Comptia A+ 802 Practice Questions

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A Windows XP system stops booting with the error message `NTLDR is missing'. Which of the following is the BEST resolution for this problem?

fixboot

Which of the following accounts is MOST restrictive?

Guest

Port 80 has been disabled

Internal dust buildup

Which of the following commands may be used on a computer, running Windows 7, to stop a single process from the command line?

KILL

A technician needs to create a new folder from the command line on the root of the C. drive. Which of the following is the correct command to use?

MD (Make Directory)

Which of the following security threats involve shoulder surfing and phone phishing?

Social engineering

Which of the following would be the BEST way to combat social engineering?

User education

The benefit of MAC filtering in wireless networking is that the network:

is more secure.

A client has asked a technician about drive sanitation and wants to know what the difference is between overwriting a drive and formatting a drive. Which of the following would be the BEST response from the technician?

"Overwriting writes 1s and 0s to a hard drive replacing the data, while formatting only clears the reference to the data and only overwrites as space is used."

A user reports that their PC does not work. Which of the following would be the BEST question for the technician to ask the user to get further information?

"What exactly does not work?"

Which of the following switches should a technician use with the PING command to resolve an IP address to a hostname?

-a

A user's PC has four hard drives in a RAID setup. After a single drive fails, the system will no longer boot and even rescue disks cannot see or access the volume. Which of the following RAID types was the user MOST likely using?

0

While configuring a new email application that uses POP3 for a customer, the technician determines the firewall is blocking the traffic. Which of the following ports should be opened to allow POP3 mail traffic through the firewall?

110

Which of the following ports MUST be open in order for Remote Desktop to function?

3389

Which of the following is the MAXIMUM number of primary partitions that can be created on a hard drive withFAT32?

4

A user recently purchased a new PC with a 500GB hard drive. However, they are reporting that their C. Drive is only 420GB. Which of the following BEST explains this?

A Factory Recovery Partition is using the 80GB.

Which of the following explains why a tablet OS loads quicker than a laptop OS?

A SSD drive loads data much faster than a SATA drive.

When removing the top case from a laptop, which of the following, besides hand tools, should a technician have on hand to assure correct disassembly and reassembly?

A container with separated areas to store different size screws. A manufacturer's technical manual for the model of the laptop.

A user wants to prevent access to specific websites to prevent their children from accidently accessing them. Which of the following can be implemented?

A firewall

Which of the following scenarios BEST defines phishing?

A user receives an email from a person in another country with a story as to why they need help with a financial arrangement.

In which of the following locations is the Windows Vista local user settings found?

A.%userprofile%\AppData\Local

Which of the following is a new feature of iOS 5?

Ability to perform untethered updates

A customer calls and reports that when they walk away from their laptop for an extended period of time they have to reconnect to wireless when they get back. Which of the following will MOST likely correct this issue?

Adjust power settings

A small business owner is setting up their wireless network in their office, which is in a building shared with several other businesses. The owner does not want to disable the SSID broadcasting due to visiting customers needing to use the network, but does not want other businesses to notice the network, let alone access it. Which of the following would BEST accomplish this?

Adjust the radio power so that coverage is restricted to the business.

The shared folder named C$ is an example of which of the following?

Administrative share

Which of the following user accounts should be renamed to adhere to security best practices?

Administrator

Which of the following mobile device features disables cellular and wireless communication?

Airplane Mode

Which of the following is true about a file when it is copied from an NTFS to a FAT32 partitions?

All of the file permissions are lost

When connecting a Bluetooth device to a mobile device, which of the following BEST describes the purpose of discovery mode?

Allows a peripheral to be contacted by the mobile device

For the last year, a company has gathered statistics on the most common security incidents. The highest percentage deals with opening email attachments that contain malware. Which of the following would mitigate this issue without reducing productivity?

Annual cyber security education

A technician is diagnosing a PC running Windows 7 which has been affected with an "NTLDR is missing" error message. Which of the following command line tools would BEST resolve the problem?

Fixboot

A /all switch is MOST likely to be used with which of the following commands?

IPCONFIG

A customer says they cannot access the network printer. The technician cannot PING the printer from their location. Which of the following should be the NEXT step in troubleshooting this issue?

Check the link lights on printer NIC

A customer is not able to connect to any websites. Which of the following commands should a technician run FIRST to identify the issue?

IPCONFIG

A user reports that every time they use a search engine and click on a link to go to a website, they instead are taken to a site blocked by their company's content filter. The user is not trying to go to the blocked site and needs to be able to successfully use the search engine to complete their assignment. Which of the following tools would a technician use to BEST resolve this issue?

Anti-malware software

Which of the following can be used to remove a virus from a computer?

Anti-malware software

A user calls the helpdesk and states that they suddenly cannot connect to the Internet or any other network resources. The user is on a company network that uses DHCP. The technician runs IPCONFIG from the command prompt and the PC has an IP address of 0.0.0.0. Which of the following steps should the technician perform FIRST to troubleshoot this issue?

Check the network cable

Which of the following should a technician do FIRST to secure a mobile device?

Assign a passcode

A user has a perimeter firewall and up-to-date antivirus software. The user is asking what else they can do to improve their security. Which of the following will have the MOST impact on network security? (Select TWO).

Assign security rights based on job roles Use strong passwords

When configuring user accounts, which of the following should a technician perform?

Assign the minimum required access to the users

A user reports a loud clicking noise coming from their PC, but the PC operates normally. Which of the following actions should the technician perform FIRST when responding to this issue?

Attempt to backup data from the hard drive

Which of the following allows a user to reset their password with a series of security questions that only the user should know?

Authentication

IT suspects that other people are frequently making changes to a computer when a user leaves their desk. Which of the following security policies can be implemented in order to prevent this situation?

Auto-lock

A technician is troubleshooting a laptop LCD monitor with an extremely dim screen. Which of the following is the cause?

Backlight failure

Which of the following System Tools would be the BEST one to perform a regular archiving of information on a PC?

Backup

Ann, a home user, brings a Windows XP PC in for repair and reports that several disk read errors are occurring. She has run check disk and errors have been reported several times. Which of the following should a technician recommend? (Select TWO).

Backup all data on the drive Purchase a new hard drive

Which of the following security methods is BEST used to track access to a server room?

Biometric lock

Which of the following security measures is usually found in a laptop?

Biometrics

Ann, a technician, is trying to recover some files for a user from a damaged laptop. Since the Windows installation has been corrupted and does not boot, Ann plugs the drive into a bench system to attempt a recovery. After trying to access the drive on the bench computer, the following message is displayed. "Access Denied. Please Enter Encryption Password." Which of the following is the reason that this error is displayed?

BitLocker is being used

A technician is installing a webcam in a nursery for a user to monitor their baby. The user wants to ensure that the webcam is not broadcasting externally. Which of the following would the technician implement on the SOHO router to prevent the broadcast?

Block the outbound port

A computer is showing the "No boot device found" message even though a technician has verified that the hard drive is set as Device 1 in the BIOS boot order. Which of the following causes is MOST likely at play?

Both PATA devices are incorrectly set to the master jumper setting.

Which of the following directory paths is the default profile folder for User1 in Windows 2000?

C:\Documents and Settings\User1

Which of the following commands would a technician use to move one directory above or below the one the technician is currently in?

CD

Which of the following file system types is used for optical media?

CDFS

Which of the following file system types is used primarily for optical media?

CDFS

Which of the following would be the BEST format for optical media?

CDFS

A technician is working on a workstation that is receiving read/write failures when trying to access a particular file. Which of the following commands should the technician use to resolve this issue?

CHKDSK

A technician notices multiple disk errors in the Event Viewer. Which of the following tools would BEST diagnose this issue?

CHKDSK

Which of the following commands, in Windows 7, could a technician use to schedule a disk integrity scan upon next boot?

CHKDSK

Which of the following commands can be used in Windows XP to modify when the CHKDSK command runs?

CHKNTFS

A user states they have to reset the date and time on their computer every day. Which of the following hardware needs to be replaced to resolve this issue?

CMOS battery

Which of the following components would a user MOST need when building a virtual server? (Select TWO).

CPU RAM

When setting up a Microsoft Exchange mail account to synchronize with an iPhone, which of the following items can be configured to synchronize besides the mail? (Select TWO).

