⟩ A _______ attack uses multiple systems to launch a coordinated attack. A. Distributed denial-of-service B. Teardrop C. Birthday D. FTP Bounce E. Salami?
A. Distributed denial-of-service
A. Distributed denial-of-service
Explain Which of the following is the best example of a client? A. An FTP site receiving a file B. A database fulfilling a query C. A workstation sharing a directory D. A Web browser querying a database
Rolfs Web site does not meet the W3Cs Web Content Accessibility Guidelines (WCAG). To make his site more accessible according to WCAG, which change could he make? A. Remove all tables from site pages B. Add a disclaimer to the home page C. Create a text-only version of the site D. Add more images and decrease text
Suppose your company is outsourcing some content development tasks. The contractors who work on these projects will see some of your companys proprietary content before it is available to customers. Your company needs to ensure that this trade-secret content is kept confidential by the contractors who see it. Which of the following protects your intellectual property in this situation? A. Copyright B. Trademark C. License agreement D. Non-disclosure agreement
Explain Which diagnostic tool would you use to determine the physical (MAC) address to systems that you have recently connected with? A. arp B. netstat C. nbtstat D. tracert
Suppose 1 What is an intranet? A. A searchable internal repository that stores an organizations proprietary documents B. A worldwide network available to anyone who has a TCP/IP connection on a computer C. A TCP/IP-based network accessible only by an organizations members and employees D. A TCP/IP-based network accessible only by an organizations internal employees and select external clients
Explain Which term describes a server at the highest level of the Domain Name System (DNS)? A. Master B. Primary C. Top level D. Root level
Explain Which of the following is a contract used in project management that outlines the requirements for each project task to ensure that the project objectives are met? A. Project triangle B. Organizational chart C. Statement of work (SOW) D. Return on Investment (ROI)
Explain Which of the following is the most popular protocol that provides authentication and encryption for secure exchanges over the Internet? A. Secure Sockets Layer (SSL) B. Public Key Infrastructure (PKI) C. Electronic Data Interchange (EDI) D. Secure Electronic Transactions (SET)
Suppose You have purchased some products from an online business. This business collected information from you regarding your purchase, such as your name, e-mail address and product preferences. This online business then sold some information about you to a third party. This routine practice is an example of A. a copyright issue. B. a privacy concern. C. a trademark issue. D. a licensing concern.
Which of the following is a contract used in project management that outlines the requirements for each project task to ensure that the project objectives are met? A. Project triangle B. Organizational chart C. Statement of work (SOW) D. Return on Investment (ROI)