Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following internet service types is most susceptible to weather disruptions?

A.

Cable

B.

Satellite

C.

DSL

D.

Fiber

A database administrator finds that a table is not needed in a relational database. Which of the following

commands is used to completely remove the table and its data?

A.

UPDATE

B.

DELETE

C.

ALTER

D.

DROP

A user has an HDD that is almost at full capacity. Which of the following operating system features should be used to free up some space without deleting any files?

A.

Compression

B.

Encryption

C.

Journaling

D.

Formatting

A programmer uses DML to modify:

A.

files

B.

permissions

C.

data

D.

backups

A user installs a wireless router and opens a browser to modify the settings. Which of the following installation types does this describe?

A.

Web-based

B.

Plug-and-play

C.

Driver-based

D.

Server-based

Which of the following is primarily a confidentiality concern?

A.

Eavesdropping

B.

Impersonating

C.

Destructing

D.

Altering

Which of the following is the main purpose for a MAC address to identify?

A.

A user

B.

A piece of hardware

C.

An IP address

D.

A network

An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step?

A.

Restart the computer.

B.

Contact other users.

C.

Disconnect the peripherals.

D.

Document the findings.

Which of the following scripting languages is most likely to be used in a Linux command-line environment?

A.

JavaScript

B.

PowerShell

C.

C++

D.

Bash

A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation?

A.

USB

B.

NFC

C.

DSL

D.

DVI