1.
Which one of the following would breach the integrity of a system?
2.
Which software prevents the external access to a system?
3.
Which one of the following is a valid email address?
4.
Which of the following best describes uploading information?
5.
Which one of the following is the most common internet protocol?
6.
Software programs that allow you to legally copy files and give them away at no cost are called which of the following?
7.
The term FTP stands for?
8.
At what speed does tele-computed refer?
9.
Which one of the following is not a network topology?
10.
The maximum length (in bytes) of an IPv4 datagram is?