1. A technician arrives at a job site to troubleshoot a copier. Which of the following safely procedures are MOST appropriate for this task?
A) A. Wearing long parts B) B. Using an ESD mat C) C. Removing jewelry D) D. Disabling the circuit breaker
2. While booting a Linux workstation, a runtime error occurs as the kernel is loading. The error message is written to the screen and then disappears. Which of the following is the system location where this error will be available to reference during troubleshooting?
A) A. /var/log/message B) B. /tmp/logs C) C. /var/spool D) D. /etc/sysconfig/kernel
3. Ann, a user, reports that a website the company uses for time and attendance is not performing properly. The technician goes to Ann-s computer and troubleshoots the issue. Ann can log into the website and sees her information on the main page. When Ann clicks on a link, to request time off, nothing happens. The technician looks at another user-s computer and has the user do all the same steps. The technician notices that when the other user clicks on the same link, another window opens with the page requested. The technician goes back to Ann with the issue and checks some settings. Which of the following is MOST likely causing the issue?
A) A. Invalid certificate B) B. Browser hijacking C) C. Pop-up blocker D) D. Firewall settings
4. A system analyst must ascertain why icons are occasionally missing on a user-s laptop. The analyst has determined this occurs when the system is docked to a docking station that has multiple monitors. Which of the following is the NEXT troubleshooting step?
A) A. Establish a theory of a probable cause. B) B. Verify full system functionality and implement preventive measures. C) C. Establish a plan of action to resolve the problem. D) D. Identify the problem.
5. Joe, a user, has connected a tablet to his personal mobile hotspot device in a public location for Internet access. The device display indicates there are two connections instead of just one. Which of the following actions can he perform to prevent this unauthorized access to the device immediately? (Select TWO).(Select 2answers)
A) A. Change the SSID to a different broadcast name B) B. Add the intruding device to a blocked access list C) C. Access the intruder-s device and shut it down D) D. Shut down the device until the intruder is no longer in the area E) E. Set up a WiFi analyzer to identify the intruding device
Leave a comment