Peter, a technician, is tasked with installing Windows Vista on a new PC that came with Windows XP. He would like to preserve the data on the machine in case it is needed later. Which of the following installation methods would be MOST effective for him to use?
A. Image creation B. Unattended installation C. Clean install D. In-place upgrade
An administrator has taken steps to secure a SOHO wired network, but as a result the users report that they can no longer access the Internet but can still see other computers on the network. Which of the following would have caused this issue?
A. Port 80 has been disabled B. Port 3389 has been enabled C. MAC filtering has been enabled D. LDAP has been disabled
A. An infection that causes a web browser to go to a different site than the one intended from a search result page. B. A technique used to obtain financial information from a user mimicking a legitimate website. C. An infection that causes a computer to behave erratically by playing music and launching browser windows. D. A technique used to obtain financial information from a user by compiling information from social networks and their friends.
A technician is working on a users PC. After testing the theory of the cause, which of the following could the technician perform NEXT? (Select TWO).
A. Resolve issue B. Inform user C. New theory or escalate D. Document issue E. Verify system functionality
Correct Answer: AC
Explanation: When you have tested the theory of cause, resolve the issue using troubleshooting techniques and if the issue is not resolved after the troubleshooting measure, re-establish the theory and escalate the issue to higher authorities.