ExamCram: Practice Exam D (CompTIA A+ 220-902)

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

*Which of the following statements best describes how to reach the System Restore utility in Windows 7? (Select the two best answers.)* *A.* Start > right-click Computer > Properties > click the System protection link *B.* Start > right-click Computer > Advanced *C.* Run > type systempropertiesprotection.exe *D.* Start > right-click Computer > Properties > click the Advanced system settings link

*A and C.* The correct navigational path to the System Restore configuration utility in Windows 7 is Start > right-click Computer > Properties > click the System protection link. That displays the System Properties dialog box System Protection tab. But you gotta love the other method: Run > type systempropertiesprotection.exe. Without touching the mouse, you can bring up the same dialog box: Windows + R > type systempropertiesprotection.exe. Fun! Anyway, Start > right-click Computer > Advanced is not a valid path. Start > right-click Computer > Properties > click the Advanced system settings link is valid, but it brings you to the Advanced tab of the System Properties dialog box.

*Examine the following figure. Then answer the question that follows. Image The figure shows the Computer Name/Domain Changes dialog box in Windows 7. Which of the following steps best represents how to navigate to this window? (Select the two best answers.)* *A.* System > Advanced System Settings > Computer Name > Change *B.* System > Advanced System Settings > Advanced > Change *C.* Run > systempropertiescomputername.exe > Change *D.* Run > systempropertiescomputername.exe > Advanced > Change Computer Name

*A and C.* You can navigate to the window in the figure by going to the System window (from the Control Panel), clicking the Advanced system settings link, then accessing the Computer Name tab, and clicking Change. Or, by accessing Run, typing systempropertiescomputername.exe, and finally clicking the Change button.

*A user who is part of a workgroup reports that she cannot print to a new printer. Everyone else in the workgroup can print to the new printer, and the user can still automatically send print jobs to the old printer. Which of the following statements describes how to remedy the problem? (Select the two best answers.)* *A.* Add the new printer to the user's computer. *B.* Clear the print queue on the new printer. *C.* Change the user's password and permissions. *D.* Set the new printer as the default printer.

*A and D.* If a user cannot print to a brand-new printer, yet everyone else can print to it, you should check if the printer is installed on that user's computer and if it is set as the default printer. If the printer has not yet been installed, there will be no print queue to clear. However, if the printer has been installed, then the next thing to check would be if the print queue has failed. You could also check the Print Spooler. If the user was able to print to an older printer that was also shared by other users in the workgroup, then you should not have to change the user's password or permissions.

*Which of the following are components of dealing with prohibited content? (Select the three best answers.)* *A.* First response *B.* Maintaining a positive attitude *C.* Preserving data *D.* Creating a chain of custody *E.* Avoiding distraction

*A, C, and D.* When dealing with prohibited content, there will always be a first responder who is required to identify the issue, report through proper channels, and preserve data and possibly devices used. This person will be in charge of starting the documentation process which includes a chain of custody, the tracking of evidence and maintaining a chronological log of that evidence.

*Your boss wants to implement BitLocker on yet a second laptop for traveling purposes. Which of the following should be performed before implementing BitLocker?* *A.* Enable TPM in the BIOS/UEFI. *B.* Disable UAC. *C.* Defrag the hard drive. *D.* Convert the file system to NTFS.

*A.* Before implementing the BitLocker solution in Windows, you should enable the trusted platform module (TPM) in the BIOS. This is the chip on the motherboard that includes the encryption code. UAC is User Account Control, a separate security option in Windows that checks if users have administrative permissions before allowing them to carry out administrative tasks. Defragmenting the hard drive is not necessary, but it can't hurt to at least analyze the drive and see if it needs to be defragged. Defragging a drive that requires it can increase performance. BitLocker works on FAT16, FAT32, NTFS, and exFAT partitions, so no need to convert the file system.

*Your boss wants to encrypt a hard drive that will be storing critical data. Your boss needs to be able to drag and drop folders onto the volume and have them be encrypted in real-time. Which encryption technique should you suggest?* *A.* BitLocker *B.* PKI *C.* TPM *D.* Kerberos

*A.* BitLocker is a type of WDE: whole-disk encryption. It encrypts all of the contents that are created on it or copied to it in real-time. It requires a trusted platform module (TPM) on the motherboard or an encrypted USB flash drive. Only Windows 8 Pro and Enterprise, Windows 7 Ultimate and Enterprise, and Windows Vista Ultimate and Enterprise, support BitLocker when used in this manner. Other lesser versions of Windows are compatible with BitLocker To Go for reading encrypted documents from USB flash drives.

*A Windows PC is not booting correctly. You need to locate bad sectors and recover information. Which command is best?* *A.* Chkdsk C: /R *B.* Chkdsk C: /F *C.* Chkdsk C: /C *D.* Chkdsk C: /I

*A.* Chkdsk /R locates bad sectors and recover the information from them. /F fixes errors but doesn't locate bad sectors and recover the information from them. /C and /I skip certain checks of the volume (in this case C:), which ultimately reduces the time it takes to check the volume.

*One of the computers in your warehouse often requires the replacement of power supplies, CPUs, and optical drives. Which tool can help to prevent these types of hardware faults?* *A.* Compressed air *B.* Antistatic wrist straps *C.* Rescue disk *D.* Multimeter

*A.* Compressed air, if used periodically inside the computer, can help to prevent the hardware faults that occur. Most likely, the warehouse is not the cleanest, and the computer is sucking in dirt 24 hours a day. If you take the computer outside, remove the cover, and carefully blow out the dust bunnies with compressed air, you might increase the life expectancy of the hardware components. Other ways to help prevent this problem are to install a filter in front of the computer where air is drawn into the system, and to enable hibernation of the computer during off hours. During this time, the computer does not draw any air into the case, limiting the intake of dust, dirt, and other pollutants. Antistatic wrist straps are necessary when installing devices, and if they are not used, devices could become damaged, but the frequency of the issues in the question points to environmental conditions, and not ESD. A rescue disk (or rescue disc or repair disc) is used to repair an OS when a catastrophic stop error or other similar error occurs. It rebuilds the OS so that it can function again. Because in this scenario the problem is hardware-related, a rescue disk does not help the situation.

*Where can a user's Desktop folder be found in Windows by default?* *A.* C:\Users\%username%\desktop *B.* C:\Documents and Settings\%username%\desktop *C.* C:\System Volume Information\%username%\desktop *D.* C:\Users\System32\%username%\desktop

*A.* Every user profile gets a Desktop folder by default. This folder is located within the user profile folder, which is shown in the answer as a variable %username%. In a standard Windows 8/7/Vista configuration, the Documents and Settings and System Volume Information folders are hidden and access is denied. The System32 folder is inside the Windows folder, not the Users folder. The no-longer-supported Windows XP used Documents and Settings as the main user folder, but Windows Vista/7/8 changed that by creating a junction from that folder to the Users folder. Now in Vista/7/8 the Documents and Settings folder is protected, but you have limited access to the Users folder.

