What are two characteristics of a scalable network? (Choose two.)

What are two characteristics of a scalable network? (Choose two.) suitable for modular devices that allow for expansion offers limited number of applications grows in size without impacting existing users…

Comments Off on What are two characteristics of a scalable network? (Choose two.)

A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut, students in the dormitories only experience a very short interruption of network services. What characteristic of the network is shown here?

A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a…

Comments Off on A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut, students in the dormitories only experience a very short interruption of network services. What characteristic of the network is shown here?

In which scenario would the use of a WISP be recommended?

In which scenario would the use of a WISP be recommended? an apartment in a building with cable access to the Internet a farm in a rural area without wired…

Comments Off on In which scenario would the use of a WISP be recommended?

What is an ISP?

What is an ISP? It is an organization that enables individuals and businesses to connect to the Internet. It is a networking device that combines the functionality of several different…

Comments Off on What is an ISP?

During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?

During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type…

Comments Off on During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?

A user reports that a PC is losing files, not opening some files, and is performing slowly. The technician suspects problems with the hard drive. What should be done to protect the data that is on the PC and to determine the source of the problem, without risking total drive failure?

A user reports that a PC is losing files, not opening some files, and is performing slowly. The technician suspects problems with the hard drive. What should be done to…

Comments Off on A user reports that a PC is losing files, not opening some files, and is performing slowly. The technician suspects problems with the hard drive. What should be done to protect the data that is on the PC and to determine the source of the problem, without risking total drive failure?

A technician needs to check the system settings on a remote computer to make sure it will be compatible with a new software update that will be sent out. The technician will use an administrator account to log in and start a user session on the remote PC. Which Windows tool will the technician use to accomplish this?

A technician needs to check the system settings on a remote computer to make sure it will be compatible with a new software update that will be sent out. The…

Comments Off on A technician needs to check the system settings on a remote computer to make sure it will be compatible with a new software update that will be sent out. The technician will use an administrator account to log in and start a user session on the remote PC. Which Windows tool will the technician use to accomplish this?

What does virtual memory provide to an operating system?

What does virtual memory provide to an operating system? an increase in data storage an increase in the speed of accessing RAM a temporary storage of data until enough RAM…

Comments Off on What does virtual memory provide to an operating system?

Which type of malware is disguised as a legitimate program?

Which type of malware is disguised as a legitimate program? adware worm Trojan spyware Explanation & Hint: Trojan horses disguise themselves as legitimate programs. Worms replicate themselves across a network.…

Comments Off on Which type of malware is disguised as a legitimate program?

After complaints from users, a technician identifies that the college web server is running very slowly. A check of the server reveals that there are an unusually large number of TCP requests coming from multiple locations on the Internet. What is the source of the problem?

After complaints from users, a technician identifies that the college web server is running very slowly. A check of the server reveals that there are an unusually large number of…

Comments Off on After complaints from users, a technician identifies that the college web server is running very slowly. A check of the server reveals that there are an unusually large number of TCP requests coming from multiple locations on the Internet. What is the source of the problem?

An IT technician in a service company has provided extensive remote IT support with product deployment for a customer. After the completion of the contract, a complaint is filed against the IT technician for not following company policy by sending unsolicited emails about services and products that are not related to the contract. What two things should the IT support technician have done differently? (Choose two.)

An IT technician in a service company has provided extensive remote IT support with product deployment for a customer. After the completion of the contract, a complaint is filed against…

Comments Off on An IT technician in a service company has provided extensive remote IT support with product deployment for a customer. After the completion of the contract, a complaint is filed against the IT technician for not following company policy by sending unsolicited emails about services and products that are not related to the contract. What two things should the IT support technician have done differently? (Choose two.)

A user finds that when launching a downloaded Windows update file, Windows Update fails. What are two possible causes for this? (Choose two.)

A user finds that when launching a downloaded Windows update file, Windows Update fails. What are two possible causes for this? (Choose two.) The hard disk is failing. The Windows…

Comments Off on A user finds that when launching a downloaded Windows update file, Windows Update fails. What are two possible causes for this? (Choose two.)

What two roles or tasks are associated with level two technicians? (Choose two.)

What two roles or tasks are associated with level two technicians? (Choose two.) remotely updating drivers and software on customer computers prioritizing incoming calls according to their severity gathering customer…

Comments Off on What two roles or tasks are associated with level two technicians? (Choose two.)

A technician is setting up an environment where popular and frequently accessed web pages are stored locally on the internal network. What type of server will accomplish this task?

A technician is setting up an environment where popular and frequently accessed web pages are stored locally on the internal network. What type of server will accomplish this task? proxy…

Comments Off on A technician is setting up an environment where popular and frequently accessed web pages are stored locally on the internal network. What type of server will accomplish this task?

A technician is building a gaming computer with a PCIex16 graphics card. The graphics card requires 100 watts of power to run. How will this power be supplied?

A technician is building a gaming computer with a PCIex16 graphics card. The graphics card requires 100 watts of power to run. How will this power be supplied? from the…

Comments Off on A technician is building a gaming computer with a PCIex16 graphics card. The graphics card requires 100 watts of power to run. How will this power be supplied?

What is meant by a cloud service being metered?

What is meant by a cloud service being metered? The company is charged a monthly or annual fee for a specific service. The company is charged based on the amount…

Comments Off on What is meant by a cloud service being metered?

A company owns servers for a particular corporate application. The servers are housed in an external data center. The company has an agreement with a cloud provider to spin up additional servers for the same application during peak usage. Which cloud model is the company using?

A company owns servers for a particular corporate application. The servers are housed in an external data center. The company has an agreement with a cloud provider to spin up…

Comments Off on A company owns servers for a particular corporate application. The servers are housed in an external data center. The company has an agreement with a cloud provider to spin up additional servers for the same application during peak usage. Which cloud model is the company using?