Exam 20: Computer Security and Deployment
Exam 1: Introduction to the World of IT20 Questions
Exam 2: Connectivity12 Questions
Exam 3: On the Motherboard18 Questions
Exam 4: Introduction to Configuration19 Questions
Exam 5: Disassembly and Power18 Questions
Exam 6: Memory20 Questions
Exam 7: Storage Devices20 Questions
Exam 8: Multimedia Devices19 Questions
Exam 9: Printers13 Questions
Exam 10: Mobile Devices20 Questions
Exam 11: Computer Design and Troubleshooting Review11 Questions
Exam 12: Internet Connectivity, Virtualization, and Cloud Technologies13 Questions
Exam 13: Networking13 Questions
Exam 14: Introduction to Operating Systems18 Questions
Exam 15: Introduction to Scripting14 Questions
Exam 16: Advanced Windows13 Questions
Exam 17: Macos and Linux Operating Systems20 Questions
Exam 18: Computer and Network Security20 Questions
Exam 19: Operational Procedures15 Questions
Exam 20: Computer Security and Deployment361 Questions
Select questions type
What term is associated with a compromised mobile operating system?
(Multiple Choice)
4.9/5
(31)
Which of the following tools would be used to verify that a UTP cable is working properly?
(Multiple Choice)
4.7/5
(31)
How do you dispose of an old container of a solvent used on rubber rollers that you found in the back of a cabinet?
(Multiple Choice)
4.8/5
(33)
Which cell phone component is a unique number for a phone?
(Multiple Choice)
4.9/5
(37)
Which of the following is used to deliver both video and audio from a single connector?
(Multiple Choice)
4.9/5
(47)
A user is complaining that her laptop display is not very bright.Which of the following would you most likely use to adjust the brightness?
(Multiple Choice)
4.8/5
(33)
A company is merging with a larger company,and together they are considering authentication options.Which types of servers would be used to authenticate users in a corporate environment? (Choose two. )
(Multiple Choice)
4.8/5
(28)
Which commands could a technician use when working on a corporate computer that the user has said is slow? (Choose two. )
(Multiple Choice)
4.8/5
(37)
On a corporate mobile device,the user can reach neither internal network resources nor external ones.Which problems would most likely be the causes of this issue? (Choose two. )
(Multiple Choice)
4.7/5
(35)
A computer cannot reach any device on the Internet or within a browser for any web-based app within the company.When a technician troubleshoots this computer,he discovers that the computer can reach all devices by IP address.What configuration does the technician need to apply?
(Multiple Choice)
4.9/5
(32)
A DDoS attack has occurred within a corporate environment,The security assessment team has determined that the attack was launched from multiple computers within the company and was aimed at other company computers.Which types of infection are probably on the computers that are launching the attack? (Choose two. )
(Multiple Choice)
4.8/5
(41)
A user has an old parallel printer that he wants to share with other users in the office.Which of the following is needed to accomplish this?
(Multiple Choice)
4.7/5
(41)
A technician is responding to a call about an inkjet printer that is not printing all of any character.Which of the following should the technician do first?
(Multiple Choice)
4.8/5
(28)
A user's computer keeps rebooting as the computer is turning on.The technician notices that it never completes the POST sequence.Which of the following could be possible causes? (Choose two. )
(Multiple Choice)
4.9/5
(33)
A technician wants to configure two drives for maximum performance.Which setup should he use?
(Multiple Choice)
4.9/5
(38)
A laptop user cannot connect to the wireless network.The user claims he doesn't even see any wireless networks available to connect to.Which of the following should the user do first?
(Multiple Choice)
4.9/5
(35)
A user reports that his PC's display isn't showing the colors properly.When you wiggle the VGA cable connected to the computer's VGA port,the display goes all blue,then all red,then all yellow.Which of the following might be the problem?
(Multiple Choice)
4.8/5
(30)
Which security technique makes it possible to use one username and password to access multiple corporate applications and resources?
(Multiple Choice)
4.8/5
(38)
What type of device proactively monitors,identifies,logs,and attempts to thwart suspicious activity aimed at a device or network?
(Multiple Choice)
5.0/5
(32)
Showing 281 - 300 of 361
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)