⟩ Organizations _______ risk, when they convince another entity to assume the risk for them. A. Elevate B. Assume C. Deny D. Transfer E. Mitigate?
D. Transfer
D. Transfer
Explain Which of the following is a contract used in project management that outlines the requirements for each project task to ensure that the project objectives are met? A. Project triangle B. Organizational chart C. Statement of work (SOW) D. Return on Investment (ROI)
Explain Which of the following is the most popular protocol that provides authentication and encryption for secure exchanges over the Internet? A. Secure Sockets Layer (SSL) B. Public Key Infrastructure (PKI) C. Electronic Data Interchange (EDI) D. Secure Electronic Transactions (SET)
Suppose You have purchased some products from an online business. This business collected information from you regarding your purchase, such as your name, e-mail address and product preferences. This online business then sold some information about you to a third party. This routine practice is an example of A. a copyright issue. B. a privacy concern. C. a trademark issue. D. a licensing concern.
Which of the following is a contract used in project management that outlines the requirements for each project task to ensure that the project objectives are met? A. Project triangle B. Organizational chart C. Statement of work (SOW) D. Return on Investment (ROI)
Explain Which of the following allows multiple systems to communicate on a wireless network in infrastructure mode? A. A switch B. A wireless NIC C. A network access point (NAP) D. A wireless access point (WAP)
Which of the following is the most popular protocol that provides authentication and encryption for secure exchanges over the Internet? A. Secure Sockets Layer (SSL) B. Public Key Infrastructure (PKI) C. Electronic Data Interchange (EDI) D. Secure Electronic Transactions (SET)
Which term describes a server at the highest level of the Domain Name System (DNS)? A. Master B. Primary C. Top level D. Root level
Suppose Mike is able to check his Web-based e-mail using his cell phone. Which protocol allows his cell phone to connect to the Internet? A. Post Office Protocol (POP3) B. Wireless Access Point (WAP) C. Wireless Application Protocol (WAP) D. Multipurpose Internet Mail Extensions (MIME)
Mike wants to download the Macromedia Flash MX 2004 viewer software to his desktop. Which Internet protocol will he use? A. FTP B. SSH C. TCP D. SMTP
Which type of encryption uses a pair of keys, in which one key is used to encrypt information and the other key is used to decrypt that information? A. Hash encryption B. One-way encryption C. Symmetric encryption D. Asymmetric encryption