A+ Core 1 + Core 2
You are connecting a new PSU (Power Supply Unit). The PSU has a square 4-pin P4 cable but there is no square 4-pin receptacle on the motherboard. Where does this cable connect? Leave it unplugged. Plug it into the PCIe power port on the video card. Plug it into the primary hard drive. Plug it into the EPS12V receptacle.
Plug it into the EPS12V receptacle.
Which of these are firewall settings? (Select all that apply.) Port Forwarding Create PTR Records MAC Filtering Content Filtering/Parental Controls
Port Forwarding MAC Filtering Content Filtering/Parental Controls
If you want to run some sort of server application from your network making it accessible to the Internet, what do you need to setup? Port triggering Media Access Control (MAC) filtering Content filtering Port forwarding
Port forwarding
______ allows you to configure a host to forward a network port from one network node to another. It is automated by port triggering.
Port forwarding
_______ means that the router takes requests from the Internet for a particular protocol and sends them to a designated host on the Local Area Network (LAN). ________ is possible on a firewall.
Port forwarding
port forwarding
Port forwarding means that a router takes requests from the Internet for a particular application (say, HTTP/port 80) and sends them to a designated host on the LAN.
port triggering
Port triggering is used to configure access through a firewall for applications that require more than one port. Basically, when the firewall detects activity on outbound port A destined for a given external IP address, it opens inbound access for the external IP address on port B for a set period.
_______ set properties and monitor local printers and manage printer sharing on the network.
Print Management
The _____ service needs to be started in order to print in Windows. Open the Computer Management console, then expand Services and Applications and select Services.
Print Spooler
A technician receives tickets regarding failed print jobs from multiple users using the same network printer. Where should the technician look for errors? Printer logs Logs on the users' computers Windows Device Manager Recent configuration changes
Printer logs
video card
Provides the interface between the graphics components of the computer and the display device. A number of connectors may be provided for the display, including VGA, DVI, and HDMI. Most adapters come with their own processor (Graphics Processing Unit [GPU]) and onboard memory.
The IT department is revamping the wiring closet to improve cable management. A new patch panel has been installed on the rack in the room and you have been tasked with terminating the cables into the patch panel. Which tool would you need to use to complete your task? Cable stripper Loopback plug Punch-down tool Crimper
Punch-down tool
You have been tasked with making some cable runs to accommodate new offices. After running the cable, you now need to attach the cable to the back of the patch panel. What tool will you need to complete this task? Punch-down tool Cable crimper Loopback plug BNC coupler
Punch-down tool
The utility company you work for is moving to connect the substations to the network. It is a regulatory requirement that proactive security measures against network attacks be implemented immediately. What would you need to do to make sure the network is compliant, and the utility isn't fined? Purchase and install an Intrusion Detection System (IDS) Purchase and install a proxy server Purchase and install an Endpoint Management server Purchase and install an Intrusion Prevention System (IPS)
Purchase and install an Intrusion Prevention System (IPS)
You need to allow network prioritization based on packet contents. What settings would you need to change on your network? QoS Firewall VLAN SSID
QoS
Which of the following means to use a network protocol to prioritize certain types of traffic over others? Quality of Service (QoS) Network Interface Card (NIC) Roaming Aggressiveness Transmit Power
Quality of Service (QoS)
_______ means using a network protocol to prioritize certain types of traffic over others. Enterprise networks can use ______ protocols to make sure traffic such as Voice over IP calling or video conferencing is given higher priority than traffic where the timing of packets is less important, such as ordinary file downloads.
Quality of Service (QoS)
In setting up a new Small Office Home Office (SOHO) network for a small business, you want to ensure that more bandwidth is allocated to business apps and discourage game-playing during work hours. What would you need to configure on the wireless router? Port forwarding Network Address Translation (NAT) Quality of service (QoS) Port triggering
Quality of service (QoS)
What is the second step that CompTIA has identified as best practice for malware removal? Schedule scans and run updates. Identify and research malware symptoms. Quarantine infected systems. Remediate infected systems.
Quarantine infected systems.
challenge question
Questions asked, usually through software but sometimes from a help desk staff member, that only the end-user can answer. A feature of multi-factor authentication or for account recovery.
______ stores the instructions for the operating system of a device. Upgrading _____ would not increase data transfer speeds like an SSD would.
RAM
Which protocol and port number allows a user to view and control the desktop of a remote Windows computer? Telnet over TCP port 23 DNS over TCP port 53 SSH over TCP port 22 RDP over TCP port 3389
RDP over TCP port 3389
REG_BINARY
REG_BINARY is a data type that is raw binary data.
REG_DWORD
REG_DWORD is a data type that is data represented by a 4-byte number. Many parameters for device drivers and services are this type and can be displayed in binary, hex, or decimal format.
Which of the following cloud computing characteristics allows resources to be automatically provisioned to scale up or down as required by the customer? Resource pooling Measured service Rapid elasticity On-demand self service
Rapid elasticity
_____ share permission is when users are permitted to connect to the resources, run programs, and view files. They are not allowed to edit, delete, or create files.
Read
_______ is an NTFS feature that utilizes sector sparing and transaction tracking to provide reliable data transfer. When data is written to an NTFS volume, it is re-read and verified. In the event of a problem, the sector concerned is marked as bad and the data is relocated. Transaction tracking logs all disk and file system activity, making recovery after power outage a faster and more reliable process.
Recovery
backup
Recovery of data can be provided through the use of a backup system. Most backup systems provide support for tape devices. This provides a reasonably reliable and quick mechanism for copying critical data. Different backup types (full, incremental, or differential) balance media capacity, time required to backup, and time required to restore.
You have a Windows 10 system that has failed. It turns out that the operating system needs to be reinstalled. The system did not come with any media. What reinstallation method would be best to try first? OEM license Recovery partition Media download Retail purchase
Recovery partition
_________ distribution is a stable, predictable, manageable and reproducible platform derived from the sources of Red Hat Enterprise Linux (RHEL).
Red Hat/CentOS
Malware often targets the web browser. What is it called when the user tries to open one page but gets sent to another? Redirection Rootkits Hoax virus alerts Rogue antivirus
Redirection
A user's PC is experiencing severe sluggishness. You decide to try a reinstall of the operating system but want to keep user settings and personal files. Which of the below do you try? Reset System restore Refresh Recovery image
Refresh
feed roller
Roller that works with a separation roller or pad to feed just one sheet of paper (or other media) into the printer mechanism.
transfer unit
Roller, corona wire, or belt assembly that applies a charge to the media (paper) so that it attracts toner from the photoconductor. A detac strip then removes the charge to prevent paper curl. On a color laser printer, the transfer unit is usually a belt.
What type of Trojan is a set of tools designed to gain control of a computer without revealing its presence? Ransomware Rootkits Spyware Rogueware
Rootkits
Which protocol provides strong authentication methods and secure communications over insecure channels to allow users to execute commands and manage files? Telnet File Transfer Protocol (FTP) HyperText Transfer Protocol (HTTP) Secure Shell (SSH)
Secure Shell (SSH)
An operating system (OS) provides an interface between defined components. Which of the following is NOT one of those components? Security Users Programs Hardware
Security
End of life operating systems are systems that are no longer supported by the developer. What is the main concern with an end of life operating system? Security Performance Connectivity Administration
Security
The ________ Log is a principal default Windows log file that holds the audit data for the system.
Security
What principal Windows log file holds the audit data for the system? System Log Security Log Application Log Setup
Security Log
You are installing a wireless Small Office Home Office (SOHO) network for a new client. The business is located near an apartment complex and you are noticing a lot of interference on channel 6. What is one of the first steps you could take to resolve this issue? Replace the access point Enable MAC filtering Disable SSID broadcast Select channels 1 or 11 instead
Select channels 1 or 11 instead
What are the Symptoms or Characteristics of a Worm? Self-replicating Tracks user activity Obtains high level privileges, hiding from OS Packaged as useful application Replication requires user interaction Self-Contained Often paired with keylogger Infects firmware code Used by attacker to conceal actions Boot Sector, macro, polymorphic
Self-replicating Self-contained
What type of device most commonly uses a static Internet Protocol (IP) address? Server Laptops Thin clients Computers
Server
You have just purchased a new WiFi router. Which router settings require configuration so that users can start using the router quickly, with the minimum layer of security required? (Select all that apply.) Encryption Service Set ID (SSID) Updating Firmware Strong Passphrase
Service Set ID (SSID) Strong Passphrase
________ start, stop, and pause services.
Services
______ refers to the means of getting users to reveal confidential information about the security system or allowing some sort of access to the organization that should not have been authorized.
Social engineering
driver
Software that creates an interface between a device and the operating system. It may also include tools for configuring and optimizing the device.
Which of the following servers logs event messages sent from networked devices? DHCP server Proxy server Authentication server Syslog server
Syslog server
A _______ message indicates that a local host, or a host on a remote network, can not be contacted. This can be caused by a configuration error or by a router not being available.
destination unreachable
________ opens the Device Manager console.
devmgmt.msc
What windows performance management tool displays a log of "System Stability" events, so you can see at a glance whether a particular application has stopped responding frequently? Reliability Monitor Task Manager Resource Monitor Performance Monitor
Reliability Monitor
_______ view the performance of the local computer.
Reliability and Performance Monitoring
What is a remote access tool that allows a user to ask for help from a technician or co-worker? Remote Desktop Remote Assistance Remote Credential Guard Telnet
Remote Assistance
Which protocol uses Network Level Authentication (NLA) which requires the client to authenticate before a full remote session starts? Virtual Network Computing (VNC) Telnet Remote Desktop Protocol (RDP) Secure Shell (SSH)
Remote Desktop Protocol (RDP)
What are the main uses of Secure Shell (SSH)? (Select two) Trivial File Transfer (TFTP) Network Level Authentication (NLA) Remote administration Secure File Transfer (SFTP)
Remote administration Secure File Transfer (SFTP)
What device is used to overcome network cabling distance limitations? Hub Bridge Access Point Repeater
Repeater
_______ beeps = power supply, motherboard, or keyboard problem. These beeps are different for other manufacturers. A Dell computer with 7 beeps mean a bad CPU.
Repeating short
How much RAM does a 32-bit OS support?
4 GB
Windows 10 32-bit supports how much RAM?
4 GB
Windows 7 (32-bit) supports how much RAM?
4 GB
Users are complaining that a shared printer is no longer printing. You decide to manually delete the print spool data on the Windows computer. Which step do you need to perform first? Delete the spool files. Start the spooler service. Stop the spooler service. Cancel the queue.
Stop the spooler service.
Your organization is likely going to start developing applications for the iOS operating system. Which programming language will be used? Java Swift Javascript Python
Swift
Mission Control
App facilitating multiple desktops in macOS.
_________ is a principal type of cryptographic technology where a single secret key is used to both encrypt and decrypt data. The secret key is so-called because it must be kept secret. If the key is lost or stolen, the security is breached.
Symmetric Encryption
Which one of the following is NOT a required component for a successful virtualization environment? Computer Hypervisor Virtual Machine Symmetric multiprocessing
Symmetric multiprocessing
The ______ Log is a principal default Windows log file that contains information about service load failures, hardware conflicts, and driver load failures.
System
The ______ application provides a Windows interface to some of the configuration information contained in the registry.
System Information
What displays summary information about the computer, including the processor type and installed Random Access Memory (RAM), plus the Windows edition, product key, and activation status? Remote Settings System Protection System Properties System Restore
System Properties
restore points
System Restore takes a snapshot of the system configuration and enables rollbacks to these restore points.
Telnet uses ______ by default. Telnet is terminal emulation software to support a remote connection to another computer.
TCP port 23
_________ is a technology that is used with older scanners. When using various software packages on the computer, such as a word processor, it is used to acquire the image. Always identified with capital letters, it, is not an acronym and has the meaning of "couple."
TWAIN
_______ is a means of entering a secure area without authorization by following close behind the person that has been allowed to open the door or checkpoint.
Tailgating
professionalism
Taking pride in one's work and in treating people fairly.
What allows the user to shut down applications that are not responding? Task Manager Service Default Program Program and Features
Task Manager
What can Windows use for Task Automation? Backup and Restore fsck ckkdsk Package Management launchd Time Machine Disk Utility rsync cron WSUS Task Scheduler App Store
Task Scheduler
_______ is a Windows tool that sets tasks to run at a particular time.
Task Scheduler
SOP
(Standard Operating Procedure)
PAT
(port address translation) Another term for NAT overloading or NAPT.
Cat 6a speed
10 Gbps
raster
A bitmap image of a page for printing. See also Raster Image Processing.
Business client OS
A business client uses an operating system designed to work as a client on a business network.
logical operator
A comparison of more than one condition at the same time by using AND, OR, or XOR.
blackout
A complete loss of electrical power.
exFAT
A file system designed for flash memory cards and memory sticks.
This motherboard is: 12 x 9.6 inches up to 7 expansion slots
ATX
_________ the default management console with multiple snap-ins to configure local users and groups, disks, services, devices, and so on.
Computer Management
A technician is installing Bluetooth speakers in a conference room. Which of the following will be the average operating range of the speakers? A. 10 feet (3 meters) B. 15 feet (5 meters) C. 30 feet (9 meters) D. 45 feet (14 meters)
C. 30 feet (9 meters)
Which of the following cable types typically transmits the video from an analog security camera back to the CCTV system? A. CAT5e B. CAT6 C. RG-59 D. STP
C. RG-59
Which of the following types of connectors can use a maximum of 8 strands of wires? A. RJ-11 B. RS-232 C. RJ-45 D. BNC
C. RJ-45
Time Machine
App facilitating backup operations in macOS.
A technician wants to block remote logins to a server. Which of the following ports should be blocked? A. 21 B. 23 C. 80 D. 443
B. 23
What category of user groups is given a standard set of rights that allows them to perform appropriate system tasks? Built-in Local Groups Administrators Guests Power Users
Built-in Local Groups
What broadband Internet connection combines a fiber optic core network with coax links to premise equipment? Cable Satellite DSL FTTP
Cable
What is the most prevalent physical hazard that computer technicians face? Fuses Equipment Grounding Electrical Hazards High Voltage Device
Electrical Hazards
Which of the following network devices performs microsegmentation by providing an end-to-end virtual circuit between two network nodes? Wireless Network Card Router Hub Ethernet Switch
Ethernet Switch
evil twin
In an evil twin attack, the attacker creates a malicious wireless access point masquerading as a genuine one, enabling the attacker to harvest confidential information as users connect via the AP.
Which operating system is only found installed on one brand of computer? Windows Ubuntu Mac OS Linux
Mac OS
(T/F) Impact printers require an ink-bearing ribbon.
True
Is the URI sip:sam.smith@1234567890 valid?
Yes
Fingerprint ID is what type of authentication factor?
Something you are
Retina Scan is what type of authentication factor?
Something you are
Voice Recognition is what type of authentication factor?
Something you are
Key Fob is what type of authentication factor?
Something you have
Passphrase is what type of authentication factor?
Something you know
Password is what type of authentication factor?
Something you know
Hives
The Windows Registry is made up of hives. Each hive contains a discrete body of configuration data corresponding to an aspect of the system; for example; the SOFTWARE hive contains all the software configuration information. The files comprising the hives are stored in the %SystemRoot%\System32\Config folder.
You are upgrading the sound card for a home theater computer. Which of the following features should you look for in a new sound card? (Select all that apply.) On-board memory Sony/Phillips Digital Interface (S/PDIF) Jack Support for MIDI Support for multiple channel output
Sony/Phillips Digital Interface (S/PDIF) Jack Support for multiple channel output
A user reports that they are having trouble with speakers and headphones. This could be attributed to a problem with the _______.
Sound Card
fuser assembly
The part of a laser printer that fixes toner to media. This is typically a combination of a heat and pressure roller, though non-contact flash fusing using xenon lamps is found on some high-end printers.
luminance
The perceived brightness of a display screen, measured in candelas per square meter (cd/m²).
A user frequently accesses a network share. On Monday, the user sends you an email stating that the share is offline. Which of the following most likely caused the problem? The server hosting the share was updated and is no longer presenting the drive as a share. The user has lost network connectivity. The server has acquired a new IP address. The server has a new FQDN.
The server hosting the share was updated and is no longer presenting the drive as a share.
firmware
This refers to software instructions stored semi-permanently (embedded) on a hardware device. Modern types of firmware are stored in flash memory and can be updated more easily than legacy programmable Read Only Memory (ROM) types.
_______ is the potential for a threat agent or threat actor (something or someone that may trigger a vulnerability accidentally or exploit it intentionally) to "exercise" a vulnerability (that is, to breach security). The path or tool used by the threat actor can be referred to as the threat vector.
Threat
Thunderbolt
Thunderbolt can be used as a display interface (like DisplayPort) and as a general peripheral interface (like USB 3). The latest version uses USB-C connectors.
_______ sets the radio power level. It is typically set to the highest possible by default.
Transmit Power
A Simple Network Management Protocol (SNMP) agent informs the monitor of a port failure. Analyze the functions of an SNMP agent to determine what command the monitor uses for this notification. Set Trap Walk Get
Trap
branch
Used to control the flow within a computer program or script, usually based on some type of logic condition. Often implemented with If or Goto statements.
The ______ applet in Control Panel allows users to manage their accounts.
User Accounts
A DNS server is usually configured to listen for queries on ______ port 53.
User Datagram Protocol (UDP)
Trivial File Transfer Protocol (TFTP) is a connectionless protocol running over _______.
User Datagram Protocol (UDP) Port 69
______ is a first-generation virtualization extension created by Intel. Usually enabled by default, it is required to run virtualization hypervisors such as VMware's ESXi.
VT
_________ is a phase of the installation of an operating system which checks logs and completes tests to confirm that installation has succeeded.
Verify installation
Which type of display peripheral is most commonly used in an office for presentations, can be fixed or portable and uses a lens system? Virtual Reality headset Video projector CRT Monitor TFT Monitor
Video projector
When you want to connect a group of isolated computers in an organization, which of the following is the best choice? Wide Area Network (WAN) Virtual Local Area Network (VLAN) Wireless Local Area Network (WLAN) Network Address Translation (NAT)
Virtual Local Area Network (VLAN)
A PC you are working on is very sluggish. It turns out that the drive is full and there is not enough swap space on the partition. What is the purpose of the swap space? Boot Partition Virtual RAM File allocation table Dynamic disk
Virtual RAM
______ is a weakness that could be triggered accidentally or exploited intentionally to cause a security breach.
Vulnerability
A university relays data to staff and students across its nationwide network, consisting of smaller networks linked through a Virtual Private Network (VPN) and the Internet. Which term would best apply to this network? WLAN WAN LAN MAN
WAN
Which network type is characterized by long-range transmission media connecting geographically diverse users? LAN VPN WAN PAN
WAN
_____ is a newer technology that is used to acquire images within Windows and has replaced TWAIN.
WIA (Windows Image Acquisition)
What can Windows use for Patch Management? Backup and Restore fsck ckkdsk Package Management launchd Time Machine Disk Utility rsync cron WSUS Task Scheduler App Store
WSUS
RAW
When applied to a print job, RAW means the job is fully rendered and ready to be passed to the print device without further processing.
What Windows 10 edition does not support SMP?
Windows 10 Home
Which version of Windows 10 does not support EFS (Encrypting File System)? Windows 10 Education Windows 10 Home Windows 10 Professional Windows 10 Enterprise
Windows 10 Home
You are purchasing a new Windows 10 system. You do not have a requirement of joining a Windows Active Directory Domain. Which version of Windows 10 should you purchase? Windows 10 Enterprise Windows 10 Education Windows 10 Professional Windows 10 Home
Windows 10 Home
Which edition of Windows 10 is designed for small and medium-sized businesses and comes with networking and management features designed to allow network administrators more control over each client device? Windows 10 Pro Windows 10 Home Windows 10 Enterprise/Windows 10 Enterprise (Long Term Channel) Windows 10 Education/Pro Education
Windows 10 Pro
designed for small and medium-sized businesses. This edition comes with networking and management features designed to allow network administrators more control over each client device.
Windows 10 Pro
The company you are providing IT support for has multiple office locations. Due to slow WAN links, you decide to use BranchCache for optimization. Which of the following operating systems uses a limited type of the BranchCache feature? Windows 10 Enterprise Windows 10 Home Windows 10 Education Windows 10 Professional
Windows 10 Professional
You notice that the PC is not joined to the corporate domain. You attempt to join the computer but realize you can't. A business client operating system is required, but some of the extra features like BranchCache are not needed. Which do you purchase? Windows 10 S edition Windows 10 Enterprise edition Windows 10 Home edition Windows 10 Professional Edition
Windows 10 Professional Edition
You are servicing a user's Windows 10 laptop. You notice the laptop does not have the company's finance application installed, and it won't allow you to install it. What edition of Windows is the PC running? Windows 10 S edition Windows 10 Home edition Windows 10 Professional Edition Windows 10 Enterprise edition
Windows 10 S edition
Which Windows operating system does NOT use live tiles as a method for navigation? Windows 8 Windows 10 Windows 8.1 Windows 7
Windows 7
Which version of Windows introduced the concept of tiles as a navigation solution? Windows 10 Windows XP Windows 8.1 Windows 8
Windows 8
Which version of Windows introduced the start screen as a means of navigation? Windows 7 Starter Edition Windows 8 Windows 10 Enterprise Windows 7 Professional
Windows 8
Windows Media Center is a Microsoft app that allows a PC to act as an entertainment center. Which version of Windows offers Media Center as a paid add-on? Windows 7 Home Premium Windows 7 Professional Windows 10 Windows 8
Windows 8
Windows 8
Windows 8 arrived targeting the growing user base of tablet users, Microsoft did away with the familiar start button and introduced tiles to take advantage of touch screen interfaces. Windows 8 is based on x86 architecture.
Windows 8.1
Windows 8.1 was a free update for Windows 8 users. Based on feedback, Windows 8.1 was released with many updates including the return of the start button. Windows 8.1 is based on x86 architecture.
Windows Mobile
Windows Mobile is a legacy operating system that was used for early Microsoft powered smartphones and portable handheld devices.
A user has an older Microsoft Surface tablet for use while traveling. You are having difficulty installing company specific software. Which operating system does this tablet likely have? Windows 8 Windows RT Windows 8.1 Windows Mobile
Windows RT
Windows RT
Windows RT (Run Time) is an early tablet-oriented tablet OS (Operating System) that was introduced along with Windows 8. Windows RT only runs on ARM (Advanced RISC Machines) CPU (Central Processing Unit) powered devices. PC compatible software is typically designed for the x86 architecture and not ARM.
Data Sources
Windows applications can import data from various data sources. The links to different data files and database drivers can be configured from Administrative Tools.
Component Services
Windows applications use various component (COM) models and APIs to share data. Component Services in Administrative Tools allows configuration of component servers.
The file extension for _______ is .bat. They are a collection of command-line instructions that you store in a .BAT file. You can run the file by calling its name from the command-line, or double clicking the file in File Explorer.
Windows batch file
counter logs
Windows log files that allow you to collect statistics about resources and can be used to determine system health and performance.
trace logs
Windows log files that allow you to collect statistics about services, including extensions to Event Viewer to log data that would otherwise be inaccessible.
service
Windows machines run services to provide functions; for example, Plug-and-Play, the print spooler, DHCP client, and so on. These services can be viewed, configured, and started/stopped via the Services console. You can also configure which services run at startup using msconfig. You can view background services (as well as applications) using the Processes tab in Task Manager.
What is a network that refers to the interconnection of many nodes that can establish links to connect to others enabling the content to hop between them until it reaches a destination? Virtual Local Area Network (VLAN) WiFi Wireless Local Area Network (WLAN) Wireless Mesh Network (WMN)
Wireless Mesh Network (WMN)
Which of the following devices attaches to the motherboard of a device to allow the device to communicate wirelessly on a Wi-Fi network? Range extender Wireless Access Point (WAP) Router Wireless network card
Wireless network card
A router downloads configuration files over User Datagram Protocol (UDP) port 69. The router does not have access to browse the directory or to delete files. Analyze File Transfer Protocols (FTPs) and determine what protocol the router is using. Secure File Transfer Protocol (SFTP) Active File Transfer Protocol (FTP) File Transfer Protocol over Secure Sockets Layer (SSL) Trivial File Transfer Protocol (TFTP)
Trivial File Transfer Protocol (TFTP)
What is a program (usually harmful) that is packaged as something else? For example, you might download what you think is a new game, but when you run it, it also installs a key logger and starts sending a transcript of whatever you type to a host on the Internet. Worms Backdoor Trojan Horse Spyware
Trojan Horse
If you cannot diagnose a hardware driver or configuration problem via Device Manager, there are other tools you can use to get more information. Which tools are used to get more information? (Select all that apply.) Troubleshooting App Screen Resolution System Information DirectX Diagnostic Tool
Troubleshooting App System Information DirectX Diagnostic Tool
(True or False) Modems must match the type of link. For example, an Asymmetric Digital Subscriber Line (ADSL) modem must be used for an ADSL connection. You cannot use an ADSL modem for dial-up.
True
If you statically configure IPv4 settings to match the below: IP address: 192.168.1.90 Subnet mask: 255.255.240.0 Default gateway: 192.168.1.1 Answer the following questions: The IPv4 device can communicate directly with 192.168.10.226. (T/F) The subnet mask is represented in CIDR notation as /21. (T/F) Traffic leaving the internal network would travel through 192.168.1.1. (T/F)
True False True
USB 3.2 uses what type of port and connector?
USB-C
What can give away too much sensitive information to third parties? Unauthorized location tracking Data transmission overlimit Unauthorized root accesss Unauthorized account access
Unauthorized location tracking
Which of the following Internet Appliances combines several security services into a single system? Unified Threat Management (UTM) Intrusion Detection System (IDS) Intrusion Protection System (IPS) Authentication server
Unified Threat Management (UTM)
In the network, what does HyperText Transfer Protocol (HTTP) use to submit a request for a resource? Fully Qualified Doman Name (FQDN) Hyperlinks HyperText Markup Language (HTML) Uniform Resource Locator (URL)
Uniform Resource Locator (URL)
You have an Android and an app isn't working and you've already force stopped it. What else can you do?
Uninstall/Reinstall via Setting > Apps
A user has been working in an application on Windows 10. They would like the user to continue the work on a Windows 7 PC. It turns out the application is not available for Windows 7. What type of application might it be? 64-bit application Legacy application Universal application 32-bit application
Universal application
You are installing a Small Office Home Office (SOHO) network. What appliance would you use that requires no configuration, provides basic functions, and ties the network together? Firewall Unmanaged switch Hub Router
Unmanaged switch
You are installing a Small Office Home Office (SOHO) network. What appliance would you use that requires no configuration, provides basic functions, and ties the network together? Router Hub Firewall Unmanaged switch
Unmanaged switch
What is the distance, speed, and frequency of wireless standard 802.11a? Up to 30 meters, maximum speed of 54 Mbps, 5 GHz Up to 45 meters, maximum speed of 288.8 Mbps, 2.4 GHz Up to 45 meters, maximum speed of 54 Mbps, 2.4 GHz Up to 30 meters, maximum speed of 1.7 Gbps, 5 GHz
Up to 30 meters, maximum speed of 54 Mbps, 5 GHz
You have an iOS and an OS reinstall required while saving user data. What iTunes Device Summary option is used to reinstall?
Update Button
You work for a company that sells computer components. A customer recently purchased and installed a new graphics processing unit (GPU) on a Microsoft Windows PC for a gaming rig, but now the customer reports motion trails on the screen while playing games. Which actions do you recommend the user take? (Select all that apply.) Replace the GPU. Update the GPU driver. Install the latest version of DirectX. Reseat the video card.
Update the GPU driver. Install the latest version of DirectX.
If a print job prints "garbage" even after cycling power to the printer, what else can you do to fix the issue? Uninstall and reinstall the printer. Try printing a different file. Realign the belts and cartridges. Update the printer driver.
Update the printer driver.
updates
Updates are made freely available by the software manufacturer to fix problems in a particular software version, including any security vulnerabilities. Updates can be classified as hotfixes (available only to selected customers and for a limited problem), patches (generally available), and service packs (installable collections of patches and software improvements).
You are servicing a user's Windows 10 laptop. It will only allow installations of software from the online Microsoft store. You need to install specialized software for the user's home business. What step do you take? Upgrade to Windows 10 Home Upgrade to Windows 10 Pro Reinstall Windows Reboot the computer
Upgrade to Windows 10 Pro
You upgraded the hard drive in an Intel-based computer. When connecting the power supply to the new hard drive, you realize the existing power connectors do not connect to the new hard drive. What is your solution? Use a PCIe connector. Use a SATA to Molex adapter. Replace the power supply. Use a Molex to SATA adapter.
Use a Molex to SATA adapter.
An _______ bus, allows additional components to be connected to the computer.
external or expansion
Choosing to _____ saves the current session to disk before powering off the computer.
hibernate
A ______ is a feature introduced in Windows 7 and continued in Windows 8 to simplify secure access to shared folders and printers on a home network.
homegroup
While ______ disks are a good compromise between storage and speed, The disks are still not as fast as SSDs, and are more expensive than HDDs.
hybrid
An operating system is generally made up of a number of core files called the _______.
kernel
What can macOS use for Task Automation? Backup and Restore fsck ckkdsk Package Management launchd Time Machine Disk Utility rsync cron WSUS Task Scheduler App Store
launchd
Choosing to ____ will close all open programs and services started under the user account but leave the computer running.
log off
Which of the following Windows commands would you use to tell whether email ports are open on a server? ping netstat nslookup tracert
netstat
A system ______ is an option to roll back any changes to a specific point in time. This can be created manually or automatically.
restore
The fourth step in replacing an existing installation is to
restore data from the previous system using the backup you made.
A _______ is shared by a remote print server. The print spooler runs on the remote print server, and puts every client computer request in queue before processing a print job.
shared printer
Choosing to ____ will close all open programs and services before powering off the computer. The user should save changes in any open files first but will be prompted to save any open files during.
shut down
A system administrator for ABC Company receives a request for a new account. A new employee is onboarding and will receive a Voice over Internet Protocol (VoIP) phone. The employee's name is Sam Smith and the phone number will be 1234567890. The company's domain is @abccompany.com. Develop a Session Initiation Protocol (SIP) Uniform Resource Indicator (URI). (Select two) sip:123456789.abccompany.com sip:[email protected] sip:sam.smith.abccompany.com sip:sam.smith@1234567890
sip:[email protected] sip:sam.smith@1234567890
Incorrect permissions to the ______ could result in an Access Denied message meaning that the user has not been configured with permission to print documents.
spool folder
RAID 6
striping with distributed double parity 4 disk min can lose only two disk 2/n (n is drive) is used for the parity Not for performance write actions Performance for read actions
RAID 5
striping with distributed parity 3 disk min can only lose one disk no matter how many installed 1/n (n is drives) is used for the parity Not for performance write actions Performance for read action
The ______ is a plastic and metal box that houses this second class of components, such as the motherboard, Central Processing Unit (CPU), memory, adapter cards, disk drives, and power supply unit.
system case (or chassis)
The ______ synchronizes the operation of all parts of the PC and provides the basic timing signal for the CPU.
system clock
A ______ message is used when the Time to Live (TTL) of a packet reaches 0. A packet has a maximum TTL of 255, and this value is reduced by one every time the packet crosses a router. A packet looping will eventually result in the TTL reaching 0.
time exceeded
A _____ case is designed to sit vertically on a surface, so that it is taller than it is wide.
tower
A department needs to send a file to a remote server, but the file transfer is failing. Which of the following commands would you use to troubleshoot connectivity issues to the remote server? nslookup netstat ping tracert
tracert
Windows is bundled with several automated ______ utilities. These guide you through the process of installing and configuring a device correctly. The troubleshooters are available from Control Panel in Windows 7 or the Settings app in Windows 10.
troubleshooting
A _______ is the principal means of controlling access to computer and network resources and rights or privileges.
user account
If paper is not feeding into the printer or if the printer is feeding multiple sheets at the same time, check that it is loaded in the tray properly and that it is of an appropriate _______ (not too thick or thin).
weight
A ______, by contrast, lists the users, clients, or addresses that are authorized on the network. Access is denied by default unless that user or machine is specifically granted access.
whitelist
A web server is one that provides client access using the HyperText Transfer Protocol (HTTP) or its secure version (HTTPS). What host name is a common alias to indicate that the resource is a web server? www URL AD FQDN
www
Which of the following peripheral types is MOST likely to be used to input actions into a PC? A. Webcam B. Mouse C. Monitor D. Optical drive
B. Mouse
A customer wants the thinnest laptop possible. Which of the following display technologies typically allows for thinner devices? A. IPS B. OLED C. LCD D. DisplayPort
B. OLED
A user attempts to turn on a computer and receives no response. The user calls the technician to report the computer is not booting and a faint smell of something burning. Which of the following tools will BEST help to identify the issue? A. ESD strap B. PSU tester C. Cable tester D. Loopback plug
B. PSU tester
A customer is terminating an employee for suspected activity that is against company policy. They have called Ann to consult with them on how to best preserve any evidence the company may be required to provide in court. Which of the following would BEST preserve the integrity of the data and best serve the client? A. Create an image of the hard drive and store it on a NTFS drive. B. Remove and secure any HDD from the computer, documenting the process. C. Store the computer in the server room until it is required. D. Lock the user out of the computer and let another employee use it until needed.
B. Remove and secure any HDD from the computer, documenting the process.
You are setting up a PC for a community space. The public PC needs to be secure as possible. Of the following what would assist you in doing so? A. Deactivate SSO B. Require Authentication upon wake up C. Strong admin passwords D. Disable guest account
B. Require Authentication upon wake up
A mobile phone has started to respond slowly and erratically. The user has done a soft reset and the problem still exists. Which of the following is the BEST step the user can take to fix this problem? A. Perform a force stop B. Reset to factory default C. Upgrade to a larger battery D. Close running apps
B. Reset to factory default
A technician is installing new hard drives into a server and needs to set IDs to numbers ranging from 0-15. Which of the following types of drives is the technician installing? A. SATA B. SCSI C. USB D. EIDE
B. SCSI
With which of the following types is a man-in-the-middle attack associated? A. Brute force B. Spoofing C. DDoS D. Zero-day
B. Spoofing
An unattended install needs what to function properly? A. Auto CMD B. Repair File C. Answer File D. Download PDF
C. Answer File
You have an Android and a Hard reset failed. What Settings options can perform a Factory Reset?
Backup and Reset
Which of the following is a sign that the print job file size is too large for the printer? An error code on the control panel "Not available" messages "Low memory" messages "Access Denied" messages
"Low memory" messages
Cat 7 speed
10 Gbps
Windows 7 (64-bit) Enterprise supports how much RAM?
192 GB
USB 3.0 supports data rates up to what?
5 Gbps
GNU
A recursive acronym standing for "GNU is Not UNIX."
Which of the following security methods BEST describes when a user enters a username and password once for multiple applications? A. SSO B. Permission propagation C. Inheritance D. MFA
A. SSO
Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer's design? (Choose two.) A. UPS B. Server rack C. PoE phone D. Desktop printer E. Modem F. Patch panel
A. UPS B. Server rack
A user notices recent print jobs are not printing to the local printer despite printing fine yesterday. There are no errors indicated on the taskbar printer icon. Which of the following actions should the user take FIRST? A. Check to ensure the printer selected is the default printer B. Check the status of the print server queue C. Cancel all documents and print them again D. Check that the printer is not offline print mode
B. Check the status of the print server queue
The feature that allows users to store files in cloud-based when necessary, but can removed when space is freed up, is known as: A. on-demand B. resource pool C. synchronization application D. shared resources
A. on-demand
An ______ is a complex service with many components. Some of the components that you will encounter as an A+ technician include domain controllers, member servers and organizational units.
Active Directory
An _______ account can perform all management tasks and generally has very high access to all files and other objects in the system.
Administrator
Process ID
Also PID. The number assigned to a process.
DB-9
Although the original serial port used a 25-pin male D connector, most PCs today use a male DB-9 (9-pin) port. (See also serial port.)
It may be possible to replace, or supplement use of a dedicated hub with a more generic smart speaker/digital assistant-type hub. Which of the following is an example of a smart speaker type hub? Microsoft Cortana Apple Siri Amazon Echo Google Assistant
Amazon Echo
compiled program
An instruction set in which the programming instructions are performed by the computer processor.
Which of the following mobile operating systems uses an open source model? Windows mobile Blackberry iOS Android
Android
Which of the following features of a mobile device operates the touch screen? A. Gyroscope B. Digitizer C. Accelerometer D. Geotracking
B. Digitizer
A project team is organized to implement a new wireless solution for a school. The team has already done the network diagrams and knows the locations that will need to be addressed in the project. The team is in the process of creating an SOW for the project as a whole and needs to add the critical pieces to the SOW to complete it and move to the next stage. Which of the following would the project team MOST likely add to the SOW? A. Risk analysis B. Plan to change C. Backout plan D. Change board approvals
C. Backout plan
A user tries to download software and is unable to do so. What type of account do they have most likely? A. Admin B. Power user C. Guest D. Flex user
C. Guest
Which of the following is used to facilitate communications with a user's smartphone in order to make purchases and payments by proximity? A. Bluetooth B. IR C. NFC D. WPS
C. NFC
A system board has six slots for memory chips, aligned in two banks. Which of the following is the optimal memory configuration this board supports? A. Multi Mode B. Dual Channel C. Triple Channel D. Single Channel
C. Triple Channel
New offices have been built for additional staffing. You need to install cables in each of these offices. After running the cables, what tool will you need to use to prepare the cables before installing the connectors? Cable stripper Loopback plug Crimper Punch-down tool
Cable stripper
As part of the creation process, a document must be classified depending on how sensitive it is. Classification restricts who may see the document contents. Classification is generally divided into several levels, following military usage. What level is it where viewing is restricted to the owner organization or to third-parties under a Non-disclosure Agreement (NDA)? Unclassified Classified Confidential Secret
Classified
You have an iOS and Apps are unresponsive. How can the apps be stopped forcefully?
Clear App from Multitasking List
iCloud
Cloud storage service operated by Apple and closely integrated with macOS and iOS.
What Windows 8 does not support SMP?
Core
_______ Logs allow you to collect statistics about resources, such as memory, disk, and processor. These can be used to determine system health and performance.
Counter
There are several steps when configuring folder redirection. Which of these steps is the second thing to do, according to Microsoft's suggested order? Create a network file share to use for folder redirection. Create a security group for folder redirection and add group members. Configure Offline Files for folder redirection. Create a folder redirection group policy object.
Create a network file share to use for folder redirection.
How would a technician install Windows OS on a MAC OS computer without using third-party software? A. Terminal B. Boot Disk C. Disk Utility D. Boot Camp
D. Boot Camp
Which of the following charging and data ports has a non-directional connector? A. Micro-USB B. Mini-USB C. USB-A D. USB-C
D. USB-C
Which of the following provides an automatic method for allocating an Internet Protocol (IP) address, subnet mask, default gateway, and Domain Name System (DNS) server addresses? RARP TFTP APIPA DHCP
DHCP
Which protocol is used to automatically provide Internet Protocol (IP) addresses to network computers? DNS ARP DHCP IGMP
DHCP
Boolean values
Data type supporting 1-bit storage, representing FALSE and TRUE. Boolean logic is a statement that resolves to a true or false condition and underpins the branching and looping features of computer code.
string
Data type supporting storage of a variable length series of characters.
integer
Data type supporting storage of whole numbers.
What can door locks be categorized as? (Select all that apply.) Deadbolt Electronic Conventional Token-based
Deadbolt Electronic Conventional Token-based
The _________ reorganizes a drive to store information relating to each file in contiguous sectors of the disk. The __________ can also move data to the start of the disk, leaving a single free area of disk for use by new files.
Disk Defragmenter
The _________ app can be used to verify or repair a disk or file system. It can also be used to erase a disk with security options in case you are selling or passing on a Mac.
Disk Utility
What app can be used to verify or repair a disk or file system in macOS? Disk Utility Patch Management Windows Update Package Manager
Disk Utility
What can macOS use for Disk Maintenance? Backup and Restore fsck ckkdsk Package Management launchd Time Machine Disk Utility rsync cron WSUS Task Scheduler App Store
Disk Utility
What component of the Active Directory is the basic administrative building block in Windows client/server networking? Member Servers Organizational Units (OUs) Domain Accounts Domain
Domain
The New Technology File System (NTFS) is a proprietary file system developed exclusively for use with Windows. Which NTFS feature is a disk management feature allowing space on multiple physical disks to be combined into volumes? Recovery Security POSIX Compliance Dynamic Disks
Dynamic Disks
______ is a disk management feature allowing space on multiple physical disks to be combined into volumes.
Dynamic Disks
Why have so many growing businesses looking for a single solution adopted Unified Threat Management (UTM)? URL filtering Malware inspection Identifies and mitigates ongoing attacks Ease, efficiency, and security
Ease, efficiency, and security
_______ occurs when a path is created that allows electrons to rush from a statically charged body to another with an unequal charge.
Electrostatic discharge (ESD)
Windows 10 ____ are similar to the Pro edition but designed for volume licensing by medium and large enterprises.
Enterprise/Enterprise LTE(Long Term Channel)
In the Event Viewer, the ______ event is when there are significant problems such as service failures and device conflicts.
Error
What refers to logical security technologies designed to prevent malicious software from running on a host and can establish a security system that does not entirely depend on the good behavior of individual users? Trusted/Untrusted Software Sources Disable Auto Run Anti-Virus/Anti-Malware Execution Control
Execution Control
Which of the following features may or may not be found on an MFP (Multifunction Printer)? Faxing Scanning Printing Copying
Faxing
______ is a fiber optic cable that is terminated on a customer's home premise equipment. It is the domestic variant of FTTP.
Fiber to the Home (FTTH)
When seeing the ______ indicator, it means that you configured a disk as dynamic on one computer, then installed the disk in another computer. Right-click the disk and select Import ____ Disk to make it accessible to the system.
Foreign
What is the science of collecting evidence from computer systems to a standard that will be accepted in a court of law? Latent Incident Whistleblower Forensics
Forensics
Which of the following is NOT a data type that is synchronized between mobile devices? Calendar Email Contacts Geolocation
Geolocation
What protocol and port number would you use to secure communication over a computer network? HTTP port number 80 HTTPS port number 80 HTTP port number 443 HTTPS port number 443
HTTPS port number 443
Which of the following mobile touch types is a newer technology in mobiles that features virtual key presses or touches as feeling more real? Multitouch Touchscreen Haptic Feedback Proximity Sensor
Haptic Feedback
You have an Android and a hard reset is needed. What physical action(s) will perform this reset?
Hold Power Button for 10 Sec.
_________ is an OS designed to work on standalone or workgroup PCs in a home or small office.
Home client
The sole purpose of a mail server is to process and deliver incoming and outgoing email. What network protocols are used to carry out these functions? DNS, SMTP, IMAP4 HTTP, SNMP, SMB IMAP, SMTP, POP3 FTP, NTP, SLP
IMAP, SMTP, POP3
What type of backup will backup new files and files modified since last backup? Full Differential Incremental
Incremental
When upgrading the keyboard in a laptop, what do you need to do to make sure the keyboard functions properly? Remove the new ribbon cable. Re-install the old driver. Install a new driver. Install a new keyboard with the same OEM part number.
Install a new driver.
Is Java a OS?
Java is a scripting language and not an OS. Java is used for web browsing and many other functions.
Which of the following ports is a proprietary port that is used on Apple iOS devices? Lightning Thunderbolt USB C (Universal Serial Bus) SATA (Serial Advanced Technology Attachment)
Lightning
Your business has purchased the building across the street and needs an office set up there. You have found out that all physical methods of connectivity are cost prohibitive since the street will have to be excavated. Which would you suggest as being the most effective and reliable connection that is more cost-effective? Cellular Satellite Line of Sight BPL
Line of Sight
What are the two user accounts that are provided by Windows networking? (Select all that apply.) Local Accounts Active Directory Domain Accounts Member Servers
Local Accounts Domain Accounts
A network printer in your office will not print. Users are receiving "Not Available" messages when trying to print. What should you check? Make sure the users have permissions to install printer drivers. Make sure the printer is powered on. Verify that the printer has paper. Verify that users have permission to access the printer.
Make sure the printer is powered on.
A Small Office Home Office (SOHO) Local Area Network (LAN) is a business-oriented network. Which of these are common SOHO network hardware? (Select all that apply.) Modem Router Switch Access Point
Modem Router Switch Access Point
mass storage device
Non-volatile storage devices that are able to hold data when the system is powered off.
