You install a wireless router and disable the Service Set Identifier (SSID) broadcast feature. You need to configure your computer to connect to the wireless network. What should you do? ()
You need to identify each help desk user who bypasses the new corporate security policy. What should you do?()
Your network contains an Active Directory domain that has two sites. You need to identify whether logon scripts are replicated to all domain controllers. Which folder should you verify()
You have an Exchange Server 2010 Mailbox server.You need to identify which users have the largest mailboxes on the server.What should you do?()
You need to identify all failed logon attempts on the domain controllers. What should you do()
You have a computer that runs Windows 7. Multiple users share the computer. The computer contains afolder named C:\folder1. You need to identify all of the encrypted files in C:\folder1. Which command shouldyou run?()
You have a computer that runs Windows Vista. You need to identify whether the computer can be upgradedto Windows 7. Which tool should you use?()
You have an Exchange Server 2010 organization that contains one Mailbox server.All users connect to Exchange by using Microsoft Office Outlook 2010.You need to identify the latency of client connections to the Mailbox server. What should you run?()
You are planning the consolidation of the application servers. You need to identify the appropriate disk configuration for the VMs based on the company’s planned changes. Which disk configuration should you identify?()
You need to identify the data mining algorithm that meets the requirements of the credit department. Which algorithm should you use?()
You need to identify the hardware failures have occurred on your computer in the past six months. What should you do?()
You need to identify if malware is causing performance issues on your computer. What should you do? ()
You need to identify potential security threats. Which of the following security breaches might occur under the current IT and security practices?(Choose all that apply)()
You need to identify which operating system must be installed on the Hyper-V server in the new branch office. Which operating system should you identify?()
Your network contains a server that runs Windows Server 2008 R2.You need to create a script to identify known configuration issues. What should you include in the script?()
You need to identify which tool the help desk users must use to perform administrative tasks. Which tool should you identify?()
You have a server that runs Windows Server 2003 Service Pack 2 (SP2). You need to identify all the unsigned drivers that are installed on the server. What should you do? ()
An administrator named Admin1 plans to deploy the planned VMs. You need to identify which servers can be converted to VMs by using physical-to-virtual machine (P2V) conversion. Which server or servers should you identify?()
You have a computer that runs Windows 7. You need to identify which hardware is required to create a system repair disc. Which hardware should you identify?()
You have a client computer that runs Windows 7. You need to identify which unsigned drivers have beeninstalled. Which command should you run?()
You need to identify all failed logon attempts on the domain controllers. What should you do()
You need to identify if malware is causing performance issues on your computer.What should you do?()
Your network consists of a single Active Directory domain. All servers run Windows Server 2003 ServicePack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3).You have a user account named User1.You need to identify which permissions User1 has on a file.What should you do?()
Your network consists of a single Active Directory domain. All servers run Windows Server 2003Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3).You assign NTFS permissions to a folder on a file server as shown in the following table.You share the folder and assign the Change permission to the Everyone group.A user named User1 is a member of Group1, Group2, and Group3.You need to identify the least restrictive NTFS permission that User1 has when he accesses the folderover the network.Which permission should you identify? ()