You are on page 1of 6

Study Guide

 Which devices redundancy is used in RAID adapter?


 A RAID adapter connects to multiple hard disk drives (HDDs) or solid-state
drives (SSDs), making them work as one logical unit. provides a way to
store data across multiple hard disks for redundancy and/or performance
improvement. To the operating system, A RAID array appears as one disk.
 Which cable you recommend supporting both audio and video to a high
definition television from your PC?
 HDMI
 To support authentication via who you are, eyes, face, fingerprint, what
device you recommend?
 BIOMETRIC security compares physical characteristics against stored
profiles to authenticate people. A profile is a data file containing known
characteristics of an individual.
 if we need to create backup for 5 TB data, what device you recommend
using to save your backup?
 what is UPS, and thins node will add value?
 Uninterruptible power supply (UPS) - Helps protect against potential
electrical power problems by supplying a consistent level of electrical
power to a computer or other device. The battery is constantly recharging
while the UPS is in use.
 if we have multiple WIFI network run 2.4, how can we prevent them to
interfere with each other RFI?
 shat is SDS and why they are important?
 A Safety Data Sheet is a fact sheet that summarizes information about
material identification, including hazardous ingredients that can affect
personal health, fire hazards, and first-aid requirements. How to dispose
of these materials.
 What can we measure using digital multimeter?
 A multimeter is a device that can take many types of measurements. It
tests the integrity of circuits and the quality of electricity in computer
components.
 anti-static wrist strap is always good tool except some case, what are they?
 Never wear an antistatic wrist strap if you are repairing a power supply
unit.
 what should be used to clean a CPU and a heat sink?
 isopropyl alcohol and a lint-free cloth
 what slots can be used for installing Wireless NIC in your motherboard?
 Wireless NICs use PCI or PCIe expansion slots on the motherboard.
 what devices can use SATA cables to talk to Motherboard?
 Internal HDDs, SSDs, and optical drives often connect to the motherboard
using Serial AT Attachment
 what can indicate hardware failure detected by the BIOS?
 If a device is malfunctioning, an error or a beep code alerts the technician
of the problem.
 how can we use BIOS settings to secure a computer? what are our options?
 You can also choose to encrypt an entire hard drive using a feature called
BitLocker. Before using BitLocker, the Trusted Platform Module (TPM)
must be enabled in BIOS. A BIOS PASSWORD Prevents the operating
system from booting and the BIOS settings from being changed without
the appropriate password.
 Why we need computer preventive maintenance?
 what we can do if PC is very dusty inside?
 To remove dust from the inside of a computer, use a combination
of compressed air, a low-air-flow ESD vacuum cleaner, and a small lint-
free cloth.
 what is the name of the Mac OS X disk backups tool?
 TIME MACHINE
 what should we include in our documentation when we troubleshoot
problem?
 When a computer is powered on and fails to start. What initial procedure
to deal with this failure?
 Why NTFS and not FAT?
 NTFS offers FAR more storage room capacity
 what is solid-state hybrid disk?
 what do we call %USERPROFILE% represent in the path
C:\Users\%USERPROFILE%\AppData\Local\Temp?
 %USERPROFILE% is an environment variable set by the OS with the
username that is currently logged on to the computer.
 What is best tool to use when response from your PC is slow?
 TASK MANAGER
 What tool you should use when a new sound card is installed in a PC, but it
is not operating correctly?
 Where we use Hyper visor?
 The software that creates and manages a virtual machine on a host
machine is called the hypervisor, or Virtual Machine Manager (VMM).
A hypervisor can run multiple virtual machines on a single host computer.
 What indicates setting an incorrect boot order in the system BIOS?
 why Client Server and not P2P network?
 Client Server features a centralized server that provides information and
services to all. Peer to peer has no centralized server and everything is
dependent on individual machines.
 Which OSI layer has Physical address, e.g., MAC?
 Layer 2 DATA LINK
 when should we use DHCP over Static?
 DHCP is the service used by ISPs, network administrators, and wireless
routers to automatically assign IP addressing information to hosts. Static
addressing is easy to do set up in a small network with very few hosts but
static addressing can lead to complications and conflicting addresses in a
large network
 what port is used for HTTP, and HTTPS?
 HTTP operates on PORT 80. HTTPS operates on port 443
 what commands we use to test if DNS is working or not, assume name is
Google.com?
 ping. ping destination_name (e.g., ping www.cisco.com)
 What is the advantage of WPA2?
 WPA2 is the industry standard for securing WLANs. Uses the Advanced
Encryption Standerd (AES) for encryption which is considered to be the
strongest
 Which Cloud computing service would be best for an organization that
needs to collaboratively create applications and deliver them over the web?
 Why we need to clean dust from network equipment closets?
 why we can ping internal but not external hosts?
 what common input devices found on laptop?
 what can cause mobile device exhibits very slow performance?
 What should be done first before attempting to repair a hardware
component on a laptop?
 DATA BACKUP
 what can cause appearance of flashing lines on a laptop screen?
 Images on the screen are not refreshing fast enough or the inverter is
damaged
 what indicates that the battery in a mobile device could become physically
hazardous?
 The battery is swollen
 What are two potential risks that could result from rooting or jail-breaking
a mobile device?
 Voids warranty and increases risk of virus infection
 how can we preserve the security and integrity of data and applications on
mobile device?
 when you recommend impact printer?
 Uses continuous feed paper, less expensive ink, and carbon copy printing
ability
 What must the user do for other Windows 7 computers in the house to
obtain the proper driver for printer he wants us to share?
 Which three components are typically found in laser printer maintenance
kits?
 Fuser assembly, transfer rollers, separation pads, and pickup rollers
 what is DDoS?
 DoS is a type of attack that creates an abnormally large amount of
requests to network servers, such as email or web servers. A DDoS attack
is like a DoS attack but is created using many more computers, sometimes
in the thousands, to launch the attack.
 what is a good password security policy
 Minimum length, Complexity, Variety, and Expiration
 list features in TPM module?
 Trusted Platform Module (TPM) – This is a chip designed to secure
hardware by storing encryption keys, digital certificates, passwords, and
data. TPM is used by Windows to support BitLocker full-disk encryption.
 List steps of Troubleshooting?
 Step 1 Identify the problem, Step 2 Establish a theory of probable cause,
Step 3 Test your theories to determine the cause of the problem, Step 4
Establish a plan of action to resolve the problem and implement the
solution, Step 5 Verify full functionality and, if applicable, implement
preventive measures, and Step 6 Document your findings, actions, and
outcomes
 Which question is a close-ended?
 what is open source license of an application software?
 what should you do if your customer is irritated that you cannot provide
immediate assistance?
 why network printer is printing vertical lines and streaks on all pages?
 Laser printer drum is damaged or the toner is not evenly distributed in the
cartridge
 what triggers Windows 7 computer that displays an "Invalid Boot Disk”?
 Media that does not have an operating system is in a drive, the boot
order is not sec correctly, the hard drive is not detected, the hard drive
does not have an operating system installed, the MBR/GPT is corrupted,
the computer has a boot sector virus, or the hard drive is failing
 how to solve a missing or corrupt DLL message is displayed?
 One or more programs using the DLL file was uninstalled and removed it
with it, or it was corrupted during a bad installation
 what actions FW can take?
 what is Backup operator group and when we can use it?
 describe different access control devices?

You might also like