When seeing the indicator _____, it means the disk is OK.
Online
Virtual Printer prints to Toner Heat-sensitive Paper Piezoelectric Dot Matrix Extruder PDF
______ is used to set up applications that require more than one port.
Port Triggering
_______ virtual switches found in Microsoft's Hyper-V hypervisor are used to establish network communication between guest virtual machines only. There is no communication to the host.
Private
Windows 10 ____ is designed for small and medium-sized businesses.
Pro
_____ is a second-generation virtualization extension created by AMD that also uses SLAT technology and improves translation of virtual memory to physical memory.
RVI
Which of the following wireless communication standards provide only one-way communication? Radio Frequency Identification (RFID) Infrared (IR) Zigbee Near Field Communication (NFC)
Radio Frequency Identification (RFID)
You have an Android and the device is not booting properly after Factory Reset. What state can you enter using a vendor-specific button combination?
Recovery Mode
You would like to make changes to a Windows system for an international user. With which settings app can you change the date and time format? Personalization Date & Time Language Region
Region
What do you NOT need to take into consideration when replacing laptop speakers? Disconnect the old speaker connectors from the motherboard. Remove the 3.5mm speaker jack from the motherboard. Connect the new speakers to the motherboard. Use the OEM part model of the speakers.
Remove the 3.5mm speaker jack from the motherboard.
_____ is the likelihood and impact (or consequence) of a threat actor exercising a vulnerability.
Risk
A user has asked for a memory upgrade to a laptop that is used while traveling. Which of the following memory module types might be used? (Select all that apply.) SODIMM (Small Outline Dual In-line Memory Module) Mini-DIMM (Mini Dual In-line Memory Module) SIMM (Single In-line Memory Module) RIMM (Rambus In-line Memory Module)
SODIMM (Small Outline Dual In-line Memory Module) Mini-DIMM (Mini Dual In-line Memory Module)
_______ is not a diagnostic tool it is a peronalization setting. It is where you go to adjust the resolution and the color depth of the computer screen.
Screen Resolution
feature updates
Semi-annual updates to the Windows operating system that include enhanced features that are installed in multiple phases, requiring a reboot after each phase of the update installation. Compare with quality updates.
________ endpoints are the end-user devices, also known as user agents.
Session Initiation Protocol (SIP)
You are working on a Windows PC with multiple hard disks. The system is not booting off the correct disk. You've determined that the hardware boot order is correct. What next step could you take in Windows? Convert to a dynamic disk. Set the active partition. Set the boot order. Create the master boot record.
Set the active partition.
You have an Android and apps are unresponsive. Where can the apps be halted?
Setting > Apps > Force Stop
What mail server uses Transmission Control Protocol (TCP) port 25 by default? Simple Mail TransferProtocol (SMTP) Internet Message Access Protocol (IMAP) Post Office Protocol (POP3) MX (Mail Exchanger)
Simple Mail TransferProtocol (SMTP)
There are different guidelines when troubleshooting mobile app issues. What can be caused by newer apps requiring more resources than are available, reduced battery life, and lack of free storage space? Battery Life Slow Performance App Log Errors Apps Not Loading
Slow Performance
You have an iOS and the phone is unresponsive. What would gracefully power cycle the phone?
Soft Reset
Which of the following print defects do dirty feed rollers cause? White stripes Toner specks Streaks Faint prints
Streaks
Your organization wants to implement Bitlocker disk encryption on all company Windows laptops. What system component is required on the motherboards? Secure Boot UEFI TPM LoJack
TPM
_______ is a means of entering a secure area without authorization by following close behind the person who has been allowed to open the door or checkpoint.
Tailgating
POSIX
The Portable Operating System Interface (POSIX) is a family of standards specified by the IEEE Computer Society for maintaining compatibility between operating systems.
motherboard
The computer motherboard, also called the system board, provides the basic foundation for all of the computer's hardware, including the processor, RAM, firmware, and expansion cards. Several motherboard standards are available, each with a different layout and associated advantages.
Orientation
The direction that material appears on a page when printed.
Finder
The file management GUI in macOS.
A Windows 10 system is configured to boot from an internal SATA (Serial Advanced Technology Attachment) hard disk. Which port should the disk be connected to on the motherboard? The highest numbered The lowest numbered The eSATA port The parallel port
The lowest numbered
OS X
The name of the Apple operating system from 2001 through 2016.
calibration (printer)
The process by which the printer determines the appropriate print density or color balance, or how much toner to use.
active listening
The skill of listening to an individual so that you give them your full attention and are not trying to argue with, comment on, or misinterpret what they have said.
You are configuring a virtual desktop infrastructure (VDI) and need to configure the workstations for users. What type of computers will you be configuring? Thick clients Thin clients Virtual desktop environment (VDE) Windows 10 Enterprise
Thin clients
Laser printer uses Toner Heat-sensitive Paper Piezoelectric Dot Matrix Extruder PDF
Toner
The System Configuration Utility is used to modify various settings and files that affect the way the computer boots and loads Windows. Which tab in the System Configuration Utility contains shortcuts to various administrative utilities including System Information, Configuring User Access Control (UAC), and Register Editor? General Tab Boot Tab Service Tab Tools Tab
Tools Tab
______ Logs can collect statistics about services, providing you with detailed reports about resource behavior. In essence, _______ logs provide extensions to the Event Viewer logging data that would otherwise be inaccessible.
Trace
What are the Symptoms or Characteristics of a Spyware? Self-replicating Tracks user activity Obtains high level privileges, hiding from OS Packaged as useful application Replication requires user interaction Self-Contained Often paired with keylogger Infects firmware code Used by attacker to conceal actions Boot Sector, macro, polymorphic
Tracks user activity Often paired with keylogger
A Domain Name Server (DNS) server that needs to allow large record transfers over 512 bytes will be configured to allow connections over ______ port 53.
Transmission Control Protocol (TCP)
Which port will a Domain Name Server (DNS) use for record transfers over 512 bytes? Transmission Control Protocol (TCP) port 53 User Datagram Protocol (UDP) port 53 User Datagram Protocol (UDP) 69 Transmission Control Protocol (TCP) port 23
Transmission Control Protocol (TCP) port 53
In a virtualization environment, a host-based hypervisor is which type of hypervisor? Type 1 Type 2 Emulated Bare metal
Type 2
Thunderbolt 3 uses what type of connector?
USB-C
The ________ is an updated file system for optical media with support for multisession writing.
Universal Disk Format (UDF or ISO 13346)
Services that require complex firewall configuration can use the ________ framework to send instructions to the firewall with the correct configuration parameters.
Universal Plug and Play (UPnP)
When seeing the _____ indicator, it means that the disk is damaged.
Unreadable
standoffs
Used to firmly attach the motherboard to the case, ensuring no other part of the motherboard touches the case.
A user is reporting that the images on their screen are distorted. To solve this, you can check the _____ cable and connector.
Video
In the Event Viewer, the _______ event indicates future problems such as when the system runs low on disk space.
Warning
What Windows key will allow access to the Power Users Menu?
Window + X
What windows key will allow access to the Run dialog box?
Windows + R
similar to the Pro edition but designed for volume licensing by medium and large enterprises.
Windows 10 Enterprise/Windows 10 Enterprise (Long Term Servicing Channel)
You are currently using an older Windows PC. Operating system security updates are no longer available. Which Windows operating system is on your PC? Windows 8 Windows XP Windows 10 Windows 8.1
Windows XP
Which Windows network type is a system a member of by default, and allows the ability to share resources such as folders, files, and printers? Homegroup Peer-to-peer network Workgroup Network and Sharing Center
Workgroup
_______ is a type of network under Windows that a user can decide to give others access to files on his or her PC or to printers that are attached to it.
Workgroup
What is likely to happen if you load printer paper incorrectly? Wrinkled or creased output Persistent marks Toner not fused to paper Blank pages
Wrinkled or creased output
Should you run one or more antivirus software?
You should only run one antivirus program at a time. Having more than one antivirus program active in memory uses additional resources and can result in program conflicts, false virus alerts, and lowered protection.
Which of the following wireless communication standards is a mesh network with a limit of four "hops" between the controller device and endpoint? Infrared (IR) Z-Wave Near Field Communication (NFC) Zigbee
Z-Wave
An _______ sets where the system should boot from. When this partition is marked, the boot sector is populated with a record that points to the Windows boot loader. The disk management tool can be used to modify partitions.
active partition
Installing a printer driver normally requires _____ privileges, though it is possible to configure network security policies that allow users to install printers with signed drivers.
administrator
When the OS is first installed, the account created or used during setup is a powerful local ________ account.
administrator
The first step in replacing an existing installation is to
back up data from an existing system.
A ______ device is a security device such as a fingerprint reader.
biometric
A ______ is list of items, such as usernames or Internet Protocol (IP) addresses, that are denied access to a certain system or protocol.
blacklist
An electrical pathway on the motherboard or through cabling that carries the signals is referred to as a ____.
bus
The ______ consists of several controllers that handle the transfer of data between the CPU and various devices.
chipset
What can Windows use for Disk Maintenance? Backup and Restore fsck ckkdsk Package Management launchd Time Machine Disk Utility rsync cron WSUS Task Scheduler App Store
chkdsk
________ opens the Computer Management console.
compmgmt.msc
________.msc opens the Computer Management console.
compmgmt.msc
Objects have _______ representing different performance statistics and there can be multiple instances of the same type of object.
counters
What can Linux use for Task Automation? Backup and Restore fsck ckkdsk Package Management launchd Time Machine Disk Utility rsync cron WSUS Task Scheduler App Store
cron
A ________ is a principal type of cryptographic technology that makes it impossible to recover the original string from the hash value. This technique can be used to prove that a message has not been tampered with (integrity).
cryptographic hash
A _____ computer refers to a PC that is not designed to be used on the move.
desktop
The top level of the user interface is the _______.
desktop
The top level of the user interface is the _________.
desktop
________ opens the Disk Management console.
diskmgmt.msc
_________.msc opens the Disk Management console.
diskmgmt.msc
The _____ is at the bottom of the screen and gives one-click access to your favorite apps and files.
dock
A ______ is a Windows disk type that allows for spanning and striping to be implemented across multiple disks.
dynamic disk
An _______ system is one that is no longer supported by its developer or vendor.
end of life
An _______ is one that is no longer supported by its developer or vendor.
end of life system
When a device attempts to log onto the network, the ______ program validates user credentials and scans the device to make sure that it complies with defined corporate security policies before allowing access to the network.
endpoint management server
Which file system is a 64-bit file system designed for use with removable media such as flash drives? exFAT CDFS UDF FAT32
exFAT
Which file system can support a volume with a size up to 1 exbibyte (EiB)? HFS NFS ext4 ext3
ext4
PC components that are easily user-replaceable (or upgradeable) are referred to as _________.
field replaceable units (FRUs)
Windows versions are given ______ years of mainstream support and ______ years of extended support (during which only security updates are shipped).
five
On iOS-based mobile devices, calendar, contacts, email are synchronized through which service? iCloud Google drive OneDrive Dropbox
iCloud
iCloud
iCloud is the standard method of synchronizing email, contacts, and calendar information on Apple mobile devices, which are iOS-based.
Which mobile operating system is derived from Unix? Windows 10 Mobile Google Chrome iOS Android
iOS
iOS
iOS is a closed source operating system that is owned by Apple and found on mobile devices such as iPads and iPhones.
The ipconfig switch and argument _________ displays detailed configuration, including DHCP and Domain Name System (DNS) servers, MAC address, and NetBIOS status.
ipconfig/all
An operating system is generally made up of a number of core files called the _____ with additional device drivers and programs to provide extended functionality.
kernel
Keychain
macOS app for managing passwords cached by the OS and supported browser/web applications.
dock
macOS feature for managing applications from the desktop, similar to the Windows taskbar.
A ______ is two sets of interlocking doors inside a small space, where the first set of doors must close before the second set opens. If it is manual, a guard locks and unlocks each door in sequence.
mantrap
A _____ is 512 byte sector on a disk. It is created automatically when creating the partition.
master boot record (MBR)
RAID 10 (1+0)
mirror of stripes 4 disk min can lose 1 disk from each mirrored section but not both disk in a mirror 50% of total storage Has higher performance than RAID 5
If there is a cast or shadow-like effect, one or all of the cartridges, rollers, or transfer belt are probably ________.
misaligned
The ______ provides the interface between the hardware, application programs, and the user.
operating system
The _____ provides the interface between the hardware, application programs, and the user.
operating system (OS)
An echo request/reply message is used with the _____ utility.
ping
Which of the following Windows commands would you use to tell if a printer has network connectivity? nslookup netstat tracert ping
ping
There may be three _______ partitions and one extended partition.
primary
System memory uses a type of memory technology called ______.
random access memory (RAM)
A ______ image is an install image that is provided by the system manufacturer. It is typically located on a disk partition and includes all software and drivers that shipped with the system.
recovery
A ________ message is used if there are multiple routers and a more efficient route can be identified.
redirect
A system ______ is an option that was added beginning with Windows 8. With this, Windows is reinstalled while keeping certain settings and personal files intact.
refresh
The third step in replacing an existing installation is to
reinstall software applications and utilities.
A system ______ is an option that will perform a reinstall to default Windows out of the box settings.
reset
What can Linux use for Backups? Backup and Restore fsck ckkdsk Package Management launchd Time Machine Disk Utility rsync cron WSUS Task Scheduler App Store
rsync
When replacing the system board, you need to detach the ________ that hold the board to the chassis.
stand-offs
Collate
to arrange into the proper order, especially documents
Is RAM volatile or non-volatile?
volatile
To remove a file from a directory or a disk using the del command, the _____ switch will suppress prompt for read-only files.
/f
enclosure
A container with its own air filters and fans to protect computers or other devices in dirty or dusty environments.
USB On the Go (OTG)
A USB standard that allows a port to function as either a host or as a device.
kernel
A low-level piece of code responsible for controlling the rest of the operating system.
developer roller
A magnetized roller to which toner adheres during the printing process. See also developer unit.
configuration management
A means of identifying all components of the information and communications technology infrastructure, including hardware, software, and procedures, and the properties of those items.
Windows Server
A network operating system typically used for private network servers and Internet servers running web, email, and social networking apps.
separation roller
A roller in a paper tray that pushes the stack of paper back, allowing only a single sheet of paper to be fed into the printer.
Which of the following wireless standards is only capable of 5GHz frequencies? (Choose two) A. 802.11a B. 802.11ac C. 802.11b D. 802.11g
A. 802.11a B. 802.11ac
Which of the following is a security threat that disguises itself as legitimate software? A. Trojan B. Worm C. Virus D. Spyware
A. Trojan
_________ is one of the functions for the overall operation of an access control system that means recording when and by whom a resource was accessed.
Accounting
A user wants pages 1-5 separated from 6-8 when they are retrieved from the printer. Which of the following settings would the user change in the print job to ensure the pages are separated? A. Duplex B. Collate C. Orientation D. Quality
B. Collate
A user, Joe, is watching a training education video and notices dark pin-sized dots in the same location on his laptop LCD screen. Which of the following is the cause of this issue? A. Distorted image B. Dead pixels C. Pixelation D. Incorrect color palette
B. Dead pixels
Which of the following is a reason to use WPA over WEP? A. Device compatibility B. Increased security C. TACACS D. Multifactor authentication
B. Increased security
A technician needs to perform a backup while a system is running. Which of the following services allows this task to be accomplished? A. Robocopy B. Shadow copy C. Xcopy D. System restore
B. Shadow copy
Which of the following communication technologies is typically used to create a PAN (Personal Area Network)? Bluetooth IP (Internet Protocol) Gateway NFC (Near Field Communication)
Bluetooth
A technician, Anne, notices there are no hardware volume control buttons on the new laptops that were ordered. Which of the following would control the volume on the laptop? A. Software only B. Bluetooth C. Function keys D. WiFi switch
C. Function keys
Legacy software needs to be installed on a netbook. Which of the following is MOST likely needed in order to install the software? A. Lightning port B. Bluetooth adapter C. USB optical drive D. NFC chip
C. USB optical drive
The _____ is a legacy file system used for CD optical disk media (CD-Rom and CD-R).
Computer Disk (CD) File System (CDFS or ISO 9660)
Which of the following devices requires 3.3V of power from the motherboard? A. SLI Video Game B. DVD-ROM Drive C. USB Port D. Serial Port Card
D. Serial Port Card
firewall
Hardware or software that filters traffic passing into or out of a network. A basic packet-filtering firewall works at Layer 3 (Network). Packets can be filtered depending on several criteria (inbound or outbound, IP address, and port number). More advanced firewalls (proxy and stateful inspection) can examine higher layer information, to provide enhanced security.
RFID is what type of authentication factor?
Something you have
RSA Token is what type of authentication factor?
Something you have
Smart Card is what type of authentication factor?
Something you have
Which of the following peripheral devices is part of a 5.1 digital system? Microphone Speaker Webcam Camera
Speaker
A faulty _______ could cause a paper jam. Normally, the strip removes the high static charge from the paper. If the strip fails, the paper may stick to the drum or curl as it enters the fuser unit.
Static Eliminator Strip
Each disk and drive displays status indicators in the Disk Management program. What indicator will show up if the disk is damaged? Online Not Initialized Unreadable Foreign
Unreadable
The Event Viewer displays each line or item in the source log file as an event and categorizes each event. What type of event may indicate future problems, such as when the system runs low on disk space? Information Warning Error Failure Audit
Warning
What should you check if paper is not feeding into the printer correctly? Misaligned cartridges, rollers, or transfer belt Toner cartridge Faulty Static Eliminator Strip Weight of the paper
Weight of the paper
You have an older desktop PC that you connect to the network using Ethernet, but you would like to add WiFi to it for those occasions when you might need it. You do not want to have to replace the existing motherboard and want the best throughput. What's the best way to do this? You can install a PCI-E WiFi card. You can use a USB WiFi adapter. You can use the built-in WiFi. You can upgrade the existing Ethernet card.
You can install a PCI-E WiFi card.
You have an older desktop PC that you connect to the network using Ethernet, but you would like to add WiFi to it for those occasions when you might need it. You do not want to have to replace the existing motherboard and want the best throughput. What's the best way to do this? You can install a PCI-E WiFi card. You can use the built-in WiFi. You can upgrade the existing Ethernet card. You can use a USB WiFi adapter.
You can install a PCI-E WiFi card.
DVI
(Digital Video Interface) A video adapter designed to replace the VGA port used by CRT monitors. The DVI supports digital only or digital and analog signaling.
GPT
(GUID Partition Table) A modern disk partitioning system allowing large numbers of partitions and very large partition sizes.
PATA
(Parallel Advanced Technology Attachment) Used to be the main disk interface for PCs. The interface was very commonly called IDE (Integrated Drive Electronics) or Enhanced IDE (EIDE). Each PATA adapter supports two devices, commonly called master and slave. A drive is connected to the bus by a 40-pin ribbon cable. The PATA interface has been replaced by SATA.
PCI bus
(Peripheral Component Interconnect bus) Introduced in 1995 with the Pentium processor, it connects the CPU, memory, and peripherals to a 32-bit working at 33 MHz. PCI supports bus mastering, IRQ steering, and Plug-and-Play. Later versions defined 64-bit operation and 66 MHz clock but were not widely adopted on desktop PCs.
PSK
(Pre-shared Key) Symmetric encryption technologies, such as those used for WEP, require both parties to use the same private key. This key must be kept a secret known only to those authorized to use the network. A pre-shared key is normally generated from a passphrase.
QR codes
(Quick Response codes) A 2D barcode created of black and white squares used to store information that can be read using a barcode scanner or the camera on a smartphone that has a barcode scanning app installed.
SNR
(Signal-to-Noise Ratio) A sound measurement that is expressed in decibels that compares the signal power with the noise power.
VGA Connector
(Video Graphics Array connector) A 15-pin HD connector has been used to connect the graphics adapter to a monitor since 1987. The use of digital flat-panel displays rather than CRTs means that as an analog connector, it is fast becoming obsolete.
ESD
(electrostatic discharge) The release of a charge from a metal or plastic surface that occurs when a potential difference is formed between the charged object and an oppositely charged conductive object. This electrical discharge can damage silicon chips and computer components if they are exposed to it.
FRU
(field replaceable unit) An adapter or other component that can be replaced easily and quickly by a technician on-site, without the need for repair services. Most PC and laptop components are FRUs, while the components of smartphones are not.
FFF
(fused filament fabrication) A 3D printing method which lays down each layer of filament at high temperature, and as layers are extruded, adjacent layers are allowed to cool and bond together before additional layers are added to the object.
HBA
(host bus adapter) A component allowing storage devices to exchange data with a computer system using a particular interface (PATA, SATA, SCSI, and so on). Motherboards will come with built-in host adapters and more can be added as expansion cards if necessary.
LED printer
(light emitting diode printer) A type of printer that uses LEDs to print.
What is the file extension for PowerShell? .ps1 .bat .sh .py
.ps1
To remove a file from a directory or disk using the del command, the _______ switch will prompt a delete for each file.
/p
To remove a file from a directory or a disk using the del command, the ____ switch will suppress prompt on a wildcard delete.
/q
Standard User account
A Microsoft Windows user account recommended for day-to-day operations, which has much more limited capabilities than the Administrator account, and is able to run installed programs.
Which tool would you use to troubleshoot network issues such as interference and signal strength on a wireless network? A tone generator and tone probe A loopback plug A Wi-Fi spectrum analyzer An Intrusion Detection System
A Wi-Fi spectrum analyzer
Windows Resource Protection
A Windows feature that prevents essential system files, folders, and registry keys from being replaced to help prevent application and operating system failure.
recovery image
A custom image that contains the current state of the operating system files, plus all of the desktop applications installed to the boot partition.
hot swappable
A device that can be added or removed without having to restart the operating system.
resolution
A measure of the number of picture elements (pixels) that imaging devices (displays and printers) can use to sample or display an image.
backed up print queue
A problem situation where there are lots of jobs pending but not printing.
maintenance kit
A set of replacement feed rollers, new transfer roller, and a new fuser unit for a laser printer.
direct thermal printer
A thermal printer that uses heated pins to form images directly onto specially coated thermal paper.
Which of the following ports are used for secure sessions? (Select two.) A. 22 B. 23 C. 25 D. 80 E. 110 F. 443
A. 22 F. 443
A user brings in a smartphone for repair. The device is unable to send/receive calls or connect to WiFi. All applications on the device are working unless they require connectivity. Which of the following is MOST likely causing the problem? A. Airplane mode B. Tethering C. Disabled hotspot D. VPN
A. Airplane mode
Which of the following provide the BEST security for a server room? (Select two.) A. Badge reader B. Bollard C. Biometric lock D. Cable lock E. USB token F. Privacy window shades
A. Badge reader C. Biometric lock
Of the following what would provide the best physical security for a server room? A. Biometric Lock B. VPN C. Cable Locks D. Privacy Tint
A. Biometric Lock
Ann, a user, has a phablet for personal and work usage. She finds that her phablet starts to exhibit slow performance after a couple of hours and that the problem worsens as the day goes by. If Ann restarts the device, it works fine for a couple of hours and then starts to run slow again. Which of the following is the BEST action to troubleshoot this problem? A. Check running apps B. Reset to factory default C. Disable cloud syncing D. Replace the device's battery
A. Check running apps
Several computers are having network connectivity issues. Two of the computers are wired and are not having any issues. The technician verifies that none of the computers having issues have been assigned a static IP. Which of the following should the technician check NEXT? A. Check the closest AP for the area. B. Check each wireless adapter switch C. Check the group's network switch. D. Check the DHCP server.
A. Check the closest AP for the area.
Which of the following should be used to ensure that a Windows OS is functioning optimally? A. Driver updates B. Scheduled backups C. Application updates D. Restore points
A. Driver updates
A user calls the help desk because a folder containing critical business files is missing from the local drive. The user is adamant that the folder was there the previous day, and cannot understand why it is gone. The technician views the properties of the parent folder and sees a back up listed on the "Prior Versions" tab. According to the theory of troubleshooting, which of the following is the technician's NEXT step? A. Establish a theory of probable cause B. Establish a plan of action and implement the solution C. Document findings, actions and outcomes D. Verify full system functionality and implement preventive measures
A. Establish a theory of probable cause
A technician is tasked with setting up a user's webmail on a tablet, phone, and laptop. The user would like the data synced to all three devices. Which of the following items can be synced to the devices via webmail? (Select THREE). A. Free/busy B. Programs C. Documents D. Calendar E. Favorites F. Social media G. Contacts
A. Free/busy D. Calendar G. Contacts
An IT Director wants to increase security on the company website to prevent man-in-the-middle attacks. Which of the following Internet protocols should be implemented to meet the requirement? A. HTTPS B. IMAP C. TELNET D. SMTP
A. HTTPS
A company that manages its own cloud, while utilizing a third-party vendor to help manage storage, is implementing which of the following infrastructure types? A. Hybrid B. Community C. Private D. Public
A. Hybrid
A technician wants to set up a virtual machine in a public cloud environment. Which of the following cloud models should the technician use? A. IaaS B. SaaS C. PaaS D. DBaaS
A. IaaS
A user calls the helpdesk reporting that when accessing the company portal, it redirects to an unfamiliar website. Which of the following steps would the technician take to resolve this issue using best practices? A. Identify symptoms, quarantine infected system, and create restore point. B. Quarantine infected system, identify symptoms, and create restore point. C. Identify symptoms, educate end user, and create restore point. D. Create restore point, identify symptoms, and quarantine infected system.
A. Identify symptoms, quarantine infected system, and create restore point.
Why is it recommended that you disable the Universal Plug and Play (UPnP) feature on your router? A. It makes it easy for hackers to discover the router and hijack the network. B. It increases signal interference with other wireless devices. C. It requires Wired Equivalent Privacy (WEP) encryption, which is the weakest type of wireless encryption. D. It is a power-hungry service and consumes more electricity.
A. It makes it easy for hackers to discover the router and hijack the network.
A user is searching for a piano keyboard to connect to a PC. The user would like the keyboard to communicate with the PC. Which of the following features should the user look for on a piano keyboard to BEST facilitate this? A. MIDI B. USB C. TCP D. HDMI
A. MIDI
Which of the following BEST describes the purpose of an ESD mat? A. Protects against accidental static discharge B. Protects against dust/dirt contamination C. Protects against accidental scratches D. Protects against accidental water damage
A. Protects against accidental static discharge
A user states there are multiple small black dots on an LCD screen. Which of the following should be done to resolve the issue? A. Replace monitor. B. Replace video card. C. Replace video cable. D. Replace power supply.
A. Replace monitor.
An administrator has a new workstation that has been loaded with the Windows OS and configured with the proper IP settings. The workstation needs to be added to the corporation's domain. Which of the following utilities will the administrator access to configure this setting? A. System Properties B. System Information C. System Protection D. System Management
A. System Properties
Which of the following security threats happens when another person enters a secured area with an authorized person? A. Tailgating B. Shoulder surfing C. Spoofing D. Phishing
A. Tailgating
A newly deployed Windows PC cannot connect to the antivirus server on the local network for updates, but it can connect to other file servers and printers without issue. Which of the following is the MOST likely cause of this issue? A. The PC's Windows firewall is misconfigured B. The PC has an incorrect IP address configured C. The PC is on the wrong wireless network D. The PC does not have remote assistance turned on
A. The PC's Windows firewall is misconfigured
A laptop has a network port that is not working consistently and wireless is out of range. Which of the following would the technician do to quickly get the laptop back on the wired network? A. Use a USB to RJ-45 dongle B. Enable Bluetooth C. Enable NIC teaming D. Replace the motherboard
A. Use a USB to RJ-45 dongle
Which of the following will help to protect an organization from further data exposure AFTER a list of user passwords has already been leaked due to policy breach? (Select TWO). A. Use multi-factor authentication B. Require strong passwords C. Enable file encryption D. Educate end users E. Restrict user permissions
A. Use multi-factor authentication D. Educate end users
______ provides access to Windows server based resources. It would prompt for credentials after Windows has started and not immediately at boot time.
Active Directory
shell
An OS component that interacts directly with users and functions as the command interpreter for operating systems.
surge
An abrupt but brief change in the value of the voltage, lasting from a few billionths of a second (a transient) to a few thousandths of a second.
grounded
An equipment ground provides a safe path for electrical current to flow away in the event that a device or cable is faulty. Self-grounding removes any static potential difference between a technician's clothes and body and a device they are handling, reducing the risk of damaging the component through Electrostatic Discharge (ESD).
parity checking
An error checking method where each byte of data in memory is accompanied by a ninth bit used to check for corrupted data.
IPS
An intrusion prevention system (IPS) is a form of network security that works to detect and prevent identified threats.
superuser
Another term for the root user.
_______ is a principal type of cryptographic technology that if a public key is used to encrypt data, only a mathematically related private key can be used to decrypt it.
Asymmetric Encryption
A user is trying to set up a microphone, headset, and speakers. They should look at the _____ settings to configure these.
Audio
Which of the following is the MAXIMUM number of 10Mb audio files that a user can store on a CD- RW? A. 50 B. 70 C. 100 D. 120
B. 70
Which of the following Windows OS capabilities allows modern Windows versions to run applications written for older versions natively? A. Microsoft Virtual PC B. Compatibility mode C. Hyper-V D. Virtual XP mode
B. Compatibility mode
Which of the following is designed to function BEST in harsh lighting conditions? A. Large tablet B. E-reader C. Smart watch D. Virtual reality headset
B. E-reader
A customer's Windows 10 Home Premium computer displays a stop error and automatically reboots. Which of the following system utilities can a support technician use to find more information about the cause of the error? A. Action Center B. Event Viewer C. File Explorer D. Disk Management
B. Event Viewer
Which of the following Windows utilities would MOST likely be used to identify system errors? A. System Restore B. Event Viewer C. Security Center D. Windows Defender
B. Event Viewer
What is the most secure method of securing your smartphone? A. Passcode B. Fingerprint Lock C. PIN D. Swipe Unlock
B. Fingerprint Lock
A user is reporting toner smudging on paper after printing. Which of the following should the technician inspect? A. Print spooler B. Fuser C. Rollers D. Maintenance kit
B. Fuser
Which of the following BIOS level settings allow an administrator to view warnings on possible hardware level changes? A. Drive lock B. Intrusion detection C. BIOS password D. Trusted platform module
B. Intrusion detection
A customer's laptop display has suddenly become very dim. The image of the display can only be seen with a bright, external light, as adjusting the brightness/contracts controls does not cause much change. Which of the following components MOST likely needs to be replaced? A. LCD panel B. Inverter C. Video card D. Digitizer
B. Inverter
Which of the following display types does NOT use an inverter (choose two)? A. LCD (Liquid Crystal Display) TFT (Thin Film Transistor) B. LCD (Liquid Crystal Display) with LED (Light Emitting Diode) C. OLED (Organic Light Emitting Diode) D. Digitizer
B. LCD (Liquid Crystal Display) with LED (Light Emitting Diode) C. OLED (Organic Light Emitting Diode)
Ann, a user, calls a technician and reports that her PC will not boot. The technician confirms the memory, power supply, and monitor are all working. The technician runs internal diagnostics on the PC, but the hard drive is not recognized. Which of the following messages will be displayed? A. NTLDR not found B. No boot device available C. Operating system not found D. BIOS ROM checksum error
B. No boot device available
Which of the following connectors are commonly used for fiber optic cables? A. RJ-11 and RJ-45 B. ST and LC C. F-connectors D. BNC
B. ST and LC
Virtual machines provide users with the ability to do which of the following? A. Extend 32-bit machines to 64-bits B. Share hardware resources C. Increase the network download speed D. Use less memory in the machine
B. Share hardware resources
A user wants to save a file into another user's directory, but the file save is denied. Which of the following is the MOST likely reason the file save cannot be completed? A. The user must be a member of the Users group B. The user requires write permissions to the folder C. The user requires read permission to the folder D. The user must be a member of the Administrators group
B. The user requires write permissions to the folder
A laptop is setup at a podium for a presentation but is set to extended desktop. The presenter would like it to show exactly what the laptop screen is showing. Which of the following would be the QUICKEST way to accomplish this? A. Look for the setting in control panel B. Toggle the dual display function key C. Change the screen orientation D. Reboot the laptop
B. Toggle the dual display function key
A technician is working on a home theater PC in a location where the electrical system may not be properly grounded. As the technician is finishing the installation, which of the following should the computer technician do before connecting a cable TV line to a TV tuner card? A. Perform self-grounding B. Unplug the computer power cable C. Use an ESD strap D. Require the electrical system be brought up to code
B. Unplug the computer power cable
A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources. Which of the following protocols and authentication methods should the technician implement? (Select two.) A. WPA B. WPA2 C. WEP D. TKIP E. RADIUS F. Multifactor G. TACACS H. SSO
B. WPA2 F. Multifactor
A network administrator has a requirement to implement a WiFi hot-spot for the public. Which of the following should be used for secure access? A. WEP and TKIP B. WPA2 and AES C. WPA and static IPs D. WPA2 and MAC filtering
B. WPA2 and AES
A new help desk technician receives a trouble call from a user. The issue is something the technician has never encountered before, and does not know where to begin troubleshooting. The FIRST course of action is for the technician to: A. tell the customer the issue needs to be escalated to a higher tier technician. B. ask the customer if they would mind holding for no more than two minutes to check resources. C. tell the customer this is the first time encountering the issue and to please be patient. D. ask the customer to please hold while a senior technician is consulted regarding the issue.
B. ask the customer if they would mind holding for no more than two minutes to check resources.
The type of security threat that uses computers or other networks to accept and pass on viruses is called: A. phishing. B. botnets. C. logic bomb. D. man-in-the-middle.
B. botnets.
A customer has left a computer monitor on over the weekend and now notices slight discoloration of the screen. This is an example of: A. a failing backlight. B. burn in. C. a bad inverter. D. dead pixels. E. EMI.
B. burn in.
_______ enables the user to encrypt all the information on a disk drive.
BitLocker
A technician needs to attach an RJ-45 connector to a Cat 5e Ethernet cable, what tool would the technician use? Crimper Punch-down tool BNC coupler Reflectometer
Crimper
A user is requesting a cable to charge and transfer data for an Apple mobile device. Which of the following connection types would satisfy the user's requirements? A. MicroUSB B. Molex C. MiniUSB D. Lightning
D. Lightning
A technician is setting up a VM for use in testing software deployments. The VM is offline, but the hypervisor is not. Which of the following settings should the technician change to resolve this issue? A. Virtual security B. Virtual storage C. Virtual CPU D. Virtual switch E. Virtual RAM
D. Virtual switch
Which of the following components is responsible for converting light into digital information? A. Microphone B. Digitizer C. Inverter D. Webcam
D. Webcam
Devices on a network are automatically assigned IP addresses for a designated time after which the IP address is either renewed or a new one is assigned. What is this called? DHCP reservation Dynamic addressing Static addressing Subnetting
Dynamic addressing
Which of the following is NOT a common layer where network resources fail? Application/OS Security Name resolution Email
can be used to apply file- or folder-level encryption.
Encrypting File System (EFS)
_______ allows monitoring of Windows logs. System, security, and application events are recorded in these logs. There are also application- and service-specific logs.
Event Viewer
unified file system
Everything available to the Linux OS is represented as a file in the file system, including devices.
Which of the following network devices is considered a legacy device and is used to implement a star topology? Hub Router Ethernet Switch Bridge
Hub
You are considering a computer to be used as a host in a virtualized environment. Which of the following is NOT a virtualization specific hardware feature? Hyperthreading Intel VT-x AMD-V Second Level Address Translations
Hyperthreading
What is used in a program to access a program element? Variable Constant Identifier Environment variable
Identifier
constant
Identifier for a value that is fixed before program execution and does not change.
file system hierarchy
In Linux, the directory structure starting with the root directory (/) with directories and subdirectories below it to store files.
For a user who registers on a secure website, identify the protocol, transport(s), and port number(s) in use. In use is SNMP over UDP on port number 161. In use is SSH over TCP on port number 22. In use is HTTP over TCP on port number 80. In use is HTTPS over TCP on port number 443.
In use is HTTPS over TCP on port number 443.
A user is requesting to replace their current Windows 8.1 operating system with Windows 10. It has been requested that the same applications be reinstalled with the same settings after the upgrade. Which installation type is recommended? Repair installation Clean install Image deployment In-place upgrade
In-place upgrade
_______ allows you to view and edit the current security policy. A computer that is a member of a domain will have the security settings defined in the domain security policy.
Local Security Policy
________ allows you to view and edit the current security policy. A computer that is a member of a domain will have the security settings defined in the domain security policy.
Local Security Policy
_____ are one of the user accounts provided by Windows networking. They are stored in the Local Security Accounts database known as the Security Account Manager (SAM), stored in the registry, as a subkey of HKEY_LOCAL_MACHINE.
Local accounts
____ is a limited account used to run services that cannot make system-wide changes. _____ can access the network anonymously.
LocalService
iOS
Mobile OS developed by Apple for its iPhone and iPad devices.
______ is a type of OS designed to run on servers in business networks.
Network Operating System (NOS)
When seeing the _____ indicator, it means that a new unpartitioned disk was added. A wizard runs, prompting you to initialize, partition and format the disk.
Not Initialized
What are the Symptoms or Characteristics of a Rootkits? Self-replicating Tracks user activity Obtains high level privileges, hiding from OS Packaged as useful application Replication requires user interaction Self-Contained Often paired with keylogger Infects firmware code Used by attacker to conceal actions Boot Sector, macro, polymorphic
Obtains high level privileges, hiding from OS Infects firmware code
Which one of these refers to a wireless connection to connect devices within a few meters? VLAN WiFi LAN PAN
PAN
There can be many different symptoms of malware infection. What is the symptom called when the computer is slow or "behaving oddly"? Application Crashes and Service Problems File System Errors and Anomalies Event Viewer Performance Symptoms
Performance Symptoms
The ______ group still appears to support legacy applications, but its use is strongly deprecated. The rights allocated to this account type can be abused to allow the user to obtain more powerful Administrator or System privileges.
Power Users
Front panel connectors can include what?
Power button (soft power) Drive activity lights Audio Ports
________ allows you to uninstall a program or add or remove component features of software such as Microsoft Office.
Program and features
apps
Programs installed via a vendor store interface that extend the functionality of a computing device. An app must be written and compiled for the particular operating system used by the device.
Lightning ports
Proprietary connector and interface for Apple devices.
The file extension for ______ is .py. This is a general-purpose programming language that can be used to develop many different kinds of applications. It is designed to be easy to read and a program using much fewer lines of code when compared to other programming languages.
Python
Which of the following wireless communication standards provide only one-way communication? Radio Frequency Identification (RFID) Near Field Communication (NFC) Zigbee Infrared (IR)
Radio Frequency Identification (RFID)
What type of device is designed to filter and transfer data packets between dissimilar types of computer networks? Switch Firewall Router Hub
Router
A client wants to build a custom desktop computer that loads applications quickly, as well as be able to boot into Windows faster. Which of the four components, whether upgraded or a new purchase, will fulfill this need? SSD 15K HDD GDDR5 GPU Quad Core CPU
SSD
Which one of the following devices is typically the default boot device on a Windows PC? USB SSD Optical PXE
SSD
A user is running Windows 10 with a VGA monitor but cannot get the resolution to work properly. To solve this, you recommend that they get a monitor that supports _______.
SVGA
Which of these is an internet connection type that provides far bigger areas of coverage but tends to experience quite severe latency problems? DSL Cellular ISDN Satellite
Satellite
A user is having difficulty with the OCR. The problem could be a result of their _____ settings.
Scanner
program
Software that provides functionality such as word processing, graphics creation, database management, or other productivity or entertainment uses.
PIN is what type of authentication factor?
Something you know
You are installing an older scanner for a user. Which type of scanning acquisition software will likely be used? TWAIN WIA (Windows Image Acquisition) Optical Character Recognition (OCR) Contact Image Sensor (CIS)
TWAIN
system clock
The computer's timing mechanism that synchronizes the operation of all parts of the computer and provides the basic timing signal for the CPU; measured in MHz or GHz.
frame rate
The number of times the image in a video stream changes per second. This can be expressed in Hertz or Frames per Second (fps).
print job
The output produced by an application and passed to the printer, and then to the print device via a print monitor and port.
sector
The regularly sized subdivision of a drive track. During low-level formatting, the size and position of the sectors is written to the disk so that the data can be placed into uniform spots that the drive head can easily access.
Resource pooling
This is the NIST definition of cloud resource pooling: 'The provider's computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. There is a sense of location independence in that the customer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter). Examples of resources include storage, processing, memory, and network bandwidth.'
Which delivery method and protocol may send data out of order and over different paths? (Select two) UDP TCP Connectionless Connection-oriented
UDP Connectionless
What should you check if paper is not feeding into the printer correctly? Misaligned cartridges, rollers, or transfer belt Toner cartridge Weight of the paper Faulty Static Eliminator Strip
Weight of the paper
Which encryption protocol should one use on a SOHO (Small Office Home Office) wireless access point? Wired Equivalent Privacy (WEP) WiFi Protected Setup (WPS) WiFi Protected Access (WPA) WiFi Protected Access 2 (WPA2)
WiFi Protected Access 2 (WPA2)
designed for domestic consumers and Small Office Home Office (SOHO) business use. This edition cannot be used to join a Windows domain network.
Windows 10 Home
Which version of Windows includes a Charms Bar as a means of navigation? Windows 10 Windows 7 Home Premium Windows 8.1 Windows 7 Home Basic
Windows 8.1
Does Windows 10 Enterprise support BranchCache?
Yes. Windows 10 Enterprise edition is a business version of Windows 10 that has more features than Windows 10 Professional including BranchCache.
Internet of Things (IoT) door locks can offer a good deal of convenience when leaving and entering your home. However, there are several things you should consider before installing an IoT door lock. Which of these is NOT a consideration? You should make sure the door lock fits. You should make sure the door closes properly. You should use good batteries. You will need to replace your deadbolt.
You will need to replace your deadbolt.
The ______ Log is a principal default Windows log file that contains information regarding application errors. There are many other logs stored under the _________ log. You would investigate these when troubleshooting a particular Windows service or third-party application.
Application
AUP
(Acceptable Use Policy) A policy that governs employees' use of company equipment and Internet services. ISPs may also apply AUPs to their customers.
ACPI
(Advanced Configuration and Power Management Interface) An open standard to communicate between the operating system and hardware to enable power management features.
BSOD
(Blue Screen of Death) A condition that indicates an error from which the system cannot recover (also called a stop error). Blue screens are usually caused by bad driver software or hardware faults (memory or disk).
BCD
(Boot Configuration Data) Windows stores information about operating systems installed on the computer in a boot configuration data store, located in \boot\bcd on the system partition. The BCD can be modified using the bcedit command-line tool or MSCONFIG.
CAB
(Change Advisory Board) In change management, the team responsible for approving or denying RFCs.
RAID
(Redundant Array of Independent/Inexpensive Disks) A set of vendor-independent specifications for fault-tolerant configurations on multiple-disk systems.
RJ connector
(Registered Jack connector) A connector used for twisted pair cabling. 4-pair network cabling uses the larger RJ-45 connector. Modem/telephone 2-pair cabling uses the RJ-11 connector.
RFC
(Request for Change) In change management, the formal document submitted to the CAB that has the details of the proposed alteration.
SATA
(Serial ATA) The most widely used interface for hard disks on desktop and laptop computers. It uses a 7-pin data connector with one device per port. There are three SATA standards specifying bandwidths of 1.5 Gbps, 3 Gbps, and 6 Gbps, respectively. SATA drives also use a new 15-pin power connector, though adapters for the old style 4-pin Molex connectors are available. External drives are also supported via the eSATA interface.
The PSU _____ output rail has a maximum load of 33 amps and a maximum output of 396 watts.
+12V
The PSU has two ____ output rails, one as a standby, with the primary rail having a maximum load of 20 amps and a maximum output of 130 watts.
+5V
What del command switch allows you to suppress prompt on a wildcard delete? /p /f /q /s
/q
To remove a file from a directory or a disk using the del command, the _____ switch will delete files from subdirectories.
/s
What features does Windows 10 Education support?
BitLocker EFS Academic Licensing BranchCache Domain Capable
PXE booting is primarily used for what? A. Flashing BIOS B. Performance monitoring C. Virus removal D. Image deployment
D. Image deployment
dual-channel memory
Memory controller with two pathways through the bus to the CPU so that 128 bits of data can be transferred per transaction.