*Your friend is playing the latest first-person game on a PC, but the screen is pausing during game play. Your friend has a high-end graphics card and the maximum memory for the motherboard. Which of the following statements best describes how to remedy the problem?* *A.* Upgrade the drivers. *B.* Reinstall the OS. *C.* Replace the hard drive. *D.* Reinstall the game.

*A.* If you see video issues such as pausing during game play, upgrade the video drivers. Make sure that you download the latest video driver from the manufacturer's website. Gamers cannot rely on Microsoft drivers, especially FPS gamers! Sometimes reinstalling a game is necessary but shouldn't be in this scenario. Replacing the hard drive and reinstalling the OS are drastic and unnecessary measures for this problem.

*Which of the following statements best describes how to properly deal with difficult customers?* *A.* Do not minimize a customer's problems. *B.* Report through proper channels. *C.* Track evidence through documentation. *D.* Tell the customer to remove confidential documents.

*A.* Not minimizing a customer's problems is one way to deal with a difficult customer. Other ways include avoid arguing, avoid being judgmental, and clarify customer statements. As for the other answers, reporting through proper channels is part of the fundamentals of first response. Tracking evidence and documenting is part of the concept of chain of custody. Finally, you should ask the customer to remove confidential documents; this is one method of dealing with customers' confidential materials appropriately.

*Which type of hypervisor runs operating systems on bare metal?* *A.* Type 1 *B.* Type 2 *C.* Virtual PC *D.* Windows XP Mode

*A.* The Type 1 hypervisor is the bare metal, or native hypervisor. It runs directly on the host computer's hardware. Examples include Microsoft Hyper-V, VMware ESXi, and Citrix XenServer. This is required for true virtualization workstations. Type 2 hypervisors run within another operating system. Examples of this include Microsoft Virtual PC, Windows XP Mode (which runs in a Virtual PC window within Windows 7), and VirtualBox. These do not run nearly as fast as type 1 hypervisors and so are used for limited purposes. For example, if a company wanted to run Windows Server 2012 in a virtual environment but have it be an actual server on the network, it should run in a Type 1 hypervisor. But if you are learning how to use Windows 7 or 8—for example, in a lab environment—the type 2 hypervisor would probably be fine.

*Which of the following is the most appropriate question to ask a customer first when attempting to troubleshoot an input device issue over the phone?* *A.* Can you describe the steps you have taken? *B.* Have you verified that all USB plugs are secure? *C.* Have you tried turning it off and on again? *D.* Are you sure that the device is plugged in?

*A.* The key here is what you ask the customer first. You should first ask the customer to describe the steps taken so far. By asking this, you will probably elicit a lot of the other listed answers from the customer. Remember, you are not accusing the user of anything; you are simply asking what the customer did so far. You don't even know if the device is USB or not. Plus, some devices are not turned on and off. They simply plug into the computer and either work or don't. And when you ask what the customer has done so far, the person will probably tell you that she plugged the device in. The moral of this question is to get the whole story before asking questions that are arbitrary—and possibly unnecessary.

*A user's smartphone is overheating. Which of the following is the most likely cause?* *A.* Faulty GPS program *B.* Damaged battery *C.* Proper ventilation *D.* Virus *E.* Damage to the CPU

*A.* The most likely cause is a faulty GPS program or other application that is using far too many resources. It is possible that a damaged battery or a virus could also cause the smartphone to overheat, but not as common. Damage to the CPU would probably render the device inoperable. Proper ventilation would be acceptable, but improper ventilation (for example a poorly made smartphone case) would be unwanted, and could possibly lead to overheating.

*Examine the following figure. Then answer the question that follows. Image The figure shows the option to set a Passcode in iOS of an iPad. Which of the following steps best represents how to navigate to this screen?* *A.* Settings > General > Passcode Lock > Turn Passcode On *B.* Settings > General > Turn Passcode On *C.* Settings > Passcode Lock > Turn Passcode On *D.* Settings > General > Passcode Lock > Enable WPA2 Passcode

*A.* The path is Settings > General > Passcode Lock > Turn Passcode On. By default, Simple Passcode is enabled, as shown in the figure within the question. This can be disabled on the same Passcode Lock screen.

*A technician you work with just finished installing AV software on a PC. Which of the following statements best describes the first step the technician should take to remedy the problem?* *A.* Update the AV signatures. *B.* Remove infected files. *C.* Run a full scan. *D.* Quarantine infected files.

*A.* The technician should update the antivirus (AV) software immediately after installing it and set it to automatically check for updates every day. If the PC was infected, and the scenario makes no mention of this, the technician should have already removed the system from the network, ran a full scan, and quarantined infected files—in that order. Any other viruses that eluded quarantine would be researched on the AV manufacturer's website.

*User A is part of the Users Group on a Windows computer. User A attempts to access files on a UNC path: \\server\fileshare. Fileshare has the following share permissions: Administrators—Full Control Users—Read Only Guests—No Access However, the directory on the hard drive where the share is located has the following permissions: Administrators—Full Control Users—Change Guests—No Access Which level of access will the account User A have?* *A.* Read Only *B.* Change *C.* Full Control *D.* No Access

*A.* User A will end up having the Read Only level of access to the share. Generally, a user gets the more restrictive level of access. The only thing that is different between the share's permissions and the parent directory's permissions is the level of control for the Users group. Normally, a share will obtain its permissions from the parent folder. That is, unless that option is un-checkmarked in the properties of the folder; then, the folder can be reconfigured for whatever permissions an admin wants to set for it. That must be what happened in the scenario. Administrators get Full Control access to almost everything by default. And Guests get No Access to just about everything by default. So the only possibilities for this question were Change and Read Only. Again, in general, the typical Standard user account receives the more restrictive level of permissions.

*You have been asked to load a copy of the company's purchased software on a personal computer. Which of the following statements best describes the first step you should take to remedy the problem?* *A.* Verify that the install is allowed under the company's licensing agreements. *B.* Notify the company's owner of the breach. *C.* Advise the individual that downloading unlicensed software is illegal. *D.* Leave the premises and call local law enforcement.

*A.* You should first verify that the installation is allowed under a company's licensing agreement. It probably isn't, but you should check first. Most organizations do not allow purchased software to be installed on an employee's home computer. If it is against organization policy, then you should notify your supervisor. There are many types of licenses that you should be aware of including end-user licensing agreements (EULA), digital rights management (DRM), commercial and enterprise licenses (such as client access licenses or CALs), open source versus closed source (i.e. Android versus iOS), personal licenses, and so on. Again, be sure to follow and incorporate corporate end-user policies and security best practices when it comes to these types of licenses.

*A company has Category 6 cabling lying on the floor in several locations. Which of the following statements best describes the most appropriate action to take?* *A.* Reroute the cables using a protective material. *B.* Secure the cables to the floor with tape. *C.* Install a wireless network. *D.* Move the computers closer to the server.

