Which of the following devices are likely to appear as output of the Isscsi command? A DVD-ROM AGPU A SATA hard drive A Bluetooth headset
What is a common way for threat actors to gain access to a network? By sending formal requests for access to the IT department By physically breaking into server rooms By obtaining credentials to access the network By guessing the network IP address
What is a common consequence of rogue devices and services in a network? Reduction in IT department workload. Increased network security. Improved network efficiency. Creation of new unmonitored attack surfaces.
How are botnets typically created? By installing security software on devices Through the use of strong passwords Through malware that opens a backdoor By updating devices with the latest firmware
When you cut or copy a cell, it is cut or copied to which of the following? A Neither the Windows or Office clipboard B Only the office clipboard C Both the Windows and Office clipboard D Only the Windows clipboard
Write a C program that calculates the sum of the first n natural numbers using a while loop. The program should prompt the user to input a positive integer n and then compute the sum of all numbers from 1 to n.
Which of the following will process your spectral display? A FFT B Packet Size C Backing Material (D) Autocorrelation
Which of the following is an advantage of Power Angio? A Flash artifact B Increased sensitivity to flow C Degrades frame rate D No measured velocities
Keyshia wants to remove part of the glassware image in her presentation. Which tool should she use? square How should she access this tool? square What appears around the image to help her adjust the image? square What should she do to exit the image after adjusting it? square
Why is the scrollbar typically hidden from view in macOS? square
8 When does the payload of a malicious program initially activate (first instance)? When installing a program from a trusted, secure site When a file or program is opened When using a password to log in to a computer When a computer is performing its shut down
What is phishing? a. A method to steal sensitive information or b. A coding language c. A software development tool d. A type of hardware
How can the Repeat Offenders Dashboard aid in resolving issues? By predicting upcoming maintenance needs. By identifying potential root causes and locations of disabling events. By updating firmware automatically. Data here is filtered by error type.
What role does user selection play in ARCHER's ticket routing process? It determines the priority of the ticket It aids in the logical routing of trouble tickets based on diagnostic results It decides the resolution time for the ticket It assigns the ticket to a specific technician
Which of the following should a good user interface include? dim text only text limited updates images
What are the two types of cache memory? Volatile and nonvolatile Physical and virtual DRAM and SRAM Primary and secondary
Smart devices are so called because of their ability to communicate, locate and predict. a. True b. False
What is the maximum resolution that an HDM 2.1 can support? 720P 1080P 4K 8K
What component of UEFI helps to prevent malware from hijacking a system during or before the operating system load? Execute Disable Bit Secure Boot UEFI Defender BitLocker
Which of the following is true of single mode fiber? It has a larger core. It is an older technology. It is more common and used for running Internet to homes.