Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Certification
Study Set
Computing Technology Industry Association (CompTIA)
Quiz 14: Comptia Asp
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
Multiple Choice
Security is one of the most important issues an organization must discuss. Mitch wants security that is built into an application. Why would this be a problem?
Question 2
Multiple Choice
David is a security administrator at his organization. He is trying to prevent unauthorized access to the corporate wireless network by people loafing around the office. What kind of wireless network threat is he trying to curb?
Question 3
Multiple Choice
You have entered information in the database. It has been changed and is reflected in the database. What has been done?
Question 4
Multiple Choice
Database models define the relationship between different data elements, dictate how data can be accessed and define acceptable operations, the type of integrity offered, and how the data is organized. What type of database uses attributes and tuples to contain and organize information?
Question 5
Multiple Choice
Which of the following organizations regularly issues ethics-related statements concerning the use of the Internet?
Question 6
Multiple Choice
What is a single link that is pre-established for the purposes of WAN communications between two destinations?
Question 7
Multiple Choice
Which of the following statements regarding the MD5 algorithm is NOT true?
Question 8
Multiple Choice
What is the type of software that is installed on someone's computer without their knowledge?
Question 9
Multiple Choice
What item below is not associated with Session Initiation Protocol (SIP) ?
Question 10
Multiple Choice
Which of the following is a feature of Asymmetric cryptography?
Question 11
Multiple Choice
What provides for fault tolerance and higher performance when databases are clustered?
Question 12
Multiple Choice
Which of these malicious agents are capable of distributing themselves without the use of a host file?
Question 13
Multiple Choice
Networks have different types of topologies. Which topology is a single cable running the entire length of the network?
Question 14
Multiple Choice
Which of the following is a term used to define a collection of software robots-or bots-that run autonomously and automatically and may harm your computer?
Question 15
Multiple Choice
Which technology uses a person's physical characteristics to establish identity?
Question 16
Multiple Choice
Jim's company is paying Chris's company to develop software and a third party keeps a copy of the source code. What should Jim have in place for protection?
Question 17
Multiple Choice
Software development methods provide software developers and vendor guidelines for program creation. What software development method is generally implemented in scenarios requiring rapid adaptations to changing client requirements?