The Windows Device Manager is a tool that enables you to perform a variety of tasks, including:
A. Map to a printer.
B. Ping anIPaddress.
C. Defragment a hard drive.
D. Change a resource assignment.
Which term describes the practice of actively collecting wireless networking data from companies and individuals?
A. War driving
B. Spear phishing
C. Dictionary attack
D. Social engineering
Which of the following is a drawback to using Wired Equivalent Privacy (WEP)?
A. Wireless network overhead is excessive.
B. Symmetric-key encryption is susceptible to cracking.
C. The number of devices that can communicate using WEP is limited.
D. Encryption and decryption speeds are slower compared to other protocols.
When using cloud-based services to host company data, a company's disaster recovery plan should include strategies for:
A. Creating redundancy and ensuring there is an exclusive contract with the cloud service provider.
B. Distributing data and software services across multiple cloud service providers.
C. Creating redundancy and using multiple cloud service providers.
D. Using a single well-established cloud service provider.
Selena has decided to change a 32-character unique wireless network name on her wireless router to improve network security after a break-in. She is following advice from CERT to make this change in order to avoid attacks from botnets. Which of the following settings would she modify?
A. Direct Sequence Spread Spectrum (DSSS) signal
B. Media Access Control (MAC) address
C. Wi-Fi Protected Access 2 (WPA2)
D. Service Set Identifier (SSID)
ABC Company develops its own database applications. ABC is considering migrating to cloud services to accommodate the company's growth. What strategy should ABC use to ensure continuous data protection if it begins using cloud services?
A. Cloud-only solution
B. Regional systems solution
C. Location systems solution
D. Multiple cloud-service providers
You want to enable wireless security on your Android device and your Linux system. Which of the following is a disadvantage of Wired Equivalent Privacy (WEP)?
A. It enables MAC address filtering.
B. It is easily compromised by hackers.
C. It only supports 56-bit symmetric-key encryption.
D. It is based on the outdated 802.lla wireless standard.
Wireless networks are subject to more security issues than standard wired networks. Which wireless security protocol can prevent unauthorized devices from connecting to the wireless network?
A. WPA2
B. RSA
C. AES
D. DES
Carol is experiencing read/write errors when trying to save files on her Windows-based laptop. To correct the issue, she could consider performing which of the following maintenance tasks?
A. Disk cleanup
B. fsck command
C. chkdsk command
D. Disk defragmentation
Virtualization software transforms the hardware resources of a physical computer to create a fully functional virtual computer that can run its own operating systems and applications. In addition to the CPU and RAM, which hardware resources are used by virtualization software?
A. Hard disk and USB devices
B. Hard disk and network devices
C. Virtual hard disk and network devices
D. Network devices and secondary storage devices