PC PRO Chapter 1, PC PRO Chapter 2, PC PRO - 3, PC PRO Chapter 4, PC PRO Chapter 5, PC PRO Chapter 6, PC PRO Chapter 7, PC PRO Chapter 8, PC PRO Chapter 9, PC PRO Chapter 10, PC PRO Chapter 12, PC PRO Chapter 13

¡Supera tus tareas y exámenes ahora con Quizwiz!

Capacity

# of memory slots on the motherboard, module capacity, total capacity that can be installed.

What is the best countermeasure against social engineering? A.)User awareness training B.)Access auditing C.)Acceptable use policy D.)Strong passwords

A

Which of the following is an extra button or knob on a laptop keyboard that moves the mouse cursor? A.)Digitizer B.)Touch pad C.)ExpressCard D.)Pointing stick

D

Which of the following is the best definition for a LAN? A.)The interconnection of components, such as laptops, printers, keyboards, and other wireless devices within a personal range (typically 10 meter or less). B.)A network whose computers and servers are separated geographically. but still connected. C.)An extension of a private network over a shared or public network, such as the internet. D.)A network in a small geographic area, like in an office.

D

Which of the following is the most common disk interface used for optical drives on home and office computers? A.) Sound card (proprietary) B.) IDE/EIDE (ATAPI) C.) Parallel Port D.) SATA E.) SCSI

D

Which of the following is true about primary partitions? A.) Primary partitions are subdivided into logical drives B.) Primary partitions exist on dynamic disks C.) You can have a maximum of three primary partitions on a single disk D.) The active partition must be a primary partition

D

Which of the following tasks would you complete as part of a SATA installation? A.) Plug the 15-pin power connector into the SATA drive B.) Set the master/slave relationship using a jumper C.) Use the 4-pin molex power connector D.) Configure the device ID using a jumper E.) Complete a low-level format of the drive

A

Which of the following topologies connect each network devices to a central hub? A.)Star B.)Bus C.)Mesh D.)Ring

A

Which of the following standards provides data transfer rates up to 480 Mbps with a maximum cable length of 5 meters? A.) USB 2.0 B.) RS-232 C.) IEEE 1394 D.) IEEE 1284

A

Which of the following types of printers heats the ink in its print head to print? A.)Bubble jet B.)Thermal C.)Piezoelectric crystal inkjet D.)Laser

A

Which of the following us used on a wireless network to identify the network name? A.)WAP2 passphrase B.)SSID C.)MAC address D.)WEP key

A

Which of the following virtual printing options allows you to convert a Word document into a jpg file? A.)Print to Image B.)Print to PDF C.)Print to File D.)Print to XPS

A

Land Grid Array (LGA):

socket moves the connecting pins from the processor package to the socket itself. Conducting pads are implemented on the bottom of the processor that contact the protruding pins from the processor socket.

Multi-core systems enable the operating system to

run multiple applications simultaneously.

Zero Insertion Force (ZIF)

socket uses a lever to allow installation of the processor. Drop the processor into place, then push down on the lever to lock the processor into place.

southbridge chip

sits "south" of the northbridge. communicates with the Super I/O controller, which contains multiple embedded controllers including the keyboard controller.

northbridge chip

sits near the CPU and handles the flow of all data to and from the processor via the front-side bus (FSB).

ATX Mid-Tower

slightly smaller than full-tower cases. has fewer external and internal bays. Compatible with Standard ATX, microATX, Mini-ITX and EATX (some) form factors.

Throttling can also be used in low memory conditions to

slow down the processing of I/O memory requests, processing one sequence at a time in the order the request was received.

SODIMM

small outline dual in-line memory module, DIMMs used in laptops, uses DDR and DDR2

Micro-ATX Tower

smaller cases designed to be placed on desktops. typically only have one drive bay and are compatible with microATX and Mini-ITX form factors.

Install Heatsink and Fan

use thermal grease or a thermal pad between the processor die and the heat sink. This maximizes heat transfer between the processor and the CPU.

Post card

used to access POST error codes when when a problem prevents error messages from being displayed during POST. implemented as an expansion board that is inserted into an expansion slot in the motherboard but can be USB

An employee demands that she needs more RAM for her computer in order to complete her work tasks, but you know that her department isn't budgeted for new equipment. Your supervisor is the only one that has authority to allocate department funds. How should you respond? a. tell the employee that her department doesn't have a budget for equipment upgrades, but you will let your supervisor know about the request so it can be determined if new RAM can be acquired. b. Tell the employee is for her to purchase the new RAM c. Tell the employee that she should make do d. tell the employee that you will get a new RAM as soon as possible

A

Who needs to approve a change before it is initiated? (Select TWO) a. change board b. CEO' c. Personnel manager d. client or end user e. Project manager

A and D

What does occasional beeping from the UPS mean? a. computer is running on UPS battery power b. the power reserve in the UPS is critically low c. the UPS is no longer able to hold a charge d. The computer is about to shut down e. the UPS is not connected to computer

a

What is your top priority when responding to emergencies and hazardous situations? a. ensure the safety of people in the area b. protect your organizations data c. prevent release of hazardous elements into atmosphere d. reduce risk and exposure to litigation

a

Which of the following best describes the purpose for which loopback plugs are used? a. test port by returning output signals as input b. remove broken pins within sockets c. Connecting computer together without cards or modem d. grabbing and lifting small objects

a

To improve the safety of your location and comply with regulations regarding work environments with hazardous materials you have been assigned to assemble MSDS for all chemicals used in your shop. How should you obtain these documents a. from the local workers' safety insurance office b. download them from the chemical manufacturer's website c. ask your manager for them d. write them yourself after researching the issues

b

What Mac key is the primary modifier key on Apple system. a. Option b. Command c. Control d. Fn

b

Which tool would you use to grab and lift small objects a. IC extractor b. 3-prong holder c. multimeter d. cable tester

b

You are looking at a female TRS connector on the Computer. Which device uses this connector? a. Monitor b. Speaker c. Keyboard d. Joystick

b

_________________ Ability to run multiple parts of an application simultaneously. a. Multiprocessing b. Multithreading c. Multitasking

b

__________________ Ability to run multiple applications simultaneously. a. Multithreading b. Multiprocessing c. Multitasking

c

What Mac key is typically only found on Apple notebooks and is used to access the F1-F12 keys on the keyboard. a. Option b. Command c. Control d. Fn

d

Which of the following tools is specifically designed to test the DC voltage on a hark disk drive power connector? a. cable tester b. loopback plug c. multimeter d. power supply tester

d

A user has purchased an external speaker to play music from a mobile device over a wireless connection. Which of the following actions is MOSTLY likely needed for speaker connectivity? A.)Enable pairing B.)Disable airplane mode C.)Create hotspot D.)Configure tethering

A

You are an IT technician for your company. As part of your job, you must manage and support a wide variety of devices. Which of the following is the MOST common interface for peripheral deices? A.) USB B.) Firewall C.) Serial D.) PATA

A

You need a type of wireless connection that can transfer data between your phone, PDA, and laptop. You are transferring sensitive information. Which of the following would be the BEST choice? A.)Bluetooth B.)Wireless Ethernet C.)Cellular WAN D.)Infrared

A

Closed source and second most popular mobile device operating system. A.)iOS B.)Android C.)Windows

A

AGP

Accelerated graphics port

DirectX/OpenGL

DirectX is a collection of application program interfaces that improves graphic, animation and multimedia creations.

Connects segments on the same subnet. Forwards signals to only the port connected to the destination device. A.)Switch B.)Bridge C.)Router D.)Hub

A

Data transfers through the core using more than one light rays. A.)Multimode B.)Single mode

A

Which of the following components convert AC to DC?

Power supply

ROM

Read only Memory

Internet Message Access Protocol (IMAP) A.)548 B.)443 C.)22 D.)445 E.)80 F.)143 G.)427

F

Error Correcting Code

(ECC) A type of memory that detects and corrects the common kinds of internal data corruption.

You are trying to troubleshoot a power supply issue with the voltmeter. Which two of the following options are common voltage is produced by a desktop power supply? (Select two.)

+/- 5v +/- 12v

Steps to Replacing a Motherboard

1. If you are replacing an existing motherboard, document the current CMOS settings. 2. Install the CPU, heatsink, and memory before installing the motherboard in the case. 3. Insert the I/O shield into the case. 4. Fasten standoffs to the case, being sure to match the hole pattern on the motherboard. 5. Install the motherboard, securing it to the standoffs with insulated washers and screws. 6. Connect the power and accessory cables. 7. Connect drives to SATA connectors. 8. Install additional devices in expansion slots. 9. Connect wires for front/top panel ports. 10. Document the settings of the new motherboard.

If the power supply for the motherboard is failing

1. Purchase a new power supply. 2. Remove the old power supply from the system. 3. Mount the new power supply. 4. Connect the new power supply to the motherboard and to all other internal devices. 5. Power the system on and verify that the symptoms have been eliminated.

Smoke or Burning Smell Causes

1.A connector that isn't seated properly and electricity is arcing between leads. 2. A short circuit in the printed circuit board of the motherboard itself or on an expansion board. 3. An improperly installed component.

Normal Rail Volts

12 V rail should be between 11.4 and 12.6 volts. 5 V rail should be between 4.7 and 5.25 volts. 3.3 V rail should be between 3.1 and 3.4 volts.

32 bit OS capacity

3-4GB

Select the voltage provided by ATX power supply. (Select two.)

3.3, 5, 12

processor instruction set

32-bit processors use the IA-32 instruction set (x86). Itanium processors use the IA-64 instruction set. AMD64 and Intel 64 processors use the x86-64 instruction set (x64).

You have a laptop with a dual core processor with the following characteristics: * 1024 MB L2 cache *125 Watts *45 nm process size You want to upgrade the processor to one that uses less power. Which of the following characteristics would most likely identify a processor that uses less power?

90 Watts

A SOHO's connection to the internet is through an antenna that sends and receives a microwave signal to the ISP's antenna. There can be no obstacles on the direct path between the two antennae. A.)Line-of sight wireless B.)Fiber C.)DSL D.)Satellite

A

A company has subscribed to a cloud service that offers cloud applications and storage spaces. Through acquisition, the number of company employees quickly doubled. The cloud service vendor was able to add cloud services to these additional employees without requiring hardware changes. Which of the following cloud concepts does this represent? A.)Rapid elasticity B.)Resource pooling C.)Measured service D.)On-demand

A

On Windows 10, using Storage Space eliminates the need for which of the following tasks? (Select TWO) A.) Resizing volumes B.) repartitioning drives C.) Using Disk Cleanup D.) Create RAID arrays E.) Running defragmentation F.) Formatting hard drives

A and B

What are the most common means of virus distribution? A.)Malicious websites B.)Downloading music files from the internet C.)Email D.)Floppy disks E.)Commercial software CDs

A and C

Boot Errors

A malfunctioning motherboard may generate error codes when the system is powered on

You have a motherboard that requires a 24 pin connector from a power supply. What types of power supply could you use with this motherboard? (Select two.)

A power supply with 20-pin and 4-pin connectors A power supply with a 24-pin connector only

Exception error

A software bug can cause this type of error.

Parity RAM

A type of memory that checks for common kinds of internal data corruption. It does not correct internal data corruption. Non-parity memory does not perform error checking

Your iPad is configured to do remote backups everyday to iCloud. Which conditions are required for the iCloud backup to take place? (Select THREE.) A.)The iPad has to have an internet connection. B.) The iPad has to be plugged into a power source. C.)The iCloud Backup app has to be running. D.)The iPad screen has to be unlocked. E.)The iPad has to be connected to your computer and logged into iTunes

A, B, and D

Which of the following are features of Basic Rate ISDN (BRI)? (Select THREE.) A.)Dial-up connection B.)One control channel C.)Up to data channels D.Always-on connection E.)Three controls channels F.)Two data Channels

A, B, and F

Which of the following are optical storage devices?(Select THREE) A.) CD B.) SSD C.) DVD D.) HDD E.) SDHC F.) BD G.) USB flash drive

A, C, and F

Which of the following are options for connecting a computer device, such as a notebook computer or a tablet, to a cellular network. (Select FOUR.) A.)Use the device's Wi-Fi to connect to the cellular network through a cable modem's Wi-Fi antenna. B.)Use a USB cellular antennae to connect the device directly to the cellular network. C.)Use a USB cable to connect the device to the through a smartphone. D.)Use a cable to connect the device to the cellular network through a cable modem E.)Use a USB transmitter to connect the device directly to the cellular network through a satellite F.)Use an integrated cellular antennae to connect the device directly to the cellular network. G.)Use a USB transmitter to connect the device directly to the cellular network through satellite.

A,B,C, and F

Which of the following are characteristics of the 802.11g wireless standard? (Select THREE.) A.)Maximum bandwidth of 54 Mbps B.)Maximum bandwidth of 11 Mbps C.)Operates in the 2.4 GHz range D.)Backwards compatible with 802.11b devices E.)Backwards compatible with 802.11a devices

A,C, and D

On a Windows 10 workstation, you want to use the Storage Spaces feature to create a logical drive. Which of the following components are used to configure Storage Spaces? (Select THREE) A.) Storage Spaces, which are logically defined to units created from a pool of storage B.) Parity, which allows you to reconstruct data if device failure occurs C.) Pools of storage, which are logically created from free space on storage devices D.) Thin provisioning, which allows you to allocate more space than is available E.) Storage devices, which are physical drives such as SATA drives or external drives F.) Mirrored data resiliency, which provides storage redundancy

A,C, and E

Power Supply

ATX power supplies aid in cooling by exhausting hot air out the back of the case.

Analog output

Analog output jacks allow you to play sound on your computer through external devices

Feature Support

Additional features on sound cards provide higher quality sound or additional functionality

Portable devices have a software-controlled switch that disables all wireless functionality. What is the name of this software-controlled switch?

Airplane mode

Power supplies and thermal management

All ATX power supplies have a fan that cools the unit. The fan direction pulls cooler air from the front of the case and blows hot air out the back. Older ATX units use a reverse air flow that blows air directly over the CPU. This method is not as efficient.

CAS Latency

Another factor that affects the performance of memory is the latency associated with the accessing data in RAM

A company has chosen a UTM instead of an IDSS or IPS appliance to protect their network. Whcih of the following UTM security features is not available with an IDS or IPS? A.)Intrusion detection B.)Email and antispam filtering C.)Anomaly logs and alerts D.)Intrusion prevention

B

Troubleshoot Spontaneous reboot or intermittent system crashes

An overheated CPU will cause a spontaneous reboot or intermittent system crashes. A spontaneous reboot can also be caused by a bad power supply or device driver. A clicking noise when reading or writing data from the hard disk is an early sign of a failing drive.

Analog Input

Analog input jacks allow you to record audio through the sound card

Applications Performance and Bits

Applications typically perform better on 64-bit systems. 64-bit applications typically perform better than 32-bit applications. In some cases, 32-bit applications might perform better on 64-bit systems.

Channels

Audio can be split into multiple channels

A VPN is used primary for what purpose? A.)Allow remote systems to save on long distance charges B.)Support secured communications over an untrusted network C.)Support the distribution of public Web documents D.)Allow the use of network-attached printers

B

Caused this policy to be enforced A.)Not configured B.)Enabled C.)Disabled

B

You have been tasked with designing a workstation that will run VMware Workstation virtualization software. A software engineer will use it to run virtual machines for a application development and testing. Which of the following criteria should MOST likely be included in your designed for this system? (Select TWO.) A.)RAID 5 disk array B.)64-bit processor with eight cores C.)Video card within HDMI output D.)HTPC form factor E.)RAM configured to run in quad-channel mode

B and E

You have configured your Windows systems to automatically back up user data every night at midnight. You also take a system image backup once per month. What else should you do ensure that you are protected from data loss? (Select TWO.) A.)Configure System Maintenance to automatically defragment system hard drives every night. B.)Store a copy of all backup media. C.)Write-protect all backup media. D.)Restrict restoration privileges to system administrators. E.)Regularly test restoration procedures.

B and E

Your computer currently uses a 5,400 RPM hard disk. You want to improve your computer's overall performance by optimizing your hard disk performance. Which of the following would be the MOST effective means for optimizing your hard disk performance? (Select TWO) A.) Implement RAID 0 on the current hard disk B.) Upgrade to a 10,000 RPM hand disk C.) Upgrade you hard disk interface to SATA 2 D.) Upgrade to a 7,200 RPM hard disk E.) Upgrade your hard disk interface to eSATAp F.) Upgrade you hard disk interface to SATA 3

B and F

Which of the following protocols establish a secure connection and encrypt data for a VPN? (Select THREE). A.)FTP B.)L2TP C.)PPTP D.)RDP E.)IPSec

B, C, and E

two firmware implementations used by motherboard:

BIOS (Basic Input/Output System). UEFI (Unified Extensible Firmware Interface)

BIOS

Basic Input Output System, Generic term referring to both UEFI and Legacy BIOS

Troubleshoot System lockups and Restarts

Because you have just replaced the processor, the most likely cause of the problem is related to the CPU. System lockups and restarts can be caused by an overheated processor. Make sure the CPU fan is running, and that you have used thermal paste between the CPU and the heat sink.

Which feature allows a tablet to recognize multiple finger touches at the same time? A.)Resistive touchscreen B.)Accelerometer C.)Multi-touch D.)Gyroscope

C

For the past several days, the printer jobs from the inkjet printer are missing colors and leaving gaps. Which of the following will MOST resolve the problem? A.)Add additional memory to the printer. B.)Recalibrate the printer's color profile. C.)Use the automatic print head cleaning feature. D.)Check the cap between the printer and the paper.

C

Buffered (Registered)

Buffered (or registered) RAM has a buffer that holds memory addresses or data before it is transferred to the memory controller.

Legacy buses

Buses that have been replaced by newer types are considered legacy buses.

Single-sided discs can hold about 4.7 GB of data. Dual-layer discs can hold up to 8.5 GB of data. A.) Compact Disc (CD) B.) Compact Disc (CD-RW) C.) Digital Versatile Disc (DVD) D.) Digital Versatile Disc (DVD-RW) E.) Blu-ray Disc (BD-RE) F.) Blu-ray Disc (BD)

C

You replaced the ink cartridge in a color inkjet printer. Users are now complaining that print quality has degraded, lines are fuzzy, and the colored areas in images are starting or stopping before they should. Which inkjet maintenance task do you need to preform? A.)Print head cleaning B.)Carriage and belt realignment C.)Printer cartridge calibration D.)Cartridge replacement using new cartridges instead of refills

C

You have had several employees call the help desk where you work, complaining that they are not able to reach the www.widgets.com server. To help troubleshoot this issue, you decide to run a variety of commands. Which of the following commands is MOSTLY likely to return the IP address of the desired server? (Select THREE.) A.)ipconfig /all B.)ipconfig widgets C.)nslookup www.widgets.com D.)ping www.widgets.com E.)tracert www.widgets.com F.)ipconfig www.widgets.com

C, D, and E

You turn on your desktop computer. You can hear the fans start up, but the monitor remains blank. You wait a while, but it doesn't appear that anything else is happening. The hard drive activity light doesn't show activity, and you never hear the sound that plays when Windows loads. Which of the following are the most likely cause of the problem? (Select THREE). A.)Keyboard B.)Network card C.)Processor D.)Mouse E.)Hard disk F.)Memory G.)Video card

C, F, and G

A technician located at a branch office can't communicate with a company server at the home office. Which of the following commands could be used to determine where the communication is blocked? A.)ping B.)ipconfig C.)nslookup D.)tracert

D

ROM Chip

Can't be written to

2, 4, 5.1, 7.1

Channels

What type of data resiliency requires at least two storage devices? A.) Parity B.) Three-way mirror C.) Simple D.) Two-way mirror

D

Check the following if overheating seems to be the problem

Check the heatsink and fan for placement and condition. Verify that thermal paste or a thermal pad has been used between the processor and the heat sink. Ensure the heatsink is firmly attached to the CPU. Verify that the CPU is properly seated in its socket. Make sure system case fans are working and that the case and expansion slots are in place.

A technician is tasked with preparing a conference room so that at least 20 guest will be able to wirelessly connect laptop computers to the network. Which of the following network devices would be the BEST choice for this connecttivity? A.)Firewall B.)Switch C.)Router D.)Access point

D

What type of resources offer the following advantages? -Flexibility of access -Ease of use -Self-service provisioning of resources -API availability -Meter of services -Ability to try out software applications

Cloud

Which of the following terms describes the difference between white and black in an LCD monitor? A.) Resolution B.) Pitch C.) Brightness D.) Contrast E.) Aspect ratio

D

CMOS

Complimentary Metal-Oxide Semiconductor

A technician is installing a network-enabled smart home control system in a SOHO. To access the system from the internet, which of the following configurations is MOSTLY likely required on the SOHO router? A.)NAT B.)DHCP C.)QoS D.)Port following

D

dynamic RAM

DRAM stores data using a single transistor for every bit of data

4-pin 12 V (P4) power

Connects to the motherboard. Provides two dedicated 12 V wires to the CPU. not the same as the 20+4-pin ATX power connector.

Power supplies perform the following functions

Convert AC power to DC power, Provide components with the correct levels of DC voltage (3.3, 5, 12 volts), and Aid in thermal management

What does an ATX power supply do?

Converts AC to DC

A technician is replacing a SOHO router and has configured DHCP to assign private IP addresses to hosts on the local network. These hosts can communicate with each other, but users can't browse the internet. Which of the following changes to the SOHO router is MOST likely to restore internet connectivity? A.)Update the firmware on the SOHO router. B.)Remove any QoS settings that give low priority to HTTP traffic C.)Disable DHCP and configure the hosts with static IP addresses. D.)Configure the SOHO router for NAT

D

A SOHO customer finds that their VoIP conversations frequently break up and become unintelligible. This happens most often one person in the office streams video from the internet. Which of the following configurations changes on the SOHO router is MOSTLY likely to improve VoIP performance? A.)Create a DMZ and add the VoIP phone to it. B.)Change DHCP to give the VoIP phone a static address. C.)Forward UDP ports 5060 to 5065 to the VoIP phone. D.)Change the QoS settings to give VoIP traffic more priority.

D

A portion of the hard disk that cannot be used. A.) Lost cluster B.) Cross-linked file C.) Orphaned files D.) Bad sector

D

Connects segments on the same subnet. Repeats signals out to all other ports. A.)Switch B.)Bridge C.)Router D.)Hub

D

Which of the following can be used to create a secure connection to a remote server? A.)FTP B.)Telnet C.)ICMP D.)SSH E.)SMTP

D

When you printer from your laser printer, the paper contains faint images from previous printouts. Which of the following components is MOST likely the cause? (Select TWO). A.)Transfer roller B.)Primary corona wire C.)Secondary corona wire D.)Fluorescent lamp E.)Rubber scraper

D and E

What is the technology that protects the intellectual property rights of publishers and restricts the use of copyrighted works to those who have paid the necessary licensing fees?

DRM

Display Connectors

DVI, HDMI, DisplayPort

Windows 10 features a storage solution call Storage Spaces. What is the name if the Storage Space feature that allows you to allocate space for redundant information using options that include two-way mirroring, three-way mirroring, and parity?

Data Resiliency

Memory

Dedicated video cards use high speed memory to store graphic data

On a Linux system, what is the name of the directory where you will find a text file called devices that contains information about the devices that are configured on the system? A.) /sys B.) /hwinfo C.) /dev D.) /root E.) /proc

E

Uses a wireless protocol and a cryptograpgic key to execute the authorization process. It can also monitor access and send alerts related to the status of the device. A.)Thermostat B.)Switch C.)Bulb D.)Plug E.)Security Cameras F.)Door Lock G.)Speaker/Digital Assistant

F

One of the employees in your company calls and complains that text printed on the laser printer smudges easily and is staining hand and cloths. Which of the following, if adjusted or replace, would BEST fix the printer? A.)Laser B.)Photoreceptor drum C.)OPC drum D.)toner hopper E.)Fuser unit

E

Similar to a standard LAN, but uses radio signals instead of wires to connect systems together. A.)Local Area Network (LAN) B.)Personal Are Network (PAN) C.)Metropolitan Area Network (MAN) D.)Wide Area Network (WAN) E.)Wireless Local Area Network (WLAN)

E

The highest-level domain in a tree. A.)Domain Controller B.)Site C.)Subnet D.)Forrest Root Domain E.)Tree Root Domain

E

passive heat sink

Do not have a fan

Jodie's computer is acting unusually sluggish today. She calls you, an IT technician, to see if you find out what is going on and to improve her computer's performance. You run Task Manager on Jodie's computer and find that a suspicious application has nearly 90% CPU utilization. Which of the following actions can you take from Task Manager to stop the application from running? A.)Right-click > Switch to B.)Right-click > Stop C.)Right-click > Disconnect D.)Right-click > Disable E.)Right-click > End Task

E

These cores are typical in desktop systems

Dual-core, triple-core, and quad-core processors

Network resource in the directory is a? A.)Tree B.)Forest C.)Domain D.)Organizational unit E.)Object

E

A wireless technology standard for exchanging data over shot distances. A.)Hotspot B.)NFC C.)Mobile VPN D.)Tethering E.)Bluetooth

E

Hypertext Transfer Protocol (HTTP) A.)548 B.)443 C.)22 D.)445 E.)80 F.)143 G.)427

E

The number of hard faults that occur each second. A.)Disk queue length B.)Processor utilization C.)Commit charge D.)Disk time E.)Memory pages per second

E

The system boots, but the display remains blank

Either a card or memory module is not seated, or the system includes unsupported memory

The system boot fails and sounds a beep code

Either no memory installed or memory was not detected

Was originally developed for high-definition video (and expanded content on movie discs), but can also be used for data storage. A.) Compact Disc (CD) B.) Compact Disc (CD-RW) C.) Digital Versatile Disc (DVD) D.) Digital Versatile Disc (DVD-RW) E.) Blu-ray Disc (BD-RE) F.) Blu-ray Disc (BD)

F

Which of following utilities can you use from the command line on a Linux system to see a list of the installed network interfaces along with their current statuses and configurations? A.)netstat B.)netconfig C.)iflookup D.)ipconfig E.)netinfo F.)ifconfig

F

Exhaust fans

Exhausts warm air from inside the case

Troubleshoot System beeps regularly, nothing is shown on the screen and it doesn't start:

Flashing the BIOS is often required to upgrade system components that are part of the motherboard, such as to upgrade to a faster processor. If the motherboard lists the processor as supported but it is not correctly recognized, update the BIOS to the latest version. Press F8 while booting to enter the advanced boot menu when Windows loads. However, this option assumes the BIOS has loaded correctly and the computer passed the POST tests. Replacing the motherboard is likely not required as the motherboard was working correctly and the documentation states the CPU is compatible with the motherboard. Only replace the CPU after you have determined that it is faulty.

Frequency

For optimal performance, you should match the memory frequency with the frequency supported by the system bus/memory controller

You need to replace the power supply in your home desktop computer. As you choose a replacement power supply, which of the five specifications are the most likely to affect your choice?

Form factor Output wattage Processor connector

Service Location Protocol (SLP) A.)548 B.)443 C.)22 D.)445 E.)80 F.)143 G.)427

G

Uses voice recognition software and activates through Wake Word or Hot Word. A.)Thermostat B.)Switch C.)Bulb D.)Plug E.)Security Cameras F.)Door Lock G.)Speaker/Digital Assistant

G

HDMI audio

HDMI cables are able to carry both video and audio signals; however, most video cards only send a video signal

CPU sensor, System case sensor, Room temp sensor

Heat sensors

Heat Sink

Heat sinks are made of a heat conductive material and are attached to components using thermal paste or pad.

HDCP

High-Bandwidth Digital Content Protection

High Disk Usage

If the hard drive light on the system stays on for long periods of time you may need more physical memory

Clock Speed and Performance

If two processors are of the same type, higher speed typically means higher performance. With processors of different types, speeds might not be comparable.

Not Enough Memory Errors

If you receive this error when trying to open and use more than one program at a time, you may need more physical memory

Additional ports

In addition to audio input and output ports, some sound cards also include MIDI, FireWire, and sometimes HDMI audio

Overheating can be cause by

Inadequate air flow. Improperly installed fans. Failing fans. Dust buildup. Environmental heat.

four types of processor cache

Level 1 (L1) cache, Level 2 (L2) cache, Level 3 (L3) cache, Level 4 (L4) cache

CPU Manufacturer

Intel and AMD

CPU Manufacturer Facts

Intel and AMD processors support Windows software. Intel has a larger market share. AMD cost less. Processor performance and special features vary between models and manufacturers.

Hardware support is provided by processors with the following features

Intel's Virtualization Technology (VT) AMD's AMD Virtualization (AMD-V)

If the power supply can't provide adequate amounts of electricity to the system, the computer may exhibit one of several behaviors:

It may unexpectedly shut down. It may continuously reboot itself. It may not power on at all.

32-bit applications can run on 64-bit processors using the following methods:

Itanium processors use a software layer to translate. x64 processors execute both 32-bit and 64-bit instructions in the hardware. You can a 32-bit operating system on a computer with a 64-bit processor.

Liquid cooling

Liquid cooling systems are used when air cooling is not sufficient. Liquid-Based cooling systems are composed of tubes, cooling plates, a reservoir, and a radiator.

Mini ITX

Maximum motherboard size of 6.7" × 6.7". one expansion slot. (100 watt) power supplies. typically used with a home theater PC (HTPC)

The northbridge also provides control for the following components:

Memory bus. High-speed graphics bus (PCIe). Southbridge communication

Error Messages

Memory mismatch error, Memory parity interrupt at x, memory address error at x, memory failure at x, read y, expecting z

Persistent Data

Memory retained even if the system is powered off.

Heat sensors

Most motherboards include heat sensors.

Which found the power connector is use on PATA (IDE) internal hard drives and optical drives?

Molex

You have a power supply configured to receive 110 volts AC. How can you configure the power supply to receive 220 volts AC?

Move the power switch on the power supply to the different voltage.

You have a desktop PC that you have been using for 3 years in the United States. You are going on a study-abroad program for one semester and you want to take your computer with you. After some research, you find out that the country where you staying uses different voltage than what is used in the United States. What should you do so that the computer can be compatible with the electrical power in Europe?

Move the switch on the power supply to a different voltage.

64 bit OS capacity

Much more than 32 bit

Which of the following form factors does not have expansion card slots on the motherboard but rather uses a riser card for expansion cards?

NLX

Other ITX form factors

Nano-ITX (4.7" × 4.7"), Pico-ITX (3.9" × 2.85"), Mobile-ITX (2.9" × 1.7")

power supplies safety precautions

Never ground yourself when working on a power supply. Never open or disassemble a power supply. Always replace the entire unit.

Registry error

Parts of the registry are written to faulty sections of RAM.

P.C Boot Process

One of the main jobs the UEFI or Legacy Bios helps with.

Intermittent problems

One of the tougher detection challenges is the intermittent occurence or error messages, crashes, or sudden reboots.

Movement of Caches Location over time

Originally, only L1 cache was on the processor die, with L2 cache being on the motherboard between the CPU and the RAM. As processor technology has advanced, L2 cache moved to the processor die, with L3 cache being on the motherboard. Today, all three cache levels are located on the processor.

Important facts on overclocking

Overclocking can cause system instability, component damage, and can void your warranty. Motherboard bus, processor, and memory settings should be adjusted to match the overclock speed. Overclocking may require more voltage. Overclocking often increases heat output. For this reason, it may be necessary to upgrade your cooling devices.

Data rates of 1.06 GB/s

PCI

Operates at 133 MHz

PCI

expansion slot types

PCI (Peripheral Component Interconnect). PCI-X (Peripheral Component Interconnect Extended). PCIe (Peripheral Component Interconnect Express). Accelerated Graphics Port (AGP)

PCIe

PCI Express

PCI-X

PCI Extended

PCI

Peripheral Component Interconnect

POST

Power-On Self-Test

What is the major difference between the BTX and the ATX standards?

Processor slot located at 45 degrees. Improved thermal management.

Processor speed

Processors operate using an internal clock that is the same as, or is a multiple of, the motherboard bus speed. The speed is represented in megahertz (MHz) and is also referred to as the frequency.

Cooling

Processors require some form of heat dissipation system to function properly. Without a heat dissipation system, a processor will overheat and burn out in less than a minute. CPUs use a heat sink, fan, thermal paste, liquid, or fanless cooling system to transfer heat from the CPU to the cooling unit.

Software-generated memory problems

Registry error, Exception error, General-protection fault, Page fault.

Intake Fans

Pull air inside the case to cool components

Display Quality

Quality of images and animations is determined by both the video card and the external display

The southbridge includes the following systems:

Real-time clock. Power management controls. PCI bus and USB device controllers

Which of the following actions is not recommended for keeping your computer cool?

Remove unused expansion card slot covers

To test a power supply, you use a multimeter to measure the voltage on Molex hard disk drive connector. You note that the yellow wire in the connector provides 10 volts DC. What should you do?

Replace the power supply. It is failing.

System crashes on startup or when running a software application or certain group of applications:

Run repetitive tests using diagnostic software. After replacing a seemingly faulty CPU and the symptom remains, run similar tests on the motherboard and chipset. Do not forget to check for a corrupt file in the software.

static RAM

SRAM stores data using four transistors for every bit of data

An easy way to ensure compatibility when selecting a motherboard

Selecting a motherboard with the same form factor as the case and power supply

Single or Double-Sided

Single-Sided RAM has memory modules that are organized into a single logical bank: double-sided RAM has modules organized into two banks

Mini PCI

Small form factor computers, Laptops or Mini-ITX systems

Sampling rate

The sampling rate is the number of analog signal sample taken in over a period of time

Multi-GPU

Some video cards can be linked together and share the graphic processing load between the two gpus

TV input/output

Some video cards include features that allow them to receive video signals and output them to a TV source

Bus Support

Sound cards can be installed via expansion slot on the motherboard

Symptoms of a failed or failing CPU include

System will not boot. System boots, but the operating system fails to load. System has POST parity problems with a number of devices. System locks up shortly after startup

Processing capabilities

The Graphics processing unit handles all video rendering tasks,

The system boots, but the memory count is incorrect

The POST failed to recognize all of the memory.

Symptoms of bad power supply include:

The computer does not turn on. The computer sporadically shuts off or reboots. A broken or noisy fan

Modern Chipsets

The memory controller and graphics controller are on the CPU, instead of the northbridge. The remaining northbridge functionality and all of the southbridge functionality are combined into a single controller chip. Intel processors - Platform Controller Hub (PCH). AMD processors - Fusion Controller Hub (FHC). The front-side bus is replaced by the Direct Media Interface (DMI).

Before opening up the computer, rule out the obvious. Make sure:

The power cord is plugged into the wall. The power switch is in the on position. The voltage switch is set to the correct voltage.

Missing BIOS/UEFI Settings Problem

The system clock loses time. Settings configured in BIOS/UEFI are lost.

Which of the fine statements are true regarding power supply wattage? (Select two.)

The wattage requirement for each individual circuit uses the formula: W = V x A. A "watt" describes how much work or how much power can be supplied to various devices.

If symptoms of a bad power supply occur

Turn the power supply on and then test the voltage supplied on either a motherboard connector or on a hard disk connector. If the voltage is less than expected, then the power supply may be at fault.

EEPROM

Type of non-volatile memory used to store relatively small amounts of data

You are building a new computer from both new and used parts. The video card is a PCIe video card that requires an 8-pin power connector. However, your power supply doesn't have an 8-pin PCIe power connector. Which solution would be the least expensive option for your system?

Use an adapter cable to connect two 4-pin Molex connectors to the 8-pin PCIe connector.

UEFI

Unified Extensible Firmware Interface

You have a desktop computer that you want to upgrade. You have several internal components and external components. You realize that you need to use sure that your power supply can support all the new devices. What should you do?

Upgrade to a power supply that provides more watts.

Prepare Processor for Installation

Use anti-static protection when installing a CPU. The CPU and motherboard socket type must match. The socket identifies the number and layout of pins. In addition to the socket type, the motherboard must support the processor speed. Verify how heat connectivity will be established between the CPU and heatsink.

You decided to upgrade your PC to use a faster processor. To do this, you ordered a new motherboard over the Internet that supports the process you want to use. However, when it arrives, you discover that the motherboard uses the mini-ATX form factor. Your existing PC's case uses the ATX form factor. What should you do?

Use the mini-ATX motherboard in the ATX case.

SMART Reporting

Used to monitor the overall health of your storage device in the system

AMD FM2:

Used with the AMD A4 series, A6 series, A8 series, A10 series, Athlon X2, Athlon X4, FX, FirePro, and Sempron processors.

AMD FM2+:

Used with the AMD A4 series, A6 series, A8 series, A10 series, Athlon X2, Athlon X4, and FX processors.

AMD FM1:

Used with the AMD Athlon II processor along with the A-series APUs.

AMD AM3+:

Used with the AMD Phenom II, Athlon II, Sempron, and Opteron processors.

AMD AM3:

Used with the AMD Phenom II, Athlon II, Sempron, and Opteron processors.

Intel 1155(2):

Used with the Intel Celeron Dual-Core, Pentium Dual-Core, Core i3, Core i5, Core i7, Core i7 Extreme, and Xeon processors.

Intel 1366:

Used with the Intel Celeron, Core i7, and Xeon processors.

Intel 2011:

Used with the Intel Core i7 and Xeon processors.

Intel 775:

Used with the Intel Pentium 4, Celeron D, Intel Pentium 4 Extreme Edition, Pentium D, Pentium Dual-Core, Core 2 Duo, Core 2 Extreme, Core 2 Quad, Xeon, and Celeron processors.

Intel 1155:

Used with the Intel Pentium 4, Celeron, Core i3, Core i5, Core i7, Core i7 Extreme, and Xeon processors.

Intel 1156:

Used with the Intel Pentium 4, Celeron, Core i3, Core i5, Core i7, and Xeon processors.

types of hypervisor software

VMware Workstation and ESX (made by VMware) Hyper-V (made by Microsoft) XEN (open source)

System sounds a POST beep code indicating a CPU fault upon boot:

Verify that the CPU is receiving sufficient power by checking the power outputs. If these are good, replace the CPU. If the fault remains, the problem is with the motherboard.

File types

WAV, AIFF, AU, MP3, AAC, WMA, MIDI

Which of the following is a benefit of good documentation? a. it saves time and money in troubleshooting problems b. it eliminate the need to troubleshoot problems c. it reduce hardware maintenance d. it reduces hardware replacement requirements

a

A user in the conference room called concerning the digital projector and display issues when the projector is connected to his laptop. After identifying the cause and completely resolving the issue, the projector displays the images perfectly both on his laptop and on the projector. Which of the following troubleshooting strategies should be performed next? a. document the solution b. identify the problem c. test the solution d. establish what has changed

a

A user is unable to access data an external hard drive. You investigate the problem in determine that the USB cable connection to the hard drive is damaged. You replace the cable. What should you do next? a. test the solution b. create an action plan c. determine if escalation is necessary d. document the problem and solution

a

Virtualization typically includes the following components:

a physical machine, hypervisor, virtual machine, and virtual hard disk (VHD)

Multi-core processors use

a single motherboard socket to support multiple processors. Some motherboards use two (or more) processor sockets to provide a multiple processor solution.

Virtualization is performed by

adding a thin layer of software, called a hypervisor, between the physical system and the operating system.

ATX Form Factor

advanced technology extended. he most commonly used form factor. Each variant has different specifications for dimensions and number of expansion slots.

Standard ATX

all other variants are modeled after this form factor. Measure 12" × 9.6", Up to seven expansion slots, between six and nine mounting holes

Expansion slots (expansion buses)

allow you to expand the capabilities of your computer by installing expansion cards.

hypervisor

allows virtual machines to interact with the hardware without going through the host operating system.