Calendar Address book

A user has an external hard drive which they forget to unplug before booting their machine. Each time this happens, an error shows on the screen which states "Boot sector missing ?reboot to try again." Which of the following would be the BEST way to resolve this?

Change BIOS options to remove USB device from the boot order.

A wireless network is experiencing intermittent connectivity. Which of the following would BEST resolve this issue?

Change broadcast channel

A technician enabled remote management on the small office WAP to manage this device from another location. Users are reporting that the WAP has changed its SSID without anyone's knowledge. Which of the following would prevent this from occurring?

Change default usernames and passwords

A technician has installed the hardware for a SOHO wired network. Which of the following is the FIRST step to securing the network?

Change default usernames and passwords

A user reports that people are receiving emails from their account that the user never sent. Which of the following security measures would BEST resolve the problem?

Change the account password.

When setting up a new wireless router, which of the following actions should the technician take FIRST in order to secure the network? (Select TWO).

Change the default user name Change the SSID

After connecting a laptop to an external monitor, no display is detected and the monitor goes into sleep mode. Which of the following should be attempted FIRST to correct the problem? (Select TWO).

Change the input mode on the monitor Toggle the display using the keyboard shortcut

A technician is replacing a defective DVD drive. After installing the new device, the BIOS does not recognize the DVD drive. Which of the following is MOST likely the solution?

Change the jumper settings on the drive.

Which of the following should be regularly scheduled to fix hard drive errors?

Check Disk

After replacing a motherboard on a customer's laptop for a no sound issue, a technician realizes that there is intermittent wireless connectivity on the laptop. Which of the following should the technician perform FIRST?

Check if the WiFi antenna is connected properly to the wireless card.

A user tries to connect to the Internet using a dial-up modem and receives a "No dial tone detected" message. Which of the following is the FIRST thing the technician should check to troubleshoot the issue?

Check if the cable is connected on the modem s line RJ-11 port.

A user reports they cannot access the Internet. The technician has verified the user's browser settings. The user's PC has a static IP configuration. Which of the following is the NEXT step the technician should take?

Check the DNS server addresses and verify they are current.

A technician is repairing a workstation that exhibits random reboots at odd times of the day. Which of the following should be performed FIRST when troubleshooting the issue? (Select TWO).

Check the PSU integrity Check the memory integrity

A user, Ann, reports that her laptop will no longer connect to wireless. Joe, a technician, checks the device manager and does not see a wireless networking card or any unknown devices. Which of the following should Joe do FIRST? Correct!

Check to make sure the wireless card was not turned off via the hardware switch or keyboard shortcut.

Which of the following is considered a method of physical security?

Cipher locked doors

A user reports that they cleared a paper jam and now cannot print. The technician reseats the paper and then prints a test page from the printer. A test page sent from the workstation does not print. Which of the following actions should the technician take FIRST?

Clear the print queue.

A customer calls an IT consultant to explain an issue they are having with their Windows 7 Professional PC. Windows Update attempts to install patches upon each startup but fails on the same single update. The customer has attempted to re-run Windows Update from Control Panel but the issue remains. Which of the following courses of action would BEST resolve the problem?

Clearing the Windows Update download cache entirely

Which of the following can be achieved with Group Policy to help with workstation security measures?

Complexity requirements

A user's computer will not boot. A technician notices four indicator lights on the backside of the computer. Two of the lights are green, and two are amber. Which of the following documentation should the technician read to determine what the lights are indicating?

Computer manual

A user is trying to access an application on their home machine from work. The user sets up port forwarding on their router but is still unable to connect to the application. Which of the following should be the user's NEXT step in resolving this issue?

Configure a firewall exception on the Home PC.

The technician is dispatched to a user's home to secure a wireless network. The SOHO user has only one system to connect wirelessly, yet wishes to protect their Wi-Fi from unauthorized use. Which of the following will BEST meet the user's requirements? Correct!

Configure the router to allow access by MAC address.

A user states that they cannot connect to the network or the Internet. The technician determines the issue is that the computer has a static IP address and needs to use DHCP to work correctly. The technician sets the NIC to automatically assign an IP address. Which of the following should the technician perform NEXT?

Confirm the computer is back on the network and has Internet connectivity

Which of the following security controls would be an example of the least privilege principle on a home PC?

Create a standard user account for kids.

Which of the following is the BEST tool for a technician to use to make sure the network cable is securely fastened in the RJ-45 connector?

Crimper

Which of the following would have to be disabled on a PC if a user wants to assign a static IP address on that PC?

DHCP

A customer calls and states the new plasma display they just received has yellow spots all over the screen. Which of the following is the MOST likely cause of this issue?

Dead pixels

When securing a new wireless router, which of the following should be changed FIRST?

Default password

Which of the following helps to prevent virus infections from USB flash drives?

Disabling the USB on the computer

A user has an LCD and a CRT monitor attached to their workstation. The colors are slightly off on the CRT but not the LCD. Which of the following controls should be used in troubleshooting?

Degauss

A user reports that a computer reboots several times a day unexpectedly. Configuration management shows that the machine recently had a second hard drive and a DVD-ROM burner installed. Which of the following BEST describes the troubleshooting steps?

Determine the available wattage offered by the power supply and ensure it meets the power needed for all of the system components.

A laser printer is producing completely blank sheets. Which of the following processes should the technician check FIRST?

Development

A technician wants to know if a PC has an embedded wireless card. Which of the following tools should be used?

Device Manager

A user has plugged in a mobile phone to a PC and received a message that the driver was not successfully installed. Which of the following system tools should be used to troubleshoot this error?

Device Manager

Which of the following utilities would a technician use to verify that a sound card is correctly installed on a PC?

Device Manager

A user states that when they power on their computer, they receive a "Non-bootable drive" error. The user works with external storage devices to transport data to their computer. The user stated that the computer worked fine the day before. Which of the following should be checked FIRST to resolve this issue?

Device boot order

Which of the following should a technician implement to prevent external contractors from physically plugging devices into the company's network jacks unless such jacks are designated for guest use?

Disable all switch ports when they are not utilized and enable them on an as needed basis.

Which of the following security best practices would prevent a program on a CD from immediately launching when inserted into a computer?

Disable autorun

A client has a computer that is infected with several viruses and spyware. Which of the following should the technician perform FIRST before spyware removal?

Disable system restore

A user, Ann, reports that she suspects her workstation has malware. Joe, the technician, confirms malware exists and starts the process of removing the malware. Which of the following is the FIRST step he should take in removing the malware?

Disable system restore

A technician recently setup a new wired network and wants to ensure only their computers can use it. Which of the following is the MOST secure way to accomplish this?

Disable the extra ports on the router.

A technician is configuring a PC that will have confidential information stored on it. To ensure that only authorized users can access this PC, which of the following should the technician do?

Disable the guest account Change the default username

When securing a small office home office (SOHO) that has empty cubicles with unused network ports, which of the following can be used to secure ONLY the unused ports?

Disable the ports on the router or switch.

A technician has configured the ability to connect to a small office server using remote desktop from a workstation within the office. The technician has reviewed logs that show constant brute force attacks to that server from outside the network. Which of the following would prevent this from occurring?

Disable the remote desktop port

A user will be installing a switch in a public location and will allow the six users in the office to connect to it withCAT6 Ethernet. Which of the following actions would BEST ensure that there is no unauthorized access to the switch?

Disable unused ports

A service technician is installing a second hard drive on a desktop PC running Windows 7. The second hard drive is the same make and model of the first hard drive. The technician would like to provide data redundancy. Which of the following should the technician use to accomplish this?

Disk Management

A user is reporting that their screen is flickering at a rapid rate. Which of the following Control Panel paths should a technician use in order to remedy this issue?

Display -> Settings -> Advanced -> Adapter -> Refresh

A large magnet is placed too close to a CRT monitor. Which of the following will MOST likely occur?

Distorted image

A technician has finished replacing the network card in a laptop and has verified full system functionality. Which of the following troubleshooting steps should the technician take NEXT?

Document findings, actions, and outcomes

A technician is using the troubleshooting theory to help resolve a problem that is occurring with a client's machine. The technician has verified system functionally. Which of the following is the NEXT step in the troubleshooting theory?

Document findings, actions, and outcomes

An office of 25 computers is interested in employing a file server, network shares, and print server functionality. Which of the following network setups would be BEST suited for this situation?

