Which of the following would be used to implement wireless security with single sign-on?
A company wants to simplify network authentication for their users. Which of the following would
be used to implement wireless security with single sign-on?
Which of the following is the BEST course of action for the technician to take?
After responding immediately to a dispatch, a technician arrives to resolve the customer’s issue. The
customer appears to be angry that they have waited so long for a response. Which of the following is
the BEST course of action for the technician to take?
Which of the following ports is used by Telnet?
Which of the following ports is used by Telnet?
Which of the following is the CPI of the project?
An ongoing project has a BAC of $450,000, an EV of $110,000 and an AC of $100,000.
Which of the following is the CPI of the project?
Which of the following would be the BEST response from the technician?
A client has asked a technician about drive sanitation and wants to know what the difference is
between overwriting a drive and formatting a drive. Which of the following would be the BEST
response from the technician?
Which of the following BEST describes the user authentication being used?
The company requires all users to authenticate to the network with a smart card, a pin number,
and a fingerprint scan. Which of the following BEST describes the user authentication being used?
Which of the following is the BEST action for the technician to take?
A technician realizes the problem a customer is having before the customer is done explaining all the
symptoms. Which of the following is the BEST action for the technician to take?
Which of the following represents the EV of this project?
In a highway project 5 miles (8 kilometers) out of the total 15 miles (24 kilometers) have been
completed. The BAC is $900,000. Which of the following represents the EV of this project?
Windows Virtual PC is designed to:
Windows Virtual PC is designed to:
Which of the following protocols can be implemented to provide encryption during transmission between email ga
Which of the following protocols can be implemented to provide encryption during transmission
between email gateways?