How do you create a restore point?
You are working as a technician at Certkiller .com. You are about to install some new software to a
workstation, but before you do that you wish to create a restore point. How do you create a restore
point?
Which of the following you do next?
You are working as a technician at Certkiller .com. You have just finished installing and testing a
printer to a user’s workstation. Which of the following you do next?
Which of the following would MOST likely be the cause?
You are working as a technician at Certkiller .com. You are asked to troubleshoot a network printer
that is no longer printing. You start by examining all cables and verify that they are properly
attached. Also the IP settings seems to be correct and you are able to PING the network’s
gateway from a computer but not the printer’s IP address. Which of the following would MOST
likely be the cause?
Which of the following should you do to ensure that the problem is resolved?
You are working as a technician at Certkiller .com. You have just finished installing a new
maintenance kit in a laser printer with multiple trays. The printer has a history of having repeated
paper jams. Which of the following should you do to ensure that the problem is resolved?
Which of the following is MOST likely the cause?
You are working as a technician at Certkiller .com. You have been asked to troubleshoot a printer
that is producing faded print quality. The toner cartridge has been changed but there was no
improvement. Which of the following is MOST likely the cause?
What will you answer him?
You are working as a senior network technician at Certkiller .com. A trainee asks you where in the
OSI model layers the MAC address reside. What will you answer him?
Which of the following actions should you take?
You are working as a senior network technician at Certkiller .com. You have just installed a laser
printer that is directly connected to your Windows XP workstation. You wish to share the laser
printer to the local workgroup consisting of the other technicians at Certkiller .com. You want to be
able to control which users can access the printer but you can not find a permissions tab for the
printer. Which of the following actions should you take?
Which of the following would be the BEST method to maintain a secure wireless network?
You are working as a network technician at Certkiller .com. You are asked to install a new wireless
network in one of Certkiller .com’s branch offices. You have read about security flaws in wireless
networks and therefore you are concerned with securing the wireless network as much as possible
with reasonable amounts of administration. Which of the following would be the BEST method to
maintain a secure wireless network?
Which of following actions should recommend the user to take?
You are working as a technician at Certkiller .com. You receive an call from a suspicious user that
has received an email stating that the company’s network administrators are attempting to validate
the complexity of login passwords by requesting that users provide the password in a reply email.
Which of following actions should recommend the user to take?
What should you
You work as a technician at Certkiller .com. You receive a telephone call from a user stating that
he has forgotten the password and is unable to access company email. What should you