Which of the following wireless technologies is primarily setup for video/audio and the frequency is 5 GHz?
Which of the following wireless technologies is primarily setup for video/audio and the frequency is
5 GHz?
Which of the following should be implemented during the authorization stage?
A technician wants to implement a dual factor authentication system that will enable the
organization to authorize access to sensitive systems on a need-to-know basis. Which of the
following should be implemented during the authorization stage?
Which of the following will MOST likely resolve the issue?
After installing a new printer the organization determines that there are problems printing images
and very large files. Which of the following will MOST likely resolve the issue?
which of the following?
On an ATX motherboard, the 4-pin auxiliary power connector provides which of the following?
Which of the following can the researcher do to determine if the file is malicious in nature?
A security researcher wants to reverse engineer an executable file to determine if it is
malicious. The file was found on an underused server and appears to contain a zero-day
exploit. Which of the following can the researcher do to determine if the file is malicious in
nature?
Which of the following command line tools will terminate a non-system process without restarting the computer?
Which of the following command line tools will terminate a non-system process without restarting
the computer?
what needs to be changed to correct this issue?
Joe, a user, has installed a new monitor on an existing system. Joe calls a support technician and
reports that everything on the new display is fuzzy. Which of the following describes what needs to
be changed to correct this issue?
Which of the following would BEST describe this type of attack?
A recent spike in virus detections has been attributed to end-users visiting
www.compnay.com. The business has an established relationship with an organization using
the URL of www.company.com but not with the site that has been causing the infections.
Which of the following would BEST describe this type of attack?
Which of the following can the technician do to quickly fix the problem?
After accidentally removing a hard drive from a server with three drives in a RAID 5 configuration, a
technician notices the server locks up and shuts down. Which of the following can the technician do
to quickly fix the problem?
Which of the following could be the issue?
Joe, a home user, reports that on occasion he cannot print from his laptop to his wireless printer.
The problem seems to occur only when Joe is at one end of his home. A technician checks the signal
strength of the laptop in that location and finds it to be good. The technician notes that Joe’s router
is using the default SSID with no encryption. Which of the following could be the issue?