⟩ Explain How do virtual corporations maintain confidentiality? A. Encryption B. Checksum C. Data hashes D. Redundant servers E. Security by obscurity?
A. Encryption
A. Encryption
Suppose Lisa has programmed her companys router to recognize several internal networks. Which job title best describes her responsibilities? A. Network engineer B. Security manager C. Server administrator D. Help desk technician
Explain In XHTML, what is one of the functions of the <input> tag? A. To create a data cell in a table B. To create a check box in a form C. To create a record in a database D. To create a scrolling select list in a form
Explain Which protocol is used to transmit files across the Web to be rendered by a Web browser? A. Internet Protocol (IP) B. Hypertext Transfer Protocol (HTTP) C. Transmission Control Protocol (TCP) D. Point-to-Point Tunneling Protocol (PPTP)
Explain Which of the following IP addresses is invalid? A. 224.199.23.3 B. 24.256.54.255 C. 177.138.23.89 D. 182.255.254.115
When creating its Web presence, a business should choose its domain name carefully so that users will be able to recall it easily. Every domain name is unique. With which of the following must each domain name be registered? A. DNS B. W3C C. FQDN D. ICANN
Explain Which of the following is the best example of a client? A. An FTP site receiving a file B. A database fulfilling a query C. A workstation sharing a directory D. A Web browser querying a database
Rolfs Web site does not meet the W3Cs Web Content Accessibility Guidelines (WCAG). To make his site more accessible according to WCAG, which change could he make? A. Remove all tables from site pages B. Add a disclaimer to the home page C. Create a text-only version of the site D. Add more images and decrease text
Suppose your company is outsourcing some content development tasks. The contractors who work on these projects will see some of your companys proprietary content before it is available to customers. Your company needs to ensure that this trade-secret content is kept confidential by the contractors who see it. Which of the following protects your intellectual property in this situation? A. Copyright B. Trademark C. License agreement D. Non-disclosure agreement
Explain Which diagnostic tool would you use to determine the physical (MAC) address to systems that you have recently connected with? A. arp B. netstat C. nbtstat D. tracert
Suppose 1 What is an intranet? A. A searchable internal repository that stores an organizations proprietary documents B. A worldwide network available to anyone who has a TCP/IP connection on a computer C. A TCP/IP-based network accessible only by an organizations members and employees D. A TCP/IP-based network accessible only by an organizations internal employees and select external clients