• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/466

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

466 Cards in this Set

  • Front
  • Back
You have determined that several computers on your company's network need to have the BIOS updated. Which of the following changes to your computer would MOST likely require that you flash a computer's BIOS afterward?

adding memory
upgrading CPU
replacing the system board
changing the boot sequence
upgrading CPU
A user reports that he is having problems with his monitor. He explains that his Liquid Crystal display (LCD) is no longer spreading the light over the entire area of the laptop's LCD screen.

inverter
deflection yoke
electron gun
diffuser
diffuser
Vincent has a computer with two DVI ports and wants to connect it to an HDMI display. What is the easiest solution?

Install a video adapter card in the PCI slot.
Purchase a DVI to HDMI cable or adapter.
Connect the HDMI cable to the DVI port.
Install a video adapter card in the PCle slot.
Purchase a DVI to HDMI cable or adapter.
Abigail works in Europe. She has a laptop with a standard VGA port that she uses for presentations at client sites. When she gets to the United States,she realizes that the companies she's presenting for all have HDMI displays and interfaces. What would you recommend she purchase for her travel bag as the most cost-effective solution?

Purchase anew laptop with both VGA and HDMI connectors.
Purchase a portable projector for VGA.
Purchase a VGA to HDMI adapter.
Purchase an HDMI to DVI cable.
Purchase a VGA to HDMI adapter.
Why would you implement a KVM switch?

to segment a network
to protect an internal network
to cache Web data and images
to reduce device needs in a data center
to reduce device needsina data center
Your company purchases a new USB mouse for a server. Which statement characterizes this mouse?

You can plug it into a computer while the computer is on.
You must connect it to the computer through a parallel port.
You must restart the computer immediately after connecting it.
You cannot connect it if another USB device is already connected to the computer.
You can plug it into a computer while the computer is on.
A user is considering purchasing a printer capable of 1200 dpi. What does this indicate?

power capability
print speed
print resolution
communication speed
print resolution
Which printer upgrade option allows a printer to act as a standalone printer on a network?

NIC
RAM
duplexer
finisher
NIC
One of your clients needs to print to multi-part forms. Which printer type should you advise your client to consider?

laser
inkjet
thermal
dot-matrix
dot-matrix
What does a dot-matrix printer use to ensure that ink is transferred onto a piece of paper?

ink nozzles
electrostatic charges
print head pins
heat fuser
print head pins
Which printer type uses a tractor feed?

laser
inkjet
dot matrix
thermal
dot matrix
Which printer uses heat to transfer thermal wax onto paper?

ink jet
dot matrix
thermal
laser
thermal
You are responsible for performing all routine maintenance on your company's laser printers. Which of the following maintenance tasks would result in the need to reset the page count?

replacing the toner
installing the maintenance kit
calibrating the printer
cleaning the printer
installing the maintenance kit
You are responsible for performing routine maintenance on your company's laser printers. Which of the following routine maintenance does NOT require that you disconnect the laser printer from its power source?

replacing the toner
installing the maintenance kit
calibrating the printer
cleaning the printer
calibrating the printer
Which statement is true for Advanced Technology Extended (ATX) motherboards?

An ATX motherboard has a 12-pin power connector.
The processor, memory, and expansion slots on an ATX motherboard are all in line with each other.
An ATX motherboard can support a maximum of seven expansion slots.
An ATX motherboard can support Extended Data Output (EDO) Random Access Memory (RAM).

An ATX motherboard can support a maximum of seven expansion slots.

Which component detects both single-bit and multi-bit errors?

parity bit
ECC
L1 cache
L2 cache
ECC
Which hardware component will require the least amount of time to replace?

motherboard
memory module
power supply unit
network interface card
memory module
A graphics designer asks you to ensure that her computer supports scalable link interface (SLl).What is the purpose of scalable link interface (SLI) technology?

It groups two or more network links together to increase performance.
It groups two video cards together to increase video performance
It utilizes multiple serial connections to increase performance.
It provides scalability for motherboard serial connections.
It groups two or more network links together toincrease performance.
What is the name of the media of a hard drive where data is stored?

head actuator
disk platter
read/write heads
firmware
disk platter
For which type of device should you use the Safely Remove Hardware icon to stop the device's operation before removing it from the computer?

CD-ROMdrive
hard drive
DVD drive
USB flashdrive
USB flashdrive
Which media types could be used to transport a 1,100 MB file? (Choose two.)

CD
CD-RW
DVD+R
DDS-3
DVD+R
DDS-3
You have decided to enable overclocking to increase the performance of a computer. On which computer components can you specifically enable overclocking? (Choose all that apply.)

motherboard
processor
system bus
RAM
hard drive
processor
system bus
You have a motherboard that includes an LGA 1155 CPU socket. Which CPU would NOT be supported with this motherboard?

Core 2 Duo
Core i7
Celeron
Xeon
Core 2 Duo
Which of the following CPU sockets will NOT support an AMD Opteron CPU?

F
FM1
940
AM2
FM1
What is the primary purpose of an integrated GPU?

processing gaming applications
processing video and graphics
providing additional memory
providing video capture capability
processing video and graphics
Which architecture is used to build central processing unit (CPU) sockets?

CHS
PGA
ATA
EIDE
PGA
Which component can you connect to a Zero Insertion Force (ZIF) socket?

central processing unit (CPU)
single inline memory module (SIMM)
dynamic random access memory(DRAM)
electrically erasable programmable read only memory(EEPROM)
central processing unit (CPU)
Which technology allows a central processing unit (CPU) to execute two separate instructions concurrently?
Network Access Protection (NAP)
Hyperthreading
Hyper-V
Serial Advanced Technology Attachment (SATA)
Hyperthreading
Steven's computer includes a hard drive that connects to the computer's motherboard by means of a 7-wire cable with a single interface. Which hard drive interface is used by Steven's disk drive?

IDE
EIDE
SCSI
Serial ATA
Serial ATA
Which hard drive specification has the fastest theoretical busspeed?

SATA 1
SATA 2
SATA 3
IEEE 1394 FireWire
SATA 3
Which operating frequency band is usedby Bluetooth technology?


2.4 GHz to 2.485 GHz
125 KHz to 134 KHz
13.56 MHz
860 MHz to 930 MHz

2.4 GHz to 2.485 GHz
You have purchased a new 20-pin power supply to replace one that failed. However,the motherboard only has a 24-pin connector. What should you do?

Purchase a 24-pin power supply.
Plug the 20-pin power supply into the motherboard, leaving pins 1,2, 13, and14 onthe motherboard unconnected.
Plug the 20-pin power supply into the motherboard,leaving pins 11, 12, 23, and 24 on the motherboard unconnected.
Purchase a motherboard with a 20-pin powerconnector.
Change the setting on the voltage selector switch
Plug the 20-pin power supply into the motherboard,leaving pins 11, 12, 23, and 24 on the motherboard unconnected.
You are an IT technician for a small computer store. You are designing a new gaming PC for a customer. You need to ensure that it provides the capabilities that will be needed by this type of PC. Which of the following should be a concern? (Choose all that apply.)

motherboard
CPU
graphics card
sound card
CPU
graphics card
sound card
Which cable connector is used in a 1000BaseT network?

SC
ST
MTRJ
RJ-45
RJ-45
Jack has several areas in office where he needs to install cabling. He has coaxial cable on hand,and he would like to use splitters to connect the different computers and areas. If he runs multiple splitters ,which effects should he anticipate? (Choose all that apply.)

signal loss
connection speed issues
service quality issues
more collisions
fewer collisions
signal loss
connection speed issues
service quality issues

You need to connect two computers for a customer. The customer does not have a network and does not wish to purchase a concentrator , but both computers include functional Ethernet network interface cards with RJ-45 connectors. Which component will allow you to meet your customer's needs?

an Accelerated Graphics Port (AGP) card
a passive hub
a crossover cable
a protocol analyzer
a crossover cable
Which network topology supports the longest maximum cable length?

10Base2
10Base5
10BaseF
100BaseT
10BaseF
For what purpose have IP addresses in the 192.168.0.0 through 192.168.255.255 range been reserved?

multicasting
private networks
military installations only
government organizations other than the military
private networks
Which address is a MAC address?

124.24.0.2
AD-4F-C1-A9-12-CB
00120193:06F1A345CA11 1234:EF14:45:ADD1:EA23:222:1290:A 122A::ABCA:0:0 :2100
ACA1: 1345:1::123.23.0.1
AD-4F-C1-A9-12-CB
Which properties are true regarding IPv6? (Choose two.)

It has 4 billion available addresses
It has 340 undecillion available addresses
It uses 32-bit addresses
It uses 128-bit addresses
It has 340undecillion available addresses
It uses 128-bit addresses
Jeffrey wants to purchase some software for his department from Dreamsuites.com. After researching company policies, you inform him that he can only make the purchase if it is from a secure site. Which port and protocol are qualify as secure?

Port 23 Telnet
Port 443 HTTPS
Port 80 HTTP
Port 110 POP3
Port 443 HTTPS
You administer your company's 100BaseTX Ethernet network. TCP/IP is the networking protocol used on the network. You want the routers on the network to send you notices when they have exceeded specified performance thresholds. Which protocol should you use to enable the routers to send the notices?

ARP
SMTP
SNMP
Telnet
SNMP (Simple Network Management Protocol)
You want to set up a wireless network with data throughput of 54 Mbps. Which two wireless specifications will provide a data throughput of 54 Mbps? (Choose two.)

802.11
802.11a
802.11b
802.11g
802.11a
802.11g
Which technology has the SHORTEST maximum range?

Bluetooth 1.0
Bluetooth 2.0
802.11a
802.11b
Bluetooth 2.0
How should you configure the Internet Protocol (TCP/IP) Properties dialogbox on the user's laptop while expending the least administrative effort?

Configure the General tab to use the DHCP server at the headoffice. Configure a static IP address from the branch office network range on the Alternate Configuration tab.
Configure the Generaltab and the Alternate Configuration tab to use the DHCP server.
Configure a static IP address from the head office network range on the General tab.Configure a static IP address from the branch office network range on the Alternate Configuration tab.
Configure the General tab and the Alternate Configuration tab to use a static IP address from the branch office network range.
Configure the General tab to use the DHCP server at the headoffice. Configure a static IP address from the branch office network range on the Alternate Configuration tab.
Your company has both a wired and a wireless network. You have been asked to increase the security of the wireless network. Which of the followin goptions should you implement?

SSID broadcast
war driving
rogue access points
MAC filtering
MAC filtering
A salesman for your company travels primarily in Europe and Asia. You need to provide him with a wireless Internet technology that will work internationally on his laptop and that can be installed easily when he arrives at a new location. Which technology should you install?

CDMA cellular
GSM cellular
satellite
Bluetooth
GSM cellular
Which technology is the SLOWEST?

DSL
cable
fiber
satellite
satellite
What is the purpose of PoE?

It allows a network of computers to appear to the Internet as a single entity.
It provides a file storage solution that is attached to the network.
It allows an Ethernet connection to be used as both a network and power connection.
It provides a cryptographic hardware platform for securely storing data.
It allows an Ethernet connection to be used as both a network and power connection.
Which hardware device operates at the data-link layer of the OpenSystems Interconnect ion (OSI) model and ensures that data is delivered only to the destination port?

switch
hub
bridge
router
switch
You need to measure the voltage supplied by power connectors and power supplies. Which tool should you use?

ohmmeter
multimeter
SCSI terminator
Windows Resource Meter
multimeter
Which multimeter setting should you use to test a computer's power supply output?

Ohms
Continuity
AC voltage
DC voltage
DC voltage
Zachary has a desktop computer that he is replacing with a laptop. He wants to know why everyone is raving over their new flash memory drives. What is the number one reason to purchase a laptop with a flash memory drive rather than a conventional hard drive?

quiet sound
mechanical motor
ease of backup
ease of partitioning
quiet sound
You work in a customer call center.Martin is on the phone inquiring about the difference between solid state drives (SSDs),hybrids, and magnetic hard drives for his laptop. He is only going to be web surfing,emailing, and creating documents. Which hard drive would provide the best performance and reliability?

hybrid
solid state drive (SSD)
magnetic hard drive
eSata external drive
solid state drive (SSD)
Verigon hired you to train employees on how to repair computers and mobile devices. Which term below do you think is highly important to share with your trainees prior to teaching them to replace broken screens?

touch pad
swiping
digitizer
microphone
digitizer
Raymond has contacted your IT department for assistance in replacing his webcam on his laptop. What is the first step he should take?

