0% found this document useful (0 votes)
45 views3 pages

Clean The Printer

The document provides instructions for cleaning and configuring a printer, including cleaning the printer, securing printer cables, configuring the printer port, and checking for bent pins on the printer cable.

Uploaded by

Gherasie Gabriel
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
Download as docx, pdf, or txt
0% found this document useful (0 votes)
45 views3 pages

Clean The Printer

The document provides instructions for cleaning and configuring a printer, including cleaning the printer, securing printer cables, configuring the printer port, and checking for bent pins on the printer cable.

Uploaded by

Gherasie Gabriel
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 3

Clean the printer.

Secure printer cables.


Configure the printer port.
Check for bent pins on the printer cable.
32. A technician is planning an operating system upgrade for a user system that is
currently running Windows Vista. Because the BitLocker feature embedded in the
Windows Vista OS is required, there is a request that this feature be available when
the new operating system is installed. Which version or versions of Windows 7
would support this feature?
Windows 7 Ultimate
Windows 7 Ultimate and Professional
Windows 7 Ultimate and Professional and Home Premium
Windows 7 Ultimate and Professional and Home Premium and Starter
33. What does %USERPROFILE% represent in the pathC:Users
%USERPROFILE%AppDataLocalTemp?
the location of the Documents folder of a particular user
an environment variable that is set by the operating system
a variable set by the administrator for each user of the system
a fixed value that represents the level of access of a user to system files
34. A company has a preventive maintenance policy that requires every computer
have a new restore point created every six months. How can a technician create the
restore point?
From the CLI enter the command restore /cn.
Choose Start > Control Panel > Accessories > System Tools > System
Restore > Create a restore point.
Choose Start > All Programs > Accessories > System Tools > System Restore
> Create a restore point.
Right-click My Computer and then choose Properties > Restore > Create
Restore Point.
35. A technician is asked to set up one hard drive that will support two operating
systems and will store data files in three separate drive locations. Which partition
settings will support these requirements?
1 primary, 3 active, 1 extended, 2 logical
2 logical, 2 active, 3 extended
2 primary, 1 active, 1 extended, 3 logical
3 primary, 1 active, 2 extended
36. A user believes that a data file on a Windows XP computer has been corrupted.
Which utility can provide the best information about the data file?
Defrag
Chkdsk
Msconfig
Regedit
37. Which two-factor identification method requires a user to use a small radio
transmitting device and then enter a password in order for the authentication to be
accepted?
smart key
biometric reader
electronic key card
key fob
38. The corporate security policy states that all remote connections use only secure
tunnels for data communications. Which encryption technique secures data
traveling across the public Internet as if it were traveling across the corporate
LAN?
MD5
VPN
WEP
WPA
39. What type of security attack is being launched when a hacker calls a company to
obtain computer login information and pretends to be an employee?
spyware
phishing
adware
Trojan
social engineering
40. What best describes the security threat of spoofing?
making data appear to come from a source that is not the actual source
sending abnormally large amounts of data to a remote server to prevent
user access to the server services
intercepting traffic between two hosts or inserting false information into
traffic between two hosts
sending bulk email to individuals, lists, or domains with the intention to
prevent users from accessing email
41. Which three attributes of NTFS make it a better file system than FAT32?
(Choose three.)
file and folder permission options
file size per volume of 4.17 million
journaling
large cluster size
encryption at the file and folder level
maximum individual file size of 4 GB
42. Which open standards-based wireless security mode supports the highest level of
security?
WEP
WPA2
WPA
LEAP
43. After logging into a computer, a user can view

You might also like