CompTIA A+ 220-902 Set H
Which of the following is the MINIMUM group permissions needed to access the share \myserverc$? A. Administrator B. Remote User C. Domain User D. Power User
A. Administrator
A technician notices multiple disk errors in the Event Viewer. Which of the following tools would BEST diagnose this issue? A. CHKDSK B. FDISK C. BOOTREC D. DISKPART
A. CHKDSK
A technician is repairing a workstation that exhibits random reboots at odd times of the day. Which of the following should be performed FIRST when troubleshooting the issue? (Select TWO). A. Check the PSU integrity B. Check the CMOS battery C. Check the video card integrity D. Check the memory integrity E. Check the optical drive integrity
A. Check the PSU integrity D. Check the memory integrity
A service technician is installing a second hard drive on a desktop PC running Windows 7. The second hard drive is the same make and model of the first hard drive. The technician would like to provide data redundancy. Which of the following should the technician use to accomplish this? A. Disk Management B. Device Manager C. System Configuration D. Data Sources
A. Disk Management
An alert needs to be sent to the administrator when the CPU stays above 90% for a period of time. Which of the following tools would BEST be used to accomplish this? A. Performance Monitor B. Task Scheduler C. Task Manager D. System Configuration
A. Performance Monitor
Which of the following is a security threat that uses email to trick users? A. Phishing B. Virus C. Spyware D. Shoulder surfing
A. Phishing
Which of the following settings MUST be configured in order to turn on a VoIP phone? A. PoE B. Flow control C. VPN D. Duplex speed
A. PoE
A user wants to configure their network to support VoIP. Which of the following would BEST support a VoIP installation? A. QoS B. POTS C. Wake-on-LAN D. VPN
A. QoS
A user has not received any new emails on their smartphone in the last two days. The user is able to access the Internet without any problems. Which of the following should the user do FIRST? A. Restart the smartphone B. Reconfigure the smartphone email account C. Resynchronize the smart phone D. Update the operating system
A. Restart the smartphone
Which of the following protocols could a technician use to connect a smartphone to an email server? (Select TWO). A. SMTP B. POP3 C. HTTP D. SNTP E. ICMP
A. SMTP B. POP3 Explanation: SMTP and POP3 are standard email protocols. This is true on a smartphone as well. To connect to an email server, all you need is POP3 and SMTP information along with specific ports.
An employee receives a phone call inquiring about company information. This is an example of which of the following? A. Phishing B. Social engineering C. Shoulder surfing D. Rootkits
B. Social engineering
Which of the following allows a Windows 7 remote user to edit a file offline then automatically update the changes when back in the office? A. Windows Defender B. Sync Center C. Windows Aero D. HomeGroup
B. Sync Center
Turnstiles and other mantraps will prevent which of the following security threats? A. Shoulder surfing B. Tailgating C. Rootkits D. Viruses
B. Tailgating
Which of the following ports will have to be forwarded to allow an RDP connection to a specific machine? A. 25 B. 110 C. 3389 D. 8080
C. 3389
Peter, an end user, has reported that his computer is extremely slow for several minutes after logging in. He has noticed that many unnecessary programs automatically start when he logs into his computer. Which of the following tools could the technician use to prevent the unnecessary programs from starting automatically when Peter logs into his computer? A. Performance Monitor B. Task Scheduler C. MSCONFIG D. Windows Firewall
C. MSCONFIG
A customer calls and states when they are typing on their keyboard certain letters consistently display numbers instead of letters. Which of the following is the cause of the issue? A. Bluetooth keyboard did not pair properly B. Scroll lock is on C. Num lock is on D. Keyboard connector is coming loose
C. Num lock is on
A users laptop has died but the hard drive is still functioning. Which of the following is the BEST way for the user to still access and edit all of their data? A. Burn their data to DVDs B. Use a SCSI to USB adaptor C. USB hard drive enclosure D. Copy their data to a USB flash drive
C. USB hard drive enclosure
Which of the following operating systems is capable of fully utilizing more than 4GB of system RAM? A. Windows Vista Ultimate B. Windows 7 32-bit C. Windows 7 64-bit D. Windows XP Professional
