IT fundamentals + Examination
4 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990 IT Fundamentals + Test ITF+ Test 1 / 90 Which of the following requires the MOST frequent updating to remain effective? Host firewall Web browser Device drivers Antivirus 2 / 90 Which of the following concerns does installing cross-platform software address? Subscription Licensing Product key Compatibility 3 / 90 Employee information is stored in a database. Which of the following BEST describes where all of an employee’s information is stored? Record Report Column Procedure 4 / 90 A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which of the following devices is a user MOST likely to configure to allow this? Cable modem Wireless router Access point Network switch 5 / 90 Which of the following would indicate the FASTEST processor speed? 3.6GHz 3.6MHz 3.6Mbps 3.6Gbps 6 / 90 A company wants an application to be accessed by concurrent users and store company information securely. Which of the following would be the BEST option for storing the information? Word processing document Flat file Database Spreadsheet 7 / 90 Which of the following types of encryption would BEST protect a laptop computer in the event of theft? Disk Email VPN HTTPS 8 / 90 A user logs into a laptop using a username and complex password. This is an example of: biometrics multifactor authentication least privilege single-factor authentication 9 / 90 Which of the following BEST describes the physical location of the data in the database? Table Column RAM HDD 10 / 90 A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of the following types of software would BEST complete this task? Text editing software Visual diagramming software Spreadsheet software Web browsing software 11 / 90 A systems administrator is setting up a new server using RAID technology. If one hard drive in the array fails, the data is stored on another drive, preventing data loss. Which of the following business continuity concepts does this explain? File backup Data restoration Fault tolerance Restoring access 12 / 90 Which of the following does a NoSQL database use to organize data? Primary keys Schemas Keys/values Tables 13 / 90 A developer needs to add a table to a database. Which of the following database activities should the user perform? UPDATE ALTER CREATE REPORT 14 / 90 A technician is concerned that sensitive data transmitted over the Internet can be intercepted and viewed during a MITM attack. Which of the following should the technician enable to reduce the risk? DLP ACL TLS IPS 15 / 90 A company’s team members have both old and new laptops. Which of the following connectors should be available in the conference room to ensure everyone can use the conference room projectors? USB HDMI FireWire RJ45 16 / 90 A database administrator wants to populate a database with large amounts of data from an external source. Which of the following actions should be used to get the database populated? EXPORT IMPORT SELECT ALTER 17 / 90 A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card? Input Output Storage Processing 18 / 90 Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function? Rule-based access control Mandatory access control Role-based access control Discretionary access control 19 / 90 Which of the following computer components allows for communication over a computer network? RAM NIC CPU NAS 20 / 90 Which of the following storage devices have a spinning disk? Flash drive HDD RAM ROM 21 / 90 Which of the following should have the HIGHEST expectation of privacy? A picture posted to a social media website A presentation saved to a corporate file server A locally stored word processing document A spreadsheet emailed to a business client 22 / 90 Which of the following would be considered the BEST method of securely distributing medical records? Encrypted flash drive Social networking sites Fax FTP file sharing 23 / 90 Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem? Renew the IP address. Configure the browser proxy settings. Clear the browser cache. Disable the pop-up blocker 24 / 90 The sales department needs to keep a customer list that contains names, contact information, and sales records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list? Database software Word processing software Conferencing software Presentation software 25 / 90 Which of the following is an example of information a company would ask employees to handle in a sensitive manner? Customer date of birth The first and last name of the Chief Executive Officer (CEO) Customer service number Company social media screen name 26 / 90 Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing? Turn on private browsing Delete browsing history on program close. Notify when downloads are complete. Configure prompting before downloading content. 27 / 90 Which of the following would be used to send messages using the SMTP protocol? Document sharing software Instant messaging software Conferencing software Email software 28 / 90 A computer user is downloading software from the Internet and notices the following at the end of the install file: “¦x86.exe`. Which of the following statements BEST represents what the “¦x86.exe` means in the installation file? x86 only supports an installation on a 32-bit CPU architecture. x86 supports an installation on a 32-bit and a 64-bit CPU architecture. x86 only supports an installation on a 64-bit CPU architecture. x86 supports an installation on a 16-bit CPU architecture. 