902 Practice Questions

Ace your homework & exams now with Quizwiz!

A PC uses RAID 1. Ann; a technician; has read in the event log that the drive "SATA 1" is no longer in sync with drive "SATA 0". Which of the following steps should she try FIRST to repair this PC to optimal running conditions? A. Remove SATA 1 from the RAID group then try to re-add it B. Replace both drives then restore from a backup C. Remove both drives then switch the SATA channels D. Replace SATA 1; rebuild the RAID and replace SATA 0

A

A bank is upgrading some clerical users' PCs. Which of the following would be the MOST appropriate method for erasing the data on the old PCs? A. Drive degauss B. Standard format C. Change the jumpers on the hard drive D. Quick format

A

A client has asked a technician about drive sanitation and wants to know what the difference is between overwriting a drive and formatting a drive. Which of the following would be the BEST response from the technician? A. "Overwriting writes 1s and 0s to a hard drive replacing the data; while formatting only clears the reference to the data and only overwrites as space is used." B. "Nothing is different. They both destroy the data so no one can recover it." C. "Overwriting writes 1s and 0s to the drive replacing only the user's data but not the OS data; while formatting destroys the hard drive." D. "Overwriting replaces all the data with a single file that fills the hard drive destroying the data; while formatting erases all the data."

A

A company has decided that all remote users need to use two-factor authentication to increase security. Several remote users have reported losing the RSA token and have replaced it several times. Which of the following is the solution for these users? A. Use biometrics instead of the RSA token. B. Remove the RSA token requirement for any user that has lost an RSA token. C. Give the users with lost RSA tokens RFID badges instead. D. Attach the RSA token to the lid of the laptop.

A

A company would like to prevent commonly known social engineering risks. Which of the following would help mitigate these risks? A. Annual security training B. Install new switches C. Review security policies D. Require 180 day password expiration

A

A customer reports that their wireless laptop cannot connect after removing it from its carrying case. The laptop boots and the user is able to log in. Which of the following should be checked FIRST? A. External antenna switch B. Status in Device Manager C. Available hard drive space D. Laptop battery levels

A

A small business owner wants to prevent employees from disconnecting company computers from the network jacks and connecting their personal computers. Which of the following must a technician implement to ensure only company authorized computers will be given access when connected to the office network jacks? A. MAC filtering B. Disable unused ports C. Static IP addresses D. Use computer cable locks

A

A technician has finished replacing the network card in a laptop and has verified full system functionality. Which of the following troubleshooting steps should the technician take NEXT? A. Document findings; actions; and outcomes B. Escalate problem to a senior technician C. Re-establish new theory of probable cause D. Perform a full system backup

A

A technician is creating a batch script that auto-assigns a particular drive share to a drive letter upon login. Which of the following commands can accomplish this? A. NET USE B. PING C. XCOPY D. IPCONFIG

A

A technician is diagnosing a PC running Windows 7 which has been affected with an "NTLDR is missing" error message. Which of the following command line tools would BEST resolve the problem? A. Fixboot B. CHKDSK C. Scandisk D. DEFRAG

A

A technician is dispatched to repair a computer that appears to boot correctly; except no video output is being displayed. No beep codes are given by the computer; but drive activity lights and keyboard lights work correctly. The technician decides that the video card may be defective and removes it from the computer; expecting the computer's POST process to provide beep codes with the card removed. Instead the computer boots properly. Which of the following is MOST likely the cause? A. Onboard video is present B. The onboard speaker is defective C. The monitor is defective D. The RAM should be reseated

A

A technician is setting up automatic login to desktop for a non-domain Windows XP system. Which of the following administrative tools would accomplish this? A. User Accounts B. Network and Sharing Center C. Task Manager D. System Configuration

A

A technician is troubleshooting a RAID 6 array on a high end CAD/CAM workstation. Two disk drives have their fault lights on. Which of the following is the BEST action for the technician to perform when fixing this problem? A. Replace the failed drives and verify the RAID rebuilds completely. B. Reseat the drives; backup the data; and then replace them. C. Reseat the drives and monitor the RAID status over a few days. D. Replace the failed drives and restore the data from a known good backup.

A

A technician is trying to setup a non-domain user account on a workstation; but receives the following error message "Password does not meet the complexity requirements." Which of the following utilities should the technician use to identify the criteria? A. Local Security Policy B. Users and Groups C. Performance Monitor D. MSCONFIG

A

A technician must add a line into HKLM. Which of the following tools would BEST enable this ability? A. REGEDIT B. MSCONFIG C. RD D. REGSRV32

A

A technician wants to create a new logical volume on a machine. Which of the following Windows 7 utilities will allow a technician to perform this action? A. DISKPART B. FORMAT C. CHKDSK D. FDISK

A

A technician would like to image 50 desktop computers from a recently optimized test machine. Which of the following would ready the test machine for capturing the image? A. SYSPREP B. FDISK C. XCOPY D. RIS

A

A user gets an error message that the trust relationship to the domain has been broken. Which of the following can be done to resolve this from the client desktop? A. Re-join the computer to the domain B. Reboot the PC as the domain will automatically rebuild the relationship C. Update the BIOS using the latest version D. Run CHKDSK

A

A user has not received any new emails on their smartphone in the last two days. The user is able to access the Internet without any problems. Which of the following should the user do FIRST? A. Restart the smartphone B. Reconfigure the smartphone email account C. Resynchronize the smart phone D. Update the operating system

A

A user has reported their computer boots into Windows install each time they power up their computer. Which of the following is the MOST likely cause of this problem? A. An install disk was left in the multimedia drive. B. The system is booting from the utility partition. C. The system is booting PXE from the server. D. The boot sector needs to be repaired.

A

A user is attempting to use Remote Desktop to connect to a server but is getting an error message. Which of the following tools should be used to verify that the server is powered on and connected to the network? A. PING B. NSLOOKUP C. MSTSC D. SFC

A

A user wishes to access their contacts from their Android phone. Which of the following methods will provide the MOST up-to-date contact information on the user's phone on a daily basis? A. Enable contact synchronization by setting up their email account on the phone. B. Download all their contacts in a .csv file and import them into the phone via a USB laptop connection. C. Enable Bluetooth and transfer the contacts from their laptop to the cell phone. D. Enable email synchronization and email the contacts to the user account for download.

A

A user; Ann; reports that her laptop will no longer connect to wireless. Joe; a technician; checks the device manager and does not see a wireless networking card or any unknown devices. Which of the following should Joe do FIRST? A. Check to make sure the wireless card was not turned off via the hardware switch or keyboard shortcut. B. Install a USB wireless card to ensure that Windows networking is working properly. C. Open the laptop and reseat the network card and both antennas. D. Download and install the latest wireless driver from the manufacturer's website.

A

After connecting a laptop to an external monitor; no display is detected and the monitor goes into sleep mode. Which of the following should be attempted FIRST to correct the problem? (Select TWO). A. Change the input mode on the monitor B. Reboot the operating system C. Reload the display adapter drivers D. Toggle the display using the keyboard shortcut E. Verify network connectivity

A

An administrator has taken steps to secure a SOHO wired network; but as a result the users report that they can no longer access the Internet but can still see other computers on the network. Which of the following would have caused this issue? A. Port 80 has been disabled B. Port 3389 has been enabled C. MAC filtering has been enabled D. LDAP has been disabled

A

An application is unresponsive and causing system instability. Which of the following command line options would only close the application? A. taskkill B. shutdown C. chkdsk D. tasklist

A

Ann reports that printouts from the department laser printer have become faded. She has already replaced the toner cartridge. Which of the following is the MOST likely component causing the faded printing? A. Transfer roller B. Fusing assembly C. Registration assembly D. Duplexing assembly

A

Ann; a home user; brings a PC in for repair and reports that performance has become extremely slow when working on documents and viewing pictures. Which of the following suggestions should a technician make? A. Upgrade to a solid state drive B. Increase the clock speed on the CPU C. Run the file system check tool D. Upgrade to a high performance video card

A

Computers on the network are frequently infected with viruses; malware; worms and Trojans. Which of the following should Mike; a technician; update automatically to prevent future problems? A. Antivirus signatures B. Antivirus engines C. Malware engines D. Virus encyclopedias

A

In iOS; which of the following settings would need to be configured for ActiveSync? A. Mail; Contacts; & Calendars B. Music & Videos C. Phone & Messages D. Notifications & Location Services

A

Joe; a user; copies a text document off of a CD drive into a folder. Joe has full control permissions on the folder. When Joe tries to edit and save the document; the system prompts him to save it to a new location. Which of the following is the reason for this behavior? A. The file properties are set to Read Only B. The CD was damaged and transferred the file incorrectly C. The original file was corrupted D. The file has an incorrect file extension

A

Joe; an employee; has just migrated from the Marketing department to the Accounting department and cannot save files to the Accounting share. He is a member of both the Marketing and Accounting security groups. A technician discovers the following permissions are in effect for the Accounting share; Share permissions Everyone - Full Control NTFS permissions - Accounting - Full Control; Marketing - Deny All. Which of the following should the technician do to enable Joe to save files to the Accounting share without compromising security? A. Remove Joe from the Marketing group B. Ask Joe to resave the file; as the permissions are correct C. Grant the Accounting group Full Control share permissions D. Remove the Deny permission for the Marketing group

A

Laptops and tablets have which of the following in common? A. Solid state drives B. Contain an accelerometer C. No field serviceable parts D. Not upgradable

A

The computer starts up and runs for less than a minute before shutting down or locking up. This is a symptom of A. Overheating. B. Incompatible RAM. C. A faulty hard drive. D. A bad internal USB hub.