Shutdown the computer and remove the battery.
Remove the screws from the bottom of the laptop.
Remove the keyboard.
Disconnect the laptop from all external power sources.
Disconnect the laptop from all external power sources.
Adele works as a graphic artist for a media publishing company. She is shopping for a laptop that can give her the versatility of landscape and portrait modes without having to purchase two monitors. What solution do you recommend?

docking station
digitizer
rotating screen
LCD display
rotating screen
You need to purchase a device that will allow you to turn your laptop computer into a desktop computer while you are in your office. The device must include slots for extra storage bays and a DVD drive. Which device should you purchase?

docking station
port replicator
UPS
transformer
docking station
lnterconn is a marketing firm that wants to help their employees do their job more efficiently.The company wants their computer technicians to be able to record video, upload the video feed to the cloud, and talk to customers while they perform on-site repairs. Which device should you recommend?

smart watch
e-reader
smart glasses
phablet
smart glasses
You need to establish a Bluetooth connection between an iPhone and a Bluetooth headset. What is the correct order for establishing the connection on the iPhone?

Enable Bluetooth. Enable pairing. Find and select the device. Enter the appropriate PIN.
Enable Bluetooth.Find and select the device. Enable pairing.Enter the appropriate PIN.
Enable pairing. Enable Bluetooth. Find and select the device. Enter the appropriate PIN.
Enable Bluetooth. Enable pairing.Enter the appropriate PIN. Find and select the device.
Enable Bluetooth.Enable pairing. Find andselect thedevice. Enter the appropriate PIN.
Why should you go through the trouble of finding new slot covers and installing them on the unused slots? (Choose two.)

to keep foreign objects out of the case
to keep radiation exposure at a minimum
to properly ground the computer motherboard to dampen the noise coming from inside the computer
to keep air circulating properly inside the computer case
to keep foreign objects outof the case
to keep air circulating properly inside the computer case
A user has been using his desktop computer on a daily basis for over a year now. Today,when he starts your computer, he notices that the computer does not power on. You have been dispatched to troubleshoot this problem. What could be the reason for this?

The memory is faulty.
The power supply is bad.
The CPU is overheated.
The hard disk has crashed.
The power supply is bad.
You are teaching a one-week computer repair class. Early Monday morning,you discover that a student from the previous week protected his computer with a BIOS startup password, and you are unable to contact the student to obtain the password.This week's class starts in one hour,and all seats are taken. What should you do to make the computer available to a student in this week's class?

Replace the CMOS chip.
Remove the CMOS battery.
Replace the system board.
Use a system board jumper.
Use your Windows Administrator password
Use a systemboard jumper.
George,a user, receives a blue screen error when attempting to access a third-party application on his computer. When you are troubleshooting the computer,you get a blue screen error that lists the same memory location for the error. What should you do?

Replace the defective CPU.
Replace the defective memory module.
Replace the defective hard drive.
Uninstall and reinstall the applications.
Replace the defective memory module.
You need to upgrade your Windows Vista computer to Windows 7. You put the Windows 7 DVD into its drive and reboot the system. The system does not boot from the DVD. What should you do first to solve this problem?

Replace the DVD drive.
Configure BIOS to boot from the DVD drive. Make sure the DVD drive is set to master. Change the disk format from ISO 9660 to Joliet.
Configure BIOS to boot from the DVD drive.
You replaced a processor with a newer processor that should run at a much higher speed. However, your system does not identify the processor correctly, and the processor runs at the same speed as the old processor. What could you do to correct this problem?

Update the BIOS.
Reseat the processor.
Flip the turbo switch on the motherboard. Change the voltage setting for the processor.
Update the BIOS.
A technician is dispatch to troubleshoot a user's computer. After performing diagnostics, the technician determines that drive thrashing is occurring.What are the factors that can affect this? (Choose all that apply.)

hard drive
memory
paging file
running processes
hard drive
memory
paging file
running processes
While performing routine maintenance for a customer, you hear a grinding noise coming from inside the computer case. Which component should you suggest the customer replace?

power supply
hard drive
keyboard
sound card
hard drive
A user needs the video capability in his computer upgraded to support a new graphics application. The computer includes an on-board video card. You install a new video card in the computer. You need to disable the on-board video card. Where should this card be disabled?

in Control Panel
in the System Configuration utility
in Device Manager
in the BIOS
in the BIOS
A user complains that the image on his monitor flickers a lot. This flickering occurs no matter which application the user has opened. What should you do?

Replace the monitor.
Configure the video card driver to use a lower refresh rate.
Configure the video card driver to use a higher refresh rate.
Upgrade the video card drivers.
Configure the video card driverto use a higher refresh rate.
You are a desktop administrator for Nutex Corporation.A user reports that he is unable to access network resources. You notice a break in the network cable. You need to create a new network cable to connect the computer to the RJ-45 jack in the wall. What should you use to connect the end of the cable to an RJ-45 connector?

Time-domain reflectometer
Optical tester
Wire crimper
Pliers
Wire crimper
A user is not able to access shared folders on the network. While troubleshooting the problem. the technician first checks for the link lights on the Network Interface Card (NIC). The technician observes that the link lights are not on or blinking on the NIC. Which actions should the technician perform to resolve the problem by using the least amount of administrative effort? (Choose two.)

Run the ipconfig /release command.
Check that the switch is on and the other end of the cable is connected to the switch.
Replace the network cable.
Replace the NIC.
Run the ipconfig /flushdns command.
Check that the switch is on and the other end of the cable is connected to the switch.
Replace the network cable.
Users are having trouble accessing resources by computer or host name.Which device is likely causing the problem?

DHCP server
DNS server
IIS server
firewall
DNS server
You are checking connectivity between two devices using the ping command. You want the ping command to continue sending messages until interrupted. Which parameter of the ping command should you use?

-t
-a
-f
-v

-t

You need to obtain the IP address for your local Windows Vista computer. Which tool should you use?

ping
ipconfig
telnet
nslookup

ipconfig

You are the network administrator for Nutex Corporation.You have configured a wireless network for a group of users to provide Internet access. However, users complain that they are facing intermittent loss of wireless connection. You have verified the hardware and software configuration of both your Asymmetric Digital Subscriber Line (ADSL) modem and wireless router and your DSL line from the Internet SeNice Provider (ISP). What could be causing your problems?

DSL filters
cordless phones
wireless router
television set
cordless phones
A user complains that his internal wireless network card in his laptop is no longer functioning. After troubleshooting, you decide to replace the wireless network card. You replace the wireless network card with the same model as the old card. You connect the internal antenna cables. You then reboot the computer. What should you do next?

Install the latest drivers for the wireless card. Flash the BIOS.
Connect to the wireless network.
Configure the wireless network settings.
Install the latest drivers for the wireless card.
You frequently operate your Windows 7 portable computer on battery power when you are traveling. When you use battery power, your Windows 7 computer is configured to enter standby mode after 15 minutes of inactivity . Which components are turned off in this mode? (Choose two.)

the CPU
the monitor
the keyboard
the hard disk

the monitor


the hard disk

Au ser named George reports that his portable computer overheats frequently. You inspect George's computer and discover that the air vents are open. What is the MOST likely cause of this problem?

Dust has accumulated on the heatsink fins.· The fan is not working.
The battery has become faulty.
The AC adapter is not working.
Dust has accumulated on the heatsink fins.
A user contacts you regarding a problem with his laptop's keyboard. Several keys have stopped functioning. This problem occurs in multiple applications,even after rebooting the computer. What should you have the user do FIRST?

Clean the keyboard.
Enable the keyboard in the BIOS.
Plug in an external keyboard.
Replace the internal keyboard
Plugin an external keyboard.
A user contacts you about a problem with his notebook computer. The battery for his notebook computer will no longer hold a charge. He removed the battery, but the computer will not work when plugged into the AC outlet. A new battery is on order, but will not arrive until next week. The user needs the computer to be operational for a meeting tomorrow. You want to provide the easiest method to restore operation. What should you instruct him to do?

Wait until the new battery arrives next week. Fully charge the old battery overnight, and then boot the computer.
Change the battery setting in the computer's BIOS.
Re-insert the depleted battery in the computer, and then boot the computer.
Re-insert the depleted battery in the computer, and then boot the computer.
You are troubleshooting a problem with a printer attached to a Windows 2008 computer. Several print jobs are queued and the printer is online, but the print jobs are not printing. Which two conditions could cause the problem? (Choose two.)

Printing is paused.
The printer is in energy-save mode.
There is a problem with the spooler.
The disk used for spooling is extremely fragmented.
Printing is paused.
There is a problem with the spooler.
You are an IT technician for a consulting company. You installed a new inkjet printer and successfully printed a test page. Later, users complained that they were unable to print any documents on the new printer. What should you verify first?

availability of paper
printer driver
ink cartridge
print head
availability of paper
You purchase an old inkjet printer for your company. When you print a test page,extra horizontal lines are printed all over the page.What should you do FIRST to print a test page successfully?

Clean the print head.
Refill the printer ink cartridge.
Clean the printer paper feeder.
Use high-quality paper for printing.
Clean the print head
You receive a technical support call from a department manager.She reports that the laser printer in her department prints only blank pages. A telephone interview reveals that the paper is not jamming in the printer and that the problem began occurring after the toner cartridge was replaced. What is the most likely cause of the problem?

The printer needs more RAM.
The feed rollers are defective.
The photosensitive drum was not fully discharged.
The sealing tape was not removed from the toner cartridge.
The sealing tape was not removed from the toner cartridge.
Your laser printer produces accurate images that smear easily. Which printer component should you examine?

the fuser
the feed roller
the transfer corona
the photosensitive drum

the fuser

A user reports that his dot-matrix printer is printing dark and clear on the left side of the paper but that the print is very light on the right side of the paper. What should you do to correct this problem with the printer?

Adjust the platen.
Replace the ribbon.
Clean the ink nozzle.
Align the print head.
Adjust the transfer roller.
Clear debris from the tractor feed.
Adjust the platen
Every time a Windows Vista computer boots, you receive an error message stating that the cover was previously removed. You want to prevent this alert from being displayed. In which location should you disable this alert?



in the System Configuration utility


in Event Viewer


in the BIOS


in Device Manager

in the BIOS
A computer uses an LCD monitor. You need to deploy the highest resolution available for a high-end application. Which of the list LCD technology will provide this?



XGA


QXGA


SXGA


UXGA


WXGA

QXGA
Which characteristic distinguishes IEEE 1394 from USB 2.0?



USB supports hot swapping.


IEEE 1394 supports hot swapping.


USB supports more devices on a single bus.


IEEE 1394 supports more devices on a single bus

USB supports more devices on a single bus.
Which type of keyboarddoes NOT change the Num Lock status LED when you toggle the key?





wireless keyboard


multimedia keyboard


keyboard on a portable computer


keyboard on a tablet PC

wireless keyboard
Which biometric authentication device scans the pattern of blood vessels in the back of the eye?



aniris scanner


a retinal scanner


a face recognitionscanner


a signature scanner

a retinal scanner
What is thepurpose of configuring printer availability on the Advanced tabof a printer's Properties dialog box?

Itconfigures the orientation that is available.


Itconfigures the paper and print quality that is available.


Itconfigures the daysand times that a printer is available.


Itconfigures the users to whom the printer is available.

Itconfigures the days and times thata printeris available.
Youare required to print a large number of pages on an inkjet printer in the minimum possible time. What should you do?



Specify low-resolution printing.


Specify high-resolution printing.


Change page orientation of allpages to Portrait.


Change page orientation of allpages to Landscape.

Specify low-resolution printing.
Which components are parts of a laser printer? (Choose all that apply.)



fuser


ribbon


platen


main control board

fuser

main control board

What does an inkjet printer use to push ink onto paper?



a nozzle


a moving pin


apiezoelectriccrystal


an electrostaticcharge

a piezoelectric crystal
During which stage of the laser printing process is the toner permanently bonded to the paper?



fusing


exposing


cleaning


developing


transferring


charging

fusing

What occurs duringthe cleaning phaseof laser printing?



