CompTIA A+ 220-802 Topic 5 Mix Questions

Ace your homework & exams now with Quizwiz!

After a recent power spike, a user upgrades their motherboard. However, every time they try to turn their workstation on, it only crashes and performs a core dump. All hard drives and processors are compatible with the new motherboard. Which of the following symptoms has MOST likely occurred? A. Fans spin but no power to other devices B. Missing operating system C. System only works in Safe Mode D. Stop error

D. Stop error

A client wants a wireless network set up in the office, but does not want unauthorized users to be able to access the network. Which of the following provides the BEST protection? A. Change the default channel B. Disable the SSID C. AP placement D. Strong encryption

D. Strong encryption

Which of the following commands shows the number of hops from a computer to the specified destination? A. IPCONFIG B. NETSTAT C. PING D. TRACERT

D. TRACERT

A technician is having performance issues with a hard drive. Which of the following commands will verify the integrity of the hard drive and fix any errors? A. CHKDSK B. XCOPY C. FDISK D. FORMAT

A. CHKDSK

A technician has just installed and terminated a new CAT5 network cable. The device using the cable cannot connect to the network. Which of the following tools would be BEST in troubleshooting this issue? A. Cable tester B. Network analyzer C. Multimeter D. Toner probe

A. Cable tester

A technician wants to create a new logical volume on a machine. Which of the following Windows 7 utilities will allow a technician to perform this action? A. DISKPART B. FORMAT C. CHKDSK D. FDISK

A. DISKPART

A user reports slow performance on their PC after importing some photos. Which of the following maintenance tasks should a technician recommend in order to increase performance? A. Defragmentation B. Install new camera drivers C. Update anti-virus definitions D. Run CHKDSK

A. Defragmentation

Which of the following is a business use case for desktop virtualization? (Select TWO). A. Circumvent software licensing B. Disaster Recovery C. Security Monitoring D. Software Testing E. Increased Storage Space

B. Disaster Recovery D. Software Testing

A technician has a list of IP addresses that the technician's manager needs the network names for. Which of the following commands would be used? A. NBTSTAT - A B. PING - t C. NETSTAT o D. NBTSTAT - a

A. NBTSTAT - A

A technician is dispatched to repair a computer that appears to boot correctly, except no video output is being displayed. No beep codes are given by the computer, but drive activity lights and keyboard lights work correctly. The technician decides that the video card may be defective and removes it from the computer, expecting the computer's POST process to provide beep codes with the card removed. Instead the computer boots properly. Which of the following is MOST likely the cause? A. Onboard video is present B. The onboard speaker is defective C. The monitor is defective D. The RAM should be reseated

A. Onboard video is present

A technician needs to sanitize a hard drive for reuse. Which of the following would be the EASIEST for the technician to perform? A. Overwrite B. Low level format C. Destroy hard drive D. Degaussing

A. Overwrite

A user is attempting to use Remote Desktop to connect to a server but is getting an error message. Which of the following tools should be used to verify that the server is powered on and connected to the network? A. PING B. NSLOOKUP C. MSTSC D. SFC

A. PING

Anne, a technician, is trying to access the company intranet and is receiving an error stating the website is not found. Which of the following tools would she use to determine if the intranet server is online? A. PING B. NETSTAT C. NSLOOKUP D. IPCONFIG

A. PING

The support center for a PC manufacturer believes that the hard drive may be having an issue. The support representative asks the technician to find out how many pages per second and what the queue length is for the hard drive. In which of the following utilities should the technician look FIRST for this information? A. Performance Monitor B. Component Services C. Device Manager D. Drive Management

A. Performance Monitor

When issuing user permissions for job functions, an administrator should assign: A. Permissions based on employee's role. B. Them to the Power User role on the machine. C. Permissions based on employee's seniority. D. Them to the Administrator role on the machine.

A. Permissions based on employee's role.

A client is running Windows 7 Ultimate and has a requirement to run a program that only runs under Windows XP. Which of the following could the client utilize? A. Windows XP Mode B. Windows Hypervisor C. Compatibility views D. TPM

A. Windows XP Mode

An application is unresponsive and causing system instability. Which of the following command line options would only close the application? A. taskkill B. shutdown C. chkdsk D. tasklist

A. taskkill

A technician is diagnosing a computer receiving the following message upon boot: "RAID degraded." Which of the following is MOST likely the cause of such an issue? A. Faulty RAM B. Faulty RAID battery C. Faulty power supply D. Faulty hard drive

D. Faulty hard drive

A laptop boots fine but after a few minutes the LCD screen fades out into a very dim image. Which of the following is the cause of the problem? A. Weak battery B. Power supply is failing C. LCD screen connector is loose D. LCD inverter is failing

D. LCD inverter is failing

After rebooting, a technician sees the Windows logo but when Windows boots up, no video appears. Which of the following options would be the QUICKEST way to restore the computer? A. VGA Mode B. Last Known Good Configuration C. Safe Mode with Networking D. Safe Mode

B. Last Known Good Configuration

iOS version 5.0 allows for all data to be synchronized and backed up to a computer with iTunes via which of the following methods? (Select TWO). A. 4G LTE B. USB cable C. FireWire D. Bluetooth E. Local Wi-Fi

B. USB cable E. Local Wi-Fi

Which of the following command line tools would be used to display all network information for a local PC? A. ping B. ipconfig C. netstat D. tracert

B. ipconfig

Targeted emails intended to compromise security are known as: A. rootkits B. phishing C. hijacking D. spoofing

B. phishing

A technician would like to restart a computer from a command line tool. Which of the following tools should the technician use? A. Shutdown /f B. Shutdown /i C. Shutdown /r D. Shutdown /s

C. Shutdown /r

An individual pretending to be a consultant trying to gain access to information is an example of which of the following? A. Chassis Intrusion B. Principle of Least Privilege C. Social Engineering D. Identity Theft

C. Social Engineering

Which of the following scenarios would benefit from client-side virtualization? A. Increased 3D gaming performance B. Stronger NTFS permissions C. Supporting a legacy application D. Maintaining Windows Software update servers

C. Supporting a legacy application

A user signs up at an online gaming site, and shortly after receives an email with a link to download the game. After installing the game, the user notices that important files are being deleted. Which of the following is this an example of? A. SPAM B. Phishing C. Trojan D. Spyware

C. Trojan

In order to establish a VPN to a company firewall, Joe, a technician needed to have an RSA token and provide a user name and password to connect to the main office. This is an example of: A. Privacy filters. B. Extensive security. C. Two-factor authentication. D. Basic authentication.

C. Two-factor authentication.

Which of the following can an Android device use to synchronize with desktop contacts? (Select TWO). A. HDMI cable B. CAT6 cable C. USB cable D. Bluetooth E. IEEE 1394 cable

C. USB cable D. Bluetooth

Which of the following, when implemented on an unsupervised public kiosk which is used by walk- ins, increases its security posture the MOST? A. Rename the administrator account. B. Implement a screensaver. C. Use strong passwords. D. Disable guest access.

C. Use strong passwords.

Which of the following is the safest way to download and install a new program on a mobile device? A. Use the Bluetooth file sharing feature. B. Download the program from an FTP site using the USB cord. C. Use the app store to download and install the program. D. Use NFC to copy the program from another mobile device.

C. Use the app store to download and install the program.

A technician notices that everything appears too large on the computer's screen and the display resolution cannot be changed. The machine is running in which of the following modes? A. Recovery B. Virtualization C. VGA D. Administrator

C. VGA

A customer would like a technician to establish a Windows network that affords the easiest path for creating persistently mapped network drives using a login script. Which of the following is the BEST option to meet this need? A. HomeGroup B. Simple File Sharing C. Windows Domain D. Workgroup

C. Windows Domain

Windows Virtual PC is intended to run on which of the following Operating Systems? A. Windows Vista Standard B. Windows Server 2008 C. Windows XP SP3 D. Linux

C. Windows XP SP3

A user states that they are connected to a hotel's wireless access point but cannot reach their email account. Which of the following should the user MOST likely perform? A. Agree to the web based terms of use B. Reinstall the wireless NIC drivers C. Turn off Windows firewall D. Change the wireless frequency

A. Agree to the web based terms of use

A user has reported their computer boots into Windows install each time they power up their computer. Which of the following is the MOST likely cause of this problem? A. An install disk was left in the multimedia drive. B. The system is booting from the utility partition. C. The system is booting PXE from the server. D. The boot sector needs to be repaired.

A. An install disk was left in the multimedia drive.

A company would like to prevent commonly known social engineering risks. Which of the following would help mitigate these risks? A. Annual security training B. Install new switches C. Review security policies D. Require 180 day password expiration

A. Annual security training

While using an application on a Windows XP desktop PC, a BSOD appears. Which of the following should the technician select upon reboot to troubleshoot this issue? A. Boot to safe mode B. Boot to last known good configuration C. Boot to another OS on a second partition D. Boot normally

A. Boot to safe mode

After replacing a motherboard on a customer's laptop for a no POST issue, the technician realizes that there is no wireless connectivity on the laptop. Which of the following should the technician do FIRST? A. Check to see if there is a wireless switch on the laptop and its current position. B. Disassemble the laptop and check if WiFi antennas connected properly to wireless card. C. Reinstall WiFi card drivers. D. The new motherboard is defective and not recognizing wireless; it needs to be replaced.