Domain

A contractor needs to destroy several drives containing confidential information so that they can never be used again. Which of the following destruction methods would BEST accomplish this task?

Drill into the hard drives.

A bank is upgrading some clerical users' PCs. Which of the following would be the MOST appropriate method for erasing the data on the old PCs?

Drive degauss

Which of the following security threats do shredders help prevent?

Dumpster diving

A user states that when they logon to their computer sometimes they get an IP conflict error. The user computer is configured with a static IP. Which of the following is the problem?

Duplicate IP exist on the network

Which of the following passwords is the MOST secure according to industry best practices?

E@sy2Remember

Which of the following should a technician do LAST after cleaning up a virus infection?

Educate the end user

Two employees share a computer. The computer has a locally attached USB printer. Both users are local administrators of the computer. Both employees login under their own accounts. Employee A can print with no issue; however, employee B cannot. No error messages are reported. Which of the following is MOST likely the problem?

Employee B`s profile is set to use a virtual printer as the default printer.

A technician wants to know the MAC address of a computer. Which of the following commands would the technician use?

IPCONFIG

A user installed a new SOHO router and new wireless NICs to increase their transmission speed from 802.11b to 802.11g with the manufacturer's default settings. The user lives in an apartment building and is still experiencing slowness to the Internet after the installations. Which of the following is the MOST secure option that a technician could implement to resolve this issue?

Enable MAC filtering

A user wishes to access their contacts from their Android phone. Which of the following methods will provide the MOST up-to-date contact information on the user's phone on a daily basis?

Enable contact synchronization by setting up their email account on the phone.

A company recently had a security breach and is now required to increase the security on their workstations. A technician has been tasked to harden all the workstations on the network. Which of the following should the technician do?

Enable screensaver required passwords

A technician is implementing a SOHO wireless network for Company A that shares a floor with Company B. Which of the following would BEST secure the wireless network so that only Company A employees are allowed access?

Enabling MAC filtering

A user has installed a new wireless router and is unable to connect their game console to the manufacturer's service. Which of the following should the technician look for FIRST?

Ensure the correct ports are open.

A user is reporting their web browser is not going to the site they are attempting to access. Which of the following would BEST resolve this?

Ensure the user is not utilizing a proxy server.

A technician is working on an issue and has identified the problem and worked out the cause. Which of the following would MOST likely be the NEXT step the technician should make?

Establish a plan of action

A technician receives an error every time a workstation boots up. The technician needs to find out what process is responsible for the error. Which of the following utilities would be used FIRST?

Event Viewer

The customer reports their PC freezes up every day around the same time. Which of the following utilities would be BEST to check for any error codes?

Event Viewer

A new application is installed which adds three new services to a customer's PC. The customer asks for help, because the new application will not start. A technician investigates and finds that one of the services has failed to start. They attempt to manually start the service but it fails. Where should the technician look NEXT for more information? (Select TWO).

Event Viewer Log files for the new application

A printer is suddenly not printing using Windows XP. Which of the following is the BEST procedure to get the printing restarted?

Examine the print queue, stop and then restart the spooler service.

A user wants to quickly install the most recent security patch released. Which of the following options can be selected from the Windows Update website?

Express settings

A customer reports that their wireless laptop cannot connect after removing it from its carrying case. The laptop boots and the user is able to log in. Which of the following should be checked FIRST?

External antenna switch

A technician needs to format a file system to be compatible with the WIDEST range of operating systems. Which of the following file systems should be used?

FAT32

A user states their workstation will not reach the login screen. Which of the following commands can be used to write a new partition boot sector to the system partition in the Recovery Console?

FIXBOOT

Which of the following commands may need to be run after a virus removal if the computer will not boot?

FIXMBR

A technician would like to dispose of a hard drive that is no longer needed. According to company policy, all contents on the disk should be deleted before disposal. Which of the following OS command line tools should be used?

FORMAT

After being infected with a virus, a user's computer does not recognize the user as having local administrator rights to the computer. After troubleshooting the issue, a technician determines the computer needs to be rebuilt and data needs to be restored from the user's backup. Which of the following tools would BEST reset the computer to how it worked when first purchased?

Factory restore CD

A technician notices that a computer is making a loud clicking noise but continues to run. System speed is barely affected, but they cannot access certain drives. These are the symptoms of which of the following?

Failing second hard drive

A user is looking for the Application Data directory in their profile but cannot see it. Which of the following Control Panel options would correct this?

Folder Options

In which of the following locations would a technician go to show file extensions?

Folder Options

Which of the following Control Panel utilities will allow a technician to change the associated file type in a Windows XP machine?

Folder options

Which of the following BEST describes the security term known as tailgating?

Following behind someone when entering a secure area

When scheduling a backup for preventative maintenance, which of the following would ensure all data was captured?

Full

A technician would like to ensure all previous data is erased before reloading Windows 7 Home Premium onto a laptop. Which of the following procedures would accomplish this?

Full format

A technician receives a report that the pages coming out of a laser printer are smearing when touched. Which of the following components should the technician check FIRST to resolve this issue?

Fuser

While using a mapping program, which of the following functions shows the user's location on the map as well as movements on the map as they travel?

GPS

A custom configured PC with a powerful processor, high-end video, upgraded audio, and increased cooling would be MOST suited to which of the following applications?

Gaming PC

A user, Ann, reports that her computer is able to connect to devices on her local network but not on the remote office network. Ann's computer shows the following ipconfig information: IP address: 192.168.10.45 Subnetmask: 255.255.255.0 Gateway: 192.168.11.1DNS server 1: 192.168.10.2 DNS server 2: 8.8.8.8 Which of the following is the cause of the problem?

Gateway is set incorrectly.

Which of the following user accounts should be disabled to adhere to security best practices?

Guest

Which of the following mobile phone features redirects the screen orientation as the user turns their phone?

Gyroscope

A technician is having boot issues with a newly built PC, and notices the following jumper configurations for each PATA device: HARD DRIVE. MASTER OPTICAL DRIVE. CABLE SELECT Which of the following jumper configurations should be used instead?

HDD. Cable Select; Optical DrivE. Cable Select

When walking past a server with a RAID 5 array, a technician hears a loud clicking noise. Which of the following could MOST likely occur?

Hard drive failure

Browser redirection is caused by which of the following types of viruses?

Hijack

Which of the following Windows 7 versions comes with the LARGEST number of multimedia features?

Home Premium

Which of the following Control Panel items will allow for easy streaming of pictures, music, and videos to other Windows 7 PCs?

HomeGroup

Which of the following options is MOST likely active on a network of three workstations, running Windows 7 Home Edition x64, to enable File and Print sharing?

HomeGroup

A customer states that another technician just removed some viruses and now they are not able to connect to websites such as Windows Update, but are able to connect to others. Which of the following is the MOST likely cause of the issue?

Host file has been manipulated

Which of the following terms BEST describes the software or hardware used to manage virtual machines?

Hypervisor

A user is having trouble connecting to the Internet. Which of the following commands should a technician use, from the user's workstation, to ensure that the workstation has a valid IP address?

IPCONFIG

A technician has a client's laptop that is randomly shutting down. Which of the following is the FIRST step of the troubleshooting theory that the technician will perform to resolve the laptop's issue?

Identify the problem

A technician is trying to diagnose a laptop that is experiencing heavy artifact corruption and random loss of video during operation. Which of the following are MOST likely causes of this problem? (Select TWO).

Incompatible or untested video drivers have been installed. Integrated system video chip is failing and/or near death.

A technician is tracing a cable from a desk back to a patch panel in the wiring closet. The cables are not labeled. Which of the following tools would BEST trace the cable?

Induction toners

After installing a new printer the organization determines that there are problems printing images and very large files. Which of the following will MOST likely resolve the issue?

Install additional memory to the printer

A company wants to prevent non-authorized users from entering into a secure building. Which of the following will BEST mitigate this activity?

Install mantraps

A technician is tasked with installing a legacy application on a Windows 7 computer. When the technician tries to install the legacy application, an error is received that the application cannot be installed because the OS is not supported. Which of the following should the technician do FIRST to try to get the application installed in Windows 7?

Install the application with compatibility mode

A customer needs to setup their laptop for use with a proxy server to browse the web at work. Which of the following areas would a technician need to visit to configure this on a Windows 7 system?

