How much data does a byte consist of? two bits of data four bits of data six bits of data eight bits of data
DirectAccess uses HTTPS to authenticate remote access users, and IPSec to create an encrypted tunnel for network traffic between the remote access client and server. a. True b. False
2. Compare and contrast HTTP and HTTPS. Make sure you include items such as security levels and speed.
Jim wants to identify weaknesses and monitor information security progress.What type of scan should he use? a. vulnerability scan b. automated scan c. virus scan d. security scan
Which artifacts are object artifacts? Select al that apply. Scratches Backscatter Ghost images Histogram errors Pixel malfunction Collimation errors
Phishing,spear phishing,vishing and smishing are all examples of: Ransomware Social Engineering Attacks Malicious Software Anti-virus programs
The client/server network strategy can handle very large networks efficiently. false true
To keep your data safe while working on a public workstation you should do the following things: (Select all that apply) Disable autofill Clear history when you are finished Look for the "s"in the web address bar Verify there is a padlock in the web address bar
3. Harmful computer program requiring a host that accesses your computer without your permission. Virus Electronic Mail Cookie Worm
What does HTTP stand for? Select one: Hypertext Transfer Protocol Hyper Texting Teenager Pro Higher Transfer of Text Procedure Higher Transfer of Text Professionals
What must ethical hackers obtain before testing a system? the admin usernames and passwords legal authorization written consent from members of the pen testing organization explicit written permission
Use the __ dialog to add tables or queries. Join properties Show table Add field Query wizard
In Windows, how can the IP configuration for an Ethernet adapter be set? Either using the GUI Properties dialog or netsh commands Using netsh commands only Neither using the GUI Properties dialog nor netsh commands Using the GUI Properties dialog only
__ stores electronic files on the Internet instead of a local computer. Direct storage Digital storage Instant storage Cloud storage
If a standard user tries to perform an administrative task, they will be prompted to enter administrative credentials. Which security option is responsible for this prompting? User account control Network security Interactive login Secure desktop
Calculate the pixel size given these variables: $Matrixsize=512\times 512$ $Field-of-View(FOV)=12cm$ $Milliamperes(mA)=5$ $Kilovoltage\quad peak\quad (kVp)=78$ 0.000046 cm 0.023 cm 0.117 cm 42 cm
Computer __ is responsible for holding data and programs as they are being processed by the CPU. processor storage signals memory
What type of malware activates through a downloaded file and then can replicate on its own? Ransomware Virus Spyware Worm
What is clean computing? Multiple Choice a subset of sustainable MIS that refers to the environmentally responsible use, manufacture, and disposal of technology products and computer equipment bulit using environment friendly materials and designed to save energy a company's acknowledged responsibility to society reuses or refurbishes ewaste and creates a new product
Question 7 Unity can be used to create which of the following? Games Animations VR Applications Mobile Applications