A F

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A Mac user wants to update macOS and is searching Apple.com to locate update files. How are macOS updates typically obtained?

Updates are found in the app store

You decide to add three new hard drives to your computer so that you can increase the amount of storage on it. When you install the hard drives, you find enough SATA connections on the motherboard, but it is short one SATA power connector. What is the easiest way to add a SATA power connector to the system?

Use a Molex to SATA power adapter.

Phil wants to add a new video card, and he is sure the power supply is sufficient to run the new video card. But when he tries to locate the power connector for the new video card, he does not find a 6-pin PCI-E power connector. He has several extra cables for hard drive power cables from his power supply that he is not using. ​ What is the least expensive way for Phil to power his video card?

Use a SATA to 6 pin PCI-E adapter.

Sam would like to install a new application on every computer in his SOHO network. All the computers are currently connected in a workgroup. What is the easiest way for Sam to install the application on all the computers?

Use a network share to share the installation files.

How can you eliminate the need to open a dedicated TCP port on your corporate firewall when using Mac computers to share screens from the local and remote computers?

Use a third-party remote access app that uses a browser.

Restricting a device's access to the network until security requirements are met.

Which of the following is a function of an endpoint management server appliance?

In Windows, what two terms describe the active partition on an MBR drive, and the location where the Windows operating system is stored, respectively?

Boot partition System partition

You need to secure your Windows 7 computer in a way that prevents access to the entire HDD even if the drive is moved to another system. Which solution will you implement?

BitLocker

A short-range wireless technology used to connect two devices in a small personal network

Blue-tooth

If using a dual or multiboot configuration, what screen appears during the boot sequence?

Boot loader menu

When working with a security consultant that your company has hired, you notice that he is running software on one of the machines. He explains that the program is running a brute force attack that is using every word in the English language to see if the Administrator password can be cracked. What type of attack is he attempting?

Dictionary

Video card

Eric has asked you to help him build a new gaming computer so that he can play the newest games available. He also wants the computer to be VR-compatible. He has already purchased a high definition sound card, a new multi-core processor, an SSD hard drive, and 16GB of RAM. What is missing from Eric's game design build?

What term describes one or more characters following the last period in a filename, such as .exe, .txt, or .avi?

File extension

What is the general name of the processor feature that AMD calls HyperTransport?

Multithreading

A technician requires a file system on an internal 1.5 TB Windows 10 boot drive that supports file encryption, disk quotas, and security features such as file and folder permissions. Which of the following will support these requirements?

NTFS

Which of the following represents a method for accessing the BIOS/UEFI setup program?

Press a key or combination of keys during the BIOS/UEFI POST

In Windows 10, you can find this user-friendly interface to access numerous Windows settings? What is the name of this user-friendly interface?

Settings app

A Linux user needs to find all instances of the word admin in /var/log/auth.log. Which of the following commands will perform this function?

grep

Draws heat away from the CPU or other heat sensitive components so that it can be dissipated quickly

heat sink

What command creates a subdirectory under a directory?

md

The connector for memory found on a motherboard

DIMM

Which statement is NOT true regarding motherboards?

Has a heat sink on the PCIe slots

Modern desktop motherboards and laptop motherboards all utilize what two types of DRAM respectively?

DIMM, SO-DIMM

erek's supervisor is concerned that the company's security system does not comply with the new standards the company has decided to employ. She has asked Derek to determine how members of the company are authenticated on the network. What does the computer or server use to verify the access to a specific resource on the network?

Access control list

Which of the following security settings can best help minimize brute force attacks on local user account passwords?

Account lockout threshold

John recently upgraded from Windows 8.1 to Windows 10, after the upgrade is complete, on the right-hand side of his desktop there is a new area that contains a way to toggle several Windows features on and off, access the Settings app, and view notifications. ​ What is this area called in Windows 10?

Action Center

During your discussion with a client about a problem with his computer, you realize that he is explaining a problem you have seen several times. ​ What should you do when you realize you understand the problem?

Actively listen to the client until he finishes explaining the problem.

From this window, where do I click next to get to the following window?

Advanced system settings

16GB of DDR 4 RAM High-end sound card Two 4TB SATA 3 Drives

Cathy is planning to purchase a new audio and video editing workstation to make work videos. ​ What types of components will Cathy need to order to build her computer? (Select all that apply.)

16GB of DDR 4 RAM Two 4TB SATA 3 Drives Blu-ray burner High-end sound card

Cathy is planning to purchase a new audio and video editing workstation to make work videos. ​ What types of components will Cathy need to order to build her computer? (Select all that apply.)

Network and Sharing Center

Cathy wants to connect to her wireless LAN at home but is not sure where to change the setting so that she can connect. Where in the Windows Control Panel will Cathy find her computer's network connection settings?

What Intel processor technology interconnects the processor, chipset, and wireless network adapter as a unit, improving laptop performance?

Centrino

Jacob has discovered what he believes is a crime on a computer that he is servicing. Jacob has identified and gone through the proper channels to report the incident. He has created a backup of the entire hard drive to preserve the evidence and has started to document the evidence. ​ What must Jacob maintain so the evidence can be used to prosecute the crime?

Chain of custody

Which setting can be configured via the BIOS/UEFI screen?

Change the boot sequence

After installing the processor and reassembling the computer, the system begins the boot process and suddenly turns off before completing the boot. What should you do?

Check the cooler and make sure you have thermal paste on the processor

Jerry is working at the desk of a client in the marketing department of his company. The client thinks that the problem is the video card, because he has a computer at home with the same problem. The client explains to Jerry that when he fixed the problem, he had to reseat the video card. What should Jerry do when dealing with the client? (Select all that apply.)

Check the simple things first to make sure you do not miss anything. Ask the client to backtrack to see what things he tried in order to fix the computer. Compliment the client on his knowledge.

What type of installation should you perform if you want to install a 64-bit version of Windows on a computer that already has a 32-bit OS installed?

Clean install

Network-attached storage

Reggie has hired you to design a home network. The home network will share a printer but will mainly be used to stream movies to two different rooms. What kind of storage should you recommend to Reggie for this type of network?

What can a DIMM use to hold data and amplify a signal just before the data is written to the module?

Registers

While you are working on your computer, it shuts down unexpectedly, and you detect a burning smell. When you remove the case cover, you notice a distended capacitor. What can you do to fix this problem?

Replace the motherboard.

What type of RAM is typically installed onto a motherboard and loses data rapidly, requiring it to be refreshed often?

DRAM (Dynamic RAM)

Brandon purchased a new processor online as an upgrade. When he purchased the processor, he made sure that it used the same socket his computer's motherboard used. But he did not check to see whether the motherboard chipset was compatible. What will happen if you install a processor on a motherboard that can fit the socket but is the wrong chipset?

Damage to both the processor and the motherboard.

Game is not compatible with video card. Video card device drives need to be updated. Version of DirectX is out of date.

Damion recently did an update to his computer and added a new video card. After the update, Damion decided that he would like to play his favorite game. While he was playing the game, the system locked up. He restarted the computer and did not have any issues until he tried to play the same game, at which point, the computer locked up again.

She can add a digitizer over the screen on her laptop.

Danelle wants to use a stylus on her laptop but does not have a touch screen. She needs the stylus to help her create designs for her landscape business. She does not want to purchase a new laptop. ​ Is there any way for Danelle to use her current laptop with a stylus?

Danny received this email message today. What happened to Danny's computer?

Danny has received a fake security alert pop-up.

Smaller connectors for memory on laptops

SO-DIMM

Modern desktop motherboards and laptop motherboards all utilize what two types of DRAM respectively?

SO-DIMM DIMM

Polly is working on a laptop computer and notices that the computer is not running very fast. She looks and realizes that the laptop supports 8GB of RAM and that the computer is running only 4GB of RAM. Polly would like to add four more gigabits of RAM. She opens the computer and finds that there is an open slot for RAM. She checks the other module and determines that the module has 204 pins. What module should Polly order?

SO-DIMM DDR3

Which of the following is a major advantage to using SSH over Telnet for remotely accessing a Linux system?

SSH is a secure, encrypted alternative to Telnet.

She will not be able to connect to Wi-Fi with the laptop.

Sandy is replacing her broken laptop LCD screen with a new screen. During disassembly, she notices two cables that wrap around the screen and connect to the mini-PCIe card inside the laptop. ​ What will happen if Sandy breaks one of these cables?

A 9 pin two row D-shaped male connector

Sarah needs to connect to an interface port on an enterprise switch. Her laptop does not have the correct port. When she mentions this to her boss, he tells her that they have several older laptops in a closet and one of them should have a RS-232 connector for the enterprise switch. ​ What does the connector that Sarah needs look like?

What are two resources that may be useful in disassembling a laptop computer?

Service manual User manual

What term refers to a major update release on Windows 7?

Service pack

A company asked you help mitigate the brute force attacks carried out against its users' Windows account passwords. You successfully removed the malware responsible for the attacks and need to better secure the passwords assigned to the user accounts without limiting the system's usability. Which of the following should be included in securing the user accounts? (Select THREE.)

Set failed logon restrictions. Require user account passwords. Require strong passwords.

OLED

David has a laptop that is having a problem with the video system. You believe the problem might be the backlight. During your research, you discover that the laptop does not have a backlight. What type of screen is on David's new laptop?

Enable a hotspot on his smartphone.

Dennis is driving a car with his family onboard. His children are sitting on the backseat. They have a tablet and want to watch a video on the Internet. ​ What can Dennis do that will allow the children to watch a video on the Internet while in the car?

Connect to a Bluetooth speaker.

Derek is planning a camping trip and wants to be able to listen to music at the campsite. Derek currently has a smartphone but does not like the sound coming from the speakers. What will help Derek improve the sound coming from his smartphone's speakers while he is at the campsite?

Rebecca completed work on a computer and is verifying the functionality of the system when she finds a new problem. This problem is not urgent and can be easily fixed. The policy at Rebecca's company is that all problems need to be reported and given a priority code before they can be assigned to someone. What should Rebecca do about this new problem?

Determine whether fixing the first problem caused the second problem.

Two processing units installed within a single processor?

Multi-Processing

What is the general name of the processor feature that AMD calls Hyper Transport?

Multi-Threading

Multiple processors installed in the same processor housing?

Multi-core

A processor housing that contains more than one processor is referred to as what term?

Multi-core Processor

False

A serial cable with an RJ-45 connector is capable of being used through an RJ-45 Ethernet port.

Handle and switch between multiple instruction sets?

Multi-threading

A processor housing that contains more than one processor is referred to as what term?

Multicore processor

How many pins are in the power supply connector that is typically used on most motherboards today?

24-pin

What option, when passed to the shutdown command, will restart the local computer?

/r

SSH is a secure, encrypted alternative to Telnet.

