1.
Which of the following should be used to connect a small office of ten computers together and
provide the computers access through a common Internet connection?
Correct Answer
B. Router and Ethernet switch
Explanation
A router and Ethernet switch should be used to connect a small office of ten computers together and provide them access through a common Internet connection. A router is responsible for connecting the office network to the Internet and managing the traffic between the computers and the Internet. An Ethernet switch allows the computers to communicate with each other within the local network. Together, the router and Ethernet switch provide both internal network connectivity and external Internet connectivity for the office computers.
2.
A technician has just replaced the motherboard in a desktop computer. The user of the computer
reports that their system now reboots periodically. Which of the following can the technician do to
correct the rebooting problem?
Correct Answer
C. Upgrade the power supply
Explanation
Upgrading the power supply can help to resolve the rebooting problem in this scenario. When a technician replaces the motherboard, it is possible that the new motherboard requires more power than the previous one. If the power supply is not able to provide enough power to the components, it can result in periodic reboots. Upgrading the power supply to a higher wattage can ensure that the system receives enough power to function properly and prevent unexpected reboots.
3.
The purpose of a proxy exception rule is to configure the browser to:
Correct Answer
A. Force an anonymous window for traffic to certain URLs.
Explanation
A proxy exception rule is used to bypass the proxy server for certain URLs. This means that when the browser encounters these specified URLs, it will not route the traffic through the proxy server, allowing direct communication between the browser and the target website. This can be useful in situations where direct access to certain websites is required, such as for internal resources or specific trusted websites.
4.
A technician is troubleshooting a users problem; important Windows services are not starting. In
which of the following locations should the technician check to investigate when these services
started or stopped?
Correct Answer
B. System Log
Explanation
The technician should check the System Log to investigate when the important Windows services started or stopped. The System Log contains records of events related to the operating system, including service start and stop events. By reviewing the System Log, the technician can identify any errors or issues that may have caused the services to fail to start.
5.
Which of the following may cause the cursor of an optical mouse to erratically jump around the
screen? (Select TWO).
Correct Answer(s)
C. A non-reflective or uneven surface
D. An incorrect mouse device driver
Explanation
A non-reflective or uneven surface can cause the cursor of an optical mouse to erratically jump around the screen because the mouse's sensor relies on detecting reflections from the surface it is on. If the surface is non-reflective or uneven, the sensor may not be able to accurately track the movement of the mouse.
An incorrect mouse device driver can also cause the cursor to jump around the screen because the driver is responsible for translating the mouse's movements into actions on the screen. If the driver is outdated or incompatible, it may not be able to properly interpret the mouse's input, resulting in erratic cursor movement.
6.
A user reports that each time the computer is rebooted, the time on the taskbar resets. Which of
the following is the MOST likely cause of the problem?
Correct Answer
B. The CMOS battery is faulty.
Explanation
The CMOS battery is responsible for maintaining the computer's internal clock and other system settings when the computer is powered off. If the CMOS battery is faulty, it may not be able to retain the correct time and settings, causing the time on the taskbar to reset each time the computer is rebooted. This is the most likely cause of the problem described by the user.
7.
Which of the following would resolve a problem in which external speakers connected to a sound
card are not playing audio?
Correct Answer
C. Move the cable to another jack on the sound card.
Explanation
Moving the cable to another jack on the sound card would resolve the problem of external speakers not playing audio. This suggests that there may be an issue with the current jack being used, such as a loose connection or a malfunction. By moving the cable to another jack, it allows for a different connection point that may be in proper working condition, enabling the audio to play through the external speakers.
8.
A user states that there are two lines running down the middle of all printed pages on the laser
printer. Which of the following could be the cause of the lines?
Correct Answer
A. The drum is dirty
Explanation
The drum is a crucial component in a laser printer that transfers toner onto the paper. If the drum is dirty, it can cause lines to appear on printed pages. This is because the dirt or debris on the drum can interfere with the transfer of toner, resulting in uneven or incomplete printing. Cleaning the drum can help resolve this issue and eliminate the lines on the printed pages.
9.
Which of the following is the built-in security feature of Windows Vista?
Correct Answer
C. UAC
Explanation
UAC stands for User Account Control, which is a built-in security feature of Windows Vista. It helps to prevent unauthorized changes to the system by prompting the user for permission or administrator credentials when a program attempts to make changes that require administrative access. This feature enhances the overall security of the operating system and protects it from potential threats.