*A.* Your local municipality's electrical and safety code requires that all cables be installed properly. No cables can be left hanging or lying on the floor. Rerun the cables through the walls and ceiling, or use a special conduit to run the cables in a way that is safe. This in a nutshell is known as cable management.

*Which of the following are advantages of Xcopy over Copy? (Select the two best answers.)* *A.* The ability to copy files off of a mapped network drive *B.* The ability to copy NTFS permissions *C.* The ability to copy files and decrypt them *D.* The ability to copy entire folder structures *E.* The ability to copy entire folder structures to remote computers

*B and D.* Xcopy can copy NTFS permissions and copy entire folder (directory) structures. Normally, when a file is copied—for example, in Windows Explorer or File Explorer—the file loses its permissions and takes on the permissions of the new parent folder. That is also the case with the Copy command. Xcopy and Robocopy can be used to transcend this rule. Both Xcopy and Copy can copy files off of a mapped network drive, but neither can copy files while decrypting them. Neither Copy or Xcopy can copy entire folder structures to remote computers, but Robocopy can.

*Which step of the CompTIA A+ troubleshooting theory does "conduct external or internal research" exist within?* *A.* Step 1 *B.* Step 2 *C.* Step 3 *D.* Step 4 *E.* Step 5 *F.* Step 6

*B.* "conduct external or internal research" exists within Step 2, which is "Establish a theory of probable cause." Memorize your troubleshooting steps! 1. Identify the problem. Image Question the user and identify user changes to computer and perform backups before making changes. 2. Establish a theory of probable cause (question the obvious). Image If necessary, conduct external or internal research based on symptoms. 3. Test the theory to determine cause. Image Once theory is confirmed determine next steps to resolve problem. Image If theory is not confirmed re-establish new theory or escalate. 4. Establish a plan of action to resolve the problem and implement the solution. 5. Verify full system functionality and if applicable implement preventive measures. 6. Document findings, actions and outcomes.

*Which type of malware appears to perform desired functions but is actually performing malicious functions behind the scenes?* *A.* Virus *B.* Trojan *C.* Spyware *D.* Rootkit

*B.* A Trojan appears to perform desired functions but is actually performing malicious functions behind the scenes. Trojans are used to access a computer through a backdoor and take control of it. They are the bane of web servers as well. Remote Access Trojans (RATs) are used to take control of Windows clients without the users knowing. A virus is code that runs on a computer without the user's knowledge, infecting files when it is executed. Spyware is malicious software that is unwittingly downloaded and installed. It is usually employed to track the surfing activities of a user. A rootkit is software that is designed to gain administrator-level control over a system.

*Which of the following statements is true?* *A.* Authentication can be something a user knows such as a smart card. *B.* Authentication can be something a user is such as a fingerprint. *C.* Authentication can be something a user does such as a PIN or password. *D.* Authentication can be something a user has such as signature.

*B.* Authentication can be carried out by utilizing something a user is, such as a fingerprint; something a user knows, such as a password or PIN; something a user has, such as a smart card or token; and something a user does, such as a signature or speaking words.

*It seems someone has spilled a large amount of coffee in the break room and has not cleaned it up. It is seeping into the server room next door. Which of the following statements best describes the first step you should take to remedy the problem?* *A.* Fill out an accident report. *B.* Notify the network administrator. *C.* Start mopping up the mess. *D.* Reference the MSDS.

*B.* If anything is going to disturb the server room or other equipment rooms, notify the network administrator immediately. It's coffee—no need to fill out an accident report. After you notify the admin, you might choose to mop up the mess; that's your prerogative, but I would hope the person who made the mess had a hand in cleaning it up. Material Safety Data Sheets (MSDS) are available for anything that has a chemical within it. I've had some terrible coffee in my day, but nothing that required an MSDS.

*Which of the following social engineering attacks relies on impersonation in an attempt to gain personal information?* *A.* Hoaxes *B.* Phishing *C.* Dumpster diving *D.* Shoulder surfing

*B.* Phishing is the attempt to fraudulently obtain private information. Usually the phisher masquerades as someone else. A hoax is an attempt at deceiving people into believing something that is false. Dumpster diving is when a person literally scavenges for private information in the garbage. Shoulder surfing is when a person uses direct observation to find out a target password and other personally identifiable information.

*Examine the following figure. Then answer the question that follows. Image Which portion of Computer Management is being displayed in the figure?* *A.* Event Viewer *B.* Disk Management *C.* Disk Administrator *D.* DiskPart

*B.* The Disk Management component of Computer Management is being displayed in the figure. You can tell because it shows each disk and the volumes within each disk. The Event Viewer houses log information for the system, applications, and security auditing events. Disk Administrator is the predecessor to Disk Management in the old Windows NT days. DiskPart is the command-line tool used to create and modify partitions on the hard drive.

*You have some DLLs and ActiveX controls that need to be troubleshot. Which command can manipulate these?* *A.* Regedit *B.* Regsvr32 *C.* ODBC32 *D.* Regedt32 Well, you made it. Congratulations! Check your answers and read through the explanations carefully!

*B.* The Regsvr32 command in the Command Prompt is used to manipulate ActiveX controls and DLLs. For example, to register a sample ActiveX control, you would type regsvr32 sample.ocx. Unregistering requires the /u parameter. This leans more toward the programming side of things, but you should know what the command does. Regedit.exe and Regedt32 bring up the Registry Editor application in Windows. ODBC is short for Open DataBase Connectivity; it is an interface used within the C programming language to access database management systems. ODBC32 is not a command in Windows.

*Examine the following figure. Then answer the question that follows. Image The figure shows a mounted volume. Which of the following is the actual mounted volume and which hard drive folder is it pointing to?* *A.* F: and GRMCULXFRER_EN_DVD *B.* Windows 7 DVD and the Data folder *C.* F: and the DVD drive *D.* Data folder and GRMCULXFRER_EN_DVD

*B.* The Windows 7 DVD has been mounted. We can tell because the Target is GRMCULXFRER_EN_DVD; that is the name of the Windows 7 64-bit DVD. It just happens to be sitting in a DVD-ROM drive named F:. It is pointing to, or redirecting to, the Data folder on the hard drive (as you can see from the title of the window). This way, if a person clicks on the Data folder, which can be easily shared, he will see the contents of the Windows 7 DVD. This makes it possible to implement advanced networking and security techniques in conjunction with the DVD via the Data folder.

*Examine the following Windows 7 figure. Then answer the question that follows. Image Which window are we looking at, and what is highlighted?* *A.* WinMSD—I/O setting of IEEE 1394 controller *B.* System Information—I/O setting of IEEE 1394 controller *C.* Device Manager—I/O setting of IEEE 1394 controller *D.* System Properties—I/O setting of IEEE 1394 controller

*B.* The figure displays the System Information window with the IEEE 1394 (and I/O setting) highlighted. System Information can be accessed from Start > All Programs > Accessories > System Tools (in Windows 7/Vista) or by accessing Run and typing msinfo32 in any version of Windows.

