Which of the following can be implemented?
A user wants to prevent access to specific websites to prevent their children from accidently
accessing them. Which of the following can be implemented?
Which of the following is the MOST likely cause of the issue?
A technician has upgraded an internal WiFi card on a laptop and now the signal power to connect
to a WAP is low. Which of the following is the MOST likely cause of the issue?
which of the following applications?
A custom configured PC with a powerful processor, high-end video, upgraded audio, and
increased cooling would be MOST suited to which of the following applications?
which of the following is true?
When comparing laptops and tablet PCs which of the following is true?
Which of the following is the MOST secure method, short of physical destruction, that would be used to ensure
Which of the following is the MOST secure method, short of physical destruction, that would be
used to ensure that data on a hard drive cannot be recovered?
Which of the following actions would BEST ensure that there is no unauthorized access to the switch?
A user will be installing a switch in a public location and will allow the six users in the office to
connect to it with CAT6 Ethernet. Which of the following actions would BEST ensure that there is
no unauthorized access to the switch?
Which of the following technologies should a technician recommend in order for the user to have access to both
A user would like to run a copy of Windows XP for testing; however, the user is currently using a
Windows 7 PC. Which of the following technologies should a technician recommend in order for
the user to have access to both systems simultaneously?
which of the following features is typically disabled?
When putting a mobile device into airplane mode, which of the following features is typically
disabled? (Select TWO).
Which of the following security policies can be implemented in order to prevent this situation?
IT suspects that other people are frequently making changes to a computer when a user leaves
their desk. Which of the following security policies can be implemented in order to prevent this
situation?
Which of the following would be the BEST response from the technician?
A client has asked a technician about drive sanitation and wants to know what the difference is
between overwriting a drive and formatting a drive. Which of the following would be the BEST
response from the technician?