Which of the following are the primary functions of an operating system? (Choose two.)

Which of the following are the primary functions of an operating system? (Choose two.)A . Provide structure for file and data management.B . Provide protection against malware and viruses.C . Provide peer-to-peer networking capability.D . Provide user data encryption.E . Provide virtual desktop capability.F . Provide system resources.View AnswerAnswer: A,F

June 24, 2021 No Comments READ MORE +

A UPS provides protection against:

A UPS provides protection against:A . denial of serviceB . replay attack.C . power outages.D . wiretapping.View AnswerAnswer: C

June 23, 2021 No Comments READ MORE +

Which of the following WiFi security options would create the MOST need for a VPN connection on the client device?

Which of the following WiFi security options would create the MOST need for a VPN connection on the client device?A . OpenB . WEPC . WPAD . WPA2View AnswerAnswer: A

June 23, 2021 No Comments READ MORE +

Which of the following is primarily a confidentiality concern?

Which of the following is primarily a confidentiality concern?A . EavesdroppingB . ImpersonatingC . DestructingD . AlteringView AnswerAnswer: A

June 23, 2021 No Comments READ MORE +

A function is BEST used for enabling programs to:

A function is BEST used for enabling programs to:A . hold a list of numbers.B . be divided into reusable components.C . define needed constant values.D . define variables to hold different values.View AnswerAnswer: D

June 22, 2021 No Comments READ MORE +

Which of the following BEST describes the physical location of the data in the database?

Which of the following BEST describes the physical location of the data in the database?A . TableB . ColumnC . RAMD . HDDView AnswerAnswer: A

June 22, 2021 No Comments READ MORE +

Which of the following BEST describes the practice of providing user credentials when logging onto the network?

Which of the following BEST describes the practice of providing user credentials when logging onto the network?A . OutputB . StorageC . InputD . ProcessingView AnswerAnswer: C

June 21, 2021 No Comments READ MORE +

Which of the following is an advantage of installing an application to the cloud?

Which of the following is an advantage of installing an application to the cloud?A . Data is not stored locally.B . Support is not required.C . Service is not required.D . Internet access is not required.View AnswerAnswer: A

June 21, 2021 No Comments READ MORE +

Which of the following components would accomplish this task?

A company executive wants to view company training videos from a DVD . Which of the following components would accomplish this task?A . Optical driveB . Hard disk driveC . Solid state driveD . Flash driveView AnswerAnswer: A

June 20, 2021 No Comments READ MORE +

Which of the following security concerns is a threat to confidentiality?

Which of the following security concerns is a threat to confidentiality?A . Replay attackB . Denial of serviceC . Service outageD . Dumpster divingView AnswerAnswer: A

June 20, 2021 No Comments READ MORE +