802 800-850

¡Supera tus tareas y exámenes ahora con Quizwiz!

A user calls the helpdesk to report that their local printer is not printing any of the jobs that have been submitted this morning. Other users in the vicinity are not having any issues printing to the same unit via the network. The user in question connects to the printer over USB cable that connects to a laptop dock. Which of the following is MOST likely at fault here? A. The user's dock has a power problem with its built-in USB port(s). B. The printer only supports USB 2.0 and the user has a USB 3.0 enabled dock. C. The printer accidentally had its onboard wired network jack disabled. D. Other users are overloading the printer causing it to run out of memory.

A

An administrator has advised against providing any information over the phone as a way to prevent against which of the following threats? A. Session hijacking B. Social engineering C. Man-in-the-middle D. Shoulder surfing

B

Joe, a client, wants to allow only specific portable devices to connect to his wireless network. Which of the following methods would BEST accomplish this? A. Disabling SSID broadcast B. MAC filtering C. Lower radio power levels D. Directional antennas

B

A technician was asked by a user to setup IMAP sync for their Android smartphone. No other helper applications were installed by the technician to assist with syncing. Which of the following types of data can the user expect to be synced to their phone automatically from the company server? A. Calendar entries B. Sent/received text messages C. Sent/received emails D. Contacts

C

Which of the following drive destruction methods is considered the MOST secure when dealing with highly sensitive data? A. Degaussing B. Wiping C. Magnetizing D. Shredding

D

Which of the following is the correct term for the local platform on which client virtual machines run? A. Administrative shares B. Guest OS C. Cloud D. Hypervisor

D

A loud clicking noise in a RAID array indicates which of the following is MOST likely failing? A. Hard drive B. Power supply C. Audio adapter D. RAID controller

A

A technician has one computer and needs to create a multiboot to test all Windows environments. Which of the following shows the BEST order for installing the operating systems? A. Windows XP Professional, Windows Vista Business, Windows 7 Professional B. Windows Vista Business, Windows 7 Professional, Windows XP Professional C. Windows 7 Professional, Windows Vista Business, Windows XP Professional D. Windows 7 Professional, Windows XP Professional, Windows Vista Business

A

A technician is installing a new operating system. The company policy requires that the file system used must support file permissions and security. Which of the following should the technician use to BEST meet the company needs? A. NTFS B. CDFS C. FAT32 D. UDF

A

A technician is setting up new partitions on a 1TB drive for the purpose of running multiple operating systems. Which of the following represents the MAXIMUM number of primary partitions the drive can hold? A. 4 B. 8 C. 64 D. 1024

A

A technician is working on a Windows 7 computer that will not boot correctly; it is stuck in a constant loop. Which of the following should the technician perform FIRST to try and resolve this issue? A. Repair installation B. A recovery from a shadow copy C. System restore D. Factory restore

A

A technician must copy data over an unreliable network connection. Which of the following tools will BEST satisfy this requirement? A. ROBOCOPY B. XCOPY C. FDISK D. FTP

A

A technician needs to create a new directory from a command line on a Windows XP machine. Which of the following commands should be used? A. MD B. SFC C. RD D. CD

A

A technician, Joe, is running a diagnostic program on a laptop when it shuts down after running for 10 minutes. Which of the following should he do before disassembling the laptop? A. Use compressed air to blow the dust out of all the fans B. Hard reset the computer and attempt to boot it into the operating system C. Run CHKDSK on the laptop's hard drive D. Remove the battery and re-run the diagnostic program

A

A user calls the corporate helpdesk stating that their battery is not charging. The operating system shows that there is a problem with the battery. Which of the following should the technician do FIRST to determine what the issue is without erasing the user's unsaved data? A. Using a known-good computer of the same type, switch batteries between the two laptops. B. Remove the A/C adapter while the system is running and observe if the screen dims. C. Completely shut down the laptop, remove the A/C power source and restart the laptop. D. Using a known-good computer of the same type, switch A/C adapters between the two laptops.

A

Which of the following is the MINIMUM group permissions needed to access the share \\myserver\c$? A. Administrator B. Remote User C. Domain User D. Power User

A

An Android mobile device will easily synchronize with which of the following services? (Select TWO) A. Email B. SMS C. Passwords D. Calendar E. Incoming calls

A,D

A customer is reporting that since switching from an XP to a Windows 7 computer, the main application they use no longer starts. The vendor of the application no longer exists and the customer does not want to find an alternative replacement at the moment. Which of the following can a technician do to try to get the application running? A. Uninstall the application and re-install it as user so that it would have the standard rights and privileges. B. Right-click on the application and under "Troubleshoot Compatibility," select the correct mode. C. Re-install the application, but install it onto the user's Desktop in their account profile. D. Right-click on the application, select Properties and make sure that the Hidden attribute checkbox is unchecked.