10.
An alternative to plain old telephone service (POTS) would be:
Correct Answer
C. VoIP.
Explanation
VoIP stands for Voice over Internet Protocol, which is a technology that allows for the transmission of voice and multimedia over the internet. It is an alternative to traditional telephone services like POTS. VoIP offers advantages such as cost savings, flexibility, and the ability to integrate with other communication services. It uses packet-switched networks instead of dedicated circuit-switched networks, enabling voice data to be transmitted in the form of packets over IP networks. This makes it a more efficient and cost-effective solution for voice communication compared to POTS.
11.
Windows BitLocker can be used with which of the following? (Select TWO).
Correct Answer(s)
A. USB flash drive
B. Trusted platform module
Explanation
Windows BitLocker can be used with a USB flash drive and a Trusted Platform Module (TPM). BitLocker is a full disk encryption feature in Windows that helps protect data by encrypting the entire drive. A USB flash drive can be used to store the BitLocker recovery key, which is required to unlock the encrypted drive. The Trusted Platform Module (TPM) is a hardware component that provides secure storage of encryption keys and helps ensure the integrity of the system. By using both a USB flash drive and TPM, users can enhance the security of their BitLocker-encrypted drives.
12.
A technician has just installed a second SATA HDD into a Windows XP desktop. The computer
boots up successfully without any errors, but the technician cannot locate the additional HDD
when clicking on My Computer. Which of the following is MOST likely the problem?
(Select TWO).
Correct Answer(s)
A. The HDD must be partitioned.
B. The HDD must be assigned a drive letter.
Explanation
The technician cannot locate the additional HDD when clicking on My Computer because it must be partitioned and assigned a drive letter. Without partitioning the HDD, it cannot be recognized by the operating system. Additionally, without assigning a drive letter, the HDD will not be accessible through My Computer.
13.
An executives laptop screen has been damaged and will not power on. Which of the following is the FASTEST way to get the executive back online?
Correct Answer
A. Pull the hard drive and install it in a spare laptop of the same make and model.
Explanation
The fastest way to get the executive back online is to pull the hard drive from the damaged laptop and install it in a spare laptop of the same make and model. This allows the executive to continue working without the need for repairs or replacements, as the spare laptop will already have the necessary hardware and software configurations.
14.
Which of the following is a sign that a computer has been infected by a worm?
Correct Answer
B. Unauthorized outgoing emails being sent
Explanation
Unauthorized outgoing emails being sent is a sign that a computer has been infected by a worm. Worms are malicious software that can replicate themselves and spread across networks. One common behavior of worms is to use the infected computer to send out spam emails without the user's knowledge or consent. This can result in a high volume of emails being sent from the infected computer, often to random or unauthorized recipients. Therefore, the presence of unauthorized outgoing emails is a clear indication of a worm infection.
15.
The user is running dual monitors on a Windows XP Professional computer. The second monitor
failed to display after a system reboot. A technician verifies that the monitor is functioning properly.
Which of the following would the technician do NEXT?
Correct Answer
C. Use Display Settings - ensure both monitors are enabled.
Explanation
The technician would use Display Settings to ensure that both monitors are enabled. This is because the question states that the second monitor failed to display after a system reboot, and the technician has already verified that the monitor itself is functioning properly. By checking the Display Settings and ensuring that both monitors are enabled, the technician can troubleshoot any potential software or configuration issues that may be causing the second monitor to not display. Checking the BIOS or Device Manager would not be necessary in this case, as the issue is likely related to the Display Settings.
16.
Which of the following is the BEST way to ensure that only specified computers can access a
wireless network?
Correct Answer
A. Enable MAC filtering
Explanation
Enabling MAC filtering is the best way to ensure that only specified computers can access a wireless network. MAC filtering allows the network administrator to create a list of approved MAC addresses, which are unique identifiers for network devices. Only devices with MAC addresses on the approved list will be able to connect to the network, providing an additional layer of security. This method is more effective than simply changing the default password or SSID, as it specifically controls which devices can connect to the network. Disabling SSID broadcast and changing the SSID from default are also security measures, but they are not as effective as MAC filtering in restricting access to specified computers.
17.
A user reports that a newly issued smartcard does not work in their laptop, but the technicians
smartcard works without any issues. Which of the following would MOST likely resolve the issue?