Thelaser writesan image on the imaging drum.


Thetransfer corona applies a positive charge to the paper.


Thedischarge lamp neutralizes theimaging drum.


The primary corona wire applies a uniformcharge on the imagingdrum

The discharge lamp neutralizes the imaging drum.
You are responsible for performing all routine maintenance on yourcompany's dot-matrix printers. Which of the following is NOT considered as part of routine maintenance for these printers?



Replace the paper.


Replace the print head.


Replace the ribbon.


Calibrate the printer.

Calibrate the printer.
Which component on an AdvancedTechnology Extended (ATX)motherboard supportscommunication between the central processing unit(CPU) and random access memory (RAM)?



Southbridge chip


Northbridge chip


Advanced Technology Attachment (ATA) interface


firmware

Northbridge chip
With regards to RAM memory,which speed denotes the fastest memory?



7 ns


8 ns


10 ns


60 ns

7 ns

When Kevin was hired, he inherited a box of different types of RAM. Which RAM would you ask him to set aside ifyou needed to increase the number of data wiresavailable from64 to 128?



single channel


dualchannel


single-sided


double-sided



dual channel

You need to install several USB devices on a server. You have been asked to attach USB hubs to the computer. Only one USB port is available. How many hubs can you daisy chain using the single port?



2


3


4


5

5

Which serial communication standards provide hot-swap capability? (Choose two.)



USB


PS/2


IRS-232C


IEEE 1394


USB


IEEE 1394

Which RAIDlevel duplicates a partition on another physicaldisk, providing two identical copiesof the data?



Level O


Level 1


Level 2


Level 3


Level 4


Level 5

Level 1

Where is the MBR stored?



BIOS


CMOS


hard disk


paging file

hard disk

Which built-in componentof a processor prevents the processor from having to wait for code and data from the main memory?



Level 1 (L1) cache


Level 2 (L2) cache


Address bus


Front-side bus

Level 1 (L1) cache
Which processor technology contains two processor cores in a single processor package andprovides all of the advantages of a multi-processor computer?



Hyper-Threading technology


CPUthrottle technology


dual-coretechnology


MMX technology


i5 technology

dual-core technology
You have decided to enableoverclocking to increase theperformance of a computer. On which computer components can you specifically enable overclocking?(Choose all that apply.)



motherboard


processor


system bus


RAM


hard drive

processor

system bus

You wantto ensure thata computer has a 64-bitarchitecture and is able to fully utilize64-bit computing. Which component is NOT important for thispurpose?



processor


operating system


memory


device drivers

memory
Which two systemcomponents should you check to avoid CPUoverheating? (Choose two.)



heatsink


CPUfan


motherboard


power supply unit


RAM

heat sink

CPU fan

Which component is always locatedon the CPU and accelerates the processing of instructions?



the L1 cache


the L2 cache


the heat sink


the address bus

the L1 cache
Which benefit does the Hyperthreading (HT) technology in aprocessor provide?



reduces workloadcapacity


allows the resources to sit idle


usesvirtual processors to perform multitasking usestwo or more physical processors to function

uses virtual processors to performmultitasking
What is theoperating range for Class 2 Bluetooth devices?



1O meters or 33 feet


1 meter or 3 feet


100 meters or 328 feet


200 meters or 656feet

1O meters or 33 feet
What is themaximum data transmission speed for Bluetooth technology?



3 Mbps


11 Mbps


54 Mbps


100 Mbps

3 Mbps
You have to interconnect a notebook computer and a cell phone. The notebook computer supports Bluetooth, USB, FireWire,and IEEE 1294 connections. However, you do nothave any cables to connect the two devicesand do not want to purchase any. What should you do?



Enable USB technologyon both the computer and the cell phone, and then connect the two. Enable Bluetooth technology on boththe computer and the cellphone, and then connect the two.


Enable FireWire technology onboth thecomputer and the cell phone, and then connectthe two.


Enable IEEE 1284 technology on both the computer and the cell phone, and then connectthe two.

Enable Bluetooth technology on both the computer and thecell phone, andthen connect the two.
You are explaining the significance of the wires running froma power supply. The Power Good signal sends power to the motherboard to indicate that the electrical power is sufficient, and can prevent the computer from booting. Which voltage isused by the Power Good signal?



+3.3


-5


+5


-12


+12

+5

You are creating a crossover cable. You know that each end of the crossover cable must be configured differently . Which pins contain the Blue wire?



Pin 3/Pin 1


Pin 6/Pin 2


Pin 4/Pin 4


Pin 5/Pin 5

Pin 4/Pin 4
Which unshielded twisted pair (UTP) cable supports data transfer up to 100 Mbps?



CAT5
CAT4


CAT3


CAT2

CAT5
Which typeof cablecan operate at up to 10 gigabits per second (Gbps)?



CAT3


CAT5


CAT5e


CAT6

CAT5
Which network medium is the least susceptible to EMI or signal capture?



coaxial


fiber-optic


shielded twisted-pair


unshielded twisted-pair

fiber-optic
What is theminimum category of UTP cableused with 1OBaseT?



Category 2


Category 3


Category 5


Category 5e


Category 6

Category 3
What is the network prefix that is used to denote an unsubnetted Class C IP address?



/a


/16


/24


/32

/24
Which type of address does a hardware vendor assign?



Internetzip code


Logical network address


Physical device address


Physical Internet address

Physical device address
Which TCP/IPconfiguration information must a computer on a network havebefore it can communicate with the Internet? (Choose three.)



public key


subnet mask


TCP/IP address


default gateway


FTPserver address


proxy server address


MAC address of router

subnet mask

TCP/IPaddress


default gateway

You administer computers on a Microsoft Windows 2003 TCP/IP network. On the network, you want to use a domainname-to-Internet Protocol (IP) address name resolutionsystem that providesa central database on a server to resolve domainnames to IP addresses. Whichoptions should you implement on your network?



the Domain Name System (DNS)


the HOSTS file


the LMHOSTS file


theWindows Internet Name Service (WINS)

the Domain Name System(DNS)
Youadminister a TCP/IP network. You want to enable the hosts on your network to be automatically configuredwith IP configurations,such as IP address,subnet mask and default gateway address. The IP configurations shouldbe leased to the clients for a limited period. Whichprotocol should you use to accomplish this task?



BOOTP


DHCP


HTTP


IPP


SMTP

DHCP
You use acomputer named Wkst1on a TCP/IP network,whichis installed with an application that usesUDP to send a file fromyour computer to a computer named Wkst2 . Datacollisions occur, and several datapackets are lost during transmission. What will most likely occur as a result of losing the packets duringtransmission? (Choose two.)



The protocol will drop the packets.


The application will drop the packets.


The protocol will automatically retransmit thepackets.


The application will automatically retransmit the packets.

The protocol will drop the packets.

The application will automatically retransmit the packets

Which transmission mode is usedin 802.11 WLANs?



mixed mode


simplex mode


full-duplex mode


half-duplex mode

half-duplex mode
Which radio frequency band does the 802.11b standard use?



1.9 GHz


2.4 GHz


4.3 GHz


5.0 GHz

2.4 GHz
A user needs to connect to a wireless network. Whichinformation must be provided to connect?



access point (AP)


Service Set Identifier (SSID)


Wired Equivalent Privacy (WEP)


Wi-Fi Protected Access (WPA)

Service Set Identifier (SSID)
Your company has a wireless network for its small office network. The wireless network does not broadcast its Service Set ID (SSID). You configure a user's Windows Vista computer to connect to the wireless network by manually setting the SSID. You need to ensure that the user's computer does not send probe requests to discover if the wireless network is in range. What should you do?



Ensure the Connect automatically when this network is in range option on the Connections tab of the wireless connection is selected.


Ensure the Connect even if the network is not broadcasting option on the Connections tab of the wireless connection is selected.


Ensure the Connect automatically when this network is in range option on the Connections tab of the wireless connection is cleared.


Ensure the Connect even if the network is not broadcasting option on the Connections tab of the wireless connection is cleared.


Ensure the Connect even if the network is not broadcasting option on the Connectionstab of the wireless connection is cleared
Which technology has the LONGEST amount of latency?



F1


dial-up


satellite


DSL

satellite
Which Internet connection has a line-of-sight requirement?



dial-up


DSL


cable


satellite

satellite
Which statement is incorrect for routers?



Routing occurs at OSI Layer 4, the Transport layer.


Routers are used to forward data packets across networks.


Routers are used to establish a connection between two local area networks (LANs) or wide area networks (WANs) or a LAN and its Internet Service Provider (ISP).


Routers can use the Internet Control Message Protocol {ICMP) protocol to communicate with other routers.


Routing occurs at OSILayer 4,the Transport layer.
Which device is also known as a base station?



hub


switch


repeater


access point

access point
Multimeters have various settings to aid you in isolating problems. Which multimeter check is always performed with the power to the system turned off?



Current check


AC Voltage check


Resistance check


DC Voltage check


Ripple Voltage check

Resistance check
Last year, your department replaced all of the desktop computers with laptops. Recently, your company adopted a new minimum standards policy that requires a memory upgrade for the majority of the new laptops.Which type(s) o fmemory could be installed in the new laptops? (Choose all that apply.)



So-DIMM


Micro-DIMM


SIMMS


DIMMS


RIMMS


CRIMMS

So-DIMM

Micro-DIMM

You want to upgrade the memory on a laptop. You unplug the AC adapter and remove the battery. What should you do next?



Remove the memory.


Put on an anti-static wrist strap.


Remove the CMOS battery.


Disconnect the power supply from the motherboard

Put on an anti-static wrist strap.
Which built-in laptop device below would be of the most use when conducting a meeting with a person in another location?



Digitizer


Wi-Fi antenna


Webcam


Microphone

Webcam
Cheryl is an avid gamer. She needs to purchase a new laptop for personal use, but she is a bit confused about which type of display to order. She needs a display that is the best suited for gaming, but she does not want to spend more than necessary. Which display type or feature should you recommend?



TN (TTL type)


IPS


LED


OLED

TN (TTL type)
When your company issued you a laptop computer, you were also given a port replicator. Which statement best describes the function of this device?



A port replicator connects a laptop to multiple peripherals.


A port replicator connects a serial port to multiple modems.


A port replicator connects a workstation to mirrored hard disks.


A port replicator connects a backup server to multiple workstations.

A port replicator connects a laptop to multiple peripherals.
You are providing a training class for several new salesmen who have been issues a laptop computer. As part of this training, you must ensure that you instruct them on the proper use of the Function key on their laptops.Which of the following features CANNOT be controlled using that key?



mute speaker volume


mute microphone volume


increase speaker volume


decrease speaker volume


mute microphone volume
Denise has decided to start a workout regimen to improve her health. Her doctor recommends that she keep track of her workout regimen more efficiently. Which device(s) below would you recommend? (Choose all that apply.)



smart watch


fitness monitor


smart glasses


smartphone

smart watch

fitness monitor

Kathleen wants to configure her iPhone so that her iPad can wirelessly use the iPhone's Internet connection. Which feature should she use?



infrared


Bluetooth


USB


tethering

tethering
You have begun the process of replacing the CPU in your computer. You must ensure that the motherboard recognizes the new CPU. What should you do first?



Update the driver.


Update the firmware.


Access the motherboard vendor's Web site to find out if the CPU is compatible with the motherboard.


Contact the motherboard vendor to inquire about compatibility.

Update the firmware.
After you start your computer, you hear an unusual, high-pitched noise. The source of the noise is the fan mounted inside the power supply. After a few minutes, the noise goes away. Which action should you take?



Replace the fan assembly.


Replace the power supply.


Replace the bearings inside the fan motor. Lubricate the bearings inside the fan motor. Disable the power supply fan,and install a coolingfan card in an unoccupied PCI or ISA slot.

Replace the power supply
A user has recently moved to the United States from the United Kingdom. He contacts you asking how to switch his desktop computer to the appropriate voltage. What should you tell him to do?

Slide the power supply switch on the back of the computer to the appropriate voltage.


Slide the switch on the motherboard to the appropriate voltage.


