0% found this document useful (0 votes)
49 views36 pages

A+ Dumps

Uploaded by

vyasmeet2304
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views36 pages

A+ Dumps

Uploaded by

vyasmeet2304
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 36

QUESTION

A software developer develops a software program and writes a document with step-by-step instructions on how to use
the software. The developer wants to ensure that no other person or company can publish this document for public use.
Which of the following should the developer use to BEST protect the document?

Which of the following database concepts would MOST likely use a CSV file?

Which of the following BEST describes the practice of providing user credentials when logging onto the network?

Which of the following allows wireless devices to communicate to a wired network?

Which of the following computing devices would be used to provide a centralized means to distribute services to a group
of clients and usually possesses a role on a LAN?
Which of the following describes something in a database that refers to the unique identifier in the parent table?

Which of the following BEST describes an application running on a typical operating system?
The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following
actions would BEST improve the signal strength?

A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out
more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the
following troubleshooting steps is the technician using by browsing to the same site?

A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which
of the following should the user do to correct this issue?

Which of the following relational database constructs is used to ensure valid values are entered for a column?

A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data
cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?

A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual
machines. This program is an example of:

Which of the following is a compiled language?


Which of the following actions is the FINAL step in the standard troubleshooting methodology?

Which of the following is a value that uniquely identifies a database record?

A systems administrator wants to return results for a time range within a database. Which of the following commands
should the administrator use?
Which of the following statements BEST describes binary?

Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the
program’s run. Which of the following would Joe MOST likely use to accomplish this?
An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which
of the following best describes the technician’s NEXT step?

A regulation requires new applicants to provide a scan of their retinas for any future legal issues. Which of the following
concepts is this an example of?

Which of the following is an advantage of installing an application to the cloud?

A small company wants to set up a server that is accessible from the company network as well as the Internet. Which of
the following is MOST important to determine before allowing employees to access the server remotely?

An UPS provides protection against:

A company executive wants to view company's training videos from a DVD. Which of the following components would
accomplish this task?

A technician is troubleshooting a problem. The technician tests the theory and determines the theory is confirmed. Which
of the following should be the technician’s NEXT step?
A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer.
Which of the following does the workstation MOST likely needs for the printer to function?
Which of the following BEST describes a kilobyte?

Which of the following security concerns is a threat to confidentiality?

Which of the following software license models allow a developer to modify the original code and release its own version of the
application?

Which of the following are the basic computing operations?

Which of the following would work BEST stored as a flat file rather than stored in a database?

An administrator grants permission for a user to access data in a database. Which of the following actions was performed?

Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that
caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely
the problem?

A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to
remain persistent. Which of the following is the BEST option for storing the data?

Which of the following intellectual property concepts BEST represents a legally protected slogan of a business?

Which of the following is a wireless communication that requires devices to be within 6 inch of each other to transfer
information?
Which of the following would MOST likely prevent malware sent as compromised file via email for infecting a person’s
computer?
A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the following would be the BEST
choice to accomplish this task?
John, a user, finds out his password for a social media site has been compromised. John tells a friend that his email and
banking accounts are probably also compromised. Which of the following has John MOST likely performed?

A technician is installing a new wireless network and wants to secure it to prevent unauthorized access. Which of the following
protocols would be the MOST secure?
A database administrator finds that a table is not needed in a relational database. Which of the following commands is
used to completely remove the table and its data?
A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect
the display to the workstation?
Ammy, the President of a company, has requested assistance in choosing the appropriate Internet connectivity for her home. The home
is in a remote location and has no connectivity to existing infrastructure. Which of the following Internet service types should MOST
likely be used?
Which of the following is MOST likely used to represent international text data?

A technician needs to install a wireless router for a client that supports speed up to 11Mbps and operates on the 2.4GHz band. Which of
the following should the technician select?
Which of the following is an example of multifactor authentication?

Which of the following language types would a web developer MOST likely use to create a website?

A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a
computer program to solve problems. Which of the following is being developed?
Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?

In which of the following situations should there be an expectation of privacy?

