Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

The Internet has enabled many new anti-social activities, such as online stalking, cyberbullying, and addiction to solitary online activities. Which choice is the most feasible way for schools and parents to reduce cyberbullying?

A.

Monitor, track and record all online activity conducted by students.

B.

Teach teens that the use of online communication is a freedom of expression.

C.

Prevent students from accessing the Internet while at school so that they learn good habits.

D.

Educate students about cyber-ethics and the consequences of questionable online behavior.

Patrick visits his teenage daughter’s social media page and discovers several offensive posts about one of her classmates. After speaking with his daughter, Patrick learns that several other girls in her class are upset with the classmate and have been posting, texting and e-mailing others about the girl. What is the best way for Patrick to help his daughter understand cyber bullying?

A.

He should advise his daughter to ignore the posts, texts and c-mails.

B.

He should explain to his daughter that she is participating in the bullying by accepting others’posts, texts and c-mails.

C.

He should explain to his daughter that the Internet embraces freedom of speech, and anyone is allowed to write anything.

D.

He should advise his daughter to delete all the posts, texts and c-mails she has received, as well as any new ones that appear.

Which of the following is generally a component of a BYOD policy?

A.

Scope of control

B.

Insurance on devices

C.

Maintenance provision

D.

Device replacement or upgrade

Lisa is traveling on company business. She has a company-issued smartphone with 4G access. Her hotel does not provide Internet access. What advantage does 4G provide to help her access the Internet?

A.

She can use a 4G mobile hotspot device with her phone to connect her laptop to Wi-Fi.

B.

She can use the 4G phone to establish a VPN connection into the company network.

C.

She can use the41G phone to call and locate a public location that provides free Wi-Fl.

D.

She can use her41G phone’s GPS to identify another hotel that provides in-room Internet access.

Which type of attack is a form of social engineering in which an attacker attempts to steal personal or confidential information by sending e-mail that lures unsuspecting victims to log in to an authentic-looking but imposter Web site?

A.

Replay

B.

Phishing

C.

Spoofing

D.

Pharming

What is the biggest security concern with wireless networks?

A.

Firewall software is not available for access points.

B.

Wireless encryption algorithms must be implemented.

C.

Wireless networks do not support intrusion detection.

D.

Wireless networks do not support encryption via an access point.

You are a computer technician supporting a small 15-computer Internet lab. The computers are regularly used to browse the Internet and download files. Users have recently complained that they receive error messages saying the hard disk is full or out of space. You suspect this is a result of a large amount of temporary Internet files. Which of the following is a way to easily delete all the temporary Internet files?

A.

Disk cleanup

B.

fdisk command

C.

chkdsk command

D.

Disk defragmentation