Exam A QUESTION 1
What should be your first step when troubleshooting a network connection that uses a cable modem?
A. Pingtheproxyserver.
B. Pingthedefaultgateway.
C. Ping local devices using their DNS names. D. Ping local devices using their IP addresses.
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 2
Which of the following is generally a component of a BYOD policy?
A. Scopeofcontrol
B. Insuranceondevices
C. Maintenance provision
D. Device replacement or upgrade
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 3
Which term describes a compact personal computer that relies on a touch screen for input, generally uses a solid-state drive instead of a traditional hard disk, and relies on wireless or mobile networks for connectivity?
A. Tablet
B. Laptop
C. Netbook
D. Portable media player
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 4
What does the following represent?
2E22:4F00:000E:00D0:A267:97FF:FE6B:FE34
A. AMACaddress
B. AnIPv4address
C. An IPv6 address
D. An IP diagnostic loopback address
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 5
A friend has called you about a possible computer problem because her computer is acting strangely. Sounds play unexpectedly, the monitor turns off suddenly, the hard-drive light flashes constantly, the computer sometimes reboots itself without warning. When you inspect your friend's system, you notice that several ports are open. Which of the following is most likely the cause of these symptoms?
A. Thecomputerhasbeeninfectedwithapolymorphicvirus. B. Thecomputerisexperiencingadenial-of-serviceattack. C. The computer has been infected with an illicit server.
D. The computer has been infected by a worm.
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 6
The Windows Device Manager is a tool that enables you to perform a variety of tasks, including:
A. Maptoaprinter.
B. PinganIPaddress.
C. Defragment a hard drive.
D. Change a resource assignment.
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 7
Which type of attack involves the installation of malicious code on personal computers or servers that redirects Internet traffic from a legitimate Web site to an identical-looking but malicious imposter Web site?
A. Pharming B. Spoofing C. Phishing D. Replay
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 8
The capabilities of cellular networks have improved greatly since their original development for analog voice phone calls. Most recently, fourth-generation (4G) wireless supports a variety of data-intensive needs.
A benefit of 4G networks is that they:
A. Usespread-spectrumtechnologytoensurehightransmissionrates.
B. ProvidefasttransmissionratesequivalenttoDSLorbroadband-cable.
C. Provide fast transmission rates equivalent to high-speed dial-up connections.
D. Enable bandwidth throttling, allowing the user access to unrestricted download speeds.
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 9
Selena has run out of memory on her phone's SD card. She has decided to store the files she has accumulated on a third-party cloud service provider's drives. Which of the following is a typical issue that she may encounter?
A. Thefilesbecomecorruptedduetoanattackfromahackerbotnet.
B. ThefilesbecomeunavailablewheneverInternetconnectivityislost.
C. The files become unavailable because they are being shared with other users.
D. The files become corrupted because the provider uses a proprietary compression algorithm during transit.
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 10
Which of the following computer system maintenance tasks can help improve file access performance?
A. Use a SCSI drive instead of a SA T A drive
B. Use a SA T A drive instead of an EIDE drive
C. Defragment the drive using the following command: fdisk -d -w c:/
D. Defragment the drive using the following command: defrag c: -w
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 11
Which of the following is a security threat commonly associated with cloud-based services?
A. Malware B. Phishing
C. Hypervisor vulnerabilities
D. Operating system vulnerabilities
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 12
Sam is a professor at a small college. Due to a scheduling conflict, he was unable to obtain access to the computer lab to give the final exam. As an alternative, he asked students to bring their own devices (BYOD) and connect to the college's Wi-Fi for network access. What security risk is associated with this implementation?
A. Inabilityforstudentstosharefiles
B. Inabilityforstudentstobackupuserfiles
C. Student devices sending unsecured data
D. Student devices being more susceptible to malware
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 13
What is the biggest security concern with wireless networks?
A. Firewallsoftwareisnotavailableforaccesspoints.
B. Wirelessencryptionalgorithmsmustbeimplemented.
C. Wireless networks do not support intrusion detection.
D. Wireless networks do not support encryption via an access point.
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 14
Gwen works for a small company where she has been asked to find a cost-effective option for providing comprehensive customer service. The finance, technical support, sales and customer service departments all need to share information about their customers. Gwen is considering adoption of a customer relationship management (CRM) application. Which of the following would be the most cost-effective solution?
