A technician has successfully verified full system functionality after implementing the solution to a problem.
Which of the following is the NEXT troubleshooting step the technician should do?
A customer is looking for a device that uses tap to pay when making purchases. Which of the following technologies should the customer use?
Which of the following is an advantage of installing an application to the cloud?
Which of the following is the slowest processing speed?
A technician is installing a new wireless network and wants to secure the wireless network to prevent
unauthorized access. Which of the following protocols would be the MOST secure?
All users have access to an application at a company. The data from the application is stored on a centralized device located on the network. Which of the following devices would MOST likely be used to store the data?
Which of the following application delivery mechanisms BEST describes infrastructure located in an individual organization’s datacenter?
Which of the following concerns does installing cross-platform software address?
A global variable called “age” will be created in a program and incremented through the use of a function.
Which of the following data types should be defined with the age variable?
A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST?
A user browses to a website. Before the page opens, the user receives a message that the site is not secure. Which of the following caused this message?
The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?
A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?
When developing a game, a developer creates a boss object that has the ability to jump. Which of the following
programming concepts does jump represent?
Which of the following business continuity concepts is the best example of fault tolerance?
Which of the following would be the most cost-effective method to increase availability?
Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing?
A developer needs to add a table to a database. Which of the following database activities should the user
perform?
An application developer needs to test multiple operating systems on one host. Which of the following would be the best choice for the test server?
Meaningful and accurate reporting is essential to retailers in making business decisions while managing
inventory. Which of the following offers the BEST assistance in generating reports?
To establish a theory of probable cause, one technician investigates network issues in the server room while
another technician troubleshoots the user’s workstation. Which of the following troubleshooting methodologies
is being performed?
A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps is the technician using by browsing to the same site?
Which of the following security concerns is a threat to confidentiality?
Which of the following are the basic computing operations?
Which of the following is an example of utilizing a personalized code for continuous personal access to a software product?
Which of the following is an example of an interpreted language?
The sales department needs to keep a customer list that contains names, contact information, and sales
records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?
A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card?
Which of the following shows how many results are possible when evaluating Boolean data types?
Employees of a large technology company are provided access to the internet as a work resource. Which of the following most likely represents the level of privacy employees should expect when utilizing this resource?
Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?
Which of the following would be the best reason to implement a host firewall?
Which of the following would be best to use to store a project task list that will be updated by multiple team members?
Which of the following is both an input and output device?
Which of the following database structures is the most granular?
A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which
of the following devices is a user MOST likely to configure to allow this?
Which of the following is an example of a compiled language?
A technician needs to install and configure a wireless SOHO network. Which of the following should the technician configure to reduce Wi-Fi interference from other household appliances?
A company requires several reports that analyze related information from sales, inventory, marketing, and
compensation data. Which of the following is the BEST place to store this data?
A business would like to create an employee portal that employees will have access to when they are at work.
The employees will not be able to connect to the portal from home without a VPN connection. Which of the
following types of application does this describe?
Which of the following does a NoSQL database use to organize data?
Which of the following best describes when lo use an array?
Which of the following are benefits of a security awareness training program9 (Select two).
A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?
Given the following pseudocode:
If the Breakfast program ran on Sunday, which of the following would be the output?
Which of the following is a value that uniquely identifies a database record?
Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?
Which of the following is the BEST option for a developer to use when storing the months of a year and when
performance is a key consideration?
Which of the following scripting languages is most likely to be used in a Linux command-line environment?
Which of the following internet service types is most susceptible to weather disruptions?
A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of the
following types of software would BEST complete this task?
An online retailer experienced an outage. An investigation revealed that the server received more requests than it could handle, and customers could not log in as a result. Which of the following best describes this scenario?
A systems administrator is setting up a new server using RAID technology. If one hard drive in the array fails,
the data is stored on another drive, preventing data loss. Which of the following business continuity concepts
does this explain?
A computer technician is assigned a ticket to install a laptop for a new employee. Due to the arrangement of the
workspace, the employee requests that the laptop be installed with the cover closed. Which of the following
would be required to satisfy this request? (Choose two.)
Which of the following BEST describes the practice of providing user credentials when logging onto the
network?
A technician has verified full system functionality. Which of the following actions should the technician take next?
Which of the following is an example of multifactor authentication?
Which of the following storage types uses platters to store data?
A systems administrator wants to return results for a time range within a database. Which of the following
commands should the administrator use?
A remote user, who is working from home, requires significant bandwidth to connect to the corporate systems.
Which of the following types of Internet service connections would BEST meet the user’s needs?
Which of the following software license models allows a developer to modify the original code and release its own version of the application?
Which of the following is most likely to disclose the data collection practices of an application?
A developer is writing a script to calculate a bank account balance within two decimal places. Which of the following data types should the developer select to store the balance?
Which of the following database concepts would MOST likely use a CSV file?
Which of the following would be the easiest component to upgrade on a laptop that is experiencing slow performance?
A technician is concerned that sensitive data transmitted over the Internet can be intercepted and viewed during
a MITM attack. Which of the following should the technician enable to reduce the risk?
SQL databases use primary and foreign keys to enable which of the following?
A database administrator wants to populate a database with large amounts of data from an external source.
Which of the following actions should be used to get the database populated?
Which of the following BEST describes a kilobyte?