Exam 14: Comptia Asp
Exam 1: Hardware60 Questions
Exam 2: Laptops17 Questions
Exam 3: Networking154 Questions
Exam 4: Printers17 Questions
Exam 5: Procedures36 Questions
Exam 6: Other Operating Systems and Technologies201 Questions
Exam 7: Mobile-Devices28 Questions
Exam 8: Operating-Systems63 Questions
Exam 9: Security30 Questions
Exam 10: Troubleshooting59 Questions
Exam 11: Access-Identity22 Questions
Exam 12: Apps - Data - Host15 Questions
Exam 13: Compliance-Op19 Questions
Exam 14: Comptia Asp60 Questions
Exam 15: Concepts37 Questions
Exam 16: Cryptography17 Questions
Exam 17: Dhti114 Questions
Exam 18: Enrolled-Agent40 Questions
Exam 19: Essentials129 Questions
Exam 20: Install Configure16 Questions
Exam 21: Linux106 Questions
Exam 22: Management58 Questions
Exam 23: Media Topologies57 Questions
Exam 24: Network16 Questions
Exam 25: Other-Operating-Systems-And-Technologies7 Questions
Exam 26: Server98 Questions
Exam 27: Software-Troubleshooting2 Questions
Exam 28: Threats36 Questions
Select questions type
You just installed a Linux distro on your machine, specifically Fedora 21. You want to manage some installed applications packages on your machine. Which Fedora package management utility should you use?
Free
(Multiple Choice)
4.7/5
(37)
Correct Answer:
A
Which of the following is a feature of Asymmetric cryptography?
Free
(Multiple Choice)
4.9/5
(47)
Correct Answer:
A
Channels allow for communication to travel from one computer to another. What channel type divides communication channels into individual and independent channels?
Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
D
Which of the following situations would incline you to use a vulnerability scanner?
(Multiple Choice)
4.8/5
(30)
Which of the following organizations regularly issues ethics-related statements concerning the use of the Internet?
(Multiple Choice)
4.8/5
(33)
What is a single link that is pre-established for the purposes of WAN communications between two destinations?
(Multiple Choice)
4.7/5
(44)
Which method(s) of risk analysis have both pros and cons attached?
(Multiple Choice)
4.9/5
(31)
A customer complains that at times, their phone signal suddenly drops or beocmes weak. Which of the following could be the problem?
(Multiple Choice)
4.8/5
(47)
In Windows 8/8.1, which keyboard shortcut combination summons the Charms Bar?
(Multiple Choice)
4.9/5
(35)
Sam was in a building that caught on fire where the fire suppression method is bad for many types of life. What type of method was being used?
(Multiple Choice)
4.9/5
(36)
Volmetric intrusion detection systems are photoelectric, acoustical-seismic, ultrasonic, and microwave. Which can only be used in windowless rooms?
(Multiple Choice)
4.8/5
(49)
Which of these malicious agents are capable of distributing themselves without the use of a host file?
(Multiple Choice)
4.9/5
(36)
A customer complains that their mobile device screen is very dim. As the technician, which course of action should you do first?
(Multiple Choice)
4.9/5
(32)
A customer complains that their touch screen is working but the response is inaccurate. Which common resolution should be performed to help troubleshoot the problem?
(Multiple Choice)
4.7/5
(41)
You have entered information in the database. It has been changed and is reflected in the database. What has been done?
(Multiple Choice)
4.9/5
(37)
You have a computer running on Linux. You currently don't have a GUI app for backing up files. You want to schedule a backup using a command line backup utility, which creates an archive of specified files. Which command should you use to accomplish your task?
(Multiple Choice)
4.8/5
(36)
A customer finds that their phone's touch screen is not responsive. Which of the following could be the reason?
(Multiple Choice)
4.8/5
(35)
Software development methods provide software developers and vendor guidelines for program creation. What software development method is generally implemented in scenarios requiring rapid adaptations to changing client requirements?
(Multiple Choice)
4.9/5
(35)
David is a Security Administrator at his organization. He is trying to prevent unauthorized access of the corporate wireless network by people passing by. What kind of wireless network threat is he trying to curb?
(Multiple Choice)
4.8/5
(45)
Which of the following access control models uses a subject and object label?
(Multiple Choice)
4.8/5
(33)
Showing 1 - 20 of 60
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)