/sbin

What is the value of X when execution ends in the following pseudocode? Set X As Integer For X = 100 to 0 Step -1 ' This is a comment Next X X = 100

100

What is the maximum number of partitions allowed using the GUID Partition Table (GPT) method for partitioning a drive for Windows?

128

The Master Boot Record (MBR) method of partitioning hard drives is limited to what maximum size of drives?

2.2TB

When advising a customer on the purchase of a new power supply, you should explain that if the power supply runs at peak performance all the time, it will overheat. Additionally, power supplies can lose some capacity over time. Considering these conditions, you recommend that the customer purchase a power supply with a power rating higher than what the system currently uses. How much more wattage over peak do you recommend the customer purchase?

30%

When advising a customer on the purchase of a new power supply, you should explain that if the power supply runs at peak performance all the time, it will overheat. Additionally, power supplies can lose some capacity over time. Considering these conditions, you recommend that the customer purchase a power supply with a power rating higher than what the system currently uses. How much more wattage over peak do you recommend the customer purchase?

30% more

The PCI Express Version 4.0 can provide up to what amount of throughput with 16 lanes for data?

32 GB/sec

What is the maximum amount of memory supported by a 32-bit Windows operating system?

4GB

Sometimes an expansion board may have an extra PCIe power connector. This connector comes in what two different pin configurations?

6-pin 8-pin

Gwen recently purchased a new video card, and after she installed it, she realized she did not have the correct connections and was not able to power the video card. ​ What connector(s) should Gwen look for when purchasing a new power supply? (Select all that apply.)

6-pin PCI-E connector 8-pin PCI-E connector

Today's DIMMs use what size data path?

64-Bit

Today's DIMMs use what size data path?

64-bit

What type of OS should you install for best performance when you have enough RAM?

64-bit

How many pins are used in a serial port?

9

30% moreKiera is building a new computer and wants to make sure she has an adequate power supply for all the new equipment she is purchasing. She will be installing three HDDs, with each using 25 watts. The processor she is using will need 125 watts. The motherboard will use 80 watts. RAM will require 3 watts for each of the four DDR3 DIMM modules. Her video card will need 400 watts to run at the maximum level. She wants to keep the cost as low as possible for the power supply. ​ Which power supply would you recommend?

900W power supply

Kiera is building a new computer and wants to make sure she has an adequate power supply for all the new equipment she is purchasing. She will be installing three HDDs, with each using 25 watts. The processor she is using will need 125 watts. The motherboard will use 80 watts. RAM will require 3 watts for each of the four DDR3 DIMM modules. Her video card will need 400 watts to run at the maximum level. She wants to keep the cost as low as possible for the power supply. ​ Which power supply would you recommend?

900W power supply

1, 2, 3, 6

A Fast Ethernet connection utilizes what pins on an RJ-45 plug?

The share to the file server is disconnected.

A Windows user has been successfully saving documents to the file server all morning. However, the latest attempt resulted in the following message, "Could not find this item. Verify the location of '\\FileServer\Docs' and try again." Which of the following is the most likely cause for this message?

DHCP server

A client contacted you to request your help in researching and supplying the hardware necessary to implement a SOHO solution at his new home-based business. Which of the following SOHO router features will simplify IP address configuration on the private network for both wired and wireless clients?

Cable

A client is requesting an Internet connection type that is not affected by atmospheric conditions and is always on. Which of the following will meet these requirements?

Insufficient number of physical processor cores.

A company is in the middle of an operating system update to Windows 10 from Windows XP, Windows 7, and Windows 8.x. The diverse nature of the update has made it imperative that the help desk techs have the ability to run several concurrent VMs. A few of the techs are experiencing frequent and extended periods of 100% CPU usage on their computers, and these spikes are limiting their ability to assist users in a timely manner. Which of the following is most likely causing this behavior?

Cloud computing

A company is utilizing servers, data storage, data backup, and software development platforms over an Internet connection. Which of the following describes the company's approach to computing resources?

Multimode fiber cable with MT-RJ connectors

A company requires an Ethernet connection from the north end of its office building to the south end. The distance between connections is 161 meters and will need to provide speeds of up to 10 Gbps in full duplex mode. Which of the following cable combinations will meet these requirements?

Which of the following best describes a variable when implemented in a script?

A container for storing data values that can be assigned, referenced, and manipulated.

Windows domain user name and password

A corporate user is attempting to connect to the company's Windows domain server on the local network with her new laptop through a wired connection. ​ Which of the following is required for the user to successfully sign in to the Windows domain?

Network multimeter Loopback plug

A coworker is asking for your advice on a problem with a computer that will not communicate on the network. While assisting the coworker, you suspect that the wired NIC may have failed. Which of the following will you recommend to your coworker as the best tool to diagnose this issue? (Select TWO.)

On-demand

A customer has contacted you to help him alleviate the large amount of time and effort that goes into adding and removing users who require access to a business productivity suite. The suite of applications includes word processing, spreadsheet, presentation, and email. Each time an employee is hired, a technician spends over an hour preparing a computer for the user. Likewise, when an employee leaves the company, a technician spends an hour decommissioning the computer. What aspect of cloud computing will be most beneficial in reducing a technician's time and effort while still giving the technician the ability to create and delete user accounts?

Locator applications

A customer has several mobile device users who have a habit of misplacing their devices during the workday. Which of the following security methods will most benefit these users?

WMN

A group of wireless devices are using each other as relays to share a network connection across a large area. Which of the following network categories is being used?

Enable virtualization support in the laptop's UEFI.

A help desk technician needs to run virtual machines on her laptop computer for several upcoming training sessions. Which of the following must be completed before she can use virtualization on her laptop?

Implement a blacklist on the firewall and add the site the users are visiting.

A manager in a small office is asking if it is possible to limit network access to a particular website during business hours. Apparently, several users are spending an excessive amount of time on the site preventing them from completing their work-related tasks. Which of the following is the best solution to accomplish the request from the manager while not limiting access to other websites?

DHCP server

A server provides the necessary IP configuration to your network host so the host can communicate on the network. If this service malfunctions, your device will not be able to utilize the network. What server provides this service?

The screen protector is interfering with touch response.

A mobile device user is having problems launching apps and texting. The user touches an app to launch it, but the app icon next to the desired app launches instead. When the user types a text message, every word in the message is misspelled. What is the most likely cause for this behavior?

Close or disable all unused running apps.

A mobile device you are troubleshooting is experiencing a sharp decrease in performance after an hour of operation. The user powers the device off each evening, and when it is powered on, performance returns to normal. After an hour of operation, performance degrades. Which of the following is the best action to take to resolve this issue?

Subnet mask

A network host with an IP address of 192.168.10.200 wants to send a message to a destination computer with an assigned IP address of 192.168.10.100. Which of the following will the sending host use to determine whether the destination computer is on its own network or another network?

Web server Web server

A server or service is responsible for sending the contents of cengage.com to your browser when you type cengage.com into the location bar. If this service is malfunctioning, your browser will display a page not found error. What server provides this service?

The cable run exceeds the specifications for Ethernet over twisted pair.

A new Cat6 cable run and keystone jack were installed for a workstation that was moved from the sales department to the shipping department. Since the move, the user has been complaining of slow transfer speeds on both Internet and local network communications. The technician ran a test and is viewing the following output on the tester. Which of the following is the most likely reason for the sluggish network speeds?

VPN tunnel

A remote worker wants to connect his computer to his corporation's private trusted network over the Internet. Which of the following will need to be configured?

DNS server

A server provides the services to take you to the correct website domain when you type cengage.com in your web browser. If this service were not functioning, you would have to remember the IP address for cengage.com. What server performs this service?

False

A short circuit is one where needed connections are missing, such as when a wire breaks.

Private cloud

A small bank with several regional branches is searching for a solution to consolidate its business services into a single site with centralized management. The service should provide secure resources for use by the bank, and these resources must be isolated from any other organization using the same service provider. Which of the following will best meet the needs of the bank?

IaaS

A small company has hired you to take over its IT needs. The company currently has seven on-site employees and 12 remote employees working from their homes and is looking to hire an additional 20 employees in the next six to eight months. The owners of the company are asking you to obtain a business service that will meet the needs of the current staff as well as scale up when the company grows. The service must provide adequate and scalable computing power and storage. Which cloud service model should you implement?

Mobile hotspot

A small group of travelers is meeting inside an ancient building, and the travelers need access to the Internet using their mobile devices. However, the group is in an area where Wi-Fi Internet is not available and cellular coverage is intermittent. One of the travelers has an unlimited cellular data plan and a strong consistent signal. Which of the following methods would most likely be implemented to provide Internet service to the group?

Wi-Fi analyzer

A technician has been dispatched to a client's office to diagnose wireless network issues and suspects that channel overlap may be the problem. Which of the following tools will the technician use to help in determining whether her suspicions are correct?

Toner probe

A technician has verified that a bad Cat6 cable run in the wall is responsible for a workstation's lack of communication on the network. Which of the following tools can be used to pinpoint the location of the cable inside the wall?

Change the router's default administrative password.

A technician is configuring a new SOHO multifunction wireless router at a customer's location to provide network access to several wireless devices. The technician is required to protect the customer's private network from unauthorized access while performing the initial router setup as well as during normal operation after the configuration is completed. Which of the following is the best step for the technician to take in securing the router to meet this requirement?

Punchdown tool

A technician is installing UTP cable and needs to terminate the connections on the patch panel shown in the following image.

Isolate all VM virtual NICs from the physical NIC.

A technician is installing a hypervisor on a host system with a single physical NIC that runs a high-bandwidth network application. The host NIC is running at optimum bandwidth and cannot support additional network traffic. The technician will be configuring eight networked VMs that will be interconnected and on their own dedicated virtual subnet separate from the existing physical LAN subnet. When networking the VMs, what will the technician need to do to guarantee that the host network's performance is not affected without adding complexity or additional cost to the host configuration?

Back up all user data.

A technician is troubleshooting a mobile device that is experiencing very slow performance, and the decision has been made to perform a factory reset. Which of the following actions should the technician take before starting the reset process?

Verify the USB cable is attached.

A technician is troubleshooting a printer connected to a computer via USB. The printer will print using the controls at the printer but fails to print from the computer. Which of the following steps should be taken next?

Connect a computer directly to the cable modem and attempt to access the Internet.

A technician is troubleshooting a small network with cable Internet service in which a user is receiving a message in her web browser stating a site cannot be found. While interviewing users, it is determined that every host on the network is experiencing the same issue with all websites. Which of the following is the first step in troubleshooting this issue?

Cable tester Crimper Cable stripper

A technician is working at a client's office after hours and needs two cables to finish the work but does not have immediate access to prebuilt cables. One cable needed is for a dial-up connection from the dial-up modem to the existing analog POTS jack on the wall. The other cable is for an Ethernet connection from the computer to the existing keystone jack on the wall. The technician has the necessary wire and connectors to make the cables. Which of the following tools will the technician use to make the cables and then verify that they both work properly? (Select THREE.)