A. Shecanpurchaseanewserver,thencreateandmaintaintheCRMin-house.
B. Shecanoutsourceallcustomerservicesothecompanycanfocusonproductdevelopment.
C. She can contract with a cloud service provider to host the CRM that her company's employees can access.
D. She can hire a programmer to develop and maintain the CRM specific to her company's needs, then have a service provider host the application.
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 15
Sally is a network technician at Acme Corporation. She has been directed to configure the network adapter for a company laptop so that it can be used to connect to the company network and the Internet. What is one of the required TCP/IP settings that she will need to configure?
A. MACaddress
B. Defaultgateway C. Workstation name D. Loopback address
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 16
Which term describes the practice of actively collecting wireless networking data from companies and individuals?
A. W ar driving
B. Spearphishing
C. Dictionaryattack
D. Social engineering
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 17
Jose is experiencing performance problems with his notebook computer that he purchased a year ago. Upon discussing this issue with him, you learn that he has never deleted any temporary files since owning the device. What can Jose do to fix this problem most efficiently?
A. Reformathisharddrive.
B. UsetheWindowschkdskutility.
C. Use the Windows Disk Cleanup utility.
D. Back up his computer and delete the active partition.
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 18
Which of the following is a drawback to using Wired Equivalent Privacy (WEP)?
A. Wirelessnetworkoverheadisexcessive.
B. Symmetric-keyencryptionissusceptibletocracking.
C. The number of devices that can communicate using WEP is limited.
D. Encryption and decryption speeds are slower compared to other protocols.
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 19
When using cloud-based services to host company data, a company's disaster recovery plan should include strategies for:
A. Creatingredundancyandensuringthereisanexclusivecontractwiththecloudserviceprovider. B. Distributingdataandsoftwareservicesacrossmultiplecloudserviceproviders.
C. Creating redundancy and using multiple cloud service providers.
D. Using a single well-established cloud service provider.
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 20
Which of the following statement about virtualization is true?
A. Virtualizationenablesmultiplephysicalcomputerstorunoffofasinglevirtualizedserver.
B. Invirtualization,yourunmultiplevirtualmachines,providedtheyallusethesameoperatingsystem.
C. In virtualization, the operating systems of the virtual machines should match the host operating system. D. Virtualization enables you to run multiple operating systems and applications on a single computer.
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 21
When a PC computer device wants to communicate with the processor, which system resource does it use?
A. I/O B. DMA C. PIO
D. IRQ
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 22
Server-based networks typically contain centralized network resources, which are usually not available on peer-to-peer (P2P) networks. Which of the following examples describes a server based network?
A. Threenetworkclientsconnectingtoafileserver
B. DownloadingafilebyusingBitTorrenttechnology
C. Sharing one or more files to another computer via the Internet
D. A client connecting to another computer over the Internet to share music
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 23
On your Windows laptop, you store all your vacation photos and your entire digital music library. Concerned about data loss, you perform frequent backups. Your laptop has recently been stolen and you need to restore your files to a desktop computer. Which Windows tool would you use to recover and set up the saved copies of your files onto your desktop computer?
A. BackupandRestore B. BackupRecovery C. System Recovery D. System Restore
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 24
Acme Corp. is a small manufacturing company. To reduce IT infrastructure costs, it uses cloud- based services extensively and strives to have the least amount of IT equipment onsite. Last year, Acme suffered a failure that resulted in significant down time and data loss. Management has decided to implement a continuous data protection (CDP) solution. Which type of CDP solution best fits Acme's situation?
A. Cloud-onlysolution
B. Localsystemssolution
C. Distributed network services provider D. Contracted network services provider
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 25
You have just been hired by a large company, and the IT manager is giving you an overview of the corporate network. He tells you that the corporation is spread out over several cities, and various departments are divided into subnetworks that are connected using routers. What type of network are you being shown?
A. Localareanetwork(LAN)
B. Wide area network (W AN)
C. Virtual private network (VPN)
D. Internet Exchange Point (IPX)
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 26
Patrick visits his teenage daughter's social media page and discovers several offensive posts about one of her classmates. After speaking with his daughter, Patrick learns that several other girls in her class are upset with the classmate and have been posting, texting and e-mailing others about the girl. What is the best way for Patrick to help his daughter understand cyber bullying?
