单项选择题A system administrator has disabled USB ports after experiencing several virus outbreaks. A user needs to transfer several extremely large work related files from their home desktop computer to their work desktop computer. Which of the following will allow the user to transfer the needed files?()

A. An IEEE-1394 device
B. A NIC device
C. An IrDA device
D. A FDD device


您可能感兴趣的试卷

你可能感兴趣的试题

3.单项选择题A technician is dispatched to a system that will not go beyond the Windows XP splash screen.Which of the following, after restart, would allow the technician to load Windows XP?()

A. Press F6, select Last Known Good Configuration, login
B. Press F8, select Debug mode, login
C. Press F8, select Last Known Good Configuration, login
D. Press F6, select Debug mode, login

4.单项选择题A technician is dispatched to a malware infected system. Upon arrival, the technician notices themalware’s pop-up on the screen. Which of the following boot methods would the technician utilize?()

A. Reboot in Safe Mode
B. Reboot in Recovery Console
C. Reboot in Last Known Good Configuration
D. Reboot in System Debug Mode

6.多项选择题A technician turns on a PC and before the computer boots up, the technician is prompted for apassword. The technician does not know the password. Which of the following can the techniciando to allow access to the PC?() (Select TWO).

A. Set the clear password jumper on the motherboard
B. Enter the BIOS setup and select the clear password setting
C. Remove the power cord from the power supply and then plug it back in
D. Power cycle the PC
E. Remove the CMOS battery for 15 minutes


7.单项选择题Which of the following network modifications should be implemented to extend the wirelessnetwork range and allow out-of-range users to share the Internet connection?()

A. Create a new VLAN for the out-of-range users.
B. Add a wireless access point for the out-of-range users.
C. Upgrade the out-of-range users’ SSID searching software.
D. Enable network sharing on the users’ computers that are within range.

8.多项选择题Which of the following are encrypted protocols? ()(Select TWO).

A.TELNET
B.SSH
C.POP3
D.FTP
E.HTTPS

最新试题

Which of the following could cause an Inaccessible boot drive error during the boot process? ()

题型:单项选择题

A Windows XP system locks up after the GUI starts to load. The system will start in Safe Mode. TheEvent Viewer reports that a driver failed to load. Which of the following methods would help diagnose the problem? ()

题型:单项选择题

A customer wants to check whether they have the necessary tools enabled to prevent intrusions andvirus attacks on a Windows Vista workstation. Which of the following tools can be used to display thecurrent configuration? ()

题型:单项选择题

A technician needs to check which ports are open in the Windows Firewall. Which of the following willallow the technician to view these settings?()

题型:单项选择题

A user reports they can no longer change the web browser home page. Which of the following is MOSTlikely the problem? ()

题型:单项选择题

Which of the following commands will allow a technician to disable startup programs? ()

题型:单项选择题

A computer is failing to boot. Which of the following tools would be used FIRST in troubleshooting? ()

题型:单项选择题

If a technician is traveling outside of the US, which of the following should be checked before setting up a workstation? ()

题型:单项选择题

A user reports that their system is starting to run slower, especially when opening large local files. The system has sufficient RAM for the users applications, but the hard drive seems to have higher than normal activity when opening large files.Which of the following would be the BEST tool to diagnose and troubleshoot this problem? ()

题型:单项选择题

Which of the following is the BEST solution for repairing a hard drive that results in the NTLDR ismissing display upon booting?()

题型:单项选择题