Filters
Question type

SuperBank is considering a cloud service from Local Data Center, Inc., to support the bank's expanding needs. SuperBank's managers are concerned about security. What can SuperBank request to protect its data from security threats?


A) For Local Data Center to run multiple hypervisors
B) For Local Data Center to install a DDoS mitigation system
C) For SuperBank staff to manage the servers at Local Data Center, Inc.
D) For SuperBank to perform background checks on the staff at Local Data Center, In.

Correct Answer

verifed

verified

D

You are a small-business owner and would like to encourage employees to bring their own devices (BYOD) to work. Which of the following can help reduce the security risks associated with a BYOD implementation?


A) Expense accounts
B) Acceptable use policy
C) End user license agreement
D) In-house device maintenance

Correct Answer

verifed

verified

What does the following represent?


A) A MAC address
B) AnIPv4address
C) An IPv6 address
D) An IP diagnostic loopback address

Correct Answer

verifed

verified

C

Carlos is the Information Technology (IT) administrator for a small company. Over the past year, employees have been using their personal mobile devices and smartphones for business use. This has reduced costs of purchasing new devices for employees. Carlos is now considering whether he should stop supplying employees with company phones and instead require all employees to use their personal smartphones for work. How can Carlos address the most significant security vulnerability?


A) Develop a robust app to push security updates out to the various mobile OS devices
B) Create an employee policy that requires employees to keep phones updated to the latest technology
C) Create a policy that specifies acceptable use, ensuring security measures are in place for mobile devices
D) Mandate that employees switch to the company's mobile service provider to ensure security policies are enforced

Correct Answer

verifed

verified

Lisa is traveling on company business. She has a company-issued smartphone with 4G access. Her hotel does not provide Internet access. What advantage does 4G provide to help her access the Internet?


A) She can use a 4G mobile hotspot device with her phone to connect her laptop to Wi-Fi.
B) She can use the 4G phone to establish a VPN connection into the company network.
C) She can use the41G phone to call and locate a public location that provides free Wi-Fl.
D) She can use her41G phone's GPS to identify another hotel that provides in-room Internet access.

Correct Answer

verifed

verified

Henry is the network manager at XYY Corporation, a large manufacturing company that competes in the global market. The company's computing environment is extremely complex and includes several proprietary software systems, all of which require custom configuration of network devices to operate correctly. The company's executive management team believes that they can benefit by switching the company over to any cloud-based service. Henry disagrees. What is a disadvantage of cloud-based services that Henry can cite to support his position?


A) Cloud-based services provide no maintenance or support.
B) Cloud-based services are typically costlier than in-house solutions.
C) The company must typically purchase additional servers to support connections to these types of cloud based service providers.
D) Cloud-based services are typically more limited in offerings and configurations that the company currently supports in-house.

Correct Answer

verifed

verified

You want to restrict host access to a wireless access point. What is the best way to do this?


A) Enable MAC address filtering at each host.
B) Log in to the access point and configure featured, such as changing the SSID.
C) Change the Direct Sequence Spectrum (DSSS) signal at both the access point and each hosts NIC.
D) Install software on the host you want to limit, then use a Web browser to log in to the host and configure it with the necessary settings to use the access point.

Correct Answer

verifed

verified

Patrick visits his teenage daughter's social media page and discovers several offensive posts about one of her classmates. After speaking with his daughter, Patrick learns that several other girls in her class are upset with the classmate and have been posting, texting and e-mailing others about the girl. What is the best way for Patrick to help his daughter understand cyber bullying?


A) He should advise his daughter to ignore the posts, texts and c-mails.
B) He should explain to his daughter that she is participating in the bullying by accepting other's posts, texts and c-mail.
C) he should explain to his daughter that the Internet embraces freedom of speech, and anyone is allowed to write anything.
D) He should advise his daughter to delete all the posts, texts and c-mail she has received, as well as any new ones that appear.

Correct Answer

verifed

verified

B

Showing 1 - 8 of 8

Related Exams

Show Answer