Question: Most commercial encryption technologies such as SSL and VPN

Answer Options:
Use only asymmetric key encryption
Use only symmetric key encryption
Combine the best features of symmetric and asymmetric key encryption

Answer: Combine the best features of symmetric and asymmetric key encryption

 

Question: A technology defined at the Data Link layer is:

Ethernet.
TCP.
SMTP.
IP.

Answer: Ethernet.

 

Question: Kathleen and Mackensie are staring at a pallet of firewood and in unison they say which of the following?

Answer Options:
That firewood is real property because it came from a planted tree.
That firewood is real property if it is brought into a home and burned in a fireplace.
That firewood is personal property.
That firewood is real property until it starts to burn.

Answer: That firewood is personal property.

 

Question: Connie discovers four biology majors who took Professor Langley’s course in Italian Renaissance history. All four wear Calvin Klein jeans, and so does Connie.
a. Strengthens.
b. Has no effect.
c. Weakens.

Answer Options:
a. Strengthens
b. Has no effect
c. Weakens

Answer: b. Has no effect

 

Question: At which layer of the OSI model are you likely to see acknowledgments of data segments?

Presentation.
Network.
Application.
Transport.

Answer: Transport.

 

Question: An organization maintains multiple network connections to the Internet. This is an example of

Answer Options:
Modulation
Patching
Encryption
Redundancy

Answer: Redundancy

 

Question: At a meeting, the regional manager informs the store managers that none of the merchandise will be discounted. One manager, believing that discounts are good for business, decides to discount candies by 10%. When the regional manager discovers this, he instructs the store manager to insist that all customers who purchased the candies pay the additional 10% or return the candies. Which of the following is true?

Answer: The customers can keep the candies because the manager had the apparent authority to grant the discount.

 

Question: Myra asks Dottie to sign for an Amazon package for her. When Dottie signs for the package she opens it to discover that it is the latest and greatest iPhone. Dottie decides to activate it and discovers its amazing features. Which of the following is true?

Answer Options:
Dottie has exceeded her express authority which was limited to signing for the package.
Since Dottie was authorized to sign for the package, her implied authority included opening the package.
Dottie did Myra a favor because she could verify that the iPhone was not defective.
Dottie had the apparent authority to open the package and verify its functionality.

Answer: Dottie has exceeded her express authority which was limited to signing for the package.

 

Question: Which of the following best describes the difference between a warranty deed and a special warranty deed?

Answer Options:
A warranty deed provides the buyer/grantee more protection.
A special warranty deed provides the buyer/grantee more protection.
For a warranty deed to be enforceable, the buyer/grantee must purchase title insurance.
There is no difference between the two deeds.

Answer: A warranty deed provides the buyer/grantee more protection.

 

Question: Marketable title is which of the following?

Answer Options:
Title to real estate that can be transferred without encumbrances
Property that is sold for its true value
Property that has passed inspection
Title to property in fee simple

Answer: Title to real estate that can be transferred without encumbrances

 

Question: A mobile worker requires secure access to corporate business applications from his hotel room. The most suitable encryption technology for this purpose is

Answer Options:
Transport Layer Security (TLS)
Virtual Private Network (VPN)
Digital Signature
Secure Shell (SSH)

Answer: Virtual Private Network (VPN)

 

Question: Redundancy is

Answer Options:
Hiding information to provide confidentiality
The provision of surplus service capacity to improve availability
None of the above
Scheduling periodic maintenance to improve availability

Answer: The provision of surplus service capacity to improve availability

 

Question: The OSI model has ____ layers.

Answer: 7.

 

Question: A unique feature of the Internet compared to landline phone and traditional cable TV networks is that:

The Internet has a higher data transfer rate.
The Internet was operational long before phone and TV networks.
The Internet uses a common packet format to transfer data from any application.
The Internet can be used to transmit information.

Answer: The Internet uses a common packet format to transfer data from any application.

 

Question: The presentation layer in the OSI model is responsible for:

Error control.
Syntax conversion from host-specific syntax for network transfer.
Specifying end user needs.
Preventing unauthorized file access.

Answer: Syntax conversion from host-specific syntax for network transfer.

 

Question: Asher is selling his house to Mollie Cule. There is an issue as to whether a microwave is a fixture, and thus, is part of the house. Which of the following will be determinative?

Answer Options:
The price of the microwave
Whether the microwave is built into a space such that its removal would cause damage
Whether smart microwaves are used contemporarily, thereby classifying it as a trade fixture
None of the alternatives are correct

Answer: Whether the microwave is built into a space such that its removal would cause damage