Which of the following is a security threat commonly associated with cloud-based services?
C
Sam is a professor at a small college. Due to a scheduling conflict, he was unable to obtain access to
the computer lab to give the final exam. As an alternative, he asked students to bring their own
devices (BYOD) and connect to the college’s Wi-Fi for network access. What security risk is associated
with this implementation?
C
What is the biggest security concern with wireless networks?
B
Gwen works for a small company where she has been asked to find a cost-effective option for
providing comprehensive customer service. The finance, technical support, sales and customer
service departments all need to share information about their customers. Gwen is considering
adoption of a customer relationship management (CRM) application. Which of the following would
be the most cost-effective solution?
C
Sally is a network technician at Acme Corporation. She has been directed to configure the network
adapter for a company laptop so that it can be used to connect to the company network and the
Internet. What is one of the required TCP/IP settings that she will need to configure?
B
Which term describes the practice of actively collecting wireless networking data from companies
and individuals?
A
Jose is experiencing performance problems with his notebook computer that he purchased a year
ago. Upon discussing this issue with him, you learn that he has never deleted any temporary files
since owning the device. What can Jose do to fix this problem most efficiently?
C
Which of the following is a drawback to using Wired Equivalent Privacy (WEP)?
B
When using cloud-based services to host company data, a company’s disaster recovery plan should
include strategies for:
C
Which of the following statement about virtualization is true?
D