The technician should:
A customer recently purchased a new computer and has been experiencing trouble. The customer
is on the telephone with a technician for the fourth time and is frustrated by the number of
problems with the computer. The technician should:
Which of the following is the MOST effective means for a technician to prevent ESD damage when installing RAM?
Which of the following is the MOST effective means for a technician to prevent ESD damage when
installing RAM?
Which of the following would be an advantage for using PKI over a key server system?
Which of the following would be an advantage for using PKI over a key server system?
Which of the following is the Green Grid?
Which of the following is the Green Grid?
A "Frankenstein?
A “Frankenstein?test server is being built from the used parts bin at your company. All component
functionality is questionable. Which of the following is the BEST way to proceed?
What is corresponding device name on a Linux system?
In GRUB’S configuration file you find the line root (hd1,4)
What is corresponding device name on a Linux system?
What is table routing?
A customer has a SAS-based storage environment with a SAS domain and some standalone
servers, each with multiple built-in SAS disks. The implementation includes direct routing, table
routing and subtractive routing. What is table routing?
Which of the following roles should you create?
You work as the network administrator at certways .com. The certways .com network uses the
RBAC (Role Based Access Control) model. You must plan the security strategy for users to
access resources on the certways .com network. The types of resources you must control access
to are mailboxes, and files and printers. Certways.com is divided into distinct departments and
functions named Finance, Sales, Research and Development, and Production respectively. Each
user has its own workstation, and accesses resources based on the department wherein he/she
works. You must determine which roles to create to support the RBAC (Role Based Access
Control) model. Which of the following roles should you create?
What can cause the Gigabit Ethernet to become the bottleneck in this backup environment?
Who has the MOST control over project scope changes?
Who has the MOST control over project scope changes?