Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
466 Cards in this Set
- Front
- Back
You have determined that several computers on your company's network need to have the BIOS updated. Which of the following changes to your computer would MOST likely require that you flash a computer's BIOS afterward?
adding memory upgrading CPU replacing the system board changing the boot sequence |
upgrading CPU
|
|
A user reports that he is having problems with his monitor. He explains that his Liquid Crystal display (LCD) is no longer spreading the light over the entire area of the laptop's LCD screen.
inverter deflection yoke electron gun diffuser |
diffuser
|
|
Vincent has a computer with two DVI ports and wants to connect it to an HDMI display. What is the easiest solution?
Install a video adapter card in the PCI slot. Purchase a DVI to HDMI cable or adapter. Connect the HDMI cable to the DVI port. Install a video adapter card in the PCle slot. |
Purchase a DVI to HDMI cable or adapter.
|
|
Abigail works in Europe. She has a laptop with a standard VGA port that she uses for presentations at client sites. When she gets to the United States,she realizes that the companies she's presenting for all have HDMI displays and interfaces. What would you recommend she purchase for her travel bag as the most cost-effective solution?
Purchase anew laptop with both VGA and HDMI connectors. Purchase a portable projector for VGA. Purchase a VGA to HDMI adapter. Purchase an HDMI to DVI cable. |
Purchase a VGA to HDMI adapter.
|
|
Why would you implement a KVM switch?
to segment a network to protect an internal network to cache Web data and images to reduce device needs in a data center |
to reduce device needsina data center
|
|
Your company purchases a new USB mouse for a server. Which statement characterizes this mouse?
You can plug it into a computer while the computer is on. You must connect it to the computer through a parallel port. You must restart the computer immediately after connecting it. You cannot connect it if another USB device is already connected to the computer. |
You can plug it into a computer while the computer is on.
|
|
A user is considering purchasing a printer capable of 1200 dpi. What does this indicate?
power capability print speed print resolution communication speed |
print resolution
|
|
Which printer upgrade option allows a printer to act as a standalone printer on a network?
NIC RAM duplexer finisher |
NIC
|
|
One of your clients needs to print to multi-part forms. Which printer type should you advise your client to consider?
laser inkjet thermal dot-matrix |
dot-matrix
|
|
What does a dot-matrix printer use to ensure that ink is transferred onto a piece of paper?
ink nozzles electrostatic charges print head pins heat fuser |
print head pins
|
|
Which printer type uses a tractor feed?
laser inkjet dot matrix thermal |
dot matrix
|
|
Which printer uses heat to transfer thermal wax onto paper?
ink jet dot matrix thermal laser |
thermal
|
|
You are responsible for performing all routine maintenance on your company's laser printers. Which of the following maintenance tasks would result in the need to reset the page count?
replacing the toner installing the maintenance kit calibrating the printer cleaning the printer |
installing the maintenance kit
|
|
You are responsible for performing routine maintenance on your company's laser printers. Which of the following routine maintenance does NOT require that you disconnect the laser printer from its power source?
replacing the toner installing the maintenance kit calibrating the printer cleaning the printer |
calibrating the printer
|
|
Which statement is true for Advanced Technology Extended (ATX) motherboards?
An ATX motherboard has a 12-pin power connector. The processor, memory, and expansion slots on an ATX motherboard are all in line with each other. An ATX motherboard can support a maximum of seven expansion slots. An ATX motherboard can support Extended Data Output (EDO) Random Access Memory (RAM). |
An ATX motherboard can support a maximum of seven expansion slots. |
|
Which component detects both single-bit and multi-bit errors?
parity bit ECC L1 cache L2 cache |
ECC
|
|
Which hardware component will require the least amount of time to replace?
motherboard memory module power supply unit network interface card |
memory module
|
|
A graphics designer asks you to ensure that her computer supports scalable link interface (SLl).What is the purpose of scalable link interface (SLI) technology?
It groups two or more network links together to increase performance. It groups two video cards together to increase video performance It utilizes multiple serial connections to increase performance. It provides scalability for motherboard serial connections. |
It groups two or more network links together toincrease performance.
|
|
What is the name of the media of a hard drive where data is stored?
head actuator disk platter read/write heads firmware |
disk platter
|
|
For which type of device should you use the Safely Remove Hardware icon to stop the device's operation before removing it from the computer?
CD-ROMdrive hard drive DVD drive USB flashdrive |
USB flashdrive
|
|
Which media types could be used to transport a 1,100 MB file? (Choose two.)
CD CD-RW DVD+R DDS-3 |
DVD+R
DDS-3 |
|
You have decided to enable overclocking to increase the performance of a computer. On which computer components can you specifically enable overclocking? (Choose all that apply.)
motherboard processor system bus RAM hard drive |
processor
system bus |
|
You have a motherboard that includes an LGA 1155 CPU socket. Which CPU would NOT be supported with this motherboard?
Core 2 Duo Core i7 Celeron Xeon |
Core 2 Duo
|
|
Which of the following CPU sockets will NOT support an AMD Opteron CPU?
F FM1 940 AM2 |
FM1
|
|
What is the primary purpose of an integrated GPU?
processing gaming applications processing video and graphics providing additional memory providing video capture capability |
processing video and graphics
|
|
Which architecture is used to build central processing unit (CPU) sockets?
CHS PGA ATA EIDE |
PGA
|
|
Which component can you connect to a Zero Insertion Force (ZIF) socket?
central processing unit (CPU) single inline memory module (SIMM) dynamic random access memory(DRAM) electrically erasable programmable read only memory(EEPROM) |
central processing unit (CPU)
|
|
Which technology allows a central processing unit (CPU) to execute two separate instructions concurrently?
Network Access Protection (NAP) Hyperthreading Hyper-V Serial Advanced Technology Attachment (SATA) |
Hyperthreading
|
|
Steven's computer includes a hard drive that connects to the computer's motherboard by means of a 7-wire cable with a single interface. Which hard drive interface is used by Steven's disk drive?
IDE EIDE SCSI Serial ATA |
Serial ATA
|
|
Which hard drive specification has the fastest theoretical busspeed?
SATA 1 SATA 2 SATA 3 IEEE 1394 FireWire |
SATA 3
|
|
Which operating frequency band is usedby Bluetooth technology?
|
2.4 GHz to 2.485 GHz
|
|
You have purchased a new 20-pin power supply to replace one that failed. However,the motherboard only has a 24-pin connector. What should you do?
Purchase a 24-pin power supply. Plug the 20-pin power supply into the motherboard, leaving pins 1,2, 13, and14 onthe motherboard unconnected. Plug the 20-pin power supply into the motherboard,leaving pins 11, 12, 23, and 24 on the motherboard unconnected. Purchase a motherboard with a 20-pin powerconnector. Change the setting on the voltage selector switch |
Plug the 20-pin power supply into the motherboard,leaving pins 11, 12, 23, and 24 on the motherboard unconnected.
|
|
You are an IT technician for a small computer store. You are designing a new gaming PC for a customer. You need to ensure that it provides the capabilities that will be needed by this type of PC. Which of the following should be a concern? (Choose all that apply.)
motherboard CPU graphics card sound card |
CPU
graphics card sound card |
|
Which cable connector is used in a 1000BaseT network?
SC ST MTRJ RJ-45 |
RJ-45
|
|
Jack has several areas in office where he needs to install cabling. He has coaxial cable on hand,and he would like to use splitters to connect the different computers and areas. If he runs multiple splitters ,which effects should he anticipate? (Choose all that apply.)
signal loss connection speed issues service quality issues more collisions fewer collisions |
signal loss
connection speed issues service quality issues |
|
You need to connect two computers for a customer. The customer does not have a network and does not wish to purchase a concentrator , but both computers include functional Ethernet network interface cards with RJ-45 connectors. Which component will allow you to meet your customer's needs?
an Accelerated Graphics Port (AGP) card a passive hub a crossover cable a protocol analyzer |
a crossover cable
|
|
Which network topology supports the longest maximum cable length?
10Base2 10Base5 10BaseF 100BaseT |
10BaseF
|
|
For what purpose have IP addresses in the 192.168.0.0 through 192.168.255.255 range been reserved?
multicasting private networks military installations only government organizations other than the military |
private networks
|
|
Which address is a MAC address?
124.24.0.2 AD-4F-C1-A9-12-CB 00120193:06F1A345CA11 1234:EF14:45:ADD1:EA23:222:1290:A 122A::ABCA:0:0 :2100 ACA1: 1345:1::123.23.0.1 |
AD-4F-C1-A9-12-CB
|
|
Which properties are true regarding IPv6? (Choose two.)
It has 4 billion available addresses It has 340 undecillion available addresses It uses 32-bit addresses It uses 128-bit addresses |
It has 340undecillion available addresses
It uses 128-bit addresses |
|
Jeffrey wants to purchase some software for his department from Dreamsuites.com. After researching company policies, you inform him that he can only make the purchase if it is from a secure site. Which port and protocol are qualify as secure?
Port 23 Telnet Port 443 HTTPS Port 80 HTTP Port 110 POP3 |
Port 443 HTTPS
|
|
You administer your company's 100BaseTX Ethernet network. TCP/IP is the networking protocol used on the network. You want the routers on the network to send you notices when they have exceeded specified performance thresholds. Which protocol should you use to enable the routers to send the notices?
ARP SMTP SNMP Telnet |
SNMP (Simple Network Management Protocol)
|
|
You want to set up a wireless network with data throughput of 54 Mbps. Which two wireless specifications will provide a data throughput of 54 Mbps? (Choose two.)
802.11 802.11a 802.11b 802.11g |
802.11a
802.11g |
|
Which technology has the SHORTEST maximum range?
Bluetooth 1.0 Bluetooth 2.0 802.11a 802.11b |
Bluetooth 2.0
|
|
How should you configure the Internet Protocol (TCP/IP) Properties dialogbox on the user's laptop while expending the least administrative effort?
Configure the General tab to use the DHCP server at the headoffice. Configure a static IP address from the branch office network range on the Alternate Configuration tab. Configure the Generaltab and the Alternate Configuration tab to use the DHCP server. Configure a static IP address from the head office network range on the General tab.Configure a static IP address from the branch office network range on the Alternate Configuration tab. Configure the General tab and the Alternate Configuration tab to use a static IP address from the branch office network range. |
Configure the General tab to use the DHCP server at the headoffice. Configure a static IP address from the branch office network range on the Alternate Configuration tab.
|
|
Your company has both a wired and a wireless network. You have been asked to increase the security of the wireless network. Which of the followin goptions should you implement?
SSID broadcast war driving rogue access points MAC filtering |
MAC filtering
|
|
A salesman for your company travels primarily in Europe and Asia. You need to provide him with a wireless Internet technology that will work internationally on his laptop and that can be installed easily when he arrives at a new location. Which technology should you install?
CDMA cellular GSM cellular satellite Bluetooth |
GSM cellular
|
|
Which technology is the SLOWEST?
DSL cable fiber satellite |
satellite
|
|
What is the purpose of PoE?
It allows a network of computers to appear to the Internet as a single entity. It provides a file storage solution that is attached to the network. It allows an Ethernet connection to be used as both a network and power connection. It provides a cryptographic hardware platform for securely storing data. |
It allows an Ethernet connection to be used as both a network and power connection.
|
|
Which hardware device operates at the data-link layer of the OpenSystems Interconnect ion (OSI) model and ensures that data is delivered only to the destination port?
switch hub bridge router |
switch
|
|
You need to measure the voltage supplied by power connectors and power supplies. Which tool should you use?
ohmmeter multimeter SCSI terminator Windows Resource Meter |
multimeter
|
|
Which multimeter setting should you use to test a computer's power supply output?
Ohms Continuity AC voltage DC voltage |
DC voltage
|
|
Zachary has a desktop computer that he is replacing with a laptop. He wants to know why everyone is raving over their new flash memory drives. What is the number one reason to purchase a laptop with a flash memory drive rather than a conventional hard drive?
quiet sound mechanical motor ease of backup ease of partitioning |
quiet sound
|
|
You work in a customer call center.Martin is on the phone inquiring about the difference between solid state drives (SSDs),hybrids, and magnetic hard drives for his laptop. He is only going to be web surfing,emailing, and creating documents. Which hard drive would provide the best performance and reliability?
hybrid solid state drive (SSD) magnetic hard drive eSata external drive |
solid state drive (SSD)
|
|
Verigon hired you to train employees on how to repair computers and mobile devices. Which term below do you think is highly important to share with your trainees prior to teaching them to replace broken screens?
touch pad swiping digitizer microphone |
digitizer
|
|
Raymond has contacted your IT department for assistance in replacing his webcam on his laptop. What is the first step he should take?
Shutdown the computer and remove the battery. Remove the screws from the bottom of the laptop. Remove the keyboard. Disconnect the laptop from all external power sources. |
Disconnect the laptop from all external power sources.
|
|
Adele works as a graphic artist for a media publishing company. She is shopping for a laptop that can give her the versatility of landscape and portrait modes without having to purchase two monitors. What solution do you recommend?
docking station digitizer rotating screen LCD display |
rotating screen
|
|
You need to purchase a device that will allow you to turn your laptop computer into a desktop computer while you are in your office. The device must include slots for extra storage bays and a DVD drive. Which device should you purchase?
docking station port replicator UPS transformer |
docking station
|
|
lnterconn is a marketing firm that wants to help their employees do their job more efficiently.The company wants their computer technicians to be able to record video, upload the video feed to the cloud, and talk to customers while they perform on-site repairs. Which device should you recommend?
smart watch e-reader smart glasses phablet |
smart glasses
|
|
You need to establish a Bluetooth connection between an iPhone and a Bluetooth headset. What is the correct order for establishing the connection on the iPhone?
Enable Bluetooth. Enable pairing. Find and select the device. Enter the appropriate PIN. Enable Bluetooth.Find and select the device. Enable pairing.Enter the appropriate PIN. Enable pairing. Enable Bluetooth. Find and select the device. Enter the appropriate PIN. Enable Bluetooth. Enable pairing.Enter the appropriate PIN. Find and select the device. |
Enable Bluetooth.Enable pairing. Find andselect thedevice. Enter the appropriate PIN.
|
|
Why should you go through the trouble of finding new slot covers and installing them on the unused slots? (Choose two.)
to keep foreign objects out of the case to keep radiation exposure at a minimum to properly ground the computer motherboard to dampen the noise coming from inside the computer to keep air circulating properly inside the computer case |
to keep foreign objects outof the case
to keep air circulating properly inside the computer case |
|
A user has been using his desktop computer on a daily basis for over a year now. Today,when he starts your computer, he notices that the computer does not power on. You have been dispatched to troubleshoot this problem. What could be the reason for this?
The memory is faulty. The power supply is bad. The CPU is overheated. The hard disk has crashed. |
The power supply is bad.
|
|
You are teaching a one-week computer repair class. Early Monday morning,you discover that a student from the previous week protected his computer with a BIOS startup password, and you are unable to contact the student to obtain the password.This week's class starts in one hour,and all seats are taken. What should you do to make the computer available to a student in this week's class?
Replace the CMOS chip. Remove the CMOS battery. Replace the system board. Use a system board jumper. Use your Windows Administrator password |
Use a systemboard jumper.
|
|
George,a user, receives a blue screen error when attempting to access a third-party application on his computer. When you are troubleshooting the computer,you get a blue screen error that lists the same memory location for the error. What should you do?
Replace the defective CPU. Replace the defective memory module. Replace the defective hard drive. Uninstall and reinstall the applications. |
Replace the defective memory module.
|
|
You need to upgrade your Windows Vista computer to Windows 7. You put the Windows 7 DVD into its drive and reboot the system. The system does not boot from the DVD. What should you do first to solve this problem?
Replace the DVD drive. Configure BIOS to boot from the DVD drive. Make sure the DVD drive is set to master. Change the disk format from ISO 9660 to Joliet. |
Configure BIOS to boot from the DVD drive.
|
|
You replaced a processor with a newer processor that should run at a much higher speed. However, your system does not identify the processor correctly, and the processor runs at the same speed as the old processor. What could you do to correct this problem?
Update the BIOS. Reseat the processor. Flip the turbo switch on the motherboard. Change the voltage setting for the processor. |
Update the BIOS.
|
|
A technician is dispatch to troubleshoot a user's computer. After performing diagnostics, the technician determines that drive thrashing is occurring.What are the factors that can affect this? (Choose all that apply.)
hard drive memory paging file running processes |
hard drive
memory paging file running processes |
|
While performing routine maintenance for a customer, you hear a grinding noise coming from inside the computer case. Which component should you suggest the customer replace?
power supply hard drive keyboard sound card |
hard drive
|
|
A user needs the video capability in his computer upgraded to support a new graphics application. The computer includes an on-board video card. You install a new video card in the computer. You need to disable the on-board video card. Where should this card be disabled?
in Control Panel in the System Configuration utility in Device Manager in the BIOS |
in the BIOS
|
|
A user complains that the image on his monitor flickers a lot. This flickering occurs no matter which application the user has opened. What should you do?
