Exam 20: Computer Security and Deployment
Exam 1: Introduction to the World of IT20 Questions
Exam 2: Connectivity12 Questions
Exam 3: On the Motherboard18 Questions
Exam 4: Introduction to Configuration19 Questions
Exam 5: Disassembly and Power18 Questions
Exam 6: Memory20 Questions
Exam 7: Storage Devices20 Questions
Exam 8: Multimedia Devices19 Questions
Exam 9: Printers13 Questions
Exam 10: Mobile Devices20 Questions
Exam 11: Computer Design and Troubleshooting Review11 Questions
Exam 12: Internet Connectivity, Virtualization, and Cloud Technologies13 Questions
Exam 13: Networking13 Questions
Exam 14: Introduction to Operating Systems18 Questions
Exam 15: Introduction to Scripting14 Questions
Exam 16: Advanced Windows13 Questions
Exam 17: Macos and Linux Operating Systems20 Questions
Exam 18: Computer and Network Security20 Questions
Exam 19: Operational Procedures15 Questions
Exam 20: Computer Security and Deployment361 Questions
Select questions type
A technician needs to improve read/write speeds for data as well as data availability.Which of the following should the technician implement?
(Multiple Choice)
4.7/5
(40)
Which security technology is used to limit the number of users allowed to use a scanner attached to the network?
(Multiple Choice)
4.9/5
(33)
With which type of network security attack is a man-in-the-middle attack associated?
(Multiple Choice)
5.0/5
(24)
Which device protects a computer from power that is over the recommended input level using the path of least resistance?
(Multiple Choice)
4.9/5
(34)
A technician has been asked to update a salesperson's laptop from Windows 7 Home Premium to Windows 10 Pro.What should the technician do first?
(Multiple Choice)
4.9/5
(29)
Which wireless communication type is the least likely to be intercepted by a malicious party?
(Multiple Choice)
4.8/5
(43)
Which term is used to describe allowing a CPU to handle simultaneous processing instructors?
(Multiple Choice)
4.8/5
(22)
A new technician has mistakenly assigned both share and NTFS permissions to a folder.When someone accesses the data from a remote computer,what permissions will be the effective permissions?
(Multiple Choice)
4.9/5
(40)
A technician is reviewing storage options with a user.Which type of memory is non-volatile and will hold data even when the computer loses power?
(Multiple Choice)
4.8/5
(34)
If 50 computers were being upgraded with a new image using Windows Deployment Services,which boot method would a technician use to initiate the deployment?
(Multiple Choice)
4.8/5
(37)
A college has a learning management system (LMS)application that is in the cloud and maintained by the college IT department.The college has a contract with the company that wrote the LMS software to provide access to the LMS during planned maintenance periods and in the event of a disaster.This service is a cloud-based service as well.What cloud architectural model does the college use?
(Multiple Choice)
4.9/5
(43)
What should an organization require when an outside company provides a service for shredding and disposal of sensitive corporate documents?
(Multiple Choice)
5.0/5
(33)
A customer brings in an older computer that has Windows XP installed and is used to run an online business.The technician recommends an operating system upgrade.Which operating system does the technician recommend?
(Multiple Choice)
4.8/5
(32)
A user calls to complain that her computer is not working.What should the technician do next?
(Multiple Choice)
5.0/5
(28)
A technician is new to working in a large company domain-based environment.A new computer has been delivered,imaged,and added to the domain for a new employee.What should the technician do next?
(Multiple Choice)
4.8/5
(23)
A technician is installing RAM in a motherboard with eight RAM slots,four white and four blue,numbered 0 through 7.What should the technician do first?
(Multiple Choice)
4.8/5
(37)
Which of the following should be used to ensure that a user cannot log in to her computer during non-working hours?
(Multiple Choice)
4.8/5
(32)
A tablet mounted in a restaurant for Internet access has multiple web pages open by themselves,and the tablet is running slowly even when playing locally installed games.What should the technician do?
(Multiple Choice)
4.8/5
(35)
A user reports that she is unable to access a web page by name but is able to access the page by IP address.Which of the following is most likely the cause of the problem?
(Multiple Choice)
4.8/5
(29)
Which of the following is a secure area that contains systems that need to be publicly accessible without being granted access to the internal network?
(Multiple Choice)
4.9/5
(27)
Showing 101 - 120 of 361
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)