Question 16(2 points) A Wireless Wide Area Network (WWAN) is:...
Question 16 (2 points)
A Wireless Wide Area Network (WWAN) is:
Question 16 options:
A network that Interconnects devices in a short span, generally within a person's reach.
A network that connects smaller networks within the same city or town to form a larger network.
A network that allows users in a local area to form a network and gain access to the Internet.
A network that covers large areas such as neighboring towns and cities
Question 17 (4 points)
A cloud data breach is more serious than an ordinary data center breach because:
Question 17 options:
There are fewer threats against cloud service providers.
A cloud data breach puts data of multiple users in the hands of attackers in a single go.
Generally less sensitive data is stored on clouds
Cloud systems inherently more secure than on premise.
Question 18 (4 points)
You are looking to connect your traditional IT on premise infrastructure with the lowest cost cloud infrastructure service provider. Which kind of cloud should you invest in?
Question 18 options:
Public
SaaS
Private
Hybrid
Question 19 (4 points)
Platform as a Service (PaaS) differs from Software as a Service (SaaS) in that:
Question 19 options:
In PaaS you develop and deploy your application.
You pay for the infrastructure separately in SaaS
You pay for the infrastructure separately in PaaS
in SaaS you have ready to host application containers available for you to deploy custom applications.
Question 20 (4 points)
You notice that your on line backups are taking longer than usual. What could be the cause?
Question 20 options:
You are doing a full backup real time.
You are bandwidth constrained.
Your PC may be corrupted.
You have paused your on line backup.
Question 21 (4 points)
Which of the following is true of Online Data Backup systems?
Question 21 options:
It is susceptible to natural disasters
Backup and restore speed is dependent on internet connection
It is hard to download and install
It does not require an online connection
Question 22 (4 points)
Which of the following are not Windows or Apple Mac OS backup software?
Question 22 options:
Windows Backup
Acronis
Time machine
Norton Home Security
Question 23 (4 points)
Every operating system and application is subject to security flaws. Consequently,
Question 23 options:
Delete your browser cache, passwords, and history
Patch early and often
Avoid updates and changes to operating systems and applications
System compromises are generally unrelated to operating system vulnerabilities
Question 24 (4 points)
You notice that Windows Update has multiple hotfixes and OS updates pending download. Why should you install them immediately?
Question 24 options:
They offer upgrades to features that you may like on Windows.
This may be the first line of defense suggestion when you call the helpdesk for a problem.
The hotfixes and patches likely contain urgent fixes to vulnerabilities which may be exploited.
The updates may improve the performance of the PC.
Question 25 (4 points)
Automatic software updates:
Question 25 options:
Often require manual intervention for options
Should only be installed from vendor sites/systems or automated patching systems
The update process is always hidden
Can only be scheduled during evening hours
Question 26 (4 points)
Routers play an active role in network security. What should one of the first actions when setting up a router?
Question 26 options:
They are inaccessible from the internet.
Recognizable brands are safer.
Update the software
Change the default admin password
Question 27 (4 points)
Which of the following are TRUE about wireless networks?
Question 27 options:
Wireless networks are generally private and secure.
They are easily hacked so a strong password is highly required.
Wireless networks offer more security since the connections are generally encrypted.
Wireless networks offer more robust security than wired.
Question 28 (4 points)
Network connections are kept safe by browsing only on secure websites. Which of the following are true?
Question 28 options:
You must use a VPN to establish secure website connections.
Lock icons in browsers indicate when websites are secure.
URLs containing http:// are always secure.
Only PC based browsers use secure websites.
Question 29 (5 points)
Padgett Beale is looking to move their internal customer relationship database to a cloud service that requires no infrastructure on premise. Which of the following cloud models is a good fit?
Question 29 options:
A private cloud.
Public Cloud.
Virtual Private Cloud
Hybrid cloud.
Question 30 (5 points)
Padgett-Beale's hotels provide fitness centers for guest use. These facilities are locked between 11PM and 7AM local time. Guest Services wants to allow after hours access to loyalty program members using an App on their cell phones. What type of network connection(s) could be used to access this self-service feature?