Which of the following data types should a developer use when creating a variable to hold a postal code?
When transferring a file across the network, which of the following would be the FASTEST transfer rate?
A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the
technician should assign?
A game developer is purchasing a computing device to develop a game and realizes that game engine software will
require a device with high-end specifications that can be upgraded. Which of the following devices would be BEST for the
developer to buy?
A company requires several reports that analyze related information from sales, inventory, marketing and compensation data. Which of
the following is the BEST place to store this data?
A computer user is downloading software from the Internet and notices the following at the end of the installation file: “…
x86.exe”. Which of the following statements BEST represent what “…x86.exe” means in the installation file?

Which of the following would be used to send messages using the SMTP protocol?

Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by
Internet browsing?

Which of the following is an example of information a company would ask employees to handle in a sensitive manner?

The sales department needs to keep a customer list that contains names, contact information, and sales records. This list
will be edited by multiple people at the same time. Which of the following applications should be used to create this list?

Amanda, a user, connects to the corporate Wi-Fi and tries to browse the Internet. Amanda finds that she can only get to local (intranet)
pages. Which of the following actions would MOST likely fix the problem?

Assigning different permissions for user based on departments is an example of:

Which of the following is a value that uniquely identifies a database record:

A user is creating a password for a new website and receives a message stating the password is not using all of the required character
types, which of the following password best practices is being enforced:
A human resources department wants to implement video communication between physical office locations. Which of the following
would be the BEST option for this?

Which of the following internet service types carries the MOST bandwidth?

Which of the following is an example of database DML element?

Gracy, a customer, withdraws $75 from her bank account, but when she receives her bank statement, it shows there was actually a
withdrawal of $700. Which of the following is the MOST likely exploit used by an attacker in this instance?

In computer programming, which of the following would MOST likely be used to describe the properties of an object?
Martina, a home user, receives a phone call from someone who informs her that her computer is running slow and has
been infected with a virus. The caller tells Martina that she must pay to have the computer cleaned. Which of the
following has occurred?

A company wants to keep track of business expenses. Which of the following is the BEST software for this task?

A laptop user is installing an IP-based video camera connected to a SOHO router. The LED light shows the traffic is generated between
the router and the IP camera. Which of the following should be done to obtain the camera's IP address?

Which of the following application architecture models of a simple client-server configuration is an example of?

A company wants to ensure employee browsers route through a centralized server to access the internet. Which of the following
browser settings should the company configure?
Which of the following is the PRIMARY function of a software?

Which of the following would BEST protect a person's laptop form unauthorized connections by malicious users on the
same WI-FI network?
Which of the following is commonly used to distinguish one brand from another?

Which of the following BEST describes what should be done to make an empty database useful to the business?

A company setting up its first and only file server. The company wants to ensure that if one of the hard drives in the
server fails, the server will continue to operate with no downtime, and data will remain available. This is an example of:

A technician has recently deployed a new firewall. Which of the following should the technician perform to secure
network access to the firewall?

Which are the following basic computing operations?


When troubleshooting a problem, which of the following is the Last step in the methodology?

In an n-tire application, which of the following tiers displays the information on web page or in a GUI?

Richard, a user, experiences difficulty in getting his IP based security camera to function at his house after a rain storm that caused
power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem?

Which option BEST describes the characteristic of a relational database?

A system administrator logs into a computer and wants to use a program. Upon examination, however, the systems administrator finds
the program is in hung state. Which of the following is the NEXT step?

A software developer is creating a flowchart, which is pictorial representation of


While installing a new printer, a technician receives the following error message: "The device failed to install properly". Which of
the following steps would MOST likely resolve this error?

Steeve, a customer, has a wireless network that does not seem to broadcast as far as it did previously. In Steeve's office where he
typically works, the signal has become far weaker. Steeve recalls his children adjusting a setting to speed up their wireless. Which of
the following settings should be altered to BEST resolve the issues?

Which of the following protocols is primarily used to download messages from an email server, but does not preserve a copy on the
email server after it is downloaded to a client computer?

An end user is setting up a smart thermostat to connect to a home network. Which of the following BEST describes an OS the
thermostat uses?

An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a
remote database to pull data for the report. Which of the following types of application architecture did the employee use?

Which of the following is the BEST precaution against ransomeware?