A. Heshouldadvisehisdaughtertoignoretheposts,textsandc-mails.
B. Heshouldexplaintohisdaughterthatsheisparticipatinginthebullyingbyacceptingothers'posts,texts and c-mails.
C. He should explain to his daughter that the Internet embraces freedom of speech, and anyone is allowed to write anything.
D. He should advise his daughter to delete all the posts, texts and c-mails she has received, as well as any new ones that appear.
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 27
Which of the following is a disadvantage of implementing a Bring Your Own Device (BYOD) policy in a company?
A. Increasedcostforlicensingmobileapplications
B. Configuringthecorporatee-mailservertoworkwithmobiledevices
C. Inability to control access to company data if the device is stolen or lost
D. Providing training for employees on how to use mobile devices with company applications
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 28
Selena has decided to change a 32-character unique wireless network name on her wireless router to improve network security after a break-in. She is following advice from CERT to make this change in order to avoid attacks from botnets. Which of the following settings would she modify?
A. DirectSequenceSpreadSpectrum(DSSS)signal B. MediaAccessControl(MAC)address
C. Wi-Fi Protected Access 2 (WPA2)
D. Service Set Identifier (SSID)
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 29
Configuring a wireless network involves several steps. Which of the following is a task that should be performed to configure and connect to a wireless network?
A. Configureacertificateauthorityandconfigurethetrustsettings.
B. ConfigurethewirelessAP'sSSID,encryptionlevelandsharedkey.
C. Connect your computer to the same network hub as the wireless AP. D. Connect your computer to the same network switch as the wireless AP.
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 30
Henry is the network manager at XYY Corporation, a large manufacturing company that competes in the global market. The company's computing environment is extremely complex and includes several proprietary software systems, all of which require custom configuration of network devices to operate correctly. The company's executive management team believes that they can benefit by switching the company over to any cloud-based service. Henry disagrees.
What is a disadvantage of cloud-based services that Henry can cite to support his position?
A. Cloud-basedservicesprovidenomaintenanceorsupport.
B. Cloud-basedservicesaretypicallymorecostlythanin-housesolutions.
C. The company must typically purchase additional servers to support connections to these types of cloud- based service providers.
D. Cloud-based services are typically more limited in offerings and configurations than the company currently supports in-house.
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 31
Three hardware devices need to communicate with the CPU simultaneously. Which of the following will each device need to issue?
A. DMA request
B. CONrequest
C. Interrupt request (IRQ) D. Input/output request (I/O)
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 32
What is the distinguishing difference between a LAN and WAN?
A. ALANisagroupofnetworkedcomputerswithinaconfinedgeographicarea. B. AWANisagroupofnetworkedcomputerswithinaconfinedgeographicarea. C. A LAN typically provides slower network connection speeds than a WAN.
D. A WAN is commonly used for intra-office communication.
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 33
ABC Company develops its own database applications. ABC is considering migrating to cloud services to accommodate the company's growth. What strategy should ABC use to ensure continuous data protection if it begins using cloud services?
A. Cloud-onlysolution
B. Regionalsystemssolution
C. Location systems solution
D. Multiple cloud-service providers
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 34
You are a computer technician supporting a small 15-computer Internet lab. The computers are regularly used to browse the Internet and download files. Users have recently complained that they receive error messages saying the hard disk is full or out of space. You suspect this is a result of a large amount of temporary Internet files. Which of the following is a way to easily delete all the temporary Internet files?
A. Disk cleanup
B. fdisk command
C. chkdsk command
D. Disk defragmentation
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 35
When comparing IPv4 to IPv6, which of the following is an advantage of the IPv6 network addressing scheme?
A. Largeraddressspace
B. Shorteraddressspace
C. High dependence on network routers
D. Fast and unencrypted network transmissions
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 36
Which security issue is most closely associated with wireless networks?
A. Spoofing
B. Wardriving
C. Eavesdropping
D. Man-in-the-middle
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 37
Which type of attack is a form of social engineering in which an attacker attempts to steal personal or confidential information by sending e-mail that lures unsuspecting victims to log in to an authentic-looking but imposter Web site?
