PCCET 1 EXAM QUESTIONS WITH
CORRECT ANSWERS
Business intelligence (BI) software consists of tools and techniques used to surface
large amounts of raw unstructured data to perform a variety of tasks, including data
mining, event processing, and predictive analytics
True or False - Correct Answers -True.
The process in which end users find personal technology and apps that are more
powerful or capable, more convenient, less expensive, quicker to install, and easier to
use than enterprise IT solutions is known as consumerization.
True or False - Correct Answers -True
Which action is associated with Web 1.0?
A. checking CNN's website for news
B. posting on Facebook
C. adding information to Wikipedia
D. asking Apple's Siri a question - Correct Answers -A. checking CNN's website for
news
4Which action is associated with Web 3.0?
A. Checking CNN's website for news
B. posting on Facebook
C. adding information to Wikipedia
D. asking Apple's Siri a question - Correct Answers -D. asking Apple's Siri a question
Gmail is associated with which cloud computing model?
A. SaaS
B. PaaS
C. IaaS
D. DaaS - Correct Answers -A. SaaS
Which two port numbers are associated with HTTP? (Choose two.)
A. 80
B. 389
, C. 8080
D. 25 - Correct Answers -A. 80
C. 8080
Which port number is associated with HTTPS?
A. 21
B. 23
C. 443
D. 53 - Correct Answers -C. 443
Which port is used for encrypted communication?
A. 22
B. 80
C. 389
D. 25 - Correct Answers -A. 22
Which protocol distinguishes between applications using port numbers?
A. TCP
B. ICMP
C. ESP
D. UDP - Correct Answers -A. TCP
How do attackers prevent port scans from being noticed by monitoring software?
A. scan ports so quickly it is finished before it can be detected and stopped
B. scan ports so slowly it looks like random attempts to connect, rather than a concerted
attack
C. scan ports from an internal device
D. scan ports through WiFi instead of Ethernet - Correct Answers -A. scan ports so
quickly it is finished before it can be detected and stopped
Which potentially risky attributes is the most serious?
A. pervasive
B. malware
C. excessive bandwidth
D. tunnels - Correct Answers -B. malware
Which application can be used as a tunnel for other applications?
A. Telnet
B. SMTP
C. HTTPS
D. SSH - Correct Answers -D. SSH
Which two devices or systems require the configuration of non-standard ports to be able
to use an application on a non-standard port? (Choose two.)
A. firewall
B. client
CORRECT ANSWERS
Business intelligence (BI) software consists of tools and techniques used to surface
large amounts of raw unstructured data to perform a variety of tasks, including data
mining, event processing, and predictive analytics
True or False - Correct Answers -True.
The process in which end users find personal technology and apps that are more
powerful or capable, more convenient, less expensive, quicker to install, and easier to
use than enterprise IT solutions is known as consumerization.
True or False - Correct Answers -True
Which action is associated with Web 1.0?
A. checking CNN's website for news
B. posting on Facebook
C. adding information to Wikipedia
D. asking Apple's Siri a question - Correct Answers -A. checking CNN's website for
news
4Which action is associated with Web 3.0?
A. Checking CNN's website for news
B. posting on Facebook
C. adding information to Wikipedia
D. asking Apple's Siri a question - Correct Answers -D. asking Apple's Siri a question
Gmail is associated with which cloud computing model?
A. SaaS
B. PaaS
C. IaaS
D. DaaS - Correct Answers -A. SaaS
Which two port numbers are associated with HTTP? (Choose two.)
A. 80
B. 389
, C. 8080
D. 25 - Correct Answers -A. 80
C. 8080
Which port number is associated with HTTPS?
A. 21
B. 23
C. 443
D. 53 - Correct Answers -C. 443
Which port is used for encrypted communication?
A. 22
B. 80
C. 389
D. 25 - Correct Answers -A. 22
Which protocol distinguishes between applications using port numbers?
A. TCP
B. ICMP
C. ESP
D. UDP - Correct Answers -A. TCP
How do attackers prevent port scans from being noticed by monitoring software?
A. scan ports so quickly it is finished before it can be detected and stopped
B. scan ports so slowly it looks like random attempts to connect, rather than a concerted
attack
C. scan ports from an internal device
D. scan ports through WiFi instead of Ethernet - Correct Answers -A. scan ports so
quickly it is finished before it can be detected and stopped
Which potentially risky attributes is the most serious?
A. pervasive
B. malware
C. excessive bandwidth
D. tunnels - Correct Answers -B. malware
Which application can be used as a tunnel for other applications?
A. Telnet
B. SMTP
C. HTTPS
D. SSH - Correct Answers -D. SSH
Which two devices or systems require the configuration of non-standard ports to be able
to use an application on a non-standard port? (Choose two.)
A. firewall
B. client