A UPS provides protection against:
A UPS provides protection against:A . denial of serviceB . replay attack.C . power outages.D . wiretapping.View AnswerAnswer: C
Which of the following WiFi security options would create the MOST need for a VPN connection on the client device?
Which of the following WiFi security options would create the MOST need for a VPN connection on the client device?A . OpenB . WEPC . WPAD . WPA2View AnswerAnswer: A
Which of the following is primarily a confidentiality concern?
Which of the following is primarily a confidentiality concern?A . EavesdroppingB . ImpersonatingC . DestructingD . AlteringView AnswerAnswer: A
A function is BEST used for enabling programs to:
A function is BEST used for enabling programs to:A . hold a list of numbers.B . be divided into reusable components.C . define needed constant values.D . define variables to hold different values.View AnswerAnswer: D
Which of the following BEST describes the physical location of the data in the database?
Which of the following BEST describes the physical location of the data in the database?A . TableB . ColumnC . RAMD . HDDView AnswerAnswer: A
Which of the following BEST describes the practice of providing user credentials when logging onto the network?
Which of the following BEST describes the practice of providing user credentials when logging onto the network?A . OutputB . StorageC . InputD . ProcessingView AnswerAnswer: C
Which of the following is an advantage of installing an application to the cloud?
Which of the following is an advantage of installing an application to the cloud?A . Data is not stored locally.B . Support is not required.C . Service is not required.D . Internet access is not required.View AnswerAnswer: A
Which of the following components would accomplish this task?
A company executive wants to view company training videos from a DVD . Which of the following components would accomplish this task?A . Optical driveB . Hard disk driveC . Solid state driveD . Flash driveView AnswerAnswer: A
Which of the following security concerns is a threat to confidentiality?
Which of the following security concerns is a threat to confidentiality?A . Replay attackB . Denial of serviceC . Service outageD . Dumpster divingView AnswerAnswer: A
following types of software would BEST complete this task?
A user needs to enter text and numbers to produce charts that demonstrate sales figures . Which of the following types of software would BEST complete this task?A . Text editing softwareB . Visual diagramming softwareC . Spreadsheet softwareD . Web browsing softwareView AnswerAnswer: C