Which of the following would be considered a detrimental effect of a virus hoax?
Which of the following would be considered a detrimental effect of a virus hoax? (Select TWO).
Which of the following should be done when disposing of the old battery?
A user reports that their cell phone battery is dead and cannot hold a charge. Which of the
following should be done when disposing of the old battery?
Which of the following is the functional description of a server connected between two separate IP subnets?
Which of the following is the functional description of a server connected between two separate IP
subnets?
What file should you edit to change the default background for it?
You have just set up the X Display Manager as your default display manager. What file should you
edit to change the default background for it?
What is the cause of the errors?
You are trying to upgrade an existing 1Gb/s FC SAN that is using 62.5 micron multi-mode cable
from a tape library to a server that is 175 meters away to 2Gb/s Fibre Channel. After switching to
the 2Gb/s Fibre Channel equipment, a connection to the server cannot be maintained. When a
connection is made, numerous errors are reported. What is the cause of the errors?
What two (2) technologies are commonly used in a business continuity plan?
What two (2) technologies are commonly used in a business continuity plan? (Choose two.)
Which of the following is the earned value (EV)?
The project cost performance index is 1.2 and the project manager has spent $71,248 dollars to
date. The project is currently 50 percent complete. Which of the following is the earned value
(EV)?
Which of the following BEST explains the security benefit of a standardized server image?
Which of the following BEST explains the security benefit of a standardized server image?
Which of the following memory types is located in the processor chip?
Which of the following memory types is located in the processor chip?
Which of the following can assure the security of data transmission via an IP network?
Which of the following can assure the security of data transmission via an IP network?