00:00

QUESTION 26

- (Topic 3)
You have purchased a wireless router for your home network. What will you do first to enhance the security?

Correct Answer: A

QUESTION 27

- (Topic 2)
Which of the following can be used to protect a computer system from malware, viruses, spyware, and various types of keyloggers? Each correct answer represents a complete solution. Choose all that apply.

Correct Answer: BD

QUESTION 28

- (Topic 2)
You are developing an online business solution for National Institute of Meteorological and Oceanographic Research (NIMOR). A case study for the organization is given in the exhibit. Based on the case study, you need to implement Internet security so that no user can hack confidential data. According to you, which of the following security options will you use for your solution? Each correct answer represents a complete solution. Choose all that apply. (Click the Exhibit button on the toolbar to see the case study.)

Correct Answer: AC

QUESTION 29

- (Topic 1)
Which project management risk event would you be using if you changed the sequence of activities to reduce the probability of the project being delayed?

Correct Answer: D

QUESTION 30

CORRECT TEXT - (Topic 1)
Fill in the blank with the appropriate layer name.
The Network layer of the OSI model corresponds to the ______ layer of the TCP/IP model.
Solution:
Internet

Does this meet the goal?

Correct Answer: A