*You have been asked to move data from one laptop to another, each of which has EFS functioning. Which of the following statements best describes the first step you should take to remedy the problem?* *A.* Give the user of the second laptop administrator privileges. *B.* Export the user's certificate. *C.* Disable networking. *D.* Convert the partition to FAT32.

*B.* The first thing you should do is export the user's certificate from the first laptop to the second laptop. This can be done by clicking Start and typing certmgr.msc in the Search box; then locate and export the correct Personal Certificate. The Certificates console window can also be added to an MMC. The Encrypting File System (EFS) is the standard single-file encryption method for Windows 8/7/Vista (if the version supports it). Files encrypted with EFS are then displayed as green in color within Windows Explorer. Networking need not be disabled, and we aren't sure which user is being referred to in the answers, but if the certificate has been exported, that user should be able to read the files. Partitions can be converted from FAT32 to NTFS but not vice versa.

*Your boss asks you to troubleshoot a computer with a virus. Which of the following statements best describes the first step you should take to remedy the problem?* *A.* Run a System Restore. *B.* Identify the malware. *C.* Roll back drivers. *D.* Research malware types.

*B.* The first thing you should do is identify the malware. (BTW, if the computer is on the network, disconnect it first.) Then, you can research that malware and any possible cures by searching the Internet and accessing your AV provider's website. Rolling back drivers should not be necessary, especially if you find it necessary to run a System Restore at some point. Remember your best practices procedure for malware removal!

*A customer has a computer running Windows. The Windows Firewall appears to be causing communications to fail within a certain gaming application even though you set up an exception for the program. You stop the Windows Firewall, but when the computer reboots, the service starts up again. Which of the following tools should be used to disable the Windows Firewall service?* *A.* Task Scheduler *B.* System Configuration *C.* System Properties *D.* Local Security Policy

*B.* Use the System Configuration tool (Msconfig.exe) to disable the service. Do this in the Services tab. Of course, you can also disable services in the Services console window (services.msc). If you need to stop and disable a service, the Services console window is your best bet. That is because Msconfig can disable them but not stop them (plus a restart is required for most Msconfig actions). And the Task Manager can stop them, but not disable them. As to the incorrect answers: The Task Scheduler is used to set a time when particular applications and processes will run. System Properties is the dialog box where you can change the name of the computer, configure System Restore, and set up Remote Desktop. Local Security Policy is where password and auditing policies can be configured.

*Which of the following is a potential risk associated with WEP when that protocol is used to secure a WLAN?* *A.* SSID broadcast *B.* Weak encryption *C.* Data emanation *D.* Zero protection against war driving attacks

*B.* WEP is a deprecated standard. It has a weak encryption. Instead it is recommended that WPA or WPA2 be used to protect wireless networks. The SSID broadcast functions regardless of the type of encryption protocol used on the wireless network; however, disabling the SSID broadcast is important after all clients have been connected to the wireless access point. Data emanation (also known as signal emanation) is an electromagnetic field generated by devices and cables. If nothing else is available, you should use WEP. This at least offers some level of protection against war driving attacks; it is better than using no encryption whatsoever.

*You are working on a computer in which you just installed a new hard drive. The system already runs Windows. The new hard drive does not appear in Explorer. Which of the following statements best describes the next step you should take to ensure the drive will be recognized by the operating system?* *A.* Reboot the computer. *B.* Initialize and format the hard drive in Disk Management. *C.* Configure the drive in the BIOS/UEFI. *D.* Assign a drive letter to the hard drive in Disk Management. *E.* Set the drive to active.

*B.* When you add a second drive to a system that already has Windows installed, you will probably have to initialize the drive and format it in the Disk Management utility. Rebooting the computer does not help the system see the drive. You can configure the drive in the BIOS to a certain extent, but that won't help Windows see the drive. When you format the drive, Disk Management asks you to assign a drive letter. No need to set the drive to active because this drive does not have an OS to be booted to.

*You are required to implement an organizational policy that states user passwords can't be used twice in a row. Which of the following policies should be configured?* *A.* Minimum password length *B.* Enforce password history *C.* Minimum password age *D.* Complexity requirements

*B.* You should configure the Enforce password history policy and set it to a number higher than zero. This way, when a user is prompted to change her password every 42 days (which is the default minimum password age), that user will not be able to use the same password. Password policies can be accessed in Windows within the Local Security Policy window > Security Settings > Account Policies > Password Policy. Minimum password length is the policy that states how many characters a password must be at minimum. Eight is a decent setting, but to be full-on secure many organizations require 15 minimum. There are several technical reasons for this, but the A+ exam does not go into that kind of depth. Complexity requirements policy, if enabled, forces a user to select a password that meets 3 of the following 5 categories: uppercase characters, lowercase characters, numbers, special characters (such as ! or #), and Unicode characters (not often implemented).

*Which of the following is the best solution for repairing a hard drive when a computer displays an "NTLDR is missing error" upon booting?* *A.* Recovery Console with the fixmbr command *B.* Recovery Console with the fixboot command *C.* Recovery Console with the chkdsk command *D.* Recovery Console with the bootcfg /rebuild command

*B.* The Recovery Console is a system recovery tool used in Windows XP. There are a lot of different commands that can be issued in this mode. If the NTLDR file has been damaged or is missing, it can be rewritten to the hard disk by issuing the fixboot command while in the Recovery Console. NTLDR can also be manually copied from the CD-ROM disc if necessary. The fixmbr command rewrites the master boot record of the hard drive. The chkdsk command checks the integrity of the disk. Bootcfg /rebuild can be used to scan for the operating system installations and rebuild that information into the boot.ini file. Note: While Windows XP is deprecated and not supported by Microsoft, you never know what you find in the field. In addition, the term "Missing NTLDR" is in

*You are designing the environmental controls for a server room that contains several servers and other network devices. Which of the following statements best describes the role of an HVAC system in this environment? (Select the two best answers.)* *A.* It shields equipment from EMI. *B.* It provides isolation in case of a fire. *C.* It provides an appropriate ambient temperature. *D.* It maintains appropriate humidity levels. *E.* It vents fumes from the server room.

*C and D.* The HVAC system's primary responsibilities are to provide an appropriate ambient temperature for the equipment and to maintain appropriate humidity levels. This keeps the equipment from overheating and prevents electrostatic discharge (ESD). Some HVAC equipment needs to be shielded to reduce electromagnetic interference (EMI) after it is installed. Isolation can be provided by other methods such as the material used in the perimeter of the room, such as physical firewalls. A separate ventilation system can be installed to vent fumes away from the server room; however, there shouldn't be any fumes. Products that contain fumes should be stored in a separate and specially secured area. And if a fire were to occur, the sprinkler system or special hazards system should end that threat, eliminating any fumes that were a result of the fire.