Which of the following internal components is the FASTEST for data access?
A developer must repeatedly use the same logic to calculate a result based on data values that can change at different points in the
program. Which of the following is MOST likely that the developer would use to accomplish this?

While browsing the internet a user encounters a pop-up window that says the security to the website is untrusted. Which of the
following is the BEST cause for the pop-up window?

Which of the following data types is 101001.11?

A technician is called to troubleshoot a user issue; however, the user has already closed out of the program and did not take a screenshot
of the error. Which of the following should the technician do NEXT?

After a browser update, a browser add-on is no longer functioning. The company that provides this add-on has promised an update to
the add-on soon. Which of the following is the BEST course of action to take until the update is available?

Which of the following BEST describes a property of a database foreign key?

A few users reported the help desk that they cannot connect to the wireless network. After further investigations, it is
found to be a company wide issue. The technician suspects the wireless certificate has expired. According to
troubleshooting methodology, which of the following should be performed NEXT?

A programmer writes codes that will automatically choose which interest rate will be applied to saving account based on the amount
deposited in the account at opening. If the account is opened with less than $5000, the interest rate will be 4%. If the amount is $5000
or more, the interest rate will be 7%. Which of the following pseudo code examples would BEST meet this requirement?

An administrator wants to allow users to change information in NTFS file, but users are restricted from changing permission. Which of
the following NTFS permissions should be used?
Which of the following components is responsible for device communication path and the ability of peripheral devices to be connected
to a computer?
A door lock that can be looked and unlocked from a mobile application is an example of:

In which of the following situations should a person have an expectation of privacy?


A company set up a folder on the network where employees can access a spreadsheet, make changes, and save the changes. All
employees can access the file. This is an example of:

Which of the following is an example of the concept of "expectation of privacy" with regards to the internet?

Which of the following is MOST commonly required to connect to a relational database and alter DDL?

A desktop administrator just downloads a productivity application from application's website. Which of the following is MOST likely
the file extension of the application?

Which of the following is the closest to machine language?

Which of the following could be the speed of the Internet connectivity?

A manager asks an administrator to copy a set of files and folders to a remote location each day to create a redundant copy. The
administrator sets up a job that performs the needed function. Which of the following features of an operating system BEST
accomplishes this purpose?

Which of the following, BEST represents how this collection of information [Name, address, zip code, email address, phone number,
student ID] would be stored in a database?

Which of the following files, when created on a mobile device would MOST likely expose a user's physical location at the
time of creation?
A user has been working on a file with no network or Internet access and needs to save it before the computer powers off. Which of the
following types of storage would be used for this task?
Which of the following is a compiled language?

Which of the following notational systems uses a base of 16?

Which of the following programming concepts allows BEST code reuse?

Which of the following is primary risk with utilizing password managers?


A help desk technician called to troubleshoot an issue. The technician asks user some questions and then duplicated the issue on the
same computer. Which of the following troubleshooting methodology steps is the technician using?

Which of the following connector types should be used to connect a new display to a PC?
Which of the following is benefit of using a database?

An access card system is used in a school. Badges for teachers and students allow access to the cafeteria. Only teacher badges allow
access to the teacher's lounge. From a security perspective, this is an example of:

With regard to the security concepts of authentication, authorizations and accounting, which of the following is an example of an
accounting function?

Which of the following password assigning method has best practice of involving the confirmation of personal data?

Which of the following is an example of multifactor authentication?

A user wants to create a file that shows how data flows through a programming logic tree. Wich of the following applications should he
use?

Users of a file server allowed to configure security settings on any files they create. Which of the following access control models, is
this, an example of?

Which of the following connectors is commonly used with Cat 5 and Cat 6 cables?

Which of the following internal components converts a picture file into output on a monitor?

The MOST important step in securing a workstation is to:

A database administrator has been asked to examine the performance of a database. The administrator uses the database management
system to examine the tables. Which of the following describes the method of accessing the database?

Which of the following security concerns is a threat to confidentiality?

Meaningful & accurate reporting is essential to retailers in making business decisions while managing inventory. Which of the
following best offers assistance in generating report?

A programmer needs to perform a single operations ten times. Which of the following technique would be best to use for this purpose?