AMR

audio/modem riser

A user asks you to perform a task that you do not know how to do and is not in the scope of your job duties. What is the best way to respond? a. tell the user that they need to find someone else b. Explain you cannot perform the task but you will do your best to contact someone who can perform the task c. tell the user it isn't in your job description d. Try to perform the task by yourself

b

You are removing screws within a computer, but several have fallen into places you can't reach. Which tool would help retrieve the small screws? a. screwdriver b. extension magnet c. IC extractor d. Needle nose pliers

b

When adding multiple processors in a multi-processor system

be sure that the speed of the processors are the same.

a processor with more cache performs

better than a processor with less cache (all other things being equal).

DDR

bus speed: 100, 133, 166, 200 MHz

32-bit processor

can process 32-bits of information. have a limit of 4GB of memory.

64-bit processor

can process 64-bits. theoretical limit of 16 EB of memory.

Distended Capacitors

capacitors on the motherboard may become overstressed or overheated. When this happens, they may bulge or even begin to leak fluid. usually fail at some point, causing the motherboard to fail

Distended Capacitors Repair

carefully replace a failed capacitor on the motherboard, it is usually faster and more cost effective to replace the entire motherboard

HTPC Case

cases are designed to connect to TVs and be used as a home media computer. compatible with microATX and Mini-ITX form factors.

If the computer boots, but the processor is running at less than its rated speed,

check for incorrectly set motherboard settings or use the BIOS/UEFI to set the appropriate CPU speed. If you cannot set the correct speed, try updating the BIOS with the latest version.

CNR

communications network riser

6+2-pin PCIe

connector plugs directly into the video card to supply additional, dedicated power. Provides up to 150 watts. is also known as a PEG6+2 (PCI Express Graphics 6+2 pin) Some motherboards only have a 6-pin PCIe connector. These connectors provide up to 75 watts.

Internal connectors

connectors on motherboards for components such as power supplies, fans, and LED lights.

The fan in a 450-Watt power supply is malfunctioning. What action should you take? a. open the power supply and oil the fan b. open the power supply and replace fan c. do not service until CPU fan fails d. remove and replace the power supply

d

ITX

designed for low-power computers. most common is the Mini-ITX form factor.

Mini-ITX Tower

designed to house Mini-ITX motherboards. They are typically smaller than Micro-ATX towers.

form factor

determines the physical characteristics of a motherboard, including its dimensions, number of expansion slots, and mounting hole locations, as well as the back panel dimensions, arrangement, and orientation

I/O shield

fits over the connectors to secure them and protect the inside of the computer from dust and debris.

DDR

double data rate a variation of the original synchronous DRAM

DDR2

doubles the data transfer rate of DDR

DDR3

doubles the data transfer rate of DDR2

DDR DIMM

dual in line memory module

Which of the following is the term used for a set of programs that acts as an interface between the applications that are running on a computer and the computer's hardware? a. Kernel b. Driver c. Command line d. Utilities e. Operating system

e

soft power

even when the computer is turned off, the motherboard has power. allows the computer to be turned on and off by the operating system or over the network.

Hyper-threading

feature of some Intel processors that allows a single processor to run threads (instructions) in parallel, as opposed to processing threads linearly. enables a processor to execute two threads at the same time.

Notebook Cases

generally proprietary and often vary among models

Chipset

group of chips that facilitates communication between the processor, memory, and peripheral devices

SATA power

has 15 pins and provides 3.3, 5, and 12 volts. powers SATA devices. You can use a special adapter to convert a 4-pin peripheral power connector to this connector. When using an adapter, or on some power supplies, the connector only supplies 5 and 12 volts.

Dual Rail

helps prevent circuit overload by balancing current flow

The size of the cache

increases as you move from L1 to L4, with L1 cache being the smallest.

Smoke or Burning Smell

indicates that electricity is not flowing in the correct manner within the system. shut the system off immediately.

Intermittent Device Failure

indicates that the device itself is failing. The best remedy is to replace the failing device because it will fail completely at some point. Immediate replacement prevents this from happening.

Fan filter

installed to keep dust and debris out of the case.

I/O connectors location

located on the back of the motherboard

When selecting a processor

make sure the motherboard supports the processor speed by reading the motherboard documentation first.

Cache

memory that the processor can access directly without using the system RAM

Process size is expressed in

microns (such as .25 microns) or nanometers (90 nm which equals .09 microns).

Throttling is often used in

mobile processors to change the operating frequency to minimize power consumption and heat output.

Missing BIOS/UEFI Settings Repair

motherboard battery has failed and needs to be replaced.

Test the power supply using a

multimeter or power supply tester. Voltage levels should be within +/- 5% of normal. If they aren't, the power supply is bad or failing and should be replaced.

Multi-core

multiple processors within a single processor package.

Onboard components

network cards, audio cards, video cards, or USB and FireWire connections.

When selecting a Central Processing Unit (CPU)

ou will need to match the motherboard and the CPU. Either select a CPU supported by the motherboard, or select a motherboard that will support the processor you have chosen

Mobile processors

portability and mobility are a concern. Special versions of processors are built to minimize power consumption and the amount of heat generated.

headers

ports are connected to the motherboard's front panel connectors

Power supplies are responsible for

powering every component in a computer system

Pin Grid Array (PGA):

processors implement a series of pins on the underside of the processor package in an array. The pins are inserted into corresponding receptacles within the processor socket on the motherboard.

Unlocked processors

processors whose speed can be changed above their rated speed through overclocking.

4-pin mini-Molex

provides both 5 and 12 volts and is used by floppy drives. Most modern power supplies do not have this connector.

8-pin EPS12V CPU power

provides four lines of 12 V power. originally used with some older dual processor systems. All modern multi-core processors use this connector. Some power supplies have two 4-pin connectors (4+4) that are meant to be used side-by-side in the 8-pin plug.

Arrange the stand change order to its standard order backout plan Purpose plan risk scope

purpose scope plan risk backout

Overclocking

pushing a CPU beyond its designed specifications. can give you a marginal increase in performance, but will decrease your CPU's life

Process size

refers to the manufacturing process used to etch transistors onto the silicon wafer that will become the CPU. A smaller ____means smaller transistors, which translates into a smaller CPU die with more transistors and less power consumption

Small Form Factor Cases (e.g., Micro-ATX and Mini-ITX towers)

riser cards for installing expansion boards. Riser cards are installed in an expansion slot and allow the expansion board to be installed parallel to the motherboard, instead of perpendicular.

front-side bus

speed is rated in MHz and is often used to determine CPU and memory compatibility.

older motherboard bios

stored the BIOS on removable, read-only memory (ROM) chips.

ATX Full-Tower

the largest computer cases. lots of space for external and internal components. compatible with the Standard ATX, EATX and microATX form factors.

24-pin (20+4 pin) ATX connector

supplies power to the motherboard. the four extra pins supply an additional 3.3, 5, and 12 volts of DC power.

Virtualization

the ability to install and run multiple operating systems simultaneously on a single physical machine.

Extended ATX (EATX)

the largest ATX variant. Measures 12" × 13". Typically uses extra space for additional memory slots microATX

Power Supply voltage switch

toggles between 115 and 230 volt electricity. 115 volts is used in North America. 230 volts is used in Europe. Some power supplies eliminate the voltage switch and instead automatically switch between voltages as necessary. These power supplies specify a voltage range they can function in.

UniDIMM

universal DIMM is used in laptops and is populated with DDR3 or DDR4

When installing a processor in a multi-processor system,

unused processor slots must be filled with a special terminating resistor.

Power On Self-Test (POST)

used to make sure all of the basic hardware in the system is present and functioning correctly. If a problem is identified during POST, an error is generated.

performance rating

used to rate processor speeds. typically only applicable between models of the same manufacturer.

Mini ITX and ATX

uses the same mounting locations and back panel specifications as the ATX form factor, allowing Mini-ITX motherboards to fit in ATX cases.

Motherboard Power Supply Issue

wear out over time, especially if they're overheated or overstressed

You will be late for an appointment with a customer. Which of the following actions should the tech take?(Select TWO) a. tell a joke b. blame your tardiness on heavy traffic c. explain why you are late d. contact the customer and apologize e. give a realistic timeframe for you arrival

D and E

Which of the following device types should be plugged into a surge-protected only outlet on a UPS unit and not a battery backup outlet? a. laser printer b. external hard drive c. Secondary LCD monitor d. inkjet printer

a

Which operating system(s) include the following feature? *Cortana *Cloud storage *Continuum *Microsoft Store *Microsoft Edge a. Windows 10 b. Windows 10 and Windows 7 c. Mac d. Linux e. Mac and Linux

a

Which tool would you use to measure electrical properties such as voltage, amps and resistance? a. multimeter b. IC extractor c. cable tester d. mini electronic combination wrench

a

You've working on a Mac computer that has an issue with a non-responsive application. You need to stop the application using the Force Quit feature. Which of the following keyboard shortcuts can be used to access the Force Quit feature? a. Command+Esc b. Command+Option+Esc c. Command+Q d.Command+Spacebar

b Explanation: Force Quit can be accessed from the Apple menu or the keyboard shortcut Command+Option+Esc. Force Quit is used to stop non-responsive processes and application. It can also be used to restart the Finder service.

A new laptop is delivered and left on the porch. It is very cold. You unpack the computer and would like to know if it is working properly. Which of the following is the best action? a. blow compressed air into the cooling ports b. turn on the computer and run self-diagnostic tests c. place the laptop next to the heater set on high d. let the computer warm up to room temperature before turning it on e. Visually inspect the LCD screen for cracks before turning it on

d

A technician is tasked with installing the Windows Os on a Mac OS computer so that the computer can boot to either the Mac OS or the Windows OS. Which Mac OS feature should the technician use to complete this task? a. Key Chain b. Disk Utility c. Finder d. Boot Camp

d

A user called the Help Desk because he's having trouble downloading new messages from the company's email server. The Help Desk technician told him to open a command prompt and try to ping the email server. The technician also told him to check his SMTP and POP3 server IP addresses. Which of the following mistakes did the tech make? a. The technician had a negative attitude and failed to take notes b. the tech did not have the user check the workstations IP address first c. the tech did not walk to the user's desk and conduct the tests for the user d. The tech used jargon that the user didn't understand

d

As you troubleshoot a problem during a customer appointment, you discover the problem is directly related to the customer's actions. How should you best address the situation? a. fix the problem with saying anything realizing you'll probably be back b. explain the problem with abbreviations to convey information quickly c. as the customer "What did you do to it?" d. Tactfully explain the problem without accusing or judging the customer

d

Of the following choices which action count be most physical harmful to you? a. wearing a grounding strap while installing a modem b. force ejecting a DVD using a paper clip c. using a computer without a surge protector d. looking into the end of a fiber optic cable

d

Which of the following Mac features is used to launch apps, switch between running between apps, access the Trash, and access specific folders? a. Mission Control b. Spotlight c. Terminal d. Dock

d

You can use these finger motions to perform specific functions on a Mac OS system: *Right-click: Tap with two finger to right-click * Smart zoom: Double-tap with two fingers to zoom in on a web page, image, or document (double-tap again to zoom) *Scroll: Slide up or down using two fingers to scroll up or down * Zoom: Spread two fingers apart to zoom in. Bring fingers back together to zoom out * Page navigation: Slide two fingers left or right to navigate between pages in a document * Mission Control: Slide four finger straight up to open Mission Control * All apps: Slide four finger straight down to display all windows of the active app. a. Boot Camp b. Gestures c. Mission Control d. Spotlight

B Explanation: Gestures is the name of the Mac feature that makes the finger motions available to perform specific functions on a Mac OS system.

You are helping a customer over the phone. The customer needs to connect a monitor that uses a digital interface. Which port should you instruct her to look for on the back of her PC? a. DVI b. SVGA DB-15 3-row c. Serial DB-15 d. USB

a

You are the PC technician for a company. You received the following email from an employee: My email doesn't work. I keep getting email sent back to me, and I can't find any of my old emails. I don't think that the email program has ever worked well. When you arrive at the user's desk, you ask him to show you how they usually go about their email tasks. You quickly determine that the problem is not with the program, but that the user needs to be trained on how to use the program. You have several important work tasks that need to be completed by the end of the day, and this is not high on your priority list. What is the best way for you to respond? a. set an appointment to train the employee on how to complete common email tasks b. Inform the employee that there isn't anything wrong and he simply doesn't know how to use it c. Tell the employee to ask their coworkers how to use the program if he has further problems d. direct the employee to the email help utility

a

You arrive on-site to fix and issue. The employee details how critical the issue is and how it has to be fixed as quickly as possible. Having seen this same issue many times you say "Stop worrying I know what I am doing." Which of the following professionalism principles is the technician failing to follow? a. avoid dismissing customer problems b. avoid being judgmental c. maintain a positive attitude d. avoid an argument with the customer

a

When assisting users, a technician often Mac OS Force Quit functions and functions and Linux kill command. Which of the following situations would require their use? a. A user accidentally sends a large job to a printer. b. A runway application does not respond to user input. c. The operating system needs to be rebooted. d. A remote desktop connection needs to be closed.

a Explanation: The Mac Os Force Quit functions and the Linux kill command can be used to stop a runway application if it does not respond to user input.

Besides protecting a computer from under voltage, a typical UPS also performs which two actions. (Select TWO) a. protects from over-voltages b. prevents ESD c. conditions the power signal d. prevents electric shock e. Protects network cabling from EMI

a and c

Which of the following are safe methods of lifting heavy objects? (Select TWO) a. bend your knees with back straight b. use a lifting strap around your neck c. lift with your legs d. bend at the waist e. pull up with your arms

a and c

Which of the following is most helpful in keeping a computer cool? (Select TWO) a. vacuum dust from the system regularly b. install a thermostat in the fan c. verify the cooling fan s are not circulating air in the wrong direction d. remove a slot cover from the back e. Use a high-wattage power supply

a and c

To prevent ESD when replacing internal computer components, you attach an anti-static wrist strap to your wrist. Where should the other end be fastened? (Select two.) a. anti static mat b screw on the power outlet c. ground wire on the power outlet d. metal area on the computer case e. ground wire on the power supply

a and d

Which of the following BEST describes the DisplayPort interface used for connecting video monitors to computer? (Select TWO). a. DisplayPort can send both video and audio signals over the same cable. b. DisplayPort is electrically equivalent to DVI and HDMI. c. DisplayPort carries both analog and digital signals. d. DisplayPort uses a lower voltage than DVI or HDMI.

a and d

A technician is tasked with replacing a 110-style keystone jack module in a patch panel. Which of the following tools would the technician use to attach the new module to the end of the cable?(Select TWO) a. punchdown tool b. crimper c. multimeter d. tone generator and probe e. cable stripper

a and e

What is the purpose of an MSDS a. to prevent dust from accumulating on equipment b. document how to safely handle and dispose of hazardous materials c. to monitor the potential for electrostatic discharge d. to protect service technicians from voltage

b

Which component of Windows prompts the user for credentials or permissions to minimize the dangers of unintended software installations? a. Firewall with Advanced Security b. User Account Control (UAC) c. Defender d. Firewall

b

Which of the following components requires special disposal procedures to comply with environmental guidelines a. video card b. notebook battery c. hard disk drive d. motherboard

b

Which of the following devices help protect equipment from temporary above normal voltages a. grounding wire b. surge protector c. ESD grounding strap d. power strip

b

Which of the following protects you from electrostatic discharge? a. ESD heel strap b. ESD wrist strap c. self-ground d. ESD mat

b

While answering help desk calls, a field customer calls and complains that he cannot print to a workgroup laser printer. Which of the following should be the first question you ask? a. have you check the cables b. have you ever printed to that printer c. have you rebooted and chosen safe mode d. have you rebooted the printer

b

You are called to a customer and suspect the problem. You are given permission to fix that component at the cost quoted. When you open you find it is another component and costs less that you intended to fix. Which of the following is the best course of action? a. fix the broken component and surprise the owner with a lower price b. obtain authorization before repairing the broken component c. fix the component for the agreed price and let the customer think you fixed the other d. decline to fix the broken component

b

You are trying to help a coworker order a UPS for each PC in her remote office. What rating is used to specify the size of the UPS? a. Watts b. VA (volt/amp) c. Volt/ohm d. Volts

b

A maintenance worker accidentally nicks a cable. Only one is severed. Which of the following would the tech Most likely use to identify which wall jack connect to the severed cable? a. multimeter b. cable stripper c. tone generator and probe d. loopback plug

c

A tech has installed several access points in a building. Which of the following tools can be used to check the signal strength at various locations in the building? a. multimeter b. loopback plug c. Wi-Fi analyzer d. tone generator and probe

c

A user called her organization's Help Desk to request help with connecting to a network server. The help desk technician came to her desk to resolve the issue. Once there, the technician used the user's telephone to call his girlfriend. The call lasted the entire time the technician was at the user's desk. Which of the following mistakes did the tech make? a. should have used a remote assist application instead of visiting her desk b. should have sent the user instruction in an email c. should not have used the user's telephone for personal call d. should have directed the user to the software documentation on the internet

c

A user reports that her system is running slow when saving files. You determine that you would need to upgrade her hard disk. You identify the components that are required and decide to schedule the repair for later that afternoon. Which of the following steps have you forgotten in your publishing process? a. create an action plan b. implement the solution c. perform a backup d. verify system functionality

c

After troubleshooting you discover the switch on the power strip was off. After switching it on all function returns to normal. Which of the following is the best way to explain the solution to the customer? a. "That was probably the easiest problem I've ever fixed. I am surprised you had to call in" b. "All I did was flip the power strip switch on. You probably bumped into it by accident. That accident cost you $80." c. "I found this power strip switch in the off position. Now that it's on everything seems to be working. Can you confirm the problem is resolved?" d. "Next time you need to check this power strip switch. If I were you I would have checked this first and saved us both time."

c

What would you enter at the command prompt to start a new Bourne-again shell session? a. cp b. pwd c. bash d. rm

c

What device is used to create a physical star topology? A.)Switch B.)Repeater C.)Bridge D.)Router

A

A customer complains that a recently purchased monitor no longer displays a picture. You verify that the monitor is powered on and that the video cable is securely fastened to the video port. Which of the following actions is the BEST to take next? A.) Check the monitor's brightness and contrast settings using the controls on the monitor B.) Unload and reload the video card's software driver C.) Open the computer and switch the video card to a different slot D.) Return the monitor to the manufacturer.

A

A group of workers attend a team-building retreat at a remote cabin. They can place calls on their mobile smartphone, but the cabin has no wired phone, television, or wired internet connectivity. The workers need to access an internet webpage using their laptop computers. A.)Cellular B.)Dial-up C.)DSL D.)Cable

A

A large number of compromised computers are infected with malware that allows an attacker (herder) to control them to spread and launch denial-of-service attacks. Which of the following does this security threat describe? A.)Zombie/botnet B.)Phishing C.)Spoofing D.)Man-in-the middle

A

A malicious person calls an employee from a cell phone. She tells the employee that is the vice president over the accounting department in the employee's company. She relates that she has forgotten her password and demands that the employee give her his password so that she can access the reports she needs for an upcoming presentation. She threatens to fire the employee if he does not comply. Which of the following BEST describes the type of attack that just occurred? A.)Masquerading B.)Eavesdropping C.)Phishing D.)Piggybacking

A

A medical center wants to upgrade their network to 10-Gigabit Ethernet (10 Gbps) so they can perform daily backups of large amounts of data to the secure on-site storage are network (SAN) without bogging down the network. Some of the backbones segments will have to reach between buildings that are close to 300 meters apart. Which of the following cable types BEST supports the 10-Gigabit Ethernet at the necessary segments lengths while keeping cost as low as possible? A.)Multimode fiber optic B.)Twisted pair Category 6 C.)Single-mode fiber optic D.)Twisted pair Category 7

A

A mobile device has poor performance and is slow to respond to screen inputs. After troubleshooting, a technician decides to preform a factory rest. Which of the following actions should a technician take before doing so? A.)Back up all data to an attached computer or a cloud backup service. B.)Ensure that the battery is fully charged. C.)Perform a remoter wipe to clear any personal data. D.)Close all running applications.

A

A network in a small geographic area that typically uses wires to connect systems together. A.)Local Area Network (LAN) B.)Personal Are Network (PAN) C.)Metropolitan Area Network (MAN) D.)Wide Area Network (WAN) E.)Wireless Local Area Network (WLAN)

A

A physical location where you can emulate cryptographic smart card functionalities. A.)Hotspot B.)NFC C.)Mobile VPN D.)Tethering E.)Bluetooth

A

A series of used clusters on the hard disk drive that are not associated with a specific file. A.) Lost cluster B.) Cross-linked file C.) Orphaned files D.) Bad sector

A

A server that holds a copy of the Active Directory database that can be written to. A.)Domain Controller B.)Site C.)Subnet D.)Forrest Root Domain E.)Tree Root Domain

A

A set of subnets connected to each other, typically by wires, using at least one router. A.)Local Area Network (LAN) B.)Personal Are Network (PAN) C.)Metropolitan Area Network (MAN) D.)Wide Area Network (WAN) E.)Wireless Local Area Network (WLAN)

A

A small business hires an after-hours cleaning service that is known to have a high turnover of employees. They want to prevent unauthorized access to their computers, but do not want to spend money on new hardware. Which of the following is the BEST solution? A.)Set login time restrictions B.)Require strong passwords. C.)Change the default account names and passwords. D.)Restrict user permissions.

A

A small business named BigBikes, Inc. has hired you to evaluate their wireless netwrok security practices. As you analyze their facility, you note the following: -They use an 802.11a wireless network. -The wireless network SSID is set to BWLAN. -The wireless network is not broadcasting the network SSID. -The wireless network uses WPA2 with AES security. -Omnidirectional access point are positioned around the periphery of the building. Which of the following would you MOST likely recommend your client do to increase their wireless network security? A.)Implement directional access points. B.)Enable SSID broadcast. C.)Configure the wireless network network to use WEP security. D.)Upgrade to an 802.11g wireless network. E.)Change the SSID to something similar to BigBikeInc.

A

A technician finds that after restoring the operating system on a mobile device, the touch screen operates unpredictably. This happens in both the default orientation or when the screen is rotated. Which of the following would BEST correct the problem? A.)Screen calibration B.)Wi-Fi calling C.)Virtual assistant D.)App store

A

A technician installs a new touch screen on a laptop. Directly touching on an on-screen button doesn't depress or activate the button, but touching near the button does. Which of the following actions will correct the misalignment? A.)Calibrate the touchscreen. B.)Lower the screen resolution. C.)Disable all mouse or touchpad devices. D.)Update the touchscreen display driver.

A

A technician is replacing a cable modem. The cable from the cable company has an inner solid wire conductor and an outer mess conductor separated by PVC plastic insulation. Which of the following network cable types is being used? A.)Coaxial cable B.)Straight-through cable C.)Twisted pair cable D.)Fiber optic cable

A

A technician is tasked with configuring a user's personal tablet to connect tot he corporate network. Which of the following should be performed before configuring access? A.)Check the tablet for unauthorized root access. B.)Reset the tablet to factory defaults. C.)Close all running apps. D.)Check that the battery is fully charge.

A

A technician is unable to install virtualization software on a host computer. The host has more free disk space than required. Which of the following is MOST likely to be the cause? A.)The motherboard UEFI/BIOS doesn't support hardware assisted virtualization. B.)The CPU doesn't have multiple core processors. C.)There is no auxiliary hard drive to store the VM files. D.)There is insufficient physical on the host to support both the host and the VM.

A

A technician must press a cable connector's retaining tab to remove a faulty fiber optic network cable. Which of the following connectors does the cable use? A.)LC B.)ST C.)RJ45 D.)RJ11

A

A technician upgrades the hard drive on a computer in the accounting department and decides to donate the old drive to a local trade school. Which of the following is the BEST method to ensure that the accounting data can't be recovered? A.)Drive wipe B.)diskpart format C.)Standard format D.)Degauss

A

A technician was able to stop a security attack on a user's computer. When conducting a forensic investigation, which of the following actions should be performed FIRST? A.)Document what's on the screen B.)Stop all running processes C.)Remove the hard drive D.)Turn off the system

A

A thick magnetic disk made of aluminum platters. Uses read/write heads to access data stored on the platter. A.) Hard disk drive (HDD) B.) Solid state drive (SSD) C.) Optical disc

A

A user calls the help desk stating that the touchpad on a laptop does not work. Which of the following actions would BEST help the technician diagnose the problem? A.)Toggle the touchpad function key B.)Attach a external mouse C.)Attach an external keyboard D.)Disable the touchscreen

A

A user has created a complex spreadsheet on her workstation containing many graphs and charts. She sent the document to an older network laser printer that is shared by everyone in her department. When she picked up the output only the top half of each page was printed and the bottom half was blank. Which of the following will MOST likely rectify this issue? A.)Install additional memory in the printer B.)Instruct her to not create such complex print jobs. C.)Install additional memory in her workstation D.)Update the printer driver on her workstation E.)Ask the network administrator to increase the speed of the network link in her department.

A

After a user checks the volume settings and make sure its not muted, sound still isn't coming from the internal speaker on a tablet device. Which of the following is MOST likely reason? A.)The audio output is being directed to a Bluetooth speaker. B.)Multiple apps are sending audio to the speakers. C.)The battery needs to be charged. D.)The tablet is set to airplane mode.

A

After arriving in a new city today, a traveling sales team member calls you stating that his wireless connection no longer works. He has checked the wireless configuration, and he knows it to be correct because it was working yesterday. What should you do first? A.)Have him verify that the wireless card's hardware switch is in the On position. B.)Have him update the drivers for the wireless card. C.)Have him purchase a USB wireless card to use until you can check the problem yourself. D.)Have him manually configure the wireless card to use only 802.11b

A

After entering a user id and password, an online banking user must enter a PIN that was sent as a text message to the user's mobile phone. Which of the following digital security methods is being used? A.)Multifactor authentication B.)DLP C.)Smart card D.)Firewall

A

After several new computer are connected to a network device, every computer connected to the device begins to experience slow transfer speeds. Which of the following is the FIRST step in troubleshooting this problem? A.)Determine whether the network device is a hub or switch B.)Use a loopback plug to determine whether the NIC in each computer is good. C.)Use a loopback plug to determine whether each port on the network device is good. D.)Use a cable tester to determine whether all the cables between each computer and the device are good.

A

Allows two devices in a computer to send information to each other. A.) I/O address B.) IRQ (Interrupt Request) C.) DMA (Direct Memory Access)

A

Anna has been backing up her data on a hot swappable drive mounted in an external hard drive docking station. This docking station holds two drives. Anna would like to exchange one of the drives with a drive of higher storage capacity. Which of the following is the BEST method for replacing the drive? A.) Remove and replace the drive after using the Safely Remove Hardware feature to shut down the device B.) Power off the computer, Remove and replace the drive, Power on the computer and test the drive C.) From Control Panel, use the Disk Management tool to prepare the bad drive for ejection D.) Remove and replace the drive without powering off the computer

A

Apple Filing Protocol (AFP) A.)548 B.)443 C.)22 D.)445 E.)80 F.)143 G.)427

A

As the IT technician for your company, you need to ensure that IP addresses are automatically assigned to hosts while at the same time preventing the same addresses from being assigned twice. Which of the following services would be BEST to use? A.)DHCP B.)TCP C.)IGMP D.)ICMP

A

As you are working on your Windows 10 computer during a fierce thunder storm, lightning strikes the nearby transformer, and your office loses all power. Since your laptop's battery is dead, your computer instantly turn off. Once power to the building has been restored, you turn your computer on and notice that you are now getting a missing DLL error message. Which of the following tools MOST likely to rectify this issue? A.)sfc B.)chkdsk C.)bootrec D.)defrag

A

Learns from your habits and schedule, allows you to control the climate in your home remotely, shows you energy consumption in real-time, and adjusts itself depending on ambient conditions. A.)Thermostat B.)Switch C.)Bulb D.)Plug E.)Security Cameras F.)Door Lock G.)Speaker/Digital Assistant

A

What PC hardware configuration belongs to the workstation type listed below? -Intel Celeron dual-core 2.7GHz CPU -320 GB SATA HD -2 GB DDR3 RAM -Few or no applications installed A.)Thin client PC B.)Video editing workstation C.)Virtualization workstation

A

What aspect ratio applies to display with resolutions of 800x600 and 1600x1200? A.) 4:3 B.) 16:10 C.) 16:9

A

As you arrive on-site at a customer's place of business, you go to the front desk and ask for Mr. Magorium, the head of the IT department. Mr. Magorium meets you, and escorts you to the printer, which is jammed. After you fix the printer, the existing print job completes. As you paper comes out, you notice that one of them is marked confidential and has to do with an upcoming merger. You go to Mr. Magorium's and say Hi, your printer is fixed and working perfectly. Mr Magorium then escorts you off the premises. When you get home that evening, you tell your spouse about the merger document you saw. The next day, you call Mr. Magorium to verify that printer is still functioning properly. Which of the following professionalism principles is the technician failing to follow? A.) Deal with confidential materials appropriately B.) Use appropriate professional titles C.) Avoid being judgmental D.) Follow up with the customer to verify satisfaction

A

Can be a stand-alone device or integrated with other peripherals, such as a keyboard. A.) Smart card reader B.) Digitizer C.) Biometric Scanner D.) Barcode reader

A

Devices solely designed and developed by Apple. A.)iOS B.)Android C.)Windows

A

Does not change the current setting for the policy. A.)Not configured B.)Enabled C.)Disabled

A

Each device in a computer must have its own. A.) I/O address B.) IRQ (Interrupt Request) C.) DMA (Direct Memory Access)

A

Employees complain to the company IT division that are spending considerable time and effort discarding unwanted junk email. Which of following should be implemented? A.)Email filtering B.)Firewall C.)Multifactor authentication D.)Antivirus

A

Employees currently access a data center RFID badges. The company is concerned that an unauthorized person could gain access using a lost or stolen badge. Which of the following could be implemented to increase the physical security? A.)Biometric locks B.)Key fobs C.)Smart card D.)Security tokens

A

Examine the following output: 4 22 ms 21 ms 22 ms sttlawa01gr02.bb.ispxy.com [154.11.10.62] 5 39 ms 39 ms 65 ms plalca01gr00.bb.ispxy.com [154.11.12.11] 6 39 ms 39 ms 39 ms Rwest.placa01gr00.bb.ispxy.com [154.11.3.14] 7 40 ms 39 ms 46 ms svl-core-03.inet.ispoxy.net [205.171.206.29] 8 75 ms 117 ms 63 ms dia-core-01.inet.ispxy.net [205.151.142.1] Which of the following produced this output? A.)tracert B.)ping C.)netstat D.)nslookup

A

Examine the following output: Server: helicuplar.xct.takro.net Address:209.53.4.130 Name: westsim.com Address: 64.78.193.84 Which command produced this output? A.)nslookup B.)netstat C.)ipconfig D.)tracert

A

First developed to store digital music. Later, was adapted to store digital computer data. A.) Compact Disc (CD) B.) Compact Disc (CD-RW) C.) Digital Versatile Disc (DVD) D.) Digital Versatile Disc (DVD-RW) E.) Blu-ray Disc (BD-RE) F.) Blu-ray Disc (BD)

A

For some time now, you have been using an application on your Windows 10 computer at home and while in the office. This application communicates with the internet. Today, your team lead decide to have a special team meeting at a local hotel. During this meeting, you obtained access to the internet using the hotel's network, but when you tried to run your application, it could not communicate with internet. Which of the following Control Panel setting is MOST likely causing this behavior? A.)Firewall settings B.)Privacy settings C.)Security settings D.)Programs settings

A

For which type of device will you typically install the driver before you connect the device to your system? A.) USB devices B.) Hot swappable devices C.) Firewire devices D.) Plug-and-play devices

A

Group of related domains is a? A.)Tree B.)Forest C.)Domain D.)Organizational unit E.)Object

A

Hannah has been working for your company for several years. Recently, she moved to a new department, which is located on a different floor. After the move, Hannah informs you that when she tries to print a Microsoft Word document (the same program she has always used), the printer on her new floor prints pages after page of seemingly random characters. Which of the follwoing is the MOST likely the cause of Hannah's printer problems? A.)The wrong printer driver has been selected. B.)The cable connecting the printer to the network is failing. C.)The program used to create the document has a bug. D.)The hard drive on the print sever is corrupt.

A

Ida, one of the employees in the sales department, needs a way to display her PowerPoint sales presentation to a large group of potential customer. She has asked you to set up the conference room in preparation for her presentation. You will need to purchase a display system for the conference room. Which of the following display systems would be the BEST to purchase? A.) A large screen and a projector B.) A large Plasma monitor C.) A large OLED monitor D.) A large LCD Monitor

A

Joe is working on a design team that uses a computer-aided design (CAD) system. Joe has been complaining that it takes too long to preform tasks such as panning, rotating, and zooming. You have been asked to look at Joe's computer and to make any charges required to increase Joe's productivity. Which of the following changes would BEST meet Joe's needs? A.)Add a very high-end video board. B.)Configure Joe's workstation with dual monitors. C.)Add a second high-capacity hard drives to Joe's computer. D.)Increase the memory fr the onboard video embedded in the motherboard.

A

Joe, an executive, receives an email that appears to be from the financial institution that provides his company credit card. The text of the email includes Joe's name and states that there is a problem with Joe's credit card. The email provides a link to verify the credit card, but when Joe hovers over the link, he thinks the web address seems strange. Which of the following BEST describes this type attack? A.)Social engineering B.)Zero-day attack C.)Brute forcing D.)Man-in-the-middle attack

A

Jose, a medical doctor, has a mobile device that contains sensitive patient information. He is concerned about unauthorized access to the data if the device is lost or stolen. Which of the following is the BEST option to prevent this from happening? A.)Configure the device to remote wipe as soon as it reported lost. B.)Configure the device for multi-factor authentication C.)Configure the device to wipe after a number of failed login attempts. D.)Install a locator application on the device so that it can be traced.

A

What category do apps fall into if they have been reviewed, approved, and signed with a certificate? A.)Trusted B.)Untrusted

A

Lloyd works for a graphic design company. He needs a monitor that accurately represents colors. Lloyd's monitor recently failed, and you have been asked to purchased a new one. You have been asked to purchased a new one. You have been asked to find a monitor with a fast pixel refresh rate, low energy consumption, and very accurate colors representation. Which of the following of display devices will BEST meet the requirements requested? A.) OLED B.) LCD C.) Plasma D.) CTR

A

Occasionally, Rachel works from another Mac in her office, rather than her own, and needs to be able to access her Mac while she is away from her desk. Which option can Rachel use to access her MAC? A.)Screen Sharing B.)Remote Desktop Protocol C.)Telnet D.)SSH

A

Oliver, a user in your company, is using an inkjet printer. After using this printer for several months, Oliver has noticed that streaks are beginning to appear on his printed pages. Oliver has asked you to fix this issue? Which of the following is MOST likely causing Oliver's printer to malfunction? A.)The printer's heads are out of position and need to be aligned. B.)The fusing unit is too hot, causing some of the ink from the previous job to remain on the unit. C.)The mirror in the printer is dusty and needs to be cleaned. D.)The imaging drum is probably at end of life.

A

On a Windows system, which of the following is true of groups? A.)Group members have the access rights assigned to the group. B.)Users can log on as long as the group and have all access rights assigned to the group. C.)A group allows multiple users to share a single logon. D.)Users and local resources, such as printers and shared folders, can be made members of a group. All group members have access to all resources in the same group.

A

One day, while trying to start your Windows 10 computer, the system displays the following error: Windows could not start. Could not read from the selected boot disk. Check boot path and disk hardware. Which of the following will most likely fix the problem? A.)Boot in the recovery environment and run the bootrec /rebuildbcd command. B.)Boot in the recovery console and copy NTLDR file to the boot volume. C.)Boot in the recovery environment and restore to a restore point. D.)Boot in the recovery console and run the fixmbr command on the boot volume. E.)Boot in the recovery console and run the bootcfg /rebuild command.

A

Only some of the components of a virtual machine are virtualized. A.)Partial virtualization B.)Full virtualization C.)Paravirtualization

A

Operates in full-duplex mode, meaning devices can both send and receive data at the same time. A.)Switch B.)Bridge C.)Router D.)Hub

A

Provides a high-level overview of the organization's security program. A.)Organizational Security Policy B.)Password Policy C.)Code of Ethics D.)Acceptable Use Policy E.)User Awareness Policy

A

Provides computing resources that are accessible by the general public. A.)Public cloud B.)Private cloud C.)Community cloud D.)Hybrid cloud.

A

Provides up to several terabytes in storage capacity, and cost per megabyte is very low. A.) Hard disk drive (HDD) B.) Solid state drive (SSD) C.) Optical disc

A

Several users have forwarded you an email stating that your company's health insurance provider has just launched a new websites for all employees. To access the site, they are told to a click a link in the email and provide their personal information. Upon investigation, you discover that your company's health insurance provider did not send this email. Which of the following BEST describes the type of attack that just occurred? A.)Phishing B.)Denial of service C.)Smurf D.)Piggybacking

A

Shows while a disk is being converted from a basic disk to a dynamic disk. A.) Initializing B.) Healthy C.) Unavailable D.) Offline

A

Stores partitioning information in a hidden database on all such disks in the system. A.) Dynamic disk B.) Basic disk

A

Support volumes that use discontiguous disk space. A.) Dynamic disk B.) Basic disk

A

Supports up to 128 volumes. A.) Dynamic disk B.) Basic disk

A

System Restore has been enabled for all volumes on a Windows system. Recently, a new network, a new netwrok driver was installed on the system. However, the driver code contained bugs, and now your network board no longer function. You are unable to access the internet to download an older version of the driver. You need to revert the system to a prior restore point that was taken before the driver was installed. What option would you use in System Protection to do this? A.)System Restore B.)Configure C.)Create

A

The number of read and write requests that are waiting to be processed. A.)Disk queue length B.)Processor utilization C.)Commit charge D.)Disk time E.)Memory pages per second

A

To increase security on your company's internal network, the administrator has disabled as many ports as possible. Now, however, though you can browse the Internet, you are unable to perform secure credit card transactions. Which port needs to be enabled to allow secure transactions? A.)443 B.)21 C.)22 D.)69 E.)80

A

Up to 10 meters for Class 2 devices. A.)Bluetooth B.)Infrared

A

Up to 100 meters for Class 1 devices? A.)Bluetooth B.)Infrared

A

Used to scan hardware that contains an embedded microchip for authentication. A.) Smart card reader B.) Digitizer C.) Biometric Scanner D.) Barcode reader

A

What PC hardware configuration belongs to the workstation type listed below? -1000 W power supply -1 TB SATA HD -Dual SLI 6 GB PCIe video adapter -5.1 channel surround sound adapter -Liquid CPU cooler A.)Home office server B.)Gaming PC C.) Thick client workstation

A

What PC hardware configuration belongs to the workstation type listed below? -2 GB GDDR5 PCIe video adapter -16 GB PC3-21300 DDR4 ECC RAM -1 TB SATA HD A.)CAD/CAM design workstation B.)Virtualization workstation C.)Home theater PC

A

What PC hardware configuration belongs to the workstation type listed below? -2 TB RAID 5 disk array -600 W power supply -No audio adapter -Integrated video adapter A.)Home office server B.)Gaming PC C.) Thick client workstation

A

What is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it is found? A.)Virus B.)Trojan C.)Buffer overflow D.)Password attack

A

What is the first step to add more disk space to a Storage Space in Window 10? A.) Install a new storage device to the system B.) Add free space on a new storage device to a storage pool C.) Allocate space from the storage pool to an existing storage space

A

What is the name of the utility that is (1 similar to Telnet and (2 used to establish a secure remote server management session? A.)SSH B.)Telnet C.)PuTTY D.)xterm E.)RUMBA

A

What is the purpose of the dxdiag tool? A.)View information related to DirectX operation. B.)Gather information about your computer and diagnose issues with your computer. C.)View logs about programs, system events, and security. D.)Configure your system to enable optimal troubleshooting and diagnosis of technician issues.

