1.
Which of the following describes a secure connection over the Internet between two sites?
2.
On a Windows XP machine, which of the following settings should be configured to allow dragging of files without holding the mouse button?
3.
A technician troubleshooting an issue has implemented a solution. Which of the following is the NEXT troubleshooting step the technician should take?
4.
Which of the following is the LAST step of the troubleshooting theory?
5.
A user can no longer launch their word processing program. The program worked fine yesterday. Which of the following options could BEST be used to fix the word processing program?
6.
Which of the following printers uses toner to transfer an image onto paper?
7.
A user reports a problem with a PC located in the same room as cement testing equipment. The room has adequate cooling. The PC will boot up but locks up after 5 to 10 minutes of use. After a lockup, it will not reboot immediately. Which of the following is the MOST likely problem?
8.
Which of the following is commonly used to restrict access to a network, based on the physical hardware address of the client's network device?
9.
Which of the following should be done FIRST when identifying and troubleshooting a problem?
10.
Which of the following protocols is used to connect to a secure Internet website?