Gwen works for a small company where she has been asked to find a cost-effective option for providing comprehensive customer service. The finance, technical support, sales and customer service departments all need to share information about their customers. Gwen is considering adoption of a customer relationship management (CRM) application. Which of the following would be the most cost-effective solution?
SuperBank is considering a cloud service from Local Data Center, Inc., to support the bank’s expanding needs. SuperBank’s managers are concerned about security. What can SuperBank request to protect its data from security threats?
You have recently purchased a new wireless router. You would like to configure a name for your wireless network so that you can easily identify it when scanning available wireless networks.
Which term describes this wireless network device name?
When comparing IPv4 to IPv6, which of the following is an advantage of the IPv6 network addressing scheme?
Three hardware devices need to communicate with the CPU simultaneously. Which of the following will each device need to issue?
ABC Company develops its own database applications. ABC is considering migrating to cloud services to accommodate the company’s growth. What strategy should ABC use to ensure continuous data protection if it begins using cloud services?
Virtualization software transforms the hardware resources of a physical computer to create a fully functional virtual computer that can run its own operating systems and applications. In addition to the CPU and RAM, which hardware resources are used by virtualization software?
Security attacks can vary greatly. Which type of attack is characterized as an attempt to trick an individual into revealing confidential or private information?
Selena has decided to change a 32-character unique wireless network name on her wireless router to improve network security after a break-in. She is following advice from CERT to make this change in order to avoid attacks from botnets. Which of the following settings would she modify?
Disaster recovery planning is considered a best practice for all organizations. It is even more important when cloud-computing services are used. Which of the following should be included as part of a disaster recovery plan for companies that use cloud-based services?