A technician is working on a Windows 10 PC that is running slowly. Which of the following commands should the technician use to correct this issue? (Choose two.)

New VCE 1002 Ver 1

Quiz
•
Computers
•
University
•
Medium

Jose Manuel Rios
Used 77+ times
FREE Resource
50 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
dism
ipconfig
format
diskpart
chkdsk
2.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
An administrator is setting up a Windows terminal server.
Which of the following settings should the administrator modify to increase server security? (Choose two.)
Change the default access port
Enforce password complexity
Put the terminal server into the router’s DMZ
Block all unused ports on the LAN smart switch
Disable logon time restrictions
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company has hired a new IT firm to manage its network switches and routers. The firm is geographically separated from the company and will need to able to securely access the devices Which of the following will provide the ability to access these devices?
Telnet
SSH
RDP
VNC
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
A small office’s wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network. Which of the following configurations MOST likely allowed the attack to take place? (Choose two.)
Default login
Outdated firmware
TKIP
WEP
Guest network
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A client wants a technician to create a PC naming convention that will make the client’s PCs easier to track and identify while in use. Which of the following naming convention formats should the technician follow?
Location, RFID
Asset ID, MAC address
Domain name, location, asset ID
Domain name, location, IP address
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following provide the BEST security for a server room? (Choose two.)
Privacy window shades
USB token
Cable lock
Biometric lock
Badge reader
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following threats uses personalized information in an attempt at obtaining information?
Spoofing
Spear phishing
Impersonation
Whaling
Create a free account and access millions of resources
Similar Resources on Quizizz
50 questions
ICT 151-200

Quiz
•
University
53 questions
System Analysis and Design (Prelim Exam)

Quiz
•
University
50 questions
Software engineering MCQ Test 1

Quiz
•
University
55 questions
3 курс Cybersecurity Compliance Framework & System Administratio

Quiz
•
University
50 questions
INSW Test (Q1) - ICT2-1

Quiz
•
University
48 questions
Net+008 Domain 1,2

Quiz
•
University
50 questions
AKT test (251-300) Жаңа вариант

Quiz
•
University
45 questions
Module 12

Quiz
•
University
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade