Question
Answered step-by-step

Question 16(2 points) A Wireless Wide Area Network (WWAN) is:...

Question 16 (2 points)

 A Wireless Wide Area Network (WWAN) is:

Question 16 options:


A network that Interconnects devices in a short span, generally within a person's reach.


A network that connects smaller networks within the same city or town to form a larger network.


A network that allows users in a local area to form a network and gain access to the Internet.


A network that covers large areas such as neighboring towns and cities


Question 17 (4 points)

 A cloud data breach is more serious than an ordinary data center breach because:

Question 17 options:


There are fewer threats against cloud service providers.


A cloud data breach puts data of multiple users in the hands of attackers in a single go.


Generally less sensitive data is stored on clouds


Cloud systems inherently more secure than on premise.


Question 18 (4 points)

 You are looking to connect your traditional IT on premise infrastructure with the lowest cost cloud infrastructure service provider. Which kind of cloud should you invest in?

Question 18 options:


Public


SaaS


Private


Hybrid


Question 19 (4 points)

 Platform as a Service (PaaS) differs from Software as a Service (SaaS) in that:

Question 19 options:


In PaaS you develop and deploy your application.


You pay for the infrastructure separately in SaaS


You pay for the infrastructure separately in PaaS


in SaaS you have ready to host application containers available for you to deploy custom applications.


Question 20 (4 points)

 You notice that your on line backups are taking longer than usual. What could be the cause?

Question 20 options:


You are doing a full backup real time.


You are bandwidth constrained.


Your PC may be corrupted.


You have paused your on line backup.


Question 21 (4 points)

 Which of the following is true of Online Data Backup systems?

Question 21 options:


It is susceptible to natural disasters


Backup and restore speed is dependent on internet connection


It is hard to download and install


It does not require an online connection


Question 22 (4 points)

Which of the following are not Windows or Apple Mac OS backup software?

Question 22 options:


Windows Backup


Acronis


Time machine


Norton Home Security


Question 23 (4 points)

Every operating system and application is subject to security flaws. Consequently,

Question 23 options:


Delete your browser cache, passwords, and history


Patch early and often


Avoid updates and changes to operating systems and applications


System compromises are generally unrelated to operating system vulnerabilities


Question 24 (4 points)

You notice that Windows Update has multiple hotfixes and OS updates pending download. Why should you install them immediately?

Question 24 options:


They offer upgrades to features that you may like on Windows.


This may be the first line of defense suggestion when you call the helpdesk for a problem.


The hotfixes and patches likely contain urgent fixes to vulnerabilities which may be exploited.


The updates may improve the performance of the PC.


Question 25 (4 points)

 Automatic software updates:

Question 25 options:


Often require manual intervention for options


Should only be installed from vendor sites/systems or automated patching systems


The update process is always hidden


Can only be scheduled during evening hours


Question 26 (4 points)

 Routers play an active role in network security. What should one of the first actions when setting up a router?

Question 26 options:


They are inaccessible from the internet.


Recognizable brands are safer.


Update the software


Change the default admin password


Question 27 (4 points)

 Which of the following are TRUE about wireless networks?

Question 27 options:


Wireless networks are generally private and secure.


They are easily hacked so a strong password is highly required.


Wireless networks offer more security since the connections are generally encrypted.


Wireless networks offer more robust security than wired.


Question 28 (4 points)

 Network connections are kept safe by browsing only on secure websites. Which of the following are true?

Question 28 options:


You must use a VPN to establish secure website connections.


Lock icons in browsers indicate when websites are secure.


URLs containing http:// are always secure.


Only PC based browsers use secure websites.


Question 29 (5 points)

 Padgett Beale is looking to move their internal customer relationship database to a cloud service that requires no infrastructure on premise. Which of the following cloud models is a good fit?

Question 29 options:


A private cloud.


Public Cloud.


Virtual Private Cloud


Hybrid cloud.


Question 30 (5 points)

 Padgett-Beale's hotels provide fitness centers for guest use. These facilities are locked between 11PM and 7AM local time. Guest Services wants to allow after hours access to loyalty program members using an App on their cell phones. What type of network connection(s) could be used to access this self-service feature?

