Virtual machines hosted in the cloud that are used by developers to code applications are an example of:

Virtual machines hosted in the cloud that are used by developers to code applications are an example of:A . FaaSB . BaaSC . PaaSD . SaaSE . IaaSView AnswerAnswer: C

March 11, 2021 No Comments READ MORE +

Which of the following is MOST likely preventing the RAID array from operating optimally?

An administrator notices the RAID 5 array is reporting a degraded health message. It contains three HDDs. A technician replaces the faulty HDD with a new one. but users then report access to the fileshare is not as fast as it used to be . Which of the following is...

March 11, 2021 No Comments READ MORE +

Which of the following networking protocols would be BEST track packages through a sorting facility?

Which of the following networking protocols would be BEST track packages through a sorting facility?A . RFIDB . NFCC . BluetoothD . ZigbeeView AnswerAnswer: D

March 11, 2021 No Comments READ MORE +

CORRECT TEXT

CORRECT TEXT You need to configure your mobile device to send and receive electronic messages from your company. You must use the company’s WLAN as all e-mail services are on default non-secure ports. The company’s WLAN is broadcasting across the company for easier access. Users must authenticate to the server...

March 11, 2021 No Comments READ MORE +

Which of the following is the technician configuring?

A junior technician is working on a new server that will Intercept web traffic and file requests from users computers and retrieve the necessary content . Which of the following is the technician configuring?A . DNS serverB . Authentication serverC . Proxy serverD . Web serverE . File serverF ....

March 11, 2021 No Comments READ MORE +

Which of the following enables hardware encryption to secure user data?

A company is concerned about the security of sensitive data on a laptop a user frequently takes off-site. Which of the following enables hardware encryption to secure user data?A . BIOS passwordB . Hibernation modeC . Trusted Platform ModuleD . Screen-saver lockView AnswerAnswer: C

March 11, 2021 No Comments READ MORE +

Which of the following connector types can be plugged into a device both right-side up and upside down?

Which of the following connector types can be plugged into a device both right-side up and upside down?A . USBB . USB-CC . Mini-USBD . Micro-USBView AnswerAnswer: B

March 11, 2021 No Comments READ MORE +

To do so without a fire code violation, which of the following types of cable should the technician run?

A technician is hired to install network cable in a crawl space running the length of a hallway. To do so without a fire code violation, which of the following types of cable should the technician run?A . PlenumB . FiberC . ShieldedD . CoaxialView AnswerAnswer: A

March 10, 2021 No Comments READ MORE +

Which of the following network types does this describe?

An office has a network that has all computers connected to two switches. The switches are connected with a fiber cable. The computers and switches are all located in the same building . Which of the following network types does this describe?A . WANB . PANC . LAND . MANView...

March 10, 2021 No Comments READ MORE +

Which of the following technologies is the technician teaching to the staff?

A technician needs to give users the ability to transfer files between mobile devices. The technician teaches the staff how to use a file transfer method in which the devices need to be in close proximity with line-of-sight access to each other . Which of the following technologies is the...

March 10, 2021 No Comments READ MORE +