A

The support center for a PC manufacturer believes that the hard drive may be having an issue. The support representative asks the technician to find out how many pages per second and what the queue length is for the hard drive. In which of the following utilities should the technician look FIRST for this information? A. Performance Monitor B. Component Services C. Device Manager D. Drive Management

A

Users are reporting that their laser printer is picking up multiple pages. The printer has very high utilization. Which of the following should be performed to resolve this issue? A. Use a maintenance kit B. Calibrate the printer C. Replace the toner D. Replace the fuser

A

Which of the following OS utilities can be used to modify which programs are run at the time of system startup? A. MSCONFIG B. Services C. MSTSC D. Computer Management

A

Which of the following characteristics MOST separates a tablet from a laptop? A. Lack of field serviceable parts B. Lack of any storage medium C. Lack of internal wireless D. Lack of a touchscreen

A

Which of the following is solely designed to avoid detection by an antivirus program by using the underlying operating system to its advantage? A. Rootkit B. Virus C. Trojan D. Worm

A

Which of the following is the correct socket type for a Pentium 4 processor? A. 478 B. 939 C. 1366 D. AM2+

A

Which of the following is the difference between a quick and a full format? A. Quick format does not check for bad sectors while full format does. B. Full format prompts for confirmation while quick format does not. C. Full format erases all partitions on the disk at once while quick format only erases one partition at a time. D. Quick format only erases the system partition and not the data partition.

A

Which of the following locations would a technician use to add a Windows 7 computer to a domain? A. System Properties B. Windows Defender C. Network and Sharing Center D. Device Manager

A

Which of the following resources is MOST important for accessing remote virtual environments on a client machine? A. Network speed B. CPU speed C. High speed memory D. Drive space

A

What are possible symptoms of malware? (Select all that apply.) A. Security alerts B. Windows update failures C. Pre-installation environment D. Renamed system files E. Rogue antivirus F. User error

A B D

A technician is trying to diagnose a laptop that is experiencing heavy artifact corruption and random loss of video during operation. Which of the following are MOST likely causes of this problem? (Select TWO). A. Integrated system video chip is failing and/or near death. B. Video drivers were not installed directly from Microsoft update. C. Incompatible or untested video drivers have been installed. D. The BIOS is not set for the proper operation temperature of the video chipset. E. The BIOS is underclocking the video card's operating speed.

A C

A user has just purchased a wireless router for their home. Which of the following should be done to BEST secure the router from unauthorized access? (Select TWO). A. Change router default logins B. Change the security settings on their computer C. Set encryption on the router D. Update router firmware E. Change the encryption on the computer's wireless adapter

A C

Which of the following would a technician use to install applications onto an iPad? (Select TWO). A. App Store B. Market Place C. iTunes D. Exchange E. Mobile Market

A C

A technician is repairing a workstation that exhibits random reboots at odd times of the day. Which of the following should be performed FIRST when troubleshooting the issue? (Select TWO). A. Check the PSU integrity B. Check the CMOS battery C. Check the video card integrity D. Check the memory integrity E. Check the optical drive integrity

A D

A user reports that their wireless connection is slow. The technician knows that the access point in use is an 802.11g. Which of the following could be the cause of the user's issue? (Select TWO). A. User is too far from an access point B. User is experiencing interference from the refrigerator C. User's PC is slow due to insufficient RAM D. User is using an 802.11b card E. Access point is not powered on

A D

A technician is configuring a PC that will have confidential information stored on it. To ensure that only authorized users can access this PC; which of the following should the technician do? (Select TWO). A. Disable the guest account B. Install antivirus applications C. Disable DHCP D. Change the SSID E. Change the default username

A E

A client has a Windows Vista PC that has several unused programs that run on startup. Which of the following utilities can a technician use to disable these programs from running at startup? A. Default programs B. Performance information and tools C. Performance Monitor D. Device Manager

B

A client has a computer that is infected with several viruses and spyware. Which of the following should the technician perform FIRST before spyware removal? A. Run Windows Update B. Disable system restore C. Run the chkdsk /r command D. Disable network cards

B

A company recently had a security breach and is now required to increase the security on their workstations. A technician has been tasked to harden all the workstations on the network. Which of the following should the technician do? A. Enable Windows automatic updates B. Enable screensaver required passwords C. Enable MAC filtering D. Enable wireless encryption

B

A contractor needs to destroy several drives containing confidential information so that they can never be used again. Which of the following destruction methods would BEST accomplish this task? A. Overwrite the hard drives. B. Drill into the hard drives. C. Degauss the hard drives. D. Sanitize the hard drives.

B

A custom configured PC with a powerful processor; high-end video; upgraded audio; and increased cooling would be MOST suited to which of the following applications? A. Thin client B. Gaming PC C. Virtualization workstation D. Thick client

B

A customer calls and reports that when they walk away from their laptop for an extended period of time they have to reconnect to wireless when they get back. Which of the following will MOST likely correct this issue? A. Disable screensaver B. Adjust power settings C. Replace the wireless card D. Install a higher capacity battery

B

A small business owner is looking to assign users to a Windows group level. They have the following requirements for these users; and stress that they should receive no more privileges than necessary The users should not be able to change passwords for higher level accounts The users need the ability to install software The users cannot create new accounts for others Which of the following group levels will BEST meet these needs? A. Remote Desktop Users B. Power Users C. Standard Users D. Administrators

B

A small business owner is setting up their wireless network in their office; which is in a building shared with several other businesses. The owner does not want to disable the SSID broadcasting due to visiting customers needing to use the network; but does not want other businesses to notice the network; let alone access it. Which of the following would BEST accomplish this? A. Configure the access point encryption from unsecured access to WEP. B. Adjust the radio power so that coverage is restricted to the business. C. Change the SSID to reflect the business name instead of a public access point. D. Enable MAC filtering and restrict access to other company's devices.

B

A technician enabled remote management on the small office WAP to manage this device from another location. Users are reporting that the WAP has changed its SSID without anyone's knowledge. Which of the following would prevent this from occurring? A. Change to user MAC filtering B. Change default usernames and passwords C. Disable the SSID from broadcasting D. Enable static IP addresses

B

A technician has a client's laptop that is randomly shutting down. Which of the following is the FIRST step of the troubleshooting theory that the technician will perform to resolve the laptop's issue? A. Document finding; actions; and outcomes B. Identify the problem C. Establish a theory D. Establish a plan of action to resolve the problem

B

A technician has discovered that there is an issue with the configuration of DirectX. Which of the following utilities would allow the technician to resolve this issue? A. MSINFO32 B. DXDIAG C. REGEDIT D. MSCONFIG

B

A technician has discovered two PCs with the same name being used on the network. Which of the following BEST describes what has been happening and how to resolve the problem? A. Both users can log in but only one can access company shares; both PCs need their network names changed. B. Only one user can log in; one PC needs to have its network name changed. C. Both users can log in and access company shares; one PC needs to have its network name changed. D. Neither user can log in; one PC needs to have its network name changed.

B

A technician has just updated a user's PC to Windows 7 and connected to a network printer through a print server. After finishing; the user reports that the printer will not print. Which of the following is the MOST likely reason for this issue? A. The PC's network connection is down. B. The print server does not have the proper driver. C. The printer is not installed on the print server. D. The server is using PCL instead of PostScript.

