A+ Dumps
A+ Dumps
A software developer develops a software program and writes a document with step-by-step instructions on how to use
the software. The developer wants to ensure that no other person or company can publish this document for public use.
Which of the following should the developer use to BEST protect the document?
Which of the following database concepts would MOST likely use a CSV file?
Which of the following BEST describes the practice of providing user credentials when logging onto the network?
Which of the following computing devices would be used to provide a centralized means to distribute services to a group
of clients and usually possesses a role on a LAN?
Which of the following describes something in a database that refers to the unique identifier in the parent table?
Which of the following BEST describes an application running on a typical operating system?
The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following
actions would BEST improve the signal strength?
A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out
more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the
following troubleshooting steps is the technician using by browsing to the same site?
A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which
of the following should the user do to correct this issue?
Which of the following relational database constructs is used to ensure valid values are entered for a column?
A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data
cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?
A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual
machines. This program is an example of:
A systems administrator wants to return results for a time range within a database. Which of the following commands
should the administrator use?
Which of the following statements BEST describes binary?
Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the
program’s run. Which of the following would Joe MOST likely use to accomplish this?
An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which
of the following best describes the technician’s NEXT step?
A regulation requires new applicants to provide a scan of their retinas for any future legal issues. Which of the following
concepts is this an example of?
A small company wants to set up a server that is accessible from the company network as well as the Internet. Which of
the following is MOST important to determine before allowing employees to access the server remotely?
A company executive wants to view company's training videos from a DVD. Which of the following components would
accomplish this task?
A technician is troubleshooting a problem. The technician tests the theory and determines the theory is confirmed. Which
of the following should be the technician’s NEXT step?
A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer.
Which of the following does the workstation MOST likely needs for the printer to function?
Which of the following BEST describes a kilobyte?
Which of the following software license models allow a developer to modify the original code and release its own version of the
application?
Which of the following would work BEST stored as a flat file rather than stored in a database?
An administrator grants permission for a user to access data in a database. Which of the following actions was performed?
Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that
caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely
the problem?
A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to
remain persistent. Which of the following is the BEST option for storing the data?
Which of the following intellectual property concepts BEST represents a legally protected slogan of a business?
Which of the following is a wireless communication that requires devices to be within 6 inch of each other to transfer
information?
Which of the following would MOST likely prevent malware sent as compromised file via email for infecting a person’s
computer?
A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the following would be the BEST
choice to accomplish this task?
John, a user, finds out his password for a social media site has been compromised. John tells a friend that his email and
banking accounts are probably also compromised. Which of the following has John MOST likely performed?
A technician is installing a new wireless network and wants to secure it to prevent unauthorized access. Which of the following
protocols would be the MOST secure?
A database administrator finds that a table is not needed in a relational database. Which of the following commands is
used to completely remove the table and its data?
A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect
the display to the workstation?
Ammy, the President of a company, has requested assistance in choosing the appropriate Internet connectivity for her home. The home
is in a remote location and has no connectivity to existing infrastructure. Which of the following Internet service types should MOST
likely be used?
Which of the following is MOST likely used to represent international text data?
A technician needs to install a wireless router for a client that supports speed up to 11Mbps and operates on the 2.4GHz band. Which of
the following should the technician select?
Which of the following is an example of multifactor authentication?
Which of the following language types would a web developer MOST likely use to create a website?
A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a
computer program to solve problems. Which of the following is being developed?
Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?
Which of the following data types should a developer use when creating a variable to hold a postal code?
When transferring a file across the network, which of the following would be the FASTEST transfer rate?
A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the
technician should assign?
A game developer is purchasing a computing device to develop a game and realizes that game engine software will
require a device with high-end specifications that can be upgraded. Which of the following devices would be BEST for the
developer to buy?
A company requires several reports that analyze related information from sales, inventory, marketing and compensation data. Which of
the following is the BEST place to store this data?
A computer user is downloading software from the Internet and notices the following at the end of the installation file: “…
x86.exe”. Which of the following statements BEST represent what “…x86.exe” means in the installation file?
Which of the following would be used to send messages using the SMTP protocol?
Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by
Internet browsing?
Which of the following is an example of information a company would ask employees to handle in a sensitive manner?
The sales department needs to keep a customer list that contains names, contact information, and sales records. This list
will be edited by multiple people at the same time. Which of the following applications should be used to create this list?
Amanda, a user, connects to the corporate Wi-Fi and tries to browse the Internet. Amanda finds that she can only get to local (intranet)
pages. Which of the following actions would MOST likely fix the problem?
A user is creating a password for a new website and receives a message stating the password is not using all of the required character
types, which of the following password best practices is being enforced:
A human resources department wants to implement video communication between physical office locations. Which of the following
would be the BEST option for this?
Which of the following internet service types carries the MOST bandwidth?
