Itil 4 Flashcards

1
Q

Which of the following is primarily a confidentiality concern?

A. Eavesdropping
B. Impersonating
C. Destructing
D. Altering

A

A. Eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use. Which of the following should the developer use to BEST protect the document?
A. Patent
B. Trademark
C. Watermark
D. Copyright
A

D. Copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following database concepts would MOST likely use a CSV file?

A. Data querying
B. Data reports
C. Data importing
D. Data persistence

A

B. Data reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST?

A. Check Knowledge Base.
B. Search local logs.
C. Research possible theories.
D. Question users

A

A. Check Knowledge Base.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following BEST describes the practice of providing user credentials when logging onto the network?

A. Output
B. Storage
C. Input
D. Processing

A

C. Input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following allows wireless devices to communicate to a wired network?

A. Modem
B. Switch
C. Firewall
D. Access point

A

D. Access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?

A.Laptop

B.Workstation

C.Mobile phone

D.Server

A

D.Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following describes something in a database that refers to the unique identifier in the parent table?

A. Attribute
B. Constraint
C. Foreign key
D. Schema

A

A. Attribute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
For which of the following is a relational database management system MOST commonly used?
A. Building flowcharts
B. Storing information
C. Generating reports
D. Creating diagrams
A

B. Storing information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which of the following BEST describes an application running on a typical operating system?
A. Process
B. Thread
C. Function
D. Task
A

A. Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?
A. Update from 802.11b to 802.11g.
B. Ensure sources of EMI are removed.
C. Enable WPA2-Enterprise.
D. Use WiFi Protected Setup.
A

B. Ensure sources of EMI are removed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps is the technician using by browsing to the same site?
A. Establish a plan of action.
B. Gather information
C. Duplicate the problem.
D. Find the root cause.
A

C. Duplicate the problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue?
A. Ensure both devices are connected to the LAN.
B. Enable task scheduling.
C. Reset the proxy settings to their default values.
D. Review the fault tolerance configurations.

A

A. Ensure both devices are connected to the LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Which of the following relational database constructs is used to ensure valid values are entered for a column?
A. Schema
B. Permissions
C. Constraint
D. Column
A

C. Constraint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?
A. Encryption
B. Compression
C. Permissions
D. Auditing
A

A. Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of:
A. a storage area network.
B. an embedded OS.
C. network attached storage.
D. a Type 1 hypervisor.
A

D. a Type 1 hypervisor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is a compiled language?

A.Perl

B.JScript

C.Java

D.PowerShell

A

C.Java

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
Which of the following actions is the FINAL step in the standard troubleshooting methodology?
A. Document the solution and cause.
B. Create a new theory of cause.
C. Research the problem online.
D. Implement preventive measures.
A

A. Document the solution and cause.

19
Q
A systems administrator wants to return results for a time range within a database. Which of the following commands should the administrator use?
A. SELECT
B. INSERT
C. DELETE
D. UPDATE
A

A. SELECT

20
Q

Which of the following statements BEST describes binary?
A. A notational system used to represent an ג€onג€ or ג€offג€ state
B. A notational system used to represent media access control
C. A notational system used to represent Internet protocol addressing
D. A notational system used to represent a storage unit of measurement

A

A. A notational system used to represent an ג€onג€ or ג€offג€ state

21
Q
Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the programג€™s run. Which of the following would Joe
MOST likely use to accomplish this?
A. Loop
B. Variable
C. Constant
D. Function
A

B. Variable

22
Q
An end userג€™s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technicianג€™s NEXT step?
A. Restart the computer.
B. Contact other users.
C. Disconnect the peripherals.
D. Document the findings.
A

D. Document the findings.

23
Q
A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?
A. Non-repudiation
B. Authentication
C. Integrity
D. Accounting
A

B. Authentication

24
Q
Which of the following is an advantage of installing an application to the cloud?
A. Data is not stored locally.
B. Support is not required.
C. Service is not required.
D. Internet access is not required.
A

A. Data is not stored locally.

25
Q

A small company wants to set up a server that is accessible from the company network as well as the Internet. Which of the following is MOST important to determine before allowing employees to access the server remotely?
A. The quality of the computer used to connect
B. A security method of allowing connections
C. The employeesג€™ home ISP speeds
D. The geographical location of the employees