B

A technician has received a laptop that is having problems with the screen. The user is reporting that the display is too dim and difficult to see. Which of the following steps should the technician take FIRST? A. Install an anti-glare filter B. Increase the brightness using the function keys C. Replace the LCD backlight in the display D. Update the display drivers

B

A technician is having boot issues with a newly built PC; and notices the following jumper configurations for each PATA device HARD DRIVE. MASTER OPTICAL DRIVE. CABLE SELECT Which of the following jumper configurations should be used instead? A. HDD. Cable Select; Optical Drive. Master B. HDD. Cable Select; Optical Drive. Cable Select C. HDD. Slave; Optical Drive. Slave D. HDD. Master; Optical Drive. Master

B

A technician is implementing a SOHO wireless network for Company A that shares a floor with Company B. Which of the following would BEST secure the wireless network so that only Company A employees are allowed access? A. Turning down the radio power level B. Enabling MAC filtering C. Setting a high encryption level D. Disabling the SSID broadcast

B

A technician is replacing a processor in a workstation. After installation; the workstation starts up and immediately shuts down; the technician tries to start the workstation several more times and gets the same result. Which of the following is the cause of this issue? A. The workstation is not plugged in. B. The thermal paste was not applied. C. The memory was not installed properly. D. The L2 cache was not cleared.

B

A technician notices a computer is overheating after 30 minutes of use. Which of the following is the MOST likely cause? A. Clogged temporary file folders B. Internal dust buildup C. Incorrect input voltage setting D. ACPI is disabled

B

A technician plugs a USB device into the computer. The system tray displays a message that reports the device is installed; but may not work properly. Which of the following is the MOST likely cause of the message? A. The device needs a firmware update. B. The device needs an updated driver installed. C. The plugged in device is too slow for the USB port speed. D. The device is incompatible with the installed version of Windows.

B

A technician receives a call late in the evening that employees of a small business cannot access the company's remote access server. The technician cannot get a response from the server or the router at the site. Upon gaining access to the physical site; the technician discovers the router unplugged from the power source. Which of the following should be implemented to reduce the chance of this happening again? A. Plug the router into an uninterruptable power supply. B. Move the router to a physically secure location. C. Install security cameras to monitor the router. D. Outsource the remote access service to a third party.

B

A technician receives a report that the pages coming out of a laser printer are smearing when touched. Which of the following components should the technician check FIRST to resolve this issue? A. Drum B. Fuser C. Pickup roller D. Corona wire

B

A technician receives a trouble ticket stating that a user is receiving error messages on their computer. When the technician arrives at the computer; it is now working with no error messages being displayed. Which of the following should the technician use to determine what the error message was? A. MSINFO32 B. EVENTVWR C. DXDIAG D. REGSVR32

B

A technician recently removed spyware from a computer and now the user is getting error messages about system files. Which of the following tools would a technician use to verify all system files are intact and in their original versions? A. Repair Disk B. SFC C. FIXMBR D. ASR

B

A technician suspects that a recent virus they removed may have corrupted a necessary system file. Which of the following utilities can the technician use to verify the integrity of these critical files? A. msconfig B. sfc C. regsrv32 D. fixmbr

B

A user calls the help desk to report about their smartphone not being able to make any phone calls. The user admits that the smartphone can still send/receive email; browse all websites; and utilize all Internet-capable applications. Which of the following issues is MOST likely affecting the smartphone? A. Wi-Fi is turned off; the cellular antenna is turned on. B. The cellular antenna is turned off; Wi-Fi is still on. C. The user forgot to turn off Bluetooth before trying to make a call. D. The user has 4G capability turned off; and is only on 2G.

B

A user has Share permissions of "Allow - Full Control" and NTFS permissions of "Allow - Read; Allow - Write; Deny - Modify" to a shared file. In which of the following ways can they manipulate the file? A. They can delete the file. B. They can open the file. C. They can take ownership of the file. D. They can edit permissions on the file.

B

A user has an external hard drive which they forget to unplug before booting their machine. Each time this happens; an error shows on the screen which states "Boot sector missing - reboot to try again." Which of the following would be the BEST way to resolve this? A. Change BIOS options to remove floppy drive from the boot order B. Change BIOS options to remove USB device from the boot order C. Change BIOS options to remove CD drive from the boot order D. Set the SATA setting in BIOS to AHCI from IDE

B

A user has asked for a recommendation for a strong password. Which of the following passwords is the STRONGEST? A. password! B. Pa$sw0rd C. pa$4w0rd D. thisismypsswrd1

B

A user is operating a virtual machine (VM) and discovers it has been infected with malware. Which of the following applies? A. The host computer will automatically delete the VM. B. The VM can be shut down with no harm to the host PC. C. The host computer will quarantine the VM automatically. D. The VM will crash and cause irreparable damage to the host PC.

B

A user is reporting that their computer is running slow and is having trouble connecting to the Internet. After further inspection; the technician notices that the antivirus definitions are up-to-date and the system is scheduled for regular scans. Which of the following solutions will MOST likely help resolve the issues reported? A. Enabling system restore B. Anti-spyware software C. Spam blocker D. Pop-up blocker

B

A user is reporting that they are clicking on search results and being redirected to the wrong sites. Which of the following should a technician check FIRST? A. Temporary Internet Files B. Proxy Settings C. Cookies D. Windows Firewall

B

A user is reporting their web browser is not going to the site they are attempting to access. Which of the following would BEST resolve this? A. Delete all Internet cookies. B. Ensure the user is not utilizing a proxy server. C. Remove all Internet shortcuts. D. Clear all Internet cache and saved passwords.

B

A user reports that their PC will not boot after multiple attempts. Which of the following should be the technician's FIRST response? A. "Are you able to log in?" B. "Do you see lights on the PC?" C. "Do you hear a clicking sound?" D. "Is the PC plugged in?"

B

A user reports that their printouts contain a shadow of the previous image. Which of the following is MOST likely the cause? A. Separation pads B. Fuser assembly C. Corona wire D. Pickup assembly

B

A user states that their old notebook loses connectivity to the Internet several times a day at work and at home. The issue started after the wireless card was replaced. Which of the following items is MOST likely causing the issue? A. The motherboard drivers are not current. B. The drivers for the NIC need to be updated. C. The wireless on/off switch is not in the on position. D. The keyboard is faulty and turns the wireless NIC on and off.

B

A user states that when they power on their computer; they receive a "Non-bootable drive" error. The user works with external storage devices to transport data to their computer. The user stated that the computer worked fine the day before. Which of the following should be checked FIRST to resolve this issue? A. Jumper settings B. Device boot order C. PXE boot settings D. Hard drive cable

B

A user states they are hearing a clicking noise coming from the computer. There is a message on the screen saying no operating system found; and the computer then attempts to boot from PXE. Which of the following should the technician perform? A. Remove the floppy disk B. Replace the hard drive C. Replace the NIC D. Replace the DVD-Rom

B

A user states when they press certain letters on their laptop's keyboard; a number is displayed on the screen. Which of the following can the technician perform to resolve this issue? A. Change the character mapping B. Turn off number lock C. Replace the keyboard D. Update the keyboard drivers

B

A user; Ann; reports that she suspects her workstation has malware. Joe; the technician; confirms malware exists and starts the process of removing the malware. Which of the following is the FIRST step he should take in removing the malware? A. Disable antivirus B. Disable system restore C. Enable hard drive encryption D. Format the hard drive

B

A wireless network is experiencing intermittent connectivity. Which of the following would BEST resolve this issue? A. Enable MAC filtering B. Change broadcast channel C. Enable wireless encryption D. Disable SSID broadcasting

B

Administrative share names are MOST commonly designated by which of the following symbols? A. ! B. $ C. ; D. *

B

After an installation of a video adapter; the screen on a Windows 7 system cannot be seen. Which of the following Windows 7 functions will resolve this? A. Component Management B. Startup Repair C. Device Manager D. Task Manager

B

After being relocated to an enclosed position under a desk; a computer experiences intermittent shutdowns. Which of the following conditions is MOST likely the cause? A. Power surges B. Overheating C. APIPA addressing D. RF interference

B

After rebooting; a technician sees the Windows logo but when Windows boots up; no video appears. Which of the following options would be the QUICKEST way to restore the computer? A. VGA Mode B. Last Known Good Configuration C. Safe Mode with Networking D. Safe Mode

B

An unauthorized user observing system security procedures is known as A. A worm. B. Shoulder surfing. C. Phishing. D. Spyware.