You are about to start a network installation of a Windows 10 workstation. Which boot device will likely need to be the highest priority device? PXE (Preboot Execution Environment) Floppy drive Optical drive Hard drive
PXE (Preboot Execution Environment)
CIS
(Contact Image Sensor) A type of digital imaging sensor. An array of LEDs strobing between red, blue, and green light are used to illuminate an object. The reflected light is captured through a lens onto an image sensor.
How many extended partitions can be created on a MBR-type (Master Boot Record) partitioned hard drive? 1 4 3 128
1
Microsoft provides how many years of supports for OS?
5 years mainstream and 5 years extended support
Which 802.11 wireless standard(s) uses the 5 gigahertz (GHz) frequency range? 802.11a, 802.11n, and 802.11ac 802.11g, 802.11a, and 802.11ac 802.11b, 802.11g, and 802.11n 802.11a, 802.11b, and 802.11n
802.11a, 802.11n, and 802.11ac
A technician is working on a laptop with a failed Ethernet port caused by ESD. Which of the following is the simplest solution to restore network connectivity? A. Re-solder the network connector B. Replace the Ethernet daughter board C. Update the Ethernet driver D. Enable wireless and connect to the WAP
D. Enable wireless and connect to the WAP
Which of the following prevention methods is considered to be digital security? A. RFID badge B. Mantrap C. Biometrics D. Firewalls E. ID badge
D. Firewalls
A user wants to be able to access email from all devices. Which of the following formats should be used to allow this synchronization? A. SMTP B. iCal C. POP3 D. IMAP
D. IMAP
To the left of the menu bar is the Apple menu, represented by the Apple icon. When clicking this icon, what are some of the items found in the "About this Mac" section? (Select all that apply.) The Dock Displays Storage Service
Displays Storage Service
What solution was developed to update the last mile of the telephone network wiring to provide high bandwidth to small business premise equipment? FTTH FTTP FTTC ISDN
FTTP
In the Event Viewer, the _______ event is when there are security access attempts that were unsuccessful. This may indicate a possible security breach or simply a user mistyping a password.
Failure Audit
Which of the following security appliances analyzes packets entering a network and alerts administrators, but takes no corrective action? Intrusion Prevention System(IPS) Authentication server Intrusion Detection System (IDS) Proxy server
Intrusion Detection System (IDS)
There are some non-interactive accounts that users cannot sign into. They are used to run Windows processes and services. Which of these are those accounts? (Select all that apply.) LocalSystem Network LocalService NetworkService
LocalSystem LocalService NetworkService
Wearable fitness tracking devices use which of the following technologies to determine user activity levels? A. Digitizer B. Gyroscope C. Accelerometer D. Inverter
C. Accelerometer
The Finance department in your company has its administrative staff on the second floor connected to a new switch and its professional staff on the third floor connected to a different new switch. These two groups need to work as a team on the same logical and physical network on the server/router side. What would be the best solution? A. Break the network up into two subnets: one for administration and one for marketing. B. Setup Network Address Translation (NAT) on the gateway. C. Add Virtual Local Area Networks (VLANs) to each of these switches. D. Run new cabling from the switch on the second floor to staff on the third floor.
C. Add Virtual Local Area Networks (VLANs) to each of these switches.
3D printer
Hardware device capable of small scale manufacturing. 3D printers use a variety of filament media (typically plastic) with different properties.
The network needs to support a pre-Windows 2000 legacy system. What protocol will need to be enabled? LDAP NetBT IP TCP/IP
NetBT
closed questions
Questions that require a fixed response, such as yes or no.
________.msc opens the Device Manager console.
devmgmt.msc
An ______ is the point at which two devices connect and communicate with each other.
interface
Choosing to _____ saves the current session to memory and puts the computer into a minimal power state.
standby/sleep
A ______ is a special type of expansion bus dedicated to communicating with storage devices, such as hard disks, solid state drives, and optical drives (CD/DVD/Blu-ray).
storage bus
Which output rail in a power supply unit (PSU) has a maximum load of 20 amps? The +240V rail The +5V rail The +115V rail The +12V rail
The +5V rail
USB uses what voltage?
5V
The validity of the whole access control system depends on the credentials for an account being known to the account holder only. What is the format of the credentials called? A. Authentication factor B. BIOS (Basic input/output system )/UEFI (Unified Extensible Firmware Interface) Passwords C. Key fob D. Two-factor authentication
A. Authentication factor
A user states that when typing in directions on a navigation website, the map is not viewable in a newer web browser. The technician runs updates to Java, but is still unable to view the map. The technician should change which of the following Internet Options? A. Compatibility view B. Manage add-ons C. Clear browser cache D. Pop-up blocker
A. Compatibility view
Which of the following is considered government-regulated data? A. PII B. End-user license agreement C. Digital Millennium Copyright Act D. DRM
A. PII
A technician has been tasked with limiting the users who can connect to a network printer located centrally within an office environment. Which of the following tools would be the BEST to utilize to achieve this goal? A. VPN B. ACL C. RDP D. DLP
B. ACL
A network administrator has given a technician documentation detailing the switchports the technician will need to patch in for a network upgrade. Which of the following documents did the network administrator MOST likely give to the technician? A. Process diagram B. Physical network diagram C. Fiber backbone diagram D. Logical topology diagram
B. Physical network diagram
Which of the following cable types designates that it can safely be run through a drop ceiling? A. STP B. Plenum C. CAT5e D. UTP
B. Plenum
Joe, an employee, took a company-issued Windows laptop home, but is having trouble connecting to any of the shares hosted on his home media server. Joe has verified he is connected to the Internet. Which of the following would explain why Joe cannot access his personal shares? A. An IP conflict is present B. A corporate VPN is enabled C. A firewall exception must be set D. HomeGroup must be enabled
C. A firewall exception must be set
A customer struggles with the small print of most smartphones. The customer still likes the idea of using a smartphone for phone calls and work. Which of the following devices should the technician recommend to the customer? A. A tablet B. An e-Reader C. A phablet D. A smart watch
C. A phablet
Which of the following connectors provides the capability to pass both analog and digital signals? A. VGA B. BNC C. DVI-I D. USB 3.0
C. DVI-I
Which of the following Internet connection types often terminates at a switching center and then requires the use of a different media for the last mile to the customer? A. ISDN B. DSL C. Fiber D. Cable
C. Fiber
Which of the following is an advantage of UDP over TCP? A. It is connection based. B. It uses flow control. C. It transfers packets faster. D. It uses connection handshakes.
C. It transfers packets faster.
Which of the following would typically require the use of a punchdown tool to connect a cable to the network switch? A. Router B. Repeater C. Patch panel D. PoE injector
C. Patch panel
A user reports the Internet connection is not working on the corporate network. After running through the troubleshooting steps, the administrator finds the computer has a valid IP address, can connect to network shares, and can view local intranet pages in the web browser. The administrator tries navigating to a public Internet page and it times out. Which of the following should the technician configure next? A. Hosts files B. IPv6 settings C. Proxy settings D. Lmhosts files
C. Proxy settings
A technician is asked to repair a broken Ethernet jack in a conference room. Which of the following tools would the technician use when repairing the wall jack? A. Crimper B. Toner probe C. Punchdown tool D. Multimeter
C. Punchdown tool
A technician is required to connect a new cable to an open port on the patch panel. Which of the following would the technician MOST likely use in this situation? A. Loopback tool B. Multimeter C. Punchdown tool D. Toner probe
C. Punchdown tool
You have been tasked with making Ethernet cables of custom length for a server room refresh. Your coworker sends you to get a tool from the cabinet to utilize while making the new cables. Choose the most necessary tool(s) below: Cable Tester Tone Generator Punch-down Tool Cable stripper and Crimper
Cable stripper and Crimper
A printer on the second floor is not printing for anyone. However, the printer has power and displays ready on the LCD display. There is paper in the trays and the toner was recently changed. The system administrator goes to the location with a laptop and tests the network port and is able to connect. Jobs are being queued on the local machines. Which of the following should the system administrator do to get the printer functioning again? A. Move the printer to a known good port and connect to the network B. Replace the network cable to the printer C. Verify the server's print spooler service is running D. Attach the printer directly to the laptop and print a test page
C. Verify the server's print spooler service is running
Which of the following commands are used from a Linux command line interface to elevate a user's access level to administrative privilege? (Select TWO). A. chmod B. passwd C. sudo D. su E. runas
C. sudo D. su
_______ is the default management console with multiple snap-ins to configure local users and groups, disks, services, devices and so on.
Computer Management
expansion slots
Connection slots on the motherboard in which adapter cards can be installed to extend the range of functions the computer can perform.
Which of the following ports is typically used for sending email? A. 21 B. 22 C. 23 D. 25
D. 25
Which of the following is used to connect a headset to a laptop? A. eSATA B. BNC C. RG-6 D. USB
D. USB
In Performance Monitor, you can create log files, referred to as _______, to record information for viewing at a later date.
Data Collector Sets
Dropbox
Dropbox is a non-platform specific cloud-based service for storing files. Synchronization between multiple devices with differing operating systems is possible.
A user believes there is a virus on a laptop. The user installs additional real-time protection antivirus software but is now experiencing extremely slow performance on the laptop. Which of the following should a technician do to resolve the issue and avoid recurrence? A. Activate real-time protection on both antivirus software programs B. Uninstall one antivirus software program and install a different one C. Run OS updates D. Enable the quarantine feature on both antivirus software programs E. Remove the user-installed antivirus software
E. Remove the user-installed antivirus software
What partition type can a logical partition be created in? Primary Extended Boot System
Extended
Spotlight
File system search feature in macOS.
recovery disc
OEM recovery media enabling the user to reset the system to its factory configuration.
_________ is the process involved in performing updates in different operating systems.
OS Updates
system memory
The main storage area for programs and data when the computer is running.
What determines the number and type of devices a power supply can support? The number of connectors The voltage rating The amperage rating The hertz rating
The number of connectors
baseline
The point from which something varies. A configuration baseline is the original or recommended settings for a device, while a performance baseline is the originally measured throughput.
pixel
The smallest discrete element on a display. A single pixel is composed of a red, a blue, and a green dot.
The _____ transfers electronic signals between the device and the system unit.
port
A department needs to send a file to a remote server, but the file transfer is failing. Which of the following commands would you use to troubleshoot connectivity issues to the remote server? (Choose Two) tracert ping nslookup netstat
tracert ping
System RAM is normally packaged as ______ fitted to motherboard slots.
Dual Inline Memory Modules (DIMMs)
_______ has many security features and these include file permissions and ownership, file access audit trails, quota management, and Encrypting File System (EFS).
NTFS
SLA
(stereolithography) A 3D printing method which uses a resin or photopolymer to create objects which are cured using an ultraviolet laser.
AHCI
(Advanced Host Controller Interface) A logical interface used by SATA drives to communicate with the bus.
ASF
(AutoSheet Feeder) In an inkjet printer, the paper pickup mechanism to feed paper into the printer.
ADF
(Automatic Document Feeder) Device that feeds media automatically into a scanner or printer.
BD
(Blu-ray Disc) The latest generation of optical disc technology that uses a 405 mm blue laser for high density storage, with disc capacity of 25 GB per layer. Transfer rates are measured in multiples of 36 MBps.
CCD
(Charge Coupled Device) A type of microchip widely used as a digital image sensor. Each element in a CCD converts light captured by a photodiode into a proportional electric charge, which is then amplified, sampled, and stored as a digital value. The number of elements determines the resolution.
CCFL
(Cold Cathode Fluorescent Lamp) A type of lamp providing a bright, clear light source. CCFLs are used for LCD backlights and scanners.
CLI
(Command Line Interface) A textual interface based on the operating system, where a user typically enters commands at the command prompt to instruct the computer to perform a specific task.
CD-ROM
(Compact Disc - Read Only Memory) An optical storage technology. The discs can normally hold 700 MB of data or 80 minutes of audio data. Recordable and re-writable CDs (and DVDs) are a popular backup solution for home users. They are also useful for archiving material. Unlike magnetic media, the data on the disc cannot be changed (assuming that the disc is closed to prevent further rewriting in the case of RW media). This makes them useful for preserving tamper-proof records.
compressed air blaster
A can of air packaged under pressure that is used to remove dust and debris from inside printers and other computing devices.
image
A duplicate of an operating system installation (including installed software, settings, and user data) stored on removable media. Windows makes use of image-based backups and they are also used for deploying Windows to multiple PCs rapidly.
RS-232
A serial port that uses a 25-pin male D connector. (See also serial port).
A user has 6,250 Megabytes worth of pictures they would like to back up. At the very MINIMUM, which of the following could backup these pictures to a single medium? A. DL DVD Burner B. LTO Drive C. CD Burner D. Blu-Ray Burner
A. DL DVD Burner
Mikey is unable to view files on his companies work network from home. What is the first thing he should do? A. Check VPN settings B. Run virus scan C. Reset SOHO router D. Call device distributor
A. Check VPN settings
A technician has been informed that multiple users are receiving duplicate IP address warnings on their workstations, and they are unable to browse the Internet. Which of the following server types should the technician log in to in order to resolve the problem? A. DNS server B. DHCP server. C. Proxy server D. RADIUS server
A. DNS server
A technician works for a company that has virtual servers and virtual desktops. The company hires a user who only needs to access the virtual desktops. Which of the following is the MOST cost-effective workstation to purchase? A. Thin client B. Gaming PC C. CAD PC D. Thick client
A. Thin client
An example of single factor authentication is username and password A. True B. False
B. True
Which of the following ports is used for a secure browser connection for an online purchase? A. 23 B. 80 C. 110 D. 443 E. 3389
D. 443
This motherboard is: 9.6 x 9.6 inches up to 4 expansion slots
Micro-ATX (mATX)
What partition type is bootable and can be marked as active? Extended Logical MBR Primary
Primary
Duplex printing
Printing on both sides of the paper.
The _______ is a name set up on the WiFi router for users to quickly identify and connect to it. The _____ can be broadcast or hidden from public view.
Service Set ID (SSID)
incident
Something that is not normal and disrupts regular operations in the computing environment.
You can use a cell or smartphone's data plan to allow a laptop or PC to access the Internet. What is this called? Bluetooth Tethering Mobile hotspot USB
Tethering
system files
The files necessary for the operating system to function properly.
______ is an updated file system for optical media that supersedes CDFS.
UDF (Universal Disk Format)
Windows Settings
Windows 10 app for configuring and managing the Windows 10 computer.
Is sip:[email protected] a valid SIP URI?
Yes
IRQ
(Interrupt Request) A communications channel between a hardware device and the system processor. Originally, when hardware was added to the computer it had to be manually configured with a unique interrupt number (between 0 and 15). Plug-and-Play compatible systems configure resources automatically. The PCI bus introduced IRQ steering, which allowed IRQs to be shared. Modern computers use programmable interrupt controllers, allowing for hundreds of interrupts.
KVM switch
(Keyboard Video Mouse switch) A switch supporting a single set of input and output devices controlling a number of PCs. KVM are more typically used with servers but 2-port versions allow a single keyboard, mouse, and display to be used with two PCs.
KB
(Knowledge Base) A searchable database of product FAQs (Frequently Asked Questions), advice, and known troubleshooting issues. The Microsoft KB is found at support.microsoft.com.
LED
(Light Emitting Diode) Small, low-power lamps used both as diagnostic indicators, LCD backlights, and (as Organic LEDs) in high-quality flat panels.
LCD panel
(Liquid Crystal Display panel) A display technology where the image is made up of liquid crystal cells controlled using electrical charges. LCD panels are used on laptops and have replaced CRT monitors as the main type of computer display screen.
MBR
(Master Boot Record) A sector on a hard disk storing information about partitions configured on the disk.
MSDS
(Materials Safety Data Sheet) Information sheet accompanying hazardous products or substances explaining the proper procedures for handling and disposal.
MTBF
(Mean Time Between Failures) The rating on a device or component that predicts the expected time between failures.
MIDI
(Musical Instrument Digital Interface) Allows a computer with a sound card to drive MIDI compatible musical instruments, such as synthesizers, samplers, and drum machines (or [vice versa] for a synthesizer to drive a computer audio application [such as a sampler]).
NTFS
(NT File System) A Windows file system that supports a 64-bit address space and is able to provide extra features such as file-by-file compression and RAID support as well as advanced file attribute management tools, encryption, and disk quotas.
NFC
(Near Field Communications) A Standard for peer-to-peer (2-way) radio communications over very short (around 4") distances, facilitating contactless payment and similar technologies. NFC is based on RFID.
NAPT
(Network Address Port Translation) Similar to NAT, it (or PAT or NAT overloading) maps private host IP addresses onto a single public IP address. Each host is tracked by assigning it a random high TCP port for communications.
NAT
(Network Address Translation) A network service provided by router or proxy server to map private local addresses to one or more publicly accessible IP addresses. NAT can use static mappings but is most commonly implemented as Network Address Port Translation (NAPT) or NAT overloading, where a few public IP addresses are mapped to multiple LAN hosts using port allocations.
NFS
(Network File System) A remote file access protocol used principally on UNIX and Linux networks.
NLA
(Network Level Authentication) An RDP technology requiring users to authenticate before a server session is created.
NVMHCI
(Non-Volatile Memory Host Controller Interface specification) A logical interface used by PCIe-based SSD drives to communicate with the bus.
NVMe
(Non-volatile Memory Express) An interface for connecting flash memory devices, such as SSDs, directly to a PCI Express bus. NVMe allows much higher transfer rates than SATA/AHCI.
OCR
(Optical Character Recognition) Software that can identify the shapes of characters and digits to convert them from printed images to electronic data files that can be modified in a word processing program. Intelligent Character Recognition (ICR) is an advanced type of OCR, focusing on handwritten text.
PCIe
(PCI Express) An expansion bus standard using serial communications. Each device on the bus can create a point-to-point link with the I/O controller or another device. The link comprises one or more lanes (x1, x2, x4, x8, x12, x16, or x32). Each lane supports a full-duplex transfer rate of 250 MBps (v1.0), 500 MBps (v2.0), or 1 GBps (v3.0). The standard is software compatible with PCI, allowing for motherboards with both types of connectors.
page description language
(PDL) A high-level computer language used to describe the contents and the layout of the information to be printed on a page through PDL commands.
POST
(Power-On Self-Test) A hardware checking routine built into the PC firmware. This test sequentially monitors the state of the memory chips, the processor, system clock, display, and firmware itself. Errors that occur within vital components such as these are signified by beep codes emitted by the internal speaker of the computer. Further tests are then performed and any errors displayed as on-screen error codes and messages.
PXE
(Preboot Execution Environment) A feature of a network adapter that allows the computer to boot by contacting a suitably configured server over the network (rather than using a local hard disk).
QoS
(Quality of Service) Systems that differentiate data passing over the network that can reserve bandwidth for particular applications. A system that cannot guarantee a level of available bandwidth is often described as Class of Service (CoS).
RAM
(Random Access Memory) The principal storage space for computer data and program instructions. RAM is described as being volatile in the sense that once power has been removed or the computer has been rebooted, data is lost.
RIP
(Raster Image Processing) The component responsible for converting instructions in the Page Description Language (PDL) to instructions that control the print engine (an inkjet's ink dispersion nozzles or a laser printer's developer laser, for instance). A PDL might contain instructions for printing vector graphics and fonts; the RIP translates these instructions into a pattern of dots (raster) at the required resolution.
RPO
(Recovery Point Objective) The amount of data loss that a system can sustain, measured in time. See also recovery time objective.
RTO
(Recovery Time Objective) The period following a disaster that a system may remain offline. See also recovery point objective.
rpm
(Red Hat Package Manager) A tool for maintaining packages in Red Hat Linux systems.
SCSI
(Small Computer Systems Interface) A legacy expansion bus standard allowing for the connection of internal and external devices. SCSI 1 defines the original 8-bit bus with a transfer rate of 5 MBps. SCSI 2 features a 16-bit data bus implementation (Wide SCSI) and a faster transfer rate (Fast SCSI) while maintaining backward compatibility with most of the original devices. SCSI 3 introduces further data rate enhancements (Ultra SCSI) and a serial SCSI standard (Firewire). Each device on a SCSI bus must be allocated a unique ID. The bus must also be terminated at both ends.
SFF
(Small Form Factor) Motherboards and connectors that are designed to take up less space.
SODIMM
(Small Outline Dual In-line Memory Module) Memory that is half the size of DIMMs, are available in 32- or 64-bit data paths, and are commonly found in laptops and iMac systems.
S/PDIF
(Sony/Phillips Digital Interface) A high-quality audio port that uses coax cabling with RCA connectors or fiber optic cabling and connectors. S/PDIF supports surround sound speakers.
SVGA
(Super VGA) A variant of the VGA standard that supported 800x600 pixel resolution with 4-bit or 8-bit color.
SDRAM
(Synchronous Dynamic Random Access Memory) A variant on the DRAM chip designed to run at the speed of the system clock, thus accelerating the periodic refresh cycle times. SDRAM can run at much higher clock speeds than previous types of DRAM. Basic SDRAM is now obsolete and has been replaced by DDR/DDR2/3 SDRAM.
UPS
(Uninterruptible Power Supply) An alternative AC power supply in the event of power failure. A UPS requires an array of batteries, a charging circuit, an inverter to convert DC to AC current, a circuit to allow the system to take over from a failing power supply, and some degree of spike, surge, or brownout protection (possibly including a line conditioner).
How many extended partitions can be created on a MBR-type (Master Boot Record) partitioned hard drive? 3 1 4 128
1
PCIe 3 has what transfer rates?
1 GBps per lane
______ beeps = display adapter error.
1 long, 2 or 3 short
______ beep = normal post, system is OK. Consult motherboard manufacturers' support site for beep code list.
1 short
What are the only three channels in the 2.4 GHz WiFi spectrum that do NOT overlap with each other? 1, 5, and 10 1, 6, and 11 3, 7, and 11 6, 10, and 14
1, 6, and 11
Malware removal steps?
1. Identify and research malware symptoms. 2. Quarantine the infected systems. 3. Disable System Restore (in Windows) 4. Remediate the infected systems. 5. Schedule scans and run updates. 6. Enable System Restore and create a restore point (in Windows) 7. Educate the end user
Which of these are the maximum transfer rate, band and range of the 802.11ac Wireless Local Area Networks (WLAN), also call WiFi, standard? 54 Mbps, 2.4 GHz, up to 150 feet 54 Mbps, 5 GHz, up to 100 feet 11 Mbps, 2.4 GHz, up to 150 feet 1.7 Gbps, 5 GHz, up to 100 feet
1.7 Gbps, 5 GHz, up to 100 feet
USB 3.1 supports data rates up to what?
10 Gbps
Cat 3 speed
10 Mbps
Cat 5 speed
10/100 Mbps
Max distance for ethernet cables?
100 meters
Cat 5e speed
1000 Mbps / 1 Gbps
Cat 6 speed
1000 Mbps / 1 Gbps
An Internet Protocol (IP) address is 192.156.32.49. Calculate the binary representation of the first octet. 00000011 11000000 10100000 11000011
11000000
RS-232 and DB-9 have speeds up to what?
115 Kbps
A USB bus consists of a host controller and up to _____ devices.
127
How much RAM does Windows 10 Home edition support?
128 GB
Windows 10 (64-bit) Home supports how much RAM?
128 GB
Windows 8 (64-bit) Core supports how much RAM?
128 GB
PCIe 2.1 supplies what power?
150W from motherboard and another 150W from power connector
Windows 7 (64-bit) Home Premium supports how much RAM?
16 GB
Windows 7 (64-bit) Professional supports how much RAM?
192 GB
Windows 7 (64-bit) Ultimate supports how much RAM?
192 GB
Windows 7 Starter edition supports how much RAM?
2 GB
PCIe 4 has what transfer rates?
2 GBps per lane
How much RAM does Windows 10 Pro/Education editions support?
2 TB
Windows 10 (64-bit) Education supports how much RAM?
2 TB
Windows 10 (64-bit) Pro supports how much RAM?
2 TB
Which of the following is a valid storage drive size for a laptop (choose two)? 3.5" 2.5" 1.8" 5.25"
2.5" 1.8"
Thunderbolt 2 supports speeds of what?
20 Gbps
USB 3.2 supports data rates up to what?
20 Gbps
A standard desktop PC that may use a full range of expansion cards and peripherals is typically rated to use a PSU (Power Supply Unit) around what amount of wattage? 100-200 W > 300 W 200-300 W < 100 W
200-300 W
The ATX12V version 2 PSU (Power Supply Unit) specification uses what type of connector to power a motherboard? 24-pin P1 4-pin molex 15-pin SATA 6-pin PCIe
24-pin P1
A power supply unit that uses the ATX12V version 2 specification has what type of power connector? 4-pin Molex adapter 15-pin SATA adapter 24-pin motherboard adapter 20-pin motherboard adapter
24-pin motherboard adapter
An engineer has reported that a printer is no longer working and needs troubleshooting. You have been informed that there is a problem with the extruder. What type of printer will you be working with? Inkjet Laser Dot Matrix 3D
3D
Which of the following printer types uses filament? 3D Thermal Inkjet Laser
3D
What wireless technology delivers speeds that are at least 200Kbps (Kilobits per second) up to 3Mbps (Megabits per second)? 3G 5G 2G 4G
3G
Windows 8 (32-bit) supports how much RAM?
4 GB
PCIe 5 has what transfer rates?
4 GBps per lane
Thunderbolt 3 supports speeds up to what?
40 Gbps
The USB 2.0 (HighSpeed) standard specifies a data rate of _______.
480 Mbps
Which one of the wireless technology generations offered the new Long Term Evolution (LTE) only for data? 3G 2G 1G 4G
4G
Which of the following wireless technology requires the use of a Subscriber Identity Module (SIM) card? DSL 4G LTE VSAT Fiber optic
4G LTE
What is a cellular card used for? To connect to any wireless network 4G LTE data connectivity Wi-Fi connectivity Bluetooth connectivity
4G LTE data connectivity
You are going to upgrade a 32-bit Windows 7 Home Premium to Windows 7 Professional for business purposes. In addition to more features with the operating system, what will the new maximum memory limit be? 16GB 192GB 4GB 8GB
4GB
Microsoft products are subject to a support lifecycle policy. How many years of extended support does Microsoft offer for operating systems? 7 3 5 10
5
PCIe 2 has what transfer rate?
500 MBps per Lane
Windows 8 (64-bit) Pro and Enterprise supports how much RAM?
512 GB
USB supplies what power?
5V 2.5W or 4.5W (USB 3.0)
Thunderbolt 2 supports how many devices daisy chained?
6
How much RAM does Windows 10 Enterprise edition support?
6 TB
Windows 10 (64-bit) Enterprise supports how much RAM?
6 TB
Windows 7 (64-bit) Home Basic supports how much RAM?
8 GB
You are planning the installation of several wireless access points in a large office area with multiple high-end devices. Which standard is the best wireless solution for this network? 802.11n 802.11ac 802.11a 802.11g
802.11ac
Which standard supports speeds as high as 11 Megabits per second (Mbps) and uses the Direct Sequence Spread Spectrum (DSSS) transmission method in the 2.4 gigahertz (GHz) band for up to 30 meters indoors? 802.11b 802.11g 802.11ac 802.11n
802.11b
Which standard supports speeds up to 600 Megabits per second (Mbps) in the 2.4 GHz or 5 GHz frequency ranges? 802.11n 120 VAC 802.11a 3
802.11n
You need to configure a wireless SOHO (Small Office Home Office) network that can operate at two different channel widths on the same spectrum simultaneously. It needs to ensure that a mixture of old and new company smartphones, tablets, laptops, and desktops can access the WiFi. What network standard will your network setup need to support? 802.11a 802.11n 802.11ac 802.11b
802.11n
If the goal is to use Secure Sockets Layer (SSL) for incoming emails, which Post Office Protocol (POP3) incoming mail server port is used to configure the email client settings? 587 995 110 993
995
low level format
A "proper" low level format creates cylinders and sectors on the disk. This can generally only be done at the factory. The disk utilities just clean data from each sector; they don't re-create the sector layout.
A technician needs to install a network device in a Small Office Home Office (SOHO) network. The office requires 9 wired workstations to share and print data. Which of the following can the technician use? An 8-port firewall with one console port A wireless router with an 8-port switch, and a WAN port A 12-port unmanaged switch A wired router with an 8-port switch and a WAN port
A 12-port unmanaged switch
cron
A Linux/Unix daemon that runs in the background and executes specified tasks at a designated time or date.
File Explorer
A Microsoft Windows tool that offers a single view of all the resources and information that you can access from a computer.
Administrator account
A Microsoft Windows user account that can perform all tasks on the computer, including installing and uninstalling apps, setting up other users, and configuring hardware and software.
You need to connect to the guest wireless network in your corporate environment. What could you install in a laptop that did not have wireless capabilities, so you can connect to the guest WiFi? A Mini PCIe adapter A WiFi adapter in a PCIe slot on the motherboard A mSATA interface A Bluetooth M.2 adapter
A Mini PCIe adapter
Plug and Play
A Plug and Play system (comprising a compatible BIOS, operating system, and hardware) is self-configuring. When a hardware device is added or removed, the operating system detects the change and automatically installs the appropriate drivers.
backup power generator
A Standby Power Supply fueled by diesel or propane. In the event of a power outage, a UPS must provide transitionary power, as a backup generator cannot be cut-in fast enough.
barcode scanner
A barcode reader is a handheld or pen-shaped device designed to scan barcodes. A barcode is a pattern of different sized parallel bars, typically representing a product number, such as an ISBN, EAN, or UPC. The reader uses a sensor mechanism (typically either a photo diode, laser, or CCD) to read the intensity of light reflected back by the barcode. The reader then reports the number back to application software, which links it to a product database.
brownout
A brownout occurs when the power that is supplied by the electrical wall socket is insufficient to allow the computer to function correctly. Brownouts are long sags in power output that are often caused by overloaded or faulty mains distribution circuits or by a failure in the supply route from electrical power station to a building.
smart card
A card with a chip containing data on it. Smart cards are typically used for authentication, with the chip storing authentication data such as a digital certificate.
file attribute
A characteristic that can be associated with a file or folder that provides the operating system with important information about the file or folder and how it is intended to be used by system users.
daughter board
A circuit board that connects to the motherboard to provide extra expansion slots or connectors. Typically, these are used in slimline case designs so that adapter cards can be installed parallel to the motherboard, reducing the height of the case.
game pad
A controller containing multiple buttons and toggles, each of which controls a different action in a video game or program, typically held and manipulated with two hands.
When TCP/IP (Transmission Control Protocol/Internet Protocol) communications need to be routed to systems on other networks, the protocol directs the packets to a special address known as what? A static IP address A subnet mask A default gateway A host address
A default gateway
I/O port
A device connection through which data can be sent and received.
line conditioner
A device that adjusts voltages in under-voltage and over-voltage conditions to maintain a 120 V output.
headset
A device that combines headphones and microphone in a single device.
duplexing assembly
A device that enables a printer or scanner to use both sides of a page automatically.
home directory
A directory (folder) where you are placed when you log in to the OS. In Linux, it is typically represented by the ~ symbol. The home directory could be redirected to a network location.
A user has a desktop inkjet printer that is printing vertical lines on each printed page. What is likely the cause of the lines? A dirty print head or blocked ink nozzle A stuck pin in the print head A dirty primary transfer roller Incorrect adjustment of the platen gap
A dirty print head or blocked ink nozzle
slipstreamed media
A disc-based installation that has all of the various updates, patches, and drivers included along with the original installation files.
Disaster Recovery Plan
A documented and resourced plan showing actions and responsibilities to be used in response to critical incidents. The recovery plan may also provide for practice exercises or drills for testing and to familiarize staff with procedures. As well as facilitating a smooth transition in the event of disaster, plans must stress the importance of maintaining secure systems.
hybrid drive
A drive in which a portion is SSD, which functions as a large cache, containing frequently accessed data and a magnetic disk portion which is only spun up when non-cached data is accessed.
multiple desktops
A feature that enables users to set up one or more desktops with different sets of apps, backgrounds, and so on. See Mission Control.
ISO file
A file that contains all of the contents from an optical disc in a single file which can be mounted to the file system as though it were a physical optical drive.
privacy filter
A filter to fit over a display screen so that it can only be viewed straight-on.
personal firewall
A firewall implemented as applications software running on the host. Personal software firewalls can provide sophisticated filtering of network traffic and also block processes at the application level. However, as a user-mode application they are more vulnerable to attack and evasion than kernel mode firewalls or network firewall appliances.
network firewall
A firewall placed inline in the network that inspects all traffic that passes through it.
patch
A fix or update for a software program or application, designed to eliminate known bugs or vulnerabilities and improve performance.
host controller
A hardware component of the USB subsystem responsible for recognizing when a USB device is attached or removed from the system, monitors the device status, provides power to the USB devices, and controls the flow of data between the USB host and USB devices.
port (physical)
A hardware connection interface on a personal computer that enables devices to be connected to the computer.
hotfix
A hotfix is a software update designed and released to particular customers only, though they may be included in later Service Packs.
A portable access point that facilitates connections to a High-Speed Packet Access (HSPA+) or 4G network for multiple devices is referred to as: A mobile hotspot Tethering USB Bluetooth
A mobile hotspot
Which of the following describes an Internet connection type referred to as Line of Sight? A connection using a cellular subscription A wireless connection to a satellite A modem with maximum speed of 56 Kbps A modem using a wireless connection to a wireless tower
A modem using a wireless connection to a wireless tower
NOS
A network operating system (NOS) is an operating system designed to run on servers in a business environment.
antistatic bag
A packaging material containing anti-ESD shielding or dissipative materials to protect components from ESD damage.
mount point
A partition or volume mapped to a folder in another file system rather than allocated a drive letter.
joystick
A pivoting stick or lever attached to a base that is used to control movement on a device.
backout plan
A plan defined ahead of making any moves, adds, or changes so that in case unforeseen problems arise when the change is made, there is a plan to put things back as they were before making the change.
system case
A plastic and metal box that houses components such as the motherboard, Central Processing Unit (CPU), memory, adapter cards, disk drives, and power supply unit. System units are also often referred to as boxes, main units, or base units.
swap partition
A portion of the hard disk that is formatted with a minimal kind of file system and used in situations when Linux runs out of physical memory and needs more of it. It can only be used by the memory manager and not for storage of ordinary data files.
Molex connector
A power connector that is used to supply power to Parallel Advanced Technology Attachment (PATA) drives, optical drives, and SCSI drives.
expansion cards
A printed circuit board that is installed in a slot on a system board to provide special functions for customizing or extending a computer's capabilities. Also referred to as adapter card, I/O card, add-in, add-on, or board.
Windows Certified Products List
A searchable database of hardware devices that have been tested to ensure they are compatible with the Windows 10 operating system.
sector
A sector is the term given to the regularly sized subdivision of a drive track. During low-level formatting, the size and position of the sectors are written to the disk so that the data can be placed into uniform spots that the drive head can easily access.
secure boot
A security system offered by UEFI that is designed to prevent a computer from being hijacked by malware.
file extension
A series of characters at the end of a file name; used by an OS to identify the software application that is associated with a file.
surge protector
A simple device intended to protect electrical devices against the damaging effects of a power spike.
mini-ITX
A small compact board that fits the same form factor as the ATX and the micro-ATX boards. They have a maximum size of 6.7 inches by 6.7 inches.
jumper
A small plastic clip containing a metal conductor that fits over two contacts to complete a circuit that configures the motherboard or adapter card one way or another.
unattended installation
A software or operating system installation where the configuration information is derived from an input file.
attended installation
A software or operating system installation where the installer inputs the configuration information in response to prompts from a setup program.
operating system
A software package that enables a computer to function. It performs basic tasks, such as recognizing the input from a keyboard, sending the output to a display screen or monitor, and controlling peripheral devices such as disk drives and printers.
print spooler
A software program in Microsoft Windows that is responsible for managing all print jobs currently being sent to the computer printer or print server. The print spooler program allows a user to delete a print job being processed or otherwise manage the print jobs currently waiting to be printed.
riser card
A space-saving feature of some motherboards, a riser card puts the PC's expansion slots on a separate board installed at right-angles to the main board. This allows the system components to fit within a slimline case.
wildcard
A special character that is used to substitute characters in a string.
spike
A spike can occur when electrical devices are turned off or when electrical storms are happening. Normally, spikes and surges are not sufficient to cause problems but occasionally big fluctuations may lead to the system crashing or hanging.
ATX
A standard PC case, motherboard, and power supply specification. Mini-, Micro-, and Flex-ATX specify smaller board designs.
separation pad
A stationary pad in a paper tray that pushes the stack of paper back, allowing only a single sheet of paper to be fed into the printer.
environment variable
A storage location in the environment of the operating system's command shell.
detac corona
A strip that removes the charge to prevent paper curl in a laser printer.
policy
A subset of a security profile, and a document that outlines the specific requirements and rules everyone must meet.
data backup
A system maintenance task that enables you to store copies of critical data for safekeeping as protection against loss of data due to disasters such as file corruption or hardware failure.
end of life system
A system that is no longer supported by the developer or vendor.
RFID tag
A tag containing an RFID chip programmed with asset data.
script file
A text file containing commands or instructions that are performed by a program on the computer rather than by the computer itself.
apt
A tool for maintaining packages on Debian-based Linux systems.
yum
A tool for maintaining packages on Fedora-based Linux systems.
packet filtering
A type of firewall that inspects the headers of IP packets and can perform filtering on IP address, protocol type, and port numbers.
dot matrix printer
A type of impact printer that uses a set of pins to strike the ribbon to create printed characters and images using combinations of dots.
scanner
A type of photocopier that can convert the image of a physical object into an electronic data file. The two main components of a scanner are the lamp, which illuminates the object, and the recording device, an array of CCDs (Charge Coupled Devices). There are flatbed and sheet-fed versions, with sheet-fed versions typically being incorporated with a printer and fax machine into a multifunction device. Scanners can output images directly to a printer or to a suitable file format (such as JPEG, PNG, or TIFF). Scanners can also interface with applications software using one of several interfaces (TWAIN, WIA, SANE, or ISIS).
laser printer
A type of printer that develops an image on a drum using electrical charges to attract special toner then applying it to paper. The toner is then fixed to the paper using a high-heat and pressure roller (fuser). The process can be used with black toner only or four color toner cartridges (Cyan, Magenta, Yellow, and Black) to create full-color prints. Monochrome laser printers are the "workhorses" of office printing solutions.
thermal printer
A type of printer that uses a thermal (high heat) print head to fuse or transfer wax-based ink onto paper or selectively heats specially treated paper to form the image. Most thermal printers are handheld devices used for printing labels or receipts.
Universal Application
A universal application is an application type in Windows 10. Universal applications use an API for use across Windows 10, Windows 10 Mobile, and Xbox devices. A universal app is obtained from the Microsoft store app. Windows 7 does not support these applications.
Apple ID
A user account on an Apple device based on the sign-in email address that is used to sign-in to the App Store, access iCloud, and other Apple features and functions.
root user
A user who has access rights to all files and resources on the system and is the default administrative account on a Linux system.
jitter
A variation in the time it takes for a signal to reach the recipient. Jitter manifests itself as an inconsistent rate of packet delivery. If packet loss or delay is excessive, then noticeable audio or video problems (artifacts) are experienced by users.
digital camera
A version of a 35mm film camera where the film is replaced by light-sensitive diodes (an array of CCDs [Charge Coupled Devices]) and electronic storage media (typically a flash memory card). The sensitivity of the array determines the maximum resolution of the image, measured in megapixels.
webcam
A webcam can be used to stream and record video. There are many types, from devices built into laptops to standalone units. While early devices were only capable of low resolutions, most webcams are now HD-capable.
Which of the following describes an Internet connection type referred to as Line of Sight? (Choose Two) A modem with maximum speed of 56 Kbps A connection using a cellular subscription A modem using a wireless connection to a wireless tower A wireless connection to a satellite
A wireless connection to a satellite A modem using a wireless connection to a wireless tower
In which of the following file extension types would a user expect to see the command. "net use T:\\server\files'? A. .bat B. .vbs C. .js D. .py
A. .bat
A customer wants to upgrade a PC's internal storage to have more room to store backups, photos, and videos. The new storage should be large enough to avoid expanding again next year. Which of the following BEST meets these needs? A. 3TB HDD B. 50GB NAS C. 500TB SAN D. 512GB SSD
A. 3TB HDD
A business owner wants to provide security to laptop users with the ability to charge their devices, access corporate LAN resources, and allow for a variety of their removable hardware. Which of the following devices would BEST meet the owner's needs? A. Docking station B. Port replicator C. Thunderbolt D. USB hub
A. Docking station
Which of the following is a sign that a user does not have permission to print to a specific printer? "Not available" messages "Access Denied" messages "Low memory" message Error code
"Access Denied" messages
Which of the following is a sign that a network printer is offline? An error code on the control panel "Low memory" messages "Access Denied" messages "Not available" messages
"Not available" messages
COM+
(Component Object Model) Microsoft's object-oriented programming architecture and operating system services for developing applications. See also Component Services.
GUI
(Graphical User Interface) An easy to use, intuitive interface for a computer operating system. Most GUIs require a pointing device, such as a mouse, to operate efficiently. One of the world's first GUI-based operating systems was the Apple Mac OS, released in 1984. Thereafter, Microsoft produced their Windows family of products based around their GUI. In fact, recognizing that GUI covers a whole range of designs, the Windows interface is better described as a WIMP (Windows, Icons, Menus, Pointing [device]) interface.
GPU
(Graphics Processing Unit) a Type of microprocessor used on dedicated video adapter cards or within a CPU with integrated graphics capability.
CMDB
(Configuration Management Database) In change management, the database in which configuration items are stored, identified using a label and defined by their attributes.
CMS
(Configuration Management System) The tools and databases that collect, store, manage, update, and present information about CIs.
CMYK Color Model
(Cyan Magenta Yellow Key [Black] color model) Subtractive color model used by print devices. CMYK printing involves use of halftone screens. Four screens (or layers) of dots printed in each of the colors are overlaid. The size and density of the dots on each layer produces different shades of color and is viewed as a continuous tone image.
DMZ
(Demilitarized Zone) A private network connected to the Internet must be protected against intrusion from the Internet. However, certain services may need to be made publicly accessible from the Internet (web and email, for instance). One solution is to put such servers in a DMZ. The idea of a DMZ is that traffic cannot pass through it. If communication is required between hosts on either side of a DMZ, a host within the DMZ acts as a proxy. It takes the request and checks it. If the request is valid, it re-transmits it to the destination. External hosts have no idea about what (if anything) is behind the DMZ. A DMZ is implemented using either two firewalls (screened subnet) or a single three-legged firewall (one with three network ports).
DLP (video)
(Digital Light Processing) Mirror-based projector technology developed by Texas Instruments.
DAC
(Digital-to-Analog Converter) A sound card component that converts the digital signals generated by the CPU to an analog electrical signal that can drive the speakers.
DDR SDRAM
(Double Data Rate Synchronous Dynamic Random Access Memory) A standard for SDRAM where data is transferred twice per clock cycle (making the maximum data rate 64x the bus speed in bps). DDR2/DDR3/DDR4 SDRAM uses lower voltage chips and higher bus speeds.
DIMM
(Dual In-line Memory Module) The standard packaging for system memory. There are different pin configurations for different RAM types (DDR SDRAM [184], DDR2/3 SDRAM [240], and DDR4 SDRAM [288]).
DRAM
(Dynamic Random Access Memory) A type of volatile memory that stores each bit of data as a charge within a capacitor. A transistor refreshes the capacitor charge periodically. Standard DRAM is the lowest common denominator of the DRAM types. Modern PCs use a DRAM derivative to store data (Double Data Rate SDRAM).
________ can be used to apply file- or folder-level encryption.
(EFS) Encrypting File System
EP drum
(Electrostatic Photographic drum) The component in a laser printer that carries the electrical charge to attract toner and then to transfer the toner to the paper.
EMF
(Enhanced MetaFile) When using EMF, the software application and GDI quickly produce a partial print job. Control is then released back to the user while spooling continues in the background (GDI and the print driver are called to complete the processing of the job).
ECC
(Error Checking and Correcting [or Error Correcting Code]) System memory (RAM) with built-in error correction security. It is more expensive than normal memory and requires motherboard support. It is typically only used in servers.
HFS+
(Extended Hierarchical File System) The file system used by Apple Mac workstations and laptops.
FAT
(File Allocation Table) A basic disk format allowing the OS to write data as files on a disk. The original 16-bit version (FAT16, but often simply called FAT) was replaced by a 32-bit version that is almost universally supported by different operating systems and devices. A 64-bit version (exFAT) was introduced with Windows 7 and is also supported by XP SP3 and Vista SP1 and some versions of Linux and macOS. There is also a 12-bit version used to format floppy disks.
