Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which hacking method involves forging the from address so that replies go to an unintended audience?

A.

Packet tampering

B.

Spoofing

C.

Spyware

D.

Hoaxes

How can a unified communications system meet the communication goals of most organizations?

A.

Manages customer expectations

B.

Reduces latency between parties

C.

Generates innovative solutions

D.

Makes employees more comfortable

Which factor in the planning process is considered true, real, or certain without proof or demonstration?

A.

Project requirements

B.

Project theory

C.

Project Assumption

D.

Project objective

Which protocol provides for the collection, organization, and modification of information about managed devices on IP networks?

A.

Telnet protocol (TELNET)

B.

Hypertext Transfer Protocol (HTTP)

C.

Simple Network Management Protocol (SNMP)

D.

File Transfer Protocol (FTP)

What is the bullwhip effect?

A.

The process of stockpiling excess inventory due to incorrect product demand communication between the supplier and its partners

B.

The optimization resulting from high visibility of all areas up and down the supply chain

C.

A cultural trend that places value on an individual's ability to be a creator of things as well as a consumer of things

D.

The process by which products in a network increase in value to users as the number of users increases

A director of software development observes friction between various team members. How should the director alleviate team friction?

A.

Ask each team member to provide weekly feedback via email

B.

Create a culture of showing appreciation

C.

Nurture competition among team members

D.

Provide a public forum for anonymous feedback

What is a method for confirming users' identities?

A.

Information secrecy

B.

Public key encryption

C.

Authentication

D.

Authorization

Which type of memory describes a special type of rewritable memory that is compact and portable?

A.

Flash

B.

Random access

C.

Cache

D.

Read-only

Which three primary elements of information infrastructure support ongoing operations? Choose 3 answers.

A.

Business continuity plans

B.

Augmentation plans

C.

Authentication plans

D.

Disaster recovery plans

E.

Backup and recovery plans

Which system provides a foundation for collaboration between departments, enabling people in different business areas to communicate?

A.

Enterprise resource planning (ERP)

B.

Supply chain management (SCM)

C.

Customer relationship management (CRM)

D.

Electronic data interchange (EDI)