Correct Answer
A. Upgrade the smartcard readers firmware.
18.
Which of the following is an example of Automatic IP addressing in Windows XP?
Correct Answer
D. 255.255.0.0
Explanation
The IP address 255.255.0.0 is an example of a subnet mask, not an example of automatic IP addressing. Automatic IP addressing, also known as Automatic Private IP Addressing (APIPA), is a feature in Windows XP that allows a computer to automatically assign itself an IP address if it is unable to obtain one from a DHCP server. The APIPA range is 169.254.0.1 to 169.254.255.254, so the correct answer should be 169.254.254.0.
19.
A user states that the LCD display on their laptop has intermittent lines on the screen. The
technician notices that when the display panel is moved, the line appears and then disappears.
Which of the following is the MOST likely cause?
Correct Answer
B. The display cable is loose or damaged.
Explanation
When the user moves the display panel and the line on the screen appears and disappears, it suggests that there is a problem with the connection between the display panel and the system board. This is most likely caused by a loose or damaged display cable. The movement of the display panel causes the cable to lose or regain proper connection, resulting in the intermittent lines on the screen.
20.
A technician replaced a processor, but when the computer is powered on, the POST issues a
series of beeps. Which of the following is the MOST likely cause?
Correct Answer
B. The CPU is not properly seated.
Explanation
The most likely cause for the series of beeps during POST after replacing the processor is that the CPU is not properly seated. When the CPU is not correctly installed or seated in its socket, it can cause a variety of issues, including beeping sounds during the POST process. It is crucial to ensure that the CPU is securely and correctly placed in its socket to avoid any connectivity problems and ensure proper functioning of the computer.
21.
Which of the following components is MOST often removed in order to access laptop
motherboards and internal components?
Correct Answer
B. Keyboard
Explanation
The keyboard is most often removed in order to access laptop motherboards and internal components. This is because the keyboard is typically connected to the motherboard via a ribbon cable, making it necessary to remove the keyboard in order to gain access to the motherboard and other internal components. Removing the keyboard allows technicians to perform repairs or upgrades on the motherboard or other internal components as needed.
22.
A user is reporting that a PC will suddenly shut down without warning. The PC boots up with no
problems, but after using the PC for a short time, the PC turns off. Which of the following
components should the technician check? (Select TWO).
Correct Answer(s)
A. CPU fan
D. Power supply
Explanation
The technician should check the CPU fan because if it is not functioning properly, the PC may overheat and shut down as a safety measure. The technician should also check the power supply because if it is faulty or not supplying enough power, it can cause the PC to shut down unexpectedly.
23.
A technician is moving data from one laptop to another that has EFS installed. Which of the
following would the technician need to perform FIRST?
Correct Answer
C. Export the users certificate
Explanation
To move data from one laptop to another with EFS (Encrypting File System) installed, the technician would need to export the user's certificate first. The EFS uses certificates to encrypt and decrypt files, and by exporting the user's certificate, the technician ensures that the files can be accessed and decrypted on the new laptop. This step is necessary before transferring the encrypted data to the new device.
24.
A technician turns on a PC and before the computer boots up, the technician is prompted for a
password. The technician does not know the password. Which of the following can the technician
do to allow access to the PC? (Select TWO).
Correct Answer(s)
A. Set the clear password jumper on the motherboard.
E. Remove the CMOS battery for 15 minutes.
Explanation
The technician can set the clear password jumper on the motherboard and remove the CMOS battery for 15 minutes to allow access to the PC. Setting the clear password jumper on the motherboard will reset the BIOS settings, including the password. Removing the CMOS battery for 15 minutes will also reset the BIOS settings. Both of these actions will remove the password prompt when the PC is turned on.
25.
Which of the following will happen if a PCI express video card is used in a PCI slot?
Correct Answer
C. A PCI express video card cannot be used in a PCI slot.
Explanation
PCI express and PCI slots are two different types of slots with different physical and electrical characteristics. A PCI express video card cannot be used in a PCI slot because they are not compatible with each other. The physical design and the number of pins in the slots are different, preventing the video card from being properly inserted and connected. Therefore, it is not possible to use a PCI express video card in a PCI slot.
26.
Which of the following should be implemented on a small office home office (SOHO) server?