A. Check to see if there is a wireless switch on the laptop and its current position.

A technician, Joe, has a wired switch in a conference room for guests. In which of the following ways could Joe restrict the network to only six devices at a time, with minimum management effort? (Select TWO). A. Disable the extra Ethernet ports on the switch B. Configure DHCP for six addresses maximum C. Enable Spanning Tree protocol D. Create an access control list for each new PC E. Configure DNS to only resolve six IP addresses F. Add each guest to the MAC filter list

A. Disable the extra Ethernet ports on the switch B. Configure DHCP for six addresses maximum

A technician is setting up a wired SOHO network for a client. The client would like to ensure that unauthorized PCs are not easily able to communicate on the network. Which of the following can the technician do? A. Enable MAC filtering B. Encrypt passwords C. Disable SSID D. Disable DHCP

A. Enable MAC filtering

An unknown device has been found on a SOHO wireless router. Which of the following is BEST to perform to keep this device off the network? A. Enable MAC filtering B. Change the channel C. Disable DHCP D. Disable SSID broadcast

A. Enable MAC filtering

A user reports that their computer restarts at 3:00 PM every day. Which of the following tools would BEST help a technician troubleshoot this issue? A. Event Viewer B. Task Scheduler C. Performance Monitor D. System Restore

A. Event Viewer

A customer calls and states their display is very dark even with the brightness settings at maximum. Which of the following is the MOST likely cause of this issue? A. Faulty backlight B. Improper graphics settings C. Graphics driver is out of date D. Display is overheating

A. Faulty backlight

Which of the following BEST prevents attackers from accessing network equipment? A. Firewall B. Privacy filter C. Antivirus software D. Server

A. Firewall

A technician recently installed a new USB printer for a customer that is running Windows 7. Windows automatically installed the drivers. When the user prints, the printout has a bunch of symbols. Which of the following should the technician do NEXT? A. Install the vendor specific driver B. Replace the printer C. Check for Windows Updates D. Run antivirus application

A. Install the vendor specific driver

Which of the following characteristics MOST separates a tablet from a laptop? A. Lack of field serviceable parts B. Lack of any storage medium C. Lack of internal wireless D. Lack of a touchscreen

A. Lack of field serviceable parts

A user attempts to remote into their machine at night but cannot connect. The user believes that someone is unplugging their computer from the network at night and plugging in a personal machine. Which of the following security measures would BEST prevent this behavior from continuing? A. Limit the port to a specific MAC address. B. Set the port to only activate during business hours. C. Disable DHCP on the network router. D. Deactivate the port that is being used from the switch.

A. Limit the port to a specific MAC address.

A technician needs to securely delete all data from a hard drive containing highly sensitive information. Which of the following is the BEST way to delete the data? A. Low-level format B. Manually select and delete the data within the OS C. Delete the partition and re-format D. Standard format

A. Low-level format

A small business owner wants to prevent employees from disconnecting company computers from the network jacks and connecting their personal computers. Which of the following must a technician implement to ensure only company authorized computers will be given access when connected to the office network jacks? A. MAC filtering B. Disable unused ports C. Static IP addresses D. Use computer cable locks

A. MAC filtering

Which of the following OS utilities can be used to modify which programs are run at the time of system startup? A. MSCONFIG B. Services C. MSTSC D. Computer Management

A. MSCONFIG

In iOS, which of the following settings would need to be configured for ActiveSync? A. Mail, Contacts, & Calendars B. Music & Videos C. Phone & Messages D. Notifications & Location Services

A. Mail, Contacts, & Calendars

Which of the following is the common term for software designed to steal information, disrupt files and an operating system's integrity, and spy on a user's activity? A. Malware B. Spyware C. Rootkit D. Virus

A. Malware

- A user receives the following email message: - From: IT Department - To: Joe User - Subject: Email quota exceeded. Your mailbox has reached the maximum size. Your account will be suspended unless you provide the IT department the following required information: - Username: - Password: This an example of which of the following? A. Phishing B. Worm C. Spyware D. Malware

A. Phishing

A user receives an email seemingly from the director of the company's IT department. The user however notices that the content of the email is asking for information specifically forbidden to be shared with anyone. This type of interaction is known as which of the following? A. Phishing B. Shoulder surfing C. Malware D. Spyware

A. Phishing

Joe, a user, receives a spam email supposedly sent from a coworker's email address asking for money. This is an example of which of the following common security threats? A. Phishing B. Spyware C. Malware D. Evil Twin

A. Phishing

Which of the following common security threats could be occurring when a user receives an email with a link to login and change their username and password? A. Phishing B. DDoS C. Malware D. Spoofing

A. Phishing

Which of the following types of security threats is delivered primarily via email? A. Phishing B. Rootkits C. Viruses D. Grayware

A. Phishing

Which of the following is the difference between a quick and a full format? A. Quick format does not check for bad sectors while full format does. B. Full format prompts for confirmation while quick format does not. C. Full format erases all partitions on the disk at once while quick format only erases one partition at a time. D. Quick format only erases the system partition and not the data partition.

A. Quick format does not check for bad sectors while full format does.

A technician must add a line into HKLM. Which of the following tools would BEST enable this ability? A. REGEDIT B. MSCONFIG C. RD D. REGSRV32

A. REGEDIT

A user states that they see flickering on their external display. The technician asks if anything has changed since they noticed the problem. Next the technician replaces the external display with a new one which corrected the issue. According to the troubleshooting theory, which of the following would the technician do NEXT? A. Record the resolution to the problem for future references. B. Determine what needs to be replaced to resolve the issue. C. Recreate the recent changes to the PC. D. Identify what exactly the user is having a problem with.

A. Record the resolution to the problem for future references.

Joe, an employee, has just migrated from the Marketing department to the Accounting department and cannot save files to the Accounting share. He is a member of both the Marketing and Accounting security groups. A technician discovers the following permissions are in effect for the Accounting share: Share permissions: Everyone Full Control NTFS permissions: Accounting Full Control, Marketing Deny All Which of the following should the technician do to enable Joe to save files to the Accounting share without compromising security? A. Remove Joe from the Marketing group B. Ask Joe to resave the file, as the permissions are correct C. Grant the Accounting group Full Control share permissions D. Remove the Deny permission for the Marketing group

A. Remove Joe from the Marketing group

A user reports that the power LED light flickers orange when the laptop is plugged in. Which of the following should the technician do FIRST? A. Reseat the battery. B. Place the laptop on the docking station. C. Check the power options in Control Panel. D. Restart the laptop.

A. Reseat the battery.

A technician arrives at a customer's location to do a memory upgrade on a laptop. However, the technician's tools were left in the work van. The customer offers a screwdriver, which they "use all the time" on the laptop. Several screws are stripped on the laptop. Which of the following would be the appropriate NEXT step? A. Return to the work van and get tools which contain the correct screwdriver. B. Instruct the customer on the importance of using proper tools. C. Replace the screws with ones that actually fit the customer's screwdriver. D. Use the screwdriver provided by the customer, being careful not to further strip any of the screws.

A. Return to the work van and get tools which contain the correct screwdriver.

A customer calls and states that they are getting a lot of pop-ups and the new antivirus they just downloaded is not helping. Which of the following is the MOST likely cause of the issue? A. Rouge antivirus B. Need anti-malware scan C. Security Center Disabled D. Windows not up to date

A. Rouge antivirus

A client wants a wireless SOHO installed in the building that already has other wireless networks in it. The client wants the network to not be easily seen. Which of the following can the technician disable to help the network from being seen? A. SSID broadcast B. DHCP C. MAC filtering D. Wireless encryption

A. SSID broadcast

A technician would like to image 50 desktop computers from a recently optimized test machine. Which of the following would ready the test machine for capturing the image? A. SYSPREP B. FDISK C. XCOPY D. RIS

A. SYSPREP

Joe, a user, should be aware of his surroundings when when Windows boots. Which of the following tools would BEST be used to disable some programs from automatically starting when the computer is booted? A. Performance Monitor B. Fixboot C. MSCONFIG D. FIXMBR

A. Shoulder surfing

A company's security guard found Ann, an unauthorized person, searching through the recycling dumpster behind the building. When Ann was questioned she responded with, "I work for the company and have lost a report". Which of the following is occurring? A. Social engineering B. Malware C. Phishing D. Shoulder surfing

A. Social engineering

Which of the following is a common component found on ultra thin laptops and tablet devices? A. Solid state drives B. Touch screen interface C. Upgradeable RAM D. Field serviceable parts

A. Solid state drives

Which of the following are examples of digital security? (Select TWO). A. Strong password B. Privacy screen C. Badge D. MAC filtering E. Mantrap

A. Strong password D. MAC filtering

The user is having trouble using the mouse. The technician believes a program stopped responding that caused the issue and asks the customer to hold down "Ctrl + Shift + Esc" to verify. Which of the following did the technician launch? A. Task Manager B. Control Panel C. Services D. MSCONFIG

A. Task Manager

Which of the following is the MOST likely reason for a low wireless signal? A. The distance from the access point B. Incompatible wireless hardware C. The access point is bridged D. Channel conflict in the access point

A. The distance from the access point

Joe, a user, copies a text document off of a CD drive into a folder. Joe has full control permissions on the folder. When Joe tries to edit and save the document, the system prompts him to save it to a new location. Which of the following is the reason for this behavior? A. The file properties are set to Read Only B. The CD was damaged and transferred the file incorrectly C. The original file was corrupted D. The file has an incorrect file extension

A. The file properties are set to Read Only

Ann reports that upon booting up her workstation the screen says that no boot device is found. She also reports that she hears a faint clicking noise from the workstation. Which of the following is the MOST likely problem? A. The hard drive has failed. B. The CMOS battery needs to be replaced. C. The CPU fan has failed. D. The sound card is incorrectly cabled.