A. Replay B. Phishing C. Spoofing D. Pharming
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 38
To restore a backup file on a Windows-based computer, you:
A. UsetheDiskManagementutilityintheMicrosoftManagementConsole(MMC). B. UsetheBackupandRestoreutilityintheControlPanel.
C. Use Device Manager in the Control Panel. D. Extract the backed-up file.
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 39
You have recently purchased a new wireless router. You would like to configure a name for your wireless network so that you can easily identify it when scanning available wireless networks.
Which term describes this wireless network device name?
A. Defaultgateway
B. Wirelessaccesspoint(AP) C. Access Point Identifier (API) D. Service Set Identifier (SSID)
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 40
You want to enable wireless security on your Android device and your Linux system. Which of the following is a disadvantage of Wired Equivalent Privacy (WEP)?
A. ItenablesMACaddressfiltering.
B. Itiseasilycompromisedbyhackers.
C. It only supports 56-bit symmetric-key encryption.
D. It is based on the outdated 802.lla wireless standard.
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 41
You want to restrict host access to a wireless access point. What is the best way to do this?
A. EnableMACaddressfilteringateachhost.
B. Logintotheaccesspointandconfigurefeatures,suchaschangingtheSSID.
C. Change the Direct Sequence Spread Spectrum (DSSS) signal at both the access point and each hosts NIC.
D. Install software on the host you want to limit, then use a Web browser to log in to the host and configure
it with the necessary settings to use the access point.
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 42
Disaster recovery planning is considered a best practice for all organizations. It is even more important when cloud-computing services are used. Which of the following should be included as part of a disaster recovery plan for companies that use cloud-based services?
A. Companyorganizationalchart
B. Malwareandanti-virussoftwareupdates
C. Service-level agreement with a cloud-provider
D. Inventory of services not dependent on the cloud provider
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 43
Lisa is traveling on company business. She has a company-issued smartphone with 4G access. Her hotel does not provide Internet access. What advantage does 4G provide to help her access the Internet?
A. Shecanusea4GmobilehotspotdevicewithherphonetoconnectherlaptoptoWi-Fi.
B. Shecanusethe4GphonetoestablishaVPNconnectionintothecompanynetwork.
C. She can use the41G phone to call and locate a public location that provides free Wi-Fl.
D. She can use her41G phone's GPS to identify another hotel that provides in-room Internet access.
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 44
You are distributing a large video game file using BitTorrent. First, you upload the initial file and make it available via a central server called a tracker. Other users can then connect to the tracker and download the file. Each user who downloads the file makes it available to other users to download. The use of BitTorrent significantly reduces the original provider's hardware and bandwidth resource costs. BitTorrent is an example of what type of network?
A. Centralizednetwork
B. Client-servernetwork
C. Peer-to-peer (P2P) network D. Virtual private network (VPN)
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 45
John is the network administrator for a small company. The company's network equipment has become outdated, and John has been asked to recommend a plan to update the company's infrastructure. John has read extensively about the many advantages of using cloud-based services. Which of the following is an advantage of cloud-based services that John could cite to support his recommendation?
A. Unlimitedserviceoptionsandchoices
B. Highersecurityinacloud-basedenvironment
C. Elimination of need for high-speed Internet connection D. Elimination of equipment purchase and maintenance
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 46
Security attacks can vary greatly. Which type of attack is characterized as an attempt to trick an individual into revealing confidential or private information?
A. Trojan
B. Spoofing
C. Man in the middle D. Social engineering
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 47
You are a small-business owner and would like to encourage employees to bring their own devices (BYOD) to work. Which of the following can help reduce the security risks associated with a BYOD implementation?
A. Expenseaccounts
B. Acceptableusepolicy
C. End user license agreement D. In-house device maintenance
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 48
Jenny recently switched from broadband cable Internet to ADSL service with her local phone company.
To economize, she chose the self-installation option. It appears that her ADSL modem is not allowing her to connect to the Internet. Which setting should she check first?
A. Loopback address B. Softwareversion C. Default gateway
D. Device name
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 49
Mobile computing has become a common necessity for both personal and business transactions. Which device has features similar to a smartphone but usually does not have telephone capabilities?
A. Portablemediaplayer B. Netbook
C. Laptop
D. Tablet
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 50
Wireless networks are subject to more security issues than standard wired networks. Which wireless security protocol can prevent unauthorized devices from connecting to the wireless network?
