‘ating pol datatypes ses fer numerica caleations that reale a decimal pont, such as percentages. In is case to
cast 90% fhe real pic an tema fost pont ata type necessary because can represent ot the whole
‘umber an the cal prof he number allowing for precie cleats.
QUESTION: 2
Which technique allows someone to obtain a password while itis in transit?
Pacha sing a technique uses Capture and analyze network rate, hch can inde interesting passwords while they
are in ans at packets ar transmite over ne, a packs str can capture se packet and they are
‘ot encrypted an read sense tomaton Be passwords. Theater options: Butler our is type a attack that
espeso programs memory handing, Ping so socio engineering lack to deceive users nto proving senate
information. Blackhat cefersto a hacker ih malus intent, nt specif technique. Therefore packet sitio correct
technique or btaing passos trans References: "Network Securty Essens: Appatios and Standar” by Willem
Saga explains packet sing and network security treat. "Camper Security: Principles aná Practice” y Wiliam
‘Sings and Lane Brown which covers network ack techniques including packet sii,
QUESTION: 3
How can the organizational culture support ethical guidlines?
Option A : By outlining the roles of I specialists in the organization
Option 8: By outring the protocols to support security and privacy of data
Option €: By creating the system requirements for computers in the organization
Option D : By creating the government regulations that apply tothe organization
Explanation/Reference:
‘rganizatonal cute can support tica quideines by establishing er protocols and ple hat promot he secur and
‘acy of ta. Ti ines: Data protection oles: Guideines on how dota shoul e handed, sted and protected
Ethic! hover. Ecourging employee to adhere o etica standards and practices Tang and awareness: Regular
ring sessions to educateemployes on seurty best rates and ethical bave Incident response: Petal fo
espondng to data breaches and athe ecu incidents strong rganiraina culture tat rires ata ecuty and
pay helps ensure that tical uieine are content alone. References Michael E man and Meret) Matar,
“principles of formation Sect,” Cengage Leaning. Rebecca Merl, Managing an information Secu and Privacy
arenes and Tring Program” CRC Pres.
QUESTION: 4
Whats scope creep?
Option A; Realization thatthe organization staffing is inadequate
Option 8; The extent ofthe project that acks needed requirements
Option : Small changes ina project that lead to bigger changes
Option D : When the project is completed in ess than the required time
Correct Answer: €
Explanation/Reference:
‘Scope rep efes to the phenomenon whee the cop fa projet gradually increases ver time due to sal, emer
‘changes that werent nal lame or approved. Ts can happen when: New fatureor requirements ae added whut
per evaluation or approval takeholercontiuousy request small changes or ations Lack fa ea scope
efintionand change conte process. These smal changes can accumulate easing to signant eins from he orinal
project pan affecting the project's schedule, budget, and veal sucess. References Project Management sue, "A Guide
tothe Projet Management ody of Krone (PMBOK Guide) PL Kathy Schwabe, “formation Technology Project
Management Cengage Leaning
QUESTION: 5
ich characteristic identifies intranet application sofware?
Option A; Hosted by an outsourced provider
Option B: Hosted in the internal business network
Option €: Hosted by a third-party web portal
Option D : Hosted on an individual computer
Correct Answer: B
Explanation/Reference:
lane plain Software: nvret aplcaions ae designe oe usd wen an again trol network. Tey are
‘ot accesible rom ouside te organizan unes trough secure connection ke 3 VN, Cartes Internal Hosting:
‘These oplatins oe hosted on servers tn th business net enuring ha only autre nel urs cn access
om. Secu: Since try ar hosted itera, hey canbe secure mt internal cuy measures ke frena and access
caro Increc Options: Describes apps hosted by externa provides, C: Descres aplicas haste by hi
party web portal. D: Desribs standalone aplican on inkl comptes, References Intranet appikatirs manet
Aoplcatens
QUESTION: 6
‘What are two differences between a handheld computer and a desktop? Choose 2 answers.
Option A : A handheld has more memory.
Option : A desktop has more memory.
Option € A desktop has more internal storage.
Option D : Ahandheld has more internal storage.
Explanation/Referenc
Desktops pally have more memory (RAM) and intemal rage (hard res o OS} compare to handheld computes. is
lows estos to handle more tense computing tasks nd str ger amount of ta. Handheld devices, onthe other
and proie pora and battery se over high storage and memery capaci.
QUESTION: 7
‘Which roe is responsible fr instaling new hardware and troubleshooting exiting hardware?
Option A: Web administrator
Option 8; System administrator
Option €: Security administrator
Option D : Network administrator
Correct Answer: B
Explanation/Reference:
A sstem administrators response for managing stalin, and maintain an rganizations computer sstems and
networks. Thi ole volves confguing ew hard, sting up user acount, trobleshaotng syste and nano,
and ensring te systems un fen.