<< Prev Question Next Question >>

Question 66/103

A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of:

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (103q)
Question 1: A large payment website was breached recently. A user is con...
Question 2: A company purchased a software program. The EULA states that...
Question 3: SQL databases use primary and foreign keys to enable which o...
Question 4: A program needs to choose apples, oranges, or bananas based ...
Question 5: Which of the following would MOST likely use an ARM processo...
Question 6: When following the troubleshooting methodology, which of the...
Question 7: Which of the following computing devices would be used to pr...
Question 8: Which of the following would be best to use to store a proje...
Question 9: Which of the following BEST describes a technology that allo...
Question 10: A technician travels to a data center to review specificatio...
Question 11: Which of the following would work BEST stored as a flat file...
Question 12: A computer technician is assigned a ticket to install a lapt...
Question 13: Which of the following would be BEST to keep the data on a l...
Question 14: An online retailer experienced an outage. An investigation r...
Question 15: Which of the following is an advantage of a fiat file?...
Question 16: A programmer is generating results by iterating rows that pr...
Question 17: A user is selecting software to use to prepare handouts for ...
Question 18: A systems administrator is setting up a new server using RAI...
Question 19: When developing a game, a developer creates a boss object th...
Question 20: A systems administrator wants to return results for a time r...
Question 21: Which of the following can a company use to protect its logo...
Question 22: Which of the following is an example of an interpreted langu...
Question 23: Which of the following BEST describes the purpose of a vecto...
Question 24: A company wants an application to be accessed by concurrent ...
Question 25: Which of the following programming concepts uses properties ...
Question 26: For which of the following is a relational database manageme...
Question 27: An attacker is using subversive tactics to gain the trust of...
Question 28: A global variable called "age" will be created in a program ...
Question 29: A technician is installing a new wireless network and wants ...
Question 30: A company executive wants to view company training videos fr...
Question 31: A company wants its employee to use an email client that dow...
Question 32: Malware infections are being caused by websites. Which of th...
Question 33: A company will begin to allow staff to work from home by mea...
Question 34: Which of the following is used to protect intellectual prope...
Question 35: A technician has received multiple reports about a media pla...
Question 36: An application is hosted on a local network. Which of the fo...
Question 37: A user is buying a laptop. The user will have a lot of perso...
Question 38: Which of the following filesystems would a Linux computer MO...
Question 39: A user wants to use a laptop outside the house and still rem...
Question 40: All users have access to an application at a company. The da...
Question 41: Which of the following would a company consider an asset?...
Question 42: Employees must use a badge to enter and exit the building. E...
Question 43: Which of the following database concepts would MOST likely u...
Question 44: An IP address is 32 bits long. If converted to bytes, it wou...
Question 45: Which of the following types of memory can retain its conten...
Question 46: Which of the following is primarily a confidentiality concer...
Question 47: Employee information is stored in a database. Which of the f...
Question 48: When editing a document, which of the following describes wh...
Question 49: Within a database, which of the following would be the best ...
Question 50: Which of the following WiFi security options would create th...
Question 51: Which of the following is an example of multifactor authenti...
Question 52: Which of the following is the closest to machine language?...
Question 53: Which of the following best explains the reason for password...
Question 54: Which of the following storage devices have a spinning disk?...
Question 55: Which of the following data types should a database administ...
Question 56: Which of the following BEST describes the practice of provid...
Question 57: When transferring a file across the network, which of the fo...
Question 58: Which of the following database structures is the most granu...
Question 59: A technician has been asked to assign an IP address to a new...
Question 60: Which of the following creates multifactor authentication wh...
Question 61: Which of the following filesystems is compatible with the gr...
Question 62: Which of the following would be the easiest component to upg...
Question 63: Which of the following is the most secure fllesystem?...
Question 64: A technician is concerned that sensitive data transmitted ov...
Question 65: Ann, a user, is experiencing difficulty getting her IP-based...
Question 66: A systems administrator uses a program that interacts direct...
Question 67: Which of the following is a compiled language?...
Question 68: A user browses to a website. Before the page opens, the user...
Question 69: Which of the following intellectual property concepts BEST r...
Question 70: A new device has been installed on a wired network and can b...
Question 71: Which of the following software solutions ensures that progr...
Question 72: A developer is writing a script to calculate a bank account ...
Question 73: Which of the following computer components allows for commun...
Question 74: A company purchased a software program. The EULA states that...
Question 75: A help desk technician loads a browser-based ticketing syste...
Question 76: Which of the following security concerns is a threat to conf...
Question 77: Which of the following internet service types is most suscep...
Question 78: Which of the following requires the MOST frequent updating t...
Question 79: For a disaster recovery exercise, a company wants to ensure ...
Question 80: A technician overhears a systems administrator mention the t...
Question 81: Which of the following terms best describes the outcome of a...
Question 82: Given the following lines: (Exhibit) This is an example of:...
Question 83: Which of the following types of encryptions would BEST prote...
Question 84: A company is concerned with ensuring its databases are highl...
Question 85: An IT manager wants to prevent end users from booting altern...
Question 86: A programmer uses DML to modify:...
Question 87: Which of the following network protocols will MOST likely be...
Question 88: A company's team members have both old and new laptops. Whic...
Question 89: Meaningful and accurate reporting is essential to retailers ...
Question 90: Salespeople roam around a retail store conducting transactio...
Question 91: An administrator grants permission for a user to access data...
Question 92: Employees of a large technology company are provided access ...
Question 93: Which of the following is a wireless communication that requ...
Question 94: A user revisits a website and receives a message that the si...
Question 95: Which of the following is the exact number of bytes in a gig...
Question 96: A computer user is downloading software from the Internet an...
Question 97: Concerned with vulnerabilities on a home network, an adminis...
Question 98: Which of the following business continuity concepts is the b...
Question 99: A technician is troubleshooting a problem. The technician te...
Question 100: The broadcast signal from a recently installed wireless acce...
Question 101: The process of determining the source of an issue during tro...
Question 102: Which of the following language types would a web developer ...
Question 103: Given the following information: (Exhibit) Which of the foll...