HDD
(Hard Disk Drive) A device providing persistent mass storage for a PC (saving data when the computer is turned off). Data is stored using platters with a magnetic coating that are spun under disk heads that can read and write to locations on each platter (sectors). A HDD installed within a PC is referred to as the fixed disk. HDDs are often used with enclosures as portable storage or as Network Attached Storage (NAS).
HCL
(Hardware Compatibility List) Before installing an OS, it is vital to check that all the PC components have been tested for compatibility with the OS (that they are on the Hardware Compatibility List [HCL] or Windows Logo'd Product List). Incompatible hardware may not work or may even prevent the installation from completing successfully.
HVAC
(Heating, Ventilation, and Air Conditioning) The building environmental heating and cooling services and the control of those systems.
HDMI
(High Definition Multimedia Interface) High-specification digital connector for audio-video equipment.
HIDs
(Human Interface Devices) Peripherals that enable the user to enter data and select commands.
ITIL
(IT Infrastructure Library) An IT best practice framework, emphasizing the alignment of IT Service Management (ITSM) with business needs. ITIL was first developed in 1989 by the UK government and the ITIL v3 2011 edition is now marketed by AXELOS.
I/O addresses
(Input/Output addresses) Input/output peripherals have a special area of memory in the range 0000-FFFF set aside to allow data reading and writing functions. This is normally configured by Plug-and-Play but can be set manually using Device Manager.
IDE (programming)
(Integrated Development Environment) A programming environment that typically includes a code editor containing an autocomplete feature to help you write code, a debugger to help you find coding errors, and an interpreter that translates the script file code into machine readable code the computer can execute.
ICMP
(Internet Control Message Protocol) IP-level protocol for reporting errors and status information supporting the function of troubleshooting utilities such as ping.
A technician is replacing a broken screen on a new company laptop but does not have repair information from the vendor. Which of the following is the BEST way to proceed? A. Document and label the cable and screw locations. B. Replace the screen with a non-OEM. C. Update the firmware on the device before repairing it. D. Wait for the vendor to provide more information.
A. Document and label the cable and screw locations. D. Wait for the vendor to provide more information.
A user reports a laserjet printer is not printing properly. A technician prints a test page and notices the toner is smeared on the page. The technician confirms the toner cartridge is installed correctly and the paper in the tray is the right size. Which of the following printer components is the MOST likely cause of the problem? A. Fuser B. Roller C. Memory D. Toner
A. Fuser
A user notices the social media apps are constantly updated with the user's precise location. The user is worried about privacy and would like to keep this information from being broadcast online. Which of the following features should the user adjust in order to accomplish this? A. Geotracking B. Filtering C. WiFi D. Tethering
A. Geotracking
A Windows user is attempting to install a local printer and is unsuccessful on permissions. Which of the following user types BEST describes this user? A. Guest B. Power User C. Administrator D. Standard User
A. Guest
A Windows user is attempting to install a local printer and is unsuccessful on permissions. Which of the following user types BEST describes this user? A. Guest B. Power User C. Administrator D. Standard User
A. Guest
A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will have access to only the application needed for customer interaction. The technician must also ensure that whenever the computer is rebooted or powered on it logs on automatically without a password. Which of the following account types would the technician MOST likely set up on this kiosk machine? A. Guest B. Administrator C. Power User D. Remote Desktop User
A. Guest
Which of the following is an advantage of using static IP addresses for a business? A. High availability B. Simplifies IP management C. Lower security risk D. Scalability for upgrades
A. High availability
During an inspection, it was found that data racks were not properly grounded. To pass the inspection and address a growing concern to protect data cabling and equipment, a technician must make sure all racks are properly grounded. Which of the following tools should the technician use to verify this has been completed? A. Multimeter B. Cable tester C. Tone generator D. Voltmeter
A. Multimeter
Which of the following is used to provide secure file storage to network users only? A. NAS B. IMAP C. SAN D. SSH
A. NAS
Which of the following features is being used when a smartphone is used to purchase a product at a retail kiosk? A. NFC B. Virtual assistant C. SDK D. Bluetooth
A. NFC
Which of the following components of a motherboard is responsible for communications between CPU and RAM? A. North Bridge B. South Bridge C. PCIe slot D. CMOS battery
A. North Bridge
A technician has been asked to recommend antivirus software for a home PC, but the user does not want to pay for a license. Which of the following license type should the technician recommend? A. Open license B. Personal license C. Corporate license D. Enterprise license
A. Open license
A user wants to build a computer with a high-end CPU, plenty of RAM, and a high-end graphics card for online gaming. The user wants to verify that the graphics card is compatible with the motherboard. Which of the following connection types would the user MOST likely utilize to connect the video card to the motherboard? A. PCle B. ISA C. AGP D. USB
A. PCle
A user has a new web email account and asks a technician for help with setting up email on a tablet. The user would like for the email to only be stored on this tablet. Which of the following email server setting types would the technician use to accomplish this task? A. POP3 B. IMAP C. S/MIME D. SMTP
A. POP3
What is PII? A. Personal Identifiable Information B. Personal Independent Information C. People Inside Internet D. Personally Internal Information
A. Personal Identifiable Information
Ronald receives an email requesting his username and password. The email looks to be from a legitimate source but Ronald is unsure. What kind of email could this be? A. Phishing B. Promotional C. Rootkit D. Ad Smap
A. Phishing
A technician needs to quickly destroy data on several hard drives that are no longer wanted. Which of the following methods is MOST effective? A. Physical destruction B. Quick format C. Low level format D. Overwrite
A. Physical destruction
A technician is installing a wireless network and wants to limit the signal available outside the building. Which of the following would help accomplish this? A. Place directional antennas B. Use omni-directional antennas C. Enable MAC filtering D. Disable SSID broadcast
A. Place directional antennas
A user's iPhone will not power on. Which of the following should the technician do FIRST to isolate the problem? A. Plug the phone into a known good charger B. Remove and reseat the battery C. Replace the screen glass assembly D. Replace the battery and charge the phone.
A. Plug the phone into a known good charger
A customer recently moved a high-end graphics card from a known-working computer to a different computer. The computer works without issue when viewing email and web pages or when using certain applications. However, when a game with high-end graphics requirements is opened, the program will run for a few minutes before the computer shuts down. Which of the following is MOST likely causing the problem? A. Power supply wattage B. Video RAM C. CPU frequency D. Monitor resolution
A. Power supply wattage
An administrator wants to give a user limited access rights in Windows Vista so that the user can install printers and create local user accounts. Which of the following accounts should the administrator create for the user? A. Power user B. Administrator C. Standard D. Guest
A. Power user
A user's Windows laptop has become consistently slower over time. The technician checks the CPU utilization and sees that it varies between 95% and 100%. After the technician closes some running applications, the CPU utilization drops to approximately 20%, and the laptop runs much faster. The next day the same user calls again with the same problem. Which of the following is a tool the technician can use to resolve the issue? A. Task Manager B. MSTSC C. MSConfig D. PerfMon
A. Task Manager
A technician receives a helpdesk ticket about an employee having a problem sending text messages with a company Android smartphone. It has been determined that it is not a carrier issue. Which of the following should the technician perform FIRST? A. Verify data connectivity B. Reformat the MicroSD card C. Replace the SIM card D. Perform a soft restore
A. Verify data connectivity
The technician would like to upgrade a workstation by adding a USB 3.0 card, and upgrading the video card, sound card, and NIC. The technician is concerned about power consumption by the expansion cards. Which of the following upgrades would MOST likely require also upgrading the power supply? A. Video card B. USB 3.0 card C. Sound card D. Network card
A. Video card
A user sets up a cable modem at home and connects the modem to the ISP at the cable company. Which of the following network types does this connection describe? A. WAN B. LAN C. PAN D. MAN
A. WAN
Of the options below what would make a wireless network most secure? (Choose Two) A. WPA2 B. WEP C. SSO D. Multifactor Authentication E. RFID
A. WPA2 D. Multifactor Authentication
A user, Ann, is preparing to travel abroad and wants to ensure that her laptop will work properly. Which of the following components of the laptop should be verified FIRST to ensure power compatibility before traveling? A. Wall adapter B. Battery C. Power supply D. Digitizer
A. Wall adapter
A user, Ann, reports that her company laptop cannot pick up a wireless connection in certain areas of a building. However, users working on their laptops in the common areas have Internet connectivity. Which of the following is the MOST likely cause? A. Weak RF signals B. Out of date Ethernet driver C. Enabled MAC filtering D. Duplicate IP addresses
A. Weak RF signals
A customer reports very slow wireless connection speeds in the new office. Which of the following tools should a technician use to troubleshoot the issue? A. WiFi analyzer B. Loopback plug C. Signal booster D. Packet sniffer
A. WiFi analyzer
A user who is running Windows XP calls a technician to upgrade the computer to a newer Windows OS. The user states the computer has only 1GB of RAM and 16GB of hard drive space with a 1,7GHz processor. Which of the following OSs should the technician recommended to ensure the BEST performance on this computer? A. Windows 7 B. Windows 8 C. Windows 8.1 D. Windows 10
A. Windows 7
Recently a company updated their network infrastructure. A user reports that a laptop is experiencing slower network speeds since the update. Which of the following would the technician replace, rather than purchase a new device? A. Wireless NIC B. CPU C. RAM D. Hard drive
A. Wireless NIC
Which of the following devices provides protection against brownouts? A. battery backup B. surge suppressor C. rack grounding D. line conditioner
A. battery backup
A customer is experiencing issues with email and calls the help desk. The technician determines it would help clarify the issue if the customer agrees to share their desktop. Prior to establishing a Remote Desktop Assistance connection with a customer, a technician should ask the customer to: A. close any items of a personal nature. B. reboot the computer and log back in. C. capture a screen-shot of the error message. D. take steps to reproduce the error.
A. close any items of a personal nature.
Which of the following tasks is automatically added to the task scheduler in Windows to keep hard disk performance up? A. defrag B. chkdsk C. cleanmgr D. diskpart
A. defrag
A technician is navigating through a Windows OS via command prompt. The technician needs to display the content of a folder. Which of the following is the BEST option for accomplishing this task? A. dir B. ls C. rd D. cmd
A. dir
A user is trying to use an external hard drive with an incompatible file system. Which of the following tools will allow the user to change the file system on the hard drive? A. format B. defrag C. bootrec D. chkdsk
A. format
Which of the following would a technician use to search for a specific string within a file name? A. grep B. chmod C. wget D. sudo
A. grep
After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked with limiting removable hard drive access to certain network users. USB ports are used for many devices, including scanners, printers, and signature pads, so a policy is created to deny access to removable hard drives only. When testing the policy, a removable drive is plugged in but can still be accessed. Which of the following command-line tools should the technician use to apply the new policy? A. grupdate B. diskpart C. gpresult D. net use
A. grupdate
The cloud model that represents a company maintaining some data in on-premise storage and some data in cloud-based storage is known as: A. hybrid B. private C. public D. community
A. hybrid
A technician is determining the specifications for a desktop computer that will be used at trade shows all over the world. The computer will have the maximum amount of RAM. The CPU, GPU, and storage will be typical of a business workstation. Which of the following system parameters is the MOST important for the technician to consider when choosing a power supply? A. input voltage B. Efficiency rating C. 12V rail amperage D. Number of SATA connectors
A. input voltage
Which of these does NOT need to be connected to the system board when replacing them? Laptop speakers AC Adapter An inverter Smart card readers
AC Adapter
What protocol and port(s) perform a file sharing function on Apple networks running macOS (Macintosh Operating System)? FTP over TCP ports 20 and 21 TFTP over UDP port 69 SMB/CIFS over TCP port 445 AFP over TCP or UDP port 427 and TCP port 548
AFP over TCP or UDP port 427 and TCP port 548
_______ is a first-generation virtualization extension created by AMD. Usually enabled by default, it is also required to run virtualization hypervisors.
AMD-V
An address in the range 169.254.x.y indicates the client is using which of the following? ICMP APIPA DHCP DNS
APIPA
In your apartment, you are experiencing limited connectivity even when you are well within range of your router. You suspect interference from the neighbors' Wi-Fi networks. How do you resolve this problem? Add a wireless access point (WAP). Reboot the router. Verify your network authentication information. Adjust the Wi-Fi channel.
Adjust the Wi-Fi channel.
There are several steps that can be taken to reduce the risk and impact of malware. Which one of the following is NOT a step that should be taken? Do not allow users to bring in their own software programs. Install and use an anti-virus package. Always log on with administrative privileges. Select antivirus software that scans automatically.
Always log on with administrative privileges.
answer file
An XML text file that contains all of the instructions that the Windows Setup program will need to install and configure the OS without any administrator intervention, including the product key.
sound card
An add-on card or built-in adapter to process audio signals and provide interfaces for connecting audio devices.
blacklisting
An address added to the blacklist is prohibited from connecting to any port.
virtual memory
An area on the hard disk allocated to contain pages of memory. When the operating system doesn't have sufficient physical memory (RAM) to perform a task, pages of memory are swapped to the paging file. This frees physical RAM to enable the task to be completed. When the paged RAM is needed again, it is re-read into memory.
corona
An assembly within a laser printer that contains a wire (the corona wire), which is responsible for applying an electrostatic charge.
What are the two main approaches to performing an attended installation? (Select all that apply.) Clean Install Verify Installation In-place Upgrade Check Compatibility
Clean Install In-place Upgrade
________ is one of the approaches to performing an attended installation by installing the OS to a new computer or completely replacing the OS software on an old one. Any existing user data or settings would be deleted during the setup process.
Clean install
What actions may a technician utilize when troubleshooting a problematic mobile device? (Select all that apply.) Close running apps Uninstall apps Try a soft reset Perform a factory default reset
Close running apps Uninstall apps Try a soft reset Perform a factory default reset
The network is using a mixture of local and cloud-based resources. What would you use to obtain "visibility" of the whole network from a single management interface? Infrastructure as a Service (IaaS) Cloud-based network controller Virtual Private Network (VPN) Platform as a Service (PaaS)
Cloud-based network controller
charms
Commands displayed in a vertical bar on the right side of a Windows 8 Start Screen. The commands are Search, Share, Start, Devices, and Settings.
A technician has been notified that recent vulnerabilities have been discovered related to a type of SOHO router. The technician has verified that all connections and settings are appropriate. Which of the following actions should the technician take NEXT? A. Change the router firewall settings B. Check for and apply a firmware update C. Reconfigure the QoS settings D. Change router user-names and passwords
B. Check for and apply a firmware update
A customer wants to purchase a new home computer. The machine will mainly be used for Internet browsing and streaming video, except on weekends when the customer's son will use it to play games with friends. Which of the following should the technician focus on to meet these requirements? (Choose two.) A. 80mm case fans B. Four-core processor C. RAID 5 array D. 16GB DDR2 memory E. Dual monitors F. Encrypted hard drive
B. Four-core processor D. 16GB DDR2 memory
Ann, a user, reports that after setting up a new WAP in her kitchen she is experiencing intermittent connectivity issues. Which of the following should a technician check FIRST? A. Channels B. Frequency C. Antenna power level D. SSID
B. Frequency
Which of the following resources in the MOST critical when using cloud file-storage synchronization applications? A. Disk speed B. I/O bandwidth C. RAM utilization D. CPU utilization
B. I/O bandwidth
Which of the following resources is the MOST critical when using cloud file-storage synchronization applications? A. Disk speed B. I/O bandwidth C. RAM utilization D. CPU utilization
B. I/O bandwidth
A workstation has a network link light, but it cannot access internal network resources. Which of the following is the MOST likely cause of the issue? A. Slow transfer speeds B. IP address conflict C. Incorrect gateway D. Packet collisions
B. IP address conflict
A user reports several technicians have been unable to solve a problem and requests that the technician on the phone comes out to fix the problem because the user is unable to work. After the technician has effectively communicated a willingness to help, which of the following is the NEXT step? A. Allow the user to speak with a supervisor. B. Identify the problem. C. Establish a theory. D. Immediately go to the user's office.
B. Identify the problem.
An end user is browsing the Internet when multiple browser pages open by themselves. The user notices the PC is running slowly, even while not browsing the internet. Which of the following actions should the user take? A. Update antivirus definitions B. Install anti-malware software C. Enable the pop-up blocker D. Reboot the PC
B. Install anti-malware software
A brownout has occurred within a building. A technician is repairing a workstation which has a power light, but is not displaying anything on the screen and is not making any sounds during boot up. Which of the following should be used to further troubleshoot the workstation? A. Loop back plug B. POST card C. Power supply tester D. Multimeter
B. POST card
A user's phone contains customer's PII. The user cannot have the phone automatically wiped because the data is very valuable. Which of the following is the BEST method of securing the phone? A. Fingerprint lock B. Passcode lock C. Swipe lock D. PIN lock
B. Passcode lock
Joe, a user, states he is unable to use his Android phone after updating the OS. Joe is in a hurry and would like a quick solution that would most likely fix the issue. Which of the following methods can the technician use? A. Initiate a factory reset B. Perform a hard reset C. Remove the MicroSD card D. Rollback the OS update
B. Perform a hard reset
A technician troubleshooting a computer finds a faulty video card and needs to replace it. Which of the following safety procedures should be used to prevent damaging the new part? A. Ground the computer and remove jewelry. B. Self ground and handle the new card by the edges. C. Place the computer on an ESD mat. D. Attach an ESD strap to the new card during handling.
B. Self ground and handle the new card by the edges.
A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources. Which of the following protocols and authentication methods should the technician implement? (Choose two.) A. WPA B. WPA2 C. WEP D. TKIP E. RADIUS F. Multifactor G. TACACS H. SSO
B. WPA2 F. Multifactor
A user would like to do an in-place upgrade on their current computer to Windows 10 Enterprise. The computer currently runs Windows 8.1 Pro 32-bit. Why won't the upgrade work? A. Windows 8.1 is not directly upgradeable. B. Windows 10 Enterprise is 64-bit. C. Windows 8.1 Pro to Windows 10 Enterprise is not a possible upgrade path. D. Windows Pro cannot be upgraded to Windows Enterprise.
B. Windows 10 Enterprise is 64-bit.
Administrators have recently configured a new email server and multiple users have reported issues receiving emails from outside the network. Why would you use the nslookup command to diagnose the issue? A. You need to test the connectivity between the email server and remote servers. B. You can query your name server and an outside name server to highlight any configuration issues. C. You want to verify the IP configuration information of your email server. D. You need to verify that the email server is online.
B. You can query your name server and an outside name server to highlight any configuration issues.
A technician is working on a Windows 10 PC that is running slowly. Which of the following commands should the technician use to correct this issue? (Select two.) A. dir B. chdsk C. dism D. ipconfig E. format F. diskpart
B. chdsk C. dism
A user is no longer able to browse the Internet after returning from vacation. The user is able to log in and navigate to the local intranet, but not to any outside sites. A technician pings a well-known website by name but gets no reply. The technician then pings its IP address and gets a reply. Which of the following commands will MOST likely resolve the issue? A. ipconfig /all B. ipconfig /flushdns C. ipconfig /release D. ipconfig /setclassid
B. ipconfig /flushdns
A Windows workstation is suspected of having malicious software that created an infected start-up item or service. Which of the following tools would a technician use to test this theory? A. chkdsk B. msconfig C. dxdiag D. ipconfig
B. msconfig
A client's computer is not connecting to a website. Which of the following commands will allow the technician to view the route/number of hops between the host and remote systems? A. nbtstat B. tracert C. nslookup D. netstat
B. tracert
A boot order option is found in the ________. This tells the physical computer which device to boot from. The device order has already been verified.
BIOS (Basic Input Output System)
You are using a company laptop that is protected with several different security methods. After having the laptop serviced for a hardware problem you are prompted to enter a key immediately at bootup. Which security component is likely prompting for this information? Biometric device Active Directory BitLocker BIOS
BitLocker
You are using a company laptop that is protected with several different security methods. After having the laptop serviced for a hardware problem you are prompted to enter a key immediately at bootup. Which security component is likely prompting for this information? Biometric device BIOS BitLocker Active Directory
BitLocker
______ is a security mechanism that protects computer hard drives by encrypting the drive's data. A TPM (Trusted Platform Module) chip is required for it to work. If a hardware change is detected, such as a new motherboard, it would prompt for authorization to access the drive.
BitLocker
enables the user to encrypt all the information on a disk drive.
BitLocker
What features does Windows 10 Professional support?
BitLocker EFS BranchCache Designed for SOHO or Small Business Use Domain Capable
What features does Windows 10 Enterprise support?
BitLocker EFS Volume Licensing BranchCache Domain Capable
Blackberry
Blackberry is a closed source operating system that is owned by Blackberry and found on Blackberry mobile devices.
What environmental power problem is a complete power failure? Surges Sags/Brownouts Blackouts Spike
Blackouts
______ pages could indicate that a toner cartridge has been installed without removing its packing seals.
Blank
On a laser printer, which of the following could be caused by application or driver problems or packing seal left on the toner cartridge? Faint prints Color cast Blank pages Ghost images
Blank pages
A Mac user would like to print to the company's network printers. Which of the following supports printing from Apple devices (choose two)? Bonjour iCloud AirPrint CloudPrint
Bonjour AirPrint
A remote office has five Windows 10 PCs that often access files from the server at the main office. The WAN (Wide Area Network) link between the sites is slow which impacts file access. You decide to optimize the environment by making files more readily available at the remote site. What solution do you implement? VPN Tunnel Remote Assistance Remote desktop BranchCache
BranchCache
______ groups are given a standard set of rights that allow them to perform appropriate system tasks.
Built-in local
A user reports that there is a ghost image of a document on their display. This is most likely due to _______.
Burn-In
bus
Buses are the connections between components on the motherboard and peripheral devices attached to the computer. Buses are available in industry standard formats, each with its own advantages and disadvantages. The standard functions of a bus are to provide data sharing, memory addressing, power supply, and timing. Common bus types include PCI, PCI Express, and USB.
_____ is a type of OS designed to work as a client in business networks.
Business Client
________ is an OS designed to work as a client in business networks.
Business client
an OS designed to work as a client in business networks.
Business client
Which of the following file formats does Android use for application installation? A. .ipa B. .api C. .apk D. .exe E. .sdk
C. .apk
A user creates a file in presentation software to be shown on a widescreen display. The user would like to adjust the aspect ratio of the slides in the presentation software so they display without extra black areas on the top, bottom, left, or right of the slides. Which of the following aspect ratios would BEST meet this requirement? A. 4:3 B. 5:4 C. 16:9 D. 256:135
C. 16:9
An end user reports a printer error that states "Replace filament". With which of the following types of printer is the end user MOST likely having problems? A. Ink jet B. Laser C. 3-D D. Thermal
C. 3-D
An end user reports a printer error that states "Replace filament". With which of the following types of printer is the end user MOST likely having problems? A. ink jet B. Laser C. 3-D D. Thermal
C. 3-D
A technician is configuring a SOHO router to ensure network computers can only use secured protocols on the Internet. Which of the following ports should be allowed? A. 143 B. 23 C. 443 D. 3269 E. 3389
C. 443
A technician is tasked with setting up a workstation in a new location. The technician realizes there is no network connectivity and the workstation's NIC does not have a link light. Given the connection in the wall is correctly labeled, which of the following would be BEST for the technician to use NEXT? A. A multimeter B. A tone generator C. A cable tester D. A punchdown tool
C. A cable tester
A technician has just finished installing a secondary OS on a workstation. After rebooting the computer, the technician receives the following error: No OS found. The technician confirms the boot.ini file is correct. Which of the following is MOST likely causing this error? A. The computer has GRUB Legacy installed B. Windows Startup services are not running C. An incompatible partition is marked as active D. An unsupported version of Windows is installed
C. An incompatible partition is marked as active
What would be a disadvantage, which has a negative impact on performance, of using a hub on a network? A. The hub transmits and receives signals and processes them as digital data. B. The hub only passes signals from one segment to another if there is a match to the destination MAC address. C. Any incoming signal on any of the hub's ports is re-created and sent out on any connected ports. D. The hub can connect nodes together in a single network, repeating and regenerating signals over multiple ports.
C. Any incoming signal on any of the hub's ports is re-created and sent out on any connected ports.
A technician is installing Windows 10 64-bit OS on a VM but keeps getting errors. The specifications for the machine are: -Two 1GHz CPUs -2GB of memory -15GB hard drive -800x600 screen resolution Which of the following should the technician do to resolve the problem? A. Increase the number of CPUs B. Increase the amount of memory C. Increase the amount of hard drive space D. Increase the screen resolution
C. Increase the amount of hard drive space
A technician is installing Windows 7 64-bit OS on a VM but keeps getting errors. The current specs for the VM are: - Two 1GHz CPUs - 2GB of memory - 15GB hard drive - 800x600 screen resolution Which of the following should the technician do to resolve the problem? A. Increase the number of CPUs B. Increase the amount of memory C. Increase the amount of hard drive space D. Increase the screen resolution
C. Increase the amount of hard drive space
Which of the following terminates a coaxial cable? A. DB9 B. RJ45 C. RG-59 D. RS-232
C. RG-59
Which of the following cloud computing concepts allows scalable services to be provided to the client? A. On-demand B. Metered C. Rapid elasticity D. Resource pooling
C. Rapid elasticity
After installing a critical update from Windows Update, a user accidentally types an incorrect URL into the browser and malware is automatically installed. The malware disables the computer's antivirus software and Internet connection. Which of the following would be the BEST tool to remove the malware without risking loss of the user's data? A. Run System Restore B. Reinstall Windows with the Repair Option C. Reinstall Windows on top of itself D. Run System File Checker
C. Reinstall Windows on top of itself
A user, Ann, has reported that she lost a laptop. The laptop had sensitive corporate information on it that has been published on the Internet. Which of the following is the FIRST step in implementing a best practice security policy? A. Require biometric identification to log into the laptop. B. Require multifactor authentication to log into laptop. C. Require laptop hard drives to be encrypted. D. Require users to change their password at frequent intervals. E. Require users to have strong passwords.
C. Require laptop hard drives to be encrypted.
A user received the following error message while trying to access a shared drive: Network Path was Not Found. Which of the following should be performed to resolve the issue? (Select TWO). A. Set the NIC to full duplex. B. Disable the local firewall. C. Reset the TCP/IP stack. D. Disable the Ethernet adapter. E. Use static IP addressing instead of DHCP. F. Flush the DNS cache.
C. Reset the TCP/IP stack. F. Flush the DNS cache.
A technician is trying to install a full-size PCI card into a slim line desktop PC. Which of the following would MOST likely be required to facilitate installation? A. RAID card B. CNR card C. Riser card D. MCA card
C. Riser card
A technician is planning on running multimode fiber and only needs the fiber runs to be 500 feet (152 meters) in distance. Which of the following connectors should the technician use? A. BNC B. LC C. ST D. F
C. ST
A technician needs to boot a PC from a USB drive. Which of the following settings should be disabled to accomplish this task? A. Fast Boot B. UEFI Admin Password C. Secure Boot D. Legacy Boot
C. Secure Boot
A network administrator notices a new WiFi connection has appeared as a wireless network choice and is always at the top of the list. As a result, users are constantly trying to connect to the wrong network. Which of the following should the administrator do to correct this issue? A. Adjust the wireless router antennas to 90 degrees clockwise from the current position. B. Ask the new wireless network owner to adjust the radio power level so it is listed below the company's network. C. Set all of the WiFi users' wireless profiles to automatically connect to the company network. D. Change the company's channel to a lower number than the new network's channel.
C. Set all of the WiFi users' wireless profiles to automatically connect to the company network.
A technician has been tasked with loading the operating system on every PC with a blank hard drive on a network. The technician wishes to install the operating system with minimal physical interaction with the PCs. Which of the following is the BEST way to accomplish this? A. Clone the operating system from an image onto optical media. B. Use the original software media to load the operation system on every PC. C. Set up a central image that the PCs can load from a PXE boot. D. Create an image and copy it from a USB drive using an unattended answer file.
C. Set up a central image that the PCs can load from a PXE boot.
In Windows 10, a system reset can be performed. What is the result of this process when selecting to remove everything? A. Settings are reset and installed software is removed. Personal files are saved. B. The restore point rolls the system back to the selected point in time. Personal files are removed. C. Settings are reset and installed software is removed. Personal files are removed. D. All system files that the sfc (System File Checker) finds corrupted are replaced. Personal files are saved.
C. Settings are reset and installed software is removed. Personal files are removed.
Ann, an end user, receives a call from someone claiming to be from the help desk and asking for her username and password to prevent her email box from being deleted immediately. Which of the following BEST describes this type of attack? A. Shoulder surfing B. Man-in-the-middle C. Social engineering D. Ransomware
C. Social engineering
A user updates the video driver on the computer and it requests a restart after installation. The computer never gets past the loading Windows page without rebooting. Which of the following should the technician use to resolve this issue without losing any vital files or programs? A. Emergency Repair Disk B. Restore from OEM image C. System Recovery D. Restore from backup
C. System Recovery
A user is having problems printing. The technician believes the printer may be out of ink. Which of the following troubleshooting steps should be performed NEXT? A. Establish a plan of action to resolve the problem B. Implement the solution C. Test the theory to determine cause D. Verify full system functionality
C. Test the theory to determine cause
Explain how the Simple Authentication and Security Layer (SASL) provides binding in Lightweight Directory Access Protocol Secure (LDAPS). A. The directory grants anonymous access. B. The server authenticates to the client and configures a secure channel for communications. C. The client and server negotiate the use of a supported security mechanism. D. The client supplies the Domain Name (DN) and password.
C. The client and server negotiate the use of a supported security mechanism.
The steps for setting up a Digital Subscriber Line (DSL) modem are the same as a cable modem except for one. How does connecting a cable modem differ from DSL? A. The connection to the provider network will be through the phone point. B. The connection to the provider network will require a filter to be installed. C. The connection to the provider network will be through a coax cable. D. The connection type must be matched to the network type.
C. The connection to the provider network will be through a coax cable.
A new device is connected to the network. The device automatically receives an Internet Protocol (IP) address. What protocol, transport(s), and port number(s) was responsible for supplying this device its address? A. The device received its IP address from NetBT over UDP or TCP on port numbers 137 through 139. B. The device received its IP address from SNMP over UDP on port number 161. C. The device received its IP address from DHCP over UDP on port numbers 67 and 68. D. The device received its IP address from DNS over TCP or UDP on port number 53.
C. The device received its IP address from DHCP over UDP on port numbers 67 and 68.
An end user has reported not receiving emails sent by a specific customer. Which of the following is the MOST likely cause of this issue? A. The HIPS device is blocking the messages B. The access control list is blocking the messages C. The email filter has quarantined the messages D. The firewall is blocking the sender's email address
C. The email filter has quarantined the messages
A technician is troubleshooting a WiFi issues with a laptop user in a corporate office. The user can connect to web pages without trouble; however, the user cannot connect to the email server or print a locally stored document to the network printer. The technician cannot ping the mail server or the network printer. No other users are experiencing this issue. Which of the following is MOST likely causing the issue? A. The laptop has an APIPA address B. The laptop is configured to the wrong default gateway C. The laptop is connected to the guest WiFi D. The laptop is configured with a static IP
C. The laptop is connected to the guest WiFi
A network administrator is unable to install programs on a workstation. Which of the following is MOST likely the reason the administrator is not able to install applications? A. The workstation is victim of a denial of service attack. B. The username is not authenticating on the network. C. The username is not part of the local administrator group. D. The administrator has not applied appropriate security patches.
C. The username is not part of the local administrator group.
A new employee has reported that print jobs are printing as garbled text. Which of the following is MOST likely the reason for this issue? A. The printer needs a maintenance kit installed B. The network cable on the printer is unplugged C. The workstation has the incorrect drivers installed D. The employee does not have the proper permissions
C. The workstation has the incorrect drivers installed
A technician is asked to install Microsoft office directly on a customer's computing device. The technician notifies the customer that office cannot be installed directly on that device. Which of the following device types does the customer have? A. Mac B. Thick client C. Thin client D. Phablet
C. Thin client
In terms of network access, what is the purpose of a blacklist? A. To determine access to the network from the address assigned to each network card B. To define the specific clients that will be denied access to the network C. To identify the devices that are not authorized to access the network D. To identify attempts to access a secure domain and prevent unauthenticated access
C. To identify the devices that are not authorized to access the network
A technician is working on a user's workstation and notices a lot of unknown processes running in the background. The user informs the technician that an application was recently downloaded from the Internet. Which of the following types of infection does the user MOST likely have? A. Rootkit B. Keylogger C. Trojan D. Ransomware
C. Trojan
A technician is working at a help-desk form and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in. Which of the following is the BEST choice for the technician to make? A. Politely ask the user to call back B. Ask another technician to take the call C. Troubleshoot the issue for the user D. Input the issue as a ticket and escalate to Tier 2 E. Put the user on hold and troubleshoot after the scheduled break
C. Troubleshoot the issue for the user
Telnet on Transmission Control Protocol (TCP) port 23, a command-line emulation protocol and program, is still sometimes used for what? A. To establish a Wi-Fi Direct connection between devices to transfer files B. Replacement of unsecure administration and file copy programs C. Troubleshooting and configuration D. To connect to a Screen Sharing server
C. Troubleshooting and configuration
Data on full disk encrypted drives using BitLocker is MOST secure from loss when combined with which of the following technologies? A. USB authentication token B. Filesystem access controls C. Trusted platform module D. Fingerprint reader
C. Trusted platform module
Transport Control Protocol (TCP) and User Datagram Protocol (UDP) are the most widely used protocols that are built on the top of Internet Protocol (IP). Both protocols are used to send bits of data over the Internet, which is also known as 'packets'. How is UDP different from TCP? A. UDP is connection oriented, slower, a heavy weight connection, and ensures packets are received. B. UDP is connection oriented, faster, a heavy weight connection, and does not ensure packets are received. C. UDP is connectionless, faster, a lightweight transport layer, and does not ensure packets are received. D. UDP is connectionless, slower, a lightweight transport layer, and ensures packets are received.
C. UDP is connectionless, faster, a lightweight transport layer, and does not ensure packets are received.
A technician needs to install a clean Windows OS on several laptops in the office. The office is running a 100Base-T network. The owner would like the installations completed as soon as possible. Which of the following installation methods should the technician use? A. FireWire External Hard Drive B. PXE-based Network Installation C. USB 3.0 Flash Drive D. DVD-ROM
C. USB 3.0 Flash Drive
A technician is in need of a device that would give the BEST network protection within a single device. Which of the following devices would the technician use? A. NLX B. IDS C. UTM D. ATX
C. UTM
A customer reports that a smartphone is experiencing a very short battery life. The user has been using this phone for a short time and has installed several apps recently. Which of the following might be the cause of the issue? A. Slow data speeds B. Defective SD card C. Unauthorized root access D. Signal drop or weak signal
C. Unauthorized root access
A user is reporting that a desktop monitor backlighting is very dim. Which of the following should be performed FIRST when troubleshooting the problem? A. Update drivers B. Reseat the video card C. Use OSD tools D. Replace the monitor
C. Use OSD tools
Which file system is a technical standard that is referred to as ISO 9660? NTFS exFAT UDF CDFS
CDFS
______ is a legacy file system used for Compact Disc optical media. It has two writing modes and an extension called Joliet that allows for long file name support.
CDFS (CD File System)
On older computers, _______ RAM stored the PC's basic configuration and any settings made via the system firmware setup program.
CMOS
When a user browses to a favorite website on a Windows laptop, a different website opens. A technician installs an additional web browser, but it also opens to the same unfamiliar site. The technician resets the web browser settings back to default, but the issue persists. Which of the following troubleshooting steps should the technician complete NEXT? A. Change the browser's home page B. Check the Windows host file C. Update the default web browser D. Restore Windows to a previous date
B. Check the Windows host file
You are configuring Email on a user's mobile device. You decide to let the application detect and setup the Email client with little intervention. What type of configuration technology is being used? Airplane mode Autodiscover Post office protocol Pretty good privacy
Autodiscover
______ is a property of secure information that means that information is accessible to those authorized to view or modify it.
Availability
Respect means that you treat others (and their property) as you would like to be treated. What are some elements of respect? (Select all that apply.) Avoid Distractions Prioritize Work Respect for Property and Confidentiality Cultural Sensitivity
Avoid Distractions Respect for Property and Confidentiality Cultural Sensitivity
Accounts can be managed at the command line using the net user command. What example disables the dmartin account? A) Net user dmartin Pa$$w0rd/add/fullname "David Martin"/logonpasswordchg:yes B) Net user dmartin/active:no C) Net user dmartin D) Net localgroup Administrators dmartin/add
B) Net user dmartin/active:no
By default, which of the following ports is used for SMTP? A. 21 B. 25 C. 110 D. 143
B. 25
Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows? A. 2GB B. 4GB C. 8GB D. 16GB
B. 4GB
A user wants to implement a wireless router that will have the fastest data speeds and operate over the 5GHz frequency. Which of the following standards should the user select? A. 802.11a B. 802.11ac C. 802.11g D. 802.11n
B. 802.11ac
Under normal circumstances, which of the following wireless standards provides the slowest transfer speed at 2.4GHz? A. 802.11a B. 802.11b C. 802.11g D. 802.11n
B. 802.11b
A technician is disposing of computer hardware that contains PHI. The drive must be reusable. Which of the following methods should be used? A. Degauss B. Drive wipe C. Standard format D. Low-level format
B. Drive wipe
A SOHO is considering a purchase of several printers that will facilitate printing on both sides of the media. Which of the following optional add-ons will provide this functionality? A. Collate B. Duplex C. Fast draft D. Paper type
B. Duplex
A group of users need to connect directly to a printer with continuous access. Which of the following connection types will achieve this? A. Serial B. Ethernet C. USB D. eSATA
B. Ethernet
After powering on your workstation, you notice the system time has reset. You reboot the workstation and notice BIOS (basic input/output system) settings have also reset. What seems to be the issue? Workstation experienced a power loss from the PSU (Power Supply Unit). Operating System boots to incorrect disk. Motherboard is damaged by Electrostatic discharge. CMOS battery is failing.
CMOS battery is failing.
A user's printer is printing all print jobs incorrectly. The text appears misaligned, so you decide to adjust the print quality using the printer's control panel. What process are you performing? Maintenance Cleaning Testing Calibrating
Calibrating
You are troubleshooting a printer for a user. While speaking to the printer vendor for support, you need to identify the components. Which of the following is NOT found in a laser printer? Fuser Drum Carriage Corona wire
Carriage
What Internet connection's most common speeds are 3G and 4G? DSL Cellular Satellite Line of Sight
Cellular
______ facilitates a wireless network over a large distance using portable devices such as smart phones. These networks use a combination of circuit-switching and packet-switching.
Cellular radio wireless networking
Windows provides different levels of share permissions. Which one allows the user to edit a file, but does NOT allow the user to set permissions for others? Full Control Change Read Shared Folders
Change
_____ is similar to full control share permissions but does not allow the user to set permissions for others.
Change
_______ means putting polices in place to reduce the risk that changes to these components could cause service disruption (network downtime).
Change management
The 2.4 gigahertz (GHz) band is subdivided into up to 14 channels with only 3 that are non-overlapping. There are 23 non-overlapping channels in the 5 GHz band. Which of these channels are permitted for use in the Americas? Channels 1-13 All 14 channels All 23 channels Channels 1-11
Channels 1-11
Which of the following cloud computing models has a cost that is shared between several organizations or groups? Hybrid Private Public Community
Community
CD-RW
Compact disks containing a heat sensitive compound whose properties can be changed between crystalline and amorphous by a special laser.
CD-R
Compact disks containing a layer with photosensitive dye in which a laser transforms the dye to mimic the pits and lands of a premastered CD.
______ enables you to register new server applications or reconfigure security permissions for existing services.
Component Services
_______ enables you to register new server applications or reconfigure security permissions for existing services.
Component Services
Which Administrative Tool allows the default management console with multiple snap-ins to configure local users and groups, disks, services, and devices? Component Services Data Sources Computer Management Local Security Policy
Computer Management
Which of the following means identifying all components of the information and communications technology infrastructure properties? Change Management IT Infrastructure Library (ITIL) Configuration Management Baseline
Configuration Management
________ means identifying all components of the information and communications technology infrastructure and their properties.
Configuration management
It is often useful for hosts such as servers, routers, and printers to use the same Internet Protocol (IP) address. To ensure these hosts keep the same IP address, what configuration setting needs to be made on the Dynamic Host Configuration Protocol (DHCP) server? Dynamically assign IP addresses. Use static IP addressing. Configure DHCP reservations. Use Automatic Private IP Addressing (APIPA).
Configure DHCP reservations.
Once a system has been cleaned then the appropriate steps need to be taken to prevent re-infection. What is it called when the Anti-Virus (A-V) software intercepts an Operating System (OS) call to open a file and scans the file before allowing or preventing it from being opened? Configuring On-access Scanning Configuring Scheduled Scans DNS Configuration Software Firewalls
Configuring On-access Scanning
_____ is a scanning technology that uses LEDs (Light Emitting Diodes) to illuminate the image during a scan.
Contact Image Sensor (CIS)
_________ are firewall settings which block websites and services on the basis of keywords or site rating and classification services.
Content filtering/parental controls
______ beep = power supply, motherboard, or system memory problem. Other manufacturers may use beep codes for singular hardware and not multiple.
Continuous
A user is reporting that they have a dim screen. To solve this, you can adjust the brightness and _____ controls.
Contrast
Put the following folder redirection steps in the correct order. Create a network file share to use for folder redirection. Create a security group for folder redirection and add group members. Configure Offline Files for folder redirection. Create a folder redirection group policy object.
Create a security group for folder redirection and add group members. Create a network file share to use for folder redirection. Create a folder redirection group policy object. Configure Offline Files for folder redirection.
Which of the following is a good way for a technician to manage multiple printers? Keep printer drivers up to date. Create an administrative alert for error events in printer logs. Restart printers daily. Clear the print queue at the end of each business day.
Create an administrative alert for error events in printer logs.
slicing
Creating horizontal layers to use in 3D modeling and 3D printers.
In Linux, if you want to run a batch of commands or a script to perform a backup or other maintenance task what is the scheduling service called? Task Scheduler Finder Cron Time Machine
Cron
_______ is the scheduling service in Linux when you want to run a batch of commands or a script to perform a backup or other maintenance task.
Cron
The use of encryption and other digital security techniques provides users with three important security requirements on computer networks: confidentiality, integrity, and authentication. What are the principal types of cryptographic technology? (Select all that apply.) Public Key Infrastructure (PKI) Cryptographic Hashes Asymmetric Encryption Symmetric Encryption
Cryptographic Hashes Asymmetric Encryption Symmetric Encryption
What two sets of key combinations will you use to access Task Manger?
Ctrl + Alt + Del Ctrl + Shift + Esc
Which of the following requires less current to provide the same amount of power to devices inside a PC? A. 5.5V B. 12V C. 120V D. 220V
D. 220V
A technician is called into the office during a thunderstorm. Users are reporting that machines are intermittently powering off. Which of the following will BEST prevent user data loss? A. Auto save B. A surge protector C. An ESD mat D. A UPS
D. A UPS
Setting up a network requires the use of various devices requiring that you know the difference between each. What are the differences between a hub, a switch, and a router? A. A hub controls traffic between networks, a switch merely passes traffic between devices, and a router directs traffic from one device to another. B. A hub directs traffic from one device to another, a switch controls traffic between networks, and a router merely passes traffic between devices. C. A hub merely passes traffic between networks, a switch passes signals from one segment to another, and a router transmits and receives signals and processes them as digital data. D. A hub merely passes traffic between devices, a switch directs traffic from one device to another, and a router controls traffic between networks.
D. A hub merely passes traffic between devices, a switch directs traffic from one device to another, and a router controls traffic between networks.
Which of the following features is an advantage of a switch over a hub? A. A switch routes packets instead of frames to different networks. B. A switch divides bandwidth among connected devices. C. A switch broadcasts the data frames to every connected device. D. A switch sends data frames to the correct connected device.
D. A switch sends data frames to the correct connected device.
What would be a disadvantage, which has a negative impact on performance, of using a hub on a network? A. The hub transmits and receives signals and processes them as digital data. B. The hub can connect nodes together in a single network, repeating and regenerating signals over multiple ports. C. The hub only passes signals from one segment to another if there is a match to the destination MAC address. D. Any incoming signal on any of the hub's ports is re-created and sent out on any connected ports.
