Digital signatures verify the integrity of the data, verify the identity of the sender, and:
A. Provide data confidentiality.
B. Enforce non-repudiation.
C. Sign digital certificate requests.
D. Create certificate requests.
When a PC computer device wants to communicate with the processor, which system resource does it use?
A. I/O
B. DMA
C. PIO
D. IRQ
When using cloud-based services to host company data, a company's disaster recovery plan should include strategies for:
A. creating redundancy and ensuring there is an exclusive contract with the cloud service provider.
B. distributing data and software services across multiple cloud service providers.
C. creating redundancy and using multiple cloud service providers.
D. using a single well-established cloud service provider.
Raoul has received a file attachment from a known individual. He has no reason to expect files from this individual. Which of the following is an effective security strategy for Raoul to take?
A. Open the file attachment and use anti-virus software to scan it.
B. Before opening the attachment, use anti-virus software to scan the system's hard disk.
C. Make back-up copies of important files so that it is possible to recover them in case of an incident.
D. Before opening the attachment, call or send a text or instant message to the individual to verify that he or she meant to send it.
You are a small-business owner and would like to encourage employees to bring their own devices (BYOD) to work. Which of the following can help reduce the security risks associated with a BYOD implementation?
A. Expense accounts
B. Acceptable use policy
C. End user license agreement
D. In-house device maintenance
Marsha has been hired by XYZ, Inc., to update the company Web site. Marsha discovers that the existing Web pages were structured using tables. Marsha needs to explain to XYZ why the Web site needs to be recoded in HTML5 with CSS controlling the structure of the document. What is the most important reason for using HTML5 and CSS?
A. The updates will increase user traffic to the site.
B. The updates will improve the overall look and feel of the Web site.
C. The Web site can be interpreted by any HTML5-compliant browser, including mobile devices.
D. The Web site will rank higher in many search engines results, as long as the search engine bot recognizes the code.
You want to restrict host access to a wireless access point.
What is the best way to do this?
A. Enable MAC address filtering at each host.
B. Log in to the access point and configure features, such as changing the SSID.
C. Change the Direct Sequence Spread Spectrum (DSSS) signal at both the access point and each hosts NIC.
D. Install software on the host you want to limit, then use a Web browser to log in to the host and configure it with the necessary settings to use the access point.
ABC Company develops its Own database applications. ABC is considering migrating to cloud services to accommodate the company's growth. What strategy should ABC use to ensure continuous data protection if it begins using cloud services?
A. Cloud-only solution
B. Regional systems solution
C. Location systems solution
D. Multiple cloud-service providers
Emelia and Lola have created a new software application that allows messaging site subscribers to analyze the message statistics in order to more easily assess and interact with followers. They have decided to license this software according to the GNU GPL Version 3. What does this license allow them to do with their software?
A. They can only sell this software through a not-for-profit company.
B. They can sell this software, but only if they make the software code available on a public server.
C. The software enters the public domain for free use and can be altered by other programmers, who must then make their changes freely available as well.
D. The software enters the public domain for free use, but any changes made in the future can be kept secret, allowing them to profitably sell the modified software.
Your customer scheduled a meeting to discuss a project you are managing. Early testing indicates that there are currently quality problems with some of the more complex features. The customer stated that quality and budget are his two main concerns: The project must be developed within budget and must be very high quality. When you asked the customer if he would be willing to extend the deadline to meet his objectives, he stated this was not possible. What adjustment to the project triangle components can you suggest to meet your customer's needs?
A. Suggest that the scope be limited to include only the most important features.
B. Inform the customer that he must compromise one of the three elements of a project triangle: quality, budget or schedule.
C. Suggest that the customer hire temporary contractors.
D. Suggest that the customer use a Gantt chart to add time to the project.