Crimper Cable stripper Cable tester

A technician is working at a client's office after hours and needs two cables to finish the work but does not have immediate access to prebuilt cables. One cable needed is for a dial-up connection from the dial-up modem to the existing analog POTS jack on the wall. The other cable is for an Ethernet connection from the computer to the existing keystone jack on the wall. The technician has the necessary wire and connectors to make the cables. Which of the following tools will the technician use to make the cables and then verify that they both work properly? (Select THREE.)

Address reservation

A technician wants to configure a DHCP server to guarantee that certain printers always receive the same address. Which of the following should the technician configure?

Syslog server

A technician wants to consolidate and log specific alerts from network devices into a database so maintenance tasks and potential device problems can be addressed in a timely manner. Which of the following should the technician implement?

The method for retrieval is dependent on the specific app or device's operating system.

A user is troubleshooting a mobile device app that is displaying errors and has contacted the app manufacturer's technical support team for assistance. The support technician needs specific information from the device about how the app is responding and what is happening to cause the errors. How can the technician retrieve the requested information from the user's device?

True

A wavelength mismatch occurs when transmissions are optimized for one type of cable but sent over a different type of cable.

True

Multimode fiber contains a core that is larger than a single mode fiber core.

At what point during the motherboard installation should you install the motherboard drivers?

After Windows successfully boots without errors

Motherboards may contain which of the following ports on the I/O panel?

All of these

What configuration can you find for PCIe slots?

All of these

Which component may be considered a field replaceable unit or FRU?

All of these

Yesterday you installed a new game on your computer. When you ran the computer, you noticed that the application was running very slow. After you exited the game and restarted it, you received an error message saying, "Insufficient memory or disk space." You checked your hard drive and saw that you had more than 250GB of free space. What should you check next in Task Manager?

Amount of RAM available.

Gmail

Angela recently purchased a new Android smartphone. While purchasing the phone, Angela was told that she would need to set up a new email account for the phone. Which commercial email provider should Angela use for her new Android phone?

What is another name for several small utility programs that are found in the Control Panel?

Applets

Richard has been called to the human resources department to repair a desktop computer. The woman using the computer is currently working on the company's payroll and wants to get her computer working quickly so that everyone will be paid on time. While working at her desk, Richard notices that the paperwork she is entering into the system has his coworkers' bank account information. ​ What should Richard do when he discovers this paperwork?

Ask the client to remove the documents.

Sara receives a call from a customer who just purchased her first computer with Windows 10 installed. She is having some issues using the new computer and needs help setting up a printer. What should Sara do when working with the inexperienced customer? (Select all that apply.)

Avoid asking the customer to take steps that might destroy files or settings. Keep a positive attitude. Frequently ask the customer what she sees on the screen.

Isaac was assigned to work on a computer in his company's R&D department. While working on the system, Isaac received several text messages and emails from his coworkers about another issue in the data center. Isaac answered the text messages as they came in and finished working on the computer system in the R&D department. The next day Isaac was called into his supervisor's office. His supervisor told him that he received a complaint that Isaac was on his phone instead of working on the problem with the computer. ​ What should Isaac have done differently to avoid this complaint?

Avoided distractions.

What two different types of firmware may be used on motherboards?

BIOS UEFI

Where must virtualization be enabled for VM (virtual machine) software to work?

BIOS/UEFI

What is used to change motherboard settings, finds a boot device, and contains instructions for running essential hardware before an OS is started?

BIOS/UEFI setup

Where should a user disable virus protection settings that might prevent the boot area of the hard drive from being altered?

BIOS/UEFI setup

During an upgrade for a new web server, Glen's company experienced a power surge. The power surge hit the new server, and now the company must troubleshoot the server. ​ What can the company implement that will get the website up and running without the new server?

Back-out plan

An administrator is assigning Windows user accounts to user groups based on the user's role and notices the built-in Power Users group. What is the purpose of the Power Users group in Windows 7 and later?

Backward compatibility for legacy operating systems and applications.

Thunderbolt 3

Bayley wants to connect a new external hard drive to his Windows PC. He wants the fastest connection type available because he plans to edit video directly to and from the external hard drive. Which connection type should Bayley use to get the fastest connection possible?

Which statement is NOT a good practice when working inside a computer case?

Be sure to hold expansion cards by the edge connectors.

wavelength division multiplexing

Bidirectional transceivers utilize what technology to separate the data in each direction?

Landon starts his computer and receives the error message, "Hard drive is not found." In a panic, he calls you because he did not back up his data and has numerous important files on his hard drive. During your investigation, Landon tells you he was watching a movie on his computer the previous night. What might be the problem with Landon's computer?

Boot priority is set to the DVD drive.

Shane is working on a new project for the sales department. The company wants a way to allow the sales force to print orders at the company headquarters. Shane has proposed that their computers be able to connect to the system using a VPN. ​ Who does Shane need to get permission from before he installs the VPN?

CAB

Where do today's computers store almost all motherboard configuration data?

CMOS RAM

James travels for business and is always worried that his laptop will be taken from his room. Which type of device will ensure that James's laptop will not be stolen while he travels?

Cable lock

You are troubleshooting a laptop with multiple sticking keys that result in misspelled words while the user types. Other than several sticking keys, the laptop appears to be functioning properly. You have cleaned the keyboard with compressed air, but the problem persists. After removing one of the key tops, it becomes apparent that a liquid was spilled into the keyboard. Which of the following is the next step in resolving the issue of sticking keys?

Clean the keyboard keys with a contact cleaner.

A technician is using the Security tab in the Properties dialog box in an attempt to remove the inherited status from a file's permissions but cannot locate where to make the change. Which of the following steps should the technician take to make this change?

Click the Advanced button to open Advanced Security Settings for the file.

Paul is playing a game when his computer shuts down unexpectedly. Paul has noticed recently that his fans are running very loud. When Paul turns his computer back on, it starts to boot and then shuts off again. ​ What is a possible problem with Paul's computer?

Computer is overheating.

Your organization recently deployed a Windows domain controller with Active Directory. All the domain OU users need to run the same script file each time they sign in to Windows. How can the settings be configured with the least effort by the admin?

Configure Group Policy to run a logon script.

Several computers in your organization are being used from within the building after hours when the company is closed. Your manager has asked you to configure the computers to limit access to business hours. Which of the following steps can be taken to limit access to the computers?

Configure logon time restrictions.

Nothing needs to be changed.

Consider the following configuration. ​ Computer "A" IP address: 172.16.100.100 Subnet mask: 255.255.0.0 ​ Computer "B" IP address: 172.16.200.200 Subnet mask: /16 What should be done to allow these computers to send and receive data to and from each other?

Which of the following must be performed prior to creating a spanned, striped, or mirrored volume on unallocated space in Windows?

Convert basic disks to dynamic disks.

If you enter a command, what three key presses can you use to terminate its execution before it is finished?

Ctrl+Pause Ctrl+Break Ctrl+C

AES

Current encryption algorithm used today.

Jenny is preparing to install Windows 10 on a system that has a version of Windows 8.1 installed. This version of Windows 8.1 runs slowly and crashes occasionally. The optical drive also does not work, so Jenny decides to use a flash drive to install Windows 10. Jenny wants to remove all the programs and data from the computer and start over with Windows 10. What type of installation should Jenny perform?

Custom installation

Which type of memory can support quad, triple, and dual channels?

DDR3 - DDR4 and anything above

What two different DIMM technologies can be used in a quad channel configuration?

DDR3, DDR4

The LGA1151 socket and latest Coffee Lake chipset support what type of RAM?

DDR4

The web server at Terry's company recently was attacked by multiple computers. The attack overwhelmed the company's web servers and caused the web servers to crash. What type of attack occurred?

DDoS

The company that you work for has recently had a security breech. During the recover and assessment, it was discovered that the malicious user used the company VPN to gain access to the network. Now your company would like to find a way to verify the identity of a user who requests access to the company through a VPN. What can you recommend to the company?

Digital certificate

RFID tags

Dillion's company has decided it wants to find a way to do a better job of tracking clothing inventories. Dillon has been asked to research ways to use the wireless network and IoT devices to help when tracking the clothing inventories. What should Dylan recommend to his company to help track the inventories?

Which of the following security policies can be implemented to prevent removable media from automatically launching potentially harmful programs?

Disable AutoRun.

Victoria is working on a computer that was infected with a virus when a client clicked on a link and downloaded a Trojan. Victoria researched the virus and learned that the virus might have written itself into System Restore. What does Victoria need to do to run the antivirus software on System Restore?

Disable System Protection.

You recently created several new user accounts in the Sales OU and configured them with the appropriate group membership, logon scripts, and printer access. Except for one new sales employee, all employees are actively using the account. The remaining employee will be using the account within the next two weeks. What is best practice for the remaining unused account?

Disable the account until the employee is ready to use it.

Which of the following is not considered good customer service? (Select all that apply.)

Disclose the experience on social media.

You can use what utility to convert two or more basic disks to dynamic disks?

Disk Management

Transmits digital video and audio. They are slowly replacing VGA and DVI ports on computers

DisplayPort

What type(s) of port transmits both digital audio and digital video with a single connector? Select all that apply.

DisplayPort HDMI

When selecting a processor to match system needs, what features should you consider and NOT consider?

Do: Number of Cores, Cache Memory, Socket Compatibility, Integrated graphics processing units, Frequency Don't: Wireless Display, mouse and keyboard

Molly, an end user, connects an external monitor, external keyboard and mouse, and a wired network cable to her laptop while working in the office. She leaves the office frequently to meet with customers and takes the laptop with her. Disconnecting and reconnecting these external connections has become inconvenient. Which of the following devices will allow the user to disconnect and reconnect the laptop to the external connections with the least amount of effort? (Select TWO).

Docking station Port replicator

If you wish to install a new OS without disturbing the old one so that you can boot to either OS, what type of boot setup should you create?

Dual

Two processor sockets on the motherboard?

Dual Processors

Thunderbolt

Dylan called you because he purchased an external hard drive for his computer, and the connector on the cable is different from the cable he had previously seen. In the past, the cable was a USB connection on one end of the cable for the computer and a mini-USB connection for the hard drive. Dylan sent you a picture of the cable. What type of cable is Dylan using?

You are researching RAM for a computer you are building for a friend who will be using the system as a home office server for her small business. She wants the added protection so the computer will not crash due to a memory error. ​ What type of RAM should you consider purchasing?

ECC

DIMMs used in servers can provide additional reliability by checking for and correcting errors if they use what specific technology?

ECC - Error Checking Code

You are researching RAM for a computer you are building for a friend who will be using the system as a home office server for her small business. She wants the added protection so the computer will not crash due to a memory error. What type of RAM should you consider purchasing?

