When transferring a file across the network, which of the following would be the FASTEST transfer rate?
When transferring a file across the network, which of the following would be the FASTEST transfer rate?A . 1001KbpsB . 110MbpsC . 1.22GbpsD . 123MbpsView AnswerAnswer: C Explanation:
Which of the following commands is used to completely remove the table and its data?
A database administrator finds that a table is not needed in a relational database. Which of the following commands is used to completely remove the table and its data?A . UPDATEB . DELETEC . ALTERD . DROPView AnswerAnswer: D Explanation: DROP is the command that is used to completely remove...
Which of the following is the BEST way for the company to document this change?
A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?A . Written procedureB . Written policyC . Written emailD . Written memoView AnswerAnswer: B Explanation: A written policy is...
Which of the following would be used to send messages using the SMTP protocol?
Which of the following would be used to send messages using the SMTP protocol?A . Document sharing softwareB . Instant messaging softwareC . Conferencing softwareD . Email softwareView AnswerAnswer: D Explanation: Email software would be used to send messages using the SMTP protocol. SMTP stands for Simple Mail Transfer Protocol,...
Which of the following types of software would BEST complete this task?
A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of the following types of software would BEST complete this task?A . Text editing softwareB . Visual diagramming softwareC . Spreadsheet softwareD . Web browsing softwareView AnswerAnswer: C Explanation: Spreadsheet software is a type...
network?
Which of the following BEST describes the practice of providing user credentials when logging onto the network?A . OutputB . StorageC . InputD . ProcessingView AnswerAnswer: C Explanation: Providing user credentials when logging onto the network is an example of input, which is the process of entering data or commands...
Which of the following allows wireless devices to communicate to a wired network?
Which of the following allows wireless devices to communicate to a wired network?A . ModemB . SwitchC . FirewallD . Access pointView AnswerAnswer: D Explanation: An access point is a device that allows wireless devices to communicate to a wired network. An access point acts as a bridge between the...
Which of the following should the company use to BEST protect the logo?
A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Select TWO).A . PatentB . CopyrightC . NDAD . TrademarkE . EULAView AnswerAnswer: B, D...
Which of the following should the technician enable to reduce the risk?
A technician is concerned that sensitive data transmitted over the Internet can be intercepted and viewed during a MITM attack. Which of the following should the technician enable to reduce the risk?A . DLPB . ACLC . TLSD . IPSView AnswerAnswer: C Explanation: TLS (Transport Layer Security) is a protocol...
Which of the following statements BEST represents what the “…x86.exe” means in the installation file?
A computer user is downloading software from the Internet and notices the following at the end of the install file: “…x86.exe”. Which of the following statements BEST represents what the “…x86.exe” means in the installation file?A . x86 only supports an installation on a 32-bit CPU architecture.B . x86 supports...