the prompts during setup and accepting all defaults, the user has noticed
outbound network traffic. Which of the following is the MOST likely cause?
• A. Pre-installed applications are reporting user information.
• B. Applications are retrieving the latest security configuration changes.
• C. Group Policy objects are being implemented.
• D. The computer is mining cryptocurrency.
A. Pre-installed applications are reporting user information
A development team is brainstorming how a new program should operate.
Which of the following techniques can be used to depict the program visually
during brainstorming?
• A. Flowchart
• B. Spreadsheet
• C. Pseudocode
• D. Branching
A. Flowchart
Data contained on which of the following would have the HIGHEST
expectation of privacy?
• A. Mobile
• B. Laptop
• C. Cloud
• D. Workstation
A. Mobile
A user clicks a link to a web page to view a document, but nothing happens.
Which of the following is MOST likely the issue?
, • A. Scripting is disabled.
• B. The security settings are too high.
• C. Pop-up blockers are enabled.
• D. The web certificate is invalid.
C. Pop-up blockers are enabled
A user wants to use a workstation to view data ad hoc from a company
database. Which of the following access methods would be BEST?
• A. Command-line interface
• B. Report builder
• C. User interface
• D. Programmatic
B. Report builder
Which of the following is typically used to lay out documents with images
and text for the web?
• A. C++
• B. HTML
• C. Python
• D. JavaScript
B. HTML
A non-profit organization obtains images from the internet to use on a
website. Which of the following is the organization possibly infringing on?
• A. Copyright
• B. Patent
• C. Trademark