B

A network DHCP server crashes and has to be rebuilt from scratch. Shortly afterwards many users report an "Address Conflict" alert on their computers. Which of the following tools should the users run to help fix this issue? A. route B. ipconfig C. netstat D. nbtstat

B

A remote Windows XP user believes unauthorized software has been installed on their laptop. The technician must direct the user to which of the following locations to remove the application? A. Action Center B. Add/remove Programs C. Windows Firewall D. Computer Management

B

A technician is testing a connection from the main building to a newly networked off-site location. The main network and off-site both have fast transfer times, however any data sent between the two sites is taking much longer than expected. Which of the following command line tools could the technician use to determine where this slowness is originating? A. NETSTAT B. TRACERT C. NSLOOKUP D. PING

B

A technician is trying to remove a resilient computer virus. The virus keeps coming back after rebooting the system because some program or service has locked some of the virus' files and is preventing the AV from cleaning the system. Which of the following is the BEST approach to try and remove the virus while minimizing negative impact to the system? A. Use REGSRV32 to deregister the virus DLLs. B. Run the antivirus after rebooting in safe mode. C. Use the repair disk and follow the prompts. D. Use the recovery console to disable all windows services.

B

A user states that every time they turn on their computer they have to change the computer's time and date. Which of the following should the technician perform FIRST to resolve this issue? A. Change time zones B. Synchronize with a different time date server C. Replace the drive cache battery D. Perform a firmware update

B

A user suspects that everything they type is being captured. Which of the following security threats would this indicate? A. Worm B. Keylogger C. Trojan D. Rootkit

B

An employee recently departed under bad terms, and the client is concerned for their SOHO network security. Which of the following should the technician do FIRST? A. Physically secure the access point B. Change default password C. Lower the transmission power D. Assign static IP addresses

B

Ann, a technician, is taking apart a laptop to replace some components. Which of the following will allow Ann to put the laptop back together properly and in a timely fashion? A. Have an identical laptop on hand to compare B. Label screws and their location C. Use a magnetic screwdriver D. Ask a fellow technician to help

B

Joe, a technician, recently built a new gaming PC for Ann, a customer, with two hard drives configured in RAID 0. Ann calls and states she was playing a game online and the computer shut off. Now the computer will not boot. Which of the following is a cost effective way to correct the issue? A. Remove both drives from the RAID array B. Reformat both drives and reload windows C. Replace both of the drives and load windows D. Replace one of the drives and rebuild the array

B

Which of the following activities would BEST be described as social engineering? A. Downloading Spyware B. Bribery C. Writing down passwords D. Brute force

B

Which of the following can a technician implement to ensure that only company owned mobile devices can connect to the wireless network? A. Deploy a script to auto-configure employees' mobile devices wireless settings. B. Configure MAC address filtering on the access points. C. Implement a wireless policy and train all users. D. Enable WPA2-Personal with a strong password.

B

Which of the following will help limit unauthorized access to a mobile device? A. Remote wipes B. Screen locks C. Geotracking D. Antivirus software

B

A client requests a small SOHO wireless network setup. The client has only three devices that will require access to the Internet. The client is also concerned that a neighboring business will attempt to access the Internet without permission. Which of the following should the technician ensure when setting up the SOHO network? (Select TWO). A. Enable client isolation B. Lower radio power levels C. Physically secure the access point D. Disable unused ports E. Enable MAC filtering F. Enable short preambles

B,E

A company has purchased new computers. The old computers will be donated to a local charity. Before the computers are picked up, the president of the company wants to make sure that the computers do not have confidential company information on them. Which of the following is the BEST method to accomplish this? A. Run CHKDSK B. Format the hard drive C. Use a degaussing tool D. Defragment the hard drive

C

A new network drop was just installed and the technician determined it was not terminated correctly. Which of the following tools would the technician use to terminate a network wall jack correctly? A. Cable crimper B. Cable tester C. Punchdown D. Wire strippers

C

A small library has an integrated switch and router that is not wireless. All of the public PCs in the library are connected to the device. Which of the following is the FIRST thing the library should do to deter curious patrons from interfering with the device? A. Configure DNS to resolve externally rather than internally B. Enable MAC filtering to permit public PCs C. Change the default user name and password D. Set up the DHCP server to use a different gateway option

C

A technician has installed a replacement motherboard in a desktop case with no other modifications. All power connectors and drive data connectors have been connected to the new motherboard; however, the system will not power on. Which of the following is MOST likely the cause? A. An incorrect firmware version resides on the motherboard B. The voltage selection on the power supply is set incorrectly C. The front panel connector is not connected properly D. The RAM is not correctly installed in the new motherboard

C

A technician is concerned that archiving computers over the network is taking too long to finish each night. A vendor suggests incremental backups. Incremental backups would accomplish which of the following? A. Limited number of computers would be fully archived each night B. Backup an increasing number of files until the backup window closes C. Backup only changed items on each computer D. Limited number of directories on each computer each night

C

A user needs to find the MAC address for a Windows computer. Which of the following is the correct command? A. ipconfig B. ifconfig C. ipconfig /all D. ifconfig -a

