While browsing the Internet, a user receives a warning regarding the display of mixed content. The address bar includes https, and the lock symbol is showing.
Which of the following does this warning indicate about the website?
A. It stores data in cache or cookies, but not both.
B. It requires login credentials for some sections.
C. It contains both secure and non-secure parts.
D. It is best viewed with a different browser.
Joe, a user, has many applications on his computer and is trying to use software management best practices.
Which of the following should he consider?
A. Install a desktop cleanup application.
B. Uninstall unneeded applications.
C. Load each application one at a time.
D. Manage the use of internal memory.
A user's government identification number, birth date, and current address are considered which of the following?
A. IMAP
B. HTTP
C. PII
D. HTTPS
A user receives an email from the bank stating that the user needs to follow a link and re- enter login credentials due to recent security breaches.
Based on best practices, which of the following actions should the user take? (Select TWO).
A. Inform the ISP.
B. Follow the instructions.
C. Delete the message.
D. Reply to the email.
E. Contact the bank.
Which of the following statements about the DVI-D connector are true? Each correct answer represents a complete solution. Choose three.
A. It is used only for digital signal connections.
B. Its single link connector contains 18 pins.
C. It is used for both digital and analog signal connections.
D. Its dual link connector contains 24 pins.
Rick works as your assistant. He is configuring a computer running Windows XP Professional to connect to a network. He needs to get IP information in the command prompt. He asks you about the usage and brief description of various switches used with a command.
Which of the following command switches will you suggest that he use to get the required information of the command?
A. [command] /<
B. [command] /+
C. [command] />
D. [command] /?
How many devices can be connected to an IEEE 1394 port?
A. 63
B. 127
C. 256
D. 1
Which of the following are a form of online advertising on the World Wide Web intended to attract
Web traffic or capture email addresses?
A. Pop-ups
B. Signed script policy:
C. Cookies
D. Java applet
Which of the following are types of access control attacks?
Each correct answer represents a complete solution. Choose all that apply.
A. Brute force attack
B. Mail bombing
C. Spoofing
D. Dictionary attack
Which of the following statements is true about the installation of Universal Serial Bus (USB) devices?
A. A USB device can be plugged to a computer without restarting it.
B. A computer has to be restarted to install a USB device.
C. USB devices are non-Plug and Play.
D. Software drivers are not required for USB devices.