Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following is MOST likely used to represent international text data?

A.

ASCII

B.

Octal

C.

Hexadecimal

D.

Unicode

Given the following pseudocode:

If the Breakfast program ran on Sunday, which of the following would be the output?

A.

Oatmeal

B.

Bacon and eggs

C.

Waffles

D.

Pancakes

Which of the following is the BEST option for a developer to use when storing the months of a year and when

performance is a key consideration?

A.

Array

B.

Vector

C.

List

D.

String

Which of the following is a wireless communication that requires devices to be within 6in of each other to

transfer information?

A.

Infrared

B.

NFC

C.

Bluetooth

D.

WiFi

Which of the following application delivery mechanisms BEST describes infrastructure located in an individual organization’s datacenter?

A.

Private

B.

Traditional

C.

Public

D.

Cloud

A remote user, who is working from home, requires significant bandwidth to connect to the corporate systems.

Which of the following types of Internet service connections would BEST meet the user’s needs?

A.

T1 line

B.

Satellite

C.

Fiber optic

D.

DSL

A user clicks a link to a web page to view a document, but nothing happens. Which of the following is most likely the issue?

A.

Scripting is disabled.

B.

The security settings are too high.

C.

Pop-up blockers are enabled.

D.

The web certificate is invalid.

A computer technician is assigned a ticket to install a laptop for a new employee. Due to the arrangement of the

workspace, the employee requests that the laptop be installed with the cover closed. Which of the following

would be required to satisfy this request? (Choose two.)

A.

Printer

B.

Mouse

C.

Webcam

D.

External hard drive

E.

Speakers

F.

Display

Which of the following BEST describes a technology that allows multiple users to create and edit reports at the

same time?

A.

Text file on a shared drive

B.

Managed relational database

C.

Informational intranet page

D.

Locally installed productivity software

A technician is concerned that sensitive data transmitted over the Internet can be intercepted and viewed during

a MITM attack. Which of the following should the technician enable to reduce the risk?

A.

DLP

B.

ACL

C.

TLS

D.

IPS