Which of the following can preserve permissions when copying files from one volume to another? (Select TWO).
A. DISKPART
B. Robocopy
C. Copy
D. SFC
E. XCOPY
A technician is installing Windows 7 on a new PC. Which of the following would be the MOST likely third party driver needed during installation?
A. Network
B. Video
C. RAID
D. Sound
A company is looking to donate a collection of old PCs that are no longer needed. Which of the following data destruction methods would be MOST secure for highly sensitive information?
A. Simple 1-pass zero overwrite
B. Low level 3-pass random wipe
C. Low level 7-pass random wipe
D. High level format 10 times
A user states that when they logon to their computer sometimes they get an IP conflict error. The user computer is configured with a static IP. Which of the following is the problem?
A. Duplicate IP exist on the network
B. DHCP server needs to be rebooted
C. Network adapter driver needs to be updated
D. Bad network adapter
A technician has just installed and terminated a new CAT5 network cable. The device using the cable cannot connect to the network. Which of the following tools would be BEST in troubleshooting this issue?
A. Cable tester
B. Network analyzer
C. Multimeter
D. Toner probe
A technician would like to restart a computer from a command line tool. Which of the following tools should the technician use?
A. Shutdown /f
B. Shutdown /i
C. Shutdown /r
D. Shutdown /s
A computer user, Joe, was surfing for information on a news site when he reported a screen flicker and then a pop-up appeared on his screen stating the computer was infected with a virus. Joe noticed the title of the pop-up was not from his installed antivirus. Which of the following BEST describes this infection?
A. Worm
B. Spyware
C. Social engineering
D. Malware
Which of the following usually incorporates an 8-digit code that can be found on the bottom of a SOHO router?
A. Port forwarding
B. WPS
C. Wireless encryption
D. Port triggering
A SOHO has had several issues with various unauthorized devices consuming the network's bandwidth. There are only four network devices that are authorized to access the Internet as well as the local LAN's resources. Which of the following security implementations would MOST likely help disable network access to the unauthorized devices?
A. Using complex passwords
B. Disabling the use of static IP addresses
C. Disabling ports
D. MAC filtering
When cutting back the protective coating on CAT5 wiring, which of the following is the recommended tool?
A. Punchdown tool
B. Basic crimper
C. Wire strippers
D. Degausser