A+ Software Final Exam
Match the problem to the possible solution. (Not all options are used.) 1. The PCI NIC adapter card has stopped working. 2. The computer does not display any video after installing a new PICe video card. 3. The user can hear the fans spinning but the PC will not start and there are no beeps from the speaker. 4. The motherboard capacitors are distended, swollen, emitting residue, or bulging. 5. After upgrading the single core CPU to a dual core CPU, only one CPU graph is seen in the task manager. -Replace the motherboard. -Check for faulting cable, damaged or mis-seated CPU or other motherboard component prior to replacing the motherboard if required. -Update the BIOS firmware. -Connect the auxiliary power cable for the adapter card.
4, 3, 5, 2
Match the memory type to the feature. (Not all options are used.) 1. DDR SDRAM 2. DDR3 SDRAM 3. GDDR SDRAM 4. DDR2 SDRAM 5. DDR4 SDRAM -Its connector has 288 pins and has advanced error correction features available. -Its connector has 184 pins and is able to support two writes and two reads per CPU clock cycle. -Its connector has 240 pins and consumes 1.5 Volts of power. -Its connector has 240 pins and consumes 18. Volts of power.
5, 1, 2, 4
A user calls the help desk reporting that a laptop with Linux freezes on startup and displays kernel panic. What could cause this problem? -A driver has become corrupted. -GRUB or LILO has been deleted. -GRUB or LILO has been corrupted. -An application is using a resource that has become unavailable.
A driver has become corrupted. A corrupted driver or failing hardware could cause kernel panic for Linux or Mac OS. The laptop will not be able to boot successfully. Either GRUB or LILO corruption or GRUB or LILO deletion would cause the stop screen to display a "Missing GRUB" or "Missing LILO" message. A resource unavailable to an application will cause the application to stop responding, but not prevent a laptop from starting up.
Why is a full format more beneficial than a quick format when preparing for a clean OS installation? -A full format is the only method of installing Windows 8.1 on a PC that has an operating system currently installed. -A full format will delete files from the disk while analyzing the disk drive for errors. -A full format will delete every partition on the hard drive. -A full format uses the faster FAT32 file system, whereas a quick format uses the slower NTFS file system.
A full format will delete files from the disk while analyzing the disk drive for errors. A full format removes files from a partition while scanning the disk for bad sectors. A quick format will remove files from a partition but does not scan a disk for bad sectors.
A user calls the help desk to report that a mobile device exhibits very slow performance. What could cause this problem? -The touchscreen is not calibrated. -An app is not compatible with the device. -The operating system is corrupt. -A power-intensive app is running in the background.
A power-intensive app is running in the background. A power-intensive app that is running in the background could consume most of the CPU cycles and thus the device would exhibit very slow performance for other apps. If an app is not compatible with the device, the device operating system would freeze. If the operating system has encountered an error, the device will fail to respond.
When attempting to improve system performance for Linux computers with a limited amount of memory, why is increasing the size of the swap file system not considered the best solution? -A swap file system only supports the ex2 file system. -A swap file system does not have a specific file system. -A swap file system cannot be mounted on an MBR partition. -A swap file system uses hard disk space to store inactive RAM content.
A swap file system uses hard disk space to store inactive RAM content. The swap file system is used by Linux when it runs out of physical memory. When needed, the kernel moves inactive RAM content to the swap partition on the hard disk. Storing and retrieving content in the swap partition is much slower than RAM is, and therefore using the swap partition should not be considered the best solution to improving system performance.
A technician is installing an internal HDD. To which motherboard connector will the technician connect the data cable? -ATX -PCI -PWR_SW -SATA
SATA Internal hard drives are commonly SATA drives that have a data cable that extends from the drive to a motherboard SATA connector.
Which feature is included with macOS and provides the ability for a remote user to view and change files., folders, and applications on the local computer? -Screen Sharing -Remote Assistance -Virtual Network Computing -Remote Desktop
Screen Sharing In macOS, remote access functionality is provided by the Screen Sharing feature, which is based on Virtual Network Computing (VNC). VNC is a freeware product that is similar in functionality to RDP and works over port 5900.
Match the individual languages with their corresponding classification. 1. VBScript 2. JavaScript 3. Python 4. C++ 5. C# 6. Java -Scripting Languages -Compiled Languages
Scripting Languages: 1, 2, 3 Compiled Languages: 4, 5, 6 Scripting languages include Windows batch files, PowerShell, Linux shell script, VBScript, JavaScript, and Python. Compiled languages include C, C++, C#, and Java.
A user complains that user files cannot be synced with the network file server while the user is traveling out of the office. The user had access to the Internet but no access to the company network server. How can this be addressed? -Ensure that the user only uses a single device and not multiple devices when accessing networked files. -Turn off the activation of Offline Files feature in the Sync Center. -Setup a Sync partnership with the networked file location. -Setup a Sync partnership between the network server, Microsoft OneDrive, and the user.
Setup a Sync partnership between the network server, Microsoft OneDrive, and the user. Because the user has access to the internet, access to the Microsoft OneDrive cloud based service is possible and thus the user can sync with Microsoft OneDrive, which in turn can sync with the company network server from across the internet.
Refer to the exhibit. What is true of this mobile screen? -Tapping and holding the arrow at the bottom left will display the Home screen. -Text messages, news, photos and other content can be displayed in the different tiles. -Icons and buttons are used to represent the different apps on the phone. -Unpinning an app from this view will uninstall the app from the phone. -Tile sizes depend on the size of the app.
Text messages, news, photos and other content can be displayed in the different tiles. The Windows Phone interface uses tiles to represent apps. Tiles are rectangular areas of a screen that identify the app and may also contain active content such as text messages, news feeds, and photos.
