Which of the following authorizes and documents all the changes in the IT Infrastructure and its components
Which of the following authorizes and documents all the changes in the IT Infrastructure and its
components (Configuration Items) in order to maintain a minimum amount of interruptive effects
upon the running operation?
What is one of the dominant factors that lead to insecure programming?
What is one of the dominant factors that lead to insecure programming?
Which of the following techniques is an encryption method that uses public-key encryption to encrypt and digit
Which of the following techniques is an encryption method that uses public-key encryption to
encrypt and digitally sign e-mail messages during communication between e-mail clients?
What is this process called where illegal copies are released to the public along with the legal versions?
Although software companies despise software piracy, they often realize that illegal release of
their product parallel to the legal release can actually increase the item’s user base. These illegal
versions of the software can oftentimes increase actual legal buyers. What is this process called
where illegal copies are released to the public along with the legal versions?
Drag and drop the appropriate team names in front of their respective responsibilities
Drag and drop the appropriate team names in front of their respective responsibilities.
What type of authentication is used in the following Pocket SOAP code?
What type of authentication is used in the following Pocket SOAP code?
Dim Envelope
Dim HTTP
Set Envelope = CreateObject(“PocketSOAP.Envelope.2”)
Set HTTP = CreateObject(“PocketSOAP.HTTPTransport.2)
Envelope.SetMethod “GetSome”, “http://www.mysite.org/message/”
Emvelope.Parameters.Create “SomeParameter”, “SomeValue”
HTTP.SOAPAction = “http://www.mysite.org/action/Service.GetSome”
HTTP.Authentication “Username”, “Password”
HTTP.Send http://www.mysite.org/webservice.WDSL”,Envelope.Serialize
Envelope.Parse HTTP
MsgBox “Result: ” & Envelope.Parameters.Item(0).Value
What will he do to save his data from a disaster?
Joseph is a merchant. He lives in an area that is prone to natural disasters. What will he do to
save his data from a disaster?
What function can be used with SQL to encrypt user supplied-passwords to that they can be compared with the en
What function can be used with SQL to encrypt user supplied-passwords to that they can be
compared with the encrypted passwords stored on the SQL server?
Which of the following BCP teams deals with the key decision making and guides recovery teams and business per
Which of the following BCP teams deals with the key decision making and guides recovery teams
and business personnel?
What SQL stored procedure could Darren use to remove user accounts from the databases?
Darren has just been hired on as the SQL dba for Fredrickson Inc., a marketing firm in New York
City. He has been asked to clearn up the SQL databases on one of the servers. What SQL stored
procedure could Darren use to remove user accounts from the databases?