Question 101
Which of the following types of encryption would BEST protect a laptop computer in the event of theft?
A. Disk
B. Email
C. VPN
D. HTTPS
Question 102
Which of the following tasks is typically performed during the identification phase of the troubleshooting methodology?
A. Question users.
B. Verify functionality.
C. Divide and conquer.
D. Implement the solution.
Question 103
A technician overhears a systems administrator mention the term `IOPS`. To which of the following operating system functions would the term BEST apply?
A. Disk management
B. Process management
C. Application management
D. Service management
Question 104
Which of the following is the BEST option for a developer to use when storing the months of a year and when performance is a key consideration?
A. Array
B. Vector
C. List
D. String
Question 105
A company wants an application to be accessed by concurrent users and store company information securely. Which of the following would be the BEST option for storing the information?
A. Word processing document
B. Flat file
C. Database
D. Spreadsheet