A user reports that a Windows 10 PC displays the error message "Invalid Boot Disk" during the boot process. The IT technician attempts to boot the computer and finds that the error message occurs immediately after the POST. What could be the possible cause? -A recently installed device driver is incompatible with the boot controller. -BOOTMGR is corrupted. -The MBR/GPT is corrupted. -A service failed to start during the booting process.
The MBR/GPT is corrupted. The message "Invalid Boot Disk" could be a symptom of a missing or damaged MBR/GPT, a missing or damaged Boot Configuration Data file, a boot sector virus, a boot order not set correctly in BIOS, media without an operating system being in a drive, a hard drive not detected or damaged, or the absence of an installed operating system.
A technician wishes to deploy Windows 10 Pro to multiple PCs through the remote network installation process. The technician begins by connecting the new PCs to the network and booting them up. However, the deployment fails because the target PCs are unable to communicate with the deployment server. What is the possible cause? -The wrong network drivers are loaded in the image file. -The SID has not been changed in the image file. -The NIC cards on the new PCs are not PXE-enabled. -Sysprep was not used before building the image file.
The NIC cards on the new PCs are not PXE-enabled. The NIC cards on the new PCs have to be PXE-enabled in order for them to communicate with the remote installation services on the server.
What would happen if a PC that contains a power supply that does not automatically adjust for input voltage is set to 230 volts and attaches to an outlet in the United States? -The power supply would explode. -The PC would not turn on. -The PC would display an error code. -The PC would emit a series of beeps.
The PC would not turn on. In the United States, the wall outlet electrical power is standardized at 120 volts AC.
A technician uses Microsoft Deployment Image Servicing and Management (DISM) tool to create a Windows image file on one of the workstations running Windows 10. When the technician tries to clone another workstation with the image file, the workstation exhibits network connectivity issues on completion. What could cause this? -The SID of the original PC is not cleared when creating the image with DISM. -The technician used the wrong tool to create the image file. -The network drivers were not added to the image file. -The Sysprep utility should have been turned off prior to the creation of the image file.
The SID of the original PC is not cleared when creating the image with DISM. The technician must use Sysprep to clean up the local specific configuration, such as the SID, otherwise the cloned systems will not work properly.
A technician is troubleshooting a computer that is experiencing hardware failure detected by the BIOS. What is one way this failure is indicated? -The computer automatically boots into Safe Mode and displays a warning on the screen. -The screen flashes with a red background and displays a warning message. -The computer emits a pattern of beeps indicating the failing device. -The computer return an error message that indicates the I/O address of the failing device.
The computer emits a pattern of beeps indicating the failing device. Beep codes are a result of POST and these vary between computer vendors based on what BIOS is installed.
Which condition is required when planning to install Windows on a GPT disk? -The computer must be UEFI-based. -Only one primary partition can contain an OS. -The maximum partition size cannot exceed 2 TB. -The maximum number of primary partitions that can co-exist is 4.
The computer must be UEFI-based. The globally unique identifier (GUID) partition table (GPT) makes use of a number of modern techniques to expand on the older MBR partitioning scheme. GPT is commonly used in computers with UEFI firmware. For Windows 10 to be installed on, and boot, from a GPT disk UEFI must be used.
A technician is troubleshooting a server that displays the error message "RAID not found" after a power outage over the weekend. What is a possible cause for this? -The BIOS firmware needs updating. -The FSB settings have changed and are wrong. -The external RAID controller is not receiving power.
The external RAID controller is not receiving power.
A user downloads a widget onto his Android phone but is puzzled to see that when the widget is touched an app is launched. What is a possible cause? -The user has downloaded a virus. -The widget is corrupt. -The security settings of the Android OS have been compromised. -The widget is associated with the app and this is the normal behavior.
The widget is associated with the app and this is normal behavior. Widgets are programs that when installed associate with the application they were built for. This will cause the application to launch when the widget icon is touched on the touchscreen of the Android device.
Which built-in tool is available on a Mac OS X machine to perform disk backups? -Disk Utility -Deja Dup -Finder -Time Machine
Time Machine Time Machine is an automatic backup utility in the Mac OS. The Mac Disk Utility allows an administrator to configure disk backups. The Deja Dup tool is a tool built into the Linux OS for backing up data. Finder is similar to the Windows File Explorer tool and is used to navigate the Mac OS file system.
A user wants to synchronize some apps, movies, music, and ebooks between mobile devices. What are the two types of connections used to synchronize this type of data? -cellular -Wi-Fi -USB -Bluetooth -NFC
Wi-Fi USB Because of the amount of data transferred during video synchronization, synchronization occurs through either a Wi-Fi connection or a wired USB connection.
Which two tools are available to transfer user data and settings from an old Windows computer to a Windows operating system on a new computer? (Choose two.) -Windows Easy Transfer -Windows User Manager -Windows Upgrade Assistant -Windows Upgrade Advisor -User State Migration tool
Windows Easy Transfer User State Migration Tool When a new operating system is being installed, existing user data and settings need to be migrated from the old to the new operating system. The User State Migration Tool and the Windows Easy Transfer Tool are available to perform this task on the Windows Vista, 7, and 8 operating systems.
A technician wishes to perform a customized unattended network installation of Windows 10 on a PC. The requirements include the installation of specific applications and device drivers through the use of an answer file. What would the technician use to create the answer file? -Recovery partition -Windows SIM -disk cloning -System Restore
Windows SIM To perform a custom Windows Unattended installation, setup.exe must be run with the user options found in the answer file. Additional packages, such as applications or drivers, can be added to the answer file. The Windows System Image Manager (SIM) is used to create the setup answer file.
