Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following is an example of a MAC address?

A.

00:50:09:2D:4D:94

B.

0x3476

C.

192.68.10.24

D.

fe80:102d:cd62:5434:82ae

A company updates its password policy to require that all passwords be reset every 60 days. Which of the following best describes this requirement?

A.

Password complexity

B.

Password management

C.

Password expiration

D.

Password privacy

A user is configuring a server OS. Which of the following should the user do after setting up the system?

A.

Change the default usernames and passwords.

B.

Synchronize the administrative log-ins with other servers on the domain.

C.

Disable the administrator password.

D.

Clear the password complexity database.

An application stops working after 30 days and then prompts the user to input some information. Which of the following will fix this issue?

A.

IP address

B.

MAC address

C.

Product key

D.

Password

A user is testing new speakers on a laptop, but the user does not hear any sounds. The speakers are plugged in and turned on, and the correct driver is updated. Which of the following would most likely cause the issue?

A.

OS incompatibility

B.

Defective speakers

C.

Misconfigured output

D.

Incorrect cable

Which of the following is used to measure the speed of an internet connection?

A.

802.11X

B.

Mbps

C.

MHz

D.

Bytes

A user lives in a remote area that does not have cabling or towers available. The user wants to connect to the internet. Which of the following is the best solution?

A.

Fiber optic

B.

IDSL

C.

Cellular

D.

Satellite

Which of the following concepts is represented by the sale of customer email addresses to potential product vendors?

A.

Data monetization

B.

Data correlation

C.

Data analytics

D.

Data capture

A systems administrator requires access to a user’s laptop over a VPN for troubleshooting. Which of the following software types should the systems administrator use?

A.

Collaboration

B.

Productivity

C.

Web browsing

D.

Remote assistance

A lab technician removes access from students who do not need to use a fileshare. Which of the following best describes this action?

A.

Least privilege model

B.

Non-repudiation

C.

Multifactor authentication

D.

Single sign-on