Which of the following should be used to prevent issues…
A network technician is diligent about maintaining all system servers’ at the most current service pack level available. After performing upgrades, users experience
issues with server-based applications. Which of the following should be used to prevent issues in the future?
Which of the following will BEST meet this requirement?
An IT security technician needs to establish host based security for company workstations.
Which of the following will BEST meet this requirement?
Which of the following BEST describes these actions?
An administrator reassigns a laptop to a different user in the company. Upon delivering the laptop to the new user, the administrator documents the new location,
the user of the device and when the device was reassigned. Which of the following BEST describes these actions?
Which of the following file systems is from Microsoft a…
Which of the following file systems is from Microsoft and was included with their earliest operating systems?
Which of the following will be needed after the server …
The RAID controller on a server failed and was replaced with a different brand. Which of the following will be needed after the server has been rebuilt and joined to
the domain?
Which of the following can be performed when an element…
Which of the following can be performed when an element of the company policy cannot be enforced by technical means?
Which of the following would resolve this issue?
The administrator’s network has OSPF for the internal routing protocol. One port going out to the Internet is congested. The data is going out to the Internet, but
queues up before sending. Which of the following would resolve this issue?
Output:
Fast Ethernet 0 is up, line protocol is up
Int ip address is 10.20.130.5/25
MTU 1500 bytes, BW10000 kbit, DLY 100 usec
Reliability 255/255, Tx load 1/255, Rx load 1/255
Encapsulation ospf, loopback not set
Keep alive 10
Half duplex, 100Mb/s, 100 Base Tx/Fx
Received 1052993 broadcasts
0 input errors
983881 packets output, 768588 bytes
0 output errors, 0 collisions, 0 resets
Which of the following PKI concepts is this describing?
If Organization A trusts Organization B and Organization B trusts Organization C, then Organization A trusts Organization C. Which of the following PKI concepts is
this describing?
Which of the following is being monitored to trigger th…
A network technician receives the following alert from a network device:
“High utilizations threshold exceeded on gi1/0/24 : current value 9413587.54”
Which of the following is being monitored to trigger the alarm?
Which of the following would prevent a user from instal…
Which of the following would prevent a user from installing a program on a company-owned mobile device?
