The document describes several troubleshooting scenarios involving users, networks, and computers. It provides multiple choice questions and answers for each scenario. Some key points:
- A user is unable to download files but needs to be able to. The best option is to set the file permissions to Read and Execute.
- When servicing a laser printer, the technician should avoid touching the corona wire and printer head as they can retain high voltage even when unplugged.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
60 views4 pages
Set The File Permissions To Read and Execute
The document describes several troubleshooting scenarios involving users, networks, and computers. It provides multiple choice questions and answers for each scenario. Some key points:
- A user is unable to download files but needs to be able to. The best option is to set the file permissions to Read and Execute.
- When servicing a laser printer, the technician should avoid touching the corona wire and printer head as they can retain high voltage even when unplugged.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4
ut is unable to download the files.
What action can the administrator take to allow
the user to download the files while preventing deletion of the files? Set the folder permissions to Read. Set the file permissions to Modify. Set the file permissions to Full Control Set the file permissions to Read and Execute. 44. A technician is servicing a laser printer. Which two printer parts should the technician avoid touching because they retain large amounts of voltage even when disconnected from a power source? conditioning roller toner cartridge corona wire printer head paper tray 45. A wireless LAN is being deployed inside the new one room office that is occupied by the park ranger. The office is located at the highest part of the national park. After network testing is complete, the technicians report that the wireless LAN signal is occasionally affected by some type of interference. What are two possible causes of the signal distortion? (Choose two.) the microwave oven the large number of trees that surround the office the cellular phones that are used by the employees the elevated location where the wireless LAN was installed the number of wireless devices that are used in the wireless LAN 46. A technician is to document the current configurations of all network devices in a college, including those in off-site buildings. Which protocol would be best to use to securely access the network devices? FTP HTTP SSH Telnet 47. A computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem? The cable is not connected properly to the NIC. The computer has an invalid IP address. The computer has an incorrect subnet mask. The computer has an invalid default gateway address. 48. What is the reason for disabling SSID broadcasting and changing the default SSID on a wireless access point? Anyone with the default SSID can gain access to the access point and change the configuration. Disabling SSID broadcasting frees up radio frequency bandwidth and increases the data throughput of the access point. The access point stops broadcasting its own MAC address, thus preventing unauthorized wireless clients from connecting to the network. Wireless clients must then have the SSID manually configured to connect to the wireless network. 49. After confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of the system? Check for the latest OS patches and updates. Document the problem and the procedures performed to solve it. Talk with the user to determine the cause of the problem. Gather information from a number of sources to clearly identify the problem. 50. Rogue antivirus warning windows have been reported as appearing on computers in a company. The computer systems administrator is drafting a notice to all employees explaining how to deal with this problem. In addition to a description of the problem and the reporting procedure, which two instructions should also be included in the notice? (Choose two.) Do not click anywhere in the warning window. If the window has to be closed, then press Alt + F4. Close the window by clicking the cross in the top right corner. Click the Cancel button in the window to close the window. Update the antimalware software on the computer. 51. An audit reveals company files that are stored in the personal server space of a former employee have been modified after the employee left the company. What should be done to prevent further unauthorized access to these files, while still allowing the company to use them? Disable the account of the former employee. Delete the account of the former employee. Delete the files from the server. Change the account to a Guest account. 52. A technician is explaining the differences between inkjet printers and laser printers to a customer. Which two comparisons should the technician make? (Choose two.) Inkjet printers are less expensive as an initial purchase than laser printers. A laser printer is significantly slower than an inkjet printer. Both laser and inkjet printers produce poor quality images. The laser printer output is dry after printing, but an inkjet printer may still have wet ink on the paper after printing. Inkjet printers use plain paper to make economical prints, but laser printers require more expensive thermal paper. 53. Which two procedures should be done before performing preventive maintenance on a laptop? (Choose two.) Attach any devices that are normally used as part of daily operations. Verify that all drivers are current. Ensure the BIOS is the latest version. Disconnect the AC adapter. Remove the battery. Ensure the latest operating system updates have been applied. 54. In what circumstance would plenum-rated twisted-pair computer network cabling be required? when the required cable run is more than 330 feet in length when the cable run must be installed inside a ceiling when the cable run connects to the MDF when the cabling is installed at a punchdown block in a wiring closet 55. Which three actions should be part of a regular computer preventive maintenance plan? (Choose three.) removing dust from fan intakes, the power supply, and peripherals installing appropriate security updates removing unused or unwanted programs changing browser settings deleting old email installing more RAM in the machine 56. Which feature is characteristic of the ntbackup command? It can be executed from a batch file. It can be used to restore files. It is used to create a copy of the registry. It is used to create restore points. 57. What are the four layers in the TCP/IP reference model? HTTP, TCP, IP, Ethernet TCP, IP, Ethernet, IEEE application, transport, internet, network access application, presentation, session, transport physical, data link, network, transport 58. After the administrator manually configures the correct SSID on a new laptop, the computer is still unable to connect to the wireless LAN. Which additional action should the administrator take to resolve this problem? Modify the group account of the user to include all file permissions. Reboot the wireless access point. Rename the laptop and reset the user password on the network. Verify that the MAC address for the laptop is in the MAC address filter table. 59. The current IP configuration of a small company is done manually and is time- consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service would simplify the workstation IP configuration task? APIPA DHCP DIPS ICMP 60. What is a typical task performed by a level one technician in a call center? gathering information when a customer calls for help solving the problem that might require opening up the computer case using remote access software to troubleshoot the customer computer picking up an escalated work order and calling the customer for further information 61. Which action can reduce the risk of ESD damage when computer equipment is being worked on? working on a grounded antistatic mat lowering the humidity level in the work area moving cordless phones away from the work area keeping the computer plugged into a surge protector 62. What approach should a technician take when receiving a call from a stressed customer? Ask the customer to telephone back when the customer is feeling less stressed. Ask the customer to hold, and then wait five minutes for the customer to calm down. * Try to establish a rapport with the customer. Transfer the customer to a level-two technician who will ask the customer to explain the problem again. 63. A call center technician answers a call from a frequent customer who is known to be impatient and lacks experience with computers. The customer has an issue with an application that the call center supports. The customer informs the technician that the problem had been reported before but the original technician was rude, did not listen, and did not fix the problem. If the technician is confident that the problem can be resolved by increasing the amount of memory in the computer, what should the technician do? Tell the customer to install 2 GB of DDR3 PC3-10600 RAM. Explain that the original technician is no good and the supervisor will be told. Suggest that the customer purchase a new computer. Confirm the issues and give detailed instructions to solve the problem. 64. A call center technician has asked a customer to perform a simple operation to fix a problem on a computer. The customer seems unable to perform the task. What should the technician do?