A. The hard drive has failed.

A technician installs another IDE hard drive for more storage space and now when the workstation boots up it displays a message of `disk not found'. Which of the following is the MOST likely cause? A. The jumper is set to master on the newly installed hard drive. B. The jumper is set to cable select on the newly installed hard drive. C. The new hard drive is faulty. D. The operating system is corrupt.

A. The jumper is set to master on the newly installed hard drive.

A user reports that their wireless connection is slow. The technician knows that the access point in use is an 802.11g. Which of the following could be the cause of the user's issue? (Select TWO). A. User is too far from an access point B. User is experiencing interference from the refrigerator C. User's PC is slow due to insufficient RAM D. User is using an 802.11b card E. Access point is not powered on

A. User is too far from an access point D. User is using an 802.11b card

Which of the following installation types uses an answer file as part of the installation process? A. Unattended installation B. Clean installation C. Virtual desktop image deployment D. Remote network installation

A. Unattended installation

Ann, a home user, brings a PC in for repair and reports that performance has become extremely slow when working on documents and viewing pictures. Which of the following suggestions should a technician make? A. Upgrade to a solid state drive B. Increase the clock speed on the CPU C. Run the file system check tool D. Upgrade to a high performance video card

A. Upgrade to a solid state drive

A company has decided that all remote users need to use two-factor authentication to increase security. Several remote users have reported losing the RSA token and have replaced it several times. Which of the following is the solution for these users? A. Use biometrics instead of the RSA token. B. Remove the RSA token requirement for any user that has lost an RSA token. C. Give the users with lost RSA tokens RFID badges instead. D. Attach the RSA token to the lid of the laptop.

A. Use biometrics instead of the RSA token.

Administrative share names are MOST commonly designated by which of the following symbols? A. ! B. $ C. : D. *

B. $

A user reports that their PC will not boot after multiple attempts. Which of the following should be the technician's FIRST response? A. "Are you able to log in?" B. "Do you see lights on the PC?" C. "Do you hear a clicking sound?" D. "Is the PC plugged in?"

B. "Do you see lights on the PC?"

The swap file is described as which of the following? A. The hidden file created when in hibernation mode. B. A system file containing the computer's virtual memory. C. A file created when downloading a program from the web. D. A hidden file created when moving files on a computer.

B. A system file containing the computer's virtual memory.

Which of the following settings should be implemented when a mobile device MUST be configured to receive push email notification? A. POP3 with SSL B. ActiveSync C. IMAP D. Secure SMTP

B. ActiveSync

A user is reporting that their computer is running slow and is having trouble connecting to the Internet. After further inspection, the technician notices that the antivirus definitions are up-to-date and the system is scheduled for regular scans. Which of the following solutions will MOST likely help resolve the issues reported? A. Enabling system restore B. Anti-spyware software C. Spam blocker D. Pop-up blocker

B. Anti-spyware software

A technician encounters a PC where they can hear the power supply fan running, but the system is not booting up and there is no display. Which of the following are the MOST likely causes? (Select TWO). A. Bad PCI card B. Bad Motherboard C. Bad RAM D. Bad boot.ini file E. Bad Power Supply

B. Bad Motherboard E. Bad Power Supply

On a mobile device, enforcing a policy that erases a device after a number of failed login attempts is used to prevent which of the following? A. Unauthorized application installations B. Brute forcing C. Social engineering D. Man-in-the-middle attack

B. Brute forcing

A technician has found bad sectors on a hard drive. Which of the following command line tools could MOST likely remap bad sectors to fix this hard drive issue? A. FIXMBR B. CHKDSK C. DISKPART D. FDISK

B. CHKDSK

Anne, a user, states her computer is running very slow. On further investigation, a technician sees several disk errors in the event viewer. Which of the following commands would be used to resolve this issue? A. DISKPART B. CHKDSK C. FORMAT D. SFC

B. CHKDSK

Joe, a user, brings a PC in for repair, reporting that his Windows PC is no longer booting and returning an error that says the OS was not found. Which of the following should the technician do FIRST? A. Enable hard drives over 4TB to be recognized by the BIOS B. Change the boot order in BIOS to hard drive first C. Remove all optical media from the drives D. Change the default OS in the boot.ini file

B. Change the boot order in BIOS to hard drive first

A technician is setting up a new wireless router at a client's home. Which of the following would the technician do FIRST when securing the network? A. Change the DHCP scheme B. Change the default administrative password C. Enable the VPN pass through setting D. Increase radio power levels

B. Change the default administrative password

A residential customer just purchased a new wireless router. During the setup, which of the following should be done to increase the default security of the router? A. Change the default SSID B. Change the default password C. Turn off DHCP services D. Change the default wireless channel

B. Change the default password

An administrator sets up a wireless device that they will need to manage across the Internet. Which of the following security measures would BEST prevent unauthorized access to the device from the Internet? A. Set the channels to wireless 802.11n only B. Change the default username and password C. Enable the wireless AP's MAC filtering D. Enable the wireless AP's WPA2 security

B. Change the default username and password

Joe, a technician, has been tasked to verify a new device has been installed and correctly configured on a Windows 7 computer. He has now confirmed the new device is not working properly. Upon opening the Device Manager, he sees several icons. Which of the following should Joe do FIRST to help troubleshoot the problem? A. Upgrade the antivirus signatures and disable system restore B. Check any items with yellow exclamation points C. Check any items with green checkmarks D. Disable items with a red X over the icon

B. Check any items with yellow exclamation points

A user is receiving an error message of "paper jam in tray 1" every time a print job is sent to the printer. Which of the following should the technician do NEXT, after verifying that there are no visible paper jams in the printer? A. Reset the page count on the printer. B. Check if the pick up rollers are worn out. C. Reinstall the printer driver. D. Replace the paper tray 1.

B. Check if the pick up rollers are worn out.

A technician has discovered that there is an issue with the configuration of DirectX. Which of the following utilities would allow the technician to resolve this issue? A. MSINFO32 B. DXDIAG C. REGEDIT D. MSCONFIG

B. DXDIAG

A technician receives a trouble ticket stating that a user is receiving error messages on their computer. When the technician arrives at the computer, it is now working with no error messages being displayed. Which of the following should the technician use to determine what the error message was? A. MSINFO32 B. EVENTVWR C. DXDIAG D. REGSVR32

B. EVENTVWR

A user has a nonfunctional computer that has two hard drives. The user needs to retrieve information from one of the drives. Which of the following would be used? A. Reformat bad hard drives B. External enclosure C. Reformat all hard drives D. CHKDSK along with DEFRAG utility

B. External enclosure

A user reports that they can browse the local network but cannot reach the Internet. A technician pings the local server and verifies the server responds but sites on the Internet do not. This could be caused by which of the following? (Select TWO). A. Failed WINS server B. Failed router C. Disabled Windows firewall D. Bad NIC E. Failed gateway

B. Failed router E. Failed gateway

A user reports that their printouts contain a shadow of the previous image. Which of the following is MOST likely the cause? A. Separation pads B. Fuser assembly C. Corona wire D. Pickup assembly

B. Fuser assembly

Which of the following can be installed on a virtualized client to enhance user experience and provide closer integration with the host operating systems? A. USB pass-through B. Guest tools C. Virtual NIC D. Remote desktop

B. Guest tools

Which of the following mobile device features is responsible for shifting the device display orientation? A. Device calibration B. Gyroscope C. GPS D. Accelerometer

B. Gyroscope

By definition, a rootkit does which of the following? A. Appears to be useful software until it is installed and fully activated B. Hides the existence of certain processes and programs to provide elevated privileges C. Replicates by being copied or causing itself to be copied to another program 204 D. Travels from computer to computer using the native transport protocols available

B. Hides the existence of certain processes and programs to provide elevated privileges

A technician has received a laptop that is having problems with the screen. The user is reporting that the display is too dim and difficult to see. Which of the following steps should the technician take FIRST? A. Install an anti-glare filter B. Increase the brightness using the function keys C. Replace the LCD backlight in the display D. Update the display drivers

B. Increase the brightness using the function keys

When a folder is copied into a shared folder, the permissions on that folder: A. Change ownership to the domain administrator. B. Inherit from the shared folder. C. Need to be manually recreated. D. Retain their original permissions.

B. Inherit from the shared folder.

A user has just installed an old CRT monitor on their home PC, and is connected to the onboard VGA port. The user notes that the display has a green tint at all times. Which of the following is the MOST likely cause of the issue? A. Old video card drivers B. Loose video cable C. Monitor D. Video card

B. Loose video cable

Which of the following is an edition of a Windows XP operating system? A. Enterprise B. Media Center C. Ultimate D. Home Premium

B. Media Center

A technician receives a call late in the evening that employees of a small business cannot access the company's remote access server. The technician cannot get a response from the server or the router at the site. Upon gaining access to the physical site, the technician discovers the router unplugged from the power source. Which of the following should be implemented to reduce the chance of this happening again? A. Plug the router into an uninterruptable power supply. B. Move the router to a physically secure location. C. Install security cameras to monitor the router. D. Outsource the remote access service to a third party.