D. Any incoming signal on any of the hub's ports is re-created and sent out on any connected ports.
A user contacts a technician to troubleshoot server errors. The user explains that some files will not open on the server, the data backups are operational, and the weather has been bad. The technician notices missing time slots in the event log. Which of the following should the technician replace to prevent these issues in the future? A. System memory B. Surge protector C. Hard drives D. Battery backup
D. Battery backup
A technician is connecting a PoE enabled phone and needs to run the drop from the switch that is 55 meters (180.4 feet) away. Which of the following cable types would be the MOST suitable for this purpose? A. Fiber B. Coaxial C. CAT3 D. CAT6
D. CAT6
Joe would like an Internet connection that is always on, stable, and not influenced by atmospheric conditions. Which of the following Internet connection types would BEST meet Joe's requirements? A. Dial-up B. Mobile Hotspot C. Satellite D. Cable
D. Cable
A technician is performing a clean install of Windows on a new hard drive from a factory DVD, but the computer does not recognize the optical disc. A "non-system disk or disk error" is observed. Which of the following should the technician do FIRST? A. Update the motherboard firmware B. Check the cables C. Replace the optical drive D. Check the BIOS setting
D. Check the BIOS setting
Multicast addresses fall in which of the following classful address ranges? A. Class A B. Class B C. Class C D. Class D E. Class E
D. Class D
Ann, a user, boots her laptop and notices the screen flashes then turns black. It was working during her presentation yesterday. Which of the following troubleshooting steps should be completed? A. Use a multimeter to test voltage. B. Replace the laptop with a new one. C. Replace the battery. D. Connect an external display device.
D. Connect an external display device.
A user purchases a wireless printer and sets it up in an office. The user installs all necessary software for the printer on the computer and connects the printer to the guest wireless network. However, when the user attempts to print to the printer, nothing happens. Which of the following will resolve the issue? A. Set up the user's computer to act as a print server. B. Configure the printer to use the Internet printing protocol. C. Ensure the user's computer is set to DHCP. D. Connect the printer to the company wireless network.
D. Connect the printer to the company wireless network.
An end-user is attempting to access a file-sharing site to download files shared by a customer, but is receiving a message stating the site has been blocked. Which of the following is the MOST likely cause of this issue? A. Antivirus software B. Internet connectivity issues C. Ransomware infection D. Content-filtering
D. Content-filtering
Which of the following would likely be the MOST cost-effective media to use for storing 8GB of data? A. DVD RW B. CD-ROM C. Tape backup D. DVD+R DL
D. DVD+R DL
Which of the following would MOST likely be found on a docking station versus a port replicator? A. USB Hub B. VGA Port C. PS/2 Slot D. DVD-ROM
D. DVD-ROM
The touch-screen feature on a Windows device has stopped working. Which of the following should the technician check FIRST? A. Device Manager B. Performance Monitor C. System configuration D. Digitizer settings
D. Digitizer settings
A computer was recently infected by malware after a flash drive was plugged in. The user, Ann, indicates she never opened any files or folders from the flash drive. A technician needs to prevent this from occurring in the future. Which of the following would accomplish this? A. BitLocker To Go B. Set strong passwords C. Disable usermin D. Disable AutoRun
D. Disable AutoRun
A customer asks a technician for a device that has the capability to easily connect a laptop to an external monitor, keyboard, mouse, and charge the battery. Which of the following devices should the technician recommend to the customer? A. Lightning B. KVM switch C. USB 3.0 D. Docking station
D. Docking station
A technician has upgraded four computers and would like to securely repurpose the hard drives for later use. Which of the following should the technician do to the drives to prepare them for later use? A. chkdsk B. Degauss C. Quick format D. Drive wipe
D. Drive wipe
A server needs a RAM upgrade, and a technician has been tasked with retrieving the RAM from storage and then installing it. Which of the following is the BEST RAM type for the technician to retrieve? A. SoDIMM B. DDR4 C. Single channel D. ECC
D. ECC
A server needs a RAM upgrade, and a technician has been tasked with retrieving the RAM from storage and then installing it. Whish of the following is the BEST RAM type for the technician to retrieve? A. SoDIMM B. DDR4 C. Single channel D. ECC
D. ECC
An employee is unable to view in-office network folders while working at home. Which of the following is the MOST likely cause of the problem? A. Untrusted software B. Outdated antivirus C. MDM policies D. Inactive VPN
D. Inactive VPN
A technician is trying to install Windows on a computer. The install process reports there are no storage devices available, but the BIOS shows a hard drive is installed. Which of the following does the technician need to do? A. Create a primary partition B. Use NTFS C. Enable PXE D. Install third-party drivers
D. Install third-party drivers
Joe, a user, reports that several of his colleagues have received a suspicious email from his account that he did not send. A technician asks one of the colleagues to forward the email for inspection. After ruling out spoofing, the technician verifies the email originated from the corporate email server. Which of the following is the FIRST step the technician should take to correct this issue? A. See if Joe's email address has been blacklisted B. Change the password on Joe's email account C. Update the antivirus and perform a full scan on the PC D. Isolate Joe's computer from the network
D. Isolate Joe's computer from the network
A bridge divides a local network into two or more segments. Where collisions occur in these segments, the bridge can separate those collision domains. How does the bridge perform this function? A. It forwards signals received out of each port for reception by all devices. B. It transmits and receives signals and processes them as digital data. C. It receives frames into a port buffer and reads the destination MAC address from the Ethernet frame. D. It tracks MAC addresses of each port and only forwards communications out of the port associated with the destination MAC address.
D. It tracks MAC addresses of each port and only forwards communications out of the port associated with the destination MAC address.
The main directory standard for interoperability of network resources directories is X.500. What protocol was standardized by Internet Engineering Task Force (IETF) to query and update an X.500 directory over which default protocol(s) and port(s)? A. Service Location Protocol (SLP) over TCP port 427 B. HyperText Transfer Protocol (HTTP) over TCP port 80 C. Simple Network Management Protocol (SNMP) over UDP port 161 D. Lightweight Directory Access Protocol (LDAP) over TCP or UDP port 389
D. Lightweight Directory Access Protocol (LDAP) over TCP or UDP port 389
Joe, a technician, is preparing to replace a laptop screen. This laptop has a touch screen to support Windows 8.1 in order to use the Metro tiles. Which of the following is the FIRST step the technician should perform? A. Remove the laptop bezel B. Document and label each cable and screw location C. Organize the replacement parts D. Refer to the manufacturer's documentation
D. Refer to the manufacturer's documentation
A technician needs to log into a user's computer to fix the user's corrupt local profile. Which of the following connectivity tools will allow the technician to connect to the user's computer? A. Remote Assistance B. Virtual Private Network C. Computer Management D. Remote Desktop
D. Remote Desktop
A smartphone user experiences difficulty removing the back cover of the device. Once finally removed, the battery appears to have swollen. The battery is still functional, but requires more frequent charging than it used to. Which of the following should the user do NEXT? A. Remove the battery and let it cool for 24 hours B. Fully discharge and then fully recharge the battery C. Short the battery terminals with a paper clip D. Replace the battery with a new one
D. Replace the battery with a new one
A new user has been issued a laptop. They are not very tech savvy and require some assistance with adjusting the laptop screen brightness. What is the easiest and quickest way for the user to adjust the brightness? BIOS (Basic Input Output System) Fn (Function) key combination Control Panel Glare screen
Fn (Function) key combination
disk defragmentation
Fragmentation occurs when a data file is not saved to contiguous sectors on a disk. This decreases performance by making the disk read/write heads move between fragments. Defragmentation is a software routine that compacts files back into contiguous areas of the disk. The process can be run from a command-line using the defrag utility, but it is more often run from Windows.
A user is having quality issues with audio playback in their workstation. This could be a problem with the ______ response.
Frequency
What type of backup will backup all selected data regardless of when it was previously backed up? Full Differential Incremental
Full
________ allows users to read, edit, create, and delete files and subdirectories, and assign permissions to other users and groups.
Full Control
You will be installing a used hard drive in a spare PC. You need to prepare the hard drive for use and would like to have the drive scanned for bad sectors. Which step should you perform? Convert to Dynamic Disk Full Format Quick Format Partition
Full Format
You have been assigned to configure a new enterprise wireless router for your employer's network. Which of the following settings should be changed first? Media Access Control (MAC) address filters Configure encryption Default Service Set Identifier (SSID) Default password
Default password
In an organization, a ______ is a means of establishing a more secure configuration. The idea of a _____ is that hosts placed within it are untrusted by the local network zone.
Demilitarized Zone (DMZ)
In an organization, which physical configuration is a means of establishing a more secure network? Demilitarized Zone (DMZ) Universal Plug and Play (UPnP) Port Triggering Whitelists/Blacklists
Demilitarized Zone (DMZ)
_______ refers to a computer on the Local Area Network (LAN) that is configured to receive communications for any ports that have not been forwarded to other hosts.
Demilitarized Zone (DMZ)
What network connection uses an analog modem to dial another modem on the Internet Service Provider (ISP) remote access server, which then transfers the data onto the ISP's network and to and from the wider Internet? Wireless WAN (Cellular) Dial Up Virtual Private Network (VPN) SOHO (small office/home office)
Dial Up
Which is a simple conversation between two computers that provides the slowest connection speed? Cellular Dial-up DSL Cable
Dial-up
What type of backup will backup all data modified since the last full backup? Full Differential Incremental
Differential
DisplayPort
Digital A/V interface developed by VESA. DisplayPort supports some cross-compatibility with DVI and HDMI devices.
How is a website and program code made trustworthy by proving the site or code author's identity? Certificate Authority (CA) Root Certificates Digital Certificate Public Key
Digital Certificate
______, like ISDN, is a telecommunications technology that enables the delivery of digital data over standard phone lines. However, it is a service, that once installed Internet access, is "always on".
Digital Subscriber Line (DSL)
________ uses the higher frequencies available in a copper telephone line. It is always on and is not a dial-up technology.
Digital Subscriber Line (DSL)
Like any other computer, mobile devices can have their own issues that need diagnosing and fixing. What is one of the common issues that usually happens when the user has set the backlight to its lowest setting? Dim Display Touchscreen Unresponsive External Monitor Issues Sound Issues
Dim Display
The _______ displays a report on the system's DirectX configuration, which determines its ability to support 3D graphics and sound.
DirectX Diagnostic Tool
Factory Recovery Partition
Disk partition accessible via the startup sequence that contains an image of the system partition as produced by the PC vendor. This can be used to recover the PC to its factory state by performing a repair install, but will erase any user data or installed programs.
clusters
Disk sectors are grouped in clusters of 2, 4, 6, 8, or more. The smaller the cluster size, the lower the data overhead in terms of wasted space, but larger clusters can improve performance.
airborne particles
Dust and other small items that can be blown about and carried on air currents, that if they get inside computers, can prevent effective heat dissipation.
Which file system has a maximum file size of 4 GB (Gigabyte) minus 1 byte? exFAT UDF FAT16 FAT32
FAT32
_____ is a file system created as an improvement over FAT16, such as larger volumes.
FAT32 (File Allocation Table)
What can you do to your mobile device that will remove all user data, apps and settings? Rebooting a mobile device Uninstall / Reinstall Apps Closing running apps Factory Default Reset
Factory Default Reset
Upon using a partitioning tool on your Windows 7 PC, you have deleted a partition labeled as recovery. What was this partition used for? Local system backups System restore points System crash data Factory recovery
Factory recovery
(T/F) If toner is spilled on skin or clothes, you should use soap and hot water to clean it off.
False
If your Wi-Fi settings were configured as below: SSID: CompTIA_WiGuest Security: WPA Answer the following questions: It is mandatory for CompTIA_WiGuest to use AES for encryption. (T/F) Disabling the SSID is an effective way to provide additional privacy and security. (T/F)
False True
________ is not a circuit-switched technology. It supports a much higher bandwidth than the others with less distance limitations, but is still quite expensive to extend to individual homes.
Fiber optic Internet
system firmware
Low-level code to allow the computer components to be initialized and load the main operating system software.
_______ is a firewall setting where firewall, switches and access points can be configured either with whitelists of allowed MACs or blacklists of prohibited MACs.
MAC filtering
A type of network formed by connecting multiple Local Areas Networks (LANs) spanning an entire city or campus is commonly referred to as: LAN WLAN VLAN MAN
MAN
______ are any server based systems that have been configured into the domain, but do not maintain a copy of the Active Directory database and are therefore unable to provide logon services.
Member servers
______ are any server-based systems that have been configured into the domain, but do not maintain a copy of the Active Directory database and are therefore unable to provide logon services. Because the user validation process consumes resources, most servers are configured as member servers rather than domain controllers.
Member servers
blanking plate
Metal strips that cover unused adapter slots in the case so that proper air flow is maintained within the system case.
Because of user complaints of intermittent network connectivity, you investigate cabling to find that many cables cross above your office's break room microwaves. Why is this discovery a probable source of the connectivity problems? The cables become overheated and the cable integrity fails. The microwaves cut through cables and strip their insulation. Microwaves produce a large amount of electrical noise. The cables that touch the microwaves will short and cause signal loss.
Microwaves produce a large amount of electrical noise.
This motherboard is: 6.7 x 6.7 inches only has 1 expansion slot
Mini-ITX
RAID 1
Mirror Only two disk Can lose 1 drive 50% of storage available Not for performance
On a CDMA (Code Division Multiple Access) network, how are mobile handsets identified by the carrier? International Mobile Subscriber Identity (IMSI) Mobile Equipment ID (MEID) Subscriber Identity Module (SIM) Equipment Identity Register (EIR)
Mobile Equipment ID (MEID)
______ make a physical network link with the ISP's network.
Modems
When the user wants to finish using Windows, simply disconnecting the power runs a risk of losing data or corrupting system files. There are various choices for closing or suspending a session. Which choice below will save the current session to disk before powering off the computer? Hibernate Shut down Log off Standby/Sleep
Hibernate
If a mobile device is lost or stolen, there are mechanisms to recover it and to prevent any misuse or loss of data stored on the device. What physical technology are most smartphones and many tablets equipped with that can determine a receiver's position on the Earth based on information received from satellites? Indoor Positioning Systems (IPS) Geotracking Location applications Global Positioning System (GPS)
Global Positioning System (GPS)
Google drive
Google drive is a freemium cloud service from Google. Google drive is used to store and synchronize documents between systems, and it is available on a number of platforms.
An industrial designer is looking to improve the performance of Computer Aided Design (CAD) software. You recommend adding a Graphics Processing Unit (GPU) to the designer's computer. With which of the following does the GPU need to be compliant? Graphics Application Programming Interface (API) Clock speed Digital interfaces Frame rate
Graphics Application Programming Interface (API)
The ______ group has only limited rights; for example, members can browse the network and Internet and shut down the computer but cannot save changes made to the desktop environment.
Guests
Which of the following technologies found on a mobile device can detect rotational motion? Accelerometer Gyroscope Haptic feedback Light sensor
Gyroscope
_____ are an older technology than SSDs. They are cheaper, but the end-user sacrifices the speed and performance of an SSD.
HDDs
Which of the following cable types supports only digital signals and is currently the most common cable type among consumer electronics? VGA DVI-D HDMI (Type A) DisplayPort
HDMI (Type A)
Which file system is a proprietary file system developed by Apple for use in systems running MacOS? HFS ext4 NTFS NFS
HFS
The registry is structured as a set of five root keys that contain computer and user databases. Which of the following are root key names? (Select all that apply.) HKEY_LOCAL_MACHINE REG_BINARY REG_DWORD HKEY_USERS
HKEY_LOCAL_MACHINE HKEY_USERS
HKEY_LOCAL_MACHINE
HKEY_LOCAL_MACHINE is a root key name that handles hardware information such as bus type, system memory, device drivers, and startup control data.
HKEY_USERS
HKEY_USERS is a root key name that contains all actively loaded user profiles, including HKEY_CURRENT_USER, which always refers to a child of HKEY_USERS, and the default profile.
You are an IT Analyst for a large chain of restaurants. Your department has been asked to evaluate accepting payments through wireless transmission from mobile devices. Which standard technology are they referring to? Infrared (IR) Radio Frequency Identification (RFID) Near Field Communication (NFC) WiFi
Near Field Communication (NFC)
_____ is a system group that contains the user account(s) of any users currently connected to the computer over a network.
Network
What feature is a requirement for port forwarding to work? Dynamic Host Configuration Protocol (DHCP) Network Address Translation (NAT) Universal Plug and Play (UPnP) Dynamic Network Address Translation (DNAT)
Network Address Translation (NAT)
Which of the following processes assigns a public Internet Protocol (IP) address to a computer inside a private network? Network Address Translation (NAT) Virtual Local Area Network (VLAN) Dynamic addressing Subnetting
Network Address Translation (NAT)
Which of the following processes assigns a public Internet Protocol (IP) address to a computer inside a private network? Virtual Local Area Network (VLAN) Network Address Translation (NAT) Dynamic addressing Subnetting
Network Address Translation (NAT)
What types of operating systems (OSs) are designed to run on servers in a business network? Business Client Network Operating System (NOS) Home Client Cell Phone
Network Operating System (NOS)
_______ is an OS designed to run on servers in business networks.
Network Operating System (NOS)
an OS designed to run on servers in business networks.
Network Operating System (NOS)
Thermal Printer uses Toner Heat-sensitive Paper Piezoelectric Dot Matrix Extruder PDF
Heat-sensitive paper
You are pricing out a new laptop for a user. You decided to go with a traditional hard disk that has a cache of flash memory. Which type of disk are you purchasing? Hard disk drive Solid state drive M.2 Solid state drive Hybrid disk drive
Hybrid disk drive
Which protocol allows for a protected dialog between the client and server by assigning the web server a digital certificate issued by a Certificate Authority? Secure Sockets Layer/Transport Layer Security (SSL/TLS) Hypertext Transfer Protocol (HTTP) Hypertext Transfer Protocol Secure (HTTPS) Network Time Protocol (NTP)
Hypertext Transfer Protocol Secure (HTTPS)
An _____ address based printer connection allows the client computer to communicate directly to the printer over a wired or wireless network. The print spooler runs locally on the client computer.
IP (Internet Protocol)
What is the term for the situation in which two devices share the same Internet Protocol (IP) address? Interference IP conflict ICMP Spoofing
IP conflict
What is a fully digital telephone service, providing data, voice, and video channels over existing phone lines which requires that a phone number be dialed to access the Internet? ISDN Dial-up DSL Cellular
ISDN
Which of the following is a dial-up service and is a digital circuit-switched technology for voice, video, and data? DSL Fiber optic ISDN Cellular
ISDN
______ is a digital circuit-switched technology that uses existing copper telephone wiring versus fiber links as FTTP uses.
ISDN (Integrated Services Digital Network)
______ is a telecommunications technology that enables the delivery of digital data over standard phone lines. It is a dial-up service that is faster than 56K modem but slower than Digital Subscriber Line (DSL).
ISDN (Integrated Services Digital Network)
______ is a popular documentation of good and best practice activities and processes for delivering IT services.
IT Infrastructure Library (ITIL)
In a cloud computing environment, which type of service would include the configuration of virtual gateways, virtual private networks, virtual servers, and virtual switches? SaaS (Software as a Service) PaaS (Platform as a Service) IaaS (Infrastructure as a Service) Virtual Desktop Infrastructure (VDI)
IaaS (Infrastructure as a Service)
variable
Identifier for a value that can change during program execution. Variables are usually declared with a particular data type.
boot partition
In Microsoft terminology, the partition that contains the operating system (that is, the\WINDOWS folder) is referred to as the boot partition. This is typically a different partition to the system partition (the partition containing the boot files).
system partition
In Microsoft terminology, the system partition is the bootable partition on the hard disk. This is usually, but not always, separate to the boot partition, which contains the operating system. The system partition is usually hidden from File Explorer (no drive letter is assigned to it).
port (network)
In TCP and UDP applications, a port is a unique number assigned to a particular application protocol (such as HTTP or SMTP). The port number (with the IP address) forms a socket between client and server. A socket is a bi-directional pipe for the exchange of data. For security, it is important to allow only the ports required to be open (ports can be blocked using a firewall).
formatter board
In a laser printer, the unit that exposes and processes all of the data received from the computer and coordinates the steps needed to produce the finished page.
ink cartridge
In an inkjet printer, a cartridge containing an ink reservoir and sensors to detect the amount of remaining ink, typically with separate cartridges for cyan, magenta, yellow, and black ink. Most ink cartridges also contain the print head for the printer.
piezoelectric printing
Ink delivery system in an inkjet printer that uses a tiny element that changes shape to act as a pump used in Epson printers.
touchpad
Input device used on most laptops to replace the mouse. The touchpad allows the user to control the cursor by moving a finger over the pad's surface. There are usually buttons too but the pad may also recognize "tap" events and have scroll areas.
What is the typical input voltage for a power supply in North America? Input of 12V Input of 115V Input of 5V Input of 240V
Input of 115V
You want to create a standard image for installation on multiple computers on the network. What is the first step in the process of image deployment? Create a software repository that includes required dependencies. Install a disk mirroring utility to a master workstation. Install the operating system on a reference computer. Create a recovery partition on the master disk.
Install the operating system on a reference computer.
You want to create a standard image for installation on multiple computers on the network. What is the first step in the process of image deployment? Create a software repository that includes required dependencies. Install the operating system on a reference computer. Create a recovery partition on the master disk. Install a disk mirroring utility to a master workstation.
Install the operating system on a reference computer.
A Virtual Desktop Infrastructure (VDI) has been installed and configured. Users are ready to receive and use their thin clients. Which actions are commonly performed by admins to set up a thin client? (Select TWO.) Install thin client OS. Install a small form factor GPU. Configure the connection manager/broker. Setup dual monitors.
Install thin client OS. Configure the connection manager/broker.
If you create a multiboot installation with two or more operating systems, which primary technical concern should be considered regarding the installation process? OS version Security Installation order Licensing
Installation order
multiboot system
Installing multiple operating systems on a single computer. Each OS must normally be installed to a separate partition.
in-place upgrade
Installing the OS on top of an existing version of the OS, retaining applications, user settings, and data files.
clean install
Installing the OS to a new computer or completely replacing the OS software on an existing computer, and in the process, deleting existing applications, user settings, and data files.
_____ is a dial-up service and makes use of copper telephone wiring. Unlike dial-up, it can use higher speeds since it can transmit signatures for both voice and data over the line.
Integrated Services Digital Network (ISDN)
A system administrator notices a server cannot access network services. Authentication is also failing. The error is an invalid token message. Which of the following protocols should the system administrator verify early in the troubleshooting process? Hypertext Transfer Protocol (HTTP) Server Message Block (SMB) Network Time Protocol (NTP) Post Office Protocol (POP)
Network Time Protocol (NTP)
A system administrator notices a server cannot access network services. Authentication is also failing. The error is an invalid token message. Which of the following protocols should the system administrator verify early in the troubleshooting process? Server Message Block (SMB) Post Office Protocol (POP) Network Time Protocol (NTP) Hypertext Transfer Protocol (HTTP)
Network Time Protocol (NTP)
On a private network, you can customize the sharing options to include printers and disable password-protected sharing. These options are configured via the ________.
Network and Sharing Center
IP (Internet Protocol) provides packet addressing and routing at the network layer. It does this through IP addressing which provides two pieces of information encoded within the same value, these are: APIPA and link local Static address and lease address IPv4 and IPv6 Network number and host number
Network number and host number
______ is an account that has the same privileges as LocalService but can access the network using the computer's machine account's credentials.
NetworkService
fragmentation
Occurs when a data file is not saved to contiguous sectors on a disk. This decreases performance by making the disk read/write heads move between fragments.
paper jam
Occurs when paper does not feed through the printer properly, resulting in pages that are stuck within the paper feed mechanism, often crumpled or torn.
________ provide a way of dividing a domain up into different administrative realms. You might create OUs to delegate responsibility for administering different company departments or locations.
Organizational Units (OUs)
Which of the following is caused by dust being trapped in the cooling passages? Overheating Swollen battery Low power issues Overcharging
Overheating
There are several approaches to the problem of data remnants on magnetic disks. If a disk can be recycled or repurposed, destruction is obviously not an option so what do you do instead? Physical Destruction Remnant Removal Overwriting/Disk Wiping Low Level Format
Overwriting/Disk Wiping
Which one of these refers to a wireless connection to connect devices with a few meters? WiFi LAN PAN VLAN
PAN
What are the Symptoms or Characteristics of a Trojans? Self-replicating Tracks user activity Obtains high level privileges, hiding from OS Packaged as useful application Replication requires user interaction Self-Contained Often paired with keylogger Infects firmware code Used by attacker to conceal actions Boot Sector, macro, polymorphic
Packaged as useful application Used by attacker to conceal actions
cleaning unit
Parts such as a blade, roller, or brush that rest on the surface of a laser printer's photosensitive drum that are used to clean excess toner and remove residual charge from the photoconductor.
What is the practice of monitoring, obtaining, evaluating, testing and deploying fixes and updates? OS Updates Disk Defragmenter Check Disk Patch Management
Patch Management
___________ is the practice of monitoring, obtaining, evaluating, testing and deploying fixes and updates.
Patch Management
Which task management tool do you select to view resource usage? Networking Performance Users Processes
Performance
biometric devices
Peripherals used to gather biometric data for comparison to data stored in a database.
The rise in consciousness of identity theft as a serious crime and growing threat means that there is an increasing impetus on government, educational, and commercial organizations to take steps to process more information more sensitively and securely. What is the name of the data that can be used to identify, contact, or locate an individual or, in the case of identity theft, to impersonate them. Protected Health Information (PHI) Payment Card Industry Data Security Standard (PCI DSS) Personally Identifiable Information (PII) Top Secret
Personally Identifiable Information (PII)
The Samsung Galaxy Note popularized which of the following types of mobile devices? Smartphone Tablet Phablet Laptop
Phablet
_______ is a means of redirecting users from a legitimate website to a malicious one.
Pharming
Which part of a laser printer is likely at fault for producing ghost images?
Photosensitive Drum
Inkjet Printer has Toner Heat-sensitive Paper Piezoelectric Dot Matrix Extruder PDF
Piezoelectric
Which of the following can help diagnose latency issues on a network? A Wi-Fi spectrum analyzer ICMP DNS lookup Ping test
Ping test
surround sound
Placement of multiple speakers positioned around the listener to provide a cinematic audio experience.
microATX
Introduced in late 1997, and is often referred to as μATX, and has a maximum size of 9.6 inches by 9.6 inches.
IDS
Intrusion detection system. A detective control used to detect attacks after they occur. A signature-based IDS (also called definition-based) uses a database of predefined traffic patterns. An anomaly-based IDS (also called behavior-based) starts with a performance baseline of normal behavior and compares network traffic against this baseline. An IDS can be either host-based (HIDS) or network-based (NIDS). In contrast, a firewall is a preventative control that attempts to prevent the attacks before they occur. An IPS is a preventative control that will stop an attack in progress.
Inverter
Inverter is a pen-sized board that is usually placed on the bottom of the LCD screen, either in the same case with the LCD screen, or above the keyboard. The inverter is one of the key parts within a display; it allows for the laptop's display to be lit by providing power to the screen's backlight.
Which Internet of Things (IoT) endpoint device is used to set switches to a particular dimmer level over a smartphone app? Light switch Dimmer Zigbee IoT light switches
IoT light switches
What is the software component that provides the core set of operating system functions and is the core of Linux? Kernel Red Hat/CentOS SUSE (Software und System Entwicklung) Debian/Ubuntu
Kernel
________ is the software component that provides the core set of operating system functions and is the core of Linux.
Kernel
A network made up of computers and peripherals in a distinct geographic area sharing wired or wireless communications is referred to as: MAN WAN PAN LAN
LAN
The Engineering department has been relocated to new offices. You are responsible for moving RJ-45 wall jacks to new locations in these offices. Which tool can you use to verify these RJ-45 port connections after each has been moved? Loopback plug Cable crimper Punch-down tool Multimeter
Loopback plug
gestures
Finger movements on a trackpad or mouse that enable a user to scroll, zoom, and navigate desktop, document, and application content.
If an attacker is able to gain access to a smartphone or tablet, they can obtain a huge amount of information and the tools with which to launch further attacks. It is imperative that data stored on the device be encrypted and access to the device be protected by a screen lock. What types of screen locks provide biometric authentication? (Select all that apply.) Fingerprint sensor Passcode Face lock Pattern locks
Fingerprint sensor Face lock
Mainstream support for a Microsoft operating system is _____ years. Afterwards, five years of extended support is available. Extended support is a period of time when only security updates are made available.
Five
______ years of extended support is available for Microsoft operating systems. Extended support is a period of time when only security updates are made available.
Five
USB
(Universal Serial Bus) The main type of connection interface used on PCs. A larger Type A connector attaches to a port on the host; Type B and Mini- or Micro-Type B connectors are used for devices. USB 1.1 supports 12 Mbps while USB 2.0 supports 480 Mbps and is backward compatible with 1.1 devices (which run at the slower speed). USB devices are hot swappable. A device can draw up to 2.5 W of power. USB 3.0 and 3.1 define 5 Gbps (SuperSpeed) and 10 Gbps (SuperSpeed+) rates and can deliver 4.5 W of power.
UAC
(User Account Control) A security system in Windows designed to restrict abuse of accounts with administrator privileges. Actions such as installing hardware and software can be performed without changing accounts but the user must authorize the use of administrative rights by clicking a prompt or re-entering user credentials.
VGA
(Video Graphics Array). A standard for the resolution and color depth of computer displays. VGA specifies a resolution of 640x480 with 16 colors (4-bit color) at 60 Hz.
VR headset
(Virtual Reality headset) A headset worn like goggles to interact with images displayed in the headset.
VBR
(Volume Boot Record) Loads the boot manager, which for Windows is bootmgr.exe.
WIA
(Windows Image Acquisition) Driver model and API (Application Programming Interface) for interfacing scanner hardware with applications software on Windows PCs.
XPS
(XML Print Specification) A file format based on XML that describes one or more pages and how the information should appear on the page.
CMOS
(complementary metal oxide semiconductor) A type of integrated circuit with a wide range of applications, including static RAM (for firmware and flash memory) and imaging sensors.
CI
(configuration item) In change management, an asset that requires specific management procedures for it to be used to deliver the service. Each CI is identified with a label and defined by its attributes and stored in a CMDB.
XML
(eXtensible Markup Language) A system for structuring documents so that they are human- and machine-readable. Information within the document is placed within tags, which describe how information within the document is structured.
eSATA
(external Serial Advanced Technology Attachment) An external interface for SATA connections, enabling you to connect external SATA drives to PCs.
MAC filtering
(media access control filtering) Applying an access control list to a switch or access point so that only clients with approved MAC addresses can connect to it.
MFD
(multifunction device) Any device that performs more than one function. This typically refers to either SOHO Internet routers/access points or print devices that can also scan and fax.
OSD
(on-screen display) Display configuration menus that show up on the monitor and that you interact with by using buttons on the monitor case.
OLED display
(organic light emitting diode display) A type of LED flat panel display device that uses organic compounds that emit light when subjected to an electric current.
PDU
(power distribution unit) A device designed to provide power to devices that require power, and may or may not support remote monitoring and access.
RTC
(real time clock) Part of the system chipset that keeps track of the date and time. The RTC is powered by a battery so the PC keeps track of the time even when it is powered down. If the computer starts losing time, it is a sign that the battery is failing.
regex
(regular expressions) Strings of characters that denote a word, a set of words, or a sentence.
SLS
(selective laser sintering) A 3D printing method which fuses layers together using a pulse laser, creating the object from a plastic or metal powder with the model being lowered into a tank as each layer is added.
SSD
(solid state drive) A personal computer storage device that stores data in non-volatile special memory instead of on disks or tape.
problem management
A method of identifying, prioritizing, and establishing ownership of incidents.
video projector
A large format display in which the image is projected onto a screen or wall using a lens system.
change management
A means of putting policies in place to reduce the risk that changes to information and communications technology infrastructure components could cause service disruption.
contrast ratio
A measure of the ratio of luminance (brightness) of whites to blacks, indicating the color performance of a display or scanner. A device supporting a higher contrast ratio is able to display a wider range of colors and deliver "true" black.
scripting language
A programming language that is interpreted rather than compiled.
proper documentation
A record of what will be done so that the customer knows what to expect in terms of items that are supported, how long incidents may take to resolve, when they can expect an item to be replaced instead of repaired, and so on.
comparison operator
A relationship evaluation between two variables to determine whether they are equal, not equal, less than, greater than, less than or equal to, or greater than or equal to each other.
dial-up
A remote network access method that utilizes the local telephone line (Plain Old Telephone System [POTS]) to establish a connection between two computers fitted with modems. Dial-up is a legacy method of Internet access. It may still be deployed for special administrative purposes or as an emergency backup connection method. Configuration is generally a case of setting the telephone number, username, and password.
sag
A sag can occur when the power supply entering a computer's components dips briefly below that which is required. Sags are commonly caused when heavy machinery or other high power appliances are started.
schematic
A schematic is a simplified representation of a system. Physical network diagrams or schematics can show the general location of components and their identification. Logical network diagrams show the organization of the network into subnets and zones.
Which of the following wireless standards operates at 5 GHz and has a maximum speed of 54 Mbps? A. 802.11a B. 802.11b C. 802.11g D. 802.11n
A. 802.11a
When talking about "wireless networking" for desktops, laptops, smartphones, and tablets the term is generally understood to mean the Institute of Electrical and Electronics Engineers (IEEE's) 802.11 standards for Wireless LANs (WLAN), also called WiFi. There are five main versions of the standard. What are they and at what frequency(ies) do they operate? A. 802.11a - 5GHz,802.11b - 2.4GHz,802.11g - 2.4GHz,802.11n - 2.4/5GHz,802.11ac - 5GHz B. 802.11ab - 2.4GHz,802.11c - 2.4GHz,802.11d - 2.4GHz,802.11g - 5GHz,802.11n - 5GHz C. 802.11ab - 5GHz,802.11c - 2.4GHz,802.11d - 2.4/5GHz,802.11g - 5GHz,802.11n - 5GHz D. 802.11a - 2.4GHz,802.11b - 2.4GHz,802.11g - 2.4/5GHz,802.11n - 5GHz,802.11ac - 5GHz
A. 802.11a - 5GHz,802.11b - 2.4GHz,802.11g - 2.4GHz,802.11n - 2.4/5GHz,802.11ac - 5GHz
Joe, a user, has a new slim profile laptop and is in need of additional USB ports. He has also requested FireWire connection capabilities which his laptop does not provide. Which of the following would BEST fit the specifications Joe has provided? A. A docking station B. An external USB hub C. A USB to FireWire converter D. A cable lock
A. A docking station
An end user calls the company's IT service desk to report an inability to open encrypted emails on a mobile device. Which of the following BEST represents a possible cause? A. A valid certificate suitable for S/MIME is not installed. B. Emails received by the user lack suitable digital signatures. C. SSL/TLS certificates stored on the device are expired. D. The sender did not have the addressee's public certificate.
A. A valid certificate suitable for S/MIME is not installed.
Which of the following provide the MOST security for PCs and mobile devices? (Choose two.) A. Access control lists B. Multifactor authentication C. Organizational unit D. Trusted software sources E. Data loss prevention F. Pre-shared key
A. Access control lists B. Multifactor authentication
A technician is responsible for setting up laptops in a room for a small conference. The laptops need to communicate with each other as well as a workstation in the room. The workstation has a wireless expansion card. A switch is not available for the laptops and they cannot access the corporate network. Which of the following does the technician need to implement? A. Adhoc network B. Bluetooth network C. Serial network D. USB network
A. Adhoc network
Which of the following describe services that are provided by network servers? (Select all that apply.) A. Assigns IP addresses automatically when hosts connect to the network. B. Allows users to access resources using a FQDN. C. Allows users to edit spreadsheets and run advanced calculations. D. Provides an access control system.
A. Assigns IP addresses automatically when hosts connect to the network. B. Allows users to access resources using a FQDN. D. Provides an access control system.
A technician has decided to upgrade all users' iPhones to the latest model. Which of the following is the FIRST thing the technician should advise the users to do with the old phones before turning them in? A. Back up the mobile data with a cloud backup service. B. Enable remote wipe to clear all personal and corporate data. C. Go into the device settings to remove personal customizations. D. Factory reset the old phones to ensure the data is no longer on the device.
A. Back up the mobile data with a cloud backup service.
Which of the following Windows OS technologies is used to store remote data accessed via a WAN connection on local servers for user access? A. BranchCache B. Swap partition C. Domain access D. Proxy server
A. BranchCache
A network manager for CBA company in Dallas, TX adds host Manage30 to Active Directory. Manage30 is a client in the Management office. Utilize this information to design the distinguished name of the client. A. CN=Manage30, OU=Management, O=CBA, L=Dallas, ST=TX, DC=CBA, DC=com B. DC=com, DC=CBA, ST=TX, L=Dallas, O=CBA, OU=Management, CN=Manage30 C. CN=Manage30, OU=Management, O=CBA, L=Dallas, ST=TX, DC=com, DC=CBA D. OU=Management, CN=Manage300, O=CBA, L=Dallas, ST=TX, DC=com, DC=CBA
A. CN=Manage30, OU=Management, O=CBA, L=Dallas, ST=TX, DC=CBA, DC=com
A customer brings a laptop in for repair, because the screen image is upside down. Which of the following is the BEST solution? A. Change the screen orientation B. Replace the video card C. Connect an external monitor D. Update the video card drivers
A. Change the screen orientation
A user's email inbox is suddenly receiving dozens of rejection messages from various mail servers. Which of the following would the technician perform to BEST solve the issue? A. Change the user's email password. B. Enable spam filtering on the email account. C. Change the email account from POP to IMAP. D. Disable the user's email account.
A. Change the user's email password.
A company has very strict rules regarding proprietary information leaving the premises. All computers host proprietary information. A technician is called to repair a computer on-site at the company's corporate office. The technician identifies the problem and goes through the troubleshooting steps to create a plan of action. The technician determines the computer needs to be taken off-site for repair. Which of the following should the technician do NEXT? A. Check corporate policies for guidance. B. Get authorization from the manager. C. Delete proprietary data before leaving the building. D. Remove the HDD and send the device for repair.
A. Check corporate policies for guidance.
A company has very strict rules regarding proprietary information leaving the premises. All computers host proprietary information. A technician is called to repair a computer on-site at the company's corporate office. The technician identifies the troubleshooting steps to create a plan of action. The technician determines the computer needs to be taken off-site for repair. Which of the following should the technician do NEXT? A. Check corporate policies for guidance. B. Get authorization from the manager. C. Delete proprietary data before leaving the building. D. Remove the HDD and send the device for repair.
A. Check corporate policies for guidance.
A PC has been randomly rebooting several times a day. The technician checks the case for overheating and finds the fans appear to be operating normally. Which of the following should the technician check NEXT? A. Check motherboard for any sign of swollen capacitors B. Check hard disk drive to determine if it is defragmented and operating properly C. Check embedded NIC to ensure it has the latest firmware and drivers D. Check RAM to confirm it is the correct type for the motherboard being used
A. Check motherboard for any sign of swollen capacitors
A projector's image begins to flicker during a presentation. The laptop display does not produce this issue. When a technician changes the resolution on the laptop, the issue persists. Which of the following is the NEXT step the technician should take? A. Check the connectivity of the VGA cable. B. Check the connectivity of the power cable. C. Change the aspect ratio on the laptop. D. Change the settings of the projector.
A. Check the connectivity of the VGA cable.
A user has been granted permission to access the corporate network from a personal smartphone. Which of the following should a technician perform before configuring the phone for access? A. Check the phone for unauthorized root access B. Disable the phone's Bluetooth chip C. Erase all personal data from the phone D. Check the phone for location tracking
A. Check the phone for unauthorized root access
A workstation was just moved to a new work location without a surge protector. It was working the day before, but now the PC will not power on, the fans will not spin, and there are no signs of activity. Which of the following should the technician do FIRST? A. Check the power cable connection B. Check the voltage of the PSU with a tester C. Test for distended capacitors D. Check the voltage switch
A. Check the power cable connection
Users report they have to select the output tray at the printer, even though the correct tray is selected in the print dialog. Which of the following should a technician perform FIRST to attempt to solve the problem? A. Check the user's account for the correct printing privileges. B. Reinstall the driver on the print server. C. Update the firmware on the commercial office printer. D. Run Windows Update on the affected computers.
A. Check the user's account for the correct printing privileges.
A technician is dispatched to troubleshoot a slow performance issue on a PC. Upon arrival, the technician immediately opens Task Manager and sees that CPU and RAM performance are within normal ranges. The technician then checks and verifies the speed and duplex settings and performance on the network card. The technician then temporarily disables the antivirus to see if performance is affected, and it is not. After re-enabling the antivirus, which of the following is the NEXT best step for the technician to take? A. Check to see if insufficient hard drive space is causing the issue B. Update the operating system, drivers, and firmware on the PC C. Log into the PC with another user profile and test performance D. Shut down the PC, unplug the power for 30 seconds, and then boot the PC
A. Check to see if insufficient hard drive space is causing the issue
The printer at your office is constantly displaying an error code indicating a paper jam after every few pages printed, even though you clear the jams. What should you do to resolve the frequent paper jams? A. Clean and service the printer, replacing any old or worn components. B. Replace all toner cartridges. C. Shut down the printer, unplug it, wait a few seconds, then turn it back on. D. Check the "Use Printer Offline" option is enabled and run through a test page.
A. Clean and service the printer, replacing any old or worn components.
An employee's mobile device no longer charges, and the employee believes the battery is bad. A technician tests the mobile device and finds it will charge on a wireless charging pad but not when it is connected to a charging cable. Other devices charge without issue when the cable is used. Which of the following should the technician perform FIRST to resolve the issue? A. Clean out the charging port on the device B. Replace the mobile device's battery C. Issue a new charging cable to the employee D. Send the device for service and give the employee a loaner
A. Clean out the charging port on the device
A Google account on an Android device by default will synchronize to which of the following locations? A. Cloud B. SSD C. PC desktop D. MicroSD
A. Cloud
A printer stops working in the billing department and cannot be repaired. A new printer has been ordered and a technician is tasked with allowing other users to print to the billing manager's printer until the new printer arrives. The manager's printer is currently used via USB connection, and there are no network jacks available for use. Which of the following is the BEST way for the technician to allow access to the printer? A. Create a share on the manager's computer and give the users rights to the share. B. Install the printer on the users' desktops and point it to the IP address of the manager's computer. C. Purchase a wireless printer so the users can access the printer via network. D. Provide flash drives to the users so they can transfer data to the manager's computer for printing.
A. Create a share on the manager's computer and give the users rights to the share.
A printer stops working in the billing department and cannot be repaired. A new printer has been ordered and a technician is tasked with allowing other users to print to the billing manager's printer until the new printer arrives. The manager's printer is currently used via USB connection, and there are no network jacks available for use. Which of the following is the BEST way for the technician to allow access to the printer? A. Create a share on the manager's computer and give the users rights to the share. B. Install the printer on the users' desktops and point it to the IP address of the manager's computer. C. Purchase a wireless printer so the users can access the printer via network. D. Provide flash drives to the users so they can transfer data to the manager's computer for printing.
A. Create a share on the manager's computer and give the users rights to the share.
A technician contacts the network administrator to request a list of all static IP addresses in the building. Which of the following server roles would the technician MOST likely review to find that information? A. DHCP server B. DNS server C. File server D. Proxy server
A. DHCP server
A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom. Which of the following needs to be adjusted on the workstation to fix the issue? A. Date and time B. UEFI boot mode C. Logon times D. User access control
A. Date and time
Which of the following is a reason to use WEP over WPA? A. Device compatibility B. Increased security C. TACACS D. Multifactor authentication
A. Device compatibility
A security team is auditing a company's network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information. Which of the following actions should be taken to close the vulnerability? (Select two.) A. Disable guest account B. Remove admin permissions C. Modify AutoRun settings D. Change default credentials E. Run OS security updates F. Install a software firewall
A. Disable guest account C. Modify AutoRun settings
A customer is reporting that after removing a laptop from the docking station and bringing it home, the cursor occasionally jumps around the screen while the customer is typing. Which of the following should the technician do to mitigate this issue? A. Disable the touch pad on the laptop B. Install new keyboard drivers for the laptop C. Install new drivers for the docking station D. Disable the keyboard on the laptop
A. Disable the touch pad on the laptop
When dealing with a difficult customer, which of the following is the BEST way to handle the situation? A. Do not argue with the customer and/or be defensive B. Use technical terms to assure customer confidence C. Escalate the customer's issue to a supervisor D. Sympathize with the customer about issue
A. Do not argue with the customer and/or be defensive
A user is unable to access websites and has reported connectivity issues with pop-ups on the screen. A technician removes malware, and then is able to ping the router and access the websites. Which of the following NEXT steps should the technician perform in troubleshooting this issue? (Choose two.) A. Document findings, actions, and outcomes. B. Reboot the device to verify the fix. C. Reconnect the device to the network. D. Verify the settings in IPConfig. E. Research the problem based on symptoms. F. Run a virus scan.