A web designer accesses a company Windows 10 computer remotely. The designer often needs to simultaneously open multiple applications, such as a web page editor and a graphics editor. Rather than opening them in multiple windows, the designer opens them in different virtual desktops. What technology is being used by the designer? -virtual reality -Windows Virtual Desktop -cloud-based applications -virtual desktop infrastructure
Windows Virtual Desktop Windows 10 has a feature called Windows Virtual Desktop (WVD). A user can create multiple virtual desktops and navigate among them easily. This feature reduces the clutter on a desktop of Windows caused by opening multiple applications. With WVD, a user can have each application open in a separate desktop.
A support desk technician is dealing with an angry customer. Which two approaches should the technician take in dealing with the customer? (Choose two.) -Ask socially related questions to direct the customer away from the problem. -Work to redirect the conversation to solving the problem. -Immediately transfer the customer to a higher level technician. -Reply to the customer with the same level of anger. -Let the customer explain the problem without interrupting.
Work to redirect the conversation to solving the problem. Let the customer explain the problem without interrupting. Angry customers should be allowed to explain the problem, then be redirected to discussing how the problem can be solved. Transferring the customer, replying in a rude tone, and asking unrelated questions will usually increase, not ease, the anger being expressed by the customer.
An employee that has worked at the company for many years has started a home-based business selling crafts. While leaving an office meeting, a company supervisor notices the employee buying supplies for the personal crafting business of the employee. What section of the security policy should the supervisor review when determining how to handle this situation? -acceptable use policies -identification and authentication policies -incident handling policies -remote access policies
acceptable use policies The acceptable use policies section of a security policy commonly identifies network resources and usages that are acceptable to the organization. They might also state the ramifications that can occur if this security policy is violated.
Which change management process component is concerned with the business processes that are affected by changes? -assessment -approval -implementation -identification
assessment There are several change management process components that help changes, installations, and upgrades go more easily. The assessment component identifies the business processes that are affected and the costs and resources required.
The CIO wants to secure data on company laptops by implementing file encryption. The technician determines the best method is to encrypt each hard drive using Windows BitLocker. Which two things are needed to implement this solution? (Choose two.) -at least two volumes -USB stick -password management -TPM -EFS -backup
at least two volumes TPM Windows provides a method to encrypt files, folders, or entire hard drives depending on need. However, certain BIOS settings and configurations are necessary to implement encryption on an entire hard disk.
What are two probable causes of a user unable to access local resources such as file shares or printers on a wired network? (Choose two.) -bad cabling -DNS name resolution not working -ISP down -incorrect gateway address -poor Wi-Fi signal
bad cabling DNS name resolution not working There are many issues which can cause local resources to be unavailable. These include bad cabling, a switch or router not functioning, a firewall blocking traffic, DNS name resolution not working, or failed services.
Which two laptop components are considered replaceable by the customer. (Choose two.) -battery -integrated card reader -mini-PCIe module -RAM -display
battery RAM Customer-replaceable units (CRUs) do not typically require a lot of technical skill to replace. RAM and a battery are two examples of a CRU. In contrast, a field-replaceable unit (FRU), such as display, motherboard, keyboard, or touchpad, commonly require a technician to install.
How can a user prevent specific applications from accessing a Windows computer over a network? -enable MAC address filtering -disable automatic IP address assignment -block specific TCP or UDP ports in Windows Firewall -change default usernames and passwords
block specific TCP or UDP ports in Windows Firewall Network applications have specific TCP or UDP ports that can be left open or blocked in Windows Firewall. Disabling automatic IP address assignment may result in the computer not being able to connect to the network at all. Enabling MAC address filtering is not possible in Windows and would only block specific network hosts, not applications. Changing default usernames and passwords will secure the computer from unauthorized users, not from applications.
A technician is troubleshooting a Windows 10 laptop infected with a virus that has damaged the master boot record. The technician has booted the laptop using the installation media and is attempting to repair the laptop from the command line interface. Which command can the technician use to repair the corrupt master boot record? -bootrec /fixmbr -chkdsk -msconfig -sfc /scannow
bootrec /fixmbr The sfc /scannow command is used to check the integristy of the system files. The msconfig command allows for viewing the startup configuration mode, while the chkdsk command is used to repair the Windows file system. The bootrec /fixmbr command is used to repair a corrupt master boot record in a Windows 10 environment.
What are two types of wired high-speed Internet connections? (Choose two.) -cable -satellite -cellular -DSL -dial-up
cable DSL Cable and DSL Internet technologies both use physical cabling to provide an Internet connection to a residence or a small business. Although dial-up is a wired technology, it does not provide a high-speed Internet connection. Satellite and cellular connections provide a wireless Internet connection.
A customer has requested that a PC be built that will support eSATA. Which component should be checked to be sure that this feature is supported? -CPU -chipset -hard disk -RAM module
chipset The chipset on a motherboard consists of integrated circuits that control how system hardware interacts with the CPU and motherboard. It also provides the capability and features needed, such as the maximum memory supported on the motherboard, multiple USB ports, eSATA connections, surround sound, and video.
What are three pieces of information a level one technician should gather from a customer? (Choose three.) -contact information -description of the problem -details of any recent changes to the computer -output from diagnostic software -output from a remote connection to the customer computer -current CMOS settings
contact information description of the problem details of any recent changes to the computer A level one technician should gather information from the customer and solve simple problems. For more advanced diagnostics, opening the computer case, running diagnostics software, and performing remote connections, the problem should be escalated to a level two technician.
