Which of the following should the installation technician perform to increase the security of the wireless network?

A wireless access point is going to be configured in a small office located in a crowded building. Which of the following should the installation technician perform to increase the security of the wireless network? (Choose two.)A . Reduce the transmit powerB . Reduce the channel availablyC . Disable the...

August 10, 2020 No Comments READ MORE +

Which of the following should the technician do to resolve the problem?

A technician is installing Windows 7 64-bit OS on a VM but keeps getting errors. The specifications for the machine are: - Two 1GHz CPUs - 2GB of memory - 15GB hard drive - 800 × 600 screen resolution Which of the following should the technician do to resolve the...

August 9, 2020 No Comments READ MORE +

Which of the following should the technician do FIRST?

A technician arrives on site to find that two users who have the same model on Android smartphone are having the same issue with a specific application. Whenever they attempt to launch the application, it fails and gives an error message. Which of the following should the technician do FIRST?A...

August 9, 2020 No Comments READ MORE +

Which of the following will provide the ability to access these devices?

A company has hired a new IT firm to manage its network switches and routers. The firm is geographically separated from the company and will need to able to securely access the devices. Which of the following will provide the ability to access these devices?A . TelnetB . SSHC ....

August 9, 2020 No Comments READ MORE +

Which of the following is the FIRST option to check?

A technician is running updates on a Windows PC. Some of the updates install properly, while others appear as failed. While troubleshooting, the technician restarts the PC and attempts to install the failed updates again. The updates continue to fail. Which of the following is the FIRST option to check?A...

August 9, 2020 No Comments READ MORE +

With which of the following types is a man-in-the-middle attack associated?

With which of the following types is a man-in-the-middle attack associated?A . Brute forceB . SpoofingC . DDoSD . Zero-dayView AnswerAnswer: B

August 9, 2020 No Comments READ MORE +

Which of the following settings should the administrator modify to increase server security?

An administrator is setting up a Windows terminal server. Which of the following settings should the administrator modify to increase server security? (Choose two.)A . Change the default access portB . Enforce password complexityC . Put the terminal server into the router’s DMZD . Disable logon time restrictionsE . Block...

August 8, 2020 No Comments READ MORE +

Which of the following security methods BEST describes when a user enters a username and password once for multiple applications?

Which of the following security methods BEST describes when a user enters a username and password once for multiple applications?A . SSOB . Permission propagationC . InheritanceD . MFAView AnswerAnswer: A

August 7, 2020 No Comments READ MORE +

Which of the following would explain why Joe cannot access his personal shares?

Joe, an employee, took a company-issued Windows laptop home, but is having trouble connecting to any of the shares hosted on his home media server. Joe has verified he is connected to the Internet. Which of the following would explain why Joe cannot access his personal shares?A . An IP...

August 7, 2020 No Comments READ MORE +

Which of the following actions should the user take?

An end user is browsing the Internet when multiple browser pages open by themselves. The user notices the PC is running slowly, even while not browsing the Internet. Which of the following actions should the user take?A . Update antivirus definitionsB . Install anti-malware softwareC . Enable the pop-up blockerD...

August 7, 2020 No Comments READ MORE +