IBCA Certification Practice Exam
54 Questions
100 Views

IBCA Certification Practice Exam

Created by
@GuiltlessCyan

Questions and Answers

Which connector on the back of a computer is used to attach a mouse to a modern PC system?

USB A

Which of the following are possible consequences of updating all 20 users with a single key for 10 users? (Select two)

  • You will gain the trust of your employees
  • Your company is exposed to litigation by violating the software license agreement (correct)
  • You risk losing your job (correct)
  • Your organization may receive a discount
  • Which of the following SQL commands would you use to delete an entire table and all of its data?

    DROP

    What is the best device to deploy to protect your private network from an untrusted public network?

    <p>Firewall</p> Signup and view all the answers

    You need a storage device that has very large storage capacity, is fast, and is relatively inexpensive. Which storage device will best suit your needs?

    <p>Hard disk</p> Signup and view all the answers

    What type of attack occurred when the user was instructed to send her bank account number?

    <p>Phishing</p> Signup and view all the answers

    In object-oriented programming, which of the following concepts is used to describe properties?

    <p>Attributes</p> Signup and view all the answers

    Software that requires a monthly subscription fee is often called _______________.

    <p>Software as a Service</p> Signup and view all the answers

    Which of the following is a firewall function?

    <p>Packet filtering</p> Signup and view all the answers

    What is the best countermeasure against social engineering?

    <p>User awareness training</p> Signup and view all the answers

    Which technology is being used in mobile phones that store and transmit encrypted information?

    <p>NFC chips</p> Signup and view all the answers

    Which of the following describes the firmware in gaming consoles, TVs, and smart cars?

    <p>Embedded OS</p> Signup and view all the answers

    Which command should a database administrator execute to export a table as a backup?

    <p>BACKUP</p> Signup and view all the answers

    Which notational system is most likely used to represent a MAC address?

    <p>Hexadecimal</p> Signup and view all the answers

    Which programming models are built from class templates that have properties, attributes, and methods?

    <p>Objects</p> Signup and view all the answers

    Which of the following stores data using microscopic light and dark spots?

    <p>Compact disc</p> Signup and view all the answers

    What is the name of the narrow strip along the bottom of the Windows environment?

    <p>Taskbar</p> Signup and view all the answers

    Which protections should a business use to protect a new logo for their brand?

    <p>Trademark</p> Signup and view all the answers

    Which connector on the back of a computer is used to attach a mouse to a modern PC system?

    <p>USB A</p> Signup and view all the answers

    Your organization has 20 employees who need an accounting software update installed. What are possible consequences if you update all 20 users instead of 10? (Select TWO)

    <p>You risk losing your job</p> Signup and view all the answers

    Which of the following SQL commands would you use to delete an entire table and all of its data?

    <p>Drop</p> Signup and view all the answers

    Which of the following is the best device to deploy to protect your private network from an untrusted public network?

    <p>Firewall</p> Signup and view all the answers

    You need a storage device that has very large storage capacity, is fast, and is relatively inexpensive. Which storage device will best suit your needs?

    <p>Hard disk</p> Signup and view all the answers

    What type of attack occurred when a user complied with a sender's request for bank details after being offered a share of frozen money?

    <p>Phishing</p> Signup and view all the answers

    In object-oriented programming, which of the following concepts is used to describe properties?

    <p>Attributes</p> Signup and view all the answers

    Software that requires a monthly subscription fee is often called _______________.

    <p>Software as a service</p> Signup and view all the answers

    Which of the following is a firewall function?

    <p>Packet filtering</p> Signup and view all the answers

    What is the best countermeasure against social engineering?

    <p>User awareness training</p> Signup and view all the answers

    Which technology is being used in phones that can store and transmit encrypted information?

    <p>NFC chips</p> Signup and view all the answers

    Which of the following describes the firmware in gaming consoles, TVs, and smart cars?

    <p>Embedded OS</p> Signup and view all the answers

    Which command should a database administrator execute to export a table as a backup?

    <p>BACKUP</p> Signup and view all the answers

    Which notational system is MOST LIKELY used to represent a MAC address?

    <p>Hexadecimal</p> Signup and view all the answers

    Which programming models are built from class templates that have properties, attributes, and methods?

    <p>Objects</p> Signup and view all the answers

    Which of the following stores data using microscopic light and dark spots?

    <p>Compact disc</p> Signup and view all the answers

    What is the name of the narrow strip along the bottom of the Windows environment?

    <p>Taskbar</p> Signup and view all the answers

    Which protections should a business use to protect a new logo as part of their brand?

    <p>Trademark</p> Signup and view all the answers

    Which of the following database access methods should a developer use to read, write, update, and delete database records?

    <p>Programmatic access</p> Signup and view all the answers

    In a relational database table, columns are better known as ________________.

    <p>Fields</p> Signup and view all the answers

    What is the main risk of using a password manager?