ECC - Error checking Code

What acronym is another name for static electricity, which can damage chips and destroy motherboards?

ESD

Recently, Jessica has been receiving reports at the help desk that clients cannot log in to their computers and need to rest their passwords. After checking the log file, Jessica decided to ask one client who had recently changed his password, why he decided to change it. The client reported that someone from the help desk had called him and asked him for his password two days ago. He gave the caller the password, and now he can't log in to his system. Jessica has discovered that the client was a victim of social engineering. ​ What can the company do to prevent this from happening again?

Educate users.

You have received several trouble tickets from the employees in the warehouse for the stand-alone computers used to control various shipping machines because the computers are not booting when powered. Each time a technician resolves the booting issue the boot order is changed in the firmware. Each computer is required to have the USB ports disabled in the firmware to keep employees from connecting rogue devices. Which of the following steps should be taken to eliminate these trouble tickets?

Enable the supervisor password in the BIOS/UEFI setup.

What is the term used to designate that a particular operating system will no longer be supported by its manufacturer or managing entity?

End-of-life

When testing your theory, you discover that you are wrong. ​ What is your next step in the troubleshooting process?

Establish a new theory of probable cause.

Heather is troubleshooting a computer at her worksite. She has interviewed the computer's user and is currently trying to reproduce the problem the user described. Heather is in which step of the troubleshooting process?

Establish a theory of probable cause.

William has been working on a problem with a computer at his company for several hours and still can't ascertain the problem. The computer will not turn on, and William has tried everything he can think of to fix the computer. He has replaced the power cord, the power supply, and even the power strip the computer is plugged into. William decides that it must be the motherboard and takes the computer to his shop to replace the motherboard on the computer. When he plugs the computer in, it turns on. The problem was not the computer—someone had turned off the switch for the wall outlet that the power strip was plugged into. Where in the troubleshooting process could William have discovered this problem? (Select all that apply.)

Establish a theory of probable cause. Identify the problem. Test the theory to determine cause.

Zach believes someone is trying to log in to a computer system in order to gain access to the company's network. He wants to use Windows to determine if that is the case. ​ Where can Zach go to check the security logs?

Event Viewer

SMTP

Examine the exhibit above. Host B is sending an email intended for the user on Host A to the email server. What protocol is being used to send the message through the router?

Network multimeter

Examine the exhibit above. Which network tool most likely produced the output?

Router

Examine the exhibit above. ​ "Device A" is an 8-port layer 2 managed switch and "Device C" is a 4-port hub. Which of the following describes "Device B," assuming all workstations can communicate with each under normal circumstances?

George is working onsite at a client's desk. The client's phone rings during George's visit, and the client explains that she must take the call. What should George do in this situation?

Excuse himself and check back when the call is complete.

Loop

Executed the same command until a condition is met

During your service call at the residence of a customer, you discover you will need a part that you don't currently have. What should you do in this case?

Explain the situation and give the customer options on how to order the part and when you will return to complete the repair.

What Windows 10 utility allows you to create a backup schedule that can include any folder on the hard drive and system image? (Select all that apply.)

File History Backup and Restore

Which of the following tools are available in Windows 10 for backing up user data or complete system images? (Select TWO.)

File History Backup and Restore

When selecting a processor to match system needs, what features should you NOT consider?

Finding the latest and most powerful processor available no matter the cost

A Mac computer is reporting problems with the HDD, and the user wants to run a check for errors. Which of the following is a disk management tool built into macOS that is useful for finding and repairing disk problems?

First Aid

What is a possible remedy if your system hangs at odd times or during the boot?

Flash the BIOS/UEFI

Lana has just taken a job as an IT professional in Europe and would like to get a head start on what to expect. What regulated data would you recommend that she research?v

GDPR

What two methods are available for Windows to use to partition a drive?

GPT MBR

What are the two different methods for partitioning hard drives?

GUID Partition Table (GPT) Master Boot Record (MBR)

TKIP

Generates a different key for every transmission; however, the encryption algorithm used for its calculations is no longer considered secure.

Use Parental Controls.

George is concerned that his children might somehow be exposed to things on the Internet that they are not mature enough to handle. He wants a way to limit their ability to view content on the Internet. What will you recommend to George?

Which of the following describes the macOS feature that lets you use finger motions to perform functions, for example, spreading two fingers to zoom in?

Gestures

Your company has decided that security is very important and wants to add a second security check when workers are logging in to their computers. The company issued key fobs to all the employees. The key fob generates a code for them to enter when logging in to the computer. ​ What type of security is your company using?

Hardware token

Which of the following user accounts are created automatically and disabled by default when Windows is installed? (Select TWO.)

Guest Administrator

What type(s) of port transmits both digital audio and digital video with a single connector? Select all that apply.

HDMI DisplayPort

Penny is setting up computers at a local nonprofit organization. The computers were donated by a company that was upgrading to new computers. Penny must decide whether to use a 32-bit or 64-bit version of Windows 8.1. What hardware on the computers should Penny check? (Select all that apply.)

Hard drive Processor RAM

A user called to inform you that the laptop she purchased yesterday is malfunctioning and will not connect to her wireless network. You personally checked to verify that the wireless worked properly before the user left your office. The user states she rebooted the computer several times but the problem still persists. Which of the following is the first step you should take to assist the user in resolving this issue?

Have the user press the appropriate function key combination to enable the wireless radio and then attempt to connect to the wireless network.

GPU on video card overheating.

Heather's computer display is having a problem in which the desktop seems to be shifting. She has sent you a picture of the problem. ​ What could be causing this problem on Heather's monitor?

When working with customers, you should always try to keep a positive attitude. Why is it important to maintain a positive attitude when working with customers?

Helps to establish a good customer relationship.

Henry is having a problem with the electrical system on his current laptop. The battery for the laptop will not charge. Henry took the AC adapter and battery from another laptop that is known to work, and put them in his current laptop, but still the battery will not charge. What possible actions can Henry take to make his laptop usable? (Select all that apply.)

Henry can purchase a new laptop Henry can replace the laptop system board. Henry can use the laptop only when it's connected to the power using the AC adapter.

Henry is having a problem with the electrical system on his current laptop. The battery for the laptop will not charge. Henry took the AC adapter and battery from another laptop that is known to work, and put them in his current laptop, but still the battery will not charge. What possible actions can Henry take to make his laptop usable? (Select all that apply.)

Henry can replace the laptop system board. Henry can purchase a new laptop. Henry can use the laptop only when it's connected to the power using the AC adapter.

ping

Henry is troubleshooting a network connection and wants to see if he can connect to the server on his network. ​ Which Microsoft command-line command should Henry use to check whether he can connect to the server?

He can turn off the touchpad in Windows.

Henry uses a laptop and has noticed that sometimes when he is typing, the cursor will move, causing him to mistype words or even delete sentences or entire paragraphs. Henry has tried not to touch the touchpad on his laptop, but the problem still occurs. ​ What can Henry do to remedy this problem?

He can attach a USB mouse.

Henry's laptop computer was stepped on yesterday, and the touchpad no longer works. The keyboard works fine. ​ What can Henry do to use a mouse with his laptop?

Give two technologies that are fully-implemented, 64-bit processors for use in servers and workstations?

Hyper threading and hyper transport.

Which of the following is used to uniquely identify a computer on a network?

IP address

You want to block unauthorized activity on your LAN from the Internet.

In which of the following situations should you install an IPS instead of an IDS?

Your computer has a single HDD formatted with NTFS with the following data folders: C:\Documents C:\Pictures You create a new child folder under the C:\Documents folder. What term describes the permissions the new folder automatically attains from the C:\Documents folder?

Inherited permissions

Jennifer is trying to install an anti-malware program on a computer that she believes might be infected. During the installation, she receives an error message saying the software cannot be installed. The error reports that she does not have the privilege to install software. Jennifer is using the administrator account, so she knows she should be able to install the program. ​ What can Jennifer try next to install anti-malware software?

Install in Safe Mode.

Tracy has completed installing Windows 7 on a computer and is ready to install a printer. Tracy attaches the printer to the computer and a message pops up that a new device is being installed. When the process is done, she tries to locate the printer, but the printer is not available. What can Tracy do to use the printer?

Install the driver from the manufacturer's website.

When you verify a system is functioning properly, you determine that the problem could have been prevented. What should you do to help the computer's user avoid having the same problem again?

Instruct the user on how to prevent the problem.

Who are the two major manufacturers of processors used in PCs?

Intel, AMD

Lin received 200 new laptops to be issued to company employees. Lin was asked to set them up and distribute them to everyone on a list provided by his supervisor. Lin has completed installing all the software on each computer and is ready to distribute them, but he needs to keep track of who received each laptop. ​ How can Lin keep track of all the laptops?

Inventory management documentation

True

Is it true or false that a touchscreen on a laptop can be used as both a mouse and keyboard?

Gina is upgrading your computer with a new processor. She installs the processor into your motherboard and adds the cooling system. She powers up the computer, and it begins to boot but then shuts down. What could be the cause of this problem?

It's overheating - No thermal paste or way to much thermal paste

MAC filtering

Jacob wants to set up extra security on his wireless network; he currently uses WPA2. He wants to allow only his devices to connect to the network and reject devices that he does not own. What extra wireless security should Jacob employ in on his wireless router?

Settings app

James wants to sync his Android phone to back up his pictures. However, he does not want to sync his data files. How can James select what to synchronize from his phone to Google storage?

Reset the device and restore the data from iCloud or iTunes.

Jennifer has an iPod that she has not used for six months. She wants to move the music and pictures from the iPod to her new iPhone. She tries to access the iPod using her four-digit code, but the passcode does not work. She tries to use two other codes, but neither work. Obviously, Jennifer does not remember the passcode. What solution does Apple provide that will help Jennifer recover the passcode for her iOS device?

User guide for the device

Jerry recently purchased a new iPad. He needs guidance on setting it up and wants to find documentation to help with the setup. Where can Jerry find detailed steps on how to connect to a network, configure email, update the OS, sync, and back up settings and data, as well as what to do when things go wrong with his iPad or an iPhone?

7200 RPM magnetic HDD

Jessica wants to purchase a new hard drive. She wants a drive that has fast access because she will use it to edit videos on her PC. She also needs a lot of storage and wants to have at least 4 TB available to save her videos. Jessica wants to keep the cost down as much as possible possible. What type of hard drive should Jessica purchase?

Use a KVM switch.

Jimmy is running out of desk space. He keeps three computers on his desk. The three computers can't be moved, and they need to be running at the same time. Currently Jimmy has three mice, keyboards, and monitors running on his desk. What can Jimmy do to free up space on his desk?

