Which of the following practices are being employed?
The IT department has established a new password policy for employees. Specifically, the policy reads: ✑ Passwords must not contain common dictionary words ✑ Passwords must contain at least one special character. ✑ Passwords must be different from the las six passwords used. ✑ Passwords must use at least one...
Which of the following should the technician enable to reduce the risk?
A technician is concerned that sensitive data transmitted over the Internet can be intercepted and viewed during a MITM attack . Which of the following should the technician enable to reduce the risk?A . DLPB . ACLC . TLSD . IPSView AnswerAnswer: C
Which of the following statements BEST represents what the “…x86.exe” means in the installation file?
A computer user is downloading software from the Internet and notices the following at the end of the install file: “…x86.exe” . Which of the following statements BEST represents what the “…x86.exe” means in the installation file?A . x86 only supports an installation on a 32-bit CPU architecture.B . x86...
Which of the following applications should be used to create this list?
The sales department needs to keep a customer list that contains names, contact information, and sales records. This list will need to be edited by multiple people at the same time . Which of the following applications should be used to create this list?A . Database softwareB . Word processing...
Which of the following is the BEST option for Internet service?
A company desires to implement a six-month survey site within a remote location . Which of the following is the BEST option for Internet service?A . CellularB . SatelliteC . CableD . FiberView AnswerAnswer: B
Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?
Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?A . Email previewingB . PatchingC . Clear browsing cacheD . Kill processView AnswerAnswer: B
Which of the following requires the MOST frequent updating to remain effective?
Which of the following requires the MOST frequent updating to remain effective?A . AntivirusB . Host firewallC . Web browserD . Device driversView AnswerAnswer: A
Which of the following actions should be used to get the database populated?
A database administrator wants to populate a database with large amounts of data from an external source. Which of the following actions should be used to get the database populated?A . EXPORTB . IMPORTC . SELECTD . ALTERView AnswerAnswer: B
Which of the following devices would be BEST for the developer to buy?
A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded . Which of the following devices would be BEST for the developer to buy?A . LaptopB . ServerC . Game consoleD...
Which of the following devices would MOST likely be used to store the data?
All users have access to an application at a company. The data from the application is stored on a centralized device located on the network . Which of the following devices would MOST likely be used to store the data?A . ServerB . Tape libraryC . External HDDD . WorkstationView...