A. WPA2 B. RSA C. AES D. DES
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 51
Cloud-computing enables mobile devices to provide users with access to a wide variety of applications and services. Which of the following is a disadvantage of mobile devices?
A. MobiledevicescannotaccommodateWebbrowsing.
B. Mobiledevicescannoteasilybeusedforcheckinge-mail.
C. Mobile devices cannot access software hosted on remote servers.
D. Mobile devices cannot accommodate large database installations or applications.
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 52
Consider the network configuration shown in the command prompt:
What does the Default Gateway identify?
A. Thefileserveronthenetwork B. Thelocalhostonthenetwork C. The computer on the network D. The router on the network
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 53
Ron has an older computer to which he frequently downloads and saves company files. He recently noticed that he was running low on disk space and decided to delete many old files that he no longer needed. He now notices that it takes a long time to open or save documents to his hard drive. Which maintenance task can help?
A. Disk defragmentation B. chkdsk command
C. fdisk command
D. Disk cleanup
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 54
SuperBank is considering a cloud service from Local Data Center, Inc., to support the bank's expanding needs. SuperBank's managers are concerned about security. What can SuperBank request to protect its data from security threats?
A. ForLocalDataCentertorunmultiplehypervisors
B. ForLocalDataCentertoinstallaDDoSmitigationsystem
C. For SuperBank staff to manage the servers at Local Data Center, Inc.
D. For SuperBank to perform background checks on the staff at Local Data Center, Inc.
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 55
Carlos is the Information Technology (IT) administrator for a small company. Over the past year, employees have been using their personal mobile devices and smartphones for business use. This has reduced costs of purchasing new devices for employees. Carlos is now considering whether he should stop supplying employees with company phones and instead require all employees to use their personal smartphones for work. How can Carlos address the most significant security vulnerability?
A. DeveloparobustapptopushsecurityupdatesouttothevariousmobileOSdevices
B. Createanemployeepolicythatrequiresemployeestokeepphonesupdatedtothelatesttechnology
C. Create a policy that specifies acceptable use, ensuring security measures are in place for mobile devices
D. Mandate that employees switch to the company's mobile service provider to ensure security policies are enforced
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 56
Carol is experiencing read/write errors when trying to save files on her Windows-based laptop. To correct the issue, she could consider performing which of the following maintenance tasks?
A. Disk cleanup
B. fsck command
C. chkdsk command
D. Disk defragmentation
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 57
Virtualization software transforms the hardware resources of a physical computer to create a fully functional virtual computer that can run its own operating systems and applications. In addition to the CPU and RAM, which hardware resources are used by virtualization software?
A. HarddiskandUSBdevices
B. Harddiskandnetworkdevices
C. Virtual hard disk and network devices
D. Network devices and secondary storage devices
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 58
Your company is investigating the possibility of moving its customer service management system to a cloud service provider. The sales rep for the cloud service provider has presented many advantages that would benefit your company. What would be a potential drawback of moving the CRM from your current in-house solution?
A. Ifyourcompany'sInternetserviceisinterruptedforanyreasonatanytime,youwillnothaveaccessto the CRM.
B. Morecompanyemployeeswillhaveaccesstothesystem,whichcouldresultinunauthorizedaccessto confidential data
C. Special equipment will need to be purchased and maintained in your office in order to access and maintain the CRM once it is migrated to the hosted cloud service.
D. Migrating the CRM to the cloud service provider will eliminate several jobs in your customer service department because their job roles will no longer be required.
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
Explanation:
QUESTION 59
The Internet has enabled many new anti-social activities, such as online stalking, cyberbullying, and addiction to solitary online activities. Which choice is the most feasible way for schools and parents to reduce cyberbullying?
A. Monitor,trackandrecordallonlineactivityconductedbystudents.
B. Teachteensthattheuseofonlinecommunicationisafreedomofexpression.
C. Prevent students from accessing the Internet while at school so that they learn good habits. D. Educate students about cyber-ethics and the consequences of questionable online behavior.
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Explanation:
Network Technology Associate CIW Questions + Answers
-
- Site Admin
- Posts: 899603
- Joined: Mon Aug 02, 2021 8:13 am