A. Document findings, actions, and outcomes. B. Reboot the device to verify the fix.
A user is unable to access websites and has reported connectivity issues with pop-ups on the screen. A technician removes malware, and then is able to ping the router and access the websites. Which of the following NEXT steps should the technician perform in troubleshooting this issue? (Choose two.) A. Documents findings, actions, and outcomes. B. Reboot the device to verify the fix. C. Reconnect the device to the network. D. Verify the settings in IPConfig. E. Research the problem based on symptoms. F. Run a virus scan.
A. Documents findings, actions, and outcomes. F. Run a virus scan.
Joe, an end-user, reports that the Windows PC he is using automatically locks when he leaves his desk and walks to a printer to retrieve documents. Joe is then required to type in his username and password to unlock the computer. The technician looks at the settings on the PC and notices that the screensaver and screenlock options are grayed out on the computer and cannot be changed. Which of the following is the MOST likely cause of this issue? A. Domain-level group policies B. Antivirus domain-level policies C. Corrupted registry settings D. Incorrect local-level user policies
A. Domain-level group policies
Which of the following features has undergone the most significant changes from Windows 7 to Windows 10 and greatly simplified the operating system installation process? A. Driver detection B. Metro interface C. Account control D. PXE installation
A. Driver detection
Which of the following Windows features would be used to encrypt a single file or folder? A. EFS B. NTFS C. BitLocker D. Security
A. EFS
A technician is configuring a SOHO wireless router for a small business with three employees. After the three employees' laptops have successfully connected to the wireless network, the company would like to prevent additional access to the wireless network. The technician enables WPA2 on the wireless router. Which of the following additional settings should the technician change? A. Enable MAC filtering B. Disable SSID broadcast C. Reduce radio power level D. Update router firmware
A. Enable MAC filtering
A technician is configuring wireless for a home office. The customer wants to prevent others from accessing the wireless network. The customer has a small number of devices on the network and does not want to have to remember a complicated password. Which of the following should the technician recommend? A. Enable MAC filtering B. Disable SSID broadcast C. Assign static IP addresses D. Turn on content filtering
A. Enable MAC filtering
A corporation maintains an active social media presence by constantly uploading audio and video. The corporation also regularly hosts video conferences, but attendees are reporting buffering during their telecast. Which of the following should the IT department do to improve the ability to attend video conferences without interruption? A. Enable QoS on network traffic, prioritizing telecast traffic over uploads. B. Upgrade video conference room equipment. C. Create a VLAN for all employees updating social media. D. Adjust the network intrusion device to allow video to flow without filtering.
A. Enable QoS on network traffic, prioritizing telecast traffic over uploads.
A SOHO user wants a multifunction device to be set up for the office printer. Additionally, scanning and fax capability must be set up for office employees only. Guest WiFi access will open. Which of the following configuration changes will BEST meet the user's request? A. Enable user authentication. B. Disable remote printing. C. Configure the print server. D. Enable cloud settings. E. Disable the wireless network. F. Connect to a wired network.
A. Enable user authentication.
Joe, a user, returns his computer to the technician who performed a virus removal on it the week before. Joe states that several symptoms have returned. Which of the following should the technician have covered previously as part of the original repair? A. End-user education B. Pre-installation environment cleaning C. Disabling of System Restore D. Infected system quarantine
A. End-user education
A technician is setting up a new wireless network at a branch office that previously had only wired connectivity with statically assigned IP addresses. After setting up the network, the technician configures a server to provide IP addresses to wireless clients. During testing, the technician is unable to access the Internet or named network resources. The technician receives a valid IP address from the DHCP server and can ping the default gateway. Which of the following should be technician check NEXT to resolve this issue? A. Ensure the options are configured to provide a DNS server. B. Verify the Windows Firewall is turned off. C. Configure the wireless network's SSID to be hidden. D. Enable file and printer sharing in the OS.
A. Ensure the options are configured to provide a DNS server.
A network administrator would like to increase network bandwidth to 1Gbps between two office buildings that are 0.5mi(805m) apart. Which of the following would be the BEST solution? A. Fiber B. Coaxial C. Plenum D. Cat 6
A. Fiber
A user with a USB printer would like to print from more than one computer. Which of the following features should be used? A. File and printer sharing B. Internet connection sharing C. Enable printer duplexing D. USB hub
A. File and printer sharing
When securing a mobile device, which of the following types of screen locks is the MOST secure? A. Fingerprint lock B. Swipe lock C. Passcode lock D. Face lock
A. Fingerprint lock
A technician is attempting to remove malware from a customer's workstation. Which of the following Control Panel utilities should the technician use? A. Folder Options > View hidden files B. System > Performance C. Display Settings > Refresh rate D. Internet Options > Privacy
A. Folder Options > View hidden files
A new company is thinking of upgrading its media workstation in the conference room. The computer will be predominantly used for graphically intensive presentations, slideshows, and video gaming tournaments. Which of the following BEST satisfies the needs of the company? A. High-end video, high-end audio, multicore processor B. Minimum RAM required, network connectivity, high-end cooling C. Media streaming, file sharing, gigabit NIC, dual monitors, TV tuner D. Network connectivity, TV tuner, surround sound audio, dual monitors
A. High-end video, high-end audio, multicore processor
A technician receives a cellular call from a manager. The technician is instructed to download a service manual directly from the Internet to a laptop. However, there is no WiFi signal or wired Ethernet. Which of the following would be the MOST appropriate connections for the technician to use? A. Hotspot B. NFC C. Bluetooth D. VPN
A. Hotspot
Ann, a technician, is inspecting a PC with an Intel Core 2 Quad processor and finds that the Task Manager is reporting the system as having 8 cores. She is convinced this system only has four cores. Which of the following technologies is causing the discrepancy? A. Hyper-threading B. Intel SSE3 C. L2 Cache D. S.M.A.R.T.
A. Hyper-threading
A systems administrator is configuring a server to host several virtual machines. The administrator configures the server and is ready to begin provisioning the virtual machines. Which of the following features should the administrator utilize to complete the task? A. Hypervisor B. Disk management C. Terminal services D. Device Manager E. Virtual LAN
A. Hypervisor
A user is configuring the email settings on a smartphone. Which of the following configurations will allow the user to synchronize email from multiple devices? A. IMAP B. S/MIME C. POP3 D. SMTP
A. IMAP
A network administrator must install a device that will proactively stop outside attacks from reaching the LAN. Which of the following devices would BEST meet the organization's needs? A. IPS B. IDS. C. Proxy server D. Authentication server.
A. IPS
How are Internet Protocol version 4 (IPv4) addresses different from IPv6 addresses? A. IPv4 are 32-bit addresses displayed as four numbers from 0 to 255. B. IPv4 are 128-bit addresses displayed as eight groups of four hexadecimal numbers. C. Leading zeros in a block of an IPv4 address can be removed. D. A single group of one or more consecutive blocks of four 0s in an IPv4 address can be written as a double colon.
A. IPv4 are 32-bit addresses displayed as four numbers from 0 to 255.
A technician is PXE booting a computer. Which of the following is the technician MOST likely performing on the computer? A. Image deployment B. Multiboot configuration C. In-place upgrade D. System repair
A. Image deployment
An ISP has notified a SOHO user of a usage increase on the user's network. The user is concerned the WiFi network is being utilized by unauthorized users. Which of the following would minimize the unauthorized use of the WiFi network? A. Implement MAC filtering B. Enable NAT C. Create a network DMZ D. Upgrade the encryption standards
A. Implement MAC filtering
Several company users are frequently forgetting passwords for their mobile devices and applications. Which of the following should the systems administrator do to reduce the number of help desk tickets submitted? A. Implement single sign-on. B. Enable multifactor authentication. C. Configure biometric authentication. D. Remove complex password requirements.
A. Implement single sign-on.
A user reports that printing on heavy cardstock paper results in the image smearing if touched. When printing on plain paper, the problem does not occur. Which of the following would be the NEXT troubleshooting step to perform? A. Increase the fuser temperature. B. Change the paper feed rate. C. Clean the transfer roller. D. Replace the toner cartridge.
A. Increase the fuser temperature.
A technician is determining the specifications for a desktop computer that will be used at trade shows all over the world. The computer will have the maximum amount of RAM. The CPU, GPU, and storage will be typical of a business workstation. Which of the following system parameters is the MOST important for the technician to consider when choosing a power supply? A. Input voltage B. Efficiency rating C. 12V rail amperage D. Number of SATA connectors
A. Input voltage
A printer technician is sent to work on a fuser in a laser printer that is not adhering toner properly to the paper. While onsite Joe, an end user, reports that he has been having frequent paper jams as well. Which of the following would be the BEST course of action to repair the printer? A. Install a manufacturer recommended maintenance kit B. Install the fuser, replace the toner cartridge, and replace the pickup and separation rollers C. Install the fuser and also replace the high voltage power supply D. Install the fuser as the paper jams were probably also caused by the defective fuser
A. Install a manufacturer recommended maintenance kit
A support technician is using virtualization software on a Windows 7 Enterprise PC to test Windows 8.1 Enterprise for a future deployment. When operating the Windows 8.1 VM, performing tasks in the host operating system becomes considerably slower. Which of the following options may improve performance in the host operating system? (Select TWO). A. Install more physical memory. B. Increase the size of the virtual hard drive. C. Install a different hypervisor. D. Reduce physical memory allocated to the VM. E. Clear temporary files in the VM. F. Install additional physical hard drives.
A. Install more physical memory. D. Reduce physical memory allocated to the VM.
Which of the following is a risk of implementing a BYOD policy? A. Introducing malware onto the network B. DHCP may fail due to incompatibility C. Different encryption technology D. Higher risk of phishing attacks
A. Introducing malware onto the network
Which of the following is the main purpose of the +5VSB output of a power supply? A. It allows peripherals to draw power when the machine is off B. It provides power to the audio and sound boards of the machine C. It acts as the main voltage supply to the motherboard and processor D. It powers all expansion cards and external device hubs
A. It allows peripherals to draw power when the machine is off
What is a characteristic of connection-oriented communication? A. It provides assurance of packet delivery during data transmission. B. It uses store-and-forward techniques to move packets between computers. C. It provides fast but unreliable delivery of packets during data transmission. D. It uses message-oriented communication for processing email.
A. It provides assurance of packet delivery during data transmission.
A network administrator is attempting to access the firewall while inside the datacenter. Which of the following peripherals must be connected to do so? A. KVM B. Touchpad C. Mouse D. Keyboard
A. KVM
Modern laptop screens are much brighter because of advances in which of the following technologies? A. LED B. Batteries C. Inverter D. Plasma
A. LED
Joe, a user, has purchased a new mobile device that uses a different OS than his previous one. Joe wants to copy his contacts and appointments from his corporate account without entering them manually. Which of the following would be the BEST way for a technician to assist Joe? A. Log into the same email provider on the new device, and restore the contacts and dates. B. Create a Bluetooth connection between Joe's devices, and copy his contacts and calendar. C. Back up the old mobile device to a PC, and import the contacts and schedule from the PC. D. Use NFC to transfer all compatible data from one device to the other.
A. Log into the same email provider on the new device, and restore the contacts and dates.
A technician needs to call a user's cellular provider to troubleshoot a network speed issue with the user's mobile device. Which of the following technologies is the technician troubleshooting? A. Long-term evolution B. Near-field communication C. Radio frequency ID D. Z-wave
A. Long-term evolution
Every wireless device operates on a specific radio frequency within an overall frequency band. The two most common frequency bands in the Institute of Electrical and Electronics Engineers' (IEEE's) 802.11 standards are 2.4 gigahertz (GHz) and 5.0 GHz. How is the 2.4 GHz frequency range different from 5.0 GHz? A. Longer range, propagates better through solid surfaces, and lower maximum achievable data rates B. Shorter range, less effective propagating through solid surfaces, and supports higher data rates C. Supports more individual channels, suffers less congestion from interference, maximum achievable data rates are higher D. Longer wavelength, supports maximum ranges achieved, and supports more individual channels
A. Longer range, propagates better through solid surfaces, and lower maximum achievable data rates
A technician would like to remove the dust inside of a desktop computer. Which of the following should the technician use to MINIMIZE exposure to the dust while protecting internal hardware components? (Select TWO). A. Mask B. ESD mat C. ESD strap D. Antistatic bag E. Safety goggles F. Rubber gloves
A. Mask E. Safety goggles
A company has subscribed to a cloud service, paying monthly for a block of services and being billed incrementally when they exceed the monthly fee. Which of the following cloud concepts does this represent? A. Measured service B. Rapid elasticity C. On-demand D. Resource pooling
A. Measured service
The city you work for is looking for a wireless connectivity solution that supports coverage for their public safety and emergency response services. You suggest the implementation of a Wireless Mesh Network (WMN) because: A. Mesh nodes "talk" to each over large geographic areas providing high speed mobility and high-quality video surveillance. B. It depends on wired infrastructure that interconnects to central Access Points (APs). C. It delivers Internet access provided through communications satellites. D. It utilizes microwave dishes providing a reliable and high-bandwidth solution.
A. Mesh nodes "talk" to each over large geographic areas providing high speed mobility and high-quality video surveillance.
A user has a Windows 8.1 RT operating system and wants to add additional programs to the computer. Which of the following is available for installing more applications? A. Microsoft Store B. DVD C. Google Play D. iTunes
A. Microsoft Store
Which of the following has a P4 connector to provide a 12V output? A. Molex connector B. 24-pin adapter C. SCSI cable D. eSATA cable
A. Molex connector
A user's mobile device appears to be losing battery life rapidly and often feels warm to the touch, even when it is put away. The device is relatively new, so the user is concerned it is defective. A technician inspects the device and see the following: Storage Settings: 26GB Used (6GB Free) Photos 15GB Music 5GB Messages 3 GB Apps 2GB Usage Settings: Calls 800MB Maps 3.2GB Messages 120MB News 250MB Weather 40MB Mail Settings: WorkPush PersonalFetch (15 minutes) Privacy Settings: App Store While Using Maps Always Email Never Weather Always Calendar While Using Messages While Using Photos Always Display Settings: Brightness Auto Auto-Lock Never Night Mode Disabled Which of the following should be changed to resolve this issue? A. Privacy - Maps B. Display - Brightness C. Storage - Photos D. Mail - Work
A. Privacy - Maps
A systems administrator has discovered a folder on the server with numerous inappropriate pictures and videos, which is in violation of the company's AUP. Which of the following would be the NEXT appropriate act? A. Promptly notify the administrator's immediate supervisor B. Rename the folder on the server, and notify the information security officer C. Move the folder to another location on the server, and notify the local authorities D. Ask the owner to move the files from the server to a local computer
A. Promptly notify the administrator's immediate supervisor
Which of the following server types caches previously visited web pages for faster access in the future? A. Proxy server B. Web hosting server C. DNS server D. Branch cache server
A. Proxy server
A technician needs to attach a network cable to a wall jack in the conference room. After running the cable through the conduit to the conference room, which of the following tools would BEST be used to connect the cable to the wall jack? A. Punchdown B. Loopback plug C. Multimeter D. Crimper
A. Punchdown
A user reports unexpected icons appearing on the desktop. The technician identifies that the symptoms point to a malware infection. Which of the following procedures would be performed NEXT? A. Quarantine infected system B. Schedule scans and run updates C. Report the issue to the information security officer D. Disable System Restore (in Windows) E. Educate end user
A. Quarantine infected system
A user's computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening. Which of the following should the technician attempt NEXT? A. Reboot into safe mode and roll back the updates B. Repair the Windows Registry C. Configure boot options in the BIOS D. Disable Windows services and applications
A. Reboot into safe mode and roll back the updates
An end user needs to completely re-install Windows 10 on a home computer but it did not come with any OS discs. How would a technician accomplish this? A. Recovery partition B. Primary partition C. System restore D. System refresh
A. Recovery partition
A wireless access point is going to be configured in a small office located in a crowded building. Which of the following should the installation technician perform to increase the security of the wireless network? (Select two.) A. Reduce the transmit power B. Reduce the channel availably C. Disable the DHCP server D. Enable QoS management E. Disable the SSID broadcast F. Implement WPA encryption
A. Reduce the transmit power E. Disable the SSID broadcast
A wireless access point is going to be configured in a small office located in a crowded building. Which of the following should the installation technician perform to increase the security of the wireless network? (Choose two.) A. Reduce the transmit power B. Reduce the channel availably C. Disable the DHCP server D. Enable QoS management E. Implement WPA2 encryption
A. Reduce the transmit power E. Implement WPA2 encryption
An end user's PC is taking a long time to boot. Which of the following operations would be the BEST to resolve this issue with minimal expense? (Choose two.) A. Remove applications from startup B. Defragment the hard drive C. Install additional RAM D. Install a faster hard drive E. End the processes in Task Manager F. Run the Disk Cleanup utility
A. Remove applications from startup B. Defragment the hard drive
An end user's PC is taking a long time to boot. Which of the following operations would be the BEST to resolve this issue with minimal expense? (Select two.) A. Remove applications from startup B. Defragment the hard drive C. Install additional RAM D. Install a faster hard drive E. End the processes in Task Manager F. Run the Disk Cleanup utility
A. Remove applications from startup B. Defragment the hard drive
A user accidentally spills liquid on a laptop. The user wants the device to be fixed and would like to know how much it will cost. Which of the following steps should the technician take NEXT to verify if the device is repairable before committing to a price? (Choose two.) A. Remove the case and organize the parts. B. Document the screw locations. C. Search the Internet for repair tutorials. D. Consult colleagues for advice. E. Place the device in rice for a few days.
A. Remove the case and organize the parts. B. Document the screw locations.
A technician is configuring a new Windows computer for a home office. Which of the following steps should the technician take to secure the workstation? (Select TWO). A. Rename default accounts B. Disable Windows Update C. Configure single sign-on D. Run gpupdate tool E. Disable guest account F. Disable Action Center pop-ups
A. Rename default accounts E. Disable guest account
A technician has been asked to fix a problem with a projector. The projector lamp turns off for brief periods during a demonstration. After the technician replaced the lamp, the problem continued with an added message that appears just before the lamp turns off. Which of the following MOST likely need to be performed? (Choose two.) A. Reset the lamp life counter B. Replace the cooling fan C. Adjust the brightness D. Update the laptop video driver E. Install a higher lumen lamp F. Change the video resolution
A. Reset the lamp life counter B. Replace the cooling fan
In a virtual environment, which of the following allows all the VMs to have RAM allocated for use? A. Resource pooling B. Measured service C. Virtual application streaming D. Synchronization
A. Resource pooling
A user calls the help desk regarding a new Windows issues that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem. Which of the following would MOST likely fix the issue? A. Roll back updates B. Disable the Windows Update service C. Check for updates D. Restore hidden updates
A. Roll back updates
An engineer working with large detailed CAD files notices over time that the workstation is taking significantly longer to open files that used to launch quickly. Other applications work fine, and the engineer confirms all of the data has been backed up the night before. A technician determines that the workstation is about two years old. Which of the following would be the technician's FIRST step in troubleshooting the problem? A. Run defrag on the hard drive B. Restore the CAD files from backup C. Replace the hard drive D. Remove and reinstall the CAD software
A. Run defrag on the hard drive
A user advises that a computer is displaying pop-ups when connected to the Internet. After updating and running anti-malware software, the problem persists and the technician finds that two rogue processes cannot be killed. Which of the following should be done NEXT to continue troubleshooting the problem? A. Run msconfig to clean boot the computer B. Run Event Viewer to identify the cause C. Run System Restore to revert to previous state D. Run Recovery Console to kill the processes
A. Run msconfig to clean boot the computer
A customer asks a technician to help set up a specialized computing system for video editing. Which of the following should the technician install on the workstation to BEST meet the customer's specifications? (Choose two.) A. SSD B. Dual monitors C. Gigabit NIC D. Hypervisor E. Docking station F. NAS
A. SSD B. Dual monitors
A manager suspects a user has obtained movies protected by copyright using a torrent client. An incident response technician responds and verifies the user has indeed been violating company policy. Which of the following would be the next BEST step for this technician to perform? A. Secure the workstation in a limited access facility. B. Document the incident, purge all policy violating materials. C. Immediately delete all unauthorized materials. D. Reprimand the user and apply a content filter to their profile.
A. Secure the workstation in a limited access facility.
Which of the following tools is used to type or paste recovery commands directly into a Linux box? A. Shell/terminal B. Backup/time machine C. Command/cmd D. Restore/snapshot
A. Shell/terminal
Which of the following is an advantage of using DHCP for network addressing? A. Simplified configuration B. More addresses are available C. Faster connection speeds D. Lower latency times
A. Simplified configuration
Joe, an end user, has been prompted to provide his username and password to access the payroll system. Which of the following authentication methods is being requested? A. Single-factor B. Multifactor C. RADIUS D. TACACS
A. Single-factor
Ann, an executive, reports that she received a call from someone asking for information about her email account. Which of the following type of potential security threats does this scenario describe? A. Social engineering B. Spoofing C. Zero-day D. Man-in-the-middle
A. Social engineering
A user is on a business trip with a company issued Windows 10 laptop and is unable to connect to corporate WLAN. To temporarily reconfigure the settings, which of the following must the technician must access? A. Start/Control Panel/Network and Sharing Center/Change Adapter Settings/Wireless Network Connection Properties B. Start/Control Panel/Network and Sharing Center/Manage Wireless Networks/Profile Types C. Start/Control Panel/Network and Sharing Center/Manage Wireless Networks/Add/Create an ad hoc network D. Start/Control Panel/Network and Sharing Center/Manage Wireless Networks/Add/Manually create a network profile
A. Start/Control Panel/Network and Sharing Center/Change Adapter Settings/Wireless Network Connection Properties
An office manager mistakenly uninstalled a valuable application. Which of the following utilities may allow the manager to correct this issue? A. System Restore B. Computer Management C. Disk Management D. System Configuration
A. System Restore
A user reports being unable to browse the Internet. A technician believes the cause of the issue is related to DNS. Which of the following should the technician perform NEXT? A. Test the theory by attempting to browse to a website's known IP address. B. Implement preventive measures by manually assigning a DNS server to the PC. C. Identify the problem by running the command ipconfig /flushdns. D. Document the findings in the organization's local knowledge base.
A. Test the theory by attempting to browse to a website's known IP address.
What is the result of disabling Service Set Identifier (SSID) broadcast on a wireless access point (WAP)? A. The access point will not advertise its name to clients within range. B. Wireless clients will not be able to connect to it. C. The access point will not have a name to differentiate it from other access points. D. Wireless clients will not need to provide a password to connect to it.
A. The access point will not advertise its name to clients within range.
A computer technician wants to boot up a computer using a USB flash drive. After inserting the USB drive and powering on the computer, it does not boot to the flash drive and instead boots to the OS on the hard drive. Which of the following is MOST likely the cause? A. The boot order in the BIOS is incorrect B. The hard drive is not formatted C. There is a disc in the optical drive D. There is insufficient memory
A. The boot order in the BIOS is incorrect
A technician has noticed that when at company headquarters the laptop connection to the Internet is more responsive than when using the company-provided phone as a hotspot. The technician updated the drivers on the WiFi NIC without resolution and then verified the configuration on the WiFi was correct. Which of the following configurations could cause the decreased performance? A. The connection is throttled. B. There is a low RFID signal. C. SSID is not found. D. It is out of range.
A. The connection is throttled.
A user is connected to a docking station with an optical drive and is trying to back up personal files to removable media, but is encountering write errors. Which of the following is MOST likely cause of the errors? A. The disk has already been finalized B. The files are encrypted C. There is a corrupt file on the hard drive D. The files are not compatible with the type of disk used
A. The disk has already been finalized
A laser printer is producing output that smudges easily. Which of the following is likely the cause? A. The fuser needs to be replaced. B. Loose toner needs to be cleaned from the inside of the printer. C. One or all of the cartridges, rollers, or transfer belt are probably misaligned. D. The toner is poorly distributed.
A. The fuser needs to be replaced.
A user frequently travels with a Windows laptop and connects to several wireless networks. At a new location, the user reports that the locally shared printers are not available on the wireless connection. Which of the following would be causing the issue? A. The location profile is set to public. B. Workgroup is disabled. C. The proxy settings are misconfigured. D. Remote assistance is not configured.
A. The location profile is set to public.
A technician upgraded the memory on a server from two 8GB sticks to eight 32GB sticks. The server memory is now at full capacity per the user guide. When the technician powers on the system, only 128GB of memory is recognized by the OS and the BIOS. The technician decides to upgrade to the latest version of the firmware on the system, which does not help. Next, the technician installs the memory in sets of 64GB at a time. Each individual set of 64GB is fully recognized by the server. Which of the following will not allow the server to recognize all of the memory installed at the same time? A. The power supply is not supplying enough power for the memory. B. The memory has too many ECC errors and is shutting down C. The server is overheating when all of the memory is installed. D. The server needs DDR4 memory, and DDR3 is installed.
A. The power supply is not supplying enough power for the memory.
A technician is setting up a Windows mobile device for a user who had trouble reading text on a previous device, especially at night. Which of the following adjustments would be MOST appropriate? A. Use the magnifier. B. Increase the resolution. C. Use haptic feedback. D. Utilize text-to-speech.
A. Use the magnifier.
The graphics department has an issue with printing certain files. The printer does not print the complete image on larger files. A technician verifies the network speed of the printer is set to 1GB and that regular text files print without issue. Which of the following is the MOST likely cause of this problem? A. The printer needs more RAM B. The print server is timing out C. The users are not printing in post-script mode D. The printer network connection is set to half duplex
A. The printer needs more RAM
The OSD of a monitor indicates the proper video source is selected, but no image is displayed. Which of the following issues are the MOST likely reasons? (Select TWO). A. The source cable is disconnected B. The monitor's brightness is set too low C. The backlighting of the monitor is faulty D. The monitor's contrast is set too high E. No device is sending source video
A. The source cable is disconnected E. No device is sending source video
A user reports that the cursor jumps to random screen locations when typing on a laptop computer. Which of the following devices is MOST likely causing this? A. The touchpad B. The mouse wheel C. The multimedia keys D. The digitizer
A. The touchpad
Ann, a user, has purchased a new Android phone and is attempting to access a public hotspot. When she gets a message indicating the page cannot be displayed. She notices there is a "?" in the radio icon in the toolbar. She has verified Bluetooth is active, airplane mode is off, and tethering is turned on. She uses the cell phone to call a technician for assistance. Which of the following is the MOST likely issue Ann is experiencing? A. There is unauthenticated wireless connectivity B. She has exceeded the data allowance C. The phone is only 3G capable D. It is an unrooted phone E. The SIM card was not activated F. A data plan was not purchased
A. There is unauthenticated wireless connectivity
A MAC user's operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC. Which of the following built-in utilities should be used? A. Time Machine B. Snapshot C. System Restore D. Boot Camp
A. Time Machine
In terms of network access, what is the purpose of a blacklist? A. To identify the devices that are not authorized to access the network B. To identify attempts to access a secure domain and prevent unauthenticated access C. To determine access to the network from the address assigned to each network card D. To define the specific clients that will be denied access to the network
A. To identify the devices that are not authorized to access the network
In an enterprise network, a Demilitarized Zone (DMZ) is a means of establishing a more secure configuration. How do many SOHOs (Small Office Home Offices) use the term DMZ? A. To mean "not protected by the firewall" as the host is fully accessible to other Internet hosts B. To describe a host that is configured to forward a port from one network node to another C. To define the specific clients that will be denied access to the network D. To identify the devices that are not authorized to access the network
A. To mean "not protected by the firewall" as the host is fully accessible to other Internet hosts
A user's smartphone has been slow recently. A technician sees the phone was purchased two months ago, and it is top of the line. About a month ago, a new OS update was installed. To address the issue, the technician runs a hardware diagnostic on the device, and it reports no problems. Which of the following is MOST likely the cause of the performance issue on the device? A. Too many applications are running updates B. The device is currently running in airplane mode C. The internal memory is failing on the device D. The OS update is too resource intensive for the device
A. Too many applications are running updates
Joe, a user, just downloaded a game onto his company phone. When he is not using the device, it unexpectedly dials unrecognized numbers and downloads new content. Joe is the victim of which of the following? A. Trojan horse B. Spyware C. Social engineering D. Worms
A. Trojan horse
PII is considered government regulated data A. True B. False
A. True
Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer's design? (Select two.) A. UPS B. Server rack C. PoE phone D. Desktop printer E. Modem F. Patch panel
A. UPS B. Server rack
Which of the following installation types would require the use of an answer file to install the OS? A. Unattended B. Clean C. Repair D. Upgrade
A. Unattended
Joe, a user, is using his smartphone for navigation while driving. As he drives, an icon frequently appears on the screen informing the user additional information is required to log in. Which of the following is causing this? A. Unintended WiFi connections B. Cellular data roaming notifications C. Weak cellular signal D. Unintended Bluetooth connections
A. Unintended WiFi connections
A user is requesting a solution that will prevent file corruption and ensure a graceful shutdown while providing at least one hour of uptime in case of extreme weather conditions. Which of the following should a technician recommend? A. Uninterruptible power supply B. Surge protector C. Power strip D. Power distribution unit
A. Uninterruptible power supply
Which of the following devices can be used to connect multiple devices within a network without broadcasting to every network port? A. Unmanaged switch B. Hub C. Firewall D. Cable modern
A. Unmanaged switch
A technician is troubleshooting a laptop/projector combination that is displaying artifacts on the screen. When a different laptop is connected to the projector, the image appears to be correct but is very dim. Which of the following steps should the technician take to address these issues? (Choose two.) A. Update the video drivers on the laptop. B. Increase the projector contrast. C. Replace the original laptop. D. Change the aspect ratio on the projector. E. Replace the bulb in the projector. F. Modify the laptop's display resolution.
A. Update the video drivers on the laptop. B. Increase the projector contrast.
A technician opens a customer's computer and sees large amounts of accumulated dust. Which of the following is the BEST method of removing the dust from the computer? A. Use compressed air to free the dust from the components and remove it with an ESD vacuum. B. Dampen an ESD cloth with denatured alcohol and use it to gently wipe the dust away. C. Use a shop vacuum with enough power to ensure all dust has been removed. D. Remove as much dust as possible by hand and use compressed air to blow the rest out.
A. Use compressed air to free the dust from the components and remove it with an ESD vacuum.
A technician is setting up a WiFi-enabled thermostat for a customer, but the customer is concerned about IoT devices getting hacked. Which of the following BEST address the customer's concerns? (Choose two.) A. Use the latest encryption standard on the wireless network and set a strong password. B. Enable two-factor authentication for the IoT device's cloud account, if it is available. C. Separate the IoT thermostat by segregating it in a DMZ network. D. Disable wireless access on the thermostat to make it unshakable. E. Upgrade the customer's router to the latest version to improve network security. F. Upgrade the customer's wireless network encryption to WPA.
A. Use the latest encryption standard on the wireless network and set a strong password. C. Separate the IoT thermostat by segregating it in a DMZ network.
A technician is setting up a WiFi-enabled thermostat for a customer, but the customer is concerned about IoT devices getting hacked. Which of the following BEST address the customer's concerns? (Choose two.) A. Use the latest encryption standard on the wireless network and set a strong password. B. Enable two-factor authentication for the IoT device's cloud account, if it is available. C. Separate the IoT thermostat by segregating it in a DMZ network. D. Disable wireless access on the thermostat to make it unshakable. E. Upgrade the customer's router to the latest version to improve network security. F. Upgrade the customer's wireless network encryption to WPA.
A. Use the latest encryption standard on the wireless network and set a strong password. C. Separate the IoT thermostat by segregating it in a DMZ network.
Which of these is an embedded system in a corporate environment? DNS server Windows Server 2012 Windows Server 2003 Alarm system
Alarm system
procedure
An inflexible, step-by-step listing of the actions that must be completed for any given task.
Windows Media Center
An obsolete program included with Windows Vista and Windows 7 that included a broadcast TV schedule that allowed computers equipped with a TV tuner card to view and record TV programs. It also acted as a playback interface for optical discs.
Android
An open-source operating system supported by a wide range of hardware and software vendors.
Linux
An open-source operating system supported by a wide range of hardware and software vendors.
CD drive
An optical drive consisting of a spindle motor to spin the disc, a laser and lens to read the disc, and a tracking system to move the laser and lens assembly.
Blu-ray drive
An optical drive for reading, and if so equipped, writing to Blu-ray disc media. Most drives can also read CD and DVD discs.
printer
An output device that produces text and images from electronic content onto physical media such as paper or transparency film. Also the term used to describe the software object representing a print device in an operating system.
The company's owner would like to purchase a very lightweight system to be used while traveling. There is no need to join a Windows domain or to have any business software other than Microsoft Office. What operating system do you recommend? Android Windows 10 Home edition Windows 10 Education Windows 10 Professional
Android
Android
Android is an open source operating system. This means that the source code is freely available to developers for modification. As such, device manufacturers can modify the code so that the operating system suits their particular device features.
Which of the following mobile devices requires a Google account to use the app store? iPhone Kindle Android tablet iPad
Android tablet
What type of security software is designed to monitor the permissions allocated to apps and how they are using (or abusing) them? Firewall Apps Anti-virus Apps App Scanner Patches
App Scanner
What can macOS use for Patch Management? Backup and Restore fsck ckkdsk Package Management launchd Time Machine Disk Utility rsync cron WSUS Task Scheduler App Store
App Store
solid state storage
Any type of persistent digital storage technology that does not use mechanical parts.
What are some proper ways to clean and control the build-up of dust on or within a Personal Computer (PC)? (Select all that apply.) Anti-static cloth Blowing with your mouth Compressed air Anti-static Vacuum
Anti-static cloth Compressed air Anti-static Vacuum
trip hazard
Any object placed in pathways where people walk.
developer unit
Assembly that applies toner to areas of the photoconductor where charge has been removed by the laser. The main components are a toner hopper, transfer roller, waste toner hopper, a screw or blade to stir the toner, and a doctor blade to ensure the correct level of toner on the developer roller.
asset management
Asset management means identifying each asset and recording its location, attributes, and value in a database.
serial port
Asynchronous serial transmission (RS-232) is one of the oldest PC bus standards. A serial port is a legacy port that can be used to connect devices such as modems, mice, and Uninterruptible Power Supplies (UPS). Serial ports transmit data bit-by-bit using a single data line at a speed of up to about 115 Kbps. Although the original serial port used a 25-pin male D connector, most PCs today use a male DB9 (9-pin) port. The serial port is now little used but does provide an "out-of-band" means of configuring network appliances such as switches and routers.
________ is one of the functions for the overall operation of an access control system that means one or more methods of proving that user is who she/he says she/he is.
Authentication
Logical security refers to controls implemented in software to create an access control system. What functions describe the overall operation of an access control system? (Select all that apply.) Availability Authentication Authorization Accounting
Authentication Authorization Accounting
Which type of server checks your security credentials before allowing you to pass through to network services? Proxy server Authentication server Mail server File server
Authentication server
________ is one of the functions for the overall operation on an access control system that means creating one or more barriers around the resource such that only authenticated users can gain access.
Authorization
A system administrator identifies an issue with a server. The administrator believes the problem is with the Network Time Protocol (NTP). Analyze the NTP and determine what symptoms would lead the administrator to believe there is an NTP issue. A. A server cannot access the File/Print Sharing Service. B. A server cannot access network resources and authentication is failing. C. A server cannot access a previously configured mailbox. D. A server cannot request resources from a web server.
B. A server cannot access network resources and authentication is failing.
A system administrator identifies an issue with a server. The administrator believes the problem is with the Network Time Protocol (NTP). Analyze the NTP and determine what symptoms would lead the administrator to believe there is an NTP issue. A. A server cannot request resources from a web server. B. A server cannot access network resources and authentication is failing. C. A server cannot access the File/Print Sharing Service. D. A server cannot access a previously configured mailbox.
B. A server cannot access network resources and authentication is failing.
A technician is ordering a new motherboard and processors for a company email server. When reviewing the vendor licensing agreement, the technician sees that there is a flat per-socket licensing fee. Which of the following motherboard/processor combinations should the technician order to get the BEST performance while minimizing licensing fees? A. A dual-processor motherboard with six hyperthreaded cores each. B. A single-processor motherboard with eight hyperthreaded cores. C. A dual-processor motherboard with eight overclocked cores each. D. A single-processor motherboard with ten overclocked cores.
B. A single-processor motherboard with eight hyperthreaded cores.
Android smartphones are typically different from other smartphone devices in that: A. Android devices use apps that are more secure than other devices. B. Android devices use open source operating systems. C. Android devices can only operate with a proprietary operating system. D. Android devices can receive apps from different sources.
B. Android devices use open source operating systems.
A user reports that any URL entered redirects to the same web page. A technician concludes that the user's computer has been compromised. Which of the following tools would the technician use to resolve the issue? A. Last known good configuration B. Anti-malware C. System restore D. Rogue antivirus
B. Anti-malware
Ann, a user, calls the help desk regarding an issue on her laptop. While working remotely, she appears to be connecting to WiFi but is unable to retrieve her corporate email. The wireless name is listed as "ConnectMe" and appears as unsecure. Which of the following should the help desk perform to fix the issue? A. Remote into Ann's system and restart the wireless adapter B. Ask Ann to open a browser and watch for a redirect page C. Advice Ann to plug an Ethernet cable into her laptop D. Direct Ann to run an antivirus program on her laptop
B. Ask Ann to open a browser and watch for a redirect page
Your Windows 10 PC has a secondary hard drive that is configured as a dynamic disk. You wish to convert this disk to a basic disk and move it to a different system. What is the first best step? A. Initialize the disk and create a new partition for the other computer. B. Backup the data as a dynamic to basic conversion will delete the data. C. Shrink the volume on the disk and create a new volume on the same disk. D. Mark the disk as foreign and move it to the other computer.
B. Backup the data as a dynamic to basic conversion will delete the data.
Ann, a user, needs to attend several day-long conferences and wants to ensure her mobile device will have enough power for these events. She is concerned about wall outlet availability at the conferences and needs to continuously use her device for important updates. Which of the following should a technician recommend to BEST accommodate Ann's needs? A. Wireless charging pad B. Built-in battery case C. Extra charging cords D. Airplane mode
B. Built-in battery case
A customer is reporting a burning smell coming from a CRT monitor. Which of the following should be taken into consideration before attempting to resolve the customer's issue? A. Disconnect power before inspecting the CRT power supply B. CRT monitors should be serviced by qualified personnel C. Have compressed air available to clear out the debris D. Wear safely goggles to protect from the cathodes
B. CRT monitors should be serviced by qualified personnel
A user opens a service ticket for a laser printer that has paper jams. Lately, jamming has become more frequent. The technician recreates the problem and checks the printer logs for more information about the printer. Which of the following choices are MOST likely fixes to this problem? (Select TWO). A. Clean and inspect the laser drum assembly B. Clean and inspect the entire paper path C. Use the printer maintenance kit to replace parts D. Replace the paper exit assembly switch E. Clean and replace the paper out sensor F. Clean the fuser cold roller and verify fuser operation
B. Clean and inspect the entire paper path C. Use the printer maintenance kit to replace parts
A SOHO customer has recently experienced a major hurricane. The customer has no backups and has lost all data and hardware associated with the company. The customer calls a contractor to assist in the rebuilding process and needs suggestions on the best way to prevent this from happening again. Which of the following recommendations should the contractor give to the customer? (Choose two.) A. Backup testing B. Cloud storage C. Local storage backups D. Data recovery E. Hot site F. Waterproof devices
B. Cloud storage E. Hot site
A user needs to shrink the partition size of a hard drive encrypted with BitLocker. Which of the following is the BEST option to modify the size of the partition? A. Credential Manager B. Computer Management C. Device Manager D. TPM Manager
B. Computer Management
A user connects a laptop to a docking station but is unable to see an image on the external monitor. The user tests the docking station USB ports, and they are working fine. Which of the following should be done NEXT? A. Check for firmware updates B. Configure extended display mode C. Replace the external monitor D. Adjust the laptop's BIOS settings
B. Configure extended display mode
A technician has been informed that multiple users are receiving duplicate IP address warnings on their workstations, and they are unable to browse the Internet. Which of the following server types should the technician log in to in order to resolve the problem? A. DNS server B. DHCP server. C. Proxy server D. RADIUS server
B. DHCP server.
An employee's laptop will not power on. When the power button is pressed, the power light goes on and then suddenly off. A technician replaces the battery, and the laptop powers on. The employee works without issues until the end of the day, but the laptop presents the same problem the next morning. Which of the following is the MOST probable cause of the issue? A. Swollen battery B. Damaged AC adapter C. Improperly seated RAM D. Cooling fan failure E. Imminent hard drive failure
B. Damaged AC adapter
A technician has just installed a video card in a PC. The video card is not working, although it was working fine on the test bench. Which of the following Windows tools should the technician use to start troubleshooting the problem? A. Task Manager B. Device Manager C. System Configuration D. Computer Management
B. Device Manager
A company brings in contractors several times a year to perform inventory, and the contractors use company-supplied laptops. The company's security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory. Which of the following BEST enforces this policy? A. Delete the user accounts B. Disable the user accounts C. Restrict the user accounts D. Reset the user accounts
B. Disable the user accounts
A user's mobile device appears to be losing battery life rapidly and often feels warm to the touch, even when it is put away. The device is relatively new, so the user is concerned it is defective. A technician inspects the device and see the following: Storage Settings: 26GB Used (6GB Free) Photos 15GB Music 5GB Messages 3 GB Apps 2GB Usage Settings: Calls 800MB Maps 3.2GB Messages 120MB News 250MB Weather 40MB Mail Settings: WorkPush PersonalFetch (15 minutes) Privacy Settings: App Store While Using Maps Always Email Never Weather Always Calendar While Using Messages While Using Photos Always Display Settings: Brightness Auto Auto-Lock Never Night Mode Disabled Which of the following should be changed to resolve this issue? A. Privacy - Maps B. Display - Brightness C. Storage - Photos D. Mail - Work
B. Display - Brightness
A network administrator wants to plan a major OS upgrade of the router, which acts as a default gateway in an organization. The administrator has documented the purpose of the change, scoped the change, and completed a comprehensive risk analysis. Which of the following is an important part of the change request process for which the administrator still must plan? A. Inform management regarding the anticipated amount of downtime B. Document a backout plan to roll back changes to the router C. Configure a redundant data path to eliminate downtime D. Make the downtime window larger than actually anticipated
B. Document a backout plan to roll back changes to the router
A server administrator set up a VM to be used in a lab setting. A technician is setting up thin-client computers to access this VM. Which of the following tasks are required to complete the project? (Choose four.) A. Connect the device to a printer. B. Install the operating system. C. Install a USB keyboard and mouse. D. Connect the device to the network. E. Install the latest system updates. F. Install the latest device drivers. G. Connect the device to a monitor. H. Install the necessary applications.
B. Install the operating system. C. Install a USB keyboard and mouse. D. Connect the device to the network. G. Connect the device to a monitor.
A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server. Which of the following Control Panel utilities should the technician use to configure the setting? A. Internet Options - Advanced B. Internet Options - Connections C. Internet Options - Security D. Internet Options - Content E. Internet Options - Privacy
B. Internet Options - Connections
What is the function of a Local Area Network (LAN) router? A. It works at the same layer as a switch making a physical link with the Internet Service Provider's network. B. It divides the network into multiple networks. C. It joins a network using one type of media with a network using another type of media. D. It converts the client's private Internet Protocol (IP) address into a public IP address.
B. It divides the network into multiple networks.
What is a proxy server and how does it protect the computer network? A. It logs event messages sent by network devices identifying any issues or problems. B. It hides network IP addresses from external users by making the computer network invisible. C. It translates device names into IP addresses providing resolution of host and domain names to IP addresses. D. It identifies an individual process or entity attempting to access a secure domain preventing access by unauthenticated users.
B. It hides network IP addresses from external users by making the computer network invisible.
What are two benefits of using a Power over Ethernet (PoE) switch versus a non-PoE switch? A. It connects computers to the network and monitors and controls network traffic sent. B. It is more efficient than using an electric outlet and allows network software to manage power to devices. C. It overcomes network cabling distance limitations and divides local networks into segments. D. It provides power to non-PoE connections and communicates over electric wiring.