Question 30 options:
A cellular connection to the Internet could be used to access the Internet and communicate with Padgett-Beale's infrastructure to unlock the door.
A Wi-Fi connection to the hotel's local area network could be used to communicate with the Padgett-Beale infrastructure to unlock the door.
A QRC code can be transmitted from the phone to the door lock using an infrared signal.
Both cellular and Wi-Fi connections could be used to communicate with the Padgett-Beale infrastructure to unlock the door.
Question 31 (5 points)
Padgett-Beale's central office customer relationship management servers have suffered a disk array failure. The secondary array has started the auto recovery process but is missing the entries from the past 24 hours since the last daily backups. Which of the following backups do you recover the missing CRM data?
Question 31 options:
Last good full backup.
Last good weekly backup.
Last good differential backup.
The data is lost.
Question 32 (5 points)
A front desk manager at one of Padgett-Beale's hotels reports that one of the staff members have opened up a link from IT instructing them to patch their PC via a link. The link has downloaded an executable called "OS Update v2_1.exe". What should the manager do next?
Question 32 options:
Contact the Padgett Beale IT department via helpdesk phone line to ensure that the OS patch is legitimate.
Have the staff member patch the PC, after all updating your Operating System is a priority.
Have them reply to the email and ask to verify the patch update?
Have the staff member run antivirus scan first then instruct them to patch the PC.
ce dui lectus, congue vel la
gue vel laoreet ac, dictum vitae odio.
a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laUnlock full access to Course Hero
Explore over 16 million step-by-step answers from our library
Subscribe to view answergue vel laoreet ac, dictu
ia pulvinar tortor nec facilisis. Pellentes
rem ipsum dolor sit
et, consectesus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui
gue
rem ipsum dolor sit amet,
ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipis
ongue vel laoreet a
risus antor nec facilisis. Pellentesque dapibus efficitur laore
gue
gue
risus ante, dapibus a mol
icitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit
ng elit. Nam lacinia
risus antamet
gue
gue
gue
ac, dictum vitae odio. D
trices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec
risus ante, dapibus
risus antacinia pulvinar tortor nec facilisis. Pellentes
gue
gue
gue vel laoreet ac, dictu
ce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit a
m ipsum dolor sit am
risus antlestie consequat, ultrices ac
gue
gue
onec aliquet. Lorem ipsum
cing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesqu
ac, dictum vitae odi
risus antlestie consequat, ultrices ac magna. Fusce dui lectus, congu
gue
gue
itur laoreet. Nam risus
a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel l
entesque dapibus eff
risus anta mole
gue
gue
a. Fusce dui lectus, cong
pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risu
sum dolor sit amet,
risus antec facilisis. Pellent
gue
gue
fficitur laoreet. Nam ris
tesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue ve
facilisis. Pellente
risus antec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie conseq
gue
gue
lestie consequat, ultrice
amet, consectetur adipiscing el
molestie consequat,
risus antcing elit. Nam lacinia pulvinar tortor nec fa
gue
gue
congue vel laoreet ac, d
cing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapib
amet, consectetur
ac, dictuiscing elit. Nam lacinia pulvinar
gue
gue
gue vel laoreet ac, dictu
sque dapibus efficitur laoreet. Nam risus ante, dapibus a m
ac, dictum vitae odi
ac, dictua. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio.
gue
gue
ultrices ac magna. Fusce
icitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue v
trices ac magna. Fu
risus antmolestie consequat, ultrices ac magna. Fusce dui lectus,
gue
gue
gue
gue
a. Fusce dui lectus, cong
ce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus eff
rem ipsum dolor sit
risus antFusce dui l
gue
gue
gue
itur laoreet. Nam risus a
ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipisci
e vel laoreet ac, d
urisus antrem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec
gue
gue
ongue vel laoreet ac, dic
usce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet a
o. Donec aliquet. L
risus antinia pulvinar tortor
gue
gue
itur laoreet. Nam risus a
s ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet.
ia pulvinar tortor n
risus antat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio.