Which of the following statement about virtualization is true?
Answer : D
Security attacks can vary greatly. Which type of attack is characterized as an attempt to trick an individual into revealing confidential or private information?
Answer : D
When a PC computer device wants to communicate with the processor, which system resource does it use?
Answer : D
Selena has decided to change a 32-character unique wireless network name on her wireless router to improve network security after a break-in. She is following advice from CERT to make this change in order to avoid attacks from botnets. Which of the following settings would she modify?
Answer : D
John is the network administrator for a small company. The company's network equipment has become outdated, and John has been asked to recommend a plan to update the company's infrastructure. John has read extensively about the many advantages of using cloud-based services. Which of the following is an advantage of cloud-based services that John could cite to support his recommendation?
Answer : D
Sam is a professor at a small college. Due to a scheduling conflict, he was unable to obtain access to the computer lab to give the final exam. As an alternative, he asked students to bring their own devices (BYOD) and connect to the college's Wi-Fi for network access. What security risk is associated with this implementation?
Answer : C
When using cloud-based services to host company data, a company's disaster recovery plan should include strategies for:
Answer : C