Which of the following is an example of multifactor authentication?
Which of the following is an example of multifactor authentication?A . Password and passphraseB . Fingerprint and retina scanC . Hardware token and smartphoneD . Smart card and PINView AnswerAnswer: D Explanation: Smart card and PIN are the examples of multifactor authentication. Multifactor authentication is a security method that requires...
Which of the following should the technician select?
A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band. Which of the following should the technician select?A . 802.11aB . 802.11bC . 802.11gD . 802.11nView AnswerAnswer: B Explanation:
Which of the following best describes the technician’s NEXT step?
An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step?A . Restart the computer.B . Contact other users.C . Disconnect the peripherals.D . Document the findings.View AnswerAnswer: D Explanation: The...
Which of the following concepts is this an example of?
A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?A . Non-repudiationB . AuthenticationC . IntegrityD . AccountingView AnswerAnswer: A Explanation: Non-repudiation is a security...
A programmer uses DML to modify:
A programmer uses DML to modify:A . filesB . permissionsC . dataD . backupsView AnswerAnswer: C Explanation: A programmer uses DML to modify data in a database. DML stands for Data Manipulation Language, which is a subset of SQL (Structured Query Language) that is used to manipulate or change data...
Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?
Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?A . Rule-based access controlB . Mandatory access controlC . Role-based access controlD . Discretionary access controlView AnswerAnswer: C Explanation: Role-based access control is the authorization technique that is used...
Which of the following intellectual property concepts BEST represents a legally protected slogan of a business?
Which of the following intellectual property concepts BEST represents a legally protected slogan of a business?A . ContractB . PatentC . CopyrightD . TrademarkView AnswerAnswer: D Explanation: A trademark is a type of intellectual property that protects a word, phrase, symbol, or design that identifies and distinguishes the source of...
Which of the following is the closest to machine language?
Which of the following is the closest to machine language?A . Scripted languagesB . Compiled languagesC . Query languagesD . Assembly languagesView AnswerAnswer: D Explanation: Assembly languages are the closest to machine language among the given options. Machine language is the lowest-level programming language that consists of binary codes (0s...
Which of the following is MOST likely the problem?
Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem?A . The power interruption caused the...
Which of the following is a value that uniquely identifies a database record?
Which of the following is a value that uniquely identifies a database record?A . Foreign keyB . Public keyC . Primary keyD . Private keyView AnswerAnswer: C Explanation: A primary key is a value that uniquely identifies a database record or a row in a table. A primary key can...