29 / 90 A company requires several reports that analyze related information from sales, inventory, marketing, and compensation data. Which of the following is the BEST place to store this data? Flat file Word processor Database Network share 30 / 90 A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded. Which of the following devices would be BEST for the developer to buy? Laptop Server Game console Workstation 31 / 90 Which of the following data types should a developer use when creating a variable to hold a postal code? Integer String Float Boolean 32 / 90 Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen? Host-based firewall Strong administrator password Anti-malware software Full disk encryption 33 / 90 A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? Patent Copyright EULA NDA 34 / 90 A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed? Algorithm Software Pseudocode Flowchart 35 / 90 Which of the following is an example of multifactor authentication? Password and passphrase Fingerprint and retina scan Hardware token and smartphone Smart card and PIN 36 / 90 A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band. Which of the following should the technician select? 802.11a 802.11b 802.11g 802.11n 37 / 90 Which of the following operating systems do not require extensions on files to execute a program? Windows 7 Windows Server 2012 Android Linux 38 / 90 For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of: redundancy replication prioritization fault tolerance 39 / 90 Which of the following is MOST likely used to represent international text data? ASCII Octal Hexadecimal Unicode 40 / 90 Ann, the president of a company, has requested assistance with choosing the appropriate Internet connectivity for her home. The home is in a remote location and has no connectivity to existing infrastructure. Which of the following Internet service types should MOST likely be used? Fiber DSL Cable Satellite 41 / 90 A database administrator finds that a table is not needed in a relational database. Which of the following commands is used to completely remove the table and its data? UPDATE DELETE ALTER DROP 42 / 90 Which of the following network protocols will MOST likely be used when sending and receiving Internet email? SMTP SNMP DHCP ICMP 43 / 90 A technician is installing a new wireless network and wants to secure the wireless network to prevent unauthorized access. Which of the following protocols would be the MOST secure? WPA SSID WEP WPA2 44 / 90 Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed? Password reuse Snooping Social engineering Phishing 45 / 90 Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer? Email previewing Patching Clear browsing cache Kill process 46 / 90 The IT department has established a new password policy for employees. Specifically, the policy reads: ✑ Passwords must not contain common dictionary words ✑ Passwords must contain at least one special character. ✑ Passwords must be different from the las six passwords used. ✑ Passwords must use at least one capital letter or number. Which of the following practices are being employed? Password lockout Password complexity Password expiration Passwords history 47 / 90 Which of the following is a wireless communication that requires devices to be within 6in of each other to transfer information? Infrared NFC Bluetooth WiFi 48 / 90 Which of the following intellectual property concepts BEST represents a legally protected slogan of a business? Contract Patent Copyright Trademark 49 / 90 A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data? Flat file Memory Relational database Solid state drive 50 / 90 Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem? The power interruption caused the camera to malfunction. Ann has a compatibility problem with the camera. A firmware update needs to be applied to the camera. Ann’s Internet connection and wireless router are still down. 51 / 90 Given the above pseudocode. If the Breakfast program ran on Sunday, which of the following would be the output? Oatmeal Bacon and eggs Waffles Pancakes 52 / 90 Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem? The power interruption caused the camera to malfunction. Ann has a compatibility problem with the camera. A firmware update needs to be applied to the camera. Ann’s Internet connection and wireless router are still down. 53 / 90 An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of application architectures did the employee use? Standalone application Client-server application Web application Cloud application 54 / 90 An administrator grants permission for a user to access data in a database. Which of the following actions was performed? Data correlation Data manipulation Data gathering Data definition 55 / 90 Which of the following would work BEST stored as a flat file rather than stored in a database? Contact list Movie theater locations Directions to doctor’s office Store inventory 56 / 90 Which of the following are the basic computing operations? Input, process, output, and feedback Input, output, storage, and feedback Input, process, and output Input, process, output, and storage 57 / 90 Which of the following software license models allows a developer to modify the original code and release its own version of the application? Proprietary software Commercial software Open source software Cross-platform software 58 / 90 Which of the following security concerns is a threat to confidentiality? Replay attack Denial of service Service outage Dumpster diving 59 / 90 A kilobyte is a measurement of processor speed (e.g., 2.4KHz). kilobyte is a measurement of storage (e.g., 100KB). A kilobyte is a measurement of throughput (e.g.,100Kbps). A kilobyte is a measurement of power (e.g., 100KW). A kilobyte is a measurement of processor speed (e.g., 2.4KHz). 