C. Windows 7 64-bit
When cutting back the protective coating on CAT5 wiring, which of the following is the recommended tool? A. Punchdown tool B. Basic crimper C. Wire strippers D. Degausser
C. Wire strippers
A user reports that their computer restarts at 3:00 PM every day. Which of the following tools would BEST help a technician troubleshoot this issue? A. Event Viewer B. Task Scheduler C. Performance Monitor D. System Restore
A. Event Viewer
A technician is diagnosing a PC running Windows 7 which has been affected with an "NTLDR is missing" error message. Which of the following command line tools would BEST resolve the problem? A. Fixboot B. CHKDSK C. Scandisk D. DEFRAG
A. Fixboot
Which of the following is the BEST example of social engineering? A. Impersonation B. Key logger C. Virus D. Malicious cookie
A. Impersonation
A technician recently replaced a users monitor and now the user is reporting that the screen is filled with static and appears distorted. Which of the following will resolve the issue? A. Lower refresh rate B. Lower the resolution C. Raise the resolution D. Increase refresh rate
A. Lower refresh rate
A technician needs to create a new directory from a command line on a Windows XP machine. Which of the following commands should be used? A. MD B. SFC C. RD D. CD
A. MD
A technician has a list of IP addresses that the technicians manager needs the network names for. Which of the following commands would be used? A. NBTSTAT - A B. PING - t C. NETSTAT D. NBTSTAT - a
A. NBTSTAT - A /A <IPaddress> Displays the NetBIOS name table of a remote computer, specified by the IP address (in dotted decimal notation) of the remote computer.
Which of the following resources is MOST important for accessing remote virtual environments on a client machine? A. Network speed B. CPU speed C. High speed memory D. Drive space
A. Network speed
Which of the following is one of the major differences between a new tablet and a new laptop computer? A. Tablet has no field serviceable parts. B. Laptop has less field functionality. C. Tablet has faster Ethernet capability. D. Laptops have slower responsiveness than tablets.
A. Tablet has no field serviceable parts. Explanation: Tablet PC has very delicate parts. Due to the nature of these parts, it cannot be serviced on field. You need special tools to pry open a tablet and working with the parts needs attention.
Which Windows 7 command can stop a single process from the command-line? A. Taskkill B. Shutdown C. Tasklist D. DEL
A. Taskkill
A user calls the helpdesk to report that their local printer is not printing any of the jobs that have been submitted this morning. Other users in the vicinity are not having any issues printing to the same unit via the network. The user in question connects to the printer over USB cable that connects to a laptop dock. Which of the following is MOST likely at fault here? A. The users dock has a power problem with its built-in USB port(s). B. The printer only supports USB 2.0 and the user has a USB 3.0 enabled dock. C. The printer accidentally had its onboard wired network jack disabled. D. Other users are overloading the printer causing it to run out of memory.
A. The users dock has a power problem with its built-in USB port(s).
A technician has one computer and needs to create a multiboot to test all Windows environments. Which of the following shows the BEST order for installing the operating systems? A. Windows XP Professional, Windows Vista Business, Windows 7 Professional B. Windows Vista Business, Windows 7 Professional, Windows XP Professional C. Windows 7 Professional, Windows Vista Business, Windows XP Professional D. Windows 7 Professional, Windows XP Professional, Windows Vista Business
A. Windows XP Professional, Windows Vista Business, Windows 7 Professional
Which of the following will help limit unauthorized access to a mobile device? A. Remote wipes B. Screen locks C. Geotracking D. Antivirus software
B. Screen locks
A user reports that their PC does not work. Which of the following would be the BEST question for the technician to ask the user to get further information? A. "Can you get to the Internet?" B. "What exactly does not work?" C. "Does the PC turn on?" D. "Are you able to sign on?"
B. "What exactly does not work?" Explanation: Clarify what is not working. The line of questioning is an effective strategy to discover and solve a problem especially on phone.
