Refer to the graphic. What type of cabling is shown?

Refer to the graphic. What type of cabling is shown? coaxial plastic fiber-optic glass fiber-optic twisted-pair Explanation and Hint: Network cabling includes different types of cables: Twisted-pair Ethernet cables consist…

Comments Off on Refer to the graphic. What type of cabling is shown?

Match the TCP/IP model layer to the function.

Match the TCP/IP model layer to the function. application  ---> represents data to the user, data encoding, and dialog control. network access ---> controls hardware devices and media that make up the…

Comments Off on Match the TCP/IP model layer to the function.

Which domain name database query utility has been restricted by the European Union´s General Data Protection Regulation (GDPR) to protect privacy?

Which domain name database query utility has been restricted by the European Union´s General Data Protection Regulation (GDPR) to protect privacy? Dig Whois FOCA theHarvester Explanation & Hint: Most Linux,…

Comments Off on Which domain name database query utility has been restricted by the European Union´s General Data Protection Regulation (GDPR) to protect privacy?

Match the attack to the definition.

Match the attack to the definition. cache poisoning ==> Attacker sends falsified information to redirect users to malicious sites resource utilization attack ==> Attacker sends multiple packets that consume server…

Comments Off on Match the attack to the definition.

What control category does system hardening belong to?

What control category does system hardening belong to? technical administrative operational physical Explanation & Hint: Technical controls make use of technology to reduce vulnerabilities. System hardening is an example of…

Comments Off on What control category does system hardening belong to?

A document entitled “Building an Information Technology Security Awareness and Training Program” succinctly defines why security education and training are so important for users. The document defines ways to improve the security operations of an organization.  Which document is being described?

A document entitled "Building an Information Technology Security Awareness and Training Program" succinctly defines why security education and training are so important for users. The document defines ways to improve…

Comments Off on A document entitled “Building an Information Technology Security Awareness and Training Program” succinctly defines why security education and training are so important for users. The document defines ways to improve the security operations of an organization.  Which document is being described?

Match the term to the respective description.

Match the term to the respective description. false positive ==> A security device triggers an alarm, but there is no malicious activity or actual attack taking place true positive ==>…

Comments Off on Match the term to the respective description.

Which two items are examples of technical controls that can be recommended as mitigations and remediation of the vulnerabilities found during a pen test? (Choose two.)

Which two items are examples of technical controls that can be recommended as mitigations and remediation of the vulnerabilities found during a pen test? (Choose two.) multifactor authentication  certificate management …

Comments Off on Which two items are examples of technical controls that can be recommended as mitigations and remediation of the vulnerabilities found during a pen test? (Choose two.)

Match the job title with the matching job description.

Match the job title with the matching job description. Data Analyst: Leverage existing tools and problem-solving methods to query and process data, provide reports, summarize and visualize data. Data Engineer:…

Comments Off on Match the job title with the matching job description.

Which skill set is important for someone seeking to become a data scientist?

Which skill set is important for someone seeking to become a data scientist? An understanding of architecture and distribution of data acquisition and storage, multiple programming languages (including Python and…

Comments Off on Which skill set is important for someone seeking to become a data scientist?

A data analyst is building a portfolio for future prospective employers and wishes to include a previously completed project. What three process documentations would be included in building that portfolio? (Choose three.)

A data analyst is building a portfolio for future prospective employers and wishes to include a previously completed project. What three process documentations would be included in building that portfolio?…

Comments Off on A data analyst is building a portfolio for future prospective employers and wishes to include a previously completed project. What three process documentations would be included in building that portfolio? (Choose three.)

Match the data professional role with the skill sets required.

Match the data professional role with the skill sets required. Data scientist - Ability to use statistical and analytical skills, programming knowledge (Python, R, Java), and familiarity with Hadoop; a…

Comments Off on Match the data professional role with the skill sets required.

What are two types of supervised machine learning algorithms? (Choose two.)

What are two types of supervised machine learning algorithms? (Choose two.) Clustering Mode Classification Regression Association Mean Answers Explanation & Hints: Supervised learning is a type of machine learning where…

Comments Off on What are two types of supervised machine learning algorithms? (Choose two.)

What are two applications that would gain ratification intelligence by using the reinforcement learning model? (Choose two.)

What are two applications that would gain ratification intelligence by using the reinforcement learning model? (Choose two.) Predicting the trajectory of a tornado using weather data. Robotics and industrial automation.…

Comments Off on What are two applications that would gain ratification intelligence by using the reinforcement learning model? (Choose two.)

Which type of learning algorithm can predict the value of a variable of a loan interest rate based on the value of other variables?

Which type of learning algorithm can predict the value of a variable of a loan interest rate based on the value of other variables? Clustering Regression Association Classification Answers Explanation…

Comments Off on Which type of learning algorithm can predict the value of a variable of a loan interest rate based on the value of other variables?