What works in conjunction with a secure sockets layer (SSL) to ensure that data is transported safely? Select one: HTTPS HTTP FTP ATPS
Which of the following Ethernet enhancements increases data communication from the machine for tighter integration of onboard controls and site systems? Select the best answer a) Autonomy b) Improved Site Integration c) Data Analytics d) Advanced Operator Displays
The data link layer refers to the __ between ECUs Select the best answer. a) terminating resistors b) language being spoken c) voltage level d) type of wiring
Many viruses are disguised as security updates to trick computer users. False True
Chapter 8: Computer forensics tasks include all of the following except: presenting collected evidence in a court of law. recovering data from computers while preserving evidential integrity. collecting physical evidence on the computer. securely storing recovered electronic data. finding significant information in a large volume of electronic data.
What is the slowest type of internet connection? Select one: DSL Cellular Cable Dial Up
How does multi-factor authentication help protect you against authentication fraud?'Select the best answer. It limits access to systems and accounts based on your location. It verifies your identity using more than one method of authentication. It alerts you if you are about to enter your information on a fake login page. It provides a single-use code that expires after one session and is impossible to share with someone else.
1. Describe the main functions of an operating system. 2. Explain the difference between a clean installation and an upgrade installation of an OS. 3. List three methods for optimizing the performance of a Windows operating system.
Which components are essential for setting up a wireless network? Switch, hub, coaxial cables Modem, switch, fiber optic cables Router, modem, Ethernet cables Router, wireless access points, network adapters
Timeliness is more important than accuracy or relevance of threat information. True False
What must ethical hackers obtain before testing a system? the admin usernames and passwords legal authorization written consent from members of the pen testing organization explicit written permission
Use the __ dialog to add tables or queries. Join properties Show table Add field Query wizard
In Windows, how can the IP configuration for an Ethernet adapter be set? Either using the GUI Properties dialog or netsh commands Using netsh commands only Neither using the GUI Properties dialog nor netsh commands Using the GUI Properties dialog only
__ stores electronic files on the Internet instead of a local computer. Direct storage Digital storage Instant storage Cloud storage
If a standard user tries to perform an administrative task, they will be prompted to enter administrative credentials. Which security option is responsible for this prompting? User account control Network security Interactive login Secure desktop
Calculate the pixel size given these variables: $Matrixsize=512\times 512$ $Field-of-View(FOV)=12cm$ $Milliamperes(mA)=5$ $Kilovoltage\quad peak\quad (kVp)=78$ 0.000046 cm 0.023 cm 0.117 cm 42 cm
Computer __ is responsible for holding data and programs as they are being processed by the CPU. processor storage signals memory
What type of malware activates through a downloaded file and then can replicate on its own? Ransomware Virus Spyware Worm
What is clean computing? Multiple Choice a subset of sustainable MIS that refers to the environmentally responsible use, manufacture, and disposal of technology products and computer equipment bulit using environment friendly materials and designed to save energy a company's acknowledged responsibility to society reuses or refurbishes ewaste and creates a new product
Question 7 Unity can be used to create which of the following? Games Animations VR Applications Mobile Applications