*Which switch of the Robocopy command copies subdirectories but skips empty ones?* *A.* /E *B.* /B *C.* /S *D.* /DCOPY:T

*C.* /S copies subdirectories but skips any empty ones. /E copies all subdirectories, including empty ones. /B copies files in backup mode. /DCOPY:T also copies timestamps of files and folders.

*Which type of device uses an MOV to protect equipment?* *A.* Power strip *B.* Power supply *C.* Surge suppressor *D.* Multimeter

*C.* A surge suppressor (or surge protector) uses metal-oxide varistors (MOVs) to protect against surges and spikes. They protect each outlet and port on the device, but they do not last forever. Most manufacturers recommend that after several years of use you replace them. Power strips do not have these and do not protect against surges and spikes, though the device might have trip functionality and have to be reset in the case of an electrical problem. Power supplies are located within the computer; they do not have MOVs. A multimeter is used to test outlets and wires. An MOV can also be tested by a multimeter by testing its resistance.

*Which of the following switches skips the process that compares directory entries to the file record segments corresponding to those entries, when running the Chkdsk command?* *A.* Chkdsk /V *B.* Chkdsk /F *C.* Chkdsk /I *D.* Chkdsk /R

*C.* Chkdsk /I performs a less vigorous check of index entries. It can be used only on NTFS partitions. /V (short for verbose) displays the full path and name of every file on the disk. /F fixes errors on the disk. /R locates bad sectors and recovers readable information.

*Which of the following commands enables you to copy a file without prompts?* *A.* Copy /Z *B.* Xcopy *C.* Copy /Y *D.* Copy /A

*C.* Copy /Y suppresses prompting of overwrite confirmations. Copy /Z copies networked files in restartable mode. Xcopy is used to easily copy entire directories of data to another location. Copy /A allows you to indicate an ASCII text file to copy.

*Which of the following will occur if %temp% is executed from Run?* *A.* Applications located in the %temp% folder will be executed. *B.* The operating system's temporary folder will be open. *C.* The current user temporary folder will be open. *D.* Applications will be deleted in the %temp% folder.

*C.* Entering %temp% in the Run prompt displays a folder with the current user's temporary files. For example, in Windows this would show the C:\Users\%username%\AppData\Local\Temp folder. Nothing will be added or changed. Simply the folder will be displayed in a Windows Explorer or File Explorer window. The operating system's temporary folder is located at C:\Windows\Temp.

*You are on a service call and receive an urgent phone call. Which of the following statements best describes the proper way to respond?* *A.* Leave the site and take the call. *B.* Talk with the person while working. *C.* Ask to be excused, and after determining the urgency of the call, go back to work. *D.* Ask to be excused, and after determining that it is not a truly urgent call, get right back to work while talking on the phone.

*C.* Everyone has urgent calls sometimes. But, are they actually urgent? Determine this, and then get back to work as quickly as possible. Don't text, e-mail, or use the phone while at the job site.

*A customer reports to you that a newly issued smart card does not work in a laptop. You try your smart card in the laptop, and it works without any problems. Which of the following statements best describes the most likely solution to the problem?* *A.* Perform a BIOS flash. *B.* Reinstall the OS. *C.* Upgrade the smart card reader firmware. *D.* Replace the smart card reader.

*C.* First, try upgrading the smart card reader firmware. A smart card is an intelligent card that authenticates a user. Newer smart cards with more intelligence are constantly being developed. These newer cards might not be readable by a smart card reader until it is updated. In rarer cases you might have to replace the smart card reader. A BIOS flash should be necessary only if the smart card reader is not recognized. Reinstalling the OS should be avoided at all costs, but it might be necessary if the laptop has a very old version of Windows.

*The Disk Management utility lists a disk as "Foreign." Which of the following statements best describes how to make the disk usable?* *A.* Convert the disk to basic. *B.* Convert the disk to dynamic. *C.* Import the disk. *D.* Set the disk to active.

*C.* Foreign disks that are installed in a computer show up in the Disk Management utility as foreign. They need to be imported by right-clicking them and running through the import procedure. No need to convert them from basic to dynamic unless you decide later that you want to create special arrays of disks or expand/contract the size of partitions. Set a disk to active if it has an OS and you wish to make it bootable.

*A customer is having a hard time describing a computer problem. You are not sure what the problem is or where it is occurring. Which of the following statements best describes how to remedy the problem?* *A.* Offer various different repair options. *B.* Use computer jargon to help relax the customer. *C.* Ask the customer to slowly repeat what the problem is. *D.* Tell the customer that you have to leave and that the problem will be fixed soon.

*C.* If the customer is having a hard time describing the problem, leaving you at a loss as to what to fix, ask the person to slowly repeat what the problem is. Try to relax him and be understanding, and especially patient. The more patient you appear, the more chance the customer will paint you a good picture of what the problem is. You should not offer any repair options until you know exactly what the problem is. Computer jargon never helps the situation; if you start using terms the customer is unfamiliar with, then you risk alienating the customer and making things more difficult. Never abruptly leave the customer. Persevere, find out what the problem is, and repair it as soon as possible.

*When explaining a technical concept to a customer, which of the following is not permissible?* *A.* Using analogies *B.* Using visual aides *C.* Using jargon *D.* Limiting the amount of information to what is necessary for the user to know

*C.* Keep away from the jargon. Customers can be confused by it, intimidated by it, and sometimes even frightened by it. This means to stay away from mentioning computer acronyms, the latest technology names, TCP/IP in general, and anything more technical than "reboot the computer." Analogies and visual aids can be great when explaining technical concepts to a customer. Think along their lines and paint a picture that they can understand. You should definitely limit what the customer needs to know. For example, there is no reason for the customer to know that 802.3ab is the IEEE standard for 1000BASE-T: Ethernet over twisted-pair transmissions at 1000 Mbps on the LAN. You want to know it, but then again, you are a techie and the customer is not.

*A customer is frantic because a mobile device's operating system has crashed. The customer keeps referring to KitKat in excited tones but isn't making much sense. Which OS is the customer referring to?* *A.* Windows 10 Mobile *B.* Apple iOS version 8 *C.* Android version 4 *D.* BlackBerry OS

*C.* KitKat is the name of Android version 4.4 through 4.4.4, though newer versions are now available including Lollipop (ver 5) and Marshmallow (ver 6). Windows 10 Mobile, Apple iOS, and BlackBerry OS don't use such descriptive names.

*A user calls and complains that he cannot get onto the Internet, although he could just minutes before. Which of the following statements best describes how to properly respond to the user?* *A.* "What is your IP address?" *B.* "Wait 10 minutes, and then try it again." *C.* "Do you remember the last thing that you did?" *D.* "Let me get my supervisor."