B. Move the router to a physically secure location.

Which of the following file systems is required to install Windows 7? A. CDFS B. NTFS C. FAT D. FAT32

B. NTFS

A technician has discovered two PCs with the same name being used on the network. Which of the following BEST describes what has been happening and how to resolve the problem? A. Both users can log in but only one can access company shares; both PCs need their network names changed. B. Only one user can log in; one PC needs to have its network name changed. C. Both users can log in and access company shares; one PC needs to have its network name changed. D. Neither user can log in; one PC needs to have its network name changed.

B. Only one user can log in; one PC needs to have its network name changed.

A technician wants to test connectivity with a remote device in the other room that appears to be having intermittent connectivity issues. Which of the following command line tools will allow them to check connectivity over an extended period of time without having to retype commands? A. NSLOOKUP B. PING C. NETSTAT D. TRACERT

B. PING

A user has asked for a recommendation for a strong password. Which of the following passwords is the STRONGEST? A. password! B. Pa$sw0rd C. pa$4w0rd D. thisismypsswrd1

B. Pa$sw0rd

A company has decided to implement a recycling program across the organization. The financial department uses employee sensitive information on a regular basis for payroll. Which of the following would need to be implemented for the financial department? A. Use a single garbage container for department paper waste B. Paper shredding service C. Disable printing for all users in the department D. Pickup material more often

B. Paper shredding service

A client has a Windows Vista PC that has several unused programs that run on startup. Which of the following utilities can a technician use to disable these programs from running at startup? A. Default programs B. Performance information and tools C. Performance Monitor D. Device Manager

B. Performance information and tools

Which of the following is a best practice when securing passwords for a desktop? (Select TWO). A. Store on a flash drive B. Place in an encrypted file C. Place in a zip file D. Passwords should be memorized E. Store on an FTP

B. Place in an encrypted file D. Passwords should be memorized

A user reports they have no display on their laptop. Which of the following would be checked FIRST in order to narrow down the issue? A. Swap displays with an extra laptop. B. Plug an external monitor into the laptop, press the appropriate function keys, and look for an 191 output display. C. If the power indicator lights are lit assume the motherboard is good and order a replacement display. D. Remove the display bezel and ensure the display connector is in place.

B. Plug an external monitor into the laptop, press the appropriate function keys, and look for an 191 output display.

A small business owner is looking to assign users to a Windows group level. They have the following requirements for these users, and stress that they should receive no more privileges than necessary: The users should not be able to change passwords for higher level accounts The users need the ability to install software The users cannot create new accounts for others Which of the following group levels will BEST meet these needs? A. Remote Desktop Users B. Power Users C. Standard Users D. Administrators

B. Power Users

In order to pair a phone with another device like a GPS or a car stereo through Bluetooth, which of the following steps need to be taken? A. Put both devices in discovery mode and type in the generated pin into both devices B. Put both devices in discovery mode and type in the generated pin C. Put the second device in discovery mode and type in the generated pin D. Put the phone discovery mode and type in the generated pin

B. Put both devices in discovery mode and type in the generated pin

When installing Windows on a new server, a technician gets an error reporting that no suitable hard drives are available for installation. Which of the following is MOST likely the issue? A. Bluetooth pairing is disabled B. RAID drivers need loading C. PXE boot server unavailable D. CMOS battery needs replaced

B. RAID drivers need loading

Which of the following is the MOST important system resource for virtual machines? A. Hard drive space B. RAM C. BIOS D. CPU

B. RAM

Which of the following technologies can be used to secure mobile devices and their data? (Select TWO). A. Protective screen B. Remote wipe C. Physical lock D. Locator E. Passcode lock

B. Remote wipe E. Passcode lock

Joe, a user, is experiencing some operating system errors that are disrupting his ability to boot the workstation. Which of the following would allow him to keep his data, but possibly resolve operating system errors? A. Clean installation B. Repair installation C. Image deployment D. Quick formatting

B. Repair installation

A user states that their old Windows XP notebook loses time when they power it off. Which of the following items would address this problem? A. Remove any over clocking settings in the BIOS. B. Replace the CMOS battery. C. Replace the main battery with a larger power battery. D. Update the BIOS to new revision.

B. Replace the CMOS battery.

A user states they are hearing a clicking noise coming from the computer. There is a message on the screen saying no operating system found, and the computer then attempts to boot from PXE. Which of the following should the technician perform? A. Remove the floppy disk B. Replace the hard drive C. Replace the NIC D. Replace the DVD-Rom

B. Replace the hard drive

Which of the following devices would provide the GREATEST security to a server room? A. Keycode pad B. Retinal scanner C. Badge reader D. Mantrap

B. Retinal scanner

Joe, a user, is reporting he cannot start an Internet browser. Which of the following commands is MOST likely to resolve this issue? A. FIXMBR B. SFC C. BOOTREC D. RD

B. SFC

Anne, an employee, stepped away from her workstation to deliver a report to her boss. When she came back, confidential material was displayed on the screen that was not opened prior to her leaving. Which of the following could have mitigated this from occurring? A. Intrusion detection system B. Screensaver password C. Privacy filters D. RFID badges

B. Screensaver password

Ann, a customer, has a wired router that connects to the Internet without any issue, but does not provide any other network services. When users connect PCs to the router, they cannot access the Internet or any other network resources. Which of the following should Ann do to connect the PCs to the Internet? A. Change the gateway address on the wired router B. Set the DNS to an external public source on the PCs C. Remove the PCs from the MAC filter list in the wired router D. Change the switch port duplex setting from half to full

B. Set the DNS to an external public source on the PCs

Physically observing a user input a code or password is known as: A. Social engineering. B. Shoulder surfing. C. Tailgating. D. Phishing.

B. Shoulder surfing.

An employee receives a phone call inquiring about company information. This is an example of which of the following? A. Phishing B. Social engineering C. Shoulder surfing D. Rootkits

B. Social engineering

Multiple users have reported that there are black dots on the conference room LCD when doing presentations. Which of the following is MOST likely the problem? A. The video card displaying to the LCD is incompatible. B. The LCD has dead pixels. C. The LCD needs to be recalibrated. D. The conference room PC is overheating.

B. The LCD has dead pixels.

Revert to snapshot is a feature of: A. The host OS. B. The hypervisor. C. The underlying storage. D. The guest OS.

B. The hypervisor.

Ann, a user, reports that a newly purchased laptop is only showing 65GB total on the C. drive, but she purchased a 100GB hard drive. Which of the following is MOST likely the cause of this difference? A. The unavailable space is set aside for Windows system files B. The manufacturer provided a factory recovery partition C. Corrupted data is being stored in the unused space D. The partition was setup incorrectly and needs to be extended

B. The manufacturer provided a factory recovery partition

A technician has just updated a user's PC to Windows 7 and connected to a network printer through a print server. After finishing, the user reports that the printer will not print. Which of the following is the MOST likely reason for this issue? A. The PC's network connection is down. B. The print server does not have the proper driver. C. The printer is not installed on the print server. D. The server is using PCL instead of PostScript.

B. The print server does not have the proper driver.

When using an optical mouse connected via USB on a laptop and experiencing strange cursor movement, which of the following is MOST likely to be the cause? (Select TWO). A. The mouse is failing and should be replaced B. There is contact with the touchpad C. The mouse drivers need to updated D. The laptop is using a capacitive touchscreen E. The surface is interfering with the optical sensor

B. There is contact with the touchpad E. The surface is interfering with the optical sensor

A user has Share permissions of "Allow Full Control" and NTFS permissions of "Allow Read, Allow Write, Deny Modify" to a shared file. In which of the following ways can they manipulate the file? A. They can delete the file. B. They can open the file. C. They can take ownership of the file. D. They can edit permissions on the file.

