Which of the following is an advantage of installing an application to the cloud?
Which of the following is an advantage of installing an application to the cloud?A . Data is not stored locally.B . Support is not required.C . Service is not required.D . Internet access is not required.View AnswerAnswer: A
Which of the following components would accomplish this task?
A company executive wants to view company training videos from a DVD . Which of the following components would accomplish this task?A . Optical driveB . Hard disk driveC . Solid state driveD . Flash driveView AnswerAnswer: A
Which of the following security concerns is a threat to confidentiality?
Which of the following security concerns is a threat to confidentiality?A . Replay attackB . Denial of serviceC . Service outageD . Dumpster divingView AnswerAnswer: A
following types of software would BEST complete this task?
A user needs to enter text and numbers to produce charts that demonstrate sales figures . Which of the following types of software would BEST complete this task?A . Text editing softwareB . Visual diagramming softwareC . Spreadsheet softwareD . Web browsing softwareView AnswerAnswer: C
Which of the following would a company consider an asset?
Which of the following would a company consider an asset?A . An external company used to destroy defective hard drivesB . Information residing on backup tapesC . A company-sponsored technology conferenceD . A certified third-party vendor that provides critical componentsView AnswerAnswer: B
Which of the following is MOST likely the problem?
Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power . Which of the following is MOST likely the problem?A . The power interruption caused...
Which of the following concerns does installing cross-platform software address?
Which of the following concerns does installing cross-platform software address?A . SubscriptionB . LicensingC . Product keyD . CompatibilityView AnswerAnswer: D
Which of the following practices are being employed?
The IT department has established a new password policy for employees. Specifically, the policy reads: ✑ Passwords must not contain common dictionary words ✑ Passwords must contain at least one special character. ✑ Passwords must be different from the las six passwords used. ✑ Passwords must use at least one...
Which of the following should the technician enable to reduce the risk?
A technician is concerned that sensitive data transmitted over the Internet can be intercepted and viewed during a MITM attack . Which of the following should the technician enable to reduce the risk?A . DLPB . ACLC . TLSD . IPSView AnswerAnswer: C
Which of the following statements BEST represents what the “…x86.exe” means in the installation file?
A computer user is downloading software from the Internet and notices the following at the end of the install file: “…x86.exe” . Which of the following statements BEST represents what the “…x86.exe” means in the installation file?A . x86 only supports an installation on a 32-bit CPU architecture.B . x86...