B

Ann; a customer; has a wired router that connects to the Internet without any issue; but does not provide any other network services. When users connect PCs to the router; they cannot access the Internet or any other network resources. Which of the following should Ann do to connect the PCs to the Internet? A. Change the gateway address on the wired router B. Set the DNS to an external public source on the PCs C. Remove the PCs from the MAC filter list in the wired router D. Change the switch port duplex setting from half to full

B

Ann; a small business owner; would like to implement wireless networking for her business but wants to be sure the wireless is ONLY accessible from within her business' premises. Which of the following would BEST accomplish this? A. Disabling SSID broadcast to ensure that only employees know the SSID B. Using unidirectional antennas and reducing radio power levels appropriately C. Assigning DHCP addresses that expire after a shorter period of time D. Using omni-directional antennas and reducing radio power levels appropriately

B

Ann; a user; reports that a newly purchased laptop is only showing 65GB total on the C. drive; but she purchased a 100GB hard drive. Which of the following is MOST likely the cause of this difference? A. The unavailable space is set aside for Windows system files B. The manufacturer provided a factory recovery partition C. Corrupted data is being stored in the unused space D. The partition was setup incorrectly and needs to be extended

B

Anne; an employee; stepped away from her workstation to deliver a report to her boss. When she came back; confidential material was displayed on the screen that was not opened prior to her leaving. Which of the following could have mitigated this from occurring? A. Intrusion detection system B. Screensaver password C. Privacy filters D. RFID badges

B

By definition; a rootkit does which of the following? A. Appears to be useful software until it is installed and fully activated B. Hides the existence of certain processes and programs to provide elevated privileges C. Replicates by being copied or causing itself to be copied to another program D. Travels from computer to computer using the native transport protocols available

B

Despite objections; the Chief Executive Officer (CEO) wanted all managers to have administrator rights to their workstations. After a few months; the CEO was replaced. A technician is assigned the task of changing the managers to power users on the domain. Which of the following is the BEST choice to complete this task? A. rstrui.exe B. gpedit.msc C. lusrmgr.msc D. usergroup.exe

B

In order to pair a phone with another device like a GPS or a car stereo through Bluetooth; which of the following steps need to be taken? A. Put both devices in discovery mode and type in the generated pin into both devices B. Put both devices in discovery mode and type in the generated pin C. Put the second device in discovery mode and type in the generated pin D. Put the phone discovery mode and type in the generated pin

B

In which of the following locations would a technician go to show file extensions? A. Security Center B. Folder Options C. Display D. System

B

It is a company's policy to shut down all workstations at the end of the day. However; the majority of employees are leaving disks in their workstations and upon start up the next morning they are receiving a `NTLDR is missing' error. Which of the following is a possible solution? A. Make a daily announcement to remove all disks before departing for the day. B. Change the Boot order in the BIOS. C. Make it a part of the evening checks to ensure all disks are removed. D. Make a company policy that states that it is unlawful to leave disks in the machines.

B

Joe; a technician; has been tasked to verify a new device has been installed and correctly configured on a Windows 7 computer. He has now confirmed the new device is not working properly. Upon opening the Device Manager; he sees several icons. Which of the following should Joe do FIRST to help troubleshoot the problem? A. Upgrade the antivirus signatures and disable system restore B. Check any items with yellow exclamation points C. Check any items with green checkmarks D. Disable items with a red X over the icon

B

Joe; a technician; receives an error message on his tower PC just after POST which reads-- "WARNING! Your drive is about to fail. Please back up your data and run full drive diagnostics." Which of the following is generating this error message? A. CHKDSK B. S.M.A.R.T. C. eSATA D. QoS

B

Joe; a user; is experiencing some operating system errors that are disrupting his ability to boot the workstation. Which of the following would allow him to keep his data; but possibly resolve operating system errors? A. Clean installation B. Repair installation C. Image deployment D. Quick formatting

B

On a mobile device; enforcing a policy that erases a device after a number of failed login attempts is used to prevent which of the following? A. Unauthorized application installations B. Brute forcing C. Social engineering D. Man-in-the-middle attack

B

Revert to snapshot is a feature of A. The host OS B. The hypervisor C. The underlying storage D. The guest OS

B

The swap file is described as which of the following? A. The hidden file created when in hibernation mode. B. A system file containing the computer's virtual memory. C. A file created when downloading a program from the web. D. A hidden file created when moving files on a computer.

B

When a folder is copied into a shared folder; the permissions on that folder A. Change ownership to the domain administrator. B. Inherit from the shared folder. C. Need to be manually recreated. D. Retain their original permissions.

B

When installing Windows on a new server; a technician gets an error reporting that no suitable hard drives are available for installation. Which of the following is MOST likely the issue? A. Bluetooth pairing is disabled B. RAID drivers need loading C. PXE boot server unavailable D. CMOS battery needs replaced

B

When securing a small office home office (SOHO) that has empty cubicles with unused network ports; which of the following can be used to secure ONLY the unused ports? A. Use DHCP addressing on the network. B. Disable the ports on the router or switch. C. Power down the router when it is not being used. D. Disable DNS on the network.

B

Which of the following BEST describes the Apple utility used with iOS devices to synchronize; upgrade; and restore to factory default if needed? A. iMac B. iTunes C. Safari D. Bluetooth

B

Which of the following allows a Windows 7 remote user to edit a file offline then automatically update the changes when back in the office? A. Windows Defender B. Sync Center C. Windows Aero D. HomeGroup

B

Which of the following applications can be scheduled to delete unwanted; compressed; older files? A. Disk Defragmenter B. Disk Cleanup C. CHKDSK D. Disk Management

B

Which of the following file systems is required to install Windows 7? A. CDFS B. NTFS C. FAT D. FAT32

B

Which of the following is an edition of a Windows XP operating system? A. Enterprise B. Media Center C. Ultimate D. Home Premium

B

Which of the following is required in order to receive push email notifications on a mobile device? A. IMAP B. POP3 C. ActiveSync D. SMTP

B

Which of the following is the MOST important system resource for virtual machines? A. Hard drive space B. RAM C. BIOS D. CPU

B

Which of the following operating systems enables a user to use Flip 3D? A. Windows XP Professional B. Windows 7 Professional C. Windows Vista Home Basic D. Windows 7 Starter

B

Which of the following operating systems has the Shake; Peek and Snap features? A. Windows XP Home B. Windows 7 Professional C. Windows XP Professional D. Windows Vista Business

B

Which of the following settings should be implemented when a mobile device MUST be configured to receive push email notification? A. POP3 with SSL B. ActiveSync C. IMAP D. Secure SMTP

B

Which of the following usually incorporates an 8-digit code that can be found on the bottom of a SOHO router? A. Port forwarding B. WPS C. Wireless encryption D. Port triggering

B

Windows XP Mode is available in which of the following Microsoft Windows environments? A. Windows Vista Ultimate B. Windows 7 Business Edition C. Windows XP Professional D. Windows Server 2008 R2

B

A technician wants to secure a Windows 7 Ultimate notebook hard drive. Which of the following should the technician do to implement BitLocker? (Select TWO). A. Disable TPM in the system BIOS B. Run the BitLocker wizard and any necessary partitions C. Enable TPM in the system BIOS D. Enable TPM in the Windows 7 OS files E. Set up the OS and the system files on the same partition

B C

Which of the following data types can be synchronized to a mobile device by default? (Select TWO). A. Biometric information B. Pictures C. Contacts D. Credentials E. SMS

B C

Which of the following is a business use case for desktop virtualization? (Select TWO). A. Circumvent software licensing B. Disaster Recovery C. Security Monitoring D. Software Testing E. Increased Storage Space

B D

A user reports that they can browse the local network but cannot reach the Internet. A technician pings the local server and verifies the server responds but sites on the Internet do not. This could be caused by which of the following? (Select TWO). A. Failed WINS server B. Failed router C. Disabled Windows firewall D. Bad NIC E. Failed gateway

B E

Which of the following are encrypted protocols? (Select TWO). A. TELNET B. SSH C. POP3 D. FTP E. HTTPS

B E

iOS version 5.0 allows for all data to be synchronized and backed up to a computer with iTunes via which of the following methods? (Select TWO). A. 4G LTE B. USB cable C. FireWire D. Bluetooth E. Local Wi-Fi