A technician is attempting to install a RAID 1 configuration. Which of the following is the MINIMUM amount of disks that can be used to create a RAID 1 array? A. 1 B. 2 C. 3 D. 4
B. 2
A small business owner is setting up their wireless network in their office, which is in a building shared with several other businesses. The owner does not want to disable the SSID broadcasting due to visiting customers needing to use the network, but does not want other businesses to notice the network, let alone access it. Which of the following would BEST accomplish this? A. Configure the access point encryption from unsecured access to WEP. B. Adjust the radio power so that coverage is restricted to the business. C. Change the SSID to reflect the business name instead of a public access point. D. Enable MAC filtering and restrict access to other company's devices.
B. Adjust the radio power so that coverage is restricted to the business. Explanation: Best way to do this is to adjust radio power to restrict the coverage to the business. When the radio power is restricted to an office. The persons in the other office space cannot detect the signals at all.
Jane, a home user, brings a Windows XP PC in for repair and reports that several disk read errors are occurring. She has run check disk and errors have been reported several times. Which of the following should a technician recommend? (Select TWO). A. Increase the amount of RAM to improve disk checks B. Backup all data on the drive C. Upgrade to a home server D. Purchase a new hard drive E. Change the drive configuration to RAID 0 F. Upgrade to Windows 7 Professional
B. Backup all data on the drive D. Purchase a new hard drive
Peter, a technician, has been tasked to verify a new device has been installed and correctly configured on a Windows 7 computer. He has now confirmed the new device is not working properly. Upon opening the Device Manager, he sees several icons. Which of the following should Peter do FIRST to help troubleshoot the problem? A. Upgrade the antivirus signatures and disable system restore B. Check any items with yellow exclamation points C. Check any items with green checkmarks D. Disable items with a red X over the icon
B. Check any items with yellow exclamation points
An inkjet printer used for printing marketing brochures is losing color stability (e.g. orange appears brown, red appears purple). Which of the following items should a technician do FIRST? A. Replace the failing print heads. B. Clean the print heads. C. Update the drivers. D. Recycle the printer.
B. Clean the print heads.
In which of the following locations would a technician go to show file extensions? A. Security Center B. Folder Options C. Display D. System
B. Folder Options
Which of the following Windows installations is MOST likely to contain custom user settings and files? A. Clean Install B. Imaging C. Unattended Installation D. Remote Network Installation
B. Imaging
A technician is tasked with installing a legacy application on a Windows 7 computer. When the technician tries to install the legacy application, an error is received that the application cannot be installed because the OS is not supported. Which of the following should the technician do FIRST to try to get the application installed in Windows 7? A. Install the application in safe mode B. Install the application with compatibility mode C. Install the latest Windows service packs and updates D. Install Windows Security updates on the system
B. Install the application with compatibility mode
Which of the following commands may be used on a computer, running Windows 7, to stop a single process from the command line? A. ERASE B. KILL C. SHUTDOWN D. DEL
B. KILL
Which of the following command line tools will terminate a non-system process without restarting the computer? A. Shutdown B. Kill C. Erase D. Break
B. Kill
A company is experiencing issues with third parties tailgating authorized users during entry to secure server rooms. Which of the following would BEST alleviate this problem? A. Retinal scanners B. Mantraps C. Door locks D. Smart card badges
B. Mantraps
Which of the following commands is used to map a network drive? A. NBTSTAT B. NET USE C. NETMAP D. NETSTAT
B. NET USE
A technician discovers slow data transfer speeds in a wired network. Which of the following would be the MOST probable cause? A. Using APIPA address B. Outdated NIC drivers C. Too many simultaneous connections D. CAT5 cable connection
B. Outdated NIC drivers
Which of the following is required in order to receive push email notifications on a mobile device? A. IMAP B. POP3 C. ActiveSync D. SMTP
B. POP3
A technician has been dispatched to a customer site to diagnose an issue where the computer turns off intermittently. Upon arriving at the site, the technician detects a smoke smell coming from the computer. Which of the following is the BEST solution? A. Power down the system and replace the CPU. B. Power down the system and replace the power supply. C. Install an additional case fan for proper ventilation. D. Remove the side panel for proper ventilation.
