Which type of attack involves the installation of malicious code on personal computers or servers that redirec
Which type of attack involves the installation of malicious code on personal computers or
servers that redirects Internet traffic from a legitimate Web site to an identical-looking but
malicious imposter Web site?
Which of the following would be the most appropriate response to Melanie’s actions by the company?
Melanie works in the sales department at XYZ Company. She decides that her company’s
marketing team has done a poor job representing the company’s brand. Without direction or
permission, she starts her own social networking account to help. This account’s name is
called XYZ Professional. To customize her page, she uses company logos and verbiage
from the company Web site. She then begins communicating with customers and
individuals interested in XYZ via this service. Which of the following would be the most
appropriate response to Melanie’s actions by the company?
which of the following offers mobile-friendly content to the widest possible audience?
When establishing a mobile presence, which of the following offers mobile-friendly content
to the widest possible audience?
Which type of intellectual property includes business plans, proprietary code and sales contracts?
Which type of intellectual property includes business plans, proprietary code and sales
contracts?
To insert a graphic in a Web page and successfully validate the page as HTNL5, the <img> element must in
To insert a graphic in a Web page and successfully validate the page as HTNL5, the <img>
element must include:
which of the following actions would be considered unethical?
When developing a Web site, which of the following actions would be considered unethical?
Which HTML element aligns content both horizontally and vertically to the center of the table cell by default?
Which HTML element aligns content both horizontally and vertically to the center of the
table cell by default?
Which of the following is a drawback to using Wired Equivalent Privacy (WEP)?
Which of the following is a drawback to using Wired Equivalent Privacy (WEP)?
Which of the following would you include in your recommendations to parents?
You have volunteered to give a presentation to the parents at your child’s school about the
dangers of the Internet. Which of the following would you include in your recommendations
to parents?
What type of network are you being shown?
You have just been hired by a large company, and the IT manager is giving you an overview
of the corporate network. He tells you that the corporation is spread out over several cities,
and various departments are divided into sub networks that are connected using routers.
What type of network are you being shown?