Slide the switch on the inside of the power supply to the appropriate voltage.


Replace the power supply

Slide the power supply switch on the back of the computer to theappropriate voltage.
A computer receives a parity check error message. Which component should you check first?



hard drive


motherboard


video card


memory

memory
You are instructing new IT technicians on the reasons why a computer's complementary metal-oxide semiconductor (CMOS) battery should be replaced. Which event is an early indication that you may need to replace it?



Parity errors occur at startup.


A hard disk on the computer fails.


The computer's power supply fails.


The computer's internal clock loses time at startup.

The computer's internal clock loses time at startup.
You perform several hardware upgrades on a user's computer. You notice that the computer has an AMI BIOS. After completing the upgrades, you boot the computer. You hear seven short beeps. Which component should you check?



video card


memory


CPU


keyboard

CPU
A user complains that his computer is taking a long time to boot. During the boot process, you observe that the hard drive activity light is staying on. You discover that the hard drive is nearing its maximum capacity. The computer contains a single 150-GB hard drive. What should you do?



Add an identical hard drive, and configure a RAID-0 volume.


Add an identical hard drive,and configure a RAID-1 volume.


Add an identical hard drive, and configure a RAID-5 volume.


Defragment the hard drive

Add an identical hard drive, and configure a RAID-0 volume.
In the past year, several hard drives in your company's computers failed without warning . Allof the failed drives were replaced, but management is concerned that this will become an increasing problem because of the number of older computers in use. They have asked you to implement a technology that detects failinghard drives by analyzing the hard drive and providing a warning of impending failure.Which technology should you implement?



S.M.A.R.T.


throttling


overclocking


hyper-threading

S.M.A.R.T. (Self-Monitoring Analysis and Reporting Technology)
You are troubleshooting a problem with a Windows XP Professional computer. When you boot up the computer, you hear the hard disks start,the computer beeps once, and everything appears normal except the display. The display is blank. You confirm that the monitor's power switch is on and the monitor is plugged in. What should you do next to troubleshoot this problem?



Replace the monitor.


Replace the video card.


Replace the power supply.


Install new video display drivers

Replace the monitor.
Your computer has been operating with out problems for some time, but on your most recent startup, nothing appears on the monitor screen. The lights for the keyboard,floppy drive,and hard disk flash at startup. Your computer has an American Megatrends, Inc.(AMI) BIOS program, and the computer generates one long beep followed by eight short beeps at startup. Which item is most likely to be defective?



the hard disk


the video card


the floppy disk


the central processing unit (CPU)

the video card



(The beep code generated by the power-on self-test (POST) in this situation indicates a missing or defective video card)

A user reports that his computer is having trouble accessing the Ethernet network. You need to trace the network cable back to the central wiring closet. Which tool should you use?



a wire crimper


an optical tester


a tone generator


a network monitor


a cable tester

a tone generator
Which command should you run from Server B to determine whether the default gateway address is properly configured?



ipconfig /all


ipconfig /renew


ipconfig ServerB


ipconfig 129.68.0.1

ipconfig /all
You are using the ipconfig tool to troubleshoot a problem with a wireless host. The results are as follows:

Adapter address: 00-10-4B-DE-F5-D8


IPaddress: 192.168.1.40


Subnet mask: 255.255.255.0


Default gateway: 0.0.0.0


You can access services on the local network from the host, but you cannot access the Internet. What is the most likely cause of the problem?




incorrect IP address


missing default gateway


incorrect subnet mask


invalid Ethernet adapter

missing default gateway
You administer computers on an Ethernet 100BaseTX network,which uses the TCP/IP network communications protocol. The network uses an unsubnetted Class A IP address range. A computer on the network named Admin1 has the IP address 12.10.100.3, and a computer on the network named Marketing1 is configured with the IP address 12.10.100.4.Both computers are configured with the subnet mask255.0.0.0 and the default gateway address 12.10.100.5. The network is connected to the Internet. RemoteWkst is a computer on a remote network that is connected to the Internet. Normally, Marketing1 and Admin1 can connect to RemoteWkst. You recently discovered that Marketing1 can connect to Admin1 and Admin1 can connect to Marketing1, but neither of these computers can connect to RemoteWkst. You suspect that there is a problem with one of the routers between RemoteWkst and the network you administer. Which TCP/IP utility should you use to troubleshoot this connectivity problem?



the arp utility


the ipconfig utility


the nslookup utility


the tracert utility

the tracert utility
On a network that you administer, you cannot use a Windows computer named Wkst 1 to connect to an Internet host with the fully qualified domain name (FQDN) www.transoft.com. You want to determine whether a WAN link between Wkst1 and www.transoft.com is down. You know that data normally passes through 10 hops in transit from Wkst1 to www.transoft.com. Which command should you use to test connectivity?



arp www.transoft.com


nbtstat www.transoft.com


tracert www.transoft.com


ipconfig www.transoft.com

tracert www.transoft.com
Your 100BaseT network uses the TCP/IP protocol suite exclusively,and workstations on your network obtain addresses dynamically from a server. From your computer,you can contact all servers and workstations on your own network segment, but you are unable to gain access to network resources on other segments. Which factors should you investigate? (Choose two.)



the routers


the frame types


the default gateway


IP address conflicts

the routers

the default gateway

You want to use Enhanced Intel SpeedStep Technology in a laptop. Which components must support this technology to use it? (Choose all that apply.)



motherboard


BIOS


software drivers


operating system

motherboard

BIOS


operating system

Which keys should you use on a laptop in combination with special functionality keys to perform tasks such as toggling the display or adjusting the display brightness?



the Ctrlkey


the Fn key


the Shift key


the Alt key

the Fn key
You need to configure a removable storage device so that the device can be removed without using the Safely Remove Hardware application. What should you do?



Enable write caching on the disk


Optimize for quick removal


Optimize for performance


Adjustfor best performance

Optimize for quick removal
A user complains that the pointer movement on his laptop computer is very erratic. What should you do?



Reboot the computer.


Calibrate the touch screen .


Adjust the touchpad sensitivity.


Attach an external mouse to the laptop.

Adjust the touchpad sensitivity.
You clear a paper jam from the tray in a laser printer. However, the printer still indicates a jam. What step should you perform next?



Run the diagnostic software.


Physically open and close the top assembly. Look for another jam in the paper tray.


Look for another jam in the pressure roller area.

Physically open and close the top assembly.
A user from the accounting department has contacted you regarding problems with a dot-matrix printer. When you examine the output from the printer,several letters have missing dots from the page. What should you do?



Replace the print head.


Replace the ribbon.


Clean the print head.


Print a test page

Replace the print head.
A user contacts you stating that he can no longer print to a network printer. While troubleshooting the issue,you suspect that the printer's IPaddress has changed and is causing the printing problems. What should you do to test your theory?



Ping the printer from the user's computer.


Run the ipconfig command on the user's computer.


Pause the printer's print queue.


Install the latest device drivers for the printer on the user's computer.

Ping the printer from the user's computer.
You are the network administrator for your company.You are installing a new printer in the network.When you check the print server properties, it displays the following error:Server properties cannot be viewed. The print spooler service is not running. What should you do to resolve the issue using the least administrative effort?



Run the net stopspooler command.


Run the net startspooler command.


Use the Services program in Administrative Tools to start the printer spooler service.


Click Start and Run.


Type services.msc to start the printer spooler service.

Run the net start spooler command
You notice that the pages coming out of your laser printer have toner that you can brush off. Which printer component is MOST likely causing the problem?



toner cartridge


pickup roller


fuser assembly


photoreceptor

fuser assembly
A department manager reports that one of her department's printer is printing fuzzy or low quality print. Which conditions contribute to this problem (Choose two.)



damp paper


high humidity


too much paper in the papertray


a warped roller in the paper path


iron particles in the paper fibers


a problem with the charge wires or the drum

damp paper

high humidity

Your printer is printing fuzzy text with white lines running through it. You need to clean the clogged print head of your inkjet printer. Which two activities can you undertake to immediately clean the clogged print head? (Choose two.)



Replace the platen.


Replace the nozzle.


Power the inkjet printer off and then on. Replace the ink cartridge with a new ink cartridge.


Run the printer management utility provided with the printer.

Power the inkjet printer off and then on.

Run the printer management utility provided with the printer.

A user has been given a new laptop computer. The user has always worked with a desktop computer. He contacts you asking about the wireless Function key on the laptop computer. What can you configure with this key in a laptop?



Turn on and off the wireless adapter.


Increase and decrease the wireless signal strength.


Cycle through the different wireless frequencies.


Cycle through the different wireless channels.

Turn on and off the wireless adapter
Which of the following accessories will enable users to pair devices over Bluetooth? (Choose all that apply.)



docking station


credit card readers


memory/microSDcard


headsets


speakers


game pads

credit card readers

headsets


speakers


game pads

You need to ensure that small inventory devices are able to securely communicate with the inventory servers. For security purposes, the devices should only communicate when they are within 4 cm or 1.5 inches of each other.Which technology should you deploy?


NFC


RFID


802.11a


infrared

NFC

Your company employs a team of trainers who travel to remote locations to make presentations and teach classes. The team has been issued new laptops to use for those presentations and classes.Doug of Wonder Web is coming to your office to show the trainers the ports they will use to connect different devices for the presentations. Which of the following will he most likely to demonstrate?



DisplayPort ports


USB port adapters


ExpressCard ports


VGAports


RJ-45 ports


Audio jacks

DisplayPort ports

USB port adapters


VGAports

Your company has issued you a laptop computer to use while working remotely. You must ensure that you understand the special Function keys on the laptop. Which of the following features is generally NOT included as part of the special Function keys in a laptop computer?



Volume controls


Brightness controls


Screen resolution controls


Internal/external display controls

Screen resolution controls
A user's laptop computer has an external display port.You want to attach an external projector and allow both the laptop display and the projector to display the laptop's image. Which option will allow you to scroll through the display options?



the Ctrl key


the Alt key


a Fn key combination


the Shift key

a Fn key combination
You are choosing from among several different laptop components. Which of the following operates at the fastest speed?



PC card using 16-bit bus


ExpressCard using USB 2.0 bus


ExpressCard using aPClebus


PCMCIA card using a16-bit bus

ExpressCard using a PCle bus
You have been asked to ensure that all corporate laptops are secured from physical theft when used in corporate facilities. You review the security techniques listed in the options.Which of the security techniques will NOT protect the laptop from physical theft?



Install LoJack for Laptops on the laptop.


Lock the office where the laptop resides.


Lock the laptop in a filing cabinet drawer.


Attach the laptop to the desk using a cable lock.

Install LoJack for Laptops on the laptop.
You are trying to help your customer connect a Universal Serial Bus (USB) 3.0 printer to his laptop and his desktop computer . The laptop computer has only USB 1.1 ports and PCle slots available. What would be the most logical and affordable option to recommend to him?



Purchase a newer laptop with USB 2.0 ports. Purchase another printer that supports USB 1.1.


Purchase another printer that supports USB 2.0.


Replace all USB 1.1 ports with USB 3.0 hubs. Install a USB 3.0 card in the PCle slot.

Install a USB 3.0 card in the PCle slot.
You have just installed and configured an inkjet printer on Beth's desktop. Which step should you perform first to ensure that the inkjet printer is working properly?



Print a test page.


Explain the basic printer functionality to Beth. Assign print permissions to Everyone.


Assign print permissions to Beth.


Load the device drivers for the inkjet printer.

Print a test page.
Which of the following is not considered to be an input device?



barcode reader


scanne


digitizer


printer

printer

A customer brings you a computer that he wants to upgrade to SATA drives. Currently,all the drives in the system are EIDE drives. What should you do first?



Make sure that the motherboard will support SATA drives.


Install the new SATA drive, and use jumpers on the system board to configure the new disk as a master."


Install an SSD drive and configure it manually. Disable the floppy drive,remove it,and install a second SATA drive in that bay.

Make sure that the motherboard will support SATA drives.
What are the dimensions of an Advanced Technology Extended (ATX) motherboard?



