Which of the following is primarily a confidentiality concern?
|\ |\ |\ |\ |\ |\ |\ |\
A. Eavesdropping
|\
B. Impersonating
|\
C. Destructing
|\
D. Altering - CORRECT ANSWERS ✔✔A. Eavesdropping
|\ |\ |\ |\ |\ |\
A software developer develops a software program and writes a
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
document with step-by-step instructions on how to use the
|\ |\ |\ |\ |\ |\ |\ |\ |\
software. The developer wants to ensure no other person or
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
company will publish this document for public use. Which of the
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
following should the developer use to BEST protect the
|\ |\ |\ |\ |\ |\ |\ |\ |\
document?
A. Patent
|\
B. Trademark
|\
C. Watermark
|\
D. Copyright - CORRECT ANSWERS ✔✔D. Copyright
|\ |\ |\ |\ |\ |\
Which of the following database concepts would MOST likely use
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
a CSV file?
|\ |\
A. Data querying
|\ |\
B. Data reports
|\ |\
C. Data importing
|\ |\
D. Data persistence - CORRECT ANSWERS ✔✔B. Data reports
|\ |\ |\ |\ |\ |\ |\ |\
,A help desk technician encounters an issue and wants to find out
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
if a colleague has encountered the same issue before. Which of
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
the following should the technician do FIRST?
|\ |\ |\ |\ |\ |\
A. Check Knowledge Base.
|\ |\ |\
B. Search local logs.
|\ |\ |\
C. Research possible theories.
|\ |\ |\
D. Question users. - CORRECT ANSWERS ✔✔A. Check Knowledge
|\ |\ |\ |\ |\ |\ |\ |\ |\
Base
Which of the following BEST describes the practice of providing
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
user credentials when logging onto the network?
|\ |\ |\ |\ |\ |\
A. Output |\
B. Storage|\
C. Input |\
D. Processing - CORRECT ANSWERS ✔✔C. Input
|\ |\ |\ |\ |\ |\
Which of the following allows wireless devices to communicate to
|\ |\ |\ |\ |\ |\ |\ |\ |\
a wired network?
|\ |\ |\
A. Modem |\
B. Switch |\
C. Firewall
|\
D. Access point - CORRECT ANSWERS ✔✔D. Access Point
|\ |\ |\ |\ |\ |\ |\ |\
,Which of the following computing devices would be used to
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
provide a centralized means to distribute services to a group of
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
clients and usually possesses a role on a LAN?
|\ |\ |\ |\ |\ |\ |\ |\
A. Laptop
|\
B. Workstation
|\
C. Mobile phone
|\ |\
D. Server - CORRECT ANSWERS ✔✔D. Server
|\ |\ |\ |\ |\ |\
Which of the following describes something in a database that
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
refers to the unique identifier in the parent table?
|\ |\ |\ |\ |\ |\ |\ |\
A. Attribute
|\
B. Constraint
|\
C. Foreign key
|\ |\
D. Schema - CORRECT ANSWERS ✔✔A. Attribute
|\ |\ |\ |\ |\ |\
For which of the following is a relational database management
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
system MOST commonly used?|\ |\ |\
A. Building flowcharts
|\ |\
B. Storing information
|\ |\
C. Generating reports
|\ |\
D. Creating diagrams - CORRECT ANSWERS ✔✔B. Storing
|\ |\ |\ |\ |\ |\ |\ |\
Information
Which of the following BEST describes an application running on
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
a typical operating system?
|\ |\ |\
A. Process
|\
, B. Thread |\
C. Function
|\
D. Task - CORRECT ANSWERS ✔✔A. Process
|\ |\ |\ |\ |\ |\
The broadcast signal from a recently installed wireless access
|\ |\ |\ |\ |\ |\ |\ |\ |\
point is not as strong as expected. Which of the following actions
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
would BEST improve the signal strength?
|\ |\ |\ |\ |\
A. Update from 802.11b to 802.11g.
|\ |\ |\ |\ |\
B. Ensure sources of EMI are removed.
|\ |\ |\ |\ |\ |\
C. Enable WPA2-Enterprise.
|\ |\
D. Use WiFi Protected Setup. - CORRECT ANSWERS ✔✔B. Ensure
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
Sources of EMI Are Removed |\ |\ |\ |\
A user is getting an error message when trying to go to a
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
website. A technician asks the user a few questions to find out
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
more about the issue. The technician opens a browser locally and
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
browses to the same site as the user. Which of the following
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
troubleshooting steps is the technician using by browsing to the |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
same site? |\
A. Establish a plan of action.
|\ |\ |\ |\ |\
B. Gather information
|\ |\
C. Duplicate the problem.
|\ |\ |\
D. Find the root cause. - CORRECT ANSWERS ✔✔C. Duplicate The
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
Problem
|\