Internet Options

A user calls the helpdesk and states that they are receiving an IP conflict error on their computer. The user is on a company network that uses DHCP. The technician verified the PC is using DHCP to obtain TCP/IP settings. Which of the following commands should the helpdesk technician use to resolve this issue? (Select TWO).

Ipconfig /renew Ipconfig /release

A technician is required to change a setting for HKEY_Local_Machine. Which of the following would the technician use to change this?

REGEDIT

A technician is reconfiguring an email account for off-line mode. Which of the following will describe the expected time of account synchronization with the email server?

It will depend on the time when the account was last synchronized.

Which of the following command line tools will terminate a non-system process without restarting the computer?

Kill

A technician is taking apart a laptop in order to replace an internal part. During this process, which of the following represents a best practice?

Label the screws according to where they came from

Which of the following security concepts establishes the notion that a user should only be given sufficient access to the resources they need to perform their job function?

Least privilege

A technician is tasked with changing the account lockout threshold to 30 minutes in Windows 7. Which of the following should the technician use to accomplish this task?

Local Security Policy

A technician is trying to setup a non-domain user account on a workstation, but receives the following error message "Password does not meet the complexity requirements." Which of the following utilities should the technician use to identify the criteria?

Local Security Policy

A technician needs to change the minimum password length to 8 characters to make it more secure. Which of the following system settings should the technician configure?

Local Security Policy

A technician has a computer locked in a cabinet in the office that shares a printer and some files. The computer must remain on. Which of the following Control Panel options would be used to control the users that are able to shut the computer down?

Local security policy

A technician would like to limit computer access to certain users. Which of the following should be configured?

Local security policy

A user regularly has to walk away from their computer and is worried someone may access their workstation. Which of the following would BEST prevent this?

Lock the workstation

Which of the following are examples of physical security? (Select TWO).

Locked doors Badges

A senior technician requests a diagnostic tool for checking external ports and connectors on computers and laptops. Which of the following tools would BEST accomplish this task?

Loopback plugs

A company is looking to donate a collection of old PCs that are no longer needed. Which of the following data destruction methods would be MOST secure for highly sensitive information?

Low level 7-pass random wipe

A PC has sensitive data that must be destroyed, before the PC is redeployed. A technician has been tasked with completely wiping the PC hard drive. Which of the following methods is BEST for the technician to use?

Low level format

A technician recently replaced a user's monitor and now the user is reporting that the screen is filled with static and appears distorted. Which of the following will resolve the issue?

Lower refresh rate

A user gets a warning from their ISP about illegally downloading copyrighted movies. The user insists that they did not download any movies and calls a technician to implement stronger small office home office (SOHO) security. Which of the following will allow only known workstations to connect to the SOHO router?

MAC filtering

Which of the following identifies traffic based upon its physical network address?

MAC filtering

A technician is installing and configuring a SOHO wireless network for a client. The client only wants five authorized computers to connect to the network with a defined IP range. Which of the following should the technician configure on the router? (Select TWO).

MAC filtering DHCP

A technician wants to create a customized list of common utilities that are easily accessible in the same location. Which of the following tools would allow them to build such a list?

MMC (Microsoft Management Console)

A user has too many applications starting when they log into windows. From the command line, which of the following tools is the FASTEST option to prevent these applications from running on startup?

MSCONFIG

A user states that the computer takes a long time to load the desktop after login. Which of the following tools should be used to help remediate the problem?

MSCONFIG

A user states that their machine is taking much longer to boot than usual. Which of the following utilities would BEST allow a technician to limit what is launched at startup?

MSCONFIG

A technician needs to use Remote Desktop Connection in order to get access to a remote Windows workstation. However, the Programs menu has been hidden and they only have access to the Run command utility or a command-line prompt. Which of the following is the utility that the technician should use to access Remote Desktop Connection?

MSTSC (Microsoft Terminal Services Client)

A client calls after connecting the keyboard and mouse to a new computer. The client indicates that neither the keyboard nor the mouse works. The technician has determined these devices are connected through the PS/2 ports. Which of the following recommendations is BEST?

Make sure the PS/2 plugs and ports are color matched.

A user has recently installed Windows 7 on a computer. They ran Windows updates, updated the firmware and installed a printer. The user accessed a P2P application and now they are getting a large amount of browser pop-ups. Which of the following is MOST likely the cause of the pop-ups?

Malware

A company is experiencing issues with third parties tailgating authorized users during entry to secure server rooms. Which of the following would BEST alleviate this problem?

Mantraps

A technician wants to ensure that only authorized administrators can make configuration changes to the company's wireless router. Which of the following MUST the technician change to prevent unauthorized users from modifying the access point configuration?

Manufacturer password

Which of the following is the BEST definition of what an accelerometer does?

Measures velocity in a given direction

A PC is powering on but the only activity a technician can see is spinning fans. Which of the following components would MOST likely be at fault for such a condition? (Select TWO).

Memory CPU

A user reports that they are receiving intermittent BSOD error messages. Which of the following tools should a technician use to determine which hardware is failing?

Memory diagnostics

A user, Joe, has just finished upgrading his computer with a wireless keyboard/mouse combination, additional memory, installed new speakers, and replaced his 15 inch flat screen with a 24 inch flat screen. When he boots the computer it immediately starts making a loud beeping noise and will go no further in the boot process. Which of Joe's system upgrades is the cause of the problem?

Memory is mismatched

Which of the following data transfers will retain the current NTFS permissions of a file?

Moving the file to a different location on the same volume

Which of the following allows a user to pinch zoom on an Android device?

Multi-touch

Joe, a technician, would like to map a network drive when he starts up his computer in the morning. Which of the following commands would he use to accomplish this task?

NET

Which of the following commands would a technician use to map a network share?

NET

A technician is creating a batch script that auto-assigns a particular drive share to a drive letter upon login. Which of the following commands can accomplish this?

NET USE

Which of the following commands is used to map a network drive?

NET USE

Which of the following utilities will display a listing of active IP ports on the computer being tested?

NETSTAT

Which of the following is true for a 10/100 NIC running at full-duplex?

NIC will simultaneously transmit data in both directions at a time.

Which of the following is the command line entry to start an archive or restore a process on a Windows XP computer?

NTBACKUP

Which of the following resources is MOST important for accessing remote virtual environments on a client machine?

Network speed

A technician has upgraded an internal WiFi card on a laptop and now the signal power to connect to a WAP is low. Which of the following is the MOST likely cause of the issue?

One of the antenna wires is unplugged.

Which of the following statements is true about XP mode in Windows 7?

Only the Professional and the Ultimate versions support Windows XP mode.

After being relocated to an enclosed position under a desk, a computer experiences intermittent shutdowns. Which of the following conditions is MOST likely the cause?

Overheating

A user sent an email requesting that a technician check if a computer is on and connected to the Internet so the user can login from home. Which of the following commands in the command prompt would a technician use to verify if the computer is on and connected without having to go to the computer?

PING

Which of the following protocols could a technician use to connect a smartphone to an email server? (Select TWO).

POP3 SMTP

A user just bought an Android tablet and wants to connect to their work email. The user's employer has a Microsoft Exchange server for email. Which of the following would the technician configure to allow the user to access email on the Android tablet?

POP3, SMTP

A user states their Windows XP desktop PC fails to boot to the Windows logo. Which of the following tools could a technician use to help diagnose if there is a pre-boot failure?

POST card

A technician troubleshoots a broken PC only to find that a strong burning odor is coming from inside the case. Which of the following parts MOST likely experienced a level of electrical burn?

PSU

A technician has 50 identical computers that need to be upgraded to the Windows 7 OS, and are capable of booting from the network. They are running a Gigabit network with a Windows deployment server. Which of the following will be the BEST to use in this scenario?

PXE (Preboot Execution Environment)

A user's PC breaks and a technician needs to configure a new machine with a copy of their computer image stored on a remote server. Which of the following technologies would help RIS install this image?

PXE (Preboot Execution Environment)

Which of the following BEST describes a method for installing an operating system across the network?

PXE (Preboot Execution Environment)

Which of the following BIOS boot methods allows a system to boot from a remote server?

PXE (Preboot Execution Environment)

A technician must secure company documents from accidental disclosure. Which of the following should be implemented? (Select TWO).