Correct Answer
C. Assign static IP address
Explanation
Assigning a static IP address to a small office home office (SOHO) server is important for several reasons. Firstly, it ensures that the server always has the same IP address, making it easier for other devices on the network to locate and connect to it. Additionally, a static IP address allows for more stable and reliable connections, as it eliminates the need for the server's IP address to change dynamically. This is especially crucial for a server, as it needs to be consistently accessible to clients and other devices on the network.
27.
For the third time in two weeks a technician must re-image a machine for the same end user. After
discussing in depth the actions preceding the problems the technician has determined the root
cause to be opening unknown attachments. Which of the following is the MOST likely reason for
the issues?
Correct Answer
A. Virus
Explanation
The most likely reason for the issues is a virus. Opening unknown attachments can often lead to the installation of malicious software on a machine, causing various problems and requiring re-imaging. Social engineering involves manipulating individuals to gain unauthorized access, but it is not directly related to opening unknown attachments. Corruption refers to data or file corruption, which may cause issues but is less likely to require re-imaging. Spam refers to unsolicited or unwanted emails, which may contain viruses but is not the root cause of the issues in this scenario.
28.
A user wishes to encrypt a hard drive for storing critical data. The user wants to drag and drop
folders onto the partition and have them be encrypted in real time. Which of the following
encryption schemes should be recommended?
Correct Answer
C. BitLocker
Explanation
BitLocker is the recommended encryption scheme for encrypting a hard drive and providing real-time encryption for folders. BitLocker is a full-disk encryption feature available in Windows operating systems. It allows the user to encrypt the entire hard drive or specific folders, providing protection for critical data. By using BitLocker, the user can drag and drop folders onto the partition, and they will be encrypted in real time, ensuring the security of the data stored on the hard drive.
29.
A user reports that there is no access to the network from the computer. The technician notices
that all of the lights on the switch are on and not flashing, the network cables are all plugged in
and the computers network card is functioning properly. Which of the following should the
technician perform to resolve the issue?
Correct Answer
A. Power cycle the switch
Explanation
Power cycling the switch can help resolve the issue because when all the lights on the switch are on and not flashing, it indicates that the switch may be experiencing a software or hardware issue. Power cycling the switch involves turning it off, waiting for a few seconds, and then turning it back on. This can help reset the switch and resolve any temporary issues that may be causing the lack of network access.
30.
A technician observes poor network performance on a networked computer when transferring
large amounts of data over the network. The technician confirms manually configured settings of
100Mbps and full-duplex on the computer, but the connected Ethernet switch shows an autonegotiated
100Mbps and half-duplex. Which of the following will correct this issue?
Correct Answer
D. Configure auto-negotiation on the computer.
Explanation
The correct answer is to configure auto-negotiation on the computer. This will allow the computer and the Ethernet switch to automatically negotiate and agree upon the correct speed and duplex settings for optimal network performance. Manually configuring the settings on the computer may cause a mismatch with the switch, resulting in poor network performance. Upgrading the network card device drivers or replacing the network card or Ethernet switch may not be necessary if the issue can be resolved by enabling auto-negotiation.
31.
A technician performs a laptop memory upgrade and now the laptop will not boot. The laptop is
emitting a series of continuous beeps prior to startup. Which of the following is the MOST likely
problem?
Correct Answer
B. Memory contacts are dirty
Explanation
The most likely problem in this scenario is that the memory contacts are dirty. When a technician performs a laptop memory upgrade, it involves removing and reseating the memory modules. If the contacts on the memory modules or in the memory slots become dirty or corroded, it can prevent proper communication between the memory and the laptop, resulting in the laptop not booting up. This can cause the laptop to emit a series of continuous beeps as a warning sign.
32.
Which of the following commands displays all local network shares?
Correct Answer
C. NET view
Explanation
The correct answer is "NET view." This command displays all local network shares.
33.
All users within an office are wirelessly connected to a network, except one user that has a valid
connection on a leased IP address in a different range. Which of the following is a possible cause
of the user having a different IP address range?
Correct Answer
B. The user has connected to a nearby wireless access point from another office
Explanation
The user having a different IP address range is likely because they have connected to a nearby wireless access point from another office. This can happen if the user's device automatically connects to the strongest available wireless signal, which in this case is from the nearby office. As a result, the user is assigned an IP address from the different range used by the nearby office's network.
34.
A user has just moved a PC from one office to another. The patch cable and the NIC do not
appear to be functioning in the new office but were working before the move. The patch cable is
plugged in correctly to both the NIC and the wall jack. Which of the following actions should the
technician take FIRST?
