What’s your credit card number?
The theft of personal information is becoming a widespread problem for network security professionals. What’s the most common method for tricking a user into divulging their personal account details?
The theft of personal information is becoming a widespread problem for network security professionals. What’s the most common method for tricking a user into divulging their personal account details?
You’d like to verify that a computer across the network is operating. What command line utility can check the remote device for availability?
What command line utility checks for availability? Read More »
You’re interested in doing some work on your laptop at the local coffee shop, but you’re concerned with the security of the public wireless network. What can help protect your computer while you’re using this public network?
Which topology was often seen on early local area networks, has a very simple structure, but is prone to errors that can affect large parts of the topology at one time?
You’ve been monitoring your computer, and you’ve found that the temperature of your CPU is running very hot even though your computer is showing very low CPU utilization. Which of these options would be the most likely cause of this issue?
A “road warrior” is stocking up their laptop computer case for a road trip, and they’ve asked you for a set of cables that could be used for hotel Ethernet links and the occasional dial-up connection. What kind of cables/connectors do they need? Pick two.
Which of these RAID types not only provides a high level of availability, but also allows efficient access to data when a failure occurs?
The NTFS file system provides a number of impressive capabilities. Which of the following features is unique to NTFS when compared to FAT or FAT32?
You’re working on a computer’s network connection, and you’d like to know the configuration settings of every network adapter in the computer. Which command line utility provides a comprehensive view of all network configurations?