Replace the monitor. Configure the video card driver to use a lower refresh rate. Configure the video card driver to use a higher refresh rate. Upgrade the video card drivers. |
Configure the video card driverto use a higher refresh rate.
|
|
You are a desktop administrator for Nutex Corporation.A user reports that he is unable to access network resources. You notice a break in the network cable. You need to create a new network cable to connect the computer to the RJ-45 jack in the wall. What should you use to connect the end of the cable to an RJ-45 connector?
Time-domain reflectometer Optical tester Wire crimper Pliers |
Wire crimper
|
|
A user is not able to access shared folders on the network. While troubleshooting the problem. the technician first checks for the link lights on the Network Interface Card (NIC). The technician observes that the link lights are not on or blinking on the NIC. Which actions should the technician perform to resolve the problem by using the least amount of administrative effort? (Choose two.)
Run the ipconfig /release command. Check that the switch is on and the other end of the cable is connected to the switch. Replace the network cable. Replace the NIC. Run the ipconfig /flushdns command. |
Check that the switch is on and the other end of the cable is connected to the switch.
Replace the network cable. |
|
Users are having trouble accessing resources by computer or host name.Which device is likely causing the problem?
DHCP server DNS server IIS server firewall |
DNS server
|
|
You are checking connectivity between two devices using the ping command. You want the ping command to continue sending messages until interrupted. Which parameter of the ping command should you use?
-t -a -f -v |
-t |
|
You need to obtain the IP address for your local Windows Vista computer. Which tool should you use?
ping ipconfig telnet nslookup |
ipconfig |
|
You are the network administrator for Nutex Corporation.You have configured a wireless network for a group of users to provide Internet access. However, users complain that they are facing intermittent loss of wireless connection. You have verified the hardware and software configuration of both your Asymmetric Digital Subscriber Line (ADSL) modem and wireless router and your DSL line from the Internet SeNice Provider (ISP). What could be causing your problems?
DSL filters cordless phones wireless router television set |
cordless phones
|
|
A user complains that his internal wireless network card in his laptop is no longer functioning. After troubleshooting, you decide to replace the wireless network card. You replace the wireless network card with the same model as the old card. You connect the internal antenna cables. You then reboot the computer. What should you do next?
Install the latest drivers for the wireless card. Flash the BIOS. Connect to the wireless network. Configure the wireless network settings. |
Install the latest drivers for the wireless card.
|
|
You frequently operate your Windows 7 portable computer on battery power when you are traveling. When you use battery power, your Windows 7 computer is configured to enter standby mode after 15 minutes of inactivity . Which components are turned off in this mode? (Choose two.)
the CPU the monitor the keyboard the hard disk |
the monitor the hard disk |
|
Au ser named George reports that his portable computer overheats frequently. You inspect George's computer and discover that the air vents are open. What is the MOST likely cause of this problem?
Dust has accumulated on the heatsink fins.· The fan is not working. The battery has become faulty. The AC adapter is not working. |
Dust has accumulated on the heatsink fins.
|
|
A user contacts you regarding a problem with his laptop's keyboard. Several keys have stopped functioning. This problem occurs in multiple applications,even after rebooting the computer. What should you have the user do FIRST?
Clean the keyboard. Enable the keyboard in the BIOS. Plug in an external keyboard. Replace the internal keyboard |
Plugin an external keyboard.
|
|
A user contacts you about a problem with his notebook computer. The battery for his notebook computer will no longer hold a charge. He removed the battery, but the computer will not work when plugged into the AC outlet. A new battery is on order, but will not arrive until next week. The user needs the computer to be operational for a meeting tomorrow. You want to provide the easiest method to restore operation. What should you instruct him to do?
Wait until the new battery arrives next week. Fully charge the old battery overnight, and then boot the computer. Change the battery setting in the computer's BIOS. Re-insert the depleted battery in the computer, and then boot the computer. |
Re-insert the depleted battery in the computer, and then boot the computer.
|
|
You are troubleshooting a problem with a printer attached to a Windows 2008 computer. Several print jobs are queued and the printer is online, but the print jobs are not printing. Which two conditions could cause the problem? (Choose two.)
Printing is paused. The printer is in energy-save mode. There is a problem with the spooler. The disk used for spooling is extremely fragmented. |
Printing is paused.
There is a problem with the spooler. |
|
You are an IT technician for a consulting company. You installed a new inkjet printer and successfully printed a test page. Later, users complained that they were unable to print any documents on the new printer. What should you verify first?
availability of paper printer driver ink cartridge print head |
availability of paper
|
|
You purchase an old inkjet printer for your company. When you print a test page,extra horizontal lines are printed all over the page.What should you do FIRST to print a test page successfully?
Clean the print head. Refill the printer ink cartridge. Clean the printer paper feeder. Use high-quality paper for printing. |
Clean the print head
|
|
You receive a technical support call from a department manager.She reports that the laser printer in her department prints only blank pages. A telephone interview reveals that the paper is not jamming in the printer and that the problem began occurring after the toner cartridge was replaced. What is the most likely cause of the problem?
The printer needs more RAM. The feed rollers are defective. The photosensitive drum was not fully discharged. The sealing tape was not removed from the toner cartridge. |
The sealing tape was not removed from the toner cartridge.
|
|
Your laser printer produces accurate images that smear easily. Which printer component should you examine?
the fuser the feed roller the transfer corona the photosensitive drum |
the fuser |
|
A user reports that his dot-matrix printer is printing dark and clear on the left side of the paper but that the print is very light on the right side of the paper. What should you do to correct this problem with the printer?
Adjust the platen. Replace the ribbon. Clean the ink nozzle. Align the print head. Adjust the transfer roller. Clear debris from the tractor feed. |
Adjust the platen
|
|
Every time a Windows Vista computer boots, you receive an error message stating that the cover was previously removed. You want to prevent this alert from being displayed. In which location should you disable this alert?
in the System Configuration utility in Event Viewer in the BIOS in Device Manager |
in the BIOS
|
|
A computer uses an LCD monitor. You need to deploy the highest resolution available for a high-end application. Which of the list LCD technology will provide this?
XGA QXGA SXGA UXGA WXGA |
QXGA
|
|
Which characteristic distinguishes IEEE 1394 from USB 2.0?
USB supports hot swapping. IEEE 1394 supports hot swapping. USB supports more devices on a single bus. IEEE 1394 supports more devices on a single bus |
USB supports more devices on a single bus.
|
|
Which type of keyboarddoes NOT change the Num Lock status LED when you toggle the key?
wireless keyboard multimedia keyboard keyboard on a portable computer keyboard on a tablet PC |
wireless keyboard
|
|
Which biometric authentication device scans the pattern of blood vessels in the back of the eye?
aniris scanner a retinal scanner a face recognitionscanner a signature scanner |
a retinal scanner
|
|
What is thepurpose of configuring printer availability on the Advanced tabof a printer's Properties dialog box?
Itconfigures the orientation that is available. Itconfigures the paper and print quality that is available. Itconfigures the daysand times that a printer is available. Itconfigures the users to whom the printer is available. |
Itconfigures the days and times thata printeris available.
|
|
Youare required to print a large number of pages on an inkjet printer in the minimum possible time. What should you do?
Specify low-resolution printing. Specify high-resolution printing. Change page orientation of allpages to Portrait. Change page orientation of allpages to Landscape. |
Specify low-resolution printing.
|
|
Which components are parts of a laser printer? (Choose all that apply.)
fuser ribbon platen main control board |
fuser
main control board |
|
What does an inkjet printer use to push ink onto paper?
a nozzle a moving pin apiezoelectriccrystal an electrostaticcharge |
a piezoelectric crystal
|
|
During which stage of the laser printing process is the toner permanently bonded to the paper?
fusing exposing cleaning developing transferring charging |
fusing |
|
What occurs duringthe cleaning phaseof laser printing?
Thelaser writesan image on the imaging drum. Thetransfer corona applies a positive charge to the paper. Thedischarge lamp neutralizes theimaging drum. The primary corona wire applies a uniformcharge on the imagingdrum |
The discharge lamp neutralizes the imaging drum.
|
|
You are responsible for performing all routine maintenance on yourcompany's dot-matrix printers. Which of the following is NOT considered as part of routine maintenance for these printers?
Replace the paper. Replace the print head. Replace the ribbon. Calibrate the printer. |
Calibrate the printer.
|
|
Which component on an AdvancedTechnology Extended (ATX)motherboard supportscommunication between the central processing unit(CPU) and random access memory (RAM)?
Southbridge chip Northbridge chip Advanced Technology Attachment (ATA) interface firmware |
Northbridge chip
|
|
With regards to RAM memory,which speed denotes the fastest memory?
7 ns 8 ns 10 ns 60 ns |
7 ns |
|
When Kevin was hired, he inherited a box of different types of RAM. Which RAM would you ask him to set aside ifyou needed to increase the number of data wiresavailable from64 to 128?
single channel dualchannel single-sided double-sided
|
dual channel |
|
You need to install several USB devices on a server. You have been asked to attach USB hubs to the computer. Only one USB port is available. How many hubs can you daisy chain using the single port?
2 3 4 5 |
5 |
|
Which serial communication standards provide hot-swap capability? (Choose two.)
USB PS/2 IRS-232C IEEE 1394
|
USB IEEE 1394 |
|
Which RAIDlevel duplicates a partition on another physicaldisk, providing two identical copiesof the data?
Level O Level 1 Level 2 Level 3 Level 4 Level 5 |
Level 1 |
|
Where is the MBR stored?
BIOS CMOS hard disk paging file |
hard disk |
|
Which built-in componentof a processor prevents the processor from having to wait for code and data from the main memory?
Level 1 (L1) cache Level 2 (L2) cache Address bus Front-side bus |
Level 1 (L1) cache
|
|
Which processor technology contains two processor cores in a single processor package andprovides all of the advantages of a multi-processor computer?
Hyper-Threading technology CPUthrottle technology dual-coretechnology MMX technology i5 technology |
dual-core technology
|
|
You have decided to enableoverclocking to increase theperformance of a computer. On which computer components can you specifically enable overclocking?(Choose all that apply.)
motherboard processor system bus RAM hard drive |
processor
system bus |
|
You wantto ensure thata computer has a 64-bitarchitecture and is able to fully utilize64-bit computing. Which component is NOT important for thispurpose?
processor operating system memory device drivers |
memory
|
|
Which two systemcomponents should you check to avoid CPUoverheating? (Choose two.)
heatsink CPUfan motherboard power supply unit RAM |
heat sink
CPU fan |
|
Which component is always locatedon the CPU and accelerates the processing of instructions?
the L1 cache the L2 cache the heat sink the address bus |
the L1 cache
|
|
Which benefit does the Hyperthreading (HT) technology in aprocessor provide?
reduces workloadcapacity allows the resources to sit idle usesvirtual processors to perform multitasking usestwo or more physical processors to function |
uses virtual processors to performmultitasking
|
|
What is theoperating range for Class 2 Bluetooth devices?
1O meters or 33 feet 1 meter or 3 feet 100 meters or 328 feet 200 meters or 656feet |
1O meters or 33 feet
|
|
What is themaximum data transmission speed for Bluetooth technology?
3 Mbps 11 Mbps 54 Mbps 100 Mbps |
3 Mbps
|
|
You have to interconnect a notebook computer and a cell phone. The notebook computer supports Bluetooth, USB, FireWire,and IEEE 1294 connections. However, you do nothave any cables to connect the two devicesand do not want to purchase any. What should you do?
Enable USB technologyon both the computer and the cell phone, and then connect the two. Enable Bluetooth technology on boththe computer and the cellphone, and then connect the two. Enable FireWire technology onboth thecomputer and the cell phone, and then connectthe two. Enable IEEE 1284 technology on both the computer and the cell phone, and then connectthe two. |
Enable Bluetooth technology on both the computer and thecell phone, andthen connect the two.
|
|
You are explaining the significance of the wires running froma power supply. The Power Good signal sends power to the motherboard to indicate that the electrical power is sufficient, and can prevent the computer from booting. Which voltage isused by the Power Good signal?
+3.3 -5 +5 -12 +12 |
+5 |
|
You are creating a crossover cable. You know that each end of the crossover cable must be configured differently . Which pins contain the Blue wire?
Pin 3/Pin 1 Pin 6/Pin 2 Pin 4/Pin 4 Pin 5/Pin 5 |
Pin 4/Pin 4
|
|
Which unshielded twisted pair (UTP) cable supports data transfer up to 100 Mbps?
CAT5 CAT3 CAT2 |
CAT5
|
|
Which typeof cablecan operate at up to 10 gigabits per second (Gbps)?
CAT3 CAT5 CAT5e CAT6 |
CAT5
|
|
Which network medium is the least susceptible to EMI or signal capture?
coaxial fiber-optic shielded twisted-pair unshielded twisted-pair |
fiber-optic
|
|
What is theminimum category of UTP cableused with 1OBaseT?
Category 2 Category 3 Category 5 Category 5e Category 6 |
Category 3
|
|
What is the network prefix that is used to denote an unsubnetted Class C IP address?
/a /16 /24 /32 |
/24
|
|
Which type of address does a hardware vendor assign?
Internetzip code Logical network address Physical device address Physical Internet address |
Physical device address
|
|
Which TCP/IPconfiguration information must a computer on a network havebefore it can communicate with the Internet? (Choose three.)
public key subnet mask TCP/IP address default gateway FTPserver address proxy server address MAC address of router |
subnet mask
TCP/IPaddress default gateway |
|
You administer computers on a Microsoft Windows 2003 TCP/IP network. On the network, you want to use a domainname-to-Internet Protocol (IP) address name resolutionsystem that providesa central database on a server to resolve domainnames to IP addresses. Whichoptions should you implement on your network?
the Domain Name System (DNS) the HOSTS file the LMHOSTS file theWindows Internet Name Service (WINS) |
the Domain Name System(DNS)
|
|
Youadminister a TCP/IP network. You want to enable the hosts on your network to be automatically configuredwith IP configurations,such as IP address,subnet mask and default gateway address. The IP configurations shouldbe leased to the clients for a limited period. Whichprotocol should you use to accomplish this task?
BOOTP DHCP HTTP IPP SMTP |
DHCP
|
|
You use acomputer named Wkst1on a TCP/IP network,whichis installed with an application that usesUDP to send a file fromyour computer to a computer named Wkst2 . Datacollisions occur, and several datapackets are lost during transmission. What will most likely occur as a result of losing the packets duringtransmission? (Choose two.)
The protocol will drop the packets. The application will drop the packets. The protocol will automatically retransmit thepackets. The application will automatically retransmit the packets. |
The protocol will drop the packets.
The application will automatically retransmit the packets |
|
Which transmission mode is usedin 802.11 WLANs?
mixed mode simplex mode full-duplex mode half-duplex mode |
half-duplex mode
|
|
Which radio frequency band does the 802.11b standard use?
1.9 GHz 2.4 GHz 4.3 GHz 5.0 GHz |
2.4 GHz
|
|
A user needs to connect to a wireless network. Whichinformation must be provided to connect?
access point (AP) Service Set Identifier (SSID) Wired Equivalent Privacy (WEP) Wi-Fi Protected Access (WPA) |
Service Set Identifier (SSID)
|
|
Your company has a wireless network for its small office network. The wireless network does not broadcast its Service Set ID (SSID). You configure a user's Windows Vista computer to connect to the wireless network by manually setting the SSID. You need to ensure that the user's computer does not send probe requests to discover if the wireless network is in range. What should you do?
Ensure the Connect automatically when this network is in range option on the Connections tab of the wireless connection is selected. Ensure the Connect even if the network is not broadcasting option on the Connections tab of the wireless connection is selected. Ensure the Connect automatically when this network is in range option on the Connections tab of the wireless connection is cleared. Ensure the Connect even if the network is not broadcasting option on the Connections tab of the wireless connection is cleared.
|
Ensure the Connect even if the network is not broadcasting option on the Connectionstab of the wireless connection is cleared
|
|
Which technology has the LONGEST amount of latency?
F1 dial-up satellite DSL |
satellite
|
|
Which Internet connection has a line-of-sight requirement?
dial-up DSL cable satellite |
satellite
|
|
Which statement is incorrect for routers?
Routing occurs at OSI Layer 4, the Transport layer. Routers are used to forward data packets across networks. Routers are used to establish a connection between two local area networks (LANs) or wide area networks (WANs) or a LAN and its Internet Service Provider (ISP). Routers can use the Internet Control Message Protocol {ICMP) protocol to communicate with other routers.
|
Routing occurs at OSILayer 4,the Transport layer.
|
|
Which device is also known as a base station?
hub switch repeater access point |
access point
|
|
Multimeters have various settings to aid you in isolating problems. Which multimeter check is always performed with the power to the system turned off?