Paper shredding Paper shredding

A virtual machine running locally would be BEST utilized in which of the following situations?

Patch testing before rollout

An alert needs to be sent to the administrator when the CPU stays above 90% for a period of time. Which of the following tools would BEST be used to accomplish this?

Performance Monitor

An attack that creates a website that looks like another website, with the purpose of learning someone's account information is called which of the following?

Phishing

Which of the following is a security threat that uses email to trick users?

Phishing

Which of the following security threats are MOST often delivered via email? (Select TWO).

Phishing

An IR printer stops working for half of an office while the other half is able to print. Which of the following should be checked FIRST?

Physical obstructions

A user reports paper jams at the location of the paper trays. Which of the following components would need to be replaced to resolve this issue?

Pickup roller

Which of the following data types can be synchronized to a mobile device by default? (Select TWO).

Pictures Contacts

A technician is tasked with improving the security of a SOHO network. The office is comprised of a single wireless router located under the front desk where the office manager sits. All desktop computers are wired into the router which is configured with strong device credentials. Additionally, wireless is disabled on the router. Which of the following should the technician perform NEXT to improve the security of the SOHO network?

Place the router in a locked room.

Which of the following display types may be practical for a laptop format, but has limited uses due to heat considerations?

Plasma

Which of the following supports IP telephony devices without requiring external power?

PoE (Power Over Ethernet)

A customer wants to use VoIP phones without having to plug them into an electrical outlet. Which of the following switch features would a technician recommend?

PoE (Power over Ethernet)

Which of the following settings MUST be configured in order to turn on a VoIP phone?

PoE (Power over Ethernet)

An administrator has taken steps to secure a SOHO wired network, but as a result the users report that they can no longer access the Internet but can still see other computers on the network. Which of the following would have caused this issue?

Port 80 has been disabled

A user wants to change the functionality that occurs when the laptop lid is closed. Which of the following Control Panel options is the MOST direct way to adjust this?

Power Options

A user has a laptop that they need to get ready for an outdoor presentation. The user is concerned that the laptop will turn off the screen or go into standby before their presentation is complete. Which of the following Control Panel paths should the technician use in order to prevent this from occurring?

Power Options -> Power Schemes

Which of the following has the HIGHEST level rights?

Power User

A technician has been dispatched to a customer site to diagnose an issue where the computer turns off intermittently. Upon arriving at the site, the technician detects a smoke smell coming from the computer. Which of the following is the BEST solution?

Power down the system and replace the power supply.

A computer starts to boot then quickly shuts down. Which of the following should the technician use to troubleshoot this issue?

Power supply tester

A storm occurred overnight and a user is having a problem turning on a workstation. The technician has determined power to the monitor is good when plugged into the same power strip as the workstation. Which of the following is the BEST tool to use?

Power supply tester

A technician is troubleshooting a customer's computer that will not turn on. The user stated that the computer was working fine until there was a thunderstorm the other night. Which of the following tools would the technician use to determine what is wrong with the computer?

Power supply tester

Which of the following is the MINIMUM account required to install most programs on Windows XP?

Power user

Which of the following steps would allow display output from a laptop to an external display? (Select TWO).

Press the appropriate Function Key combination Enabling second monitor in the Windows Display Settings

Which of the following is BEST used to prevent other people from viewing a user's computer screen?

Privacy filter

Which of the following features helps to prevent shoulder surfing?

Privacy screen

Which of the following Control Panel utilities would be BEST to use to remove a Windows 7 application?

Programs and Features

For any given 802.11n wireless Internet signal, which of the following is needed to establish a connection?

Proper SSID

A technician installed a second hard drive in a computer. Upon restart, a message appears stating, "primary drive 0 not found. Press F1 to continue." Which of the following should the technician check FIRST?

Proper drive installation (e.g. cables/jumpers)

A user is reporting that they are clicking on search results and being redirected to the wrong sites. Which of the following should a technician check FIRST?

Proxy Settings

On a corporate network, which of the following features would be used to redirect network traffic for filtering or monitoring?

Proxy Settings

A customer reports that after a technician cleaned up a rogue antivirus program, the customer cannot browse the web. Which of the following should the technician check to resolve the situation?

Proxy settings

Which of the following is the BEST tool for a technician to use to make sure the network wires are securely fastened in a wall jack?

Punch down

Which of the following tools would be used to connect CAT5e cabling to a patch panel?

Punch down

A workstation is making a loud clicking noise that is originating from the hard drive and it is not booting. Which of the following should the technician do FIRST?

Put the hard drive in another system and back up all data from it.

A technician needs to build a PC to act as a home virtual server. Which of the following would be the BEST choice?

QUAD Core CPU, 6GB DDR3 RAM, 320GB of hard drive space

A user wants to configure their network to support VoIP. Which of the following would BEST support a VoIP installation?

QoS (Quality of Service)

A technician is working on a PC that utilizes a RAID array for operation. The user of the system has reported that random files are becoming corrupted on creation with no pattern to the activity. One drive in the array is likely failing and causing the read/write failures. Which of the following Types of RAID is MOST likely in use?

RAID 0

A customer is concerned about a computer that repeatedly beeps when attempting to power on. Which of the following is MOST likely the cause?

RAM not seated properly

After installing a single new RIMM memory module the system fails to start properly or recognize the new memory. Which of the following is MOST likely the problem?

RIMM modules must be installed in pairs.

A user is reporting that they cannot connect to the wireless network from their office but they were able to connect yesterday. Which of the following would be the MOST likely reason?

Radio switch on laptop is disabled

A user is experiencing slow performance with their computer. A technician suspects the computer has a virus and runs antivirus software. A virus is found and removed, but the performance issue is not resolved. Which of the following should the technician perform NEXT?

Re-establish a new theory or escalate

A user gets an error message that the trust relationship to the domain has been broken. Which of the following can be done to resolve this from the client desktop?

Re-join the computer to the domain

A client reports that their VoIP phone screen displays duplicate IP address. Which of the following is the FIRST action to try to resolve this problem?

Reboot the phone

Which of the following is an advantage of a virtual machine hosted on a PC?

Reduces the amount of physical hardware required.

A company wants to ensure that the latest cyber security threats are known to the employees across the enterprise to minimize occurrences. Which of the following should be implemented?

Regular user education

After accidentally removing a hard drive from a server with three drives in a RAID 5 configuration, a technician notices the server locks up and shuts down. Which of the following can the technician do to quickly fix the problem?

Reinsert the drive and boot.

A user realizes they left their mobile phone in a taxi minutes after the car departs. Which of the following should be done to BEST ensure none of the private data on the phone is accessed?

Remote Wipe

An employee at a company lost their mobile device that contains proprietary information. Which of the following methods is the BEST to be implemented to prevent unauthorized users from obtaining this information?

Remote wipe

Which of the following software types would need to be installed on a mobile device to help prevent data from being viewed if the device is lost?

Remote wipe

Which of the following would be the BEST means of maintaining data security for a mobile device that has been lost or stolen?

Remote wipe

A PC uses RAID 1. Ann, a technician, has read in the event log that the drive "SATA 1" is no longer in sync with drive "SATA 0". Which of the following steps should she try FIRST to repair this PC to optimal running conditions?

Remove SATA 1 from the RAID group then try to re-add it

A user has downloaded and installed a browser add-on that causes the browser to hang. The PC has very slow system response when rebooted. Which of the following should a technician do to troubleshoot this problem?

Remove all temporary files, turn off System Restore, update and run an antivirus scan.

A technician is tasked with upgrading a network card on a Windows 7 Professional PC. The technician installs the network card, loads Windows XP drivers that came with the network card, and reboots the PC. Upon rebooting, the computer blue screens and the technician cannot get the computer to boot up properly. Which of the following should the technician perform to resolve this issue without any data loss? (Select TWO).

Remove network drivers Boot up in safe mode

Which of the following is the BEST way to get rid of dead pixels on a laptop screen?

Replace the LCD

Ann, a user, has brought her laptop in for service. She reports that her battery is at 100%, but whenever it is unplugged it immediately shuts down. Which of the following should the technician do?

Replace the battery

The technician is dispatched to look at a user's laptop. The user reports the system shuts down after 30 minutes of field use. The technician notices the battery is not fully charging. Which of the following should the technician perform to resolve this?

Replace the battery.