Mutual authentication

John has subscribed to a cloud-based service to synchronize data between his smartphone, tablet, and PC. Before allowing the data to be synchronized, this service uses a process in which the cloud service and the client on the smartphone will verify the security of all devices' security certificates. What type of security does the cloud-base service employ?

Camera or webcam

Jordan has been asked to help his company find a way to allow all the workers to log on to computers securely but without using a user name and password. The CIO wants everyone use face recognition software. ​ What peripheral will be needed on each computer to allow the workers to log on using face recognition software?

The smartphone is located too close to the car's heat vent.

Jordan likes to use his smartphone in his car. He uses it as a navigation device and connects it via Bluetooth to listen to music. He has purchased accessories that allow him to see his smartphone while he is driving. On a very cold day, and after driving for several minutes, Jordan receives a warning from his smartphone that it is overheating and needs to shut down. When he touches his smartphone, it is hot. What might cause Jordan's smartphone to overheat?

Num Lock key is on.

Jose calls you at the help desk because he is having a problem logging on to his laptop computer. After several unsuccessful attempts to enter his password, he asks you to reset the password because he must have forgotten it. You reset his password, and he types it, but again the computer rejects it. Jose assures you that he typed the correct user name and password. You ask him what type of computer he is using, and he tells you a laptop. What might be the problem with Jose's computer?

Num Lock key is on.

Jose calls you at the help desk because he is having a problem logging on to his laptop computer. After several unsuccessful attempts to enter his password, he asks you to reset the password because he must have forgotten it. You reset his password, and he types it, but again the computer rejects it. Jose assures you that he typed the correct user name and password. You ask him what type of computer he is using, and he tells you a laptop. What might be the problem with Jose's computer?

RAID 1

Keion works as a freelancer creating websites and designing logos for clients. He recently had a hard drive failure and lost work for a client, and he would like to prevent the same type problem from happening again. Keion does not want to rely on a backup but would like a way to ensure that his data is safe on his computer. You recommend that he create a RAID array that will duplicate his work onto two disks. What RAID configuration should you recommend to Keion?

Enable print sharing on the computer.

Kendra, a user, would like to share her serial printer that has no networking connectivity with the other users in her small office. Which of the following would be the best choice for providing this functionality with the least effort and cost to the user?

What socket do Coffee Lake processors use?

LGA1151 version 2

You have been tasked with training end users in security best practices and have observed a trend among users in which many are writing down their passwords. Which of the following procedures can be implemented to provide enough security to protect resources while minimizing the need for users to write down their passwords?

Lengthen the time period between forced password changes.

Derek is working at the help desk when he receives a call from a client about an issue with the company's email. The customer is very upset about the email issue. He is complaining about the email service and the IT department in general. What should Derek do to defuse the situation?

Let the customer vent and then restart the conversation.

What type of processor memory is located on the processor chip (processor die)?

Level 1 Cache

You opened a batch file in Notepad and are observing the following lines. (The line numbers are for reference only.) 1- ECHO This batch file deletes the temp files 2- DEL %TEMP%\*.* /Q 3- REM The temp files were deleted 4- PAUSE Which of the lines is a comment?

Line 3

A system administrator is selecting an operating system for use by the company's research and development team. The team requires an OS that can be easily modified and changed to meet its particular requirements. Which of the following operating systems will be the best choice for the users?

Linux

A bootable Linux USB flash drive or CD that can be used to repair system issues is known by what term, respectively?

Live USB or CD

What type of storage drive contains spinning platters?

Magnetic hard disk drives

Your company wants to secure the new data center physically. The company has hired a security guard but wants to find a way so that only one person at a time can enter in the data center. As people enter, they will have to show the security guard identification that authorizes them to enter the data center. What is your company's new security called?

Mantrap

Enter the same user name and password used on the corporate network.

Mary, a remote user, connects her Windows 10 laptop to the corporate network by way of the Internet using a VPN tunnel. Which of the following is often configured as a required step for a user each time she attempts to use the VPN connection?

What connector has 4 pins, is used for older IDE drives and some SATA drives, and can provide +5 V and +12 V power outputs?

Molex connector

What two devices in a computer should be considered "black boxes," and should never be opened due to risks involving charged capacitors?

Monitor Power supply

George is involved with a project at work and notices that he has a pending update for his computer. George knows that updates are important, and he decides to take a break and complete the restart of the computer so that the update can install. After George restarts the computer, he notices that his AutoCAD program is running slowly. The issue continues to the point that George decides to call the technician and ask him to check what is going wrong on his computer. The technician tells George to turn the computer off and then on again and asks George how much RAM is counted. The amount of RAM is 8GB less than the amount that was installed on George's system. What hardware could be causing this problem? (Select all that apply.)

Motherboard RAM

Thomas came into work this morning and turned on his computer and nothing happened. He immediately called the help desk, and you were sent to fix his computer. While talking with Thomas about his computer, you find out that when he turns on the computer, he has lights and fans, but nothing else happens. He also tells you that nobody else has done anything with his computer. Nothing has been added or changed, since it worked the day before. You decide to try to re-create the problem, and when you turn on the computer, there are lights and fans, but no beeps and no video. You notice that the keyboard light does not come on. ​ What can you determine about the problem with Thomas's computer? (Select all that apply.)

Motherboard has failed. Processor has gone bad or is not seated properly.

When you turn on your computer for the day, you notice lights and fans but no beeps and no video. The Num Lock light does not come on. What might be the problem with your computer? (Select all that apply.)

Motherboard has failed. RAM is not working properly. Processor has failed or is not seated properly.

You are planning to install Windows 10 on your computer and must decide which file system to use on the hard drive. What files systems are available in Windows 10 for a local hard drive? (Select all that apply.)

NTFS FAT32

What file system supported by Windows can be used for volumes and drives that don't hold the Windows installation? (Choose all that apply.)

NTFS exFAT FAT32

A technician needs to boot macOS over the network using an image stored on a server. What Apple technology will best assist the technician?

NetBoot

A technician is configuring the Windows computers on a network to print to a printer that is directly connected to the network via UTP cable. What term best describes this method of printer connectivity?

Network printer

While researching a network issue, Randy discovered a diagram that he can use to see the design of the network. What type of documentation did Randy discover?

Network topology

Calibrate the display color.

Nick is working on a new graphic for one of his company's clients and is having an issue with the color on his screen. The client wants the graphic to include a very bright red color, but Nick can't seem to find the right color on his screen. He seems to have the color perfect on the screen, but when he tries to print the graphic, the color seems to fade. He has checked the printer, and it works fine. ​ What will help Nick see on the screen the color that he is printing?

WEP

No longer considered secure because the key used for encryption doesn't change.

Patrick is working on a computer that is having wireless network connection issues. Patrick decides that he needs to take the laptop with him to repair it and then return it to the user. While Patrick is replacing the wireless network card, he receives a phone call from the user. The user wants to know where the laptop is because he is leaving on a business trip that day and needs the computer. ​ What should Patrick have done to avoid this situation?

Offered the user different repair options.

How often does Windows automatically defragment a hard drive or trim a solid-state drive?

Once a week

AirPrint

One of your sales employees is taking a trip to several conventions over the next several weeks and will need to have access to a printer at each of the locations. Each of the convention centers will be providing hassle-free printing for all Apple computer and iOS mobile device users. Which of the following technologies will most likely be used to provide print services?

What type of software is used to control a computer?

Operating system

You are reviewing new RAM to purchase for a gaming computer and find three different RAM modules that are the same except for their CAS Latency. Option A lists the CL as 18 ns, Option B lists the CL as 20 ns, and Option C lists the CL as 15 ns. Which option will work best for a gaming computer?

Option C

A technician needs to service a laptop computer that is experiencing an intermittent problem with the display. Which of the following will be most effective at helping the technician complete the work in a timely and efficient manner? (Select TWO).

Organize and place all parts and screws and in one place. Document and label the location of the screws and cables before removing them.

What is the most likely result of a correctly installed processor, but an incorrectly installed cooler?

Overheat and shutoff

Which motherboard slot should you install a new high-end graphics card in?

PCI Express 3.0 x16 slot (PCIE2: x16 mode)

The standard for computer expansion cards

PCIEs

Jeff owns a health care company that sells medical supplies. The company bills health insurance companies for their customers. They are required by the insurance companies to complete paperwork that includes personal and health information. What type of regulated data does Jeff's company need to secure?

PHI

A diagnostic program built into a computer to test the hardware components before the computer boots up

POST

What tool can help discover and report computer errors and conflicts that occur when you first turn on a computer and before the operating system is launched.

POST card

Your computer system loses power while you are working on a project for a very important client. When the computer restarts, you hear continuous beeps coming from your computer, and the monitor is showing no signal. What do the beeps mean?

POST has failed, and you should research the BIOS beep codes.

What is the component called that usually has a dual-voltage selector switch and has cables that connect to the motherboard and internal components?

PSU

What type of bus does PCI use?

Parallel

Wi-Fi antenna

Patrick wants you to repair his laptop LCD screen. Patrick insists that it was not his fault, but sometime during the night, the laptop fell off his desk, and now the screen is broken. During disassembly of his laptop, you see a mini-PCIe card with a black cable and a white cable connected that appear to go into the screen bezel. What is the function of the two wires?

Yesterday you installed a new game on your computer. When you ran the computer, you noticed that the application was running very slow. After you exited the game and restarted it, you received an error message saying, "Insufficient memory or disk space." You checked your hard drive and saw that you had more than 250GB of free space. What should you check next in Task Manager?

Performance tab - Memory available

You go to work after a long weekend and try to turn on your computer. When you push the button on the desktop, the system does not start to boot. The monitor turns on and displays a message saying that there's no signal. ​ What is a possible problem with your computer?

Power cord is unplugged.

What is the second step in opening the case of a working computer?

Power down the system and unplug it

When Amy turns on her computer, she notices a burning smell. Smoke comes out of the case, and Amy immediately turns off her computer. ​ What might be causing Amy's computer to emit smoke and a burning smell?

Power problem

What two devices in a computer should be considered "black boxes," and should never be opened due to risks involving charged capacitors?

Power supply Monitor

#Start

Powershell comment

Thomas came into work this morning and turned on his computer and nothing happened. He immediately called the help desk, and you were sent to fix his computer. While talking with Thomas about his computer, you find out that when he turns on the computer, he has lights and fans, but nothing else happens. He also tells you that nobody else has done anything with his computer. Nothing has been added or changed, since it worked the day before. You decide to try to re-create the problem, and when you turn on the computer, there are lights and fans, but no beeps and no video. You notice that the keyboard light does not come on. ​ What can you determine about the problem with Thomas's computer? (Select all that apply.)

Processor has gone bad or is not seated properly. Motherboard has failed.

What is the set of rules and standards that any two entities use for communication?