Correct Answer
B. Verify that the port on the switch is enabled.
Explanation
The technician should first verify that the port on the switch is enabled. This is because the patch cable and NIC were working before the move, so it is likely that the issue lies with the port on the switch. By checking if the port is enabled, the technician can ensure that the connection between the PC and the network is properly established. This step should be taken before considering other actions such as checking compatibility, updating drivers, or replacing the network cable.
35.
A technician confirms a memory read error in Windows XP. Which of the following should the
technician do to resolve the problem?
Correct Answer
C. Reseat or replace RAM modules.
Explanation
To resolve a memory read error in Windows XP, the technician should reseat or replace the RAM modules. This is because memory read errors are often caused by faulty or loose RAM modules. By reseating the modules, the technician ensures they are properly connected to the motherboard, which can resolve any connection issues. If reseating does not fix the problem, replacing the RAM modules altogether may be necessary to resolve the error. Swapping the video card or changing memory settings in the BIOS would not directly address a memory read error.
36.
A technician notices that a computer is randomly rebooting. When the technician accesses the BIOS and the computer reboots. Which of the following should the technician check FIRST?
Correct Answer
C. Check for blown capacitors
Explanation
The technician should check for blown capacitors first because this is a common issue that can cause random reboots in a computer. Blown capacitors can lead to power fluctuations and instability in the system, resulting in unexpected restarts. By visually inspecting the capacitors on the motherboard, the technician can identify any bulging or leaking capacitors, which would indicate a problem.
37.
Which of the following is the BEST way to ensure that only specified devices can connect to a
wireless network?
Correct Answer
A. Use MAC filtering
Explanation
MAC filtering is the best way to ensure that only specified devices can connect to a wireless network. MAC filtering allows the network administrator to create a whitelist of approved MAC addresses, and only devices with those addresses will be able to connect to the network. This provides an additional layer of security and prevents unauthorized devices from accessing the network, even if they have the correct SSID and encryption settings. VLANs, disabling SSID broadcasting, and enabling WEP encryption can also enhance network security, but MAC filtering specifically targets and controls device access.
38.
The technician suspects a computer has been compromised by malware. Which of the following
statements BEST describes the steps a technician should take to eliminate the malware?
Correct Answer
A. Reboot in Safe Mode with Networking enabled, update and then run an anti-malware scanner.
Explanation
The best steps a technician should take to eliminate malware is to reboot the computer in Safe Mode with Networking enabled. This allows the computer to start up with only essential services and drivers, making it easier to detect and remove malware. After rebooting, the technician should update the anti-malware scanner to ensure it has the latest virus definitions, and then run a scan to identify and remove any malware present on the system. This approach helps to minimize the chances of the malware interfering with the scanning process and increases the likelihood of successful removal.
39.
A technician needs to boot a PC from a CD to run diagnostics, but the PC always boots from the
hard drive. Which of the following will allow the PC to boot from the CD?
Correct Answer
A. Change the drive order sequence in the BIOS.
Explanation
Changing the drive order sequence in the BIOS will allow the PC to boot from the CD. The BIOS (Basic Input/Output System) is responsible for initializing the hardware components of the computer, including the boot order. By accessing the BIOS settings, the technician can rearrange the boot order so that the CD drive is prioritized over the hard drive. This change will ensure that the PC boots from the CD when it is inserted, allowing the technician to run diagnostics.
40.
Which of the following is the QUICKEST way to view network adapter statistics?
Correct Answer
B. Task Manager
Explanation
Task Manager is the quickest way to view network adapter statistics. Task Manager provides real-time information about the performance of the computer, including network activity. It displays detailed statistics such as network utilization, data sent and received, and the current network connection speed. This information is readily available and can be accessed with just a few clicks, making Task Manager the fastest option for viewing network adapter statistics.
41.
A customer reports that their sound is not working. They state that the speakers worked
previously. Which of the following should the technician check? (Select THREE).
Correct Answer(s)
B. Speakers are on and the mute is off.
E. The audio driver is installed correctly.
F. Speakers are plugged into the correct jack.
Explanation
The technician should check if the speakers are on and the mute is off because the customer reports that the sound is not working. If the speakers are off or muted, that could be the reason for the issue. The technician should also check if the audio driver is installed correctly because if it is not, the sound may not work. Additionally, the technician should check if the speakers are plugged into the correct jack because if they are not properly connected, the sound may not be transmitted.
