Which of the following installation methods will allow a technician to resolve issues that may arise while the installation is being performed?
Which of the following installation methods will allow a technician to resolve issues that may arise while the installation is being performed?A . Unattended installationB . Remote installationC . Repair installationD . Image deployment installationView AnswerAnswer: D
Which of the following is protected data that can be found in a medical record?
Which of the following is protected data that can be found in a medical record?A . PIIB . PHIC . PCID . SPIView AnswerAnswer: B
Which of the following can the technician do to make the laptop faster?
An end user's laptop Is not as fast as when it was first purchased. The user wants it to revert to that point without losing any data. A technician examines the laptop and notices it has a magnetic hard drive. Which of the following can the technician do to make...
Which of the following security settings can be changed on a folder to stop permission propagation and assign new rights?
Which of the following security settings can be changed on a folder to stop permission propagation and assign new rights?A . InheritanceB . OwnershipC . SharingD . EncryptionView AnswerAnswer: A
Which of the following change management practices would MOST likely have prevented this outage?
Ann. a network engineer is performing an after-hours upgrade on a network switch During the activity. Ann notices an unrelated setting she believes is misconfigured She decides to change the setting during the upgrade which causes an outage. Which of the following change management practices would MOST likely have prevented...
Which of the following would be MOST important during this phase of the request process?
A business unit wants to upgrade the current version of its loan processing software. A manager is putting together a change management request and gathering information on the software. Which of the following would be MOST important during this phase of the request process?A . Back-out planB . End-user acceptanceC...
Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows?
Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows?A . 2GBB . 4GBC . 8GBD . 16GBView AnswerAnswer: B
Which of the following policies is needed?
A technology team is creating limits and guidelines for the use of company-provided software, equipment, and Internet access. Which of the following policies is needed?A . Password policyB . Acceptable use policyC . Regulatory policyD . Compliance policyView AnswerAnswer: B
Which of the following would provide the BEST level of protection in this scenario?
Corporate management is concerned about the security of the company’s mobile phones, in the event they are lost or stolen. Management instructs the IT staff to ensure the data on the devices is not accessible by unauthorized users. Which of the following would provide the BEST level of protection in...
Which of the following Windows technologies can tender a file unreadable by anyone other the fole's creator?
Which of the following Windows technologies can tender a file unreadable by anyone other the fole's creator?A . EFSB . DEFC . BitlockerD . NTFSView AnswerAnswer: D