A. Verify full system functionality B. Implement preventative measures C. Implement the solution D. Document findings and outcomes
单项选择题Which of the following connector types is used on CAT5e cable?()
A.RJ-45 B.ST C.RJ-11 D.BNC
单项选择题Which of the following logs contains information on overall performance and events not related to user authentication?()
A.Security B.Audit C.Application D.System
单项选择题A customer wants to know what version of DirectX the current workstation has installed. Which of the following command line tools would the customer use?()
A. edit B. systeminfo C. gpedit.msc D. dxdiag
单项选择题Which of the following would BEST optimize a computer that is heavily used? ()
A.Scandisk B.Defrag C.Indexing D.Chkdsk
单项选择题Which of the following BEST describes the purpose of user account control (UAC) in WindowsVista?()
A. UAC ensures that standard users cannot access the files and folders of administrative users. B. UAC allows a computer administrator to add new user accounts to the system, configure passwords and settings for existing users, or remove existing user accounts. C. UAC ensures that viruses and other malware cannot infect the computer, eliminating the need for third-party antivirus solutions. D. UAC ensures that important changes cannot be made to Windows Vista without the permission of a computer administrator.