Which of the following practices are being employed?
The IT department has established a new password policy for employees. Specifically, the policy reads: Passwords must not contain common dictionary words Passwords must contain at least one special character. Passwords must be different from the las six passwords used. Passwords must use at least one capital letter or number....
Which of the following is primarily a confidentiality concern?
Which of the following is primarily a confidentiality concern?A . EavesdroppingB . ImpersonatingC . DestructingD . AlteringView AnswerAnswer: A Explanation: Eavesdropping is an electronic attack where digital communications are intercepted by an individual whom they are not intended1. This is a confidentiality concern because it violates the principle of limiting...
Which of the following should be the technician’s NEXT step?
A technician is troubleshooting a problem. The technician tests the theory and determines the theory is confirmed. Which of the following should be the technician’s NEXT step?A . Implement the solution.B . Document lessons learned.C . Establish a plan of action.D . Verify full system functionality.View AnswerAnswer: C Explanation: The...
Which of the following actions should be used to get the database populated?
A database administrator wants to populate a database with large amounts of data from an external source. Which of the following actions should be used to get the database populated?A . EXPORTB . IMPORTC . SELECTD . ALTERView AnswerAnswer: B Explanation: IMPORT is the action that should be used to...
Which of the following troubleshooting steps is the technician using by browsing to the same site?
A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps...
Which of the following is the BEST option for storing the data?
A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data?A . Flat fileB . MemoryC . Relational databaseD . Solid state driveView AnswerAnswer:...
Which of the following application delivery mechanisms BEST describes infrastructure located in an individual organization’s datacenter?
Which of the following application delivery mechanisms BEST describes infrastructure located in an individual organization’s datacenter?A . PrivateB . TraditionalC . PublicD . CloudView AnswerAnswer: B Explanation: Traditional is the application delivery mechanism that best describes infrastructure located in an individual organization’s datacenter. Traditional application delivery is a method of...
Which of the following should the company use to BEST protect the logo?
A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Select TWO).A . PatentB . CopyrightC . NDAD . TrademarkE . EULAView AnswerAnswer: B, D...
Which of the following actions would MOST likely fix the problem?
Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?A . Renew the IP address.B . Configure the browser proxy settings.C . Clear the...
Which of the following is being developed?
A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?A . AlgorithmB . SoftwareC . PseudocodeD . FlowchartView AnswerAnswer: A Explanation: An algorithm is a set of specific step-by-step instructions/procedures and conditional...