Which of the following Microsoft technologies allows for file replication between servers?
Which of the following Microsoft technologies allows for file replication between servers?
Which encryption method is compatible with the previous deployed access points?
The current wireless infrastructure has just deployed new wireless access points. WPA 2 is the
security policy. Which encryption method is compatible with the previous deployed access
points?
Which of the following is MOST likely the cause of the problem?
A user reports that a local ink jet printer is not printing. The user has a signed driver, the printers
hardware is working, ink is full, print heads are clean, and the printer is connected correctly via
USB. The print queue has 20 documents waiting for the printer. Which of the following is MOST
likely the cause of the problem?
Which of the following RAM types does a laptop use?
Which of the following RAM types does a laptop use?
Which of the following activity logs should you check?
You are a technician at Certkiller .com’s security department. You have been asked to document
all accounts that has successfully logged in to a workstation the last few weeks. Which of the
following activity logs should you check?
Choose the scheme or system used by PGP (Pretty Good Privacy) to encrypt data.
Choose the scheme or system used by PGP (Pretty Good Privacy) to encrypt data.
Which of the following networks is described in this scenario?
Three locations in the same company are connected with routers to a private T-1 point-to-point
line. The sites have their own dedicated private subnets but can route to each other. Which of the
following networks is described in this scenario?
Which of the following must you do before you can boot from a bootable CD ROM?
Which of the following must you do before you can boot from a bootable CD ROM?
Which TWO commands can be used to display a swap usage summary?
The swap usage on a system needs to be checked. Which TWO commands can be used to
display a swap usage summary?
Which of the following tools would be used to decompose a project?
Which of the following tools would be used to decompose a project?