What are two examples of personally identifiable information (PII)? (Choose two.)
street address
credit card number
IP address
first name
street address
credit card number
A high technology company has an issue with unauthorized people gaining access into the company by following an authorized employee through the secure entrance. Which two measures could help with this security breach? (Choose two.)
mantrap
When would a printer be considered a network host?
when it is connected to a switch
An employee reports that each time a workstation is started it locks up after about 5 minutes of use. What is the most likely cause of the problem?
The RAM is malfunctioning.
The power supply fails to provide adequate voltage and current.
The CPU is overheating.
The hard disk is failing.
The CPU is overheating.
What is a function of the BIOS?
performs a check on all internal components
What are two advantages of using PC virtualization? (Choose two.)
It prevents viruses and worms from functioning in a virtualized environment.
It can provide cost savings.
It allows multiple operating systems to run on a single PC simultaneously.
It allows network threat identification.
It boosts the performance of the host machine through virtualization.
It can provide cost savings.
It allows multiple operating systems to run on a single PC simultaneously.
A technician has assembled a new computer and must now configure the BIOS. At which point must a key be pressed to start the BIOS setup program?
during the POST
after the POST, but before Windows starts to load
before the computer is powered on
during the Windows load process
during the POST
Which two items are used in asymmetric encryption?
a private key
a public key
A customer comes into a computer parts and service store. The customer is looking for a device to help a person with accessibility issues input instructions into a laptop by using a pen. What device should the store owner recommend to accomplish the required task?
Stylus
A user can print to a printer that is on the same network, but the traffic of the user cannot reach the Internet. What is a possible cause of the problem?
The PC has an incorrect IP address.
The NIC on the PC is faulty.
The network cable connected to the user PC is faulty.
The PC default gateway address is missing or incorrect.
The PC default gateway address is missing or incorrect.
What two default wireless router settings can affect network security? (Choose two.)
WEP encryption is enabled.
The wireless channel is automatically selected.
MAC address filtering is enabled.
A well-known administrator password is set.
The SSID is broadcast.
WEP encryption is enabled.
A well-known administrator password is set.
What are two cables that are used to connect a computer to a printer?
serial
FireWire
A network technician is checking a computer to see if the DHCP client is working correctly. The technician issues the ipconfig /all command. Which two parameters should the technician review? (2 answers)
subnet mask
default gateway
During the troubleshooting of a PC that will not boot, it is suspected that the problem is with the RAM modules. The RAM modules are removed and put into another PC, which successfully powers on. The RAM modules are then put back into the original PC and it now successfully powers on as well. What was the most likely cause of the problem?
The RAM modules were not seated firmly.
printerA network specialist has been hired to install a network in a company that assembles airplane engines. Because of the nature of the business, the area is highly affected by electromagnetic interference. Which type of network media should be recommended so that the data communication will not be affected by EMI?
Fiber optic
Users in a recently installed wireless network are complaining of slow data transfer and frequent loss of connectivity. The technician checks that the wireless security is correctly implemented, and there is no evidence of unauthorized users on the network. Which two problems might the technician suspect?
There is interference from outside sources.
The wireless signal is too weak.
During computer forensics investigations, which type of data is lost when power is removed from the computer?
data that is stored in RAM
What are two business and technical challenges that implementing virtualization within a data center help businesses to overcome?
physical footprint
power and air conditioning
A technician is troubleshooting a 4-year-old computer that takes a long time to boot, and identifies that the BIOS rediscovers all the hardware at every boot. What action would fix this problem?
Launch Device Manager to discover new hardware.
Reset the BIOS using the CMOS jumper.
Replace the CMOS battery.
Start the computer with the last known good configuration.
Replace the CMOS battery.
What are two methods to connect to a printer wirelessly?
IEEE 802.11 standards
Bluetooth
A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent?
social engineering
A technician has just finished assembling a new computer. When the computer is powered up for the first time, the POST discovers a problem. How does the POST indicate the error?
It issues a number of short beeps.
A technician needs to use an application that is not supported by Windows operating systems on the PC. How can the technician make this application run on the PC?
Create a virtual machine with an operating system that supports the application.
A technician is troubleshooting a problem where the user claims access to the Internet is not working, but there was access to the Internet the day before. Upon investigation, the technician determines that the user cannot access the network printer in the office either. The network printer is on the same network as the computer. The computer has 169.254.100.88 assigned as an IP address. What is the most likely problem?
The network interface card driver needs to be updated.
What are two functions of a print server?
provide print resources to all connected client computers
store print jobs in a queue until the printer is ready