Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which of the following best describes the primary connection between a wireless access point and a tablet?

A.

802.11X

B.

Thunderbolt

C.

Bluetooth

D.

USB-C

Full Access
Question # 5

A user finds a USB device and plugs it into a laptop. The laptop does not detect the USB device. Which of the following is the most likely cause of this issue?

A.

Disabled port

B.

Anti-malware

C.

Insufficient memory

D.

Account permissions

Full Access
Question # 6

Which of the following is used to measure the speed of a CPU?

A.

MHz

B.

MB

C.

Mbps

D.

MAC

Full Access
Question # 7

A user is trying to view a report via a hyperlink on a website. When the user clicks on the hyperlink, nothing happens. Which of the following must be configured to view the report?

A.

Cache clearing

B.

Accessibility options

C.

Pop-up blocker

D.

Private browsing

Full Access
Question # 8

A user receives a notification about a new software vulnerability. Which of the following is the best way to secure the software?

A.

Configuring a firewall

B.

Applying updates

C.

Enabling authentication

D.

Uninstalling the program

Full Access
Question # 9

Which of the following is an example of PII? (Choose two.)

A.

Full name

B.

Date of birth

C.

Employment status

D.

School attended

E.

Social media username

F.

City of residence

Full Access
Question # 10

Which of the following describes a printer?

A.

Processing

B.

Output

C.

Storage

D.

Input

Full Access
Question # 11

A user identifies the reason a computer is not working, repairs it, and prints a test page. Which of the following steps should the user take next?

A.

Submit a support ticket

B.

Test the theory

C.

Implement the solution

D.

Document the actions taken

Full Access
Question # 12

Which of the following makes a file readable only by select users who possess a key?

A.

Hidden folders

B.

File permissions

C.

Compression

D.

Encryption

Full Access
Question # 13

Given the following data sequence:

1, 10, 2, 3, 4, 5, 6, 7, 8, 9

Which of the following data types are these values an example of?

A.

Float

B.

ASCII

C.

Boolean

D.

String

Full Access
Question # 14

Which of the following uses the M.2 form factor?

A.

NVMe

B.

GPU

C.

RAM

D.

NIC

Full Access
Question # 15

A company implements a tool to allow employees to conduct meetings over the internet. Which of the following tools did the company implement?

A.

Web browsing

B.

Document sharing

C.

Remote assistance

D.

Conferencing software

Full Access
Question # 16

A user attempts to log in to a website and receives a prompt to update their password. Which of the following is this an example of?

A.

Password privacy

B.

Password history

C.

Password complexity

D.

Password expiration

Full Access
Question # 17

Given the following table:

Which of the following fields best represents a primary key?

A.

ID

B.

Month

C.

Day

D.

Year

E.

Name

Full Access
Question # 18

Which of the following types of programming languages uses tags rather than code?

A.

Markup

B.

Assembly

C.

Query

D.

Compiled

Full Access