Exam 14: Comptia Asp

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

You just installed a Linux distro on your machine, specifically Fedora 21. You want to manage some installed applications packages on your machine. Which Fedora package management utility should you use?

Free
(Multiple Choice)
4.7/5
(37)
Correct Answer:
Verified

A

Which of the following is a feature of Asymmetric cryptography?

Free
(Multiple Choice)
4.9/5
(47)
Correct Answer:
Verified

A

Channels allow for communication to travel from one computer to another. What channel type divides communication channels into individual and independent channels?

Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
Verified

D

Which of the following situations would incline you to use a vulnerability scanner?

(Multiple Choice)
4.8/5
(30)

Which of the following organizations regularly issues ethics-related statements concerning the use of the Internet?

(Multiple Choice)
4.8/5
(33)

What is a single link that is pre-established for the purposes of WAN communications between two destinations?

(Multiple Choice)
4.7/5
(44)

Which method(s) of risk analysis have both pros and cons attached?

(Multiple Choice)
4.9/5
(31)

A customer complains that at times, their phone signal suddenly drops or beocmes weak. Which of the following could be the problem?

(Multiple Choice)
4.8/5
(47)

In Windows 8/8.1, which keyboard shortcut combination summons the Charms Bar?

(Multiple Choice)
4.9/5
(35)

Sam was in a building that caught on fire where the fire suppression method is bad for many types of life. What type of method was being used?

(Multiple Choice)
4.9/5
(36)

Volmetric intrusion detection systems are photoelectric, acoustical-seismic, ultrasonic, and microwave. Which can only be used in windowless rooms?

(Multiple Choice)
4.8/5
(49)

Which of these malicious agents are capable of distributing themselves without the use of a host file?

(Multiple Choice)
4.9/5
(36)

A customer complains that their mobile device screen is very dim. As the technician, which course of action should you do first?

(Multiple Choice)
4.9/5
(32)

A customer complains that their touch screen is working but the response is inaccurate. Which common resolution should be performed to help troubleshoot the problem?

(Multiple Choice)
4.7/5
(41)

You have entered information in the database. It has been changed and is reflected in the database. What has been done?

(Multiple Choice)
4.9/5
(37)

You have a computer running on Linux. You currently don't have a GUI app for backing up files. You want to schedule a backup using a command line backup utility, which creates an archive of specified files. Which command should you use to accomplish your task?

(Multiple Choice)
4.8/5
(36)

A customer finds that their phone's touch screen is not responsive. Which of the following could be the reason?

(Multiple Choice)
4.8/5
(35)

Software development methods provide software developers and vendor guidelines for program creation. What software development method is generally implemented in scenarios requiring rapid adaptations to changing client requirements?

(Multiple Choice)
4.9/5
(35)

David is a Security Administrator at his organization. He is trying to prevent unauthorized access of the corporate wireless network by people passing by. What kind of wireless network threat is he trying to curb?

(Multiple Choice)
4.8/5
(45)

Which of the following access control models uses a subject and object label?

(Multiple Choice)
4.8/5
(33)
Showing 1 - 20 of 60
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)