Which of the following types of batteries provides the longest running time for portable devices?
Which of the following types of batteries provides the longest running time for portable devices?
Which of the following are advantages of using Dynamic Host Configuration Protocol?
Which of the following are advantages of using Dynamic Host Configuration Protocol? (Select
TWO).
What should the technician do?
A Certkiller .com technician installs Service Pack 2 on a Windows XP computer. He then starts a
network service but discovers that service cannot communicate with the server. What should the
technician do?
What must you include in the SLA to achieve this objective?
You work as the security administrator at Certpaper .com. You are defining a SLA (Service Level
Agreement). You want to ensure the availability of server based resources over guaranteed server
performance levels.
What must you include in the SLA to achieve this objective?
which advantage over non-ECC memory?
ECC memory offers which advantage over non-ECC memory?
Which of the following should you advice the user to do FIRST?
You are working as a technician at Certkiller .com. All Certkiller .com’s computers run Windows
XP. A user calls you to ask how he should disconnect his external USB hard drive. Which of the
following should you advice the user to do FIRST?
Which action should the engineer take to enable the SECOND processor?
An engineer installs an SMP (Symmetrical Multi-Processing)-compliant network operating system
on a dual-processor server. The BIOS detects two processors, but only one processor is
recognized by the network operating system. Which action should the engineer take to enable the
SECOND processor?
CORRECT TEXT To exclude all log messages of a given logging facility, you should use a logging priority of _
CORRECT TEXT
To exclude all log messages of a given logging facility, you should use a logging priority of _____ .
Which two RAID types use parity for data protection?
Which two RAID types use parity for data protection? (Choose two.)
Which of the following statements regarding access control models is FALSE?
Which of the following statements regarding access control models is FALSE?