A user is running a RAID 0 array and has problems with one of the drives. Which of the following actions will the technician take NEXT?

Replace the drive; all the data is lost and cannot be recovered.

A technician is called in to troubleshoot a four disk RAID 10 array on a high end Windows 7 Enterprise workstation. One drive has failed. Which of the following should the technician do to fix the problem?

Replace the failed drive and verify the RAID is healthy.

A technician is troubleshooting a RAID 6 array on a high end CAD/CAM workstation. Two disk drives have their fault lights on. Which of the following is the BEST action for the technician to perform when fixing this problem?

Replace the failed drives and verify the RAID rebuilds completely.

A corporate end user reports that random keys on their laptop are sticking. After taking the laptop in for repair a technician discovers that soda has been spilled inside the keyboard, possibly reaching other components inside the laptop. Which of the following should the technician do?

Replace the keyboard and clean the interior of the laptop if necessary

A technician is trying to prevent a local application from reaching the web due to security concerns. Which of the following solutions could BEST prevent the application from reaching the web? (Select TWO).

Reroute the web address in HOSTS file Block the application in Windows Firewall

A technician has installed a maintenance kit on a laser printer and replaced all consumables. Which of the following should the technician do NEXT?

Reset the page count.

After updating the device drivers for a video adapter, a user reports they are only able to view a portion of the screen and the text is very large. Which of the following is MOST likely the cause?

Resolution set too low

A technician is working on a user's PC. After testing the theory of the cause, which of the following could the technician perform NEXT? (Select TWO). Correct Answer Resolve issue

Resolve issue New theory or escalate

A user has not received any new emails on their smartphone in the last two days. The user is able to access the Internet without any problems. Which of the following should the user do FIRST?

Restart the smartphone

A technician is called onsite to solve a network connection error. Upon arrival, the technician observes a message on the screen stating there is no boot drive found. Which of the following steps should the technician take NEXT?

Restart the system to verify the proper boot sequence.

A user is advised by the software vendor that the user must have elevated privileges in order to run a program. The user should do which of the following to BEST accomplish this?

Right click select "run as" and select administrator

Which of the following is solely designed to avoid detection by an antivirus program by using the underlying operating system to its advantage?

Rootkit

Which of the following allows a hidden backdoor to be used for access to workstations on the Internet?

Rootkits

A user reports an issue of intermittent Read / Write errors occurring on their PC. Which of the following actions would a technician MOST likely take?

Run CHKDSK on the drive

A technician is about to put a computer back into service that has not been turned on for many months. It was healthy when taken out of service and boots quickly without any problems. Which of the following actions would be a best practice to begin computer maintenance? (Select TWO).

Run Windows updates. Run antivirus updates.

A technician recently created an email account for a new user, Joe. On the second day, Joe reports his email account is full of spam even though he has not given out his address. Which of the following should the technician do to resolve the issue?

Run an anti-spyware scan

A technician is fixing a very slow computer. Antivirus and Malware programs have been run, and some detection have been removed. After running Disk Cleanup, the system still seems to be slow, especially with multiple programs running. Which of the following should the technician do NEXT?

Run defrag

After several passes with a malware removal program, the program keeps detecting the same malware infection after a reboot. Which of the following should be done to attempt to remove the offending malware?

Run the malware removal program in Windows Safe Mode

Joe, a technician, receives an error message on his tower PC just after POST which reads: "WARNING! Your drive is about to fail. Please back up your data and run full drive diagnostics." Which of the following is generating this error message?

S.M.A.R.T.

A technician believes a machine loaded with Windows XP Professional has issues with file integrity of the core OS components. Which of the following commands could be used to both check and replace damaged files?

SFC /SCANNOW

A technician recently removed spyware from a computer and now the user is getting error messages about system files. Which of the following tools would a technician use to verify all system files are intact and in their original versions?

SFC(System File Checker)

A user reports that they are getting frequent delayed write messages throughout the day and are experiencing sluggish performance. The technician suspects that the issue relates to the hard disk drive. Which of the following would BEST help validate the diagnosis?

SMART status

A technician is creating an image that will be used to deploy Windows 7 to 100 PCs. Which of the following tools should be used to accomplish this?

SYSPREP

A user recently installed a new video driver on a PC but now it will not boot. Which of the following is the BEST option to correct the issue?

Safe mode

Which of the following can enable a technician to remove a virus that prevents users from updating their antivirus software?

Safe mode

A user's computer keeps producing a "low virtual memory" alert and the speed of the system degrades afterwards. Which of the following Control Panel locations can provide information to review and correct this issue?

System > Advanced

Which of the following tools and test equipment is routinely magnetized and should be used with caution around magnetic media?

Screwdrivers

A user is installing Windows 7 on a PC with a RAID card. The user has verified all of the cables are connected correctly, but the installation media does not detect any hard drives. Which of the following should the user do to help detect the hard drives?

Select load driver

A technician needs to configure their neighbor's iPad. The neighbor wants to access their work email. The technician requires some information from their neighbor's work IT department. Which of the following information does the technician need?

Server and domain

A consultant is looking to consolidate six company servers onto one physical system. Which of the following requirements is MOST important on the new setup to ensure stable functionality of the virtual environment?

Server hardware resources

In order to prevent other users from editing files in `C:\ Files', which of the following steps should be taken?

Set NTFS permissions to read only

In a SOHO wireless network, which of the following prevents unauthorized users from accessing confidential data?

Set encryption

A user has just purchased a wireless router for their home. Which of the following should be done to BEST secure the router from unauthorized access? (Select TWO).

Set encryption on the router. Change router default logins.

Ann recently upgraded a computer from Windows XP to Windows 7, but one of her applications does not work now. Which of the following should be done FIRST?

Set the application to run in XP compatibility mode

A user has installed a second hard drive into a computer and receives a message stating `Invalid Boot Volume.' Which of the following should a technician recommend to solve this problem?

Set the jumpers on both hard drives to C/S.

An administrator is concerned about users accessing network shares outside of their job role. Which of the following would BEST prevent this?

Set up shares with permissions based upon group membership.

Which of the following is the correct path to determine the IP address on an iOS device?

Settings> General> Network> Wi-Fi> SSID Name> IP address

The folder "Documents" is shared. The user can create and delete documents when on the local PC, but can only read documents when accessing them remotely. Which of the following should be adjusted?

Share Permissions

Privacy filters applied to users computer screens are used to combat which of the following security risks?

Shoulder surfing

Which of the following security threats does NOT use software to extract sensitive information or credentials?

Shoulder surfing

Which of the following security threats requires the attacker to be physically located near the target machine?

Shoulder surfing

Which of the following describes when an application is able to reuse Windows login credentials?

Single sign-on

A technician is tasked with repairing a Windows 7 system including the removal of recently installed files and software. Which of the following system restoration methods would be the LEAST destructive way to achieve this?

System Restore

Which of the following security threats is BEST mitigated through proper user training?

Social Engineering

A pest exterminator tries to gain access to a company's computer lab, but the receptionist does not see an extermination scheduled on the calendar and denies the exterminator access to the lab. Which of the following security threats almost occurred?

Social engineering

A user receives a phone call from a person claiming to be from technical support. This person knows the user's name and that the user has Windows installed on their computer. The technician directs the user to open EventViewer and look at some event log entries to demonstrate the effects of a virus on the computer. The technician also asks the user for their user ID and password so that they can clean the computer. This is an example of which of the following security threats?

Social engineering

A user receives an unsolicited call from a technician claiming to be from a Microsoft certified partner. The technician tricks the user into allowing them access to their PC because of malware alerts that were being broadcasted. Which of the following attacks is this user a victim of?

Social engineering

A user, Ann, receives a call from Joe who states that he is brand new in the help desk. Joe states that he needs to update Ann's email client to prevent corruption. At Joe's request, Ann discloses her user name and password. She later discovers that Joe is not a member of the help desk. Which of the following has occurred?

Social engineering

Which of the following common security threats could be occurring when a user calls and requests his coworker's password?

Social engineering

Laptops and tablets have which of the following in common?

Solid state drives

An Internet browser's cookie could be classified as which of the following?

Spyware

A user does not want their kids to be able to install software on their home desktop. Which of the following types of accounts should the user set up in Windows 7?

Standard

A technician needs to rebuild a computer that had a virus. Which of the following data destruction methods should be used to ensure the virus has been successfully erased before reinstalling the operating system, programs, and all user data?

