Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Gwen works for a small company where she has been asked to find a cost-effective option for providing comprehensive customer service. The finance, technical support, sales and customer service departments all need to share information about their customers. Gwen is considering adoption of a customer relationship management (CRM) application. Which of the following would be the most cost-effective solution?

A.

She can purchase a new server, then create and maintain the CRM in-house.

B.

She can outsource all customer service so the company can focus on product development.

C.

She can contract with a cloud service provider to host the CRM that her company’s employees can access.

D.

She can hire a programmer to develop and maintain the CRM specific to her company’s needs, then have a service provider host the application.

SuperBank is considering a cloud service from Local Data Center, Inc., to support the bank’s expanding needs. SuperBank’s managers are concerned about security. What can SuperBank request to protect its data from security threats?

A.

For Local Data Center to run multiple hypervisors

B.

For Local Data Center to install a DDoS mitigation system

C.

For SuperBank staff to manage the servers at Local Data Center, Inc.

D.

For SuperBank to perform background checks on the staff at Local Data Center, Inc.

You have recently purchased a new wireless router. You would like to configure a name for your wireless network so that you can easily identify it when scanning available wireless networks.

Which term describes this wireless network device name?

A.

Default gateway

B.

Wireless access point (AP)

C.

Access Point Identifier (API)

D.

Service Set Identifier (SSID)

When comparing IPv4 to IPv6, which of the following is an advantage of the IPv6 network addressing scheme?

A.

Larger address space

B.

Shorter address space

C.

High dependence on network routers

D.

Fast and unencrypted network transmissions

Three hardware devices need to communicate with the CPU simultaneously. Which of the following will each device need to issue?

A.

DMA request

B.

CON request

C.

Interrupt request (IRQ)

D.

Input/output request (I/O)

ABC Company develops its own database applications. ABC is considering migrating to cloud services to accommodate the company’s growth. What strategy should ABC use to ensure continuous data protection if it begins using cloud services?

A.

Cloud-only solution

B.

Regional systems solution

C.

Location systems solution

D.

Multiple cloud-service providers

Virtualization software transforms the hardware resources of a physical computer to create a fully functional virtual computer that can run its own operating systems and applications. In addition to the CPU and RAM, which hardware resources are used by virtualization software?

A.

Hard disk and USB devices

B.

Hard disk and network devices

C.

Virtual hard disk and network devices

D.

Network devices and secondary storage devices

Security attacks can vary greatly. Which type of attack is characterized as an attempt to trick an individual into revealing confidential or private information?

A.

Trojan

B.

Spoofing

C.

Man in the middle

D.

Social engineering

Selena has decided to change a 32-character unique wireless network name on her wireless router to improve network security after a break-in. She is following advice from CERT to make this change in order to avoid attacks from botnets. Which of the following settings would she modify?

A.

Direct Sequence Spread Spectrum (DSSS) signal

B.

Media Access Control (MAC) address

C.

Wi-Fi Protected Access 2 (WPA2)

D.

Service Set Identifier (SSID)

Disaster recovery planning is considered a best practice for all organizations. It is even more important when cloud-computing services are used. Which of the following should be included as part of a disaster recovery plan for companies that use cloud-based services?

A.

Company organizational chart

B.

Malware and anti-virus software updates

C.

Service-level agreement with a cloud-provider

D.

Inventory of services not dependent on the cloud provider