A

What is the surest way to prevent the loss of important information on your mobile device if it is lost, stolen, destroyed, or there is a natural disaster? A.)Configure your device to remotely back up important data to the Cloud B.)Only use apps, such as email apps, that store data on the app provider's servers. C.)Don't put important on your mobile device. D.)Configure your device to back up important data to your personal computer.

A

What method does an SD card use for storing data? A.) Non-volatile memory chips B.) Magnetic disks and platters C.) Reflective surface and optical readers D.) Magnetic tape

A

What type of data resiliency allows you to reconstruct data if one of the storage devices fails? A.) Parity B.) Three-way mirror C.) Simple D.) Two-way mirror

A

What type of data resiliency requires that you have at least three storage devices? A.) Parity B.) Three-way mirror C.) Simple D.) Two-way

A

Which actions allow you to access the internet on your laptop via a cellular network? A.)Install a cellular USB adapter in a open port on the laptop B.)Connect your wireless access point to the cellular network with a USB dongle and then connect the laptop to the access point using an 802.11b/g/n connections. C.)Connect the laptop to the RJ11 jack in your office D.)Connect the cell phone to the PHONE port on the dial-up modem in your office and connect the laptop to the LINE port on the modem

A

Which category do apps fall into if they have been signed with a certificate? A.)Trusted B.)Untrusted

A

Which component in a laser printer prepares the photosensitive drum for writing by causing it to receive a negative electrostatic charge? A.)Primary corona B.)Transfer corona C.)Organic photoconductor (OPC) drum D.) Fuser

A

Which component lets you use a notebook system as a desktop system by making it possible to connect a normal sized external mouse, keyboard monitor, and speakers? A.)Docking station B.)Built-in Bluetooth C.)Infrared wireless D.)Firewire ports E.)USB ports

A

Which network component connects a device to the transmission media and allows it to send and receive messages? A.)Network interface card B.)Bridge C.)Protocol D.)Switch

A

Which of following protocols provides authentication and encryption services for VPN traffic? A.)Ipsec B.)L2TP C.)TCP D.)SSL

A

Which of the following actions directly improves system security on a Windows workstation? A.)Install the latest updates. B.)Disable automatic reboot on error. C.)Create a password reset disk. d.)Create regular restore points

A

Which of the following components is a special hardware chip include on the computer motherboard that contains software in firmware that generates and stores cryptographic keys? A.)Trusted Platform Module (TPM) B.)USB device C.)BIOS/UEFI D.)Bitlocker partition

A

Which of the following devices allows network communications to be transmitted over existing AC power lines? A.)Ethernet over Power B.)Ethernet multiplexer C.)AC-enabled switch D.)Power over Ethernet E.)AC Circuit Switch

A

Which of the following functions are performed by the TPM? A.)Create a hash based on installed system components. B.)Encrypt data on the hard disk drive. C.)Generate authentication credentials. D.)Perform bulk encryption.

A

Which of the following is a magnetic storage devices? A.) Hard disk B.) Solid state drive C.) DVD D.) Flash device

A

Which of the following is an important aspect of evidence gathering? A.)Backing up all log files and audit trails B.)Restoring damaged data from backup media C.)Purging transaction logs D.)Monitoring user access to compromised systems

A

Which of the following is another name for the paging file? A.)Virtual memory B.)Random access memory C.)Upper memory D.)Extended memory

A

Which of the following is not an advantage of SSDs over HDDs? A.) Inexpensive B.) Small and light C.) Durable D.) Lower power consumption

A

Which of the following is the maximum transmission speed for Bluetooth v3 and v4 devices? A.)24 Mbps B.)1 Mbps C.)3 Mbps D.)11 Mbps

A

Which of the following is the most secure security protocol for wireless networks? A.)WPA2 B.)BitLocker C.)WPA D.)802.11n E.)WEP

A

Which of the following is true of monitors regarding backlighting? A.) LEDs are used to backlight the screen. B.) Cold cathode florescent (CCFL) are used for backlighting. C.) LCD monitors have small cells containing electrically-charged ionized gas that don't need backlighting. D.) Red, green, and blue light provide the provide the least expensive type of backlighting technology.

A

Which of the following netwrok services or protocols uses TCP/IP port 22? A.)SSH B.)IMAP4 C.)TFTP D.)NNTP

A

Which of the following printers types is considered an impacted printer? A.)dot matrix B.)Laser C.)Inkjet D.)Bubble jet

A

Which of the following refers to a situation where two files try to claim the same cluster on the hard disk? A.) Cross-linked cluster B.) Lost cluster C.) SMART error D.) Corrupt MBR

A

Which of the following security measures is a form of biometric? A.)Fingerprint scanner B.)Chassis intrusion detection C.)TPM D.)BIOS password

A

Which of the following wireless connections technologies can be described as follows? -Has a very limited transmission range of less than two inches -Used with credit cards and passports -Slower than other wireless technologies -Constantly emits a signal A.)NFC B.)IEEE 1394 C.)Infrared in line-of-sight mode D.)Bluetooth E.)Infrared in diffuse mode

A

Which printer permission would yo assign to a user so that she can pause the printer? A.)Manage this printer B.)Manage documents C.)Print D.)Pause printer

A

Which system utility would you use to troubleshoot hardware devices, examine and control the resources used by specific devices, and install updated device drivers? A.) Device Manger B.) Network C.) Notification Area D.) Control Panel E.) System Restore

A

Which tool can you use to view (but not modify) hardware and configuration information for your computer? A.)Msinfo32 B.)The System applet in Control Panel C.)Event Viewer D.)Msconfig

A

Which type of interface is typically wireless networking card in laptops? A.)Mini-PCI B.)ExpressCard C.)USB D.)PCI E.)Firewire

A

Which type of malicious activity can be described as described as numerous unwanted and unsolicited email messages sent to a wide range of victims? A.)Spamming B.)Crimeware C.)Email hijacking D.)Trojan

A

Which type of printer uses lasers and electrical charges to transfer images to paper? A.)Piezoelectric crystal inkjet B.)Thermal inkjet (bubble jet) C.)Dot matrix D.)Laser

A

While changing the toner cartridge in your laser printer, you accidently spill toner in and around the printer. Which of the following is the BEST method for cleaning up the spilled toner? A.)Use an anti-static micro-filtering vacuum B.)Wipe up most of the toner using warm, wet cloth, and then vacuum. C.)Use a household vacuum D.)Scoop up large portions and then use a static cloth to wipe up the remaining toner.

A

While investigating a network connectivity issue, a technician finds that the link light on a workstation is not lit, and there is no connectivity after replacing the patch cable with one that is known to be good. The wall jack is not labeled, within the switch room, none of the cables or patch panel ports are labeled. Which of the following tools would the technician MOST likely use next? A.)Tone generator B.)Cable tester C.)Crimper D.)Punchdown tool

A

While setting up a home office, a technician disables the DHCP service on the office router, but does not want to rely on link-local addressing. Which of the following IP addressing methods should be used? A.)Static B.)APIPA C.)Alternate D.)Dynamic

A

While using a new Windows system, you find that the double-click speed setting on the mouse pointer is set much slower than you would prefer. You want to increase the double-click speed setting. Which tab would you use in the mouse properties window to do this? A.)Buttons B.)Pointers C.)Pointer Options D.)Wheel E.)Hardware

A

While working on a Windows workstation, you've enabled Remote Desktop. Which of the following ports MUST be opened in the server's firewall to allow remote clients to access the desktop? A.)3389 B.)389 C.)110 D.)123

A

Why should backup media be stored offsite? A.)To prevent the same disaster from affecting both the system and its associated backup media. B.)It is required by government regulations in the USA. C.)To reduce the possibility of theft. D.)It improves the efficiency of the restoration process.

A

You are IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms. Which of the following features lets you allow or reject client connection by hardware address? A.)MAC address filtering B.)SSID C.)DHCP D.)WEP

A

You are a PC technician for a national company retailer. You are asked to build a system. What system is list below? - 2 TB RAID 5-disk array -600W power supply -No audio video adapter A.)Home office server B.)Gaming PC C.)Home Theater PC D.)Virtualization workstation E.)Thin client workstation F.)Audio/video editing workstation

A

Your network follows the 1000Base-T specifications for Gigabit Ethernet. Which of the following is the MAXIMUM cable segment length allowed? A.)100 meters B.)412 meters C.)500 meters D.)1,000 meters E.)2,000 meters

A

You are a security consultant and an organization has hired you to review their security measures. The organization is chiefly concerned that it could become the victim of a social engineering attack. Which of the following actions would you MOST likely recommend to mitigate the risk? A.)Teach users how to recognize and respond to social engineering attacks. B.)Implement a border firewall to filter inbound network traffic. C.)Establish a written security policy. D.)Train managers to monitor user activity.

A

You are a software developer, and you are creating a multimedia streaming application. Data will be streamed from your streaming server to streaming clients over IP network. Which transport protocol should your application use to send data between the clients and the server? A.)UDP B.)SNMP C.)TCP D.)ICMP

A

You are an IT administrator troubleshooting a Windows-based computer. After a while, you determine that you need to refresh the group policy on that computer. Rather than rebooting the computer, you open a command prompt from which the refresh can manually be completed. Which of the follwoing is the BEST command line tool to run to accomplished this task? A.)gupdate B.)gpresult C.)assoc D.)popd E.)fsutil

A

You are an IT technician for your company. Vivian has been receiving error messages indicating that some of her Windows system files are corrupt or missing. To fix this issue, you ran the Windows System File Checkers tool (SFC.exe). Shortly after the files were repaired, Vivian calls again because she is still having the same issue. You now suspect that the corruption or renaming of the system files is being caused by malware. Which of the following is the next BEST step that should be taken> A.)Quarantine Vivian's computer. B.)Disable System Restore. C.)Perform a scan using anti-malware software. D.)Back up Vivian's critical files and perform a clean install of Windows.

A

You are an It technician for your company. Fred calls you complaining that every time he opens his internet browser, the default home page has been changed to a site he is not familiar with. You suspect this change is being caused by a malware infection on his system. However, after you antimalware and antivirus software on Fred's system, it is still having the same issue. Which of the following would be the next BEST way to remove the malware? A.)Restore Fred's computer back to a previous restore point. B.)Format Fred's disks and perform a clean installation of the operating system. C.)Perform an image deployment from a backup image to restore Fred's computer to a known good point. D.)Purchase a new disk and deploy a backup image of Windows.

A

You are building a new computer and have to purchased a motherboard that includes four built-in SATA connector. Which of the following MOST accurately lists the maximum number of SATA devices you can connect to the motherboard using the integrated ports? A.) 4 B.) 8 C.) 16 D.) 32 E.) 64

A

You are building a new computer that will contain two hard disks. To provide increased performance, you have decided the drives using RAID technology. Which of the following will BEST meet your needs? A.) RAID 0 B.) RAID 1 C.) RAID 2 D.) RAID 5

A

You are preparing to install 64-bit Windows 10 on a computer that is currently running a 64-bit version of Windows 7. You perform a hardware inventory on the computer and note the following: -Processor = 2.0 GHz -Free hard drive space = 200 GB -Ram = 1 GB -DVD drive = 18x -100 Mbps NIC You need to prepare this computer to ensure that it meets the minimum hardware requirements of Window 10. What should you do? A.)Upgrade to at least 2 GB of RAM B.)Upgrade to a 2.5 GHz or Faster processor. C.)Upgrade to a Blu-ray optical drive. D.)Add another hard drive with a minimum of 500 GB of free space.

A

You are purchasing several PC systems that will be used as thin clients in a large organization. Which hardware selection criteria would be most important for this system? A.)Gigabit Ethernet adapter B.)RAID 0 array C.)64-bit 8-core processor D.)High-end video adapter

A

You are putting together a gaming system and need to make sure you get a display that meets your needs. The display needs to have a very good response time, and you would that it be affordable and power-efficient. Which of the following types of displays will MOST likely meet these needs? A.) LCD display with TN panel B.) OLED display with wide-angle viewing C.) Plasma display with no motion blur D.) LCD display with IPS Panel

A

You are the network administrator for a small company. You purchase eight copies of Windows 10 at a local retail outlet. You successfully install Windows on eight computers in the office. A month later, you start receiving calls from those who have used those copies of Windows saying that they are no longer able to log on to their computers. Which of following will BEST resolve this issue? A.)Instruct the employees to activate their Windows installation. B.)Instruct the employees to boot into Safe Mode and revert to a prior restore point. C.)Instruct the employees to disable their anti-virus software. D.)Instruct the employees to perform a startup repair from the Advanced Startup options menu.

A

You are the network technician for a small company. One of your responsibilities is to ensure that all new hardware is connected and functioning properly. You have several different types of connections that are used for various types of hardware. One of the types of cables available to you is an RJ45. Which of the following BEST describes where this cable would most likely be used? A.)Voice over IP connection B.)Modem Connection C.)Fax machine connections D.)Telephone connection

A

You are troubleshooting a malfunctioning laptop computer. Nothing appears on the LED display when the system is powered on. Which of the following is the BEST step to try first? A.)Plug in an external monitor. B.)Calibrate the battery. C.)Replace the motherboard. D.)Replace the video card.

A

You are troubleshooting connectivity between your computer and the www.widgets.com server, whose IP address is 192.168.1.1. Which of the following commands test connectivity to the device as well as name resolution? A.)ping www.widgets.com B.)nslookup 192.168.1.1 C.)nslookup www.widgets.com D.)ping 192.168.1.1

A

You are troubleshooting network connectivity issues on a Windows workstation. Which command would you use to view the MAC address of the network adapters? A.)ipconfig /all B.)nslookup C.)ipconfig D.)netstat E.)ping

A

You've just finished installing a wireless access point for a client. Which action best protects the access point from unauthorized tampering with its configuration settings? A.)Changing the default administrative password B.)Disabling DHCP C.)Implementing MAC address filtering D.)Disabling SSID broadcast

A

You are updating the operating system on your iPad. Your iPad is connected to your computer and you are using iTunes to install the update. Which of the following BEST describes what would happen to your iPad if you disconnect it before the operating system update complete? A.)If you disconnect during the update, the operating system could become corrupted. B.)iTunes would pause the update process until you reconnect your iPad to your computer. C.)Your iPad would revert to the previous version of the operating system, so you'd have to start the update again from the beginning to get the update. D.)The update would continue wirelessly (if a wireless network is available).

A

You currently use the Exchange email client on your desktop PC. You use it to connect to an email server provided by a service provider using IMAP and SMTP protocols. You recently purchased an iPad, and you want to configure its Mail app to connect to your email server. Which of the following BEST describes whether this task can be accomplished? A.)You can configure the Mail app on an iPad to connect to an email server using the IMAP and SMTP protocols. B.)The Mail app requires IMAP and SMTP traffic be secured using SSL. C.)The Mail app doesn't support the IMAP protocol. You must use POP3 instead. D.)The Mail app can only connect to email services such as Gmail or Yahoo! Mail

A

You have a computer with a removable disk drive formatted with NTFS. You want the drive to use FAT32 so it is compatible with more operating systems. The drive is currently configured using drive letter D: Which of the following MUST you complete to accomplish this task? A.)Back up the data on the D: Drive. Reformat the D: drive using FAT32. Restore the data. B.)Back up the data on the D: drive. Run format /fs:NTFS. C.)Back up the data on the D: drive. Run convert.exe D.)Upgrade the disk to dynamic disk.

A

You have a network that uses a logical ring topology. How do messages travel through the network? A.)Messages travel from one device to the next until they reach the destination device. B.)Message are sent to a central device, which the forwards the message to the destination device. C.) Message are sent to all devices connected to the network. D.) Messages are sent directly to the destination device only.

A

You have an application that you would like to run on your Windows workstation ever Monday at 3:00p.m. Which tool would you use to configure the application to run automatically? A.)Task Scheduler B.)msinfo32 C.)Services D.)msconfig E.)Task Manager

A

You have an extra disk on your system that has three primary partitions and an extended partition with two logical drives. You want to convert the partitions to simple volumes, preferably without losing any data. Which of the following is the BEST step to perform? A.) Upgrade the disk to a dynamic disk B.) Run the convert command C.) Delete the partitions and re-create them as simple volumes D.) Run the fixboot command to convert the partition type to GPT

A

You have been asked to help a small office with a limited budget set up and configure a Windows network. There are only five computers in this office. In addition to the ability to share network resources, security is a top priority. Which of the following is the BEST course of action in the situation? A.)Install a WorkGroup to allow each device to control what is shard and with whom. B.)Install WorkGroup to provide a single login and simplify and sharing. C.)Install a HomeGroup to allow each computer to control which items are shared and who can access them. D.)Install a HomeGroup to provide a single login and simplify security and sharing.

A

You have been asked to implement a network infrastructure that will accommodate failed connections. Which of the following network topologies provides redundancy for a failed link? A.)Mesh B.)Ring C.)Star D.)Bus

A

You have been asked to install Windows 10 on 30 different computers for a new branch office your company is setting up. The computers have been purchased from different companies and have different hardware. Which method should you use to reduce the installation time and the effort you need to spend? A.)Unattached B.)Imaging C.)Optical disc D.)Network

A

You have just finished upgrading the power supply in your desktop computer. Now the hard disk will not work. What should you do first? A.) Make sure the power connectors on the hard disk are plugged in all the way B.) Use the switch on the power supply to switch from 110 to 220 volts C.) Configure the jumpers on the hard disk D.) Replace the power supply

A

You have just signed up for a broadband home internet service that uses coaxial cable. Which connector type will you most likely use? A.)F-type B.)RJ45 C.)BNC D.)ST E.)RJ11

A

You have physically installed a new hard disk drive in your computer and configured the disk in the BIOS using the CMOS setup program. You try to access the hard disk drive in Windows Explorer, but the drive is not displayed. Which of the following utilities will you MOST likely use to solve the problem? A.) Disk Management B.) sfc C.) format D.) chkdsk

A

You have recently has an issue where a user's Windows computer was infected with a virus. After removing the virus from the computer, which of the following is the NEXT step you should take? A.)Install all OS updates. B.)Create a restore point. C.)Enable System Restore. D.)Educate the user.

A

You have subscribed to a cloud-based service to synchronize data between your mobile device and your PC. Before allowing the data to be synchronized, this service uses a process where the cloud service and the client on the mobile device verify each other's security certificates. What is this process called? A.)Mutual authentication B.)Hotspot connection C.)Virtual private network. D.)Tethering

A

You have used your computer for several months without any issues. Recently, you have noticed that when you perform specific actions or open certain files, your computer crashes, and programs sometimes freeze. You suspect that hard disk issues are the cause. Which of the following tools would BEST verify and fix disk errors? A.) chkdsk B.) DiskPart C.) Bootrec.exe D.) format

A

Your computer has a quad-core processor that supports multi-threading installed. Given that the system is running Windows, how can you verify whether multi-threading has been enable? A.)Task Manager can display CPU utilization graphs for eight processors. B.)Task Manager will show a single process running on multiple processors simultaneously. C.)Task Manager will show each application running with two processes. D.)Task Manager can report CPU utilization.

A

You just bought a new computer. This system uses UEFI firmware and comes with Windows 10 preinstalled. You recently accessed the manufacturer's support website and saw that a UEFI firmware update has been released. You download the update. However, when you try to install the update, an error message is displayed that indicates the digital signature on the update file is invalid. Which of the following is MOST likely caused this to happen? A.)The update file has been tampered with. B.)The system has a rootkit malware infection. C.)Interim UEFI updates released since the system was manufactured need to be installed before you can install the latest update. D.)SecureBoot has been enabled in the UEFI firmware configuration.

A

You manage a Windows system. You want to view information about all of the programs running on your system and sort each program by the amount of memory and CPU that the program uses. Which tool should you use? A.)Task Manager B.)Services C.)mscongif D.)Device Manager

A

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0 subnet, which uses the default subnet masks. The workstation can communicate with some hosts on the private netwrok, but not with other hosts. You run ipconfig /all and see the following. Ethernet adapter Local Area Connection: Connection-specific DNS suffix . :mydomain.local Description. . . . . . . . .:Broadcom network adapter Physical address. . . . . . :00-AA-BB-CC-74-EF DHCP Enabled. . . . . .: No Autoconfiguration Enabled. . . : Yes IPv4 Address. . . . . . : 192.168.1.102(Preferred) Subnet Mask. . . . . . . : 255.255.0.0 Default Gateway. . . . . . : 192.168.1.1 DNS Server. . . . . . : 192.168.1.20 192.168.1.27 Which of the following is the mostly likely cause the problem? A.)Incorrect subnet mask B.)Incorrect DNS server address C.)Incorrect default D.)Incorrect IP address

A

You need to install Windows 10 on a new computer system that uses a SATA SSD device to store data. Which of the following is the BEST method for installing Windows 10 on this system? A.)Install Windows the same way you would a system that uses a standard hard disk drive. B.)Add a standard hard disk to the system and install Windows on the disk instead of the SSD device. C.)Load the drivers for the SSD device during the initial phase of the Windows installation. D.)Set the SATA configuration in the UEFI firmware to RAID.

A

You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems with an application. He tries to describe what he is doing in the application, but you just can't understand what he is doing that might be causing the problem. What should you do? A.)Establish a Remote Assistance connection and watch what the user is doing. B.)Establish a Remote Desktop connection and perform the task on the user's system. C.)Drive to the other location as soon as possible and then watch as the user performs the task. D.)Schedule the user to get more training on using the application.

A

You recently upgraded a client's older workstations from Windows 10 to Windows 7. The client has called to complain that the interface is very slow. For example, after clicking on the Start button, the Start Menu slowly appears on the screen. How can you fix this problem without upgrading the hardware itself? A.) Set the visual effects for the best performance B.) Increase the color depth of the display C.) Increase the hardware acceleration settings D.) Increase the resolution of the display

A

You want to allow your user to download files from a server running the IP protocol. You want to protect access to the files by requiring user authentication to access specific directories on the server. Which IP protocol should you implement to provide this capability? A.)FTP B.)SMTP C.)SSH D.)SNMP E.)LDAP F.)TFTP

A

You want to scan the integrity of all protected system files on your Windows 10 system, but not repair them. Which command should you use? A.)sfc /verifyonly B.)sfc /verifyfile C.)sfc /scanfile D.)sfc /scannow

A

You want to upgrade your Windows 7 Professional computer to Windows 10 Professional. You begin by checking the hardware and discover it has 1 GB of RAM, a 2.0 GHz dual-core processor, a 128 GB solid state drive, and a video adapter with 128 MB RAM and DirectX 9 support. You want to install the 64-bit version of Windows 10. What should you do? A.)add more memory. B.)Upgrade the video adapter. C.)Install a larger solid state drive or hard drive. D.)Upgrade to a faster processor. E.)Upgrade to a processor with at least four cores.

A

You work for a large company as the IT administrator. With the many external attacks being perpetrated in the form of security breaches being found in applications, you are concerned that your Windows 10 computers may be vulnerable. You also want to ensure that Windows is using the latest features. Which of the following would BEST protect your computers? A.)Windows updates B.)Scheduled disk maintenance C.)Scheduled backups D.)Antivirus updates

A

You would like to control internet access based on users, time of day, and website visited. Which of the following actions would BEST meet your criteria? A.)Install a proxy server, Allow internet access only through the proxy server. B.)Configure a packet-filtering firewall. Add rules to allow or deny access based on time of day and content. C.)Configure internet zones using Internet Options. D.)Configure the Local Security Policy of each system to add access restrictions based on time of day and content. E.)Enable Windows Firewall on each system. Add or remove exceptions to control access based on time of day and content.

A

You would like to run an application on your Windows workstation every Monday at 3:00 p.m. Which tool would you use to configure the application to run automatically? A.)Task Scheduler B.)Startup folder C.)Services D.)Msconfig

A

You're responsible for ordering consumables for you organization's printer's. Users print from these printers frequently and demand the utmost in reliability. Which of the following would be the BEST option when ordering new toner for these printers? A.)Toner cartridges recommended by the printer manufacturer. B.)Remanufacturered cartridges from a recycler. C.)Tone refills kits. D.)Discount toner cartridges from a third-party manufacturer.

A

You're using a Linux distribution that uses RPM for package management. Which command would you use to check to see if the httpd package, the Apache HTTP Server package, is installed? A.)you list installed httpd B.)yum search httpd C.)yum info httpd D.)yum list installed

A

Your organization employs a group of traveling salespeople who need to access the corporate home network through the internet while they are on the road. You want to funnel remote access to the internal netwrok through a single server. Which of the following solutions would be BEST to implement? A.)VPN concentrator B.)Host-to-host VPN C.)Site-to-site VPN D.)DMZ

A

A small company hire a technician to review their wireless security. The technician discovers that the wireless signal is available outside of the building. Which of the following could the technician recommend to correct this problem? (Select TWO). A.)Decrease radio power levels. B.)Implement a directional antennae. C.)Enable MAC filtering. D.)Disable SSID broadcast. E.)Update firmware.

A and B

A user works primarily in your organization's production area. However, she frequently needs to access data stored on her Windows 10 desktop system in her office on the production floor. She would like to be able to use a system in the production area to remotely access her desktop system using a network connection. Which groups on her desktop system could you make her user account a member of to enable this configuration? (Select TWO). A.)Remote Desktop Users B.)Administrator C.)Guests D.)Power Users E.)Users

A and B

An administrator configures a server to run the TCP/IP suite protocol that allows users to download files contained in specific directories on the server and also protects access to those files by requiring user authentication. Which of the following TCP/IP port numbers allow this protocol to work properly? (select TWO). A.)20 B.)21 C.)53 D.)80 E.)110

A and B

Joe, a bookkeeper, works in a cubicle environment and is often away from his desk. Joe doesn't want to sign out his computer each time he leaves. Which of the following are the BEST solutions for securing Joe's workstation? (Select TWO). A.)Configure the screen saver to require a password. B.)Configure the screen lock to be applied after shot period of nonuse. C.)Change the default account names and passwords. D.)Apply multi-factor authentication. E.)Set a strong password.

A and B

One of the Windows workstations you manage has three user accounts defined on it. Two of the users are limited users while the third (you account) is an administrative user. Each limited and administrative user has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. Which of the following would MOST likely increase the security of this system? (Select TWO). A.)Set a screensaver password. B.)Disable autorun on the system. C.)Assign each user a simple password so they won't be tempted to write down. D.)Change the two limited user accounts to restricted users. E.)Enable the Guest account.

A and B

Which of the following are examples of social engineering? A.)Shoulder surfing B.)Dumpster diving C.)Port scanning D.)Port scanning E.)Ware dialing F.)Brute force password cracking

A and B

Which of the following functions are performed by proxy servers? (Select TWO). A.)Cache web pages B.)Block employees from accessing certain websites C.)Store client files D.)Block unwanted packets from entering your private network E.)Filter unwanted email

A and B

You are an IT technician for you company. Rachel, who works at the receptionist desk, thinks her Windows 10 machine is running slowly today and calls you to see if you can speed it up. None of the other employees have called regarding any related issues, so you suspect it is an issue with Rachel's computer, perhaps a malfunctioning application. To help troubleshoot Rachel's computer, you run Task Manager. Which of the following tabs would be the MOST helpful for getting an overall view of how computer is running? A.)Processes B.)Performance C.)App history D.)Startup E.)Users F.)Details G.)Services

A and B

You are configuring the local security of a Windows system. You want to prevent users from reusing old passwords. You also want to force them to use a new password for at least five days before changing it again. Which of the following policies are BEST to configure? (Select TWO). A.)Enforce password history B.)Minimum password age C.)Minimum password length D.)Maximum password age E.)Password complexity

A and B

You are in the process of preparing a storage device and must determine which file determine which file system to use. Under which of the following conditions are you MOST likely to choose exFAT over FAT32 or NTFS? (Select TWO.) A.)When formatting removable flash drives. B.)When storing files larger than 4 GB in size. C.)When formatting removable hard drives. D.)When the device needs to be readable by other operating systems, such as MacOS or Linux. E.)When creating a volume less than 10 MB in size.

A and B

You have a notebook computer with a built-in wireless network card. One day, it stops working. Because the network card is integrated onto the motherboard, you do not want to replace the entire motherboard. What can you use to connect to the wireless network? (Select TWO.) A.)Insert a wireless USB network card. B.)Enable the infrared port on the notebook. C.)Insert an ExpressCard wireless network card. D.)Insert an ExpressCard wireless network card. E.)Install a PCI wireless network card.

A and B

You manage a group of 20 Windows workstations that are currently configured as a workgroup. You have been thinking about switching to an Active Directory configuration. Which advantages would you gain by switching to Active Directory? (Selct TWO.) A.)Centralized configuration control B.)Centralized authentication C.)Increased local control of workstation. D.)reduced need for specialized hardware E.)Decreased implementation cost

A and B

You use productivity apps on your iPad tablet device while traveling between client sites. You're concerned that you may lose your iPad while on the road and want to protect the data stored on it from being compromised. Current, your iPad uses a 4-digit PIN number of a passcode. You want to use a more complex alpha-numeric passcode. You also want all data on the device to be eared if the wrong passcode is entered more than 10 consecutive times. What should you do? (Select TWO.) A.)Disable the Simple Passcode option B.)Enable the Erase Data option. C.)Enable the Restrictions option D.)Enable the Complex Passcode option. E.)Enable the Wipe Drive option. F.)Enable the Require Passcode

A and B

You want to configure Power Plans on your Windows 10 laptop computer. Which of the following can do this? A.)Go to Settings > System > Power & Sleep B.)In Notification Area, double-click the battery icon. Click Power Options C.)Click Start and then right-click Computer and select Properties. Click Advanced System Settings. D.)Right-click the Desktop and select Properties. On the Screen Save tab, Click the power... button. E.)Click Start and the open the Control Panel. Double-click the System icon. On the Advanced tab, click the Settings button for performance.

A and B

You work in an office that uses Linux and Windows servers. The network uses the IP protocol. You are setting at a Windows workstation. An application you are using is unable to connect to a Windows server named FileSrv2. Which of the following commands would work BEST to test network connectivity between your workstation and the server?(Select TWO) A.)tracert B.)ping C.)nslookup D.)arp E.)dig

A and B

Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a paper license and a single key for updating 10 users. Since this an enterprise paper license, there is no mechanism that enforces a limit to the number of times the key can be used, so you decide to go ahead and update all 20 users. What are the possible consequences of this decision? (Select TWO.) A.)You risk losing your job. B.)You expose your company to litigation by violating the software license agreement. C.)The software company will never detect the violation, so negative consequences are unlikely. D.)Because you should be allowed one to three activation's per user, this decision does not put you at risk for negative consequences. E.)The software will eventually stop working properly for the 10 extra updates you installed.

A and B

What are two major concerns regarding IoT devices? A.)Hacking B.)Short lifespan C.)Privacy D.)Availability E.)Accessibilty

A and C

What is the purpose of the Microsoft Management Console (MMC)? (Select TWO). A.)Provide a shell for running snap-ins B.)View historical data that describes the operating system's stability. C.)Provide a common user interface for performing system administrative tasks. D.)Display statistic that tell you about the operation of your computer. E.)Process requests from other application or users.

A and C

When a user rotates a mobile device, the operating system changes the screen orientation so that the display remains upright to the user. Which of the following technologies is uses to detect this device movement? (Select TWO.) A.)Gyroscope B.)Wi-Fi C.)Accelerometer D.)Geotracking E.)GPS

A and C

Which of the following are likely symptoms of malware infections? (Select TWO). A.)Renamed system files B.)Operating system updates that were installed without your knowledge C.)Changed file permissions D.)Receipt of phishing emails in you inbox E.)Cookies placed by a website recently visited

A and C

Which of the following components are found in dot matrix printers? (Select TWO.) A.)Tractor feed B.)Nozzles C.)Platen D.)Thermal ink ribbon E.)Drum

A and C

Which of the following locations will contribute the greatest amount of interference for a wireless access point? (Select TWO.) A.)Near backup generator B.)Near DHCP server C.)Near cordless phones D.)Near exterior walls E.)In the top floor of a two-story building

A and C

While browsing the Internet, a pop-up browser is displayed warning you that your system is infected with a virus. You are directed to click a link to remove the virus. Which of the following are the BEST actions to take? (Select TWO). A.)Run a full system scan using the anti-malware software installed on your system. B.)Use a search engine on the Internet to learn how to manually remove the virus. C.)Update the virus definitions for your locally-installed anti-malware software. D.)Click on the link provided to scan for and remove the virus. E.)Close the pop-up window and ignore the warning.

A and C

While using a Windows 10 system, you accidentally downloaded and installed a malware package from phishing email exploit. You were able to reboot the system into Safe Mode and use System Restore to revert the system to a point in time before the malware infection occurred. Given this information, which of the following are true? (Select TWO.) A.)You must reinstalled any applications that were installed after the restore point was taken. B.)You must restore your user data from backup. C.)Your user files were not affected when the systems was reverted to the restore point. D.)All files created or modified since the restore point was created must be restored from backup. E.)The applications installed on the system were not affected when it was reverted to restore point.

A and C

You are configuring a network firewall to allow SMTP outbound email traffic and POP3 inbound email traffic. Which of the following IP ports should you open on the firewall? (Select TWO). A.)25 B.)21 C.)110 D.)143 E.)443

A and C

You have just purchased a new home and want to purchase a home theater computer system. Which of the following hardware selection criteria is the MOST important for this system? (Select TWO.) A.)HTPC form factor B.)RAM configured to run in quad-channel mode C.)Video card with HDMI output D.)RAID 5 disk array E.)64-bit processor with 12 cores

A and C

You manage Windows desktops for your organization. You recently updated all of your workstations to Windows 10. Your organization relies on a particular application, which worked correctly on Windows 7, but now does not run in Windows 10. You have checked the application vendor's website, but they do not provide a Windows 10 update. What are your options for running the application? (Select TWO). A.)Run the application in Compatibility Mode. B.)Run the application in its own memory space. C.)Create a virtual computer that runs Windows 7. Run the virtual computer each time the application runs. D.)Make all users who need to run the application members of the local Administrator group. E.)Purchase a new application that runs on Windows 10.

A and C

A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following using a wireless network locator device: -The use an 802.11n wireless network. -The wireless network is broadcasting with SID Linksys. -The wireless network uses WPA2 with AES security. -Directional access points are positioned around the periphery of the building. Which of the following would you MOST likely recommend your client to do increase their wireless network security? (Select TWO). A.)Disable SSID broadcast. B.)Implement omnidirectional access point. C.)Upgrade to an 802.11g wireless network. D.)Change the SSID to something other than the default. E.)Configure the wireless network to use WPA with TKIP security.

A and D

For several years, the monitor on your laptop has worked perfectly. However, shortly after turning on your laptop today, you noticed a definite dimness. Which of the following is the MOST likely cause? (Select TWO) A.) The monitor's inverter has gone bad B.) The monitor's hertz rate is set too high C.) The monitor's resolution was automatically rest to the default settings D.) The power adapter was accidently unplugged E.) The brightness level was automatically reset to the default

A and D

Which are examples of a strong password? (Select TWO). A.)TuxP3nguinsRn0v3l B.)skippy C.)Morganstern D.)il0ve2EatIceCr3am E.)NewYork

A and D

Which printer management components would you use to view the port a printer uses? (Select TWO.) A.)Printer properties B.)Print queue properties C.)Print queue D.)Print server properties E.)Print spooling service

A and D

You need to protect the user data on a Windows 10 system. Which of the could you use to do this? (Select TWO.) A.)File History B.)Storage Spaces C.)Work Folders D.)Windows 7 (Backup and Restore) E.)Previous Versions

A and D

A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database. Because she rarely comes back to your home office. she usually accesses the network from her notebook computer using Wi-Fi access provided by hotels, restaurants, and airports. Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection. Which of the following key steps should you take when implementing this configuration? (Select TWO). A.)Configure the VPN connection to use IPsec. B.)Configure the VPN connection to use PPTP. C.)Configure the VPN connection to use MS-CHAPv2. D.)Configure the browser to send HTTPS requests directly to the Wi-Fi network without going through the VPN connection. E.)Configure the browser to send HTTPS requests through the VPN connection.

A and E

A technician is assisting Ann, who reports that the display on her company-issued smartphone is too dim to read in a dark room, even after she adjusts the brightness setting. Which of the following actions should the technician perform FIRST? (Select TWO.) A.)Adjust the battery saver setting. B.)Replace the Display. C.)Replace the battery. D.)Close all running apps. E.)Adjust the adaptive or automatic brightness control.

A and E

A user hibernates a laptop after giving a video presentation. Now, when it resumes, the display flickers for a moment, but remains blank. A technician suspects a bad graphics processing unit. (GPU). Which of the following troubleshooting steps should you be completed? (Select TWO.) A.)Toggle the dual display function key. B.)Connect an external keyboard and mouse. C.)Replace the battery. D.)Connect an external USB hard drive. E.)Connect an external display device.

A and E

Which of the following are advantages of solid state compared to heard drives? A.) Lower power requirements B.) Inexpensive C.) Proprietary disk interface D.) Larger storage capacity E.) No moving parts

A and E

Which of the following are characteristics of Bluetooth? (Select TWO.) A.)Ad hoc connection B.)Red spectrum light waves C.)Line-of-sight transmission D.)5.75 GHz radio transmission E.)2.4 GHz radio transmission

A and E

Which of the following techniques are used in a pharming attack to redirect legitimate web traffic to malicious website? (Select TWO). A.)Exploiting DHCP servers to deliver the IP address of poisoned DNS server B.)Man-in-the-middle attack C.)Search engine results poisoning D.)Dictionary attack E.)Changing the hosts file of a user's computer

A and E

You are installing an updated driver for a hardware device on your system. A dialog box displays indicating that Microsoft has digitally signed the driver you are installing. What benefits does driver signing provide? (Select TWO) A.) The driver has been tested by Microsoft B.) The driver will not interfere with other devices on the system C.) The driver being installed is the most recent driver available D.) The driver being installed is compatible with 32- and 64-bit versions of Windows E.) The driver file has not been altered

A and E

You have a Windows system with two SATA hard river, one used for the operating system and the other used for storing data. You have traced recent problems to a fault in the system motherboard. You replaced the motherboard and reconnected all the hardware. when you started the computer, the system showed the startup information screen, but then returned an error that an operating system could not be found. What should you do? (Select TWO.) A.)Change the boot order in the UEFI configuration. B.)Boot into the recovery console and run the bootrec /rebuildbcd command. C.)Press F6 during startup and load SATA drivers. D.)Boot into Safe Mode and import the disks in Disk Management. E.)Verify the operating system SATA drive is configured as the boot drive in the UEFI configuration.

A and E

You're troubleshooting a malfunctioning notebook computer system. The user has indicated that the LCD screen suddenly became dark and difficult to read while he was downloading a large file through his wireless network card while the system was plugged in at his desk. You've checked the system and determined that the backlight has stopped working. Which of the following is the MOST likely cause? (Select TWO.) A.)The inverter in the LCD assembly has malfunctioned. B.)Malware was installed as part of the download that targeted the backlight circuitry. C.)The wireless netwrok card is emitting radio signals that interfere with the backlight, causing it to stop functioning. D.)The extended download placed high demands on the system DC power, causing the BIOS to shut off the backlight. E.)The cold cathode fluorescent lamp has burned out and needs to be replaced.

