Podcast
Questions and Answers
A company's team members have both old and new laptops. Which of the following connectors should be available in the conference room to ensure everyone can use the conference room projectors? (Choose two)
A company's team members have both old and new laptops. Which of the following connectors should be available in the conference room to ensure everyone can use the conference room projectors? (Choose two)
A programmer uses DML to modify:
A programmer uses DML to modify:
A technician is concerned about sensitive data transmitted over the Internet being intercepted during a MITM attack. What should the technician enable to reduce the risk?
A technician is concerned about sensitive data transmitted over the Internet being intercepted during a MITM attack. What should the technician enable to reduce the risk?
Given the pseudocode provided, what is the output of the code?
Given the pseudocode provided, what is the output of the code?
Signup and view all the answers
A developer needs to add a table to a database. Which of the following database activities should the user perform?
A developer needs to add a table to a database. Which of the following database activities should the user perform?
Signup and view all the answers
Which of the following is primarily a confidentiality concern?
Which of the following is primarily a confidentiality concern?
Signup and view all the answers
A software developer wants to protect a document with step-by-step instructions on how to use software. What should the developer use to BEST protect the document?
A software developer wants to protect a document with step-by-step instructions on how to use software. What should the developer use to BEST protect the document?
Signup and view all the answers
Which of the following database concepts would MOST likely use a CSV file?
Which of the following database concepts would MOST likely use a CSV file?
Signup and view all the answers
A help desk technician wants to find out if a colleague has encountered the same issue before. What should the technician do FIRST?
A help desk technician wants to find out if a colleague has encountered the same issue before. What should the technician do FIRST?
Signup and view all the answers
Which of the following BEST describes the practice of providing user credentials when logging onto the network?
Which of the following BEST describes the practice of providing user credentials when logging onto the network?
Signup and view all the answers
Which of the following allows wireless devices to communicate to a wired network?
Which of the following allows wireless devices to communicate to a wired network?
Signup and view all the answers
Which of the following computing devices provides a centralized means to distribute services on a LAN?
Which of the following computing devices provides a centralized means to distribute services on a LAN?
Signup and view all the answers
What describes something in a database that refers to the unique identifier in the parent table?
What describes something in a database that refers to the unique identifier in the parent table?
Signup and view all the answers
For which of the following is a relational database management system MOST commonly used?
For which of the following is a relational database management system MOST commonly used?
Signup and view all the answers
Which of the following BEST describes an application running on a typical operating system?
Which of the following BEST describes an application running on a typical operating system?
Signup and view all the answers
What action would BEST improve the signal strength of a weak wireless access point broadcast signal?
What action would BEST improve the signal strength of a weak wireless access point broadcast signal?
Signup and view all the answers
A user is getting an error message when trying to access a website. What troubleshooting step is the technician using by browsing to the same site?
A user is getting an error message when trying to access a website. What troubleshooting step is the technician using by browsing to the same site?
Signup and view all the answers
A user is attempting to print to a wireless printer but encounters an error. What should the user do to correct the issue?
A user is attempting to print to a wireless printer but encounters an error. What should the user do to correct the issue?
Signup and view all the answers
What relational database construct is used to ensure valid values are entered for a column?
What relational database construct is used to ensure valid values are entered for a column?
Signup and view all the answers
What should be set up to ensure data on a laptop cannot be accessed by unauthorized parties, even if the laptop is stolen?
What should be set up to ensure data on a laptop cannot be accessed by unauthorized parties, even if the laptop is stolen?
Signup and view all the answers
Which of the following is an example of a program that directly manages hardware for storage, networking, and virtual machines?
Which of the following is an example of a program that directly manages hardware for storage, networking, and virtual machines?
Signup and view all the answers
Which of the following actions is the FINAL step in the standard troubleshooting methodology?
Which of the following actions is the FINAL step in the standard troubleshooting methodology?
Signup and view all the answers
Which of the following is a value that uniquely identifies a database record?
Which of the following is a value that uniquely identifies a database record?
