Which of the following is NOT a typical function performed by the OS installation program?
A. gathering system information
B. backing up existing data
C. configuring devices and drivers
D. restarting the system
Answer: B
You might also like to view...
Create a short report describing your findings.
a. Begin the report with your recommendations. This should be short -- no more than a page. b. Include your proposed groups of topics. Choose an easy-to-read format.
Which of the following social media sites is designed for professional business connections?
A) Facebook B) Second Life C) Webkinz D) LinkedIn
________ is software that you can download from a website without a fee
Fill in the blank(s) with correct word
Recently, your company implemented two wireless networks. Within days of implementation, you discover that unauthorized devices have connected to the wireless networks. You need to ensure that unauthorized devices are unable to connect to either wireless network. What should you do?
A. Deploy the wireless access points behind a firewall. B. Deploy the wireless access points behind an intrusion prevention system (IPS). C. Employ MAC filtering on the wireless access points. D. Disable SSID broadcast on the wireless access points.