COGNITIVE ASSESSMENT
To prevent unauthorized users from reading data as it travels over a network, what process should the administrator specify?

A. encryption
B. decoding
C. scrambling
D. authorization


Answer: A

Computer Science & Information Technology

You might also like to view...

At the lower left of the Start menu, you can type in the ________ to search your entire computer for files

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following functions will calculate the total principal paid between select periods?

A) IPMT B) PPMT C) CUMIPMT D) CUMPRINC

Computer Science & Information Technology

Match each item with a statement below.

A. A console interface that can be used to interact with an ESXi server host. B. The process of assigning more disk space to virtual disks that you have space available on a VMFS data store. C. A file stored in a VMFS volume that acts as a proxy or go-between providing a physical storage device to virtual disk mapping. D. Allows the administrator to set up rules and procedures to manage how virtual network resources are used. E. Allocates the space required for a virtual machine during creation. Data remaining on the physical device is zeroed out when the disk is created. F. Space required for a virtual disk is allocated during creation, but data remaining on the physical device is not erased during creation, it is zeroed out over time. G. Uses only as much data store space as the disk initially needs. H. As an example, this is used by a physical switch to pass packets from multiple VLANs to a host using VLAN tags. I. An emulated version of the AMD 79C970 PCnet32 NIC J. The next generation of a paravirtualized NIC, designed for performance and advanced features such as fault tolerance.

Computer Science & Information Technology

The Property inspector is context sensitive.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology