Which of the following wireless device interfaces is primarily used for connecting devices to a local area network(LAN) to enable internet and network access? (802.11X,RFID,NFC,Bluetooth)
802.11X
What type of language would you use to write a device driver for Linux?
You would use an ASSEMBLY language to write a device driver for Linux.
Where would you go to configure an SSD?
Disk management
With what programming concept are properties and methods associated?
Objects
Which of the following addresses the storage concern of data persistence?
Saving the information to disk.
Which of the following display technologies allows you to wirelessly send content from a device to an external screen, such as a Smart TV, without physically connecting a cable?
Casting
Which of the following can be characterized as the interface between applications and hardware?
Operating System
Which of the following are IoT devices? (Choose all that apply.)
1.Fax machines, 2. IP cameras, 3. Mobile phones, 4. Medical devices, 5.Home automation thermostats
1.Home automation thermostats, 3. IP cameras, 5. Medical devices
Screen locks, allow lists, and block lists can raise your expectation of privacy when using which of the following?
Desktop software
Management is concerned that mobile device location information can be revealed to attackers. Which mobile device feature should you investigate? (Remote wiping, screen lock,Geotagging,Allow listing)
Geotagging
Which of the following is NOT a component of multifactor authentication?1. Something you have, 2. Single sign-on, 3. Something you know, 4. Something you are
Single sign-on
Which of the following is NOT a file system?
A) Ext4 B) FAT32 C) NTFS D) GUI
A graphical user interface (GUI) is not a file system.
You are calculating the GrossPay amount by multiplying the HoursWorked field x the HourlyRate field. Which datatype would you use for the GrossPay, HoursWorked, and HourlyRate fields?
Float
Which of the following characterizes a byte? (1. A zero (0) or one (1), 2. A measurement in Mbps, 3.The string 01000001, 4.A measurement in MHz)
The string 01000001
Which of the following is NOT an email client? (Outlook, Excel, Thunderbird, Mailbird)
Excel
Which of the following location backup considerations would NOT be advisable for mobile devices? (Backup stored locally, Backup to cloud storage, Backup stored offsite, Backup stored onsite)
Backup stored locally
Which of the following is the fastest throughput unit?
Gbps, Mbps, Kbps, Bps
The fastest throughput listed is gigabits per second (Gbps).
Which term refers to the large volumes of data that require advanced tools and techniques to process, analyze, and extract meaningful insights?
Big Data
Your browser uses Bing when you want to look things up. You want to change it so that your browser uses Google instead. What must you change?
Default search engine
Which of the following are connections that are used in wired networking? (Choose two.)
1. Infrared, 2. DVI, 3. RJ-45, 4. VGA, 5. RJ-11
RJ-11 and RJ-45 (registered jack) are both connections (input/output interfaces) that are used in networking.
When using the internet, which of the following areas should concern you about your expectation of privacy?(Choose all that apply.)
When using file sharing applications, When using email, While instant messaging, When using social networking sites
All of the them.
Which term is used to describe the overall structure of a database?Primary key, Row,Table, Schema
Schema
You are concerned about browser security in your organization. You want to ensure that JavaScript is blocked fromall websites. What would you implement? Clear the cache, Check for a valid certificate, Enable pop-up blockers, Deactivate client-side scripting.
Deactivate client-side scripting.
You arrive at the user’s cubicle in response to a help desk call. Your first step is to identify the problem. Which one of these is NOT an activity you might use to identify the problem? (Establish a theory of probable cause, Duplicate the problem, Identify symptoms, Gather information)
Establish a theory of probable cause.
Which password best practice focuses on safeguarding passwords from unauthorized access by ensuring they are not shared or exposed?
Password expiration, Password length, Password complexity, Password privacy
Password privacy