B. Power down the system and replace the power supply.
On a corporate network, which of the following features would be used to redirect network traffic for filtering or monitoring? A. Content Advisor B. Proxy Settings C. Network Drive Mapping D. Local Security Policy
B. Proxy Settings
A server is configured to boot with a "mirrored" RAID configuration. Which of the following BEST describes this configuration? A. RAID 0 B. RAID 1 C. RAID 3 D. RAID 5
B. RAID 1
Which of the following are examples of physical security? (Select the two best answers.) A. Directory permissions B. RSA token C. Principle of least privilege D. Privacy filter
B. RSA token D. Privacy filter
A user is reporting that they cannot connect to the wireless network from their office but they were able to connect yesterday. Which of the following would be the MOST likely reason? A. Radio switch on laptop is enabled B. Radio switch on laptop is disabled C. Channel interference D. User is too far away from the access point
B. Radio switch on laptop is disabled
Which of the following technologies can be used to secure mobile devices and their data? (Select TWO). A. Protective screen B. Remote wipe C. Physical lock D. Locator E. Passcode lock
B. Remote wipe E. Passcode lock
A user states that their old notebook loses connectivity to the Internet several times a day at work and at home. The issue started after the wireless card was replaced. Which of the following items is MOST likely causing the issue? A. The motherboard drivers are not current. B. The drivers for the NIC need to be updated. C. The wireless on/off switch is not in the on position. D. The keyboard is faulty and turns the wireless NIC on and off.
B. The drivers for the NIC need to be updated. Explanation: Update the drivers for the network interface card. Sometimes updating drivers solve major problems.
A user reports that a file they shared out on their computer for another network user is not accessible to the third party. The user insists they specifically gave this third party Allow rights for Read and Write access. Which of the following could explain the problem at hand? A. The parent folder has explicit Allow rights set for this user. B. The parent folder has explicit Deny rights set for this user. C. The user forgot to share the parent folder and only shared the specific file. D. The parent folder likely has the "archive" attribute enabled.
B. The parent folder has explicit Deny rights set for this user.
Which of the following usually incorporates an 8-digit code that can be found on the bottom of a SOHO router? A. Port forwarding B. WPS C. Wireless encryption D. Port triggering
B. WPS
Despite objections, the Chief Executive Officer (CEO) wanted all managers to have administrator rights to their workstations. After a few months, the CEO was replaced. A technician is assigned the task of changing the managers to power users on the domain. Which of the following is the BEST choice to complete this task? A. rstrui.exe B. gpedit.msc C. lusrmgr.msc D. usergroup.exe
B. gpedit.msc Group Policy Editor
Which of the following BEST describes the Apple utility used with iOS devices to synchronize, upgrade, and restore to factory default if needed? A. iMac B. iTunes C. Safari D. Bluetooth
B. iTunes
A network DHCP server crashes and has to be rebuilt from scratch. Shortly afterwards many users report an "Address Conflict" alert on their computers. Which of the following tools should the users run to help fix this issue? A. route B. ipconfig C. netstat D. nbtstat
B. ipconfig
A technician is working on a workstation that is receiving read/write failures when trying to access a particular file. Which of the following commands should the technician use to resolve this issue? A. DISKPART B. FORMAT C. CHKDSK D. FDISK
C. CHKDSK
A user reports that after configuring the BIOS to boot to the hard drive first, the system still tries to boot from the optical drive. Which of the following is the MOST likely cause? A. Optical drive B. Power supply C. CMOS battery D. CD-ROM disk
C. CMOS battery
A technician receives a trouble ticket about intermittent wireless on a users laptop while they are at home but not at work. Which of the following could be the cause of this issue? A. While at home, the user is too close to their access point B. Encryption is set differently at home then at work C. Cordless phone is interfering with signal at home D. Laptops wireless is set to only work while at work
