0 of 38 Questions completed
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 38 Questions answered correctly
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Which of the following BEST describes the practice of providing user credentials when logging onto the network?
Which of the following is both an input and output device?
Which of the following are input devices? (Choose All That Apply)
A technician is concerned that sensitive data transmitted over the Internet can be intercepted and viewed during a MITM attack. Which of the following should the technician enable to reduce the risk?
A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open?
Which of the following is an example of multifactor authentication?
Which of the following is primarily a confidentiality concern?
A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?
A systems administrator is setting up a new server using RAID technology. If one hard drive in the array fails, the data is stored on another drive, preventing data loss. Which of the following business continuity concepts does this explain?
Which of the following storage types is MOST vulnerable to magnetic damage?
The IT department has established a new password policy for employees. Specifically, the policy reads:
Passwords must not contain common dictionary words
Passwords must contain at least one special character.
Passwords must be different from the las six passwords used.
Passwords must use at least one capital letter or number
Which of the following practices are being employed? (Select TWO).
A large payment website was breached recently. A user is concerned that the breach will affect account security on other sites. Which of the following password best practices would mitigate this risk?
Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?
Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed?
A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?
Which of the following is an example of information a company would ask employees to handle in a sensitive manner?
Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?
In which of the following situations should there be come expectation of privacy?
For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:
Which of the following security concerns is a threat to confidentiality?
Which of the following is a reason why complex passwords are required?
A user logs into a laptop using a username and complex password. This is an example of:
Which of the following BEST describes a technology that allows multiple users to create and edit reports at the same time?
A program needs to choose apples, oranges, or bananas based on an input. Which of the following programming constructs is BEST to use?
Which of the following is a compiled language?
A programmer uses DML to modify:
When developing a game, a developer creates a boss object that has the ability to jump. Which of the following programming concepts does jump represent?
The sales department needs to keep a customer list that contains names, contact information, and sales records. This list will need to be edited by multiple people at the same time. Which of the following
applications should be used to create this list?
For which of the following is a relational database management system MOST commonly used?
A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data?
Which of the following BEST describes the physical location of the data in the database?
A systems administrator wants to return results for a time range within a database. Which of the following commands should the administrator use?
An administrator grants permission for a user to access data in a database. Which of the following actions was performed?
Which of the following relational database constructs is used to ensure valid values are entered for a column?
SQL databases use primary and foreign keys to enable which of the following?
Which of the following would work BEST stored as a flat file rather than stored in a database?
A developer needs to add a table to a database. Which of the following database activities should the user perform?
A database administrator finds that a table is not needed in a relational database. Which of the following commands is used to completely remove the table and its data?