checkpoint quiz

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A PC technician is having trouble with a Windows-based system and wants to perform a system restore from the command prompt. What command would start this process? tasklist robocopy sfc gpupdate rstrui

A PC technician is having trouble with a Windows-based system and wants to perform a system restore from the command prompt. What command would start this process? tasklist robocopy sfc gpupdate rstrui*

A company has a preventive maintenance policy that requires every computer have a new restore point created every six months. For computers using the Windows 7 operating system, how can a technician create the restore point? From the CLI enter the command restore /cn. Choose Start > Control Panel > Accessories > System Tools > System Restore > Create a restore point. Choose Start > All Programs > Accessories > System Tools > System Restore > Next. Right-click My Computer and then choose Properties > Restore > Create Restore Point.

A company has a preventive maintenance policy that requires every computer have a new restore point created every six months. For computers using the Windows 7 operating system, how can a technician create the restore point? From the CLI enter the command restore /cn. Choose Start > Control Panel > Accessories > System Tools > System Restore > Create a restore point. Choose Start > All Programs > Accessories > System Tools > System Restore > Next.* Right-click My Computer and then choose Properties > Restore > Create Restore Point.

A computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem? The cable is not connected properly to the NIC. The computer has an invalid IP address. The computer has an incorrect subnet mask. The computer has an invalid default gateway address.

A computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem? The cable is not connected properly to the NIC. The computer has an invalid IP address. The computer has an incorrect subnet mask. The computer has an invalid default gateway address.*

A computer is assigned an IP address of 169.254.33.16. What can be said about the computer, based on the assigned address? It cannot communicate outside its own network. It can communicate on the local network as well as on the Internet. It can communicate with networks inside a particular company with subnets. It has a public IP address that has been translated to a private IP address.

A computer is assigned an IP address of 169.254.33.16. What can be said about the computer, based on the assigned address? It cannot communicate outside its own network.* It can communicate on the local network as well as on the Internet. It can communicate with networks inside a particular company with subnets. It has a public IP address that has been translated to a private IP address.

A corporation has expanded to include multiple remote offices around the globe. Which technology should be used to allow the remote offices to communicate and share network resources privately? VPN Remote Desktop administrative share Remote Assistance

A corporation has expanded to include multiple remote offices around the globe. Which technology should be used to allow the remote offices to communicate and share network resources privately? VPN* Remote Desktop administrative share Remote Assistance

A customer who wants to enhance home network security is shopping for devices. The sales representative recommends a device that has a hardware firewall. Which device can provide this service? bridge switch integrated router wireless access point

A customer who wants to enhance home network security is shopping for devices. The sales representative recommends a device that has a hardware firewall. Which device can provide this service? bridge switch integrated router* wireless access point

A desktop user has requested the ability to easily transfer photos from a camera SD card to a computer. Which device can be installed on the desktop computer to fulfill this request? capture card storage controller media reader graphics card

A desktop user has requested the ability to easily transfer photos from a camera SD card to a computer. Which device can be installed on the desktop computer to fulfill this request? capture card storage controller media reader* graphics card

A home user was successfully browsing the Internet earlier in the day but is now unable to connect. A ping command from a wireless laptop to a wired PC in the LAN is successful, but the nslookup command fails to resolve a website address. The user decides to analyze the LEDs on the Linksys router to verify connectivity. Which LED should be of main concern in this situation? WLAN LED power LED Internet LED 1-4 Ethernet LEDs

A home user was successfully browsing the Internet earlier in the day but is now unable to connect. A ping command from a wireless laptop to a wired PC in the LAN is successful, but the nslookup command fails to resolve a website address. The user decides to analyze the LEDs on the Linksys router to verify connectivity. Which LED should be of main concern in this situation? WLAN LED power LED Internet LED* 1-4 Ethernet LEDs

A network administrator has finished migrating from a peer-to-peer network to a new client-server network configuration. What are two advantages of the new configuration? (Choose two.) The total cost of the new solution is considerably lower. Data is more secure in the event of hardware failures. Individual users are in control of their own computers and network resources. Data resources and access are centrally controlled. Personnel costs are lower because a dedicated network administrator is no longer necessary.

