How can you secure a wireless network?
Which of these techniques are wireless router security options? Pick three.
Which of these techniques are wireless router security options? Pick three.
One of your customers uses a poorly written application that often hangs and will not close properly. What Windows utility can you use to terminate the application manually?
Which 802.11 wireless networking type has a maximum bandwidth of 54 megabits per second?
You’ve made some changes to your Windows XP boot.ini file, but now your system will not boot at all. What program can you use to rebuild your boot.ini file?
You would like to configure the boot order of your computer to allow boot DVDs and boot USB flash memory sticks, but you don’t want to boot from the network unless the hard drive was missing or unbootable. Which of these boot orders would be an appropriate configuration for your PC? Pick two.
When you print to a printer on the network, your output looks like garbage that contains odd characters and symbols. It doesn’t matter which application you use; all of your output is illegible. Other people can print to the network printer without any issues. What of these is the most likely cause of your issue?
You would like to build a drive array configuration that provides the highest levels of throughput. You don’t need the RAID array to provide any redundancy if a drive fails. What RAID type would be the best fit?
You’re installing a memory upgrade into a computer, and you notice that the motherboard documentation states that ECC memory is required. Why would a computer use ECC memory?
One of your customers has brought in their computer for repair. They are complaining that the computer makes clicking noises when it is powered on. The noise is constant and it doesn’t appear to ever stop while the computer is operational. The computer appears to be working normally otherwise. What of these would be the most likely cause of this odd noise?
Your organization has uses an important application that was custom written in-house. Unfortunately, this application conflicts with portions of the UAC process. What is the easiest way to disable portions of the UAC but still keep other aspects of UAC operating normally?
How can you make this application work properly? Read More »