What is a VPN?
Your company’s security team has announced the rollout of a new VPN for each laptop in the organization. What will this VPN provide?
Your company’s security team has announced the rollout of a new VPN for each laptop in the organization. What will this VPN provide?
It’s relatively easy to see the icons in the taskbar or system tray that are associated with running applications, but identifying the services running behind the scenes isn’t quite as obvious. Which one of these methods could be used to view all of your computer’s services?
You are using Windows Vista to share a printer that is directly connected to your computer. However, other people on the network are not able to print to your printer. You can print normally to your printer and to other printers on the network. Which of these options may be contributing to this issue?
One of your clients is planning to upgrade their PATA drives to SATA drives. Which one of these would be a good reason to upgrade from PATA to SATA?
You’ve recently received a computer at the United States office that was shipped from the London office, and you need to change the date and currency formats to the local settings. Where can you find the options to modify these configuration settings?
During the formatting of a new external USB-connected hard drive, you have the choice of NTFS or FAT32 file systems. Which one of these would be a reason to choose FAT32 over NTFS?
During the troubleshooting of a remote computer called server1.example.com, you perform this command:
> tracert server1.example.com
What information can you gather from this network troubleshooting command? Pick two.
You’re planning an in-place upgrade from your existing Windows XP Professional system to Windows Vista Ultimate. Which one of these methods can be used to perform this upgrade?
You have set permissions on a set of files in an NTFS folder, and you have a different set of permissions on a network share to the same NTFS folder. When someone connects to the share across the network, how do you determine the effective permissions?