B E

A PC has sensitive data that must be destroyed; before the PC is redeployed. A technician has been tasked with completely wiping the PC hard drive. Which of the following methods is BEST for the technician to use? A. Quick format B. FDISK C. Low level format D. Standard format

C

A client states that there are too many programs automatically starting when Windows boots. Which of the following tools would BEST be used to disable some programs from automatically starting when the computer is booted? A. Performance Monitor B. Fixboot C. MSCONFIG D. FIXMBR

C

A company decides to implement two-factor authentication on all of the company computers. In addition to a user password; which of the following is a commonly used item to implement two- factor authentication? A. Retinal scanner B. Key Lock C. RSA token D. Privacy Filter

C

A company has created a personal SSL certificate for an internal website and a user is reporting error messages when accessing the site. In which of the following locations could a technician troubleshoot SSL certificate errors? A. System Protection B. Folder Options->View Hidden Files C. Internet Options->Content D. Local Security Policy

C

A consultant is called in to help troubleshoot connectivity problems an office is experiencing with their 802.11a wireless network. The office manager reports that at random times during the day; workers will lose wireless connectivity for different spans of time. There is no pattern to the drops in connectivity. Which of the following causes should the technician explore FIRST in troubleshooting the office issues? A. 2.4 GHz portable phone system B. Microwave ovens C. 5G Hz portable phone system D. Two Way RF radios

C

A customer purchases a new 802.11n router for their home. They connect it to their current 801.11g devices; as well as their new laptop. Even though the laptop has a built-in 802.11n antenna; they are not noticing any speed increase. Which of the following is the MOST likely cause? A. The laptop is not close enough to the router. B. The router should be set to "G-Only". C. The router is broadcasting in Mixed Mode. D. The laptop needs a dedicated access point.

C

A network printer has quit printing from all connected customers. No error messages are displayed on the printer and the network connection is working. Which of the following is the FIRST troubleshooting step for the technician to try? A. Check port on switch B. Reboot the printer C. Print configuration page D. Clear print queue

C

A new user reports that they are unable to login to the corporate network on their desktop but they are able to access the WLAN from their mobile device. After further inspection; the technician realizes that the wall port is not wired correctly. Which of the following tools would be used to permanently restore network connectivity to the desktop? A. Wireless locator B. Tethering with mobile device C. Punchdown tool D. Crimper

C

A small office has two routers; one wired and one wireless. Joe; a laptop user; experiences no issues while at his desk; but when he unplugs his laptop to go to a conference room; Joe is no longer able to access the Internet. Other users do not have this issue. A technician checks the laptop and sees an IP address of 169.254.13.142. Which of the following actions should the technician take FIRST so that Joe can access the Internet? A. Disable the wired connection. B. Reinstall DHCP on the server. C. Refresh the network connection. D. Power cycle the wireless router.

C

A technician adds a second monitor to a system that supports dual video output. Which of the following tabs in Display properties will allow the technician to extend the Windows desktop onto the second monitor? A. Themes B. Desktop C. Settings D. Appearance

C

A technician discovers a networked computer has been infected with a zero day virus. Which of the following is the FIRST thing that should be done to the workstation? A. Document the symptoms of the virus. B. Turn off the computer using the power switch. C. Unplug it from the network. D. Run an antivirus update and then a full scan.

C

A technician is installing a new wired router and needs to disable all the ports currently not in use. The documentation for router mentions the web interface for the router is available by default at 192.168.1.1 In which of the following ways would the technician go about doing this? A. Place labels on top of all the ports that are not to be used. B. Manually set the IP address to 10.168.1.1; and then access the website at 192.168.1.1. C. Use an Internet browser to access the router configuration at 192.168.1.1. D. Use Windows Explorer and search for a file called 192.168.1.1.

C

A technician needs to build a PC to act as a home virtual server. Which of the following would be the BEST choice? A. Dual Core CPU; 6GB DDR3 RAM; 320GB of hard drive space B. Dual Core CPU; 8GB DDR RAM; 1TB of hard drive space C. QUAD Core CPU; 6GB DDR3 RAM; 320GB of hard drive space D. QUAD Core CPU; 4GB DDR2 RAM; 1TB of hard drive space

C

A technician needs to dispose of an old database server which stored company payroll information. Which of the following is a logical data destruction method suitable for this task? A. Degaussing the hard drive with a powerful magnet. B. Using a commercial shredder to destroy the hard drive. C. Overriding the data on the hard drive multiple times. D. Burning the hard drive using an approved method.

C

A technician recently created an email account for a new user; Joe. On the second day; Joe reports his email account is full of spam even though he has not given out his address. Which of the following should the technician do to resolve the issue? A. Turn on windows firewall B. Click the unsubscribe link in the spam C. Run an anti-spyware scan D. Install privacy filter

C

A technician recently installed a new video card in a PC. The PC already has integrated video on the motherboard. When the technician turns on the PC; there is no video. Which of the following is MOST likely the cause? A. The motherboard BIOS version is out of date. B. The incorrect video card drivers are installed. C. The power connector for the video card is unplugged. D. The video card is unsupported by the motherboard.

C

A technician replaced a video card on a desktop PC. The technician powers on the PC to install the device drivers. The PC boots up and goes through the POST; but the screen goes black when trying to boot the operating system. Which of the following steps should the technician perform NEXT to troubleshoot this issue? A. Flash the BIOS B. Reseat the video card C. Boot the PC in safe mode D. Replace the video card with a new one

C

A technician wants to prevent users in a computer lab from seeing the name of the last user who logged onto the computer after the user logs out from the workstation. Which of the following MUST the technician configure? A. Screen saver advanced options B. User access control C. Local computer policy D. Control Panel options

C

A technician would like to restart a computer from a command line tool. Which of the following tools should the technician use? A. Shutdown /f B. Shutdown /i C. Shutdown /r D. Shutdown /s

C

A user gets a warning from their ISP about illegally downloading copyrighted movies. The user insists that they did not download any movies and calls a technician to implement stronger small office home office (SOHO) security. Which of the following will allow only known workstations to connect to the SOHO router? A. WPA password B. Static IPs C. MAC filtering D. WEP password

C

A user has a computer with a 100GB IDE hard drive formatted as a single FAT32 partition. This drive is only used to store data. The user adds a second 100GB hard drive and wants to mirror the two drives. When the user goes to disk management there is no option to mirror the drives. Which of the following will resolve this issue? A. Convert the partition to NTFS. B. Change the partition to be an extended partition. C. Convert both drives to a dynamic disk. D. Change the partition to be the active partition.

C

A user has downloaded and installed a browser add-on that causes the browser to hang. The PC has very slow system response when rebooted. Which of the following should a technician do to troubleshoot this problem? A. Run System Restore; update antivirus program; and run an antivirus scan. B. Remove all Internet temporary files; run an antivirus scan; and reboot using Last Known Good Configuration. C. Remove all temporary files; turn off System Restore; update and run an antivirus scan. D. Run an antivirus scan; Run Disk Cleanup; and reboot into Safe Mode.

C

A user is concerned about an issue with iOS. The user MOST likely has which of the following devices? A. iCloud B. Android Phone C. iPhone D. Windows Tablet

C

A user is experiencing slow performance with their computer. A technician suspects the computer has a virus and runs antivirus software. A virus is found and removed; but the performance issue is not resolved. Which of the following should the technician perform NEXT? A. Document findings; actions; and outcomes B. Establish a plan of action to resolve the problem C. Re-establish a new theory or escalate D. Implement preventative measures

C

A user is running a RAID 0 array and has problems with one of the drives. Which of the following actions will the technician take NEXT? A. Replace the failing drive and let the RAID recover. B. Add an additional drive to the array and let the RAID recover. C. Replace the drive; all the data is lost and cannot be recovered. D. Remap the RAID array to another drive letter to recover the data.

C

A user just bought an Android tablet and wants to connect to their work email. The user's employer has a Microsoft Exchange server for email. Which of the following would the technician configure to allow the user to access email on the Android tablet? A. DNS; DHCP B. IMAP; SNTP C. POP3; SMTP D. Devices are incompatible

C

A user launches a software application on their Android tablet device. Once the software has loaded; the user reports that when turning the tablet to work the application in landscape mode; the software does not automatically adjust to landscape mode. Which of the following is the cause of the issue? A. The auto-adjust setting is not enabled in the operating system. B. The tablet is running low on power and disabled landscape mode. C. The application was not developed to react to changes to the gyroscope. D. The user did not switch the tablet to landscape mode.

