Which of the following backup methodologies would be most efficient in backing up a database in the production environment?
Which of the following backup methodologies would be most efficient in backing up a database in the production environment?A . Disk mirroring of the data being stored on the database.B . A differential backup that is performed on a weekly basis.C . An array of independent disks used to back...
Which of the following situations best illustrates a "false positive" in the performance of a spam filter?
Which of the following situations best illustrates a "false positive" in the performance of a spam filter?A . The spam filter removed Incoming communication that included certain keywords and domains.B . The spam filter deleted commercial ads automatically, as they were recognized as unwanted.C . The spam filter routed to...
Which of the following purchasing scenarios would gain the greatest benefit from implementing electronic cate interchange?
Which of the following purchasing scenarios would gain the greatest benefit from implementing electronic cate interchange?A . A just-in-time purchasing environmentB . A Large volume of custom purchasesC . A variable volume sensitive to material costD . A currently inefficient purchasing processView AnswerAnswer: A
Which of the following is a benefit from the concept of Internet of Things?
Which of the following is a benefit from the concept of Internet of Things?A . Employees can choose from a variety of devices they want to utilize to privately read work emails without their employer’s knowledge.B . Physical devices, such as thermostats and heat pumps, can be set to react...
Which of the following authentication device credentials is the most difficult to revoke when an employee s access rights need to be removed?
Which of the following authentication device credentials is the most difficult to revoke when an employee s access rights need to be removed?A . A traditional key lockB . A biometric deviceC . A card-key systemD . A proximity deviceView AnswerAnswer: B
Which of the following describes the most appropriate set of tests for auditing a workstation's logical access controls?
Which of the following describes the most appropriate set of tests for auditing a workstation's logical access controls?A . Review the list of people with access badges to the room containing the workstation and a log of those who accessed the room.B . Review the password length, frequency of change,...
Which of the following intangible assets is considered to have an indefinite life?
Which of the following intangible assets is considered to have an indefinite life?A . Underground oil depositsB . CopyrightC . TrademarkD . LandView AnswerAnswer: C
Which of the following is a project planning methodology that involves a complex series of required simulations to provide information about schedule risk?
CORRECT TEXT Which of the following is a project planning methodology that involves a complex series of required simulations to provide information about schedule risk?A . Monte Carlo Analysis.B . Project Management Information System (PMIS).C . Earned Value Management (EVM).D . Integrated Project PlanView AnswerAnswer: A
Which of the following is an indicator of liquidity that is more dependable than working capital?
Which of the following is an indicator of liquidity that is more dependable than working capital?A . Acid-test (quick) ratioB . Average collection periodC . Current ratio.D . Inventory turnover.View AnswerAnswer: A
According to Maslow's hierarchy of needs theory, which of the following best describes a strategy where a manager offers an assignment to a subordinate specifically to support his professional growth and future advancement?
According to Maslow's hierarchy of needs theory, which of the following best describes a strategy where a manager offers an assignment to a subordinate specifically to support his professional growth and future advancement?A . Esteem by colleagues.B . Self-fulfillmentC . Series of belonging in the organizationD . Job securityView AnswerAnswer:...