The capabilities of cellular networks have improved greatly since their original development for analog voice phone calls. Most recently, fourth-generation (4G) wireless supports a variety of data-intensive needs.
A benefit of 4G networks is that they:
A. Use spread-spectrum technology to ensure high transmission rates.
B. Provide fast transmission rates equivalent to DSL or broadband-cable.
C. Provide fast transmission rates equivalent to high-speed dial-up connections.
D. Enable bandwidth throttling, allowing the user access to unrestricted download speeds.
Which of the following computer system maintenance tasks can help improve file access performance?
A. Use a SCSI drive instead of a SATA drive
B. Use a SATA drive instead of an EIDE drive
C. Defragment the drive using the following command: fdisk -d -w c:/
D. Defragment the drive using the following command: defrag c: -w
Which of the following is a security threat commonly associated with cloud-based services?
A. Malware
B. Phishing
C. Hypervisor vulnerabilities
D. Operating system vulnerabilities
Gwen works for a small company where she has been asked to find a cost-effective option for providing comprehensive customer service. The finance, technical support, sales and customer service departments all need to share information about their customers. Gwen is considering adoption of a customer relationship management (CRM) application. Which of the following would be the most cost-effective solution?
A. She can purchase a new server, then create and maintain the CRM in-house.
B. She can outsource all customer service so the company can focus on product development.
C. She can contract with a cloud service provider to host the CRM that her company's employees can access.
D. She can hire a programmer to develop and maintain the CRM specific to her company's needs, then have a service provider host the application.
Configuring a wireless network involves several steps. Which of the following is a task that should be performed to configure and connect to a wireless network?
A. Configure a certificate authority and configure the trust settings.
B. Configure the wireless AP's SSID, encryption level and shared key.
C. Connect your computer to the same network hub as the wireless AP.
D. Connect your computer to the same network switch as the wireless AP.
ABC Company develops its own database applications. ABC is considering migrating to cloud services to accommodate the company's growth. What strategy should ABC use to ensure continuous data protection if it begins using cloud services?
A. Cloud-only solution
B. Regional systems solution
C. Location systems solution
D. Multiple cloud-service providers
Wireless networks are subject to more security issues than standard wired networks. Which wireless security protocol can prevent unauthorized devices from connecting to the wireless network?
A. WPA2
B. RSA
C. AES
D. DES
Carlos is the Information Technology (IT) administrator for a small company. Over the past year, employees have been using their personal mobile devices and smartphones for business use. This has reduced costs of purchasing new devices for employees. Carlos is now considering whether he should stop supplying employees with company phones and instead require all employees to use their personal smartphones for work. How can Carlos address the most significant security vulnerability?
A. Develop a robust app to push security updates out to the various mobile OS devices
B. Create an employee policy that requires employees to keep phones updated to the latest technology
C. Create a policy that specifies acceptable use, ensuring security measures are in place for mobile devices
D. Mandate that employees switch to the company's mobile service provider to ensure security policies are enforced
Your company is investigating the possibility of moving its customer service management system to a cloud service provider. The sales rep for the cloud service provider has presented many advantages that would benefit your company. What would be a potential drawback of moving the CRM from your current in-house solution?
A. If your company's Internet service is interrupted for any reason at any time, you will not have access to the CRM.
B. More company employees will have access to the system, which could result in unauthorized access to confidential data
C. Special equipment will need to be purchased and maintained in your office in order to access and maintain the CRM once it is migrated to the hosted cloud service.
D. Migrating the CRM to the cloud service provider will eliminate several jobs in your customer service department because their job roles will no longer be required.
The Internet has enabled many new anti-social activities, such as online stalking, cyberbullying, and addiction to solitary online activities. Which choice is the most feasible way for schools and parents to reduce cyberbullying?
A. Monitor, track and record all online activity conducted by students.
B. Teach teens that the use of online communication is a freedom of expression.
C. Prevent students from accessing the Internet while at school so that they learn good habits.
D. Educate students about cyber-ethics and the consequences of questionable online behavior.