You received an e-mail message on which several other individuals were copied. You want to respond to this message in a way that will include everyone who was copied on the original message. You can accomplish this by using which action?
Answer : B
A friend just sent you a link to a Facebook page with information that you find very useful. You want to be able to recall the site in the future from your desktop computer, or from your mobile device while away from your desk. Which is the best approach?
Answer : B
A paradigm shift has occurred in the way that small businesses use software applications. Companies increasingly choose hosted solutions with a monthly subscription fee and outsourced system maintenance, instead of purchasing software and hardware that must be maintained by internal resources. This business model is commonly referred to as:
Answer : D
You have just checked the balance in your bank account by logging into your bank's Web site. Which protocol was most likely used for the transmission of your information?
Answer : B
An end user cannot log in to a page that provides an c-learning course. The authentication window will not launch. Which of the following is most likely the cause of this problem?
Answer : D
Raoul has received a file attachment from a known individual. He has no reason to expect files from this individual. Which of the following is an effective security strategy for Raoul to take?
Answer : D
You received a text and a threatening voicemail from an angry customer who wants to immediately discuss the shortcomings of a recently released product. You are about to walk into a mandatory meeting with your top-level leadership team. Which of the following is your best course of action?
Answer : B