C

A user reports that after configuring the BIOS to boot to the hard drive first; the system still tries to boot from the optical drive. Which of the following is the MOST likely cause? A. Optical drive B. Power supply C. CMOS battery D. CD-ROM disk

C

A user reports that the PC is not working. After questioning the user; the technician believes the problem is a bad memory module. Which of the following is the NEXT step the technician should take? A. Document findings; actions; and outcomes B. Test the theory by replacing the motherboard C. Test the theory by running memory diagnostic software D. Verify the system is working correctly

C

A user reports that the laptop's screen flickers and then goes black. When connecting to an external monitor the operating system desktop is displayed. Which of the following is the cause of the problem? A. Monitor function key B. Resolution is set too low C. Inverter board D. Display adapter drivers

C

A user signs up at an online gaming site; and shortly after receives an email with a link to download the game. After installing the game; the user notices that important files are being deleted. Which of the following is this an example of? A. SPAM B. Phishing C. Trojan D. Spyware

C

A user states that their wireless connection drops when the phone rings. Which of the following solutions BEST shows what the technician should do to prevent this from happening? A. Move the access point closer to the user B. Remove the phone C. Change the frequency that the wireless router is using D. Change the wireless security encryption settings

C

A user states that they are having a problem with their word processor on their laptop. Whenever they attempt to type letters with their right hand; numbers and symbols show up instead. Which of the following would address this issue? A. Switch to a standardized font B. Restore regional settings to default C. Toggle the function + num lock combination D. Connect a full sized external keyboard

C

A user states they have to reset the date and time on their computer every day. Which of the following hardware needs to be replaced to resolve this issue? A. Processor B. Hard drive C. CMOS battery D. Memory

C

A user; Joe; wants to enable communication between his GPS and his smartphone. Which of the following would allow for this communication? A. A data link cable B. A wireless access point C. Bluetooth pairing D. Infrared communication

C

A worker from a branch office goes to the main office for a meeting. They plug their laptop into a couple of wall jacks and do not get network connectivity. Which of the following should the technician check to resolve this issue for the employee? A. Encryption levels on the laptop B. All antivirus updates have been performed C. Disabled switch ports D. If the users account has been locked

C

After a recent memory upgrade; a customer is reporting they have seen no improvement in their system performance. Upon inspection; the technician finds that 6.0 GB are detected but only 3.0 GB of memory are usable. Which of the following is the MOST likely cause? A. The remaining memory is a different type and cannot be used. B. The remaining memory is defective and needs to be replaced. C. The customer is using a 32-bit operating system. D. The memory has not been properly configured in BIOS.

C

After installing a new printer software package which came with print drivers; a user is experiencing problems launching other applications. Which of the following should the technician do to resolve the user's printing problem? A. Run a backup of the current state. B. Defragment the system. C. Run the system restore. D. Update the antivirus definition.

C

After installing a new printer the organization determines that there are problems printing images and very large files. Which of the following will MOST likely resolve the issue? A. Update the drivers using WHQL drivers B. Install additional memory to each computer C. Install additional memory to the printer D. Apply the latest OS service pack

C

After installing an updated video card driver in a Windows XP machine; a technician sees a bluescreen of death (BSOD). Which of the following would BEST help the technician repair the computer? A. Update antivirus definitions B. Run System Restore C. Last Known Good Configuration D. Factory pre-installation CD

C

An administrator wishes to prevent users from accessing unattended computers in other departments. Which of the following would BEST accomplish this? A. Use a roaming profile using domain credentials. B. Implement event monitoring of user logins on every PC. C. Enforce a password-protected screensaver after five minutes of inactivity. D. Use a common login and password for multiple users based upon department.

C

Anne; an end-user; reports to Joe; a helpdesk technician; that her computer has been redirecting her browser to unknown websites when clicking on search results. Joe runs a malware scan and finds that her computer is infected with malware. Joe uses the anti-malware program to remove the infection but Anne reports that the problem resurfaced the next day. Joe runs the malware scan again and finds the same malware is still infecting Anne's computer. Joe runs several passes of the malware scan to remove the infection but it keeps recurring. Which of the following would MOST likely aid in removing the infection? A. Enable Windows User Access Control to ensure the user has proper rights to remove the infected files. B. Disable Windows firewall as it may be conflicting with the malware scan. C. Run the malware scan in Windows safe mode. D. Change the desktop's IP address to a different subnet.

C

DXDIAG is used to display information about which of the following components and its characteristics? A. Printer components B. Network components C. Graphics components D. Storage components

C

In a SOHO wireless network; which of the following prevents unauthorized users from accessing confidential data? A. Reduce broadcast power B. Change SSID name C. Set encryption D. Enable MAC filtering

C

Joe; the Chief Executive Officer (CEO); has a habit of forgetting his mobile device and asks for assistance in locating it in the future. Which of the following would help finding his lost device? A. Enable IMAP settings B. Gyroscope features C. GPS location services D. Enable SSL services

C

Privacy filters applied to users computer screens are used to combat which of the following security risks? A. Rootkits B. Spear phishing C. Shoulder surfing D. Social Engineering

C

The network administrator is called to assist a user; Joe; who has trouble accessing his network drive. Joe states he logs on with his credentials with no problem; however; when he attempts to access a folder via UNC the system asks for credentials. Which of the following is the BEST explanation for this? A. Joe is logging in with a disabled network user name. B. Joe does not have local share permission to access that folder. C. Joe is logging in to the local user account. D. Joe is not typing in the correct network password.

C

Virtual machines help users developing cloud applications in which of the following ways? A. Provides an environment where the host cannot be connected to the network. B. Provides a platform where operating system requirements are lessened. C. Provides a safe; secure environment in which to test patches or application updates. D. Provides an environment that is never accessible from the Internet.

C

When transferring a virtual client from one computer to another; which of the following MUST be checked for compatibility on the host? A. IP addressing methods B. Hard drive connection types C. Processors D. Hard drive rotation speeds

C

Which of the following Control Panel utilities would be BEST to use to remove a Windows 7 application? A. Folder Options B. Add/Remove Programs C. Programs and Features D. Administrator Tools

C

Which of the following allows a user to pinch zoom on an Android device? A. Accelerometer B. Micro USB port C. Multi-touch D. A trackball

C

Which of the following boot methods receives the bootstrap files from a network server? A. IDS B. PAN C. PXE D. NAT

C

Which of the following features would be BEST used to recover a lost mobile device? A. Remote backup application B. Remote wipe C. Locator application D. RFID chip

C

Which of the following file system types is used for optical media? A. FAT32 B. FAT C. CDFS D. NTFS

C

Which of the following is an advantage of installing a 64-bit processor versus a 32-bit processor? A. Uses less bandwidth on the front side bus B. Only requires half of the clock speed C. Able to access a larger amount of RAM memory D. Able to be used as two 32-bit processors

C

Which of the following is responsible for flipping the image when a smartphone is rotated? A. Accelerometer B. Shock sensor C. Gyroscope D. Ambient light sensor

C

Which of the following is the BEST definition of what an accelerometer does? A. Prolongs battery life B. Calculates the rotation of a device C. Measures velocity in a given direction D. Makes the device run with more speed

C

Which of the following is the BEST tool to verify the cable is plugged into the correct port on the patch panel? A. Cable certifier B. Punch down C. Toner probe D. Cable tester

C

Which of the following is the MOST secure method; short of physical destruction; that would be used to ensure that data on a hard drive cannot be recovered? A. Use a degaussing tool B. Format the drive C. Use an overwrite program D. Repartition the drive

C

Which of the following is the safest way to download and install a new program on a mobile device? A. Use the Bluetooth file sharing feature. B. Download the program from an FTP site using the USB cord. C. Use the app store to download and install the program. D. Use NFC to copy the program from another mobile device.

C

Which of the following is true when Bob; a technician; is setting default security permissions on a folder? A. There are no significant changes to other files. B. The created folder inherits the most restrictive permissions within the folder. C. The permissions are inherited by all files and folders within that folder. D. All folders within that folder are given a restrictive password.

