Exam 20: Computer Security and Deployment
Exam 1: Introduction to the World of IT20 Questions
Exam 2: Connectivity12 Questions
Exam 3: On the Motherboard18 Questions
Exam 4: Introduction to Configuration19 Questions
Exam 5: Disassembly and Power18 Questions
Exam 6: Memory20 Questions
Exam 7: Storage Devices20 Questions
Exam 8: Multimedia Devices19 Questions
Exam 9: Printers13 Questions
Exam 10: Mobile Devices20 Questions
Exam 11: Computer Design and Troubleshooting Review11 Questions
Exam 12: Internet Connectivity, Virtualization, and Cloud Technologies13 Questions
Exam 13: Networking13 Questions
Exam 14: Introduction to Operating Systems18 Questions
Exam 15: Introduction to Scripting14 Questions
Exam 16: Advanced Windows13 Questions
Exam 17: Macos and Linux Operating Systems20 Questions
Exam 18: Computer and Network Security20 Questions
Exam 19: Operational Procedures15 Questions
Exam 20: Computer Security and Deployment361 Questions
Select questions type
A host computer has Internet connectivity,but a VM does not.What is the first thing that a technician should check?
(Multiple Choice)
5.0/5
(43)
Which Linux command is used to search text or a specific file for lines that match a specific text string?
(Multiple Choice)
4.8/5
(33)
What should a technician do if the Windows installation process shows no storage devices,but the BIOS/UEFI shows a hard drive?
(Multiple Choice)
4.9/5
(35)
What is the effect of disabling the SSID broadcast feature?
(Multiple Choice)
4.7/5
(43)
Which macOS feature allows a technician to view all virtual machines as well as open applications?
(Multiple Choice)
4.7/5
(32)
Which of the following should a technician use when performing hardware upgrades to prevent damage to computer components due to static discharges?
(Multiple Choice)
4.8/5
(37)
Which of the following is used to prevent an attack from a malicious user?
(Multiple Choice)
4.9/5
(41)
Which Windows tool is used to separate a hard disk into separate sections?
(Multiple Choice)
4.9/5
(33)
Which Internet Explorer Internet Options tab is used to view specific digital certificates that have been issued?
(Multiple Choice)
4.8/5
(30)
Which of the following can be done to prevent unauthorized access to a wireless network? (Choose two. )
(Multiple Choice)
4.7/5
(34)
A user says that after running for a minute or two,a computer randomly turns off and then won't turn back on.After sitting for a few minutes,it turns back on only to shut off again after another minute or two.Which of the following is most likely the cause?
(Multiple Choice)
4.9/5
(32)
What is the most secure way for a technician to get rid of personal data on several hard drives that were removed from employee computers and are no longer wanted?
(Multiple Choice)
4.9/5
(35)
What Windows Control Panel utility would be used to adjust virtual memory performance?
(Multiple Choice)
4.8/5
(38)
When a user closes his laptop lid,the Windows laptop shuts down.Which of the following Control Panel functions can be used to change this?
(Multiple Choice)
4.9/5
(30)
Which of the following wireless protocols has the highest possible maximum transfer rate?
(Multiple Choice)
4.9/5
(39)
What Windows utility allows a technician to remotely access a user's computer and does not prompt the user for permission before the technician is allowed to connect?
(Multiple Choice)
4.8/5
(34)
Which security measure is considered government-regulated data?
(Multiple Choice)
4.9/5
(39)
A user needs to access resources from the main office while at home while also ensuring that the traffic is protected.Which of the following should the user use?
(Multiple Choice)
4.7/5
(30)
Showing 301 - 320 of 361
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)