performed when establishing a theory of probable cause?
• A. Question the obvious.
• B. Identify the symptoms.
• C. Duplicate the problem.
• D. Determine if anything has changed.
A. Question the obvious.
Which of the following would be considered confidential information?
• A. The design for a company’s yet-to-be-released product
• B. A list of services offered by a private investigator
• C. A large corporation's financial results for the year
• D. An individual’s record of traffic citations
A. The design for a company’s yet-to-be-released product
Which of the following information types is MOST likely a violation of an email
security policy?
• A. Login credentials
• B. Project schedules
• C. Customer product information
• D. Technical installation documents
A. Login credentials
Which of the following programming languages is considered a low-level language
with commands specific to the processor type used?
• A. Assembly
• B. C++
• C. SQL
• D. HTML
A. Assembly
Joe, a tech-savvy teenager, has received one of the best new home Wi-Fi routers on
the market. Joe’s parents have entrusted Joe to set up the router. To leverage the
best throughput options available for Joe’s devices, the router is located in Joe’s
bedroom. Joe’s parents’ devices are set to slower standards. Which of the following
is being used for Joe’s devices?
• A. 802.11n 2.4GHz
• B. 802.11ac 2.4GHz
• C. 802.11n 5GHz
• D. 802.11ac 5GHz
, D. 802.11ac 5GHz
Which of the following data is MOST likely to be stored as a string?
• A. 3.1415927
• B. x
• C. Cat
• D. 42
C. Cat
Which of the following is MOST likely used to measure SSD capacity?
• A. GHz
• B. Gb
• C. GB
• D. Gbps
C. GB
Which of the following information types would cause the GREATEST loss of value to
an organization if encrypted by a ransomware attack?
• A. Employee emergency contacts
• B. Research projects database
• C. User login history
• D. Advertising material archive
B. Research projects database
Which of the following database design requirements is MOST likely a reason to
implement a flat file?
• A. Data type flexibility
• B. Scalability
• C. Simplicity
• D. Search speed
C. Simplicity
A user received an account compromise notice from an online retailer. Two weeks
later, the user received another notice stating the new compromise used the
credentials from the first compromise. Which of the following password best
practices MOST likely would have prevented the second compromise?
• A. Password age
• B. Password complexity
• C. Password reuse
• D. Password length