By plugging in a tone generator at the jack of one end of the cable, you can find the other end by waving a toner probe around the area you think it could be. A loud tone noise will generate when you have found the end of the cable.
Burning smells usually indicate hardware that has burned out or a bad capacitor. To protect other components of your computer from potential damage, it is best to completely power off your machine until you can investigate the cause.
The computer sets up the OS boot sequence in the BIOS. It lists the order in which it should look for an operating system. If the USB drive is listed in a higher priority, it will check here first for the system files. If none are found, or if they are corrupted, it may display this message.
Correct answer Have the user check to see if the printer is offline
Correct answer: Operations
The operations phase is when you manage your Microsoft Office Communications Server 2007 R2 servers, unified communications clients, and unified communications applications.
Typical hard drives consist of several moving parts required to read and write data. Loud clicking noises usually indicate one of these components inside the drive has failed. Constantly having to read extremely large file sizes could potentially accelerate hard drive failure.
Correct answer: TPM
The Trusted Platform Module (TPM) is a chip that is integrated in the motherboard of a device. TPMs allow devices to store essential artifacts such as passwords and cryptographic keys in a secure manner.
Correct answer Open System Tools located in All Programs, Accessories, and then select System Restore.
Correct answer A yellow triangle with an exclamation mark.
A multimeter would be able to check voltage readings from both the power outlet and power supply. This would help narrow down the source of any power issues. A power supply tester’s intended use is strictly to test the power supply unit.
Correct answer: Symmetric key algorithm
A shared secret is required for a symmetric key algorithm. The shared secret, which permits encryption and decryption, is held by each communication party. A shared key isn't used by the other algorithms.
Correct answer Right-click on the sidebar, select properties and then uncheck the Start Sidebar when Windows starts.
The correct answer Remote desktop is installed by default.
Correct answer: DNSSEC
A suite of security extensions for an Internet service that translates domain names into IP addresses is known as DNSSEC.
A connector is typically crimped as the last step in the process after creating an ethernet cable. This securely tightens down the wiring to the correct spots inside the connector for electrical signals to pass.
A computer with no power will not turn on. This could be caused by issues with the power supply inside the computer case, or issues with power coming from the outlet. Even if the cord is plugged in, either of these locations could be lacking in power, thus there would be no transfer of power.
NTBackup (or Windows Backup) is the built-in backup application introduced in Windows NT 3.51 and included in Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003.
Performance Monitor is a system monitoring program introduced in Windows NT 3.1. It monitors various activities on a computer such as CPU or memory usage. This type of application may be used to determine the cause of problems on a local or remote computer by measuring the performance of hardware, software services, and applications
Click for next FREE CompTIA Test
CompTIA Operational Practice Test #1