Common Technical Interview Questions and Answers Update on April 29, 2020

Question 11: What differentiates a router from a switch?
A. Routers are for WANs, and switches are for LANs.
B. A router provides a path out of the LAN, such as to the internet.
C. A switch provides a path out of the LAN, such as to the internet.
D. Routers are for client-server networks, and switches are for peer-to-peer networks.
Correct Answer: B. A router provides a path out of the LAN, such as to the internet.
Explanation: A router, not a switch, provides a path out of the LAN to other networks. Both routers and switches can be used with either WANs or LANs and with both client-server and peer-to-peer networks.

Question 12: Which wireless encryption standard is the most secure?
Correct Answer: C. WPA2
Explanation: WPA2 is the most secure wireless encryption standard listed, although WPA3 is now available. WEP and WPA are not as good. WPS is not an encryption standard; it is a way of configuring a WiFi network connection by pressing a button on the router.

Question 13: In which way is a cellular internet connection superior to wired and WiFi?
A. Bandwidth
B. Mobility
C. Number of concurrent connections
D. Security
Correct Answer: B. Mobility
Explanation: Wired connections excel at bandwidth, concurrent connections and security. Cellular and satellite are better for mobility.

Question 14: Disabling the Bluetooth adapter on a laptop when it is not in use is an example of:
A. Dumpster diving
B. Cracking
C. Device hardening
D. Hardware theft prevention
Correct Answer: C. Device hardening
Explanation: Device hardening involves blocking all unnecessary points of access, such as an unused wireless connection. Read more about mobile device security.

Question 15: Which of the following might you want to disable to protect your privacy?
A. Autofill forms
B. Hyperlinks
C. Certificates
D. InPrivate browsing
Correct Answer: A. Autofill forms
Explanation: Autofill forms can make your previously entered form data available to others who use your computer.

Question 16: Which type of contingency plan is specific to an IT system or service?
A. Business continuity
B. Incident response
C. Disaster recovery
D. Data restoration
Correct Answer: C. Disaster recovery
Explanation: The disaster recovery plan provides details for how to restore a specific failed IT system or service to a functional state as quickly as possible.

Question 17: You have configured a database in the headquarters office located in Houston, Texas. Your company has offices in major cities across Canada and the United States. Users in Eastern Canada complain about slow query access to the database, while Texas users enjoy fast performance. What should you do?
A. Place a read replica in Eastern Canada
B. Create an index
C. Place a writeable replica in Eastern Canada
D. Create a foreign key
Correct Answer: A. Place a read replica in Eastern Canada
Explanation: Placing a database read replica physically near users will reduce network latency.

Question 18: Which type of database does not use a rigid schema?
A. Relational
B. On-premises
C. Cloud
Correct Answer: D. NoSQL
Explanation: NoSQL databases are used to store large amounts of unstructured data and as such do not use a rigid schema to define what type of data will be stored.

Question 19: You are using the C programming language to create a software solution. A single variable must be tested for multiple possible values. Which programming construct should you use to achieve this?
A. If
B. Select case
C. While
D. Switch
Correct Answer: D. Switch
Explanation: In the C programming language, the switch statement is best suited for testing a single variable for multiple values.

Question 20: Which type of coding practice uses smaller code modules working together to support an application?
A. Monolithic
B. Interpreted
C. Microservices
D. Compiled
Correct Answer: C. Microservices
Explanation: Microservices are independent code modules that together form a larger application.