Standard format

Which of the following would be the QUICKEST means of removing data from a hard drive, when there is no consideration regarding the total destruction of the data?

Standard format

A user on a domain network cannot install software that they need. Which of the following user groups is this user MOST likely associated with?

Standard user

A local administrator would like to determine why a laptop is taking so long to boot into the operating system. Which of the following tabs in MSCONFIG would the administrator access to BEST determine this?

Startup

Which of the following tabs under MSCONFIG would allow a technician to configure all of the applications that launch at boot?

Startup

After an installation of a video adapter, the screen on a Windows 7 system cannot be seen. Which of the following Windows 7 functions will resolve this?

Startup Repair

A technician responds to a hardware issue with a server. The technician discovers that one of the hard drives in the server has failed. The server is set up in a RAID 1 configuration. Which of the following steps would the technician perform NEXT?

Swap hard drive and rebuild array

A user, Joe, calls and states every few hours he is unable to connect to the Internet for several minutes but is able to access internal sites during this time. Which of the following tools would be used to find the issue with the network connection?

TRACERT

Which of the following devices is MOST likely to come standard with a solid state hard drive?

Tablet

Which of the following is one of the major differences between a new tablet and a new laptop computer?

Tablet has no field serviceable parts.

When comparing laptops and tablet PCs which of the following is true?

Tablets typically use solid state drives

Turnstiles and other mantraps will prevent which of the following security threats?

Tailgating

A PC is running slower than usual. Which of the following tools would BEST diagnose the possible bottleneck?

Task Manager

An entry level network analyst calls and is not sure which Windows OS features to use to check for users who are currently logged on. Which of the following features would BEST assist this analyst?

Task Manager

From which of the following tools can a technician locate the PID of an application?

Task Manager

A critical server was replaced by the IT staff the previous night. The following morning, some users are reporting that they are unable to browse to the Internet upon booting their workstations. Users who did not shut down their workstations the previous day are able to connect to the Internet. A technician looks at the following report from a workstation with no Internet connectivity: IP Address: 192.168.1.101 Netmask: 255.255.255.0DHCP Server:192.168.1.1 DNS Server:192.168.1.2 Default Gateway:192.168.1.1 Given the above report, which of the following is the cause of why some workstations are unable to browse the Internet?

The DHCP server is misconfigured.

A user is operating a virtual machine (VM) and discovers it has been infected with malware. Which of the following applies?

The VM can be shut down with no harm to the host PC.

A user launches a software application on their Android tablet device. Once the software has loaded, the user reports that when turning the tablet to work the application in landscape mode, the software does not automatically adjust to landscape mode. Which of the following is the cause of the issue?

The application was not developed to react to changes to the gyroscope.

A user calls the help desk to report about their smartphone not being able to make any phone calls. The user admits that the smartphone can still send/receive email, browse all websites, and utilize all Internet-capable applications. Which of the following issues is MOST likely affecting the smartphone?

The cellular antenna is turned off; Wi-Fi is still on.

An end user reports that they are unable to access any websites or network resources by the fully qualified domain name (FQDN); however, the technician is able to access these resources by IP address. Which of the following is the MOST likely cause for this problem?

The customer's DNS server is unavailable.

A user states that their old notebook loses connectivity to the Internet several times a day at work and at home. The issue started after the wireless card was replaced. Which of the following items is MOST likely causing the issue?

The drivers for the NIC need to be updated.

A user recently purchased a new high-end graphics card, and would like to run their existing games through an LCD TV at 1080p. However, when the installation is complete, none of the games appear correctly on the LCD TV. Which of the following is the MOST likely cause?

The games do not support a 1920x1080 resolution.

A user reports that the desktop PC shuts down 10 minutes after turning it on in the morning. When the technician moves the PC, it sounds like there are loose parts sliding around in the case. Which of the following is the MOST likely explanation for the PC shutting down?

The heat sink retaining clip has broken loose.

A technician is troubleshooting a PC that is not completing POST and merely provides an audible beep code. Which of the following should be the FIRST item checked?

The memory configuration

A customer states that their laptop has stability issues after a recent memory upgrade. Which of the following is the MOST likely cause?

The memory is not properly seated.

A user reports that all print jobs sent to a certain printer that require legal sized paper are not printing. However, standard size paper jobs are printing correctly. A technician checks the paper tray and verifies that it is loaded with legal size paper. Which of the following is the MOST likely cause of the problem?

The paper size for the tray is incorrect in the printer setup.

A user reports that a file they shared out on their computer for another network user is not accessible to the third party. The user insists they specifically gave this third party Allow rights for Read and Write access. Which of the following could explain the problem at hand?

The parent folder has explicit Deny rights set for this user.

A technician recently installed a new video card in a PC. The PC already has integrated video on the motherboard. When the technician turns on the PC, there is no video. Which of the following is MOST likely the cause?

The power connector for the video card is unplugged.

A user states they have rebooted the printer and it is displaying "PC load letter". Which of the following is the MOST likely cause?

The printer is out of paper.

A user is unable to receive FTP antivirus updates from the vendor but has network connectivity. Which of the following settings should be checked? (Select TWO).

The proxy setting in the antivirus application Port 21 is open

A user's laptop has died but the hard drive is still functioning. Which of the following is the BEST way for the user to still access and edit all of their data?

USB hard drive enclosure

A customer purchases a new 802.11n router for their home. They connect it to their current 801.11g devices, as well as their new laptop. Even though the laptop has a built-in 802.11n antenna, they are not noticing any speed increase. Which of the following is the MOST likely cause?

The router is broadcasting in Mixed Mode.

After installing a new multifunctional printer, an administrator realizes the flatbed scanner does not scan any documents. Which of the following is the MOST likely reason of the issue?

The scanner lock switch on the device is locked.

A user with a CRT monitor notes that there is a discolored area in a portion of their screen. Which of the following is the MOST likely cause of the issue?

The screen needs to be degaussed

A technician replaced a laptop motherboard with an identical model and now wireless networking is not working. Which of the following is the MOST likely cause?

The technician failed to connect the antenna wires to the WiFi card.

A Windows user states that every time they hit certain letter keys on their notebook, a number appears instead of the letter. Which of the following items is MOST likely the cause of this problem?

The user enabled num lock.

A user reports that their PC boots up to a screen that reads "OS not found". Which of the following would be the MOST likely cause of this problem?

The user has a USB key attached.

A user recently purchased an 802.11g-capable laptop, but reports their network connection speed is much slower than expected. The technician notes that while the users wireless signal strength is excellent, they are connected at just 11Mbps. Which of the following BEST describes the cause of the problem?

The user is connected to an 802.11b wireless access point.

A user's CRT display is not displaying colors correctly. Turning the display to the right or left sometimes temporarily corrects the problem. Which of the following should the technician check?

The video cable

A user reports that their wireless connectivity is being spotty. The issue seems to interrupt their wireless signal connection when the laptop screen is tilted forward or backward during operation. When this happens, the entire wireless signal drops out until the screen is left in position for a good minute or so. Which of the following MOST likely explains what is happening?

The wireless signal cables are being crimped when the screen is opening/closing.

Which of the following BEST represents a security vulnerability of mobile devices? (Select TWO).

Theft Viruses

If a customer wants to create a multi-boot PC with different editions of Windows, which of the following is MOST important to consider?

Using multiple partitions

A user states that they are having a problem with their word processor on their laptop. Whenever they attempt to type letters with their right hand, numbers and symbols show up instead. Which of the following would address this issue?

Toggle the function + num lock combination

Which of the following is the BEST tool to verify the cable is plugged into the correct port on the patch panel?

Toner probe

Which of the following features allows for easier navigation of long lists on a tablet device?

Touch flow

Ann reports that printouts from the department laser printer have become faded. She has already replaced the toner cartridge. Which of the following is the MOST likely component causing the faded printing?

Transfer roller

A computer program that functions normally while quietly installing malicious software on a machine is known as a:

Trojan.

A user states when they press certain letters on their laptop's keyboard, a number is displayed on the screen. Which of the following can the technician perform to resolve this issue?

Turn off number lock

Which of the following home computer synchronization methods are possible with an iOS device? (Select TWO).

USB Wi-Fi

Which of the following can be used as an appropriate boot device?