Current check AC Voltage check Resistance check DC Voltage check Ripple Voltage check |
Resistance check
|
|
Last year, your department replaced all of the desktop computers with laptops. Recently, your company adopted a new minimum standards policy that requires a memory upgrade for the majority of the new laptops.Which type(s) o fmemory could be installed in the new laptops? (Choose all that apply.)
So-DIMM Micro-DIMM SIMMS DIMMS RIMMS CRIMMS |
So-DIMM
Micro-DIMM |
|
You want to upgrade the memory on a laptop. You unplug the AC adapter and remove the battery. What should you do next?
Remove the memory. Put on an anti-static wrist strap. Remove the CMOS battery. Disconnect the power supply from the motherboard |
Put on an anti-static wrist strap.
|
|
Which built-in laptop device below would be of the most use when conducting a meeting with a person in another location?
Digitizer Wi-Fi antenna Webcam Microphone |
Webcam
|
|
Cheryl is an avid gamer. She needs to purchase a new laptop for personal use, but she is a bit confused about which type of display to order. She needs a display that is the best suited for gaming, but she does not want to spend more than necessary. Which display type or feature should you recommend?
TN (TTL type) IPS LED OLED |
TN (TTL type)
|
|
When your company issued you a laptop computer, you were also given a port replicator. Which statement best describes the function of this device?
A port replicator connects a laptop to multiple peripherals. A port replicator connects a serial port to multiple modems. A port replicator connects a workstation to mirrored hard disks. A port replicator connects a backup server to multiple workstations. |
A port replicator connects a laptop to multiple peripherals.
|
|
You are providing a training class for several new salesmen who have been issues a laptop computer. As part of this training, you must ensure that you instruct them on the proper use of the Function key on their laptops.Which of the following features CANNOT be controlled using that key?
mute speaker volume mute microphone volume increase speaker volume decrease speaker volume
|
mute microphone volume
|
|
Denise has decided to start a workout regimen to improve her health. Her doctor recommends that she keep track of her workout regimen more efficiently. Which device(s) below would you recommend? (Choose all that apply.)
smart watch fitness monitor smart glasses smartphone |
smart watch
fitness monitor |
|
Kathleen wants to configure her iPhone so that her iPad can wirelessly use the iPhone's Internet connection. Which feature should she use?
infrared Bluetooth USB tethering |
tethering
|
|
You have begun the process of replacing the CPU in your computer. You must ensure that the motherboard recognizes the new CPU. What should you do first?
Update the driver. Update the firmware. Access the motherboard vendor's Web site to find out if the CPU is compatible with the motherboard. Contact the motherboard vendor to inquire about compatibility. |
Update the firmware.
|
|
After you start your computer, you hear an unusual, high-pitched noise. The source of the noise is the fan mounted inside the power supply. After a few minutes, the noise goes away. Which action should you take?
Replace the fan assembly. Replace the power supply. Replace the bearings inside the fan motor. Lubricate the bearings inside the fan motor. Disable the power supply fan,and install a coolingfan card in an unoccupied PCI or ISA slot. |
Replace the power supply
|
|
A user has recently moved to the United States from the United Kingdom. He contacts you asking how to switch his desktop computer to the appropriate voltage. What should you tell him to do?
Slide the power supply switch on the back of the computer to the appropriate voltage. Slide the switch on the motherboard to the appropriate voltage. Slide the switch on the inside of the power supply to the appropriate voltage. Replace the power supply |
Slide the power supply switch on the back of the computer to theappropriate voltage.
|
|
A computer receives a parity check error message. Which component should you check first?
hard drive motherboard video card memory |
memory
|
|
You are instructing new IT technicians on the reasons why a computer's complementary metal-oxide semiconductor (CMOS) battery should be replaced. Which event is an early indication that you may need to replace it?
Parity errors occur at startup. A hard disk on the computer fails. The computer's power supply fails. The computer's internal clock loses time at startup. |
The computer's internal clock loses time at startup.
|
|
You perform several hardware upgrades on a user's computer. You notice that the computer has an AMI BIOS. After completing the upgrades, you boot the computer. You hear seven short beeps. Which component should you check?
video card memory CPU keyboard |
CPU
|
|
A user complains that his computer is taking a long time to boot. During the boot process, you observe that the hard drive activity light is staying on. You discover that the hard drive is nearing its maximum capacity. The computer contains a single 150-GB hard drive. What should you do?
Add an identical hard drive, and configure a RAID-0 volume. Add an identical hard drive,and configure a RAID-1 volume. Add an identical hard drive, and configure a RAID-5 volume. Defragment the hard drive |
Add an identical hard drive, and configure a RAID-0 volume.
|
|
In the past year, several hard drives in your company's computers failed without warning . Allof the failed drives were replaced, but management is concerned that this will become an increasing problem because of the number of older computers in use. They have asked you to implement a technology that detects failinghard drives by analyzing the hard drive and providing a warning of impending failure.Which technology should you implement?
S.M.A.R.T. throttling overclocking hyper-threading |
S.M.A.R.T. (Self-Monitoring Analysis and Reporting Technology)
|
|
You are troubleshooting a problem with a Windows XP Professional computer. When you boot up the computer, you hear the hard disks start,the computer beeps once, and everything appears normal except the display. The display is blank. You confirm that the monitor's power switch is on and the monitor is plugged in. What should you do next to troubleshoot this problem?
Replace the monitor. Replace the video card. Replace the power supply. Install new video display drivers |
Replace the monitor.
|
|
Your computer has been operating with out problems for some time, but on your most recent startup, nothing appears on the monitor screen. The lights for the keyboard,floppy drive,and hard disk flash at startup. Your computer has an American Megatrends, Inc.(AMI) BIOS program, and the computer generates one long beep followed by eight short beeps at startup. Which item is most likely to be defective?
the hard disk the video card the floppy disk the central processing unit (CPU) |
the video card
(The beep code generated by the power-on self-test (POST) in this situation indicates a missing or defective video card) |
|
A user reports that his computer is having trouble accessing the Ethernet network. You need to trace the network cable back to the central wiring closet. Which tool should you use?
a wire crimper an optical tester a tone generator a network monitor a cable tester |
a tone generator
|
|
Which command should you run from Server B to determine whether the default gateway address is properly configured?
ipconfig /all ipconfig /renew ipconfig ServerB ipconfig 129.68.0.1 |
ipconfig /all
|
|
You are using the ipconfig tool to troubleshoot a problem with a wireless host. The results are as follows:
Adapter address: 00-10-4B-DE-F5-D8 IPaddress: 192.168.1.40 Subnet mask: 255.255.255.0 Default gateway: 0.0.0.0 You can access services on the local network from the host, but you cannot access the Internet. What is the most likely cause of the problem? incorrect IP address missing default gateway incorrect subnet mask invalid Ethernet adapter |
missing default gateway
|
|
You administer computers on an Ethernet 100BaseTX network,which uses the TCP/IP network communications protocol. The network uses an unsubnetted Class A IP address range. A computer on the network named Admin1 has the IP address 12.10.100.3, and a computer on the network named Marketing1 is configured with the IP address 12.10.100.4.Both computers are configured with the subnet mask255.0.0.0 and the default gateway address 12.10.100.5. The network is connected to the Internet. RemoteWkst is a computer on a remote network that is connected to the Internet. Normally, Marketing1 and Admin1 can connect to RemoteWkst. You recently discovered that Marketing1 can connect to Admin1 and Admin1 can connect to Marketing1, but neither of these computers can connect to RemoteWkst. You suspect that there is a problem with one of the routers between RemoteWkst and the network you administer. Which TCP/IP utility should you use to troubleshoot this connectivity problem?
the arp utility the ipconfig utility the nslookup utility the tracert utility |
the tracert utility
|
|
On a network that you administer, you cannot use a Windows computer named Wkst 1 to connect to an Internet host with the fully qualified domain name (FQDN) www.transoft.com. You want to determine whether a WAN link between Wkst1 and www.transoft.com is down. You know that data normally passes through 10 hops in transit from Wkst1 to www.transoft.com. Which command should you use to test connectivity?
arp www.transoft.com nbtstat www.transoft.com tracert www.transoft.com ipconfig www.transoft.com |
tracert www.transoft.com
|
|
Your 100BaseT network uses the TCP/IP protocol suite exclusively,and workstations on your network obtain addresses dynamically from a server. From your computer,you can contact all servers and workstations on your own network segment, but you are unable to gain access to network resources on other segments. Which factors should you investigate? (Choose two.)
the routers the frame types the default gateway IP address conflicts |
the routers
the default gateway |
|
You want to use Enhanced Intel SpeedStep Technology in a laptop. Which components must support this technology to use it? (Choose all that apply.)
motherboard BIOS software drivers operating system |
motherboard
BIOS operating system |
|
Which keys should you use on a laptop in combination with special functionality keys to perform tasks such as toggling the display or adjusting the display brightness?
the Ctrlkey the Fn key the Shift key the Alt key |
the Fn key
|
|
You need to configure a removable storage device so that the device can be removed without using the Safely Remove Hardware application. What should you do?
Enable write caching on the disk Optimize for quick removal Optimize for performance Adjustfor best performance |
Optimize for quick removal
|
|
A user complains that the pointer movement on his laptop computer is very erratic. What should you do?
Reboot the computer. Calibrate the touch screen . Adjust the touchpad sensitivity. Attach an external mouse to the laptop. |
Adjust the touchpad sensitivity.
|
|
You clear a paper jam from the tray in a laser printer. However, the printer still indicates a jam. What step should you perform next?
Run the diagnostic software. Physically open and close the top assembly. Look for another jam in the paper tray. Look for another jam in the pressure roller area. |
Physically open and close the top assembly.
|
|
A user from the accounting department has contacted you regarding problems with a dot-matrix printer. When you examine the output from the printer,several letters have missing dots from the page. What should you do?
Replace the print head. Replace the ribbon. Clean the print head. Print a test page |
Replace the print head.
|
|
A user contacts you stating that he can no longer print to a network printer. While troubleshooting the issue,you suspect that the printer's IPaddress has changed and is causing the printing problems. What should you do to test your theory?
Ping the printer from the user's computer. Run the ipconfig command on the user's computer. Pause the printer's print queue. Install the latest device drivers for the printer on the user's computer. |
Ping the printer from the user's computer.
|
|
You are the network administrator for your company.You are installing a new printer in the network.When you check the print server properties, it displays the following error:Server properties cannot be viewed. The print spooler service is not running. What should you do to resolve the issue using the least administrative effort?
Run the net stopspooler command. Run the net startspooler command. Use the Services program in Administrative Tools to start the printer spooler service. Click Start and Run. Type services.msc to start the printer spooler service. |
Run the net start spooler command
|
|
You notice that the pages coming out of your laser printer have toner that you can brush off. Which printer component is MOST likely causing the problem?
toner cartridge pickup roller fuser assembly photoreceptor |
fuser assembly
|
|
A department manager reports that one of her department's printer is printing fuzzy or low quality print. Which conditions contribute to this problem (Choose two.)
damp paper high humidity too much paper in the papertray a warped roller in the paper path iron particles in the paper fibers a problem with the charge wires or the drum |
damp paper
high humidity |
|
Your printer is printing fuzzy text with white lines running through it. You need to clean the clogged print head of your inkjet printer. Which two activities can you undertake to immediately clean the clogged print head? (Choose two.)
Replace the platen. Replace the nozzle. Power the inkjet printer off and then on. Replace the ink cartridge with a new ink cartridge. Run the printer management utility provided with the printer. |
Power the inkjet printer off and then on.
Run the printer management utility provided with the printer. |
|
A user has been given a new laptop computer. The user has always worked with a desktop computer. He contacts you asking about the wireless Function key on the laptop computer. What can you configure with this key in a laptop?
Turn on and off the wireless adapter. Increase and decrease the wireless signal strength. Cycle through the different wireless frequencies. Cycle through the different wireless channels. |
Turn on and off the wireless adapter
|
|
Which of the following accessories will enable users to pair devices over Bluetooth? (Choose all that apply.)
docking station credit card readers memory/microSDcard headsets speakers game pads |
credit card readers
headsets speakers game pads |
|
You need to ensure that small inventory devices are able to securely communicate with the inventory servers. For security purposes, the devices should only communicate when they are within 4 cm or 1.5 inches of each other.Which technology should you deploy?
NFC RFID 802.11a infrared |
NFC |
|
Your company employs a team of trainers who travel to remote locations to make presentations and teach classes. The team has been issued new laptops to use for those presentations and classes.Doug of Wonder Web is coming to your office to show the trainers the ports they will use to connect different devices for the presentations. Which of the following will he most likely to demonstrate?
DisplayPort ports USB port adapters ExpressCard ports VGAports RJ-45 ports Audio jacks |
DisplayPort ports
USB port adapters VGAports |
|
Your company has issued you a laptop computer to use while working remotely. You must ensure that you understand the special Function keys on the laptop. Which of the following features is generally NOT included as part of the special Function keys in a laptop computer?
Volume controls Brightness controls Screen resolution controls Internal/external display controls |
Screen resolution controls
|
|
A user's laptop computer has an external display port.You want to attach an external projector and allow both the laptop display and the projector to display the laptop's image. Which option will allow you to scroll through the display options?
the Ctrl key the Alt key a Fn key combination the Shift key |
a Fn key combination
|
|
You are choosing from among several different laptop components. Which of the following operates at the fastest speed?
PC card using 16-bit bus ExpressCard using USB 2.0 bus ExpressCard using aPClebus PCMCIA card using a16-bit bus |
ExpressCard using a PCle bus
|
|
You have been asked to ensure that all corporate laptops are secured from physical theft when used in corporate facilities. You review the security techniques listed in the options.Which of the security techniques will NOT protect the laptop from physical theft?
Install LoJack for Laptops on the laptop. Lock the office where the laptop resides. Lock the laptop in a filing cabinet drawer. Attach the laptop to the desk using a cable lock. |
Install LoJack for Laptops on the laptop.
|
|
You are trying to help your customer connect a Universal Serial Bus (USB) 3.0 printer to his laptop and his desktop computer . The laptop computer has only USB 1.1 ports and PCle slots available. What would be the most logical and affordable option to recommend to him?
Purchase a newer laptop with USB 2.0 ports. Purchase another printer that supports USB 1.1. Purchase another printer that supports USB 2.0. Replace all USB 1.1 ports with USB 3.0 hubs. Install a USB 3.0 card in the PCle slot. |
Install a USB 3.0 card in the PCle slot.
|
|
You have just installed and configured an inkjet printer on Beth's desktop. Which step should you perform first to ensure that the inkjet printer is working properly?
Print a test page. Explain the basic printer functionality to Beth. Assign print permissions to Everyone. Assign print permissions to Beth. Load the device drivers for the inkjet printer. |
Print a test page.
|
|
Which of the following is not considered to be an input device?
barcode reader scanne digitizer printer |
printer |
|
A customer brings you a computer that he wants to upgrade to SATA drives. Currently,all the drives in the system are EIDE drives. What should you do first?
Make sure that the motherboard will support SATA drives. Install the new SATA drive, and use jumpers on the system board to configure the new disk as a master." Install an SSD drive and configure it manually. Disable the floppy drive,remove it,and install a second SATA drive in that bay. |
Make sure that the motherboard will support SATA drives.
|
|
What are the dimensions of an Advanced Technology Extended (ATX) motherboard?
11.2 inches wide and 8.2 inches deep 12 inches wide and 9.6 inches deep 9.6inches wide and 9.6 inches deep 6.7inches wide and 6.7 inchesdeep |
12 inches wide and 9.6 inches deep
|
|
Youhave purchased a program that requires a joystick.Which ofthese types of computerports could allowyou to attach a joystick? (Choose two.)
anIEEE 1394 port anSPDIFport a DA-15 port a USB port |
a DA-15 porta
USB port |
|
Your digital camera requires a FireWire interface for image transfers to your computer. Which port type should you use to connect the digital camera to your computer?
Universal Serial Bus(USB) PS/2 A Small Computer System Interface (SCSI) IEEE 1394 |
IEEE 1394
|
|
Beverly has contacted you and stating that her computer will not boot and keeps beeping. Which components must pass a computer's power-on self-test (POST) before an operating system will load? (Choose three.)
the memory the keyboard the video card the hard disk drive the network interface card (NIC) the central processing unit (CPU) |
the memory
the video card the central processing unit (CPU) |
|
Christine has a motherboard with a Socket 1156 and has called you to see if a Socket 1150 CPU could be used in its place. What would you recommend that she do?
