Exam 20: Computer Security and Deployment
Exam 1: Introduction to the World of IT20 Questions
Exam 2: Connectivity12 Questions
Exam 3: On the Motherboard18 Questions
Exam 4: Introduction to Configuration19 Questions
Exam 5: Disassembly and Power18 Questions
Exam 6: Memory20 Questions
Exam 7: Storage Devices20 Questions
Exam 8: Multimedia Devices19 Questions
Exam 9: Printers13 Questions
Exam 10: Mobile Devices20 Questions
Exam 11: Computer Design and Troubleshooting Review11 Questions
Exam 12: Internet Connectivity, Virtualization, and Cloud Technologies13 Questions
Exam 13: Networking13 Questions
Exam 14: Introduction to Operating Systems18 Questions
Exam 15: Introduction to Scripting14 Questions
Exam 16: Advanced Windows13 Questions
Exam 17: Macos and Linux Operating Systems20 Questions
Exam 18: Computer and Network Security20 Questions
Exam 19: Operational Procedures15 Questions
Exam 20: Computer Security and Deployment361 Questions
Select questions type
Which type of printer uses pickup rollers,transfer rollers,and a fuser?
(Multiple Choice)
4.8/5
(39)
Which of the following statements best describes the purpose of a virtual machine?
(Multiple Choice)
4.7/5
(34)
Thermal paste is used between which of the following components?
(Multiple Choice)
4.7/5
(26)
Which of the following is the first component used to transfer heat away from a processor?
(Multiple Choice)
4.8/5
(27)
In what instance would a PC technician need to use the msconfig command?
(Multiple Choice)
4.8/5
(38)
A company is looking to install network cabling.Which of the following has network capabilities up to 1 Gb/s and would be appropriate for the company to consider if cost is a factor? (Choose all that apply. )
(Multiple Choice)
4.8/5
(34)
Which security measure would be good for a mobile device that has sensitive data stored on it and has been stolen?
(Multiple Choice)
4.9/5
(30)
A user wants to use his smartphone in hands-free mode while driving his car.What feature should the user enable?
(Multiple Choice)
4.7/5
(39)
Which of the following expansion slots is found only in desktop computers?
(Multiple Choice)
4.8/5
(33)
Which access method would be best for a technician working from a desk to remotely access network devices such as switches?
(Multiple Choice)
4.8/5
(35)
Which of the following wireless standards can operate at both 2.4 GHz and 5.0 GHz?
(Multiple Choice)
4.8/5
(38)
Which of the following disables a mobile device's radio to prevent wireless communication?
(Multiple Choice)
4.7/5
(46)
Which laptop power option keeps information in RAM with a small amount of power?
(Multiple Choice)
4.8/5
(39)
Which protocol would a technician use in the e-mail settings configuration on a smartphone if the user wants to synchronize e-mail from multiple devices?
(Multiple Choice)
4.8/5
(38)
Which of the following is a feature that allows the operating system to see logical processor cores as physical processors?
(Multiple Choice)
4.8/5
(30)
A technician knows that a network is experiencing packet loss and needs to verify where along the network path this is occurring.Which of the following utilities should the technician use?
(Multiple Choice)
4.9/5
(31)
A malicious attacker decides that he is going to try to compromise the account of the CEO of a company by calling him up on the phone,pretending to be a vendor,and gain access to the company's payment information.What type of attack is this?
(Multiple Choice)
4.9/5
(33)
Showing 141 - 160 of 361
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)