Which of the following BEST describes the potential risk of using the same
password?
• A. The password might be easier for an attacker to guess.
• B. Password compromise would allow access to all of the systems.
• C. Single sign-on would be unable to function correctly.
• D. Systems might reject the password based on different requirements.
B. Password compromise would allow access to all of the systems
Which of the following should be used to store a list of strings?
• A. Array
• B. Constant
• C. Variable
• D. Branch
A. Array
Which of the following services is used to translate a URL to an IP address?
• A. ARP
• B. IMAP
• C. DNS
• D. MAC
C. DNS
Which of the following is the BEST method for ensuring there is no Telnet access?
• A. Network sniffer
• B. Intrusion detection system
• C. Antivirus software
• D. Host-based firewall
D. Host-based firewall
Which of the following types of software is MOST effective for tracking and
communicating time spent on tasks for each team member?
• A. Spreadsheet
• B. Collaborative workspace
• C. Project management
• D. Personal information management
C. Project management