Beruflich Dokumente
Kultur Dokumente
Making data appear to come from a source other than the actual source.
Sending abnormally large amounts of data to a remote server to prevent user access to the server services.
Sending bulk e-mail to individuals, lists, or domains intending to prevent users from accessing e-mail.
antivirus program
firewall
network analyzer
spyware program
Refer to the exhibit. A technician is troubleshooting a problem where a teacher is unable to connect a laptop to a wireless netwo
wireless NIC is enabled and the wireless network configuration settings are correct. Which key would be used in conjunction with
key to enable the wireless connection?
F5
F6
F7
F8
Disk Management
Chkdsk
Defrag
Device Manager
fusing
writing
skewing
spraying
transferring
sublimating
drum
ink cartridge
ink ribbon
paper
toner
Remove all the peripherals except the hard drive and observe the results.
Ask the customer to telephone back when the customer is feeling less stressed.
Ask the customer to hold, and then wait five minutes for the customer to calm down.
Transfer the customer to a level-two technician who will ask the customer to explain the problem again.
The peripherals can be plugged in and out without turning the laptop off.
Data transfer is more controlled than using the parallel or serial ports.
Ensure the humidity and temperature levels are set as low as possible.
Ensure the number of wireless NICs exceeds the number of wireless phones.
Ensure the wireless network is on a different frequency than the offending source.
Ensure each wireless NIC is configured to operate at different frequencies from all other wireless NICs.
Choose Start > Settings > Control Panel. Double-click Network Connections. Right-click the NIC. Choose Properties >
Uninstall.
Choose Start > Settings > Control Panel. Double-click System. Click the Hardware tab. Choose Device Manager. Choo
Action > Uninstall.
Choose Start > Settings > Control Panel. Double-click Add or Remove Programs. Click Change.
Individual users are in control of their own computers and network resources.
ACPI power management must be enabled in the BIOS using Administrative Tools in the Windows Control Panel.
APM power management mode must be configured in the BIOS before ACPI can be used to enable power management.
APM power management mode must be configured in the BIOS so that Windows XP can be used to enable power manage
ACPI power management mode must be enabled in the BIOS before Windows XP can be used to configure power manage
The technician lacks the file attribute rights to the file to copy it to the external drive.
The external drive is formatted with a FAT 32 file system and the file is too large for that file system.
The file is a system file and will cause the operating system to fail if it is moved.
The technician needs to add the file to the Master File System before trying to move the file.
multi-ping attack
phishing
ping bomb
ping of death
spoofing
zombie attack
antistatic mat
soft cloth
flat-head screwdriver
FAT16
FAT32
HPFS
NTFS
CDFS
corrupted driver
20/21
22
23
25
80
Press the function key sequence to activate the image on the projector.
Turn audio and video off on the laptop and on for the projector.
The motherboard slot requires the number of wires that are represented by the different colors.
Temperature should be preferentially between 45 to 90 degrees Fahrenheit (7 to 32 degrees Celsius) to avoid overheating.
In dusty conditions, laptop vents should be partially covered to prevent the internal components from getting dirty.
Laptops should be cleaned every month or the internal components will be damaged.
Open the Windows XP CD. Locate the Windows Components folder. Right click on Component. Choose Install.
Right click on the Desk Top. Choose Properties > Settings > Add/Remove Windows Components
Choose Start > Control Panel > Add Remove Programs > Add/Remove Windows Components
ntldr
regedit
msconfig
Task Manager
Refer to the exhibit. A Cisco Networking Academy instructor is trying to print a flash graphic from the curriculum. The print job ha
into the print queue as shown. Based on the output, what should be the next step in solving this problem?
FAT32
HPFS
NFS
NTFS
adware
Trojan
worm
virus
grayware
server
administrator
root
unlimited
RAID 0 does not provide any protection for the data that is located on a hard drive.
dot-matrix
solid-ink
daisy-wheel
thermal
Adjust the settings to match the colors on the screen to the colors on the printed sheet.
adware
phishing
Trojan horse
virus
worm
cache memory
DDR SDRAM
FPM DRAM
SDRAM
SRAM
all-in-one
drum
handheld
flatbed
DB-9
DB-25
IEEE 1284
IEEE 1394a
IEEE 1394b
It prevents third party drivers from modifying the operating system kernel.
It permits the 64-bit operating system to patch the operating system at a much higher rate.
It prevents the use of additional operating system kernels from being added to Vista.
It allows the use of unsigned drivers to be used within the 64-bit Vista operating system.
It prevents the use of 32-bit drivers with the 64-bit Visa operating system.
loopback adapter
port scanner
network analyzer
PS/2
component
speaker
DVI
parallel
The power supply has sufficient wattage to support all components inside the computer.
The power supply provides at least 800 V.
The power supply must have both a P-8 and P-9 connector.
Convert
Fdisk
Msconfig
Ntbackup
DHCP
DNS
ICMP
RARP
TCP
sliding the selective power switch to the on position on the power supply