Signup and view all the answers
A systems administrator wants to return results for a time range within a database. Which of the following commands should the administrator use?
A systems administrator wants to return results for a time range within a database. Which of the following commands should the administrator use?
Signup and view all the answers
Which of the following statements BEST describes binary?
Which of the following statements BEST describes binary?
Signup and view all the answers
Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program's run. Which of the following would Joe MOST likely use to accomplish this?
Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program's run. Which of the following would Joe MOST likely use to accomplish this?
Signup and view all the answers
An end user's computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician's NEXT step?
An end user's computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician's NEXT step?
Signup and view all the answers
A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?
A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?
Signup and view all the answers
Which of the following is an advantage of installing an application to the cloud?
Which of the following is an advantage of installing an application to the cloud?
Signup and view all the answers
A small company wants to set up a server that is accessible from the company network as well as the Internet. Which of the following is MOST important to determine before allowing employees to access the server remotely?
A small company wants to set up a server that is accessible from the company network as well as the Internet. Which of the following is MOST important to determine before allowing employees to access the server remotely?
Signup and view all the answers
A program needs to choose apples, oranges, or bananas based on an input. Which of the following programming constructs is BEST to use?
A program needs to choose apples, oranges, or bananas based on an input. Which of the following programming constructs is BEST to use?
Signup and view all the answers
A UPS provides protection against:
A UPS provides protection against:
Signup and view all the answers
A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?
A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?
Signup and view all the answers
A technician is troubleshooting a problem. The technician tests the theory and determines the theory is confirmed. Which of the following should be the technician's NEXT step?
A technician is troubleshooting a problem. The technician tests the theory and determines the theory is confirmed. Which of the following should be the technician's NEXT step?
Signup and view all the answers
Given the following pseudocode:
If the Breakfast program ran on Sunday, which of the following would be the output?
Given the following pseudocode: If the Breakfast program ran on Sunday, which of the following would be the output?
Signup and view all the answers
A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function?
A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function?
Signup and view all the answers
Which of the following BEST describes a kilobyte?
Which of the following BEST describes a kilobyte?
Signup and view all the answers
Which of the following security concerns is a threat to confidentiality?
Which of the following security concerns is a threat to confidentiality?
Signup and view all the answers
Ann, the president of a company, needs Internet connectivity for her home in a remote location with no existing infrastructure. Which Internet service type should she MOST likely use?
Ann, the president of a company, needs Internet connectivity for her home in a remote location with no existing infrastructure. Which Internet service type should she MOST likely use?
Signup and view all the answers
Which of the following is MOST likely used to represent international text data?
Which of the following is MOST likely used to represent international text data?
Signup and view all the answers
For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:
For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:
Signup and view all the answers
Which of the following operating systems do not require extensions on files to execute a program? (Choose two)
Which of the following operating systems do not require extensions on files to execute a program? (Choose two)
Signup and view all the answers
A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band. Which of the following should the technician select?
A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band. Which of the following should the technician select?
Signup and view all the answers
Which of the following is an example of multifactor authentication?
Which of the following is an example of multifactor authentication?
Signup and view all the answers
Which of the following language types would a web developer MOST likely use to create a website?
Which of the following language types would a web developer MOST likely use to create a website?
Signup and view all the answers
A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?
A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?
Signup and view all the answers
A startup company has created a logo and wants to ensure no other entity can use it. Which of the following should the company use to BEST protect the logo? (Choose two)
A startup company has created a logo and wants to ensure no other entity can use it. Which of the following should the company use to BEST protect the logo? (Choose two)
Signup and view all the answers
Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?
Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?
Signup and view all the answers
In which of the following situations should there be some expectation of privacy?
In which of the following situations should there be some expectation of privacy?
Signup and view all the answers
Which of the following data types should a developer use when creating a variable to hold a postal code?
Which of the following data types should a developer use when creating a variable to hold a postal code?
Signup and view all the answers
Which of the following is the closest to machine language?