A network administrator has finished migrating from a peer-to-peer network to a new client-server network configuration. What are two advantages of the new configuration? (Choose two.) The total cost of the new solution is considerably lower. Data is more secure in the event of hardware failures.* Individual users are in control of their own computers and network resources. Data resources and access are centrally controlled.* Personnel costs are lower because a dedicated network administrator is no longer necessary.

A server administrator needs to set up a new server with disk fault tolerance technology. The administrator decides to deploy RAID 0+1 technology. What is the minimum number of disks needed to deploy the disk array setting? 2 3 4 5 6

A server administrator needs to set up a new server with disk fault tolerance technology. The administrator decides to deploy RAID 0+1 technology. What is the minimum number of disks needed to deploy the disk array setting? 2 3 4* 5 6

A technician is attempting to create virtual machines on a PC but wants to ensure that the physical system resources used by the virtual machines are directly managed by them and not by the host operating system. How can the technician accomplish this? Set up the virtual machines using a native hypervisor. Set up the virtual machines using a hosted hypervisor. Set up the virtual machines as Windows Virtual PCs Limit the amount of paged RAM. Disable hyperthreading in the BIOS.

A technician is attempting to create virtual machines on a PC but wants to ensure that the physical system resources used by the virtual machines are directly managed by them and not by the host operating system. How can the technician accomplish this? Set up the virtual machines using a native hypervisor.* Set up the virtual machines using a hosted hypervisor. Set up the virtual machines as Windows Virtual PCs Limit the amount of paged RAM. Disable hyperthreading in the BIOS.

A technician is troubleshooting a problem where many websites return a "certificate not valid" error. The technician notices that the date and time are not current and resets these to the correct settings. The previously inaccessible websites are now accessible. However, when the computer is restarted the same problem reoccurs. What can the technician do to prevent the date and time from resetting? Reinstall the OS. Upgrade the BIOS. Change the power settings in the BIOS. Replace the CMOS battery.

A technician is troubleshooting a problem where many websites return a "certificate not valid" error. The technician notices that the date and time are not current and resets these to the correct settings. The previously inaccessible websites are now accessible. However, when the computer is restarted the same problem reoccurs. What can the technician do to prevent the date and time from resetting? Reinstall the OS. Upgrade the BIOS. Change the power settings in the BIOS. Replace the CMOS battery. *

A technician needs to add a new wireless device to a small WLAN. The WLAN is a mixture of old and newer 802.11b and 802.11g devices. What choice for the new device would provide the most interoperability for present and future growth? Add a new 802.11a device. Add a new 802.11b device. Add a new 802.11g device. Add a new 802.11n device.

A technician needs to add a new wireless device to a small WLAN. The WLAN is a mixture of old and newer 802.11b and 802.11g devices. What choice for the new device would provide the most interoperability for present and future growth? Add a new 802.11a device. Add a new 802.11b device. Add a new 802.11g device. Add a new 802.11n device. *

A technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to force the release of system resources from the unresponsive application? Task Manager Add or Remove Programs Event Viewer System Restore

A technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to force the release of system resources from the unresponsive application? Task Manager* Add or Remove Programs Event Viewer System Restore

A user is configuring a wireless access point and wants to prevent any neighbors from discovering the network. What action does the user need to take? Disable SSID broadcast. Enable WPA encryption. Configure DMZ settings. Configure a DNS server.

A user is configuring a wireless access point and wants to prevent any neighbors from discovering the network. What action does the user need to take? Disable SSID broadcast.* Enable WPA encryption. Configure DMZ settings. Configure a DNS server.