B. They can open the file.

Which of the following would be the BEST choice to use when implementing a business virtual environment? A. Thick client B. Thin client C. Media PC D. Remote desktop

B. Thin client

Which of the following methods is BEST used to ensure that data on a hard drive cannot be recovered? A. Overwrite the drive B. Use a degaussing tool C. Repartition the drive D. Format the drive

B. Use a degaussing tool

Ann, a small business owner, would like to implement wireless networking for her business but wants to be sure the wireless is ONLY accessible from within her business' premises. Which of the following would BEST accomplish this? A. Disabling SSID broadcast to ensure that only employees know the SSID B. Using unidirectional antennas and reducing radio power levels appropriately C. Assigning DHCP addresses that expire after a shorter period of time D. Using omni-directional antennas and reducing radio power levels appropriately

B. Using unidirectional antennas and reducing radio power levels appropriately

A technician has just finished installing a new NIC in a desktop. Which of the following should the technician perform NEXT according to the troubleshooting theory? A. Test the theory to determine cause B. Verify full system functionality C. Escalate issue to a manager D. Document findings and repairs

B. Verify full system functionality

Which of the following is the BEST example of a physical security barrier? A. Firewall B. Cypherlock C. Strong passwords D. BitLocker

B. Windows 7 Professional

Which of the following operating systems enables a user to use Flip 3D? A. Windows XP Professional B. Windows 7 Professional C. Windows Vista Home Basic D. Windows 7 Starter

B. Windows 7 Professional

Despite objections, the Chief Executive Officer (CEO) wanted all managers to have administrator rights to their workstations. After a few months, the CEO was replaced. A technician is assigned the task of changing the managers to power users on the domain. Which of the following is the BEST choice to complete this task? A. rstrui.exe B. gpedit.msc C. lusrmgr.msc D. usergroup.exe

B. gpedit.msc

Which of the following PING switches would be used to continue a ping to a host until stopped? A. -r B. -a C. -t D. -l

C. -t

A consultant is called in to help troubleshoot connectivity problems an office is experiencing with their 802.11a wireless network. The office manager reports that at random times during the day, workers will lose wireless connectivity for different spans of time. There is no pattern to the drops in connectivity. Which of the following causes should the technician explore FIRST in troubleshooting the office issues? A. 2.4 GHz portable phone system B. Microwave ovens C. 5G Hz portable phone system D. Two Way RF radios

C. 5G Hz portable phone system

The computer was booting normally yesterday, but in the morning a message appears stating "Operating System Not Found". This can be caused by which of the following? (Select TWO). A. Bad memory module B. Bad USB controller C. Bad hard drive D. Bad IDE or SATA controller E. Bad CPU

C. Bad hard drive D. Bad IDE or SATA controller

A user, Joe, wants to enable communication between his GPS and his smartphone. Which of the following would allow for this communication? A. A data link cable B. A wireless access point C. Bluetooth pairing D. Infrared communication

C. Bluetooth pairing

A technician replaced a video card on a desktop PC. The technician powers on the PC to install the device drivers. The PC boots up and goes through the POST, but the screen goes black when trying to boot the operating system. Which of the following steps should the technician perform NEXT to troubleshoot this issue? A. Flash the BIOS B. Reseat the video card C. Boot the PC in safe mode D. Replace the video card with a new one

C. Boot the PC in safe mode

A user states that their wireless connection drops when the phone rings. Which of the following solutions BEST shows what the technician should do to prevent this from happening? A. Move the access point closer to the user B. Remove the phone C. Change the frequency that the wireless router is using D. Change the wireless security encryption settings

C. Change the frequency that the wireless router is using

A laptop user reports that they cannot see the SSID or connect to their company's wireless network. Which of the following should the technician try FIRST? A. Check the wireless settings in the OS B. Replace the internal wireless adapter C. Check the wireless on/off switch D. Check the signal strength

C. Check the wireless on/off switch

Ann, a user, has a computer running Windows XP Professional. She would like the computer to run Windows 7 Professional. She does not wish to save any information on the current system. Which of the following types of installations should the technician perform? A. Repair B. Multiboot C. Clean D. Upgrade

C. Clean

A technician receives a trouble ticket about intermittent wireless on a user's laptop while they are at home but not at work. Which of the following could be the cause of this issue? A. While at home, the user is too close to their access point B. Encryption is set differently at home then at work C. Cordless phone is interfering with signal at home D. Laptop's wireless is set to only work while at work

C. Cordless phone is interfering with signal at home

Which of the following boot methods would a technician use to BEST install an image from an optical media onto a new computer? A. PXE B. Tape C. DVD D. USB

C. DVD

A user states that they have noticed longer wait times when opening applications. Which of the following should the technician perform in order to BEST resolve this issue? A. Remove all startup entries B. Perform a chkdsk /x command C. Defragment the hard drive D. Convert the drive from FAT32 to NTFS

C. Defragment the hard drive

A worker from a branch office goes to the main office for a meeting. They plug their laptop into a couple of wall jacks and do not get network connectivity. Which of the following should the technician check to resolve this issue for the employee? A. Encryption levels on the laptop B. All antivirus updates have been performed C. Disabled switch ports D. If the users account has been locked

C. Disabled switch ports

An administrator wishes to prevent users from accessing unattended computers in other departments. Which of the following would BEST accomplish this? A. Use a roaming profile using domain credentials. B. Implement event monitoring of user logins on every PC. C. Enforce a password-protected screensaver after five minutes of inactivity. D. Use a common login and password for multiple users based upon department.

C. Enforce a password-protected screensaver after five minutes of inactivity.

When a user tries to print, the OS slows down and appears to lock up. Shutting down the Print Spooler Service restores the computer's speed, but leaves the user unable to print. Which of the following should be used FIRST to troubleshoot this problem? A. Rebuild print spooler files B. Hardware diagnostic software C. Event viewer D. Antivirus software

C. Event viewer

A technician is working on a consumer computer that has multiple virus infections. The end user states that all of their data documents are stored on a backup drive. Which of the following methods are commonly available to do a clean install and return the computer back to factory condition? (Select TWO). A. Upgrade installation disc B. Repair installation C. Factory recovery partition D. OS installation disc E. Remote network installation

C. Factory recovery partition D. OS installation disc

Which of the following methods provides digital security? A. Mantrap B. Biometrics C. Firewall D. Bollards

C. Firewall

A technician, Anne, observes that a laser printer prints pages with toner scattered on the page that easily rubs off of the paper. Which of the following components has failed in the printer? A. Duplexing assembly B. Imaging drum C. Fusing assembly D. Transfer roller

C. Fusing assembly

Joe, the Chief Executive Officer (CEO), has a habit of forgetting his mobile device and asks for assistance in locating it in the future. Which of the following would help finding his lost device? A. Enable IMAP settings B. Gyroscope features C. GPS location services D. Enable SSL services

C. GPS location services

DXDIAG is used to display information about which of the following components and its characteristics? A. Printer components B. Network components C. Graphics components D. Storage components

C. Graphics components

After loading a new operating system, which of the following accounts is MOST often changed for security purposes? A. Standard User B. Power User C. Guest D. System

C. Guest

Which of the following is responsible for flipping the image when a smartphone is rotated? A. Accelerometer B. Shock sensor C. Gyroscope D. Ambient light sensor

C. Gyroscope

Social engineering makes use primarily of which of the following techniques, to bypass common corporate security barriers? A. Grayware installation B. Worm transmission C. Human interaction D. Malware installation

C. Human interaction

A company has created a personal SSL certificate for an internal website and a user is reporting error messages when accessing the site. In which of the following locations could a technician troubleshoot SSL certificate errors? A. System Protection B. Folder Options->View Hidden Files C. Internet Options->Content D. Local Security Policy

C. Internet Options->Content

A user reports that the laptop's screen flickers and then goes black. When connecting to an external monitor the operating system desktop is displayed. Which of the following is the cause of the problem? A. Monitor function key B. Resolution is set too low C. Inverter board D. Display adapter drivers

C. Inverter board

The network administrator is called to assist a user, Joe, who has trouble accessing his network drive. Joe states he logs on with his credentials with no problem, however, when he attempts to access a folder via UNC the system asks for credentials. Which of the following is the BEST explanation for this? A. Joe is logging in with a disabled network user name. B. Joe does not have local share permission to access that folder. C. Joe is logging in to the local user account. D. Joe is not typing in the correct network password.

C. Joe is logging in to the local user account.

Ann, a user, reports her display is too dim. Which of the following should be checked to potentially increase the brightness of the display? A. Desktop power supply wattage B. Increase the screen resolution settings C. Laptop function key settings D. Monitor power supply cable

C. Laptop function key settings

After installing an updated video card driver in a Windows XP machine, a technician sees a bluescreen of death (BSOD). Which of the following would BEST help the technician repair the computer? A. Update antivirus definitions B. Run System Restore C. Last Known Good Configuration D. Factory pre-installation CD

C. Last Known Good Configuration

A technician is installing an upgrade of Windows on a machine using an external drive. After rebooting the installation process hangs and reports the media cannot be found. Which of the following will correct this issue? A. Select PXE boot as the first boot method in the BIOS B. Change the CPU speed in the BIOS to a supported value C. Load third party drivers for the external drive and adapter D. Reset the system clock to a previous time and date

C. Load third party drivers for the external drive and adapter

A technician wants to prevent users in a computer lab from seeing the name of the last user who logged onto the computer after the user logs out from the workstation. Which of the following MUST the technician configure? A. Screen saver advanced options B. User access control C. Local computer policy D. Control Panel options

C. Local computer policy

Which of the following features would be BEST used to recover a lost mobile device? A. Remote backup application B. Remote wipe C. Locator application D. RFID chip

C. Locator application

A client states that there are too many programs automatically starting when Windows boots. Which of the following tools would BEST be used to disable some programs from automatically starting when the computer is booted? A. Performance Monitor B. Fixboot C. MSCONFIG D. FIXMBR

C. MSCONFIG

A user states every time Windows boots up it runs very slow for the first few minutes. The user asks if a technician can shorten the boot time. Which of the following tools would be used to address the issue? A. SFC B. FIXMBR C. MSCONFIG D. FIXBOOT

C. MSCONFIG

Joe, an end user, has reported that his computer is extremely slow for several minutes after logging in. He has noticed that many unnecessary programs automatically start when he logs into his computer. Which of the following tools could the technician use to prevent the unnecessary programs from starting automatically when Joe logs into his computer? A. Performance Monitor B. Task Scheduler C. MSCONFIG D. Windows Firewall

C. MSCONFIG

Which of the following should be considered true when selecting a 64-bit version of Windows? A. 64-bit extensions can be disabled in the bios and prevent a proper boot. B. XP Compatibility mode only allows for the 64-bit version of Windows XP. C. Many browser plug-ins may only be supported on 32-bit browsers. D. 64-bit uses memory more efficiently so less RAM is needed than in a 32-bit version.