Which of the following is the closest to machine language?
Signup and view all the answers
A function is BEST used for enabling programs to:
A function is BEST used for enabling programs to:
Signup and view all the answers
When transferring a file across the network, which of the following would be the FASTEST transfer rate?
When transferring a file across the network, which of the following would be the FASTEST transfer rate?
Signup and view all the answers
A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the technician should assign?
A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the technician should assign?
Signup and view all the answers
A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded. Which of the following devices would be BEST for the developer to buy?
A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded. Which of the following devices would be BEST for the developer to buy?
Signup and view all the answers
A company requires several reports that analyze related information from sales, inventory, marketing, and compensation data. Which of the following is the BEST place to store this data?
A company requires several reports that analyze related information from sales, inventory, marketing, and compensation data. Which of the following is the BEST place to store this data?
Signup and view all the answers
Which of the following software license models allows a developer to modify the original code and release its own version of the application?
Which of the following software license models allows a developer to modify the original code and release its own version of the application?
Signup and view all the answers
A computer user is downloading software from the Internet and notices the following at the end of the install file: x86.exe
. What does the x86
part likely indicate?
A computer user is downloading software from the Internet and notices the following at the end of the install file: x86.exe
. What does the x86
part likely indicate?
Signup and view all the answers
Which of the following are the basic computing operations?
Which of the following are the basic computing operations?
Signup and view all the answers
Which of the following would work BEST stored as a flat file rather than stored in a database?
Which of the following would work BEST stored as a flat file rather than stored in a database?
Signup and view all the answers
An administrator grants permission for a user to access data in a database. Which of the following actions was performed?
An administrator grants permission for a user to access data in a database. Which of the following actions was performed?
Signup and view all the answers
An employee uses spreadsheet software and connects to a remote database to pull data for a report. Which type of application architecture did the employee use?
An employee uses spreadsheet software and connects to a remote database to pull data for a report. Which type of application architecture did the employee use?
Signup and view all the answers
Ann, a user, is experiencing difficulty getting her IP-based security camera to function after a power interruption. What is the MOST likely problem?
Ann, a user, is experiencing difficulty getting her IP-based security camera to function after a power interruption. What is the MOST likely problem?
Signup and view all the answers
A programmer needs to store output in a place that can be accessed quickly. The data does not need to remain persistent. What is the BEST option for storing the data?
A programmer needs to store output in a place that can be accessed quickly. The data does not need to remain persistent. What is the BEST option for storing the data?
Signup and view all the answers
Which intellectual property concept BEST represents a legally protected slogan of a business?
Which intellectual property concept BEST represents a legally protected slogan of a business?
Signup and view all the answers
What is a wireless communication that requires devices to be within 6 inches of each other to transfer information?
What is a wireless communication that requires devices to be within 6 inches of each other to transfer information?
Signup and view all the answers
The IT department has established a new password policy. Which practices are being employed? (Choose two.)
The IT department has established a new password policy. Which practices are being employed? (Choose two.)
Signup and view all the answers
Which method would MOST likely prevent malware sent via email from infecting a computer?
Which method would MOST likely prevent malware sent via email from infecting a computer?
Signup and view all the answers
A user wants to use a laptop outside the house and remain connected to the Internet. What would be the BEST choice to accomplish this task?
A user wants to use a laptop outside the house and remain connected to the Internet. What would be the BEST choice to accomplish this task?
Signup and view all the answers
If Joe's password for a social media site is compromised, what is Joe MOST likely performing when believing his email and banking accounts may also be compromised?
If Joe's password for a social media site is compromised, what is Joe MOST likely performing when believing his email and banking accounts may also be compromised?
Signup and view all the answers
A technician is securing a new wireless network. What protocol would be the MOST secure to prevent unauthorized access?
A technician is securing a new wireless network. What protocol would be the MOST secure to prevent unauthorized access?
Signup and view all the answers
Which network protocols would MOST likely be used when sending and receiving Internet email? (Choose two.)