Purchase a new motherboard that has an 1150 socket. Upgrade the socket on the existing motherboard so it compatible with an LGA 1156. Replace the heat sink. Replace the thermal paste and pins. |
Purchase a new motherboard that has an 1150 socket
|
|
You are providing consulting services for a client who plans to purchase a large number of printers that can print multi-part forms. Which printer type should you advise him to consider?
laser inkjet thermal dot-matrix |
dot-matrix
|
|
A user's computer is experiencing overheating problems. What is the most likely cause of this problem?
dust humidity power sags power surges |
dust
|
|
You have just replaced the ink cartridge in an ink-jet printer. What should you do immediately after this?
Reboot the computer. Charge the OPC drum. Reinitialize the printer. Run the print alignment program. |
Run the print alignment program.
|
|
Susan called the help desk to ask which type of BIOS password she should configure to restrict access to the BIOS setup program. Which password type would you explain?
User password Supervisor password Administrator password System password |
Supervisor password
|
|
What is the function of the nozzle gate in an inkjet printer?
controls the paper movement contains ink in the ink cartridge controls whether ink is flowing from the ink cartridge controls how much ink is flowing from the ink cartridge |
controls whether ink is flowingfrom the ink cartridge
|
|
A user notifies you that the monitor on his notebook computer is not displaying anything. What should you do FIRST?
Replace the video output port. Plug in an external monitor to test the external output. Use the Fn key to toggle to the internal video display. Reboot the computer. |
Use the Fn key to toggle to the internal video display.
|
|
An IBM computer is giving one long beep and one short beep when turned on. The computer does not boot up. What should you do to troubleshoot the problem?
Check the video adapter card. Check the motherboard. Reconnect the keyboard. Check the central processing unit (CPU). |
Check the motherboard.
|
|
After troubleshooting a laptop computer issue, you discover that that the motherboard is faulty. The computer is under warranty , and the manufacturer ships you a replacement motherboard that is the exact model number as the defective one. You need to replace the laptop's motherboard. All of the following are guidelines when replacing the motherboard, EXCEPT:
Remove the laptop's keyboard,and disconnect it from the motherboard. Remove the RAM and hard drive from under the laptop's keyboard. Remove the fan and heatsink from the processor, and then remove the processor. Remove any peripheral cards that are directly plugged into the motherboard. |
Remove the RAM and hard drive from under the laptop's keyboard.
|
|
Which new technology protects a CPU from heat damage by slowing the clock rate on the CPU?
CPU throttle technology MMX technology Hyper-Threading (HT) technology superscalar execution technology |
CPU throttle technology
|
|
You need to install a new videocard in a Windows XP Professional computer. You need to ensure that the installed technology supports both analog and digital transmissions. Which technology should you install?
DVI-D DVl-1 DVI-A HDMI |
DVl-1
|
|
Which CPU coolingmethod should you implement when convective methods will not work?
heat sinks heat pipes water cooling Peltier cooling |
Peltier cooling
|
|
If you were explaining to your company's IT personnel about the difference between their old hard drive technology and newer solid state drives,which statement would be FALSE?
They do not require an external power source. They are not as fragile as magnetic hard drives. They are silent when in operation. They use a read/write assembly. |
They use a read/write assembly
|
|
Which biometric method can work in conjunction with a password to provide increased security?
password aging keystroke dynamics password checkers password encryption |
keystroke dynamics
|
|
You are in the process of replacing the toner cartridge for a laser printer. However, you notice that toner particle have been split inside the printer.What should you use to effectively remove these particles?
compressed air ESD-safe vacuum cleaner household vacuum cleaner damp cloth |
ESD-safevacuum cleaner
|
|
What is the main purpose of a laserprinter's charge(primary) corona?
To charge thepaper To write theimage on the drum To melt the toner into the paper Toneutralize the chargeon thepaper To coordinate the components to print a page Toapply auniformnegativecharge tothe photosensitive drum |
To apply a uniform negative charge to the photosensitive drum
|
|
You replace the toner cartridge in a laser printer. Now, all print outs have black specks on both sides. Which action you should take first?
Replace the toner cartridge. Realign the transfer corona. Clean the interior of the printer. Check the fuser assembly and fuse. |
Clean the interior of the printer.
|
|
You are a desktop engineer for DreamSuites Corporation. Irene Jones has joined DreamSuites Corporation as an HR Executive in the London office. You configure a new computer for Irene Jones.The computer will not power up,and you have asked to troubleshoot the problem. Which action is NOT required to troubleshoot the problem?
Setthe power outputof thewall outletto 230 volts. Ensure that the 115/230 voltage selector switch is set tothe correct voltage. Ensure that power is available. Check the power cords. |
Set the power output of the wall outlet to 230 volts.
|
|
You are a desktop administrator for Nutex Corporation. Your organization uses Ethernet cable to connect network resources.A user reports that he is unable to access network resources on his portable computer. The portable computer is connected to the company's network using an Ethernet cable. When you test the cable using a time domain reflectometer (TDR),the signal returns too early. What should you do?
Replace the network cable. Reinstall the network adapter. Replace the network adapter. Re-route the network cable. |
Replace the network cable.
|
|
You are the desktop administrator for your company and maintain all the computers in your organization. To properly upgrade one of the computers,you must upgrade the motherboard.While upgrading this computer,you should choose the appropriate form factor that is suitable for the motherboard of the existing computer.Which two specifications should you consider while selecting the appropriate form factor? (Choose two.)
physical size power supply number of PCI slots supported amount of memory |
physical size
power supply |
|
A user keeps receiving a printer error message before the print job is sent to the print spooler. Which printer issue would cause this?
The printer is paused. The printer queue is stalled. The printer driver is corrupt. The printer power is off. |
The printer power is off.
|
|
You are troubleshooting a laser printer that feeds multiple sheets of paper for each page it is supposed to print.Which component could be causing the problem? (Choose two.)
the paper type the primary corona the feed mechanism the photosensitive drum |
the paper type
the feed mechanism |
|
You want to enable Hyper-Threading(HT) technology in your computer that has an older processor. When you check the BIOS settings,you observe that the HT option appears dimmed. What should you do to enable the HT option in the BIOS?
Upgrade the BIOS to support HT. Execute the INF utility to enable HT. Restart the computer to enable HT. Upgrade the processor. |
Upgrade the processor.
|
|
You are troubleshooting a laser printer problem where faint images of previously printed pages are appearing on the current page. Which two components are the most likely cause of this problem? (Choose two.)
detac corona charge corona fusing rollers discharge lamp cleaning blade |
discharge lamp
cleaning blade |
|
You suspect that an uninterruptible power supply (UPS) is malfunctioning. You need to test the output from the UPS using a multimeter. Which multimeter setting should you use?
Ohms Continuity AC Voltage DC Voltage |
AC Voltage
|
|
A user named Bradcalls and reports that he is unable to connect to a file server on your 100BaseT network, although he is able to connect to folders on other computers. A single hub exists on the network. Which hardware problems should you investigate? (Choose two.)
a defective hub an improper termination a defective NIC in the file server a defective NIC in Brad's computer |
a defective hub
a defective NIC in the file server |
|
You have replaced the memory in a laptop computer. What would cause the reported memory to be lower than the actual physical memory?
parity shared video memory cache ECCmemory |
shared video memory
|
|
A user complains that his monitor is not working. You must diagnose the problem to return the monitor to normal operation.What are the four primary sources of display problems?(Choose four.)
monitor processor data cable power supply video cable video driver video adapter card |
monitor
video cable video driver video adapter card |
|
You need to replace the hard drive in a user's portable computer. You examine the physical size of the hard drive and purchase a replacement drive that is the appropriate size, as verified by your inspection of the existing drive. You unplug the portable computer from alternating current(AC) power. What should you do next?
Open the panel on the case where the old hard drive resides. Remove the battery. Open the cage where the old hard drive is mounted. Place the computer in Hibernation mode. |
Remove the battery.
|
|
All of the following steps are necessary to install a V tuner adapter card in a computer ,EXCEPT:
Plug the TV tuner adapter card into a USB port. Plug the antenna into the TV tuner adapter card. Plug the audio cable into the TV tuner adapter card and sound card. Plug the TV tuner adapter card into a PCI slot.n |
Plug the TV tuner adapter card into a USB port.
|
|
Which chip connects the system bus to the AGP and PCI buses?
south bridge north bridge hub CPU socket |
north bridge
|
|
Which statement is anaccurate characterization of the Peripheral Component Interconnect (PCI) architecture?
All PCI cards support bus mastering. The PCI bus is for 80386 and 80486 computers only. The PCI architecture supports 32-and 64-bit data transfers. The PCI architecture is for Intel-compatible computers only. |
The PCI architecture supports 32- and 64-bit data transfers
|
|
Which term is used to identify the concentric circles on a hard disk platter?
track sector cluster cylinder |
Track |
|
What is an example of a solidstate drive?
ATA hard drive CD-ROM drive USB flash drive DVD drive |
USB flash drive
|
|
Alice needs to connect many external devices to her PC. Which of the following expansion cards would enable her to connect the largest number of devices?
USB expansion card FireWire expansion card Thunderbolt card Riser card |
USB expansion card
|
|
Which of the following are you LEAST likely to see as a front-panel connector on a motherboard?
USB port reset button SCSI port drive activity lights |
SCSI port
|
|
If you were explaining various RAM types to a new user,which type of computer memory module uses 168 pins?
SIPP SIMM DIMM DIPP RDRAM |
DIMM |
|
Your company implements a new policy that all computers must use drive-level encryption for security. You want to enhance the security provided by Bitlocker. What should you enable?
EFS NTFS TPM BIOS passwords |
TPM
(You should enable Trusted Platform Module (TPM) to enhance the security provided by Bitlocker. Bitlocker is a hard drive encryption technology introduced in Windows Vista.) |
|
Steven wants to upgrade the RAM in his gaming system. Which features are important considerations before he adds memory modules to a computer's system board? (Choose two.)
parity CPU type access speed Level 1 cache |
parity access speed |
|
Aaron has just been hired as your new tech support. You are explaining different RAM types to him. Which random access memory (RAM) technology would you tell him fetches 4 bits of data per clock cycle and uses 1.8 V to operate?
SDRAM SGRAM DDR SDRAM DDR2 SDRAM |
DDR2 SDRAM
|
|
You are a desktop engineer for Verigon Corporation. Gloria Taylor requires a PCI network interface card and a PCI sound card installed in her computer. Her computer has three PCI slots,two of which contain the video card and the modem, respectively . Which card should you use to attach both the PCI network interface card and sound card to the computer?
riser card PCMCIA card USB PCI card flash memory card |
riser card
(Riser cards have several slots to hold additional cards,such as PCI orISA that work in parallel with the motherboard. A riser card is commonly used in low profile extended (LPX)and new low-profile extended New Low Profile Extended (NLX)computers because these form factors are for slim-line cases.)
|
|
A user contacts you stating that his laptop is making a weird buzzing noise. When you examine the laptop, you notice that the buzzing noise is coming from the bottom of the display assembly. Which device should you probably replace?
the motherboard the display screen the inverter board the hard drive |
the inverter board
|
|
Your laptop computer, which typically draws 2 amperes (amps) under normal usage, has a rechargeable nickelcadmium (NiCad) battery that provides 150 minutes of battery power. Lately,the laptop runs out of power after only 30 minutes of use. Which actions should you take to extend the time your computer can operate on battery power? (Choose two.)
Configure APM. Clean the battery terminals. Run fewer applications while using battery power. Use a charging device with a higher output voltage. Perform several cycles of discharging and recharging the battery. |
Perform several cycles of discharging and recharging the battery.
Clean the battery terminals. |
|
Andrew works for a local law firm's help desk and is getting complaints that employees cannot access the company's intranet site. What is the first tool he should use?
ping cable tester dir /w ipconfig |
ping |
|
A client,Warren, reports CMOS mismatch errors at startup. Further conversation with Warren reveals that he had forgotten the startup password he assigned in CMOS,and he had to clear all CMOS settings for his computer to complete a successful startup. Although he can now start his computer,he continues to observe CMOS error seach time he starts the computer. He replaced the CMOS battery, but the problem continues. Which component should you investigate first to resolve the problem?
the CMOS battery voltage the presence of new hardware the system board jumper settings the availability of a BIOS flash for the CMOS |
the system board jumper settings
|
|
George, a user, is having trouble connecting to network resources, including shared folders on the local network and Internet resources. Yesterday he was able to connect with no problems. You need to ensure that he can connect to these resources. Which tool should you use FIRST?
ipconfig Device Manager My Network Places Control Panel |
ipconfig |
|
You are nearing the completion of an upgrade that involves implementing a new network infrastructure and upgrading the operating systems running on your network servers.Currently,static IP addresses and HOSTS files are used. The upgrade has included implementing DNS, implementing DHCP, and moving servers and other resources to a new location with new IP addresses. However, you cannot accessthe resources that were moved using their host names from any of the client workstations. You can access them by their IP addresses. What should you do first?
Enable NetBIOS over TCP/IP. Delete the HOSTS file on each workstation. Import the workstations' names and addressmapping to DNS. Configure DHCP to supply a different range of IP addresses to the workstations |
Delete the HOSTS file on each workstation.
|
|
A user reports that the mouse moves erratically whenever he connects his laptop computer to the docking station. When the laptop is not connected to the docking station,the mouse moves properly. What should you do?
Clean the mouse that is connected to the docking station. Clean the touchpad in the laptop computer. Adjust the settings for the touchpad. Disconnect and reconnect the mouse to the docking station. |
Clean the mouse that is connected to the docking station
|
|
The primary hard drive in your Windows computer has failed. You purchase a new harddrive and install it in yourcomputer. What should you do first?
Partition the harddrive. Format the hard drive. Change the hard drive configuration settings in the computer's BIOS. Change the hard drive configuration settings in the Disk Management utility. |
Change the hard drive configuration settings in the computer's BIOS.
|
|
You were recently given an old notebook computer,which is missing most of its peripherals and accessories. You need to obtain the components necessary to allow you to efficiently perform your job both at the office and while traveling.You would like to purchase as many of the necessary accessories and peripherals as possible from a local computer store,where your company has an account. Which accessory or peripheral will you most likely have to obtain directly from the notebook manufacturer because of its highly proprietary nature?
mouse modem card network card docking station external monitor |
docking station |
|
You are the network administrator for your company. A user reports that he cannot access network resources from his computer. He was able to access the resources yesterday. While troubleshooting his computer,you find that his computer is issued an Automatic Private IP Addressing (APIPA) address. All the network equipment in the user's computer is functioning properly because you are able to access the user's computer from a remote computer. What is most likely the problem?
The computer is configured with an alternate IP address. The computer is configured with a static IP address. The DNS server is down. The DHCP server is down. |
The DHCP server is down.
|
|
What is the transmission distance supported by single-mode fiber optic cable?
appr. 50 feet appr. 3000feet appr. 20 miles appr. 74 miles |
appr. 20 miles
|
|
Which connectors are used with fiber-optic cabling? (Choose two.)
SC ST AUi RJ-11 RJ-45 |
SC ST |
|
Which Internet connectivity type always uses a coaxial (coax) cable to establish a two-way connection to the Internet?
digital subscriber line (DSL) cable modem dial-up satellite |
cable modem |
|
Which IP address is used by a Class Aprivate network?
10.0.0.0 172.16.0.0 192.168.0.0 127.0.0.1 |
10.0.0.0 |
|
Which applications use UDP?
ICMP,ARP, FTP NFS, FTP, TFTP NFS,TFTP, SNMP ARP,NFS,FTP, SMTP |
NFS,TFTP, SNMP
|
|
Which hardware device operates at the physical layer of the Open Systems Interconnection(OSI) model to connect computers in a network?
switch hub bridge router |
hub |
|
You have implemented a hardware firewall on a small office network. Youneed to ensure that all HTTP packets are automatically sent to theWeb server. What should you do?
Enable port triggering. Enable port forwarding. Enable NAT. Enable QoS. |
Enable port forwarding.
|
|
You are setting up an 802.11a wireless network in a small office environment that includes three wireless access points. The wireless access points are at least 15 meters apart and are configured for automatic channel setting.Each time you turn the wireless access points on, the wireless access points choose the same channel. You need to ensure that the access points choose separate channels toprevent interference, using the least amount of administrative effort. What should you do?
Increase the distance between the wireless access points to at least 20 meters. Manually configure each of the access points to use channels1,6, and11, respectively. Start each wireless access point at a separate time. Reduce the signal strength on each accesspoint. |
Start each wireless access point at a separate time.
|
|
Which of the following statementsis true regarding RG6 coaxial cable?
