单项选择题
Which of the following would be used to monitor unauthorized access to data files?()
A. Performance Log and Alerts
B. Event Viewer
C. Security Configuration and Analysis
D. IP Security Monitor
相关考题
-
单项选择题
Which of the following cables can be used to directly connect a laptop to a PC for ICS?()
A. IEEE 1394 cable
B. CAT5 crossover cable
C. CAT5e patch cable
D. Parallel cable -
单项选择题
Which of the following safety procedures is the BEST when lifting heavy equipment onto a repairbench?()
A. The technician should always bend at the waist and lift with their arms.
B. The technician should seek assistance from an available customer.
C. The technician should always bend at the waist and lift with their back.
D. The technician should get assistance from another technician. -
单项选择题
A laser printer has an error tray two paper jam but tray two does not have any paper in it. Which of the following should the technician do FIRST? ()
A. Replace the tray two paper sensor and run the printer self test.
B. Remove the tray two paper sensor and clean the printhead.
C. Check the tray two paper sensors for blockage and run the printer self test.
D. Check the tray two paper rollers for blockage, clean the printhead, and run the printer self test.
