Which of the following describes a security device that validates a users identity based on unique personal ch
Which of the following describes a security device that validates a users identity based on unique personal characteristics?
A retinal scanner is an example of which of the following security methods?
A retinal scanner is an example of which of the following security methods?
Which of the following would be the MOST effective way to monitor access to secure areas?
Which of the following would be the MOST effective way to monitor access to secure areas?
To force a user to use Ctrl-Alt-Delete to log into the computer, a technician can go to Control Panel then:
To force a user to use Ctrl-Alt-Delete to log into the computer, a technician can go to Control Panel then:
Which of the following actions should be taken?
A customer has security concerns about classified local data being compromised if the laptop is stolen. The customers laptop has Windows 2000 utilizing the FAT16 file system. Which of the following actions should be taken?
Which of the following devices should the technician choose?
A technician needs to transfer data as quickly as possible. Which of the following devices should the technician choose?
Which of the following may be the cause?
A workstation consistently powers off after a few minutes of operation.
Which of the following may be the cause?
During the servicing of a desktop PCI card, which of the following may cause the motherboard to short out? (Se
During the servicing of a desktop PCI card, which of the following may cause the motherboard to short out? (Select TWO).
Which of the following would be a valid way to determine the CPU speed of a laptop running Windows XP? (Selec
Which of the following would be a valid way to determine the CPU speed of a laptop running Windows XP? (Select THREE).
Which of the following would be the FIRST action to take?
A printer takes a long time to print high-end graphics. Which of the following would be the FIRST action to take?