IT CONCEPTS AND TERMINOLOGY
INFRASTRUCTURE
APPLICATIONS AND SOFTWARE
SOFTWARE DEVELOPMENT
SECURITY
100

Which of the following BEST describes the practice of providing user credentials when logging onto the network? 

A. Output 

B. Storage 

C. Input 

D. Processing

C. Input

100

A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task? 

A. Optical drive

B. Hard disk drive 

C. Solid state drive 

D. Flash drive  

A. Optical drive

100

Which of the following software license models allows a developer to modify the original code and release its own version of the application? 

A. Proprietary software 

B. Commercial software 

C. Open source software

D. Cross-platform software

C. Open source software

100

A program needs to choose apples, oranges, or bananas based on an input. Which of the following programming constructs is BEST to use? 

A. Variable 

B. If 

C. Datatype 

D. Comment

B. If

100

Which of the following is primarily a confidentiality concern? 

A. Eavesdropping 

B. Impersonating 

C. Destructing 

D. Altering

A. Eavesdropping 

200

Which of the following BEST describes a kilobyte? 

A. A kilobyte is a measurement of storage (e.g., 100KB).

B. A kilobyte is a measurement of throughput (e.g.,100Kbps). 

C. A kilobyte is a measurement of power (e.g., 100KW). 

D. A kilobyte is a measurement of processor speed (e.g., 2.4KHz).

A. A kilobyte is a measurement of storage (e.g., 100KB).

200

A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function? 

A. Permission 

B. Ink cartridge 

C. USB cable 

D. Driver

D. Driver

200

Which of the following BEST describes an application running on a typical operating system? 

A. Process 

B. Thread 

C. Function 

D. Task

A. Process

200

Which of the following is a compiled language? 

A. Perl 

B. JScript 

C. Java 

D. PowerShell

C. Java

200

A UPS provides protection against: 

A. denial of service 

B. replay attack 

C. power outages 

D. wiretapping

C. power outages.

300

Which of the following are the basic computing operations? 

A. Input, process, output, and feedback 

B. Input, output, storage, and feedback 

C. Input, process, and output 

D. Input, process, output, and storage

D. Input, process, output, and storage

300

Which of the following allows wireless devices to communicate to a wired network? 

A. Modem 

B. Switch 

C. Firewall 

D. Access point

D. Access point

300

A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of: 

A. a storage area network 

B. an embedded OS. 

C. network attached storage. 

D. a Type 1 hypervisor.

D. a Type 1 hypervisor.

300

Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program's run. Which of the following would Joe MOST likely use to accomplish this? 

A. Loop 

B. Variable

C. Constant 

D. Function

B. Variable

300

A small company wants to set up a server that is accessible from the company network as well as the Internet. Which of the following is MOST important to determine before allowing employees to access the server remotely? 

A. The quality of the computer used to connect 

B. A security method of allowing connections 

C. The employees' home ISP speeds 

D. The geographical location of the employees

B. A security method of allowing connections

400

A technician is troubleshooting a problem. The technician tests the theory and determines the theory is confirmed. Which of the following should be the technician's NEXT step? 

A. Implement the solution. 

B. Document lessons learned. 

C. Establish a plan of action.

D. Verify full system functionality

C. Establish a plan of action.

400

Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN? 

A. Laptop 

B. Workstation 

C. Mobile phone 

D. Server

D. Server

400

An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of application architectures did the employee use? 

A. Standalone application 

B. Client-server application 

C. Web application 

D. Cloud application

B. Client-server application 

400

Which of the following language types would a web developer MOST likely use to create a website? 

A. Interpreted 

B. Query 

C. Compiled 

D. Assembly

A. Interpreted 

400

Which of the following security concerns is a threat to confidentiality? 

A. Replay attack

B. Denial of service 

C. Service outage 

D. Dumpster diving

A. Replay attack

500

A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST? 

A. Check Knowledge Base. 

B. Search local logs. 

C. Research possible theories. 

D. Question users.

A. Check Knowledge Base.

500

The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength? 

A. Update from 802.11b to 802.11g. 

B. Ensure sources of EMI are removed. 

C. Enable WPA2-Enterprise. 

D. Use WiFi Protected Setup.

B. Ensure sources of EMI are removed.

500

Which of the following operating systems do not require extensions on files to execute a program? (Select TWO). 

A. Windows 7 

B. Windows 8 

C. UNIX 

D. Windows Server 2012 

E. Android F. Linux

C. UNIX 

F. Linux

500

A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed? 

A. Algorithm 

B. Software 

C. Pseudocode 

D. Flowchart

A. Algorithm 

500

A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this? 

A. Encryption 

B. Compression 

C. Permissions 

D. Auditing

A. Encryption

M
e
n
u