60 / 90 A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function? Permission Ink cartridge USB cable Driver 61 / 90 A technician is troubleshooting a problem. The technician tests the theory and determines the theory is confirmed. Which of the following should be the technician’s NEXT step? Implement the solution. Document lessons learned. Establish a plan of action. Verify full system functionality. 62 / 90 A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task? Optical drive Hard disk drive Solid state drive Flash drive 63 / 90 A UPS provides protection against: denial of service replay attack. power outages. wiretapping. 64 / 90 A program needs to choose apples, oranges, or bananas based on an input. Which of the following programming constructs is BEST to use? Variable If Datatype Comment 65 / 90 A small company wants to set up a server that is accessible from the company network as well as the Internet. Which of the following is MOST important to determine before allowing employees to access the server remotely? The quality of the computer used to connect A security method of allowing connections The employees’ home ISP speeds The geographical location of the employees 66 / 90 Which of the following is an advantage of installing an application to the cloud? Data is not stored locally. Support is not required. Service is not required. Internet access is not required. 67 / 90 A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of? Non-repudiation Authentication Integrity Accounting 68 / 90 An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step? Restart the computer. Contact other users. Disconnect the peripherals. Document the findings. 69 / 90 Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program’s run. Which of the following would Joe MOST likely use to accomplish this? Loop Variable Constant Function 70 / 90 Which of the following statements BEST describes binary? A notational system used to represent an ג€onג€ or ג€offג€ state A notational system used to represent media access control A notational system used to represent Internet protocol addressing A notational system used to represent a storage unit of measurement 71 / 90 A systems administrator wants to return results for a time range within a database. Which of the following commands should the administrator use? SELECT INSERT DELETE UPDATE 72 / 90 Which of the following is a value that uniquely identifies a database record? Foreign key Public key Primary key Private key 73 / 90 Which of the following actions is the FINAL step in the standard troubleshooting methodology? Document the solution and cause. Create a new theory of cause. Research the problem online. Implement preventive measures. 74 / 90 Which of the following is a compiled language? Perl JScript Java PowerShell 75 / 90 A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of: a storage area network. an embedded OS. network attached storage. a Type 1 hypervisor. 76 / 90 A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this? Encryption Compression Permissions Auditing 77 / 90 Which of the following relational database constructs is used to ensure valid values are entered for a column? Schema Permissions Constraint Column 78 / 90 A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue? Ensure both devices are connected to the LAN. Enable task scheduling. Reset the proxy settings to their default values. Review the fault tolerance configurations. 79 / 90 A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps is the technician using by browsing to the same site? Establish a plan of action. Gather information Duplicate the problem. Find the root cause. 80 / 90 The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength? Update from 802.11b to 802.11g. Ensure sources of EMI are removed. Enable WPA2-Enterprise. Use WiFi Protected Setup. 81 / 90 Which of the following BEST describes an application running on a typical operating system? Process Thread Function Task 82 / 90 For which of the following is a relational database management system MOST commonly used? Building flowcharts Storing information Generating reports Creating diagrams 83 / 90 Which of the following describes something in a database that refers to the unique identifier in the parent table? Attribute Constraint Foreign key Schema 84 / 90 Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN? Laptop Workstation Mobile phone Server 85 / 90 Which of the following allows wireless devices to communicate to a wired network? Modem Switch Firewall Access point 86 / 90 Which of the following BEST describes the practice of providing user credentials when logging onto the network? Output Storage Input Processing 87 / 90 A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST? Check Knowledge Base. Search local logs. Research possible theories. Question users. 88 / 90 Which of the following database concepts would MOST likely use a CSV file? Data querying Data reports Data importing Data persistence 89 / 90 A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use. Which of the following should the developer use to BEST protect the document? Patent Trademark Watermark Copyright 90 / 90 Which of the following is primarily a confidentiality concern? Eavesdropping Impersonating Destructing Altering Your score is Restart quiz
IT Fundamentals + Test
ITF+ Test
1 / 90
Which of the following requires the MOST frequent updating to remain effective?
