Questions and CORRECT Answers
A company is developing an application that will be used to simplify typing on a virtual
keyboard. This will MOST likely be installed on: - CORRECT ANSWER - A Mobile OS
A database administrator has placed data from another source into a database. Which of the
following did the database administrator perform? - CORRECT ANSWER - Import
A database administrator wants to populate a database with large amounts of data from an
external source. Which of the following actions should be used to get the database populated? -
CORRECT ANSWER - IMPORT
A developer needs to add a table to a database. Which of the following database activities should
the user perform? - CORRECT ANSWER - CREATE
A group of files that enable one or more hardware devices to communicate with the computer's
operating system is known as a ______. - CORRECT ANSWER - Device driver
A large payment website was breached recently. A user is concerned that the breach will affect
account security on other sites. Which of the following password best practices would mitigate
this risk? - CORRECT ANSWER - Password expiration
A name for an IP address that is easier to remember and type is referred to as... - CORRECT
ANSWER - Domain name
A small company wants to set up a server that is accessible from the company network as well as
the Internet. Which of the following is MOST important to determine before allowing employees
to access the server remotely? - CORRECT ANSWER - A security method of allowing
connections
, A systems administrator downloads an update for a critical system. Before installing the update,
the administrator runs a hash of the download and ensures the results match the published hash
for the file. This is an example of: - CORRECT ANSWER - Integrity concerns
A systems administrator wants to return results for a time range within a database. Which of the
following commands should the administrator use? - CORRECT ANSWER - SELECT
A technician is given a document with step-by-step instructions to perform a task. Which of the
following BEST describes that document? - CORRECT ANSWER - Procedures
A user connects a company computer to free WiFi at a local coffee shop. Which of the following
BEST describes this situation? - CORRECT ANSWER - The information on the network
can be seen by others
A user logs into a laptop using a username and complex password. This is an example of: -
CORRECT ANSWER - Single-factor authentication
A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of
the following types of software would BEST complete this task? - CORRECT ANSWER -
Spreadsheet software
A user revisits a website and receives a message that the site may not be secure. The user is
prompted to click a link to continue to the site. Which of the following would MOST likely
identify the issue? - CORRECT ANSWER - Checking certification validity
A user wants to run a major update on a laptop. Which of the following should be considered
before running any major updates? - CORRECT ANSWER - Back up important folders
An administrator grants permission for a user to access data in a database. Which of the
following actions was performed? - CORRECT ANSWER - Data definition