A

B. A security method of allowing connections

26
Q
A program needs to choose apples, oranges, or bananas based on an input. Which of the following programming constructs is BEST to use?
A. Variable
B. If
C. Datatype
D. Comment
A

B. If

27
Q
A UPS provides protection against:
A. denial of service
B. replay attack.
C. power outages.
D. wiretapping.
A

C. power outages.

28
Q
A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?
A. Optical drive
B. Hard disk drive
C. Solid state drive
D. Flash drive
A

A. Optical drive

29
Q
A technician is troubleshooting a problem. The technician tests the theory and determines the theory is confirmed. Which of the following should be the technicianג€™s NEXT step?
A. Implement the solution.
B. Document lessons learned.
C. Establish a plan of action.
D. Verify full system functionality.
A

C. Establish a plan of action.

30
Q

Given the following pseudocode:

If the Breakfast program ran on Sunday, which of the following would be the output?
A. Oatmeal
B. Bacon and eggs
C. Waffles
D. Pancakes
A

C. Waffles

31
Q

A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation
MOST likely need for the printer to function?
A. Permission
B. Ink cartridge
C. USB cable
D. Driver

A

D. Driver

32
Q

Which of the following BEST describes a kilobyte?
A. A kilobyte is a measurement of storage (e.g., 100KB).
B. A kilobyte is a measurement of throughput (e.g.,100Kbps).
C. A kilobyte is a measurement of power (e.g., 100KW).
D. A kilobyte is a measurement of processor speed (e.g., 2.4KHz).

A

A. A kilobyte is a measurement of storage (e.g., 100KB).

33
Q
Which of the following security concerns is a threat to confidentiality?
A. Replay attack
B. Denial of service
C. Service outage
D. Dumpster diving
A

A. Replay attack

34
Q
Which of the following software license models allows a developer to modify the original code and release its own version of the application?
A. Proprietary software
B. Commercial software
C. Open source software
D. Cross-platform software
A

C. Open source software

35
Q
Which of the following are the basic computing operations?
A. Input, process, output, and feedback
B. Input, output, storage, and feedback
C. Input, process, and output
D. Input, process, output, and storage
A

D. Input, process, output, and storage

36
Q
Which of the following would work BEST stored as a flat file rather than stored in a database?
A. Contact list
B. Movie theater locations
C. Directions to doctorג€™s office
D. Store inventory
A

A. Contact list

37
Q
An administrator grants permission for a user to access data in a database. Which of the following actions was performed?
A. Data correlation
B. Data manipulation
C. Data gathering
D. Data definition
A

D. Data definition

38
Q
An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of application architectures did the employee use?
A. Standalone application
B. Client-server application
C. Web application
D. Cloud application
A

B. Client-server application

39
Q

Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem?
A. The power interruption caused the camera to malfunction.
B. Ann has a compatibility problem with the camera.
C. A firmware update needs to be applied to the camera.
D. Annג€™s Internet connection and wireless router are still down.

A

D. Annג€™s Internet connection and wireless router are still down.

40
Q
A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data?
A. Flat file
B. Memory
C. Relational database
D. Solid state drive
A

A. Flat file

41
Q
Which of the following intellectual property concepts BEST represents a legally protected slogan of a business?
A. Contract
B. Patent
C. Copyright
D. Trademark
A

D. Trademark

42
Q
Which of the following is a wireless communication that requires devices to be within 6in of each other to transfer information?
A. Infrared
B. NFC
C. Bluetooth
D. WiFi
A

B. NFC

43
Q

The IT department has established a new password policy for employees. Specifically, the policy reads:
✑ Passwords must not contain common dictionary words
✑ Passwords must contain at least one special character.
✑ Passwords must be different from the las six passwords used.
✑ Passwords must use at least one capital letter or number.
Which of the following practices are being employed? (Choose two.)
A. Password lockout
B. Password complexity
C. Password expiration
D. Passwords history
E. Password length
F. Password age

A

B.Password complexity

D. Passwords history

44
Q
Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a personג€™s computer?
A. Email previewing
B. Patching
C. Clear browsing cache
D. Kill process
A

B. Patching