Joseph works as a Network Administrator for WebTech Inc. He has to set up a centralized area on the network so that each employee can share resources and documents with one another. Which of the following will he configure to accomplish the task?
Answer : C
Which of the following protocols uses a combination of public key and symmetric encryption to provide communication privacy, authentication, and message integrity for secure browsing on the Internet?
Answer : B
Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer?
Each correct answer represents a complete solution. Choose two.
Answer : B, C
Which of the following heights of fence deters only casual trespassers?
Answer : A
Which of the following is the practice of a domain name registrant using the five-day "grace period" (the Add Grace Period or AGP) at the beginning of the registration of an ICANN-regulated second-level domain to test the marketability of the domain?
Answer : B
Which of the following are symptoms of a virus attack on your computer?
Each correct answer represents a complete solution. Choose two.
Answer : A, B
Which of the following malware spread through the Internet and caused a large DoS attack in
1988?
Answer : A