Disaster recovery planning is considered a best practice for all organizations. It is even more important when cloud-computing services are used. Which of the following should be included as part of a disaster recovery plan for companies that use cloud-based services?
A. Malware and anti-virus software updates
B. Company organizational chart
C. Service-level agreement with a cloud-provider
D. Inventory of services not dependent on the cloud provider
正解:C
質問 2:
Three hardware devices need to communicate with the CPU simultaneously. Which of the following will each device need to issue?
A. Interrupt request (IRQ)
B. Input/output request (I/O)
C. CON request
D. DMA request
正解:A
質問 3:
You are a small-business owner and would like to encourage employees to bring their own devices (BYOD) to work. Which of the following can help reduce the security risks associated with a BYOD implementation?
A. In-house device maintenance
B. Acceptable use policy
C. Expense accounts
D. End user license agreement
正解:B
質問 4:
What is the distinguishing difference between a LAN and WAN?
A. A LAN is a group of networked computers within a confined geographic area.
B. A LAN typically provides slower network connection speeds than a WAN.
C. A WAN is commonly used for intra-office communication.
D. A WAN is a group of networked computers within a confined geographic area.
正解:A
質問 5:
Lisa is traveling on company business. She has a company-issued smartphone with 4G access. Her hotel does not provide Internet access. What advantage does 4G provide to help her access the Internet?
A. She can use the41G phone to call and locate a public location that provides free Wi-Fl.
B. She can use her41G phone's GPS to identify another hotel that provides in-room Internet access.
C. She can use the 4G phone to establish a VPN connection into the company network.
D. She can use a 4G mobile hotspot device with her phone to connect her laptop to Wi-Fi.
正解:D
質問 6:
Sam is a professor at a small college. Due to a scheduling conflict, he was unable to obtain access to the computer lab to give the final exam. As an alternative, he asked students to bring their own devices (BYOD) and connect to the college's Wi-Fi for network access. What security risk is associated with this implementation?
A. Inability for students to share files
B. Inability for students to back up user files
C. Student devices being more susceptible to malware
D. Student devices sending unsecured data
正解:D
Komatsu -
合格しました。
貴社Pass4Testホームページに記載のとおり、高い合格率がありますよね。ありがとうございました。