Gracy, a customer, withdraws $75 from her bank account, but when she receives her bank statement, it shows there was actually a
withdrawal of $700. Which of the following is the MOST likely exploit used by an attacker in this instance?
In computer programming, which of the following would MOST likely be used to describe the properties of an object?
Martina, a home user, receives a phone call from someone who informs her that her computer is running slow and has
been infected with a virus. The caller tells Martina that she must pay to have the computer cleaned. Which of the
following has occurred?
A company wants to keep track of business expenses. Which of the following is the BEST software for this task?
A laptop user is installing an IP-based video camera connected to a SOHO router. The LED light shows the traffic is generated between
the router and the IP camera. Which of the following should be done to obtain the camera's IP address?
Which of the following application architecture models of a simple client-server configuration is an example of?
A company wants to ensure employee browsers route through a centralized server to access the internet. Which of the following
browser settings should the company configure?
Which of the following is the PRIMARY function of a software?
Which of the following would BEST protect a person's laptop form unauthorized connections by malicious users on the
same WI-FI network?
Which of the following is commonly used to distinguish one brand from another?
Which of the following BEST describes what should be done to make an empty database useful to the business?
A company setting up its first and only file server. The company wants to ensure that if one of the hard drives in the
server fails, the server will continue to operate with no downtime, and data will remain available. This is an example of:
A technician has recently deployed a new firewall. Which of the following should the technician perform to secure
network access to the firewall?
In an n-tire application, which of the following tiers displays the information on web page or in a GUI?
Richard, a user, experiences difficulty in getting his IP based security camera to function at his house after a rain storm that caused
power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem?
A system administrator logs into a computer and wants to use a program. Upon examination, however, the systems administrator finds
the program is in hung state. Which of the following is the NEXT step?
Steeve, a customer, has a wireless network that does not seem to broadcast as far as it did previously. In Steeve's office where he
typically works, the signal has become far weaker. Steeve recalls his children adjusting a setting to speed up their wireless. Which of
the following settings should be altered to BEST resolve the issues?
Which of the following protocols is primarily used to download messages from an email server, but does not preserve a copy on the
email server after it is downloaded to a client computer?
An end user is setting up a smart thermostat to connect to a home network. Which of the following BEST describes an OS the
thermostat uses?
An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a
remote database to pull data for the report. Which of the following types of application architecture did the employee use?
Which of the following internal components is the FASTEST for data access?
A developer must repeatedly use the same logic to calculate a result based on data values that can change at different points in the
program. Which of the following is MOST likely that the developer would use to accomplish this?
While browsing the internet a user encounters a pop-up window that says the security to the website is untrusted. Which of the
following is the BEST cause for the pop-up window?
A technician is called to troubleshoot a user issue; however, the user has already closed out of the program and did not take a screenshot
of the error. Which of the following should the technician do NEXT?
After a browser update, a browser add-on is no longer functioning. The company that provides this add-on has promised an update to
the add-on soon. Which of the following is the BEST course of action to take until the update is available?
A few users reported the help desk that they cannot connect to the wireless network. After further investigations, it is
found to be a company wide issue. The technician suspects the wireless certificate has expired. According to
troubleshooting methodology, which of the following should be performed NEXT?
A programmer writes codes that will automatically choose which interest rate will be applied to saving account based on the amount
deposited in the account at opening. If the account is opened with less than $5000, the interest rate will be 4%. If the amount is $5000
or more, the interest rate will be 7%. Which of the following pseudo code examples would BEST meet this requirement?
An administrator wants to allow users to change information in NTFS file, but users are restricted from changing permission. Which of
the following NTFS permissions should be used?
Which of the following components is responsible for device communication path and the ability of peripheral devices to be connected
to a computer?
A door lock that can be looked and unlocked from a mobile application is an example of:
Which of the following is an example of the concept of "expectation of privacy" with regards to the internet?
Which of the following is MOST commonly required to connect to a relational database and alter DDL?
A desktop administrator just downloads a productivity application from application's website. Which of the following is MOST likely
the file extension of the application?
A manager asks an administrator to copy a set of files and folders to a remote location each day to create a redundant copy. The
administrator sets up a job that performs the needed function. Which of the following features of an operating system BEST
accomplishes this purpose?
Which of the following, BEST represents how this collection of information [Name, address, zip code, email address, phone number,
student ID] would be stored in a database?
Which of the following files, when created on a mobile device would MOST likely expose a user's physical location at the
time of creation?
A user has been working on a file with no network or Internet access and needs to save it before the computer powers off. Which of the
following types of storage would be used for this task?
Which of the following is a compiled language?
Which of the following connector types should be used to connect a new display to a PC?
Which of the following is benefit of using a database?
