Mobile computing has become a common necessity for both personal and business transactions. Which device has features similar to a smartphone but usually does not have telephone capabilities?
Henry is the network manager at XYY Corporation, a large manufacturing company that competes in the global market. The company’s computing environment is extremely complex and includes several proprietary software systems, all of which require custom configuration of network devices to operate correctly. The company’s executive management team believes that they can benefit by switching the company over to any cloud-based service. Henry disagrees.
What is a disadvantage of cloud-based services that Henry can cite to support his position?
Jose is experiencing performance problems with his notebook computer that he purchased a year ago. Upon discussing this issue with him, you learn that he has never deleted any temporary files since owning the device. What can Jose do to fix this problem most efficiently?
Which type of attack involves the installation of malicious code on personal computers or servers that redirects Internet traffic from a legitimate Web site to an identical-looking but malicious imposter Web site?
Sally is a network technician at Acme Corporation. She has been directed to configure the network adapter for a company laptop so that it can be used to connect to the company network and the Internet. What is one of the required TCP/IP settings that she will need to configure?
Gwen works for a small company where she has been asked to find a cost-effective option for providing comprehensive customer service. The finance, technical support, sales and customer service departments all need to share information about their customers. Gwen is considering adoption of a customer relationship management (CRM) application. Which of the following would be the most cost-effective solution?
Which of the following is a disadvantage of implementing a Bring Your Own Device (BYOD) policy in a company?
Wireless networks are subject to more security issues than standard wired networks. Which wireless security protocol can prevent unauthorized devices from connecting to the wireless network?