During a meeting, managers spoke of several instances in which confidential information appeared on inappropriate websites. The company also discovered its firewall did not filter out certain traffic to prevent such issues. Which of the following most likely exposed the confidential information?
Which of the following scripting languages is most likely to be used in a Linux command-line environment?
An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step?
A developer is writing a script to calculate a bank account balance within two decimal places. Which of the following data types should the developer select to store the balance?
Which of the following software license models allows a developer to modify the original code and release its own version of the application?
Employee information is stored in a database. Which of the following BEST describes where all of an
employee’s information is stored?
Consider the following statements:
Given the input (userin) of “analyst”, to which of the following would the clearance variable be set?
A technician reading workstation security logs notices that an unidentified device is plugged into a USB port several hours a day but is never plugged in when the technician goes to check the machine. File audits reveal nothing unexpected. Which of the following devices is most likely causing this message?
Which of the following internet service types is most susceptible to weather disruptions?
Which of the following OS features would be best to use to remove unnecessary programs?
Which of the following is a wireless communication that requires devices to be within 6in of each other to
transfer information?
The sales department needs to keep a customer list that contains names, contact information, and sales
records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?
A company requires several reports that analyze related information from sales, inventory, marketing, and
compensation data. Which of the following is the BEST place to store this data?
Which of the following relational database constructs is used to ensure valid values are entered for a column?
Which of the following actions is the FINAL step in the standard troubleshooting methodology?
An IT manager wants to prevent end users from booting alternative operating systems on workstations. Which of the following security-related best practices would be used to accomplish this?
A hotel guest is using the public computer to check travel plans. Which of the following is the best approach to prevent others from seeing what the guest was doing on the computer?
A programmer creates an object to retrieve customer names from a database. Which of the following best describes the object that is retrieving the names?
All users have access to an application at a company. The data from the application is stored on a centralized device located on the network. Which of the following devices would MOST likely be used to store the data?
To establish a theory of probable cause, one technician investigates network issues in the server room while
another technician troubleshoots the user’s workstation. Which of the following troubleshooting methodologies
is being performed?
A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?
A programmer chooses a database for a new application that needs to store information, including dates, times, names, and amounts. Which of the following database features is this an example of?
An application is hosted on a local network. Which of the following descriptions is correct?
Which of the following software solutions ensures that programs running simultaneously on a workstation do not utilize the same physical memory?
A technician is concerned that sensitive data transmitted over the Internet can be intercepted and viewed during
a MITM attack. Which of the following should the technician enable to reduce the risk?
A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of the
following types of software would BEST complete this task?
A systems administrator wants to run a script at a certain time every day. Which of the following is the BEST
way to achieve this?
Which of the following terms best describes the outcome of a text message that is encrypted from its original form?
Which of the following is the BEST option for a developer to use when storing the months of a year and when
performance is a key consideration?
A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function?
A company desires to implement a six-month survey site within a remote location. Which of the following is the
BEST option for Internet service?
Which of the following language types most likely controls the way a web page looks?
Which of the following license types would be most cost effective for an organization if all users need to access software but not on a consistent basis?
A technician wants to reset the boot order on a computer. Which of the following would the technician most likely use?
Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?
A company’s team members have both old and new laptops. Which of the following connectors should be available in the conference room to ensure everyone can use the conference room projectors? (Choose two.)
A technician is troubleshooting a problem. The technician tests the theory and determines the theory is
confirmed. Which of the following should be the technician’s NEXT step?
A user revisits a website and receives a message that the site may not be secure. The user is prompted to click
a link to continue to the site. Which of the following would MOST likely identify the issue?
A technician overhears a systems administrator mention the term “IOPS”. To which of the following operating
system functions would the term BEST apply?
An administrator grants permission for a user to access data in a database. Which of the following actions was performed?
A hacker was able to obtain a user's password for email, social media, and bank accounts. Which of the following should the user do to prevent this type of attack in the future?
Which of the following types of memory can retain its content after a system reboot?
When a user types a web page name in an internet browser address field, this information is translated to an IP address behind the scenes. Which of the following is being used?
A user wants to prevent web history logging. Which of the following features will allow the user to achieve this goal?
A customer is looking for a device that uses tap to pay when making purchases. Which of the following technologies should the customer use?
A user needs an interface that supports both video and data. Which of the following will meet this requirement?
Which of the following BEST describes the practice of providing user credentials when logging onto the
network?
Which of the following is an example of information a company would ask employees to handle in a sensitive manner?
A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?
When following the troubleshooting methodology, which of the following should be performed last?
Which of the following troubleshooting steps happens before establishing a theory of probable cause?
A technician needs to install and configure a wireless SOHO network. Which of the following should the technician configure to reduce Wi-Fi interference from other household appliances?
A global variable called “age” will be created in a program and incremented through the use of a function.
Which of the following data types should be defined with the age variable?
A network technician is installing an RJ11 connector inside a home tor new internet service. Which ot the following network connection types is the technician most likely using?
Which of the following best describes the process of comparing MD5 values after downloading software?
Which of the following types of encryptions would BEST protect a laptop computer in the event of theft?
A program needs to choose apples, oranges, or bananas based on an input. Which of the following
programming constructs is BEST to use?
Salespeople roam around a retail store conducting transactions. Which of the following computing devices would be most ideal for point-of-sale transactions?
A new device has been installed on a wired network and can be accessed via the LAN but cannot be accessed remotely.
Which of the following is the most likely cause?
Meaningful and accurate reporting is essential to retailers in making business decisions while managing
inventory. Which of the following offers the BEST assistance in generating reports?
Which of the following describes the ability to recover access to a specific account if a credential is forgotten?
of the following would most likely be used to protect the intellectual property of printed materials?
A technician is troubleshooting an error message and tests the same program on a separate, identical
machine. Which of the following troubleshooting methodology steps is this an example of?
The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?
For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:
A company wants to build an application that is available to employees without a client component because some employees do not connect to the corporate network in order to work. Which of the following network types would best deliver this application to all employees?
A computer technician is assigned a ticket to install a laptop for a new employee. Due to the arrangement of the
workspace, the employee requests that the laptop be installed with the cover closed. Which of the following
would be required to satisfy this request? (Choose two.)
A business would like to create an employee portal that employees will have access to when they are at work.
The employees will not be able to connect to the portal from home without a VPN connection. Which of the
following types of application does this describe?
Which of the following describes something in a database that refers to the unique identifier in the parent
table?
Users are required to install a certificate in order to access commercial web pages through a corporate proxy server. Which of the following Windows Control Panel applets would enable users to verify the needed certificate is installed?
A technician is configuring a new Windows PC and needs to choose a filesystem that supports encryption. Which of the following is the technician most likely to choose?