Which of the following should the project manager do to make the project status meetings more productive?
A project manager notices that status meetings are poorly attended and that one or two team
members try to dominate the meetings. Which of the following should the project manager do to
make the project status meetings more productive? (Select Two).
Which of the following would the administrator implement on the firewall to accomplish this?
An administrator needs to provide remote connectivity to server1, web traffic to server2, and FTP
access to server3 using a single outside IP address. Which of the following would the
administrator implement on the firewall to accomplish this?
Which of the following BEST represents a hardware requirement for building a PC that will specialize in gaming
Which of the following BEST represents a hardware requirement for building a PC that will specialize
in gaming? (Select TWO).
Which of the following risk responses is the project manager using?
A hurricane is forecasted near the corporations call center. The project manager has arranged for
a redundant call center in another location to accept calls if the corporate call center is unable to
receive calls. Which of the following risk responses is the project manager using?
Which of the following tools would the administrator MOST likely use?
An administrator would like to scan for open ports on the subnet and determine if any vulnerable
applications are listening. Which of the following tools would the administrator MOST likely use?
Which of the following BEST represents a hardware requirement for building a PC that will specialize in being
Which of the following BEST represents a hardware requirement for building a PC that will specialize
in being a Home Server? (Select TWO).
Which of the following protocols can be used?
A technician wants to send management information from devices on the network to a central
server and have it encrypted in the process. Which of the following protocols can be used?
Which of the following risk responses is the project manager using?
Several project tasks cannot be completed because local resources are not available. The project
manager has to outsource the work to find qualified resources. Which of the following risk
responses is the project manager using?
An attack used to find unencrypted information in network traffic is called:
An attack used to find unencrypted information in network traffic is called:
what the numbers indicate?
In reference to express card types (e.g. Express Card 34 and Express Card 54), which of the following
BEST describes what the numbers indicate?