Which network protocols would MOST likely be used when sending and receiving Internet email? (Choose two.)
Signup and view all the answers
A database administrator finds that a table is not needed in a relational database. What command is used to completely remove the table and its data?
A database administrator finds that a table is not needed in a relational database. What command is used to completely remove the table and its data?
Signup and view all the answers
A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which of the following devices is a user MOST likely to configure to allow this?
A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which of the following devices is a user MOST likely to configure to allow this?
Signup and view all the answers
The computer language that is closest to machine code is:
The computer language that is closest to machine code is:
Signup and view all the answers
Employee information is stored in a database. Which of the following BEST describes where all of an employee's information is stored?
Employee information is stored in a database. Which of the following BEST describes where all of an employee's information is stored?
Signup and view all the answers
Which of the following is an example of an interpreted language?
Which of the following is an example of an interpreted language?
Signup and view all the answers
An employee's laptop does not connect to the Internet when it is used in a coffee shop. Which of the following is the MOST likely cause?
An employee's laptop does not connect to the Internet when it is used in a coffee shop. Which of the following is the MOST likely cause?
Signup and view all the answers
Which of the following filesystems would a Linux computer MOST likely use?
Which of the following filesystems would a Linux computer MOST likely use?
Signup and view all the answers
Which of the following concerns does installing cross-platform software address?
Which of the following concerns does installing cross-platform software address?
Signup and view all the answers
Which of the following requires the MOST frequent updating to remain effective?
Which of the following requires the MOST frequent updating to remain effective?
Signup and view all the answers
Which of the following BEST explains the use of float over integer to store monetary values?
Which of the following BEST explains the use of float over integer to store monetary values?
Signup and view all the answers
An IP address is 32 bits long. If converted to bytes, it would be:
An IP address is 32 bits long. If converted to bytes, it would be:
Signup and view all the answers
Which of the following BEST describes the purpose of a vector in programming?
Which of the following BEST describes the purpose of a vector in programming?
Signup and view all the answers
Which of the following WiFi security options would create the MOST need for a VPN connection on the client device?
Which of the following WiFi security options would create the MOST need for a VPN connection on the client device?
Signup and view all the answers
Which of the following statements BEST represents what 'x86.exe' means in the installation process?
Which of the following statements BEST represents what 'x86.exe' means in the installation process?
Signup and view all the answers
Which of the following would be used to send messages using the SMTP protocol?
Which of the following would be used to send messages using the SMTP protocol?
Signup and view all the answers
Which of the following BEST describes a technology that allows multiple users to create and edit reports at the same time?
Which of the following BEST describes a technology that allows multiple users to create and edit reports at the same time?
Signup and view all the answers
A company has installed an application that only requires a workstation to function. Which of the following architecture types is this application using?
A company has installed an application that only requires a workstation to function. Which of the following architecture types is this application using?
Signup and view all the answers
Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing?
Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing?
Signup and view all the answers
A global variable called 'age' will be created in a program and incremented through the use of a function. Which of the following data types should be defined with the age variable?
A global variable called 'age' will be created in a program and incremented through the use of a function. Which of the following data types should be defined with the age variable?
Signup and view all the answers
Which of the following is an example of information a company would ask employees to handle in a sensitive manner?
Which of the following is an example of information a company would ask employees to handle in a sensitive manner?
Signup and view all the answers
Meaningful and accurate reporting is essential to retailers in making business decisions while managing inventory. Which of the following offers the BEST assistance in generating reports?
Meaningful and accurate reporting is essential to retailers in making business decisions while managing inventory. Which of the following offers the BEST assistance in generating reports?
Signup and view all the answers
The sales department needs to keep a customer list that contains names, contact information, and sales records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?
The sales department needs to keep a customer list that contains names, contact information, and sales records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?
Signup and view all the answers
Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?
Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?
Signup and view all the answers
A business would like to create an employee portal that employees will have access to when they are at work. The employees will not be able to connect to the portal from home without a VPN connection. Which of the following types of application does this describe?