11.2 inches wide and 8.2 inches deep


12 inches wide and 9.6 inches deep


9.6inches wide and 9.6 inches deep


6.7inches wide and 6.7 inchesdeep

12 inches wide and 9.6 inches deep
Youhave purchased a program that requires a joystick.Which ofthese types of computerports could allowyou to attach a joystick? (Choose two.)





anIEEE 1394 port


anSPDIFport


a DA-15 port


a USB port



a DA-15 porta

USB port

Your digital camera requires a FireWire interface for image transfers to your computer. Which port type should you use to connect the digital camera to your computer?



Universal Serial Bus(USB)


PS/2


A Small Computer System Interface (SCSI)


IEEE 1394

IEEE 1394
Beverly has contacted you and stating that her computer will not boot and keeps beeping. Which components must pass a computer's power-on self-test (POST) before an operating system will load? (Choose three.)



the memory


the keyboard


the video card


the hard disk drive


the network interface card (NIC)


the central processing unit (CPU)

the memory

the video card


the central processing unit (CPU)

Christine has a motherboard with a Socket 1156 and has called you to see if a Socket 1150 CPU could be used in its place. What would you recommend that she do?



Purchase a new motherboard that has an 1150 socket.


Upgrade the socket on the existing motherboard so it compatible with an LGA 1156.


Replace the heat sink.


Replace the thermal paste and pins.

Purchase a new motherboard that has an 1150 socket
You are providing consulting services for a client who plans to purchase a large number of printers that can print multi-part forms. Which printer type should you advise him to consider?



laser


inkjet


thermal


dot-matrix

dot-matrix
A user's computer is experiencing overheating problems. What is the most likely cause of this problem?



dust


humidity


power sags


power surges

dust
You have just replaced the ink cartridge in an ink-jet printer. What should you do immediately after this?



Reboot the computer.


Charge the OPC drum.


Reinitialize the printer.


Run the print alignment program.

Run the print alignment program.
Susan called the help desk to ask which type of BIOS password she should configure to restrict access to the BIOS setup program. Which password type would you explain?



User password


Supervisor password


Administrator password


System password

Supervisor password
What is the function of the nozzle gate in an inkjet printer?



controls the paper movement


contains ink in the ink cartridge


controls whether ink is flowing from the ink cartridge


controls how much ink is flowing from the ink cartridge

controls whether ink is flowingfrom the ink cartridge
A user notifies you that the monitor on his notebook computer is not displaying anything. What should you do FIRST?



Replace the video output port.


Plug in an external monitor to test the external output.


Use the Fn key to toggle to the internal video display.


Reboot the computer.

Use the Fn key to toggle to the internal video display.
An IBM computer is giving one long beep and one short beep when turned on. The computer does not boot up. What should you do to troubleshoot the problem?



Check the video adapter card.


Check the motherboard.


Reconnect the keyboard.


Check the central processing unit (CPU).

Check the motherboard.
After troubleshooting a laptop computer issue, you discover that that the motherboard is faulty. The computer is under warranty , and the manufacturer ships you a replacement motherboard that is the exact model number as the defective one. You need to replace the laptop's motherboard. All of the following are guidelines when replacing the motherboard, EXCEPT:



Remove the laptop's keyboard,and disconnect it from the motherboard.


Remove the RAM and hard drive from under the laptop's keyboard.


Remove the fan and heatsink from the processor, and then remove the processor. Remove any peripheral cards that are directly plugged into the motherboard.

Remove the RAM and hard drive from under the laptop's keyboard.
Which new technology protects a CPU from heat damage by slowing the clock rate on the CPU?



CPU throttle technology


MMX technology


Hyper-Threading (HT) technology


superscalar execution technology

CPU throttle technology
You need to install a new videocard in a Windows XP Professional computer. You need to ensure that the installed technology supports both analog and digital transmissions. Which technology should you install?



DVI-D


DVl-1


DVI-A


HDMI

DVl-1
Which CPU coolingmethod should you implement when convective methods will not work?



heat sinks


heat pipes


water cooling


Peltier cooling

Peltier cooling
If you were explaining to your company's IT personnel about the difference between their old hard drive technology and newer solid state drives,which statement would be FALSE?



They do not require an external power source.


They are not as fragile as magnetic hard drives. They are silent when in operation.


They use a read/write assembly.

They use a read/write assembly
Which biometric method can work in conjunction with a password to provide increased security?



password aging


keystroke dynamics


password checkers


password encryption

keystroke dynamics
You are in the process of replacing the toner cartridge for a laser printer. However, you notice that toner particle have been split inside the printer.What should you use to effectively remove these particles?



compressed air


ESD-safe vacuum cleaner


household vacuum cleaner


damp cloth

ESD-safevacuum cleaner
What is the main purpose of a laserprinter's charge(primary) corona?



To charge thepaper


To write theimage on the drum


To melt the toner into the paper


Toneutralize the chargeon thepaper


To coordinate the components to print a page Toapply auniformnegativecharge tothe photosensitive drum

To apply a uniform negative charge to the photosensitive drum
You replace the toner cartridge in a laser printer. Now, all print outs have black specks on both sides. Which action you should take first?



Replace the toner cartridge.


Realign the transfer corona.


Clean the interior of the printer.


Check the fuser assembly and fuse.

Clean the interior of the printer.
You are a desktop engineer for DreamSuites Corporation. Irene Jones has joined DreamSuites Corporation as an HR Executive in the London office. You configure a new computer for Irene Jones.The computer will not power up,and you have asked to troubleshoot the problem. Which action is NOT required to troubleshoot the problem?



Setthe power outputof thewall outletto 230 volts.


Ensure that the 115/230 voltage selector switch is set tothe correct voltage.


Ensure that power is available.


Check the power cords.

Set the power output of the wall outlet to 230 volts.
You are a desktop administrator for Nutex Corporation. Your organization uses Ethernet cable to connect network resources.A user reports that he is unable to access network resources on his portable computer. The portable computer is connected to the company's network using an Ethernet cable. When you test the cable using a time­ domain reflectometer (TDR),the signal returns too early. What should you do?



Replace the network cable.


Reinstall the network adapter.


Replace the network adapter.


Re-route the network cable.

Replace the network cable.
You are the desktop administrator for your company and maintain all the computers in your organization. To properly upgrade one of the computers,you must upgrade the motherboard.While upgrading this computer,you should choose the appropriate form factor that is suitable for the motherboard of the existing computer.Which two specifications should you consider while selecting the appropriate form factor? (Choose two.)



physical size


power supply


number of PCI slots


supported amount of memory

physical size

power supply

A user keeps receiving a printer error message before the print job is sent to the print spooler. Which printer issue would cause this?



The printer is paused.


The printer queue is stalled.


The printer driver is corrupt.


The printer power is off.

The printer power is off.
You are troubleshooting a laser printer that feeds multiple sheets of paper for each page it is supposed to print.Which component could be causing the problem? (Choose two.)



the paper type


the primary corona


the feed mechanism


the photosensitive drum

the paper type

the feed mechanism

You want to enable Hyper-Threading(HT) technology in your computer that has an older processor. When you check the BIOS settings,you observe that the HT option appears dimmed. What should you do to enable the HT option in the BIOS?



Upgrade the BIOS to support HT.


Execute the INF utility to enable HT.


Restart the computer to enable HT.


Upgrade the processor.

Upgrade the processor.
You are troubleshooting a laser printer problem where faint images of previously printed pages are appearing on the current page. Which two components are the most likely cause of this problem? (Choose two.)



detac corona


charge corona


fusing rollers


discharge lamp


cleaning blade

discharge lamp

cleaning blade

You suspect that an uninterruptible power supply (UPS) is malfunctioning. You need to test the output from the UPS using a multimeter. Which multimeter setting should you use?



Ohms


Continuity


AC Voltage


DC Voltage

AC Voltage
A user named Bradcalls and reports that he is unable to connect to a file server on your 100BaseT network, although he is able to connect to folders on other computers. A single hub exists on the network. Which hardware problems should you investigate? (Choose two.)



a defective hub


an improper termination


a defective NIC in the file server


a defective NIC in Brad's computer

a defective hub

a defective NIC in the file server

You have replaced the memory in a laptop computer. What would cause the reported memory to be lower than the actual physical memory?



parity


shared video memory


cache


ECCmemory

shared video memory
A user complains that his monitor is not working. You must diagnose the problem to return the monitor to normal operation.What are the four primary sources of display problems?(Choose four.)



monitor


processor


data cable


power supply


video cable


video driver


video adapter card

monitor

video cable


video driver


video adapter card

You need to replace the hard drive in a user's portable computer. You examine the physical size of the hard drive and purchase a replacement drive that is the appropriate size, as verified by your inspection of the existing drive. You unplug the portable computer from alternating current(AC) power. What should you do next?



Open the panel on the case where the old hard drive resides.


Remove the battery.


Open the cage where the old hard drive is mounted.


Place the computer in Hibernation mode.

Remove the battery.
All of the following steps are necessary to install a V tuner adapter card in a computer ,EXCEPT:



Plug the TV tuner adapter card into a USB port. Plug the antenna into the TV tuner adapter card.


Plug the audio cable into the TV tuner adapter card and sound card.


Plug the TV tuner adapter card into a PCI slot.n

Plug the TV tuner adapter card into a USB port.
Which chip connects the system bus to the AGP and PCI buses?



south bridge


north bridge


hub


CPU socket

north bridge
Which statement is anaccurate characterization of the Peripheral Component Interconnect (PCI) architecture?



All PCI cards support bus mastering.


The PCI bus is for 80386 and 80486 computers only.


The PCI architecture supports 32-and 64-bit data transfers.


The PCI architecture is for Intel-compatible computers only.

The PCI architecture supports 32- and 64-bit data transfers
Which term is used to identify the concentric circles on a hard disk platter?



track


sector


cluster


cylinder

Track

What is an example of a solidstate drive?



ATA hard drive


CD-ROM drive


USB flash drive


DVD drive

USB flash drive
Alice needs to connect many external devices to her PC. Which of the following expansion cards would enable her to connect the largest number of devices?



USB expansion card


FireWire expansion card


Thunderbolt card


Riser card

USB expansion card
Which of the following are you LEAST likely to see as a front-panel connector on a motherboard?



USB port


reset button


SCSI port


drive activity lights

SCSI port
If you were explaining various RAM types to a new user,which type of computer memory module uses 168 pins?



SIPP


SIMM


DIMM


DIPP


RDRAM

DIMM

Your company implements a new policy that all computers must use drive-level encryption for security. You want to enhance the security provided by Bitlocker. What should you enable?



EFS


NTFS


TPM


BIOS passwords

TPM

(You should enable Trusted Platform Module (TPM) to enhance the security provided by Bitlocker. Bitlocker is a hard drive encryption technology introduced in Windows Vista.)

Steven wants to upgrade the RAM in his gaming system. Which features are important considerations before he adds memory modules to a computer's system board? (Choose two.)



parity


CPU type


access speed


Level 1 cache

parity


access speed

Aaron has just been hired as your new tech support. You are explaining different RAM types to him. Which random access memory (RAM) technology would you tell him fetches 4 bits of data per clock cycle and uses 1.8 V to operate?



SDRAM


SGRAM


DDR SDRAM


DDR2 SDRAM

DDR2 SDRAM
You are a desktop engineer for Verigon Corporation. Gloria Taylor requires a PCI network interface card and a PCI sound card installed in her computer. Her computer has three PCI slots,two of which contain the video card and the modem, respectively . Which card should you use to attach both the PCI network interface card and sound card to the computer?



riser card


PCMCIA card


USB PCI card


flash memory card

riser card

(Riser cards have several slots to hold additional cards,such as PCI orISA that work in parallel with the motherboard. A riser card is commonly used in low profile extended (LPX)and new low-profile extended New Low Profile Extended (NLX)computers because these form factors are for slim-line cases.)


A user contacts you stating that his laptop is making a weird buzzing noise. When you examine the laptop, you notice that the buzzing noise is coming from the bottom of the display assembly. Which device should you probably replace?



the motherboard


the display screen


the inverter board


the hard drive

the inverter board
Your laptop computer, which typically draws 2 amperes (amps) under normal usage, has a rechargeable nickel­cadmium (NiCad) battery that provides 150 minutes of battery power. Lately,the laptop runs out of power after only 30 minutes of use. Which actions should you take to extend the time your computer can operate on battery power? (Choose two.)