USB drive

If a computer does not have an optical drive, which of the following is the MOST efficient method to install an operating system?

USB flash drive

A technician needs to decrease the time it takes to install an operating system on 100 computers. Which of the following installations would the technician use to reduce hands-on time spent on each computer?

Unattended installation

A technician discovers a networked computer has been infected with a zero day virus. Which of the following is the FIRST thing that should be done to the workstation?

Unplug it from the network.

A technician is called to assist a customer. The customer reports when they powered on the system, they heard a loud noise, saw a spark, and smelled a burning smell. Which of the following should the technician advise the customer to do FIRST?

Unplug the system from the power source.

A technician upgrades a computer from Windows XP Media Center Edition to Windows Vista Home Premium. After the upgrade Aero will not turn on. The system has a 2.4 GHz processor, 1GB of RAM, and a DirectX 7 video card. Which of the following will resolve this issue?

Upgrade the video card to a DirectX 9 compatible card.

Users are reporting that their laser printer is picking up multiple pages. The printer has very high utilization. Which of the following should be performed to resolve this issue?

Use a maintenance kit

A technician is changing out a toner cartridge in a high volume printer. As they are removing the empty cyan cartridge, a large amount of blue powder falls out onto rollers in the immediate area. Which of the following should the technician do NEXT?

Use a toner vacuum to remove the spilled toner from the undesired surfaces.

A technician is installing a new wired router and needs to disable all the ports currently not in use. The documentation for router mentions the web interface for the router is available by default at 192.168.1.1. In which of the following ways would the technician go about doing this?

Use an Internet browser to access the router configuration at 192.168.1.1.

Which of the following is the MOST secure method, short of physical destruction, that would be used to ensure that data on a hard drive cannot be recovered?

Use an overwrite program

A customer states their laptop screen is very dim. In order to avoid going to the client site, which of the following is the FIRST action the customer should perform?

Use function keys

A user has installed a legacy application in Windows 7 and reports that only some of the functionality in it is operational. Another user is using the same application on a different Windows 7 machine and doesn't report those problems. Which of the following features in Windows 7 may be responsible for this problem?

User Account Control

A technician is setting up automatic login to desktop for a non-domain Windows XP system. Which of the following administrative tools would accomplish this?

User Accounts

Which of the following is MOST effective in preventing security breaches on a network? (Select THREE).

User education Antivirus software Enforced login/logoff hours

A technician gets a call from a customer stating that their computer will not boot. They are getting the following error "invalid system disk". Which of the following should the technician check FIRST?

Verify that all removable drives are empty.

A user would like to run a copy of Windows XP for testing; however, the user is currently using a Windows 7 PC. Which of the following technologies should a technician recommend in order for the user to have access to both systems simultaneously?

Virtualization

Which of the following encryption standards is found on older wireless devices and provides minimal security?

WEP

Which of the following are true regarding Windows 32-bit versus Windows 64-bit Operating Systems? (Select TWO).

Windows 64-bit can address larger amounts of RAM. Not all CPUs are capable of running Windows 64-bit.

Which of the following operating systems is capable of fully utilizing more than 4GB of system RAM?

Windows 7 64-bit

Windows XP Mode is available in which of the following Microsoft Windows environments?

Windows 7 Business Edition

Which of the following operating systems supports full BitLocker functionality?

Windows 7 Enterprise

Which of the following operating systems supports full usage of 8GB DDR3 RAM?

Windows 7 Home Premium x64

An audio visual company has decided that they want to migrate from Windows XP Professional SP2. The company has a domain network. A technician is tasked with selecting an operating system. Which of the following should the technician select?

Windows 7 Professional

In which of the following operating systems does Windows XP mode come as a free download to be used for application compatibility?

Windows 7 Professional

Which of the following allows a user to enable XP mode?

Windows 7 Professional

A technician is tasked with building three systems that are capable of utilizing the new Windows HomeGroup functionality. Which of the following versions of Windows would need to be used?

Windows 7 only

Which of the following utilities would a technician use on a Windows Vista or Windows 7 machine to configure what applications are allowed to send/receive data over the LAN connection?

Windows Firewall

A Windows 7 desktop PC has crashed (i.e. BSOD) several times indicating a possible RAM problem. Which of the following is an OS built-in tool that can be used to test this problem?

Windows Memory Diagnostic

Which of the following areas of a file system should a standard user have restricted permissions to in order to promote a security best practice? (Select TWO).

Windows System Files Program Files

Which of the following operating systems can be upgraded directly to Windows 7 Professional by a default installation? (SELECT TWO)

Windows Vista Business Windows 7 Home Premium

The Aero feature is found in which of the following operating systems? (Select TWO).

Windows Vista Enterprise Windows 7 Home Premium

A technician is trying to troubleshoot an issue on a Windows 7 computer remotely, but is unable to PING the computer. The technician verified that the computer is turned on, has network connectivity, and can get to the Internet. Which of the following is MOST likely the issue?

Windows firewall is enabled

When putting a mobile device into airplane mode, which of the following features is typically disabled? (Select TWO).

Wireless Cellular data

Which of the following mobile device sync methods is easiest for the end user but requires more configuration on the part of the technician?

Wireless sync

A user has setup a SOHO and needs to implement a network configuration that allows for sharing of devices and files across the network without the complexity of a centralized server. Which of the following would be MOST appropriate?

WorkGroup

Which of the following security threats is defined by its self-propagating characteristic?

Worm

Which of the following is TRUE about the difference between a worm and a virus?

Worms self-propagate while viruses need human intervention to replicate.

When moving files from a Microsoft gaming console, which of the following command line utilities is recommended to transfer files?

XCOPY

Which of the following is an example of client-side virtualization?

XP mode running in Windows 7 64-bit operating system

When running Windows XP, which of the following would give a list of switches for the CHKDSK command?

chkdsk /?

Which of the following keys, when pressed immediately after the BIOS test, will display Windows Boot Manager on a Windows 7 PC?

esc

Which of the following is the correct UNC path to use when mapping a network drive?

\\server\share

A technician would like to map a network drive. Which of the following indicates the correct path for mapping a network drive?

\\servername\share

Which of the following paths would a technician use to map a network drive?

\\servername\usershare

Phishing is:

a technique used to obtain financial information from a user mimicking a legitimate website.

Windows Virtual PC is designed to:

allow a user to run older programs in a Windows XP environment.

A technician needs to remove the ability of standard users to shut down or restart a shared computer. Which of the following commands can be used to accomplish this task?

gpedit.msc

New smart phones have features that allow them to be backed up to a remote location. Which of the following is this an example of?

iCloud

A user is concerned about an issue with iOS. The user MOST likely has which of the following devices?

iPhone

Which of the following BEST describes the Apple utility used with iOS devices to synchronize, upgrade, and restore to factory default if needed?

iTunes

Which of the following would a technician use to install applications onto an iPad? (Select TWO).

iTunes App Store

A technician is trying to request a new IP address to a customer's computer through the command prompt. Which of the following commands should the technician use?

ipconfig /renew

A technician needs to use a command line tool to determine the network name and the IP address of are source. Which of the following command line tools will provide an IP address when given a name?

nslookup

The computer starts up and runs for less than a minute before shutting down or locking up. This is a symptom of:

overheating.

A technician is dispatched to a location that has multiple laser printers. One of the network printers is printing what appears to be a shadow image. The technician could solve this issue by:

replacing the drum.

A technician suspects that a recent virus they removed may have corrupted a necessary system file. Which of the following utilities can the technician use to verify the integrity of these critical files?

sfc

An unauthorized user observing system security procedures is known as:

shoulder surfing.

The practice of following an authorized person through an entrance without using a badge to defeat security is called:

tailgating

When the computer is turned on it emits a series of beeps and does not POST. This can be caused by a bad:

video card.


Ensembles d'études connexes

Ch 42: Management of Patients with MSK trauma PrepU

View Set

Chapter 12 Chemistry Practice Test

View Set

AP World History: Chapters 33, 34, & 35

View Set

Chapter 8: Sugar-The Simplest of Carbohydrates

View Set

PREPU Chapter 14: Nursing Management During Labor and Birth

View Set

Weekly Challenge 4: Define user problems

View Set

Megan Mental Health Practice Unit 3 - CASPN Q4

View Set

Myer's AP Psychology: Unit 11 Review

View Set