Exam 14: Comptia Asp
Exam 1: Hardware60 Questions
Exam 2: Laptops17 Questions
Exam 3: Networking154 Questions
Exam 4: Printers17 Questions
Exam 5: Procedures36 Questions
Exam 6: Other Operating Systems and Technologies201 Questions
Exam 7: Mobile-Devices28 Questions
Exam 8: Operating-Systems63 Questions
Exam 9: Security30 Questions
Exam 10: Troubleshooting59 Questions
Exam 11: Access-Identity22 Questions
Exam 12: Apps - Data - Host15 Questions
Exam 13: Compliance-Op19 Questions
Exam 14: Comptia Asp60 Questions
Exam 15: Concepts37 Questions
Exam 16: Cryptography17 Questions
Exam 17: Dhti114 Questions
Exam 18: Enrolled-Agent40 Questions
Exam 19: Essentials129 Questions
Exam 20: Install Configure16 Questions
Exam 21: Linux106 Questions
Exam 22: Management58 Questions
Exam 23: Media Topologies57 Questions
Exam 24: Network16 Questions
Exam 25: Other-Operating-Systems-And-Technologies7 Questions
Exam 26: Server98 Questions
Exam 27: Software-Troubleshooting2 Questions
Exam 28: Threats36 Questions
Select questions type
Security is one of the most important issues an organization must discuss. Mitch wants security that is built into an application. Why would this be a problem?
(Multiple Choice)
4.9/5
(38)
A user has an old tablet that uses NiMH battery. The battery was working fine until lately, where it drains quicker even with minimal usage. The user explains that there are times when they performed partial recharges. You advised the user to replace the battery. Of the following, which term best describes this power drain issue?
(Multiple Choice)
4.7/5
(35)
You want to install 64 bit version of Windows 8.1 on your machine. Your machine currently have the following specs: Processor: 3 GHz with support for PAE, NX, and SSE2
RAM: 1GB
Hard disk space: 16GB
Graphics Card: DirectX 10 Video Card
Which components should you upgrade first to achieve proper functionality? (Choose two.)
(Multiple Choice)
4.8/5
(30)
Which windows 8 and 8.1 feature allows you to synchronize files in the cloud?
(Multiple Choice)
4.7/5
(38)
John is in charge of setting up an infrastructure which includes flammable liquids. Which of the following Fire extinguisher types should he use in case of a fire emergency?
(Multiple Choice)
4.9/5
(39)
John wants to measure the network utilization factor of his network, that is, the ratio of current network traffic to the maximum traffic that a port can handle. Which of the following should he use?
(Multiple Choice)
4.9/5
(37)
David is a security administrator at his organization. He is trying to prevent unauthorized access to the corporate wireless network by people loafing around the office. What kind of wireless network threat is he trying to curb?
(Multiple Choice)
4.8/5
(35)
You just purchased a mobile device. You want to synchronize your photos and music to your desktop computer running Windows 7. However, after plugging in the USB cable, you received an error stating that the device driver was not successfully installed. Which Windows system tools should you use to troubleshoot the error?
(Multiple Choice)
4.7/5
(37)
What item below is not associated with Session Initiation Protocol (SIP)?
(Multiple Choice)
4.8/5
(33)
You own a phone with private data stored. You want to be able to secure by erasing the private data in case you lose your phone. Which of the following methods should be implemented?
(Multiple Choice)
5.0/5
(40)
You are the systems administrator for your company. You want to implement a WAN bandwidth optimization technology in order to improve end user productivity and network performance for client computers that are running windows 8 Enterprise. Which feature will allow you to do this?
(Multiple Choice)
4.8/5
(41)
Which Linux command should you use if you want to view or set the TCP/IP properties of wired network connections?
(Multiple Choice)
4.8/5
(34)
A user complains that his phone data transmission is always over the limit even when they use the phone to browse and do stuff on the internet at his house through wireless connection. Which of the following actions should be done to prevent/fix the issue?
(Multiple Choice)
4.7/5
(25)
Database models define the relationship between different data elements, dictate how data can be accessed and define acceptable operations, the type of integrity offered, and how the data is organized. What type of database uses attributes and tuples to contain and organize information?
(Multiple Choice)
4.8/5
(38)
What provides for fault tolerance and higher performance when databases are clustered?
(Multiple Choice)
4.8/5
(49)
What security feature on android devices running OS version 5 or later, allows users to use facial recognition, voice, or trusted places to unlock the device screen?
(Multiple Choice)
4.9/5
(38)
Which of the following is a term used to define a collection of software robots-or bots-that run autonomously and automatically and may harm your computer?
(Multiple Choice)
4.9/5
(38)
John is a Network Security Administrator at his organization. The company plans to establish secure connections between the company's headquarters and branch offices. Which of the following protocols should be used to configure the router?
(Multiple Choice)
4.7/5
(44)
Networks have different types of topologies. Which topology is a single cable running the entire length of the network?
(Multiple Choice)
4.9/5
(30)
Showing 41 - 60 of 60
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)