remotely?
A small company wants to set up a server that is accessible from the company network as well as the Internet. Which of the following is MOST important to determine before allowing employees to access the server remotely?A . The quality of the computer used to connectB . A security...
Which of the following security concerns is a threat to confidentiality?
Which of the following security concerns is a threat to confidentiality?A . Replay attackB . Denial of serviceC . Service outageD . Dumpster divingView AnswerAnswer: A
Which of the following should the user do to correct this issue?
A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue?A . Ensure both devices are connected to the LAC . Enable task scheduling.D . Reset...
Which of the following troubleshooting steps is the technician using by browsing to the same site?
A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps...
A UPS provides protection against:
A UPS provides protection against:A . denial of serviceB . replay attack.C . power outages.D . wiretapping.View AnswerAnswer: C
Which of the following best describes the technician’s NEXT step?
An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step?A . Restart the computer.B . Contact other users.C . Disconnect the peripherals.D . Document the findings.View AnswerAnswer: D
If the Breakfast program ran on Sunday, which of the following would be the output?
Given the following pseudocode: If the Breakfast program ran on Sunday, which of the following would be the output?A . OatmealB . Bacon and eggsC . WafflesD . PancakesView AnswerAnswer: C
Which of the following software license models allows a developer to modify the original code and release its own version of the application?
Which of the following software license models allows a developer to modify the original code and release its own version of the application?A . Proprietary softwareB . Commercial softwareC . Open source softwareD . Cross-platform softwareView AnswerAnswer: C
Which of the following is primarily a confidentiality concern?
Which of the following is primarily a confidentiality concern?A . EavesdroppingB . ImpersonatingC . DestructingD . AlteringView AnswerAnswer: A
Which of the following actions is the FINAL step in the standard troubleshooting methodology?
Which of the following actions is the FINAL step in the standard troubleshooting methodology?A . Document the solution and cause.B . Create a new theory of cause.C . Research the problem online.D . Implement preventive measures.View AnswerAnswer: A