random stuff
cables and other things
network
Troubleshooting
Printers
100

What are two examples of personally identifiable information (PII)? (Choose two.)

street address

credit card number

IP address

first name

street address

credit card number

100

A high technology company has an issue with unauthorized people gaining access into the company by following an authorized employee through the secure entrance. Which two measures could help with this security breach? (Choose two.)

mantrap

100

When would a printer be considered a network host?

when it is connected to a switch

100

An employee reports that each time a workstation is started it locks up after about 5 minutes of use. What is the most likely cause of the problem?

The RAM is malfunctioning.

The power supply fails to provide adequate voltage and current.

The CPU is overheating.

The hard disk is failing.

The CPU is overheating.

100

What is a function of the BIOS?

performs a check on all internal components

200

What are two advantages of using PC virtualization? (Choose two.)

It prevents viruses and worms from functioning in a virtualized environment.

It can provide cost savings.

It allows multiple operating systems to run on a single PC simultaneously.

It allows network threat identification.

It boosts the performance of the host machine through virtualization.

It can provide cost savings.

It allows multiple operating systems to run on a single PC simultaneously.

200

A technician has assembled a new computer and must now configure the BIOS. At which point must a key be pressed to start the BIOS setup program?

during the POST

after the POST, but before Windows starts to load

before the computer is powered on

during the Windows load process

during the POST

200

Which two items are used in asymmetric encryption?

a private key

a public key

200

A customer comes into a computer parts and service store. The customer is looking for a device to help a person with accessibility issues input instructions into a laptop by using a pen. What device should the store owner recommend to accomplish the required task?

Stylus

200

A user can print to a printer that is on the same network, but the traffic of the user cannot reach the Internet. What is a possible cause of the problem?

The PC has an incorrect IP address.

The NIC on the PC is faulty.

The network cable connected to the user PC is faulty.

The PC default gateway address is missing or incorrect.

The PC default gateway address is missing or incorrect.

300

What two default wireless router settings can affect network security? (Choose two.)


WEP encryption is enabled.

The wireless channel is automatically selected.

MAC address filtering is enabled.

A well-known administrator password is set.

The SSID is broadcast.

WEP encryption is enabled.

A well-known administrator password is set.

300

What are two cables that are used to connect a computer to a printer?

serial

FireWire

300

A network technician is checking a computer to see if the DHCP client is working correctly. The technician issues the ipconfig /all command. Which two parameters should the technician review? (2 answers)

subnet mask

default gateway

300

During the troubleshooting of a PC that will not boot, it is suspected that the problem is with the RAM modules. The RAM modules are removed and put into another PC, which successfully powers on. The RAM modules are then put back into the original PC and it now successfully powers on as well. What was the most likely cause of the problem?

The RAM modules were not seated firmly.

300

printerA network specialist has been hired to install a network in a company that assembles airplane engines. Because of the nature of the business, the area is highly affected by electromagnetic interference. Which type of network media should be recommended so that the data communication will not be affected by EMI?

Fiber optic

400

Users in a recently installed wireless network are complaining of slow data transfer and frequent loss of connectivity. The technician checks that the wireless security is correctly implemented, and there is no evidence of unauthorized users on the network. Which two problems might the technician suspect? 

There is interference from outside sources.

The wireless signal is too weak.

400

During computer forensics investigations, which type of data is lost when power is removed from the computer?

data that is stored in RAM

400

What are two business and technical challenges that implementing virtualization within a data center help businesses to overcome?


physical footprint

power and air conditioning

400

A technician is troubleshooting a 4-year-old computer that takes a long time to boot, and identifies that the BIOS rediscovers all the hardware at every boot. What action would fix this problem?

Launch Device Manager to discover new hardware.

Reset the BIOS using the CMOS jumper.

Replace the CMOS battery.

Start the computer with the last known good configuration.

Replace the CMOS battery.

400

What are two methods to connect to a printer wirelessly?

IEEE 802.11 standards

Bluetooth

500

A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent?

social engineering

500

A technician has just finished assembling a new computer. When the computer is powered up for the first time, the POST discovers a problem. How does the POST indicate the error?

It issues a number of short beeps.

500

A technician needs to use an application that is not supported by Windows operating systems on the PC. How can the technician make this application run on the PC?

Create a virtual machine with an operating system that supports the application.

500

A technician is troubleshooting a problem where the user claims access to the Internet is not working, but there was access to the Internet the day before. Upon investigation, the technician determines that the user cannot access the network printer in the office either. The network printer is on the same network as the computer. The computer has 169.254.100.88 assigned as an IP address. What is the most likely problem?

The network interface card driver needs to be updated.

500

What are two functions of a print server?

provide print resources to all connected client computers

store print jobs in a queue until the printer is ready