    <p>Master password is compromised</p> Signup and view all the answers

    Which of the following two options are the main types of firewall? (Select two)

    <p>Network firewall</p> Signup and view all the answers

    What is junk email?

    <p>Unwanted, unsolicited email</p> Signup and view all the answers

    Which kind of system software tells the computer how to communicate with peripherals, such as a printer or scanner?

    <p>Device drivers</p> Signup and view all the answers

    Which of the following rights is NOT guaranteed by copyright?

    <p>Right to avoid criticism</p> Signup and view all the answers

    Which of the following is technically NOT a programming language?

    <p>HTML</p> Signup and view all the answers

    A small business wants a computing device that will provide central access to business resources. Which type of device is needed?

    <p>Network server</p> Signup and view all the answers

    The ______________ is an information system that connects documents to each other by hypertext links.

    <p>World Wide Web</p> Signup and view all the answers

    What is the collective name for creations that are not the intellectual property of anybody?

    <p>Public Domain</p> Signup and view all the answers

    The idea of programming by modeling real-world things into computer code is called _____________.

    <p>Object-oriented programming</p> Signup and view all the answers

    Which of the following lists the basic computing and processing steps in order?

    <p>Input, processing, output, and storage</p> Signup and view all the answers

    What feature allows you to allow or reject client connections based on the hardware address?

    <p>MAC address filtering</p> Signup and view all the answers

    Which Windows utility will allow you to manually update the driver for a network adapter?

    <p>Device Manager</p> Signup and view all the answers

    Which two actions should you take if you receive an email about a new, serious malicious code threat? (Select two)

    <p>Run a full anti-malware scan</p> Signup and view all the answers

    What is the primary function of a pop-up blocker?

    <p>Prevents unwanted advertisements</p> Signup and view all the answers

    What should a user do if their spreadsheet application becomes unresponsive?

    <p>Use Task Manager to end task</p> Signup and view all the answers

    Study Notes

    Computer Connectors and Devices

    • USB A connectors are commonly used for attaching mice to modern PC systems.
    • Firewalls serve to protect private networks from untrusted public networks.
    • Hard disks offer large storage capacity, speed, and affordability for data storage needs.
    • NFC chips enable encrypted information transfer, commonly used in mobile payments.

    Software and Database Management

    • SQL command DROP deletes an entire table and its data.
    • BACKUP command is essential for exporting a database table as a precaution before making changes.
    • A database is the optimal choice for tracking customer feedback and feature requests, enabling indexing and sorting.

    Security and Compliance

    • Risks of updating software beyond purchased licenses include job loss and potential litigation.
    • Phishing attacks aim to steal sensitive information via deceptive emails, leading to unauthorized access to personal accounts.
    • Social engineering countermeasures revolve around user awareness and training.

    Programming Fundamentals

    • Attributes in object-oriented programming describe properties of objects, enhancing their functionality.
    • Programming by modeling real-world scenarios is termed Object-oriented programming.
    • Algorithms are structured problem-solving statements created in programming.

    Data and Privacy

    • Fields refer to columns in a relational database table.
    • Cookies are small files used by websites to remember user preferences.
    • Public Domain denotes creations not owned by anyone, allowing free use.
    • Fair Use doctrine permits limited use of copyrighted works for public benefit.

    Troubleshooting and Technical Support

    • When troubleshooting a Windows error with a blue screen, searching the error code in Microsoft's knowledge base is the recommended first step.
    • Users experiencing network issues in accessing websites may indicate a proxy server filtering connection attempts.
    • Task Manager is the best tool to end unresponsive applications.

    Internet and Network Configuration

    • RJ-45 connectors are standard for terminating Cat 5e and Cat 6a network cables.
    • Proper MAC address filtering allows or rejects client connections based on hardware addresses, promoting network security.

    Miscellaneous

    • OneDrive is Microsoft’s cloud storage service integrated into Windows.
    • Device drivers enable communication between the computer and peripherals like printers and scanners.
    • Vector allows dynamic resizing in programming, accommodating variable numbers of values.
    • Junk email is identified as unsolicited and unwanted communications.
    • Trademark protections are essential for safeguarding brand identities like logos.
    • Password reuse represents a significant risk, as demonstrated by compromised accounts when users rely on the same password across multiple sites.
    • Redundancy applies to disaster recovery, ensuring server availability during failures.

    Tools and Collaboration

    • Resource management software tracks project assignments, while collaborative editing tools enable simultaneous work on documents.
    • The World Wide Web connects documents through hypertext links, facilitating information access and usability.

    Additional Notes

    • Master passwords for password managers represent potential risks if compromised.
    • Blu-ray discs require an optical drive for playback on computers.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge with this IBCA certification practice exam. These flashcards cover essential topics including hardware connections and software licensing issues relevant to IT professionals. Perfect for preparing for the IBCA certification exam!

    More Quizzes Like This

    Use Quizgecko on...
    Browser
    Browser