Which of the following requirements is MOST important on the new setup to ensure stable functionality of the v
A consultant is looking to consolidate six company servers onto one physical system. Which of the
following requirements is MOST important on the new setup to ensure stable functionality of the
virtual environment?
Which of the following security concepts establishes the notion that a user should only be given sufficient ac
Which of the following security concepts establishes the notion that a user should only be given
sufficient access to the resources they need to perform their job function?
Which of the following are MOST likely causes of this problem?
A technician is trying to diagnose a laptop that is experiencing heavy artifact corruption and random
loss of video during operation. Which of the following are MOST likely causes of this problem?
(Select TWO).
Which of the following tools would a technician use to BEST resolve this issue?
A user reports that every time they use a search engine and click on a link to go to a website, they
instead are taken to a site blocked by their company’s content filter. The user is not trying to go to
the blocked site and needs to be able to successfully use the search engine to complete their
assignment. Which of the following tools would a technician use to BEST resolve this issue?
Which of the following tools would BEST reset the computer to how it worked when first purchased?
After being infected with a virus, a user’s computer does not recognize the user as having local
administrator rights to the computer. After troubleshooting the issue, a technician determines the
computer needs to be rebuilt and data needs to be restored from the user’s backup. Which of the
following tools would BEST reset the computer to how it worked when first purchased?
Which of the following should the technician check FIRST?
A technician installed a second hard drive in a computer. Upon restart, a message appears statinG.
“primary drive 0 not found. Press F1 to continue.” Which of the following should the technician
check FIRST?
which of the following?
The shared folder named C$ is an example of which of the following?
Which of the following is BEST used to prevent other people from viewing a user’s computer screen?
Which of the following is BEST used to prevent other people from viewing a user’s computer screen?
Which of the following security threats almost occurred?
A pest exterminator tries to gain access to a company’s computer lab, but the receptionist does not
see an extermination scheduled on the calendar and denies the exterminator access to the lab.
Which of the following security threats almost occurred?
Which of the following can be used as an appropriate boot device?
Which of the following can be used as an appropriate boot device?