
New VCE 1002 Ver 1
Authored by Jose Manuel Rios
Computers
University
Used 77+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
50 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
A technician is working on a Windows 10 PC that is running slowly. Which of the following commands should the technician use to correct this issue? (Choose two.)
dism
ipconfig
format
diskpart
chkdsk
2.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
An administrator is setting up a Windows terminal server.
Which of the following settings should the administrator modify to increase server security? (Choose two.)
Change the default access port
Enforce password complexity
Put the terminal server into the router’s DMZ
Block all unused ports on the LAN smart switch
Disable logon time restrictions
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company has hired a new IT firm to manage its network switches and routers. The firm is geographically separated from the company and will need to able to securely access the devices Which of the following will provide the ability to access these devices?
Telnet
SSH
RDP
VNC
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
A small office’s wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network. Which of the following configurations MOST likely allowed the attack to take place? (Choose two.)
Default login
Outdated firmware
TKIP
WEP
Guest network
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A client wants a technician to create a PC naming convention that will make the client’s PCs easier to track and identify while in use. Which of the following naming convention formats should the technician follow?
Location, RFID
Asset ID, MAC address
Domain name, location, asset ID
Domain name, location, IP address
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following provide the BEST security for a server room? (Choose two.)
Privacy window shades
USB token
Cable lock
Biometric lock
Badge reader
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following threats uses personalized information in an attempt at obtaining information?
Spoofing
Spear phishing
Impersonation
Whaling
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?