Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Roberto’s company is releasing updates to a specific product. He needs to educate the company’s sales managers, who are located in various international locations, about the new product updates. Which of the following methods would be the most economical and efficient solution for Roberto to discuss the required information with the sales managers synchronously?

A.

Send the product update blueprints via e-mail to each of the sales managers and ask them to contact him with any questions.

B.

Schedule an in-person sales meeting with them at the company headquarters so that the updates can be demonstrated and any questions answered with the entire group present.

C.

Schedule a Webinar with the sales managers so that the updates can be demonstrated and any questions answered with the entire group.

D.

Post the product update blueprints on the company’s Web site and call each sales manager personally to discuss their individual questions or concerns offline.

Full Access
Question # 5

Marcella is looking for a very unique product online. She has found one on the XYZ Company’s Web site, which is designed well and appears to be legitimate. As she navigates through the checkout process, she reaches the checkout page with this URL, which asks her to enter her credit card information:

http://XYZ.com/gp/checkout.html/ref=chk_out_TLS12B_lb?ie=IJTFB &docld=10007931

Why should Marcella cancel her online transaction instead of proceeding?

A.

Because the site uses 128-bit encryption, which is illegal for companies that are located overseas

B.

Because the link contains abbreviations and is not completely readable, so Marcella is unsure of the server name

C.

Because the link does not use SSL/TLS encryption and therefore the information Marcella enters would not be secure

D.

Because the link uses SSL/TLS encryption, which Marcella knows is not compatible with the browser she is using

Full Access
Question # 6

To define a circle-shaped hot-spot for an image map, which of the following code fragments would you use?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 7

A friend just sent you a link to a Facebook page with information that you find very useful. You want to be able to recall the site in the future from your desktop computer, or from your mobile device while away from your desk. Which is the best approach?

A.

Memorize the URL so you can pull up the site in any browser such as Chrome, Firefox or Internet Explorer.

B.

Add the link to a cloud-based bookmark service such as Delicious or Google Bookmarks.

C.

Manually enter the Web address into any and all browsers on all of your devices.

D.

Pull up the message with the link any time you want to view the site.

Full Access
Question # 8

When previewing a Web page using a GUI HTML editor, you will:

A.

be limited to the default browser on your computer or device.

B.

be limited to the browsers installed on your computer or device.

C.

receive an error because GUI editors cannot preview pages in a browser.

D.

be limited to two browser choices that are installed on your computer or device.

Full Access
Question # 9

Carlos is the Information Technology (iT) administrator for a small company. Over the past year, employees have been using their personal mobile devices and smart phones for business use. This has reduced costs of purchasing new devices for employees. Carlos is now considering whether he should stop supplying employees with company phones and instead require all employees to use their personal smart phones for work. How can Carlos address the most significant security vu inerrability?

A.

Develop a robust app to push security updates out to the various mobile OS devices

B.

Create an employee policy that requires employees to keep phones updated to the latest technology

C.

Create a policy that specifies acceptable use, ensuring security measures are in place for mobile devices

D.

Mandate that employees switch to the company’s mobile service provider to ensure security policies are enforced

Full Access
Question # 10

ABC Company develops its Own database applications. ABC is considering migrating to cloud services to accommodate the company’s growth. What strategy should ABC use to ensure continuous data protection if it begins using cloud services?

A.

Cloud-only solution

B.

Regional systems solution

C.

Location systems solution

D.

Multiple cloud-service providers

Full Access
Question # 11

Marion has been hired by a popular national salon business to refresh its existing Web site and update it to valid HTML5 code. Money is not an issue, but time is. Marion is asked to complete the project within eight weeks. The site currently includes 10 pages and connects to a back-end database so that customers can sign in for a personalized experience. Marion suspects that most of the existing code will need to be replaced. Marion must ensure that she has plenty of time for the testing phase, so she needs to complete the planning phase, in which she selects the multimedia for the site, within the next couple days. Which strategy should Marion use in the planning phase?

A.

Take pictures of the salons herself.

B.

Purchase stock photos from online resources.

C.

Hire a photographer to take pictures of the salons.

D.

Edit existing images of the salons to update them.

Full Access
Question # 12

Skylar has been asked by the HR Department to create a Web page for the company’s intra net site that compares the company’s four different medical insurance plans. To accomplish this effectively in HTML5, Skylar should:

A.

use document structure tags to lay out the page and use a table to organize the medical insurance plan information.

B.

use JavaScript to lay out the page and use a table within the page to organize the medical insurance plan information.

C.

use tables to lay out the page and use the tag inside the table to organize the medical insurance plan information.

D.

use CSS to lay out the page and use the

 element to organize the medical insurance plan information.

Full Access
Question # 13

You are a computer technician supporting a small 15-computer Internet lab. The computers are regularly used to browse the Internet and download files. Users have recently complained that they receive error messages saying the hard disk is full or out of space. You suspect this is a result of a large amount of temporary Internet files. Which of the following is a way to easily delete all the temporary Internet files?

A.

Disk cleanup

B.

fdisk command

C.

chkdsk command

D.

Disk defragmentation

Full Access