100% Verified Answers |Latest Version |Already
Graded A+
Which connector on the back of a computer is used to attach a mouse to a modern PC system?
✔Correct Answer-USB A
Your organization has 20 employees who need an accounting software update installed. Due to a
miscommunication, the purchaser only paid to update 10 licenses. The software company issued a
paper license and a single key for updating 10 users. This is an enterprise paper license and there is
no mechanism that enforces a limit to the number of times the key can be used. You decide to
update all 20 users.
Which of the following are possible consequences of this decision? (Select TWO). ✔Correct
Answer-You risk losing your job; your company is exposed to litigation by violating the software
license agreement
Which of the following SQL commands would you use to delete an entire table and all of its data?
✔Correct Answer-Drop
Which of the following is the best device to deploy to protect your private network from an
untrusted public network? ✔Correct Answer-Firewall
You need a storage device that has very large storage capacity, is fast, and is relatively inexpensive.
Which storage device will best suit your needs? ✔Correct Answer-Hard disk
A user within your organization received an email relating how an account containing a large sum of
money has been frozen by the government of a small African nation. The user was offered a 25%
share of this account if she would help the sender transfer it to a bank in the United States. The user
responded to the sender and was instructed to send her bank account number so that it could be
used to facilitate the transfer. She complied, and then the sender used the information to drain her
bank account. What type of attack occurred? ✔Correct Answer-Phising
In object-oriented programming, which of the following concepts is used to describe properties?
✔Correct Answer-Attributes
Software that requires a monthly subscription fee is often called _______________. ✔Correct
Answer-Software as a service
Which of the following is a firewall function? ✔Correct Answer-Packet filtering
What is the best countermeasure against social engineering? ✔Correct Answer-User awareness
training
You have recently issued new mobile phones to the sales team in your company. Each phone has the
ability to store and transmit encrypted information for such things as making payments at a checkout
counter. Which of the following is the technology being used in these phones? ✔Correct Answer-
NFC chips
, Which of the following describes the firmware in gaming consoles, TVs, and smart cars? ✔Correct
Answer-Embedded OS
A database administrator wants to export a table as a backup before changes are made to the table
structure. Which of the following commands should be executed? ✔Correct Answer-BACKUP
Which of the following notational systems is MOST LIKELY used to represent a MAC address?
✔Correct Answer-Hexadecimal
Which of the following programming models are built from class templates that have properties,
attributes, and methods? ✔Correct Answer-Objects
Which of the following stores data using microscopic light and dark spots? ✔Correct Answer-
Compact disc
What is the name of the narrow strip along the bottom of the Windows environment? ✔Correct
Answer-Taskbar
A business has come up with a new logo for the company and they want to protect the logo as part
of their brand. Which of the following protections should they use? ✔Correct Answer-Trademark
Match each security policy on the left with the appropriate description on the right. ✔Correct
Answer--Provides a high-level overview of the organization's security program; Organizational
Security Policy
-Specifies that user accounts should be locked after a certain number of failed login attempts;
Password policy
-Sets expectations for user privacy when using company resources; Acceptable Use policy
-Identifies a set of rules or standards that define personal behaviors; Code of Ethics
A small business wants to persistently store customer feedback and product feature requests. The
business also wants to be able to index and sort the information by priority. Which of the following
would be the BEST option to track this information? ✔Correct Answer-Database
Which of the following lines will initiate an Internet search from the address bar of a web browser?
✔Correct Answer-microsoft gov
You successfully connect your computer to a wireless network available at the local library. Although
you can access some websites, you can't access several other websites that you need for your
research.
Which of the following is the MOST likely cause of this problem? ✔Correct Answer-A proxy server
is filtering access to websites
In a relational database table, columns are better known as ________________. ✔Correct Answer-
Fields
You're troubleshooting a computer running Windows 10. The operating system has halted and a blue
screen has been displayed on the monitor with an error message.
Which of the following is the MOST likely first step that should be taken in troubleshooting the issue?
✔Correct Answer-Search for the error in Microsoft's knowledgebase