A user notices that some of the programs that are installed before upgrading to Windows 7 no longer function properly. What can the user do to fix this problem? Change the file system to FAT16. Update the driver for the graphics card. Reinstall the programs in Compatibility Mode. Lower the UAC setting in the Change User Account Control settings dialog box of the User Accounts control.

A user notices that some of the programs that are installed before upgrading to Windows 7 no longer function properly. What can the user do to fix this problem? Change the file system to FAT16. Update the driver for the graphics card. Reinstall the programs in Compatibility Mode.* Lower the UAC setting in the Change User Account Control settings dialog box of the User Accounts control.

After performing a preventive maintenance on a PC, the technician powers on the PC only to find that nothing happens. What is the most likely problem? The computer is not plugged into the AC outlet. The power supply voltage switch is set to the incorrect voltage. The technician forgot to reset the BIOS settings. The CPU has not been reinserted properly.

After performing a preventive maintenance on a PC, the technician powers on the PC only to find that nothing happens. What is the most likely problem? The computer is not plugged into the AC outlet.* The power supply voltage switch is set to the incorrect voltage. The technician forgot to reset the BIOS settings. The CPU has not been reinserted properly.

At which TCP/IP model layer would a MAC address be found? application transport internet network access

At which TCP/IP model layer would a MAC address be found? application transport internet network access *

Copper network cables consist of pairs of wires that are twisted together. Which type of signal interference is reduced or prevented by this? RFI EMI crosstalk white noise

Copper network cables consist of pairs of wires that are twisted together. Which type of signal interference is reduced or prevented by this? RFI EMI crosstalk* white noise

Hard drives in a grocery warehouse keep failing because of the adverse warehouse environment. What would be a possible solution for this high failure rate? Install an SSD drive in each computer. Install a more powerful power supply in each computer. Install an antistatic mat under each computer. Install each computer in a specialized high airflow case.

Hard drives in a grocery warehouse keep failing because of the adverse warehouse environment. What would be a possible solution for this high failure rate? Install an SSD drive in each computer.* Install a more powerful power supply in each computer. Install an antistatic mat under each computer. Install each computer in a specialized high airflow case.

If a technician is unable to create a backup of data on a customer computer, what three pieces of information should the technician include on the liability release form signed by the customer before beginning work? (Choose three.) a description of the problem the steps required to resolve the problem permission to work on the computer without a current backup available a release from liability if data is lost or corrupted the components used in the repair a description of the work to be performed

If a technician is unable to create a backup of data on a customer computer, what three pieces of information should the technician include on the liability release form signed by the customer before beginning work? (Choose three.) a description of the problem the steps required to resolve the problem permission to work on the computer without a current backup available* a release from liability if data is lost or corrupted* the components used in the repair a description of the work to be performed *

In which folder are application files for 32-bit programs typically located on a computer that is running a 64-bit edition of Windows 7? C:Users C:Program Files C:Application Data C:Program Files (x86)

In which folder are application files for 32-bit programs typically located on a computer that is running a 64-bit edition of Windows 7? C:Users C:Program Files C:Application Data C:Program Files (x86) *

On which two occasions is it most likely that a technician will have to perform a clean operating system installation if a backup has not been performed? (Choose two.) A user requires access to a new printer. The existing operating system is corrupted. The existing security software requires upgrading. The computer is being moved to a different network. A new replacement hard drive is installed in a computer.

On which two occasions is it most likely that a technician will have to perform a clean operating system installation if a backup has not been performed? (Choose two.) A user requires access to a new printer. The existing operating system is corrupted.* The existing security software requires upgrading. The computer is being moved to a different network. A new replacement hard drive is installed in a computer. *

The current IP configuration of a small company is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service would simplify the workstation IP configuration task? APIPA DHCP DIPS ICMP

The current IP configuration of a small company is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service would simplify the workstation IP configuration task? APIPA DHCP* DIPS ICMP

What are two effects of not having a preventive maintenance plan for users and organizations? (Choose two.) increased repair costs increased number of regular updates increased downtime increased management tasks increased documentation needs

