Which of the following actions would MOST likely fix the problem?
Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?A . Renew the IP address.B . Configure the browser proxy settings.C . Clear the...
Which of the following should have the HIGHEST expectation of privacy?
Which of the following should have the HIGHEST expectation of privacy?A . A picture posted to a social media websiteB . A presentation saved to a corporate file serverC . A locally stored word processing documentD . A spreadsheet emailed to a business clientView AnswerAnswer: C
Which of the following would be the BEST choice to accomplish this task?
A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the following would be the BEST choice to accomplish this task?A . Thunderbolt cableB . Bluetooth moduleC . Infrared portD . WLAN cardView AnswerAnswer: D
Which of the following is the BEST place to store this data?
A company requires several reports that analyze related information from sales, inventory, marketing, and compensation data. Which of the following is the BEST place to store this data?A . Flat fileB . Word processorC . DatabaseD . Network shareView AnswerAnswer: C
Which of the following has Joe MOST likely performed?
Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed?A . Password reuseB . SnoopingC . Social engineeringD . PhishingView AnswerAnswer: A
Which of the following are the primary functions of an operating system? (Choose two.)
Which of the following are the primary functions of an operating system? (Choose two.)A . Provide structure for file and data management.B . Provide protection against malware and viruses.C . Provide peer-to-peer networking capability.D . Provide user data encryption.E . Provide virtual desktop capability.F . Provide system resources.View AnswerAnswer: A,F
A UPS provides protection against:
A UPS provides protection against:A . denial of serviceB . replay attack.C . power outages.D . wiretapping.View AnswerAnswer: C
Which of the following WiFi security options would create the MOST need for a VPN connection on the client device?
Which of the following WiFi security options would create the MOST need for a VPN connection on the client device?A . OpenB . WEPC . WPAD . WPA2View AnswerAnswer: A
Which of the following is primarily a confidentiality concern?
Which of the following is primarily a confidentiality concern?A . EavesdroppingB . ImpersonatingC . DestructingD . AlteringView AnswerAnswer: A
A function is BEST used for enabling programs to:
A function is BEST used for enabling programs to:A . hold a list of numbers.B . be divided into reusable components.C . define needed constant values.D . define variables to hold different values.View AnswerAnswer: D