A business would like to create an employee portal that employees will have access to when they are at work. The employees will not be able to connect to the portal from home without a VPN connection. Which of the following types of application does this describe?
Signup and view all the answers
A computer technician is assigned a ticket to install a laptop for a new employee. Due to the arrangement of the workspace, the employee requests that the laptop be installed with the cover closed. Which of the following would be required to satisfy this request? (Choose two.)
A computer technician is assigned a ticket to install a laptop for a new employee. Due to the arrangement of the workspace, the employee requests that the laptop be installed with the cover closed. Which of the following would be required to satisfy this request? (Choose two.)
Signup and view all the answers
Which of the following would be considered the BEST method of securely distributing medical records?
Which of the following would be considered the BEST method of securely distributing medical records?
Signup and view all the answers
Which of the following should have the HIGHEST expectation of privacy?
Which of the following should have the HIGHEST expectation of privacy?
Signup and view all the answers
A company wants its employees to use an email client that downloads and removes messages from the email server. Which of the following protocols must be configured in the email client to facilitate this?
A company wants its employees to use an email client that downloads and removes messages from the email server. Which of the following protocols must be configured in the email client to facilitate this?
Signup and view all the answers
Which of the following storage devices have a spinning disk? (Choose two)
Which of the following storage devices have a spinning disk? (Choose two)
Signup and view all the answers
Which of the following computer components allows for communication over a computer network?
Which of the following computer components allows for communication over a computer network?
Signup and view all the answers
A company desires to implement a six-month survey site within a remote location. Which of the following is the BEST option for Internet service?
A company desires to implement a six-month survey site within a remote location. Which of the following is the BEST option for Internet service?
Signup and view all the answers
Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?
Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?
Signup and view all the answers
A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card?
A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card?
Signup and view all the answers
A company purchased a software program. The EULA states that the software can be installed on as many computers as the company wants, but only four users can be using the software at any point in time. Which of the following types of license is this an example of?
A company purchased a software program. The EULA states that the software can be installed on as many computers as the company wants, but only four users can be using the software at any point in time. Which of the following types of license is this an example of?
Signup and view all the answers
A user at a company visits a weather website often during the day. The user browses to the site in the afternoon and notices that the temperature listed is from the morning and is not the current temperature. The user closes the page and tries again with the same result. Which of the following is the MOST likely cause?
A user at a company visits a weather website often during the day. The user browses to the site in the afternoon and notices that the temperature listed is from the morning and is not the current temperature. The user closes the page and tries again with the same result. Which of the following is the MOST likely cause?
Signup and view all the answers
Which of the following application delivery mechanisms BEST describes infrastructure located in an individual organization's datacenter?
Which of the following application delivery mechanisms BEST describes infrastructure located in an individual organization's datacenter?
Signup and view all the answers
A database administrator wants to populate a database with large amounts of data from an external source. Which of the following actions should be used to get the database populated?
A database administrator wants to populate a database with large amounts of data from an external source. Which of the following actions should be used to get the database populated?
Signup and view all the answers
Which of the following would a company consider an asset?
Which of the following would a company consider an asset?
Signup and view all the answers
A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?
A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?
Signup and view all the answers
Given the input (userin) of analyst
, to which of the following would the clearance variable be set?
Given the input (userin) of analyst
, to which of the following would the clearance variable be set?
Signup and view all the answers
Which of the following is a reason why complex passwords are required?
Which of the following is a reason why complex passwords are required?
Signup and view all the answers
A technician is troubleshooting an error message and tests the same program on a separate, identical machine. Which of the following troubleshooting methodology steps is this an example of?
A technician is troubleshooting an error message and tests the same program on a separate, identical machine. Which of the following troubleshooting methodology steps is this an example of?
Signup and view all the answers
Which of the following storage types is MOST vulnerable to magnetic damage?
Which of the following storage types is MOST vulnerable to magnetic damage?
Signup and view all the answers
When developing a game, a developer creates a boss object that has the ability to jump. Which of the following programming concepts does jump represent?
