Which of the following commands can be used in Windows XP to modify when the CHKDSK command runs?
Which of the following commands can be used in Windows XP to modify when the CHKDSK
command runs?
Which of the following will allow only known workstations to connect to the SOHO router?
A user gets a warning from their ISP about illegally downloading copyrighted movies. The user insists
that they did not download any movies and calls a technician to implement stronger small office
home office (SOHO) security. Which of the following will allow only known workstations to connect
to the SOHO router?
Which of the following would the technician implement on the SOHO router to prevent the broadcast?
A technician is installing a webcam in a nursery for a user to monitor their baby. The user wants to
ensure that the webcam is not broadcasting externally. Which of the following would the technician
implement on the SOHO router to prevent the broadcast?
Which of the following is the MOST secure option that a technician could implement to resolve this issue?
A user installed a new SOHO router and new wireless NICs to increase their transmission speed from
802.11b to 802.11g with the manufacturer’s default settings. The user lives in an apartment building
and is still experiencing slowness to the Internet after the installations. Which of the following is the
MOST secure option that a technician could implement to resolve this issue?
Which of the following can be implemented?
A user wants to prevent access to specific websites to prevent their children from accidently
accessing them. Which of the following can be implemented?
Which of the following is the MOST likely cause of the issue?
A technician has upgraded an internal WiFi card on a laptop and now the signal power to connect to
a WAP is low. Which of the following is the MOST likely cause of the issue?
which of the following applications?
A custom configured PC with a powerful processor, high-end video, upgraded audio, and increased
cooling would be MOST suited to which of the following applications?
which of the following is true?
When comparing laptops and tablet PCs which of the following is true?
Which of the following is the MOST secure method, short of physical destruction, that would be used to ensure
Which of the following is the MOST secure method, short of physical destruction, that would be used
to ensure that data on a hard drive cannot be recovered?
Which of the following actions would BEST ensure that there is no unauthorized access to the switch?
A user will be installing a switch in a public location and will allow the six users in the office to
connect to it with CAT6 Ethernet. Which of the following actions would BEST ensure that there is no
unauthorized access to the switch?