Exam 20: Computer Security and Deployment

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which type of printer uses pickup rollers,transfer rollers,and a fuser?

(Multiple Choice)
4.8/5
(39)

Which of the following statements best describes the purpose of a virtual machine?

(Multiple Choice)
4.7/5
(34)

Thermal paste is used between which of the following components?

(Multiple Choice)
4.7/5
(26)

Which of the following is the first component used to transfer heat away from a processor?

(Multiple Choice)
4.8/5
(27)

In what instance would a PC technician need to use the msconfig command?

(Multiple Choice)
4.8/5
(38)

A company is looking to install network cabling.Which of the following has network capabilities up to 1 Gb/s and would be appropriate for the company to consider if cost is a factor? (Choose all that apply. )

(Multiple Choice)
4.8/5
(34)

Which security measure would be good for a mobile device that has sensitive data stored on it and has been stolen?

(Multiple Choice)
4.9/5
(30)

Why would a technician use a tone generator?

(Multiple Choice)
4.9/5
(30)

A user wants to use his smartphone in hands-free mode while driving his car.What feature should the user enable?

(Multiple Choice)
4.7/5
(39)

Which of the following expansion slots is found only in desktop computers?

(Multiple Choice)
4.8/5
(33)

Which access method would be best for a technician working from a desk to remotely access network devices such as switches?

(Multiple Choice)
4.8/5
(35)

Which of the following is a class A private IP address?

(Multiple Choice)
4.7/5
(34)

Which of the following wireless standards can operate at both 2.4 GHz and 5.0 GHz?

(Multiple Choice)
4.8/5
(38)

Which of the following disables a mobile device's radio to prevent wireless communication?

(Multiple Choice)
4.7/5
(46)

Which of the following services uses port 21 by default?

(Multiple Choice)
4.9/5
(41)

Which laptop power option keeps information in RAM with a small amount of power?

(Multiple Choice)
4.8/5
(39)

Which protocol would a technician use in the e-mail settings configuration on a smartphone if the user wants to synchronize e-mail from multiple devices?

(Multiple Choice)
4.8/5
(38)

Which of the following is a feature that allows the operating system to see logical processor cores as physical processors?

(Multiple Choice)
4.8/5
(30)

A technician knows that a network is experiencing packet loss and needs to verify where along the network path this is occurring.Which of the following utilities should the technician use?

(Multiple Choice)
4.9/5
(31)

A malicious attacker decides that he is going to try to compromise the account of the CEO of a company by calling him up on the phone,pretending to be a vendor,and gain access to the company's payment information.What type of attack is this?

(Multiple Choice)
4.9/5
(33)
Showing 141 - 160 of 361
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)