The concept of COV is a process where device B notifies device A that data has changed by an amount deemed to be significant and it is now time for that data to be transferred from device B to device A. A) True B) False
When a vendor chooses BACnet for a new system design, they must choose only one network type for the entire system. A) True B) False
ABBB will include a collection of one or more services and is useful in the specification of a BACnet compliant system. A) True B) False
This is one or more statements that are always executed after the try block has executed and after any catch blocks have executed if an exception was thrown. try block finally block protected block catch block
You are tasked with setting up a virtualization environment for a team of developers who need to test applications on their existing desktop computers. The developers require the ability to run multiple operating systems simultaneously without replacing their current OS. Which type of hypervisor would be the most appropriate for this scenario? Type1 (Bare Metal Hypervisor) Type 2 (Host-based Hypervisor) Container virtualization Virtual Desktop Infrastructure (VDI)
A cloud administrator configures a cloud instance to increase its resources during times of high utilization and decrease its resources when peak utilization times end. What cloud characteristic does this represent? Scalability HA Metered utilization Rapid elasticity
Which type of malware disguises itself as an interesting, useful, or desirable program in order to gain access to your system? A zombie B virus C worm D Trojan horse
What does URL stand for? Uniform Resource Language Understand Resource Language Uniform Resource Locator Ultimate Resource Locator
Choose the correct answer. Each portion of a PowerPoint presentation is an individual __ page slide clip frame
Which key advantages do containers have over virtual machines? (Select two.) Smaller size and may only require a few megabytes Portability between hypervisor environments Hardware optimization Faster start times for containerized applications The ability to.run legacy software on an updated operating system
Question 3 If the $IPV4CIDR$ address is $73.0.5.0/17$ how many bits are reserved for the host address? 17 32 16 15
Task 2 Incident Handling Plan Create an incident handling plan for the selected attack from the top 100 B $\square $ Space used(includes formatting): 0/30000
Matching 2 points Match the definition on the left to the correct term on the right: A(n) __ disappointed is a program that translates programs to a simpler language that the computer can execute. The __ is a program that supervises operation of the entire computer. $\square $ memory operating system processor algorithm The __ is the part of a computer that follows instructions.
Which statements correctly describe the role of big cata in unsupervised, supervisec or reinforcement machine learning? Select all that apply. A. Allows the AI to identify meaningful patterns. B. Increases the Al motlel Accuracy with predictions. Determines the Al's tone and personality. a Improves the AI's decision -making over time. E. Reduces the At's need for complex alzorithms
1 . Identify List five different technologies or types of hardware that are used today in communications.
Which image type is made up of pixels and is best suited for detailed images like photographs? A Bitmap B Vector C Path D Shape
Click to add title How can you add a frame to a picture in Word? A. type "frame" B. Double click the picture, then the "frame"menu appears C. Drag the picture into the frame options window D. none of the above
To convert an image stored by a geometric formula to pixels A Vector B Bitmap C Rasterize D Smart Object
13 of 51 Determining the type and specifics of contamination is performed during the __ phase. after-attack recovery during-attack pre-attack
Which color mode is used primarily for digital displays? A RGB B CMYK C Grayscale D Indexed Color