Which of the following installation methods is most appropriate so that the application continues to work even if the workstation is
disconnected from the LAN?
A programm needs to choose apple, oranges, bananas based on an input. Which of the following programming construct is BEST to
use?
A function is BEST used for enabling programs to?

A regulation required a new applicant to provide a scan of their retinas in case of any future legal questions regarding who applied for
the position. Which of the following is this an example of?

A network engineer wants to increase the speed of the access point. Which of the following standard should be used as a reference of
the purchase of the access points?
Which of the following commands is MOST likely to be used to change existing data in a database?
A computer science professor is referring keyboards, mice, scaners, and styluses in the context of computing basics and processes.
Given the supplied list, under which of the following categories do these devices fall?
Relational databases store data in which of the following?

Which of the following is an IP address?

Which of the following password policies BEST protect against brute force attacks?

A network architect has created an outline for an idea for a process that an organization uses as a primary financial source. Which of the
following would BEST protect this process from other organizations?
Which of the following parts of the URL https://www.example.com, hosts the IP address?

For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:

Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts
probably are compromised as well. Which of the following has Joe MOST likely performed?

Give the following pseudocode: program breakfast weekday = [" Monday ","Tuesday ","wednesday ","thursday","friday "]
weekend = ["saturday ","sunday] if today == wednesday Output "Bacon and eggs" else if today == friday output
"Oaatmeal" else if today in weekend output "Waffles" else output "Pancakes" end
if the breakfast program ran on sunday ,which of the following would be the output?

A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the
following should the technician do FIRST?

Which of the following explains why a database adminstrator would most likely use a relaional database instead of a flat file database?

Which of the following is primarily a confidentiality concern?

A developer needs to know the length of a text file. Which of the following would the developer MOST likely use?
A hardware technician is discussing the speed of a workstation processor. Which of the following is the best option for the speed of the
processor?

Which of the following is used to maintain relation between data?

An employee's laptop does not connect to the internet when it is used in a coffe shop. Which of the following is the MOST likely
cause ?

Marketing department requests a report of last month's orders from a database. Which of the following language types will be used to
identify and pull the correct information?
A technician has just installed a new wireless router. To configure basic wireless security, the technication should change the SSID,
enable encryption and:

The help desk receives a call from an individual claiming to be a corporate Vice President and resquesting a password reset. The
individual answered all but one of the challenge questitions. Which of the following actions should the help desk take?
Difficulty Level OPTION 1 OPTION 2 OPTION 3 OPTION 4 Answers
Normal Patent Trademar Watermar Copyright 4
k k

Normal Data Data Data Data persistence 2


querying reports importing

Normal Output Storage Input Processing 3

Normal Modem Switch Firewall Access point 4

Normal Laptop Workstati Mobile Server 4


on phone
Normal Attribute Constrain Foreign Schema 1
t key
Normal Process Thread Function Task 1
Normal Update Ensure Enable Use Wi-Fi Protected Setup 2
from sources of WPA2-
802.11b EMI are Enterprise
to removed
802.11g

Normal Establish Gather Duplicate Find the root cause 3


a plan of informati the
action on problem

Normal Ensure Enable Reset the Review the fault tolerance configurations 1
both task proxy
devices schedulin settings
are g to their
connecte default
d to the values
LAN

Normal Schema Permission Constraint Column 3


s
Normal Encryption Compressi Permissio Auditing 1
on ns

Normal A storage An Network A Type 1 hypervisor 4


area embedded Attached
network OS Storage
Normal Perl JScript Java PowerShell 3
Normal Documen Create a Research Implement preventive measures 1
t the new theory the
solution of cause problem
and cause online

Normal Foreign Public key Primary Private key 3


key key
Normal SELECT INSERT DELETE UPDATE 1

Normal A A A A notational system used to represent unit of 1


notational notational notational storage measurement
system system system
used to used to used to
represent represent represent
an “on” media unit of
or “off” access speed
state control measure
ment

Normal Loop Variable Constant Function 2

Normal Restart Contact Disconnec Document the findings 4


the other t the
computer users periphera
ls

Normal Non- Authentic Integrity Accounting 2


repudiati ation
on

Normal Data is not Support is Service is Internet access is not required 1


stored not not
locally required required
Normal The A security The The geographical location of the employees 2
quality of method employee
the of s’ home
computer allowing ISP
used to connectio speeds
connect ns

