Clock


Invite Icon

Jika postingan saya bermanfaat dan anda menyukainya, Bantu ya kawan buat nyebarin blog saya. pasang icon blog saya di blog anda,yuk gabung!

Lalu paste ke HTML website yang anda punya, terimakasih yang sudah mencobanya

Visitors

Free counters!

Visitors

Members

Total Pageviews

About Me

Rank

Review indo-toshare.blogspot.com on alexa.com
Tukeran Link | Backlink | Link Exchange
Related Posts Plugin for WordPress, Blogger...
-MOHON MAAF JIKA ADA LINK YANG BROKEN. ITU DISEBABKAN KARENA TELAH DI HAPUS OLEH PENCIPTA LINK. JIKA TERDAPAT LINK BROKEN HARAP LAPOR/TINGGALKAN KOMENTAR, TINGGALKAN KOMENTAR ANDA JUGA JIKA MENURUT ANDA POST DI BAWAH BERMANFAAT/MENARIK DAN SELAMAT BERAKTIFITAS..TERIMAKASIH ATAS PERHATIANNYA-
Wednesday, May 23, 2012
Mudah mudahan terbantu ya kawan dan mendapatkan nilai 100 aminn.. 


1.A technician is trobleshoouting a networked computer. The technician has gathered as much information as possible from the user and now needs to verify obvious issues. Which two action should the technician perform? (choose two.)
• Verify the computer IP information;
• Check activity on the routers.
2.Which statement is true about network maintenance?
• Educating users on IT policies and procedures is an example of proactive network maintenance;
3.A technician is concerned that a wireless router is missing current security features. What action
• Check for an updated firmware version;
4.A company purchases several wireless NICs at a great price. After installing the NICs, they find that the user cannot connect to the 2,4 GHz wireless network. What is a likely cause of the problem?
• The NICs are designed for the 802.11a standard;
5.In Internet Explorer, after choosing Tools and then Internet Options, which tab would a user select to set the browser to prompt before downloading potentially unsafe content?
• Security.
6.A technician is working on a workstation that has an IP address of 169.254.25.34. The technician found that the computer cannot connect to the Internet and the network cable to the computer had been disconnected. Which command can a technician use to get a new IP address once the cable is reconnected?
• ipconfig /renew;
7.Which three ports are used by SMTP, POP and IMAP ? (Choose three.)
• 25
• 110
• 143
8.A technician has been asked to install a second optical drive in a computer. The technician will need to configure the drive as slave. How can the technician accomplish this desired configuration?
• Use jumpers on the drive to configure the drive as slave.
9.Which protocol provides secure transport of data from the company web server to remote users?
• HTTPS
10.The network technician is researching the best way connect the branch offices to the main office. What are three main considerations that the technician should remember when choosing an Internet connection? (choose three.)
• availability;
• reliability;
• speed.
11.Which action should a user take to ensure that personal information that is entered into a website form is not retained on the computer?
• Delete the temporary Internet files.
12.ABC Computer Company is in the process of planning a network for a new client. A network technician has been asked to perform a physical inspection of the facilities to determine the flow of data and protocols required by the client. What is this inspection called?
• site survey.
13.A user is reporting intermittent loss of connectivity to the network. No other users have reported similar issues. What preventive maintenance task would likely identify the problem?
• Check for a damaged network cable at the user workstation;
14.A user is receiving e-mail on a regular basis from a particular person. A problem occurs when the e-mail from this same person contains an attachment. What is one solution?
• Request that the person sending the e-mail attach only one picture per e-mail message;
15.When planning the network in a new bulding, the technician notes that the company requires cabling that can extend up to 295ft (90m) with enchanged banwith support at an affordable price. Which cable type will the technician pick if he chooses the most common type of cabling used on network?
• Cat5e
16.Which two protocols are used to receive e-mail? (choose two.)
• IMAP
• POP3
17.Which two hazard exist when working with fiber optic cabling (choose two.)
• Chemicals;
• Glass splinters;
18.Students on the college network need to be able to view folder names and data in files stored on the Windows based file server, but should never be allowed to add or save information on the server. Occasionally, the students also need to run media programs to watch videos stored on the server. Which permission should the network technician assign to the students accesing the file server?
• Read;
19.A new employee needs to transfer files to the corporate FTP server. However, the employee is unable to log in to the FTP server. What is the most likely cause of the problem?
• The employee is using an incorrect username or password;
20.What are two ways to assign an IP address to wirekess NIC? (choose two.)
• Assign a static address;• Use DHCP.


Kunjungi dan selamat mencoba :



Ditulis Oleh : Unknown|Admint MYSHARE

M.HIDAYAT
Salam Blogger lovers Sejati
Blogger Loverz sedang membaca artikel tentang Chapter 15 Exam - IT Essentials:PC Hardware and Software(Vesion 4.1).Saya sebagai Admint Blog MYSHARE, Mari kita menghargai sesama blog jika menurut Blogger lovers artikel ini bermanfaat, silahkan share di mana saja dan jika berkenan mohon mencantumkan link sumbernya.Sukses buat Blogger lovers sejati!!,Terimakasih atas perhatiannya.

Sebagai GUEST yang baik di harapkan meninggalkan KOMENTAR atau sedikit Bantuan LIKE pada Artikel yang Blogger lovers Baca,TERIMAKASIH..!!

0 comments:

Chat Box

Translate

English French German Spain Italian Dutch Russian Portuguese Japanese Korean Arabic Chinese Simplified

Serch

Recent post

GameStop, Inc.