A and E

which of the following statements about Dynamic Host Configurations Protocol (DHCP) are true? (Select TWO.) A.)A workstation must request addressing information from a DHCP server B.)It cannot be configured to assign the same IP address to the same host each time it boots C.)It can only deliver IP addresses to hosts D.)The DHCP sever detects workstations when they attach tot he network and automatically delivers IP addressing information to them. E.)It can deliver a DNS server address in addition to the host IP address

A and E

Which of the following are the BEST steps you can take to avoid having your mobile device exploited by a hacker or infected by a virus? (Select TWO.) A.)Keep the operating system up to date. B.)Keep your device in your possession. C.)Keep an up-to-date remote backup D.)Avoid anti-virus apps. E.)Turn off location services F.)Lock the screen with some form of authentication

A and F

Which of the following identifies the Interface ID component of an IPv6 address?(Select TWO) A.)The last 64 bits of an IPv6 address B.)The first quartet of an IPv6 address C.)The first four quartets of an IPv6 address D.)The fourth quartet of an IPv6 E.)The last quartet of an IPv6 F.)The last four quartets of an IPv6 address

A and F

You are an IT technician for your company. Jodie, a receptionist, thinks her Windows 10 machine is running slowly today and calls you see if you can speed it up. None of the other employees have called regarding any related issues, so you suspect it is an issues with Jodie's computer, perhaps a malfunctioning application. To help troubleshoot Jodie's computer, you run Task Manager. Which of the follwoing tabs would be the MOST helpful of getting an overall view of how Jodie's computer is running? (Select TWO). A.)Performance B.)Users C.)App history D.)Details E.)Services F.)Processes

A and F

You've just set up a color laser printer on a customer's Window workstation. You've connected it to the workstation using a USB cable and have loaded the appropriate drivers? Which of the following are the BEST step to take next? (Select TWO). A.)Edit the printer properties to configure paper tray and other device-specific settings. B.)Use Driver Rollback to make a backup copy of the new printer driver. C.)Set the driver to print grayscale by default to reduce color toner consumption. D.)Use the UBSTEST utility in Windows to verify that the USB connections is working properly. E.)Do nothing. Your work is done. F.)Verify that it is working correctly by printing a test page.

A and F

Which of the following will improve the security of sensitive information on your device if it is lost or stole? (Select THREE.) A.)A lock screen B.)Remote backup C.)Keeping up to date with OS updates and patches D.)Remote wipes E.)Locator applications F.)Anti-malware software

A, D, and E

Which of the following are printer languages?(Select THREE.) A.)Escape codes B.)PCL C.)Pascal D.)PostScript E.)Capture F.)PrintDef

A,B, and C

A customer is experiencing a sporadic interruption of their Wi-Fi network in one area of their building. A technician investigates and discovers signal interference caused by a microwave oven. The customer approves replacing the wireless access point that covers the area, but asks that the wireless speed alson be increased. Which of the following Wi-Fi standards should the replacement device support to BEST fulfill the customer's needs? A.)802.11g B.)802.11ac C.)802.11b D.)802.11a

B

A few simple replies to this from the remote host indicates that a connection exists between sender and receiver. specified hostname. A.)ipconfig B.)ping C.)tracert D.)nslookup E.)netstat

B

A flash device and storage capacity similar to a small hard drive. A.) Hard disk drive (HDD) B.) Solid state drive (SSD) C.) Optical disc

B

A group of workers in an office space communicate with each other on their smartphones and tablet devices through an as hoc network linked using Bluetooth technology protocol. A.)Local Area Network (LAN) B.)Personal Are Network (PAN) C.)Metropolitan Area Network (MAN) D.)Wide Area Network (WAN)

B

A homeowner's connection to the internet is through an always-on modem that connects to existing telephone wiring and has a download speed of over 3 Mbps. The homeowner is able to make analog phone calls over the same wiring at the same time. Which of the following internet connection types is being used? A.)Cable B.)DSL C.)ISDN D.)Dial-up

B

A router on the boarder of your network receives a packet with a source address that shows it originating from a client on the internal network. However, the packet was received on the router's external interface, which means it originated somewhere of the Internet. Which of the following BEST describes the type of attack which as occurred in this scenario? A.)Sniffing B.)Spoofing C.)Man-in-the-middle D.)Session hijacking E.)Snooping

B

A sales person typically carries a laptop computer to several off-site customer meetings each day, but needs the flexibility to quickly attach other peripherals and charge the laptop battery while at their office desk. Which of the following laptop feature would BEST meet these requirements? A.)A keyboard-video-mouse (KVM) switch B.)A laptop docking station C.)A USB 3.0 hub D.)A USB-RJ45 dongle

B

A small network used for connecting devices, such as a notebook computer, a wireless headset, a wireless printer, and a smartphone. A.)Local Area Network (LAN) B.)Personal Are Network (PAN) C.)Metropolitan Area Network (MAN) D.)Wide Area Network (WAN) E.)Wireless Local Area Network (WLAN)

B

A technician determines that an older network hub connects 24 workstations is performing poorly due to excessive network collisions. Which of the following network devices would be the BEST replacement? A.)Patch panel B.)Switch C.)Router D.)Bridge

B

A technician is running a network above a dropped ceiling that is also used for ventilation. The cable must be twisted pair and must be capable of Gigabit Ethernet speeds. A.)Riser-rated RG-58 B.)Plenum-rated CAT-6a C.)Riser-rated CAT-5e D.)Plenum-rated multimode fiber

B

A technician is servicing a laptop that works properly when the power adapter is plugged in. Even though the battery icon show that the battery if fully charge, when the laptop is unplugged, the laptop immediately shuts down. Which of the following actions should the technician perform? A.)Change the power options mode to Balanced. B.)Replace the laptop battery. C.)Replace the power adapter. D.)Change the power options mode to Power Saver.

B

A technician is tasked wit repairing a laptop keyboard with sticking keys. Which of the following actions should the technician perform before replacing the keyboard? A.)Repeatedly drop a small rubber ball on each sticky key. B.)Spray compressed air between the keys. C.)Disable the Sticky Keys keyboard setting. D.)Enable the Bounce Keys setting to ignore repeated keystrokes.

B

A technician is tasked with increasing the RAM memory on a laptop by adding a SODIMM module to an empty memory slot. Whic of the following processes will seat the module in the slot? A.)Slide the memory into the external Expresscard slot horizontally until the card is even with the laptop case and you hear a click. B.)Align the notch on the long side of the memory module with the rise in the memory slot. Insert the module pins into the slot a 45-degree angle. Rotate the module by pressing down until the side hold down clips snap into place. C.)Add the mounting pegs to the side of the memory module. Attach the ribbon cable and press into place until the mounting clips catch the mounting pegs. D.)Align the notch on the long side of the memory module with the rise in the memory slot. Insert the module pins into the slot at a 90-degree angle to the motherboard and press down until the side hold down clip snap into place.

B

A technician is tasked with replacing an internal laptop hard drive. Which of the following hard drive standards would be of MOST concern when selecting a replacement? A.)The hard drive's minimum voltage requirements B.)The hard drive's form factor C.)The hard's storage capacity D.)The hard drive's read and write speed

B

A technician receives notification from a SOHO router manufacturer of a specific vulnerability that allows attackers to exploit SNMP traps to take over the router. The technician verifies the setting outlined in the notification. Which of the following actions should the technician take NEXT? A.)Enable MAC filtering. B.)Check for and apply firmware updates. C.)Enable content filtering. D.)Disable DHCP.

B

An internal laptop is generally connected to the laptop's system board using a? A.)USB connector B.)Ribbon cable C.)Mini-molex connector D.)PS/2 port

B

Are supported by all operating systems. A.) Dynamic disk B.) Basic disk

B

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While she normally works from her office, today she is trying to access the wireless network from a conference room which is across the hall and next to the elevator. What is the most likely cause of her connectivity problem? A.)MAC filtering is preventing the computer from connecting. B.)Interference is affecting the wireless signal C.)The client computer is using the wrong channel number. D.)SSID broadcast has been disabled E.)The user has not yet rebooted her laptop computer while at her new location

B

A user complains that his USB scanner no longer works. You check Device Manager and see an icon with a black down arrow on it. What should you do? A.) Remove and reinstall the device B.) Enable the device in Device Manager C.) Update the device drivers D.) Replace the device

B

A user complains that his notebook display has started to go dim intermittently. You suspect the backlight might need to be replaced, but you want verify that the backlight is failing before you replace it. Which of the follwoing would BEST to check before replacing the backlight? A.)Check the display inverter connections. B.)Make sure that the dimming isn't being caused by a power saving method that has been configured to conserve notebook power. C.)Check for cracks in the power bundles that go from the laptop to the display. D.)Make sure the battery is still able to hold a charge. E.)Make sure the power adapter cords are plugged in securely.

B

A user has a file that contains sensitive data. Which of the following can be used to encrypt a single file? A.)Bitlocker B.)EFS C.)Administrative share D.)Single sign-on

B

A user has complained about not being able to remove a program that is no longer needed on a computer. The Programs option is not available in Control Panel. You suspect that a policy is enabled that hides this option from the user. But after opening the Local Group Policy Editor, you see that the policy to hide Programs is not configured. You know that other users in this domain can access the Programs option. To determine whether the policy is enabled, where should you look next? A.)The Default Domain Policy GPO. B.)GPOs linked to organizational units that contain this user's object. C.)The Local Group Policy. D.)GPOs linked to the domain that contains this users object.

B

A user has configured his mobile device to unlock using facial recognition. Which of the follwoing methods for securing a mobile device is being used? A.)Trusted source B.)Biometric authentication C.)A locator application D.)An antivirus application

B

A user is trying to log into Window on her notebook computer. She enter the correct password for her user account, but the system won't let her authenticate, claiming the wrong password has been entered. Which of the following is MOST likely causing this problem? A.)She has entered the wrong password to many time, causing Intruder Detection in Windows to lock the system. B.)She has turned Num Lock on, Causing the keyboard to register numbers instead of letter. C.)The CPU is in power-safe mode, causing all login attempts to be denied. D.)The Scroll Lock key has been pressed, locking all input from the keyboard. E.)The keyboard must be replaced.

B

A user is trying to log into her notebook computer. She enters the correct password for her user account, but the system won't let her authenticate, claiming the wrong password has been entered. Which of the following is MOST likely causing the problem? A.)The CPU is in power-save mode, causing all login attempts to be denied. B.)She has enabled Num Lock, causing numbers to be sent from the keyboard instead of letter. C.)The Scroll Lock key has been pressed, locking all input from the keyboard. D.)She has entered the wrong password too many times, causing Intruder Detection in Windows to lock the system. E.)The keyboard must be replaced.

B

A user reports that an older laptop is having trouble connecting with newer wireless networks. Which of the following actions should a technician consider as an alternate to replacing the laptop? A.)Add more memory B.)Replace the internal wireless card. C.)Replace the hard drive with one with a larger capacity D.)Replace the system board.

B

A user stores sensitive data on a USB flash drive. Which of the following can be used to encrypt the data on this drive? A.)Administrative share B.)Bitlocker To Go C.)Run as administrator D.)Single sign-on

B

After using your LCD monitor for about three months, you notice a small black dot in one area of the screen. Regardless of what is shown on the monitor, the dot remains the same color and in the same location. Which of the following is the BEST method for removing the black dot from the monitor? A.) Purchase a new monitor B.) Play a video designed to fix dead pixels C.) Apply pointed pressure and rub the dead pixel D.) Apply a heated cloth enclosed in a bag to the dead pixel.

B

Alice has received several calls from her friends informing her that they are receiving strange emails containing content that seems odd coming from her. Which of the following MOST likely happened on Alice's computer? A.)A Trojan horse is running on Alice's computer. B.)Alice's email account was hijacked. C.)A family member used her account to send prank emails D.)A virus or malware was installed on Alice's computer.

B

Allows a device to request processing time from CPU. A.) I/O address B.) IRQ (Interrupt Request) C.) DMA (Direct Memory Access)

B

Allows you to control hardwired lights, ceiling fans, fireplaces, small appliances, and garbage disposals. A.)Thermostat B.)Switch C.)Bulb D.)Plug E.)Security Cameras F.)Door Lock G.)Speaker/Digital Assistant

B

An 8-port switch receives a frame on port number 1. The frame is addresses to an unknown device. What will the switch do? A.)Send the frame out all 8 ports. B.)Send the frame out port 2-8. C.)Drop the frame. D.)Send the frame out the destination port.

B

An after-school daycare center allows children to browse the internet. They want to limit the websites that the children can access. Which of the following netwrok hosts would MOST likely provide this service? A.)Print server B.)Proxy server C.)DHCP server D.)Web server

B

An employee working from home access the company network using a VPN connection. When connection, the employee s prompted for a PIN that changes at predetermined intervals. Which of the following will the employee MOST likely use to obtain the PIN? A.)Entry control roster B.)Key fob C.)RFID badge D.)Fingerprint reader

B

Ben is concerned about losing data due to a hard disk failure. His computer will only support a maximum of three disks. To protect his data, you have decided to use RAID (redundant array of independent disks). Which of the following RAID types would give Ben the BEST mirrored data protection? A.) RAID 0 B.) RAID 1 C.) RAID 5 D.) RAID 10

B

Cable lengths can extend a great distance. A.)Single mode B.)Multimode

B

Can be used to connect wireless clients to wired clients on the same network. A.)Switch B.)Bridge C.)Router D.)Hub

B

Can be written, read many times, erased, rewritten, and has a capacity of about 650 MB. A.) Compact Disc (CD) B.) Compact Disc (CD-RW) C.) Digital Versatile Disc (DVD) D.) Digital Versatile Disc (DVD-RW) E.) Blu-ray Disc (BD-RE) F.) Blu-ray Disc (BD)

B

Collection of related domain trees is a? A.)Tree B.)Forest C.)Domain D.)Organizational unit E.)Object

B

Connector used to emulate cryptographic smart card functionalities. A.)Hotspot B.)NFC C.)Mobile VPN D.)Tethering E.)Bluetooth

B

Consider the virtual memory configuration for the Windows 10 system shown in the exhibit. Given that this Windows 10 system has 16 GB of system RAM and three hard disks installed, which configuration change could you make to the paging file to increase system performance? A.)Set the initial size of the paging files 8 GB. B.)Add paging files to the E: and F: volumes. C.)Remove the paging file from C: volume. D.)Set the maximum size of the paging file to 32 GB.

B

Device manufacturers are countless. A.)iOS B.)Android C.)Windows

B

Faster than other devices. No moving parts. Last longer than other storage devices. A.) Hard disk drive (HDD) B.) Solid state drive (SSD) C.) Optical disc

B

Fingerprint scanner A.) Smart card reader B.) Digitizer C.) Biometric Scanner D.) Barcode reader

B

Following your Windows installation, you enabled the built-in Administrator account. You remove the password for this account. You enable Remote Desktop on your computer using the default settings. From home, you try to access your computer using Remote Desktop using the Administrator account, but you are unable to log on. Which of the following MUST be completed before you can access your computer using Remote Desktop? A.)Make the Administrator account a member of the Remote Desktop Users group. B.)Configure a password for the Administrator account. C.)Disable fast user switching on the computer. D.)Unlock the Administrator account.

B

Graphics tablets mostly used by graphic artists to capture hand-drawn images. A.) Smart card reader B.) Digitizer C.) Biometric Scanner D.) Barcode reader

B

HTTP over SSL (HTTPS) A.)548 B.)443 C.)22 D.)445 E.)80 F.)143 G.)427

B

Identifies the requirements for credentials used to authenticate to company-owned systems. A.)Organizational Security Policy B.)Password Policy C.)Code of Ethics D.)Acceptable Use Policy E.)User Awareness Policy

B

If a printer is connected directly to a Windows workstation, what can be done to allow other workstations on the same network to send print jobs to this printer? A.)Configure the printer to be a print server B.)Configure the printer to be a shared printer C.)Configure the workstation as a print driver D.)The printer can only be shared by disconnecting it from the workstation and connecting it to the network.

B

Indicates that the disk is turned on and can be accessed and the volume on the disk is valid and no error. A.) Initializing B.) Healthy C.) Unavailable D.) Offline

B

Joe, a frequent visitor to a branch office, attempts to connect his tablet to the office wireless network, but is unable to connect to the internet, even though he has verified that the SSID and password are correct. Joe attempts to connect to a coworker's hotspot, but still unable to connect to the internet. Which of the following is the MOST likely cause of this issue? A.)MAC filtering has been enabled on the branch office wireless access point. B.)Airplane mode has been set on the tablet. C.)The connection between the branch office router and internet service provider is down. D.)Joe's tablet has been configured with full device encryption.

B

Keeps one organization data separate and secure from any other organization using the same service provider. A.)Public cloud B.)Private cloud C.) Community cloud D.)Hybrid cloud.

B

Micka, a tech-savvy employee, tried to upgrade her computer from Windows 7 to Windows 10 from the internet. Something went wrong during the upgrade, and Micka's computer boot to Windows. She has brought her computer to the IT department for you repair. You have tried to repair the computer, but you are unable to get it to boot to Windows. Which of the following methods would be the Quickest way to get Micka's computer back to its original Windows 7 operating system. A.)Using the Windows 7 DVD, perform an upgrade. B.)Restore her system using the recovery partition. C.)Download and reinstalled Windows Automated Installation Kit (AIK) for Windows 7. D.)Connect her computer to your external flash drive and install Windows 7 from the data it contains.

B

Nathan, a long-time Mac user, has been using his Mac computer for some time now with no issues. Recently, however, he reported that his Mac will unexpectedly tell him that his computer must be restarted by holding down the Power button for several seconds or by pressing the Restart button. Assuming that this is a symptom of kernel panic, which of the following steps would be the BEST first step for troubleshooting this issue? A.)Verify that your disk has enough free space. B.)Do a safe boot C.)Update your firmware. D.)Disconnect all external devices except the keyboard and mouse. E.)Install all available software updates.

B

Occurs when two files claim the same cluster. A.) Lost cluster B.) Cross-linked file C.) Orphaned files D.) Bad sector

B

Which of the following conditions would prevent you from using a GUID Partition Table (GPT) when setting up a disk drive? A.) You're setting up the drive to boot 64-bit Windows 7 on a UEFI-based computer. B.) You're setting up the drive to boot Window 10 on a computer that uses traditional BIOS C.) You need to set up the drive as a dynamic disk D.) You need to be able to create up to 128 partitions on the drive

B

One day, while trying to start your Windows 10 system, you see the following error displayed: *Could not read from the selected boot disk. Check boot path and disk hardware. Which of the following will MOST likely fix the problem? A.) Boot into Safe Mode and restore to a restore point B.) Boot into the recovery environment and run the bootrec /rebuildbcd command C.) Boot into the recovery console and run the fixmbr command on the boot volume. D.) Boot into the recovery console and run the bootcfg /rebuild command E.) Boot into recovery console and copy the NTLDR file to the boot volume

B

One of the Windows workstations you manage has four user accounts defined on it. Two of the users are limited users while the third (your account) is an administrative user. The fourth account is the Guest user account, which has been enabled to allow management employees convenient workstation access. Each limited and administrative user has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's file. Autorun has been disabled on the system? A.)Change your user account to a limited iser. B.)Disable the Guest account. C.)Enable autorun on the system. D.)Change the two limited user accounts to administrative users.

B

One of your computers wants you to build a personal sever that he can use in his home. One of his concerns is making sure he has at least one backup of their data stored on the server in the event that a disk fails. You have decided to back up his data using RAID. Since this server is for personal use only, the customer wants to keep costs down. Therefore, he would like to keep the number of drives to a minimum. Which of the following RAID systems would BEST meet the customer's specifications? A.) RAID 0 B.) RAID 1 C.) RAID 5 D.) RAID 10

B

One of your customers wants to configure a small network in his home. The home has three floors, and there are computers on each floor. this customer needs to share files between computers, print to a centrally located printer, and have access to the internet. Which of the following print solutions would work BEST meet this client's need? A.)Configure a Wi-Fi space network B.)Configure a Wi-Fi infrastructure network C.)Configure a Wi-Fi global area network D.)Configure a Wi-Fi ad hoc network

B

One software license model allows software to be freely distributed, downloaded, and installed without paying a license fee, but often requires a fee for support, training, or added functionality. What is the name of this model? A.)Persistent B.)Open source C.)Personal D.)Proprietary E.)Enterprise

B

Only support volumes made up of contiguous disk space. A.) Dynamic disk B.) Basic disk

B

Open source and most popular mobile device operating system. A.)iOS B.)Android C.)Windows

B

Operating systems do not need modification to run within virtual machines. A.)Partial virtualization B.)Full virtualization C.)Paravirtualization

B

Performs a continuous connection test when used with -t option. specified hostname. A.)ipconfig B.)ping C.)tracert D.)nslookup E.)netstat

B

Provides resources to a single organization. A.)Public cloud B.)Private cloud C.) Community cloud D.)Hybrid cloud.

B

Rachel, an employee in the support department, wants to run a virtual machine on her computer from which she can troubleshoot customer issues. Which of the following must you complete before virtualization will work on her computer? A.)Install the extra hard disk from the new virtual machine will run on. B.)Enable virtualization support in the BIOS settings. C.)Flash the computer's BIOS to add virtualization support. D.)Install additional memory.

B

Represents a group of networks that are connected with high-speed links. A.)Domain Controller B.)Site C.)Subnet D.)Forrest Root Domain E.)Tree Root Domain

B

Sends an ICMP echo request/reply packet to a remote host. specified hostname. A.)ipconfig B.)ping C.)tracert D.)nslookup E.)netstat

B

Some software on Rachel's computer is telling her that her computer is at risk and that she needs to purchase an upgrade for the software before the risk can be removed. Confused, Rachel calls you (the IT specialist) for advice. After meeting with Rachel, you discover that the pop-up warnings only began after she installed a plug-in for her internet browser. Which of the following is the MOST likely cause of these warning messages? A.)Hijacked email B.)Rogue antivirus C.)App scanner D.)SPAM

B

Specifies that user accounts should be locked after a certain number of failed login attempts. A.)Organizational Security Policy B.)Password Policy C.)Code of Ethics D.)Acceptable Use Policy E.)User Awareness Policy

B

Susan works in the research and development. She has recently purchased a large high-speed external drive and has attached the drive to her computer using a USB cable. Her drive requires a minimum bandwidth of 400 Mbps and at least 900 milliamps (mA) to function. Although the correct drivers are installed, the drive is not functioning. To troubleshoot the problem, she has connected her drive to her coworker's computer where the drive functions properly. No additional cables are required for this drive. A.) Susan has connected her drive to a USB 3.0 port, but the drive is only made to work with a 2.0 port, B.) Susan has connected her drive to a USB 2.0 port, which does not have enough power for her drive. C.) Susan has connected her drive to a USB 3.0 port, which does not have enough power for her drive. D.) Susan has connected her drive to a USB 2.0 port, which does not support the maximum bandwidth required. E.) Susan has connected her drive to a USB 3.0 port, which does not support the maximum bandwidth required.

B

System Restore is currently disabled for all volumes on a Windows 10 system. You need to enable System Protection for the C: volume. What option would you select in System Protection? A.)System Restore B.)Configure C.)Create

B

The amount of time the processor spends performing non-idle tasks. A.)Disk queue length B.)Processor utilization C.)Commit charge D.)Disk time E.)Memory pages per second

B

The chain of custody is used for what purpose? A.)Maintaining compliance with federal privacy laws. B.)Retaining evidence integrity by identifying people coming into contact with evidence. C.)Identifying the owner of evidence. D.)Detailing the timeline between creation and discovery of evidence.

B

The core diameter is around 10 microns. A.)Multimode B.)Single mode

B

The marketing department has hired a new employee. Prior to the new employee's first day at work, you have set up and configured a new laptop computer. The computer and all of the peripherals were purchased from the same vendor. After the new employee begins work, you receive a phone call stating that the wireless mouse is not working. Which of the following is the MOST likely reason the mouse isn't working? A.) The USB mouse driver is too old for the current mouse. B.) The USB mouse receiver is not plugged into the computer. C.) The USB mouse is malfunctioning. D.) The USB mouse is not a wireless mouse and needs to be plugged into the computer.

B

The method used by different system device to interact with the CPU. A.) I/O address B.) IRQ (Interrupt Request) C.) DMA (Direct Memory Access)

B

The virtual machine completely simulates a physical computer system. A.)Partial virtualization B.)Full virtualization C.)Paravirtualization

B

Two employees are unable to access any website on the internet, but can still access servers on the local netwrok, including those residing on other subnets. Other employees are not experiencing the same problem. Which of the following actions would BEST resolve this issue? A.)Reconfigure the clients to send all traffic directly to the ISP, bypassing the proxy server. B.)Identify the proxy server name and port number in Internet Options. C.)Identify the filter settings on the proxy server for specific internet sites. D.)Use ipconfig to confirm that APIPA has not assigned an IP address.

B

Up to 30 meter in areas without interference. A.)Bluetooth B.)Infrared

B

Use primary and extended partitions. A.) Dynamic disk B.) Basic disk

B

Used to capture some type of analog signal and convert it into digital data. A.) Smart card reader B.) Digitizer C.) Biometric Scanner D.) Barcode reader

B

What PC hardware configuration belongs to the workstation type listed below? -32 GB PC4-21300 DDR4 RAM -4 TB SATA HD -Integrated video adapter A.)CAD/CAM design workstation B.)Virtualization workstation C.)Home theater PC

B

What PC hardware configuration belongs to the workstation type listed below? -Intel Core i7 six-core 3.4 GHz CPU -1 TB SSD SATA HD -16 GB DDR4 RAM -Video capture card A.)Thin client PC B.)Video editing workstation C.)Virtualization workstation

B

What is a cookie? A.)An executable file that runs in the background and tracks internet use. B.)A file saved on your hard drive that tracks website preferences and use. C.)A malicious program that runs when you read an email attachment. D.)A malicious program that disguises itself as a useful program.

B

What is a program that appears to be a legitimate application, utility, game, or screensaver,but performs malicious activities surreptitiously? A.)Scareware B.)Trojan C.)Worm D.)Ransomware

B

What is an advantage of RAID 5 over RAID 1? A.) RAID 5 provides redundancy; RAID 1 does not B.) RAID 5 improves performance over RAID 1 C.) RAID 5 provides redundancy for the disk controller D.) RAID 5 continues to operate with a failure in two disks; RAID 1 can only operate with a failure of one disk

B

What is the difference between UXGA and WUXGA display? A.) WUXGA is capable of using the entire screen for images B.) WUXGA has a widescreen aspect ratio C.) WUXGA has a lower screen resolution D.) WUXGA has a higher contrast ratio

B

What is the maximum range of the Bluetooth 2.0 specification for class 1 device? A.)30 M B.)100 M C.)300 M D.)50 M E.)10 M

B

What is the name of the service included with the Windows Server operating system that manages a centralized database containing user account and security information? A.)Access B.)Active Directory C.)Active Desktop D.)SQL

B

What is the second step to add more disk space to a Storage Space in Window 10? A.) Install a new storage device to the system B.) Add free space on a new storage device to a storage pool C.) Allocate space from the storage pool to an existing storage space

B

What type of data resiliency protects your data if two storage devices fail at one time? A.) Parity B.) Three-way mirror C.) Simple D.) Two-way mirror

B

What type of data resiliency requires at least five storage devices? A.) Parity B.) Three-way mirror C.) Simple D.) Two-way mirror

B

Which ACPI power state retains the contents in RAM, but turns all other components off? A.)Sleep B.)Suspend C.)On D.)Hibernate

B

Which TCP/IP configuration parameter identifies the router that is used to reach hosts on remote networks? A.)Subnet mask B.)Default gateway C.)WINS server address D.)Alternate IP address E.)DNS server address F.)Hostname

B

Which aspect ratio applies to displays with resolutions of 1680x1050 and 1920x1200? A.) 4:3 B.) 16:10 C.) 16:9

B

Which component in a laser printer charges the paper to attract toner? A.)Primary corona B.)Transfer roller C.)Drum D.)Fuser

B

Which component within a device measures acceleration horizontally and vertically at the same time? A.)G-Sensor B.)Gyroscope C.)Attitude indicator D.)Accelerometer

B

Which data transmission rate is defined by the IEEE 802.11b wireless standard? A.)10 Mbps B.)11 Mbps C.)54 Mbps D.)150 Mbps E.)2 Mbps

B

Which interface is primarily used for internal hard drives in modern desktop PC systems? A.) PATA B.) SATA C.) SCSI D.) Firewire E.) USB

B

Which of the following LAN devices a signal on one port and forwards that signal only to the port where the destination device is connected? A.)Hub B.)Switch C.)Router D.)Network adapter

B

Which of the following best describes spyware? A.)It is a program that attempts to damage a computer system and replicate itself to other computer systems. B.)It monitors the actions you take on your machine and sends the information back to its originating source. C.)It is a malicious program that is disguised as legitimate software. D.)It monitors the actions of the user and then sends pop-up ads to the user that match their tastes.

B

Which of the following devices can be used to distribute electrical power along with network data on twisted-pair Ethernet cabling (CAT 5 or higher)? A.)Ethernet over Power B.)Power over Ethernet C.)AC-enabled switch D.)AC Circuit Router E.)Ethernet multiplexer

B

Which of the following forms of networking is highly susceptible to eavesdropping (Data interception) and must be secured accordingly? A.)Satellite B.)Wireless C.)Dial-up D.)DSL E.)ISDN

B

Which of the following hardware regenerates a signal out all connected ports without examining the frame or packet contents? A.)Bridge B.)Hub C.)Router D.)Switch E.)Gateway

B

Which of the following indicates that a system case cover has been removed. A.)Trusted Platform Module (TPM) B.)Chassis intrusion detection C.)DriveLock D.)BIOS password

B

Which of the following input devices uses stylus? A.)Touchpad B.)Digitizer C.)Trackpoint D.)Touch screen

B

Which of the following is a characteristic of extended partitions? A.) They are bootable B.) They are subdivided into logical drives C.) There can be multiple extended partitions per drive D.) They can be set to active

B

Which of the following is a firewall functions? A.)Packet rearranging B.)Packet filtering C.)Encrypting D.)Protocol converting E.)FTP hosting

B

Which of the following is a valid MAC address? A.)83-5A-5B-0B-31-55F1 B.)C0-34-FF-15-01-8E C.)73-99-12-61-15 D.)192.168.12.15 E.)34-9A-86-1G-B3-24 F.)255.255.255.0

B

Which of the following is an example of a strong password? A.)desktop#7 B.)a8bT11$yi C.)at9iov45a D.)Robert694

B

Which of the following is considered an input devices? A.) Monitor B.) Touchscreen C.) Hard disk D.) RAM

B

Which of the following is not a form of biometrics? A.)Retina scan B.)Smart card C.)Fingerprint D.)Face recognition

B

Which of the following is the BEST device to deploy to protect your private network from a public, untrusted network? A.)Gateway B.)Firewall C.)Router D.)Hub

B

Which of the following is the MOST likely symptom of a dirty drum or roller in a laser printer? A.)Smudges on the print job. B.)Lines or splotches repeated at regular intervals on the print job. C.)A vertical black or white stripe on the print job. D.)A faint image on the print job.

B

Which of the following networking devices or services is LEAST likely to be compatible with VPN connections? A.)Router B.)NAT C.)Switch D.)Firewall

B

Which of the following protocols carry phone calls over an IP-based network? A.)HTTP B.)VoIP C.)TCP D.)RTSP

B

Which of the following provides the BEST security for wireless networks? A.)WEP B.)WPA2 C.)WAP D.)802.11a E.)CSMA/CD

B

Which of the following terms describes a Windows operating system patch that corrects a specific problem and is released on a short-term, periodic basis? A.)Kernel fix kit B.)Hotfix C.)Service pack D.)Targeted software patch

B

Which of the following terms refers to a network resource sharing model that uses access control lists saved on each computer? A.)Client/server B.)Peer-to-peer C.)Extranet D.)Intranet

B

Which of the following types of internet connection services can allow you to be truly mobile while maintaining your internet connections? A.)Mobile hotspot B.)Cellular C.)ISDN BRI D.)Satellite E.)Wi-Fi

B

Which of the following wireless networking standards uses a frequency of 5 GHz and supports transmission speeds up to 1.3 gbps? A.)802.11g B.)802.11ac C.)802.11n D.)802.11b E.)802.11a

B

Which of the followings protocols is used by an email client to retrieve messages from an email server and gives user the option to keep mail messages on the server? A.)SMTP B.)IMAP C.)POP3 D.)NTP

B

Which partition type identified the partition as one that holds the boot loader program used to start the operating system? A.) Extended B.) Active C.) System D.) Primary

B

Which port must be opened in the firewalls of a Windows system so that a Remote Desktop connection can be established? A.)123 B.)3389 C.)23 D.)22

B

Which protocol is used to send email messages from a mail client to a mail server? A.)POP3 B.)SMTP C.)FTP D.)SNMP E.)IMAP

B

Which system utility would you use to troubleshoot hardware devices, examine and control the resources used by specific devices, and install updated devices drivers? A.) Services console B.) Device Manager C.) Msinfo32 D.) System Restore E.) Msinfofig

B

Which term describes the layer of software that resides between the virtual operating system and the physical hardware it runs on in a virtualization environment? A.)Workload management B.)Hypervisor C.)Virtual hard disk D.)Virtual machine

B

Which term refers to a software implementation of a computer system that executes programs like a physical machine? A.)Workload management B.)Virtual machine C.)Hypervisor D.)Physical host

B

Which terms refers to the portion of the hard drive where print jobs are stored before going to the print device? A.)Printer port B.)Print queue C.)Printer driver D.)Print device

B

Which tool lets you view and directly edit the registry? A.)System Configuration Utility B.)Regedit C.)Control Panel D.)Msinfo32

B

Which tool would you use to configure the paging file location and size on a Windows system? A.)Administrator Tools in Control Panel B.)Advance System Setting in Control Panel C.)Hardware and Sound in Control Panel D.)Clock, Language, and Region in Control Panel

B

Which type of fiber optic cable supports 10 Gigabit Ethernet with a maximum segment length of up to 40 km? A.)10GBaseLR single-mode B.)10GBaseER single-mode C.)10GBaseT twisted pair Category 7 D.)10GBaseSR multimode

B

Which type of network medium is used by an Integrated Services Digital Network (ISDN) adapter? A.)Wireless radio waves B.)Copper telephone wire C.)Infrared light waves D.)Fiber-optic cable E.)Cable TV coaxial cable

B

Which type of printer uses an inked ribbon? A.)Laser B.)Dot matrix C.)Ink jet D.)Dye sublimation

B

While investigating a network issue, a technician finds that the link light on a workstation is not lit, and there is no connectivity after replacing the patch cable bot between the workstation and the wall jack and between the patch panel and the switch with cables that are known to be good. If the wall jack and patch panel ports are label correctly, which of the following tools would the technicians MOST likely use next? A.)Crimper B.)Cable tester C.)Punchdown tool D.)Tone generator

B

While organizing a storage cabinet, a technician discovers a box of hard rives that are incompatible with current hardware and may contain sensitive data. Which of the following is the BEST method for disposing of these drives? A.)Overwriting B.)Shredding C.)Partitioning D.)Formatting

B

While troubleshooting a Windows workstation, you find that the computer as several cross-linked clusters within the file system. Which of the following utilities would MOST likely fix this issue? A.) attrib B.) chkdsk C.) fdisk D.) DiskScan

B

While troubleshooting a computer, you need to view a list of all IRQs and the device using each IRQ. Which of the following options would BEST allow you to accomplish this task? A.) In Device Manager, click View > Devices by connection B.) In Device Manager, click View > Resources by type C.) In Device Manager, click View > Customize... Add IRQ as a column D.) In Device Manager, click View > Show hidden devices

B

Why is it important to have your mobile device charger plugged in while its receiving an operating system update? A.)It is not important for the charger to be plugged in since the update can be received wirelessly. B.)If the battery dies during the update, the operating system could become corrupted. C.)The device must be connected to and charging from a computer so the update can be preformed from the app store. D.)Downloads run faster when the charger is plugged in.

B

You are a PC technician for a national company retailer. You are asked to build a system. What system is list below? -1000w power supply -1 TB SATA HD -Dual SLI 6GB PCIe video adapters -5.1 channel surround sound adapter -Liquid CPU A.)Home office server B.)Gaming PC C.)Home Theater PC D.)Virtualization workstation E.)Thin client workstation F.)Audio/video editing workstation

B

You are an IT administrator for a large company that is doing very well in their business endeavors. As a result, the company is hiring new employees on a regular basis. In addition to your normal workload, you have been asked to install and configure the new employees' computers with a Windows operating system and the applications your company uses to do their business. To make this processor easier, you only give new employees the choice of one of two laptops. Which of the installation types would make the BEST use of your time installing and configuring these laptops? A.)Upgrade B.)Image deployment C.)Recovery partition D.)Clean install

B

You are an IT technician for your company and would like to be able to: -Establish a remote sever management session. -Send unencrypted (clear text) transmissions to the remote sever. -Manage specialized industrial and scientific devices. Which of the following utilities would be the BEST to use to accomplish these tasks? A.)SSH B.)Telnet C.)PuTTY D.)xterm E.)RUMBA

B

You are configuring a new system, and you want to use a RAID 0 array for the operating system using SATA disks and RAID functionally built into the motherboard. Which of the following BEST describes the action you will take as part of configuration? A.) In the BIOS; set the disk mode to IDE B.) Load the RAID drivers during operating system installation C.) Set the disk mode to AHCI in the BIOS D.) Set master/slave jumpers on the hard drives

B

You are currently a few Apple iPad devices that run the iOS operating system. Which of the following BEST describes the architecture used by this device? A.)x86 B.)ARM C.)X86-64 D.)Intel64

B

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work the best in the situation? A.)802.11g B.)802.11n C.)802.11b D.)802.11a

B

You are managing a workstation that is not part of a Windows domain. Users on this computer should not be permitted to download applications from the Windows Store. Which administration tool can you use to enable a policy that turns off the Store application for all users on this computer? A.)Programs B.)Local Group Policy Editor C.)Control Panel D.)Windows Firewall E.)Settings

B

You are responsible for disposing of several old workstations formerly used by accountants in your organization's Finance department. Before being shipped to a computer recycler, you decide to make sure any old data on the hard drives is erased. To do this, you use the Windows XP Installation CDs that came with these systems to delete all partitions from the hard drives. Which of the following BEST described what needs to be done before the systems are ready to be recycled? A.)Use Linux fdisk utility to completely remove the partitions on the systems. B.)Use disk wiping software to fully erase the drives on the systems. C.)Nothing, the systems are ready to be recycled. D.)Repartition and reformat the drives on the system before disposal.