Protocol

Lin is booting up his computer, and during the boot process, the computer powers down. After several unsuccessful attempts to boot his computer, he decides that he needs to start the troubleshooting process. Lin thinks that the problem could be in the power supply, so he uses a power supply tester. The test shows that the power supply is functioning properly. What should Lin check next in the troubleshooting process?

RAM

George is involved with a project at work and notices that he has a pending update for his computer. George knows that updates are important, and he decides to take a break and complete the restart of the computer so that the update can install. After George restarts the computer, he notices that his AutoCAD program is running slowly. The issue continues to the point that George decides to call the technician and ask him to check what is going wrong on his computer. The technician tells George to turn the computer off and then on again and asks George how much RAM is counted. The amount of RAM is 8GB less than the amount that was installed on George's system. What hardware could be causing this problem? (Select all that apply.)

RAM Motherboard

You notice that your computer is running slow and decide to reboot the computer to see if that will fix the problem. During the reboot, you notice that the amount of RAM shown during the RAM count is not the same as it was the day before. ​ What might cause this problem?

RAM module has become unseated.

A Windows user contacted the help desk with a problem that requires the technician to connect to the remote computer using Remote Assistance to view a very detailed and cryptic error message on the user's desktop. Each attempt the technician makes to connect to the remote computer results in a message stating the connection was refused. Which of the following protocol and port number combinations should be opened on the remote computer's firewall to allow this connection?

RDP, port 3389

What is the connector called on a network cable that connects to an Ethernet port?

RJ-45

Sara is having a tough time finding the cause of a problem on a computer she is troubleshooting. She found a possible problem but is not sure if she is correct. In case she is wrong, Sara does not want to test her theory, because doing so might worsen the problem. ​ What would you advise Sara to do?

Research the problem on the Internet.

What is a snapshot of the system settings and configuration called?

Restore point

A customer called Derek to complain that her computer was running slow, so he went to the client work area and started troubleshooting the problem. Derek ran the Disk Defragmenter and Disk Clean-up utilities. He checked the processes running in Task Manger. Derek found that the CPU was running several processes. While Derek was looking at Task Manager, the computer crashed. Derek restarted the computer and noticed a long load time for Windows. Derek checked Task Manager and saw several processes that he did not recognize. What should Derek perform next on the client's computer?

Run a virus scan.

Larry has participated in a change proposal for his company. During the planning stage, Larry was told that his role in the change would be small but important. In the implementation stage, Larry completed his task according to the stipulations and timeframe of the plan. However, Larry was called in five times during the change to help others complete the change process. ​ Where in the change management process did the problem occur?

Scope of plan

What component of UEFI helps to prevent malware from hijacking a system during or before the operating system load?

Secure Boot

A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The coworker recalls there is a setting in the Internet Options dialog box to prompt the user before downloading ActiveX controls, but can't remember which tab to use. Which of the following tabs will you suggest to the coworker?

Security tab

The users in the sales department need a central location on the network to share data files. All the client computers in the organization are running Windows 10 and have network and Internet connectivity. The file server that hosts the network drive for the sales department is running Windows Server 2016. Which of the following is the first step in implementing this data share?

Share the folder or volume on the file server that will store the shared data files.

Molex connector

Sharon is troubleshooting a computer and wants to test the hard drive in another computer. Sharon removes the hard drive and notices that it does not have a SATA power connection. The connector for power is white and has four pins instead. What type of connector will Sharon need to test the hard drive in the computer she is using?

Holly is trying to use Windows Defender to run an antivirus scan. Windows Defender refuses to run. She notices a problem when she tries to update Windows Defender and it fails. When Holly opens the Action Center she sees a fake antivirus screen. What has happened to Holly's computer?

She has downloaded a rogue antivirus.

Digitizer

Sherri has recently been injured. She is having a problem using her left hand and would like to use a stylus to move her mouse around the screen on her laptop computer. What device can Sherri add to her system to allow a non-touch screen laptop to use a stylus to manipulate the screen?

OLED

Shivam has a broken laptop screen and needs to replace the screen. While doing research to find a new screen, he discovers that the laptop screen he is replacing does not have a backlight. ​ What kind of screen does Shivam need to order for his laptop?

simplex

Signals that can travel in only one direction on a medium are referred to as what type of signal?

What types of physical drives does Windows disable defragmenting, but provides another method of optimization?

Solid-state drives

Dead pixel.

Stephen has an older monitor that he uses for presentations. Recently, Stephen has noticed that a spot on the monitor that does not change when he shows his presentations. The spot does not display the colors and stays dark when the screen is white.

Dead pixel.

Stephen has an older monitor that he uses for presentations. Recently, Stephen has noticed that a spot on the monitor that does not change when he shows his presentations. The spot does not display the colors and stays dark when the screen is white. ​ What might be the problem with Stephen's video issue?

What should you do if you want to be able to locate your laptop in the event of loss or theft and give it a command through the Internet to lock it or delete data?

Subscribe to LoJack for Laptops

Which of the following are natively supported by the Windows, Mac, and Linux operating systems?

Support for reading and writing to FAT32 partitions

Restore points are created at regular intervals and just before you install software or hardware by what utility?

System Protection

A user wants to make sure he can quickly restore his computer after a drive failure to the state it was in when Windows and all its apps were initially installed. Which backup type will be most useful in this scenario?

System image backup

You are troubleshooting a computer that your client said turns off during normal operation. While you are trying to identify the problem, the client also informs you that if he waits a while, the computer will turn back on and run normally for a bit. You open the system and immediately notice a large dust buildup around the processor fan and heat sink. What problem can you detect on the computer and confidently report to your client?

System is overheating.

Scott has just completed installing Windows 8.1 and needs to install several applications on the computer before returning it to his client. What should Scott check prior to installing the applications? (Select all that apply.)

System requirements Hard drive space

Wanda wants to find some basic information about her computer, for example, what operating system and how much RAM are installed on her computer. Where can Wanda find this information quickly in Windows 10?

System window

Currently James's company is using RADIUS for AAA services to connect wireless users to the Windows Active Directory domain. However, the company wants to upgrade to a Cisco-based wireless network and would like to upgrade the older RADIUS. ​ What will James recommend as an upgrade to RADIUS?

TACACS+

Which of the following is a hardware component used to hold the BitLocker encryption key and ensures encrypted data is not accessed in the event a hard drive is lost or stolen?

TPM

What must your motherboard have to use BitLocker Encryption in Windows 7/8/10 which will ensure that your hard drive cannot be used in another computer?

TPM chip

Sara works in the IT department for a large retail store. She has been testing a theory about why an error message keeps popping up on a coworker's computer when he tries to start Windows. She has hit a wall and doesn't know where to look next. Sara feels very frustrated with the problem. What should Sara do to help work out the solution?

Take a break and come back later.

Manuel is working on a project in Visual Studio. He wants to keep this program showing on the entire desktop, but he also needs to have several other applications open so that he can research the project. ​ What feature in Windows 10 will allow Manuel to view Visual Studio on the full desktop and have other applications open at the same time?

Task View

registered jack 11 (RJ-11)

Telephone connections follow what registered jack standard?

SATA cable connection

Terry came into work and turned on his computer. During the boot process, the computer shut down. When he tried again, the computer showed the error message, OS not found. Terry called the help desk and explained the computer issue. The help desk technician asked Terry to open the computer. As a help desk technician, what would you have Terry check on his computer with the case cover removed?

Computer's resolution has been set too low.

Terry is having a problem with his computer screen. He said the screen looks distorted. When you go to check his monitor, you notice that the icons on the desktop appear to be tall and skinny. What is the common cause of this problem?

Over the past week, every time Larry has started his computer, he has noticed that the time is not correct. Larry didn't consider this a problem because his computer was working properly. However, now Larry has decided that he should investigate why the time is not accurate. ​ What can you tell Larry to check to find out why the clock does not keep the right time?

The CMOS battery is bad and needs to be replaced.

Which statement is NOT true regarding Coffee Lake chipsets?

The Coffee Lake LGA1151 socket is backwards compatible with earlier generation processors.

A technician, who was signed in to a Windows 10 computer as local administrator, accessed the Local Security Policy console and changed the Lock Screen timeout from 10 minutes to 60 minutes. After the technician completed the change, the user signed in to AD and discovered that the setting had reverted to 10 minutes. What can the technician do to keep the setting from reverting from 60 minutes to 10 minutes?

The Lock Screen timeout setting needs to be made in the AD OU GPO.

False

The ST and SC fiber connectors are the most commonly found connectors due to their smaller sizes.

The cable run connecting the new keystone jack to the patch panel is bad. The patch panel connector for the new location's cable run is not connected to a switch.

The accounting department moved its network-attached printer from one side of the office to a more centralized location, making the printer much more accessible to all accounting users. Since the move, the users have not been able to print to the printer. The printer powers on and shows it is ready to accept print jobs. The printer configuration page shows the following output. You disconnect the patch cable from the keystone jack at the new location and move the printer and cable to reconnect it at the original location. The printer begins printing the jobs that failed to print earlier. Which of the following are the most likely reasons for the printer failing to print at the new location? (Select TWO.)

The battery is going bad.

The back cover of a mobile device is warmer than usual, and the battery seems to lose its charge much quicker than normal. The user has scanned for malware, closed unused apps, and decreased the brightness level of the screen, but the symptoms persist. Which of the following is the most likely cause for this behavior?

What has occurred if you see the message, "Chassis Intruded! System has halted." the next time you start your computer?

The case has been opened

Danielle, a help desk technician, receives a call from a client. In a panic, he explains that he was using the Internet to research a new product when his computer emitted an alarm accompanied by a warning that a site had blocked his computer and that information was being stolen from the computer. The message included a phone number and a note to call the number within five minutes so that engineers could walk him through the removal process. ​ What has happened to the customer computer?

The client received a fake security alert.

A technician is logged in to a Linux system with a user account that has been assigned root privileges. Each time the technician attempts to run a specific terminal command, a "Permission denied" message is displayed. What is the most likely reason for this message?

The command needs to be preceded by sudo.

Change default user name and password.

The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless network is secure and that no unauthorized person can gain access to the network. What is the first step Derek should perform to secure the wireless router?

Nick is working on a computer at a customer's house. The customer is concerned that her computer has a problem because recently the Internet home page changed, and when she tried to search the Internet, a strange search engine appeared. ​ What has happened to the customer's computer?

The computer is infected with a redirect virus.

A user is attempting to format a 4 TB HDD using NTFS but only has the option to format the disk with a size of approximately 2 TB. What is the most likely reason the user is unable to format the disk to its full capacity?

The disk is using the MBR partitioning scheme.

A Windows 10 user is copying a file from the C:\data folder to the E:\data folder. The C: drive is formatted with NTFS, and the D: drive is formatted with FAT32. What happens to the permissions of the file on the D:\ drive when copied?

The file will lose all permissions.