It should be used in situations that require lower frequencies than 50 MHz. It is thicker than RG59 coaxial cable. Its signal quality is NOT as good asthat of RG59 coaxial cable. It does NOT have a foil shield. |
It is thicker than RG59 coaxial cable.
|
|
Your company has a network that consists of 12 computers on a single floor in your building. You need to set up a computer to work beyond the maximum length of an Ethernet segment.You have two Ethernet cables that will allow you to do this. You want to provide a connection only for this computer using an inexpensive device. Which device should you use?
switch bridge repeater firewall |
repeater |
|
Which of the following is an example of an IPv6 address?
192.1.0.1 127.0.0.1 fe80::200:f8ff:fe21 :67cf OO-OC-F1-56-98-ADs |
fe80::200:f8ff:fe21 :67cf
|
|
Which IP address is used by Class B private networks?
10.0.0.0 172.16.0.0 192.168.0.0 127.0.0.1 |
172.16.0.0
|
|
What does a cable rating of "plenum" indicate about the cable?
It is rated for speeds of 1000 Mbps. It is not Layer 2protocol-dependent. It cannot be tapped without detection. I twill not produce toxic gas when it burns |
It will not produce toxic gas when it burns
|
|
What is the maximum segment distance for data transmission using 10BaseT, 100BaseT,and 1000BaseT?
25 meters (82 feet) 50 meters (164 feet) 100 meters (328 feet) 185 meters (607feet) 500 meters (1,640 feet) |
100 meters (328 feet)
|
|
You are wiring a small office for a client. The client has purchased several 568A and 5688 wall jacks and enough 568A wiring cables to attach all devices correctly.You want to configure the network for ease of administration. What should you do?
Use only the 568A wall jacks. Use only the 5688 wall jacks. Use both the 568A and5688 walljacks. Purchase 5688 wiring cables. |
Use only the 568A wall jacks.
|
|
Which cable uses a light-emitting diode (LED)?
coaxial cable multi-mode fiber optic cable shielded twisted pair(STP) cable unshielded twisted pair(UTP) cable |
multi-mode fiber optic cable
|
|
What is the main difference in the physical composition of UTP and STP cable?
wire gauge mesh shielding number of twists in the wires separators between the wire pairs |
mesh shielding
|
|
Which versions of Windowsinclude the PowerShell scriptingtool? (Choose all that apply.)
Windows Vista Windows 7 Windows 8 Windows 8.1 |
Windows Vista
Windows 7 Windows 8 Windows 8.1 |
|
Which Windows 8 and Windows 8.1 feature allows youto sign into Windows using the same credentials as your Hotmail account?
Live Sign In Gmail Outlook |
Live Sign In
|
|
Which Microsoft utility provides drive-level encryption?
Bitlocker TrueCrypt Symantec Drive Encryption DiskCryptor |
Bitlocker
|
|
Management has decided to replace the five computers in the human resources department withnew Windows computers. A legacy application is only capable of running on Windows XP Professional. For this reason, you need to beable to use Windows XP Mode. Which editions of Windows could youimplement in thehuman resources department? (Choose all thatapply.)
Windows 7 HomePremium Windows 7 Ultimate Windows 7 Professional Windows 7 Enterprise Windows 8 Professional |
Windows 7 Ultimate
Windows 7 Professional Windows 7 Enterprise |
|
You need to install Windows 7 Professional on a user's computer. Which hardware is NOT a minimum requirement?
1 gigahertz processor 2 gigabytes RAM 16gigabytes available hard drivespace DirectX 9 graphics card |
2 gigabytes RAM
|
|
Youare installing Windows 8 on a client computer.The client has installed a newer versionof a graphics card. The driverincluded in Windows 8 is outof date. What should you do?
Proceed with the installation, and update the third-party driverafter the installation is finished. Use an older graphics cardduring theinstallation. Stop the installation. Proceed with the installation as is. Thedriversdo notneed tobe updated. |
Proceed with the installation, and update the third-party driverafter the installation is finished.
|
|
You need to reinstall Windows 7 on a clientcomputer. The old hard drive crashed, and you are using the original installation DVD from 2009. You have an internet connection. What is the best way to make sure you have themost current drivers and updates?
Proceed with the installation, and update driversand patches via Internet when complete. Nodriver or patch updates are necessary. Download all the drivers and patches on anothermachine, burn a DVD, andupdate fromthe DVD when installation is complete. Accept the option to download updatesand new driverpackages. |
Accept the optionto download updatesand new driverpackages.
|
|
Your company's network containsworkstations that run Windows 8, Windows 8.1,WindowsVista Ultimate, and Windows7 Ultimate. You need to install the Multilingual UserInterface (MUI) on all the workstations. Which operating systems will provide multilingualsupport for both the operating systems and applications?(Choose all that apply.)
Windows 8 Windows 8.1 Windows Vista Ultimate Windows 7 Ultimate |
Windows 8
Windows 8.1 Windows Vista Ultimate Windows 7 Ultimate |
|
You need to refresh thegroup policy settings. Which command-line utilityshould you use?
GPRESULT GPUPDATE GPFIXUP Youcannot do this from a commandline. |
GPUPDATE
|
|
You know you saved a file named FILECHK in the D:\MYDOCS directory, but you don't rememberthe locationor the extension. Yourun the dir D:\MYDOCS\FILECHK.* /S command. What would this command accomplish?
It locates a file named FILECHK.* onthedefault drive. Itlocates all files that have names startingwith FILECHK on the default drive. It locates all files that have names startingwith FILECHK in the MYDOCS directoryof drive D, including the subdirectories. It locates all the files anddirectories that have the name FILECHK with any file extension inthe MYDOCS directory of drive D, including the subdirectories. |
It locates all the files anddirectories thathave the name FILECHKwith any file extensionin theMYDOCS directory of drive D,including the subdirectories.
|
|
You need to check the startupconfiguration for several services. From which tools can you access the Servicesconsole? (Choose all that apply.)
System Properties Computer Management Device Manager Administrative Tools |
Computer Management
Administrative Tools |
|
You need to quickly display the running processes on your Windows 7 computer.What should you do?
Click Startand Devices and Printers. Click Start and Control Panel. Click Systemand Security. Right-click theComputer icon on the desktop and select Properties. Click Ctrl+Alt+Deland selectStart Task Manager. |
Click Ctrl+Alt+Deland selectStart Task Manager.
|
|
A user is locally connected to a printer on his Windows Vistacomputer. The printer is disconnectedfrom the computer and connected to the localnetwork. You need tochange the port for the printer on the user'sWindows Vista computer. How could you change the port settings?
Click Startand Printers & Faxes. Right-click theprinter, and select Properties,In the printer's Propertiesdialog box, select the Ports tab. Click Start and Control Panel. Click the Printer link under Hardware and Sound. Right-click the printer,and select Properties. In theprinter's Properties dialog box, select the Ports tab. ClickStart, Control Panel,and Printers & Faxes. Right-click theprinter and selectProperties.In the printer's Properties dialog box,select the Ports tab. Click Start and Devices and Printers. Right-click the printer and select Properties. In the printer's Properties |
Click Start and Control Panel. Click the Printer linkunder Hardware and Sound. Right-click the printer,and selectProperties.In the printer's Properties dialog box, select the Ports tab.
|
|
A user with a Windows 7 Ultimate computerthat is a member of a domainreports that she is unable to create a Homegroup. What is the reason this is happening?
The user should disable UAC. Homegroups are only available oncomputers running Windows7 HomeBasic andHome Premium. The user cannotcreate a Homegroup because the computer is a member of a domain. The user is not runningthe correct edition ofWindows 7to createa Homegroup. |
The user cannot create a Homegroup because the computer is a member of a domain.
|
|
Youjust received your newwork laptop.Included in the boxis a device that looks similar to aUSB drive and has the word AirCardon it. Which type of connection to theinternet will this provide?
VPN WWAN Wired Dialup |
WWAN A WWAN connection is a cellular data connection that requires an accesscard, often called an AirCard. WWAN connections operate over the cellular data network and require a data plan from a cellular provider. |
|
You need to connect to the network at a client site. The systems administratorhands you a cable where the connectors have 8 pins each. Which type of network are youabout to use?
VPN WWAN wired dialup |
wired
You about to use a wired network. The cable described is an Ethernet cable. |
|
How can you restorean operating systemto the way it waswhen the computer was shipped fromthe factory?
Press F8 duringPOST, and select Advanced Boot, Repair YourComputer, and SystemImageRecovery. Use the format command. Use theDiskManagement utility. Create a restore point. |
Press F8 during POST,and select Advanced Boot, RepairYour Computer, and System Image Recovery.
|
|
A user contacts you regarding theWindows Update settings on his Windows 7 computer. He wants Windows Updates set back to its default setting. Which setting should you configure?
Never Check For Updates Check For Updates But Let Me Choose Whether To Download and Install Them DownloadUpdates But Let Me Choose Whether to Install Them Install UpdatesAutomatically |
Install UpdatesAutomatically
|
|
What Linux command creates a hard drive image?
Is mv dd cp |
dd |
|
Which Linux command allows you to change a user's password?
pwd passwd vi chown |
passwd
|
|
You are responsible for managing your company's virtualizationenvironment. Which featureshould NOTbe allowed on a virtualization host?
implementing IPsec browsing the Internet implementing a firewall monitoring the event logs |
browsing the Internet
|
|
Of the terms below, which is the term for the cloud computing concept that allows the provider to shareservices with multiple subscribers, asopposed to the subscriber having adedicated cloud service?
communitycloud rapid elasticity resource pooling measured service |
resource pooling
|
|
Which cloud computing term refers to the availability ofa resource as it is needed by the client?
resource pooling ondemand rapid elasticity measured service |
ondemand
|
|
Which of the following might you find on a network in a legacy system?
NetBEUI protocol TCP/IP DHCP DNS |
NetBEUI protocol
|
|
Which of the following is an open-source mobile operating system?
iOS Android Windows None of the above |
Android
|
|
Your company wants employees to beable to securely connect to the corporatenetwork from remote locations overthe Internet. Whichtype of connection should you set up?
IMAP VPN IMEI IMSI |
VPN |
|
After contacting a mobiledevice provider with an issue, the provider asks you to providethem with the IMEIand IMSI. What is the differencebetween IMEI and IMSI?
IMEI isthe serial number for the mobile device, and IMSI isthe number assigned to the SIM card. IMEI is theserial number for the SIM card, andIMSIis the number assigned to thephone. Thephone numberis a component of IMEI, but not a component of IMSI. IMEI isan iPhone serial number,and IMSI isan Android serial number. |
IMEI is the serial number for the mobile device, and IMSI is the number assigned to the SIM card
|
|
You need to ensure that the GSM and 3G phone information your Android phone is updated.Which type of update would you perform?
PRI update PRL update Baseband update None of the above |
Baseband update A baseband updatewill update the radio firmware on thecell phone. |
|
You have an iPhone. What is the default connectiontype to synchronize your data?
Google Drive iTunes Dropbox OneDrive |
iTunes
|
|
What are the minimumsoftware requirements for installing iTunes on a Microsoft Windows PC?
Windows Vista or later and 100MB freedisk space Windows Vista orlaterand 650 MB free disk space Windows 8 or later and1TB free disk space Windows 7 or later and 400MB free disk space |
Windows 7 or later and 400MB free disk space
|
|
You are providing training on security breaches regarding passwords andencryption. Which attacks below best describes this?
Brute-force attacks Violations of security best practices Man-in-the-middleattack Dictionary attacks |
Dictionary attacks
|
|
Nicholas reports to the securityguards that individuals are following closely when he enters buildings, using his credentials to gain access. Heknows that some of them are valid employeesbut is concerned that not all ofthe people are.What security breach is he reporting?
tailgating zero-day attack zombie shoulder surfing |
tailgating
Tailgatingoccurs when someonepiggybacks on your credentials to gain entry to a building. Theunauthorized individual usuallyjust follows closely behind you as you enter the buildingwithout needing to use a key,a card, or any other security device. |
|
Recently several employees email accounts were hacked afterthey visited thelocal coffeeshop and usedtheir mobile devices there. Which type of attack most likely occurred?
zero-day attack shoulder surfing zombie tailgating |
shoulder surfing Shoulder surfing occurs when hackers watch or sit close or near someone and memorize their sensitive information. They will watch for people entering passwords,credit card numbers,or other private information. |
|
Andrea is concerned that she is beinglured to provide her financial institution's credentials on an invalidsite via a message shereceived. Which typeof attack is mostlikely taking place?
IP spoofing MAC address spoofing data mining email spoofing |
email spoofing |
|
lnterConn has decidedit wants toimplement multi-factor authentication. Whatis the BESTimplementation you should deploy? usernames, strong passwords, and PIN smart cards, usernames,and strongpasswords biometrics, smart cards, andstrong passwords smart cards, usernames, and PIN |
biometrics, smartcards, and strong passwords
|
|
You have recently discovered that users on your network have been victims of impersonation attacks. You need to implement an authentication method that checks the identity of both ends of the connection. Whichauthentication method does this?
biometric authentication mutual authentication Kerberos authentication RADIUS authentication |
mutual authentication |
|
Spencer has been hired as thesystems administrator for a small business and he wants to set up authentication on a network that contains two servers. What is the best way to provide this?
usernames withstrongpasswords directory permissions VPN access control lists (ACLs) |
usernames with strong passwords |
|
Paul is the new security guard at Metroil.He is stationed at the data center where all the valuable data is stored. Entryto the data center is controlledby two doors with a small room between them. Personnel use a smart card toopen the first door. During his shift at Metroil, Paul allows access to the data centerthrough the second door once a user has successfully opened thefirst door. Which type of physical security barrieris being used? mantrap key fob biometrics ID badges |
mantrap A mantrap isa setup with two doors and asmall room between them. The first door requires authentication to get into the small room. Then a second verificationwill occur (such as a guard visually identifying the person) to allow the user throughthe second door . Mantraps are typically used where very high security isneeded because thesecond door can only open once the first door is closed. |
|
Youneed to provide a physicalsecurity measure for a data center located on the second floor of a building. Management wants you to implement the highest level ofsecurity possible. Whichphysical security control should you implement? ID badges Key fobs Biometrics Passwords |
Biometrics |
|
After installing asoftware firewall on his computer, auser reports that he is unable to connect to any Web sites. Theuser must be able to connect to all types of Web sites. Which ports should youopen in thefirewall application? (Choose two.) port 20 port 21 port 25 port 80 port 443 |
port 80 port 443 |
|
Youneed to ensurethatusers are ableto log into multiple systems using the same login credentials.Which technology should youdeploy? VPN multifactor authentication sso two-factor authentication |
sso You should deploy singlesign-on (SSO) to ensure that users areable to log in to multiple systems usingthe same login credentials |
|
When explaining thedifferences between NTFS and FAT32 to a user installing Window 7, whichthree benefits would you share with them regarding NTFS?
better security file encryption better disk space management malware protection virus protection |
better disk space management
better security file encryption |
|
A user that has a Windows 7 laptop is frequently away from the office. Duringthat time, he needs access to severalfiles that are on the network. What should youdo? Enable BitLocker. Enable BitLocker To Go. Enable offline files. Create a Windows 7 library. |
Enable offline files |
|
Which policy is the mostsecure password policy? Password change requests must be made in person. Password change requests must be made in writing. Password change requests must be madeby e-mail message. Password change requests mustbe made by telephone |
Passwordchange requests must be made in person. |
|
What is themost common formof identification andauthentication? biometrics smart cards two-factor authentication useridentification with reusable password |
user identification with reusable password |
|
Which security measureis considered to be the easiest to implementfor mobile devices?