C. Many browser plug-ins may only be supported on 32-bit browsers.

When installing Windows XP Professional, which of the following file types will the hard drive be formatted to use by default? A. FAT32 B. CDFS C. NTFS D. FAT

C. NTFS

A technician needs to dispose of an old database server which stored company payroll information. Which of the following is a logical data destruction method suitable for this task? A. Degaussing the hard drive with a powerful magnet. B. Using a commercial shredder to destroy the hard drive. C. Overriding the data on the hard drive multiple times. D. Burning the hard drive using an approved method.

C. Overriding the data on the hard drive multiple times.

A manager asks a technician to find a way to deploy images to all new computers from a central location. Which of the following would be used to accomplish this? A. SCSI B. CDFS C. PXE D. IDS

C. PXE

Which of the following boot methods receives the bootstrap files from a network server? A. IDS B. PAN C. PXE D. NAT

C. PXE

Which of the following BEST describes the practice of attempting to gain information through deceptive emails? A. Hashing B. Biometrics C. Phishing D. Encryption

C. Phishing

For which of the following instances is System Restore MOST likely to be used? A. Deleting temporary files that are not needed. B. Replacing a failed hard drive with a new drive. C. Placing the system configuration into a prior state. D. Downgrading an operating system to another version.

C. Placing the system configuration into a prior state.

A network printer has quit printing from all connected customers. No error messages are displayed on the printer and the network connection is working. Which of the following is the FIRST troubleshooting step for the technician to try? A. Check port on switch B. Reboot the printer C. Print configuration page D. Clear print queue

C. Print configuration page

At the airport the company sales employees work on their laptops to submit financial proposals. Which of the following would mitigate shoulder surfing? A. Firewalls B. The use of VPNs C. Privacy filters D. RSA key fobs

C. Privacy filters

When transferring a virtual client from one computer to another, which of the following MUST be checked for compatibility on the host? A. IP addressing methods B. Hard drive connection types C. Processors D. Hard drive rotation speeds

C. Processors

Virtual machines help users developing cloud applications in which of the following ways? A. Provides an environment where the host cannot be connected to the network. B. Provides a platform where operating system requirements are lessened. C. Provides a safe, secure environment in which to test patches or application updates. D. Provides an environment that is never accessible from the Internet.

C. Provides a safe, secure environment in which to test patches or application updates.

A new user reports that they are unable to login to the corporate network on their desktop but they are able to access the WLAN from their mobile device. After further inspection, the technician realizes that the wall port is not wired correctly. Which of the following tools would be used to permanently restore network connectivity to the desktop? A. Wireless locator B. Tethering with mobile device C. Punchdown tool D. Crimper

C. Punchdown tool

A company decides to implement two-factor authentication on all of the company computers. In addition to a user password, which of the following is a commonly used item to implement two- factor authentication? A. Retinal scanner B. Key Lock C. RSA token D. Privacy Filter

C. RSA token

A technician is having issues with a corporate wireless signal bleeding into nearby offices. Which of the following techniques could be used to mitigate the risk of wireless attacks by third parties in the nearby offices? A. Switch from 802.11b to 802.11g spectrums B. Disable WEP-128 security C. Radio power adjustment D. Switch from 802.11g to 802.11n spectrums

C. Radio power adjustment

A small office has two routers, one wired and one wireless. Joe, a laptop user, experiences no issues while at his desk, but when he unplugs his laptop to go to a conference room, Joe is no longer able to access the Internet. Other users do not have this issue. A technician checks the laptop and sees an IP address of 169.254.13.142. Which of the following actions should the technician take FIRST so that Joe can access the Internet? A. Disable the wired connection. B. Reinstall DHCP on the server. C. Refresh the network connection. D. Power cycle the wireless router.

C. Refresh the network connection.

A user is running a RAID 0 array and has problems with one of the drives. Which of the following actions will the technician take NEXT? A. Replace the failing drive and let the RAID recover. B. Add an additional drive to the array and let the RAID recover. C. Replace the drive; all the data is lost and cannot be recovered. D. Remap the RAID array to another drive letter to recover the data.

C. Replace the drive; all the data is lost and cannot be recovered.

Which of the following is the BEST way to secure a workstation which is shared by multiple users using the same guest account? A. Implement strong password requirements. B. Use a password protected screensaver. C. Restrict the guest account's privileges. D. Change the guest account default name.

C. Restrict the guest account's privileges.

A technician is responding to a user reporting corrupted files. Which of the following should the technician do to determine the problem? A. Ensure all Windows updates are installed B. Perform a backup of all drives C. Run CHKDSK D. Run defragmentation

C. Run CHKDSK

A user's CRT monitor was damaged by a large magnet, resulting in a distorted image. Which of the following can a technician do to BEST safely fix the monitor? A. Replace cathode ray tube B. Power cycle the monitor C. Run degaussing tools D. Adjust monitor's brightness

C. Run degaussing tools

Anne, an end-user, reports to Joe, a helpdesk technician, that her computer has been redirecting her browser to unknown websites when clicking on search results. Joe runs a malware scan and finds that her computer is infected with malware. Joe uses the anti-malware program to remove the infection but Anne reports that the problem resurfaced the next day. Joe runs the malware scan again and finds the same malware is still infecting Anne's computer. Joe runs several passes of the malware scan to remove the infection but it keeps recurring. Which of the following would MOST likely aid in removing the infection? A. Enable Windows User Access Control to ensure the user has proper rights to remove the infected files. B. Disable Windows firewall as it may be conflicting with the malware scan. C. Run the malware scan in Windows safe mode. D. Change the desktop's IP address to a different subnet.

C. Run the malware scan in Windows safe mode.

After installing a new printer software package which came with print drivers, a user is experiencing problems launching other applications. Which of the following should the technician do to resolve the user's printing problem? A. Run a backup of the current state. B. Defragment the system. C. Run the system restore. D. Update the antivirus definition.

C. Run the system restore.

A night shift employee constantly fails to logoff at the end of their shift. The employee on the next shift regularly does not bother to log in because they are not prompted to do so. Which of the following actions would be BEST for the technician to do to correct this issue? A. Write up each employee every time the login and logoff policy is ignored. B. Have each employee report to their supervisor at the end of their shift. C. Set the computer to restart after each employee's shift. D. Educate employees to log off within an hour of their shift.

C. Set the computer to restart after each employee's shift.

A technician works for a company that uses an application to track licensing information. The application runs in the background on the Windows 7 computers. A technician receives a call stating that the licensing tracking software is not running. Which of the following should the technician perform to ensure that the application is always running? A. Keep Windows updated with the latest patches B. Run the application in compatibility mode C. Set the service to automatically start D. Install application in Windows XP mode

C. Set the service to automatically start

A technician adds a second monitor to a system that supports dual video output. Which of the following tabs in Display properties will allow the technician to extend the Windows desktop onto the second monitor? A. Themes B. Desktop C. Settings D. Appearance

C. Settings

Ann, a user who works with many patients during the day, has a privacy screen attached to her monitor. Which of the following does this help prevent? A. Rootkits B. Phishing C. Shoulder surfing D. Trojans E. Whaling

C. Shoulder surfing

A user reports that the PC is not working. After questioning the user, the technician believes the problem is a bad memory module. Which of the following is the NEXT step the technician should take? A. Document findings, actions, and outcomes B. Test the theory by replacing the motherboard C. Test the theory by running memory diagnostic software D. Verify the system is working correctly

C. Test the theory by running memory diagnostic software

After a recent memory upgrade, a customer is reporting they have seen no improvement in their system performance. Upon inspection, the technician finds that 6.0 GB are detected but only 3.0 GB of memory are usable. Which of the following is the MOST likely cause? A. The remaining memory is a different type and cannot be used. B. The remaining memory is defective and needs to be replaced. C. The customer is using a 32-bit operating system. D. The memory has not been properly configured in BIOS.

C. The customer is using a 32-bit operating system.

A technician is called into an office where multiple users are reporting duplicate IP address errors. Upon arrival, the technician skims notes from the previous technician who serviced the office and finds that DHCP functionality was disabled on the internal router. Which of the following explanations is MOST likely the issue? A. The previous technician turned off DHCP to free up resources for QoS functionality. B. The previous technician decided to use DNS instead of DHCP for handling IP addresses. C. The previous technician moved the office to a mismanaged static IP address setup. D. The previous technician did not setup DHCP reservations properly and therefore the router is giving multiple users the same IP.