A technician has determined that a laptop keyboard will need to be removed in order to replace the laptop's CPU cooling fan. Which of the following steps will most likely be required before the technician can remove the keyboard from the laptop? (Select TWO.)

The keyboard bezel will need to be removed. The keyboard cable(s) will need to be disconnected from the ZIF socket(s).

A technician has determined that a laptop keyboard will need to be removed in order to replace the laptop's CPU cooling fan. Which of the following steps will most likely be required before the technician can remove the keyboard from the laptop? (Select TWO.)

The keyboard cable(s) will need to be disconnected from the ZIF socket(s). The keyboard bezel will need to be removed.

FE80::feba:123:8:9343 169.254.1.1

The network icon in the notification area of a Windows 7 machine is displaying a yellow triangle with a black exclamation point indicating limited connectivity. Checking the computer's network connection properties will most likely indicate which of the following single-assigned host IP addresses? (Select TWO.)

While performing disk and file maintenance on the company file server, you determine a user in the accounting department has been accidentally saving documents to all shared folders on the file server. The user's computer was recently passed to her from another user in the company, and according to company policy, the user should have access only to the accounting share. Which of the following best describes this situation?

The principle of least privilege was not followed.

Print a test print from the printer's console.

The receptionist's directly connected laser printer is printing blank sheets. The technician assigned to the trouble ticket has replaced the toner. However, blank pages continue to print from the receptionist's PC. Which of the following steps should be performed next?

A technician wants to limit access to a group of folders and is using Group Policy to prevent the users in the sales department from accessing folders assigned to the accounting department. The technician is having difficulty achieving acceptable results. Which of the following is the most likely reason the technician is having difficulties?

The technician should be setting NTFS permissions instead of using Group Policy.

A Windows user called the help desk to request that her local user account password be reset on her computer. The help desk technician connected to the computer using RDC and reset the password using the Network Places Wizard. After the password was reset, the user lost access to all the data files on the local HDD. Which of the following describes the most likely reason for the lost data files?

The user had previously encrypted her data files and folders using EFS

Mini PCIe

The video on your laptop needs to be updated. You have researched online, and according to the manufacturer, you can install a new video card in your laptop. What is the most likely slot connection you will use to install a new video card in your laptop?

Gina is upgrading your computer with a new processor. She installs the processor into your motherboard and adds the cooling system. She powers up the computer, and it begins to boot but then shuts down. What could be the cause of this problem?

Thermal paste was not used.

SCSI

Tim has an old server computer that his company uses as a backup. One of the hard drives has gone bad and needs to be replaced. The cable that the hard drive uses is not one that Tim has ever seen before, so he posts a picture of it on the company collaboration board to get help in deciding what type of hard drive he will need to order. Identify the type of cable from the picture.

A technician would like to have the ability to add physical hard drives to a Storage Spaces storage pool at future times on an as-needed basis. Which of the following Storage Spaces features describes this functionality without the need to also reconfigure the available space to users?

Thin provisioning

If a storage pool is configured as if it has more virtual storage than the physical drives actually offer, what feature is being used?

Thin provisioning

GPU on video card overheating.

This is a picture of a monitor that has a horizontally torn image. What is the most common cause of a monitor showing horizontally torn images on the screen?

Magnetic hard drive failed

This morning when Paul turned on his computer at work, it would not boot. Instead, Paul reported that he heard a loud clicking noise coming from inside his computer. What might be the problem with Paul's computer?

Monitor backlighting.

Today when Dylan turned on his computer, he noticed that the monitor was very dim. He could still see the desktop icon and text. He turned the brightness all the way up, but that did not correct the issue. Dylan also checked to make sure the Power Options brightness was not turned down, causing the screen to go dim. He connected a different monitor, and the screen was fine. What caused the screen to be very dim?

Henry is sent to work with a customer at the company's satellite branch in another town. During his visit, he notices that most of the computer users are not following the corporate guidelines on password safety and are looking at their personal emails, which is not allowed for security reasons. What can Henry do about these corporate policy issues?

Train the employees on why these issues are security concerns.

John is trying to find everything on his computer associated with a new application that he downloaded. Is it true or false that when using the search box in Windows 10, you can search for an app or a file or search for its name on the web?

True

Lane is very nervous about going to visit the person on his help desk ticket. There are several notes from senior technicians about the client, and most of the notes are about how difficult she is to deal with. ​ What advice can you give Lane for dealing with this difficult client? (Select all that apply.)

Try not to argue with her or be defensive. Don't dismiss what she says the problem might be. When talking with her, use clarifying statements to show her you understand the problem.

WPA2

Typically uses AES for encryption.

WPA

V

Which products are considered to be hypervisors?

VMware Player Virtual PC Client Hyper-V VirtualBox

What is it called when software is used to simulate the hardware of a physical computer?

Virtual machine

What is it called when a partition is formatted with a file system and assigned a drive letter?

Volume

James added a new video card and needs to get a power supply that will have enough power to run the new card. When researching the new power supply, what feature does James need to look for to make sure he has enough power to run his computer with the new video card?

Wattage

Your customer wants to build a new computer and needs to make sure he orders the correct power supply for his machine. What should you tell him to check to make sure he orders the correct power supply? (Select all that apply.)

Wattage requirements Form factor Number of hard drives Video requirements

RJ-45

What connector is shown in the exhibit?

WAN, MAN, LAN, PAN

What is the correct order of network types when categorized by their size or the physical area they cover, from largest to smallest?

8 degrees

What is the industry standard angle for an Angle Polished Connector (APC)?

Reduce crosstalk between wire pairs.

What is the purpose for the twists in twisted pair Ethernet cabling?

multimeter

What kind of tool can you use to measure voltage on a cable length?

Static Dynamic

What methods are used to assign TCP/IP parameters to network hosts? (Select TWO.)

Accelerometer

What smartphone feature allows a user to turn her phone to change from portrait view to landscape view when she is watching a video?

A customer modem is continuously losing signal due to large distance from the transmitting device.

What statement describes a transmission flaw that is occurring due to attenuation?

Power over Ethernet requires CAT6 or better copper cable.

What statement regarding the Power Over Ethernet standards is inaccurate?

Thin client

What type of computer is recommended when you want to allow the server to do most of the computing but would like to connect to the server via a browser?

Is the monitor plugged in properly?

When Ron turns on his computer, he hears one beep. However, there is no image on the screen. The monitor indicator is not on. What should Ron consider first when he troubleshoots this video issue?

When is it okay to touch the inside of a computer that is turned on?

When using a multimeter to measure voltage output

white/orange, orange, white/green, blue, white/blue, green, white/brown, brown

When viewing the pinout for T568B, what is the correct order of wire colors, starting at pin 1?

Meet requirements for the OS.

When you are ordering a standard thick client computer for a normal business user, what should you check before ordering the computer?

The battery indicator light is on, even though your laptop is plugged into an AC adaptor. ​ To determine why you are not getting power from the AC adapter, which of the following should you check? (Select all that apply.)

Whether the AC adapter is connected properly to the laptop. Whether the AC adapter is plugged into a live electrical outlet. Whether the DC jack is loose.

The battery indicator light is on, even though your laptop is plugged into an AC adaptor. ​ To determine why you are not getting power from the AC adapter, which of the following should you check? (Select all that apply.)

Whether the DC jack is loose. Whether the AC adapter is connected properly to the laptop. Whether the AC adapter is plugged into a live electrical outlet.

802.11n 802.11ac

Which of the following 802.11 wireless networking standards support transfer rates of over 54 Mbps? (Select TWO.)

Port 443 SSH

Which of the following are secure protocols, ports, services, or applications? (Select TWO.)

SSH Port 443

Which of the following are secure protocols, ports, services, or applications? (Select TWO.)

10.20.30.40 172.29.29.254

Which of the following are valid IPv4 private IP addresses? (Select TWO.)

172.29.29.254 10.20.30.40

Which of the following are valid IPv4 private IP addresses? (Select TWO.)

Measured service

Which of the following aspects of cloud computing allows a service provider to limit a customer's use of a particular resource based on a service agreement between the provider and the customer?

SaaS

Which of the following can provide a user with a cloud-based application that is integrated with a cloud-based virtual storage service and can be accessed through a web browser?

An intermittent or unavailable Internet connection.

Which of the following could be a major concern for implementing cloud computing for business-critical services?

Emulator

Which of the following creates an environment that behaves in a hardware-like manner to run software meant for other hardware?

A private unicast address used for limited communication with neighboring nodes in the same link.

Which of the following describes an IPv6 link -local address assigned to a node on a network?

Cable modem DSL modem

Which of the following devices are most commonly used to connect a LAN to an ISP for broadband services? (Select TWO.)

FEFE::2:0:0:1

Which of the following indicates the most concise abbreviation of the IPv6 address FEFE:0000:0000:0000:0002:0000:0000:0001?

Resource pooling

Which of the following is a cloud computing element that gives a service provider the ability to dynamically allocate shared physical resources to multiple customers based on each customer's usage demand?

In the event a DHCP server is unavailable, the workstation will have a valid IP address on the subnet.

Which of the following is a scenario in which an IT support technician would most likely be required to implement the alternate IP configuration method on a network host?

3G

Which of the following is a wireless Internet connectivity method that utilizes cellular technology?

Install apps only from trusted sources.

Which of the following is best practice to minimize the chance of infecting your mobile device with malware?

Isolating operating system when running multiple concurrent VMs.

Which of the following is considered a security benefit when utilizing virtualization?

SFP+ is the same size as SFP, and supports a theoretical maximum transmission speed of 16 Gbps.

Which of the following statements correctly describes the SFP+ transceiver?

Data transmission over limit

Which of the following symptoms is most likely related to leaked personal files/data on a mobile device?

DSL

Which of the following will use an RJ-11 connector for connectivity?

Fourth-generation cellular

Which of the following wireless networking protocols uses LTE technology with a maximum speed of up to 1 Gbps? ​

ipconfig /all

While assisting a Windows user over the phone, you need to determine the IP address for the DHCP server along with the MAC address of the Ethernet NIC. The user has successfully opened a command prompt. What command will you have the user type at the command line to determine these two addresses?

Escalate the problem to a server administrator to check for issues with the server.

While investigating an email issue, a support technician discovers no users can access their email accounts on the company's email server connected to the private LAN. Pinging the email server from several workstations on the LAN results in 0% packet loss. Which of the following is the next step the technician should take in troubleshooting this issue?

Motherboard SATA port has gone bad

While working on your computer, you receive the POST error, "Drive Not Recognized." You check your SATA cable to see if it is the problem, and it tests fine. You remove the hard drive and test it in a computer system known to be in good working condition and find that the hard drive is working. You can move data and check to make sure the OS files are not corrupt. You use a power supply tester to see if the voltage for the SATA power connection is correct, and the test shows the power is correct. You even check BIOS to make sure the hard drive can be recognized and find that all settings in BIOS are at default, so the system should recognize the hard drive. ​ What might be the problem with your hard drive system?

