Exam 20: Computer Security and Deployment

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following would be an important consideration when selecting a power supply for a new high-performance gaming PC?

(Multiple Choice)
4.9/5
(33)

Which security measure would be best for a mobile device?

(Multiple Choice)
4.7/5
(35)

Where is the computer's boot sequence stored?

(Multiple Choice)
4.7/5
(40)

Which of the following printer types requires toner to be periodically replaced as part of a maintenance cycle?

(Multiple Choice)
4.8/5
(31)

An IT intern from a local college has been given the assignment of installing IP phones.The supervisor of the project gives the intern some documentation showing which switch ports the intern is to attach the phones to.What documentation is given to the intern?

(Multiple Choice)
4.9/5
(33)

Which Internet Explorer Internet Options tab is used to enable a specific TLS version?

(Multiple Choice)
4.8/5
(27)

A user wants to be able to easily connect his laptop to an external monitor,keyboard,mouse,printer,and hard drive whenever sitting at his desk in the office.What should you provide for the user?

(Multiple Choice)
4.7/5
(34)

Which of the following ports is used to secure a website while browsing the Internet?

(Multiple Choice)
4.8/5
(29)

Which two of the following are true about IPv6? (Choose two. )

(Multiple Choice)
4.8/5
(34)

A user left his monitor on while away on vacation for a week without a screensaver.Now there is a faint "ghost" image and discoloration on the screen.Which of the following has occurred?

(Multiple Choice)
4.9/5
(32)

Which of the following allows multiple computers to share a common display and input devices such as a keyboard and mouse?

(Multiple Choice)
4.7/5
(35)

What should an organization require when an outside company provides a service for shredding and disposal of sensitive corporate documents?

(Multiple Choice)
5.0/5
(33)

A user keeps running a port scanning routine from within the corporate network.The program cloaks the real IP address but not the MAC address of the computer.Security software allowed the technicians to discover the MAC address of the computer used to run the port scanning software.The technicians want to get this stopped due to the decreased network performance.What command could the technicians use to verify the MAC addresses being used by corporate computers?

(Multiple Choice)
4.9/5
(31)

Which wireless technology commonly includes haptic feedback?

(Multiple Choice)
4.9/5
(29)

Which components should be in contact with thermal paste? (Choose two. )

(Multiple Choice)
4.8/5
(31)

A technician is about to begin replacing a faulty component on a laptop.What should the technician do first before doing anything else?

(Multiple Choice)
4.7/5
(33)

A user is reporting a burning smell coming from her older computer.Which of the following would be the most probable cause?

(Multiple Choice)
4.9/5
(37)

Which of the following deployment methods would be the quickest way to deploy a standard image to many PCs across the enterprise?

(Multiple Choice)
4.8/5
(37)

A person walks into a computer store,looking for a computer that will be used for writing letters,documenting health,communicating with remote family members,and streaming video.Which hardware technology should the technical salesperson ensure is part of the sale?

(Multiple Choice)
4.8/5
(28)

A user is building a high-end gaming PC that includes dual CPUs and a 1,000 W power supply.Which of the following would be best suited for cooling the PC?

(Multiple Choice)
4.9/5
(35)
Showing 221 - 240 of 361
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)