

Most Missed #4
Presentation
•
Computers
•
9th Grade
•
Practice Problem
•
Hard
Eric Asel
Used 6+ times
FREE Resource
16 Slides • 16 Questions
1
ITF+ Most Missed Q's
2
Multiple Choice
For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:
Prioritization
Redundancy
Replication
Fault Taulerance
3
Prioritization.
Prioritization refers to the act of ranking the importance of recovering different types of data during a disaster recovery exercise. Since the company wants to ensure customer data is recovered before operational data, it emphasizes the importance of prioritizing customer data in the recovery process.
4
This involves having duplicate systems or components to ensure continued operation if one fails.
It's not Redundancy
This refers to a system's ability to continue operating despite failures.
It's not Fault Tolerance
Prioritization.
5
Multiple Choice
A company is concerned with ensuring its databases are highly available.
Failover
Indexes
Prioritization
Backups
6
Failover.
Failover refers to the automatic process of switching to a secondary database server in case the primary server becomes unavailable. This ensures minimal downtime for applications that rely on the database
7
Backups are essential for recovering data in case of failures, but they don't directly address the concept of high availability.
It's not Backups
Prioritization is important in disaster recovery scenarios, but it focuses on the order of recovery for different types of data. Not keeping them available.
It's not Prioritization
Failover.
8
Multiple Choice
A user has an outdated version of an operating system for which support is no longer available. The browser is also out of date. Which of the following should the user do to BEST protect online banking information?
Install and run an antivirus program.
Install and configure a firewall.
Install and use another browser.
Install and configure an IDS
9
Install and use another browser.
Using a modern, up-to-date browser with a good security track record significantly reduces the risk of online banking information being compromised through vulnerabilities in the outdated software. Modern browsers receive regular security updates to address newly discovered exploits.
10
A firewall can help control network traffic and block malicious connections, but it wouldn't address vulnerabilities within the outdated browser.
It's not Firewall
While an antivirus program can be helpful, it might not be enough to mitigate the risks associated with a completely outdated operating system and browser.
It's not antivirus
Install and use another browser.
11
Multiple Choice
Which of the following types of network security deals with deviations from the historic connection patterns and analysis of new threats to provide effective mitigation responses?
Behavior security
Information Identity Management
Unauthorized hacking
Authorized hacking
12
Behavior Security.
This type of network security focuses on monitoring network activity for anomalies and deviations from typical patterns. It analyzes traffic for suspicious behavior that might indicate new or unknown threats. This proactive approach can help identify and stop attacks before they cause significant damage.
13
This doesn't describe a specific type of network security but rather the malicious activity that behavior security aims to detect and prevent.
It's not unauthorized hacking
This focuses on managing user access and identities within a system or network. It ensures users have the appropriate permissions
It's not IAM
Behavior Security.
14
Multiple Choice
Which of the following would allow an application to run automatically when a computer is started?
Services
Processes
Journaling
Drivers
15
Services.
Services are background programs that run continuously when the computer is started. They can be system services critical for functionality or user-added services for specific tasks.
16
These are software components that allow the operating system to interact with hardware devices. They don't directly manage application startup.
It's not Drivers...
These are instances of running programs. While some processes might be essential and start automatically, it's not a general mechanism for application startup.
It's not Processes.
Services.
17
Multiple Choice
An organization exports an inventory database nightly. This is an example of:
Database Backup
Database Import
Database Query
Database Report
18
Database Backup.
Database backup is the process of creating a copy of the database for archival or disaster recovery purposes. Exporting the inventory database nightly suggests creating a copy for safekeeping, aligning with a backup strategy.
19
Database query retrieves specific data from the database based on defined criteria. Nightly exports typically involve the entire database, not targeted data retrieval.
It's not Query...
Reports are formatted presentations of data extracted from the database, often for analysis or visualization. Exports are raw data copies, not formatted reports.
It's not Reports.
Database Backup.
20
Multiple Choice
A systems administrator downloads an update for a critical system. Before installing the update, the administrator runs a hash of the download and ensures the results match the published hash for the file. This is an example of:
Integrity concerns
Availability Concerns
Accounting concerns
Confidentiality concerns
21
Integrity.
Verifying the downloaded file integrity exemplifies concern about ensuring the data has not been tampered with, which aligns with integrity concerns.
22
Availability emphasizes ensuring authorized users can access data when needed. Downloading the update is necessary for availability, but verifying the hash isn't directly concerned with that aspect.
It's not Query...
Confidentiality focuses on protecting data from unauthorized access. Hashing doesn't directly address confidentiality.
It's not Confidentiality.
Integrity.
23
Review
24
Multiple Choice
What is an example of an interpreted language?
C++
Python
Java
HTML
25
Multiple Choice
A database administrator uses GRANT to grant privileges to a user.
What type of command did he use?
DLL
DML
DDL
DHL
26
Multiple Choice
A technician is concerned that sensitive data transmitted over the Internet can be intercepted and viewed during a MITM attack. Which of the following should the technician enable to reduce the risk?
TLS
DLP
IPS
ACL
27
Multiple Choice
A developer needs to add a table to a database. Which of the following database activities should the user perform?
SELECT
ALTER
UPDATE
CREATE
28
Multiple Choice
Which of the following would indicate the FASTEST processor speed?
3.6Mbps
3.6Gbps
3.6GHz
3.6MHz
29
Multiple Choice
The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?
Ensure sources of EMI are removed.
Update from 802.11b to 802.11g.
Enable WPA2-Enterprise.
Use WiFi Protected Setup.
30
Multiple Choice
SQL databases use primary and foreign keys to enable which of the following?
Rows
Fields
Schemas
Relationships
31
Multiple Choice
Which of the following would be used to connect a user’s Cable Modem WAN connection?
Coax
RJ-11
RJ-45
USB-C
32
Multiple Choice
Which of the following allows wireless devices to communicate to a wired network?
Switch
Modem
Access Point
Router
ITF+ Most Missed Q's
Show answer
Auto Play
Slide 1 / 32
SLIDE
Similar Resources on Wayground
23 questions
Introduction to Biomolecules
Presentation
•
9th Grade
23 questions
Prokaryotic V Eukaryotic Cells
Presentation
•
9th Grade
23 questions
Biology ACP Review Day 3
Presentation
•
9th Grade
23 questions
Sistem komputer kelas 9
Presentation
•
9th Grade
25 questions
Simplifying Radicals Review
Presentation
•
9th Grade
25 questions
Correlation Coefficient
Presentation
•
9th Grade
26 questions
Coordinating Conjunctions (fanboys)
Presentation
•
9th Grade
24 questions
Ecological Relationships Lesson
Presentation
•
9th Grade
Popular Resources on Wayground
16 questions
Grade 3 Simulation Assessment 2
Quiz
•
3rd Grade
19 questions
HCS Grade 5 Simulation Assessment_1 2526sy
Quiz
•
5th Grade
10 questions
Cinco de Mayo Trivia Questions
Interactive video
•
3rd - 5th Grade
17 questions
HCS Grade 4 Simulation Assessment_2 2526sy
Quiz
•
4th Grade
24 questions
HCS Grade 5 Simulation Assessment_2 2526sy
Quiz
•
5th Grade
13 questions
Cinco de mayo
Interactive video
•
6th - 8th Grade
20 questions
Math Review
Quiz
•
3rd Grade
30 questions
GVMS House Trivia 2026
Quiz
•
6th - 8th Grade