Multiple Choice 2 points Which of the following is a negative consequence associated with malware infections? loss of data identity theft time spent removing the infection all of the above
A group of eight bits is called a __ kilobit byte pixel binary
What is a characteristic of deep learning that traditional machine learning does not have? it uses decision trees for classification It relies specifically on neural networks It only uses small datasets It is exclusively used for image recognition
What is a function of a proxy firewall? uses signatures to detect patterns in network traffic connects to remote servers on behalf of clients filters IP traffic between bridged interfaces drops or forwards traffic based on packet header information
Multiple Choice Question A collection of computers that are connected in a small geographic area such as an office, college campus, or in your home is called a __ LAN MAN PAN CAN
Select the person whose job is performing the role of a software project manager. Valerie maintains documentation related to product testing and software training of personnel. Felipe is responsible for keeping software development projects on time and on budget. Ellen writes computer code using a programming language. Colin develops and evaluates the results of tests for different aspects of the software.
To apply a header in Word, select the __ tab. A Review B Insert C Home
When should a user consider restoring the operating system? A When programs or apps do not start properly B When the monitor does not display anything C When you cannot print documents D When you can't connect to the Internet
What type of hard drive has no moving parts, making it fast and durable? A magnetic hard drive B solid state drive C DVD D tape drive
What is typically configured when you turn on a mobile device for the first time? App store access Email settings Phone number and text messaging Security settings
What is the intersection of a row and column in a table called? placeholder cell data points axis
Once a variable gets a value, you cannot change its value. True C False
True or False? The first step in active reconnaissance is the gathering of information about software in use by the target. True False
Of the options below, what is the most important consideration when designing a high-availability network? (pick two) A. Ease of recovery B. Ability to patch C. Attack surface D. Physical isolation E. Extensible authentication F. Responsiveness
¿Qué escenario o situación impediria que un usuario actualice el sistema operativo en un dispositivo Android? No se instalaron los parches correctos. Los derechos de autor del software no se obtuvieron antes de la instalación. El hardware no cumple con las especificaciones. No se obtuvo el permiso del fabricante.
You need to deploy a new web application firewall, and you're comparing different solutions according to what kinds of rules they can process, how many requests they can handle per second how much they affect website response time , and how much training it takes for administrators to design and apply rules. What kind of metrics are not currently included in your comparison? Choose all that apply. Usability Latency Capability Maintainability Scalability
There are three network levels. True False
¿Cuáles el Objetivo Personal SMART S1 que usted se propuso? Escribe tu respuesta aqui
When you start to $type=AV,$ what feature displays a list of functions and defined names? A. Function ScreenTip B. Insert Function dialog box C. Function Arguments dialog box D. Formula AutoComplete
Identify the correct statement. An array is passed to a method by passing a reference to the array A method cannot modify the elements of an array argument An array is converted to another data type and passed to a method An array is passed to a method by passing the array's values