Answers Latest Update 2025/2026 (100% Correct Answers)
a
1. Which data set consumes disk space equal to the change in the data since it was last
captured?
A. Static
B. Snapshot
C. Dynamic
D. Big: B
2. An organization wants to calculate its sales by region.
Which type of software will serve this need?
A. Personnel management
B. Inventory management
C. Customer relationship management (CRM)
D. Human resources management (HRM): C
3. Which component functions as a computer's working memory?
A. Central processing unit (CPU)
B. Read-only memory (ROM)
,C. Random access memory (RAM)
D. Solid state drive (SSD): C
4. What is a secondary storage medium?
A. Read-only memory
B. Cache
C. Magnetic tape
D. Random access memory: C
5. A business wants to allow its employees to communicate online with each other in
real time.
What should the business use to achieve this?
A. Word processor
B. Instant messaging
C. Spreadsheet
Email: B
6. Which type of network should a company use if they want to connect a group
of computers in an office building?
,A. LAN
B. WAN
C. PAN
D. MAN: A
7. Which network topology uses a central hub to which all devices on the network
are connected?
A. Wireless
B. Bus
C. Star
D. Hybrid: C
8. Which lifecycle stage of ITIL focuses on ensuring that a business's objec- tives
align with those of the IT provider?
A. Service strategy (SS)
B. Service transition (ST)
C. Service design (SD)
D. Service operation (SO): A
9. Why was ITIL developed?
A. As an assessment tool to be used globally in the IT industry
B. As a consulting organization to support the IT industry globally
C. As a global oversight committee for the IT industry
D. As a guide to be used globally in the IT industry: D
10. Which two subcategories are found within the service strategy stages? Choose 2
answers.
, A. Demand management
B. Knowledge management
C. Access management
D. Problem management
E. Financial management: AE
11. Which multiuser operating system originated at AT&T's Bell Laboratories?
A. OS X
B. Android
C. Unix
D. Linux: C
12. Which IT ethics policy protects a company by outlining the corporate
guidelines or principles governing online communications?
A. Social media
B. Information privacy
C. Email privacy
D. Acceptable use: A
13. What is an example of a best practice in an ethical IT use policy?
A. Perform non-repudiation
B. Eliminate information management risks
C. Train employees in compliance
D. Create automatic updates of software patches: C
14. Which IT ethical policy is violated when an employee shares information with