Which of the following indicates the correct path for mapping a network drive?
A technician would like to map a network drive. Which of the following indicates the correct path
for mapping a network drive?
Which of the following should the technician do NEXT?
A technician servicing a user’s computer notices the user has a lot of desktop icons linking to
inappropriate websites. Which of the following should the technician do NEXT?
Which of the following is the MINIMUM account required to install most programs on Windows XP?
Which of the following is the MINIMUM account required to install most programs on Windows
XP?
which of the following bus speeds will the system function?
A technician has just installed two memory modules on a motherboard that supports DDR3 RAM
with the bus speed up to 1600 MHz. The specifications of memory are DDR3 1066 MHz for one
module and DDR3 1333 MHz for another. On which of the following bus speeds will the system
function?
Which of the following should a technician configure on a small office home office (SOHO) wireless router̷
Which of the following should a technician configure on a small office home office (SOHO)
wireless router so IP addresses are automatically assigned to devices on the wireless network?
Which of the following security methods is BEST used to track access to a server room?
Which of the following security methods is BEST used to track access to a server room?
Which of the following ports on the firewall should be checked?
A customer states that since the new firewall has been installed, the customer has not been able
to send email. Which of the following ports on the firewall should be checked?
Which of the following user accounts should be disabled to adhere to security best practices?
Which of the following user accounts should be disabled to adhere to security best practices?
Which of the following can be implemented on a WAP to ensure that only certain client machines can access it?
Which of the following can be implemented on a WAP to ensure that only certain client machines
can access it?
Which of the following user accounts should be renamed to adhere to security best practices?
Which of the following user accounts should be renamed to adhere to security best practices?