Which negative environmental factor does cleaning the inside of a computer reduce? -dust -EMI -rust -ESD
dust Accumulated dust inside the computer can prevent the flow of air and can hinder cooling.
Which three components are typically found in laser printer maintenance kits? -fuser assembly -primary corona -pickup rollers -transfer rollers -secondary corona -paper trays
fuser assembly pickup rollers transfer rollers Laser printer maintenance kits typically contain components that wear and can be installed with minimal disassembly of the printer. Corona wires are internal components that would require a trained technician to replace. Paper trays are components that are not typically replaced during maintenance, but would be replaced any time if damaged.
Which three components are used to assign file and directory permissions in Linux systems? (Choose three.) -root -group -owner -all users -super group -admin group
group owner all users In Linux, file and directory permissions are assigned as follows: Owner - the owner user of the file or directory Group - the user group that has been assigned to the file or directory All users - all other users on the system
What are two safety hazards when dealing with laser printers? (Choose two.) -high voltage -hot components -heavy metals -proprietary power bricks -unwieldy card cages
high voltage hot components Laser printers require high voltage when initially powered on and to change the drum in preparation for writing data to the drum. This high voltage requirement is why most laser printers are not normally connected to a UPS. A laser printer also has a fuser assembly used to apply heat and pressure to the toner to permanently attach it to the paper. The laser printer must be unplugged and the fuser assembly must be allowed to cool before working inside the printer.
What is a recommended procedure to follow when cleaning computer components? -remove the CPU before cleaning -blow compressed air on cooling fans so that they will spin when dust is being removed -use window cleaner on LCD screens -hold cans of compressed air upright while spraying
hold cans of compressed air upright while spraying When using compressed air, keep the can upright to prevent the fluid from leaking onto the computer.
Which area of concern falls under the operations and planning category in IT documentation? -inventory management -disaster recovery policies and procedures -logical and physical network topology diagrams -end-user manual for hardware and software
inventory management There are four broad categories of IT documentation: Policies, Operations, Projects, and User documentation. Operations is concerned with inventory management.
What are three features of GPS on mobile devices? (Choose three.) -phone number lookup -navigation -specialized search results -device tracking -remote wipe -gas mileage calculations
navigation specialized search results device tracking Navigation, specialized search results, and device tracking are features of GPS on mobile devices. Remote wipe may be a feature on some mobile devices, but is not related to GPS. Phone number lookup and gas mileage calculations are not GPS features.
A user chooses the collate option and prints two copies of a three-page document. What is the order in which the pages are printed? -pages 1, 1, 2, 2, 3, 3 -pages 1, 2, 3, 1, 2, 3 -pages 3, 3, 2, 2, 1, 1 -pages 3, 2, 1, 3, 2, 1
pages 1, 2, 3, 1, 2, 3 The collate feature enables a printer to sort multiple copies of a document with the proper page order for each copy.
Which three features can be configured in the BIOS settings to secure a computer? (Choose three.) -MAC filtering -drive encryption -TPM -file encryption -TKIP key -passwords
passwords drive encryption TPM Passwords, drive encryption, and TPM are BIOS configurable security features. File encryption, TKIP key, and MAC filtering are security features not configured within the BIOS.
Which methods can be used to implement multifactor authentication? -VPNs and VLANs -IDS and IPS -passwords and fingerprints -tokens and hashes
passwords and fingerprints A cybersecurity specialist must be aware of the technologies available that support the CIA triad.
Which component requires a technician to install screws externally through the PC case? -RAM -CPU -motherboard -power supply
power supply The power supply commonly has four screws that attach from outside the case through case holes into screw holes on the power supply.
What two kinds of problems should be escalated from a level one technician to a level two technician? (Choose two.) -problems that require rebooting the equipment -problems that can be solved in a short time -problems that are complicated and will take a long time to resolve -problems that do not fit into the "down call" category -problems that are beyond the scope of the knowledge of the level one technician
problems that are complicated and will take a long time to resolve problems that are beyond the scope of the knowledge of the level one technician A problem should be escalated to a level two technician when the problem is going to take a long time to fix, is affecting a large number of users, or requires knowledge or expertise that the level one technician does not possess.
Refer to the exhibit. A technician has been asked to install a video card. Which section of the motherboard will the technician use to install the card? -section A -section B -section C -section D
section D Graphics cards, also known as video card, are installed into a PCIe x16 expansion slot. The expansion slots on a motherboard are located near the motherboard ports.
What three values must be added to the IPv4 properties of a NIC in order for a computer to have basic connectivity with the network? (Choose three.) -subnet mask -DHCP server address -domain name -default gateway -speed and duplex -IP address
subnet mask default gateway IP address The IP address, subnet mask, and default gateway address values should be added to the NIC properties in order for the computer to have basic network connectivity. This can be done either statically or dynamically with DHCP. An additional value that should be present if the computer is to be used to connect to the Internet is the DNS server value. A computer automatically attempts to locate a DHCP server if configured to do so. A DHCP server address is not used. Finally, NAT is configured on a router, not on a computer host, and speed and duplex settings are NIC hardware settings and not IPv4 properties of the NIC.
On the production floor, a furniture plant has laptops for process monitoring and reporting. The production floor environment is around 80 degrees Fahrenheit (27 degrees Celsius). The humidity level is fairly high around 70 percent. Fans are mounted in the ceiling for air circulation. Wood dust is prevalent. Which condition is most likely to adversely affect a laptop that is used in this environment? -the temperature -the humidity -the air flow -the dust
the dust Most laptops are created to be tolerant of a wide range of humidity levels and room temperatures. Dust, however can cause overheating and failures.