C. The previous technician moved the office to a mismanaged static IP address setup.

A technician discovers that a hard drive has died in a RAID 0 configuration. Which of the following would be the outcome of this situation? A. The user will need to replace the PC. B. The technician will need to back up and replace the drive. C. The user will lose all non-backed up data. D. The technician will need to replace the drive and rebuild the array

C. The user will lose all non-backed up data.

A customer has recently returned to the United States from a trade show in Europe. They report none of their computers will power on. Which of the following is MOST likely the solution? A. Change the monitor settings from PAL to NTSC B. The motherboard drivers need to be reloaded C. The voltage settings on the power supply need to be changed D. Change the keyboard settings

C. The voltage settings on the power supply need to be changed

A technician needs to change a FAT32 partition to NTFS. Which of the following commands would allow the technician to do this? A. CHKDSK B. FORMAT C. CD D. CONVERT

D. CONVERT

A company recently had a security breach and is now required to ensure that all data is removed from a PC once it leaves the building. Which of the following should the technician perform? A. A standard format B. Reset PC to factory default C. A quick format D. A low level format

D. A low level format

A user reports that they accidentally unplugged their CMOS battery. The unit was reinstalled, but all subsequent boot attempts have resulted in a BSOD. Which of the following should be the FIRST item checked by the technician? A. Whether the boot order now has the optical drive in position one B. If the BIOS can detect the hard drive at all C. Whether the SATA power cable was unplugged D. AHCI IDE setting under SATA options in the BIOS

D. AHCI IDE setting under SATA options in the BIOS

Which of the following is a difference between Android and iOS operating systems? A. Screen sizes are larger in iOS devices B. iOS is an open source operating system C. Android does not have NFC technology D. Android allows the use of various application sources

D. Android allows the use of various application sources

An iOS user does not want to automatically connect to wireless networks that are broadcasting. Which of the following settings must be enabled in iOS 5.x to authorize connecting to wireless networks? A. Connect to WiFi B. Change adapter settings C. Manage wireless networks D. Ask to join

D. Ask to join

Joe, a technician, built a new computer for a customer. The computer has been setup with the appropriate operating system, but when Joe boots the PC after configuration, he receives an invalid boot disk message. Which of the following tools should he use to fix the issue? A. Safe Mode with command prompt B. Restore from a prior recovery point C. MSCONFIG to disable startup programs D. BIOS and change the boot order

D. BIOS and change the boot order

Which of the following regular maintenance tasks for a workgroup of Windows PCs is MOST likely to be performed on a nightly basis? A. CHKDSK B. Patch installation C. Defragmentation D. Backups

D. Backups

Many business laptops now come with fingerprint readers to enable users to login without typing in passwords. This is an example of which of the following? A. Privacy filters B. RFID C. RSA tokens D. Biometrics

D. Biometrics

Which of the following relies on individual characteristics unique to each person? A. Rootkits B. Phishing C. Antispyware D. Biometrics

D. Biometrics

Which of the following wireless standards used on modern smartphones depends on direct client- to-client handshake pin code authorization for establishing transmission connection? A. 802.11n Wi-Fi B. WiMAX C. Infrared D. Bluetooth

D. Bluetooth

In order to connect a mobile device to a PAN, a technician MUST ensure which of the following are enabled? A. Wi-Fi antenna B. 3G data services C. Location services D. Bluetooth discovery

D. Bluetooth discovery

A computer's time settings reset every time it is unplugged. This is a symptom of a faulty: A. Memory module. B. Power supply. C. Motherboard. D. CMOS battery.

D. CMOS battery.

A technician is having connectivity issues with a client's machine. The client's wall jack passed testing and the technician also uses a loopback to test the NIC on the PC and it also passed testing. Which of the following tools would a technician use to test between the wall jack and the PC? A. Toner probe B. Multimeter C. Wireless locator D. Cable tester

D. Cable tester

A network consultant needs to redo a CAT5e wall jack that has become unusable due to recent physical damage. In order to install the replacement jack, which of the following tools would need to be used to both install and validate the hardware? (Select TWO). A. Cable crimper B. Loopback plug C. Voltage meter D. Cable tester E. Punch down tool

D. Cable tester E. Punch down tool

A user calls a technician and states that their computer shutdowns after about 15 minutes of being turned on. The user also states that if they wait about an hour and turn the computer back on, it will function properly, but will shutdown after 15 minutes as it did before. Which of the following should the technician check on the motherboard that could be causing this problem? A. SATA connection B. CMOS battery C. TPM chip D. Capacitors

D. Capacitors

Which of the following should be checked FIRST when troubleshooting a computer that intermittently shuts down after heavy usage? A. Proper paper levels in the printer B. Inadequate available RAM C. Optical drive device drivers D. Central processing unit fan

D. Central processing unit fan

A technician installs a new graphics card that supports high resolutions. The technician sets the resolution to the highest setting and then the monitor displays no video. The technician hits the enter key to exit and nothing happens. After a reboot, no video appears after the operating system loads. Which of the following would the technician perform NEXT? A. Reseat the graphics card in a different slot B. Update the graphics card driver C. Reinstall the operating system D. Change the resolution in Safe Mode

D. Change the resolution in Safe Mode

A Windows desktop PC user states that they have sent several print jobs to their locally connected printer, yet none have printed. The printer has no error conditions on the control panel. Which of the following should the technician do FIRST in troubleshooting this problem? A. Open the printer properties page and send a test print to it. B. Clear the print queue of all documents and resend one to test the printer. C. Power the printer off and on and send one test document to it. D. Check if Use Printer Offline has been selected.

D. Check if Use Printer Offline has been selected.

A technician has replaced the CMOS battery on the motherboard. Which of the following is the reason why the technician did this? A. BIOS password was set incorrectly B. System would not shut down properly C. Video card was under powered D. Clock settings are not being maintained

D. Clock settings are not being maintained

The technician is dispatched to a multi-function device that users print and copy from all day. The technician is told pages that are copied all have a line on them on the left hand side of the page. The technician prints a printer test page and does not see the line on the page. The technician's NEXT step would be which of the following? A. Replace the toner cartridge to eliminate the lines. B. Print from another workstation to recreate the problem. C. Close the trouble ticket and document no trouble found. D. Copy a printed page to recreate the problem.

D. Copy a printed page to recreate the problem.

A user calls the helpdesk to report that colleagues are unable to open shared files off their desktop. After inquiring about permissions, the user claims that the "Everyone" group was given DENY rights to all rights levels, but the users who need access were given read/write ALLOW privilege. Which of the following is the MOST likely issue? A. The user needs to give the group "ADMINISTRATORS" full read/write access B. The GUEST account needs to be added to the list of users who have shared access C. The user has DENY permissions setup for the POWER USERS group which needs to be removed D. DENY permissions always supersede ALLOW permissions in Windows

D. DENY permissions always supersede ALLOW permissions in Windows

A user brings in an older CRT monitor and reports there are issues with the colors and bands of discoloration. Which of the following should be done to correct the issue? A. Replace the power cord B. Reformat C. Increase the refresh rate D. Degauss

D. Degauss

The payroll department works with company financial data and had an incident that involved employee's salary being shared across the network. Which of the following would enforce least privilege? A. Paper shredding B. Firewalls C. RFID employee badges D. Directory permissions

D. Directory permissions

A SOHO would like to limit usage of their wireless network to two computers. Which of the following would be the EASIEST way for a technician to accomplish this? A. Assign static IP addresses B. Change the signal strength C. Disable unused ports on the router D. Enable MAC filtering

D. Enable MAC filtering

The user would like to prevent hardware that they do not own from connecting to the network. Which of the following actions would BEST prevent outside users from connecting? A. Enable static IPs B. Disable DNS C. Disable local proxy server D. Enable MAC filtering

D. Enable MAC filtering

A user would like to allow all of the devices on a home network to connect to the WAP except for smart phones. Which of the following features should be used to accomplish this? A. Set a unique DHCP scope ID for the smart phones B. Change the WAP SSID C. Change the channel to the same frequency as the smart phones D. Exclude smart phones from the MAC filter list

D. Exclude smart phones from the MAC filter list

Joe, a new employee, requests to receive Exchange based company email on his tablet device. Which of the following can a technician enable to BEST secure his Exchange account to ensure the email account is not compromised in case his device is lost or stolen? A. Remote backup applications B. Antivirus C. Locator applications D. Forced pin locks

D. Forced pin locks

A user is reporting that they can no longer view their laptop on the projector. Which of the following would MOST likely fix this issue? A. Reinstall the video drivers for the laptop video card. B. Reboot the laptop and projector. C. Reset the video cable from the laptop and projector. D. Hold function key and appropriate "f" key.

