A technician notices multiple disk errors in the Event Viewer. Which of the following tools would BEST diagnose this issue?
A. CHKDSK
B. FDISK
C. BOOTREC
D. DISKPART
Phishing is:
A. An infection that causes a web browser to go to a different site than the one intended from a search result page.
B. A technique used to obtain financial information from a user mimicking a legitimate website.
C. An infection that causes a computer to behave erratically by playing music and launching browser windows.
D. A technique used to obtain financial information from a user by compiling information from social networks and their friends.
Which of the following will allow a company to implement the MOST cost-efficient way to easily identify whether a user has secure access to particular areas of a building?
A. Require badges
B. Install retina scanners
C. Install firewalls
D. Require key fobs
A technician installs a new SOHO wireless router to replace a failed router and users report connectivity issues and IP errors. Which of the following is the MOST likely cause?
A. Their server has gone down
B. There are too many static IP addresses on the network
C. The new router's firewall is malfunctioning
D. Users need to refresh their IP configuration
A user states that their wireless connection drops when the phone rings. Which of the following solutions BEST shows what the technician should do to prevent this from happening?
A. Move the access point closer to the user
B. Remove the phone
C. Change the frequency that the wireless router is using
D. Change the wireless security encryption settings
A user has a nonfunctional computer that has two hard drives. The user needs to retrieve information from one of the drives. Which of the following would be used?
A. Reformat bad hard drives
B. External enclosure
C. Reformat all hard drives D. CHKDSK along with DEFRAG utility
DXDIAG is used to display information about which of the following components and its characteristics?
A. Printer components
B. Network components
C. Graphics components
D. Storage components
Which of the following is a common component found on ultra thin laptops and tablet devices?
A. Solid state drives
B. Touch screen interface
C. Upgradeable RAM
D. Field serviceable parts
Following an authorized person through a door or other security check point without showing proper identification or defeating a security mechanism is known as which of the following?
A. Hacking
B. Emulating
C. Partitioning
D. Tailgating
A small library has an integrated switch and router that is not wireless. All of the public PCs in the library are connected to the device. Which of the following is the FIRST thing the library should do to deter curious patrons from interfering with the device?
A. Configure DNS to resolve externally rather than internally
B. Enable MAC filtering to permit public PCs
C. Change the default user name and password
D. Set up the DHCP server to use a different gateway option