Which of the following is MOST important to determine before allowing employees to access the server remotely?
A small company wants to set up a server that is accessible from the company network as well as the Internet. Which of the following is MOST important to determine before allowing employees to access the server remotely?A . The quality of the computer used to connectB . A security...
Which of the following would work BEST stored as a flat file rather than stored in a database?
Which of the following would work BEST stored as a flat file rather than stored in a database?A . Contact listB . Movie theater locationsC . Directions to doctor’s officeD . Store inventoryView AnswerAnswer: A
Which of the following security concerns is a threat to confidentiality?
Which of the following security concerns is a threat to confidentiality?A . Replay attackB . Denial of serviceC . Service outageD . Dumpster divingView AnswerAnswer: A
Which of the following concepts is this an example of?
A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?A . Non-repudiationB . AuthenticationC . IntegrityD . AccountingView AnswerAnswer: B
Which of the following network protocols will MOST likely be used when sending and receiving Internet email? (Select TWO.)
Which of the following network protocols will MOST likely be used when sending and receiving Internet email? (Select TWO.)A . SMTPB . POP3C . SNMPD . DHCPE . ICMPF . SFTPView AnswerAnswer: AB
Which of the following operating systems do not require extensions on files to execute a program? (Select TWO).
Which of the following operating systems do not require extensions on files to execute a program? (Select TWO).A . Windows 7B . Windows 8C . UNIXD . Windows Server 2012E . AndroidF . LinuxView AnswerAnswer: CF
When transferring a file across the network, which of the following would be the FASTEST transfer rate?
When transferring a file across the network, which of the following would be the FASTEST transfer rate?A . 1001KbpsB . 110MbpsC . 1.22GbpsD . 123MbpsView AnswerAnswer: C
Which of the following protocols would be the MOST secure?
A technician is installing a new wireless network and wants to secure the wireless network to prevent unauthorized access. Which of the following protocols would be the MOST secure?A . WPAB . SSIDC . WEPD . WPA2View AnswerAnswer: D
Which of the following would be considered the BEST method of securely distributing medical records?
Which of the following would be considered the BEST method of securely distributing medical records?A . Encrypted flash driveB . Social networking sitesC . FaxD . FTP file sharingView AnswerAnswer: A
Which of the following best describes the technician’s NEXT step?
An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step?A . Restart the computer.B . Contact other users.C . Disconnect the peripherals.D . Document the findings.View AnswerAnswer: D