B

You are the IT administrator for your company. You several users who want to work from home by connecting to a server running at the corporate headquarters. You manager has asked you to keep costs to a minimum as you provide computers for this environment. Which of the following types for PCs would work NEST for these users? A.)Tablet B.)Thin client C.)Thick client d.)CAD/CAM workstation

B

You are the owner of a small startup company consisting of only five employees. Each employee has their own computer. Due to the type of services your company offers, you don't foresee the employee count increasing much in the next year or two. As a startup company, you want to keep costs low and facilitate file sharing, internet access, printers, and other local network resources. Which of the following would be the BEST implementation for your business? A.)A Tree B.)A workgroup C.)A domain D.)A forest

B

You are working on your computer when a person from the shipping department delivers a new external solid state drive (SSD) you ordered. When you plug the drive into your USB port, Windows cannot find a suitable device driver for the drive. To BEST resolve this issue, from which of the following Windows consoles would you access Device Manager? A.)System Configuration B.)Control Panel C.)Component Service D.)Service

B

You have a computer that runs Windows 10. Where would you go to verify that the systems has recognized the anti-malware software installed on the system? A.)Network and Sharing B.)Security and Maintenance C.)Windows Firewall D.)System

B

You have a computer with three hard disks. A RAID 0 volume uses spaces on Disk 1 and Disk 2. A RAID 1 volume uses space on Disk 2 and Disk 3. Disk 2 fails. Which of the following is true? A.) Data on both volumes is still accessible B.) Data on the RAID 1 volume is accessible; data on the RAID 0 volume is not C.) Data on the RAID 0 volume is accessible; data on the RAID 1 volume is not D.) Data on both volume is not accessible

B

You have a hard disk that is formatted with the FAT32 file system. You would like to implement file and folder permissions on the Design folder that apply when files are accessed both locally and remotely. Which of the following BEST describes the next step you need to perform? A.) Share the folder and then use share permissions to control access. B.) Use the convert command to convert from FAT32 to NTFS and then configure NTFS permissions C.) Use Explorer to edit the permissions on the folder D.) At a command prompt, use the attrib command to configure permission.

B

You have a user who takes his laptop home every day after work. When he's working in the office, the laptop must get an IP address from DHCP server so you can configure it to obtain IP and DNS information automatically. When he's working from home, the laptop must use IP and DNS information that connects with his home network. Which of the addressing method can you use to make sure he gets a network connection at home. A.)Static IP addressing B.)Alternate IP configuration C.)Dynamic IP addressing D.)APIPA IP addressing E.)Link-local addressing

B

You have a workstation running Windows Vista Business that you would like to upgrade to Windows 10 Enterprise edition. You want to perform the upgrade with the least amount of effort and cost. What should you do? A.)Purchase an upgraded version of Windows 10 and perform a custom installation. B.)Purchase a full version of Windows 10 and perform a custom installation. C.)Purchase a full version of Windows 10 and perform an in-place upgrade. D.)Purchase an upgrade of Windows 10 and perform an in-place upgrade.

B

You have an existing computer running Windows 10 Enterprise. You want to configure a RAID 5 array in the computer. You install three new SATA drives and then use the RAID controller integrated into the motherboard to define a RAID 5 array using them. When you boot the computer, Windows does not show the logical RAID drive you just created. What should you do? A.) In the BIOS, change the SATA disk mode to AHCI B.) Install the drivers for the motherboard RAID controller C.) Reconfigure the drives into a RAID 0 or RAID 1 array D.) In the BIOS, change the SATA disk mode to RAID

B

You have an existing computer running Windows 10. You want to configure a RAID 1 array in the computer. You install two new SATA drives, then use the RAID controller integrated in the motherboard to define a RAID 1 array using them. When you boot the computer, Windows does not show the logical RAID drive. What should you do? A.) In the BIOS, change the SATA disk mode to AHCI B.) Install the drivers for the RAID controller C.) In the BIOS, change the SATA disk mode to RAID D.) Set the jumpers on the drives to use SATA 1 mode

B

You have been asked to implement a RAID 5 solution for an engineer's desktop workstation. What is the minimum number of hard disks that can be used to configure RAID 5? A.) 2 B.) 3 C.) 4 D.) 5 E.) 6

B

You have been contracted by OsCorp to recommend a wireless internet solution. The wireless strategy must support a transmission range of 150 feet, use a frequency range of 2.4 GHz, and provide the highest possible transmission speeds. Which of the following wireless solution would you recommend? A.)802.11a B.)802.11n C.)802.11b D.)802.11g

B

You have booted your Windows workstation into Safe Mode and enable Boot Logging. To which log file is the boot logging information now being written? A.)Myboot.txt B.)Ntbtlog.txt C.)Bootlog.txt D.)Boot.log

B

You have just finished upgrading the 250 W power suppler in your desktop computer to a 450 W power supply. Now the BIOS doesn't recognize one of the hard disk drives in the system during POST. Which of the following troubleshooting steps is the BEST to try first? A.) Reconfigure the hard disk to use the higher-wattage power supply using jumpers on the drive B.) Make sure that the hard disk is connected to the power supply C.) Manually enter the hard disk is connected to the power supply D.) Use the switch on the power supply to switch from 110 volts to 220 volts E.) Replace the power supply

B

You have just installed a new device in your Windows system. After installation, you can't use the device. You check Device Manager and find an icon for the device with a yellow exclamation mark over it. What should you do? A.) Enable the device B.) Download the latest driver from the manufacturer's website C.) Run the Add Legacy Hardware wizard and manually configure the device D.) Reinstall the device F.) Replace the device

B

You have just installed several devices to a computer at once, but now the computer fails to boot properly. Which of the following troubleshooting steps is the BEST to try first? A.) Change the configuration of a single device B.) Remove all of the newly added devices and install them one at a time C.) Swap a single device with one that you know to be good D.) Swap all of the device with those you know to be good

B

You have just purchased a new USB drive that you want to use to troubleshoot the computers in your computers in your company as well as other devices, such as printers and projectors. You need to format this new drive with a file system that will be recognized and used on all devices. When formatting your USB drive, which of the following file systems types would meet MOST, if not all, of your needs? A.) NTFS B.) FAT32 C.) CDFS D.) NFS

B

A technician is installing a new SOHO wireless router in a home office. The customer wants to secure the wireless network so only a smartphone, tablet and laptop can connect. Which of the follwoing router settings should the technician change? A.)Enable port forwarding B.)Disable SSID broadcast C.)Enable MAC filtering D.)Disable DHCP

C

You have just received a call from one of your customers. He informs you that after turning his computer on, he received the following error: Error loading operating system BOOTMGR is missing press Ctrl+Alt+Del to restart Every time he restarts his computer, the same error is shown. Which of the following tools BEST for fixing this issue? A.)chkdsk B.)bootrec C.)format D.)diskpart

B

You have purchased a used computer from a computer liquidator. When you boot the computer, you find that there has been a password set on the BIOS. You need to clear the password so that you can edit the CMOS settings. What should you do? A.)Press Ctrl + Alt + Del while booting the computer. B.)Remove the motherboard battery for a few seconds. C.)Press F2 while booting the computer. D.)Flash the BIOS.

B

You have purchased an LED monitor and connected it to the HDMI port on your computer using an HDMI cable. You configure the screen resolution to 1280 x 768 with 32-bit. The images displayed on the screen appear to be overly large. What should you do to correct the problem? A.) Change the screen resolution to 1280 x 720 B.) Set the display resolution to the native resolution of the monitor C.) Decrease the color depth of the video driver to 24-bit color D.) Use a VGA cable to connect the monitor instead of an HDMI cable E.) Increase the hardware acceleration setting on the video driver

B

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0 subnet using the default subnet mask. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following: Ethernet adapter Local Area Connection: Connection-specific DNS suffix . :mydomain.local Description. . . . . . . . .:Broadcom network adapter Physical address. . . . . . :00-AA-BB-CC-74-EF DHCP Enabled. . . . . .: No Autoconfiguration Enabled. . . : Yes IPv4 Address. . . . . . : 192.168.1.102(Preferred) Subnet Mask. . . . . . . : 255.255.255.0 Default Gateway. . . . . . : 192.168.2.1 DNS Server. . . . . . : 192.168.2.20 Which of the following is the mostly likely cause the problem? A.)Incorrect subnet mask B.)Incorrect DNS server address C.)Incorrect default D.)Incorrect IP address

B

You manage the desktop computer at your company. You are in charge of 100 computer, all of which run Windows 7. You want to upgrade all computer to Windows 10. Prior to the upgrade, you need to verify the compatibility of each computer with Windows 10. You want to gather the necessary information as quickly as possible. Which of the following will BEST collect the required information? A.)Run the Windows 8 Upgrade Assistant, B.)Use the Microsoft Assessment and Planning Toolkit (MAP). C.)Use the User State Migration Tool (USMT). D.)Run the Windows 7 Upgrade Advisor.

B

You need a storage device that has very large storage capacity, is fast, and is relatively inexpensive. Which storage device will best suit your needs? A.) USB flash drive B.) Hard disk C.) Optical D.) SSD

B

You need to create a user account on a Windows system that can create files, run applications, and install printers when the driver for the printer already exists on the computer. You want the users to have only minimum rights necessary on the computer. Which group should this user be a member of? A.)Remote Desktop Users B.)Users C.)Guests D.)Administrators

B

You need to use Task Manager to analyze memory utilization on a Windows system. For example, you need to see how much system RAM is currently in use and how much is available. Which tab in Task Manager would you use to do this? A.)Processes B.)Performance C.)App history D.)Startup E.)Users F.)Details G.)Services

B

You provide desktop for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems installing a new device. You try to tell the user how to update the driver for the device over the phone, but he is having a hard time understanding your directions and is becoming frustrated. What should you do? A.)Drive to the other location as soon as possible and update the driver. B.)Establish a Remote Desktop connection and update the driver. C.)Tell the user to wait you are scheduled to be in that location. D.)Escalate the call to another technician or your supervisor.

B

You want to be able to access your home computer using Remote Desktop while traveling. You enable Remote Desktop, but you find that you cannot access your computer outside of your home network. Which of the following is the BEST solution of your problem? A.)Open the Telnet and SSH ports in your firewall. B.)Open the firewall port for the Remote Desktop protocol. C.)Configure a VPN connection to your computer. D.)Move your home computer outside of the firewall.

B

You want to be able to monitor and filter VW-to-VM traffic within a virtual netwrok. What should you do? A.)Define VLAN membership on each VM. B.)Implement a virtual firewall within the hypervisor. C.)Create a virtual router with VRF technology. D.)Route VM-to-VM traffic a physical firewall and back to the virtual netwrok.

B

You want to configure User Account Control so that when a UAC prompt is shown, the desktop is not dimmed, allowing you to continue working without responding to the prompt immediately. What should you do? A.)In the Control Panel, select Programs, then Programs and Features. B.)Edit settings in the Local Security Policy. C.)In the Control Panel, select System and Security and the System. Click System protection. D.)In the Control Panel, go to System and Security, then System.

B

You want to configure User Account Control so that you see the permission prompt only when programs try to make changes to your computer (not when you make changes). You do not want the desktop to be dimmed when the prompt is shown. What should you do? A.)Configure UAC to Always notify B.)Disable Secure Desktop C.)Configure UAC to Never notify D.)Disable UAC

B

You want to configure your computer so that a password is required before the operating system will load. What should you do? A.)Configure an administrator password in the BIOS/UEFI. B.)Configure a user password in the BIOS/UEFI. C.)Require complex passwords in the local security policy. D.)Configure chassis instruction detection.

B

You want to create a new user account on a Windows system that can create and edit private files, start and stop the system, install applications, and add new drivers. Which group should this be a member of? A.)Guests B.)Administrators C.)Power Users D.)Users

B

Which storage device uses aluminum platters for storing data? A.) SD card B.) DLT tape C.) Hard disk D.) DVD disc E.) CD-ROM disc

C

You want to install Windows on a mirrored disk array. You run the motherboard disk configuration utility and create the RAID 1 array =, then configure the system to boot form the Windows installation disc. The Windows installation starts, but does not detect the RAID array. Whic of the following will MOST likely allow RAID array to be detected? A.)In the UEFI configuration, configure the boot order to boot from the hard drive instead of the optical drive. B.)During the installation, browse to and select the appropriate driver for your RAID controller when prompted. C.)In the UEFI configurations, set the SATA mode IDE. D.)In the UEFI configure, set the SATA mode to be AHCI.

B

You want to use your Window workstation to browse the websites on the internet. You use a broadband DSL connection to access the internet. Which network protocol must be installed on your workstation to do this? A.)SLIP B.)IP C.)IPX/SPX D.)PPP E.)NetBIOS

B

You work as the IT administrator for a small startup company. Lily's computer has two internal hard drives and runs Windows 10. She is concerned that she may accidently delete a file or that her primary hard disk may fail at some future time. She has come to you for suggestions about how to protect her files. Due to the size and revenue of this startup company, resources are somewhat limited. Which of the following would BEST protect Lily's files? A.)Configure scheduled disk maintenance. B.)Back up her files using File History. C.)Purchased a third-party backup software. D.)Create a network share to which lily can copy her files.

B

You work in the IT department. To perform your daily tasks, you often use many of the Windows consoles, such as the Device Manager, Hyper-V Manager, and the Performance Monitor. Although each of these can be accessed from various locations in Windows, you want one location from which these common tools can be accessed. Which of the following system utilities would BEST provide this capability? A.)MSINFO32 B.)MMC C.)SERVICES.MSC D.)MSTSC

B

You're troubleshooting an older laser printer that is creating 'accordion jams' where the paper is crumpled as it exits the printer moving into the output tray. What can you do to fix this problem? A.)Replace the fuser wires. B.)Install a maintenance kit. C.)Replace the drum. D.)Replace the toner cartridge. E.)Use heavier paper.

B

You're using a Linux distribution that uses Debian Package Manager (dpkg) for package management. Which command would you use to install httpd, the Apache HTTP Server package, and all it dependencies? A.)dpkg installed httpd B.)apt-get install httpd C.)apt-get installed httpd -dep D.)ps -ef E.)ps -e F.)yum install httpd -dep G.)yum installed httpd

B

You're using a Linux distribution that uses RPM for package management. Which command would you use to install httpd, the Apache HTTP server package, and all it dependencies? A.)yum installed hhtpd -dep B.) yum install httpd C.)apt-get update httpd D.)yum update httpd E.)apt-get install httpd

B

You've just purchased 10 new notebook systems for your users. You are concerned that users will leave the system on for long periods of time, which could result in display burn-in. What should you do to prevent this from happening? A.) Install a software utility on each system that is designed to fix stuck pixels. B.) Configure a screen saver on each system. C.) Increase the hardware acceleration setting on each system. D.) Configure each system to automatically power off after five minutes of inactivity.

B

Your Windows client systems are joined to the WestSim.com domain. To ensure correct time stamps are used, you need to verify that these clients are configured for the appropriate time zone. A.)w32tm /query /status B.)w32tm /tz C.)w32tm /register D.)w32tm /monitor

B

Your client has hired you to evaluate their wired netwrok security posture. As your tour their facility, you note the following: -Servers systems are kept in a locked server room. -Users accounts on desktop systems have strong passwords assigned. -A locked door is used to control access to the work area. Users must use ID badges to enter the area. -Users connect their personal mobile devices to their computers using USB. -Users work in three 8-hour shifts per day. Each computer is shared by three users. Each user has a limited account on the computer they use. Based in this information, which of the following would you MOST likely recommend your client do to increase security? A.)Assign users easy-to-remember simple passwords so they won't be tempted to write them down. B.)Disable the USB ports on user's workstations. C.)Move the server systems to an empty cubicle in the work area. D.)Provision each employee with their own computer system.

B

Your company has decided to use only SATA drives in their system. Which of the following is true MOST newer SATA drivers? A.) They can be plugged into a system without shutting down the computer, but not removed without shutting down. B.) They can be added to or removed from a system without shutting down the computer. C.) After you install the latest driver from Device Manager, they can be added to or removed from a system without shutting down the computer D.) They can be added to or removed from a system without shutting down the computer, but they must be enabled from Device Manager

B

Your company has just upgraded your laptop computer. After receiving your computer, you plug your external USB 2.0 hard disk into your new USB 3.0 port. A.) The device will be able to transfer at USB 3.0 speeds. B.) The devices will work, but will only transfer at USB 2.0 speeds. C.) The USB 2.0 device will not work in the USB 3.0 port. D.) The device will require an external power source.

B

Your computer has a single volume used by the C:/ drive. You have previously upgraded the disk to a dynamic disk. The disk has run out of disk space. You need to add more space C:/ volume. You add a new hard disk to the computer. Which of the following is the BEST step to complete while adding space to the C:/ drive? A.) Strip the C:/ volume to the second disk B.) Create a mount point using space on the second disk C.) Span the C:/ volume to the second disk D.) Extended the C:/ volume to the second disk

B

Your functions have recently changed. As a result, you find that you are needing to work with more running programs on your Windows 10 computer at at time. Although you haven't seen these in the past, you are now starting to receive error message warning you of low virtual memory. However, no additional RAM can be added to your computer. Which of the following Control Panel utilities would BEST allow you to eliminate or reduce the number of error message. A.)Troubleshooting B.)System C.)Device Manager D.)Programs

B

Your system administrator shared a USB laser printer connected to your Windows 10 system so other users on the network can send jobs to it. A network user has sent a large job to the printer, but the print job has stalled. You try to delete the print job, but can't. Why can't you delete the print job? A.)You do not have the Manage netwrok printers permission B.)You do not have the Mange documents permission C.)You do not have Print permission D.) You do not have the manage this printer permission

B

A portable computer connected to a printer with an infrared work fine inside your office. However, when you go outside, it works sporadically. Which of the following would BEST resolve this issue? (Select TWO.) A.)Install Ferrite shielding on both the PC and printer power cords. B.)Block direct and reflected sunlight from the pathway between the PC and the printer. C.)Move the printer closer to the computer. D.)Set the environment setting to outdoor mode in the BIOS. Install a Gamma Ray Spectrometer (GRS) to shield the interface.

B and C

To protect user data on a Windows 10 system, you've configured System Restore to automatically create restore points for the C: volume. Given that your user profile data is restored in the stored in the default directory (C:\Users), will this strategy adequately protect your users' data (Select TWO.) A.)Yes. Your workstation data is protected. B.)No. You need to enable File History. C.)No. You need to create a backup of your user data as well. D.)No. You need to implement a RAID 0 array to protect your data.

B and C

Which IEEE wireless standards specify transmission speeds up to 54 Mbps? (Select TWO). A.)Bluetooth B.)802.11a C.)802.11g D.)802.1x E.)802.11b

B and C

Which disk types does Windows support? (Select TWO) A.) Primary B.) Basic C.) Dynamic D.) Extended E.) Static

B and C

Which of the following is true of a network using the 1000Base-T standard? A.)The network operates at 10 gigabits per second. B.)The network uses a copper UTP. C.)The network operates at one gigabit per second. D.)The network uses fiber optic cables. E.)The network operates at one kilobit per second.

B and C

Which of the following protocols can you portable computer use to connect to your company's network via a virtual tunnel through the internet? (Select TWO)> A.)Remote Desktop Protocol (RDP) B.)L2TP C.)PPTP D.)PPPoE E.)VNC

B and C

Which of the following statements accurately describes how a modem works? (Select TWO) A.)It modulates digital data from a telephone network into analog data that a PC can use. B.)It demodulates analog data from a telephone network into digital PC data. C.)It modulates digital data from the PC into analog and transmits it on a telephone network. D.)It demodulates analog PC data into digital data that can be transmitted through a telephone network. E.)It transmits digital signals over ordinary telephone copper wiring at a rate up to 128 Kbps. F.)It communicates over a telephone network using digital signals.

B and C

Your organization is frequently visited by sales reps. While on-site, they frequently plug their notebook systems into any available will jack, hoping to get to internet connectivity. You are concerned that allowing them to do this could result in the spread of malware throughout your network. Which of the following would BEST protect you from guest malware infection? (Select TWO). A.)Implement SNMP traps on your network switch. B.)Implement static IP addressing. C.)Implement MAC address filtering. D.)Enable port analysis on your network switch. E.)Implement private IP addressing with a Network Address Translation (NAT) router facing the internet.

B and C

What are the two protocols used most often with IoT device? A.)Zerg B.)Z-Wave C.)Zbot D.)Zigbee E.)Zensys

B and D

Which of the following are antenna types that are commonly used in wireless networks? (Select TWO). A.)Low EMI antenna B.)Omnidirectional antenna C.)High EMI antenna D.)Directional antenna E.)Full-duplex antenna F.)Half-duplex antenna

B and D

Which of the following paths opens the Computer Management tool in Windows 10 (Select TWO). A.)Right-click the Windows icon and select run. The enter cmd in the Run field. B.)In Control Panel, open System and Security > Administrative Tools and then double-click the Computer Management icon. C.)Right-click the Windows icon and then select System. D.)Right-click the Windows icon and select Computer Management.

B and D

Which of the following tools allow remote server management? (Select TWO.) A.)LDAP B.)SSH C.)FTP D.)Telnet E.)POP3

B and D

You are a security consultant and have been hired to evaluate an organization's physical security practices. All employees must pass through a locked door to enter the main work area. Access is restricted using a biometric fingerprint lock. A receptionist is located next to the locked door in the reception area. She uses an iPad application to log any security events that may occur. She also uses her iPad to complete work tasks as assigned by the organization's CEO. Network jacks are provided in the reception area such that employees and vendors can easily access the company network for work-related purposes. Users within the secured work area have been trained to lock their workstations if they will be leaving them for any period of time. What recommendations would you make to this organization to increase their security? (Select TWO). A.)Move the receptionist's desk into the secured area. B.)Train the receptionist to keep her iPad in a locked drawer when not in use. C.)Replace the biometric locks with smart cards. D.)Disable the netwrok jacks in the reception area. E.)Require users to use screensaver passwords.

B and D

A technician is installing a new SOHO wireless router. Which of the following is the FIRST thing the technician should do to secure the router? A.)Disable SSID broadcast B.)Adjust the radio power levels C.)Change the router's default password D.)Press the WPS button

C

You have a computer that runs Windows 7, and you want to install Windows 10. You are not concerned about keeping any of the existing data currently on the drive, and you want to do a clean install. After placing the Windows 10 installation DVD in the optical drive, you restart the computer, but it does not boot to the DVD, and you are unable to install Windows Which of the following are the BEST methods for installing Windows from the DVD? (Select TWO. Each choice is a complete solution.) A.)While the computer is rebooting, press and hold Ctrl = C. B.)While the computer is rebooting, press the boot menu function key. C.)While the computer is rebooting, press the Ctrl + Alt + Del keys. D.)From the UEFI or BIOS firmware, change the boot order. E.)While the computer is rebooting, press and hold the Windows + C.

B and D

You have just installed a wireless access point (WAP) for your organization's network. You know that the radio signals used by the WAP extend beyond your organization's building and are concerned that unauthorized users outside may be able to access your internal network. Which of the following step will BEST protect the wireless network? (Select TWO.) A.)Implement a WAP with a shorter range. B.)Use the WAP's configuration utility to reduce the radio signal strength. C.)Disable SSID broadcast on the WAP. D.)Configure the WAP to filter out unauthorized MAC addresses. E.)Disable the spread-spectrum radio signal feature on the WAP F.)Install a radio signal jammer at the perimeter of your organization's property.

B and D

You just purchased an iPad tablet device. You want to synchronize your photos, music, email, and contacts from your Windows 7 PC to the device. How can you connect the device to the PC? (select two) A.)Firewire cable B.)Wi-Fi wireless connection C.)Ethernet wired connection D.)USB cable E.)Serial cable

B and D

You need to boot a Windows 10 system into Safe Mode. Which steps will accomplish this task? (Select TWO. each choice is a complete solution.) A.)Press F2 at Startup. B.)In Safe Mode, select Start > Settings > Updates & Security > Recovery > Advance startup > Restart now. C.)Press F8 at Startup. D.)In Safe Mode, press the [Shift] key on the keyboard while you click Restart. E.)Press ALT

B and D

You provide desktop support at the branch office of a bank. One of the Windows workstations you manage is used to set up new customer accounts and fill out customer loan applications. Each user account on the system has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. Which of the following would MOST likley increase the security of this system? (Select TWO.) A.)Enable the Guest account. B.)Secure the computer system to the desk with a cable lock. C.)Assign each user a simple password so they won't be tempted to write it down. D.)Install a privacy filter on the monitor. E.)Make user accounts members of the Administrators group.

B and D

A company executive has just brought a new Android mobile device. She wants you to help her make sure it is protected from malware threats. What options are available and important to use to protect Android devices? (Select TWO.) A.)Android mobile device, like iOS devices, are not susceptible to malware threats. B.)App reviews and rating will help you choose an effective anti-virus app. C.)Android operating system updates are sufficient to protect against malware threats. D.)Anti-virus apps for Android have not been developed yet. E.)Anti-virus apps are available for purchase from app stores. F.)Any Android anti-virus app will be about as effective as any other.

B and E

A home office user employs a technician to secure a Windows computer. To secure the local accounts, which of the following actions should the technician perform? (Select TWO). A.)Move all accounts in the Administrator group to the User group. B.)Rename all Administrator account. C.)Move all accounts in the Guests group. D.)Remove the Power Users group. E.)Disable the Guest Account.

B and E

A user wants to use a laptop to display a presentation on a large TV monitor that has HDMI connection. Which of following laptop ports or connections can be used to add this display device? (Select TWO). A.)Expresscard connection using a Expresscard Ethernet adapter B.)USB port using a USB-to-HDMI adapter C.)USB port using a USB-to-Wireless dongle D.)USB port using a USB-to-RJ45 dongle E.)DisplayPort using a DisplayPort-to-HDMI cable

B and E

Anna, a home user, employs a technician to check the security on a computer that was hacked. The technician discovers that the user's password is the name of Anna's dog and hasn't been changed in over a year. Which of the following security best practices should the technician recommend? (Select TWO). A.)Set the number of failed password attempts to two. B.)Set a password expiration period. C.)Restrict user permissions. D.)Configure the screen saver to require a password. E.)Require a strong password.

B and E

Which aspects of virtual memory can you configure on a Windows workstation? (Select TWO.) A.)Recommended size of the paging file B.)Maximum size of the paging file C.)Maximum time between swap operations D.)Minimum time between memory swap operations. E.)Location of the paging file

B and E

Which of the following are advantages of using fiber optic cabling for a network, as opposed to other types of cabling? (Select TWO) A.)Lower installation cost B.)Greater cable distances without a repeater C.)Increased flexibility D.)Faster installation E.)Immunity to electromagnetic interference

B and E

Which of the following are characteristic of coaxial network cable? (Select TWO) A.)The conductors within the cable are twisted around each other to eliminates crosswalk. B.)It has a conductor made of copper in the center of the cable. C.)It is totally immune to electromagnetic interference (EMI). D.)It is made of a plastic or glass in the center of the cable. E.)It uses two concentric metallic conductors

B and E

Which of the following methods can be used to connect a printer to a network? (Select TWO.) A.)Plug a netwrok cable into your printer's serial port. B.)Connect your printer to an external print server device that is connected to the netwrok. C.)Plug a netwrok cable into your printer's USB port. D.)Plug a USB-to-Ethernet adapter in your printer's USB port. E.)Plug an Ethernet cable into the network port in the printer.

B and E

Which of the following statements about an SSL VPN are true? (Select TWO). A.)Encapsulates packets by adding a GRE header. B.)Uses port 443. C.)Provides message integrity using HMAC. D.)Uses UDP port 500 E.)Encrypts the entire communication session. F.)Uses pre-shared keys for authentication.

B and E

Which of the following statements about virtual NICs are true? (Select TWO.) A.)Virtual NICs don't have a MAC address. B.)Multiple Virtual NICs can be added to a virtual machine. C.)The type of NIC installed in the physical machine determines the type of virtual of NIC that is emulated. D.)Virtual NICs can communicate only with other virtual NICs. E.)Virtual NICs need the appropriate installed to functions.

B and E

You are purchasing a PC system that will be used as a file and print server in a small business. Which hardware selection criteria would be most important for this system? (Select TWO) A.)HDMI output B.)64-bit multi-core processor C.)RAID 0 array D.)High-end video adapter with GPU E.)RAID 1+0 array

B and E

You have a computer with a 64-bit dual-core processor that runs 32-bit version of Windows 7 Professional edition. You would like to upgrade to the 64-bit version of Windows 10 Professional. You want to perform the upgrade with the least amount of effort possible. Which of the following steps are required to accomplish this (Select TWO.) A.)Perform an in-place upgrade. B.)Get 64-bit drivers for all hardware. C.)Get 64-bit version of all applications. D.)Upgrade to a CPU with at least four-cores. E.)Perform a clean installation.

B and E

Which of the following is true of online software activation? (Select THREE.) A.)With enterprise licenses, the software vendor tracks how many times each license code is activated and automatically charges the enterprise for activations above the license limit. B.)With personal software licenses, the limit is usually one to three online activations. C.)The software vendor does not track how many time each license code is activated, but uses persistent activation to annually audit the number of licenses being used. D.)Since the license account information is stored online, it is usually not affected by operating system upgrades or migrations. E.)Before running a newly installed application, the user must activate their license online on the software vendor's website. F.)Persistent activation may require the license to be continuously re-activated online at a preconfigured interval.

B, E, and F

While browsing the Internet, you notice that the browser displays ads that are targeted towards recent keyword searches you have performed. What is this an example of? A.)Trojan B.)Adware C.)Grayware D.)Worm

B`

ATX Variants Common Charateristics

Back plate measurements (6.25" × 1.75"), 24-pin ATX power connector, On/off switch runs from the case to the motherboard, Soft-power control, Expansion slot locations and spacing (0.8" between slots), Mounting hole locations, CPU location

Which type of authentication would require a user fingerprint or facial recognition for a user to get past the screen lock on a mobile device and gain access the device?

Biometric Authentication

A technician is replacing a hard drive in a laptop. Which of the following is the FIRST action the technician should perform before opening the laptop case? A.)Create written disassembly notes and tape screws and parts to the notes. B.)Document and label cable and screw locations. C.)Review the laptop manufacturer's documentation. D.)Obtain the appropriate hand tools.

C

A technician is tasked with configuring a mobile devices to connect securely to the company network when the device is used at off-site locations where only internet connectivity is available. Whic of the following should be the technician configure? A.)Hotspot B.)Bluetooth C.)VPN D.)IMAP

C

A computer being used by the HR department need to ensure that all of the data on that computer is protected from a single hard disk failure. The data needs to be read as quickly as possible, and the HR department would like to maximize drive use as much as possible. This computer can use up to three hard drives. Which of the following RAID types would meet these requirements and provide the BEST data protection? A.) RAID 0 B.) RAID 1 C.) RAID 5 D.) RAID 10

C

A customer is upgrading the routers and switches in their network. The signal source in these network devices is a light-emitting diode. Which of the following network cabling options is MOST likely being used in the upgrade? A.)Coaxial B.)Twisted pair C.)Multimode fiber D.) Single-mode fiber

C

A host on your network that provides a service that requires the server to always use the same IP address. Which IP addressing method can you use to manually assign the specific IP address? A.)Alternate IP configuration B.)Link-local addressing C.)Static IP addressing D.)APIPA IP addressing E.)Dynamic IP addressing

C

A laptop has a wired connection to the network and is configure with a static IP address. The link light on the NIC is lit, but the laptop can't communicate with any hosts on the local network. Which of the following is the MOST likely cause of the issue? A.)Packet collisions are preventing the laptop from sending and receiving network communications. B.)The network settings are configured with the wrong gateway address. C.)The IP address conflicts with another host on the local network. D.)The laptop is connected to a hub instead of a switch.

C

A laptop has wired connection to the network and is configured with a static IP address. The link light on the NIC is lit, but the laptop can't communicate with any host on the local network. Which of the following is the MOST likely to cause the issue? A.)Packet collisions are preventing the laptop from sending or receiving network communications. B.)The network settings are configured with the wrong gateway address. C.) The static IP address and subnet mask are configured with the wrong network address. D.)A low RF signal is being sent from the wireless access point.

C

A network that covers an area as small as a few city blocks to as large as an entire city. A.)Local Area Network (LAN) B.)Personal Are Network (PAN) C.)Metropolitan Area Network (MAN) D.)Wide Area Network (WAN) E.)Wireless Local Area Network (WLAN)

C

A network that is typically owned and managed by a city as a public utility. A.)Local Area Network (LAN) B.)Personal Are Network (PAN) C.)Metropolitan Area Network (MAN) D.)Wide Area Network (WAN) E.)Wireless Local Area Network (WLAN)

C

A public library has purchased a new laptop computer to replace their older desktop computers and is concerned that they are vulnerable to theft. Which of the following laptop features should be used to physically secure the laptop? A.)An external encryption device B.)A multi-factor password policy C.)A cable lock D.)Biometric authentication

C

A sales person requires that a large number of document, data, presentation, image, and video files be accessible on their personal mobile device when making sales pitches to new customers. A cloud solution is not feasible, since cellular and internet connections are not always guaranteed at a customer site. Which of the following accessories would a technician suggest to BEST meet the sales person's requirements? A.) Docking station B.) Credit car reader C.) Micro SD Card D.) Wireless hotspot

C

A security incident is currently occurring on the company netwrok. You discover that the attack involves a computer system that is attached to the network. You're unsure what kind of damage is being done to the network systems or data. Which of the following actions should you take FIRST? A.)Examine the active computer system to analyze the live network connection, memory contents, and running programs. B.)Document and photograph the entire scene of the crime including the current state of the attached computer system. C.)Stop the attack and contain the damage by disconnecting the system from the network. D.)Determine whether you have the expertise to conduct an investigation, or whether you need to call in additional help.

C

A security technician is conducting a forensic analysis. Which of the following actions is MOST likely to destroy critical evidence? A.)Disconnecting the system from the network B.)Restricting physical access to the system C.)Shutting down the system D.)Copying the contents of memory to removable media

C

A technician assists Joe, an employee in the sales department who needs access to the client database, by granting him administrator privileges. Later, Joe discovers he has access to the salaries in the payroll database. Which of the following security practices was violated? A.)Entry control roster B.)Multifactor authentication C.)Principle of least privilege D.)Strong password policy

C

A technician connects two network switches using a twisted pair cable. Neither switch supports auto-uplinking. Which of the following identifies the TIA wiring standard required on each end of the cable? A.)Both ends must only be T568B B.)Both ends must only be T568A C.)One end must be T568A, and the other must be T568B

C

Test connectivity between devices and shows the routers in the path between the two devices. specified hostname. A.)ipconfig B.)ping C.)tracert D.)nslookup E.)netstat

C

A technician is tasked with installing a network-enable camera that runs on power that is supplied through its network connection. The network device that connects to the camera does not have the capability to supply this power. There is a power outlet close to the camera. Which of the following devices can be used to supply power? A.)A repeater B.)A modem C.)A Power over Ethernet injector D.)An Ethernet over Power adapter

C

A technician is tasked with replacing a Wi-Fi antenna in a laptop computer. Which of the following places would the antenna MOST likely to be located? A.)Near the memory expansion slots B.)Under the laptop keyboard C.)Around the laptop's bezel D.)Next to the laptop battery

C

A technician is troubleshooting a company cell phone that is overheating. Which of the following is the FIRST action the technician should perform? A.)Close all applications B.)Determine whether the users has been streaming data. C.)Determine whether the battery is warped or swollen. D.)Update the operating system.

C

A technician wants to destroy the data on a hard drive and re-purpose it as a spare drive. Which of the following data destruction methods allow the reuse of the hard drive? A.)Degaussing B.)Incineration C.)Drive wipe D.)Shredding

C

A user opens a help desk ticket to replace a laptop keyboard. The user reports that the cursor randomly moves when typing using the laptop keyboard, causing the user to make frequent typing corrections. The problem does not occur when the laptop is attached to a docking station and an external keyboard is used. You want to find a more affordable solution than replacing the keyboard. Which of the following actions would mitigate the problem? A.)Increase the screen resolution so that mouse movements are more granular. B.)Lower the screen resolution so that mouse movements are less granular. C.)Use the special function key to disable the touchpad when the laptop keyboard is used. D.)Decrease the operating system's mouse speed setting.

C

A user pays for retail purchase by placing a smart phone next to the merchant's reader. Which of the following mobile device connections is being used? A.)MicroUSB B.)Lightning C.)NFC D.)Bluetooth

C

After removing the printed paper from your laser printer, the toner smudges and can be wiped off in places. Which of the following is the MOST likely the problem? A.)Print drum B.)Primary corona C.)Fuser rollers D.)Secondary corona

C

An administrator configures the Time Machine application on Mac OS computers and develops scripts that use the tar command on Linux computers. Which of the following best practices is the administrator following? A.)Patch management B.)Driver/firmware updates C.)Scheduled backups D.)Scheduled disk maintenance

C

As an IT technician, you are often asked to work on laptop computers that included internal wireless network cards. Which of the following is the MOST commonly used type of card for these internal wireless adapters? A.)ExpressCard/34 B.)Firewire C.)Mini-PCI D.)USB

C

Can change colors, track motion, stream audio over Bluetooth, and double as a connected camera, but it's only smart when turned on. It doesn't work when turned off. A.)Thermostat B.)Switch C.)Bulb D.)Plug E.)Security Cameras F.)Door Lock G.)Speaker/Digital Assistant

C

Closed source and third most popular mobile device operating system. A.)iOS B.)Android C.)Windows

C

Collection of network resources is a? A.)Tree B.)Forest C.)Domain D.)Organizational unit E.)Object

C

Conduits used by high-speed devices to bypass the CPU and communicate directly with RAM. A.) I/O address B.) IRQ (Interrupt Request) C.) DMA (Direct Memory Access)

C

Connects to network segments that have different subnet addresses. A.)Switch B.)Bridge C.)Router D.)Hub

C

Designed to be shared by several organizations. A.)Public cloud B.)Private cloud C.) Community cloud D.)Hybrid cloud.

C

Device manufacturers are constantly finding bugs, vulnerabilities, or better ways for their devices to communicate with the operating system. Because of this, which of the following is the BEST practice to do before installing a new device? A.) Let the installation program find the latest driver and download it during installation B.) Use the driver included on the installation disc from manufacturer C.) Obtain the latest driver from the manufacturer's website D.) Obtain the latest driver from the manufacturer's website only if there is a problem

C

Device manufacturers include Microsoft, Samsung, and HTC. A.)iOS B.)Android C.)Windows

C

Don is an accountant in the Finance department. For the last several months, he has been testing an online accounting programs. After speaking with his manager, Don receives permission to download a streamlined version of the software, which requires a local installation. Don downloads the application and tries to install it, but the operating system will not allow him to. Out of frustration, he calls the help desk. the help desk sends a technician to Don's machine while Don is out to lunch. the technician installs the application without issue. Which of the following is the most likely reason Don could not install the application? A.)Insufficient system RAM B.)Incorrect service pack level C.)Insufficient permissions D.)Failed device driver E.)Insufficient disk space

C

Drivers for a small trucking company relay on a smartphone navigation application. When the smartphone loses internet connectivity, the maps don't update properly. Also, the company pays extra for a premium data service plan to support the application. Which of the following mobile devices could replace the smartphone navigation application, could provide map coverage when internet connectivity is lost, and does not require a data plan? A.)A GPS-enabled alphabet B.)Wearable smart glasses C.)A GPS-enabled personal navigation device D.)A GPS-enabled tablet.

C

During an airline flight, a laptop user makes last-time changes to a presentation that contains sensitive company information. Which of the following would make it difficult for other passengers to view this information on the laptop display? A.)Smart card B.)Mantrap C.)Privacy filter D.)Cable lock

C

Files that exist on the hard drive but are associated with a directory in the index. A.) Lost cluster B.) Cross-linked file C.) Orphaned files D.) Bad sector

C

From your laptop, you have been working on a large project that has required you to open a lot of items. It is time to leave the office and make the two-hour journey home. You will be working on this project a bit more when you arrive at home. You computer's battery is failing and only has a very short life span (about one hour) before your computer loses power. When you arrive home and open the lip of your laptop, nothing happens. After plugging in you computer and powering it on, you find that all of programs and files have been closed. To troubleshoot this, you open Control Panel and navigate to the settings that control what your computer will do when the laptop lid is closed. Which of the following power settings MUST you choose to prevent the same problem in the future? A.)When I close the lid: Shut down B.)When I close the lid: Standby C.)When I close the lid: Hibernate D.)When I close the lid: Sleep/Suspend

C

Guest operating systems directly access hardware resources in the hypervisor host system. A.)Partial virtualization B.)Full virtualization C.)Paravirtualization

C

How can you keep a Windows 10 system from automatically restarting after a critical system error occurs? A.)Use the Last Known Good configuration option on the Advanced Startup Options menu. B.)Use the Enable Safe Mode with Command Prompt option on the Advanced Startup options menu. C.)Use the Disable automatic restart after failure option on the Advanced Startup Option menu. D.)Use the Enable Safe Mode with Networking option on the Advanced Startup Options menu.