C. Cordless phone is interfering with signal at home
Which operating system feature will show a hard drive's status? A. Tasklist B. Administrative tools C. Disk Management D. Ping
C. Disk Management
Peter, the Chief Executive Officer (CEO), has a habit of forgetting his mobile device and asks for assistance in locating it in the future. Which of the following would help finding his lost device? A. Enable IMAP settings B. Gyroscope features C. GPS location services D. Enable SSL services
C. GPS location services
A company has created a personal SSL certificate for an internal website and a user is reporting error messages when accessing the site. In which of the following locations could a technician troubleshoot SSL certificate errors? A. System Protection B. Folder Options->View Hidden Files C. Internet Options->Content D. Local Security Policy
C. Internet Options->Content
A technician needs to change the minimum password length to 8 characters to make it more secure. Which of the following system settings should the technician configure? A. Windows Firewall B. Windows Security Center C. Local Security Policy D. System Configuration
C. Local Security Policy
A user on a domain PC needs to leave their desk immediately, but does not want to compromise displayed content. Which of the following should be done? A. Screensaver password B. Restart PC C. Lock screen D. Reset user password
C. Lock screen
Which of the following identifies traffic based upon its physical network address? A. Phishing B. Hashing C. MAC filtering D. Geotracking
C. MAC filtering
A Windows 7 desktop PC has crashed (i.e. BSOD) several times indicating a possible RAM problem. Which of the following is an OS built-in tool that can be used to test this problem? A. Windows System Restore B. Windows System File Checker C. MSCONFIG D. Windows Memory Diagnostic
C. MSCONFIG
A client states that there are too many programs automatically starting when Windows boots. Which of the following tools would BEST be used to disable some programs from automatically starting when the computer is booted? A. Performance Monitor B. Fixboot C. MSCONFIG D. FIXMBR
C. MSCONFIG
Virtual machines help users developing cloud applications in which of the following ways? A. Provides an environment where the host cannot be connected to the network. B. Provides a platform where operating system requirements are lessened. C. Provides a safe, secure environment in which to test patches or application updates. D. Provides an environment that is never accessible from the Internet.
C. Provides a safe, secure environment in which to test patches or application updates.
A new network drop was just installed and the technician determined it was not terminated correctly. Which of the following tools would the technician use to terminate a network wall jack correctly? A. Cable crimper B. Cable tester C. Punchdown D. Wire strippers
C. Punchdown
A technician needs to build a PC to act as a home virtual server. Which of the following would be the BEST choice? A. Dual Core CPU, 6GB DDR3 RAM, 320GB of hard drive space B. Dual Core CPU, 8GB DDR RAM, 1TB of hard drive space C. QUAD Core CPU, 6GB DDR3 RAM, 320GB of hard drive space D. QUAD Core CPU, 4GB DDR2 RAM, 1TB of hard drive space
C. QUAD Core CPU, 6GB DDR3 RAM, 320GB of hard drive space Explanation: Virtual server hosts a lot of virtual machines that host various operating systems and applications. Therefore, you need maximum cores and memory to keep all the virtual machines humming properly. More cores and more memory means you can have more physical resources to create virtual resources that will be used to host virtual machines.
A newly installed application runs every time the operating system boots causing a delay during startup. Which of the following tools will allow a technician to resolve the problem? A. SFC B. DXDIAG C. REGSRV32 D. MSCONFIG
C. REGSRV32 In computing, regsvr32 (Register Server) is a command-line utility in Microsoft Windows and ReactOS[1] for registering and unregistering DLLs and ActiveX controls in the operating system Registry.[2] Despite the suffix "32" in the name of the file, there are both 32-bit and 64-bit versions of this utility (with identical names, but in different directories).[3] regsvr32 requires elevated privileges.