B. It is more efficient than using an electric outlet and allows network software to manage power to devices.
What is the function of a computer's network adapter or Network Interface Card (NIC)? A. It is responsible for monitoring and controlling traffic on a network. B. It is responsible for connecting the computer or device to the network. C. It is responsible for ensuring that all devices receive signals on the network. D. It is responsible for monitoring network traffic and blocking or allowing the traffic to pass.
B. It is responsible for connecting the computer or device to the network.
A technician is running updates on a Windows PC. Some of the updates install properly, while others appear as failed. While troubleshooting, the technician restarts the PC and attempts to install the failed updates again. The updates continue to fail. Which of the following is the FIRST option to check? A. Visit the Microsoft Update website to see if there is an issue with a specific update B. Look up the error number associated with the failed update C. Look at the system Event Viewer to find more information on the failure D. Download the failed update to install manually
B. Look up the error number associated with the failed update
Which of the following are characteristics of routers, but NOT characteristics of modems? (Select all that apply.) A. Must be matched to the type of link B. Make decisions about forwarding between two networks C. Make a physical network link with the Internet Service Provider's (ISP's) network D. Can divide a physical network into multiple networks
B. Make decisions about forwarding between two networks D. Can divide a physical network into multiple networks
A SOHO technician recently moved some data from one server to another to increase storage capacity. Several users are now reporting they cannot access certain shares on the network. When the users attempt to access the shares, they get the following error: Access Denied. The technician confirms the users are all in the proper security groups and have the proper access, but they are still unable to access the shares. Which of the following are the MOST likely reasons for these issues? (Select two.) A. Administrative share permissions B. Mapped drives C. Group Policy hours restriction D. Denied write/delete permissions E. Disabled proxy settings
B. Mapped drives D. Denied write/delete permissions
A network printer is online and ready. The accounting group is unable to print to this network printer, but other departments can. Which of the following would the technician use to resolve the problem? A. Replace the printer's network cable B. Modify the security setting of the print spooler C. Restart the TCP/IP print spooler service D. Use the manufacturer's maintenance kit
B. Modify the security setting of the print spooler
Which of the following cable types should always be used through life safety areas? A. PVC B. Plenum C. STP D. Fiber
B. Plenum
Which of the following connector types is used to terminate household telephone cabling? A. RG-6 B. RJ-11 C. RJ-45 D. RG-59
B. RJ-11
A technician wants the number of virtual machines hosting a web application in the public cloud environment to scale based on real-time traffic on the website. Which of the following should the technician configure? A. Resource pooling B. Rapid elasticity C. Measured service D. High availability
B. Rapid elasticity
After upgrading a smartphone's OS, Joe, a user, reports the smartphone no longer connects to his automobile automatically when near it, Joe, restarts the smartphone, but the problem persists. Which of the following should a technician do NEXT to restore the previous functionality? A. Connect the smartphone to the automobile via USB B. Reenable the smartphone's Bluetooth radio C. Perform a rollback of the smartphone's OS D. Pair the smartphone with the automobile
B. Reenable the smartphone's Bluetooth radio
A user is experiencing a software application error. The user contacts a technician for support. Which of the following will allow the user to issue an invitation to the technician in this scenario? A. Remote desktop B. Remote assistance C. telnet D. FTP
B. Remote assistance
A technician just installed an antivirus suite on a workstation. It is kept up-to-date and has recently scanned the system. A day later the user reports slower response times than usual. Which of the following is the user MOST likely experiencing? A. Advertisements B. Resource consumption C. A trojan infection D. Unremoved viruses
B. Resource consumption
A manager with a restricted user account receives the following error message: Windows Update cannot currently check for updates because the service is not running. The manager contacts the help desk to report the error. A technician remotely connects to the user's computer and identifies the problem. Which of the following should the technician do NEXT? A. Reboot the computer B. Restart the network services C. Roll back the device drivers D. Rebuild the Windows profiles
B. Restart the network services
What is the purpose of Applications implementing Server Message Block (SMB) sometimes referred to as Common Internet File System (CIFS)? A. SMB/CIFS shares files, printers, and other network resources on Apple networks over TCP or UDP port 427 and TCP port 548. B. SMB/CIFS shares files, printers, and other network resources on Windows networks usually over TCP port 445. C. SMB/CIFS transfers files with a remote host (typically requiring authentication of user credentials) over TCP ports 20 and 21. D. SMB/CIFS transfers files with a remote host (without requiring authentication of user credentials) over UDP port 69.
B. SMB/CIFS shares files, printers, and other network resources on Windows networks usually over TCP port 445.
An end user has signed up to use a web-based calendar application. Which of the following solutions has the user purchased? A. DaaS B. SaaS C. PaaS D. IaaS
B. SaaS
Which of the following Internet connection types has the HIGHEST latency? A. WiMAX B. Satellite C. Fiber D. Dial-up
B. Satellite
Which of the following Internet connection types is known to have a significantly higher latency than the others? A. Cable B. Satellite C. DSL D. Fiber
B. Satellite
A user's personal laptop was hacked. A technician troubleshooting the issue discovers the user used the numbers 123456789 as their account password. The user has not changed the password in two years. Which of the following best practices should the technician recommend the user implement to prevent future hacking? (Select TWO). A. Configure screen saver B. Set a strong password C. Set login time restrictions D. Use a more secure browser E. Change the password frequently
B. Set a strong password E. Change the password frequently
Ann, an accountant, reports that after turning on her new laptop, she received a message stating her IP address is already in use on the system. She tried going back to her old desktop, which she now only uses for email, but received the same message. The technician checks the account and sees a comment that Ann requires a special network setup to connect to the banking software. Which of the following should the technician do to resolve the issue? A. Remove the static IP configuration from the desktop. B. Set the laptop configuration to DHCP to prevent conflicts. C. Replace the network card in the laptop, as it may be defective. D. Bridge the LAN connection between the laptop and the desktop.
B. Set the laptop configuration to DHCP to prevent conflicts.
Of the following which is the least technical method a malicious user can use to obtain user passwords? A. Spyware B. Shoulder surfing C. Evil Twin D. Tailriding
B. Shoulder surfing
A technician has been tasked with disposing of hard drives that contain sensitive employee data. Which of the following would be the BEST method to use for disposing of these drives? A. Recycling B. Shredding C. Overwriting D. Reformatting
B. Shredding
Which of the following network cable types has the longest range? A. CAT5e B. Single-mode fiber C. Multi-mode fiber D. CAT6
B. Single-mode fiber
Joe, a user, calls the help desk from a coffee shop while on a business trip to report the WiFi hotspot on his phone is extremely slow. The technician runs a speed test from a laptop connected to the hotspot and gets 200Kbps. Ann, Joe's coworker with whom he is travelling, also has a hotspot on her phone, and the speed test result on that hotspot is 15Mbps. The technician checks the hotspot settings on Joe's phone and sees the following: Network Name: Joe's Hotspot Security: WPA2/PSK Password: hotspot Band: 2.4 GHz Client DHCP start address: 192.168.23.1 Which of the following is the MOST likely cause of the problem? A. Joe should be using WEP security on his hotspot for faster throughput B. Someone else is using Joe's hotspot due to weak password C. Joe's hotspot gave him an invalid IP address D. Joe is likely in a poor signal area and should try another area
B. Someone else is using Joe's hotspot due to weak password
Which of the following connects a PC to its default gateway? A. NIC B. Switch C. Router D. Cable modem
B. Switch
Neither hubs nor bridges are widely used on networks anymore. These appliances have been replaced by Ethernet switches. How are switches like hubs? A. Switches amplify received signals, so they can be transmitted over greater distance without loss of quality. B. Switches can connect nodes together in a single network, repeating and regenerating signals over multiple ports. C. Switches are used to reduce the effect of contention on network performance. D. Switches consist of multiple ports arranged in rows used for cable management.
B. Switches can connect nodes together in a single network, repeating and regenerating signals over multiple ports.
A technician is noticing extremely slow performance on a computer and would like to see what application is consuming resources. Which of the following tools should the technician use to view the system performance? A. msconfig B. Task Manager C. Event Viewer D. netmon
B. Task Manager
Which of the following is important when replacing a power supply in a workstation located in a datacenter server rack? A. A fanless power supply should be used B. The proper voltage must be selected C. The unit must be the same or less wattage D. The power connector location must be the same
B. The proper voltage must be selected
A technician replaced a broken LED screen on a mobile computer. The operating system can be seen perfectly on screen, but the touch screen is non-responsive. Which of the following are the MOST probable root causes for the given failure? (Choose three.) A. The hardware replacement used is a non-touch-screen version. B. The touch screen must be calibrated after a replacement. C. The digitizer cable is not seated properly on the motherboard. D. The new touch-screen drivers must be installed. E. The replacement part is dead-on-arrival. F. The LCD panel firmware must be updated. G. The grounding screws are not securely attached.
B. The touch screen must be calibrated after a replacement. C. The digitizer cable is not seated properly on the motherboard. D. The new touch-screen drivers must be installed.
You need to diagnose a broken laptop. Which of the following is NOT a technical component of the screen? Display Bezel Digitizer Inverter
Bezel
A user brings a Windows laptop into the office and connects it to a wireless network. Upon connecting to the network, the user is prompted to select whether the network is a home, work, or public network. The user selects the work profile and is able to access the Internet but cannot access office network resources. Which of the following is the MOST likely cause of the problem? A. The user's network card is malfunctioning. B. The user is connected to the wrong wireless network. C. The user's firewall is blocking access to the resources. D. The user put in the wrong credentials.
B. The user is connected to the wrong wireless network.
If a user is unable to install a printer, what is likely the problem? A. The printer is offline. B. The user's account does not have sufficient permissions to install drivers. C. The Print Spool service is started. D. The user's account does not have sufficient permissions to the spool folder.
B. The user's account does not have sufficient permissions to install drivers.
Laser printers and thermal printers both use a heating element to function. Which of the following differentiates them? A. Laser printers require a liquid pigment. B. Thermal printers use device specific stock. C. Laser printers do not require thermal toner. D. Thermal printers utilize refillable heat toner.
B. Thermal printers use device specific stock.
How are tone generators and tone probes different from cable testers? A. They can only confirm that a signal is present on a network cable. B. They can only help you differentiate between different unshielded twisted pair (UTP) cables. C. They can only determine the voltage and resistance of the cable. D. They can only certify the cable for transmission quality.
B. They can only help you differentiate between different unshielded twisted pair (UTP) cables.
An IPS appliance is installed on the network. Which of the following is the purpose of the IPS? A. To check the network for unwanted activity B. To check and stop unwanted activity C. To provide connectivity to the network D. To test the resilience of the network
B. To check and stop unwanted activity
In an enterprise network, a Demilitarized Zone (DMZ) is a means of establishing a more secure configuration. How do many SOHOs (Small Office Home Offices) use the term DMZ? A. To define the specific clients that will be denied access to the network B. To mean "not protected by the firewall" as the host is fully accessible to other Internet hosts C. To describe a host that is configured to forward a port from one network node to another D. To identify the devices that are not authorized to access the network
B. To mean "not protected by the firewall" as the host is fully accessible to other Internet hosts
When referring to laser printing, which of the following describes the development process? A. The corona wire places a static charge on the drum. B. Toner is pulled to the charged areas of the drum. C. Toner is pulled from the drum to the paper. D. The toner is permanently affixed to the paper.
B. Toner is pulled to the charged areas of the drum.
What is the primary purpose of a Domain Name System (DNS) server? A. Storing, processing and delivering web pages to clients B. Translating names into numeric IP addresses C. Maintaining a pool of IP addresses and leasing these to network devices D. Logging event messages sent by network devices for identification of any issues or problems
B. Translating names into numeric IP addresses
A technician has successfully completed a gpupdate from a CMD box of a user's PC and is ready to move to the next user. Which of the following is the appropriate NEXT step? (Select TWO). A. View the CMD process in Task Manager B. Type EXIT at the command prompt and press Enter C. Minimize the CMD box to the taskbar D. Click the "x" in the top right of the CMD window E. Select Switch User on the PC
B. Type EXIT at the command prompt and press Enter D. Click the "x" in the top right of the CMD window
A SOHO user reports desktop applications are performing slowly, and no emails have been received all morning. A technician remotes in and determines Internet pages' load slowly or not at all, CPU performance is normal, and the local router can successfully ping. The remote connection drops periodically. Which of the following steps should the technician take NEXT to resolve the problem? A. Reboot into safe mode, uninstall the latest OS update, and run a repair on the OS B. Update the antivirus software, run an antivirus scan, verify the browser settings, and check all email settings C. Reboot to BIOS setup, verify the TPM is enabled, and start a System Restore from safe mode D. Send a test email, open a command prompt to check the file system, and empty the browser cache
B. Update the antivirus software, run an antivirus scan, verify the browser settings, and check all email settings
Power over Ethernet (PoE) is a means of supplying electrical power from a switch port over data cabling, category 5 (Cat 5) or better, to a connected powered device. What is a Power over Ethernet (PoE) power injector used for? A. Automatically detecting and communicating over electrical wiring B. Upgrading non-PoE network connections to PoE C. Overcoming distance limitations imposed by network cabling D. Providing power to PoE connected devices
B. Upgrading non-PoE network connections to PoE
A technician has just installed a wireless access point in a customer's home office. While testing the network and browsing the Internet, the technician finds that the connection is not stable, speeds are slow, and websites sometimes do not load. Which of the following should the technician do FIRST? A. Re-enable the broadcasting of the access point's SSID so it is visible to mobile devices. B. Use a WiFi analyzer to ensure neighboring networks are not using the same channel. C. Reconfigure network devices to use static IPs instead of DHCP-assigned addresses. D. Change the signal encryption from WPA2 to WEP to ease transmission overhead.
B. Use a WiFi analyzer to ensure neighboring networks are not using the same channel.
A technician has replaced the NIC in a computer running Windows 10 Professional and has properly installed the device driver. The computer indicates the card has network connectivity, but the technician is unable to access the Internet. Which of the following should the technician do NEXT to finish the NIC installation? A. Change the computer and DNS server's IP addresses in the Action Center B. Use ipconfig to check the current settings and Network Connections to make changes C. Assign the NIC an APIPA address using ipconfig and the network setup wizard D. Reboot the computer and configure the necessary network settings in the BIOS
B. Use ipconfig to check the current settings and Network Connections to make changes
An end user wants to have a second monitor installed on a laptop. Which of the following would allow a technician to configure the laptop to show both screens once the cable is connected? A. Plug an external monitor into the USB port. B. Use the Fn and function key combination C. Adjust the monitor display settings. D. Enable DisplayPort.
B. Use the Fn and function key combination
A network administrator needs to connect to resources from an offsite location while ensuring the traffic is protected. Which of the following should the administrator use to gain access to the secure network? A. SSH B. VPN C. SFTP D. RDP
B. VPN
A new user reports trying to login to a workstation but, when pressing CTRL+ALT+DEL, they are asked for a PIN. Which of the following should be done NEXT? A. Enter all passwords they have used in the past B. Verify a smart card has been issued C. Check the network cable D. Reboot the computer
B. Verify a smart card has been issued
A user is having a problem with printing a specific document type. The network printer OCP shows that the printer is online with no errors. Other users are not having the same issue. The user sends the document to another printer and the document prints. Which of the following should a technician do FIRST in troubleshooting the problem? A. Stop and restart the PC print spooler service. B. Verify the user is sending the document to the correct printer queue. C. Have each user send the same document to the correct printer queue. D. Stop and restart the print server queues, and then have the user resend the document.
B. Verify the user is sending the document to the correct printer queue.
An administrator has a virtual client running but cannot receive network connectivity. The host workstation is able to access the network. Which of the following would the administrator check on the host to repair the problem? A. The cable connected to the network B. Virtual host network adapter C. USB host adapter D. The domain of the virtual machine
B. Virtual host network adapter
A user has lost connection to the Internet, but can still browse locally shared folders. Which of the following connections is MOST likely down? A. SAN B. WAN C. LAN D. PAN
B. WAN
cultural sensitivity
Being aware of customs and habits used by other people.
What is the first step in replacing (rather than upgrading) an existing installation? Reinstall software applications and utilities. Back up data from existing system. Restore data from the previous system using the backup you made. Install the new OS.
Back up data from existing system.
A user's laptop is experiencing problems with the display. The screen often flickers and is dim. Which of the following two components might be failing (choose two)? LCD (Liquid Crystal Display) panel Backlight Touchscreen Inverter
Backlight Inverter
What can Windows use for Backups? Backup and Restore fsck ckkdsk Package Management launchd Time Machine Disk Utility rsync cron WSUS Task Scheduler App Store
Backup and Restore
ink dispersion printer
Better known as inkjets, this is a type of printer where colored ink is sprayed onto the paper using microscopic nozzles in the print head. There are two main types of ink dispersion system: thermal shock (heating the ink to form a bubble that bursts through the nozzles) and piezoelectric (using a tiny element that changes shape to act as a pump).
______ is a fundamental concept in configuration management. This represents "the way it was." It can be a configuration type (the ACL applied to a firewall, for instance) or a performance type (such as the throughput achieved by a server).
Baseline
A user leaves the workstation frequently and does not want sensitive material to be accessed. In addition, the user does not want to turn off the computer every time in the evening. Which of the following is the BEST solution for securing the workstation? A. Set a strong password that requires a renewal every 30 days. B. Run a screensaver after one minute of nonuse and fingerprint lock for afterhours. C. Apply a screen lock after five minutes of nonuse and login time restrictions for afterhours. D. Require a password and fingerprint lock afterhours.
C. Apply a screen lock after five minutes of nonuse and login time restrictions for afterhours.
Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After about ten minutes of troubleshooting, Joe is increasingly concerned and claims that the technician is wasting his time because he has already tried everything that has been suggested. Which of the following should the technician do? A. Since Joe is concerned about time, suggest calling back later when Joe has more time to troubleshoot B. Record the call and send it to the local intranet for future technicians to learn how to deal with calls like this one C. Ask more open-ended questions to see if the issue can be narrowed down in order to properly identify the issue and save time D. Inform the customer that there is a troubleshooting script that must be followed to get the issue resolved
C. Ask more open-ended questions to see if the issue can be narrowed down in order to properly identify the issue and save time
Mika has just removed a virus that was found on a company issued laptop. What should Mika require of the user before returning the laptop to him? A. Place him and the device in quarantine B. No action needed C. Attend user training D. Install spyware on his machine to ensure it doesn't happen again
C. Attend user training
A customer contacts the help desk stating a laptop does not remain charged for more than 30 minutes and will not charge more than 15%. Which of the following components are the MOST likely causes the issue? A. LCD power inverter B. AC adapter C. Battery D. Processor E. VGA card F. Motherboard G. Backlit keyboard H. Wireless antenna
C. Battery
A technician is troubleshooting an expansion card in a computer that allows the computer to receive faxes over a VoIP line. The telephone line connected to the expansion card is MOST likely which of the following cable types? A. Coaxial B. CAT3 C. CAT6 D. Multi-mode fiber E. Single-mode fiber
C. CAT6
An end user is unable to connect to the network, and a technician has visually verified the lights on the back of the PC are active and there is no physical damage to the Ethernet jack. Which of the following tools should the technician use to continue troubleshooting the connection? A. Punchdown tool B. Tone generator and probe C. Cable tester D. Crimper
C. Cable tester
Which of the following Ethernet cables would BEST support an application that requires a 600 Mbps throughput at the lowest price point? A. Cat 3 B. Cat 5 C. Cat 5e D. Cat 6
C. Cat 5e
Which of the following Ethernet cables would BEST support an application that requires a 600Mbps throughput at the lowest price point? A. Cat 3 B. Cat 5 C. Cat 5e D. Cat 6
C. Cat 5e
Ann, an employee at a company, calls the help desk to report issues logging on to a vendor's website. Joe, the technician, is able to log in successfully with his credentials before going to Ann's office. However, when he attempts to log in from Ann's office, Joe experiences the same issue. Ann asks Joe questions about the new software installed on the laptop from the pop-up notification. Which of the following are the NEXT steps Joe should take to resolve the issue? (Choose two.) A. Ask Ann for her credentials to verify and log on to the vendor's website from Ann's laptop B. Verify Ann's laptop has the correct browser settings C. Check all browser cached files on Ann's laptop and log on to another vendor's website D. Attempt to log on to another vendor's website from Ann's laptop E. Ask Ann about the notification and review the installed programs F. Reinstall the browser, reboot the laptop, and check the vendor's website again
C. Check all browser cached files on Ann's laptop and log on to another vendor's website E. Ask Ann about the notification and review the installed programs
Ann, an employee at a company, calls the help disk to report issues logging on to a vendor's website. Joe, the technician, is able to log in successfully with his credentials before going to Ann's office. However, when he attempts to log in from Ann's office, Joe experiences the same issue. Ann asks Joe questions about the new software installed on the laptop from the pop-up notification. Which of the following are the NEXT steps Joe should take to resolve the issue? (Select two.) A. Ask Ann for her credentials to verify and log on to the vendor's website from Ann's laptop B. Verify Ann's laptop has the correct browser settings C. Check all browser cached files on Ann's laptop and log on to another vendor's website D. Attempt to log on to another vendor's website from Ann's laptop E. Ask Ann about the notification and review the installed programs F. Reinstall the browser, reboot the laptop, and check the vendor's website again
C. Check all browser cached files on Ann's laptop and log on to another vendor's website E. Ask Ann about the notification and review the installed programs
Joe, a user, sets up an IMAP connection on his smartphone to connect to webmail. Joe is able to view email, but he receives an error message when trying to send a message. When viewing the mail client's configuration, Joe sees a valid SMTP server and port. Which of the following should Joe check NEXT to resolve the issue? A. Configure the email account as a POP3 connection B. Ensure the SSL/TLS option is being used C. Check that the account password is still valid D. Make sure the smartphone is not in airplane mode
C. Check that the account password is still valid
A technician is notified of an inkjet printer not printing properly. The user's computer has the printer software loaded and is not displaying any errors. A test print was performed, with one of the colors not printing properly. Which of the following would the technician typically perform FIRST to resolve the issue? A. Replace cartridges B. Run a cleaning page C. Clean heads D. Clean fuser assembly
C. Clean heads
A user's smartphone runs very slow at the end of the day. When the user restarts the phone in the morning, it runs at its normal speed. Which of the following should be done throughout the day to BEST resolve this issue? A. Reset to the smartphone to factory default. B. Uninstall any unused apps. C. Close all running apps. D. Charge the smartphone.
C. Close all running apps.
Which of the following is the BEST option to prevent data breaches on lost mobile devices? A. Install a locator application on the mobile device so that it can be traced. B. Apply a restriction to lock the device after a certain number of failed login attempts. C. Configure the device to remote wipe as soon as it is reported lost. D. Utilize the fingerprint scanner and passcode for multifactor authentication.
C. Configure the device to remote wipe as soon as it is reported lost.
Which of the following is the FASTEST way for a user to synchronize data between an iPhone and a work PC? A. Transfer data via WiFi Direct to the user's laptop. B. Use Bluetooth to share data from the phone. C. Connect the iPhone's USB cable and use iTunes. D. Copy the data from the phone to a MicroSD card.
C. Connect the iPhone's USB cable and use iTunes.
A technician is troubleshooting what appears to be a RAM issue on a PC. Which of the following symptoms would indicate if this is a RAM issue? A. POST code beeps B. Distended capacitors C. Continuous reboots D. Wrong BIOS time
C. Continuous reboots
A technician sets up a new printer on the network, allowing it to obtain an IP address. The technician records the IP address and sets up users to print using the information. The following Monday after powering on the printer, users report they can no longer print. After verifying users can access other network shares, the technician prints a configuration page and sees the IP address has changed. Which of the following is the BEST method for the technician to ensure this will not happen again? A. Set up MAC filtering on the switch to ensure the printer gets the same IP. B. Set up the users to print using the newly assigned IP address. C. Create an IP reservation for the printer on the DHCP server. D. Statically assign the current IP address to the printer.
C. Create an IP reservation for the printer on the DHCP server.
A customer wants to connect a laptop to a mobile device's Internet for use in situations where there is no Internet connectivity. Which of the following technologies would the technician recommend to the customer? A. IR B. NFC C. Hotspot D. Lightning
C. Hotspot
A technician is notified that a laptop is not booting. It is discovered that there are no system lights, sounds, or display when the power button is pressed. Which of the following should the technician attempt FIRST in the troubleshooting process? A. Connect an external monitor into the laptop to determine if the LCD has failed. B. Boot the system from either a boot CD or other removable media type. C. Disconnect the AC and battery power and hold the power button for several seconds. D. Remove any hard drives or optical drives, RAM, and any wireless cards or USB devices from the laptop.
C. Disconnect the AC and battery power and hold the power button for several seconds.
Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairing a PC? A. Put on an ESD strap. B. Place components on an ESD mat C. Disconnect the power before servicing the PC D. Place the PC on a grounded work bench
C. Disconnect the power before servicing the PC
A user wants to connect a laptop to the office LAN, charge the battery, and have a dual screen setup. Which of the following would BEST solve this user's requirements? A. Digitizer B. Thunderbolt C. Docking station D. Desktop mode
C. Docking station
A user wants to print a large job on both the front and back sides of the paper. Which of the following settings should the technician advise the user to change in the printer settings? A. Collate B. Orientation C. Duplex D. Transparency
C. Duplex
Which of the following laser printer components will flip the paper to allow for printing on both sides? A. Paper registration assembly B. Paper pickup assembly C. Duplex assembly D. Image transfer belt
C. Duplex assembly
A technician is attempting to manually migrate a user's profile from one Windows PC to another. Files in the user's My Documents folder cannot be copied. Some files in question have green letters in the filenames. Which of the following file systems is causing this to occur? A. exFAT B. COMPRESSED C. EFS D. NTFS
C. EFS
A technician wants to simplify users' wireless configuration in a new remote office. Which of the following must be configured on the access point to allow wireless clients to automatically negotiate secure authentication with the SOHO access point? A. Enable QoS B. Enable SSID Broadcast C. Enable WPS D. Enable MAC filtering
C. Enable WPS
A manager requests remote access to a server after hours and on weekends to check data. The manager insists on using the server. Before granting the access, which of the following is the MOST important step a technician can take to protect against possible infection? A. Create a policy to remove Internet access from the server during off hours B. Set the local antivirus software on the server to update and scan daily C. Ensure the server is patched with the latest security updates D. Educate the manager on safe Internet browsing practices
C. Ensure the server is patched with the latest security updates
A technician finds an external hard drive with the markings "IEEE 1394" on it. Which of the following cable types would be needed to view the contents of this drive? A. Ethernet B. eSATA C. FireWire D. MicroUSB
C. FireWire
A technician needs to edit a protected .dll file but cannot find the file in the System32 directory. Which of the following Control Panel utilities should the technician use? A. System B. Display C. Folder Options D. Indexing Options
C. Folder Options
Which of the following 802.11 standards has a MAXIMUM bandwidth throughput of 54Mbps and uses 2.4GHz frequency? A. A B. B C. G D. N
C. G
A server administrator set up a VM to be used in a lab setting. A technician is setting up thin-client computers to access this VM. Which of the following tasks are required to complete the project? (Choose three.) A. Connect the device to a printer. B. Install the operating system. C. Install a USB keyboard and mouse. D. Connect the device to the network. E. Install the latest system updates. F. Install the latest device drivers. G. Connect the device to a monitor. H. Install the necessary applications.
C. Install a USB keyboard and mouse. D. Connect the device to the network. G. Connect the device to a monitor.
A user recently purchased a video card for gaming purposes. The user installed the appropriate drivers and validated they work using vendor-supplied test tools. However, while gaming, the speed of the case fans increases, the entire system locks up, and the user must hard boot to restart the computer. Which of the following is the MOST likely cause of this issue? A. Unsupported operating system B. Unacceptable CPU type and speed C. Insufficient airflow and cooling D. Inadequate video RAM amount
C. Insufficient airflow and cooling
A technician just finished replacing a laptop screen, and upon first boot notices that the screen provides a very faint but darkened image which cannot be adjusted. Which of the following was MOST likely left unplugged after replacement? A. CMOS Battery B. Mini-PCI Card C. Inverter D. DC Cord
C. Inverter
There are two options for sharing printers on a network: Windows print server or hardware print server. What does a print server do? A. It is used to store data remotely, rather than locally, and in a central location to share with other users. B. It allows network users to have complete control over the print driver to suit their individual needs as the jobs spool locally. C. It accepts print jobs from computers and sends the jobs to the appropriate network printers. D. It requires each node to provide authentication credentials before being given authorized access to network-based applications and services.
C. It accepts print jobs from computers and sends the jobs to the appropriate network printers.
To guarantee high-quality bandwidth and high-quality network transmissions for applications that require it, you enable quality of service (QoS) Packet Scheduler on every workstation. What does QoS do for applications that require it? A. It ensures that the transmissions are clean and error free. B. It prevents Ethernet collisions so that your data transmission is faster. C. It guarantees a portion of total bandwidth specifically to those applications that use it. D. It limits what a user can do on the network by disabling listed apps.
C. It guarantees a portion of total bandwidth specifically to those applications that use it.
What is the function of an Intrusion Prevention System (IPS)? A. It is to monitor a network or system for malicious activities and report on the activity. B. It is to check the validity of users or tokens prior to allowing access to the network. C. It is to prevent an attack by restarting a router if traffic spikes overall or for a given protocol. D. It is to allow or block content based on users and/or groups.
C. It is to prevent an attack by restarting a router if traffic spikes overall or for a given protocol.
A laptop is connected to a conference room projector in extended display mode. The desktop icons appear normal on the laptop, but are disproportionate and illegible on the projector screen. Which of the following should the technician check? A. Video resolution B. HDMI connection C. Keystone D. Focus
C. Keystone
An office has a network that has all computers connected to two switches. The switches are connected with a fiber cable. The computers and switches are all located in the same building. Which of the following network types does this describe? A. WAN B. PAN C. LAN D. MAN
C. LAN
LTE (Long Term Evolution) is a wireless broadband technology for communication of high speed data for mobile phones. What is the main difference between GSM (Global System for Mobile) and CDMA (Code-Division Multiple Access) and LTE? A. LTE (Long Term Evolution) was developed for 2G connectivity. B. LTE (Long Term Evolution) is used for voice and texts only. C. LTE (Long Term Evolution) phones need SIM (Subscriber Identity Module) cards. D. LTE (Long Term Evolution) phones do not need SIM (Subscriber Identity Module) cards.
C. LTE (Long Term Evolution) phones need SIM (Subscriber Identity Module) cards.
A technician is recycling PCs to be reused by a middle school. Which of the following methods is MOST appropriate for ensuring data has been removed from the PCs? A. Standard formatting B. HD drilling C. Low-level formatting D. HD partitioning
C. Low-level formatting
A turnstile is an example of which of the following forms of physical security? A. Entry control roster B. Biometrics C. Mantrap D. Cipher lock
C. Mantrap
A company is concerned about users tailgating into restricted areas. In order to prevent unauthorized users from following others, which of the following should be implemented? A. Biometric locks B. CCTV C. Mantraps D. Badge readers
C. Mantraps
Which of the following translates digital signals into analog for transmission over phone lines? A. SAN B. VoIP C. Modem D. Bridge
C. Modem
A networked PC has started to display adware pop-ups when the user opens the browser. Which of the following best practices should the technician employ FIRST when responding to the problem? A. Disable System Restore B. Schedule scans and run updates in safe mode C. Quarantine the system D. Create a System Restore point
C. Quarantine the system
Ann, a user, is attempting to log in to her email service from a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid. Ann then decides to reset her email password, but after the reset, the new credentials still do not work in the third-party email client. Which of the following settings or features is responsible for the problems Ann is experiencing? A. Full device encryption B. Account lock C. Multifactor authentication D. Strong password requirements
C. Multifactor authentication
A technician is configuring a high-performance workstation. The technician needs to choose storage for the boot drive with the highest performance possible. Which of the following drive types BEST meets this requirement? A. MicroSD B. 15K rpm C. NVMe D. USB flash
C. NVMe
A technician is upgrading a user's smartphone and wants to move all of the applications and contact information quickly to the new device. Which of the following connection types would work BEST to do this? A. NFC B. IR C. OTG D. Bluetooth
C. OTG
A user wants to configure a smartphone to save all attachments from an Outlook.com email to a cloud-based service. Which of the following would be BEST to use to accomplish this? A. Google Drive B. iCloud C. One Drive D. FTP
C. One Drive
An administrator is in a Remote Assistance session, sharing a user's desktop. While trying to map a shared network drive for the user, an "access denied" error is encountered while using the user's credentials. Which of the following should be the administrator's NEXT step? A. Ensure the user's account is not locked out B. Use the fully qualified domain name of the share C. Open the location with administrator privileges D. Try mapping with a different drive letter
C. Open the location with administrator privileges
An administrator must upgrade multiple workstations with a new image being deployed using Windows Deployment Services. Which of the following client-side boot methods initiates the deployment of the new image? A. USB flash drive B. CD-ROM C. PXE D. GRUB
C. PXE
A user has requested a device that could be used for web-conferences while away from work. The device will mainly be used for emailing, document reviewing, and phone calls. Which of the following mobile devices would a technician MOST likely recommend? A. Tablet B. Smart camera C. Phablet D. Web camera
C. Phablet
Ann, a user, wants to host a gaming server on her SOHO network. Which of the following features on the SOHO router would need to be configured? A. Channels B. DHCP C. Port forwarding D. Firmware
C. Port forwarding
A service call was opened for a thermal printer that has poor print quality. Which of the following should the technician do FIRST? A. Replace the print head with OEM replacement. B. Use a cotton swab and alcohol to clean the print head. C. Use the printer manufacturer's cleaning kit to clean the print head. D. Use an industry approved cleaning kit to clean the print rollers. E. Use the printer manufacturer's cleaning kit to clean the print rollers.
C. Use the printer manufacturer's cleaning kit to clean the print head.
After receiving a call from an executive, a technician walks into a meeting room to find that the projector is not showing the screen of the executive's laptop. The projector shows a message that reads "No video signal". Which of the following is the FIRST thing that the technician should do? A. Adjust the laptop's screen brightness B. Replace the projector's bulb C. Verify the VGA cable is connected D. Ensure secondary display is enabled
C. Verify the VGA cable is connected
A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately. With which of the following types of infections are the PCs MOST likely infected? (Choose two.) A. Spyware B. Zombies C. Virus D. Ransomware E. Worm F. Botnet
C. Virus E. Worm
A machine receives an IP address starting with 169.254.x.x when which of the following occurs? A. When the machine is using IPv6 B. When the next IP range begins with 169.253 C. When the DHCP server does not respond D. When the operating system is Unix or Linux
C. When the DHCP server does not respond
A technician is installing the latest OS on a user's system. The user wants all of the settings and file to remain intact during the installation. Which of the following upgrade methods should the technician use? A. network installation B. clean install C. in-place upgrade D. image deployment
C. in-place upgrade
A customer has recently installed several applications on a Windows 10 workstation and is now experiencing slow system performance and spontaneous restarts. After removing some of the recently installed applications, the issue persists. Which of the following tools could the technician use to troubleshoot the problem while preventing data loss? A. Factory restore B. SecureBoot C. msconfig D. diskpart
C. msconfig
The loud clicking noise coming from a faulty hard drive is MOST likely created by: A. the coil reversing polarity in an endless loop. B. one or more bad spindle motor bearings. C. repeated motion of the read/write head armature parallel to the platter. D. the solid state read/write head scratching the platter surface.
C. repeated motion of the read/write head armature parallel to the platter.
You receive a trouble ticket from a user that the network seems to be running slow. You have verified the device side and found no problems and the Ethernet cable is properly connected. What tool would you use next to test the connection? ping Tone generator/probe Multimeter Cable tester
Cable tester
When troubleshooting connectivity issues for a user's computer, which of the following tools can help establish if there is a physical problem with the Ethernet cable or port? (Select all that apply.) Cable tester Loopback plug Punch-down tool Cable stripper
Cable tester Loopback plug
A user is attempting to create digital art, but it does not appear clean. To solve this, the display should be ______ to scanning devices.
Calibrated
The ________ Windows utility checks the integrity of disks and can repair any problems detected.
Check Disk
___________ is a phase of the installation of an operating system that checks the core components of the computer are sufficient to run the OS and that peripheral devices have drivers suitable for use with the OS.
Check compatibility
You recently installed a new video card on a desktop computer. After editing videos on the computer, you receive a Windows Blue Screen. Which approach is a valid troubleshooting step? Check for overheating. Replace the video card. Increase the Random Access Memory (RAM). Power down the computer.
Check for overheating.
A user tells you that they cannot connect to some network resource while others are readily accessible and no one else has the same problem. What do you check in order to investigate this problem? Check the user's Active Directory and shared resource permissions. Check the user's network card activity and connectivity. Check the user's Internet Protocol (IP) address settings for the primary network adapter for accuracy. Check the user's connection at the switch to be sure it has end-to-end connectivity.
Check the user's Active Directory and shared resource permissions.
Chrome OS
Chrome OS (Operating System) is a lightweight operating system developed by Google. It is commonly used on Chromebook laptops; however, Chrome OS powered desktops are available as well. Chrome OS is based on Chromium which is derived from Linux.
Chrome OS
Chrome OS is derived from Linux, via an open source OS called Chromium. Chrome OS itself is proprietary. Chrome OS is developed by Google to run on specific laptop (chromebooks) and PC (chromeboxes) hardware.
adapter card
Circuit board providing additional functionality to the computer system (video, sound, networking, modem, and so on). An adapter card fits a slot on the PC's expansion bus and often provides ports through slots cut into the back of the PC case. Different cards are designed for different slots (PCI or PCIe).
A user's laptop is shutting down unexpectedly. The technician discovers the shutdowns only happen when the laptop is moved from one room to another. The technician reseated the hard drive, memory, battery, and LCD cable, but the laptop continues to shut down. Which of the following is the MOST probable cause of the issue? A. Residual energy on the motherboard B. System overheating C. Distended capacitors D. Loose battery connection E. CMOS battery failure
D. Loose battery connection
A user, Ann, receives a phone call from the company's mail administrator who indicates her email account has been disabled due to high volumes of emails being sent in a very short period of time. Which of the following types of attack has the user experienced? A. Virus infection B. Man-in-the-middle attack C. Phishing attack D. Malware infection
D. Malware infection
Which of the following devices is used to convert initially audible signals into digital signals to provide communication between two endpoints? A. Bridge B. Fax machine C. Repeater D. Modem
D. Modem
What does 5G add to the cellular communications networks that 3G or 4G did not? A. Analog technology and simple telephony service without data B. Up to 250Kbps speed and support for text and data services C. Long Term Evolution (LTE) and a download speed up to 300Mbps (megabits per second) D. More bandwidth, lower latency, and ability to connect more devices
D. More bandwidth, lower latency, and ability to connect more devices
A user has downloaded an image file and needs to install an application from the image. When trying to execute or open the file, an error is displayed. Which of the following should the user perform? A. Download a different file from the website B. Rename the extension of the file to a known extension C. Verify the MD5 hash of the downloaded file D. Mount the file as an emulated DVD
D. Mount the file as an emulated DVD
A technician has identified malware on a user's system. Which of the following should the technician do NEXT according to malware removal best practices? A. Enable System Restore and create a restore point so no data is lost B. Educate the user about how to avoid malware in the future C. Update the antivirus software and run a full system scan D. Move the infected system to a lab with no network connectivity
D. Move the infected system to a lab with no network connectivity
A user reports that the mouse is not working properly. The technician notices on the user's workstation that the mouse cursor spins for several minutes before the technician can use the mouse. Which of the following is the cause of the issue? A. Failed Operating System B. Faulty mouse C. Faulty CPU D. Not enough memory
D. Not enough memory
An end user receives an unsolicited and unencrypted email containing a co-workers birth date and social security number. The end user should immediately contact the IT department and report a violation of which of the following policies? A. DRM B. EULA C. IRP D. PII
D. PII
A desktop technician is attempting to upgrade several machines to Windows 10. After releasing there is only one disc for the installation, the technician decides to upgrade over the network. Which of the following boot methods initiates such an upgrade? A. SSD B. Optical drive C. Flash drive D. PXE
D. PXE
A technician was called to check an unexpected clicking noise on a desktop that has become more frequent every time a video editing application is loaded. The system fans have been replaced, but the clicking noise remains. Diagnostics have been run on the video card. Which of the following should me the technician do FIRST? A. Replace the hard drive. B. Replace the video card. C. Do a System Restore. D. Perform a full data backup. E. Scan the system for viruses.
D. Perform a full data backup.
A technician was called to check an unexpected clicking noise on a desktop that has become more frequent every time a video editing application is loaded. The system fans have been replaced, but the clicking noise remains. Diagnostics have been run on the video card. Which of the following should the technician do FIRST? A. Replace the hard drive. B. Replace the video card. C. Do a System Restore. D. Perform a full data backup. E. Scan the system for viruses.
D. Perform a full data backup.
A customer is using a cloud storage program that maintains a copy of local files on the cloud storage servers. The WiFi network is not very fast, and the customer uses bandwidth-intensive video streaming all day. Which of the following parameters should be adjusted to keep the cloud storage program from using too much bandwidth? A. Synchronization settings B. Wireless settings C. Video streaming settings D. QoS settings
D. QoS settings
A technician is talking to end users about the specifications for an upgraded application server. The users of the application report that there cannot be any unscheduled downtime or data loss. Additionally, they would like the performance of the application to improve over the previous server in any way possible. The previous server running RAID 5. Which of the following RAID solutions should be implemented in this scenario? A. RAID 0 B. RAID 2 C. RAID 6 D. RAID 10
D. RAID 10
A technician is installing a private PC in a public workspace. Which of the following password practices should the technician implement on the PC to secure network access? A. Remove the guest account from the administrators group B. Disable single sign-on C. Issue a default strong password for all users D. Require authentication on wake-up
D. Require authentication on wake-up
A user is having issues with a Windows computer. Upon loading the operating system, several messages appear referring to a DLL file that cannot be found. Which of the following would be the BEST course of action for the technician to perform NEXT? A. Copy the DLL file from a working PC and use the regsvr32 command to load the file B. Run the Windows Update utility to manually reinstall the DLL file C. Run the defrag utility to correct any fragmentation that may have damaged the file D. Research the DLL file to identify the application it corresponds to before continuing
D. Research the DLL file to identify the application it corresponds to before continuing
A user is experiencing issues synchronizing a smartphone. The user is able to connect to individual services, but each requires a different password. Which of the following needs to be configured to allow the user to access web services securely with a unique password? A. SIM B. SMB C. SSL D. SSO
D. SSO
A technician manually configured the wireless connection on the Chief Information Officer's (CIO's) new laptop so it can communicate with the network at the office. The CIO now is having trouble connecting to a guest WiFi hotspot. While the device has a gateway address and says it is connected, the CIO cannot access company email. Which of the following would BEST resolve the issue? A. Move the CIO's laptop closer to the access point to obtain a better RF signal. B. Restart the wireless connection to obtain a self-assigned APIPA address. C. Assign a different IP address to the device in conflict with the CIO's laptop. D. Set the network connection to use DHCP instead of a static address. E. Change the network's SSID to a mobile hotspot to access company email.
D. Set the network connection to use DHCP instead of a static address.
Joe, a systems administrator, is setting up a risk management plan for the IT department. Part of the plan is to take daily backups of all servers. The server backups will be saved locally to NAS. Which of the following can Joe do to ensure the backups will work if needed? A. Frequently restore the servers from backup files and test them B. Configure the backups to restore to virtual machines for quick recovery C. Set up scripts that automatically rerun failed backup jobs D. Set up alerts to let administrators know when backups fail E. Store copies of the backups off-side in a secure datacenter
D. Set up alerts to let administrators know when backups fail
Which of the following threats uses personalized information in an attempt at obtaining information? A. Whaling B. Impersonation C. Spoofing D. Spear phishing
D. Spear phishing
A small office with five computers on a workgroup that are directly connected to a switch is an example of which of the following network topologies? A. Ring B. Bus C. Mesh D. Star
D. Star
Which of the following devices uses MAC tables to allow multiple computers to access a single network connection? A. Hub B. Firewall C. VoIP D. Switch
D. Switch
A client, Ann, is having issues with a PC shutting down. There are no error messages displayed before the system powers off. Ann reports that this started after she installed and began using CAD software. The hard drive, video card, and RAM all meet the software requirements and have passed diagnostics. Which of the following is MOST likely the issue? A. The video card has 3D acceleration disabled. B. The hard drive is IDE instead of SATA. C. The hard drive needs to be repartitioned. D. The PSU is underpowered for the system.