Normal Denial of Replay Power Wiretapping 3


Service Attack Outages
Normal Optical Hard disk Solid Flash drive 1
drive drive state
drive

Normal Implement Document Establish a Verify full system functionality 3


the lessons plan of
solution learned action
Normal Permission Ink USB cable Driver 4
cartridge
Normal A kilobyte A kilobyte A kilobyte A kilobyte is a measurement of processor speed 1
is a is a is a (e.g. 2.4KHz)
measureme measure measureme
nt of ment of nt of power
storage throughp (e.g.
(e.g. ut 100KW).
100KB) (e.g.100K
bps)

Normal Replay Denial of Service Dumpster diving 1


attack Service outage
Normal Proprietar Commerci Open Cross-platform software 3
y al source
software software software

Normal Input, Input, Input, Input, process, output, and storage 4


process, output, process,
output, and storage, and
feedback and output
feedback
Normal Contact list Movie Directions Store inventory 1
theater to doctor’s
locations office

Normal Data Data Data Data definition 4


correlatio manipulat gathering
n ion

Normal The Ann has a A Ann’s Internet connection and wireless 4


power compatibi firmware router are still down
interrupti lity update
on caused problem needs to
the with the be
camera to camera applied to
malfuncti the
on camera

Normal Flat file Memory Relational Solid state drive 1


database

Normal Contract Patent Copyright Trademark 4

Normal Infrared NFC Bluetooth Wi-Fi 2

Normal Email Patching Clear Kill process 2


previewing browsing
cache
Normal Thunderbo Bluetooth Infrared WLAN card 4
lt cable module port
Normal Password Snooping Social Phishing 1
reuse Engineerin
g
Normal WPA SSID WEP WPA2 4

Normal UPDATE DELETE ALTER DROP 4

Normal USB NFC DSL DVI 4

Normal Fiber DSL Cable Satellite 4

Normal ASCII Octal Hexadeci Unicode 4


mal
Normal 802.11a 802.11b 802.11g 802.11n 2

Normal Password Password Hardware Smart card and PIN 4


and and token and
passphrase paraphrase smartphon
e
Normal Interpreted Query Compiled Assembly 1

Normal Algorithm Software Pseudocod Flowchart 1


e
Normal Host-based Strong Anti- Full disk encryption 4
firewall administrat malware
or software
password
Normal Posting a Submitting Posting a Sending email and pictures to a close relative 2
comment personal comment
on a informatio on a video
friend’s n on a sharing site
social school
media page enrollment
site

Normal Integer String Float Boolean 2


Normal 1001Kbps 110Mbps 1.22Gbps 123Mbps 3
Normal 127.0.0.1 172.16.2.1 192.168.25 255.255.255.0 2
89 7.1
Normal Laptop Server Game Workstation 2
console

Normal Flat file Word Database Network share 3


processor
Normal x86 only x86 x86 only x86 supports an installation on a 16-bit CPU 1
supports an supports an supports an architecture
installation installation installation
on a 32-bit on a 32-bit on a 64-bit
CPU and a 64- CPU
architectur bit CPU architectur
e architectur e
e

Normal Document Instant Conferenci Email software 4


sharing messaging ng
software software software
Normal Turn on Delete Notify Configure prompting before downloading content 4
private browsing when
browsing history on downloads
program are
close complete
Normal Customer The first Customer Company social media screen name 1
date of and last service
birth name of number
the Chief
Executive
Officer
(CEO)

Normal Database Word Conferenci Presentation software 1


software processing ng
software software
Normal Renew the Configure Clear the Disable the pop-up blocker 2
IP address the browser
browser cache
proxy
settings
Normal Role based Mandatory Location User account type control 1
access access access
control control control

Normal Foreign Public key Private key Primary key 4


key
Normal Password Password Password Password expiration 1
complexity history length
Normal File Conferenci Web Presentation software 2
sharing ng browsing
software software software
Normal Satellite DSL T1 Fiber Optics 4