An access card system is used in a school. Badges for teachers and students allow access to the cafeteria. Only teacher badges allow
access to the teacher's lounge. From a security perspective, this is an example of:
With regard to the security concepts of authentication, authorizations and accounting, which of the following is an example of an
accounting function?
Which of the following password assigning method has best practice of involving the confirmation of personal data?
A user wants to create a file that shows how data flows through a programming logic tree. Wich of the following applications should he
use?
Users of a file server allowed to configure security settings on any files they create. Which of the following access control models, is
this, an example of?
Which of the following connectors is commonly used with Cat 5 and Cat 6 cables?
Which of the following internal components converts a picture file into output on a monitor?
A database administrator has been asked to examine the performance of a database. The administrator uses the database management
system to examine the tables. Which of the following describes the method of accessing the database?
Meaningful & accurate reporting is essential to retailers in making business decisions while managing inventory. Which of the
following best offers assistance in generating report?
A programmer needs to perform a single operations ten times. Which of the following technique would be best to use for this purpose?
Which of the following installation methods is most appropriate so that the application continues to work even if the workstation is
disconnected from the LAN?
A programm needs to choose apple, oranges, bananas based on an input. Which of the following programming construct is BEST to
use?
A function is BEST used for enabling programs to?
A regulation required a new applicant to provide a scan of their retinas in case of any future legal questions regarding who applied for
the position. Which of the following is this an example of?
A network engineer wants to increase the speed of the access point. Which of the following standard should be used as a reference of
the purchase of the access points?
Which of the following commands is MOST likely to be used to change existing data in a database?
A computer science professor is referring keyboards, mice, scaners, and styluses in the context of computing basics and processes.
Given the supplied list, under which of the following categories do these devices fall?
Relational databases store data in which of the following?
Which of the following password policies BEST protect against brute force attacks?
A network architect has created an outline for an idea for a process that an organization uses as a primary financial source. Which of the
following would BEST protect this process from other organizations?
Which of the following parts of the URL https://www.example.com, hosts the IP address?
For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:
Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts
probably are compromised as well. Which of the following has Joe MOST likely performed?
Give the following pseudocode: program breakfast weekday = [" Monday ","Tuesday ","wednesday ","thursday","friday "]
weekend = ["saturday ","sunday] if today == wednesday Output "Bacon and eggs" else if today == friday output
"Oaatmeal" else if today in weekend output "Waffles" else output "Pancakes" end
if the breakfast program ran on sunday ,which of the following would be the output?
A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the
following should the technician do FIRST?
Which of the following explains why a database adminstrator would most likely use a relaional database instead of a flat file database?
A developer needs to know the length of a text file. Which of the following would the developer MOST likely use?
A hardware technician is discussing the speed of a workstation processor. Which of the following is the best option for the speed of the
processor?
An employee's laptop does not connect to the internet when it is used in a coffe shop. Which of the following is the MOST likely
cause ?
Marketing department requests a report of last month's orders from a database. Which of the following language types will be used to
identify and pull the correct information?
A technician has just installed a new wireless router. To configure basic wireless security, the technication should change the SSID,
enable encryption and:
The help desk receives a call from an individual claiming to be a corporate Vice President and resquesting a password reset. The
individual answered all but one of the challenge questitions. Which of the following actions should the help desk take?
Difficulty Level OPTION 1 OPTION 2 OPTION 3 OPTION 4 Answers
Normal Patent Trademar Watermar Copyright 4
k k
Normal Ensure Enable Reset the Review the fault tolerance configurations 1
both task proxy
devices schedulin settings
are g to their
connecte default
d to the values
LAN
Normal Document Test the Renew Report the findings and document the action 4
the theory of the taken
findings validation wireless
certificate
Normal IF amount IF amount IF amount IF amount > 5000 Interest Rate = 0.07 ELSE 3
> 5000 < 5000 < 5000 Interest rate = 0.04 ENDIF
Interest Interest Interest
Rate = Rate = Rate =
0.04 ELSE 0.07 ELSE 0.04 ELSE
Interest Interest Interest
rate = rate = 0.04 rate =
0.07 ENDIF 0.07
ENDIF ENDIF
Normal A photo is A A persons A social media post that was deleted two 4
published person's intentionall years ago is found when searching an
to a photo unpopula y makes internet archive site
sharing site r quote in their
for sharing a public birthday
with sports visible in a
friends interview gaming
as app
available
on a sport
media
service
Normal Fingerprint Username SMS text Retina scan and facial recognition 4
and and and
passcode password hardware
token
Normal Presentatio Presentatio Word Visual diagramming Software 4
n Software n Software processing
software
Normal Mandatory Discretiona Role-based Rule-based access controls 2
access ry access access
controls controls controls
Normal The www The com The The https portion of the URL address 3
portion of portion of example
the URL the URL portion of
address address the URL
address
Normal Redundanc Replication Prioritizati Fault tolerance 3
y on
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a