Remote wipes Remote locks GPS locator applications Passcode locks |
Passcode locks |
|
Daniel is newto your department and is asking about wireless networks. What would you tell him are three conditions thataffect theexternalvulnerabilities of wireless networks? (Choose three.) Number of users Antenna selection Antenna placement Access pointpower Speed of connection |
Antenna selection Antenna placement Access pointpower |
|
You are instructing a new IT technicianon securing networks and using permissions. What would you tellGraham that the default permission position should be? explicit allow implicit allow explicit deny implicit deny |
implicit deny |
|
You need to broaden the area to which a wireless access point(AP) can transmit. What should you do? Maximize the powerlevel setting. Relocate theAP. Adjust the power level setting slightly higher. Change the channel used by the AP. |
Adjust the power level setting slightly higher |
|
Lee is complaining thathis Windows 7 computer is having performance issues and is running slower.He wants to clean it up so it will run faster andmore efficient. Which built-in tools wouldyou recommend he usefirst? (Choose all that apply.) Disk Cleanup Add/Remove Programs SFC DEFRAG Recovery Console |
Disk Cleanup Add/Remove Programs DEFRAG |
|
Gloria of CDPress is holdingfree computer maintenance classes in her community. In herclass,sheemphasizes tools anyone canaccess and use.She spends a lot of timediscussing the DEFRAG tool. What should she tellthem is the minimum free disk space needed to runthis tool? 15% ofhard drive space 25% ofhard drive space 200MB 800 MB |
15% ofhard drive space |
|
You decide to edit the boot order for your Windows 8 computer using the MSCONFIG utility. To which file is this edit saved? bootmgr boot.ini Ntoskrnl.exe BCD |
BCD the Boot Configuration Data (BCD) file |
|
Atechnician contacts you that he cannot locate theNTLDR file on a Windows Vistacomputer. You explainthat this file was replaced in Windows Vista.Which file replaced it? BCD bcdedit.exe bootmgr boot.ini |
bootmgr |
|
Auser has a computer that is able toboot into WindowsVista, Windows 7, and Windows 8. Theuser has requested thatyou changethe default boot operating system to Windows8. Which toolshouldyou use to do this? taskmgr.exe regedit.exe bcdedit.exe boot.ini |
bcdedit.exe You should use thebcdedit.exe utility to edit, modify, and update the Boot Configuration Data (BCD)file |
|
While teaching a class, David mentions that Windows Vista and later no longer include the boot.ini file. Which file is used in its place? NTLDR BCD bootmgr ipconfig |
BCD |
|
AnIT technicianmentions thathe finds theREGSRV32 utility useful. For which of the following issues canthis toolbe used? corrupt registry missing exe files missing boot.ini missing dll files |
missing dll files |
|
Ever since Daniel upgraded his operating system to Windows 7, some of his programsfrom Windows XP do not loadproperly. What does heneed to do? Roll back the drivers. Re-install the programs. Restore a systemrestore point. Set up Windows XP Mode |
Set up WindowsXP Mode. |
|
Susan is constantly shutting downher laptop improperly due to movingfrom meeting to meeting. Whichfile is in jeopardy of being affected the most? system restore points BCD file registry dll file |
registry The registry isinjeopardy of being affected the most. When you shutyour computer down improperly, you areputting the registry,as well as your software, indanger of becoming corrupt. |
|
You have been sent to clean up acomputer that has been infected with malware. When you arrive at the computer, you identifythe symptoms that are occurring,quarantine the system, and disable System Restore.Now you must remediate the computer. Which steps are parts of this process? Update the anti-malware software. Schedule automatic system scans and updates in the anti-malware software. Enable System Restore, and create a newrestore point. Educate theend user. Use scan andremoval techniques to clean up thecomputer. |
Update the anti-malware software. Use scan and removaltechniques to clean up the computer |
|
Thomas is teachinga class for new users and wants to cover what to do and what not to do online. He specifically discusses spyware and malware infections andhow they occur. What aresome of thewarningsigns he should teach them to be aware of? (Choose all that apply.) The browser's home pagechanges unexpectedly. The Taskbar orSystem tray has strange icons. The firewall and antivirus programsare randomly disabled. The Add/Remove Programs console has programsyou do not recognize. |
Thebrowser's home page changes unexpectedly. The Taskbar or System tray has strange icons.The firewall andantivirus programs are randomly disabled. The Add/Remove Programs console has programs you do not recognize. |
|
Auser's computer is infected with malware. You quarantine the infected computer,disable SystemRestore, and remediate theinfected computerby updating theanti-malwaresoftware and removingthe malware. Whatstep should you complete next? Enable System Restore. Create a restore point. Schedule automatic scans and updates forthe anti-malware software. Educate the end user. |
Schedule automaticscans and updates for the anti-malware software. |
|
William has discovered an infected fileon his computer. Hewants to prevent it from causing anymore harmto his computer. Fromthe list below, what should he needto do? Change the browser'shome page. Quarantine the file. Disable the firewall. Use Add/Remove Programs. |
Quarantine the file. |
|
You suspect that a Windows 7 computerhas been infected with a Trojan horse. You need to determine if any Trojan horses are loadingat system startup and remove them. Which tool should you use to find outif anyTrojan horses are being loaded at startup? anti-malware software MSCONFIG System Restore System Recovery Environment |
MSCONFIG Ifyou need to determine ifa Trojanhorse isloadingat systemstartup, you shoulduse MSCONFIGto analyzethe applications on the Startup tab. Check each application shown in the listto ensurethat it isa valid application you need |
|
Thomas has been given a company iPad that will be used for storing private data and photos of clients. He needs toprotect the integrity of the data on this device.What should he do? (Choose two.) Turn onFind MyiPhone in Settings. Turn onWiFi. Turn onBluetooth. Turn on Touch ID and Passcode |
Turn on Find My iPhone in Settings. Turnon Touch ID andPasscode. |
|
A user reportsthat an app that has worked fine in the past willno longer launch. Heindicates that he closedout theapp and then turnedoff and back onthe device.What shouldyou suggest that he do NEXT? Perform a soft reset. Uninstall and then reinstall the app. Force stop the app. Perform a factory reset. |
Uninstall andthen reinstall the app. |
|
Thomas reports that his mobile device is not working properly. Whenyou research the issue, you discover that he accidentally deleted all the data on his device. What has most likely occurred on Thomas's mobile device? factory reset soft reset data backup force stop |
factory reset |
|
Sam is delighted with hisnew Android phone. However one of the apps causes performance issueswith the other apps almost every time he launches the app. What does heneed to do with this app when this happens? Perform a hard reset. Perform a soft reset. Adjust device settings. Perform a force stop |
Perform a force stop |
|
Paula recently advertised her olderiPhone for sale. What should she do before sellingthe device? Back up and restore the data. Back up and delete the data. Backup and reset to factory settings. Back up and remove apps. |
Back up and reset to factory settings. |
|
Tina tradedin her old iPhonefor a newer version. However,soon aftershe got it, shestarted receiving notices from her carrier thatshe had exceeded data limit. What should shedo to eliminate this problem? Disable iCloud. Disable Google Sync. Install a WiFi analyzer. Install a celltower analyzer. |
Disable iCloud. She shoulddisable iCloud. When iClouddata syncingisturned on, you are uploading all the documents and data stored on your phonefor all the applications to iCloud. Thisalso drainsthe battery much quicker. |
|
Elizabeth has given her teen age son an iPhone for his birthday. She has enabledallthe services requiredto usethe Find My iPhone feature. Whichsecurity risk may occuras a result? unauthorized location tracking unintended WiFiconnections slow data speeds unintended Bluetooth connection |
unauthorized location tracking |
|
You want to prevent your computer from any type ofelectrostatic discharge (ESD) while servicingthe computer. Which actions should you NOT performwhile servicing the computer? (Choose two.)J Wearan anti-static wristband. Keepyour one hand in contact withbare metal frameof computer at all times. Ensure that the room inwhich computer isserviced is carpeted. Ensure that the room in which computer is serviced is cooland dry. Wearcotton clothes. |
Ensure that theroom in which computer is serviced is carpeted. Ensure thatthe room in which computer is servicedis cool anddry. |
|
Anthony andBrent were just hiredas IT technicians for MetroilCorporation. Youare training them on proper repairprocedures. Which procedure should be performed off-site? flashing a BIOSchip disabling busmastering resolving an IRQ conflict repairing a power supply for acathode ray tube (CRT) |
repairing a power supply for a cathode ray tube (CRT) You shouldnot attempt to work inside a monitor case unless you have been trained specifically for that kind of work. |
|
You planto replace some components within a computer. As a recommended practice, what should be thefirst step towards disassemblinga computer? The processor shouldbe removed fromthe motherboard. The power supply shouldbe disconnected fromthe motherboard. The memory modules shouldbe removed fromthe motherboard. The power cord of the systemcase should be disconnected |
The powercordof the systemcase should be disconnected. |
|
You are an IT technician for a company. You arerequired to implement CAT-5cabling for your company's network. The cablewill run to each user workstation along the floor. Whatshould you do to secure thecable? Installcables using a protective channel. Install CAT-6 cableinstead of CAT-5 cable. Use duct tape to secure thecable. Implement a wireless network |
Install cables using a protective channel. |
|
You remove the toner cartridge from a laser printer. Whatshould you do with it?
Deposit it in amunicipal trash bin. Refill it with general-purpose toner Return it tothe manufacturer forrecycling. Send it to a standard plastic recycling center. |
Return it to themanufacturer for recycling. |
|
You have severalcathode ray tube (CRT) monitors that no longer function. You need to dispose of them. What shouldyou do? Throw them in thetrash. Dissemble them, and throw the non-reusable parts in the trash. Sendthem to an electronics recycler. Donate them to your favorite charity |
Send them to an electronics recycler. |
|
A large conference room in your office is being repurposed as a server room. Doug, the administrator,has been askedto make suggestions on improving the safety of the room.What detection systems should he recommend? (Choose all that apply.) temperature detection system water detection system smoke detection system light detection system |
temperature detection system water detection system smoke detection system |
|
Youhave several old computerparts in astorage room. Because youwork for a company with an aggressive green policy, youwant toreclaim asmuch as possible fromthe components. What CANNOT bereclaimed? metal from a circuit board phosphorus from a CRT monitor with a brokenscreen metal from the computer case lead from an intactCRT monitor |
phosphorus from a CRT monitor witha broken screen If thescreen on a CRT monitoris broken, you cannot reclaimany materials from it. If the CRT is intact, youcan reclaim lead, mercury, and phosphorus fromit. |
|
Mary has inheriteda bunch of older laptops that need their batteriesreplaced. Which statements are true regarding proper disposal ofunusable and old Ni-cad batteries that she should utilize? Unusable Ni-cad batteries can bethrown inthe garbage. Unusable alkaline batteries should not be thrown in the garbage. Unusable Ni-cad batteriesshould bethrown in a water body. Unusable alkaline batteries should be handedover to the supplier. Unusable Ni-cadbatteries shouldbe givento the waste disposalfacility |
Unusable Ni-cad batteries shouldbe given to thewaste disposal facility. |
|
What should you do if you discover inappropriate material on a company-owned computer but no specific companycomputer-use policy exists? Inform your supervisor of the inappropriate material. Inform the user'ssupervisor ofthe inappropriate material. Asktheuser to remove the inappropriate material. Inform the companypresidentof the inappropriate material. |
Inform your supervisor of theinappropriate material. |
|
While performing preventative maintenance on a user'scomputer,you notice several files thatviolate theAcceptable Usage Agreement the usersigned when initially employed by the company. TheIT department has specific policies for dealingwithany violations. What shouldyou do? Contact your supervisor. Contact the user's supervisor. Inform the user that the files must beremoved. Follow the procedures for dealing with thisviolation. |
Follow theprocedures fordealing withthis violation. |
|
You are a desktop administrator for Nutex Corporation. Auser in the human resources department is unable to open Internet Explorer on their computer. You go to thecustomer's desk to troubleshootthe problem. While you arethere, you notice confidential documents regarding an employee'srecent disciplinary action sitting next to thekeyboard. What should you do? Readthe informationon the document, and inform yourco-workers of its contents. Store the papers in a drawer. Turn the documents over. Read the information on the document, butkeep the information confidential. |
Turn the documents over.
|
|
Youhave been assigned a troubleshooting jobfor a user in thehuman resources department. When youarrive, you notice that aspreadsheet that containsconfidential employee information is open on the user's computer. What shouldyou do?
Close the spreadsheet. Askthe user toclose the spreadsheet. Minimize thespreadsheet. Leave the spreadsheet alone as longas the user is present. |
Ask the user to close the spreadsheet.
|
|
A customer has contacted you and is angry about yourcompany's service. During the call, you discover that another technician responded initially to the customer's issue. What should you do first?
Stay calm. Ask for clarification. Ask the customerwhat would make the situation better. Transfer the customer to the technician who initially handled the issue. |
Stay calm.
|
|
What should you do if a customer calls and complains that his CRT monitorhas waves going across it?
Askthe customer to rebootthe computer. Schedule an appointment with thecustomer to replace the video card. Askthe customer what electrical equipment is near the computer. Askthe customer to exchange his monitor withanother monitor to seeif the problemis fixed. |
Ask thecustomer what electrical equipment is near the computer.
|
|
You are at a customersite. The customer reports problems stayingconnected to the Internet,but he does not provide any specificinformation. What should you do to gather more information on the problem?
Askthe customer to demonstrate the problem. Troubleshoot the problem as reported. Escalate theproblem. Attempt to connectto the Internet from the customer's computer. |
Ask the customer to demonstrate the problem.
|
|
You haverecentlydiagnosed a videoproblem with a customer's computer. Yoususpect that the videocard or monitorhas failed. AnIT technic ian is being dispatched. Which rule should NOT befollowed for the sitevisit?
Take the appropriate parts and tools. Askthe customer to demonstrate the problem. Explain any repairs made. Askthe customerto clean up the repair site. |
Ask the customerto clean upthe repair site. |
|
You are a help desk technician for your company.Several hours into the day,you receiveyour first technical call from a customer. Your radio is on, and you are in the process of eating your lunch. What should you do?
Transferthecustomer to a co-worker. Continue what you are doing while talkingto the customer. Turn off your radio, stop eating, and listen to your customer. Get the customer's contact information, and call them back later . |
Turn off your radio, stop eating, and listen to your customer.
|
|
Mark is the network administrator in his building and is responsible for training all the new technicians on various troubleshooting techniques. He is instructing them on documenting their actions at the end of the troubleshooting process. What should he NOT encourage them to document at that time?
actions taken findings discovered theories used outcomes achieved |
theories used |
|
You have been asked to implement a Homegroup for a user. You need to explain to the user the requirements for thisto occur. What is the mainrequirement that you should mention? All computers must run Windows 7, Windows 8, or Windows 8.1. All computers must run Windows Vistaor Windows 7. Allcomputers must run Windows 7 HomePremium Edition. All computers must run Windows VistaHome Premium or Windows 7 Home Premium Edition. |
All computers must run Windows 7, Windows 8,or Windows 8.1. |
|
You want to install Windows 7 Professional 64-bitedition on a new computer. Whichhardware is NOTa minimum requirement? 1gigahertz 64-bit processor 2 gigabytes RAM 16 GB available hard drive space DirectX 9 graphics card |
16GB available hard drive space
|
|
You want to upgrade a Windows VistaBusiness computer to Windows7 Professional. You needto ensure that all the hardwarein the computer is compatible withWindows 7. Whichtool should you use? Windows 7 Upgrade Advisor Windows Vista Upgrade Advisor Windows Easy Transfer Microsoft Assessment andPlanning Toolkit |
Windows 7 Upgrade Advisor |
|
Youhave installed several32-bitand 64-bit applications on a Windows VistaUltimate 64-bit computer .What is the installation folderfor the 64-bit applications? C:\Program Files C:\Program Files (x86) C:\Program Files (x64) C:\Windows\System32 |
C :\Program Files
|
|
You are responsible for purchasing new Windows computers for your company.The computers must be able to joinyour company's domain.Which versions of Windows should you implement?(Choose all that apply.) Windows 7 Starter Windows 7 HomePremium Windows 7 Professional Windows 7 Ultimate Windows 8 Professional |
Windows 7 Professional
Windows 7 Ultimate Windows 8 Professional |
|
You do not have the originalinstallation media, but you need to restore Windows to the original factory settings. Whatisthe quickest way to do this? Email or callthe computer manufacturer and ask for a restore DVD. Install from the recoverypartition. Purchase a new copy of Windows. Boot into Safe Mode. |
Install from the recoverypartition.
|
|
You are installing an operating systemon a drive that appears to have sector issues. Whichformatting option should you use?
ExFAT Quick Format Full Format NTFS |
Full Format
|
|
A user needs to install a Language Interface Pack (LIP) on his Windows 7 computer. Which edition of Windows 7 is needed? Windows 7 HomeBasic Windows 7 Home Premium Windows 7 Ultimate Windows 7 Professional |
Windows 7 Ultimate
|
|
On your first day on the job asan A+ technician, you observeyour boss executingthe command chkdsk. Which statement is true of this utility?
It detects and fixes file system errors on a Windows disk. It rearranges a file to enable it to occupy contiguous space on a drive. It detects Windows disk errors,but fixing errors requires the scandisk utility. It is a command-line utility that isNOT available in Windows Vista andlater. |
It detects and fixes file system errors ona Windows disk.
|
|
A user contacts youasking if sheshould run the chkdsk command on his computer. Whywould you use thiscommand?
to manage hard drive partitions towrite new boot sector code on the system partition torepair the master boot record (MBR) on the bootpartition tocheck the specified drive and repair problems, ifany |
to checkthe specifieddrive and repairproblems, if any
|
|
Youneed to adjust which applications can beloaded at boot time. Which tab ofthe MSCONFIG utility in Windows 7 should you access?
the Startup tab the Services tab the Boot tab the General tab |
the Startup tab
|
|
A user wants to be ableto restore his Windows 7 computer's system files to anearlierpoint in time. He asksthat youensurethat a restore point is created every dayat the sametime. Which toolshould you use to schedulethe restore point creation?
