A cloud administrator configures a cloud instance to increase its resources during times of high utilization and decrease its resources when peak utilization times end. What cloud characteristic does this represent? Scalability HA Metered utilization Rapid elasticity
Which type of malware disguises itself as an interesting, useful, or desirable program in order to gain access to your system? A zombie B virus C worm D Trojan horse
What does URL stand for? Uniform Resource Language Understand Resource Language Uniform Resource Locator Ultimate Resource Locator
Choose the correct answer. Each portion of a PowerPoint presentation is an individual __ page slide clip frame
Which key advantages do containers have over virtual machines? (Select two.) Smaller size and may only require a few megabytes Portability between hypervisor environments Hardware optimization Faster start times for containerized applications The ability to.run legacy software on an updated operating system
Which application had a file extension of .dmg? Windows Mac Neither one
Select the correct answer. What is the main function of the arithmetic logic unit (ALU)? communicating with the input devices sending the output to the monitor performing arithmetic and logical operations controlling the flow of information between hardware components
The first step in troubleshooting a system is: Select one: A. Understanding the system operational sequence. B. Recognizing what component is operating incorrectly. C. Replacing defective components. D. Testing to isolate the cause.
1 of 20 Which of the following is a Java call- back method invoked when a view is clicked? onTab OnTapListener onClick OnClickl _istener
Ian Waterman relies on closed-loop control when he moves with visual feedback. True False
A system administrator reviews network access permissions granted to several devices and revokes their certificates. What log would reflect these changes? A. Public Key Infrastructure (PKI) B. Certificate Revocation Lists (CRL) C. Trusted Platform Module (TPM) D. Hardware Security Module (HSM)
Which data type would be best for a username field? a. Long text b. Hyperlink c. AutoNumber d. Short text
4. Word can provide help in a variety of ways. If you search for a term in Search box on the top line of the Word screen, which of the following options might be included on the drop-down menu? Select all that apply. 1 point Get Help Actions A full contents list of the Help pages
Question 13 of 15:What level of system and network configuration is required for CUI? (Select the best answer) Moderate confidentiality Advanced confidentiality Basic confidentiality Enhanced confidentiality
Which change is designed to close a security vulneability without affecting other components of an application? a. Patch b. Upgrade c. Rollback d. Installation
What is a loop in programming? A conditional statement A block of code that is executed repeatedly A function definition A data structure
Address Verification System, is a way to increase credit card security. Answers A True B False
Which of the following are common data types in programming? String Boolean Integer All of the above
eventing Unsafe Conditions Elements for correcting unsafe conditions: #1 H3 $\square $ $\square $ Recognize Eliminate or Control Evaluate
22. Our Internal database will be protected by: Closing the program when not in use Daily Back -up Storing the program in the Administrator's home Not applicable