Join the discussion
Question 1/59
Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person's computer?
Correct Answer: B
Add Comments
- Other Question (59q)
- Q1. Which of the following would MOST likely prevent malware sent as compromised file via emai...
- Q2. A computer user is downloading software from the Internet and notices the following at the...
- Q3. SQL databases use primary and foreign keys to enable which of the following?...
- Q4. A technician is concerned that sensitive data transmitted over the Internet can be interce...
- Q5. Which of the following BEST describes an application running on a typical operating system...
- Q6. Which of the following BEST describes the purpose of a vector in programming?...
- Q7. Which of the following storage types is MOST vulnerable to magnetic damage?...
- Q8. Which of the following is an advantage of installing an application to the cloud?...
- Q9. Given the following pseudocode: (Exhibit) If the Breakfast program ran on Sunday, which of...
- Q10. Which of the following allows wireless devices to communicate to a wired network?...
- Q11. An employee's laptop does not connect to the Internet when it is used in a coffee shop. Wh...
- Q12. Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds th...
- Q13. A technician is installing a new wireless network and wants to secure the wireless network...
- Q14. A company desires to implement a six-month survey site within a remote location. Which of ...
- Q15. Which of the following describes something in a database that refers to the unique identif...
- Q16. Which of the following is a compiled language?...
- Q17. Which of the following is an example of multifactor authentication?...
- Q18. A user is getting an error message when trying to go to a website. A technician asks the u...
- Q19. Which of the following software license models allows a developer to modify the original c...
- Q20. A company requires several reports that analyze related information from sales, inventory,...
- Q21. A gaming console needs to allow for inbound connectivity on a home network to facilitate c...
- Q22. A company is concerned with ensuring its databases are highly available. Which of the foll...
- Q23. The computer language that is closest to machine code is:...
- Q24. A developer needs to add a table to a database. Which of the following database activities...
- Q25. A small company wants to set up a server that is accessible from the company network as we...
- Q26. Which of the following is primarily a confidentiality concern?...
- Q27. In which of the following situations should there be come expectation of privacy?...
- Q28. Given the following pseudocode: (Exhibit) If there are seven apples in the basket, which o...
- Q29. Which of the following statements BEST describes binary?...
- Q30. Which of the following BEST describes the practice of providing user credentials when logg...
- Q31. Joe, a developer, is writing a program in which he needs to store a number that changes ov...
- Q32. Which of the following operating systems do not require extensions on files to execute a p...
- Q33. A user is attempting to print a document to a wireless printer and receives an error stati...
- Q34. A remote user, who is working from home, requires significant bandwidth to connect to the ...
- Q35. A desktop administrator just connected a printer to a workstation, but the workstation doe...
- Q36. A company purchased a software program. The EULA states that the software can be installed...
- Q37. For a disaster recovery exercise, a company wants to ensure customer data is recovered bef...
- Q38. A computer technician is assigned a ticket to install a laptop for a new employee. Due to ...
- Q39. A systems administrator is setting up a new server using RAID technology. If one hard driv...
- Q40. Which of the following would a company consider an asset?...
- Q41. A technician replaces the video card in a user's PC. The user reports the resolution on th...
- Q42. A user is getting an error message when trying to go to a website. A technician asks the u...
- Q43. An IP address is 32 bits long. If converted to bytes, it would be:...
- Q44. A user wants to use a laptop outside the house and still remain connected to the Internet....
- Q45. A user is buying a laptop. The user will have a lot of personal and confidential informati...
- Q46. Given the following pseudocode: (Exhibit) Which of the following is the output of the code...
- Q47. Which of the following authorization techniques is used to assign permissions and authoriz...
- Q48. Which of the following would be used to send messages using the SMTP protocol?...
- Q49. Which of the following is the closest to machine language?...
- Q50. Consider the following statements: (Exhibit) Given the input (userin) of "analyst", to whi...
- Q51. A technician is troubleshooting an error message and tests the same program on a separate,...
- Q52. Which of the following application delivery mechanisms BEST describes infrastructure locat...
- Q53. A user wants to use a laptop outside the house and still remain connected to the Internet....
- Q54. A user at a company visits a weather website often during the day. The user browses to the...
- Q55. Which of the following would indicate the FASTEST processor speed?...
- Q56. Which of the following types of encryption would BEST protect a laptop computer in the eve...
- Q57. Which of the following is a logical structure for storing files?...
- Q58. The IT department has established a new password policy for employees. Specifically, the p...
- Q59. Which of the following is the BEST option for a developer to use when storing the months o...
