You shall not pass
Which of these wireless security techniques would prevent an unauthorized workstation from getting an IP address from your access point? Pick two.
Which of these wireless security techniques would prevent an unauthorized workstation from getting an IP address from your access point? Pick two.
You need to configure your firewall to allow mail traffic between your mail server and the Internet. Which of these ports would be the most appropriate to open in your firewall?
You have recently upgraded to Bluetooth 2.0. What type of data throughput would you expect to see with your new Bluetooth connection?
What two network configuration parameters are required to communicate to another device on the local subnet?
You need to configure the core router at your office, but you are currently out of town at a conference. Which of these tools would allow you to securely manage your router?
You have a user in your organization that needs to migrate his Windows XP system to Windows 7. What application would the best choice for this task?
In which of these situations would a proxy configuration be the most applicable?
You need to install the 64-bit version of Windows 7 onto a video editing workstation, but your memory upgrade hasn’t been delivered. What is the minimum memory required to install Windows 7 x64?
You need to create a spreadsheet naming convention for your Accounting department that is using Windows 7 on their laptops. What is the maximum size of a spreadsheet filename, including both the filename and the extension?