Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following best protects data in transit?

A.

Backup tapes

B.

Encrypted flash drive

C.

VPN connection

D.

FTP

Which of the following are the basic computing operations?

A.

Input, process, output, and feedback

B.

Input, output, storage, and feedback

C.

Input, process, and output

D.

Input, process, output, and storage

Which of the following is the largest storage capacity?

A.

1PB

B.

100TB

C.

9,000GB

D.

9,900MB

Which of the following is the best reason to implement a software token instead of a hardware token?

A.

A software token can be set to a permanent number that never changes.

B.

A software token can be encrypted.

C.

A software token is more cost efficient than a hardware token.

D.

A software token cannot be lost.

A user works at a health insurance company. Which of the following is the best method for ensuring a customer's personal information is kept confidential when it needs to be shared with another authorized employee?

A.

Sending it as an encrypted email to the other employee

B.

Putting it in a shared drive on the company's network

C.

Printing it out and giving it to the employee

D.

Putting it on the company's cloud document site

Which of the following creates multifactor authentication when used with something you have?

A.

Single sign-on

B.

Hardware token

C.

Geolocation

D.

Password

Which of the following data types is used to implement a simple counter application?

A.

Boolean

B.

Integer

C.

String

D.

Floating point

A flatbed scanner that is connected to a laptop is used to convert photographic prints to digital images for reproduction on a color printer. Which of the following is considered the input device for this process?

A.

Laptop hard drive

B.

Laptop keyboard

C.

Photographic prints

D.

Flatbed scanner

E.

Color printer

Which of the following BEST explains the use of float over integer to store monetary values?

A.

It accepts negative values.

B.

It stores symbols

C.

It accommodates larger values.

D.

It supports decimals.

A technician has verified full system functionality. Which of the following actions should the technician take next?

A.

Question the users.

B.

Determine if anything has changed.

C.

Document the findings.

D.

Gather Information.