Which of the following is MOST important to determine before allowing employees to access the server remotely?
A small company wants to set up a server that is accessible from the company network as well as the Internet. Which of the following is MOST important to determine before allowing employees to access the server remotely?A . The quality of the computer used to connectB . A security...
A UPS provides protection against:
A UPS provides protection against:A . denial of serviceB . replay attack.C . power outages.D . wiretapping.View AnswerAnswer: C Explanation: A UPS (uninterruptible power supply) provides protection against power outages by providing backup power to connected devices in case of a power failure. A UPS typically consists of a battery,...
Which of the following practices are being employed?
The IT department has established a new password policy for employees. Specifically, the policy reads: Passwords must not contain common dictionary words Passwords must contain at least one special character. Passwords must be different from the las six passwords used. Passwords must use at least one capital letter or number....
Which of the following is primarily a confidentiality concern?
Which of the following is primarily a confidentiality concern?A . EavesdroppingB . ImpersonatingC . DestructingD . AlteringView AnswerAnswer: A Explanation: Eavesdropping is an electronic attack where digital communications are intercepted by an individual whom they are not intended1. This is a confidentiality concern because it violates the principle of limiting...
Which of the following should be the technician’s NEXT step?
A technician is troubleshooting a problem. The technician tests the theory and determines the theory is confirmed. Which of the following should be the technician’s NEXT step?A . Implement the solution.B . Document lessons learned.C . Establish a plan of action.D . Verify full system functionality.View AnswerAnswer: C Explanation: The...
Which of the following actions should be used to get the database populated?
A database administrator wants to populate a database with large amounts of data from an external source. Which of the following actions should be used to get the database populated?A . EXPORTB . IMPORTC . SELECTD . ALTERView AnswerAnswer: B Explanation: IMPORT is the action that should be used to...
Which of the following troubleshooting steps is the technician using by browsing to the same site?
A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps...
Which of the following is the BEST option for storing the data?
A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data?A . Flat fileB . MemoryC . Relational databaseD . Solid state driveView AnswerAnswer:...
Which of the following application delivery mechanisms BEST describes infrastructure located in an individual organization’s datacenter?
Which of the following application delivery mechanisms BEST describes infrastructure located in an individual organization’s datacenter?A . PrivateB . TraditionalC . PublicD . CloudView AnswerAnswer: B Explanation: Traditional is the application delivery mechanism that best describes infrastructure located in an individual organization’s datacenter. Traditional application delivery is a method of...
Which of the following should the company use to BEST protect the logo?
A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Select TWO).A . PatentB . CopyrightC . NDAD . TrademarkE . EULAView AnswerAnswer: B, D...