Which of the following should be removed prior to replacing or upgrading memory in a laptop?
Which of the following should be removed prior to replacing or upgrading memory in a
laptop?
Which of the following identifies traffic based upon its physical network address?
Which of the following identifies traffic based upon its physical network address?
Which of the following is the MOST important component for this type of build?
Ann, a technician, is tasked with building a workstation that can host multiple virtual
environments. Which of the following is the MOST important component for this type of
build?
Which of the following should be implemented?
A technician must secure company documents from accidental disclosure. Which of the
following should be implemented? (Select TWO).
Which of the following network devices has the capability to provide power to devices attached to it?
Which of the following network devices has the capability to provide power to devices
attached to it?
Which of the following is TRUE about the difference between a worm and a virus?
Which of the following is TRUE about the difference between a worm and a virus?
Which of the following would prevent this from happening in the future?
A user has been reported for storing prohibited material on a company owned PC. The
accused user is notified and an investigation is launched. However, no evidence is found
and it is believed that the user was able to delete all relevant evidence. Which of the
following would prevent this from happening in the future?
Which of the following should the technician perform NEXT to improve the security of the SOHO network?
A technician is tasked with improving the security of a SOHO network. The office is
comprised of a single wireless router located under the front desk where the office manager
sits. All desktop computers are wired into the router which is configured with strong device
credentials. Additionally, wireless is disabled on the router. Which of the following should the
technician perform NEXT to improve the security of the SOHO network?
Which of the following connector types is MOST likely to be used with fiber connections?
Which of the following connector types is MOST likely to be used with fiber connections?
Which of the following should be done to attempt to remove the offending malware?
After several passes with a malware removal program, the program keeps detecting the
same malware infection after a reboot. Which of the following should be done to attempt to
remove the offending malware?