Topic 5: Exam Pool E (NEW)
A company gives users microSD cards to install on smartphones so users can store pictures that will be used on the website. After installing the cards, users report only being able to save a small number of pictures on the microSD cards before running out of space. Which of the following is the most likely issue?
A. ThemicroSD cards were not properly formatted before being installed.
B. ThemicroSD cards are not compatible with the smartphones.
C. ThemicroSD cards are not capable of UHD storage.
D. ThemicroSD cards were not selected for camera storage.
A user is reporting that a computer has been very slow in recent days. The technician looks into the problem and finds pop-ups are randomly appearing on the screen. Which of the following is the next step the technician must take?
A. Establish a knowledge base.
B. Establish a theory of probable cause.
C. Establish a new theory and consider escalating.
D. Establish a plan of action.
A company has a dot matrix printer that uses carbon paper. The company reports that the first page is printing too light, although the following pages are still legible. Which of the following MOST likely needs to be fixed?
A. The print drum is worn and loose causing the printing to be light in places
B. The ribbon is low on ink or missing and must be replaced to get proper output
C. The heating element has failed, and a new one needs to be installed for proper transfer
D. The wrong type of filement is loaded, preventing it from sticking correctly
E. The fuser assembly is not calibrated properly, causing it to impact the paper too hard
Which of the following is an email authentication method designed to detect email spoofing by attaching a digital signature to outgoing email?
A. SPF
B. DKIM
C. DNS pointer
D. MX records
Client-side virtualization guest machines have security requirements similar to physical machines, but they also need to ensure separation from other guest machines. Which of the following BEST describes this client-side guest security requirement?
A. Isolation
B. Authentication
C. Hardening
D. Authorization
Page 6 out of 159 Pages |
Previous |