Exam 20: Computer Security and Deployment
Exam 1: Introduction to the World of IT20 Questions
Exam 2: Connectivity12 Questions
Exam 3: On the Motherboard18 Questions
Exam 4: Introduction to Configuration19 Questions
Exam 5: Disassembly and Power18 Questions
Exam 6: Memory20 Questions
Exam 7: Storage Devices20 Questions
Exam 8: Multimedia Devices19 Questions
Exam 9: Printers13 Questions
Exam 10: Mobile Devices20 Questions
Exam 11: Computer Design and Troubleshooting Review11 Questions
Exam 12: Internet Connectivity, Virtualization, and Cloud Technologies13 Questions
Exam 13: Networking13 Questions
Exam 14: Introduction to Operating Systems18 Questions
Exam 15: Introduction to Scripting14 Questions
Exam 16: Advanced Windows13 Questions
Exam 17: Macos and Linux Operating Systems20 Questions
Exam 18: Computer and Network Security20 Questions
Exam 19: Operational Procedures15 Questions
Exam 20: Computer Security and Deployment361 Questions
Select questions type
Which of the following devices forwards traffic received based on the destination MAC address?
(Multiple Choice)
4.9/5
(43)
Which of the following protocols can be used to apply settings to and retrieve logs from routers and switches?
(Multiple Choice)
4.9/5
(35)
Which of the following is used to encrypt a hard drive in Windows with BitLocker?
(Multiple Choice)
4.8/5
(35)
Which laptop power option keeps information on the hard drive and takes longer for the computer to return from a reduced-power state?
(Multiple Choice)
4.8/5
(41)
Employees are having trouble sending e-mails.A technician suspects that the firewall may be blocking the port.Which port is the technician looking to verify?
(Multiple Choice)
4.8/5
(36)
Which of the following files systems is used on compact disc media in Linux?
(Multiple Choice)
4.9/5
(32)
Which Linux commands are used when administrative access is required? (Choose two. )
(Multiple Choice)
4.8/5
(35)
A computer is having intermittent network connectivity issues.Which of the following utilities would display ports that currently have established connections?
(Multiple Choice)
4.7/5
(39)
A company has computers that contain sensitive corporate financial data stored on the internal hard drives.These computers are being replaced.Once the data has been backed up,restored onto the new computers' hard drives,and tested,what should the technicians do with the hard drives in the old (replaced)computers?
(Multiple Choice)
4.8/5
(39)
A macOS user is trying to find his IP address.Which of the following utilities should he use?
(Multiple Choice)
4.9/5
(36)
Which of the following printer types might require an alignment or calibration to print properly?
(Multiple Choice)
4.7/5
(31)
Which of the following can be used to repair errors on a hard drive?
(Multiple Choice)
4.8/5
(30)
A company uses cloud-base file storage for disaster recovery.Which resource is most important to this company when synchronizing apps?
(Multiple Choice)
4.9/5
(29)
Which type of server acts as an intermediary between a client and an application seeking resources from another server?
(Multiple Choice)
4.9/5
(38)
Which of the following is a piece of malicious software that is self-replicating and self-propagating?
(Multiple Choice)
4.7/5
(37)
A small company is installing UTP cabling and would like to have the cheapest but best option possible to support at least 700 Mb/s throughput.Which type of UTP cable would be best for this company?
(Multiple Choice)
4.8/5
(35)
When a technician is writing a script,what would the technician use to create a dynamic value that is given a name?
(Multiple Choice)
4.9/5
(27)
Which of the following are types of flash storage devices? (Choose two. )
(Multiple Choice)
4.9/5
(34)
Showing 201 - 220 of 361
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)