Which of the following should you do?
You are working as a network technician at Certkiller .com. As you enter a server room you
observe water dripping from the ceiling. Which of the following should you do?
Which of the following describes the function of a switch in a network?
Which of the following describes the function of a switch in a network?
Which of the following should you schedule to run at a regular interval in order to optimize system performanc
You are working as a technician at Certkiller .com. You are asked to see if you can optimize the
performance of the computers in the computer lab. Which of the following should you schedule to
run at a regular interval in order to optimize system performance in the computer lab? (Select
THREE).
Which item below can offer central logging for all devices with message priority levels?
Your company’s network has been extended, and you can’t monitor the network devices
manually.Which item below can offer central logging for all devices with message priority levels?
Which of the following commands is used to partition a hard drive?
Which of the following commands is used to partition a hard drive?
Which of the following should the technician verify FIRST if the customer reports that a laptop battery is not
Which of the following should the technician verify FIRST if the customer reports that a laptop
battery is not charging?
Which of the following actions should you take?
You are working as a technician at Certkiller .com. A customer has requested that you do work
outside the original scope of the work order. Which of the following actions should you take?
Which of the following should you avoid when explaining a technological concept to a customer.
Which of the following should you avoid when explaining a technological concept to a customer.
Which of the following measures would be the MOST effective means of limiting access?
A user wants to secure their home wireless network and allow only certain devices access to the
network. Which of the following measures would be the MOST effective means of limiting access?
Which of the following represents a preventative maintenance measure that ensures a secure and up-to-date oper
Which of the following represents a preventative maintenance measure that ensures a secure and
up-to-date operating system?