The document provides instructions for cleaning and configuring a printer, including cleaning the printer, securing printer cables, configuring the printer port, and checking for bent pins on the printer cable.
Download as DOCX, PDF, TXT or read online on Scribd
Download as docx, pdf, or txt
0 ratings0% found this document useful (0 votes)
45 views3 pages
Clean The Printer
The document provides instructions for cleaning and configuring a printer, including cleaning the printer, securing printer cables, configuring the printer port, and checking for bent pins on the printer cable.
Download as DOCX, PDF, TXT or read online on Scribd
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 3
Clean the printer.
Secure printer cables.
Configure the printer port. Check for bent pins on the printer cable. 32. A technician is planning an operating system upgrade for a user system that is currently running Windows Vista. Because the BitLocker feature embedded in the Windows Vista OS is required, there is a request that this feature be available when the new operating system is installed. Which version or versions of Windows 7 would support this feature? Windows 7 Ultimate Windows 7 Ultimate and Professional Windows 7 Ultimate and Professional and Home Premium Windows 7 Ultimate and Professional and Home Premium and Starter 33. What does %USERPROFILE% represent in the pathC:Users %USERPROFILE%AppDataLocalTemp? the location of the Documents folder of a particular user an environment variable that is set by the operating system a variable set by the administrator for each user of the system a fixed value that represents the level of access of a user to system files 34. A company has a preventive maintenance policy that requires every computer have a new restore point created every six months. How can a technician create the restore point? From the CLI enter the command restore /cn. Choose Start > Control Panel > Accessories > System Tools > System Restore > Create a restore point. Choose Start > All Programs > Accessories > System Tools > System Restore > Create a restore point. Right-click My Computer and then choose Properties > Restore > Create Restore Point. 35. A technician is asked to set up one hard drive that will support two operating systems and will store data files in three separate drive locations. Which partition settings will support these requirements? 1 primary, 3 active, 1 extended, 2 logical 2 logical, 2 active, 3 extended 2 primary, 1 active, 1 extended, 3 logical 3 primary, 1 active, 2 extended 36. A user believes that a data file on a Windows XP computer has been corrupted. Which utility can provide the best information about the data file? Defrag Chkdsk Msconfig Regedit 37. Which two-factor identification method requires a user to use a small radio transmitting device and then enter a password in order for the authentication to be accepted? smart key biometric reader electronic key card key fob 38. The corporate security policy states that all remote connections use only secure tunnels for data communications. Which encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN? MD5 VPN WEP WPA 39. What type of security attack is being launched when a hacker calls a company to obtain computer login information and pretends to be an employee? spyware phishing adware Trojan social engineering 40. What best describes the security threat of spoofing? making data appear to come from a source that is not the actual source sending abnormally large amounts of data to a remote server to prevent user access to the server services intercepting traffic between two hosts or inserting false information into traffic between two hosts sending bulk email to individuals, lists, or domains with the intention to prevent users from accessing email 41. Which three attributes of NTFS make it a better file system than FAT32? (Choose three.) file and folder permission options file size per volume of 4.17 million journaling large cluster size encryption at the file and folder level maximum individual file size of 4 GB 42. Which open standards-based wireless security mode supports the highest level of security? WEP WPA2 WPA LEAP 43. After logging into a computer, a user can view