System Restore Volume Shadow Copy Service Task Scheduler msconfig |
Task Scheduler
|
|
You need to download and install critical system updates, security patches or hotfixes, andupgrades for Windows components. Which Windows utility allows you accomplish this?
Windows Update File and Settings Wizard System Restore Recovery Console |
Windows Update
|
|
Auser has connected a second monitor to his Windows 7 Ultimate computer. The new monitoris detected. However, thedual-monitor configuration is not configured as he wantsit. What should the user do to changethe dual-monitor configuration of the monitors?
Navigate to Control Panel\Appearance andPersonalization\Display\AdjustResolution. Navigate to Control Panel\Appearance andPersonalization\Display\Adjust Resolution\Advanced Settings. Right-click the desktop, and select Personalize. Right-click thedesktop, and select Gadgets. |
Navigate to Control Panel\Appearance and Personalization\Display\Adjust Resolution.
|
|
Youneed toconnect tothe Internet ata client site. The system administrator gives you an SSID of Workplace 1 and a password. Which network typeare you goingto use to connect to the Internet?
VPN broadband wireless dialup |
wireless
|
|
You are working at a client site and need to connect securely to the network at your home office. Whichsecondary network connection will allowyou to do that?
VPN WWAN Wireless Dialup |
VPN
|
|
You have configured System Restore on the computers in your network. Which condition will NOT result in a restorepoint being created?
installing new device driver upgrading device driver installing software saving a new file |
savinga new file
|
|
You need to defragment a hard drive.When the defragmentation is complete,you want to view both the analysis and defragmentation reports. Which command should you run?
defrag /a defrag /v defrag /a /v defrag /f |
defrag /v
|
|
Which Linux command allows you to view the processes running on a system?
ps grep apt-get chmod |
ps |
|
Which Mac OS feature allows you to access content on a CD or DVD drive when you do not have an opticaldrive? Boot Camp iCloud Remote Disk Finder |
Remote Disk
|
|
You areresponsible for managing the virtual computers on your network. Whichguideline is important when managing virtual computers?r
Updatethe operating system and applications only on the host computer. Implement a firewall only on the host computer . Isolate thehost computerand eachvirtual computer from each other. Install and update the antivirus program onlyon the host computer. |
Isolatethe host computer and each virtualcomputer from each other
|
|
Which cloud computing term refers to a feature that allows a provider to dynamically adjust resource allocation, based on demand?
rapid elasticity resource pooling measured service on demand |
rapid elasticity |
|
Which termrefers to a cloud infrastructure that provides services to many related organizations?
public cloud private cloud hybrid cloud community cloud |
community cloud
|
|
Which iPhone feature allows you towirelessly backup yourmobile device data, includingapp,pictures, and music, so that youcanlater retrieve the data on any mobile device, even if thedata ison another mobiledevice?
Passbook App Store iTunes iCloud |
iCloud
|
|
Which feature of a mobile device measures the directional movement of the device, but not the tilt of the device relative to a horizontal plane?
Geotracking GPS gyroscope accelerometer |
accelerometer
|
|
You are on an Android phone and frequently roam outside of your local area. You need to update the list of cell towersto provide better coverage. Which updatewould you perform?
PRI update PRL update Baseband update None of the above |
PRL update preferred roaminglist |
|
You need to configureyour Android phone so that you can receiveyour Yahoo email on the device. What information would youneed to provide?
email address, password, IMAP servermail.yahoo.com, SMTP serversmtp.mail.yahoo.com device's IP address, password,IMAP server mail.yahoo.com, SMTPserver smtp.mail.yahoo.com email address, password, IMAP server mail.yahoo.com, SMTPserver ftp.yahoo.com email address, password,IMAP server mail.yahoo.com |
email address, password, IMAP server mail.yahoo.com, SMTPserver ftp.yahoo.com
|
|
You are configuring the e-mail settings for the phones. Your organization's e-mail servers are as follows:
•POP3 mail server - pop3.dreamsuites.com •IMAP mail server - imap.dreamsuites.com •SMTP mail server - smtp.dreamsuites.com The POP3 and IMAP servers use the default ports. The SMTP server requiresSSL and uses port 587. Management has requestedthat their e-mails retainthe Readstatus no matter where the e-mailwas read. What shouldyou do? (Choose two.) Configure pop3.dreamsuites.com as the incoming server usingport 110. Configure pop3.dreamsuites.com as the incoming server usingport 143. Configure imap.dreamsuites.com as the incoming serverusing port 110. Configure imap.dreamsuites.com as the incomingserver using port143. Configure smtp.dreamsuites. com as the outgoing server using port 25. Configure smtp.dreamsuites. comas theoutgoing server usingport 587. |
Configure imap.dreamsuites.com asthe incomingserver using port 143.
Configure smtp.dreamsuites.com as theoutgoing server using port 587. |
|
Yourcompany is implementing anew application. Authenticationwithin theapplication includesthe client authenticating with theserver and theserver authenticatingwith the client. Whattype of authentication is this?
mutual authentication multifactorauthentication single sign-on biometricauthentication |
mutualauthentication
|
|
Which of the following types of data can be synchronizedto the cloud?
calendar pictures documents all ofthe above |
all ofthe above
|
|
You are a network administrator for Nutex Corporation.Your organization implements anetwork. You have been tasked with designing theend-user security training that will be given to all employees regarding the network. Whichsecurity issue should you cover?
denial of service (DOS) attacks physical security issues social engineering attacks smart card usage |
social engineering attacks
|
|
A hacker has called a company employeeand learned the employee's user name and password by posingas a memberof corporate technical support.
Which type of attack has the company suffered? buffer overflow denial of service brute force social engineering |
social engineering
|
|
Which of the following is an example of phishing?
a Visual Basic scriptattached to an e-mail that infects your system anattack thatuses drones to obtain e-mail accounts to sendspam a program that sends out your personalinformation to an advertiser ane-mail request from a financial institution askingyou to log in and changeyour password usingtheprovided link |
ane-mail request from a financial institution askingyou to log in and changeyour password usingtheprovided link
|
|
Which malicious program replicates itself to computers on a networkthrough security loopholes?
worm boot virus e-mail virus trojan horse |
worm
|
|
After determining the scope of a user's job, what is the next step in implementing theprincipleof least privilege?
Determine the minimumset of privileges neededto perform the user'sjob. Determine the maximumset of privileges needed toperform the user's job. Configure the appropriate privileges forthe user's account. Configure the appropriate group memberships for the user's account. |
Determine the minimumset of privileges neededto perform the user'sjob.
|
|
What is a smart card?
ahardware device that has an embedded microchip that contains authentication orsecurity information atechnology thatmeasures a humancharacteristic for authentication anelectronic file that establishes youridentity via a public key infrastructure (PKI) to complete transactions anelectronic signature that can be used to prove the sender's identity or a document's signer |
ahardware device that has an embedded microchip that contains authentication orsecurity information
|
|
You want to provide secure access to the research laboratoryand ensure that only authorized persons canenter thelaboratory. Which system does NOT provide aneffective means of ensuring that only authorizedpersons can enter the server room?
smart card system swipe card system single sign-on system biometric access controlsystem |
single sign-on system
|
|
You have stored criticalinformation about your companyin the computers in yourserver room. You want only authorized peopleto be allowed entry into the server room. Whichmethod will be MOST effective to maintain the security of the serverroom?
Employ an access controlsystem on the entrance of theserver room. Employ a securitystaff at the entry of the serverroom to checkthe individuals who enterthe server room. Place a safe lock on the serverdoor and give the key only to the authorized persons. Position a surveillance cameraat the entranceof the serverroom. |
Employ an access controlsystem on the entrance of theserver room.
|
|
What is thepurpose of a privacy filter?
tofilter confidential information that is contained in any networkcommunication to prevent othersfrom viewing what you are enteringon your keyboard toprevent others fromviewing what you have displayed on your monitor tofilter confidential information that is contained in any e-mail |
to prevent others from viewing what you have displayed on your monitor
|
|
What is the aim of security awareness training?
All employees must understand their security responsibilities. Allemployees in the IT department shouldbe able to handle security incidents. All employees excludingtop management should understand the legal implications of loss of information. All employees in the IT department shouldbe able to handle social engineering attacks. |
All employees must understand their security responsibilities.
|
|
Whenusers log in tothe network locally,they must provide their username and password. When users log in to the network remotely, theymust provide theirusername, password,and smartcard. Which two statements are true regarding your organization'ssecurity? {Choose two.)
The local networklogin uses one-factor authentication. The local network login uses two-factor authentication. The remote network login uses three-factor authentication. The remote network login usestwo-factor authentication. |
The local network login uses one-factor authentication.
The remote network login uses two-factor authentication. |
|
You have installedseveral 32-bit and 64-bit applications on a Windows 7 Ultimate 64-bit computer. What is the installation folder for the 32-bit applications?
C:\Program Files C:\ProgramFiles (x86) C:\Program Files (x64) C:\Windows\System32 |
C:\Program Files (x86)
|
|
Yourorganization is concerned with unauthorized users downloading confidential datato removable media.You decide to encrypt the confidentialdata using the Encrypting File System (EFS) in Windows XP. You need to copy an EFS-encrypted file. The file will be copied to an NTFS volume that does not implement EFS.What is the state of the file?
The original versionof the file is decrypted.The newversionof the file is encrypted. The originalversion of the file remainsencrypted.The new version of the file is encrypted. The original versionof the file remains encrypted.The newversion of the file is decrypted. The original versionof the file is decrypted.The new version of the file is decrypted. |
The original version of the fileremains encrypted. The new version of the fileisdecrypted.
|
|
Whatis the quickest way to lock a Windows7 computer?
Press Ctrl+Alt+Del, and select Lock this computer. Press the Windows + L keys. Right-click the taskbar , andselect Lock the taskbar. Click Start.Clicktheright arrow next to Shutdown, andselect Lock. |
Pressthe Windows + L keys.
|
|
Which password policy setting can you configure on a Windows 7 computer to define the number of days that a password must be kept beforethe user can change it?
the Enforce password history setting the Maximum password age setting the Minimum password age setting the Minimumpassword lengthsetting |
the Minimumpassword age setting
|
|
What is thegreatest threat to the securityof mobile devices?
excessive permissions GPS location services theft unsecured WiFi |
Theft Thetop threats to mobile devicesecurity are as follows . •Theft •Excessivepermissions •Geolocation and GPS locationservices •Unsecured WiFi •Mobile application vulnerabilities |
|
A user from your organization contacts you that a company-issued iPhone has been lost. The iPhone contained confidential information. You need to remove all thedata from this iPhone. What should you do?
Log in toiCloud.com, andselect Find MyiPhone. Select the devicefrom theDevices list, and click Erase iPhone. Login to iCloud.com,and selectFind My iPhone.Select thedevice from theDevices list, and click Lock. Login to iTunes,andselect Find My iPhone. Select the device from the Deviceslist, and clickErase iPhone. Login to iTunes,and selectFind My iPhone. Select the device from the Deviceslist, and click Lock. |
Log in to iCloud.com, and select Find My iPhone. Select the device from the Devices list,and click Erase iPhone.
|
|
You need to ensure thatdata on storagemedia is properly classified to ensure that the appropriate data is retained. Whichoperation mustyou undertake to avoidmishandlingof tapes,CD-ROMs,floppy disks, and printed material?
labeling degaussing zeroization offsite storage |
labeling
|
|
You are creating a wireless network for your company. You need to implement a wireless protocolthat provides maximum security while providingsupport for olderwireless clients. Whichprotocol should you choose?
Wireless Application Protocol (WAP) Wired Equivalent Privacy (WEP) Wi-Fi Protected Access (WPA) Wi-Fi Protected Access 2 (WPA2) |
You should implementWPA. WPA was created to fix core problems with WEP. WPA isdesigned to work with olderwireless clientswhile implementing the 802.11istandard.
|
|
You have twowireless networks in your building.The wireless networks do notoverlap. Bothof them use Wi-FiProtected Access (WPA). You want to ensure that no unauthorized wirelessaccess points are established. What should you do?
Change the twowireless networks to WPA2. Change the two wirelessnetworks to WEP. Periodically complete a site survey. Disable SSID broadcasts for the two wireless networks. |
Periodically complete a site survey.
Sitesurveys generally produceinformation on the typesof systemsin use,theprotocols in use,and other critical information. You need to ensure that hackerscannot use sitesurveys toobtain this information. To protect against unauthorized site surveys, you should changethe default Service Set Identifier (SSID} and disable SSIDbroadcasts. Immediately upon discovering a wireless accesspoint using a site survey, youshould physically locate the device anddisconnect it. |
|
Thomas contacts you that a motherboard manufacturer has announced that arecent firmware update will provide additional functionality and increased performance for hisWindows 7 computer. What would you tell Thomas to do?
Download the new driver,and install it in the operating system. Flash the BIOS. Select the Update Driver Software option in Device Manager. Use theSystem Configuration utility to reboot the computer in Diagnostic startup mode, andthen install the update. |
Flash the BIOS
|
|
Ten computers in your department need the BIOS updated, and it needs to be completed within a two-hour timeframe. What is the fastest way to accomplish this task?
Flash the BIOS. Usea bootable flash drive. Usea boot loader file. Update the EEPROM chip. |
Flash the BIOS.
|
|
A user has recently upgradedthe video adapter drivers on a Windows Vista computer . Since thattime, thecomputer has been continuously restarting. You tried rebooting thecomputer using the Last Known Good Configuration, but it does not affect the problem. What should you do to fix the problem using the least administrative effort? (Choose two.)
Boot thecomputer witha Windows Vista bootable disk. Restart thecomputer inSafe Mode. Roll backthe video adapter drivers. Perform afresh installation of Windows Vista. Restart thecomputer,press the F8key, and select the Command prompt only option. |
Restart thecomputer in SafeMode. Roll back the videoadapterdrivers. |
|
You need totroubleshoot a driverissue. When Windows Vistais booting, you press F8to enter the AdvancedBoot Options menu. Whichoption is NOTan optionlisted in themenu?
Safe Mode Safe Mode withNetworking Directory Services Restore Mode Automated System Recovery |
Automated System Recovery
|
|
Asthe desktop engineer in your company , youare responsible fortier-onesupport, meaning that youcompile all problems and report themto the proper technician. Several users report thatwhen they boot their computer it generates a screen with hexadecimalcodes on a blue background. Which type of Windows error code is this??
a POST error a runtime error an illegal operation a STOP error |
a STOP error
|
|
A user has a WindowsVista computer with 128 MB of RAM and two hard drives, named drive C and drive D. The pagingfile is locatedon drive C. The user complainsthat his computer does not performwell after running for a couple hours. What should you tell the userto do?
Move the paging file to drive D. Increase thesize of thepaging file. Disable the paging file. Defragment the hard drives |
Move the paging fileto drive D.
|
|
After George works with his Windows computerfor several minutes,a blue screen erroroccurs. His computer reboots, andno error reportnotification is received.You want Microsoftto be notifiedof theerror, and you suspect that the error-reporting feature is disabled. You must enable it. You openthe System Properties dialog box. Where should you enable this feature?
the Advanced tab the System Restore tab the Hardware tab the General tab |
the Advanced tab
|
|
A user contacts you to report that a "NTLDR is missing or corrupt" message is appearingon his computer. After researching this issue, you discoverthat the master boot record is corrupt. Which tool should you use to correct thisproblem?
System Recovery Options Windows Update MSCONFIG Event Viewer |
System Recovery Options
|
|
WindowsVista could not start because the following fileis missing or corrupt: \WINDOWS\SYSTEM32\CONFIG\SYSTEM What doesthe error message indicate?
The registry is corrupt. A configuration file has problems. Anewly installed application is corrupt. A Windows startup file iscorrupt |
The registry is corrupt.
|
|
What will enable you to change the Screen area setting to 1024 x 768 pixels?r Restart your WindowsVista computer.
Start your Windows Vistacomputer in Safe Mode. Install the appropriate device driverfor the videocard. Replace the monitor connected to yourWindows Vistacomputer. |
Install the appropriate device driver for thevideo card.
|
|
Amyis an IT trainer and is training a group of technicians on how to look forcertain attacks and security threats. She is discussing software included in Windows Vista that helps prevent malwareand spyware infections. Whatis the name of this software?
Event Viewer Windows Defender Microsoft AntiSpyware Ad-Aware SE Personal |
Windows Defender
|
|
A user contacts you stating thathe believes that his computer is infected with malware. Whichsymptoms may indicate that he is correct? (Choose all that apply.)
pop-ups browser redirection low diskspace warning alert security alerts junkemail slower performance |
pop-upsbrowser redirection security alerts slower performance
|
|
Users in your department are noticing thattheir computers are not acting normal. Whenyou ask them to explain, theysay that their computers are sluggish and slower than usual. You need to rule out a virus infection. What is the first question you will ask them to help determinewhether they have a virus or not?
