Which of the following ports does Windows firewall open by default for Remote Desktop to work?
Which of the following ports does Windows firewall open by default for Remote Desktop to work?
Which of the following is used to attach a RJ-45 connector to a Cat5 cable?
Which of the following is used to attach a RJ-45 connector to a Cat5 cable?
Which of the following is the MOST efficient way to force a large number of users to change their passwords on
Which of the following is the MOST efficient way to force a large number of users to change their
passwords on logon?
Which of the following would allow a company to conserve energy and still provide a functional service to its
Which of the following would allow a company to conserve energy and still provide a functional
service to its employees?
Which of the following devices transmits data to all ports regardless of final destination?
Which of the following devices transmits data to all ports regardless of final destination?
Which of the following could you use to retrieve the screw?
You are working as a technician at Certkiller .com. You by accident drop a screw on the
motherboard of a computer that you are upgrading. Which of the following could you use to
retrieve the screw?
Which of the following should be checked FIRST?
A failover SQL server attempts to take over for a primary SQL server that continues to function
normally, causing an IP address conflict. Which of the following should be checked FIRST?
Which of the following programs is typically used to query installed debian packages?
Which of the following programs is typically used to query installed debian packages? (Please
select TWO that apply).
Which three benefits result from migrating to dual fabrics with full mesh topologies?
The SAN audit reports that there is a single fabric in a full mesh topology. Which three benefits
result from migrating to dual fabrics with full mesh topologies? (Choose three.)
Which item best describes an instance where a biometric system identifies legitimate users as being unauthoriz
Which item best describes an instance where a biometric system identifies legitimate users as
being unauthorized?