In a SOHO wireless network, which of the following prevents unauthorized users from accessing confidential data? A. Reduce broadcast power B. Change SSID name C. Set encryption D. Enable MAC filtering
C. Set encryption
A technician has installed a replacement motherboard in a desktop case with no other modifications. All power connectors and drive data connectors have been connected to the new motherboard; however, the system will not power on. Which of the following is MOST likely the cause? A. An incorrect firmware version resides on the motherboard B. The voltage selection on the power supply is set incorrectly C. The front panel connector is not connected properly D. The RAM is not correctly installed in the new motherboard
C. The front panel connector is not connected properly
A technician recently installed a new video card in a PC. The PC already has integrated video on the motherboard. When the technician turns on the PC, there is no video. Which of the following is MOST likely the cause? A. The motherboard BIOS version is out of date. B. The incorrect video card drivers are installed. C. The power connector for the video card is unplugged. D. The video card is unsupported by the motherboard.
C. The power connector for the video card is unplugged.
A technician discovers that a hard drive has died in a RAID 0 configuration. Which of the following would be the outcome of this situation? A. The user will need to replace the PC. B. The technician will need to back up and replace the drive. C. The user will lose all non-backed up data. D. The technician will need to replace the drive and rebuild the array
C. The user will lose all non-backed up data.
Which of the following is the BEST tool to verify the cable is plugged into the correct port on the patch panel? A. Cable certifier B. Punch down C. Toner probe D. Cable tester
C. Toner probe
Which of the following scenarios BEST defines phishing? A. A user receives an email from a friend to download a picture but the file format ends in .exe. B. A user receives a pop-up message about a virus from a company that states that if they buy this product it will remove the virus. C. A user receives a message about unwanted activity from their antivirus asking to remove the suspect file. D. A user receives an email from a person in another country with a story as to why they need help with a financial arrangement.
D. A user receives an email from a person in another country with a story as to why they need help with a financial arrangement.
A Windows desktop PC user states that they have sent several print jobs to their locally connected printer, yet none have printed. The printer has no error conditions on the control panel. Which of the following should the technician do FIRST in troubleshooting this problem? A. Open the printer properties page and send a test print to it. B. Clear the print queue of all documents and resend one to test the printer. C. Power the printer off and on and send one test document to it. D. Check if Use Printer Offline has been selected.
D. Check if Use Printer Offline has been selected.
After replacing a motherboard on a customers laptop for a no sound issue, a technician realizes that there is intermittent wireless connectivity on the laptop. Which of the following should the technician perform FIRST? A. Reinstall the driver of the WiFi card. B. Check to see if there is a wireless switch on the laptop and its current position. C. Replace the wireless card because it is not fully compatible with the new motherboard. D. Check if the WiFi antenna is connected properly to the wireless card.
D. Check if the WiFi antenna is connected properly to the wireless card.
The technician is dispatched to a multi-function device that users print and copy from all day. The technician is told pages that are copied all have a line on them on the left hand side of the page. The technician prints a printer test page and does not see the line on the page. The technicians NEXT step would be which of the following? A. Replace the toner cartridge to eliminate the lines. B. Print from another workstation to recreate the problem. C. Close the trouble ticket and document no trouble found. D. Copy a printed page to recreate the problem.
D. Copy a printed page to recreate the problem.
A technician has configured the ability to connect to a small office server using remote desktop from a workstation within the office. The technician has reviewed logs that show constant brute force attacks to that server from outside the network. Which of the following would prevent this from occurring? A. Configure the server to use a static IP B. Logically move the server to the DMZ C. Reallocate the server to a different networking closet D. Disable the remote desktop port
D. Disable the remote desktop port
A technician has developed training material to ensure employees physically secure company laptops from being stolen. Which of the following is a preventative directive that MUST be included in the training material? A. RFID tags must be attached to all laptops and receivers to all doors to alert when a laptop leaves the designated area. B. Biometrics devices must be installed on all laptops. C. All computers must be equipped with privacy filters. D. Employees must remember to lock their office doors when leaving even for a short period of time.
