16. Which two wireless configuration features make it harder for a hacker to see and attach to a wireless network? (Choose two.)
i Disabling SSID broadcasts.
| Configuring MAC address filtering.
17. Which two Windows XP procedures can be used to access a command prompt to test network connectivity? (Choose two.)
i Use the Start > Ali Programs > Accessories > Command Prompt method.
I Use the Start > Run > and type CMD.
18. Which location on a hard disk is used by the BIOS to search for operating system instructions in order to boot a PC?
! active partition
19. A temporary user is trying to log in to a Computer that the same user used last month, but now is unable to complete the login process. What are two possible causes of the failed login? (Choose two.)
! The user is using an incorrect username or password.
i The user account has been disabled.
20. What could be the possible solution to the Windows Yista search feature taking longer than expected to find results?
i Change the settings of the Index service in the Advanced Options panel.
21. A technician is trying to allow user access to a printer on a smali network. Which solution is the lowest in cost?
| computer-shared printer
22. In a networking class, the instructor tells the students to ping the other computers from the command prompt. Why do all pings in the class fail?
i The Windows firewall is blocking the ping.
23. A Computer that worked fine yesterday now locks after two hours of use. What is the problem?
i CPU overheating