Exam 14: Comptia Asp

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What are mandatory activities, actions, or rules?

(Multiple Choice)
4.7/5
(33)

Security is one of the most important issues an organization must discuss. Mitch wants security that is built into an application. Why would this be a problem?

(Multiple Choice)
4.9/5
(38)

A user has an old tablet that uses NiMH battery. The battery was working fine until lately, where it drains quicker even with minimal usage. The user explains that there are times when they performed partial recharges. You advised the user to replace the battery. Of the following, which term best describes this power drain issue?

(Multiple Choice)
4.7/5
(35)

You want to install 64 bit version of Windows 8.1 on your machine. Your machine currently have the following specs: Processor: 3 GHz with support for PAE, NX, and SSE2 RAM: 1GB Hard disk space: 16GB Graphics Card: DirectX 10 Video Card Which components should you upgrade first to achieve proper functionality? (Choose two.)

(Multiple Choice)
4.8/5
(30)

Which windows 8 and 8.1 feature allows you to synchronize files in the cloud?

(Multiple Choice)
4.7/5
(38)

John is in charge of setting up an infrastructure which includes flammable liquids. Which of the following Fire extinguisher types should he use in case of a fire emergency?

(Multiple Choice)
4.9/5
(39)

John wants to measure the network utilization factor of his network, that is, the ratio of current network traffic to the maximum traffic that a port can handle. Which of the following should he use?

(Multiple Choice)
4.9/5
(37)

David is a security administrator at his organization. He is trying to prevent unauthorized access to the corporate wireless network by people loafing around the office. What kind of wireless network threat is he trying to curb?

(Multiple Choice)
4.8/5
(35)

You just purchased a mobile device. You want to synchronize your photos and music to your desktop computer running Windows 7. However, after plugging in the USB cable, you received an error stating that the device driver was not successfully installed. Which Windows system tools should you use to troubleshoot the error?

(Multiple Choice)
4.7/5
(37)

What item below is not associated with Session Initiation Protocol (SIP)?

(Multiple Choice)
4.8/5
(33)

You own a phone with private data stored. You want to be able to secure by erasing the private data in case you lose your phone. Which of the following methods should be implemented?

(Multiple Choice)
5.0/5
(40)

You are the systems administrator for your company. You want to implement a WAN bandwidth optimization technology in order to improve end user productivity and network performance for client computers that are running windows 8 Enterprise. Which feature will allow you to do this?

(Multiple Choice)
4.8/5
(41)

Which Linux command should you use if you want to view or set the TCP/IP properties of wired network connections?

(Multiple Choice)
4.8/5
(34)

A user complains that his phone data transmission is always over the limit even when they use the phone to browse and do stuff on the internet at his house through wireless connection. Which of the following actions should be done to prevent/fix the issue?

(Multiple Choice)
4.7/5
(25)

Database models define the relationship between different data elements, dictate how data can be accessed and define acceptable operations, the type of integrity offered, and how the data is organized. What type of database uses attributes and tuples to contain and organize information?

(Multiple Choice)
4.8/5
(38)

What provides for fault tolerance and higher performance when databases are clustered?

(Multiple Choice)
4.8/5
(49)

What security feature on android devices running OS version 5 or later, allows users to use facial recognition, voice, or trusted places to unlock the device screen?

(Multiple Choice)
4.9/5
(38)

Which of the following is a term used to define a collection of software robots-or bots-that run autonomously and automatically and may harm your computer?

(Multiple Choice)
4.9/5
(38)

John is a Network Security Administrator at his organization. The company plans to establish secure connections between the company's headquarters and branch offices. Which of the following protocols should be used to configure the router?

(Multiple Choice)
4.7/5
(44)

Networks have different types of topologies. Which topology is a single cable running the entire length of the network?

(Multiple Choice)
4.9/5
(30)
Showing 41 - 60 of 60
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)