When a PC is being assembled, what component is connected to the motherboard with a SATA cable? -the optical drive -the network interface card -the video card -the power supply
the optical drive SATA cables, or serial ATA cables, are used to carry data from drives to the motherboard.
What is the purpose of RAID adapters? -to allow older PCI technology expansion slots to be used -to provide enhanced audio and graphic capabilities -to connect multiple storage devices for redundancy or speed -to connect peripheral devices to a PC to improve performance
to connect multiple storage devices for redundancy or speed RAID 0 allows "striping" or writing data across two hard drives, but provides no redundancy. The other RAID versions provide redundancy.
What is the purpose of running mobile device apps in a sandbox? -to enable the phone to run multiple operating systems -to prevent malicious programs from infecting the device -to enable separate app icons to be displayed on the home screen -to bypass phone carrier restrictions that prevent access to unauthorized apps
to prevent malicious programs from infecting the device Mobile device apps are run in a sandbox that isolates them from other resources. Bypassing the phone carrier from preventing access to unauthorized apps is jailbreaking or rooting the device.
What is the purpose of a Safety Data Sheet? -to specify procedures for dealing with potentially hazardous materials -to specify procedures in designing and building common computer systems -to specify procedures for the operation of sensitive components and prevention of electrostatic discharge -to specify procedures in the use of humidity control and prevention of moisture damage
to specify procedures for dealing with potentially hazardous materials A Safety Data Sheet is a fact sheet that summarizes information about material identification, including hazardous ingredients that can affect personal health, fire hazards, and first-aid requirements. The SDS explains how to dispose of potentially hazardous materials in the safest manner.
A technician is installing a new printer in a cool, damp environment. After the printer cabling is done, and the software and print driver are installed, the printer test page jams. What is the most likely cause of the print failure? -incorrect printer driver -too much humidity -not enough printer memory -loose printer cables
too much humidity Paper jams are commonly caused when the paper being used is dirty, affected by humidity, or is the wrong type of paper for the printer.
A student is helping a friend with a home computer that can no longer access the Internet. Upon investigation, the student discovers that the computer has been assigned the IP address 169.254.100.88. What could cause a computer to get such an IP address? -static IP addressing with incomplete information -interference from surrounding devices -reduced computer power supply output -unreachable DHCP server
unreachable DHCP server When a PC does not have a static IP address or cannot pick one up from a DHCP server, Windows will automatically assign the PC an IP address using APIPA, that uses the range of addresses from 169.254.0.0 to 169.254.255.255.
What are two security risks associated with sharing printers in a corporate environment? (Choose two.) -user authentication -cached files -document viewing in the printer queue -dumpster diving -shoulder surfing
user authentication cached files Three security concerns related to shard printers include (1) cached print files could contain sensitive data; (2) user authentication is needed to control access to the printer; and (3) print jobs could be read by others, intercepted, copied, or modified. Although the names of documents can be viewed in the print queue, document viewing is not possible. Dumpster diving and shoulder surfing are security concerns regardless of whether the printer is shared or not.
A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual discrete server for each customer. What is the networking trend that is being implemented by the data center in this situation? -BYOD -virtualization -maintaining communication integrity -online collaboration
virtualization Virtualization technology can run several different operating systems in parallel on a single CPU.
Which type of security threat can be transferred through email and is used to gain sensitive information by recording the keystrokes of the email recipient? -adware -Trojan -worm -virus -grayware
virus Adware does not record keystrokes. A worm self-replicates across the network. A Trojan appears to be a legitimate program while carrying malware, and grayware is a general term for software that may be malware.
In what two situations would UDP be better than TCP as the preferred transport protocol? (Choose two.) -when applications need to guarantee that a packet arrives intact, in sequence, and unduplicated -when a faster delivery mechanism is needed -when delivery overhead is not an issue -when applications do not need to guarantee delivery of the data -when destination port numbers are dynamic
when a faster delivery mechanism is needed when applications do not need to guarantee delivery of the data UDP is a very simple transport layer protocol that does not guarantee delivery. Devices on both ends of the conversation are not required to keep track of the conversation. UDP is used as the transport protocol for applications that need a speedy, best-effort delivery.
A technician has been asked to configure Wi-Fi calling on a corporate mobile device. In which situation would this feature be most advantageous? -in an emergency situation and no minutes are left on the phone -when sending WEA updates -when in an area with poor cellular coverage -in a store transaction making a payment using the mobile device
when in an area with poor cellular coverage Wi-Fi calling is not supported on all mobile devices, but when enabled, it uses a Wi-Fi network to make voice calls. It is very useful in areas with poor cellular coverage.
Which standard provides a bridge between laptop hardware and the operating system and a way for technicians to configure power management schemes to get the best performance? -ACPI -PCIe -Bluetooth -802.11
ACPI The Advanced Configuration and Power Interface (ACPI) standard has specific sleep states that can be assigned to a device in order to conserve power. PCIe is a motherboard interface. Bluetooth and 802.11 are wireless standards.
A customer brings in a computer that is asking for a password as soon as it powers on, even before the operating system boots. Which type of password is enabled? -BIOS -login -multifactor -network -synchronous
BIOS A BIOS password is configured by entering the BIOS Setup program. If unknown, it can be removed by placing a jumper over two motherboard pins. Some motherboards support BIOS password removal by removing the CMOS battery, but if this is done, all BIOS settings will be reset to the default values.
What two motherboard components control the system boot operations? (Choose two.) -BIOS chip -UEFI chip -Northbridge chip -Southbridge chip -CPU
BIOS chip UEFI chip System boot services are provided by the motherboard BIOS and UEFI chips.
