Which of the following practices are being employed?

The IT department has established a new password policy for employees. Specifically, the policy reads: ✑ Passwords must not contain common dictionary words ✑ Passwords must contain at least one special character. ✑ Passwords must be different from the las six passwords used. ✑ Passwords must use at least one...

June 19, 2021 No Comments READ MORE +

Which of the following should the technician enable to reduce the risk?

A technician is concerned that sensitive data transmitted over the Internet can be intercepted and viewed during a MITM attack . Which of the following should the technician enable to reduce the risk?A . DLPB . ACLC . TLSD . IPSView AnswerAnswer: C

June 18, 2021 No Comments READ MORE +

Which of the following statements BEST represents what the “…x86.exe” means in the installation file?

A computer user is downloading software from the Internet and notices the following at the end of the install file: “…x86.exe” . Which of the following statements BEST represents what the “…x86.exe” means in the installation file?A . x86 only supports an installation on a 32-bit CPU architecture.B . x86...

June 18, 2021 No Comments READ MORE +

Which of the following applications should be used to create this list?

The sales department needs to keep a customer list that contains names, contact information, and sales records. This list will need to be edited by multiple people at the same time . Which of the following applications should be used to create this list?A . Database softwareB . Word processing...

June 18, 2021 No Comments READ MORE +

Which of the following is the BEST option for Internet service?

A company desires to implement a six-month survey site within a remote location . Which of the following is the BEST option for Internet service?A . CellularB . SatelliteC . CableD . FiberView AnswerAnswer: B

June 18, 2021 No Comments READ MORE +

Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?

Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?A . Email previewingB . PatchingC . Clear browsing cacheD . Kill processView AnswerAnswer: B

June 18, 2021 No Comments READ MORE +

Which of the following requires the MOST frequent updating to remain effective?

Which of the following requires the MOST frequent updating to remain effective?A . AntivirusB . Host firewallC . Web browserD . Device driversView AnswerAnswer: A

June 18, 2021 No Comments READ MORE +

Which of the following actions should be used to get the database populated?

A database administrator wants to populate a database with large amounts of data from an external source. Which of the following actions should be used to get the database populated?A . EXPORTB . IMPORTC . SELECTD . ALTERView AnswerAnswer: B

June 17, 2021 No Comments READ MORE +

Which of the following devices would be BEST for the developer to buy?

A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded . Which of the following devices would be BEST for the developer to buy?A . LaptopB . ServerC . Game consoleD...

June 17, 2021 No Comments READ MORE +

Which of the following devices would MOST likely be used to store the data?

All users have access to an application at a company. The data from the application is stored on a centralized device located on the network . Which of the following devices would MOST likely be used to store the data?A . ServerB . Tape libraryC . External HDDD . WorkstationView...

June 17, 2021 No Comments READ MORE +