Normal Import Create Select Dump 3

Normal Wiretappin Buffer Man in the Changing default password 3


g flow middle

Normal Attribute Method Array Vector 2


Normal Snooping Eavesdrop Wiretappin Social engineering 4
ping g

Normal Database Spreadshee Accountin Document sharing 3


t g
Normal Consult the Reboot the Reset the Log into the SOHO router to see connected 4
laptop user laptop and camera clients
manual the IP and wait
address at 30 second
the camera before
will show powering
at startup back it on

Normal Zero tier One tier Two tier Three tier 3

Normal Private Pop-up Script Proxy setting 4


browsing blocker blocker
Normal Turn data Turn data Turn Turn information into data 1
into into informati
informati knowledg on into
on e knowledg
e

Normal Anti- Pop-up Wireless Host based firewall 4


malware blocker router
Normal Patent Barcode Copyright Trademark 4

Normal Query Generate Import Alter data 3


data a data data
report

Normal Fault File A Server backup 1


tolerance replicatio contingen
n cy plan

Normal Placed Disable Log into Change the default password 4


the the auto the
firewall in fill firewall
the password using
secured feature single
cabinet sign-on

Normal Input, Input, Input, Input, process, output and storage 4


process, output, process
output, and storage and and output
feedback feedback
Normal Establish a Test the Document Implement the solution or escalate at necessary 3
plan of theory to the
action to determine findings/le
resolve the the case ssons
problem learned,
action, and
outcome

Normal Applicatio Data tier Presentatio Service tier 3


n tier n tier
Normal The power Richard A Richard's internet connection and wireless router 4
interruptio has a firmware are still down
n caused compatibili update
the camera ty problem needs to be
to with the applied to
malfunctio camera camera
n

Normal Single Concurrent Concurrent Single user, scalable, low speed 3


user, not user, not users,
scalable, scalable, scalable,
speed low speed speed
Normal Kill the Keep Open the Reinstall program 1
process waiting program
again

Normal Identifiers Objects Attributes Programs 4


Normal Run Download Turn the Connect the printer to a different port 4
Windows new printer off
update on drivers for and turn it
the the printers on again
computer
Normal Change the Modify the Adjust the Restart the wireless router 3
wireless encryption wireless
channel setting frequency

Normal IMAP POP3 SMTP SFTP 2

Normal Server OS Network Mobile OS Embedded OS 4


OS

Normal Standard Client Web Cloud application 4


application server application
application

Normal Complicate Document Comprehe Confidential information policy 3


d password shredding nsive
policy policy backup
policy
Normal RAM HDD SSD BIOS 3
Normal Constant Container Vector Function 4

Normal Incompati Invalid Inaccurate Improper browser extension 2


ble certificate proxy
browser setting

Normal String Float Integer Binary 2

Normal Determine Identify Attempt to Gather information 4


if anything the duplicate
has symptom the
changed s problem

Normal Add the Remove Enables Disable the add-on 4


add-on the the add-on
browser
update
Normal A row's A record's A table's A schema's relationship to another database 2
relationshi relationsh relationshi
p to ip to p to
another record in another
field different database
table schema

Normal Document Test the Renew Report the findings and document the action 4
the theory of the taken
findings validation wireless
certificate

Normal IF amount IF amount IF amount IF amount > 5000 Interest Rate = 0.07 ELSE 3
> 5000 < 5000 < 5000 Interest rate = 0.04 ENDIF
Interest Interest Interest
Rate = Rate = Rate =
0.04 ELSE 0.07 ELSE 0.04 ELSE
Interest Interest Interest
rate = rate = 0.04 rate =
0.07 ENDIF 0.07
ENDIF ENDIF

Normal Full Read Read and Modify 4


control execute
Normal CPU NIC Motherbo Firmware 3
ard
Normal IR IoT NFC VPN 2

Normal Social Email Personal Financial transactions 2


media message website
support
Normal Conferenci Online Documen Instant messaging 2
ng workspace t sharing
software s

Normal A photo is A A persons A social media post that was deleted two 4
published person's intentionall years ago is found when searching an
to a photo unpopula y makes internet archive site
sharing site r quote in their
for sharing a public birthday
with sports visible in a
friends interview gaming
as app
available
on a sport
media
service