C

Which of the following passwords is the MOST secure according to industry best practices? A. VeryStrongPassword B. SimpleAnswer1234 C. E@sy2Remember D. thisisthecorrectanswer1

C

Which of the following ports MUST be open in order for Remote Desktop to function? A. 53 B. 80 C. 3389 D. 5900

C

Which of the following scenarios would benefit from client-side virtualization? A. Increased 3D gaming performance B. Stronger NTFS permissions C. Supporting a legacy application D. Maintaining Windows Software update servers

C

Which of the following should be considered true when selecting a 64-bit version of Windows? A. 64-bit extensions can be disabled in the bios and prevent a proper boot. B. XP Compatibility mode only allows for the 64-bit version of Windows XP. C. Many browser plug-ins may only be supported on 32-bit browsers. D. 64-bit uses memory more efficiently so less RAM is needed than in a 32-bit version.

C

A new application is installed which adds three new services to a customer's PC. The customer asks for help; because the new application will not start. A technician investigates and finds that one of the services has failed to start. They attempt to manually start the service but it fails. Where should the technician look NEXT for more information? (Select TWO). A. Task Manager B. System registry C. Log files for the new application D. Event Viewer E. %SystemDir%\System32\Drivers

C D

Which of the following can an Android device use to synchronize with desktop contacts? (Select TWO). A. HDMI cable B. CAT6 cable C. USB cable D. Bluetooth E. IEEE 1394 cable

C D

You are working on a Windows 7 Ultimate computer. An application called DLP 2.0 is failing to start properly. You are required to disable two of its components in MSconfig. Which two tabs should you access? (Select the two best answers.) A. General B. Boot C. Services D. Startup E. Tools

C D

Which of the following components would a user MOST need when building a virtual server? (Select TWO). A. Networking speed B. High-end sound card C. RAM D. High-end video card E. HDMI F. CPU

C F

A SOHO would like to limit usage of their wireless network to two computers. Which of the following would be the EASIEST way for a technician to accomplish this? A. Assign static IP addresses B. Change the signal strength C. Disable unused ports on the router D. Enable MAC filtering

D

A Windows user states that every time they hit certain letter keys on their notebook; a number appears instead of the letter. Which of the following items is MOST likely the cause of this problem? A. The user enabled sticky keys. B. The user changed the keyboard character set. C. The user enabled accessibility options. D. The user enabled num lock.

D

A client has a Windows XP PC that has several unused programs that run on startup. Which of the following utilities can a technician use to disable these programs from running at startup? A. Default programs B. Device Manager C. Performance information and tools D. MSCONFIG

D

A client wants a wireless network set up in the office; but does not want unauthorized users to be able to access the network. Which of the following provides the BEST protection? A. Change the default channel B. Disable the SSID C. AP placement D. Strong encryption

D

A computer is showing the "No boot device found" message even though a technician has verified that the hard drive is set as Device 1 in the BIOS boot order. Which of the following causes is MOST likely at play? A. A 40-pin cable was used instead of an 80-pin cable to connect the HDD. B. The hard drive is disconnected. C. The hard drive has corrupted sectors and needs a CHKDSK scan. D. Both PATA devices are incorrectly set to the master jumper setting.

D

A customer reports that after a technician cleaned up a rogue antivirus program; the customer cannot browse the web. Which of the following should the technician check to resolve the situation? A. Browsing history B. Firewall settings C. User privileges D. Proxy settings

D

A customer states that their wireless stops working a few times a day. They said the problem started when a new neighbor moved in. Which of the following is the MOST likely cause of the issue? A. Neighbors are using the same encryption. B. Neighbors are using the same model router. C. Neighbors have SSID broadcast enabled. D. Wireless channels are overlapping.

D

A laptop boots fine but after a few minutes the LCD screen fades out into a very dim image. Which of the following is the cause of the problem? A. Weak battery B. Power supply is failing C. LCD screen connector is loose D. LCD inverter is failing

D

A laser printer is producing completely blank sheets. Which of the following processes should the technician check FIRST? A. Fusing B. Paper handling C. Transfer D. Development

D

A manager needs to have remote access to the main office at all times. Which of the following is the BEST setup? A. WWAN B. LAN C. MAN D. VPN

D

A technician has upgraded an internal WiFi card on a laptop and now the signal power to connect to a WAP is low. Which of the following is the MOST likely cause of the issue? A. WIFI card drivers are not installed. B. The laptop's memory is faulty. C. The laptop's battery is dead. D. One of the antenna wires is unplugged.

D

A technician installs a new SOHO wireless router to replace a failed router and users report connectivity issues and IP errors. Which of the following is the MOST likely cause? A. Their server has gone down B. There are too many static IP addresses on the network C. The new router's firewall is malfunctioning D. Users need to refresh their IP configuration

D

A technician installs a new graphics card that supports high resolutions. The technician sets the resolution to the highest setting and then the monitor displays no video. The technician hits the enter key to exit and nothing happens. After a reboot; no video appears after the operating system loads. Which of the following would the technician perform NEXT? A. Reseat the graphics card in a different slot B. Update the graphics card driver C. Reinstall the operating system D. Change the resolution in Safe Mode

D

A technician is diagnosing a computer receiving the following message upon boot "RAID degraded." Which of the following is MOST likely the cause of such an issue? A. Faulty RAM B. Faulty RAID battery C. Faulty power supply D. Faulty hard drive

D

A technician is dispatched to a location that has multiple laser printers. One of the network printers is printing what appears to be a shadow image. The technician could solve this issue by A. replacing the fuser B. running calibrate C. replacing the network cable D. replacing the drum

D

A technician is using the troubleshooting theory to help resolve a problem that is occurring with a client's machine. The technician has verified system functionally. Which of the following is the NEXT step in the troubleshooting theory? A. Identify the problem B. Establish a plan of action to resolve the problem C. Test the theory to determine cause D. Document findings; actions; and outcomes

D

A technician needs to change a FAT32 partition to NTFS. Which of the following commands would allow the technician to do this? A. CHKDSK B. FORMAT C. CD D. CONVERT

D

A technician needs to remove the ability of standard users to shut down or restart a shared computer. Which of the following commands can be used to accomplish this task? A. services.msc B. shutdown.exe C. bootrec.exe D. gpedit.msc

D

A technician needs to use Remote Desktop Connection in order to get access to a remote Windows workstation. However; the Programs menu has been hidden and they only have access to the Run command utility or a command-line prompt. Which of the following is the utility that the technician should use to access Remote Desktop Connection? A. MSINFO32 B. SERVICES.MSC C. MSCONFIG D. MSTSC

D

A technician wants to run a full diagnostic of the file system on a user's hard drive and fix any index errors encountered; but the group policy on the computer prevents this from being executed while in Windows. Which of the following can the technician do to accomplish this? A. Reboot the PC into Recovery Console and run CHKDSK with the /I switch. B. Reboot the PC into Safe Mode and run Disk Defragmenter from the System Tools. C. Reboot the PC into Safe Mode and run Disk Cleanup from the System Tools. D. Reboot the PC into Recovery Console and run CHKDSK with the /R switch.

D

A user calls a technician and states that their computer shutdowns after about 15 minutes of being turned on. The user also states that if they wait about an hour and turn the computer back on; it will function properly; but will shutdown after 15 minutes as it did before. Which of the following should the technician check on the motherboard that could be causing this problem? A. SATA connection B. CMOS battery C. TPM chip D. Capacitors

D

A user calls the helpdesk to report that colleagues are unable to open shared files off their desktop. After inquiring about permissions; the user claims that the "Everyone" group was given DENY rights to all rights levels; but the users who need access were given read/write ALLOW privilege. Which of the following is the MOST likely issue? A. The user needs to give the group "ADMINISTRATORS" full read/write access B. The GUEST account needs to be added to the list of users who have shared access C. The user has DENY permissions setup for the POWER USERS group which needs to be removed D. DENY permissions always supersede ALLOW permissions in Windows

D

A user has a work laptop configured with a static IP. The user wants to be able to take the laptop home and connect it to their router which uses DHCP. However; the user does not want to manually change their settings every day. Which of the following is the BEST step the user could take to make this possible? A. Setup a VPN on the laptop to store the work IP settings. B. Use the Ethernet port at work and only use Wi-Fi while at home. C. Install an additional NIC in the laptop to access the home network. D. Place the static IP in the alternative field while using DHCP.

D

A user has installed a new wireless router and is unable to connect their game console to the manufacturer's service. Which of the following should the technician look for FIRST? A. Ensure the game system has a static IP address. B. Contact the manufacturer to see if service is available. C. Ensure the game system has updated firmware. D. Ensure the correct ports are open.