2 / 90
Which of the following concerns does installing cross-platform software address?
3 / 90
Employee information is stored in a database. Which of the following BEST describes where all of an employee’s information is stored?
4 / 90
A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which of the following devices is a user MOST likely to configure to allow this?
5 / 90
Which of the following would indicate the FASTEST processor speed?
6 / 90
A company wants an application to be accessed by concurrent users and store company information securely. Which of the following would be the BEST option for storing the information?
7 / 90
Which of the following types of encryption would BEST protect a laptop computer in the event of theft?
8 / 90
A user logs into a laptop using a username and complex password. This is an example of:
9 / 90
Which of the following BEST describes the physical location of the data in the database?
10 / 90
A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of the following types of software would BEST complete this task?
11 / 90
A systems administrator is setting up a new server using RAID technology. If one hard drive in the array fails, the data is stored on another drive, preventing data loss. Which of the following business continuity concepts does this explain?
12 / 90
Which of the following does a NoSQL database use to organize data?
13 / 90
A developer needs to add a table to a database. Which of the following database activities should the user perform?
14 / 90
A technician is concerned that sensitive data transmitted over the Internet can be intercepted and viewed during a MITM attack. Which of the following should the technician enable to reduce the risk?
15 / 90
A company’s team members have both old and new laptops. Which of the following connectors should be available in the conference room to ensure everyone can use the conference room projectors?
16 / 90
A database administrator wants to populate a database with large amounts of data from an external source. Which of the following actions should be used to get the database populated?
17 / 90
A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card?
18 / 90
Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?
19 / 90
Which of the following computer components allows for communication over a computer network?
20 / 90
Which of the following storage devices have a spinning disk?
21 / 90
Which of the following should have the HIGHEST expectation of privacy?
22 / 90
Which of the following would be considered the BEST method of securely distributing medical records?
23 / 90
Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?
24 / 90
The sales department needs to keep a customer list that contains names, contact information, and sales records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?
25 / 90
Which of the following is an example of information a company would ask employees to handle in a sensitive manner?
26 / 90
Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing?
27 / 90
Which of the following would be used to send messages using the SMTP protocol?
28 / 90
A computer user is downloading software from the Internet and notices the following at the end of the install file: “¦x86.exe`. Which of the following statements BEST represents what the “¦x86.exe` means in the installation file?
29 / 90
A company requires several reports that analyze related information from sales, inventory, marketing, and compensation data. Which of the following is the BEST place to store this data?
30 / 90
A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded. Which of the following devices would be BEST for the developer to buy?
31 / 90
Which of the following data types should a developer use when creating a variable to hold a postal code?
32 / 90
Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?
33 / 90
A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo?
34 / 90
A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?
35 / 90
Which of the following is an example of multifactor authentication?
36 / 90
A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band. Which of the following should the technician select?
37 / 90
Which of the following operating systems do not require extensions on files to execute a program?
