Front | Back |
You are helping a customer with an Internet connectivity problem. The customer tells you that the computer cannot connect to a favorite website. After quickly analyzing the computer, you note that it cannot connect to any websites. What should you do next?
|
Establish a theory of probable cause
|
You need to automatically check for performance issues in Windows 7. Which tool is the best option?
|
Troubleshooting item in the Control Panel
|
Which of the following is used by BitLocker to provide an encryption key and to protect data?
|
TPM
|
You want to verify that the local computer's network card is functioning properly. Which IP address should you use?
|
127.0.0.1
|
How would you secure a smartphone and its data?
|
Passcode lock
Remote wipe |
Your customer has a computer (called comp112) that has been infected by a worm. The worm has propagated to at least 30 other computers on the network. What should you do first before attempting to remove the worm from the computer named comp112?
|
Disconnect the network cable from the computer
|
Which command should you use to fid out the intergrity of a hard drive?
|
CHKDSK
|
Your boss asks you to find a list of routers along a given path through multiple networks. What command can help you?
|
TRACERT
|
Your computer's laptop's LCD is being scratched by the keyboard when the lid is closed. What would prevent this from happening?
|
Replace the rubber bumpers
|
You have determined that the USB controller is malfunctioning. What should you do first to troubleshoot this problem?
|
Use the Windows Device Manager
|
You have been asked by a customer to add a second optical drive, to be referenced as M: on a computer running Windows 7. What is the best place to accomplish this?
|
Disk Management
|
A user attempts to print a large image but only half the graphic prints out. What is the most likely reason for this?
|
The printer needs more memory
|
Which of the following printer failures is described as a condition in which the internal feed mechanism stopped working temporarily?
|
Paper jam
|
Which command would you use to delete an empty directory?
|
FORMAT
|
One of your co-workers is attempting to access a file on a share located on a remote computer. The file's share permissions are set to allow the user full control; however, the NTFS permissions allow the user to have read access. What will be te user's resulting access level for the file?
|
Read
|