which of the following would ensure all data was captured?
When scheduling a backup for preventative maintenance, which of the following would ensure all
data was captured?
Which of the following commands can be used in Windows XP to modify when the CHKDSK command runs?
Which of the following commands can be used in Windows XP to modify when the CHKDSK
command runs?
Which of the following technologies should a technician recommend in order for the user to have access to both
A user would like to run a copy of Windows XP for testing; however, the user is currently using a
Windows 7 PC. Which of the following technologies should a technician recommend in order for
the user to have access to both systems simultaneously?
Windows Virtual PC is designed to:
Windows Virtual PC is designed to:
Which of the following allows a user to enable XP mode?
Which of the following allows a user to enable XP mode?
Which of the following methods is BEST for the technician to use?
A PC has sensitive data that must be destroyed, before the PC is redeployed. A technician has
been tasked with completely wiping the PC hard drive. Which of the following methods is BEST for
the technician to use?
which of the following?
An attack that creates a website that looks like another website, with the purpose of learning
someone’s account information is called which of the following?
Which of the following helps to prevent virus infections from USB flash drives?
Which of the following helps to prevent virus infections from USB flash drives?
Which of the following security threats are MOST often delivered via email?
Which of the following security threats are MOST often delivered via email? (Select TWO).
which of the following to BEST accomplish this?
A user is advised by the software vendor that the user must have elevated privileges in order to
run a program. The user should do which of the following to BEST accomplish this?