When populating a motherboard with DIMM modules, what configuration option will and will not work?

Will work - Matched capacity with manufacturing. Won't work - Mixing Parity and non-parity ram, un-buffered and buffered.

Andrew is researching a new operating system for the computers at his workplace. His boss wants the computers to be able to connect to the cloud and thus have security in case the laptops are stolen. What version of Windows 8.1 does not have the ability to lock the hard drive so that it is unusable if removed from a laptop?

Window 8.1 Core

Larry wants to upgrade to Windows 10. He will use his computer both at home and at work and will need to connect to his company's Wi-Fi network to share files over the network. Which version of Windows 10 would you recommend to Larry?

Windows 10 Home

What version of Windows 10 is a valid, in-place upgrade path for a computer that has Windows 7 Starter edition on it?

Windows 10 Home

Which of the following are closed source, proprietary operating systems? (Select TWO.)

Windows 10 Home Mac OS X High Sierra

A Windows 10 Home user is attempting to encrypt the contents of a folder on a volume formatted with NTFS. The user contacted you to ask why the option to encrypt the folder is disabled. What is the most likely reason the encryption option is disabled?

Windows Home editions do not support EFS.

William's supervisor wants to create a test lab at the company in order to test Windows 10 updates. He has instructed William to create a virtual lab. William decides to use Hyper-V as the hypervisor for the virtual machines. When William tries to use Hyper-V, he realizes that it is not installed. What will William use to install Hyper-V in Windows 10?

Windows features

If a clean install is performed on a hard drive with a previous install of Windows and the drive is not re-formatted during the install, where will the files from the old installation be?

Windows.old

What is the value of X and what is the condition of the Do...Loop when execution ends in the following pseudo code? X = 1 Do ' This is a comment Print X; Loop

X = 1, the Do...Loop is endless.

Hybrid processors that can process 32 bits or 64 bits are known by what term?

X86-64

Hard drive has crashed

You and a friend decide to watch a movie on your computer. The movie is saved on a second hard drive on your system. When you are ready to watch the movie, you can't find it on your computer. You try to locate the second hard drive, and it is no longer listed in Windows. What might be the problem with the movie and the hard drive?

You are having difficulty changing permissions for a folder on an NTFS volume that was created by another user. How can you best solve this issue without losing data in the folder?

You are having difficulty changing permissions for a folder on an NTFS volume that was created by another user. How can you best solve this issue without losing data in the folder?

Motherboard manual

You are installing a new hard drive in a system in which the hard drive will run at 6.0Gbps. ​ What can you use to determine whether the SATA port no which you are connecting the drive will also run at 6.0Gbps?

WI-FI antenna Microphone

You are installing a webcam in the screen bezel of your laptop. Prior to disassembling the laptop, what other devices in the screen bezel should you be aware of? (Select all that apply.)

STP

You are installing network cabling and require a cable solution that provides the best resistance to EMI. Which of the following will you choose for this installation?

The mobile device is on a different Wi-Fi network than the TV.

You are preparing to give a presentation at a client's location using your mobile device and a large screen TV. You have successfully connected to the company's guest Wi-Fi network, and you tap the screen mirroring option on your device but cannot locate an available TV, monitor, or projector. The previous presenter finished her presentation a few minutes earlier and had no issues using the TV. Which of the following is the most likely reason for this behavior?

DNS

You are setting up your Windows computer to connect to the Internet and notice that when you type www.microsoft.com, the browser does not go to the site. Instead, you receive an error message saying that the address cannot be resolved. What network setting should you check to see the address of the server being used to resolve this address?

WPA2-PSK, AES

You are tasked with configuring a wireless SOHO router for a customer. Which of the following settings will be the most secure with the least effort and cost to the customer?

Implement a UTM appliance.

You are tasked with securing a small network for a client in which the following requirements must be met: • If a user on the private network attempts to send confidential company information to an unauthorized entity, an alert should be triggered. • The private trusted network should not be accessible from the public untrusted network. • If attacks are coming from the external network, the system should detect and prevent malicious activity. • All incoming and outgoing email should be scanned for malware. Which of the following would best meet the requirements of the client?

tracert 1.2.3.4

You are troubleshooting a Windows workstation that is having problems communicating with the host at IP address 1.2.3.4. What utility will you use at the command line to determine where the communication is stopping?

Orange/white, orange, green/white, blue, blue/white, green, brown/white, brown

You are using a crimper to attach an RJ-45 connector to a Cat 6 UTP cable. Your company requires that all cabling follow the TIA/EIA 568B standard. Which wire color code will you use starting with pin 1 of the modular plug?

Resolution

You are using a new LCD monitor and notice that the icons and images look distorted or elongated. ​ What video setting can you use to fix this problem?

Remote printing

You connected a printer directly to the network using the printer's integrated NIC. The printer was configured with an IP address for users on the local subnet to utilize. Which of the following best describes the printing method used by this printer?

Barcode reader

You have been asked to assist a retail company. It sells clothing and would like to have a Point of Sale computer installed to help with inventory control and to allow customers to check out faster. ​ What peripheral will you recommend to them to help them keep track of inventory and check customers out faster?

Demilitarized zone

You have been tasked with configuring a SOHO network in which all ports on the public untrusted network will be forwarded to one workstation connected to the LAN. Which of the following features will you configure on the SOHO router to accomplish this task?

No filters are required

You have connected a cable Internet connection as shown in the exhibit. ​ At what location should you place a filter?

The company WAP has SSID broadcast disabled.

You received a call from a user who brought her own device to the office but cannot find or connect to the company WLAN. The laptop shows other available wireless networks in the building. This user and the other users in her department are connected to the company WLAN and can browse to multiple websites with no problems from their company-assigned laptops. Which of the following is the most likely reason the user cannot find the company WLAN from her own device?

Expansion card failed or became unseated

You recently installed a new RAID controller card in a PCIe expansion slot on your computer. After setting up the controller, you transfer data from the backup you created over to the computer. When you finish the setup, you turn the computer off and return it to its normal location. When you turn the computer on, you immediately receive the error message, "RAID not found." What might be the problem?

The laptop's wireless radio is toggled to the off position.

You replaced the LCD panel in a laptop computer and verified full system functionality, including wireless connectivity. The customer picked up the laptop and now reports he can no longer access his wireless network regardless of how close the computer is positioned to the WAP. Other users can connect to the WAP without any problem. Which of the following is the most likely reason for this problem?

CIFS

You require a protocol in order for your Windows network hosts to have access to shared files and folders. Which of the following protocols will provide the necessary file services? (Select TWO.)

What is the very first step that should be taken when performing work with a computer?

You should back up any important data.

When handling a motherboard, cards, or drive, which statement is NOT accurate?

You should not hold expansion cards by the edges.

Authenticator apps

You want a method of authentication for company-owned mobile devices in which users are required to use two-step authentication. Which of the following will best assist you in meeting this requirement?

Download and install Bonjour Print Services.

You were hired by a design firm that uses Mac equipment exclusively. You prefer to use your Windows laptop and would like to print to the printers that are already in use. When you open the list of shared printers, nothing is shown. Which of the following will allow you to discover and print to the network printers from your Windows device?

local connector (LC)

You've been handed a fiber with a 1.25-mm ferrule that requires a connector. What is the most commonly used connector for this ferrule size?

Implement an endpoint management server appliance.

Your company is experiencing an increase in malware incidents. Your manager is asking for advice on how best to verify that company-owned workstations are up-to-date with security patches, anti-malware requirements, and software application updates. The manager is also concerned that employee-owned devices connecting to the corporate LAN have the same level of security as the company devices. Which of the following protections and services should you recommend?

AES

Your company is implementing a wireless network and is concerned that someone from a competing company could stand outside the building and collect wireless data. You have assured the company that WPA2 is secure. What makes WPA2 more secure than WPA?

EoP

Your company received a call from a historical society inquiring about the possibility of networking a two-century-old building with no existing network. In 1924, someone added electrical outlets to the building, but the layout and design of the building prohibits adding any additional copper or fiber cable. You completed a wireless site survey and concluded that wireless networking is out of the question and will not properly function due to environmental interference. Which of the following could be used to network this building?

Enable MAC filtering. Lower radio power levels. Disable SSID broadcasting.

Your company shares a building with a competitor's branch office. Recently, you noticed that some computers other than company computer have tried to connect to the wireless network unsuccessfully. When you are in the parking lot, you also notice that the company's wireless network SSID can be seen on your smartphone. What can you do to make sure no one outside your company can gain access to its wireless network? (Select all that apply.)

Graphics tablet

Your mother likes to draw. She has been scanning her drawings and putting them on her computer but would like a way to draw and edit the pictures on the computer. What peripheral type would you recommend for your mother?

What type of socket ensures that even force is applied when it is being installed in the socket?

ZIF

All wireless technologies are turned off resulting in no transmission or reception of wireless signals

airplane mode

In order to ensure drive health, what command should you use to search for a repair file system error?

chkdsk

A technician is logged in to a Linux computer as johnd and needs to reset group ownership for the file report.txt in the johnd home directory. Which of the following commands will perform this function?

chown

Performs most of the processing for data and instructions for the entire system

cpu (central processing unit)

What command should you use to rearrange parts of files on the drive so they are contiguous?

defrag

A Windows 10 user wants to display all the files in all the subdirectories on the E: drive with the file extension of doc. ​ What command would perform this function?

dir e:\*.doc /s

Which of the following is the current Linux file system used to hold the operating system?

ext4

1424

integer

9

integer

A technician wants to use a Time Machine backup to install a new copy of the macOS onto a Mac. Which of the following tools will the technician use to perform this task?

macOS Recovery

The smaller form factor of the ATX. Its smaller size and reduced expansion ports helps reduce costs and power consumption

micro atx

When you build a computer from parts, you usually start by deciding on which two parts listed below?

motherboard processor

A user is complaining about sluggish performance on her Linux system, and the technician suspects a running process is consuming excessive processor resources. Which of the following commands will the technician most likely use to locate the offending process?

ps

Which of the following Windows commands will delete the files and directories at the destination location that no longer exist at the source location?

robocopy /purge

"Press any key"

string

"sample text"

string

What two different passwords can be set to lock down a computer from unauthorized access?

supervisor password user password

Which of the following best meets the requirements of a strong password?

t*M&2.zY7

$X

variable

%TEMP%

windows environment variable

Hybrid processors that can process 32 bits or 64 bits are known by what term?

x86-64


Set pelajaran terkait

Translation and Post Translational Modification

View Set

Ch.18 Michigan Laws and Rules Pertinent to Insurance

View Set

Chapter 43: Management of Patients With Musculoskeletal Trauma

View Set

Chapter 39: Oxygenation and Perfusion

View Set