Which of the following is the MAXIMUM number of primary partitions that can be created on a hard drive with FA
Which of the following is the MAXIMUM number of primary partitions that can be created on a hard
drive with FAT32?
Phishing is:
Phishing is:
This is a symptom of:
The computer starts up and runs for less than a minute before shutting down or locking up. This is a
symptom of:
This can be caused by a bad:
When the computer is turned on it emits a series of beeps and does not POST. This can be caused by
a bad:
Which of the following installations would the technician use to reduce hands-on time spent on each computer?
A technician needs to decrease the time it takes to install an operating system on 100 computers.
Which of the following installations would the technician use to reduce hands-on time spent on each
computer?
which of the following should the technician do?
A technician is configuring a PC that will have confidential information stored on it. To ensure that
only authorized users can access this PC, which of the following should the technician do? (Select
TWO).
Which of the following should the technician do?
A company recently had a security breach and is now required to increase the security on their
workstations. A technician has been tasked to harden all the workstations on the network. Which of
the following should the technician do?
Which of the following is MOST likely the cause?
A technician recently installed a new video card in a PC. The PC already has integrated video on the
motherboard. When the technician turns on the PC, there is no video. Which of the following is
MOST likely the cause?
which of the following security threats?
A user receives a phone call from a person claiming to be from technical support. This person knows
the user’s name and that the user has Windows installed on their computer. The technician directs
the user to open Event Viewer and look at some event log entries to demonstrate the effects of a
virus on the computer. The technician also asks the user for their user ID and password so that they
can clean the computer. This is an example of which of the following security threats?
Which of the following should be done to BEST secure the router from unauthorized access?
A user has just purchased a wireless router for their home. Which of the following should be done to
BEST secure the router from unauthorized access? (Select TWO).