What software acts as the computer's software administrator by managing integrating, and controlling application software and hardware? Answer a. Operating system b. Anti-malware c. Utility d. Electronic health record e. Telecommunication
Pretexting involves hacking into a system through technical vulnerabilities. True False
Data mining can discover patterns and insights, such as association rules, that are not evident in raw data. True False
Which of the following is the characteristic of a vector image shape? A The image shape has a convex near field. B All of the scan lines originate from a common point of origin. C The image shape is rectangular. D The image shape has a flat top and sloped sides.
eventing Unsafe Conditions Elements for correcting unsafe conditions: #1 H3 square square Recognize Eliminate or Control Evaluate
25. Doctor's Smart Phone Patient information will be protected by: Automatically Office Manager Reception Team Each worker
22. Our Internal database will be protected by: Closing the program when not in use Daily Back -up Storing the program in the Administrator's home Not applicable
What is a loop in programming? A conditional statement A block of code that is executed repeatedly A function definition A data structure
Which of the following are common data types in programming? String Boolean Integer All of the above
1. Choose the best answer. Which of these is a specific kind of digital file stream used for storing and categorizing data? codec compression SSD none of these
If Karen scrolls through the various color themes.decides on one and clicks on it, what happens to her presentation? All the presentations slides change to match the color theme. A new presentation slide opens with the new color theme. The first slide changes to those colors. The presentation layout changes for all the slides.
A network technician needs to ensure the company's external mail server can pass reverse lookup checks. Which of the following records would the technician MOST likely configure? SPF PTR CNAME AAAA
Another method to open the Tabs dialog is to __ a tab stop on the ruler. delete click double-click right-click
An environmental advocacy group uses cyber weapons to put companies at risk and promote its agenda. This scenario illustrates what type of threat actor? A. Insider threats B. Advanced persistent threats C. Hacktivists D. Hackers
The measure of the ability of an image intensifier to increase the brightness level of the image is referred to as which of the following? Minification gain Brightness gain Amplification Automatic gain
Which of the following are topics covered in the A Digitally Editable World section of the article? Check All That Apply nanotechnology CRISPR digital triplets disease immunity
A company needs a redundant link to provide a channel to the management network in an incident response scenario. Which of the following remote access methods provides the BEST solution? Virtual network computing Remote desktop gateways Out-of-band access Split-tunnel connections
4. Word can provide help in a variety of ways. If you search for a term in Search box on the top line of the Word screen, which of the following options might be included on the drop-down menu? Select all that apply. 1 point Get Help Actions A full contents list of the Help pages
Question 13 of 15:What level of system and network configuration is required for CUI? (Select the best answer) Moderate confidentiality Advanced confidentiality Basic confidentiality Enhanced confidentiality
Which change is designed to close a security vulneability without affecting other components of an application? a. Patch b. Upgrade c. Rollback d. Installation