Which VPN implementation uses routers on the edge of each site? Host-to-host VPN Always-on VPN Site-to-site VPN Remote access VPN
What is a Cisco developer program community that allows the user to learn, connect, inspire, and code and consists of coordinated developer tools and sandboxes? Cisco Learning Network IEEE Linkedln
Match the following words: Object & [Choose] Class & [Choose] Constructor & [Choose] Behavior & [Choose] &
Match the following words: Instance Method square Variable square UML square v Dot Operator square v Property or Attribute square
What is the main role of a load balancer in network security? To capture packets for intrusion detection. To act as a gateway to access certain isolated systems. To distribute network traffic across multiple servers. To act on behalf of a client when accessing resources over the internet.
Which of these items should be identified on a route map so that the design can provide (or not provide) special network access? Houses. Restaurants. Parks. Traffic lights
What is associated with each weld in a code-driven project? revision PQR symbol WPS
What is virtualization? A technology to create a fake computer to confuse hackers. A method of increasing the storage space. A way to connect multiple computers together in a network. A technology that allows multiple operating systems to run on a single computer simultaneously.
A remote sensing classification system that is used to classif unknown image data to classes which minimize the distance between the image data and the class in multi -feature space? a. Maximum Likelihood classification b. Principal components classification c. Iso cluster classification d. Minimum -Distance-to-Means Classification
A refrigerator senses that you are out of milk and places an order for more. Automation Not automation
Cybercriminals only manually test each stolen credential and avoid automation. True False
What must ethical hackers obtain before testing a system? the admin usernames and passwords legal authorization written consent from members of the pen testing organization explicit written permission
Use the __ dialog to add tables or queries. Join properties Show table Add field Query wizard
In Windows, how can the IP configuration for an Ethernet adapter be set? Either using the GUI Properties dialog or netsh commands Using netsh commands only Neither using the GUI Properties dialog nor netsh commands Using the GUI Properties dialog only
__ stores electronic files on the Internet instead of a local computer. Direct storage Digital storage Instant storage Cloud storage
If a standard user tries to perform an administrative task, they will be prompted to enter administrative credentials. Which security option is responsible for this prompting? User account control Network security Interactive login Secure desktop
Calculate the pixel size given these variables: $Matrixsize=512\times 512$ $Field-of-View(FOV)=12cm$ $Milliamperes(mA)=5$ $Kilovoltage\quad peak\quad (kVp)=78$ 0.000046 cm 0.023 cm 0.117 cm 42 cm
Computer __ is responsible for holding data and programs as they are being processed by the CPU. processor storage signals memory
What type of malware activates through a downloaded file and then can replicate on its own? Ransomware Virus Spyware Worm
What is clean computing? Multiple Choice a subset of sustainable MIS that refers to the environmentally responsible use, manufacture, and disposal of technology products and computer equipment bulit using environment friendly materials and designed to save energy a company's acknowledged responsibility to society reuses or refurbishes ewaste and creates a new product