C

Ideal for music and video. Portable and cheap with a long shelf life. A.) Hard disk drive (HDD) B.) Solid state drive (SSD) C.) Optical disc

C

Identifies a set of rules or standards that define personal behaviors. A.)Organizational Security Policy B.)Password Policy C.)Code of Ethics D.)Acceptable Use Policy E.)User Awareness PolicyC

C

If a printer is not Wi-Fi capable, how can it be set up to provide the most reliable wireless printing? A.)Share the printer from a computer that has a wireless netwrok connection B.)If the printer is Bonjour-enabled, it can be discovered by workstations using the Bonjour service C.)If the printer is Ethernet capable, it can be connected to the network through a wireless router. D.)If the printer has a USB port, plug in a USB wireless adapter

C

In preparation to use your laptop on the airplane as you travel to a conference, you disconnected the USB mouse. The cursor drifts consistently to the left side of the screen while using the built-inn trackpad and mouse buttons. A.)Replace the trackpad B.)Calibrate the trackpad in Control Panel C.)Access the BIOS/UEFI configuration and disable the USB pointer option. D.)Update the trackpad drivers.

C

In which of the following situations should you install a firewall? A.)You want to implement a password system for internet users who access your private website. B.)You want to improve internet performance by saving popular website locally. C.)You want to restrict internet users from accessing private data on your network. D.)You want internet users to see a single IP address when accessing your company network.

C

Indicates the errors have occurred on physical or dynamic disks. A.) Initializing B.) Healthy C.) Unavailable D.) Offline

C

Jan, a user in the documentation department, printed a very large document. When Jan's boss walked by the printer and saw the large stack of papers, he called you and asked you if you could configure the printer to help reduce the amount of paper used by her department. Which of the follwoing printer configurations would BEST facilitate the manager's request? A.)Collating B.)Faxing C.)Duplexing D.)Orientation

C

Joe, a user, receives an email from a popular video streaming website. The email urges him to renew his membership. The message appears official, but Joe has never has a membership before. When Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL. Which of the following security threats does this describe? A.)Zero-day attack B.)Trojan C.)Phishing D.)Man-in-the middle

C

Marcus was attempting to tweak the way his Windows 10 workstation boots when he inadvertently corrupted his system boot files. It will now no longer boot to a logon prompt. He boots the system from the Windows installation disc and accesses the Recovery Environment. What should he do next? A.)Select Troubleshoot > Advanced Options > Go Back to the Previous Build B.)Select Troubleshoot > Restart this PC C.)Select Troubleshoot > Advanced Options > Startup Repair D.)Select Troubleshoot > Advanced Options > System Restore

C

On a Windows system, which Task Manager tab would you use to adjust the priority given to a specific program? A.)App History B.)Processes C.)Details D.)Services E.)Performance

C

One of your customers is still using an old dot matrix printer. While printing, the customer noticed that the text was light or faint. A new print head was installed, but the documents are still faint. Which of the following should you do to troubleshoot the MOST likely cause? A.)Initialize the ribbon. B.)Check the toner levels. C.)Check the gap between the printer head and the paper. D.)Install a maintenance kit.

C

Prevents the policy from being enforced. A.)Not configured B.)Enabled C.)Disabled

C

Provides mobile devices with access to netwrok resources and software applications on their home network when they connect using other wireless or wired networks. A.)Hotspot B.)NFC C.)Mobile VPN D.)Tethering E.)Bluetooth

C

Recently, a Windows 10 update was automatically download and installed on your Windows 10 system. However, after installing the update, your contact manager database application no longer works correctly. You want to uninstall the latest updates to see if the application starts working again. What option in the Settings app would you do? A.)Give me updates for other Microsoft products when I update Windows. B.)Defer upgrades. C.)View your update history D.)Choose how updates are delivered

C

Recently, your laptop won't power on, and the battery is not charging. You suspect the block on the power cord (also known as a brick) no longer works. Which tool will help you troubleshoot this problem? A.)Power supply test B.)Loopback plug C.)Multimeter D.)Cable tester

C

Represent a physical network segment. A.)Domain Controller B.)Site C.)Subnet D.)Forrest Root Domain E.)Tree Root Domain

C

Secure Shell (SSH) A.)548 B.)443 C.)22 D.)445 E.)80 F.)143 G.)427

C

The TCP/IP session state between two computers on a network is being manipulated by an attacker such that she is able to insert tampered packets into the communication stream. Which of the following BEST describes the type of attack which as occurred in this scenario? A.)Phishing B.)Whaling C.)Hijacking D.)Spear phishing

C

The amount of memory that has been assigned to running processes. A.)Disk queue length B.)Processor utilization C.)Commit charge D.)Disk time E.)Memory pages per second

C

The integrated mouse, the small monitor, and the compact nature of the keyboard are impeding your work when you use a notebook, but you still need a system that is portable if necessary. What is your best option? A.)Buy the biggest notebook possible so you don't feel so confined. B.)Connect an external keyboard, mouse, and monitor when necessary. C.)Buy a docking station for you notebook. D.)Buy a small, lightweight desktop computer. E.)Switch to a tablet device.

C

The servers for the company are all virtual machines and hosted on the same hypervisor. You need to keep users in all departments from accessing the virtual servers used by the finance department. Which of the following technologies should you use to logically isolate the network? A.)Subnetting B.)NIC teaming C.)VLANs D.)MAC filtering

C

To access your company's internal network from home, you use Secure Shell (SSH). The administrator has recently implement a new firewall at the netwrok perimeter and disabled as many ports as possible. Which port needs to remain open so you can still work from home? A.)21 B.)80 C.)22 D.)23 E.)443

C

Use the IP address within a packet to move packets between networks. A.)Switch B.)Bridge C.)Router D.)Hub

C

Used to scan users' unique physical features and use them to verify their identity. A.) Smart card reader B.) Digitizer C.) Biometric Scanner D.) Barcode reader

C

Users have been experiencing periodic system lockups that generate the same error message. After checking Microsoft's Web site, you find that a hotfix is available to address the issue. What should you do next? A.)Wait until the next service pack comes out. B.)Deploy the hotfix immediately on all company computers. C.)Deploy the hotfix on a test computer. D.)Deploy the hotfix for users who have experienced problems.

C

Uses lasers to read and write information stored in the form of pits in their reflective coating. A.) Hard disk drive (HDD) B.) Solid state drive (SSD) C.) Optical disc

C

Vera has brought her notebook computer to you for repair. After listening to her describe its symptoms, you hypothesize that the notebook may have a malfunctioning keyboard. Which of the following steps can you take to BEST determine whether the keyboard needs to be replaced? (Select TWO.) A.)Use Device Manager to make sure the correct keyboard driver is installed and up to date. B.)Recalibrate the keyboard's pressure sensors. C.)Connect an external keyboard. D.)Check for cracks in the power bundles that go from the keyboard to the motherboard.

C

Wendy had been searching the internet for a great deal on jewelry. While looking at one site, a pop-up was displayed that told her she had just been chosen as the winner of a nice prize. Being excited to win, Wendy clicked on the link provided to claim her prize. The next day, when Wendy tried to turn on her computer, her computer displayed the Blue Screen of Death (BSOD). After interviewing Wendy, you suspect that the pop-up she clicked on installed some software that has caused her computer to lock up. Which of the following is the BEST place to begin repairing Wendy's computer. A.)Boot the computer from the Windows installation disc and run Rest this PC. B.)Boot the computer from the Windows installation disc and run System Restore. C.)Boot the computer from the Windows installation disc and run Startup Repair. D.)Boot the computer from the Windows installation disc and perform a clean installation of Windows.

C

What PC hardware configuration belongs to the workstation type listed below? -400 W power supply -500 GB SATA HD -512 MC PCIe video adapter -Basic desktop application installed A.)Home office server B.)Gaming PC C.) Thick client workstation

C

What PC hardware configuration belongs to the workstation type listed below? -AMD 12-core 4 GHZ CPU -4 TB SATA HD -32 GB DDR4 RAM -Hardware-assisted virtualization A.)Thin client PC B.)Video editing workstation C.)Virtualization workstation

C

What PC hardware configuration belongs to the workstation type listed below? -HDMI output -Compact form factor -5.1 channel surround sound adapter -TV tuner adapter A.)CAD/CAM design workstation B.)Virtualization workstation C.)Home theater PC

C

What is a major benefit STP provides the UTP does not? A.)Safer for installations in overhead ceiling space. B.)Ability to install longer cable lengths C.)Greater resistance to interference D.)Lower cost

C

What is the purpose of the Services snap-in? A.)Views logs about programs, system events, and security. B.)Manage end-user applications running on your computer. C.)View and manage software programs running in the backgrounds. D.)Display statistics that tell you about the operation of your computer. E.)View historical data that describe the operating system's ability.

C

What is the third step to add more disk space to a Storage Space in Window 10? A.) Install a new storage device to the system B.) Add free space on a new storage device to a storage pool C.) Allocate space from the storage pool to an existing storage space

C

What type of data resiliency does not provide protection from a single storage device failure? A.) Parity B.) Three-way mirror C.) Simple D.) Two-way mirror

C

What type of data resiliency does not redundancy? A.) Parity B.) Three-way mirror C.) Simple D.) Two-way mirror

C

What type of peripheral device is typically found on a laptop computer and allows the user to control the cursor with a finger. A.) Mouse B.) Motion sensor C.) Touch pad D.) Gamepad E.) Scanner

C

Which Blu-ray standard defines rewritable disk? A.) BD-ROM B.) BD-R/RW C.) BD-RE D.) BD-R

C

Which aspects ratio applies to display with resolutions of 1280x720 and 1920x1080? A.) 4:3 B.) 16:10 C.) 16:9

C

Which category can you use in Control Panel how times, dates, numbers, and currency are formatted and displayed for your computer? A.)Administrative Tools B.)Appearance and Personalization C.)Clock and Region D.)Advanced System Settings

C

Which command would you use to display a simple list all processes running on a Linux distribution that uses either RPM or dpkg for package management? A.)apt-get -e B.)yum info C.)ps -e D.)yum -e E.)ps -ef F.)apt-get -ef G.)yum process info H.)yum -ef

C

Which connector is used with unshielded twisted pair (UTP) cable? A.)AUI B.)BNC C.)RJ45 D.)DIX

C

Which features make it possible to close some notebook computers and still use the touchscreen? A.)External touchscreen B.)Removable touchscreen C.)180 degree rotating touchscreen D.)Dual display

C

Which frequencies does Zigbee operate on? A.)2.7 GHz, 400 MHz, and 865 MHz B.)1.4 GHz, 90 MHz, and 500 MHz C.)2.4 GHz, 900 MHz, and 868 MHz D.)2.4 GHz, 500 MHz, and 818 MHz

C

Which kind of connector do you use to connect a modem to a standard telephone line? A.)F-type B.)RG58 C.)RJ11 D.)RJ45

C

Which of following is the most common form authentication? A.)Fingerprint B.)Photo ID C.)Username and password D.)Digital certificate on a smart card

C

Which of the follow security practices are the BEST example of the principle of least privilege? A.)All users on a Windows workstation have been assigned strong passwords. B.)The Guest user account on a Windows workstation has been disabled. C.)All user account on a Windows workstation are limited users except for one user, who is responsible for maintaining the system. D.)Autorun has been disable on a Windows workstation.

C

Which of the following are common forms of social engineering attacks? A.)Using a sniffer to capture netwrok traffic. B.)Distributing false information about your organization's financial status. C.)Sending hoax virus information emails. D.)Stealing the key card of an employee and using that to enter a secured building.

C

Which of the following battery types offers the greatest storage capacity in the smallest amount of space? A.)Carbon B.)Nickel cadmium (NiCad) C.)Lithium ion (LIB) D.)Nickel metal hydride (NiMH)

C

Which of the following best describes the Platform as a Service (PaaS) cloud computing service model? A.)PaaS delivers infrastructure to the client, such as processing, storage, network, and virtualized environments. B.)PaaS delivers software applications to the client either over the internet or on a local area network. C.)PaaS delivers everything a developer needs to build an application onto the cloud infrastructure. D.)PaaS stores and provides data from a centralized location without the need for local collection and storage.

C

Which of the following devices would you add to a computer if you needed to take inventory at a retail store by scanning the UPC symbols on products? A.) Touch screen B.) Scanner C.) Bar code reader D.) Trackball

C

Which of the following disk maintenance utilities located and disposes of files that can be safely removed from the disk? A.) Disk Defragmenter B.) Disk Management C.) Disk Cleanup D.) Check Disk

C

Which of the following disk maintenance utilities optimizes the performance of your hard drive by joining parts of file that are in different locations on your hard drive into a single location?

C

Which of the following is a form of attack that tricks into providing confidential information, such as identity information or logon credentials, through emails or websites that impersonate an online entity the victim trusts, such as a financial institution or well-known e-commerce site? A.)Fraggle attack B.)Social engineering C.)Phishing D.)Session hijacking

C

Which of the following is an advantage of connecting a printer to a netwrok? A.)Printing speed is increased. B.)You can use a less costly printer. C.)Multiple users can print to the same printer. D.)Troubleshooting costs are decreased.

C

Which of the following is not an example of wireless networking communications? A.)Bluetooth B.)802.11n C.)DSL D.)Infrared

C

Which of the following is the process of fixing problems detected by anti-virus software so that the computer is restored to it original state? A.)Isolation B.)Scanning C.)Remediation D.)Quarantine

C

Which of the following is true when the DHCP setting is disabled in a wireless network? A.)Wireless clients must use the correct wireless access point identifier (SSID) to connect to the network. B.)Wireless clients with specific MAC address to the network. C.)Wireless clients must use a static IP address within the correct IP address range to connect to the network. D.)Wireless clients must use the correct encryption key with its packets.

C

Which of the following network technologies is packed as part of a BRI plan? A.)DSL B.)Cable modem C.)ISDN D.)Dial-up

C

Which of the following protocols can be enabled so email is encrypted on a mobile device? A.)POP3 B.)SMTP C.)SSL D.)IMAP

C

Which of the following terms describes a PC card that you can insert and remove without rebooting the computer? A.) Plug-and play B.) AT attachment C.) Hot swappable D.) Hot play

C

Which of the following utilities would you use to correct cross-linked clusters within the files system on a Windows workstation? A.) attrib B.) fdisk C.) chkdsk D.) DiskScan

C

Which of the follwoing allows a computer to communicate with a printer? A.)Print queue B.)Printer port C.)Print Driver D.)Print spooler

C

Which optical media has the greatest storage capacity? A.) Dual-layer, double-sided DVD B.) Dual-layer, single-sided DVD C.) Single-layer, single-sided Blu-ray disc D.) Compact disc

C

Which port does Telnet use? A.)80 B.)34 C.)23 D.)25

C

Which printer management component would you use to view the drivers used by a printer? A.)Printer properties B.)Print queue C.)Print server properties D.)Print spooling service

C

Which tool can you use to display hardware utilization statistics that tell you about the operation of your computer? A.)Advanced System Settings B.)Event Viewer C.)Resource Monitor D.)Computer Management

C

Which tool can you use to gather and display statistics that help you monitor the operation of a Windows system? A.)Computer Management B.)MSinfo C.)Performance Monitor D.)Event Viewer

C

Which tool would you use to create and delete partitions on hard drives? A.) Explorer B.) Device Manager C.) Disk Management D.) Services

C

Which type of biometric authentication uses the ridges of your skin? A.)Keystroke dynamic B.)Face scan C.)Fingerprint D.)Retina scan

C

Which type of configuration would you use if you wanted to deploy 802.11n technology to communicate directly between two computers using a wireless connection? A.)WAP B.)Infrastructure C.)Ad hoc D.)WEP

C

Which type of printer uses a drum, plastic toner, and fuser to create a printed page? A.)Dye sublimation B.)Dot matrix C.)Laser D.)Ink jet

C

Which utility allows you to choose Selective Startup in Windows? A.)Msinfo32 B.)Regedit C.)Msconfig (System Configuration D.)Performance Monitor E.)Event Viewer

C

While reviewing video files your organization's security cameras, you notice a suspicious person piggy-backing to gain access to your building. The individual in question did not have a security badge. Which of the following would you MOST likely implement this from happening in the future? A.)Cable locks B.)Door locks with card readers C.)Mantraps D.)LO-jack recovery service

C

While traveling in a car, a user who has an unlimited data plan on a smartphone opens a wireless connection to share the internet with other passengers. Which of the following connection types is MOST likely being used? A.)NFC B.)MicroUSB C.)Hotspot D.)Lightning

C

While trying to log on, a user accidentally typed the wrong password three times, and now the system is locked because he entered too many incorrect passwords. He still remembers his password, but he just typed it wrong. He needs access as quickly as possible. Which of the following would allow the user to log on? A.)Change the password for the account B.)Have the user for the account to be unlocked automatically C.)Unlock the account D.)Enable the account

C

While using a new Windows system, you find that the mouse pointer tracks much more slowly on the screen than you would prefer. You want to increase the mouse pointer speed. Which tab would you use in the mouse properties window to do this? A.)Buttons B.)Pointers C.)Pointer Options D.)Wheel E.)Hardware

C

You are a PC technician for a national company retailer. You are asked to build a system. What system is list below? -HDMI output -Compact form factor -5.1 Channel surround sound adapter -TV tuner adapter A.)Home office server B.)Gaming PC C.)Home Theater PC D.)Virtualization workstation E.)Thin client workstation F.)Audio/video editing workstation

C

You are a trainer for your company and often teach course in a classroom located on-campus or in hotel conference room. In your office, which is separate from the classroom, you have two external monitors connected to your laptop, and you are to display different content on each monitor. However, when teaching, you only have your laptop and a projection unit. To make teaching easier, you want to the same content to show on both the laptop monitor and the projection screen. Which of the following multiple display options would be BEST to select when teaching? A.) Show only on 1 B.) Show only on 2 C.) Duplicate these displays D.) Extend these displays

C

You are an IT professional that works home users. One of your customers works from home and uses multiple Windows computers as well as an Apple Mac computer. Your customer wants to be able to switch between his computers without changing the keyboard and monitor currently in use. A.) USB multi-port hub B.) VGA splitter C.) KVM Switch D.) HDMI splitter

C

You are an IT technician for your company. One of your employees calls and tells you that every time they turn their computer on, they hear three beeps. Which of the following BEST describes an accurate reply to this employee? B.)Three repeated beeps is a general error. There is no specific information available about what this code means. C.)Three repeated beeps may mean different things. First, we need to check the motherboard documentations. D.)Three repeated beeps indicate there is something wrong with the computer's memory.

C

You are in the process of preparing a storage device and must determine which file system to use. Which of the following BEST describes the advantage of using the exFAT file system rather than NTFS? A.) Support for the files over 4 GB B.) Support for volumes over 32 GB C.) Lower memory and processor resource use D.) Access control lists and permissions

C

You are putting together a system for a graphic artist and need to make sure you get a display that meets her needs. The display needs to have very good color reproduction quality and viewing angels. The display needs to run cool and be power-efficient. Which of the following types of display will MOST likely meet these needs? A.) OLED display with wide-angle viewing B.) Plasma display with no monitor blur C.) LCD display with IPS panel D.) LCD display with TN panel

C

You are running Windows 10 on your computer. You want to decrease the time it takes to write data to your drives. To do this, you have decided to create a Windows software RAID system using a striped volume. Before you create the striped volume, which action MUST you take? A.) Use a multi-partition volume on a basic disk B.) Format your disks to use MBR partitions C.) Convert basic disks to dynamic disks D.) Format your disks to use GPT partitions

C

You are testing a printer you just installed, so you use the operator panel on the printer to print a test page. Later, you use the printer properties on your computer to print a test page. Instead of a normal test page, you receive several pages with garbled characters on them. What is the most likely cause of the problem? A.)A problem with the printer power supply or the power cable. B.)Wrong toner cartridge C.)Wrong print driver D.)Bad printer memory

C

You need to enable Remote Desktop on a user's Windows 10 system so that you can manage it over the network from your office. What Control Panel option would you use to accomplish this task? A.)User Accounts B.)Network and Internet C.)System and Security D.)Programs

C

You are the network administrator of a branch office of your company. The branch office network is part of a WAN that covers most of the United States. Users have been complaining that they are unable to access resources over the WAN at the main headquarters. You suspect that one of the routers between your office and the main headquarters is not working properly. To troubleshoot the routers, which of the following TCP/IP utilities would be BEST to use? A.)nslookup B.)nbtstat C.)tracert D.)netstat

C

You are troubleshooting a client connectivity problem on an Ethernet network. The client systems has intermittent connectivity to the network. You discover that the unshielded twisted pair patch cable run 75 feet from the wall outlet and then passes through the ceiling and over several florescent light fixtures before reaching the client system. Which of the following is the MOST likely cause of the connectivity problem? A.)Attenuation B.)Failed patch cable C.)EMI interference D.)Crosstalk

C

You have 5 salespersons who work out of your office and who frequently leave their desk in their cubicles. You are concerned that someone might walk by and take one these laptop. Which of the following is the BEST protection to implement to address your concerns? A.)Implement screen saver passwords. B.)Encrypt all company data on the hard drives. C.)Use cable locks to chain the laptops to the desks. D.)Require strong passwords in the local security policy.

C

You have a computer with a removable disk drive that has been formatted with NTFS. You want the drive to use FAT32 to be compatible with more operating systems. The drive is currently configured using drive letter D: A.) Upgrade the disk to a dynamic disk B.) Back up the data on the D: drive. Run convert.exe C.) Back up the data on the D: drive. Reformat the D: drive using FAT32. Restore the data D.) Back up the data on the drive. Run format /fs:NTFS

C

You have a computer with a single hard disk configured as a basic disk with a single partition formatted with NTFS. The computer runs Windows 10. The disk has run out of space. You need to add space to the disk. You install a new hard drive and start Disk Management. Which of the following is a required task to add space to the existing volume? A.) Extend the C:/ volume B.) Upgrade both disks to dynamic C.) On the new hard disk, create a new partition without a drive letter D.) Create an empty folder on the new hard disk.

C

You have a network that uses a logical bus topology. How do messages travel through the network? A.)Messages travel from one devices to the next until they reach the destination devices. B.)Messages are sent directly to the correct destination devices. C.)Messages are broadcast to all devices connected to the network. D.)Message are sent to a central device, which then forwards the message to the destination device.

C

You have a set of DVD-RW discs that have been used to archive files for your latest development project. You need to dispose of the discs. Which of the following methods should you use to best prevent extracting data from the discs? A.)Delete the data on the discs B.)Degaussing C.)Shredding D.)Write junk data over the discs 7 times

C

You have a workstation running a 64-bit version of Windows 8.1 Professional that you would like to upgrade to Windows 10 Professional. You want to perform the upgrade with the lowest cost and least effort. Which of the following would be the BEST way to install Windows 10? A.)Purchase a 64-bit full version of Windows 10 and perform a custom installation. B.)Purchase a 64-bit upgrade version of Windows 10 and perform a custom installation. C.)Purchase a 64-bit upgrade version of Windows 10 and perform an in-place upgrade. D.)Purchase a 32-bit version of Windows 10 and perform an in-place upgrade.

C

You have been asked to configure the drives in a computer. The end user wants to use striping without incorporating any fault tolerance. Which of the following will BEST meet these requirements? A.) RAID 1 B.) Expanded volume set C.) RAID 0 D.) RAID 5

C

You have been asked to recommend a printer that will be used in a travel agency. The printer will be used to print airline tickets. Each ticket has for pages(multi-based forms), and the same information must show up on all four pages with a single pass of the printer. Which of the type would you recommend? A.)Laser B.)Dye sublimation C.)Impact D.)Ink Jet

C

You have created a large course that describes how to install and use the software created by your company. You created the document using FrameMaker, which uses its own proprietary file format. Because your customers don't use FrameMaker, you need to print the document in a format that all of your customers can use. You customers use Windows, Linux, and Mac operating systems. Which of the following print methods would provide the BEST output for your customers to use? A.)Print the file to the Fax printer. B.)Print the file to paper and ship it to your customers. C.)Print the file to PDF D.)Print the file to XPS

C

You have installed anti-malware software that checks for viruses in e-mail attachments. You configure the software to quarantine any files with problems. You receive an email with important attachment, but the attachment is not there. Instead, you see a message that the file has been quarantined by the anti-malware software. Which of the following BEST describes what happened to the file? A.)It has been deleted from system. B.)The infection has been removed, and the file has been saved to a different locations. C.)It has been moved to a folder on your computer. D.)The file extension has been changed to prevent it from running.

C

You have just added a brand new hard disk to your Windows-based computer. When you power on the computer, the disk is not shown in File Explorer. To troubleshoot this issue, you open the Windows Disk Management console and see that the disk is present, but is shown as Unknown. Which of the following disk management steps is MOST likely required first? A.) The disk needs to be wiped B.) The disk needs to be partition C.) The disk needs to be initialized D.) The disk needs to be formatted

C

You have just connected a new computer to your network. The network uses static IP addressing. You find that the computer can communicate with hosts on the same subnet, but not with hosts on a different subnet. No other computers are having a problem. Which of the configurations values would you most likely need to change? A.)DNS B.)Subnet mask C.)Default gateway D.)IP address

C

When selecting a motherboard, consider the following motherboard specifications:

CPU socket type, Memory module compatibility, Number of memory slots, Maximum supported memory, Expansion slot count and type and Onboard devices (video, audio, or network)

You have just installed a new hardware device, upgraded the driver, and installed the custom software that came with the device. Now you can't get the device to work. Which of the following troubleshooting steps is the BEST to try first? A.) Install the drivers that came on the installation CD B.) Try installing the device in another system C.) Run any diagnostic software that came with the device D.) Remove and then reinstall the device

C

You have just installed the latest Windows updates on your Windows 10 computer. After the computer has rebooted, you get the following error message: Error: Windows failed to start. A recent hardware or software change might have caused the issue after you installed Windows updates. Since your computer won't start, you have booted you have booted your computer into the Advance Options section of the Windows 10 recovery environment. While troubleshooting this issue, which of the advanced option would be the BEST to try first? A.)System Image Restore B.)System Image C.)Startup Repair D.)Command Prompt E.)Startup Settings

C

You have just purchased a new laptop with built-in 802.11 wireless and Bluetooth capabilities. When you boot into Windows, you do not see Bluetooth adapter listed in Device Manager. Which of the following would be BEST to perform first? A.)Enable the Bluetooth device in Device Manager. B.)Update the device driver in Windows C.)Enable the Bluetooth in the BIOS/UEFI configuration. D.)Replace the wireless card in the laptop.

C

You have just purchased a used laptop and you want to configure it to hibernate when you press the power button. You edit the Power Options settings and enable hibernation, then you configure the power button to trigger hibernation. Everything works fine for several weeks. However, one day when you press the power button, the laptop does not hibernate. What should you do? A.)Configure the laptop to use the Max Battery power scheme. B.)Free up disk space C.)Enable ACPI support in the BIOS D.)Charge the battery before pressing the power button.

C

You have just received a frantic call from a customer. She informs you that after turning her computer on, she received the following error: The SMART hard disk check has detected an imminent failure. A.) Run a reliable defragmentation tool B.) Correct the bad areas on the drive using chkdsk C.) Back up all important data and files D.) Run a hard drive test to verify the condition of the hard disk. It may be a false error.

C

You have just set up a new laser printer for the company president on her Windows workstation. You have installed the printer and the drivers, what should you do next? A.)Document the steps you took to complete the configuration. B.)Share the printer over the network with the rest of the organization. C.)Edit the printer properties to configure device-specific settings. D.)Report to your supervisor that the job was completed.

C

You have purchased an LED monitor and connected it to the DVI-I port on your computer using a DVI-I cable. You configure the screen resolution to 1440 x 900 with 32-bit color. The display on the screen seems to be pixilated. Which of the following solutions is MOST likely to fix this problem? A.) Replace the DVI-I cable with a DVI-A cable B.) Decrease the color depth to 24-bit C.) Change the screen resolution to the native resolution of the monitor D.) Replace the DVI-D cable with a DVI-I cable E.) Change the screen resolution to 1600 x 1200

C

You have purchased new computers and will be disposing of your computers. These computers were previously used for storing highly-sensitive customer order information, including credit card numbers. To properly protect the accidental discovery of the company's sensitive information, which of the following steps MUST be completed prior to getting rid of the computers? A.)Repartition the hard drives. B.)Reformat the hard drives. C.)Physically destroy the hard drives with a hammer. D.)Reinstall a fresh copy of Windows on the devices. E.)Delete user data and applications from the hard drives.

C

You have recently issued new moblie phones to the sales team in your comapny. Each phone has the ability to store and transmit encrypted information for such things as making payments at a checkout counter. Which of the following technologies is being used in these phones? A.)Infrared transmitters B.)Bluetooth transmitters C.)NFC chips D.)VPN

C

You have three computer in your office. You would like to reduce the time it takes to move from one computer to the next, and you would like to used only one keyboard, one monitor, and one mouse for all computers. Which of the following device BEST allows this type of setup? A.) DVI B.) Router C.) KVM D.) USB hub

C

You installed a new toner cartridge in a company-owned laser printer and did some maintenance tasks that you needed to be done. Which of the follwoing BEST describes the next step you should take? A.)Use the automatic cleaning feature. B.)Check the gap between the printer and the paper. C.)Reset the page count. D.)Reinstall the print drivers

C

You manage a large number workstations that belong to a Windows domain. You want to prevent anyone that might try to gain access to a computer from guessing login information by trying multiple password. Which default GPO contains a policy you can enable to guard all computers in the domain against this security breach? A.)Group Domain Policy B.)Domain Security Policy C.)Default Domain Policy D.)Group Security Policy

C

You monitor is displaying images in strange colors. Which of the following is MOST likely the solution to this problem? A.) Increase the amount of memory on the video card B.) Increase the resolution C.) Increase the color depth D.) Decrease the resolution

C

You need to back up user data on a Windows 10 system. The computer has a single SSD storage device installed that contains both the Windows operating system (in C:\Windows) and user profiles data (in C:\Users). You plan to do the following: -Use Backup and Restore to backup user data. -Run the backup automatically every night at 11:00 p.m. -Store the backups in the C:\Backups folder. -Includes a system image in each backup. Will this configuration work? A.)No. Windows 10 does not include the Backup and Restore utility. File History must be used instead. B.)No. system image backup can't be scheduled with Backup and Restore. they must be run manually. C.)No. Backups created with Backup and Restore can't be Restore on the drive that contains the information being backed up. D.)Yes. all of the requirements for using Backup and Restore have been met.

C

You need to configure a Windows workstation with the IP address as the proxy server for your network. What tab in the Internet Properties window that you would use to do this? A.)General tab B.)Security C.)Connections D.)Programs

C

You recently installed a Windows 10 system, During the installation process, you elected to sign into the system using a local user account. After using the system for a time, you decide to being using an online Microsoft account to authenticate to the system instead. Which settings app option would you use to do this. A.)System B.)Devices C.)Accounts D.)Network & Internet

C

You recently installed a fiber-optic network board in an expansion slot in your system's motherboard. You no longer need to use the integrated UTP network board that is integrated in the motherboard. What option would you use in the properties of the integrated network adapter in Device manager to disable it? A.) General B.) Resources C.) Driver D.) Details

C

You recently purchased a laptop computer. As a member of the sales team, you often travel to present sales demonstrations. As one such presentation, you notice that the images being shown by a projector seem large and somewhat skewed. Which of the following changes would MOST likely give you an accurate projection of your presentation? A.) Configure the projector to use a 4:3 aspect ratio. B.) Configure the projector to use a 5:4 aspect ratio. C.) Configure the projector to use a 16:9 aspect ratio. D.) Configure the projector to used a 16:10 aspect ratio.

C

You want a security solution that protects the entire hard drive, preventing access even when it is moved to another system. Which of the following is the BEST method for achieving your goals? A.)EFS B.)VPN C.)Bitlocker D.)IPSec

C

You want to perform a Windows update on your Windows 10 computer. Before doing so, you want to make sure you can easily go back to the state it was in prior to the update. Which of the following Control Panel utilities is BEST to enable and use prior to the update? A.)Program and Features B.)View hidden files C.)System protection D.)Performance

C

You were recently hired by a small startup company. The company is in a small office and has several remote employees. You have been asked to find a business service that would accommodate the current size of the company but would also be able to scale as the company grows. The service needs to provide adequate storage, as well as additional computing power. Which cloud service model should you use? A.)DaaS B.)PaaS C.)IaaS D.)SaaS

C

You work as the IT administrator for a small news station. Jill, an employee in building 2, works in the audio/video editing department and would like to increase her productivity. For example, she would like to be able run multiple programs simultaneously and be able to compare video clips side-by-side. Which of the following configuration changes would provide the BEST solution for Jill? A.) Provide Jill with a second computer. B.) Grant Jill access to a remote workstation. C.) Configuration Jill's computer to have dual monitors. D.) Configure Jill's computer with a higher resolution.

C

You work for a company the offers their services through the internet. Therefore, it is critical that your website performs well. As a member of the IT technician staff, you received a call from a fellow employee who informs you have determined that you are a victim of a denial of service attack. As a first responder, which of the following is the next BEST step to perform? A.)Identify the issue further. B.)Investigate how the attack occurred. C.)Contains the issue. D.)Eradicate the issue.

C

You've just installed the DNS service on a Windows server. Which port must be opened in the server's firewall to allow clients to access the service? A.)110 B.)143 C.)53 D.)123

C

Your company has issued you a new laptop computer that contains a lot of memory and two very large hard disks. Since your computer at home is old and slow, you want to use your work computer for personal use as well. Tp keep your applications and files totally separate from the company's, you have been told you can run more than one version of Windows on the same computer, one for work, and one for personal use. Which of the following technologies would BEST meet your needs? A.)PXE boot B.)Recovery partition boot C.)Dual boot D.)NetBoot

C

one of the video editors in your company is worried that he may lose a lot of data if his hard drive fails. He has asked you to come up with a solution. To do this, you have decided to implement a RAID 10 solution on his desktop workstation. Which of the following is the MINIMUM number of hard disks that can be used? A.) 2 B.) 3 C.) 4 D.) 5 E.) 6

C

A user tells a help desk technician that their browser is displaying a message that a site can't be reached. When asked, the user tells the technician that other users in the same office can browse to the site. The technician suspects that the web server's name is not being translated to the correct IP address. The technician asks the user to open a command prompt window. Which of the following commands would confirm the technician assumption? (Select TWO.) A.)ifconfig B.)netdom C.)nslookup D.)ping E.)ipconfig

C and D

After installation, your Windows 10 client systems are joined to the WestSim.com domain. You need to verify that these are configured to get the time from the correct time provider. Which commands can you use to do this? (Select TWO. Each response is a complete solution.) A.)w32tm /config /update B.)w32tm /debug C.)w32tm /query /status D.)w32tm /query /source E.)Net time /querysntp

C and D

Which of the following are true of the SXGA screen resolution? (Select TWO) A.) 1600 x 1200 B.) 16:10 aspect ratio C.) 1280 x 1024 D.) 5:4 aspect ratio E.) 4:3 aspect ratio

C and D

You are configuring ADSL connection. Which of the following will be part of the configuration? (Select TWO). A.)Analog modem B.)F-type connectors C.)Filters or splitters D.)RJ11 connectors E.)An RG6 cable

C and D

You are configuring the local security policy of a Windows system. You want to require users to create passwords that are at lease 10 characters long. You also want to prevent logon after three unsuccessful logon attempts. Which of the following policies are BEST to configure?(Select TWO). A.)Account lockout duration B.)Password complexity C.)Minimum password length D.)Account lockout threshold E.)Enforce password history F.)Mazimum password age

C and D

You have a laptop running Windows 10. Users Account Control (UAC) has been disabled. How would you re-enable UAC on the laptop? (Select TWO. Each choice is complete solution.) A.)In the Control Panel, select System and Security and the System. Click Advanced system settings. B.)In the Control Panel, Select System and Security and the System. Click System protection. C.) In the Control Panel, Select System and Security and the Security and Maintenance. D.)In the Control Panel, Select User Accounts and the user Accounts. E.)In the Control Panel, select User Accounts and then Credential Manager.

C and D

Your computer seems to be running slowly. In particular, you notice that the hard drive activity light stays lit constantly when running multiple applications and switching between open windows, even though you aren't saving large files. What could you do to troubleshoot the problem? A.)Use Reliability Monitor to monitor memory utilization. B.)Use Reliability Monitor to monitor system reliability. C.)Use Resource Monitor to monitor memory utilization. D.)Use Task Manager to monitor memory utilization. E.)Use Task Manager to monitor dis activity. F.)Use Resource Monitor to monitor disk activity.

C and D

A user installs a new graphics application on her Windows system. During the installation process, the application prompts the user to load a custom video driver that has been optimized for the application. She does so and then completes the installation. Several days later, the user reports that her display doesn't seem to be working properly under some conditions. To fix the problem, you need to reload the old video driver. Which of the following actions are the BEST choices? (Select TWO) A.) Used Device Manager to disable the video driver B.) Boot from the Windows installation media and select the Startup Repair option C.) Use Device Manager to roll back the video driver D.) Boot to advance startup menu and select Last Known Good Configuration E.) Revert the system to a restore point prior to installing the video driver

C and E

During the POST, you receive the following message: Keyboard not present. Press F1 to continue. What are the most likely causes of this error message? (Select TWO) A.) Incorrect keyboard data in the CMOS B.) An outdated BIOS C.) A poor keyboard connection D.) A broken F1 key E.) A stuck key on the keyboard

C and E

The 802.11ac wireless netwroking standard provides increased bandwidth and communication speeds by using which of the following technologies? (Select TWO). A.)Peer-to-peer mode to allow each host to communicate directly with other host. B.)Dual band transmission to allow data to be transmitted at two frequecies at the same time. C.)MU-MIMO to allow multiple users to use the same channel. D.)OFDM modulation to allow several parallel data channels to stream data. E.)Channel bonding to combine more channels in the 5 GHz band to allow for up to 160-MHz-wide channels.

C and E

Which of the following describes an IPv6 address? (Select TWO) A.)32-bit address B.)64-bit address C.)128-bit address D.)Four decimal octets E.)Eight hexadecimals

C and E

Which of the following features is supplied by WPA2 on a wireless network? (Select TWO). A.)Identification of the network B.)Centralized access for clients C.)Encryption D.)Filtering of traffic based on packet characteristics E.)Authentication F.)Refusal of client connections based on MAC address

C and E

You are the IT technician for your company. Which of the following mechanisms would BEST allow you to resolve a hostname into its associated IP address? (Select TWO) A.)BOOTP B.)DHCP C.)hosts file D.)FTP E.)DNS

C and E

You have added two new hard disks to a Windows computer. The disks are configured as basic disks. Which of the following could be configured on these disks? (select TWO) A.) Spanned volumes B.) Striped volumes C.) Primary partitions D.) Simple volumes E.) Extended partition with logical drives

C and E

You have an executive user who keeps sensitive information about the company on a company-owned mobile device. You want to be prepared to keep company information secure if he loses this device or if it gets stolen. Which of the following solutions should you use? (Select TWO.) A.)Mobile device management software that provides pop-up blocking B.)Mobile device management software that automatically detects netwrok firewalls. C.)Mobile device management software that performs full device encryption. D.)Mobile device management software that allows automatic detection of unfamiliar networks. E.)Mobile device management software that performs remote wipes.

