How do delivery companies track packages? A. They use a learning management system B. They use code scanning technology C. They use GPS D They use robotic arms to load packages
Computer can execute the code in __ None of these high-level language assembly language machine language
What makes spear phishing different from other email phishing schemes? Select all that apply,and then select Submit. There is extra effort to trick the recipient into believing the email is from a credible source. It targets a specific person or organization. It has no effect on the institution that the scammer is impersonating. The emails may contain personal information about the recipient that were collected from other sources.
When a TCP session begins, what is the name of the first segment that is transferred? a. ACK b. SYN c. RST d. FIN
¿Cuál de las siguientes pestañas le permite insertar imágenes en una diapositiva? A Home Tab B Insert Tab C Design Tab D View Tab
En PowerPoint, ¿cuál de las siguientes opciones proporciona coherencia en el diseño mediante gráficos de fondo, colores y configuraciones de fuente? A Temas (Themes) B Variantes (Variants) C ) Miniaturas (Thumbnails) D vistas (Views)
Which of the following attack signature is not an example of tautology type SQL Injection? or 1=1- and 1=1- or 1gt 0- none of the above
In which method used in cryptanalysis does the attacker know a portion of the plaintext and the corresponding ciphertext? meet-in-the-middle chosen-plaintext ciphertext brute-force
What are three actions that can be performed by Snort in IDS mode? (Choose three.) Log Drop Alert Reject Sdrop Pass
Which intrusion prevention service was available on first-generation ISR routers and is no longer supported by Cisco? Cisco IOS IPS Cisco Firepower Next-Generation Cisco Snort IPS External Snort IPS Server
Cybercriminals only manually test each stolen credential and avoid automation. True False
What must ethical hackers obtain before testing a system? the admin usernames and passwords legal authorization written consent from members of the pen testing organization explicit written permission
Use the __ dialog to add tables or queries. Join properties Show table Add field Query wizard
In Windows, how can the IP configuration for an Ethernet adapter be set? Either using the GUI Properties dialog or netsh commands Using netsh commands only Neither using the GUI Properties dialog nor netsh commands Using the GUI Properties dialog only
__ stores electronic files on the Internet instead of a local computer. Direct storage Digital storage Instant storage Cloud storage
If a standard user tries to perform an administrative task, they will be prompted to enter administrative credentials. Which security option is responsible for this prompting? User account control Network security Interactive login Secure desktop
Calculate the pixel size given these variables: $Matrixsize=512\times 512$ $Field-of-View(FOV)=12cm$ $Milliamperes(mA)=5$ $Kilovoltage\quad peak\quad (kVp)=78$ 0.000046 cm 0.023 cm 0.117 cm 42 cm
Computer __ is responsible for holding data and programs as they are being processed by the CPU. processor storage signals memory
What type of malware activates through a downloaded file and then can replicate on its own? Ransomware Virus Spyware Worm
What is clean computing? Multiple Choice a subset of sustainable MIS that refers to the environmentally responsible use, manufacture, and disposal of technology products and computer equipment bulit using environment friendly materials and designed to save energy a company's acknowledged responsibility to society reuses or refurbishes ewaste and creates a new product