What service is available for Windows to provide software print server services to MAC OS clients? -Bonjour Print Server -Print to XPS -Apple AirPort Extreme -Apple AirPrint
Bonjour Print Server Bonjour Printer Server from Apple comes with MAC OS X and is a free download for Windows users to be used as a software print server. Airport Extreme, a dedicated print servers, and a PC with a printer attached serving as a print server are all hardware print sharing solutions.
A technician is upgrading an ATX motherboard with another ATX motherboard. Which component might be affected by this and need to be upgraded and bought as an additional purchase? -BIOS -chipset -CMOS battery -CPU -PCIe adapter
CPU The motherboard, CPU, and power supply must be compatible.
When a new motherboard is being installed, between which two components must thermal compound be applied? (Choose two.) -CPU -RAM -chassis -heat sink -chipset -motherboard
CPU heatsink You must apply thermal compound between the new CPU and the heat sink/fan assembly to avoid overheating the CPU. The thermal paste helps to conduct heat from the CPU to the heat sink.
Which two actions should a technician take if illegal content, such as child pornography, is discovered on the hard drive of a customer computer? (Choose two.) -Confront the customer immediately. -Remove and destroy the hard drive. -Contact a first responder. -Shut down the computer until authorities arrive. -Document as much information as possible.
Contact a first responder. Document as much information as possible. If illegal content is found, begin documentation to build a chain of custody and contact a first responder immediately.
A user wants to extend a primary partition formatted with the NTFS file system with the unallocated space on the hard disk. What must the user do after the primary partition is extended to make it usable? -Convert the disk type to dynamic. -Ensure that the disk type is basic. -Format the disk with the FAT64 file system. -Partition the new space as a basic disk.
Convert the disk type to dynamic. A partition must be formatted with the NTFS file system in order to extend it by using the unallocated space on the disk. Once the partition has been extended, the disk type must be converted to a dynamic disk in order for the new partition to be accessible.
The current IP configuration of a small company is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service would simplify the workstation IP configuration task? -APIPA -DHCP -DNS -ICMP
DHCP In networks with more than a few hosts, DHCP simplifies the addressing process. A DHCP server automatically assigns host IP addresses.
A manager reports that unusual things are happening on a Windows computer. The technician determines that malware is the culprit. What can the technician do to remove the stubborn malware? -Ensure that the computer is connected to the wired network so that antimalware updates can be installed. -Enter Safe Mode and do a system restore. -Install adware protection. -Train the user on identifying trusted and untrusted sources.
Enter Safe Mode and do a system restore. Booting the computer in Safe Mode prevents most drivers from loading. Additional antimalware software can then be installed to remove or quarantine malware. Sometimes the storage drive must be wiped, the operating system reinstalled, and data restored from a backup.
After a technician tests a theory of probable causes, what two actions should the technician take if the testing did not identify an exact cause? (Choose two.) -Establish a new theory of probable causes. -Randomly replace components one at a time until the problem is solved. -Document each test tried that did not correct the problem. -Verify full system functionality. -Test all remaining possible causes starting with the most complex.
Establish a new theory of probable causes. Document each test tried that did not correct the problem. If the exact cause of the problem has not been determined after you have tested all your theories, establish a new theory of probable causes and test it.
How does virtualization help with disaster recovery within a data center? -Power is always provided. -Less energy is consumed. -Server provisioning is faster. -Hardware does not have to be identical.
Hardware does not have to be identical. Disaster recovery is how a company goes about accessing applications, data, and the hardware that might be affected during a disaster. Virtualization provides hardware independence, which means the disaster recovery site does not have to have the exact equipment as the equipment in production. Server provisioning is relevant when a server is built for the first time. Although data centers do have backup generators, the entire data center is designed for disaster recovery, One particular data center could never guarantee that the data center itself would never be without power.
Which type of network spans a single building or campus and provides services and applications to people within a common organizational structure? -PAN -WAN -LAN -MAN
LAN A LAN is smaller or more contained than a WAN, which can span several cities. A MAN is usually contained in one city. A PAN is a very small network of devices that are located in close proximity to one another, usually within range of a single person.
What two actions are appropriate for a support desk technician to take when assisting customers? (Choose two.) -Interrupt customers if they start to solve their own problems. -Comfort a customer by minimizing the customer problem. -Let a customer finish talking before asking additional questions. -If you have to put the customer on hold, ask the customer for permission. -As soon as you detect customer anger, pass the angry customer to the next level.
Let a customer finish talking before asking additional questions. If you have to put the customer on hold, ask the customer for permission. When dealing with customers, a technician should show professionalism in all aspects. A technician should observe the process before putting a customer on hold. First, let the customer finish speaking. Then, explain that there is need to put the customer on hold for a short period, and ask the customer for permission to do so. Tell the customer that it will be only a few minutes and explain what you will do during the period. When the customer agrees to be put on hold, thank the customer.
What Windows utility should be used to configure password rules and account lockout policies on a system that is not part of a domain? -Event Viewer security log -Local Security Policy tool -Active Directory Security tool -Computer Management
Local Security Policy tool A technician must be aware of the technologies and measures that are used as countermeasures to protect the organization from threats and vulnerabilities. A Windows Domain Security Policy is used and applied when a user logs in to a computer that is on a corporate network. A Windows Local Security Policy is used for stand-alone computers to enforce security settings.
A technician suspects that a security issue is causing problems with a computer. What two actions could be performed to test theories of probable cause when troubleshooting the PC? (Choose two.) -Log in as a different user. -Disconnect the computer from the network. -Search helpdesk repair logs for more information. -Discuss solutions with the customer. -Ask the customer open-ended questions about the problem.
