Question 1
Employees of a large technology company are provided access to the internet as a work resource. Which of the following most likely represents the level of privacy employees should expect when utilizing this resource?
Question 2
Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?
Question 3
A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card?
Question 4
A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation?
Question 5
Which of the following terms best describes the outcome of a text message that is encrypted from its original form?