what software is listening on that port?
An application is using port 2000 on a PC. Which of the following could an administrator do to
determine what software is listening on that port?
Which of the following MUST be performed when installing a PCI sound card for use instead of the onboard sound
Which of the following MUST be performed when installing a PCI sound card for use instead of the
onboard sound?
Which of the following is a Class A IP address?
Which of the following is a Class A IP address?
Which of the following can result in significant administrative overhead from incorrect reporting?
Which of the following can result in significant administrative overhead from incorrect
reporting?
Which of the following is a benefit of the work breakdown structure (WBS)?
Which of the following is a benefit of the work breakdown structure (WBS)?
Which of the following is the BEST means of ensuring resource utilization remains even across the hosts?
Which of the following is the BEST means of ensuring resource utilization remains even across the
hosts?
Which of the following is the MAXIMUM number of primary partitions that can be created on a hard drive with FA
Which of the following is the MAXIMUM number of primary partitions that can be created on a hard
drive with FAT32?
Which of the following can the Network Administrator use to determine the amount of bandwidth used by type of
A large company has experienced Internet slowdowns as users have increased their use of the
Internet. Which of the following can the Network Administrator use to determine the amount of
bandwidth used by type of application?
Which of the following hard drive types would be considered the MOST likely to survive a fall?
Which of the following hard drive types would be considered the MOST likely to survive a fall?
Which of the following would allow the security administrator to test the lack of security controls for those
A security administrator wants to perform routine tests on the network during working hours
when certain applications are being accessed by the most people. Which of the following
would allow the security administrator to test the lack of security controls for those
applications with the least impact to the system?