On a corporate network, which of the following features would be used to redirect network traffic for filtering or monitoring?
A. Content Advisor
B. Proxy Settings
C. Network Drive Mapping
D. Local Security Policy
A user recently installed a new video driver on a PC but now it will not boot. Which of the following is the BEST option to correct the issue?
A. Automated system recovery
B. Emergency repair disks
C. FIXBOOT
D. Safe mode
Which of the following are characteristics of a strong password? (Select TWO).
A. Hard to guess.
B. Cannot be reversed.
C. Uses dictionary words.
D. Uses special characters.
E. Can be encrypted.
Which of the following commands would a technician use to map a network share?
A. NET
B. NSLOOKUP
C. IPCONFIG
D. COPY
Which of the following is the correct path to determine the IP address on an iOS device?
A. General> Settings> Wi-Fi> SSID Name> Network> IP address
B. Wi-Fi> SSID Name> Network> IP address
C. Settings> General> Network> Wi-Fi> SSID Name> IP address
D. Location Services> Settings> Wi-Fi> SSID Name> Network> IP address
An unknown device has been found on a SOHO wireless router. Which of the following is BEST to perform to keep this device off the network?
A. Enable MAC filtering
B. Change the channel
C. Disable DHCP
D. Disable SSID broadcast
Which of the following resources is MOST important for a network server running a virtual machine and guest operating systems?
A. Redundant power supplies
B. Memory speed
C. RAID type used
D. Multi-core CPU
An unattended install is MOST likely used for which of the following scenarios?
A. When a technician has a workstation with a defective optical media drive.
B. When a technician is going to be on vacation, but wants to configure a system at a certain time while gone.
C. When a technician wishes to update a user's system without the user's knowledge.
D. When a technician has numerous network connected workstations to image.
Which of the following describes the function of a firewall?
A. Hardware or software designed to analyze data packets to determine the origin or destination of the packet
B. Hardware or software designed to block packets based on traffic behavior over time
C. Hardware or software designed to compare data packets to known signatures
D. Hardware or software designed to block certain packets from entering or leaving a network
A user wants to ensure important documents are protected from accidental deletion, system malfunctions, and malicious activity. Which of the following features should the user implement?
A. Run System File Checker
B. Configure recurring backups.
C. Allocate space to System Restore
D. Update antivirus software