Which of the following types of scripts would be seen on the user end of a web page?
Which of the following types of scripts would be seen on the user end of a web page?A . .batB . .jsC . .shD . .vbsView AnswerAnswer: D
Which of the following is a reason to use WEP over WPA?
Which of the following is a reason to use WEP over WPA?A . Device compatibilityB . Increased securityC . TACACSD . Multifactor authenticationView AnswerAnswer: A Explanation: WEP (Wired Equivalent Privacy) was introduced when the 802.11 standard for Wi-Fi networks was launched. It allows the use of a 64-bit or 128-bit...
Which of the following password practices should the technician implement on the PC to secure network access?
A technician is installing a private PC in a public workspace. Which of the following password practices should the technician implement on the PC to secure network access?A . Remove the guest account from the administrators groupB . Disable single sign-onC . Issue a default strong password for all usersD...
Which of the following would be the appropriate action for Joe?
Joe, a technician, has his daily plans forwarded to him by his supervisor. Upon arrival to the external to the second support call of the day, Joe realizes the issue will require much more time than initially scheduled, and several support calls will not be completed. Which of the following...
Which of the following naming convention formats should the technician follow?
A client wants a technician to create a PC naming convention that will make the client’s PCs easier to track and identify while in use. Which of the following naming convention formats should the technician follow?A . Domain name, location, IP addressB . Domain name, location, asset IDC . Asset...
Which of the following is the MOST secure wireless security protocol?
Which of the following is the MOST secure wireless security protocol?A . AESB . WPAC . WPA2D . WEPView AnswerAnswer: A
Which of the following is the MOST likely cause of this issue?
Joe, a customer, calls a technician to report a remote computer is demonstrate erratic behavior while he is working on it. The technician verifies the files and directories Joe is working on locally cannot be open in any application, and the computer is extremely slow. Which of the following is...
Which of the following can Joe do to ensure the backups will work if needed?
Joe, a systems administrator, is setting up a risk management plan for the IT department. Part of the plan is to take daily backups of all servers. The server backups will be saved locally to NAS. Which of the following can Joe do to ensure the backups will work if...
Which of the following recommendations should the contractor give to the customer?
A SOHO customer has recently experienced a major hurricane. The customer has no backups and has lost all data and hardware associated with the company. The customer calls a contractor to assist in the rebuilding process and needs suggestions on the best way to prevent this from happening again. Which...
Which of the following user types should be used in a Windows environment to grant Internet access without allowing the permanent storage of files on the system?
Which of the following user types should be used in a Windows environment to grant Internet access without allowing the permanent storage of files on the system?A . Local AdministratorB . Standard UserC . Power UserD . Guest UserView AnswerAnswer: D