*C.* Questioning the user can often lead to what caused the issue. Of course, you do not want to accuse the user of anything; instead, just ask what the user did last on the computer.

*Which of the following is the best Windows utility to back up important system settings without requiring external storage?* *A.* Msconfig *B.* Task Manger *C.* System Protection *D.* Xcopy

*C.* System Protection is a feature that creates and saves data about the computer's system files and settings. It does this by creating restore points. This is accessed by going to the System Properties dialog box and clicking the System Protection tab. External storage is not necessary for these; they are automatically stored in the system volume. Msconfig is used to modify the way Windows boots and the services that are loaded at startup. The Task Manager is used to view system performance, enable/disable applications, stop services, and kill processes. Xcopy is used to copy entire directory trees of data but not settings.

*Which of the following programs in Windows 7 saves problem descriptions and solutions?* *A.* File History *B.* Problem Reports and Solutions *C.* Action Center *D.* Performance Monitor

*C.* The Action Center in Windows 7 can save problem descriptions and solutions; this is done in the archived messages section. File History is the backup program built into Windows 8/8.1. The Action Center could be considered the successor to the Problem Reports and Solutions of Windows Vista. Performance Monitor is a program that tracks how much of your device's resources are being utilized—for example, what percentage of the processor is used.

*Which utility displays important messages about solving issues in Windows 8?* *A.* Task Manager *B.* Windows Defender *C.* Action Center *D.* Problem Reports and Solutions

*C.* The Action Center in Windows 8/7 displays important messages about solving issues and security concerns. This is the successor to the Windows Vista Problem Reports and Solutions utility. The Task Manager gives you some basic real-time performance data about the PC and can be used to stop processes. Windows Defender is Microsoft's free anti-malware tool.

*In which step of the CompTIA A+ procedure for malware removal should anti-malware programs be updated?* *A.* Identify malware symptoms. *B.* Quarantine the infected system. *C.* Remediate infected systems. *D.* Schedule scans.

*C.* Updating anti-malware programs is part of step 4, remediate infected systems. Know your malware removal procedure! 1. Identify malware symptoms. 2. Quarantine infected system. 3. Disable system restore (in Windows). 4. Remediate infected systems. a. Update anti-malware software. b. Scan and removal techniques (safe mode, pre-installation environment). 5. Schedule scans and run updates. 6. Enable system restore and create restore point (in Windows). 7. Educate end user.

*Which of the following relies on PPTP to create a secure tunnel?* *A.* WWAN *B.* 4G LTE *C.* VPN *D.* WLAN

*C.* Virtual private networks (VPNs) rely on a tunneling protocol such as PPTP or L2TP to create a secure connection between a network and a remote computer or group of computers. WWAN is another name for cellular Internet access. 4G LTE is a fast, wireless cellular service used over large geographic areas—most phones use this standard in the United States and many other countries. WLAN is the wireless LAN that is created when you implement a wireless access point or create an ad-hoc network of devices.

*Examine the following figure. Then answer the question that follows. Image What are we looking at in the figure?* *A.* System Recover Options *B.* Regedit *C.* ABOM *D.* MSCONFIG

*C.* We are looking at the Advanced Boot Options Menu (ABOM) screen in Windows 7 (it is similar in Windows Vista). This is the screen that comes up if you press F8 while Windows is booting, and it's how you would access Safe Mode and a host of other booting options. In Windows 8, the ABOM is known as the Startup Settings screen and cannot be accessed with F8 unless you modify the system with the following command: bcdedit /set {default} bootmenupolicy legacy NEW PARAGRAPH The System Recovery Options (Windows RE) can be accessed by booting to the Windows DVD (or USB image, or recovery drive) and selecting Repair. Regedit (regedit.exe) is the Registry Editor utility in Windows. Msconfig is a program within Windows that allows you to modify the way the system boots, disable programs, and disable services.

*Which of the following is a type of phishing attack that is directed at the CEO of an organization?* *A.* Power phishing *B.* Vishing *C.* Whaling *D.* Spear phishing

*C.* Whaling is when phishing attacks are directed at CEOs and other powerful entities in an organization. It is a type of spear phishing—a directed phishing attack. Whereas most phishing attacks are performed via e-mail, vishing is carried out over the phone.

*Your organization wants to use a cloud service that will allow developers to program entire applications within a working environment that they can modify as they see fit. Which type of technology should be used?* *A.* SaaS *B.* IaaS *C.* PaaS *D.* Community cloud

*C.* You should be most interested in PaaS (platform as a service). This cloud technology provides the programmers with an entire platform, or environment, that they can work on. SaaS is software as a service. IaaS is infrastructure as a service. Community cloud is when multiple customers share a provider's cloud service.

*A Faraday cage prevents the usage of which of the following items?* *A.* USB flash drives *B.* Uninterruptible power supplies *C.* Cell phones *D.* Wired keyboards

*C.* Cell phones cannot obtain a signal within a Faraday cage because of the cage's shielding. In addition, if a cell phone is used outside the Faraday cage, the signal emanation cannot pass through the cage to the inside. The Faraday cage is meant to block signal or data emanations through the air. USB flash drives, uninterruptible power supplies, and wired keyboards do not use the air to transmit their data.

*Which of the following file extensions will start the program installation process in Windows?* *A.* *.INI *B.* *.CFG *C.* *.SYS *D.* *.EXE

*D.* *.EXE refers to any file with the .EXE extension. .EXE is short for executable. When you want to run a program, it is usually started with a file that has a .EXE extension. For example, to start Microsoft Word, the winword.exe executable is initiated. And for installing programs, the most common is setup.exe. .INI files are initialization files. CFG is short for configuration file. These might list commands and parameters for a program. Often, .INI and .CFG files can be manipulated in Notepad because they are text based (but not text or .txt files). .SYS files are system files—for example, pagefile.sys. The .SYS extension was used extensively back in the days of DOS, but newer versions of Windows tend to have system files with .dll and .exe extensions.

*Which of the following security threats can be updated remotely from a command center?* *A.* Virus *B.* Worm *C.* Spam *D.* Zombie

*D.* A zombie is an individual compromised computer connected to the Internet. The owner is unaware that the computer has been installed with malware. The zombie can be updated and controlled remotely from a master computer at a control center. This master computer controls the entire botnet or group of compromised computers. A virus is code that runs on a computer without the user's knowledge, infecting files. A worm is similar to a virus has the capability to self-replicate to other systems. Spam is unwanted, or unsolicited, e-mail.

*You just installed a customer's new printer and tested it. Which of the following should be performed next?* *A.* Recheck all connections. *B.* Bill the customer. *C.* Turn the printer on and off. *D.* Show the customer the printer's basic functionality. *E.* Install a maintenance kit.