What are two effects of not having a preventive maintenance plan for users and organizations? (Choose two.) increased repair costs* increased number of regular updates increased downtime* increased management tasks increased documentation needs

What can be tested with a digital multimeter? wireless signal strength and access point positioning basic functionality of computer ports copper cable location quality of electricity in computer components

What can be tested with a digital multimeter? wireless signal strength and access point positioning basic functionality of computer ports copper cable location quality of electricity in computer components *

What component can be replaced and upgraded on a PC to increase the data processing speed? CPU RAM hard drive BIOS

What component can be replaced and upgraded on a PC to increase the data processing speed? CPU* RAM hard drive BIOS

What does virtual memory provide to an operating system? an increase in data storage an increase in the speed of accessing RAM a temporary storage of data until enough RAM is available to process it the creation of virtual partitions on the hard drive

What does virtual memory provide to an operating system? an increase in data storage an increase in the speed of accessing RAM a temporary storage of data until enough RAM is available to process it* the creation of virtual partitions on the hard drive

What is the first step in the troubleshooting process? Implement a quick procedure to solve the problem. Ask the user direct questions about the issue. Create a plan of action to propose to the user. Establish a theory for the cause of the problem.

What is the first step in the troubleshooting process? Implement a quick procedure to solve the problem. Ask the user direct questions about the issue.* Create a plan of action to propose to the user. Establish a theory for the cause of the problem.

What is the function of the DNS server? It assigns IP addresses to clients. It accepts HTTP requests from clients. It maps a hostname to a corresponding IP address. It manages the domain that clients are assigned to.

What is the function of the DNS server? It assigns IP addresses to clients. It accepts HTTP requests from clients. It maps a hostname to a corresponding IP address.* It manages the domain that clients are assigned to.

What physical layer medium is used by DSL to provide high-speed data communications? telephone lines television cable Satellite dish 4G wireless radio

What physical layer medium is used by DSL to provide high-speed data communications? telephone lines* television cable Satellite dish 4G wireless radio

What technology was created to replace the BIOS program on modern personal computer motherboards? UEFI RAM CMOS MBR

What technology was created to replace the BIOS program on modern personal computer motherboards? UEFI* RAM CMOS MBR

What three voltages are commonly provided by the power supply to the various components inside the computer? (Choose three.) 3.3 volts 5 volts 9 volts 12 volts 24 volts 48 volts

What three voltages are commonly provided by the power supply to the various components inside the computer? (Choose three.) 3.3 volts* 5 volts* 9 volts 12 volts* 24 volts 48 volts

When a used CPU is being installed, what two items should be used to clean the top of the CPU and the base of the heat sink before applying thermal compound? (Choose two.) tap water denatured water isopropyl alcohol cotton swab lint-free cloth

When a used CPU is being installed, what two items should be used to clean the top of the CPU and the base of the heat sink before applying thermal compound? (Choose two.) tap water denatured water isopropyl alcohol* cotton swab lint-free cloth *

Which action can reduce the risk of ESD damage when computer equipment is being worked on? working on a grounded antistatic mat lowering the humidity level in the work area moving cordless phones away from the work area keeping the computer plugged into a surge protector

Which action can reduce the risk of ESD damage when computer equipment is being worked on? working on a grounded antistatic mat* lowering the humidity level in the work area moving cordless phones away from the work area keeping the computer plugged into a surge protector

Which disk management tool scans the critical files of an operating system and replaces the corrupt files? Scandisk Chkdsk Disk Cleanup Optimize Drives System File Checker

Which disk management tool scans the critical files of an operating system and replaces the corrupt files? Scandisk Chkdsk Disk Cleanup Optimize Drives System File Checker *

Which is the correct procedure to put out a fire with a fire extinguisher after the pin is pulled? Aim just above the flame, squeeze the lever, and sweep from side to side. Aim at the base of the flame, squeeze the lever, and sweep from side to side. Aim directly at the center of the flame, squeeze the lever, and sweep from side to side. Aim at the base of the flame, squeeze the lever, and sweep from the base to the top of the flame. Aim just above the flame, squeeze the lever, and sweep from the top to the base of the flame.

