Q: For what reasons might a dashboard designer choose to group objects? Select all that apply. or Q: What justifications can a dashboard designer have for grouping elements together? Choose every option that pertains. • To keep all pie charts together • Because they present data about similar metrics • To ensure the dashboard has a logical flow • Because…
-
-
Fill in the blank: Measures are _____ data types that can be either discrete or continuous.
Q: Fill in the blank: Measures are _____ data types that can be either discrete or continuous. or Q: Complete the blank: Measures are data types that might be continuous or discrete. • floating • boolean • quantitative • qualitative Explanation: Measures are quantitative data types that can be either discrete or continuous.
-
Fill in the blank: If a dashboard has _____, it is accessible to the general public.
Q: Fill in the blank: If a dashboard has _____, it is accessible to the general public. or Q: Complete the blank: A dashboard is publically available if it contains _____. • privacy settings • object-level permissions • public availability • row-level permissions Explanation: If a dashboard has public availability, it is accessible to the general public.
-
Fill in the blank: A dashboard using _____ has a privacy setting that controls the availability of specific rows of a dataset.
Q: Fill in the blank: A dashboard using _____ has a privacy setting that controls the availability of specific rows of a dataset. or Q: Complete the blank: There is a privacy setting on a dashboard that uses _____ that regulates which rows of a dataset are visible. • public availability • column-level permissions • object-level permissions • row-level permission …
-
A measure can be what type of data? Select all that apply.
Q: A measure can be what type of data? Select all that apply. or Q: What kind of data may be used as a measure? Choose every option that pertains. • Qualitative • Continuous • Discrete • Quantitative Explanation: Measures are always quantitative, and they can be either continuous or discrete. Qualitative data is not a type of measure.
-
What traffic does an implicit deny firewall rule block?
Q: What traffic does an implicit deny firewall rule block? or Q: What kind of traffic is blocked by an implicit deny firewall rule? Outbound traffic only All traffic that is not explicitly permitted or allowed Inbound traffic only Only traffic that is explicitly blocked Explanation: This means that any traffic not specifically allowed by other rules is automatically denied…
-
What kind of attack does IP Source Guard (IPSG) protect against?
Q: What kind of attack does IP Source Guard (IPSG) protect against? or Q: Which sort of assault is protected against by IP Source Guard (IPSG)? Rogue DHCP Server attacks IP Spoofing attacks DoS attacks ARP Man-in-the-middle attacks Explanation: IPSG helps prevent devices from using IP addresses that are not assigned to them, thereby protecting against IP spoofing, where an…
-
A host-based firewall protects against malicious attacks in which of the following scenarios? Select all that apply.
Q: A host-based firewall protects against malicious attacks in which of the following scenarios? Select all that apply. or Q: Which of the following situations is protected against harmful assaults by a host-based firewall? Choose every option that pertains. A company’s network experiences a layer 2 man-in-the-middle attack. A device on a company’s internal network needs protection when another device…
-
What underlying symmetric encryption cipher does WEP use?
Q: What underlying symmetric encryption cipher does WEP use? or Q: Which symmetric encryption cipher is used by WEP? AES RC4 DES RSA Explanation: WEP (Wired Equivalent Privacy) uses the RC4 symmetric encryption cipher.
-
Which of the following are critical flaws of PIN entry WPS authentication with a hard-coded PIN?
Q: Which of the following are critical flaws of PIN entry WPS authentication with a hard-coded PIN? or Q: What are the main drawbacks of using a hard-coded PIN for PIN entering WPS authentication? There is a one-minute lockout period after three incorrect PIN attempts. It uses an 8-digit pin, which is made of 7 digits and one checksum value,…