Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Karen is the Webmaster for her company. Management would like to make the company’s intra net site more effective by providing links to internal HR forms for all employees to access. These forms are currently stored on the company s file server and are updated quarterly. For security reasons, the Web server does not allow linking to the company s file server. How should Karen create these links?

A.

Upload the forms to the Web server and create local relative links to the files.

B.

Upload the forms to the Web server and create local absolute links to the files.

C.

Upload the forms to the Web server and create external relative links to the files.

D.

Upload the forms to the Web server and create external absolute links to the files.

Carol is experiencing read/write errors when trying to save files on her Windows-based laptop. To correct the issue, she could consider performing which of the following maintenance tasks?

A.

Disk cleanup

B.

fsck command

C.

chkdsk command

D.

Disk defragmentation

Wireless networks are subject to more security issues than standard wired networks. Which wireless security protocol can prevent unauthorized devices from connecting to the wireless network?

A.

WPA2

B.

RSA

C.

AES

D.

DES

Three hardware devices need to communicate with the CPU simultaneously. Which of the following will each device need to issue?

A.

DMA request

B.

CON request

C.

Interrupt request (IRQ)

D.

Input/output request (I/O)

John is the network administrator for a small company. The company’s network equipment has become outdated, and John has been asked to recommend a plan to update the company’s infrastructure. John has read extensively about the many advantages of using cloud-based services. Which of the following is an advantage of cloud-based services that John could cite to support his recommendation?

A.

Unlimited service options and choices

B.

Higher security in a cloud-based environment

C.

Elimination of need for high-speed Internet connection

D.

Elimination of equipment purchase and maintenance

Web developers typically include comments in their code for which reason?

A.

To insert server-side programs, such as JavaScript

B.

To communicate performance issues to site visitors

C.

To explain the purpose of code sections to other developers

D.

To declare which version of HTML each part of the code is using

Which <1mg> tag attribute is required in order for HTML5 documents to validate without error?

A.

id

B.

alt

C.

name

D.

title

Carlos is the Information Technology (iT) administrator for a small company. Over the past year, employees have been using their personal mobile devices and smart phones for business use. This has reduced costs of purchasing new devices for employees. Carlos is now considering whether he should stop supplying employees with company phones and instead require all employees to use their personal smart phones for work. How can Carlos address the most significant security vu inerrability?

A.

Develop a robust app to push security updates out to the various mobile OS devices

B.

Create an employee policy that requires employees to keep phones updated to the latest technology

C.

Create a policy that specifies acceptable use, ensuring security measures are in place for mobile devices

D.

Mandate that employees switch to the company’s mobile service provider to ensure security policies are enforced

You received an e-mail message on which several other individuals were copied. You want to respond to this message in a way that will include everyone who was copied on the original message. You can accomplish this by using which action?

A.

Reply

B.

Reply All

C.

Forward

D.

Send

You want to restrict host access to a wireless access point.

What is the best way to do this?

A.

Enable MAC address filtering at each host.

B.

Log in to the access point and configure features, such as changing the SSID.

C.

Change the Direct Sequence Spread Spectrum (DSSS) signal at both the access point and each hosts NIC.

D.

Install software on the host you want to limit, then use a Web browser to log in to the host and configure it with the necessary settings to use the access point.