42.
A technician receives a ticket about VPN issues on a Windows XP PC. The ticket explained that
the Internet was working until the VPN connection was established; now it will not allow the user to
remote desktop or browse the Internet. Which of the following would cause these network issues?
Correct Answer
B. Windows XP firewall is turned on and not configured correctly.
Explanation
The correct answer is that the Windows XP firewall is turned on and not configured correctly. This can cause network issues because the firewall may be blocking the necessary ports and protocols for remote desktop and internet browsing. The user will need to configure the firewall settings to allow these connections in order to resolve the problem.
43.
After removing malware from a users computer, the Internet browser does not access any
websites. Which of the following is the BEST method to fix this?
Correct Answer
A. Remove Proxy Settings from the Internet browser
Explanation
Removing proxy settings from the Internet browser is the best method to fix the issue of not being able to access any websites after removing malware from a user's computer. Malware often modifies proxy settings to redirect internet traffic, so removing these settings will allow the browser to connect directly to websites again. Running operating system updates, resetting the internet router, or rebooting the computer may not specifically address the issue with the browser's proxy settings.
44.
A user installed a Blu-Ray drive in their PC. The user reports that the new drive and their existing
DVD-RW drive are not operating. Which of the following needs to be replaced?
Correct Answer
A. Power supply
Explanation
The user installed a Blu-Ray drive in their PC and now both the new drive and their existing DVD-RW drive are not operating. This suggests that the issue is not with the individual drives themselves, but rather with a common component that is affecting both drives. The power supply is responsible for providing power to all the components in the PC, including the drives. If the power supply is faulty or not providing enough power, it can cause both drives to not operate properly. Therefore, the power supply needs to be replaced in order to resolve the issue.
45.
A system powers on, begins POST, displays the BIOS version information and then hangs with
the error message Error loading operating system. Which of the following is MOST likely cause of
this issue?
Correct Answer
C. Corrupt MBR
Explanation
The most likely cause of the system hanging with the error message "Error loading operating system" is a corrupt MBR (Master Boot Record). The MBR is responsible for loading the operating system, and if it becomes corrupted, the system will not be able to boot properly. This can happen due to various reasons such as a power failure, hardware issues, or a virus attack. In this case, since the system is able to display the BIOS version information, it suggests that the issue is not related to a virus or a corrupted boot sector. The most probable cause is a corrupt MBR.
46.
Which of the following is the reason for pinging the loopback address?
Correct Answer
C. To verify the functionality of the TCP/IP stack
Explanation
Pinging the loopback address (127.0.0.1) is used to verify the functionality of the TCP/IP stack. The loopback address is a virtual network interface that allows a computer to communicate with itself. By sending a ping request to the loopback address, the computer checks if the TCP/IP stack is functioning properly. This test is commonly used to troubleshoot network connectivity issues and ensure that the computer's networking components are working correctly.
47.
Which of the following symptoms would indicate a power supply issue?
Correct Answer
A. Frequent failure of hard drives
Explanation
Frequent failure of hard drives can indicate a power supply issue because insufficient power can cause fluctuations or surges in the electrical current, leading to damage or malfunctioning of the hard drives. Power supply issues can result in inconsistent power delivery, which can affect the performance and reliability of various components, including hard drives.
48.
When troubleshooting an email problem which of the following is the correct syntax for telnet?
Correct Answer
A. Telnet 25
Explanation
The correct syntax for telnet when troubleshooting an email problem is "telnet 25". This command allows the user to establish a telnet session on port 25, which is the default port for SMTP (Simple Mail Transfer Protocol) used for email communication. By using this syntax, the user can test the connectivity and communication with the email server.
49.
Which of the following protocols would a technician use to run commands on a remote computer?
Correct Answer
D. TELNET
Explanation
TELNET is the correct answer because it is a protocol that allows a technician to remotely access and control a computer over a network. It provides a command-line interface for running commands on the remote computer, making it a suitable choice for remotely managing and troubleshooting systems. NETBIOS is a networking protocol used for name resolution, FTP is used for file transfer, and SMTP is used for email communication, none of which directly allow for running commands on a remote computer.
50.
Which of the following commands would be used to set the time on a workstation?
Correct Answer
D. Time
Explanation
The correct answer is "time." This command is used to set the time on a workstation.