Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

You are configuring an e-mail client to connect to your e-mail account. Which of following is required to set up the e-mail account?

A.

An HTTP address

B.

An FTP address

C.

ADNS server address

D.

A POP3 address

What is the distinguishing difference between a LAN and WAN?

A.

A LAN is a group of networked computers within a confined geographic area.

B.

A WAN is a group of networked computers within a confined geographic area.

C.

A LAN typically provides slower network connection speeds than a WAN.

D.

A WAN is commonly used for intra-office communication.

Security attacks can vary greatly. Which type of attack is characterized as an attempt to trick an individual into revealing confidential or private information?

A.

Trojan

B.

Spoofing

C.

Man in the middle

D.

Social engineering

Your company is investigating the possibility of moving its customer service management system to a cloud service provider. The sales rep for the cloud service provider has presented many advantages that would benefit your company. What would be a potential drawback of moving the CRM from your current in-house solution?

A.

If your company’s Internet service is interrupted for any reason at any time, you will not have access to the CRM.

B.

More company employees will have access to the system, which could result in unauthorized access to confidential data

C.

Special equipment will need to be purchased and maintained in your office in order to access and maintain the CRM once it is migrated to the hosted cloud service.

D.

Migrating the CRM to the cloud service provider will eliminate several jobs in your customer service department because their job roles will no longer be required.

Sampson has used HTML5 to create a Web page that contains image-based navigation buttons.

He would like to add text-based navigation to help ensure accessibility. Which of the following

HTML5 elements should he use?

A.

B.

C.

D.

Which choice lists the HTML5 elements that define the document structure for a Web page?

A.

,
, ,
,

B.

,
, , ,

C.

,
, ,
,

D.

,
, ,
,

SuperBank is considering a cloud service from Local Data Center, Inc., to support the bank’s expanding needs. SuperBank’s managers are concerned about security. What can SuperBank request to protect its data from security threats?

A.

For Local Data Center to run multiple hypervisors

B.

For Local Data Center to install a DDoS mitigation system

C.

For SuperBank staff to manage the servers at Local Data Center, Inc.

D.

For SuperBank to perform background checks on the staff at Local Data Center, Inc.

Marcella is looking for a very unique product online. She has found one on the XYZ Company’s Web site, which is designed well and appears to be legitimate. As she navigates through the checkout process, she reaches the checkout page with this URL, which asks her to enter her credit card information:

http://XYZ.com/gp/checkout.html/ref=chk_out_TLS12B_lb?ie=IJTFB &docld=10007931

Why should Marcella cancel her online transaction instead of proceeding?

A.

Because the site uses 128-bit encryption, which is illegal for companies that are located overseas

B.

Because the link contains abbreviations and is not completely readable, so Marcella is unsure of the server name

C.

Because the link does not use SSL/TLS encryption and therefore the information Marcella enters would not be secure

D.

Because the link uses SSL/TLS encryption, which Marcella knows is not compatible with the browser she is using

Since the advent of HTML5, which choice accurately describes a difference between a mobile app and a mobile Web site?

A.

A mobile Web site is faster because it uses the mobile phone’s default browser.

B.

A mobile app is faster because it does not necessarily use the browser.

C.

A mobile Web site cannot create an immersive experience for users.

D.

A mobile app can be used on any operating system.

Disaster recovery planning is considered a best practice for all organizations. It is even more important when cloud-computing services are used. Which of the following should be included as part of a disaster recovery plan for companies that use cloud-based services?

A.

Company organizational chart

B.

Malware and anti-virus software updates

C.

Service-level agreement with a cloud-provider

D.

Inventory of services not dependent on the cloud provider