Normal Client Web Another Proxy 1


browser database
Normal EXE PNG PDF AVI 1

Normal Scripted Compiled Query Assembly language 4


language language language

Normal 10GB 10Mbps 10MHz 10MB 2

Normal Process File File and Task scheduling 4


scheduling manageme folder
nt access

Normal Record Query Row Field 1

Normal Photo Note Email PDF 1

Normal RAM Hard drive NAS Cloud 2

Normal Perl Jscript Java PowerShell 3

Normal Binary Decimal Octal Hexadecimal 4

Normal Functions Properties Containers Identifiers 1

Normal Password Master Passwords Wiretapping vulnerability 2


reuse password not
compromis frequently
e changed
Normal Test a Establish a Identify Verify full system functionality. 3
theory plan of the
action problem
Normal HDMI Bluetooth Firewire Ethernet 1
Normal Actionable There is No Storage requirement are decreased 3
reports can less need network is
be created for security required

Normal Least Mandatory Biometric Single sign-on 1


privilege access authenticat
control ion
Normal File One-time Transactio Web browser history 4
permission password n receipt
s
Normal Reset Expiration Reuse History 4

Normal Fingerprint Username SMS text Retina scan and facial recognition 4
and and and
passcode password hardware
token
Normal Presentatio Presentatio Word Visual diagramming Software 4
n Software n Software processing
software
Normal Mandatory Discretiona Role-based Rule-based access controls 2
access ry access access
controls controls controls

Normal RJ45 RJ11 USB DVI 1

Normal CPU GPU RAM NIC 2

Normal Install the Enable a Change the Install antivirus software 1


latest host default
patches firewall password
and
updates
Normal Direct GUI Query 4
Programm
atic
Normal Reply Denial of Service Dumpster diving 4
Attack service outage
Normal Data Assests Sales Average loss output 1
capture & inventory statistics
collection inputs
Normal Branching Looping Sequencin Modeling 2
g

Normal Client Local Cloud Network 2


Server
Normal Variaable If Datatype Comment 2
Normal Hold a list Be divided Define Define vaariable to hold different values 2
of numbers into needed
reusable constant
component values
s
Normal Non Authentica Integrity Accounting 3
repudiation tion

Normal 802.11a 802.11b 802.11n 802.11ac 4

Normal UPDATE ALTER INSERT RENAME 1


Normal Processin Input Output Storage 2
g
Normal Tables Schemas Constraints Reports 1

Normal Ox64F32 00:0F:AC: 10010110 172.0.0.1 4


17:2F:32
Normal Password Password Password Password reset 2
reuse complexity history
Normal Copyright Firewall Patent Password 1

Normal The www The com The The https portion of the URL address 3
portion of portion of example
the URL the URL portion of
address address the URL
address
Normal Redundanc Replication Prioritizati Fault tolerance 3
y on

Normal Password Snooping Social Phishing 1


reuse Engineerin
g
Normal Oatmeal Bacon and Waffles Pancakes 3
eggs

Normal Check Search Research Question users 1


knowledge local logs possible
base theories
Normal Data is Data is Data will Data is static in nature 3
inherently stored as be edited
tabular in system by multiple
fomat configurati concurrent
on items user

Normal Eavesdrop Impersonat Destructin Altering 1


ping ing g
Normal For loop If__Then Proceduerc Select statement 4
statement all
Normal 266MHZ 16GB 256Mbps 2.6GHz 4

Normal Database Data Data Data persistence 1


corelation replication
Normal Script Proxy Private Full browser cache 2
blocker setting browsing

Normal Scripting Markup Query Complied 3

Normal Change the Select Enable Enable NAT tables 1


default channel 6 DHCP
password
Normal Email the Notify Disable the Update the challenge questions 4
user security account
Answers Expaination
n/a

n/a

n/a

n/a

n/a

n/a

n/a
n/a

n/a

n/a

n/a

n/a

n/a

n/a
n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a
n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a
n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a
n/a
n/a

n/a

n/a
n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a
n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a
n/a

n/a

n/a

n/a

n/a

n/a
n/a

n/a

n/a

n/a

n/a

n/a

n/a
n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a
n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a
n/a

n/a
n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a
n/a

n/a

n/a

n/a
n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a

n/a
n/a

n/a

n/a

n/a

n/a

n/a

You might also like