Which of the following is considered a method of physical security?
Which of the following is considered a method of physical security?
Which of the following applies?
A user is operating a virtual machine (VM) and discovers it has been infected with malware. Which of
the following applies?
Which of the following ports MUST be open in order for Remote Desktop to function?
Which of the following ports MUST be open in order for Remote Desktop to function?
The technician could solve this issue by:
A technician is dispatched to a location that has multiple laser printers. One of the network printers
is printing what appears to be a shadow image. The technician could solve this issue by:
Which of the following options can be selected from the Windows Update website?
A user wants to quickly install the most recent security patch released. Which of the following
options can be selected from the Windows Update website?
Which of the following has the HIGHEST level rights?
Which of the following has the HIGHEST level rights?
Which of the following allows a user to reset their password with a series of security questions that only the
Which of the following allows a user to reset their password with a series of security questions that
only the user should know?
Which of the following information does the technician need?
A technician needs to configure their neighbor’s iPad. The neighbor wants to access their work
email. The technician requires some information from their neighbor’s work IT department. Which
of the following information does the technician need?
Which of the following is an advantage of a virtual machine hosted on a PC?
Which of the following is an advantage of a virtual machine hosted on a PC?
which of the following would ensure all data was captured?
When scheduling a backup for preventative maintenance, which of the following would ensure all
data was captured?