Configure APM.


Clean the battery terminals.


Run fewer applications while using battery power.


Use a charging device with a higher output voltage.


Perform several cycles of discharging and recharging the battery.

Perform several cycles of discharging and recharging the battery.

Clean the battery terminals.

Andrew works for a local law firm's help desk and is getting complaints that employees cannot access the company's intranet site. What is the first tool he should use?



ping


cable tester


dir /w


ipconfig

ping

A client,Warren, reports CMOS mismatch errors at startup. Further conversation with Warren reveals that he had forgotten the startup password he assigned in CMOS,and he had to clear all CMOS settings for his computer to complete a successful startup. Although he can now start his computer,he continues to observe CMOS error seach time he starts the computer. He replaced the CMOS battery, but the problem continues. Which component should you investigate first to resolve the problem?



the CMOS battery voltage


the presence of new hardware


the system board jumper settings


the availability of a BIOS flash for the CMOS

the system board jumper settings
George, a user, is having trouble connecting to network resources, including shared folders on the local network and Internet resources. Yesterday he was able to connect with no problems. You need to ensure that he can connect to these resources. Which tool should you use FIRST?



ipconfig


Device Manager


My Network Places


Control Panel

ipconfig

You are nearing the completion of an upgrade that involves implementing a new network infrastructure and upgrading the operating systems running on your network servers.Currently,static IP addresses and HOSTS files are used. The upgrade has included implementing DNS, implementing DHCP, and moving servers and other resources to a new location with new IP addresses. However, you cannot accessthe resources that were moved using their host names from any of the client workstations. You can access them by their IP addresses. What should you do first?

Enable NetBIOS over TCP/IP.


Delete the HOSTS file on each workstation. Import the workstations' names and addressmapping to DNS.


Configure DHCP to supply a different range of IP addresses to the workstations

Delete the HOSTS file on each workstation.
A user reports that the mouse moves erratically whenever he connects his laptop computer to the docking station. When the laptop is not connected to the docking station,the mouse moves properly. What should you do?



Clean the mouse that is connected to the docking station.


Clean the touchpad in the laptop computer. Adjust the settings for the touchpad. Disconnect and reconnect the mouse to the docking station.

Clean the mouse that is connected to the docking station
The primary hard drive in your Windows computer has failed. You purchase a new harddrive and install it in yourcomputer. What should you do first?



Partition the harddrive.


Format the hard drive.


Change the hard drive configuration settings in the computer's BIOS.


Change the hard drive configuration settings in the Disk Management utility.

Change the hard drive configuration settings in the computer's BIOS.
You were recently given an old notebook computer,which is missing most of its peripherals and accessories. You need to obtain the components necessary to allow you to efficiently perform your job both at the office and while traveling.You would like to purchase as many of the necessary accessories and peripherals as possible from a local computer store,where your company has an account. Which accessory or peripheral will you most likely have to obtain directly from the notebook manufacturer because of its highly proprietary nature?



mouse


modem card


network card


docking station


external monitor

docking station

You are the network administrator for your company. A user reports that he cannot access network resources from his computer. He was able to access the resources yesterday. While troubleshooting his computer,you find that his computer is issued an Automatic Private IP Addressing (APIPA) address. All the network equipment in the user's computer is functioning properly because you are able to access the user's computer from a remote computer. What is most likely the problem?



The computer is configured with an alternate IP address.


The computer is configured with a static IP address.


The DNS server is down.


The DHCP server is down.

The DHCP server is down.
What is the transmission distance supported by single-mode fiber optic cable?



appr. 50 feet


appr. 3000feet


appr. 20 miles


appr. 74 miles

appr. 20 miles
Which connectors are used with fiber-optic cabling? (Choose two.)



SC


ST


AUi


RJ-11


RJ-45

SC


ST

Which Internet connectivity type always uses a coaxial (coax) cable to establish a two-way connection to the Internet?



digital subscriber line (DSL)


cable modem


dial-up


satellite

cable modem

Which IP address is used by a Class Aprivate network?



10.0.0.0


172.16.0.0


192.168.0.0


127.0.0.1

10.0.0.0

Which applications use UDP?



ICMP,ARP, FTP


NFS, FTP, TFTP


NFS,TFTP, SNMP


ARP,NFS,FTP, SMTP

NFS,TFTP, SNMP
Which hardware device operates at the physical layer of the Open Systems Interconnection(OSI) model to connect computers in a network?



switch


hub


bridge


router

hub

You have implemented a hardware firewall on a small office network. Youneed to ensure that all HTTP packets are automatically sent to theWeb server. What should you do?



Enable port triggering.


Enable port forwarding.


Enable NAT.


Enable QoS.

Enable port forwarding.
You are setting up an 802.11a wireless network in a small office environment that includes three wireless access points. The wireless access points are at least 15 meters apart and are configured for automatic channel setting.Each time you turn the wireless access points on, the wireless access points choose the same channel. You need to ensure that the access points choose separate channels toprevent interference, using the least amount of administrative effort. What should you do?



Increase the distance between the wireless access points to at least 20 meters.


Manually configure each of the access points to use channels1,6, and11, respectively.


Start each wireless access point at a separate time.


Reduce the signal strength on each accesspoint.

Start each wireless access point at a separate time.
Which of the following statementsis true regarding RG6 coaxial cable?



It should be used in situations that require lower frequencies than 50 MHz.


It is thicker than RG59 coaxial cable.


Its signal quality is NOT as good asthat of RG59 coaxial cable.


It does NOT have a foil shield.

It is thicker than RG59 coaxial cable.
Your company has a network that consists of 12 computers on a single floor in your building. You need to set up a computer to work beyond the maximum length of an Ethernet segment.You have two Ethernet cables that will allow you to do this. You want to provide a connection only for this computer using an inexpensive device. Which device should you use?



switch


bridge


repeater


firewall

repeater

Which of the following is an example of an IPv6 address?



192.1.0.1


127.0.0.1


fe80::200:f8ff:fe21 :67cf


OO-OC-F1-56-98-ADs

fe80::200:f8ff:fe21 :67cf
Which IP address is used by Class B private networks?



10.0.0.0


172.16.0.0


192.168.0.0


127.0.0.1

172.16.0.0
What does a cable rating of "plenum" indicate about the cable?



It is rated for speeds of 1000 Mbps.


It is not Layer 2protocol-dependent.


It cannot be tapped without detection.


I twill not produce toxic gas when it burns

It will not produce toxic gas when it burns
What is the maximum segment distance for data transmission using 10BaseT, 100BaseT,and 1000BaseT?



25 meters (82 feet)


50 meters (164 feet)


100 meters (328 feet)


185 meters (607feet)


500 meters (1,640 feet)

100 meters (328 feet)
You are wiring a small office for a client. The client has purchased several 568A and 5688 wall jacks and enough 568A wiring cables to attach all devices correctly.You want to configure the network for ease of administration. What should you do?



Use only the 568A wall jacks.


Use only the 5688 wall jacks.


Use both the 568A and5688 walljacks. Purchase 5688 wiring cables.

Use only the 568A wall jacks.
Which cable uses a light-emitting diode (LED)?



coaxial cable


multi-mode fiber optic cable


shielded twisted pair(STP) cable


unshielded twisted pair(UTP) cable

multi-mode fiber optic cable
What is the main difference in the physical composition of UTP and STP cable?



wire gauge


mesh shielding


number of twists in the wires


separators between the wire pairs

mesh shielding
Which versions of Windowsinclude the PowerShell scriptingtool? (Choose all that apply.)

Windows Vista
Windows 7
Windows 8
Windows 8.1
Windows Vista
Windows 7
Windows 8
Windows 8.1
Which Windows 8 and Windows 8.1 feature allows youto sign into Windows using the same credentials as your Hotmail account?

Live Sign In
Gmail
Outlook
Google
Live Sign In
Which Microsoft utility provides drive-level encryption?

Bitlocker
TrueCrypt
Symantec Drive Encryption
DiskCryptor
Bitlocker
Management has decided to replace the five computers in the human resources department withnew Windows computers. A legacy application is only capable of running on Windows XP Professional. For this reason, you need to beable to use Windows XP Mode. Which editions of Windows could youimplement in thehuman resources department? (Choose all thatapply.)

Windows 7 HomePremium
Windows 7 Ultimate
Windows 7 Professional
Windows 7 Enterprise
Windows 8 Professional
Windows 7 Ultimate
Windows 7 Professional
Windows 7 Enterprise
You need to install Windows 7 Professional on a user's computer. Which hardware is NOT a minimum requirement?

1 gigahertz processor
2 gigabytes RAM
16gigabytes available hard drivespace
DirectX 9 graphics card
2 gigabytes RAM
Youare installing Windows 8 on a client computer.The client has installed a newer versionof a graphics card. The driverincluded in Windows 8 is outof date. What should you do?

Proceed with the installation, and update the third-party driverafter the installation is finished.
Use an older graphics cardduring theinstallation.
Stop the installation.
Proceed with the installation as is.
Thedriversdo notneed tobe updated.
Proceed with the installation, and update the third-party driverafter the installation is finished.
You need to reinstall Windows 7 on a clientcomputer. The old hard drive crashed, and you are using the original installation DVD from 2009. You have an internet connection. What is the best way to make sure you have themost current drivers and updates?

Proceed with the installation, and update driversand patches via Internet when complete. Nodriver or patch updates are necessary.
Download all the drivers and patches on anothermachine, burn a DVD, andupdate fromthe DVD when installation is complete.
Accept the option to download updatesand new driverpackages.
Accept the optionto download updatesand new driverpackages.
Your company's network containsworkstations that run Windows 8, Windows 8.1,WindowsVista Ultimate, and Windows7 Ultimate. You need to install the Multilingual UserInterface (MUI) on all the workstations. Which operating systems will provide multilingualsupport for both the operating systems and applications?(Choose all that apply.)

Windows 8
Windows 8.1
Windows Vista Ultimate
Windows 7 Ultimate
Windows 8
Windows 8.1
Windows Vista Ultimate
Windows 7 Ultimate
You need to refresh thegroup policy settings. Which command-line utilityshould you use?

GPRESULT
GPUPDATE
GPFIXUP
Youcannot do this from a commandline.
GPUPDATE
You know you saved a file named FILECHK in the D:\MYDOCS directory, but you don't rememberthe locationor the extension. Yourun the dir D:\MYDOCS\FILECHK.* /S command. What would this command accomplish?

It locates a file named FILECHK.* onthedefault drive.
Itlocates all files that have names startingwith FILECHK on the default drive.
It locates all files that have names startingwith FILECHK in the MYDOCS directoryof drive D, including the subdirectories.
It locates all the files anddirectories that have the name FILECHK with any file extension inthe MYDOCS directory of drive D, including the subdirectories.
It locates all the files anddirectories thathave the name FILECHKwith any file extensionin theMYDOCS directory of drive D,including the subdirectories.
You need to check the startupconfiguration for several services. From which tools can you access the Servicesconsole? (Choose all that apply.)

System Properties
Computer Management
Device Manager
Administrative Tools
Computer Management
Administrative Tools
You need to quickly display the running processes on your Windows 7 computer.What should you do?

Click Startand Devices and Printers.
Click Start and Control Panel. Click Systemand Security.
Right-click theComputer icon on the desktop and select Properties.
Click Ctrl+Alt+Deland selectStart Task Manager.
Click Ctrl+Alt+Deland selectStart Task Manager.
A user is locally connected to a printer on his Windows Vistacomputer. The printer is disconnectedfrom the computer and connected to the localnetwork. You need tochange the port for the printer on the user'sWindows Vista computer. How could you change the port settings?
Click Startand Printers & Faxes. Right-click theprinter, and select Properties,In the printer's Propertiesdialog box, select the Ports tab.
Click Start and Control Panel. Click the Printer link under Hardware and Sound. Right-click the printer,and select Properties. In theprinter's Properties dialog box, select the Ports tab. ClickStart, Control Panel,and Printers & Faxes. Right-click theprinter and selectProperties.In the printer's Properties dialog box,select the Ports tab.
Click Start and Devices and Printers. Right-click the printer and select Properties. In the printer's Properties
Click Start and Control Panel. Click the Printer linkunder Hardware and Sound. Right-click the printer,and selectProperties.In the printer's Properties dialog box, select the Ports tab.
A user with a Windows 7 Ultimate computerthat is a member of a domainreports that she is unable to create a Homegroup. What is the reason this is happening?

