Which of the following are the three primary network categories? Multiple Choice LAN, WAN, SAN LAN, SAN, XAN LAN, WAN, MAN LAN, WAN, XAN
cache Clear my choice After you have purchased a new computer, what type of program should you install to keep your data from being compromised? Select one: Antivirus Anticookies Cache clearing Hardware protection
__ is the keyboard shortcut to create a new presentation in PowerPoint. Win+N Alt+N Ctrl+N
Which of the following is a good rule to follow when installing access control equipment? anticipate needs by putting yourself in an intruder's position take the advice of security experts and then increase what they recommend trust your instincts and remember the value of common sense always follow the equipment manufacturer's guidelines
A Push-pull button works the same as a double-acting pushbutton. True False
1. Which type of imaging system records images directly onto a computer screen? Select one: a. a. Xeroradiography b. a. Digital imaging C. a. Panoramic d. a. All of the above
Why did Watson test four different algorithms for this AI model? To determine which set of algorithms predicted defaults most effectively To identify those algorithms that triggered the confusion matrix To compare four different versions of the data set for accuracy To remove the least effective model from the data set
Q6: How should a USB drive be formatted for use in SPS Programming on vehicles with RPO IVD and IVE? A. FAT32 B. exFAT C. NTFS D. HFS Plus
What is the relationship between a public key and a private key in public key cryptography? They are unrelated and serve different purposes. They are the same key with different names. They are mathematically related and used for encryption and decryption. The private key is derived from the public key.
What type of loop checks a Boolean expression at the "top" of the loop before the body has a chance to execute? do repeat switch while Question 14 The expressions in each part of an AND or OR expression are evaluated only as much as necessary to determine whether the entire expression is true or false. What type of evaluation is this? while stopwatch short-circuit loop 1 pts
2. You have problem with your c omputer The Aloric za End User Suppo rt person assisting you asks for your password.problem Give it to them but chang e it once your computer is fixed. Refuse and instead ask them to provide your User Security PIN Question it but provide the basswor d tô them anyway. Give it t them they're in IT so they'r authorized.
3. What are the four most common types of cyber attacks launched against K-12 school districts? See pages $3-11$ then identify each one and briefly describe it. __ 1. 2. 3 __ . Go to the incident map located at this website: https://www.h (12six.org/map. Find 3 incidents on the map located near your school or at least in your state and briefly __ ours MART CYBERTHREATS STUDENT WORKBOOK
What is Al bias? When an Al tool makes an incorrect or problematic decision due to flawed training data. When an Al works faster on some computers than on others. When an Alls biased against other Al programs. When an Al has a favorite color.
Adding a field to a blank form places __ control(s) in a stacked layout. two three four only one
Which step in the Cyber Attack Cycle involves delivering the malware to the target? Delivery Reconnaissance Exploitation Malicious Actions
Which of the following is true regarding a heap? Select all that apply It is typically implemented using an array There is a relationship between a node's value and the values of its children There is no relationship between a node's value and the values of its children It is a complete binary tree
Which of the following BEST describes the purpose of Locator Apps and Remote Wipe features on mobile devices? To locate a lost or stolen device and remotely erase sensitive data. To monitor app usage and restrict access to specific applications or mobile devices. To enforce password policies and ensure compliance with organizational security standards. To enhance the speed and performance of mobile devices by clearing unnecessary data.
What creates a trusted infrastructure for issuing and managing digita lidentities? CSR Firewall CA VPN
Which of these is not an advantage of star topology? Easy to add or remove devices Easy to troubleshoot Scalable If central hub fails , the network fails In which topology does a signal travel the entire network even if the recipient is found early? Ring Mesh Bus Star
When troubleshooting an app that frequently crashes on an Android device, you decide to clear the app cache. What is the primary purpose of clearing the app cache in this scenario? To permanently delete the app's data, including user settings and login information. To disable the app temporarily, preventing it from consuming system resources. To uninstall and reinstal the app to ensure compatibility with the operating system. To remove temporary files that may be causing the app to malfunction.