*D.* After installing something for a customer, teach the customer how to use it (at least the basics). If you tested it, then there is no reason to recheck connections or turn the printer on and off. Unless you are an independent contractor or consultant, you probably won't bill the customer yourself. Even if that is your responsibility, you shouldn't do so until you have shown the basics of the new printer to the customer. Maintenance kits are not necessary for new printers. They are required when the printer reaches approximately 200,000 pages printed.

*Ray used file properties to hide files in his folder and now needs to get the files back. Using a command-line tool, which of the following combinations of parameters will make the files viewable once again?* *A.* Attrib - RV **.** *B.* Attrib - A+H **.** *C.* Attrib + A+ **.** *D.* Attrib -H **.**

*D.* Attrib -H *.* unhides all of the files in the folder. The attrib command allows you to work with four different file attributes that I like to refer to as RASH. R stands for Read-only, A = Archive, S = System, and H = Hidden. Using a minus sign will remove the attribute, while a plus sign will add the attribute. Since the files were already hidden, we needed to use the minus sign to remove the attribute and be able to view the files. *.* means all the files with all extensions within that particular directory. Check out the attrib command in the Command Prompt for yourself by typing attrib /?. Ray is always doing interesting things in my books.

*Which of the following statements best describes how to confirm that a new virus definition is authentic?* *A.* Check the file owner. *B.* Check the creation date. *C.* Check the file version. *D.* Check the hash key.

*D.* Check the hash key of the virus definition you downloaded against the location that you downloaded from. Other properties of the definition (or signature) file (such as the file owner, creation date, and file version) can all be spoofed. The difference is that the hash key is mathematically contrived and must match the key from the download point. Always check hashes (such as MD5 hashes) when downloading important data in order to verify the integrity of that data.

*A co-worker tells you that a work PC has become infected with a virus. Which of the following statements best describes the first step you should take to remedy the problem?* *A.* Check for system security patches. *B.* Perform an antivirus program scan. *C.* Boot the PC into Safe Mode. *D.* Remove the PC from the network.

*D.* First thing: remove the PC from the network so that the virus (if there is one) doesn't spread to other systems! Then you can safely go about troubleshooting that system by performing an AV scan while in Safe Mode and checking for system security updates.

*You are working just outside a server room that is being built, and you hear a loud popping sound from inside. As you enter the server room, you notice an electrician lying on the floor with an electrical cord in his hand. Which of the following statements best describes the first step you should take to remedy the problem?* *A.* Call 911. *B.* Call the building supervisor. *C.* Pull the electrician away from the cord. *D.* Turn off the electrical power at the source.

*D.* If the electrician is being electrocuted, you do not want to touch him. Because it appears that the power is still on, turn it off at the source (if it is not near the sparking wire). This is usually the circuit breaker. Then call 911. Do not move the cord or the electrician; you could be next.

*Which type of data purging standard requires seven full passes or rewrites with bit-level erasure software.* *A.* Magnetic degausser *B.* Low-level format *C.* Peter Gutman security method *D.* DoD 5220.22-M

*D.* The DoD 5220.22-M standard specifies that a hard drive be properly purged with bit-level erasure software that does 7 complete passes. Compare this to the Peter Gutman security method, which requires 35 passes! A magnetic degausser is not software at all, but a device that uses a magnetic or electromagnetic pulse to remove all data from a magnetic disk. Low-level formatting can be accomplished by some BIOS programs and third-party utilities, but data can still be reconstructed from data residue (data remanence).

*Which of the following OSI model layers is where SSL provides encryption?* *A.* Network *B.* Application *C.* Transport *D.* Session

*D.* The Session Layer, layer 5 of the OSI model, is where SSL provides encryption. Though it is considered to be an Application Layer protocol, the actual encryption happens at layer 5. The Transport Layer deals with ports used by sessions; for example, an SSL session uses port 443. The Network Layer transmits the actual packets of information from one IP address to another. SSL relies on a PKI to obtain and validate certificates; for example, when you go to a secure e-commerce website. That was what we call a doozie, and goes a bit beyond the A+ exam. For more information about the OSI model, check out my video at this link: http://www.davidlprowse.com/video-osi-model-primer2.php.

*Your organization has an Active Directory domain. One of the users, Bill, should not have read access to a folder named Accounting. The Accounting folder is shared on a network server, on a partition formatted as NTFS. Which of the following statements best describes how to stop Bill from having read access to the folder without impacting any other users on the network?* *A.* Remove Bill from all domain groups that have access to the Accounting folder. *B.* Deny read access to the Accounting folder for Bill through local access security. *C.* Deny read access to the Accounting folder for any group that Bill is a member of. *D.* Deny read access to the Accounting folder for Bill through shared access security.

*D.* The best option in this scenario would be to deny read access to the Accounting folder for Bill through shared access security. You would not use local access security because the folder is shared from a network server within your Active Directory domain. Also, if you remove Bill from all domain groups that have access to the accounting folder, Bill will probably lose access to other folders as well. If you deny read access to the accounting folder for any group that Bill is a member of, you will probably impact other users on the network negatively.

*Which of the following is the correct path if you wanted to disable a service in Windows?* *A.* Msconfig > Settings > Services *B.* System Settings > Tools > Services *C.* Control Panel > Services *D.* Control Panel > Administrative Tools > Services

*D.* The correct path is Control Panel > Administrative Tools > Services. Of course, there are lots of other ways to get to the Services console window, but you should know the Control Panel paths for the exam. In addition, there are lots of ways to shut off services; you should know as many of them as you can, such as in the Task Manager or in the Command Prompt. The path Msconfig > Settings > Services is not valid because there is no Settings option. System Settings > Tools > Services is also an invalid path. Finally, Services cannot be accessed directly from Control Panel.

*Examine the following figure. Then answer the question that follows.* *The figure shows the list of shares on a Windows 7 computer. Which of the following is the path of the print$ share?* *A.* C:\Windows *B.* C:\Windows\System32 *C.* C:\Windows\System32\spool\print$ *D.* C:\Windows\System32\spool\drivers

*D.* The default path of the print$ administrative share in Windows 7 (and Windows 8 and Vista) is C:\Windows\System32\spool\drivers. This is an important folder because it contains drivers for different types of printers; it's a folder you might want to access as an administrator over the network. So, the share is hidden as an administrative share by adding a $ to the end of the sharename. The columns were dragged to the left to hide the entire folder path. You can have a folder name with a $ on the end, but that doesn't make it an administrative share; the share itself has to have the $ to make it hidden.

*Examine the following figure. Then answer the question that follows. Image In Windows 7, using individual Control Panel icons, which of the following steps describes how to navigate to the dialog box in the figure?* *A.* Control Panel > Printers > right-click the printer and select Properties > Advanced *B.* Control Panel > Devices and Printers > right-click the printer and select Properties > Ports *C.* Control Panel > Devices and Printers > right-click the printer and select Properties > Ports *D.* Control Panel > Devices and Printers > right-click the printer and select Printer Properties > Advanced

*D.* The figure is showing the Advanced tab of a Lexmark Pro900 printer in Windows 7. It was accessed by navigating to Control Panel > Devices and Printers > right-click the printer and select Printer Properties > Advanced tab. When you right-click on some printers, you need to select Properties instead of Printer Properties; otherwise, the navigation is the same. The Ports tab displays the physical or logical port being used by the printer and allows you to add, remove, and configure ports and enable printer pooling between two or more printers.

