Which of the following network protocols will MOST likely be used when sending and receiving Internet email? (Select TWO.)
Which of the following network protocols will MOST likely be used when sending and receiving Internet email? (Select TWO.)A . SMTPB . POP3C . SNMPD . DHCPE . ICMPF . SFTPView AnswerAnswer: AB
Which of the following operating systems do not require extensions on files to execute a program? (Select TWO).
Which of the following operating systems do not require extensions on files to execute a program? (Select TWO).A . Windows 7B . Windows 8C . UNIXD . Windows Server 2012E . AndroidF . LinuxView AnswerAnswer: CF
When transferring a file across the network, which of the following would be the FASTEST transfer rate?
When transferring a file across the network, which of the following would be the FASTEST transfer rate?A . 1001KbpsB . 110MbpsC . 1.22GbpsD . 123MbpsView AnswerAnswer: C
Which of the following protocols would be the MOST secure?
A technician is installing a new wireless network and wants to secure the wireless network to prevent unauthorized access. Which of the following protocols would be the MOST secure?A . WPAB . SSIDC . WEPD . WPA2View AnswerAnswer: D
Which of the following would be considered the BEST method of securely distributing medical records?
Which of the following would be considered the BEST method of securely distributing medical records?A . Encrypted flash driveB . Social networking sitesC . FaxD . FTP file sharingView AnswerAnswer: A
Which of the following best describes the technician’s NEXT step?
An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step?A . Restart the computer.B . Contact other users.C . Disconnect the peripherals.D . Document the findings.View AnswerAnswer: D
Which of the following is a value that uniquely identifies a database record?
Which of the following is a value that uniquely identifies a database record?A . Foreign keyB . Public keyC . Primary keyD . Private keyView AnswerAnswer: C
Which of the following actions is the FINAL step in the standard troubleshooting methodology?
Which of the following actions is the FINAL step in the standard troubleshooting methodology?A . Document the solution and cause.B . Create a new theory of cause.C . Research the problem online.D . Implement preventive measures.View AnswerAnswer: A
Which of the following does the workstation MOST likely need for the printer to function?
A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function?A . PermissionB . Ink cartridgeC . USB cableD . DriverView AnswerAnswer: D
Which of the following Internet service types should MOST likely be used?
Ann, the president of a company, has requested assistance with choosing the appropriate Internet connectivity for her home. The home is in a remote location and has no connectivity to existing infrastructure. Which of the following Internet service types should MOST likely be used?A . FiberB . DSLC . CableD...