Log in as a different user. Disconnect the computer from the network. Several actions can be taken by a technician when security issues are suspected as the possible cause of a problem with a computer. Logging in as a different user or disconnecting the PC from the network to isolate the cause of the problem are two possible actions.Whic
Which statement is true about laptops? -Most of the internal components that are designed for laptops cannot be used for desktops. -Laptop motherboards have standard form factors. -Laptops use fewer components than desktops use. -Laptop CPUs do not use cooling devices.
Most of the internal components that are designed for laptops cannot be used for desktops. Laptop internal components are designed with a small form factor and are proprietary. Although a laptop uses less power, it needs a cooling device (heat sink and fan).
Which Cloud computing service would be best for an organization that needs to collaboratively create applications and deliver them over the web? -PaaS -IaaS -SaaS -ITaaS
PaaS Platform as a service (PaaS) provides a collaborative environment where multiple developers can create software and host an application through a Cloud provider.
An organization has purchased a custom application for the sales staff that can only be installed on a 64-bit Windows operating system. Each member of the sales staff has a Windows 8.1 32-bit PC. What must the IT department do in order to install and run the application on the sales staff computers? -Downgrade the 32-bit Windows 8.1 to 64-bit Windows 7. -Upgrade the 32-bit Windows 8.1 to 64-bit Windows 10. -Perform a clean installation of 64-bit Windows 10. -Download and install 64-bit hardware drivers in the current OS.
Perform a clean installation of 64-bit Windows 10. A 32-bit OS cannot be upgraded to a 64-bit OS. In this case a clean install of Windows 64-bit would be the only option because the application requires a 64-bit Windows environment to work.
A technician wishes to prepare the computers in the network for disaster recovery. The network consists of a variety of desktops and laptops from different vendors. All the computers are running either a 32-bit version of Windows 10 Pro or a 64-bit version of Windows 10 Pro. How would the technician prepare the disaster media? -Prepare one 64-bit recovery disc for all the computers. -Prepare one 32-bit recovery disc for all the computers. -Prepare individual recovery discs for all the computers. -Prepare one image restore for all the computers.
Prepare individual recovery discs for all the computers. All the PCs are from different vendors and thus have dissimilar hardware configurations. Furthermore, all the PCs have a variety of 32-bit Windows 10 and 64-bit Windows 10. Because the PCs have different versions of the OS and dissimilar hardware, you cannot use the same image on all the PCs . In order to use a single image, Sysprep must be used to strip out machine specific information like the SID, and all PCs must have the same hardware configuration and the same version of the Windows operating system.
What are two possible solutions to any Windows computer restarting continuously and never displaying the desktop? (Choose two.) -Upgrade the processor. -Press F8 to open the Advanced Options menu and choose Disable Automatic Restart on System Failure. -Access the BIOS and change the boot order options. -Run chkdsk /F /R from the recovery console. -Upgrade the video card. -Reset the hard drive jumpers.
Press F8 to open the Advanced Options menu and choose Disable Automatic Restart on System Failure. Run chkdsk /F /R from the recovery console. Upgrading the processor, upgrading the video card, or resetting the hard drive jumper would not fix this problem. Boot order settings cannot cause the system to reboot continuously.
A device has an IPv6 address of 2001:0DB8:75a3:0214:0607:1234:aa10:ba01 /64. What is the host identifier of the device? -2001:0DB8:75a3 -0607:1234:aa10:ba01 -2001:0DB8 -ba01
0607:1234:aa10:ba01 An IPv6 address is made up of 128 bits that are represented as eight blocks of four hexadecimal digits that are called hextets. Because each hexadecimal digit represents four bits, each hextet represents 16 bits. The /64 network prefix indicates that the first 64 bits, or first four hextets, represent the network portion of the address. Because there are 128 bits in an IPv6 address, this leaves the last 64 bits, or last four hextets, to represent the host identifier. The value for the last four hextets is 0607:1234:aa10:ba01.
Match the wireless security settings to the description. 1. WPA2-Personal 2. WPA2-Enterprise 3. Open -The Advanced Encryption Standard (AES) cipher and pre-shared keys (PSKs) are used to encrypt communications. -Authentication is passed from the access point to a centralized authentication RADIUS server. -Data is sent unencrypted with no authentication.
1, 2, 3
Match the correct API with its function within the Windows 10 environment. 1. Open GL 2. Direct X 3. Windows APIs 4. Java APIs -This a cross platform standard specification for multimedia graphics. -This is a collection of APIs related to multimedia tasks for Microsoft Windows. -This allows applications from older versions of Windows to operate on newer versions. -This is a collection of APIs related to the development of Java programming.
1, 2, 3, 4
Match the tabs of the Windows 10 Task Manager to their functions. 1. Details 2. Performance 3. Startup 4. Services -Allows for a process to have its affinity set. -Displays resource utilization information for CPU, memory, network, disk, and others. -Allows programs that are running on system startup to be disabled. -Allows for a start, stop, or restart of a particular service.
1, 2, 3, 4
Match the Windows 10 boot sequence after the boot manager (bootmgr.exe) loads. 1. The Windows boot loader Winload.exe loads. 2. Ntoskrnl.exe and hal.dll are loaded. 3. Winload.exe reads the Registry, chooses a hardware profile, and loads the device drivers. 4. Ntoskrnl.exe takes over the process. 5. Winlogon.exe is loaded and executes the logon process.
