Which of the following are the features of the Internet?
Each correct answer represents a complete solution. Choose all that apply.
Question No 2
Which of the following software can be used to protect a computer system from external threats
(viruses, worms, malware, or Trojans) and malicious attacks?
Each correct answer represents a complete solution. Choose all that apply.
Question No 3
Which of the following connectors are used with coaxial cables?
Each correct answer represents a complete solution. Choose all that apply.
Question No 4
Which of the following policies defines the acceptable methods of remotely connecting a system to
the internal network?