*Examine the following figure. Then answer the question that follows. Image Which of the following describes how to navigate to the application shown in the figure?* *A.* Run > Console1 *B.* Right-click Start and select Manage *C.* Run > compmgmt.msc *D.* Run > MMC

*D.* The figure shows the Microsoft Management Console (MMC). You can tell because it is given the default name "Console1" and has multiple other console windows within it, including Computer Management (which can be opened itself by typing compmgmt.msc). The MMC is accessed by going to Run, and typing MMC. But when it is first opened, it is not populated with any snap-ins.

*An attacker is constantly trying to hack into one of your customer's SOHO networks. Which of the following statements best describes the easiest, most practical way to protect the network from intrusion?* *A.* Disable the SSID broadcast. *B.* Install an antivirus server application. *C.* Disconnect the Internet connection. *D.* Install a firewall. *E.* Install an IDS.

*D.* The most practical way to prevent intrusion to the network is to install a firewall. In fact, if this is a SOHO network, chances are the network is controlled by a multifunction network device that already acts as a switch and a router and probably has built-in firewall technology; it just has to be enabled. Usually these are enabled by default, but perhaps someone inadvertently disabled it, and that's one of the reasons an attacker keeps trying to get into the network. An intrusion-detection system (IDS) is usually more elaborate and costs more money, but it would help to prevent network intrusion. (Some devices combine IDS and firewall technologies, but usually not SOHO multifunction network devices.) Disabling the SSID helps to discourage the average user from accessing the wireless network, but any hacker worth his or her salt can get right past that; plus, the attacker could be trying to connect directly through the Internet connection. Antivirus software, regardless of where it is installed, does not repel attackers; it locates and quarantines malware. Disconnecting the Internet connection would work—the hacker wouldn't be able to get in, but none of the employees would be able to use the Internet. Not a good compromise.

*Which group is best to assign to a home user to prevent software installation?* *A.* Administrators *B.* Power users *C.* Remote Desktop users *D.* Users

*D.* The standard user cannot install software or make changes to the system without knowing an administrative login. Administrators have full control over a system. Power users in Windows XP were able to install programs and device drivers but are found in newer versions of Windows only for backward compatibility. Remote Desktop users can remote into other machines in order to control them from another location.

*A Windows 7 computer has an Experience Index Base score of 3.8. The technician discovers that the computer has the following: Performance index RAM1GB4.6Video3D3.8CPU2,4GHz4.2. The technician upgrades the memory to 2 GB and gets the following results: Performance index RAM2GB5.0Video3D3.8CPU2,4GHz4.2. But the Windows Experience Index Base score is still at 3.8. Which of the following can the technician do to improve the performance index Base score?* *A.* Double the RAM again. *B.* Upgrade the CPU to 3 GHz. *C.* Increase the resolution on the screen. *D.* Upgrade the video card.

*D.* Upgrade the video card. The Windows Experience Index Base score is based on the lowest component score. In this case that is the video card. You'll note that there is a number after each component. After the RAM upgrade those numbers are RAM: 5.0, Video: 3.8, and CPU: 4.2. The video score is the index. So, the lowest common denominator should be upgraded. Increasing the resolution on the screen won't have an effect, or it will cause the index for video to go down.

*Which command in the Linux terminal enables you to find out information about a wireless network adapter?* *A.* ipconfig *B.* regedit *C.* apt-get *D.* iwconfig

*D.* Use iwconfig (or ifconfig) to analyze a wireless network adapter in the Linux terminal. (Note: iwconfig does not work in OS X, but ifconfig does.) Ipconfig is a similar tool in Windows. Regedit is the executable that opens the Registry Editor in Windows. Apt-get is used for installing and uninstalling applications in the command-line in Linux.

*You have a Windows computer that you wish to write a batch file for. You want the batch file to turn off the computer after a certain amount of time. Which main command should be run in the batch file?* *A.* Taskkill *B.* Down *C.* Kill *D.* Shutdown

*D.* Use the shutdown command! It works in the Command Prompt and also works programmatically within batch files (.bat) or beyond. To set a shutdown to occur after a specific time period, use the /t xxx switch. taskkill ends processes from the Command Prompt. down is not a command in Windows, but it has been used by other operating system manufactures to initiate a shutdown. kill is the older Windows NT predecessor to the taskkill command.

*A user just returned from another country and cannot connect to the WLAN with a smartphone. Which of the following should be checked first?* *A.* Bluetooth conflict *B.* Hotspot configuration *C.* Wi-Fi calling *D.* Airplane mode

*D.* You should check whether the smartphone is in airplane mode first. That can be easily done by simply looking at the top of the screen for an airplane icon. If the device is in airplane mode, it most likely is not connected to a WLAN (wireless local area network). You could then check other things such as whether Wi-Fi is enabled, whether the person is connecting to the correct wireless network name, is using the right protocols and password and so on. You could also check if the smartphone is configured to act as a hotspot, because that nullifies its WLAN connection as well, but is less likely than the smartphone being in airplane mode in this particular scenario. It is unlikely that Bluetooth would cause a conflict with Wi-Fi, but it is possible, and you can check this by disabling Bluetooth if it is running. Remember that the terms Wi-Fi and WLAN mean essentially the same thing.

*Your co-worker just installed a new printer, replacing his older one. However, when he tries to print from Microsoft Word, the old printer comes up in the print window. Which of the following statements best describes how to remedy the problem?* *A.* Advise him to save the print job by printing to file, and then print the file with the new printer selected. *B.* Advise him to select the new printer from the list every time a document is printed. *C.* Advise him to open the Printers folder, right-click the new printer, and then select Properties > Security Tab > Make This the Default Printer. *D.* Advise him to open the Printers folder, right-click the new printer, and then click Set as Default Printer.

*D.* You want to set a new default printer in the OS because he has installed a new printer. This is usually done simply by right-clicking the printer and selecting Set as default printer. You might also see a question with the option to click File (or Printer). This is if you double-clicked the printer to open it and then selected the first menu. Unused printer drivers for older printers should be removed when the older printers are replaced.


Kaugnay na mga set ng pag-aaral

Harry Potter and the Deathly Hallows Trivia

View Set

Buttaro chapter 133 diverticular diseases

View Set

CH7: Power, Politics, and Leadership -m

View Set

Legal and Ethical Responsibilities Study Guide True or False

View Set

After Midterm Homework Study Guide

View Set

MGT 2010 Chapter 3 Practice Test

View Set

World Geography: Chapter 15 Russia and the Republics Review

View Set