38 / 90
For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:
39 / 90
Which of the following is MOST likely used to represent international text data?
40 / 90
Ann, the president of a company, has requested assistance with choosing the appropriate Internet connectivity for her home. The home is in a remote location and has no connectivity to existing infrastructure. Which of the following Internet service types should MOST likely be used?
41 / 90
A database administrator finds that a table is not needed in a relational database. Which of the following commands is used to completely remove the table and its data?
42 / 90
Which of the following network protocols will MOST likely be used when sending and receiving Internet email?
43 / 90
A technician is installing a new wireless network and wants to secure the wireless network to prevent unauthorized access. Which of the following protocols would be the MOST secure?
44 / 90
Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed?
45 / 90
Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?
46 / 90
The IT department has established a new password policy for employees. Specifically, the policy reads: ✑ Passwords must not contain common dictionary words ✑ Passwords must contain at least one special character. ✑ Passwords must be different from the las six passwords used. ✑ Passwords must use at least one capital letter or number. Which of the following practices are being employed?
47 / 90
Which of the following is a wireless communication that requires devices to be within 6in of each other to transfer information?
48 / 90
Which of the following intellectual property concepts BEST represents a legally protected slogan of a business?
49 / 90
A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data?
50 / 90
Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem?
51 / 90
Given the above pseudocode. If the Breakfast program ran on Sunday, which of the following would be the output?
52 / 90
53 / 90
An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of application architectures did the employee use?
54 / 90
An administrator grants permission for a user to access data in a database. Which of the following actions was performed?
55 / 90
Which of the following would work BEST stored as a flat file rather than stored in a database?
56 / 90
Which of the following are the basic computing operations?
57 / 90
Which of the following software license models allows a developer to modify the original code and release its own version of the application?
58 / 90
Which of the following security concerns is a threat to confidentiality?
59 / 90
A kilobyte is a measurement of processor speed (e.g., 2.4KHz).
60 / 90
A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function?
61 / 90
A technician is troubleshooting a problem. The technician tests the theory and determines the theory is confirmed. Which of the following should be the technician’s NEXT step?
62 / 90
A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?
63 / 90
A UPS provides protection against:
64 / 90
A program needs to choose apples, oranges, or bananas based on an input. Which of the following programming constructs is BEST to use?
65 / 90
A small company wants to set up a server that is accessible from the company network as well as the Internet. Which of the following is MOST important to determine before allowing employees to access the server remotely?
66 / 90
Which of the following is an advantage of installing an application to the cloud?
67 / 90
A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?
68 / 90
An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step?
69 / 90
Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program’s run. Which of the following would Joe MOST likely use to accomplish this?
70 / 90
Which of the following statements BEST describes binary?
71 / 90
A systems administrator wants to return results for a time range within a database. Which of the following commands should the administrator use?
72 / 90
Which of the following is a value that uniquely identifies a database record?
73 / 90
Which of the following actions is the FINAL step in the standard troubleshooting methodology?
74 / 90
Which of the following is a compiled language?
75 / 90
A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of:
76 / 90
A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?
77 / 90
Which of the following relational database constructs is used to ensure valid values are entered for a column?
78 / 90
A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue?
79 / 90
A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps is the technician using by browsing to the same site?
80 / 90
The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?
81 / 90
Which of the following BEST describes an application running on a typical operating system?
82 / 90
For which of the following is a relational database management system MOST commonly used?
83 / 90
Which of the following describes something in a database that refers to the unique identifier in the parent table?
84 / 90
Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?
85 / 90
Which of the following allows wireless devices to communicate to a wired network?
86 / 90
Which of the following BEST describes the practice of providing user credentials when logging onto the network?
87 / 90
A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST?
88 / 90
Which of the following database concepts would MOST likely use a CSV file?
89 / 90
A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use. Which of the following should the developer use to BEST protect the document?
90 / 90
Which of the following is primarily a confidentiality concern?
Your score is
Restart quiz