The user should disable UAC.
Homegroups are only available oncomputers running Windows7 HomeBasic andHome Premium.
The user cannotcreate a Homegroup because the computer is a member of a domain.
The user is not runningthe correct edition ofWindows 7to createa Homegroup.
The user cannot create a Homegroup because the computer is a member of a domain.
Youjust received your newwork laptop.Included in the boxis a device that looks similar to aUSB drive and has the word AirCardon it. Which type of connection to theinternet will this provide?

VPN
WWAN
Wired
Dialup

WWAN




A WWAN connection is a cellular data connection that requires an accesscard, often called an AirCard. WWAN connections operate over the cellular data network and require a data plan from a cellular provider.

You need to connect to the network at a client site. The systems administratorhands you a cable where the connectors have 8 pins each. Which type of network are youabout to use?

VPN
WWAN
wired
dialup
wired

You about to use a wired network. The cable described is an Ethernet cable.
How can you restorean operating systemto the way it waswhen the computer was shipped fromthe factory?
Press F8 duringPOST, and select Advanced Boot, Repair YourComputer, and SystemImageRecovery.
Use the format command.
Use theDiskManagement utility.
Create a restore point.
Press F8 during POST,and select Advanced Boot, RepairYour Computer, and System Image Recovery.
A user contacts you regarding theWindows Update settings on his Windows 7 computer. He wants Windows Updates set back to its default setting. Which setting should you configure?

Never Check For Updates
Check For Updates But Let Me Choose Whether To Download and Install Them DownloadUpdates But Let Me Choose Whether to Install Them
Install UpdatesAutomatically
Install UpdatesAutomatically
What Linux command creates a hard drive image?

Is
mv
dd
cp

dd

Which Linux command allows you to change a user's password?

pwd
passwd
vi
chown
passwd
You are responsible for managing your company's virtualizationenvironment. Which featureshould NOTbe allowed on a virtualization host?

implementing IPsec
browsing the Internet
implementing a firewall
monitoring the event logs
browsing the Internet
Of the terms below, which is the term for the cloud computing concept that allows the provider to shareservices with multiple subscribers, asopposed to the subscriber having adedicated cloud service?

communitycloud
rapid elasticity
resource pooling
measured service
resource pooling
Which cloud computing term refers to the availability ofa resource as it is needed by the client?

resource pooling
ondemand
rapid elasticity
measured service
ondemand
Which of the following might you find on a network in a legacy system?

NetBEUI protocol
TCP/IP
DHCP
DNS
NetBEUI protocol
Which of the following is an open-source mobile operating system?

iOS
Android
Windows
None of the above
Android
Your company wants employees to beable to securely connect to the corporatenetwork from remote locations overthe Internet. Whichtype of connection should you set up?

IMAP
VPN
IMEI
IMSI

VPN

After contacting a mobiledevice provider with an issue, the provider asks you to providethem with the IMEIand IMSI. What is the differencebetween IMEI and IMSI?

IMEI isthe serial number for the mobile device, and IMSI isthe number assigned to the SIM card.
IMEI is theserial number for the SIM card, andIMSIis the number assigned to thephone.
Thephone numberis a component of IMEI, but not a component of IMSI.
IMEI isan iPhone serial number,and IMSI isan Android serial number.
IMEI is the serial number for the mobile device, and IMSI is the number assigned to the SIM card
You need to ensure that the GSM and 3G phone information your Android phone is updated.Which type of update would you perform?

PRI update
PRL update
Baseband update
None of the above

Baseband update


A baseband updatewill update the radio firmware on thecell phone.

You have an iPhone. What is the default connectiontype to synchronize your data?

Google Drive
iTunes
Dropbox
OneDrive
iTunes
What are the minimumsoftware requirements for installing iTunes on a Microsoft Windows PC?

Windows Vista or later and 100MB freedisk space
Windows Vista orlaterand 650 MB free disk space
Windows 8 or later and1TB free disk space Windows 7 or later and 400MB free disk space
Windows 7 or later and 400MB free disk space
You are providing training on security breaches regarding passwords andencryption. Which attacks below best describes this?

Brute-force attacks
Violations of security best practices
Man-in-the-middleattack
Dictionary attacks
Dictionary attacks
Nicholas reports to the securityguards that individuals are following closely when he enters buildings, using his credentials to gain access. Heknows that some of them are valid employeesbut is concerned that not all ofthe people are.What security breach is he reporting?

tailgating
zero-day attack
zombie
shoulder surfing
tailgating

Tailgatingoccurs when someonepiggybacks on your credentials to gain entry to a building. Theunauthorized individual usuallyjust follows closely behind you as you enter the buildingwithout needing to use a key,a card, or any other security device.
Recently several employees email accounts were hacked afterthey visited thelocal coffeeshop and usedtheir mobile devices there. Which type of attack most likely occurred?

zero-day attack
shoulder surfing
zombie
tailgating

shoulder surfing




Shoulder surfing occurs when hackers watch or sit close or near someone and memorize their sensitive information. They will watch for people entering passwords,credit card numbers,or other private information.

Andrea is concerned that she is beinglured to provide her financial institution's credentials on an invalidsite via a message shereceived. Which typeof attack is mostlikely taking place?

IP spoofing
MAC address spoofing
data mining
email spoofing

email spoofing

lnterConn has decidedit wants toimplement multi-factor authentication. Whatis the BESTimplementation you should deploy?




usernames, strong passwords, and PIN


smart cards, usernames,and strongpasswords biometrics, smart cards, andstrong passwords smart cards, usernames, and PIN

biometrics, smartcards, and strong passwords
You have recently discovered that users on your network have been victims of impersonation attacks. You need to implement an authentication method that checks the identity of both ends of the connection. Whichauthentication method does this?

biometric authentication
mutual authentication
Kerberos authentication
RADIUS authentication

mutual authentication

Spencer has been hired as thesystems administrator for a small business and he wants to set up authentication on a network that contains two servers. What is the best way to provide this?

usernames withstrongpasswords
directory permissions
VPN
access control lists (ACLs)

usernames with strong passwords

Paul is the new security guard at Metroil.He is stationed at the data center where all the valuable data is stored. Entryto the data center is controlledby two doors with a small room between them. Personnel use a smart card toopen the first door. During his shift at Metroil, Paul allows access to the data centerthrough the second door once a user has successfully opened thefirst door. Which type of physical security barrieris being used?




mantrap


key fob


biometrics


ID badges

mantrap




A mantrap isa setup with two doors and asmall room between them. The first door requires authentication to get into the small room. Then a second verificationwill occur (such as a guard visually identifying the person) to allow the user throughthe second door . Mantraps are typically used where very high security isneeded because thesecond door can only open once the first door is closed.

Youneed to provide a physicalsecurity measure for a data center located on the second floor of a building. Management wants you to implement the highest level ofsecurity possible. Whichphysical security control should you implement?




ID badges


Key fobs


Biometrics


Passwords

Biometrics

After installing asoftware firewall on his computer, auser reports that he is unable to connect to any Web sites. Theuser must be able to connect to all types of Web sites. Which ports should youopen in thefirewall application? (Choose two.)




port 20


port 21


port 25


port 80


port 443

port 80


port 443

Youneed to ensurethatusers are ableto log into multiple systems using the same login credentials.Which technology should youdeploy?




VPN


multifactor authentication


sso


two-factor authentication

sso




You should deploy singlesign-on (SSO) to ensure that users areable to log in to multiple systems usingthe same login credentials

When explaining thedifferences between NTFS and FAT32 to a user installing Window 7, whichthree benefits would you share with them regarding NTFS?

better security
file encryption
better disk space management
malware protection
virus protection
better disk space management
better security
file encryption

A user that has a Windows 7 laptop is frequently away from the office. Duringthat time, he needs access to severalfiles that are on the network. What should youdo?




Enable BitLocker.


Enable BitLocker To Go.


Enable offline files.


Create a Windows 7 library.

Enable offline files

Which policy is the mostsecure password policy?




Password change requests must be made in person.


Password change requests must be made in writing.


Password change requests must be madeby e-mail message.


Password change requests mustbe made by telephone

Passwordchange requests must be made in person.

What is themost common formof identification andauthentication?




biometrics


smart cards


two-factor authentication


useridentification with reusable password

user identification with reusable password

Which security measureis considered to be the easiest to implementfor mobile devices?

Remote wipes
Remote locks
GPS locator applications
Passcode locks

Passcode locks

Daniel is newto your department and is asking about wireless networks. What would you tell him are three conditions thataffect theexternalvulnerabilities of wireless networks? (Choose three.)




Number of users


Antenna selection


Antenna placement


Access pointpower


Speed of connection

Antenna selection


Antenna placement


Access pointpower

You are instructing a new IT technicianon securing networks and using permissions. What would you tellGraham that the default permission position should be?




explicit allow


implicit allow


explicit deny


implicit deny

implicit deny

You need to broaden the area to which a wireless access point(AP) can transmit. What should you do?




Maximize the powerlevel setting.


Relocate theAP.


Adjust the power level setting slightly higher. Change the channel used by the AP.

Adjust the power level setting slightly higher

Lee is complaining thathis Windows 7 computer is having performance issues and is running slower.He wants to clean it up so it will run faster andmore efficient. Which built-in tools wouldyou recommend he usefirst? (Choose all that apply.)




Disk Cleanup


Add/Remove Programs


SFC


DEFRAG


Recovery Console

Disk Cleanup


Add/Remove Programs


DEFRAG

Gloria of CDPress is holdingfree computer maintenance classes in her community. In herclass,sheemphasizes tools anyone canaccess and use.She spends a lot of timediscussing the DEFRAG tool. What should she tellthem is the minimum free disk space needed to runthis tool?




15% ofhard drive space


25% ofhard drive space


200MB


800 MB

15% ofhard drive space

You decide to edit the boot order for your Windows 8 computer using the MSCONFIG utility. To which file is this edit saved?




bootmgr


boot.ini


Ntoskrnl.exe


BCD

BCD




the Boot Configuration Data (BCD) file

Atechnician contacts you that he cannot locate theNTLDR file on a Windows Vistacomputer. You explainthat this file was replaced in Windows Vista.Which file replaced it?




BCD


bcdedit.exe


bootmgr


boot.ini

bootmgr

Auser has a computer that is able toboot into WindowsVista, Windows 7, and Windows 8. Theuser has requested thatyou changethe default boot operating system to Windows8. Which toolshouldyou use to do this?




taskmgr.exe


regedit.exe


bcdedit.exe


boot.ini

bcdedit.exe




You should use thebcdedit.exe utility to edit, modify, and update the Boot Configuration Data (BCD)file

While teaching a class, David mentions that Windows Vista and later no longer include the boot.ini file. Which file is used in its place?




NTLDR


BCD


bootmgr


ipconfig

BCD

AnIT technicianmentions thathe finds theREGSRV32 utility useful. For which of the following issues canthis toolbe used?




corrupt registry


missing exe files


missing boot.ini


missing dll files

missing dll files

Ever since Daniel upgraded his operating system to Windows 7, some of his programsfrom Windows XP do not loadproperly. What does heneed to do?




Roll back the drivers.


Re-install the programs.


Restore a systemrestore point.


Set up Windows XP Mode

Set up WindowsXP Mode.

Susan is constantly shutting downher laptop improperly due to movingfrom meeting to meeting. Whichfile is in jeopardy of being affected the most?




system restore points


BCD file


registry


dll file

registry




The registry isinjeopardy of being affected the most. When you shutyour computer down improperly, you areputting the registry,as well as your software, indanger of becoming corrupt.

You have been sent to clean up acomputer that has been infected with malware. When you arrive at the computer, you identifythe symptoms that are occurring,quarantine the system, and disable System Restore.Now you must remediate the computer. Which steps are parts of this process?


Update the anti-malware software.


Schedule automatic system scans and updates in the anti-malware software.


Enable System Restore, and create a newrestore point.


Educate theend user.


Use scan andremoval techniques to clean up thecomputer.

Update the anti-malware software.


