Which term describes a compact personal computer that relies on a touch screen for input, generally uses a solid-state drive instead of a traditional hard disk, and relies on wireless or mobile networks for connectivity?
A. Tablet
B. Laptop
C. Netbook
D. Portable media player
Server-based networks typically contain centralized network resources, which are usually not available on peer-to-peer (P2P) networks. Which of the following examples describes a server based network?
A. Three network clients connecting to a file server
B. Downloading a file by using BitTorrent technology
C. Sharing one or more files to another computer via the Internet
D. A client connecting to another computer over the Internet to share music
Patrick visits his teenage daughter's social media page and discovers several offensive posts about one of her classmates. After speaking with his daughter, Patrick learns that several other girls in her class are upset with the classmate and have been posting, texting and e-mailing others about the girl. What is the best way for Patrick to help his daughter understand cyber bullying?
A. He should advise his daughter to ignore the posts, texts and c-mails.
B. He should explain to his daughter that she is participating in the bullying by accepting others'posts, texts and c-mails.
C. He should explain to his daughter that the Internet embraces freedom of speech, and anyone is allowed to write anything.
D. He should advise his daughter to delete all the posts, texts and c-mails she has received, as well as any new ones that appear.
Which type of attack is a form of social engineering in which an attacker attempts to steal personal or confidential information by sending e-mail that lures unsuspecting victims to log in to an authentic-looking but imposter Web site?
A. Replay
B. Phishing
C. Spoofing
D. Pharming
You have recently purchased a new wireless router. You would like to configure a name for your wireless network so that you can easily identify it when scanning available wireless networks.
Which term describes this wireless network device name?
A. Default gateway
B. Wireless access point (AP)
C. Access Point Identifier (API)
D. Service Set Identifier (SSID)
You want to restrict host access to a wireless access point. What is the best way to do this?
A. Enable MAC address filtering at each host.
B. Log in to the access point and configure features, such as changing the SSID.
C. Change the Direct Sequence Spread Spectrum (DSSS) signal at both the access point and each hosts NIC.
D. Install software on the host you want to limit, then use a Web browser to log in to the host and configure it with the necessary settings to use the access point.
You are distributing a large video game file using BitTorrent. First, you upload the initial file and make it available via a central server called a tracker. Other users can then connect to the tracker and download the file. Each user who downloads the file makes it available to other users to download. The use of BitTorrent significantly reduces the original provider's hardware and bandwidth resource costs. BitTorrent is an example of what type of network?
A. Centralized network
B. Client-server network
C. Peer-to-peer (P2P) network
D. Virtual private network (VPN)
Carlos is the Information Technology (IT) administrator for a small company. Over the past year, employees have been using their personal mobile devices and smartphones for business use. This has reduced costs of purchasing new devices for employees. Carlos is now considering whether he should stop supplying employees with company phones and instead require all employees to use their personal smartphones for work. How can Carlos address the most significant security vulnerability?
A. Develop a robust app to push security updates out to the various mobile OS devices
B. Create an employee policy that requires employees to keep phones updated to the latest technology
C. Create a policy that specifies acceptable use, ensuring security measures are in place for mobile devices
D. Mandate that employees switch to the company's mobile service provider to ensure security policies are enforced
Carol is experiencing read/write errors when trying to save files on her Windows-based laptop. To correct the issue, she could consider performing which of the following maintenance tasks?
A. Disk cleanup
B. fsck command
C. chkdsk command
D. Disk defragmentation
Your company is investigating the possibility of moving its customer service management system to a cloud service provider. The sales rep for the cloud service provider has presented many advantages that would benefit your company. What would be a potential drawback of moving the CRM from your current in-house solution?
A. If your company's Internet service is interrupted for any reason at any time, you will not have access to the CRM.
B. More company employees will have access to the system, which could result in unauthorized access to confidential data
C. Special equipment will need to be purchased and maintained in your office in order to access and maintain the CRM once it is migrated to the hosted cloud service.
D. Migrating the CRM to the cloud service provider will eliminate several jobs in your customer service department because their job roles will no longer be required.