Which of the following recovery options are available when booting from the Windows XP installation CD?
Which of the following recovery options are available when booting from the Windows XP installation CD?
Which of the following chipsets is responsible for controlling the data flow between a PATA optical drive and
Which of the following chipsets is responsible for controlling the data flow between a PATA optical drive and the processor?
If determining the risk, which of the following is the annual loss expectancy (ALE)?
A small call center business decided to install an email system to facilitate communications in the office. As part of the upgrade the vendor offered to supply anti-malware software for a cost of $5,000 per year. The IT manager read there was a 90% chance each year that workstations would be compromised if not adequately protected. If workstations are compromised it will take three hours to restore services for the 30 staff. Staff members in the call center are paid $90 per hour. If determining the risk, which of the following is the annual loss expectancy (ALE)?
Which of the following would be the FIRST action to take?
A printer takes a long time to print high-end graphics. Which of the following would be the FIRST action to take?
You are required to improve the performance by choosing which tool to use?
You work as a network technician at Domain.com. A Domain.com user has complained that several programs are running in the background which he does not recognize and cause the computers performance slower. You are required to improve the performance by choosing which tool to use?
Which of the following should be the FIRST step in troubleshooting a problem?
Which of the following should be the FIRST step in troubleshooting a problem?
In this instance, which of the following is the BEST course of action?
After a system risk assessment was performed it was found that the cost to mitigate the risk was higher than the expected loss if the risk was actualized. In this instance, which of the following is the BEST course of action?
Which of the following describes a security device that validates a users identity based on unique personal ch
Which of the following describes a security device that validates a users identity based on unique personal characteristics?
What should you do?
You work as a network technician at Domain.com. The Domain.com network user requested you install Windows XP Professional on the computers C: drive and do nothing to the D: drive. The Domain.com user uses disk intensive programs and has recently complained about poor performance when running the programs. You are required to improve the user’s performance.
What should you do?
Which of the following steps needs to be completed for this to work?
A user wants to access a Bluetooth device from a Bluetooth equipped laptop. Which of the following steps needs to be completed for this to work?