D. The PSU is underpowered for the system.
Which of the following resolves host names to Internet Protocol (IP) addresses? IPv4 APIPA DHCP DNS
DNS
A network administrator is troubleshooting a notebook that is not loading the local Windows 10 operating system. All the computers inside the company are installed using UEFI mode selected. The message on the screen shows a failed attempt to connect to a PXE server. When requested, the end user reported trying to improve the computer's speed by changing some BIOS configurations randomly. Which of the following should the network administrator check FIRST inside BIOS? A. C-states should be configured to 2 B. Secure Boot should be enabled C. Wake-on-LAN should be unchecked D. The PXE server address should be set
D. The PXE server address should be set
A Windows machine has an Internet Protocol (IP) address in the range of 169.254.x.y. What does this mean? A. The Windows machine obtained its IP address automatically. B. There is not enough information to answer the question. C. An alternative IP address was configured for the Windows machine. D. The Windows machine is using an Automatic Private IP Addressing (APIPA) address.
D. The Windows machine is using an Automatic Private IP Addressing (APIPA) address.
A customer has two 8GB sticks of 2400-speed DDR4 installed in slots 1 and 2 of a computer and wants to add more RAM. The customer purchases two additional 4GB sticks of 3200-speed DDR4 and installs them in slots 3 and 4. While installing the RAM into the board, the user notices the board has "quad channel" etched near the RAM slots. Which of the following can be said about the user's channel configuration after upgrading the RAM? A. The computer is utilizing one channel. B. The computer is utilizing two channels. C. The computer is utilizing three channels. D. The computer is utilizing four channels.
D. The computer is utilizing four channels.
If you notice that a computer has an IP address of 169.254.0.11, what can you conclude? A. The computer has been configured with static IP addressing. B. The computer is acting as a proxy server for clients on the same subnet. C. The computer is part of a Class C network. D. The computer was unable to locate an available Dynamic Host Configuration Protocol (DHCP) server.
D. The computer was unable to locate an available Dynamic Host Configuration Protocol (DHCP) server.
A technician replaces a failed hard drive with a brand new one. The technician boots from a PE CD and attempts to install a custom OS build deployed from the network. The hard drive is visible in the system's BIOS. However, once in the preinstallation environment, the drive is not recognized in the imaging process and the process fails. Which of the following is MOST likely the cause of failure? A. The boot CD has failed and needs to be replaced. B. The hard drive needs to have its configuration manually defined in the BIOS. C. The PC's power supply is not providing enough power to the new hard drive. D. The hard drive has not been partitioned correctly.
D. The hard drive has not been partitioned correctly.
Ann, a user, reports her docked mobile workstation will periodically lose her network share drive and lose video to the second monitor. Which of the following is MOST likely the cause of this anomaly? A. The workstation battery needs to be replaced. B. The NIC is functioning intermittently. C. Failed driver updates for the workstation's devices. D. The surge protector lost AC power.
D. The surge protector lost AC power.
In what way does Dynamic Network Address Translation (DNAT) differ from static NAT? A. The internal IP addressing scheme is made visible to external hosts. B. It can be implemented as software on a system or as hardware in a dedicated device. C. The router can translate between two addressing schemes. D. There is not a one-to-one ratio of internal to external addresses.
D. There is not a one-to-one ratio of internal to external addresses.
You have been tasked with inventorying all networked devices and find several Windows XP computers, why is this a concern? A. These systems cannot be relocated. B. These systems will not run the new applications being deployed across the network. C. These systems are limited as they are designed to perform specific functions. D. These are legacy systems that present a risk to corporate infrastructure.
D. These are legacy systems that present a risk to corporate infrastructure.
In an enterprise network, a Demilitarized Zone (DMZ) is a means of establishing a more secure configuration. How do many SOHOs (Small Office Home Offices) use the term DMZ? A. To describe a host that is configured to forward a port from one network node to another B. To identify the devices that are not authorized to access the network C. To define the specific clients that will be denied access to the network D. To mean "not protected by the firewall" as the host is fully accessible to other Internet hosts
D. To mean "not protected by the firewall" as the host is fully accessible to other Internet hosts
You are building a Small Office Home Office (SOHO) network for a new upstart gaming business. You are placing the gaming server in the Demilitarized Zone (DMZ). Why? A. To hide network IP addresses from external users by making the computer network invisible B. To describe a host that is configured to forward a port from one network node to another C. To identify attempts to access a secure domain and prevent unauthenticated access D. To protect the server while still making it accessible to other users through the Internet
D. To protect the server while still making it accessible to other users through the Internet
The technician is troubleshooting a connection issue between the switch and the wall jack. The user is plugged into the jack; however, there is no connection. The technician goes into the switch room to see if the cable is plugged into the switch, but none of the cables are labeled. Which of the following tools would the technician MOST likely use to find this cable? A. WiFi analyzer B. Loopback plug C. Multimeter D. Tone generator
D. Tone generator
Transport Control Protocol (TCP) and User Datagram Protocol (UDP) are the most widely used protocols that are built on the top of Internet Protocol (IP). Both protocols are used to send bits of data over the Internet, which is also known as 'packets'. How is UDP different from TCP? A. UDP is connection oriented, slower, a heavy weight connection, and ensures packets are received. B. UDP is connection oriented, faster, a heavy weight connection, and does not ensure packets are received. C. UDP is connectionless, slower, a lightweight transport layer, and ensures packets are received. D. UDP is connectionless, faster, a lightweight transport layer, and does not ensure packets are received.
D. UDP is connectionless, faster, a lightweight transport layer, and does not ensure packets are received.
A technician arrives on site to find that two users who have the same model on Android smartphone are having the same issue with a specific application. Whenever they attempt to launch the application, it fails and gives an error message. Which of the following should the technician do FIRST? A. Reinstall the application B. Roll back the application to the earlier version C. Clear the application cache D. Update the OS of the smartphones
D. Update the OS of the smartphones
A user has reported that the company notebook is performing some random mouse actions requiring the user to make a lot of typing corrections. How can the technician solve the issue for the user? A. Adjust the mouse settings so the mouse moves slower B. Reverse the buttons on the mouse pad C. Adjust the mouse settings so the mouse moves faster D. Use the function keys to disable the mouse pad
D. Use the function keys to disable the mouse pad
A video projector shows the image from a laptop, but everything is colored blue. Which of the following is the MOST likely the cause? A. Dead pixels B. Video resolution C. Failing lamp D. VGA connection
D. VGA connection
A customer asks a technician to upgrade a desktop computer to support the DVI-D interface. Which of the following PC expansion cards would the technician upgrade? A. FireWire card B. Network card C. Thunderbolt card D. Video card E. Sound card
D. Video card
A technician has been tasked with designing a new printing solution for a small team. They want to be able to use a central printer from their shared workspace as well as the conference room next door. Which of the following connection methods would BEST suit their need? A. USB B. Infrared (IR) C. Bluetooth D. Wireless
D. Wireless
You installed a new PCIe graphics card in your desktop computer. After reinstalling everything, the new card does not work when applying power to the machine. If you assume the card is not defective, what might you have forgotten? A. You forgot to connect the DVI cable to the video card. B. You forgot to connect the HDMI cable to the video card. C. You installed the video card in the wrong port on the motherboard. D. You forgot to install the secondary PCIe power connector to the video card.
D. You forgot to install the secondary PCIe power connector to the video card.
A PC technician has been asked to verify certain Group Policies applied on a workstation. Which of the following commands should be run on the workstation? A. extract B. tasklist C. gpupdate D. gpresult E. chkdsk
D. gpresult
A technician has purchased a new surge protector to protect equipment in the production environment. The surge protector's features safeguard the connected equipment by directing surges to the: A. path of shortest conductance. B. path of lowest inductance. C. path of highest voltage. D. path of least resistance.
D. path of least resistance.
The contrast ratio for an LCD monitor is BEST defined as the ratio between: A. display resolution and brightness. B. power consumption and output intensity. C. power savings of a comparable CRT monitor and the LCD. D. the darkest and lightest displayed output.
D. the darkest and lightest displayed output.
You need to configure a SOHO (Small Office Home Office) network to provide IP Addresses to devices on the network. Which feature should you enable? DNS SSID MAC Filtering DHCP
DHCP
You need to configure a SOHO (Small Office Home Office) network to provide Internet Protocol (IP) Addresses to devices on the network. Which feature should be enabled? MAC (Media Access Control) Filtering SSID (Service Set Identifier) DHCP (Dynamic Host Configuration Protocol) DNS (Domain Name System)
DHCP (Dynamic Host Configuration Protocol)
A user is reporting that the text on their screen is too small. To solve this, you can increase the _____.
DPI (Dots Per Inch)
What broadband Internet access is delivered through your phone land line using either phone lines or fiber-optic cables for transmission? DSL Satellite Cable Cellular
DSL
What is it referred to in Performance Monitor where you can create log files? Counter Logs Trace Logs Data Collector Sets Objects
Data Collector Sets
______ control connections to databases set up on the local computer.
Data Sources
_______ control connections to databases set up on the local computer.
Data Sources
What is a system maintenance task that enables you to store copies of critical data for safekeeping? Data restoration Disaster Recovery Plan (DRP) Recovery image Data backup
Data backup
What features does Windows 10 Home support?
Designed for SOHO or Small Business Use
The National Institute of Standards and Technology (NIST) Computer Security Incident Handling Guide special publication SP800-61 identifies several stages in an incident response lifecycle. Which stage is determining whether an incident has taken place and assessing how severe it might be, followed by notification of the incident to stakeholders? Post-incident Activity Preparation Detection and Analysis Containment, Eradication, and Recovery
Detection and Analysis
A user would like to upgrade a Windows 7 PC to Windows 10. There is a specialized expansion card that would need to be supported. Which of the following will be required for the card to work with Windows 10? Device manager Ease of access Device Drivers Compatibility mode
Device Drivers
Which laptop expansion option may add additional features such as a full-size expansion card? Docking station Port replicator USB (Universal Serial Bus) Dongle Physical lock
Docking station
______ is the basic administrative building block in Windows client/server networking. To create a domain, you need one or more Windows servers configured as domain controllers.
Domain
______ are user accounts that are stored in Active Directory on a Windows Server Domain Controller (DC).
Domain Accounts
What is the critical service on most networks that uses Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) for its transport on port 53? Dynamic Host Configuration Protocol (DHCP) HyperText Transfer Protocol (HTTP) Simple Network Management Protocol (SNMP) Domain Name System (DNS)
Domain Name System (DNS)
_______ are one of the user accounts provided by Windows networking. They are stored in the Active Directory (AD) on a Windows Server Domain Controller (DC). These accounts can be accessed from any computer joined to the domain.
Domain accounts
A user has brought their personal laptop to the office. They have been trying to access server files but receive an access denied message. What is the most likely problem? Domain authentication BitLocker Group policy BranchCache
Domain authentication
Impact printer also called Toner Heat-sensitive Paper Piezoelectric Dot Matrix Extruder PDF
Dot Matrix
Which of the following printer types is an impact printer? Inkjet Laser Dot Matrix Thermal
Dot Matrix
Ann, a user, brings her laptop in and reports that it is no longer charging. Additionally, the laptop can no longer stay powered on even when plugged in. Which of the following hardware components is MOST likely in need of replacement? A. Hard drive B. Memory modules C. System fan D. Wireless card E. System board
E. System board
This motherboard is 12 x 13 inches
EATX
You have a new Windows 10 laptop that you use for business. Because the files are sensitive, you wish to use encryption. You want to encrypt only files in certain folders and not the entire drive. What solution do you choose? BitLocker BranchCache Biometric device EFS
EFS
_____ is a second-generation virtualization extension created by Intel that uses SLAT (Second Level Address Translation) technology. It improves the MMU (Memory Management Unit) which handles shadow page tables that translates virtual memory to physical memory.
EPT
3D Printer uses Toner Heat-sensitive Paper Piezoelectric Dot Matrix Extruder PDF
Extruder
Which of the following refers to capturing and reading data packets as they move over the network? MAC (Media Access Control) Flooding ARP (Address Resolution Protocol) Poisoning Man-in-the-Middle (MITM) Eavesdropping
Eavesdropping
Windows 10 ______ are variants of the Enterprise and Pro editions designed for licensing by schools and colleges.
Education/Pro Education
Which of the following is NOT a common layer where network resources fail? Application/OS Name resolution Security Email
A technician is configuring wireless for a home office. The customer wants to prevent others from accessing the wireless network. The customer has a small number of devices on the network and does not want to have to remember a complicated password. Which of the following should the technician recommend? Turn on content filtering Assign static IP addresses Enable MAC filtering Disable SSID broadcast
Enable MAC filtering
You want to automatically boost the performance of your gaming system. What can you do to your CPU (Central Processing Unit) to achieve this? Increase the L1 Cache. Enable overclocking. Lower clock speed. Enable Hyperthreading.
Enable overclocking.
Your organization wants to deploy Windows Images over the LAN (Local Area Network) to user workstations. What two settings should be configured on the workstation motherboards in order to immediately boot each workstation from the network? (Select all that apply.) Set the Boot Mode to BIOS. Enable primary network adapter with PXE. Set first priority boot device to Network/PXE. Set the Boot Mode to UEFI.
Enable primary network adapter with PXE. Set first priority boot device to Network/PXE.
While working for an IT Consulting firm, you have been tasked with setting up several SOHO (Small Office Home Office) wireless networks. Which of the following will ensure the security of confidential data? Enabling Media Access Control (MAC) filtering Enabling wireless encryption Disabling SSID Broadcast Configuring the lowest broadcast power possible
Enabling wireless encryption
What is the defining characteristic of a Virtual Private Network (VPN)? Unlimited network access Password authentication Encrypted communications Single sign-on authentication
Encrypted communications
Which of the following is an Internet appliance that discovers, manages, and controls devices that request access to the corporate network? DHCP server Authentication server DNS server Endpoint management server
Endpoint management server
ECC
Error correction code (ECC) memory is a type of RAM memory found in workstations and servers. It's valued by professionals and businesses with critical data for its ability to automatically detect and correct memory errors, thus fighting data corruption.
SOHO (Small Office Home Office) networks, often built around a single connectivity appliance, face the challenge of joining up devices where the network equipment and Internet access line are located. What would be an alternative solution if network installation is needed quickly and interference may be an issue? Power over Ethernet (PoE) Data cabling Wireless Ethernet over Power
Ethernet over Power
You are a network technician for a small engineering business. The business owner has asked you to evaluate options for several SOHO (Small Office Home Office) networks to allow employees to work from home. Often the employees' modem is in a different area of the house than their home office. The business has a strict policy that prohibits wireless networks. Which of the following is the most cost-effective choice? Ethernet over Power Access Point Data cabling Power over Ethernet (PoE)
Ethernet over Power
What second generation virtualization extension must you enable on your Intel chip in order to run VMware's hypervisor virtualization technology? Extended Page Table (EPT) Rapid Virtualization Indexing (RVI) Virtualization Technology (VT) AMD-V
Extended Page Table (EPT)
______ virtual switches found in Microsoft's Hyper-V hypervisor are used to establish network communication on the physical network. This is done by binding to the host's NIC (Network Interface Card).
External
_______ is fiber to the local street cabinet and from there uses normal copper cable that the telephone/broadband is currently supplied on. The fiber link is not terminated on the premise equipment.
Fiber to the Cabinet (FTTC)
______ is a fiber optic cable delivery medium that provides last mile telecommunications' Internet access directly to a business from an Internet service provider.
Fiber to the Premises (FTTP)
A ______ system does not support the recovery or security features of New Technology File System (NTFS). The maximum file size is the volume size minus 1 byte. Its only significant feature is that it is compatible with all Microsoft operating systems plus macOS and Linux, and therefore ideal in a multiboot environment or for removable media that must be shared between different operating systems.
File Application Table (FAT) 16
_____ has a 32 bit allocation table. It supports larger volumes than FAT16.
File Application Table (FAT) 32
What service uses port 21? File Transfer Protocol (FTP) Post Office Protocol 3 (POP3) Domain Name System (DNS) HyperText Transfer Protocol (HTTP)
File Transfer Protocol (FTP)
A server is a computer that provides services to others and other systems making requests. Which of these servers allows files to be stored on it and handles requests for files and sends files over the network? Print server Mail server File server Web server
File server
You have an iOS and a hard reset is needed. What physical action(s) will perform this reset?
Hold Sleep + Home Button for 10 Sec.
Windows 10 _____ is designed for domestic consumers and Small Office Home Office (SOHO) business use. The home edition cannot be used to join a Windows domain network.
Home
What Windows 7 editions do not support SMP?
Home Basic Home Premium
______ is a type of OS designed to work on standalone or workgroup Personal Computers (PC) in a home or small office.
Home Client
Which of the following operating system types would work well in a small office environment? Home client Network Operating System Smartphone/Tablet Business client
Home client
an OS designed to work on standalone or workgroup PCs in a home or small office.
Home client
_____ provide a connection point for internal mass storage devices, such as hard drives, optical drives, and tape drives.
Host Bus Adapters (HBAs)
Which type of Hypervisor is VMware Workstation™? Bare metal Type 1 Host-based Intel VT-x
Host-based
You have received a few dozen Windows 10 systems that must be deployed within the next few days. There are several applications that need to be installed on the systems before they are issued to users. What is the fastest way to install these systems? Image deployment Repair installation Unattended installation Clean install
Image deployment
________ is one of the basic social engineering techniques. This classic attack is for an attacker to phone into a department, claim he/she has to adjust something on the user's system remotely, and get the user to reveal his/her password.
Impersonation
filament
In 3D printing, the spool of plastic or other material used to create the three-dimensional object.
terminal window
In Linux, a computer interface for text entry and display, where information is displayed as an array of preselected characters.
_________ is one of the approaches to performing an attended installation by installing on top of an existing version of the OS, retaining applications, user settings, and data files.
In-place upgrade
What includes the practices and procedures that govern how an organization will respond to an incident in progress? Policy Incident Management Accident Acceptable Use Policy (AUP)
Incident Management
What sets out procedures and guidelines for dealing with security incidents? Select all that apply. Incident Response Policy Security Incident Computer Security Incident Response team (CSIRT) Chain of Custody
Incident Response Policy Computer Security Incident Response team (CSIRT)
In the Event Viewer, the ________ event describes successful operations such as a driver or service starting or a document printing.
Information
Which of the following wireless communication standards requires line of sight to operate? Bluetooth RF (radio frequency) Infrared (IR) WiFi
Infrared (IR)
Which of the following is a common cause of intermittent connectivity? DNS IP conflict Interference Spoofing
Interference
When configuring Microsoft Hyper-V as a hypervisor, three types of virtual switches can be created. Which type is used by the virtual machine and the host only? Internal Private External Emulated
Internal
_____ virtual switches found in Microsoft's Hyper-V hypervisor are used to establish network communication between guest virtual machines and the host.
Internal
An ________ bus, connects core components, such as the CPU, memory, and the system controllers.
Internal or Local
Apple uses what type of connector on its mobile devices?
Lightning
loop
Like a branch, a loop deviates from the initial program path to some sort of logic condition. In a loop, the computer repeats the task until a condition is met. Often implemented with For or While statements.
What is the term used by open source products as a "fallback" mechanism for assigning an Internet Protocol (IP) when the Dynamic Host Configuration Protocol (DHCP) unavailable? IPv4 APIPA DNS Link local
Link local
Chrome OS (Operating System) is a proprietary OS developed by Google. It is based on the open-source Chromium OS which is based on what kernel? Linux Ubuntu Java Windows
Linux
To manage updates and software in ______, the package manager needs to be configured with the web address of the software repository that you want to use.
Linux
Which operating system is freely available as both a workstation and server? Google Chrome Windows Mac OS Linux
Linux
The file extension for _______ is .sh. This is the equivalent of a Windows batch file. This is a file that contains a list of commands to be read and executed by the shell.
Linux shell script
You are installing a new operating system from a DVD (Digital Versatile Disc) drive. You have the DVD in the drive. However, every time the system boots it does not boot from the DVD. What step would you NOT take? Press the system's boot menu function key. Load the DVD drive after the power on the PC is on. Change the boot order in the system BIOS. Check the DVD for scratches.
Load the DVD drive after the power on the PC is on.
______ is an account with the same, or in some ways better, privileges as the default Administrator account. A process executed using the ______ account is unrestricted in terms of making changes to the LocalSystem configuration and file system.
LocalSystem
There are several different types of viruses, and they are generally classified by the different ways they can infect the computer. Which type of virus affects Office documents by using the programming code that underpins macro functionality maliciously? Boot sector viruses Firmware viruses Script viruses Macro viruses
Macro viruses
audio subsystem
Made up of a sound card and one or more audio input and output devices.
A user calls to report that images on the screen appear oversized. Which of the following are most likely to cause this issue? (Select all that apply.) Magnifier in use Bad driver Loose cabling Low resolution
Magnifier in use Low resolution
A projector is being set up for a meeting, and the presenter calls you to report that no image is displayed on the screen. When troubleshooting the issue, which of the following actions do you take? (Select all that apply.) Make sure the projector is plugged in and powered on. Check that the cable is connecting the projector and the device. Check the input source. Try the projector with a different input device.
Make sure the projector is plugged in and powered on. Check that the cable is connecting the projector and the device. Check the input source. Try the projector with a different input device.
Within your large corporate environment, there are hundreds of users and you need to restrict data access based on different groupings easily distributing data over the network. Which device would you use? Repeater Bridge Unmanaged switch Managed switch
Managed switch
Within your large corporate environment, there are hundreds of users and you need to restrict data access based on different groupings easily distributing data over the network. Which device would you use? Repeater Managed switch Unmanaged switch Bridge
Managed switch
What makes up the Simple Network Management Protocol (SNMP) used for collecting information from, and configuring, network devices, such as servers, printers, hubs, switches, and routers on an Internet Protocol (IP) network? Management System and agents An agent and management systems Hardware sensors and software A centralized collection of events from multiple sources
Management System and agents
Control Panel
Management interface for configuring Windows settings. In Windows 8 and later, the touch-enabled app PC Settings/Windows Settings is used for many options previously configured via Control Panel.
What is it called when you have two sets of interlocking doors inside a small space, where the first set of doors must close before the second set opens? Tailgating Mantrap Security Guards Multifactor
Mantrap
self-grounding
Manual dissipation of static buildup by touching a grounded object prior to touching any electronic equipment.
Which of the following cloud computing characteristics measures resources through metering on a per use basis? Broad network access Rapid elasticity On-demand self-service Measured service
Measured service
Measured service
Measured service is a term that IT professionals apply to cloud computing. This is a reference to services where the cloud provider measures or monitors the provision of services for various reasons, including billing, effective use of resources, or overall predictive planning.
What router feature would allow you to specify which wireless clients may join your network? Quality of Service (QoS) Network Address Translation (NAT) Media access control (MAC) filtering Port triggering
Media access control (MAC) filtering
PCIe supplies what power?
Motherboard 75W and 75W through power connector
Authentication methods are stronger when they are combined. What authentication method means using two different methods? Authenticator Application Multifactor Authentication Mobile Device Management (MDM) One Time Password (OTP)
Multifactor Authentication
The cable TV is not working in the Director's office. It does seem to be working in other offices. You have verified that the coax cables are all connected. Which tool will you now need to see if there are any issues with the cable? Multimeter Loopback plug BNC coupler Cable Tester
Multimeter
You have been given a support ticket to test a cable that does not seem to be working correctly. Using one of your hardware tools to troubleshoot connectivity issues, you get a reading of infinity. What tool did you use and what does the reading tell you about the cable? Multimeter, the cable has a break Loopback plug, port is valid Tone generator/probe, cable has been located BNC coupler, cables are connected
Multimeter, the cable has a break
Email is a messaging system that can be used to transmit text messages and binary file attachments encoded using ________.
Multipurpose Internet Mail Extensions (MIME)
Which distributed file system protocol allows access to files over a network? NTFS ext4 UDF NFS
NFS
The _______ joins a network by connecting the network adapter to a switch or wireless access point. For proper end user device configuration, the card settings should be configured to match the capabilities of the network appliance.
NIC
Which file system is a proprietary file system developed exclusively for use with Windows? NTFS CDFS FAT32 exFAT
NTFS
Does Windows 10 Home support joining a domain or BrancheCache?
No. Windows 10 Home edition is a non-business edition of Windows. This version of Windows is not capable of joining a Windows domain.
Can you install applications outside the Microsoft store with Windows 10 S edition?
No. Windows 10 S edition is a version of Windows that is streamlined for business simplicity. This version of Windows does not allow for the installation of applications outside of those found in the online Microsoft store.
When selecting, installing, and configuring software applications, which compatibility and security concepts need to be considered? (Select all that apply.) OS Requirements System Requirements Installation and Deployment Options Permissions and Other Security Considerations
OS Requirements System Requirements Installation and Deployment Options Permissions and Other Security Considerations
OneDrive
OneDrive is a Microsoft cloud service for storing and synchronizing files. OneDrive is available as a free service and also as part of an Office 365 subscription.
macOS
Operating system designed by Apple for their range of iMac computers, Mac workstations, and MacBook portables. macOS (previously called OS X) is based on the BSD version of UNIX. macOS is well supported by application vendors, especially in the design industry.
_____ is a technology that is used for text recognition during the scanning process.
Optical Character Recognition (OCR)
NTFS is not case sensitive, but it does have the capability to preserve case for ______ compliance.
POSIX
__________ are created in the reverse lookup zone on a DNS (Domain Naming System) server.
PTR records are known as pointer records
What can Linux use for Patch Management? Backup and Restore fsck ckkdsk Package Management launchd Time Machine Disk Utility rsync cron WSUS Task Scheduler App Store
Package Management
A Fn (Function) key on a laptop is a key that can be used in combination with another key to perform specific functions. Which of the following is not a Fn key function? Display toggle Volume control Screen brightness Power source
Power source
You power on your IBM PC and you hear a continous beep during post. What seems to be the problem? Normal Post - system is OK Power supply, motherboard, or system memory problem Power supply, motherboard, or keyboard problem Display adapter error
Power supply, motherboard, or system memory problem
The file extension for _______ is .ps1. It enables you to perform management and administrative tasks in Windows 7 and later. It is fully integrated with the operating system and supports both remote execution and scripting.
PowerShell
Windows 10 minimum hardware requirements
Processor - 1GHz or faster RAM - 1 GB for 32-bit or 2 GB for 64-bit Hard Drive Space - 16 GB for 32-bit or 20 GB for 64-bit Clean install will require 32 GB or larger Graphics - DirectX 9 or later with WDDM 1.0 driver Display resolution - 800x600 Networking - Wifi or Ethernet adapter
What are the Symptoms or Characteristics of a Viruses? Self-replicating Tracks user activity Obtains high level privileges, hiding from OS Packaged as useful application Replication requires user interaction Self-Contained Often paired with keylogger Infects firmware code Used by attacker to conceal actions Boot Sector, macro, polymorphic
Replication requires user interaction Boot Sector, macro, polymorphic
What policies enforce the use of Access Control List (ACL) and ensure that they are effective? (Select all that apply.) Requiring passwords Replay attack Change default admin user Disable guest account
Requiring passwords Change default admin user Disable guest account
________ include access to files, folders, or printers; ________ refers to the ability to make configuration changes or read/modify a data file.
Resources rights or privileges
If Windows cannot identify a working Internet connection, what is a common solution in a home environment? Flush the DNS. Attempt to ping a remote host. Check the IP configurations. Restart the router.
Restart the router.
You have an iOS and the OS reinstall failed. What iTunes Device Summary option is used to perform a factory reset?
Restore Button
Windows is commercial software, meaning it must be paid for. A condition of installing Windows is accepting the End User License Agreement (EULA). Microsoft requires you to activate Windows when you install it, which helps them to verify that you are not breaking the terms of the license. What license would be used for personal use and may be transferred between computers but may only be installed on one computer at any one time? Retail Original Equipment Manufacturer (OEM) Volume Server
Retail
What is the concept in IT security described as the likelihood and impact (or consequence) of a threat actor exercising a vulnerability? Risk Vulnerability Threat Social Engineering
Risk
_________ is when the adapter starts to move out of range of one access point; it might try to connect to another one with a better signal.
Roaming Aggressiveness
You are working on a Windows PC with multiple hard disks. The system is not booting off the correct disk. You've determined that the hardware boot order is correct. What next step could you take in Windows? Set the boot order. Create the master boot record. Set the active partition. Convert to a dynamic disk.
Set the active partition.
system resources
Settings that enable a device to communicate with the CPU and memory without the device conflicting with other devices.
The ________ is a principal default Windows log file that records events generated during installation.
Setup
The _______ snap-in lets you view all the shares configured on the local machine, as well as any current user sessions and open files.
Shared Folders
You are installing a new printer for a user. Which printer connection will run the print spooler on a remote print server? USB (Universal Serial Bus) IP (Internet Protocol) address Shared printer Wi-Fi
Shared printer
_________ is a user type to give someone permission to access your shared files or to share your screen. The user cannot log in to the computer and cannot make changes to any settings on the computer.
Sharing only
Which of the following refer to stealing a password or PIN, or other secure information, by watching the user type it? Tailgating Impersonation Shoulder Surfing Pharming
Shoulder Surfing
______ refers to stealing a password or PIN, or other secure information, by watching the user type it. Despite the name, the attacker may not have to be near the target. The attacker could use high-powered binoculars or CCTV to directly observe the target from a remote location.
Shoulder surfing
What mail server uses Transmission Control Protocol (TCP) port 25 by default? MX (Mail Exchanger) Simple Mail TransferProtocol (SMTP) Internet Message Access Protocol (IMAP) Post Office Protocol (POP3)
Simple Mail TransferProtocol (SMTP)
toner
Specially formulated compound to impart dye to paper through an electrographic process (used by laser printers and photocopiers). The key properties of toner are the colorant (dye), ability to fuse (wax or plastic), and ability to hold a charge. There are three main types of toner, distinguished by the mechanism of applying the toner to the developer roller: dual component (where the toner is mixed with a separate magnetic developer), mono-component (where the toner itself is magnetic), and non-magnetic mono-component (where the toner is transferred using static properties).
At what speed and on what radio frequency does the 802.11g operate? Speeds up to 11 Mbps in the 2.4 GHz band Speeds up to 600 Mbps in the 5 GHz band Speeds up to 54 Mbps in the 2.4 GHz band Speeds up to 1.7 Gbps in the 5 GHz band
Speeds up to 54 Mbps in the 2.4 GHz band
Which one of the user accounts in macOS can change their own settings, but not those of other users? Administrator Standard Managed with Parental Controls Sharing Only
Standard
_______ users cannot change the system configuration and are restricted to saving data files within their own user profile folder or the Public profile.
Standard
TWAIN
Standard "driver" model for interfacing scanner hardware with applications software.
RAID 0
Striped volume 2 disk min Zero fault tolerance or redundancy Disk failure will result in total data loss on the volumes. Total storage is that of all drives attached High performance
In an IPv4 network, what distinguishes the network and host number components within a single IP address? Host address Subnet mask Subnetting Static addressing
Subnet mask
An end-user has complained about slow transfer speeds on a laptop and wouldn't mind sacrificing storage space for better speed and performance. In fact, the user wants to be able to transfer data on the laptop as fast as possible. What would you suggest upgrading to improve data transfer speeds? Suggest Random Access Memory Suggest a hard disk drive Suggest a hybrid disk Suggest a solid state drive
Suggest a solid state drive
A remote office has ten workstations. Three do not need to be connected to the corporate domain and would be fine in a workgroup. Seven workstations do need to be connected to the domain. Since it is a remote office, using BranchCache is essential. What Windows 10 edition(s) will you deploy? Ten Windows 10 Professional Ten Windows 10 Enterprise Three Windows 10 Home, Seven Windows 10 Enterprise Three Windows 10 Home, Seven Windows 10 Professional
Ten Windows 10 Enterprise
A remote office has ten workstations. Three do not need to be connected to the corporate domain and would be fine in a workgroup. Seven workstations do need to be connected to the domain. Since it is a remote office, using BranchCache is essential. What Windows 10 edition(s) will you deploy? Three Windows 10 Home, Seven Windows 10 Professional Ten Windows 10 Enterprise Ten Windows 10 Professional Three Windows 10 Home, Seven Windows 10 Enterprise
Ten Windows 10 Enterprise
You have a 32-bit installation of Windows 10 on your tablet. You have downloaded Microsoft Office from your Office 365 subscription. A message says it cannot install on this system. What is the most likely reason why? The Microsoft Office download does not have a proper license. The Microsoft Office download is 64-bit. The Microsoft Office download is not the tablet version. The Microsoft Office download is in the wrong language.
The Microsoft Office download is 64-bit.
Task Scheduler
The Task Scheduler is a Windows program that enables the user to perform an action (such as running a program or a script) automatically at a pre-set time or in response to some sort of trigger.
desktop style
The UI elements that allow the user to interact with the OS vary between OS types and versions. For example, the Windows Start Menu has evolved into the Start Screen.
partitioning
The act of dividing a physical disk into logically separate storage areas, often referred to as drives.
No matter how long you leave it plugged in to a "known good" power outlet, when you unplug your laptop, it dies. During your troubleshooting, you clean the battery's contacts and make sure it is properly seated. When you replace the battery with a "known good" battery of the same model, it works fine. What can you determine is most likely the cause of the problem? The battery is most likely completely discharged. The power LED needs to be replaced. An app is putting excessive strain on the battery. The battery has ended its useful life.
The battery has ended its useful life.
chipset
The chipset provides communications between different components by implementing various controllers (for memory, graphics, I/O, and so on). Historically, "fast" controllers (memory and video) were part of a "northbridge" chipset, placed close to the CPU and system memory. Slower buses were part of a "southbridge" chipset. In modern PC architecture, video and memory controllers are part of the CPU (on-die), the northbridge would mostly handle PCI Express adapters, and the southbridge would host SATA, USB, audio and LAN functions, plus PCI/PATA legacy bus support.
drive controller
The controller is the circuitry in the disk unit that allows it to put data on the bus, which the HBA shuttles to the CPU or RAM.
desktop
The desktop is at the top of the object hierarchy in Explorer, containing the Computer, Documents, Network, and Recycle Bin objects. The desktop also stores shortcuts to programs, files, and system objects.
fonts
The display and word processing programs can make use of any typeface designs (fonts) installed on the local system. Most Windows fonts are OpenType (replacing the earlier TrueType) but some design programs and printers also use Adobe Type 1 fonts.
mouse
The essential device to implement a WIMP GUI, a mouse simply controls the movement of a cursor that can be used to select objects from the screen. All Windows mice feature two click buttons, which are configured to perform different actions. Many mice also feature a scroll wheel.
expansion bus
The external bus that allows additional components to be connected to the computer.
You want to upgrade the old video card in a laptop to high-end dedicated graphics. Your goal is to turn it into a gaming machine to replace your desktop. What problems might you face when trying to accomplish this? The laptop may run out of memory. You may experience WiFi problems. You could face audio issues. The laptop could over-heat.
The laptop could over-heat.
keyboard
The oldest PC input device and still fundamental to operating a computer. There are many different designs and layouts for different countries. Some keyboards feature special keys.
You have upgraded your Windows 7 PC from 4 GB (Gigabytes) of RAM (Random Access Memory) to 8 GB of RAM by replacing the memory modules. When looking at the PC's system properties in Windows, only 4 GB is available. What would be the likely reason the full 8 GB is not available? The operating system is 64-bit. The RAM is for Windows 10. The operating system is 32-bit. The RAM is incorrect for the system.
The operating system is 32-bit.
refresh rate
The picture displayed on a CRT monitor is updated (by vertical refreshing) many times per second. The more times the image is refreshed, the more stable and flicker-free the picture. On flat panels, there is no flicker as each pixel is not redrawn but only updated. Flat panels can suffer from motion blur and ghosting, however, and better refresh rates can reduce these issues.
command interpreter
The portion of an operating system or script language that is able to read and implement commands entered by a user or from a script file.
Which of these properties from each power-using component in a computer do you total when determining the size of the necessary power supply? The resistance rating The energy rating The power rating The voltage rating
The power rating
network topology
The shape or structure of a network is commonly described as its topology. Topologies may be either physical (the actual appearance of the network layout) or logical (the flow of data across the network). In a star topology, nodes are connected to a single point while in a hub topology, all nodes connect to the same media and share bandwidth. A ring topology means that communications travel from node-to-node in a loop. In a full mesh network, each node is linked to every other node, but partial meshes are far more common. A hybrid topology uses elements of different topologies, such as a logical bus but physical star.
latency
The time it takes for a signal to reach the recipient. A video application can support a latency of about 80 ms, while typical latency on the Internet can reach 1000 ms at peak times. Latency is a particular problem for 2-way applications, such as VoIP (telephone) and online conferencing.
response rate
The time taken for a pixel to change color, measured in milliseconds (ms).
Digitizer
The touchscreen overlay technology that converts finger and stylus contact into input data for the device to use.
What is the maximum power output of a power supply known as? The hertz rating The wattage rating The amperage rating The voltage rating
The wattage rating
data type
The way the data is intended to be used in a program such as character or string, integer, real number, logical, or Boolean.
You want to measure the current temperature in your home remotely. Which Internet of Things (IoT) endpoint device would you need to purchase and install? Non-programmable thermostat Thermostat Alexa HVAC
Thermostat
Using the Finder window in ________, you can find the folder with file (or files) that you want to restore.
Time Machine
What can macOS use for Backups? Backup and Restore fsck ckkdsk Package Management launchd Time Machine Disk Utility rsync cron WSUS Task Scheduler App Store
Time Machine
_______ utility enables data to be backed up to an external, attached drive.
Time Machine Time Machine keeps hourly backups for the past 24 hours, daily backups for a month and weekly backups for all previous months.
A routing table is corrupted and causing a packet to loop. The router discards the packet and sends a warning packet to the source host. Consider the types of Internet Control Message Protocol (ICMP) messages to determine what type of message the source host receives. Redirect Echo request/reply Destination unreachable Time exceeded
Time exceeded
For maximum compatibility with any wired network, how would you configure data transferring on the wired Ethernet Network Interface Card (NIC)? To operate at half duplex To work at a nominal data rate of 1 Gbps To auto negotiate To prioritize certain types of traffic over others
To auto negotiate
For maximum compatibility with any wired network, how would you configure data transferring on the wired Ethernet Network Interface Card (NIC)? To prioritize certain types of traffic over others To auto negotiate To work at a nominal data rate of 1 Gbps To operate at half duplex
To auto negotiate
What is the primary purpose of a webcam? To record video To be used with VoIP calling To capture still images To record audio
To record video
There is a network (RJ45) port in the Director's office, but recently it stopped working. There is no connectivity provided when plugged into the port. The cable and the workstation's Network Interface Card (NIC) are verified good. You need to make sure the cable on the back-end of the port is connected but the cables in the wiring closet are not labeled. Which tool can you use to perform this task? Tone generator/probe Cable tester Loopback plug ping
Tone generator/probe
impact printer
Typically, a dot matrix printer, this uses pressure to transfer ink from a ribbon onto paper in a particular pattern, similar to the mechanism of a typewriter.
Tasks that require _____ are shown with a Security Shield icon.
UAC
Which file system is for optical media with support for multisession writing? FAT (File Application Table) 32 FAT (File Application Table) 16 UDF (Universal Disk Format) CDFS (Computer Disk File System)
UDF (Universal Disk Format)
UNIX
UNIX is a family of more than 20 related operating systems that are produced by various companies. It can run on a wide variety of platforms. UNIX offers a multitude of file systems in addition to its native system. UNIX remains widely deployed in enterprise data centers to run mission critical applications and infrastructure.
A ______ printer connection allows the client computer to communicate directly with the printer and run the print spooler locally on the client computer.
USB (Universal Serial Bus)
Password protection policies mitigate against the risk of attackers being able to compromise an account and use it to launch other attacks on the network. What are some examples that are used by Windows? (Select all that apply.) User cannot change password Minimum password length Enforce password history/Minimum password age Password must meet complexity requirements
User cannot change password Minimum password length Enforce password history/Minimum password age Password must meet complexity requirements
Which Secure Shell (SSH) method is when a client submits credentials that are verified by the SSH server either against a local user database or using an authentication server? Kerberos Host-based authentication Public Key authentication Username/Password
Username/Password
A ______ based printer connection allows the client computer to communicate directly to the printer over a wireless network. The print spooler runs locally on the client computer.
Wi-Fi
A user is complaining of very weak wireless signal. What device would you use to check the signal strength from the user's location? Multimeter Lookback plug WiFi analyzer Tone generator/probe
WiFi analyzer
Microsoft Windows
Windows started as version 3.1 for 16-bit computers. A workgroup version provided rudimentary network facilities. Windows NT 4 workstations and servers (introduced in 1993) provided reliable 32-bit operation and secure network facilities, based around domains. The Windows 9x clients (Windows 95, 98, and Me) had far lower reliability and only support for workgroups, but were still hugely popular as home and business machines. Windows 2000 and Windows XP workstations married the hardware flexibility and user interface of Windows 9x to the reliability and security of Windows NT, while the server versions saw the introduction of Active Directory for managing network objects. The subsequent client releases of Windows (Vista and Windows 7) featured a substantially different interface (Aero) with 3D features as well as security improvements. The latest client versions—Windows 8 and Windows 10—are designed for use with touchscreen devices.
quality updates
Windows updates that are typically released each Tuesday designed to address security vulnerabilities, usually installed in one group of patches and requiring a single reboot. Compare with feature updates.
What is the folder permission that can create new folders and files, change attributes, view permissions and ownership? Read Write Read & Execute Modify
Write
Which wireless communications protocol is an open source technology used primarily for home automation and operates in the same frequency band as many Wi-Fi networks? Z-Wave ZigBee Bluetooth NFC
ZigBee
If you wanted to install a wireless mesh network to monitor and remotely control your home using the 2.4 gigahertz (GHz) band, what wireless networking protocol would you use? Near Field Communication (NFC) Z-Wave Long Term Evolution (LTE) Zigbee
Zigbee
Does Windows 10 Pro support joining a domain?
Yes. Windows 10 Professional edition is a popular mainstream business version of Windows 10. It supports joining a domain and many other business features.
You are trying to connect to your home network and cannot find the SSID. Which of the following is the likely problem? You need to reboot your router. You are out of range. You have an IP conflict. Your router is not broadcasting it.
You are out of range.
Internet of Things (IoT) door locks can offer a good deal of convenience when leaving and entering your home. However, there are several things you should consider before installing an IoT door lock. Which of these is NOT a consideration? You will need to replace your deadbolt. You should make sure the door closes properly. You should make sure the door lock fits. You should use good batteries.
You will need to replace your deadbolt.
Only one ______ partition is allowed on a hard drive. It is not formatted like a primary partition is. It is is divided into segments known as logical drives.
extended
_______ is a 64-bit version of FAT (File Allocation Table). Designed for removable hard drives and flash media, this supports large volumes and large file sizes. It also supports access permissions but not compression or encryption.
exFAT
SSDs are a type of mass storage _____ memory that offers fast performance of data transfers. If cost is not a concern, but speed is, a SSD would be the best option.
flash
What can Linux use for Disk Maintenance? Backup and Restore fsck ckkdsk Package Management launchd Time Machine Disk Utility rsync cron WSUS Task Scheduler App Store
fsck
The second step in replacing an existing installation is to
install the new OS, overwriting the existing target and optionally reconfiguring the disk partition and file system structure, too.
The ipconfig switch and argument _______ displays the DNS resolver cache. This contains host and domain names that have been queried recently. Caching the name to IP mappings reduces network traffic.
ipconfig/displaydns
The ipconfig switch and argument _________ releases the IP address obtained from a DHCP server so that the network adapter(s) will no longer have an IP address.
ipconfig/release AdapterName
The ipconfig switch and argument ________ forces a DHCP client to renew the lease it has for an IP address.
ipconfig/renew AdapterName
Which ipconfig switch and arguments forces a Dynamic Host Configuration Protocol (DHCP) client to renew the lease it has for an Internet Protocol (IP) address? ipconfig/all ipconfig/release AdapterName ipconfig/renew AdapterName ipconfig/displaydns
ipconfig/renew AdapterName
In a ______ network, each computer can be both a server and a client. Each user administers his or her PC and the resources on it.
peer-to-peer
A _____ is either an electrically wired socket or plug, or it can be a wireless transmission device.
port