D. Employees must remember to lock their office doors when leaving even for a short period of time.
A user would like to allow all of the devices on a home network to connect to the WAP except for smart phones. Which of the following features should be used to accomplish this? A. Set a unique DHCP scope ID for the smart phones B. Change the WAP SSID C. Change the channel to the same frequency as the smart phones D. Exclude smart phones from the MAC filter list
D. Exclude smart phones from the MAC filter list
A technician would like to dispose of a hard drive that is no longer needed. According to company policy, all contents on the disk should be deleted before disposal. Which of the following OS command line tools should be used? A. CHKDSK B. DEL C. SCANDSK D. FORMAT
D. FORMAT
Which of the following Control Panel items will allow for easy streaming of pictures, music, and videos to other Windows 7 PCs? A. Ease of Access Center B. AutoPlay C. Sync Center D. HomeGroup
D. HomeGroup
Which of the following security concepts establishes the notion that a user should only be given sufficient access to the resources they need to perform their job function? A. Deny all B. Allow all C. Most privilege D. Least privilege
D. Least privilege
A technician would like to limit computer access to certain users. Which of the following should be configured? A. Advanced security B. Boot.ini file C. System configuration D. Local security policy
D. Local security policy
Which of the following can cause a popup box to display on a laptop, alerting a user that they have performed the same action 5 times, and asking them to click OK to enable this feature? A. Lock indicator lights B. Flickering display C. Ghost cursor D. Sticky keys
D. Sticky keys The Sticky Keys feature allows you to use key combinations involving the Ctrl, Alt, or Shift key by pressing only one key at a time. To turn Sticky Keys on or off in Windows 7 or Vista, press the Shift key five times. You can also enable Sticky Keys in Windows 7 or Vista as follows: From the Start menu, click Control Panel. Open the Ease of Access Center. Click Make the keyboard easier to use, and then check Turn on Sticky Keys.
A technician responds to a hardware issue with a server. The technician discovers that one of the hard drives in the server has failed. The server is set up in a RAID 1 configuration. Which of the following steps would the technician perform NEXT? A. Remove the hard drive and back up the data B. Run CONVERT on the hard drive C. Reboot the server D. Swap hard drive and rebuild array
D. Swap hard drive and rebuild array
When comparing laptops and tablet PCs which of the following is true? A. Tablets typically have higher resolution displays B. Laptops typically have a longer battery life C. Laptops typically use touch screen displays D. Tablets typically use solid state drives
D. Tablets typically use solid state drives
Peter, a user, reports that each time his laptop is logged in to the company's headquarters, his system time changes. After Peter returns home, he adjusts the clock, which stays set correctly until the computer is again at the company's headquarters. No other users have reported any issues. Which of the following is MOST likely occurring? A. The domain time controller is incorrect B. The laptop firmware needs to be updated C. The laptop has a malware infection D. The laptops time zone is incorrectly set
D. The laptops time zone is incorrectly set
A user reports that when printing from a warehouse to an accounting printer, the printer is only printing random symbols. Which of the following is the MOST likely cause? A. The accounting printer does not have enough memory for the job B. The accounting printer was recently restarted C. The user did not have proper print permissions D. The print driver is corrupt and needs to be reinstalled
D. The print driver is corrupt and needs to be reinstalled
A Windows user states that every time they hit certain letter keys on their notebook, a number appears instead of the letter. Which of the following items is MOST likely the cause of this problem? A. The user enabled sticky keys. B. The user changed the keyboard character set. C. The user enabled accessibility options. D. The user enabled num lock.
D. The user enabled num lock.
A manager needs to have remote access to the main office at all times. Which of the following is the BEST setup? A. WWAN B. LAN C. MAN D. VPN
D. VPN
Which of the following provides Bob, a technician, with the GREATEST security? A. Disabling SSID B. WEP C. Static IP D. WPA
D. WPA
A customer consults a technician about a series of computers that fail to finish an overnight task on a regular basis. The problem seems to only occur early morning between Tuesday and Wednesday, and affects computers running the same operating system. Which of the following Windows features is MOST likely the cause? A. Power Save Mode B. Safe Mode C. Disk Cleanup D. Windows Update
D. Windows Update
The benefit of MAC filtering in wireless networking is that the network: A. is encrypted. B. is not visible. C. uses static IP addresses. D. is more secure.
D. is more secure.