C and E

You provide desktop support at the branch office of a bank. One of the Windows workstations you manage is used by a bank employee to set up new customer accounts and fill out customer loan applications. Each user account on the system has been assigned a strong password. A cable lock has been installed to prevent it from being stolen. Which of the following steps could be completed to BEST increase the security of this system? (Select TWO). A.)Disable the netwrok jack to which the system is connected B.)Disconnect the system from the netwrok. C.)Remove the optical drive D.)Move the system to a locked room E.)Disable all USB ports in the BIOS/UEFI firmware configuration

C and E

You're about to begin an upgrade to a Window 7 workstation to Window 10. What should you do before beginning? (Select TWO.) A.)Repartition and reformat the hard dive. B.)Install all the applications that will be used on the new system prior to running the upgrade. C.)Verify that the computer meets the minimum requirements. D.)Remove all peripherals and expansion boards prior to running the upgrade. E.)Create a system backup of the hard drive prior to running the upgrade.

C and E

Your supervisor recently purchased 100 desktop computer system and 100 new Windows 10 licenses for your organization's accounting department. She received a single Windows 10 installation disc with the licenses. Whic of the following would be the BEST installation methods to use? (Select TWO.) A.)Burn 50 copies of the installation disc and install 50 system at a time. B.)Copy the installation media to 10 flash drives and install 10 systems at a time. C.)Use a network installation. D.)Use the installation. E.)Install one system and image it to the other systems.

C and E

Which of the following identifies the prefix component of an IPv6 address? (Select TWO) A.)The last 64 bits of an IPv6 address B.)The first quartet of an IPv6 address C.)The first four quartets of an IPv6 address D.)The fourth quartet of an IPv6 E.)The last quartet of an IPv6 F.)The first 64 bits of an IPv6 address

C and F

The amount of time that the disk subsystem is busy reading from and writing disk. A.)Disk queue length B.)Processor utilization C.)Commit charge D.)Disk time E.)Memory pages per second

D

Case Fans

Case fans create a pressurized system that allows air to flow through the case in a specific way

The first domain created in an Active Directory forest. A.)Domain Controller B.)Site C.)Subnet D.)Forrest Root Domain E.)Tree Root Domain

D

A VPN is used primarily for which purpose? A.)Allow the use of network-attached printers. B.)Support the distribution of public web documents. C.)Allow remote systems to save on long distance charges. D.)Support secured communication over an untrusted network.

D

A company is considering providing smartphones to their employees and is investigating the interaction of the phone with iTunes, iCloud, Google Drive, Dropbox, and OneDrive. A.)Mutual authentication for multiple services B.)Synchronization to the desktop C.)Synchronization connection types D.)Synchronization to the cloud.

D

A company is purchasing new laptops for their graphic artist division. Which of the following display technologies provides better contrast and deeper blacks, resulting in better picture quality? A.) Plasma B.) DLP C.) LCD D.) OLED

D

A group of networks that are geographically isolated, but are connected to form a large internetwork. A.)Local Area Network (LAN) B.)Personal Are Network (PAN) C.)Metropolitan Area Network (MAN) D.)Wide Area Network (WAN) E.)Wireless Local Area Network (WLAN)

D

A healthcare organization provides mobile clinics throughout the world needs to transfer patients' statistical data to a central database via the internet. Which network technology should you select to ensure network connectivity for any clinic located anywhere in the world, even remote areas? A.)Dial-up B.)DSL C.)Cable modem D.)Satellite E.)ISDN

D

A landscaping company's employees receive payment for thier services using credit card reader that physically attaches to an Apple mobile device. Which of the following connection types is being used? A.)NFC B.)IR C.)Bluetooth D.)Lightning

D

Which of the following describes the part of the IPv6 address that identifies the subnet address? A.)The first quartet in the IPv6 address prefix B.)The last quartet in the IPv6 address interface ID C.)The first quartet in the IPv6 address interface ID D.)The last quartet in the IPv6 address prefix

D

A local dentist has contracted with you to implement a netwrok in her new office. Because of security concerns related to patient privacy laws, she has asked that the new network meet the following criteria: -No one from the internet should be able to access her internal network. -Email messages should be scanned for spam, phishing attacks, and malware before they reach users' workstations. -Employees access to non-work-related websites, especially sites that contain inappropriate content, should be blocked. -A system should be out in place to detect and prevent external attacks on her network. Which of the following would BEST meet your client's criteria? A.)Implement an email security appliance. B.)Implement an intrusion prevention system (IPS). C.)Implement a firewall. D.)Implement an all-in-one security appliance. E.)Implement a content filter.

D

A manufacturing company has customized a computer application will use to track line worker efficiency. Supervisors will interact with the application while walking within and between work areas and will also use the laptop while sitting at their desks. Which of the following features would BEST minimize the awkward movement of carrying a bulky laptop with a hinged display while providing the flexibility to use the device at a desk? A.)Special function keys B.)A laptop docking station C.)A touchscreen display D.)A rotating or removable screen

D

A mobile device user is comparing method for securing the device. Which of the following methods for secure a mobile device can affect the device's performance? A.)Remote backup applications B.)Biometric authentication C.)Locator applications D.)Full device encryption

D

A new computer has been added to the Sales department and need to be joined to the CorpNet domain. Which of the follwoing System Properties settings MUST be used to make the change? A.)System Properties > System Protection B.)System Properties > Remote C.)System Properties > Advance D.)System Properties > Computer Name

D

A technician is assisting a user with rebooting a frozen laptop that does not respond to keystrokes or mouse clicks. Which of the following is the SIMPLEST way to power down the laptop? A.)Remove the battery B.)Press Ctl + Alt + Del and open the task manager C.)Disconnect the power adapter D.)Hold down the power button for several seconds.

D

A technician is installing a SOHO router at an after-school community center. The customer would like to keep children from accessing inappropriate material while browsing the web. A.)Disable SSID broadcast B.)Update firmware C.)Disable DHCP D.)Enable content filtering

D

A technician is installing a cable modem that supplies internet connectivity for a home office. Which of the following cabling types would be used to connect the cable modem to the cable wall outlet? A.)Multimode fiber B.)CAT 6a C.)Cat 5e D.)RG6

D

A technician is tasked to add a vaild certification to a mobile device so that encrypted emails can be opened. Which of the following email protocols is being used? A.)POP3 B.)IMAP C.)IMEI D.)S/MIME

D

A technician suspects that an app on a tablet device may be surreptitiously using the camera without permission. Which of the following would be the BEST way to troubleshoot this issue? A.)Perform a soft rest on the deice. B.)Check the result of a cell tower analyzer. C.)Remove all Bluetooth pairings. D.)Run an anti-malware scan.

D

A technician suspects that data is being leaked from a tablet. Which of the following is the BEST tool to troubleshoot this issue? A.)Anti-malware B.)Wi-Fi analyzer C.)Force stop D.)App Scanner

D

A user call to report a problem. She is trying to install an application on her new Windows 10 system, but cannot. Her user account is a member of the Users group on the system. What do you suspect is causing the installation issue? A.)The application is incompatible with Windows 10. B.)She is not a member of the Power Users group. C.)Only apps from Microsoft Store can be installed on Windows 10 system. D.)Her group membership does not allow her to install new software.

D

A user can't make an RDP connection from outside the network to a server inside the network. Which network device will a network administrator MOST likely configure to allow this connection? A.)Hub B.)Access point C.)Switch D.)Firewall

D

A user is choosing a method to secure a mobile device. Which of the following types of screen locks is LEAST secure? A.)Fingerprint lock B.)Passcode lock C.)Face lock D.)Swipe lock

D

A user is having problems connecting to other computer using hostnames. Which of the following commands will BEST help you troubleshoot this problem? A.)nbtstat B.)arp C.)netstat D.)nslookup

D

A user needs to use her laptop to give a presentation using a video projector. She called asking you how to switch the display to the external monitor port on her laptop. What should you tell her? A.)The laptop should have automatically detected the external display and redirected video output to it. B.)This can't be done. A special adapter must be installed in a USB slot on the laptop. C.)Increase the screen brightness until the display appears on the video projector. D.)Press and hold the Fn key; then press the monitor function key (image of a monitor on it).

D

A user normally connects a laptop to a company's network using the laptop's internal wireless NIC. The laptop does not have an Ethernet port. The wireless network has failed, and the replacement part will take two days to arrive. Which of the following solutions will connect the laptop to the company's wired network? A.)Transfer files using an external USB flash drive and then move the flash drive to a computer that is connected to the network. B.)Use a USB-to-Wi-Fi dongle to replace the laptop's internal wireless NIC C.)Enable a Bluetooth connection between the laptop and a computer that is connect to the network. D.)Use a USB-to-RJ45 dongle to connect to a wall jack with an Ethernet cable.

D

A user reports that he can't browse to a specific website on the internet. From his computer, you find that a ping test to the Web sever succeeds. A traceroute test shows 17 hops to the destination web server. A.)Incorrect default gateway address B.)Incorrect subnet mask value C.)Duplicate IP addresses D.)Incorrect DNS server address

D

Which of the following disk maintenance utilities optimizes the performance of your hard drive by verifying the file system integrity of a hard disk and fixing the errors it detects? A.) Disk Cleanup B.) Disk Defragmenter C.) Disk Management D.) Check Disk

D

A user within you organization received an email relating how an account containing a large sum of money has been frozen by the government of a small middle eastern nation. The user was offered 25% share of this account if she would help the sender transfer it to a bank in the United States. The user responded an d was instructed to wire $5,000 to the sender to facilitate the transfer. She complied, but has not heard from the sender since.Which of the following BEST describes the type of attack which as occurred in this scenario? A.)Eavesdropping B.)Vishing C.)Man-in-the-middle D.)Nigerian 419 scam

D

A user within your organization received an email relating how an account containing a large sum of money has been frozen by the government of a small African nation. The user was offered a 25 percent share of this account if she would help the sender transfer it to a bank in the United States. The users responded to the sender and was instructed to send her bank account number so that it could be used to facilitate the transfer. She complied, and then the sender used the information to drain her bank account. What type of attack occurred? A.)Man-in-the-middle B.)Eavesdropping C.)Piggybacking D.)Phishing

D

After receiving several complaints from the employees in your company, you start to troubleshoot a laser printer. After a short while, you have concluded that the most probable cause is a dirty drum. Which of the following is the MOST logical reasons for this conclusion? A.)Garbage characters on the page B.)Ghost images on the page C.)A blank page D.)Spots at the regular intervals on the page

D

After replacing a laptop touchpad, a technician finds that the touchpad does not move the cursor. However, a USB mouse does. Before opening the laptop case to re-check the connection, which of the following actions should the technician perform? A.)Perform a minimal boot of the operating system so that device drivers are not loaded. B.)Increase the operating system's mouse speed setting C.)Toggle the scroll lock key on the keyboard D.)Unplug the USB mouse and re-check touchpad movements.

D

Alice recently purchased a new cell phone. After her vacation, Alice wanted to transfer her holiday photos to her computer to do some touchup work before sending the pictures to her children. When Alice attached her phone to her computer, she saw that Windows detected her phone and tried to load the applicable software to give her access to her phone. Unfortunately, after trying for several minutes, Windows displayed a message indicting that it was unsuccessful. When Alice explored her available drives, her phone was not listed. Which of the following would be the BEST administrative tool to help Alice gain access to her phone? A.) Services B.) Component Services C.) System configurations D.) Device Manger E.) Event Viewer

D

Allows you to share the internet connection of a phone with a laptop. A.)Hotspot B.)NFC C.)Mobile VPN D.)Tethering E.)Bluetooth

D

An end user clams they are unable to connect to the internet and has called the company's help desk for a solution. Having been assigned to this issue, you decide to first test whether or not TCP/IP is working correctly on the local computer. Which of the following is the BEST commands to use for the test? A.)netstat B.)nslookup localhost C.)ping-a localhost D.)ping 127.0.0.1

D

An intruder waits near an organization's secured entrance until an employee, who assumes the intruder is another employee and holds the door open for her. Which of the following BEST describes the type of attack that just occurred? A.)Denial of service B.)Smurf C.)Phishing D.)Tailgating

D

An unauthorized person gains access to a secured area by following an authorized person through a door controlled by a badge reader. Which of the following security threats does this sentence describe? A.)Phishing B.)Brute forcing C.)Shoulder surfing D.)Tailgating

D

As a member of the help desk administration team, you've been assigned to update the driver for the network adapter that is installed that is installed on most the machines in your department. You have a copy of the latest driver on a USB flash drive. Which Windows utility will allow you to manually update this new driver? A.) Internet Properties B.) Network and Sharing Center C.) Driver Manager D.) Device manager

D

Bob calls and complains that he has suddenly started getting a lot of unwanted email. Which of the following is the BEST type of software to install to help solve Bob's problem? A.)Anti-virus B.)Anti-malware C.)Anti-plagiarism D.)Anti-spam

D

Combines public, private and community cloud resources from different service providers. A.)Public cloud B.)Private cloud C.) Community cloud D.)Hybrid cloud.

D

Currently, the users in your company are required to use their IP addresses when connecting to others hosts. Since IP addresses are difficult to remember, you want to implement a protocol on your network that allows computers to automatically find another host's IP address using a logical name. Which of the following protocols would be the BEST to implement? A.)DHCP B.)ARP C.)Telnet D.)DNS

D

Defines an employee's rights to use company property. A.)Organizational Security Policy B.)Password Policy C.)Code of Ethics D.)Acceptable Use Policy E.)User Awareness Policy

D

Dual-layer version employs two recordable dye layers, each capable of storing data. A.) Compact Disc (CD) B.) Compact Disc (CD-RW) C.) Digital Versatile Disc (DVD) D.) Digital Versatile Disc (DVD-RW) E.) Blu-ray Disc (BD-RE) F.) Blu-ray Disc (BD)

D

Due to a blackout, power is no longer coming from the wall outlet, and your computer is now off. You do not have a UPS, and you need to remove a disc out of the DVD drive. What is the easiest method for retrieving the disc? A.) Press the drive's eject button while pressing the computer's restart button B.) Add a UPS between the wall outlet and the computer C.) Remove the drive and carefully pry open the tray D.) Push an unbent paper clip into the hole on the front of the drive.

D

Easy solution for making small appliance, such as lamps, coffee makers, and toasters, smart. A.)Thermostat B.)Switch C.)Bulb D.)Plug E.)Security Cameras F.)Door Lock G.)Speaker/Digital Assistant

D

Which of the following drive configurations uses striping with parity for fault tolerance? A.) RAID 1 B.) RAID 0 C.) RAID 10 D.) RAID 5

D

Which of the following is a 172-pin DIMM often used in laptops? A.)DIMM+ B.)TinyDIMM C.)MacroDIMM D.)MircoDIMM

D

Employees in a small business have a habit of transferring file between computer using a USB flash drive and often bring in files from outside the company. Recently, a computer was infected with malware from a USB flash drive even though the employee did not access any file. Which of the following options would prevent this issue in the future? A.)Configure screen savers to require a password. B.)Set strong passwords. C.)Enable Bitlocker. D.)Disable autorun.

D

For the past few days, a mobile phone has stopped functioning and will not respond to touchscreen input. A soft reset no longer returns functionality. Which of the following is the BEST step the user can take to fix this problem? A.)Preform a force stop B.)Close all running apps. C.)Remove and replace the battery D.)Reset to factory default.

D

Given that your Windows workstation has Automatic Private IP Addressing (APIPA) implemented using default settings, which of the following TCP/IP addresses could be automatically assigned to the system should your DHCP server go down or become inaccessible? A.)10.0.0.65 B.)172.16.1.26 C.)169.254.1.26 D.)169.254.1.26 E.)168.254.10.25 F.)192.168.1.22

D

How do switches and bridges learn where devices are located on a network? A.)When a frame enters a port, the source IP address is copied from the frame header. B.) When a frame enters a port, the destination IP address is copied from the framer header. C.)When a frame enters a port, the destination MAC address is copied from the frame header. D.)When a frame enters a port, the source MAC address is copied from the frame header.

D

If you want to boot from a hard drive, what must it have? A.) Dynamic partition B.) Extended partition C.) Passive partition D.) Active partition

D

In which of the following situations would driver rollback be the BEST tool to use? A.) You recently installed a new application, and now the system behaves erratically B.) You need to restore several driver files that were accidentally deleted C.) You accidentally deleted several important emails from Outlook and need to restore them D.) You recently installed a new video driver, and now the system behaves erratically

D

Joe has been issued a company-owned tablet. He finds that the performance decreases after a few hours of use. After he power-cycles the tablet, performance returns, but the tablet begins to slow again after an hour of use. Which of the following is the BEST action to troubleshoot the problem? A.)Reset the tablet to factory defaults. B.)Disable wireless networking. C.)Replace the tablet battery. D.)Check the number apps that are running.

D

Joe, a user, is walking through a shopping mall. His phone frequently displays a message that additional information is needed to log in. Which of the following is the MOST likely cause of these messages? A.)Unauthorized location tracking B.)Leaked personal files C.)Weak or dropped cellular signal D.)Unintended Wi-Fi connections

D

Lately, you hear a clicking noise when reading or writing data from the hard disk. What is the most likely cause of the clicking? A.) Overheated CPU B.) Failed UPS C.) Bad memory D.) Failing hard drive

D

Logical organization of resource is a? A.)Tree B.)Forest C.)Domain D.)Organizational unit E.)Object

D

Most commonly used in retail environments at checkout stands. A.) Smart card reader B.) Digitizer C.) Biometric Scanner D.) Barcode reader

D

Most devices that you install in a system require little to no configuration; they simply work after you plug them in. This is because devices are automatically assigned the system resources needed for the device to being functioning. Which of the following are the three types of system resources that are USUALLY automatically assigned? A.) Power, I/O address, IRQ B.) Digital signature, DMA channel, driver updates C.) Device driver, IRQ, interrupt address D.) I/O address, IRQ, DMA channel

D

Nate, an employee in your organization, has started to work from home for two days a week. Nate uses the same company laptop while working in the office and working at home. Nate's laptop automatically connects to the wireless network in the office, but does not automatically connect to his home wireless network. Nate would like the laptop to connect automatically at home and at home. Which of the following BEST allows this to happen? A.)Configure automatic private IPv4 addressing. B.)Configure a static IP address for the general TCP/IP configuration that is compatible with the office network and another static IP address for the alternate TCP/IPv4 configuration that is compatible with the home network. C.)Configure a static IP address that works for both the office and the home office wireless networks. D.)Configure an alternate TCP/IP configuration on the laptop's wireless adapter to use a static IP address that is compatible with the home network.

D

Operates in half-duplex mode, meaning the devices can either send or receive data at any given time. A.)Switch B.)Bridge C.)Router D.)Hub

D

Resolves (looks up) the IP address of the specified hostname. A.)ipconfig B.)ping C.)tracert D.)nslookup E.)netstat

D

Rodney, a user in the research department, reports that he is getting STOP errors while using his Windows XP computer. You ask Rodney if anything has changed recently on the computer. Rodney explains that he ran the installation program for his PDA and everything worked fine until he tried to hot sync. Now any time he hot syncs, he has to reboot the computer. You need to fix Rodney's computer and prevent Rodney from using the PDA until you can install an update driver. What should you do? A.)Use the Reset This PC option in the Settings app. B.)Re-install Windows from the installation disc. C.)Boot the system from a Windows installation disc and select the Startup Repair option. D.)Boot the system into Safe Mode. Disable the TV tuner driver in Device Manager. E.)Reboot the system and select Safe Mode. Edit the properties of the TV tuner driver in Device Manager and select Roll Back Driver.

D

Server Message Block (SMB/CIFS) directly over TCP A.)548 B.)443 C.)22 D.)445 E.)80 F.)143 G.)427

D

Set expectations for user privacy when using company resources. A.)Organizational Security Policy B.)Password Policy C.)Code of Ethics D.)Acceptable Use Policy E.)User Awareness Policy

D

Shows when a dynamic disk has been removed or turned off. A.) Initializing B.) Healthy C.) Unavailable D.) Offline

D

The manufacture department consists of 50 employees. Due to the number of employees in this department, the company cannot afford to have a printer for each user. Your company has purchased a new and very expensive laser jet printer for this department's use. This printer needs to be configured so all users in the department have the ability to print to this device from their own computers. Which of the following printer connections would BEST facilitate multiple user access? A.)USB B.)Serial C.)Parallel D.)Network

D

To assist a user, a help desk technician is able to take advantage of a Windows proprietary network protocol that allows the technician to open a graphical interface to connect with the user's Window computer. Which of the following TCP/IP port number is the default port used by this protocol? A.)80 B.)143 C.)443 D.)3389

D

To protect a Windows 10 system, you've configured System Restore to automatically protect your system using restore points. Will this adequately protect the user data on the system? A.)No, you need to implement a RAID 0 array to protect your data. B.)Yes, the user data is protected. C.)No, you need to enable Storage Spaces. D.)No, you need to enable File History.

D

Travis, a long-haul truck driver, reports that when driving on remote highways, his smartphone battery drains faster than normal. and his phone calls often cut out. Which of the following is the MOST likely reason for the fast battery drain? A.)Limited data plan B.)A defective SIM card C.)Multiple Bluetooth connections D.)Signal drop or weak signal

D

What do biometrics use to authenticate identity? A.)Knowledge of password B.)Possession of a device C.)Ability to perform tasks D.)Biological attributes

D

What is required to control access to the file system using file and folder permissions on a Windows-based computer? A.) FAT32-formatted partition B.) Ext4-formatted partition C.) EFS D.) NTFS-formatted partition

D

What is the least secure place to locate on omnidirectional access point when creating a wireless network? A.)Above the third floor B.)In the center of the building C.)In common or community work areas D.)Near a window

D

What is the maximum data transfer speed for USB 3.0 devices? A.) 480 Mbps B.) 12 Mbps C.) 1.5 Mbps D.) 5 Gbps E.) 400 Mbps

D

What is the maximum number of nodes Z-Wave allows on it mesh network? A.)231 B.)322 C.)223 D.)232

D

What is the recommended size of the paging file under normal circumstances on a Windows 10 system with 8 GB of RAM installed? A.)No more than three times the amount of physical RAM. B.)As large as possible. C.)No paging file is required. D.)Equal to the amount of physical RAM. E.)Twice the amount of physical RAM.

D

What key advantages does a virtual router have over a physical router? A.)Faster routing performance. B.)Routing protocols are not needed to route data between networks. C.)Allows the Virtual Router Redundancy Protocol (VRRP) to be used. D.)Multiple networks can be connected to a single interface.

D

When a presenter at a conference connects a laptop to a projector, the projector mirrors the laptop's display. The presenter would like it to extend the laptop's desktop instead. Which of the following options is the QUICKEST way to make the change? A.)Select the proper video source from the projetor's setting menu. B.)Disconnect and reconnect the laptop to the projector C.)Change the dual display settings in the operating system's control panel. D.)Toggle the dual display function key on the laptop.

D

When assisting users, a technician often uses the Mac OS Force Quit functions and the Linux kill command. Which of the following situations would require their use? A.)The operating system needs to be rebooted. B.)A user accidently sends a large job to a printer. C.)A remote desktop connection needs to be closed. D.)A runaway application does not respond to user input.

D

Which Windows component prompts the user for credentials or permission to protect against unauthorized activities, such as unintended software installation? A.)Windows SmartScreen B.)Windows Defender C.)Windows Firewall with Advance Security D.)User Account Control (UAC)

D

Which Windows tool lets you perform automatic backups at regular times (such as on specific days at specific times)? A.)Event Manager B.)Disk Management C.)Task Manager D.)Task Scheduler

D

Which component in a laser printer applies toner to the drum, causing the toner to stick to the charged areas on the drum? A.)Fuser B.)Primary corona C.)Secondary corona D.)Developing roller

D

Which generation of SATA storage devices does the following? -Supports up to 6 Gbps data transfer rates -Addresses solid state drives A.) SATA B.) eSATA C.) eSATAp D.) SATA3 E.) SATA2

D

Which of the following Windows command line utilities would you use to realign the file structure on the disk to optimize performance? A.) Disk Management B.) chkdsk C.) fdisk D.) defrag

D

Which of the following battery types has the greatest need to be completely drained before being recharged? A.)Nickle metal hydride (NiMH) B.)Carbon C.)Lithium ion (LIB) D.)Nickel cadmium (NiCad)

D

Which of the following best describes how a switch functions? A.)It connects multiple segments of different architectures. It translates frames and forwards them to the appropriate segment. B.)It connects multiple cable segments or devices and broadcast frames to all of it ports. C.)It connects multiple segments of different architectures. It translates frames and broadcast them to all of it ports. D.)It connects multiple cable segments or devices and forwards frames to the appropriate segment.

D

Which of the following cloud computing solutions deliver software applications to a client either over the internet or on a local area network? A.)IaaS B.)DaaS C.)PaaS D.)SaaS

D

Which of the following describes a man-in-the-middle attack? A.)An IP packet is constructed which is larger than the valid size. B.)Malicious code is planted on a system where it waits for a triggering event before activating. C.)A person over the phone convinces an employee to reveal their logon credentials. D.)An attacker intercepts communications between two network hosts by impersonating each host.

D

Which of the following paper types should not be used in inkjet printers? A.)Any colored paper B.)Multi-purpose paper C.)Paper that is not specifically marked "For inkjet printers." D.)Very glossy paper.

D

Which of the following printers would produce the highest print quality? A.)24-pin B.)18-pin C.)300 DPI D.)600 DPI

D

Which of the following remote access mechanisms on a Windows system lets you watch a user is doing and, if necessary, take control of the user's desktop to perform configuration tasks? A.)SSH B.)Remote Desktop C.)Telnet D.)Remote Assisstance

D

Which of the following security solutions would prevent a user from reading a file which she did not create? A.)IPSec B.)VPN C.)BitLocker D.)EFS

D

Which of the following utilities checks the disk for bad clusters? A.) format B.) defrag C.) fdisk D.) chkdsk

D

Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients? A.)WPA Enterprise and WPA2 Enterprise B.)WEP C.)WPA Personal and WPA2 Personal D.)WEP, WPA, Personal, and WPA2 Personal E.)WEP, WPA, Personal, WPA Enterprise, WPA2 Personal, and WPA2 Enterprise

D

Which security measure can be used to generate and store cryptographic keys? A.)Chassis intrusion detection B.)DriveLock C.)BIOS/UEFI password D.)Trusted Platform Module (TPM)

D

Which utility would you use to view current connections and active sessions and ports on a computer? A.)ping B.)ipconfig C.)nslookup D.)netstat

D

Which wireless standard can stream data at a rate of up to 54 Mbps using a frequency of 5 GHz? A.)802.11n B.)802.11b C.)802.11g D.)802.11a

D

While making an online bank transaction, a customer checks to see that the web browser is displaying a lock icon that indicates that an encrypted TCP/IP suite protocol is being used. Which of the following TCP/IP port number does this protocol typically use when the browser encrypts its communication with the bank's web server? A.)25 B.)80 C.)143 D.)443

D

While on a business trip, an employee accesses the company's internal network and transfer files using an encrypted connection. Which of the following digital security methods is being used? A.)Firewall B.)Access control list C.)DLP D.)VPN

D

You are a PC technician for a national company retailer. You are asked to build a system. What system is list below? -AMD 12-core 4 GHz CPU -4 TB SATA HD -32 GB DDR4 RAM -Hardware-assisted virtualization A.)Home office server B.)Gaming PC C.)Home Theater PC D.)Virtualization workstation E.)Thin client workstation F.)Audio/video editing workstation

D

You are a security consultant and have been hired to evaluate an organization's physical security practices. All employees must pass through a locked door to enter the main work area. Access is restricted using a smart card reader. Network jacks are provided in the reception area such that employees and vendors can access the company network for work-related purposes. Users within the secured work area have been trained to lock their workstations if they will be leaving them for any period of time. Which of the following recommendations would you MOST likely make to this organization to increase their security? A.)Replace the smart card reader with a key code lock. B.)Move the receptionist's desk into the secured are. C.)Require users to use screensaver passwords. D.)Disable the switch ports connected to the network jacks in the reception area.

D

You are an IT administrator for your company. You have been tasked with the assignment of installing 300 copies of Windows 10. You need to finish this task as quickly and efficiently as possible. Which of the following boot methods would be the BEST method for installing Windows under these circumstance? A.)USB B.)DVD C.)Solid state/flash drives D.)PXE

D

You are an IT administrator troubleshooting a computer from within the Windows command prompt. You are trying to execute the chkdsk command line tool, but it keeps failing. Which of the following command switches would give you the BEST information or help on how to run this command> A.) chkdsk /info B.) chkdsk /help C.) chkdsk /i D.) chkdsk /?

D

You are configuring a firewall to allow access to a sever hosted in the demilitarized zone of your network. You open IP ports 80, 25, 110, and 143. Assuming that not other ports on the firewall need to be configured to provide access, which applications are most likely to be hosted on the server? A.)Email server, Newsgroup server, or DNS server B.)Web server, DNS server, or email server C.)Web server, DNS server, or DHCP server D.)Web server and email server

D

You are installing Windows 10 in a drive that was previously used for Windows 8.1. This drive has one primary partition. While installing Windows, you want to ensure that the old files are deleted and any bad sectors are located and marked as bad. To achieve your desired goal, which of the following is the BEST option to run? A.) DiskPart B.) Quick format C.) Bootrec D.) Full format

D

You are installing a satellite connection so your home office can connect to the internet. Which of following statements is true? A.)The connection between the satellite modem and dish uses a USB cable and connector. B.)The connection to your computer from the satellite modem may be RJ11 or F-type C.)You must have at the least one available phone line for data uploads D.)The satellite dish must be pointed in the correct direction for communicating with the satellite

D

You are installing networking cable in the air space between the ceiling and the roof of a building. Which type of cabling should you use? A.)PVC B.)STP C.)Muli-mode fiber D.)Plenum

D

You are setting up a small network in your office with one Windows server and 50 Windows workstation. You want to spend as little time as possible configuring the workstations with IP addressing information. What should you do? A.)Assign each user an IP address and instruct the user to enter the IP address in his or her computer. B.) Install the WINS service on your server C.)Install the DHCP service on each workstation D.)Install and configure the DHCP service on your server.

D

Uses an RF transmitter. May include such features as motion detection, schedule recording, remote viewing, and automatic cloud storage. A.)Thermostat B.)Switch C.)Bulb D.)Plug E.)Security Cameras F.)Door Lock G.)Speaker/Digital Assistant

E

You are trying to connect a new USB device to your computer. You install the driver and then connect the device to an open USB port. The device does not work. Which of the following troubleshooting steps is the BEST to try first? A.) Replace the USB device B.) Try a different USB cable C.) Install a new USB controller card D.) Make sure the USB device is plugged in properly

D

You are using a crimper to attach an RJ45 connector to a Cat 6 UTP cable. You need to use the T568A standard to connect the individual wires to the connector. Which wire should be connected to pin 1? A.)Green B.)Blue C.)Orange with white D.)Green with white

D

You connect your computer to a wireless netwrok at the local library. You find that you can't access several websites you need to on the internet. Which of the following is the MOST likely cause of this problem? A.)A firewall is blocking ports 80 and 443. B.)Port triggering is redirecting traffic to the wrong IP address. C.)The router has not been configured to perform port forwarding. D.)A proxy server is filtering access to websites.

D

You have a DVD-ROM disc with no label, and you want to know if it has any important files on it. You insert the DVD-ROM into your optical media drive, then you double-click the drive letter for the optical drive to see the contents of the disc. If the DVD-ROM is not a valid disc, which error message will you see? A.) Foreign B.) Unreadable C.) Missing D.) No Media

D

You have a Windows system shared by three shift workers. Files that are used by all users are stored on the D:\ drive in a various folders. the users have created hundreds of files on this drive and sometimes experience difficulty finding the files they need. What should you do? A.)Add on additional drive to the system and configure a new Storage Space using the files from the old D:\ drive. B.)Configure Work Folders for the folders on the D:\ drive. C.)Configure visual settings to optimize performance. D.)Configure indexing to include the D:\ drive.

D

You have a computer with an onboard LAN adapter. The LAN adapter has failed, and you are unable to connect the computer to the network. What should you do? A.)Clear the CMOS settings B.)Replace the motherboard C.)Add a network card using an AGP slot. D.)Add a network card using a PCI slot.

D

You have a disk in your system that is displayed in the Disk Management utility. The disk icon includes a red arrow that is pointing down. Which of the following would you expect to see, in the space where the red outline is, as the status of this disk? A.) Unreadable B.) Initializing C.) Foreign D.) not initializing

D

You have a fairly new computer that was installed with an old version of Windows Vista. This was requires to fix some software your company is still supporting. To maintain the data collected while running Vista, You decide that it would be best to upgrade this computer to Windows 10 instead of doing a clean install. Knowing that you can't upgrade directly to Windows 10 from Vista, you plan to fist upgrade to Windows 7 and then upgrade from Windows 7 to Windows 10. Which of the following would BEST help you determine whether the computer will support Windows 7? A.)Windows Easy Transfer B.)Windows Update C.)User State Migration Tool D.)Windows Upgrade Advisor

D

You have been asked to draft a document related to evidence gathering that contains details about personnel in possession and control of evidence from the time of discovery up through the time of presentation in court. What type of document is this? A.)Rules of evidence B.)FIPS-140 C.)CPS (certificate practice statement) D.)Chain of custody

D

You have been having trouble with your laptop crashing. You would like your computer to create a memory dump file when it crashes. Where should you place the paging file? A.)On a USB flash device. B.)Split between two storage devices C.)On a drive other than where the operating system files are stored D.)On the system volume.

D

You have decided to install a new Ethernet network adapter in your Windows 10 desktop computer. After installing the card and booting to Windows, you notice that you have no network connection. After looking in Device Manger, you see that the new network card was detected, but Windows doesn't know what it is. After doing a quick search on the internet, you find what looks like the correct driver and install it. A reboot of Windows is performed, but almost immediately after logging on, your computer crashes. Thinking this must be a fluke, you reboot again with the same result. Which of the following is the BEST tool to get Windows to load properly? A.) Boot from the Windows installation DVD and restore your computer back to a previous restore point. B.) Boot from the Windows installation DVD and run Start-up Repair C.) Boot to the computers BIOS/UEFI settings and uninstall the network driver D.) Boot to Safe Mode and uninstall the network driver

D

You have four volumes on a basic disk. You convert the disk to dynamic. After the conversion, which of the following are you MOST likely to see as the status of the fourth volume if it valid and has no errors? A.) Healthy (Dynamic) B.) Healthy (Logical Drive) C.) Healthy (Primary Partition) D.) Healthy E.) Healthy (Basic)

D

You have four volumes on a basic hard disk. Which of the following are you MOST likely to see as the status of the fourth volume if it is valid and has no errors? A.) Healthy B.) Healthy (Dynamic) C.) Healthy (Basic) D.) Healthy (Logical Drive) E.) Healthy (Primary Partition

D

You have implemented a regular backup schedule for a Windows system, backing up data files every night and creating a system image backup once a week. For security reasons, your company has decided to not store a redundant copy of the backup media? Where would be the next best place to keep your backup media? A.)On a shelf next to the backup device. B.)In a drawer in your office. C.)In a locked room. D.)In a locked fireproof safe.

D

You have installed a device in your system and the system does not recognize the device. Which of the following BEST describes why the device was not discovered? A.) The device driver was installed before the device was installed B.) The device connects to the USB bus C.) The device does not require a driver D.) The device does not support plug and play

D

You recently installed several applications on a Windows system. After doing so, you notice that the system takes much longer to boot up. You suspect that the new application include one or more helper applications that are automatically loaded when the system boots. To improve performance, you want to identify any such helper applications and disable them. Which tab in Task Manager would you use to do this? A.)Processes B.)Performance C.)App history D.)Startup E.)Users F.)Details G.)Services

D

You have just connected a new USB device to your Window system. You used the installation disc that came with the device to install the drivers needed to support the device. Since the installation, the system frequently crashes when you try to access the new device. Which of the following steps would MOST likely resolve this issue? A.) Run the Add Legacy Hardware wizard and manually configure the device B.) Remove and then reinstall the device C.) Replace the device itself D.) Download and install the latest driver from the manufacturer's website.

D

You have just finished installing Windows on a system that contains four physical hard disk. The installation process has created a system volume and a C: volume on the first disk (Disk 0). The installation process also initialized the second disk (Disk 1) and the third disk (Disk 2), but did not create any volumes on these disks. Which of the following would you expect to see as the status Disk 1 and Disk 2? A.) Unreadable B.) Healthy C.) Formatting D.) Unallocated E.) Unavailable F.) Initializing

D

You have just install a maintenance kit in your laser printer. Which of the follwoing is the BEST next step to perform? A.)Reinstall the print drivers. B.)Use the automatic cleaning feature. C.)Check the gap between the print head and the paper. D.)Reset the page count.

D

You have just purchased a new computer that runs Windows 10. You would like to transfer all of the applications and user data from your old computer, which is running Windows 7, to the new computer. Which of the following steps is the BEST course of action? A.)Remove the hard disk from the old computer and install it into the new computer. Add shortcuts to your old applications. B.)Move the hard disk from the old computer to new computer. Reinstall Windows 10 using the hard disk from the old computer. C.)Run Windows Easy Transfer on the old computer and the new computer. Reinstall any application. D.)Manually install application, copy data, and configure setting on the new computer.

D

You have physically installed a new hard disk in your computer, configured the disk in the BIOS using the CMOS setup program, and partitioned the disk. You try to access the hard disk drive in Windows Explorer, but get an error message. Which utility will most likely use to solve the problem? A.) sfc B.) fdisk C.) chkdsk D.) format

D

You have purchased a 1600 x 1200 LCD monitor and connected it to the DVI-I port on your computer using a DVI-D cable. You configure the screen resolution at 1280 x 1024 with 24-bit color. This display output seems to be fuzzy and stretched. Which of the following BEST describes the action you should take to correct the problem? A.) Replace the DVI-D cable with a DVI-I cable B.) Replace the DVI-I cable with a DVI-A cable C.) Increase the color depth to 32-bit D.) Change the screen resolution to the native resolution of the monitor

D

You have purchased new computers and will be disposing of your old computers. Instead of recycling the computers, you decide to resell them by placing an ad on the Internet. These computers were previously steps MUST be completed prior to getting rid of the computers? A.)Reformat the hard drives B.)Include the original operating system discs and product keys with the computers C.)Delete user data and applications from the hard drives D.)Use data wiping software to clear the hard drives

D

You have recently been called to troubleshoot network connectivity problems at a user's workstation. You have found that the network cable runs across high-traffic areas on the floor, causing the cable to wear through and break. You have replaced the cable with a plenum-rated and shielded twisted pair cable. You would like to minimize the problem and prevent it from happening again. Which of the following will BEST protect the cable from further damage? A.)Run the cable under the carpet. B.)Encase the cable in a protective shield and secure the cable to prevent it from slipping. C.)Periodically check the cable for kinks and wear. Replace the cable when necessary. D.)Run the cable through the ceiling area instead of across the floor.