Question 30 options:


A cellular connection to the Internet could be used to access the Internet and communicate with Padgett-Beale's infrastructure to unlock the door.


A Wi-Fi connection to the hotel's local area network could be used to communicate with the Padgett-Beale infrastructure to unlock the door.


A QRC code can be transmitted from the phone to the door lock using an infrared signal.


Both cellular and Wi-Fi connections could be used to communicate with the Padgett-Beale infrastructure to unlock the door.


Question 31 (5 points)

 Padgett-Beale's central office customer relationship management servers have suffered a disk array failure. The secondary array has started the auto recovery process but is missing the entries from the past 24 hours since the last daily backups. Which of the following backups do you recover the missing CRM data?

Question 31 options:


Last good full backup.


Last good weekly backup.


Last good differential backup.


The data is lost.


Question 32 (5 points)

 A front desk manager at one of Padgett-Beale's hotels reports that one of the staff members have opened up a link from IT instructing them to patch their PC via a link. The link has downloaded an executable called "OS Update v2_1.exe". What should the manager do next?

Question 32 options:


Contact the Padgett Beale IT department via helpdesk phone line to ensure that the OS patch is legitimate.


Have the staff member patch the PC, after all updating your Operating System is a priority.


Have them reply to the email and ask to verify the patch update?


Have the staff member run antivirus scan first then instruct them to patch the PC.

Answer & Explanation
Verified Solved by verified expert

ce dui lectus, congue vel la

gue vel laoreet ac, dictum vitae odio.

a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur la

Unlock full access to Course Hero

Explore over 16 million step-by-step answers from our library

Subscribe to view answer
Step-by-step explanation

gue vel laoreet ac, dictu

ia pulvinar tortor nec facilisis. Pellentes

rem ipsum dolor sit

et, consectesus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui

gue

rem ipsum dolor sit amet,

ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipis

ongue vel laoreet a

risus antor nec facilisis. Pellentesque dapibus efficitur laore

gue

gue

risus ante, dapibus a mol

icitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit

ng elit. Nam lacinia

risus antamet

gue

gue

gue

ac, dictum vitae odio. D

trices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec

risus ante, dapibus

risus antacinia pulvinar tortor nec facilisis. Pellentes

gue

gue

gue vel laoreet ac, dictu

ce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit a

m ipsum dolor sit am

risus antlestie consequat, ultrices ac

gue

gue

onec aliquet. Lorem ipsum

cing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesqu

ac, dictum vitae odi

risus antlestie consequat, ultrices ac magna. Fusce dui lectus, congu

gue

gue

itur laoreet. Nam risus

a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel l

entesque dapibus eff

risus anta mole

gue

gue

a. Fusce dui lectus, cong

pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risu

sum dolor sit amet,

risus antec facilisis. Pellent

gue

gue

fficitur laoreet. Nam ris

tesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue ve

facilisis. Pellente

risus antec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie conseq

gue

gue

lestie consequat, ultrice

amet, consectetur adipiscing el

molestie consequat,

risus antcing elit. Nam lacinia pulvinar tortor nec fa

gue

gue

congue vel laoreet ac, d

cing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapib

amet, consectetur

ac, dictuiscing elit. Nam lacinia pulvinar

gue

gue

gue vel laoreet ac, dictu

sque dapibus efficitur laoreet. Nam risus ante, dapibus a m

ac, dictum vitae odi

ac, dictua. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio.

gue

gue

ultrices ac magna. Fusce

icitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue v

trices ac magna. Fu

risus antmolestie consequat, ultrices ac magna. Fusce dui lectus,

gue

gue

gue

gue

a. Fusce dui lectus, cong

ce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus eff

rem ipsum dolor sit

risus antFusce dui l

gue

gue

gue

itur laoreet. Nam risus a

ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipisci

e vel laoreet ac, d

urisus antrem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec

gue

gue

ongue vel laoreet ac, dic

usce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet a

o. Donec aliquet. L

risus antinia pulvinar tortor

gue

gue

itur laoreet. Nam risus a

s ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet.

ia pulvinar tortor n

risus antat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio.