Which of the following features allows for easier navigation of long lists on a tablet device?
D. Touch flow
Which of the following file system types is used primarily for optical media?
When moving files from a Microsoft gaming console, which of the following command line utilities is recommended to transfer files?
Which of the following should a technician implement to prevent external contractors from physically plugging devices into the company’s network jacks unless such jacks are designated for guest use?
A. Disable DHCP and assign a static IP address to each network device physically connected to the network.
B. Enable MAC address filtering across all network jacks and record the MAC address of guest devices.
C. Disable all switch ports when they are not utilized and enable them on an as needed basis.
D. Place guest network jacks in public areas and all other jacks in secure areas as needed.
The best way is to disable all switch ports when they are not utilized. Switch them on when you need them. This way, you can prevent external contractors from physically plugging devices in to company’s network jacks.
After installing a new printer the organization determines that there are problems printing images and very large files. Which of the following will MOST likely resolve the issue?
A. Update the drivers using WHQL drivers
B. Install additional memory to each computer
C. Install additional memory to the printer
D. Apply the latest OS service pack
Which of the following command line tools will terminate a non-system process without restarting the computer?
After accidentally removing a hard drive from a server with three drives in a RAID 5 configuration, a technician notices the server locks up and shuts down. Which of the following can the technician do to quickly fix the problem?
A. Replace the RAID controller and boot.
B. Reinsert the drive and boot.
C. Plug the drive back in, the system will resume automatically.
D. Remove all drives and rebuild the array.
Just reinsert the drive and boot the computer. The computer will start since it is a RAID 5 configuration.
A customer calls an IT consultant to explain an issue they are having with their Windows 7 Professional PC. Windows Update attempts to install patches upon each startup but fails on the same single update. The customer has attempted to re-run Windows Update from Control Panel but the issue remains. Which of the following courses of action would BEST resolve the problem?
A. Running a full DEFRAG on the system
B. Clearing the AppData temp folder entirely
C. Clearing the Windows Update download cache entirely
D. Uninstalling the Windows Update feature in Windows 7 and reinstalling it directly from the Microsoft website
A user reports that their wireless connectivity is being spotty. The issue seems to interrupt their wireless signal connection when the laptop screen is tilted forward or backward during operation. When this happens, the entire wireless signal drops out until the screen is left in position for a good minute or so. Which of the following MOST likely explains what is happening?
A. The hinges on the laptop screen are not strong enough to support the wireless signal cables.
B. The wireless card is losing contact to its socket when the screen is opening/closing.
C. The laptop is designed to work optimally with wireless when the screen is at a perfect 90 degree angle.
D. The wireless signal cables are being crimped when the screen is opening/closing.
A user states that they cannot connect to the network or the Internet. The technician determines the issue is that the computer has a static IP address and needs to use DHCP to work correctly. The technician sets the NIC to automatically assign an IP address. Which of the following should the technician perform NEXT?
A. Identify the type of network card and what Operating System the computer is running
B. Confirm the computer is back on the network and has Internet connectivity
C. They need to annotate what the static IP address was and inform the employee’s manager
D. They need to determine why the NIC was assigned a static IP address
After several passes with a malware removal program, the program keeps detecting the same malware infection after a reboot. Which of the following should be done to attempt to remove the offending malware?
A. Run the malware removal program while disconnected from the Internet
B. Run the malware removal program in Windows Safe Mode
C. Reinstall the malware removal program from a trusted source
D. Set the malware removal program to run each time the computer is rebooted
A user, Joe, calls and states every few hours he is unable to connect to the Internet for several minutes but is able to access internal sites during this time. Which of the following tools would be used to find the issue with the network connection?
A technician is trying to prevent a local application from reaching the web due to security concerns. Which of the following solutions could BEST prevent the application from reaching the web? (Select TWO).
A. Configure the workstation for a static IP
B. Disable all wireless network connections
C. Remove shortcuts to the application
D. Block the application in Windows Firewall
E. Change network location to Work
F. Reroute the web address in HOSTS file
Use Windows firewall to restrict an application from reaching the web. Alternatively you can also reroute the web address in the HOST file.
For the last year, a company has gathered statistics on the most common security incidents. The highest percentage deals with opening email attachments that contain malware. Which of the following would mitigate this issue without reducing productivity?
A. Annual cyber security education
B. Update antivirus signatures more often
C. Block all email attachments
D. Install an IPS on each workstation
A company wants to ensure that the latest cyber security threats are known to the employees across the enterprise to minimize occurrences. Which of the following should be implemented?
A. Message of the Day
B. Email lists
C. Company forums
D. Regular user education
Educating user is the best way to combat security threats. After all security threats occur when a human carries it across unknowingly.
Which of the following operating systems can be upgraded directly to Windows 7 Professional by a default installation? (Select TWO).
A. Windows 7 Home Premium
B. Windows Vista Business
C. Windows XP Home
D. Windows XP Professional 64-bit
E. Windows XP Media Center
A technician has finished replacing the network card in a laptop and has verified full system functionality. Which of the following troubleshooting steps should the technician take NEXT?
A. Document findings, actions, and outcomes
B. Escalate problem to a senior technician
C. Re-establish new theory of probable cause
D. Perform a full system backup
A technician is implementing a SOHO wireless network for Company A that shares a floor with Company B. Which of the following would BEST secure the wireless network so that only Company A employees are allowed access?
A. Turning down the radio power level
B. Enabling MAC filtering
C. Setting a high encryption level
D. Disabling the SSID broadcast
A technician enabled remote management on the small office WAP to manage this device from another location. Users are reporting that the WAP has changed its SSID without anyone’s knowledge. Which of the following would prevent this from occurring?
A. Change to user MAC filtering
B. Change default usernames and passwords
C. Disable the SSID from broadcasting
D. Enable static IP addresses
A technician has configured the ability to connect to a small office server using remote desktop from a workstation within the office. The technician has reviewed logs that show constant brute force attacks to that server from outside the network. Which of the following would prevent this from occurring?
A. Configure the server to use a static IP
B. Logically move the server to the DMZ
C. Reallocate the server to a different networking closet
D. Disable the remote desktop port