When developing a game, a developer creates a boss object that has the ability to jump. Which of the following programming concepts does jump represent?
Signup and view all the answers
Concerned with vulnerabilities on a home network, an administrator replaces the wireless router with a recently released new device. After configuring the new device utilizing the old SSID and key, some light switches are no longer communicating. Which of the following is the MOST likely cause?
Concerned with vulnerabilities on a home network, an administrator replaces the wireless router with a recently released new device. After configuring the new device utilizing the old SSID and key, some light switches are no longer communicating. Which of the following is the MOST likely cause?
Signup and view all the answers
Given the following pseudocode: If there are seven apples in the basket, which of the following would be the number of oranges a person eats?
Given the following pseudocode: If there are seven apples in the basket, which of the following would be the number of oranges a person eats?
Signup and view all the answers
Which of the following are the primary functions of an operating system? (Choose two.)
Which of the following are the primary functions of an operating system? (Choose two.)
Signup and view all the answers
SQL databases use primary and foreign keys to enable which of the following?
SQL databases use primary and foreign keys to enable which of the following?
Signup and view all the answers
Which of the following is a logical structure for storing files?
Which of the following is a logical structure for storing files?
Signup and view all the answers
Which of the following is both an input and output device?
Which of the following is both an input and output device?
Signup and view all the answers
A technician has successfully verified full system functionality after implementing the solution to a problem. Which of the following is the NEXT troubleshooting step the technician should do?
A technician has successfully verified full system functionality after implementing the solution to a problem. Which of the following is the NEXT troubleshooting step the technician should do?
Signup and view all the answers
A large payment website was breached recently. A user is concerned that the breach will affect account security on other sites. Which of the following password best practices would mitigate this risk?
A large payment website was breached recently. A user is concerned that the breach will affect account security on other sites. Which of the following password best practices would mitigate this risk?
Signup and view all the answers
A company is concerned with ensuring its databases are highly available. Which of the following can be used to increase database availability?
A company is concerned with ensuring its databases are highly available. Which of the following can be used to increase database availability?
Signup and view all the answers
A user revisits a website and receives a message that the site may not be secure. The user is prompted to click a link to continue to the site. Which of the following would MOST likely identify the issue?
A user revisits a website and receives a message that the site may not be secure. The user is prompted to click a link to continue to the site. Which of the following would MOST likely identify the issue?
Signup and view all the answers
A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open?
A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open?
Signup and view all the answers
Which of the following contains exactly four copper wires?
Which of the following contains exactly four copper wires?
Signup and view all the answers
Study Notes
Computer Systems and Security
- Confidentiality is primarily a concern of eavesdropping.
- A software developer can use a copyright to protect a document with step-by-step instructions on how to use the software.
- A CSV file is most likely used for data importing.
Help Desk and Troubleshooting
- When encountering an issue, a help desk technician should first check the Knowledge Base.
- A technician can use duplication to troubleshoot an issue by browsing to the same site as the user to see if the issue can be replicated.
Networking and Communication
- A wireless access point allows wireless devices to communicate with a wired network.
- An access point can improve the signal strength by removing sources of EMI.
- A server provides a centralized means of distributing services to a group of clients on a LAN.
Database Systems
- A relational database management system is commonly used for storing information.
- A foreign key in a database refers to the unique identifier in the parent table.
- Constraints are used in relational databases to ensure valid values are entered for a column.
Operating Systems and Programming
- An application running on a typical operating system is described as a process.
- Java is a compiled language.
- A variable is used to store a number that changes over the duration of a program's run.
Security and Data Protection
- Encryption should be set up to ensure data cannot be accessed by anyone, even if the laptop is stolen.
- Non-repudiation is an example of a regulation requiring new applicants to provide a scan of their retinas.
Cloud Computing
- An advantage of installing an application to the cloud is that data is not stored locally.
IT and Computing Concepts
- A UPS provides protection against power outages.