D

A user is having difficulty installing a program in Windows Vista; as the computer appears to stall prior to the installation. Which of the following is the BEST choice of why this is occurring? A. Aero Settings are not enabled. B. Power Settings need to be enabled. C. BitLocker is scanning for corrupt software. D. UAC is waiting for user input.

D

A user is receiving random errors when accessing files commonly used throughout the day. Which of the following actions should the technician take FIRST? A. Move the files to another location B. Run FixMBR C. Convert the file system to NTFS D. Run CHKDSK

D

A user is reporting that they can no longer view their laptop on the projector. Which of the following would MOST likely fix this issue? A. Reinstall the video drivers for the laptop video card. B. Reboot the laptop and projector. C. Reset the video cable from the laptop and projector. D. Hold function key and appropriate "f" key.

D

A user just bought an iPad and wants to connect to their work email. The user's employer has a Microsoft Exchange server for email. Which of the following would the technician configure to allow the user to access email on the iPad? A. DNS; DHCP B. IMAP; SNTP C. Devices are incompatible D. POP3; SMTP

D

A user needs to replicate a large directory containing folders and files from one drive to another. It also contains several empty folders needed for future growth. Which of the following commands should a technician use in order to accomplish this task? A. ATTRIB /S B. RD /S C. COPY /A D. XCOPY /E

D

A user reports an issue of intermittent Read / Write errors occurring on their PC. Which of the following actions would a technician MOST likely take? A. Run FDISK on the drive B. Update definitions and run a virus scan C. Low level format the drive D. Run CHKDSK on the drive

D

A user reports that they accidentally unplugged their CMOS battery. The unit was reinstalled; but all subsequent boot attempts have resulted in a BSOD. Which of the following should be the FIRST item checked by the technician? A. Whether the boot order now has the optical drive in position one B. If the BIOS can detect the hard drive at all C. Whether the SATA power cable was unplugged D. AHCI - IDE setting under SATA options in the BIOS

D

A user; Ann; reports that her computer is able to connect to devices on her local network but not on the remote office network. Ann's computer shows the following ipconfig information IP address - 192.168.10.45 Subnetmask - 255.255.255.0 Gateway - 192.168.11.1 DNS server 1 - 192.168.10.2 DNS server 2 - 8.8.8.8 Which of the following is the cause of the problem? A. DNS server 2 is set incorrectly. B. DNS server 1 is set incorrectly. C. IP address is set incorrectly. D. Gateway is set incorrectly.

D

An iOS user does not want to automatically connect to wireless networks that are broadcasting. Which of the following settings must be enabled in iOS 5.x to authorize connecting to wireless networks? A. Connect to WiFi B. Change adapter settings C. Manage wireless networks D. Ask to join

D

In order to connect a mobile device to a PAN; a technician MUST ensure which of the following are enabled? A. Wi-Fi antenna B. 3G data services C. Location services D. Bluetooth discovery

D

Joe; a customer; called and stated that since a virus was removed from his PC; Windows is now displaying errors about damaged system files. Which of the following tools should be used to correct the issue? A. TASKKILL B. DISKPART C. CHKDSK D. SFC

D

Joe; a technician; built a new computer for a customer. The computer has been setup with the appropriate operating system; but when Joe boots the PC after configuration; he receives an invalid boot disk message. Which of the following tools should he use to fix the issue? A. Safe Mode with command prompt B. Restore from a prior recovery point C. MSCONFIG to disable startup programs D. BIOS and change the boot order

D

Joe; a technician; is sent out to investigate a PC which refuses to turn on for a customer after a recent thunderstorm. Upon arrival; Joe notices a heavy scent of what seems to have been an electrical burn. Which of the following PC components would be MOST likely at fault for the failure? A. ODD B. CPU C. HDD D. PSU

D

Joe; a technician; is tasked with installing Windows Vista on a new PC that came with Windows XP. He would like to preserve the data on the machine in case it is needed later. Which of the following installation methods would be MOST effective for him to use? A. Image creation B. Unattended installation C. Clean install D. In-place upgrade

D

Joe; a user; reports that each time his laptop is logged in to the company's headquarters; his system time changes. After Joe returns home; he adjusts the clock; which stays set correctly until the computer is again at the company's headquarters. No other users have reported any issues. Which of the following is MOST likely occurring? A. The domain time controller is incorrect B. The laptop firmware needs to be updated C. The laptop has a malware infection D. The laptop's time zone is incorrectly set

D

The shared folder named C$ is an example of which of the following? A. Local share B. Permission propagation C. Inheritance D. Administrative share

D

The technician is dispatched to a multi-function device that users print and copy from all day. The technician is told pages that are copied all have a line on them on the left hand side of the page. The technician prints a printer test page and does not see the line on the page. The technician's NEXT step would be which of the following? A. Replace the toner cartridge to eliminate the lines. B. Print from another workstation to recreate the problem. C. Close the trouble ticket and document no trouble found. D. Copy a printed page to recreate the problem.

D

Two users share the same Windows 7 computer. The first user creates a document intended to be used by both users; and then logs off. The second user logs on and types the name of the document in the Start menu; but the document is not found. Which of the following is the problem? A. The document is set to hidden. B. The document is locked. C. The document was saved as a system document. D. The document is owned by the first user.

D

User profiles in Windows 7 are stored in which of the following locations? A. \User Profiles B. \Documents and Settings\User Profiles C. \Documents and Settings D. \Users

D

Which of the following BEST describes the difference between batteries used in iOS devices versus Android devices? A. iOS devices batteries are NiMH B. Android device batteries are wirelessly charged C. Android device batteries also work in iOS devices D. iOS device batteries are not replaceable

D

Which of the following command line tools will bring up a GUI interface to shutdown a remote PC? A. shutdown -a B. shutdown -f C. shutdown -g D. shutdown -i

D

Which of the following commands will allow a user to discover their IP address; subnet; and DNS? A. IPCONFIG B. NETSTAT -A C. NSLOOKUP D. IPCONFIG /ALL

D

Which of the following describes when a child folder has the same permissions as its parent folder? A. Single sign-on B. Propagation C. Administrative share D. Inheritance

D

Which of the following explains why a tablet OS loads quicker than a laptop OS? A. A tablet requires less power to operate than a laptop. B. A tablet has a smaller circuit board than a laptop. C. A SATA drive loads data much faster than an IDE drive. D. A SSD drive loads data much faster than a SATA drive.

D

Which of the following features allows for easier navigation of long lists on a tablet device? A. Pinch-zoom B. Multitouch C. Scrollbars D. Touch flow

D

Which of the following features is a characteristic associated to that of Android-based smartphones? A. Apple App Store B. Closed source SDK C. Proprietary data cable connector D. Open source SDK

D

Which of the following helps to prevent virus infections from USB flash drives? A. Strong passwords B. Password protected screen savers C. Disabling the guest account D. Disabling the autorun feature

D

Which of the following is a difference between Android and iOS operating systems? A. Screen sizes are larger in iOS devices B. iOS is an open source operating system C. Android does not have NFC technology D. Android allows the use of various application sources

D

Which of the following is a required component of a virtual environment? A. KVM B. Storage area network C. VLAN D. Hypervisor

D

Which of the following mobile phone features redirects the screen orientation as the user turns their phone? A. GPS B. Geotracking C. Locator application D. Gyroscope

D

Which of the following threats changes system functionality at the operating system level for a malicious purpose by gaining administrative access after being installed by a user? A. Botnet B. Trojan C. Worm D. Rootkit

D

Which of the following utilities can a technician use to find out what programs are running at startup? A. SERVICES B. Task Scheduler C. NTLDR D. MSINFO32

D

While using a mapping program; which of the following functions shows the user's location on the map as well as movements on the map as they travel? A. Accelerometer B. Geotracking C. Gyroscope D. GPS

D

Windows 7 has notified a user that it has blocked access to the following address in Internet Explorer - ftp://ftp.microsoft.com Which of the following Windows features should the technician check to ensure that there is not an explicit rule disallowing access to this location? A. Windows Bitlocker B. Windows BranchCache C. Windows User Account Control D. Windows Firewall

D

When setting up a Microsoft Exchange mail account to synchronize with an iPhone; which of the following items can be configured to synchronize besides the mail? (Select TWO). A. Shared calendars B. Archives C. Global address list D. Calendar E. Address book

D E


Related study sets

Chapter 30: Procedures and Treatments

View Set

APUSH-Ch. 10 Check Your Understanding

View Set