Layer 2 by Layer 2
Which of these network technologies operate at OSI Layer 2 and forward traffic based on the MAC address of the destination station?
Which of these network technologies operate at OSI Layer 2 and forward traffic based on the MAC address of the destination station?
Which of these security technologies would be considered a factor of authentication?
What makes a computer worm significantly different than other types of malicious software?
One of your eight-outlet under-desk UPS units has stopped working, and you’d like to find the best way to decommission the unit. Which of these would be the best way to dispose of this broken UPS?
In this study group episode; the difference between x86 and x64, a step-by-step of the boot process, DNS vs. DHCP, 802.11 versions, and much more.
Professor Messer’s CompTIA A+ Study Group – September 24, 2011 Read More »
One of your customers has shown up at your desk with his broken computer, and he’s visibly upset and quite vocal about the problem he’s having. He’s also asking for a very specific repair that doesn’t appear to have any relationship to his issue. What’s the best way to handle this difficult situation?
You’ve had your computer for a couple of years, and you’ve noticed recently that the fan inside of the case is running more often and at higher rates of speed. What is the most likely cause of this issue?