D. Hold function key and appropriate "f" key.

Which of the following is a required component of a virtual environment? A. KVM B. Storage area network C. VLAN D. Hypervisor

D. Hypervisor

Joe, a technician, is tasked with installing Windows Vista on a new PC that came with Windows XP. He would like to preserve the data on the machine in case it is needed later. Which of the following installation methods would be MOST effective for him to use? A. Image creation B. Unattended installation C. Clean install D. In-place upgrade

D. In-place upgrade

Which of the following describes when a child folder has the same permissions as its parent folder? A. Single sign-on B. Propagation C. Administrative share D. Inheritance

D. Inheritance

A user states that their workstation is showing limited or no connectivity and they are unable to access any network shares. The technician verifies that the workstation is configured correctly. They also replace the Ethernet cable from the workstation to the wall port. Which of the following tools should the technician use NEXT in order to continue troubleshooting this issue? A. Toner probe B. Multimeter C. Time domain reflectometer D. Loopback plug

D. Loopback plug

A client has a Windows XP PC that has several unused programs that run on startup. Which of the following utilities can a technician use to disable these programs from running at startup? A. Default programs B. Device Manager C. Performance information and tools D. MSCONFIG

D. MSCONFIG

A newly installed application runs every time the operating system boots causing a delay during startup. Which of the following tools will allow a technician to resolve the problem? A. SFC B. DXDIAG C. REGSRV32 D. MSCONFIG

D. MSCONFIG

Which of the following utilities can a technician use to find out what programs are running at startup? A. SERVICES B. Task Scheduler C. NTLDR D. MSINFO32

D. MSINFO32

A computer user, Joe, was surfing for information on a news site when he reported a screen flicker and then a pop-up appeared on his screen stating the computer was infected with a virus. Joe noticed the title of the pop-up was not from his installed antivirus. Which of the following BEST describes this infection? A. Worm B. Spyware C. Social engineering D. Malware

D. Malware

Which of the following features is a characteristic associated to that of Android-based smartphones? A. Apple App Store B. Closed source SDK C. Proprietary data cable connector D. Open source SDK

D. Open source SDK

A technician needs to verify that a user's computer can connect to a particular server using TCP/IP. Which of the following commands should the technician run? A. MSCONFIG B. IPCONFIG C. NET USE D. PING

D. PING

A user just bought an iPad and wants to connect to their work email. The user's employer has a Microsoft Exchange server for email. Which of the following would the technician configure to allow the user to access email on the iPad? A. DNS, DHCP B. IMAP, SNTP C. Devices are incompatible D. POP3, SMTP

D. POP3, SMTP

Joe, a technician, is sent out to investigate a PC which refuses to turn on for a customer after a recent thunderstorm. Upon arrival, Joe notices a heavy scent of what seems to have been an electrical burn. Which of the following PC components would be MOST likely at fault for the failure? A. ODD B. CPU C. HDD D. PSU

D. PSU

A user has a work laptop configured with a static IP. The user wants to be able to take the laptop home and connect it to their router which uses DHCP. However, the user does not want to manually change their settings every day. Which of the following is the BEST step the user could take to make this possible? A. Setup a VPN on the laptop to store the work IP settings. B. Use the Ethernet port at work and only use Wi-Fi while at home. C. Install an additional NIC in the laptop to access the home network. D. Place the static IP in the alternative field while using DHCP.

D. Place the static IP in the alternative field while using DHCP.

A user has unintentionally and unknowingly hit a key combination that flipped the screen image upside down. Which of the following should a technician do to resolve the user's issues? A. Press the CTRL+CAPS LOCK+ESC key combination on the keyboard. B. Press the CTRL+SHIFT+HOME key combination on the keyboard. C. Press the CTRL+TAB+1 key combination on the keyboard. D. Press the CTRL+ALT+ARROW UP key combination on the keyboard.

D. Press the CTRL+ALT+ARROW UP key combination on the keyboard.

A user belongs to groups that have read permission on a folder and NTFS create permission. Which of the following BEST describes the access the user will have to files in the folder? A. Read and edit existing files but not create new files B. Read and edit existing files and create new files C. Create and read new files but not read or edit existing files D. Read existing files but not edit or create new files

D. Read existing files but not edit or create new files

A technician wants to run a full diagnostic of the file system on a user's hard drive and fix any index errors encountered, but the group policy on the computer prevents this from being executed while in Windows. Which of the following can the technician do to accomplish this? A. Reboot the PC into Recovery Console and run CHKDSK with the /I switch. B. Reboot the PC into Safe Mode and run Disk Defragmenter from the System Tools. C. Reboot the PC into Safe Mode and run Disk Cleanup from the System Tools. D. Reboot the PC into Recovery Console and run CHKDSK with the /R switch.

D. Reboot the PC into Recovery Console and run CHKDSK with the /R switch.

A user reports that their laptop's keyboard has areas where the keys always get stuck together. After disassembling the keyboard to clean it, which of the following processes would be the FIRST step to properly reassemble the keyboard? A. Power on laptop to verify functionality B. Use appropriate hand tools C. Test on another machine D. Refer to manufacturer documentation

D. Refer to manufacturer documentation

Joe, a technician, is tasked with disassembling a laptop to replace its motherboard. Which of the following is the FIRST step he should perform? A. Write down where all the screws go on paper B. Prepare some containers to hold the parts C. Remove the battery and the removable CD-ROM drive D. Refer to manufacturer documentation

D. Refer to manufacturer documentation

Which of the following threats changes system functionality at the operating system level for a malicious purpose by gaining administrative access after being installed by a user? A. Botnet B. Trojan C. Worm D. Rootkit

D. Rootkit

A user is receiving random errors when accessing files commonly used throughout the day. Which of the following actions should the technician take FIRST? A. Move the files to another location B. Run FixMBR C. Convert the file system to NTFS D. Run CHKDSK

D. Run CHKDSK

Joe, a customer, called and stated that since a virus was removed from his PC, Windows is now displaying errors about damaged system files. Which of the following tools should be used to correct the issue? A. TASKKILL B. DISKPART C. CHKDSK D. SFC

D. SFC

Which of the following storage types would be MOST resilient to physical drops and damage within a laptop? A. SAS HDD B. HDD C. RAID HDD D. SSD

D. SSD

A user recently installed a new video driver on a PC but upon boot Windows will not start. Which of the following is the BEST option to correct the issue? A. Automated system recovery B. Emergency repair disks C. FIXBOOT D. Safe mode

D. Safe mode

A technician has just implemented a fix on a user's PC. Which of the following would be the technician's NEXT step? A. Determine cause B. Inform the user C. Document the fix D. Test the fix

D. Test the fix

A user reports their network connection has limited or no connectivity. Which of the following should a technician check FIRST? A. The proper NIC drivers are installed B. The APIPA address has the proper gateway C. The Proxy settings in Internet Options D. The Ethernet cable is connected properly

D. The Ethernet cable is connected properly

Joe, a user, reports that each time his laptop is logged in to the company's headquarters, his system time changes. After Joe returns home, he adjusts the clock, which stays set correctly until the computer is again at the company's headquarters. No other users have reported any issues. Which of the following is MOST likely occurring? A. The domain time controller is incorrect B. The laptop firmware needs to be updated C. The laptop has a malware infection D. The laptop's time zone is incorrectly set

D. The laptop's time zone is incorrectly set

A user in a large corporation reports that they cannot burn a DVD on their Windows 7 Ultimate laptop; they have never burned a DVD on this laptop before. Which of the following would be the MOST likely to be the reason why? A. The drivers for the DVD burner need to be updated. B. The user does not have software to burn DVDs. C. The software for the DVD needs to be updated. D. The user does not have a DVD burner.

D. The user does not have a DVD burner.

A technician installs a new SOHO wireless router to replace a failed router and users report connectivity issues and IP errors. Which of the following is the MOST likely cause? A. Their server has gone down B. There are too many static IP addresses on the network C. The new router's firewall is malfunctioning D. Users need to refresh their IP configuration

D. Users need to refresh their IP configuration

A manager needs to have remote access to the main office at all times. Which of the following is the BEST setup? A. WWAN B. LAN C. MAN D. VPN

D. VPN

Which of the following operating systems can be upgraded using an in-place procedure to Windows 7 Professional x64? A. Windows Vista Professional x86 B. Windows 7 Enterprise x64 C. Windows 7 Starter x86 D. Windows 7 Home Premium x64

D. Windows 7 Home Premium x64

A customer consults a technician about a series of computers that fail to finish an overnight task on a regular basis. The problem seems to only occur early morning between Tuesday and Wednesday, and affects computers running the same operating system. Which of the following Windows features is MOST likely the cause? A. Power Save Mode B. Safe Mode C. Disk Cleanup D. Windows Update

D. Windows Update

A customer states that their wireless stops working a few times a day. They said the problem started when a new neighbor moved in. Which of the following is the MOST likely cause of the issue? A. Neighbors are using the same encryption. B. Neighbors are using the same model router. C. Neighbors have SSID broadcast enabled. D. Wireless channels are overlapping.

D. Wireless channels are overlapping.

A user needs to replicate a large directory containing folders and files from one drive to another. It also contains several empty folders needed for future growth. Which of the following commands should a technician use in order to accomplish this task? A. ATTRIB /S B. RD /S C. COPY /A D. XCOPY /E

D. XCOPY /E

Which of the following BEST describes the difference between batteries used in iOS devices versus Android devices? A. iOS devices batteries are NiMH B. Android device batteries are wirelessly charged C. Android device batteries also work in iOS devices D. iOS device batteries are not replaceable

D. iOS device batteries are not replaceable

Which of the following command line tools will bring up a GUI interface to shutdown a remote PC? A. shutdown -a B. shutdown -f C. shutdown -g D. shutdown -i

D. shutdown -i

Tablets are MOST likely to have which of the following? A. Parallel connector B. DisplayPort C. Swappable batteries D. Multiple screens E. Solid state drive

E. Solid state drive


Related study sets

Strategic Management Exam 1 Review, Strategic Management Exam 2

View Set

Retirement savings and Income Planning Chapter 8

View Set

ARTH 102 Rossmann- Movements of Art

View Set

RSA Archer - Domain 1.0: Business Logic and Configuration

View Set

Chapter 3- Elements of criminal liability

View Set

Chapter 2.7: Visual Communication Design

View Set

Domestic Violence/Abuse/Addiction/Liver Disease

View Set