Q: 1
A company implements a tool to allow employees to conduct meetings over the internet. Which of
the following tools did the company implement?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 2
A user identifies the reason a compute is not working, repairs it, and prints a test page. Which of the
following steps should the user should take next?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 3
Which of the following can be used to input commands for a computer to execute?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 4
Which of the following devices extends the range of a network?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 5
A technician is reviewing log files to track the number of times that a specific user has logged on to
the networks. Which of the following security concepts is being used?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 6
A user is unable to connect from one workstation to another workstation. Which of the following
should be configured to fix this issue?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 7
Which of the following describes a printer?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 8
A user has concerns about device theft because they are working on a laptop at a local coffee shop.
Which of the following physical devices would be best to protect the laptop?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 9
Which of the following can best protect a computer when an infected file has been downloaded?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2