ABC Company develops itsowndatabase applications. ABC is considering migrating to cloud services to accommodate the company’s growth. What strategy should ABC use to ensure continuous data protection if it begins using cloud services?
Correct Answer:
C
You are a small-business owner and would like to encourage employees to bring their own devices (BYOD) to work. Which of the following can help reduce the security risks associated with a BYOD implementation?
Correct Answer:
B
A friend has called you about a possible computer problem because her computer is acting strangely. Sounds play unexpectedly, the monitor turns off suddenly, the hard-drive light flashes constantly, the computer sometimes reboots itself without warning. When you inspect your friend’s system, you notice that several ports are open. Which of the following is most likely the cause of these symptoms?
Correct Answer:
C
You are distributing a large video game file using BitTorrent. First, you upload the initial file and make it available via a central server called a tracker. Other users can then connect to the tracker and download the file. Each user who downloads the file makesit available to other users todownload. The use of BitTorrent significantly reduces the original provider’s hardware and bandwidth resource costs. BitTorrent is an example of what type of network?
Correct Answer:
C
Which type of attack involves the installation of malicious code on personal computers or servers that redirects Internet traffic from a legitimate Web site to an identical-looking but malicious imposter Web site?
Correct Answer:
A