Exam 6: Other Operating Systems and Technologies
Exam 1: Hardware60 Questions
Exam 2: Laptops17 Questions
Exam 3: Networking154 Questions
Exam 4: Printers17 Questions
Exam 5: Procedures36 Questions
Exam 6: Other Operating Systems and Technologies201 Questions
Exam 7: Mobile-Devices28 Questions
Exam 8: Operating-Systems63 Questions
Exam 9: Security30 Questions
Exam 10: Troubleshooting59 Questions
Exam 11: Access-Identity22 Questions
Exam 12: Apps - Data - Host15 Questions
Exam 13: Compliance-Op19 Questions
Exam 14: Comptia Asp60 Questions
Exam 15: Concepts37 Questions
Exam 16: Cryptography17 Questions
Exam 17: Dhti114 Questions
Exam 18: Enrolled-Agent40 Questions
Exam 19: Essentials129 Questions
Exam 20: Install Configure16 Questions
Exam 21: Linux106 Questions
Exam 22: Management58 Questions
Exam 23: Media Topologies57 Questions
Exam 24: Network16 Questions
Exam 25: Other-Operating-Systems-And-Technologies7 Questions
Exam 26: Server98 Questions
Exam 27: Software-Troubleshooting2 Questions
Exam 28: Threats36 Questions
Select questions type
David wants to use the most secure form of authentication at his office. Which of the following should he use?
(Multiple Choice)
4.8/5
(30)
Which of the following components on the motherboard usually houses the IDE connectors?
(Multiple Choice)
4.8/5
(38)
While testing a laser printer you notice ghosted images of an object are repeated several times on the prints. What is the likely problem and solution?
(Multiple Choice)
4.8/5
(28)
John is complaining that his contacts are receiving continuous e-mails sent from his ID without his intervention. Which of the following could have caused this?
(Multiple Choice)
5.0/5
(45)
Which of the following network utilities can be used to confirm that a computer can reach the default gateway IP address?
(Multiple Choice)
4.9/5
(43)
You work in IT support for your organization. Your co-worker, Jane complains that although she is able to access Jack's computer, she is not able to make any changes to the Word document in Jack's shared folder. Which of the following could fix this issue?
(Multiple Choice)
4.8/5
(32)
Jill is trying to install an antivirus on her computer. In spite of repeated attempts she is not able to install the antivirus software. What could be the most likely problem?
(Multiple Choice)
4.7/5
(40)
Which of the following issues/errors would cause the system to hang or lock up, mostly when the system is about to boot?
(Multiple Choice)
4.9/5
(38)
A page jams in the printer that is locally attached to your printer. You see the paper jam in the front of the printer and manually remove it. However, the paper jam message continues to display. What are two options?
(Multiple Choice)
4.8/5
(44)
You have a permanent connection to the internet. Your local network includes a web server and an SMTP server. You are concerned about hacking, so you set up port filtering on your network. Your local SMTP server has stopped sending or receiving messages through the internet, but your users can still access local and internet sites. What could be the possible cause?
(Multiple Choice)
4.8/5
(30)
Which of the following languages draws and formats the page and sends it to the printer in the ready-to-print form?
(Multiple Choice)
4.9/5
(32)
A global service agent will be conducting several international trips and is concerned about damaging her laptop using foreign electrical sockets. What can she do?
(Multiple Choice)
4.9/5
(37)
You suspect one of the routers in the network is slowing the system by creating a bottleneck. You decide to use the tracert command between your computer and another computer in the office to see how many "hops" it takes to reach the host. You'll review the response time for each device along the route (in milliseconds) and you only want to see the IP address of each device, not resolve the hostnames. If the IP address of the destination host was 1.2.3.4, which is the correct command?
(Multiple Choice)
4.8/5
(34)
David is the Security Advisor at his organization. He is predicting a rapid growth in the number of systems connecting to the corporate network. He wants toto hide segments of the network from other segments and thereby control access to data on the network. Which of the following should he implement?
(Multiple Choice)
4.8/5
(33)
Which authentication methodmakes use of hand scanners, fingerprints, retinal scanners, or DNA structure to identify the user.
(Multiple Choice)
4.8/5
(36)
A new network printer installed in the reception area isn't printing. You confirm the printer is online and is not displaying error messages. You ping the printer from one of the PCs in the office and receive the message "Request timed out." You can ping other printers online and the host on the Internet. What can you do? Choose two.
(Multiple Choice)
4.8/5
(31)
To kill a process in Windows 7 from the command line, use which of the following commands?
(Multiple Choice)
4.8/5
(46)
The business accounting unit needs a laptop docking station for a new employee. What types of connections can be used with a docking station and a laptop? Choose all that apply.
(Multiple Choice)
4.8/5
(34)
A user is complaining of a problem with their computer that shows a blue error screen.The display turns blue and diagnostic information is shown. What is the first step for troubleshooting this problem?
(Multiple Choice)
4.9/5
(37)
What happens when shadowing options are enabled on a computer BIOS?
(Multiple Choice)
4.8/5
(35)
Showing 21 - 40 of 201
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)