Question 1

Employees of a large technology company are provided access to the internet as a work resource. Which of the following most likely represents the level of privacy employees should expect when utilizing this resource?
  • Question 2

    Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?
  • Question 3

    A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card?
  • Question 4

    A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation?
  • Question 5

    Which of the following terms best describes the outcome of a text message that is encrypted from its original form?