Halloween Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

When using cloud-based services to host company data, a company’s disaster recovery plan should include strategies for:

A.

Creating redundancy and ensuring there is an exclusive contract with the cloud service provider.

B.

Distributing data and software services across multiple cloud service providers.

C.

Creating redundancy and using multiple cloud service providers.

D.

Using a single well-established cloud service provider.

Full Access
Question # 5

The Internet has enabled many new anti-social activities, such as online stalking, cyberbullying, and addiction to solitary online activities. Which choice is the most feasible way for schools and parents to reduce cyberbullying?

A.

Monitor, track and record all online activity conducted by students.

B.

Teach teens that the use of online communication is a freedom of expression.

C.

Prevent students from accessing the Internet while at school so that they learn good habits.

D.

Educate students about cyber-ethics and the consequences of questionable online behavior.

Full Access
Question # 6

You want to enable wireless security on your Android device and your Linux system. Which of the following is a disadvantage of Wired Equivalent Privacy (WEP)?

A.

It enables MAC address filtering.

B.

It is easily compromised by hackers.

C.

It only supports 56-bit symmetric-key encryption.

D.

It is based on the outdated 802.lla wireless standard.

Full Access
Question # 7

What is the biggest security concern with wireless networks?

A.

Firewall software is not available for access points.

B.

Wireless encryption algorithms must be implemented.

C.

Wireless networks do not support intrusion detection.

D.

Wireless networks do not support encryption via an access point.

Full Access
Question # 8

Jose is experiencing performance problems with his notebook computer that he purchased a year ago. Upon discussing this issue with him, you learn that he has never deleted any temporary files since owning the device. What can Jose do to fix this problem most efficiently?

A.

Reformat his hard drive.

B.

Use the Windows chkdsk utility.

C.

Use the Windows Disk Cleanup utility.

D.

Back up his computer and delete the active partition.

Full Access