D

You have removed the bezel from a notebook display that has stopped functioning. You see a DC-to-AC power inverter at the base of the screen. Which of the base of the screen. Which of the following BEST describes the type of display you are working with? A.)A plasma display that does not use backlighting B.)An LCD display that uses LEDs for backlighting C.)An LED display that does not use backlighting D.)An LCD display that uses CCFL backlighting

D

You just bought a new notebook. The system uses UEFI firmware and came with Windows 10 preinstalled. However, you want to use Linux on this system. You download your favorites distribution and install it on the system, removing all Windows partitions on the hard disk in the process. When the installation is complete, you find that the operating system won't load when the system is rebooted. Which of the following would allow your computer to boot to Linux? A.)Enable SecureBoot in the UEFI configuration. B.)Set the boot order to boot from the hard disk first int eh UEFI configuration. C.)Reinstall Windows 10 on the system. D.)Disable SecureBoot in the UEFI configuration. E.)Enable the TPM chip on the motherboard.

D

You manage two computers with the following user accounts: * Wrk1 has user accounts Mary and Admin. The Mary account does not have a password set; the Admin account does. * Wrk2 has user accounts Mary and Julia. The Mary account has a password set; the Julia account does not You are working from Wrk2 and would like to access a shared folder on Wrk1. What credentials should you use to access the shared folder? A.)Type 'Julia' for the username and leave the password blank. B.)Type 'Mary" for the username and leave the password blank. C.)Type 'Mary' for the username and specify the password. D.)Type 'Admin' for the username and specify the password.

D

You need to configure File History to automatically delete any stored snapshots that are older than one month. Which option in Control Panel would you use? A.)Restore personal files B.)Select drive C.)Exclude folders D.)Advanced settings

D

You need to connect a new USB scanner to the USB port on your computer. However, the first time you plugged the scanner in, it was not recognized. What should you do? A.) Start the Add a Device wizard and then connect the scanner to the USB port. B.) Connect the scanner to the USB port. Complete the Add a device wizard, which includes installing the drivers. C.) Connect the scanner to the USB port. D.) Install the scanner drivers and then connect the scanner to the USB port and complete the Add a Device wizard when it pops up.

D

You need to replace the hard disk in your laptop computer. Which of the following hard drives sizes would you likely choose for the laptop? A.)1.25" B.)5.25" C.)3.5" D.)2.5"

D

You recently purchased a copy of Windows 10 from a retail store. The system you want to install Windows on doesn't have an optical drive. What is the BEST option for installing Windows in this scenario? A.)Install the system over the network from a Windows Deployment Service (WDS) Server. B.)Perform a Reset installation. C.)Install Windows on a system that has an optical drive and then create a disk image and copy it to the system you originally wanted to install Windows on. D.)Use the Windows USB/DVD Download Tool to copy the installation files to a USB flash drive.

D

You replaced the print cartridge on an inkjet printer. What should you do next? A.)Replace the fuser roller assembly. B.)Send the printer to the factory for a realignment. C.)Replace the ribbon as well D.)Calibrate the printer.

D

You replaced the print cartridge on an inkjet printer. Which of the follwoing BEST describes the next step you should preform? A.)Replace the ribbon. B.)Send the printer to the factory for a realignment. C.)Replace the fuser roller assembly. D.)Calibrate the printer.

D

You use your computer to type documents in Portuguese that will be sent to Brazil. You purchase a second keyboard designed specifically for Portuguese. Which Windows setting would you use to configure your computer for the new keyboard so you can switch between the Portuguese and English keyboards? A.)Apps B.)Devices C.)Personalization D.)Time & Language

D

You want to complete storage space from two different hard disks into a single logical storage unit on your Windows computer. Which of the following is the BEST step to perform? A.) Use basic disks and an extended partition B.) Use basic disks and a primary partition C.) Use dynamic disks and a simple volume D.) Use dynamic disks and a spanned volume

D

You want to configure your Windows 10 workstation so that it can get Windows update directly from other Windows 10 systems on the network that have already download them from Microsoft. What options in the Setting app would you use to do this? A.)Give me updates for other Microsoft products when I update Windows. B.)Defer upgrades. C.)View your update history D.)Choose how updates are delivered

D

You want to implement name resolution on the Linux workstations in your company. Which protocol will you use to do this? A.)LMHOSTS file B.)SMTP C.)NTP D.)DNS E.)WINS

D

You want to set up a Windows system to also to boot in Linux. To be able to dual boot, the system needs a partition on which to install Linux. However, you don't have an extra hard disk that can be used for the Linux partition. the existing disk has no unpartitioned space available, but it has about 300 GB of free space. Which of the following disk management operations will BEST prepare your hard disk for dual boot? A.) Reformat the disk with the partition needed for a dual boot system B.) Convert the disk from basic to dynamic C.) Convert the disk from the physical partitions to logical partitions D.) Shrink the primary partition

D

You want to upgrade your Windows 7 system to Windows 10. You want to keep your personal settings intact and complete the upgrade as quickly as possible. You purchased an upgrade version of Windows and perform an in-place upgrade. Which of the following is the BEST next step? A.)Reinstall all applications. B.)Restore user data files from backup C.)Run the Windows Easy Transfer wizard. D.)Make sure that all installed applications run correctly.

D

You want to use Hibernation on your Windows notebook. What does it need to have? A.)A Pentium IV or better processor B.)A minimum of GB of RAM C.)UPS D.)Enough free hard drive space

D

You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task? A.)NetBEUI B.)PPP C.)SLIP D.)PPTP

D

You work for a small company as the human resources specialist. Since your company is fairly small, you are maintaining all of the employee information in your desktop computer, which is running Windows 10. This computer has two-capacity hard disks. You want to ensure that this information is protected from a hard disk failure, so you want to set a Windows software RAID system. Which of the following would be your BEST solution? A.) Use RAID 5 volumes B.) Use striped volumes C.) Use spanned volumes D.) Use mirrored volumes

D

You're conducting scheduled maintenance on a laser printer. You notice that there is a build-up of excess toner inside the interior of the printer. Which of the following is the proper way to remove it? A.)Wipe it out with a wet, soapy rag using a mild detergent. B.)Sweep it out with a small broom. C.)Blow it out with compressed air. D.)Use an anti-static vacuum.

D

You're troubleshooting a notebook system that uses a digitizer pad and stylus for user input. The user has complained that the digitizer pad registers stylus taps about one inch to the right of where the laps actually occur. Which of the following action MOST likely fix this issue? A.)Replace the digitizer pad. B.)Replace the stylus C.)Remove any scratches from the digitizer pad. D.)Recalibrate the digitizer pad. E.)Hold the stylus at an increased angle

D

You've just installed a new video card in a user's Window workstation. When the system is powered on, the screen is displayed in 16 colors at 640x480 resolution. Which of the following will BEST resolve this problem? A.) Upgrade the monitor to one that supports a higher sync rate B.) Reboot the system into Safe Mode C.) Verify that the system UEFI firmware is compatible with the video card. D.) Download and install the latest driver from the video card manufacturer's website

D

Your anti-malware software has detected a virus on your Windows 10 system. However, the anti-malware software is unable to remove it, and when you try to delete the files, you can't because they are in use. What should you try first? A.)Run Sfc.exe. B.)Update the anti-malware definition files. C.)Reset the operating system. D.)Boot into Safe Mode and try removing the malware.

D

Your compant needs to print a lot of high-quality black-and-white test documents. These documents needs to be printed as quickly and inexpensively as possible. The printer must also have the capacity to perform duplex printing. Which of the following printer BEST meets the printing requirements for your company? A.)Inkjet B.)Dot matrix C.)Thermal D.)Laser

D

Displays active sessions, ports, sockets, and the local routing table. specified hostname. A.)ipconfig B.)ping C.)tracert D.)nslookup E.)netstat

E

Your computer's hard drive is currently formatted as FAT32, but you want to take advantage of the features offered to NTFS drives. Which of the following steps would MOST likely allow you to do this without losing the existing data? A.) In Disk Management, delete the existing partition or volume. Recreate the partition or volume. Recreate the partition or volume with the same settings and choose NTFS instead of FAT32. B.) Use the format command with the /p switch C.) Reformat the drive using Disk Management D.) Use the convert command at a command prompt

D

Your laser printer prints a vertical line on every page. You change the toner cartridge but the problem does not go away. What is the most likely problem? A.)The photosensitive drum is wearing out. B.)The fuser assembly is damaged. C.)The paper is poor quality. D.)A corona wire is dirty.

D

A user is configuring an email client application and plans to use a standard TCP/IP suite protocol to retrieve email messages from an email server. Which of the following TCP/IP suite protocols can be used to retrieve email messages? (select TWO). A.)Lightweight Directory Access Protocol (LDAP) B.)Simple Mail Transfer Protocol (SMTP) C.)Simple Network Management Protocol (SNMP) D.)Internet Message Access Protocol (IMAP) E.)Post Office Protocol (POP3)

D and E

A user reports that his machine will no longer boot properly. After asking several questions to determine the problem, you suspect the user unknowingly download malware from the internet, and that the malware corrupted the boot block. Based on your suspicions, which of the following actions would you MOST likely take to correct the problem? (Select TWO.) A.)Boot into Safe Mode and try removing the malware. B.)Run stc.exe. C.)Have the user attend an internal internet safety training course. D.)Boot from the Windows installation DVD and use the Recovery Environment to run startup repair. E.)Reimage the machine.

D and E

Which of the following are valid IPv6 addresses? (Select TWO.) A.)165.15.78.53.100.0 B.)343F:1EEE:ACDD:2034:1FF3:5012 C.)A82:5B67:7700:AH0A:446A:779F:FFE3:0091 D.)6384:1319:7700:7631:446A:5511:8940:2552 E.)141:0:0:0:15:0:0:1

D and E

Which of the following correctly describes the most common format for expressing IPv6 address(Select TWO.) A.)Binary numbers B.)128 numbers, grouped using colons C.)Decimal number D.)Hexadecimals numbers E.)32 numbers, grouped using colons

D and E

You are an IT technician for your company. As part of your job, you must manage and support a wide variety of devices. Which of the following devices MOST likely uses a micro-USB connector? (Select TWO) A.) Printers B.) Scanners C.) Network hubs and modems D.) Smartphones E.) Digital cameras.

D and E

You have just finished installing a new SATA hard disk in your computer. Now your SATA DVD drive won't work. Which of the following troubleshooting steps is the BEST to try first? (Select TWO) A.) Set the DVD drive to slave and the hard disk to Master B.) Try the DVD drive in another system C.) Remove the hard disk D.) Make sure that the DVD power cable is connected E.) Make sure that the DVD SATA cable is connected F.) Replace the DVD drive

D and E

You manage a Window system. You want to view information about your computer, including the CPU utilization and information about disk I/O operations. Which tool could you use to do this? (Select TWO) A.)Services B.)Device Manager C.)Disk Management D.)Performance Monitor E.)Task Manager

D and E

You want to make sure that you always have the latest patches installed on your workstation for an order entry application created by DataComLink corporation. What should you do? (Select TWO.) A.)Download any patches from the company as you are notified of them. B.)Configure Windows Update to download updates for other Microsoft products when Windows is updated. C.)Configure Windows Update to download and install updates automatically. D.)Configure the application to automatically download and install updates as they are released. E.)Check the DataComLink Website regularly for patches and update to the software.

D and E

You are in the process of purchasing several new Windows-based computers to replace broken or outdated computers. You have heard that solid state drives (SSDs) can significantly increase the overall performance of the system. Which of the following BEST describes the features of SSDs compared to HDDs? (Select TWO) A.) An SSD can be adversely affected by magnetism B.) SSD spindles spin at a faster rate than HDD C.) An SSD has the best Mean Time Before Failure (MTBF) D.) An SSD opens files faster than HDD E.) An SSD stores a large amount of storage cheaply F.) An SSD uses flash technology to store data

D and F

A technician is configuring the static TCP/IP setting on a client computer. Which of the following configurations are needed for internet communications? (Select THREE) A.)APIPA address B.)WINS address C.)DHCP address D.)DNS server address E.)IP address including a subnet mask (IPv4) or subnet prefix length (IPv6) F.)Default gateway address G.)Alternate IP address

D, E, and F

Packaging (Form)

DDR2, DDR3, DDR4 etc...

DDR4

DDR4 doubles the data transfer rate of DDR3

The human resources department wants to give gifts away at the company's summer party. They would like to have an assortment of fitness tracker wristbands, smartwatches, smart glasses, and virtual reality headsets. They have been trying to locate these on the internet, but have been unsuccessful. Which of the following types of mobile devices should you tell them to search for? A.)e-Readers B.)Tablets C.)Smart phone D.)Phablets E.)Wearable devices

E

To access the internet through the Publicly Switched Telephone Network (PSTN), what kind of connectivity device must you use? A.)Switch B.)DTE C.)CSU/DSU D.)TDM E.)Modem

E

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While talking to her, you discover that she is trying to work from the break room two floors above the floor where she normally works. Which of the following is the MOST likely cause of her connectivity problem? A.)The wireless network access point on the user's normal floor has failed. B.)The user has not yet logged off and back on to the network while at her new location C.)The User has not yet rebooted her laptop computer while at her new location D.)The user needs a new IP address because she is working on a different floor. E.)The user is out of the effective range of the wireless access point on her floor.

E

A user on your network has been moved to another office down the hall. After the move, she calls you to complain that she has only occasional network through her wireless connection. Which of the following is MOST likely the cause of the problem? A.)An SSID mismatch between the client and the WAP B.)The client has incorrect WPA2 C.)The encryption level has been erroneously set back to the default setting. D.)The client system has moved too far away from the access point. E.)An SSID mismatch between the client and the sever

E

Bryce's computer is acting unusually sluggish today. He calls you, an IT technician, to see if you can find out what is going on and to improve his computer's performance. You run Task Manager on Bryce's computer and find that a suspicious application has nearly 90% CPU utilization. Which of the following can be used from Task Manager to stop the application from running? A.)Right-click > Disable B.)Right-click . Disconnect C.)Right-click > Switch to D.)Right-click > Stop E.)Right-click > End task

E

Display current connections and incoming and outgoing connections. specified hostname. A.)ipconfig B.)ping C.)tracert D.)nslookup E.)netstat

E

Uses blue laser light. which has a short wavelength, allowing data to be packed more tightly onto the disc and is rewritable. A.) Compact Disc (CD) B.) Compact Disc (CD-RW) C.) Digital Versatile Disc (DVD) D.) Digital Versatile Disc (DVD-RW) E.) Blu-ray Disc (BD-RE) F.) Blu-ray Disc (BD)

E

Which connect is most commonly used to connect printers to desktop PC system? A.)IEEE 1284 B.)802.11 wireless card C.)Firewire D.)Ethernet network card E.)USB

E

Which of the following is a valid IPv6 address? A.)FEC0:9087:AB04:9900:7GA2:CEDF:349A B.)FEC0:AB04:899A C.)FEC0:AB98::A79845:4567 D.)199.12.254.11 E.)FECO::AB:9007

E

Which of the following is a wired networking method most commonly used today by desktop PCs and other network devices to connect to a local area network? A.)Token Ring B.)802.11n C.)Bluetooth D.)ArcNet E.)Ethernet

E

Which of the following measures will make your wireless network less visible to the casual attacker? A.)Use a form of authentication other than Open authentication. B.)Implement MAC address filtering C.)Change the default SSID D.)Implement WPA2 Personal E.)Disable SSID broadcast

E

Which of the following security technologies stores identification information in a magnetic strip, radio frequency transmitter, or hardware contact to authorize access to a computer? A.)SSID B.)Biometric C.)Key fob D.)ID badge E.)Smart card

E

While configuring a computer, you find that you need to create, format, and manage the partitions and volumes on your hard drives? Which of the following is the BEST command line utility use? A.) Disk management B.) DiskMan C.) chkdsk D.) format E.) DiskPart

E

While configuring a wireless access point device, a technician is presented with several security mode options. Which of the following options will provide the most secure access? A.)WPA and AES B.)WPA2 and TKIP C.)WEP 128 D.)WPA and TKIP E.)WPA2 and AES

E

You are a PC technician for a national company retailer. You are asked to build a system. What system is list below? -Intel Celeron dual-core 2.7 GHz CPU -500 GB SATA HD -2 GB DDR3 RAM -Few or no application installed A.)Home office server B.)Gaming PC C.)Home Theater PC D.)Virtualization workstation E.)Thin client workstation F.)Audio/video editing workstation

E

You have a computer running Windows 10 Home. You need to access the contents of a flash drive. The flash drive has been formatted with the eFAT file system. You want to read the flash drive on your computer as quickly as possible with the least amount of effort. What should you do? A.) Upgrade the computer to Windows 10 Professional B.) Install an exFAT reader application on your computer C.) Install the latest Windows 10 service park D.) Run convert.exe on the flash drive to convert it to FAT32 instead of exFAT E.) Do nothing. Windows 10 can natively access exFAT file system

E

You have a hard disk that has a single primary partition and has been assigned D: as the drive letter. Which tool would you use to configure the drive to use the FAT32 file system? A.) convert B.) fdisk C.) chkdsk D.) msconfig E.) format

E

You have purchased an LED monitor and connected it to the HDMI port on your computer using an HDMI cable. You configure the screen resolution to 1280 x 1024 with 32-bit color. The geometry of the images displayed on the screen appear to be distorted. What should you do to correct the problem? A.) Update the video driver to the latest version B.) Use a DVI cable to connect the monitor instead of an HDMI cable C.) Change the screen resolution to 1400 x 1050 D.) Increase the hardware acceleration setting on the video driver E.) Set the display resolution to the native resolution to the monitor

E

You need to replace the video card in a laptop. What is the first step? A.)Remove the display wires if the video card is integrated into the motherboard. B.)Remove the keyboard. C.)Remove the access panel at the bottom of the laptop. D.)Remove the bezel E.)Find a service manual with correct disassembly procedures

E

You want a storage device that has the ability to: -Integrated data and device power into a single cable -Use a connector and port that is neither L-shaped nor rectangular Which of the following SATA devices is the BEST to use? A.) SATA2 B.) SATA3 C.) eSATA D.) eSATAp E.) SATA

E

You want to use a wireless keyboard and mouse with your laptop computer. Which method should you choose? A.)IEEE 1394 B.)802.11g wireless C.)USB D.)PS/2 E.)Bluetooth

E

You're using a Linux distribution that uses RPM for package management. Which command would you use to display a list of all packages available for installation within the internet repositories configured on this system? A.)apt-get list B.)ps -ef C.)ps -e D.)yum list all E.)yum list available F.)apt-get list available G.)yum show available H.)yum show all

E

Which of the following are not valid IP addresses? (Select THREE.) A.)132.64.32.8 B.)1.55.254.3 C.)122.0.0.0 D.)116.0.0.116 E.)45.22.156.256 F.)145.8.260.7 G.)257.0.122.55

E F and G

You are a PC technician for a national company retailer. You are asked to build a system. What system is list below? -Intel Core i7 six-core 3.4 GHz CPU -2 TB SSD SATA HD -16 GB DDR4 RAM -High-end audio adapter with speaker system -High-end video adapter with dual displays A.)Home office server B.)Gaming PC C.)Home Theater PC D.)Virtualization workstation E.)Thin client workstation F.)Audio/video editing workstation

F

You're troubleshooting a computer that runs Windows 10. The operating system has halted. and a blue screen isdisplayed on the monitor with an error message. What is the first step you should take to troubleshoot the issue? A.)Update the BIOS. B.)Check the voltage levels on the DC side of the power supply. C.)Remove all memory modules and replace them one at a time until the error appears. D.)Uninstall the last application or system update that was installed. E.)Search for the error using an internet search engine. F.)Search for the error in Microsoft's knowledge base.

F

Which of the following are valid IP addresses? (Select TWO.) A.)10.384.0.3 B.)256.0.0.1 C.)1.254.1.1024 D.)192.168.1.512 E.)254.7.1.417 F.)172.16.1.26 G.)2.2.2.2

F and G

To determine a computer's power requirements

Find the watt requirement for each component by multiplying volts by amps (W = V × A). Add each value together to find the total watt requirements. Use online tools

You want to build a computer that can stand upright on a desk and take up the least amount of space possible. Which case should you choose?

Micro ATX slim tower

You want to build a new desktop computer that is portable that you can easily take it to your friends' houses for gaming parties. Which of the following form factors would you likely select?

Micro-ATX

Digital audio

Most audio devices, such as stereo consoles, TVs, and speakers require analog audio. Newer devices such as some CD players, DVD players, and HDTVs, are capable of processing digital audio signals

Configure CMOS Settings

Most motherboards automatically detect the processor speed. If not, you might need to use jumpers or edit the CMOS to configure the processor speed. For newer processors released after the motherboard, you might be able to add support for the processor by updating the BIOS

Memory slots

Most motherboards have multiple. They are designed to be compatible with a specific type of memory module.

Bus type

PCIe X16, PCI, AGP and VESA

I/O connectors Include

PS/2 mouse and keyboard ports. USB ports. Serial ports (COM 1, 2, 3, and 4). Parallel port. Audio jacks. Ethernet port

To test a power supply, you want to use a multimeter to measure the voltage on a Molex hard disk drive connector. To do this, you need to turn the power supply on. Which pins on the 24-pin motherboard connector coming from the power supply give me shunted to turn the power supply on?

Pins 15 and 16 Pins 16 and 17

System locks up shortly after startup

This symptom is possibly thermal issue. Check for this problem by shutting down, letting the system cool off, and restarting the computer to verify whether the problem repeats itself. If the computer is not overheating but has this symptom, the problem could be the clock or system timers in the BIOS/UEFI are set incorrectly.

Which connector on the back of a computer is used to attach a mouse to a modern PC system? a. High-density (three row) female DB-15 b. Low-density (two row) female DB-15 c. RJ45 d. USB A e. USB B

a

Which of the following IP address ranges is reserved for Automatic Private IP addressing? A.)169.254.0.1-169.254.255.254 B.)169.168.0.1-169.168.255.255 C.)169.192.0.0-169.192.254.255 D.)192.168.0.1-192.168.254.255 E.)192.168.0.0-192.168.255.254

a

You need to replace a broken monitor on a desktop system. You decide to replace it with a spare monitor that wasn't being used. Even though the monitor is made by a different manufacturer than the desktop computer, it still works with the computer. Which computer design concept makes this possible? a. Standardization b. Plug and play c. Firmware d. Componentization

a

You work at the IT Help Desk in your company. An employee calls to report a problem with her workstation and a service ticket is assigned to you. You respond to the service ticket immediately and arrive at the employee's workstation within minutes; however, when you begin speaking to her, you can't understand what she is saying because she is speaking Spanish, and you do not understand Spanish. What should you do? a. find an interpreter b. use hand gestures to communicate c. ignore the user and work on the computer d. walk away and assign the problem to someone else

a

You work for a store that sells and repairs computers. Due to the room's layout, while repairing computers, you must walk from one side of the carpeted room to the other frequently. Which of the following would BEST protect you from static electricity buildup? a. ESD wrist strap b. Self-ground c. ESD heel strap d. ESD mat

a

_______________ Ability to use multiple processing devices. a. Multiprocessing b. Multitasking c. Multithreading

a

A user reports that he cannot access several network files. After some investigation, you determine that the problem is with a network server. Which of the following actions should be performed next? a. fix the problem b. determine if escalation is needed c. create an action plan d. document the problem

b

The CEO of your small company has asked you to connect his laptop computer to the small conference room LED TV. The CEO will be showing a new promotional video that demonstrates the new compant strategy through images and sound. Which of the following cable types would work BEST for connecting his laptop to the display? a. VGA b. HDMI c. Composite d. DVI

b

You are talking with a customer support technician on the telephone. The technician recommends downloading a particular driver from the internet. When you try to connect to the internet using your dial-up modem, you can't. What is the problem? A.) The ISP access number is incorrect B.)You need to hang up C.)You need to install and configure TCP/IP D.)You need to disable call waiting

b

You had just installed a new USB card reader in your Windows computer. Every time you perform a certain action using the card reader, you get an error message that you've never seen before. Which of the following actions should you perform first? a. install the device on another computer b. check the manufacturers website for information about the error c. replace the card reader with a new device d. uninstall the deice and reinstall it

b

You have been notified that windows domain does not seem to be functioning. Being familiar with domains you are confident you know what the issue is. But just to be safe you take the applicable time to gather information and identify what has changed. Which of the following is the Best next step? a. gather information b. create a hypothesis c. implement the fix d. determine the appropriate fix e. Identify what has changed

b

Which of the following is true of the way many large digital media vendors are using Digital Rights Management technology? (Select TWO.) A.)They are offering free backup copies of protected digital files. B.)They are adopting alternatives to DRM such as encouraging customers to not illegally share digital files. C.)They are cooperating with other vendors to make their digital files more portable to other vendors' hardware and software. D.)They are moving away from DRM because of several key shortcomings in the technology. E.)They are moving to strengthen the encryption used to protect their digital files.

b and D

Which documents are generally finished and approved before a project begins? (Select Three) a. change order form b. resource allocation documentation c. budget d. project plan

b and c and d

Which of the following are common tools used to physically clean the inside of a computer? (Select TWO) a. damp rag b. natural bristle brush c. wire brush d. compressed air e. industrial degreaser

b and d

BTX

balanced technology extended. designed as a replacement for the ATX but did not gain widespread adoption (Implemented mainly by Dell). airflow is increased. No heatsink fan. thermal module over the CPU moves heat directly out of the system. back panel orientation and mounting location is reversed.

You are troubleshooting a Windows 10 system that won't boot. The system appears to initialize just fine and post completes correctly. However, Windows doesn't load, and an error message is displayed on the screen, indication the operating system couldn't be found. You determine that the Master Boot Record (MBR) is corrupt. To fix the issue, you do the following: 1. Boot the system from the Windows 10 installation DVD. 2. Access the Recovery Environment. 3. Open a Command window. What command can you run at the command prompt to address this issue?

bootrec /fixmbr

DDR2

bus speed: 200, 266, 333, 400, 533 MHz

DDR3

bus speed: 533, 667, 800, 900, 1000 MHz

DDR4

bus speed: 800, 933, 1066, 1200, 1333, 1600 MHz

A user sends a print job to a network printer and it prints page after page of random characters. He calls the help desk and a technician discovers that somehow the wrong printer driver had been loaded on the users workstation. The technician loads the correct driver, verifies that the system works correctly, and documents the resolution. Which of the following should the tech perform next? a. upgrade to a newer printer that uses embedded drivers b. disable the network printer until users learn to use the correct drivers c. educate the user as to how the problem was resolved and verify that they are satisfied d. write an email to the supervisor and insist he train his employees e. formally close the incident in any job tracking tool

c

An employees computer continually reboots when it is powered on. You suspect the power supply may be failing. Which of the following is the best way to determine whether the power supply is causing the reboots? a. replace the power supply b. List for POST code beeps c. Use a multimeter to test the power supply d. verify the fan on the power supply is spinning

c

What Mac key is used for application shortcuts and navigation shortcuts. a. Fn b. Command c. Option d. Control

c

Pin 8 on the power supply connector

connects to the power good wire on the motherboard. If power disappears off that wire, the motherboard shuts down. If power quickly reappears on that wire, the system may attempt to come back on by itself, resulting in continual reboots. If power does not reappear on this wire, then the system will shut off.

Support manual

contain technical specifications as well as diagrams that identify the motherboard's components.

A frantic user calls you exclaiming "Nothing is working". Which of the following actions should you perform first? a. back up the system b. find out what has changed c. Establish a plan of action d. identify the problem e. establish a theory

d

A technician works in a factory where there is significant amount of EMI. Which of the following network cabling options would be best for reestablishing network communications? a. coaxial b. cat 7 c. Cat 5e d. Fiber optic

d

A user calls and explains that her monitor does not work. While troubleshooting the issue, you discover a bad video card in the system. You replace the card you connect the monitor cable to the card. Which of the following actions should you perform next in the troubleshooting strategy? a. explain what you did to fix the problem b. implement preventative measures c. document the solution d. test the solution

d

A user reports that he can't send print jobs to a specific printer. You go to the user's computer and reproduce the problem. Which of the following actions should you perform Next? a. establish the most probably cause b. establish a plan of action c. determine if escalation is necessary d. determine whether anything has changed

d

You are in the process of setting up several servers in your network. During the process one of the servers is misconfigured and having trouble synchronizing information with other servers. Which of the following is the best next step? a. Identify what has changed b. Determine the appropriate fix c. implement the fix d. gather information e. create a hypothesis

d

You need to trace the route that a Cat 6 UTP cable takes through the ceiling and walls of your building. Which tool should you use? a. loopback plug b. cable tester c. multimeter d. tone generator

d

You suspect that the power supply in your desktop PC is failing. You want to use a multimeter to test the power supply. Which multimeter setting should you use? a. watts b. AC volts c. ohms d. DC volts

d

You want to know more about the usage, command syntax, and options available with Linux ifconfig command. What would you enter at the command prompt to display this information about ifconfig? a. less ifconfig b. vi ifconfig c. su ifconfig d. man ifconfig

d

Intermittent Device Failure other casuses

device drivers that aren't functioning properly. Device drivers are software and may contain coding errors. Before replacing, first verify that the latest drivers for that device have been loaded. Sometimes downloading the latest driver and installing it will solve the problem. If it doesn't, then the device itself may need to be replaced.

CPU socket

houses the CPU. There are a variety of types which have unique shapes, pin arrangements, or mounting configurations. It's important to match the motherboard socket type with the processor socket type.

motherboard (system board, logic board, or mainboard)

is a circuit board that either houses or is connected to all of the components operating in the computer.

Multi threading

is a feature of an application that allows it to send multiple threads at the same time

Level 3 (L3) cache

is additional cache beyond the level 2 cache. For multi-core systems, L3 cache is shared between all cores.

Level 2 (L2) cache

is additional cache used for both instructions and data. Depending on the processor, L2 cache might be shared between two or more cores, or exclusive to a single core.

Level 1 (L1) cache

is integrated on the processor die itself and stores instructions for the processor. On multi-core systems, each processor typically has its own L1 cache. Some processors might have two L1 caches, one for instructions and one for data.

Level 4 (L4) cache

is shared dynamically between the on-die graphics processor unit (GPU) and CPU. acts an overflow cache for the L3. Information evicted from L3 is dumped into L4

Throttling

is the process of modifying the operating characteristics of a processor based on current conditions.

AC (alternating current)

is the type of current distributed through wall sockets. The voltage alternates between a negative and a positive charge, which is good for appliances requiring a high current.

DC (direct current)

is the type of current used inside a computer. Negative particles are drawn toward a positive charge, creating a unidirectional current flow. This type of predictable reliable current is ideal for an application where a lower current is required.

4-pin peripheral power (4-pin Molex connector)

is used by legacy components, case fans, and other accessory devices. The connector provides both 5 V (red wire) and 12 V (yellow wire). Each power supply cable typically has multiple 4-pin connectors on the same cable.

NLX

new low profile extended. old form factor that was designed for use in slimline desktop computers. detachable riser card for expansion slots. Allows for the motherboard to slide in or out of the system case easily. Replaced by microATX and Mini-ITX.

microATX

smaller version of the ATX form factor. Measures 9.6" × 9.6". Has four expansion slots.

CMOS battery

used to keep an accurate date and time, even when the motherboard has no power. In older motherboards, it was also used to retain BIOS configuration settings, which were stored in volatile memory called the ___ chip.

You work for a company that uses a lot of wireless mouses and keyboards. There are a lot of alkaline batteries. Unless otherwise dictated by your local authorities which of the following would be the easiest way to deal with these dead batteries? a. they must be stored until they expire b. they can be thrown in trash c. they must be sent to hazardous waste collection d. the can be recharged

b

A Mac Os user has forgotten the location of an important spreadsheet document. Which Mac OS feature could be used to find the spreadsheet? a. Spotlight b. Key Chain c. Mission d. Remote Disk

a

A printer is behaving erratically and you suspect a faulty parallel port. Which tool can you use to test the port? a. Loopback plug b. multimeter c. ammeter d cable tester

a

A user reports that she can't turn her computer on. After some investigation, you find that the power supply is malfunctioning. What should you do next? a. create an action plan b. document the problem c. determine whether escalation is required d. fix the problem

a

Timothy works in the graphic arts department and has received approval to upgrade his video card. The card has arrived and you will upgrade. To ensure your personal safety which of the following should you do first? a. disconnect power b. remove jewelry c. put on safety glasses d. place the computer on an esd mat

a

What Mac key is primarily used for test document navigation. a. Control b. Option c. Fn d. Command

a

What would you enter at the command prompt on a Linux system to display a list of flies and subdirectories that exist within the present working directory? a. ls b. head c. tail d. less

a

You are filling out a change order form. Toward the end you explain how you will return affected hardware and software to its original state if the change fails. What is this plan called? a. backout plan b. system image plan c. risk analysis d. rollback plan

a

You are fixing a coworkers Blu Ray drive. He tells you how he installed and troubleshoot the issue. You discover he did not connect the power cable. You think "How stupid can this guy be". Then a coworker calls your cell. You connect the power supply and test the device, Which of the following professionalism principles is the tech failing to follow? (Select TWO) a. actively listening b. avoiding distractions c. argue with customer d. talking to coworkers which with customer e. avoid being judgmental

a and e

You are connecting an older dot matrix printer to a computer. The printer's cable is D-shaped connector with 25 pins. Which port type does the printer connect to? a. Serial Port b. Parallel Port c. VGA Port d. USB Port

b

You are providing telephone support for a user who is trying to connect a computer to a projector. You know that the projector only has a VGA port. How would you describe the connector that the should look for? a. D-shaped with 25 pins b. D-shaped with 15 pins c. Round with 6 pins d. rectangular with one beveled corner

b

You are the PC technician for a company. An employee has gone to a meeting while you fix the computer in her office. She accidentally left a report open next to her computer which states that a friend of yours in accounting will be submitted for review if their poor work performance continues. Which should you do? a. tell your friend about the report b. ignore the paper and tell no one c. give your friend a heads up about what you found d. tell your fellow techs about what you saw

b

Which of the following items are likely to be displayed in the notification area of a computer running the Windows operating system? (Select two.) a. Icons representing all currently open applications. b. A volume control. c. Icons representing all currently open documents. d. Shortcuts to open recently used documents. e. The current time. f. Shortcuts to launch recently used applications.

b and e

Company experiencing brownouts. Manager has asked you to find a solution to this problem. Which of the following would be the best device to recommend to your manager for computer protection? a. GFCI b. power strips c. UPS d. Surge suppressor

c

Part of the operating system core is responsible for controlling security, managing the file system, and providing a platform for applications to run on. What is this feature's name? a. Central Processing Unit b. Desktop c. Kernel d. Interface e. Driver

c

US based company has recently purchased an old office building where employees are being assigned to work. You are setting up the desktop computers, you come to one location where the nearest wall outlet has only 2 prongs. Which of the following is the Best way to proceed with that computer? a. purchase an adapter that converts the 3-prong to 2 b. get a new power cord with 2 prongs c. find a different outlet that uses 3 prongs d. use the existing cord but cut the ground prong

c

What would you enter at the command prompt on a Linux system to display the IP address and the subnet masks assigned to each network interface on a Linux system? a. mv b. cat c. ifconfig d. info

c

What would you enter at the command prompt on a Linux system to display the present working directory? a. mv b. less c. pwd d. info

c

Which Windows tool do you use to browse the file system on a drive? a. Taskbar b. Notification Area c. File Explorer d. Network

c

Which tool would be the best choice to remove and replace the motherboard BIOS chip? a. needle nose pliers b. screwdriver c. IC extractor d. combination ratchet

c

While on a service call at a customer site, you are discussing the problem with the customer when your cell phone rings. You check the caller ID, and you see that the call is related to parts you ordered for another customer. What is the most professional way to handle the situation? a. answer the call and finish as fast as you can b. answer the phone and say "I'm busy I'll call you back" c. Ask the customer if it is ok to take the call and then step into the hallway to briefly talk on the phone d. ignore the phone and let it ring

c

Windows includes a set a features that improves its visual appearance. These features include, but are not limited to: *Glass effect *Window animations *Flip 3D *Snap *Shake What is this set of features called? a. Search b. Taskbar c. Aero d. Control Panel

c

You work for a company with a large number of computers. Recently you noticed that the lights in the testing lab seem dimmer than normal and flicker. Which of the following electrical terms best describes the condition you are likely experiencing? a. power surge b. blackout c. brownout d. power spike

c

Your workstation is unable to communicate with any other computer on the network. Which of the following tools should you use to test the ability of the network card to send and receive signals? a. multimeter b. cable tester c. loopback plug d. ohmmeter

c

Which of the following will reduce the threat of static discharge when working on computer hardware? (Select TWO) a. Touch the leads on the PC with your finger b. Leave the system plugged into a grounded wall outlet c. remain in physical contact with the server chassis at all times d. store unused components in static shielding bags e. reduce the humidity in the room to 30%

c and d

Which of the following features should you look for when selecting a vacuum cleaner for your cleaning kit? (Select two) a. washable filters b. static induction motor c. non-static generating d. coarse grade bag e. one that blows and vacuums

c and e

Mission Control is a desktop and windows management utility that is used to access several Mac Os features. Which of the following are Mac features accessed through Mission Control? (Select three.) a. Secure Notes b. System Preferences c. Multiple Desktops d. Boot Camp e. All Windows f. Spotlight g. Dashboard

c and e and g

Which of the following statements about cleaning monitors and display devices is true? a. most new monitors are self clean and should not be cleaned b. monitors are best cleaned while powered on c. an LCD monitor is best clean using a lint rag and glass cleaner d. a monitor should be powered off and cleaned with a lint-free cloth

d

You are a PC technician for a company. An employee needs you to install some software on his computer over his lunch break. When you log on to the computer, you notice the employee's desktop has so many shortcuts and files that you can't even see the desktop background. Which of the following actions should you take? a. delete all the shortcuts and move the files to a single folder b. create a folder named Clutter and move everything from the desktop c. move the shortcuts into a single folder and then look at each file and organize them d. install the software and leave the employees computer exactly how you found it

d

You logged in as a user with limited system privileges. You are the Linux system administrator, and you have the password to the root user account. When you need to switch to root user to perform administrative tasks, what command should you enter at the command prompt? a. ls b. su c. -l d. su-

d

Your company has in place to upgrade employee's laptop computers. As a result you have old batteries from the laptop. Which of the following is the best way to deal with these batteries? a. they can be recharged b. they can be thrown in trash c. they must be stored on site d. they must be recycled

d

A technician attempts to run an executable file on a Linux computer and receives a Permission Denied message. Which of the following command should the technician use? a. grep b. ps c. ls d. chmod

d Explanation: The chmod command modifies the permissions on a files and defines who can access a file and the mode that can be used to access a file.

A technician uses the ps command to find information about a process that is running a browser application on a Linux computer. The technician knows the name of the process, but the list is very long. Which of the following commands would help the technician find and display only the information about the browser process? a. cd b. ls c. sudo d. grep

d Explanation: The grep command is used to search text. The technician could save the output of the ps command in a text file and then search the files, or the technician could pipe the output from the ps command into the grep command.


Conjuntos de estudio relacionados

Lifespan and Human Development w/o names

View Set

OAS 255 - Excel - Blue Sheets of Acquired Knowledge

View Set

Legal Issues + EXAM 4 + NPRO 2100

View Set

Intro to Personal Finance Chapter 1 and 2

View Set

Cognitive Psych Exam 3- Chapter 10

View Set

Umm IDK wut 2 call dis oh Hoi Piah💁🏽‍♀️🤷🏻‍♀️

View Set

ME 383 Exam 3- CH 23: Cutting Tool Technology

View Set