Which of the following wireless security protocols supports the use of a 40-bit encryption key?

Which of the following wireless security protocols supports the use of a 40-bit encryption key?A . TKIPB . WEPC . WPAD . WPA2View AnswerAnswer: B

June 6, 2021 No Comments READ MORE +

Which of the following should the technician use to remove the excess dust and dirt?

A user brings in a home desktop computer for cleaning. Upon opening the computer, a technician finds large amounts of dust and dirt inside. Which of the following should the technician use to remove the excess dust and dirt?A . A brushB . A vacuumC . Compressed airD . A...

June 6, 2021 No Comments READ MORE +

Which of the following commands would BEST accomplish this?

A Linux user wants to use the grep command to identify every file name in the current directory that contains the word "mandatory. Which of the following commands would BEST accomplish this?A . grep -d mandatory *B . grep -i mandatory *C . grep mandatory fileD . grep mandatory *View...

June 6, 2021 No Comments READ MORE +

Which of the following is the BEST solution for the technician to recommend?

An office building lost power, and the generator started up. Users on several floors have reported their machines will not start, even though the generator is running. A technician works to divert power from other floors until all users are able to work. Which of the following is the BEST...

June 6, 2021 No Comments READ MORE +

Which of the following security concepts can be overcome through social engineering? (Select TWO)

Which of the following security concepts can be overcome through social engineering? (Select TWO)A . Port blockingB . Strong passwordsC . FirewallsD . MAC filteringE . Email attachment filteringF . Antivirus updatesView AnswerAnswer: B,E

June 6, 2021 No Comments READ MORE +

Which of the following are the FIRST steps a technician should take to identify and resolve the issue?

A home user reports slow computer performance and application crashes after clicking a "repair" button on a pop-up warning while browsing the Internet. Which of the following are the FIRST steps a technician should take to identify and resolve the issue? (Select TWO).A . Perform a system file check and...

June 6, 2021 No Comments READ MORE +

Which of the following is MOST likely causing the wireless issues?

Several mobile users are reporting issues connecting to the WLAN within a warehouse. A technician tests wireless connectivity in the lobby and is able to connect successfully. Mobile users can connect to the Internet using cellular service, but they cannot access any internal resources on the WLAN. The technician received...

June 5, 2021 No Comments READ MORE +

Which of the following is the MOST likely cause of the issue?

A user calls a technician regarding an iOS mobile device that is having problems with standby time after a new update was applied. The technician verifies no new applications were installed since the update, but the device still has poor standby time even after the update is removed. Which of...

June 5, 2021 No Comments READ MORE +

II the technician finds vulnerable systems, which of the following is the BEST method to remove the Keylogger?

A technician receives a security alert stating a vendor has left a Keylogger on certain systems that shipped configured from the factory. The technician needs to research the system model numbers to determine if any production computers are affected. II the technician finds vulnerable systems, which of the following is...

June 5, 2021 No Comments READ MORE +

Which of the following would be the MOST appropriate to include?

A technician is creating a network topology diagram. Which of the following would be the MOST appropriate to include? (Select TWO)A . A list of network addresses for each deviceB . A list of the ports on each device and what they are connected toC . Technical specifications and performance...

June 5, 2021 No Comments READ MORE +