当前分类: 220-702
问题:单选题Which of the following will occur if a laptop SATA 1 drive is installed on a SATA 2 controller?()A The drive will run at the lower SATA 1 speed.B The drive will not work due to incompatibility.C The drive will run at the higher SATA 2 speed.D The drive...
查看答案
问题:单选题A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireles...
问题:单选题Bob, a support technician, is trying to locate a particular registry key using REGEDIT.EXE, on aWindows 2000 PC. Which of the following is the BEST method of doing this?()A Use the import function from the File menu.B Use the find function in the Edit ...
问题:单选题A technician plugs a USB device into the computer. The system tray displays a message that reports the device is installed, but may not work properly. Which of the following is the MOST likely cause of the message?()A The device needs a firmware update...
问题:多选题Which of the following are methods to automatically update the antivirus application?() (Select TWO).AEstablish rules in the email scheduling program to perform updates.BSelect Update Now from the program options.CUse the Automatic Update feature built...
问题:单选题A color laser printer is producing pages where the ink smears when touched. Which of thefollowing components should be replaced?()A Paper trayB FuserC TonerD Drum...
问题:单选题Which of the following is the number of SCSI devices that can be added to a single narrow SCSI bus?()A 6B 7C 8D 9...
问题:Which of the following CPUs would fit into an AM2 socket?()...
问题:单选题User profiles in Windows 7 are stored in which of the following locations?()A C:/User ProfilesB C:/Documents and Settings/User ProfilesC C:/Documents and SettingsD C:/Users...
问题:单选题A user reports their system is displaying an error message ‘NTLDR is missing’. Which of the following is the MOST likely cause for this error?()A BOOT.INI file is configured incorrectlyB Corrupt MBRC Boot sector virusD System file is missing components...
问题:单选题A technician wants to create a spanned volume on a set of hard drives. Which of the following tools will identify if the drives will support a spanned volume?()A System InformationB Disk ManagementC Device ManagerD Task Manager...
问题:单选题On a Windows Vista system, the default location for user data is in which of the followinglocations?()A C:/USERSB C:/DOCUMENTS/DATAC C:/DOCUMENTS/USERSD C:/USERS/APPDATA...
问题:单选题A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the user’s resulting access le...
问题:单选题On laptops, the internal wireless adapter is known by which of the following form factors?()A PCIB Mini PCIC ISAD PCIe 1x...
问题:单选题Which of the following can be used to kill a running process?()A Control PanelB Computer ManagementC Task ManagerD Add/Remove Programs...
问题:单选题A customer states that it takes a while to refresh their display when multitasking and switching between windows, in Windows XP. Which of the following is the BEST way to shorten the delay and increase response time?()A Tell the user to use Safe Mode.B...
问题:单选题A user needs a laptop keyboard replaced because the space bar is not working. Mike, a technician, replaces the keyboard, and notices that a diagonal set of keys will not respond. Which of the following is the MOST likely cause?()A StickyKeys is enabled...
问题:单选题A client needs to be able to install a new local printer, but does not currently have permission to do so. Which of the following is the BEST user group to put the client in, to allow the printer to be installed?()A Power UsersB UsersC Backup UsersD Gu...
问题:单选题Which of the following would be the BEST way to restrict access to the WAP from certain clients?()A Disable DHCP serverB Enable WEP encryptionC Disable SSID broadcastD Enable MAC filtering...
问题:单选题Which of the following is the BEST way for Karen, a technician, to mitigate phishing attempts?()A Installing antivirusB Reconfiguring the firewallC Changing the permissions and passwordsD Educating the end user...