This is used to help non-technical users collectively classify and find information on a site.
WHAT IS TAGGING?
Strategies will help protect your computer against virus attacks.
A. Perform regular backups of your hard drive.
B. Open email attachments only from unknown senders.
C. Update the definitions for your malware protection application frequently.
D. Configure security settings for your Web browser to the lowest possible level.
A Security Barrier that prevents unauthorized access
FIREWALL
As a project manager, you have to balance three elements that compose the project triangle. Suppose your customer requests that you add some new requirements to the project when you are halfway through. If you agree to this request, how would it affect other aspects of the project?
A. Project scope will decrease.
B. Cost of the project will increase.
C. Cost of the project will decrease.
D. Time to complete project will be reduced.
What is PDF?
You are configuring an email client to connect to your email account.
A. An HTTP address
B. A POP3 address
C. A DNS server address
D. A FTP address
The term or password-protected, encrypted data file that can be used to authenticate a program.
What is Digital Certificate?
Proprietary information for your company’s online business was released to a competitor. Which of the following preventative measures should your company take to ensure that its proprietary information is protected in the future?
A. Restrict Internet access
B. Uninstall any email clients
C. Monitor employees’ messages
D. Destroy all proprietary information
A paradigm shift has occured in the way the small businesses use software applications. Companies increasingly choose hosted solutions with a monthly subscription fee instead of purchasing software. This business model is referred to as.....
Crowdsourcing
Scalability
Software as a Service
Grid Computing
The best way to conducting keyword searches
A. Use few words as possible
B. Use verbs instead of nouns for keywords.
C. Use nouns instead of verbs for keywords
D. Type "the" in front of the noun or verb
Because the spam was uninvited, it can be considered as......
An invasion of privacy
When using secure authentication, which of the following are required?
A. A user name and password
B. A user name, a password and encryption of transmitted data
C. Neither user name nor a password
D. A user name onlya
You opened an email attachment and it launches a virus. It takes control of your system. What should you do?
Turn off your computer and reboot from a know, clean system disk.
Marcella is looking for a very unique product online. She has found one on the XYZ Company’s Web site, which is designed well and appears to be legitimate.
As she navigates through the checkout process, she reaches the checkout page with a URL, which asks her to enter her credit card.
A. Because the site uses 128bit encryption, which is illegal for companies that are located overseas
B. Because the link contains abbreviations and is not completely readable, so Marcella is unsure of the server name
C. Because the link does not use SSL/TLS encryption and therefore the information Marcella enters would not be secure
D. Because the link uses SSL/TLS encryption, which Marcella knows is not compatible with the browser she is using
A major update with significant software improvements is often marketed as a new....
What is RELEASE?
The AppADay company offers software applications for various topics. When a customer purchases a desired application from the AppADay online store, he is directed to a page where he can download the application directly. When the customer is redirected and begins downloading the application, which specific standard protocol is most likely transferring the application?
A. HTTP
B. HTTPS
C. FTP
D. SMTP
To reduce the costs of maintaining servers with FTP access; your company is using P2P to facilitate sharing of information. Which strategy should your company use to protect the company's sensitive information while captializing on the benefits of P2P power?
a. Restrict employees from using their computers in P2P communications
b. Use technologies that will control access & password-protect files
c. Restrict P2P use to sharing only with universities and research organizations.
Selena needs to send a message to her manager providing all the details of a business proposal. The idea they have discussed is critical to the business. The project is considered urgent and confidential.
Selena should..............?
A. To send a useful summary of the proposal to her manager so that the manager has it available during a presentation
B. To alert her manager that she has sent the proposal via email so her manager can view the proposal as soon as possible
C. To provide a detailed outline of the proposal so that her manager can refer to it as he travels
D. To send the proposal as an attachment to the text message
The term for a word, slogan, symbol, name, package designs or device that distinguishes a product from other products.
What is a TRADEMARK?
Andrea works as an Administrative Assistant for a small business that uses an SaaS service for accounting, sales orders and customer service information about the business’s customers. This product is similar to Salesforce.com and its competitors. Andrea makes sure she saves accurate records about current projects and performs regular backups of the business data stored on the cloudbased service. Which of the following is the primary reason for this practice?
A. If there is an interruption in Internet access, the service and records would not be accessible.
B. There is a limit on the number of users who are allowed to access the cloudbased service at any one time.
C. Data stored online through the cloudbased service is more at risk to security breaches than if it were stored locally.
D. Andrea is overly cautious because it is well known that cloudbased services are highly secure, highly reliable and always available.