- If-else statements are used in programming to choose between different options based on an input.### Troubleshooting
- When troubleshooting a problem, after confirming a theory, the next step is to implement the solution.
- A technician should document lessons learned after implementing a solution.
Programming and Coding
- The pseudocode "If the Breakfast program ran on Sunday" would output "Waffles".
- A kilobyte is a measurement of storage (e.g., 100KB).
- Open source software allows developers to modify the original code and release their own version of the application.
- The basic computing operations are Input, Process, Output, and Storage.
Security
- A replay attack is a threat to confidentiality.
- Implementing a password policy that includes password complexity, password history, and password expiration can improve security.
- Patching can prevent malware sent as compromised files via email from infecting a person's computer.
- WPA2 is the most secure protocol for wireless networks.
Networking
- WLAN (Wireless Local Area Network) is the best choice for connecting to the Internet while outdoors.
- SMTP (Simple Mail Transfer Protocol) and POP3 (Post Office Protocol version 3) are protocols used for sending and receiving internet email.
- Satellite Internet is the most suitable option for remote locations with no existing infrastructure.
Hardware and Software
- A USB cable is needed to connect a printer to a workstation.
- A driver is required for a workstation to recognize a printer.
- DVI (Digital Visual Interface) is used to connect a display to a workstation.
- Unicode is used to represent international text data.
Database and Storage
- A flat file is the best option for storing output that does not need to remain persistent.
- A relational database is suitable for storing data that needs to be accessed quickly.
- The command "DROP" is used to completely remove a table and its data from a relational database.
IT and Ethics
- A technician granting permission for a user to access data in a database is an example of data definition.
- Client-server architecture is used when a user connects to a remote database to pull data for a report.
- Password reuse can compromise email and banking accounts if a password is compromised.### Computer Systems and Programming
- A developer creates step-by-step instructions/procedures and conditional statements for a computer program to solve problems, which is known as developing an algorithm.
- A company can protect its logo by registering it as a trademark to prevent others from using it for any purpose.
Data and Security
- Full disk encryption is the best way to keep data on a laptop safe if the laptop is lost or stolen.
- A string data type is best used when creating a variable to hold a postal code.
- Assembly language is closest to machine language.
Networking and Internet
- A valid IP address is 172.16.2.189.
- A database is the best place to store data that needs to be analyzed, such as sales, inventory, marketing, and compensation data.
- SMTP protocol is used to send messages using email software.
- Configuring prompting before downloading content can help prevent malware infections caused by Internet browsing.
Information and Data Management
- A company should handle customer data of birth in a sensitive manner.
- Database software is the best application to use when multiple people need to edit a list at the same time.
Hardware and Software
- A workstation is the best device for a game developer who needs high-end specifications that can be upgraded.
- x86.exe installation file is specific to 32-bit CPU architecture.
- Email software is used to send messages using the SMTP protocol.
Security and Privacy
- Trademark is used to protect a company's logo from being used by others.
- Encrypting data is the best method of securely distributing medical records.
- A user has a high expectation of privacy when storing a locally stored word processing document.
- Role-based access control is used to assign permissions and authorize a user based on job title or function.
- A concurrent license allows a certain number of users to use the software at any point in time.
Computer Components and Peripherals
- A NIC (Network Interface Card) is a computer component that allows for communication over a computer network.
- A satellite connection is the best option for Internet service in a remote location.
- A GPU (Graphics Processing Unit) performs processing on a graphics card.
Software and Licensing
- A concurrent license allows a certain number of users to use the software at any point in time.
- A company can assign permissions and authorize a user based on job title or function using role-based access control.
Data Storage and Management
- A corrupted cache is the most likely cause of a website displaying outdated information.
- IMPORT is the action used to populate a database with large amounts of data from an external source.
Business and Ethics
- A company should handle customer data of birth in a sensitive manner.
- A written policy is the best way to document a change in a company's policy, such as allowing staff to work from home.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Practice quiz for CompTIA FC0-U61 certification exam, covering various topics in IT and computer systems.