1. Which of the following application types is MOST often used for doing a mail merge?
A) A. PDF software
B) B. Word processor
C) C. Presentation software
D) D. Personal information manager
2. Which of the following security threats includes suspicious activity, such as reviewing someone's screen display without permission?
A) A. Malware
B) B. Shoulder surfing
C) C. Phishing
D) D. Password cracking
3. A user reports an inability to access the Internet on a new SOHO router. On further investigation, a technician notices that the wireless network is not visible.Which of the following is the MOST likely cause?
A) A. SSID broadcast is disabled
B) B. Wireless password has changed
C) C. Firmware update is required
D) D. WPA2 is enabled
4. Which of the following storage methods is MOST likely used in corporate settings to save large amounts of data in a secured manner?
A) A. HTTP
B) B. HTTPS
C) C. FTPS
D) D. FTP
5. Which of the following describes the difference between open source and commercial operating systems?
A) A. Open source operating systems only run on desktop computers, whereas commercial operating systems run on servers.
B) B. Open source operating systems run on standard and non-standard hardware, whereas commercial operating systems only run on specific hardware.
C) C. Open source operating systems can be downloaded and used by everyone, whereas commercial operating systems can only be used by companies.
D) D. Open source operating systems are usually provided free of charge, whereas most commercial operating systems are usually provided at some cost.
Write a public review