Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?
Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?A . Email previewingB . PatchingC . Clear browsing cacheD . Kill processView AnswerAnswer: B
Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?
Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?A . Host-based firewallB . Strong administrator passwordC . Anti-malware softwareD . Full disk encryptionView AnswerAnswer: D
Which of the following BEST describes the practice of providing user credentials when logging onto the network?
Which of the following BEST describes the practice of providing user credentials when logging onto the network?A . OutputB . StorageC . InputD . ProcessingView AnswerAnswer: C
Which of the following database concepts would MOST likely use a CSV file?
Which of the following database concepts would MOST likely use a CSV file?A . Data queryingB . Data reportsC . Data importingD . Data persistenceView AnswerAnswer: B
Which of the following software license models allows a developer to modify the original code and release its own version of the application?
Which of the following software license models allows a developer to modify the original code and release its own version of the application?A . Proprietary softwareB . Commercial softwareC . Open source softwareD . Cross-platform softwareView AnswerAnswer: C
Which of the following should the technician select?
A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band. Which of the following should the technician select?A . 802.11aB . 802.11bC . 802.11gD . 802.11nView AnswerAnswer: B
Which of the following applications should be used to create this list?
The sales department needs to keep a customer list that contains names, contact information, and sales records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?A . Database softwareB . Word processing softwareC...
Which of the following intellectual property concepts BEST represents a legally protected slogan of a business?
Which of the following intellectual property concepts BEST represents a legally protected slogan of a business?A . ContractB . PatentC . CopyrightD . TrademarkView AnswerAnswer: D
Which of the following statements BEST represents what the “…x86.exe” means in the installation file?
A computer user is downloading software from the Internet and notices the following at the end of the install file: “…x86.exe”. Which of the following statements BEST represents what the “…x86.exe” means in the installation file?A . x86 only supports an installation on a 32-bit CPU architecture.B . x86 supports...
Which of the following is a valid IP address the technician should assign?
A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the technician should assign?A . 127.0.0.1B . 172.16.2.189C . 192.168.257.1D . 255.255.255.0View AnswerAnswer: B