Have you opened any email attachments lately? Haveyou run your virus scan software recently? Haveyou rebooted yourcomputer lately? Haveyou opened Task Manager recently? |
Have you opened any emailattachments lately?
|
|
You suspectthat Alice's computer isinfected with malware by identifying certain symptoms of malware. What is the next stepin the malware removalprocess?
Disable system restore onAlice's computer. Quarantine Alice's computer. Remediate Alice's computer. Educate Alice on malware. |
Quarantine Alice's computer.
|
|
Hannah ishaving issues withher new headphones directly connected to her mobile device. She cannot hear anything even though sheis connected. Whatis the firstthing she coulddo totroubleshoot thisproblem?
Check the headphone volume. Check theheadphone connection. Check WiFi connectivity. Check Bluetooth connectivity. |
Check the headphone volume.
|
|
Isaac purchased a refurbished iPhone andhas loaded the latest version of iOS. However his iPhoneseems to not hold a charge for very long.What can you recommend he try so he can alleviate his extremely short battery life?
Use the battery usage report. Use the Low Power Mode setting. Delete some apps. Enable WiFi. |
Use theLow Power Mode setting.
|
|
Alanof Northern Company is traveling to several conferences in various statesto present his new product line to consumers.He usually uses a Slim portto project his Android screen but accidentally left his cables at the last site where he was. His next presentation is in four hours. What can he request from the hotel technical team to keep theshow rolling for Alan? (Choose two.)
a Micro HDMI cable a Miracast or Chromecast an HDMI cable a mini USB cable |
a Micro HDMI cable
a Miracast orChromecast |
|
Shelly was in the workout room listening to her music via her Bluetooth headphones on her iPhone 6 which was in her pocket. When she was finished shewent into sauna but soon noticed her music stopped playing. What most likely happened?
Lost Bluetooth signal Lost WiFi signal iPhone overheated Headphones lost power |
iPhoneoverheated
|
|
Susan has calledthe help desk and is complaining about a frozenscreen on her mobile device.After troubleshooting, you determine that she has a frozen system. What instructions will you give her to doover the phone to save you a trip?
Press CTRL+ALT+DEL keys. Force a restart by holding downthe Power button. Elevate to next level oftechnical support. Callthe mobile device technical support. |
Force arestart by holding down the Powerbutton.
|
|
Andrea is inan airport waiting for herflightto takeoff andpreparingfor herwork presentation. Although the airport offers free WiFi, she usesher iPadto edither presentation and tethers it to her iPhone's personal hotspot. Why is this most likely a goodpractice?
slow data speed no wireless connectivity no Bluetooth connectivity possibility of leaked files and data |
possibility of leaked files and data
|
|
Yourmobile deviceis fully charged.You havebeen travelling all day using your mobile device tomake calls. However, when you travelinto remote areas, calls mysteriously disconnect. What is the most likely problem with thedevice?
Power drain Signal drop/weaksignal Slow data speeds High resource utilization |
Signal drop/weaksignal
|
|
There are many occupationalprocedures thatshould be modeledas an A+ certified technician. Withthat in mind, what is the most important equipment you needto transport a CRT monitorto another part of a facility?
an anti-static wrist strap a back brace rubber-soled shoes a cart |
a cart
|
|
Michael is learning about hard drives and how they should be properly installed. What factor do you tell himis MOST likely to harm the data on SATAhard drives and backup tapes?
RFI ESD magnets EMI |
magnets
|
|
You have been hired as an IT technician to repair computers and other devices for a large corporation. Which device is most likely to contain internal components that can cause burns?
desktop computer laser printer nkjet printer laptopcomputer |
laserprinter
|
|
A major fire is detected in the basement of yourcompany and a fire alarm is raised. What should be the FIRST step?
Evacuate thebuilding. Locate thefire extinguisher to douse the fire. Turnoff theelectricity. Call the emergency personnel. Determine the type of fire. |
Evacuate thebuilding. |
|
An electrical fire has started in your server room. Which type of fireextinguisher should you use?
Class A Class B Class C Class D |
Class C |
|
Jane is new to the PC technician world and is curious about ESD. Which steps would you tell her to useas preventive measures against static electricity? (Choose all that apply.)
Wear anti-static bands while servicing computer components. Ensure that the humidity leveldoes notbecome toohigh. Wear leathersoleshoes. Have proper grounding of building and outlets. Ensure that sensitive areas, such as server rooms, are carpeted. |
Wearanti-static bands while servicing computer components.
Have proper grounding of building and outlets. |
|
Howard the maintenance supervisor hasidentified several devices in yourcompany's facility that contain phosphorous. Which guidelines wouldyou need to emphasize his team regardinghow to properly dispose ofphosphorus? (Chooseall that apply.)
IMSDS OSHAguidelines EPA guidelines FDA guidelines |
MSDS (Material Safety Data Sheet )
OSHA guidelines ( Occupational Safety and Health Administration ) EPA guidelines ( Environmental Protection Agency ) |
|
You have been given a form to reviewduring the interview process for a new job. The form includes sections requesting safety measures,fire-fighting procedures,transportation requirements, andfirst aid measures. Whichform are you reviewing?
Cascading StyleSheet (CSS) Material Safety Data Sheet(MSDS) Manager's Safety DataSheet Employee Information Data Sheet |
Material Safety DataSheet (MSDS)
|
|
What should you do if you discover inappropriate material on a company-owned computer and a company computer-use policy existsthat addresses this specific situation?
Inform your supervisor of the inappropriate material. Inform the user'ssupervisor of the inappropriate material. Askthe userto remove the inappropriate material. Follow the procedures for dealing with thisviolation. |
Follow theprocedures fordealing with this violation.
|
|
While performing preventativemaintenance on a user's computer,you notice severaloffensive files on the user's computer.Your company does not have an Acceptable Use policy. What should you do?
Contact your supervisor. Contact the user's supervisor. Inform the user that the files must be removed. Remove the offensive files. |
Contact your supervisor.
|
|
While discussing a computer problemwith a user, you realize that solving the problem requires a level of expertise that you do not have. How should you handle this problem?
Tellthe useryou do not know how to fix his problem. Gothrough a few troubleshooting steps. Askthe user if you can transferhim toappropriate personnel. Put the user on hold,and call yoursupervisor. |
Askthe user if you can transferhim toappropriate personnel. |
|
All of your telephone support technicians are trainedin proper telephoneetiquette, but you notice that sometimes youoverhear some of them notfollowing all of the techniques suggested. In yourweekly team meeting what can you specifically address that they NOT exercise when dealing withan aggressive customer?
Ask for clarification. Match the customer's tone of voice. Askwhat would make the situation better. Paraphrase what the customer said. |
Match the customer's tone of voice.
|
|
Which statement is more effective when dealingwith a customer who keepshaving the same problem?
"I do not know what is causing this problem." "You should nevershut down your computer that way." "You should have shutdown your computerproperly." "Often thistype of problem is caused when a computer is not shut down properly." |
"Often thistype of problem is caused when a computer is not shut down properly." |
|
When explaining new equipment features to a customer, all of the following areacceptable practices,EXCEPT: Sit beside the customer. Usedirectstatements to the customer. Avoid interrupting the customer. Use acronyms to sound more intelligent. |
Use acronyms to sound more intelligent.
|
|
A customer contacts you with a technical issue you must research. After obtaining permission, you place the customeron hold to complete the research. What is the maximum amount of time thecustomer should remain on holdbefore receiving an update?
30 seconds 1 minute 2 minutes 5 minutes |
2 minutes
|
|
While servicing some computer equipment,youoverhear a conversation about company-widepay raises. What should you do?
Keep the information confidential. Tellyour co-workers about the pay raise. Tellyour supervisor about the pay raise. Sendan anonymous e-mailto all companyemployees about the pay raise. |
Keep the information confidential.
|
|
A customer calls you to reporta video problem with his computer . The customer starts to explainthe symptoms of the problem.What should you do first?
Interrupt him, and obtain only the relevantinformation. Interrupt him,and obtain onlythe basic information. Allowhim to finishhis explanation, andrecord all the details he gives you. Allow him tofinish his explanation, butrecord only the information you feel is relevant. |
Allow himto finish his explanation, and record allthe details he gives you.
|
|
A customer calls with a desktop computerissue. After actively listening to the customer,you have several questions you need answered.What is the purpose of asking pertinent questions AFTER using activelistening during a customer call?
to develop trust to develop understanding to develop dialogue to show interest |
to develop understanding
|
|
You are troubleshooting a problem with a computer. After analyzingthe problem, youdetermine a possible causeof the problem.Youtest your theory, but determine that thetheoryis not correct.Which two steps could you take next? (Choose two.)
Establish a new theory. Establish a planof action. Implement asolution. Escalate theproblem. |
Establisha new theory.
Escalate theproblem. |
|
You have an application thatwill only run properlyon Windows XP Professional. A user has a Windows 7 Ultimate computer on which the applicationis installed. You right-click the application and select Properties. Which tab shouldyou select to configure the application to run in a Windows XP environment?
the General tab the Compatibility tab the Securitytab thePrevious Versionstab |
the Compatibility tab
|
|
When you start WindowsVista,an error message is displayed that indicates that a servicefailed to load. Which utility can you use to determine why the service failed to load?
Event Viewer Resource Meter Network Monitor System Configuration |
Event Viewer
|
|
A user wants you to ensure that his Windows Vista computer uses Windows Flip3D. Which feature should youenable?
UAC Windows Aero Compatibility mode Windows Sidebar |
Windows Aero |
|
Whatis the recommended setting for the User Account Control: Behavior ofthe elevation prompt for administrators in Admin Approval Mode group policy in ahighly secure environment for Windows7 computers?
Prompt for consent Prompt for credentials Prompt for consent on the securedesktop Prompt for credentials on the securedesktop |
Prompt for credentials onthe secure desktop
|
|
You need to upgrade a computerrunning Windows Vista HomePremium with ServicePack 2 to Windows 7. To whicheditions of Windows 7 can this computer be upgraded? (Choose all that apply.)
Windows 7 Starter Windows 7 HomePremium Windows 7 Professional Windows 7 Ultimate |
Windows7 Home Premium
Windows 7 Ultimate |
|
You have purchased several new computers with dual processor configurations. The new computers have dual 1- gigahertz (GHz) processors and 2 gigabytes (GB) of RAM. Which editions of Windows Vista could you installtobe able to utilize all components? (Choose all that apply.)
Windows Vista Home Basic Windows Vista Home Premium Windows Vista Business Windows Vista Ultimate |
Windows Vista Business
Windows Vista Ultimate |
|
You need to locally install Windows 7 Ultimate on anew computer. What is themost likely installation method?
network DVD PXE CD |
DVD |
|
Youare settingup a new Windows Vista computer. Several users willbe using this computer. You decide to configurea local user account foreach user.You need to ensure that users can control who has access to theirfiles. What shouldyou do?
Use FAT. Use NTFS. Use EFS. Use smart cards. |
Use NTFS. |
|
You are the desktop support technician foryour company. You are working on a computer running Windows 7 thathas two hard disk drives, named HDD1 and HDD2. You want to copy the entire file andfolder structure from HDD1 to HDD2 in the most efficientmanner. Which command-line toolshould you use?
copy.exe xcopy.exe diskcopy.exe move.exe |
xcopy.exe
|
|
An ITtechnician reports that he ran the sfc utilityon a user's computer. Why would thisutility be used?
It detects signed and unsigned device drivers on a computer. Itlists information aboutdrivers running on acomputer. It monitors changes to protected system files. It repopulates the dll cache folder when contents are corrupted. |
It repopulates the dll cache folder when contents are corrupted. |
|
You runthe systeminfo command on a Windows 7 computer. Which information will NOT be displayed?
hotfixes installed boot options domain name virtual memory statistics |
boot options
|
|
You launch Performance Monitor in Windows 7 Professional. Which components can you monitorusingthis tool? (Choose all that apply.)
processor memory network disk |
processor
memory network disk |
|
All company computers have been upgraded to Windows 7. A user complains that the Run dialog box is no longer available from the Start menu. You want torestore this functionalityfor the user. What shouldyoudo?
Right-click the taskbar and select Properties. Onthe Toolbars tab, select Start. Right-click the taskbar and select Properties. On the Start Menu tab, select Customize. Right-click the taskbar and select Properties. On the Taskbar tab,select Customize. Right-click the taskbar and select Properties. On the Toolbars tab,select Run. |
Right-click thetaskbar andselect Properties. On the Start Menu tab, select Customize.
|
|
You need to make sure that no old user application data is still locatedon a Windows Vista computer. Which hidden folder in Windows Vista storesthisdata?
%systemdrive%\Users\user_name\AppData %systemdrive%\Documents and Settings\AppData %systemdrive%\Loca lSettings\Application Data %systemdrive%\Documents and Settings\Local Settings\Application Data |
%systemdrive%\Users\user_name\AppData
|
|
You need to adjust the microphonerecording levels on a Windows Vistacomputer. Where should you go?
ClickStart and Control Panel. Click Sounds and Audio Devices,andselect the Voicetab. In the Voice Recording section, click the Volume button. ClickStart and Control Panel. Click Sound, and select theRecording tab. Select the microphone you want to adjust, andclickProperties. In the Microphone Propertiesdialog box,select the Levels tab. ClickStart and ControlPanel. Double-click Speech. Choose the SpeechRecognition tab. Select the Audio Input button, and then click theProperties button. Click Start and Control Panel. Click Ease of Access and Speech Recognition. ClickSet up microphone. |
Click Start and Control Panel. Click Sound, and select the Recording tab. Select the microphone you want to adjust, and click Properties. In the Microphone Properties dialog box, select the Levels tab
|
|
You needto enable Wake on LAN. Where would you go first todo this?
on the NIC in Device Manager on the router in theBIOS |
in theBIOS
|
|
You need todo a backup. You onlywant to back up thosefile that havechanged or havenot been previously backed up.You also do not wantthem to be marked as backed up. Which type of backupwould you choose?
copy daily normal incremental differential |
differential
|
|
Which of these is a system tool withinMac operating systems?
Force Quit Task Manager TaskScheduler Dolphin |
Force Quit
|
|
You have an unresponsive application,and you wish to end it. Which toolwill allow you to do that?
Time Machine Force Quit Snapshot Image recovery |
Force Quit
|
|
You are responsible for managing a Windows Vista computer that hostsseveral virtual computers.You need to install the latest patchesfor the operating system. Where should you installthe patches?
on the host computer only on each Windows Vista virtual computer only on the physical computer only onboth the host computer and allWindow Vista virtual computers |
onboth the host computer and allWindow Vista virtual computers
|
|
Which of these cloud services typically provides the hardware and software necessary for application development?
laaS Saas Paas public cloud |
PaaS
|
|
Which of these terms refers to a foundation service upon which theother two are built?
Saas laas PaaS hybrid cloud |
laas
|
|
Which of the following is NOT an Internet appliance?
UTM IDS IPS DNS |
DNS |
|
Which of the following statements regarding Android phones is INCORRECT?
The Android GPS needs a view of thesky. The Android GPSwill use battery life. TheAndroid GPSrequires the help of cell towers to obtain a location. Android Apps canuse celltowers,WiFi hot spots,or satellites toobtaina location. |
The Android GPSrequires the help of cell towers to obtain a location.
The Android GPS uses satellites toobtain a location. |
|
Which of the following is NOT disabled whenan iPhone is placed in Airplane Mode?
cellular Siri WiFi GPS |
Siri
|
|
You wish to send encrypted emails. What option should you enable? POP3 IMAP S/MIME ISP |
S/MIME |
|
A company representative has justlanded a significant order at atrade show. He has all the necessary information on his laptop and needs to transmit it to the homeoffice for processing. However, he calls you on his company-issued Android phone and notifies you that Internet access is down at the trade show. He is on an LTE connection. What should you recommend?
Enable tethering on theAndroid phone. Pair the phone and laptop via Bluetooth. Setthe Android phone to AirplaneMode. Connect the laptop to the company network over a VPN. |
Enable tethering on the Android phone.
|
|
You need to synchronize your mobiledevice data with your desktop computer. For security reasons,your organization prohibitssyncing devices over wireless connectionsor the Internet. Which connection(s) could you use to performthe synchronization?
802.11 USB Bluetooth Ethernet |
USB |
|
Whatis the processwhereby data, including pictures, music, andcontacts, on your mobile device is uploaded to your desktop computer?
remote wipe remote backup synchronization patching |
synchronization
|
|
Which type of malicious software infects through the Internet to collectuser information, including browsinghabits?
spyware viruses worms Trojan horses |
spyware |
|
Which malicious software relies on other applications to executeand infect thesystem?
a virus a worm a logic bomb a Trojan horse |
a virus |