Hard drive cables are not connected.
BIOS chips are not seated properly.
The power supply is not functioning.
Video card is not seated properly.
第1题:
Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()
A. show hosts
B. show sessions
C. show connections
D. disconnect
E. CTRL+SHIFT+6x
F. exit
第2题:
Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes. Which commands will accomplish these options?()
第3题:
After making a long CAT5 cable, the technician fears that the cable may have been damagedduring the pull, but does not have a cable tester. Which of the following would be the BESTalternative tool to determine whether there are any breaks or shorts in the cable?()
A. Multimeter
B. Voltmeter
C. Loopback plug
D. Toner probe
第4题:
After hardware upgrades have been installed, the technician boots the computer system. Nodisplay output is observed but a beeping is heard from the computer. Which of the following is the MOST likely issue?()
第5题:
A technician(技术) has a current baseline(基准线) and is told to install additional(添加) memory and a faster NIC card. At which point in time should the next baseline be run?()
第6题:
After each container has been stuffed,responsible personnel will ensure that the doors have been securely closed and are watertight and a ______ has been placed on the container.
A.real
B.deal
C.seal
D.meal
第7题:
The technician has suspicions that a browser has been hijacked. Which of the following should the technician look for in this situation?()
第8题:
A. Baseline
B. Network map
C. Wire scheme
D. Asset management
第9题:
Under which of the following circumstances would a technician use IPCONFIG /RENEW?()
第10题:
A technician installed a new application on a Windows XP desktop. After the application wasinstalled, the technician rebooted the desktop and received a bluescreen error. Which of thefollowing steps should the technician perform?() (Select TWO).