Which of the following steps would the technician perform NEXT?
A technician responds to a hardware issue with a server. The technician discovers that one of the
hard drives in the server has failed. The server is set up in a RAID 1 configuration. Which of the
following steps would the technician perform NEXT?
which of the following, besides hand tools, should a technician have on hand to assure correct disassembly and
When removing the top case from a laptop, which of the following, besides hand tools, should a
technician have on hand to assure correct disassembly and reassembly? (Select TWO).
Which of the following is the problem?
A user states that when they logon to their computer sometimes they get an IP conflict error. The
user computer is configured with a static IP. Which of the following is the problem?
Which of the following is MOST likely the cause of the pop-ups?
A user has recently installed Windows 7 on a computer. They ran Windows updates, updated the
firmware and installed a printer. The user accessed a P2P application and now they are getting a
large amount of browser pop-ups. Which of the following is MOST likely the cause of the pop-ups?
Which of the following should be performed to resolve this issue?
Users are reporting that their laser printer is picking up multiple pages. The printer has very high
utilization. Which of the following should be performed to resolve this issue?
Which of the following statements is true about XP mode in Windows 7?
Which of the following statements is true about XP mode in Windows 7?
Which of the following is true about a file when it is copied from an NTFS to a FAT32 partitions?
Which of the following is true about a file when it is copied from an NTFS to a FAT32 partitions?
Which of the following MUST the technician change to prevent unauthorized users from modifying the access poin
A technician wants to ensure that only authorized administrators can make configuration changes to
the company’s wireless router. Which of the following MUST the technician change to prevent
unauthorized users from modifying the access point configuration?
which of the following is MOST important to consider?
If a customer wants to create a multi-boot PC with different editions of Windows, which of the
following is MOST important to consider?
what applications are allowed to send/receive data over the LAN connection?
Which of the following utilities would a technician use on a Windows Vista or Windows 7 machine to
configure what applications are allowed to send/receive data over the LAN connection?