What should you do?
You work as a network technician at Domain.com. A Domain.com network user recently complained to you about a laptop which has the power light on when booting but displays a blank screen to the user. You are required to enable the laptop to use the display.
What should you do?
Which of the following are the BEST means of ensuring that data is not lost? (Select TWO)
Which of the following are the BEST means of ensuring that data is not lost? (Select TWO).
According to the OSI model, which of the following layers is responsible for providing reliable communication?
According to the OSI model, which of the following layers is responsible for providing reliable communication?
Which of the following mitigation techniques would address this concern? (Select TWO)
Users are utilizing thumb drives to connect to USB ports on company workstations. A technician is concerned that sensitive files can be copied to the USB drives. Which of the following mitigation techniques would address this concern? (Select TWO).
To prevent damage, loss of data, or operating system instability which of the following would be the proper me
To prevent damage, loss of data, or operating system instability which of the following would be the proper method of removing a USB device?
Which of the following statements is TRUE regarding the purpose of the Fn key on the laptops keyboard?
Which of the following statements is TRUE regarding the purpose of the Fn key on the laptops keyboard?
Which of the following drive connections uses a ribbon cable with a 40-pin connector? (Select TWO)
Which of the following drive connections uses a ribbon cable with a 40-pin connector? (Select TWO).
Which of the following is the MOST likely source of the problem?
A technician receives a call on monday morning that several computers will not connect to the network. The technician determines that the computers left on over the weekend are functional and those that were turned off over the weekend are not functioning. Which of the following is the MOST likely source of the problem?
Which of the following is this an example of?
An unauthorized user intercepted a user’s password and used this information to obtain the company’s administrator password. The unauthorized user can use the administrators password to access sensitive information pertaining to client data. Which of the following is this an example of?
Which of the following tabs in the Windows XP Power Options applet configures a laptop to go into hibernation
Which of the following tabs in the Windows XP Power Options applet configures a laptop to go into hibernation when the LCD panel is closed?