C

Which of the following is one of the key differences between iOS smartphones and Android-based smartphones? A. Android phones cannot adjust Bluetooth visibility timeouts B. iOS phones have to install apps from a PC C. Android has an open source application store D. iOS phones cannot use "Airplane Mode"

C

A user has recently purchased and installed a new top of the line video card for playing games on Windows 7. However, during game play the images are blurred and artifacts appear. Once the user returns to the Windows desktop, everything returns to normal. Which of the following could be the problem? (Select TWO). A. The video card requires an adapter to output to the monitor B. User Access Control is preventing the game from functioning C. The video card requires a driver update D. The game is not compatible with Windows 7 E. The graphics card is faulty and should be replaced F. The IRQ channel must be appropriately set for the video card

C,E

A prospective employee asks for wired Internet access while waiting for a job interview. Later, it is discovered that spyware was uploaded to the network from this particular location and the prospective employee cannot be contacted with the information provided. Which of the following security threats is this an example of? A. Phishing B. Shoulder surfing C. Viruses D. Social engineering

D

A technician has developed training material to ensure employees physically secure company laptops from being stolen. Which of the following is a preventative directive that MUST be included in the training material? A. RFID tags must be attached to all laptops and receivers to all doors to alert when a laptop leaves the designated area. B. Biometrics devices must be installed on all laptops. C. All computers must be equipped with privacy filters. D. Employees must remember to lock their office doors when leaving even for a short period of time.

D

A technician is tasked with resolving a display issue with a laptop. The technician has determined that the laptop's display needs to be replaced. Which of the following is the NEXT step the technician should perform? A. Identify the problem that caused the display to fail. B. Establish a theory of the probable cause. C. Verify full system functionality and implement preventive measures. D. Establish an action plan to resolve the problem.

D

A technician is using a test tool that is displaying the current voltage output of a power supply on the tool. Which of the following tools is the technician using? A. Loopback plug B. Cable tester C. POST card D. Multimeter

D

A technician just finished replacing the system board of a user's laptop. Now, every time the unit attempts to boot into Windows 7, the laptop goes through an automatic restart midway through the OS boot screen process. Which of the following MOST likely needs to be fixed? A. The optical drive needs to be moved lower in the boot process, below the hard disk. B. The BIOS version on the motherboard is stock, and needs to be updated to the latest release. C. The technician forgot to enable the SATA controller in the BIOS. D. The hard drive operation setting in BIOS needs to be changed from AHCI to IDE.

D

A user reports that they are seeing odd shapes or blocks on their monitor that seem to be random, but stay until the system is rebooted. The monitor has been connected to another computer of the exact make and model and has shown no adverse issues. However, the problem returns once the monitor is connected to the original computer. Which of the following is MOST likely the issue? A. The monitor is overheating into above-optimal temperatures. B. The monitor is experiencing low voltage conditions. C. The video card is incompatible with the monitor. D. The video card on the problem computer is failing.

D

An administrative assistant receives a phone call from the IT department asking for personal information to update their records. One of the questions asked is the password to the company's administrative portal. Which of the following is occurring? A. Shoulder surfing B. Configuration management C. Helpdesk troubleshooting methodology D. Social engineering

D

Ann, the network administrator, is notified that the server is responding very slowly. Upon entering the server room, she notices one of the drives in a RAID1 array has failed. Which of the following would BEST restore full functionality of the server while preserving redundancy? A. Use Disk Management to remove the RAID array and use the drive standalone. B. Use the RAID configuration tool to remove the RAID array and use the drive standalone. C. Remove the failed drive in device manager and continue operating. D. Replace the drive with a new drive and repair the RAID.

D

The mouse arrow on Joe's laptop screen is unexpectedly moving around while he types on the built-in keyboard. Which of the following would be the lowest cost solution to the problem? A. Use of an external keyboard. B. Use of an external mouse. C. Use of Fn key to lock the keypad. D. Use of Fn key to disable the touchpad.

D

Which of the following is the MAIN difference between a rootkit and a virus? A. Rootkits encrypt the operating system while viruses encrypt documents B. Rootkits execute as super user while viruses execute as regular users C. Rootkits modify the BIOS while viruses cannot access the BIOS D. Rootkits infiltrate the kernel while viruses infiltrate files

D

Which of the following methods of securing mobile devices will prevent data loss due to corruption? A. Enforce pass code locks B. Install location monitoring application C. Perform remote wipe after failed login D. Perform remote application back-up

D

Which of the following security methods requires that a user enter a passcode that is changed at regular intervals? A. WPA encryption B. Biometrics C. PSK D. RSA token

D


Conjuntos de estudio relacionados

AP Bio 5th Period Test Questions

View Set

Life Insurance and Annuities- Policy Replacement and Cancellation

View Set

Chapter 8: Ancient Hebrews and the Beginning of Judaism

View Set

ZDN alimentární, respirační onemocnění

View Set

HESI: Hepatitis Case Study and Rationale

View Set