1, 2, 3, 4, 5
Match the drive status indicators in the Disk Management utility with their description. 1. Healthy 2. Initializing 3. Not Initialized 4. Online 5. Offline -a volume that is functioning properly -a basic disk that is being converted into a dynamic disk -a disk that does not contain a valid signature -a basic or dynamic disk that is accessible and shows no problems -a dynamic disk that is corrupted or unavailable
1, 2, 3, 4, 5
Place the six stages of the troubleshooting process in the correct order. 1. Test the theory to determine the cause. 2. Verify full system functionality and if applicable, implement preventative measures. 3. Identify the problem. 4. Document findings, actions, and outcomes. 5. Establish a theory of probable cause. 6. Establish a plan of action to resolve the problem and implement the solution.
3,5,1,6,2,4 3. Identify the problem. 5. Establish a theory of probable cause. 1. Test the theory to determine the cause. 6. Establish a plan of action to resolve the problem and implement the solution. 2. Verify full system functionality and if applicable, implement preventative measures. 4. Document findings, actions, and outcomes.
What is a characteristic of DDR SDRAM? -It transfers data twice per clock cycle compared to once per clock cycle for SDRAM. -DDR SDRAM modules have double the number of pins of SDRAM memory modules. -It is dynamic memory whereas SDRAM is static memory. -It operates at double the voltage of SDRAM memory.
It transfers data twice per clock cycle compared to once per clock cycle for SDRAM. DDR SDRAM transfers data twice per clock cycle, whereas SDRAM transfers data once each clock cycle. Both DDR SDRAM and SDRAM are forms of dynamic memory. The difference in data transfer rate between DDR SDRAM and SDRAM is not determined by the number of pins, nor the operating voltage.
A technician has connected a new internal hard drive to a Windows 10 PC. What must be done in order for Windows 10 to use the new hard drive? -Initialize the new hard drive. -Extend the partition on an existing hard drive to the new hard drive. -Run chkdsk on the new hard drive. -Mount the new hard drive.
Initialize the new hard drive. The new hard drive needs to be initialized before it can be used in Windows. This will involve formatting the disk which will erase any existing data on the drive.
A technician is explaining the differences between inkjet printers and laser printers to a customer. Which two comparisons should the technician make? (Choose two.) -Inkjet printers are less expensive as an initial purchase than laser printers. -A laser printer is significantly slower than an inkjet printer. -Both laser and inkjet printers produce poor quality images. -The laser printer output is dry after printing, but an inkjet printer may still have wet ink on the paper after printing. -Inkjet printers use plain paper to make economical prints, but laser printers require more expensive thermal paper.
Inkjet printers are less expensive as an initial purchase than laser printers. The laser printer output is dry after printing, but an inkjet printer may still have wet ink on the paper after printing.
Which statement describes a feature of SDRAM? -It requires constant power to function. -Its connector always has 240 pins. -It can process overlapping instructions in parallel. -It is able to support two writes and two reads per CPU clock cycle.
It can process overlapping instructions in parallel. SDRAM (Synchronous Dynamic RAM) works in synchronization with the memory bus and has higher transfer rates because it can process overlapping instructions in parallel.
What is an accurate description of asymmetric encryption technology? -Asymmetric encryption is an encryption process that compares traffic on both ends to make sure the traffic has not been altered. -It is an encryption process that uses identical keys on both ends to establish the VPN. -It is an encryption protocol that is used to encrypt data as the data is sent over the VPN. -It is an encryption process that uses a public and private key pair to encrypt/decrypt data.
It is an encryption process that uses a public and private key pair to encrypt/decrypt data.
What service does PRINT$ provide? -It provides a network share for accessing shared printers. -It provides printer drivers for printer administrators. -It provides a group of hidden printers that only administrative users have permissions to send print jobs to. -It provides an administrative Printer share accessible by all local user accounts.
It provides printer drivers for printer administrators. PRINT$ is a hidden share for printer drivers. It is shared by default and used to access remote shared printers or provide drivers to clients when sharing a printer.
The IT department has just purchased 15 wireless access points in order to provide full wireless coverage for all 100 employees within the company and is looking to deploy the most secure and scalable wireless implementation. Which open source authentication method would perform authentication on behalf of all 15 network devices? -TACACS+ -TKIP -RADIUS -WPA2-PSK
RADIUS RADIUS and TACACS+ both use a separate server that performs authentication on behalf of network devices. However, RADIUS is an open standard and provides greater compatibility.
A color laser printer is used to print documents with graphics and photographs. Users are complaining that printing takes too long. Which component of the printer should be upgraded in order to improve printing performance? -CPU -RAM -hard drive -toner cartridges
RAM Because documents with graphics and photographs generate much larger print jobs, the printing process will run more efficiently if the printer memory is adequate to store the entire job before the job starts.
Which memory module used to hold instructions for booting a PC and loading the OS, but is still used on adapters even though the memory contents cannot be changed? -RAM -ROM -cache -main memory
ROM ROM stands for read-only memory.
A company is looking for a next-generation firewall that provides VPN functionality, IDS/IPS functionality, and DoS/DDoS protection. Which device would be best suited for this task? -multipurpose device -router -endpoint management server -UTM -TPM
UTM A universal threat management (UTM) device is a security device that can provide firewall, IDS/IPS, and proxy server functionality as well as email filtering and DoS/DDoS protection.
When responding to a call from a customer who is experiencing problems with a computer, the technician notices that a number of system files on the computer have been renamed. Which two possible solutions could the technician implement to resolve the problem? (Choose two.) -Use antivirus software to remove a virus. -Restore the computer from a backup. -Change the folder and file permissions of the user. -Reset the password of the user. -Upgrade the file encryption protocol.
Use antivirus software to remove a virus. Restore the computer from a backup. Renamed system files are usually the result of a virus on the computer. Removing the virus and restoring the computer from a backup are the only two possible solutions in this case.