Which is the correct procedure to put out a fire with a fire extinguisher after the pin is pulled? Aim just above the flame, squeeze the lever, and sweep from side to side. Aim at the base of the flame, squeeze the lever, and sweep from side to side.* Aim directly at the center of the flame, squeeze the lever, and sweep from side to side. Aim at the base of the flame, squeeze the lever, and sweep from the base to the top of the flame. Aim just above the flame, squeeze the lever, and sweep from the top to the base of the flame.

Which key or key sequence pressed during the boot process will allow a user to start a Windows PC using the last known good configuration? F1 F8 F12 Alt-Z Windows key

Which key or key sequence pressed during the boot process will allow a user to start a Windows PC using the last known good configuration? F1 F8* F12 Alt-Z Windows key

Which measure can help control RFI effects on wireless networks? Ensure the humidity and temperature levels are set as low as possible. Ensure the number of wireless NICs exceeds the number of wireless phones. Ensure the wireless network is on a different frequency than the offending source. Ensure each wireless NIC is configured to operate at different frequencies from all other wireless

Which measure can help control RFI effects on wireless networks? Ensure the humidity and temperature levels are set as low as possible. Ensure the number of wireless NICs exceeds the number of wireless phones. Ensure the wireless network is on a different frequency than the offending source.* Ensure each wireless NIC is configured to operate at different frequencies from all other wireless

Which statement describes a characteristic of a network operating system? A network operating system shares files and folders on a small network with limited security. It runs multiuser applications. It typically is used in SOHO environments. It supports a limited number of users.

Which statement describes a characteristic of a network operating system? A network operating system shares files and folders on a small network with limited security. It runs multiuser applications.* It typically is used in SOHO environments. It supports a limited number of users.

Which three actions should be part of a regular computer preventive maintenance plan? (Choose three.) removing dust from fan intakes, the power supply, and peripherals installing appropriate security updates removing unused or unwanted programs changing browser settings deleting old email installing more RAM in the machine

Which three actions should be part of a regular computer preventive maintenance plan? (Choose three.) removing dust from fan intakes, the power supply, and peripherals* installing appropriate security updates* removing unused or unwanted programs* changing browser settings deleting old email installing more RAM in the machine

Which two hardware features would a technician monitor within the BIOS if a computer was suspected of overheating? (Choose two.) CPU clock speed CPU fan speed motherboard voltage hard drive speed Trusted Platform Module

Which two hardware features would a technician monitor within the BIOS if a computer was suspected of overheating? (Choose two.) CPU clock speed* CPU fan speed* motherboard voltage hard drive speed Trusted Platform Module

Which type of interface should a customer choose if connecting a single cable from a Microsoft Windows computer to output both audio and video to a high definition television? DVI HDMI PS/2 DB-15

Which type of interface should a customer choose if connecting a single cable from a Microsoft Windows computer to output both audio and video to a high definition television? DVI HDMI* PS/2 DB-15

Why would an administrator use Windows Remote Desktop and Windows Remote Assistant? to provide secure remote access to resources on another network to connect to an enterprise network across an unsecured connection and act as a local client of that network to enable sharing of files and presentations with a group of users over the Internet to connect to a remote computer over the network to control its applications and data

Why would an administrator use Windows Remote Desktop and Windows Remote Assistant? to provide secure remote access to resources on another network to connect to an enterprise network across an unsecured connection and act as a local client of that network to enable sharing of files and presentations with a group of users over the Internet to connect to a remote computer over the network to control its applications and data *


Ensembles d'études connexes

Either or fallacy/ false dilemma

View Set

Chapter 1 - Introduction to Computers and Programming

View Set

Leadership & Management Quizzes 4, 5, 6

View Set

PSY207 Chapter1, Mindtap practice questions

View Set