Which of the following would BEST prevent this?
A user regularly has to walk away from their computer and is worried someone may access their
workstation. Which of the following would BEST prevent this?
Which of the following controls should be used in troubleshooting?
A user has an LCD and a CRT monitor attached to their workstation. The colors are slightly off on the
CRT but not the LCD. Which of the following controls should be used in troubleshooting?
Which of the following should the user do to help detect the hard drives?
A user is installing Windows 7 on a PC with a RAID card. The user has verified all of the cables are
connected correctly, but the installation media does not detect any hard drives. Which of the
following should the user do to help detect the hard drives?
Which of the following accounts is MOST restrictive?
Which of the following accounts is MOST restrictive?
Which of the following should the technician do FIRST to try to get the application installed in Windows 7?
A technician is tasked with installing a legacy application on a Windows 7 computer. When the
technician tries to install the legacy application, an error is received that the application cannot be
installed because the OS is not supported. Which of the following should the technician do FIRST to
try to get the application installed in Windows 7?
Which of the following should the user do FIRST?
A user has not received any new emails on their smartphone in the last two days. The user is able to
access the Internet without any problems. Which of the following should the user do FIRST?
Which of the following file systems should be used?
A technician needs to format a file system to be compatible with the WIDEST range of operating
systems. Which of the following file systems should be used?
which of the following is needed to establish a connection?
For any given 802.11n wireless Internet signal, which of the following is needed to establish a
connection?
Which of the following could explain the problem at hand?
A user reports that a file they shared out on their computer for another network user is not
accessible to the third party. The user insists they specifically gave this third party Allow rights for
Read and Write access. Which of the following could explain the problem at hand?
Which of the following would BEST alleviate this problem?
A company is experiencing issues with third parties tailgating authorized users during entry to secure
server rooms. Which of the following would BEST alleviate this problem?