Use scan and removaltechniques to clean up the computer

Thomas is teachinga class for new users and wants to cover what to do and what not to do online. He specifically discusses spyware and malware infections andhow they occur. What aresome of thewarningsigns he should teach them to be aware of? (Choose all that apply.)




The browser's home pagechanges unexpectedly.


The Taskbar orSystem tray has strange icons. The firewall and antivirus programsare randomly disabled.


The Add/Remove Programs console has programsyou do not recognize.

Thebrowser's home page changes unexpectedly.


The Taskbar or System tray has strange icons.The firewall andantivirus programs are randomly disabled.


The Add/Remove Programs console has programs you do not recognize.

Auser's computer is infected with malware. You quarantine the infected computer,disable SystemRestore, and remediate theinfected computerby updating theanti-malwaresoftware and removingthe malware. Whatstep should you complete next?




Enable System Restore.


Create a restore point.


Schedule automatic scans and updates forthe anti-malware software.


Educate the end user.

Schedule automaticscans and updates for the anti-malware software.

William has discovered an infected fileon his computer. Hewants to prevent it from causing anymore harmto his computer. Fromthe list below, what should he needto do?




Change the browser'shome page.


Quarantine the file.


Disable the firewall.


Use Add/Remove Programs.

Quarantine the file.

You suspect that a Windows 7 computerhas been infected with a Trojan horse. You need to determine if any Trojan horses are loadingat system startup and remove them. Which tool should you use to find outif anyTrojan horses are being loaded at startup?




anti-malware software


MSCONFIG


System Restore


System Recovery Environment

MSCONFIG




Ifyou need to determine ifa Trojanhorse isloadingat systemstartup, you shoulduse MSCONFIGto analyzethe applications on the Startup tab. Check each application shown in the listto ensurethat it isa valid application you need

Thomas has been given a company iPad that will be used for storing private data and photos of clients. He needs toprotect the integrity of the data on this device.What should he do? (Choose two.)




Turn onFind MyiPhone in Settings.


Turn onWiFi.


Turn onBluetooth.


Turn on Touch ID and Passcode

Turn on Find My iPhone in Settings. Turnon Touch ID andPasscode.

A user reportsthat an app that has worked fine in the past willno longer launch. Heindicates that he closedout theapp and then turnedoff and back onthe device.What shouldyou suggest that he do NEXT?




Perform a soft reset.


Uninstall and then reinstall the app.


Force stop the app.


Perform a factory reset.

Uninstall andthen reinstall the app.

Thomas reports that his mobile device is not working properly. Whenyou research the issue, you discover that he accidentally deleted all the data on his device. What has most likely occurred on Thomas's mobile device?




factory reset


soft reset


data backup


force stop

factory reset

Sam is delighted with hisnew Android phone. However one of the apps causes performance issueswith the other apps almost every time he launches the app. What does heneed to do with this app when this happens?




Perform a hard reset.


Perform a soft reset.


Adjust device settings.


Perform a force stop

Perform a force stop

Paula recently advertised her olderiPhone for sale. What should she do before sellingthe device?




Back up and restore the data.


Back up and delete the data.


Backup and reset to factory settings.


Back up and remove apps.

Back up and reset to factory settings.

Tina tradedin her old iPhonefor a newer version. However,soon aftershe got it, shestarted receiving notices from her carrier thatshe had exceeded data limit. What should shedo to eliminate this problem?




Disable iCloud.


Disable Google Sync.


Install a WiFi analyzer.


Install a celltower analyzer.

Disable iCloud.




She shoulddisable iCloud. When iClouddata syncingisturned on, you are uploading all the documents and data stored on your phonefor all the applications to iCloud. Thisalso drainsthe battery much quicker.

Elizabeth has given her teen age son an iPhone for his birthday. She has enabledallthe services requiredto usethe Find My iPhone feature. Whichsecurity risk may occuras a result?




unauthorized location tracking


unintended WiFiconnections


slow data speeds


unintended Bluetooth connection

unauthorized location tracking

You want to prevent your computer from any type ofelectrostatic discharge (ESD) while servicingthe computer. Which actions should you NOT performwhile servicing the computer? (Choose two.)J




Wearan anti-static wristband.


Keepyour one hand in contact withbare metal frameof computer at all times.


Ensure that the room inwhich computer isserviced is carpeted.


Ensure that the room in which computer is serviced is cooland dry.


Wearcotton clothes.

Ensure that theroom in which computer is serviced is carpeted.


Ensure thatthe room in which computer is servicedis cool anddry.

Anthony andBrent were just hiredas IT technicians for MetroilCorporation. Youare training them on proper repairprocedures. Which procedure should be performed off-site?




flashing a BIOSchip


disabling busmastering


resolving an IRQ conflict


repairing a power supply for acathode ray tube (CRT)

repairing a power supply for a cathode ray tube (CRT)




You shouldnot attempt to work inside a monitor case unless you have been trained specifically for that kind of work.

You planto replace some components within a computer. As a recommended practice, what should be thefirst step towards disassemblinga computer?




The processor shouldbe removed fromthe motherboard.


The power supply shouldbe disconnected fromthe motherboard.


The memory modules shouldbe removed fromthe motherboard.


The power cord of the systemcase should be disconnected

The powercordof the systemcase should be disconnected.

You are an IT technician for a company. You arerequired to implement CAT-5cabling for your company's network. The cablewill run to each user workstation along the floor. Whatshould you do to secure thecable?




Installcables using a protective channel.


Install CAT-6 cableinstead of CAT-5 cable.


Use duct tape to secure thecable.


Implement a wireless network

Install cables using a protective channel.

You remove the toner cartridge from a laser printer. Whatshould you do with it?

Deposit it in amunicipal trash bin.
Refill it with general-purpose toner
Return it tothe manufacturer forrecycling.
Send it to a standard plastic recycling center.

Return it to themanufacturer for recycling.

You have severalcathode ray tube (CRT) monitors that no longer function. You need to dispose of them. What shouldyou do?




Throw them in thetrash.


Dissemble them, and throw the non-reusable parts in the trash.


Sendthem to an electronics recycler.


Donate them to your favorite charity

Send them to an electronics recycler.

A large conference room in your office is being repurposed as a server room. Doug, the administrator,has been askedto make suggestions on improving the safety of the room.What detection systems should he recommend? (Choose all that apply.)




temperature detection system


water detection system


smoke detection system


light detection system

temperature detection system


water detection system


smoke detection system

Youhave several old computerparts in astorage room. Because youwork for a company with an aggressive green policy, youwant toreclaim asmuch as possible fromthe components. What CANNOT bereclaimed?




metal from a circuit board


phosphorus from a CRT monitor with a brokenscreen


metal from the computer case


lead from an intactCRT monitor

phosphorus from a CRT monitor witha broken screen




If thescreen on a CRT monitoris broken, you cannot reclaimany materials from it. If the CRT is intact, youcan reclaim lead, mercury, and phosphorus fromit.



Mary has inheriteda bunch of older laptops that need their batteriesreplaced. Which statements are true regarding proper disposal ofunusable and old Ni-cad batteries that she should utilize?




Unusable Ni-cad batteries can bethrown inthe garbage.


Unusable alkaline batteries should not be thrown in the garbage.


Unusable Ni-cad batteriesshould bethrown in a water body.


Unusable alkaline batteries should be handedover to the supplier.


Unusable Ni-cadbatteries shouldbe givento the waste disposalfacility

Unusable Ni-cad batteries shouldbe given to thewaste disposal facility.

What should you do if you discover inappropriate material on a company-owned computer but no specific companycomputer-use policy exists?




Inform your supervisor of the inappropriate material.


Inform the user'ssupervisor ofthe inappropriate material.


Asktheuser to remove the inappropriate material.


Inform the companypresidentof the inappropriate material.

Inform your supervisor of theinappropriate material.

While performing preventative maintenance on a user'scomputer,you notice several files thatviolate theAcceptable Usage Agreement the usersigned when initially employed by the company. TheIT department has specific policies for dealingwithany violations. What shouldyou do?




Contact your supervisor.


Contact the user's supervisor.


Inform the user that the files must beremoved.


Follow the procedures for dealing with thisviolation.

Follow theprocedures fordealing withthis violation.

You are a desktop administrator for Nutex Corporation. Auser in the human resources department is unable to open Internet Explorer on their computer. You go to thecustomer's desk to troubleshootthe problem. While you arethere, you notice confidential documents regarding an employee'srecent disciplinary action sitting next to thekeyboard. What should you do?




Readthe informationon the document, and inform yourco-workers of its contents.


Store the papers in a drawer.


Turn the documents over.


Read the information on the document, butkeep the information confidential.

Turn the documents over.
Youhave been assigned a troubleshooting jobfor a user in thehuman resources department. When youarrive, you notice that aspreadsheet that containsconfidential employee information is open on the user's computer. What shouldyou do?

Close the spreadsheet.
Askthe user toclose the spreadsheet.
Minimize thespreadsheet.
Leave the spreadsheet alone as longas the user is present.
Ask the user to close the spreadsheet.
A customer has contacted you and is angry about yourcompany's service. During the call, you discover that another technician responded initially to the customer's issue. What should you do first?

Stay calm.
Ask for clarification.
Ask the customerwhat would make the situation better.
Transfer the customer to the technician who initially handled the issue.
Stay calm.
What should you do if a customer calls and complains that his CRT monitorhas waves going across it?

Askthe customer to rebootthe computer. Schedule an appointment with thecustomer to replace the video card.
Askthe customer what electrical equipment is near the computer.
Askthe customer to exchange his monitor withanother monitor to seeif the problemis fixed.
Ask thecustomer what electrical equipment is near the computer.
You are at a customersite. The customer reports problems stayingconnected to the Internet,but he does not provide any specificinformation. What should you do to gather more information on the problem?

Askthe customer to demonstrate the problem. Troubleshoot the problem as reported.
Escalate theproblem.
Attempt to connectto the Internet from the customer's computer.
Ask the customer to demonstrate the problem.
You haverecentlydiagnosed a videoproblem with a customer's computer. Yoususpect that the videocard or monitorhas failed. AnIT technic ian is being dispatched. Which rule should NOT befollowed for the sitevisit?

Take the appropriate parts and tools.
Askthe customer to demonstrate the problem. Explain any repairs made.
Askthe customerto clean up the repair site.

Ask the customerto clean upthe repair site.

You are a help desk technician for your company.Several hours into the day,you receiveyour first technical call from a customer. Your radio is on, and you are in the process of eating your lunch. What should you do?

Transferthecustomer to a co-worker.
Continue what you are doing while talkingto the customer.
Turn off your radio, stop eating, and listen to your customer.
Get the customer's contact information, and call them back later .
Turn off your radio, stop eating, and listen to your customer.
Mark is the network administrator in his building and is responsible for training all the new technicians on various troubleshooting techniques. He is instructing them on documenting their actions at the end of the troubleshooting process. What should he NOT encourage them to document at that time?

actions taken
findings discovered
theories used
outcomes achieved

theories used

You have been asked to implement a Homegroup for a user. You need to explain to the user the requirements for thisto occur. What is the mainrequirement that you should mention?


All computers must run Windows 7, Windows 8, or Windows 8.1.


All computers must run Windows Vistaor Windows 7.


Allcomputers must run Windows 7 HomePremium Edition.


All computers must run Windows VistaHome Premium or Windows 7 Home Premium Edition.

All computers must run Windows 7, Windows 8,or Windows 8.1.

You want to install Windows 7 Professional 64-bitedition on a new computer. Whichhardware is NOTa minimum requirement?




1gigahertz 64-bit processor


2 gigabytes RAM


16 GB available hard drive space


DirectX 9 graphics card

16GB available hard drive space

You want to upgrade a Windows VistaBusiness computer to Windows7 Professional. You needto ensure that all the hardwarein the computer is compatible withWindows 7. Whichtool should you use?




Windows 7 Upgrade Advisor


Windows Vista Upgrade Advisor


Windows Easy Transfer


Microsoft Assessment andPlanning Toolkit

Windows 7 Upgrade Advisor

Youhave installed several32-bitand 64-bit applications on a Windows VistaUltimate 64-bit computer .What is the installation folderfor the 64-bit applications?




C:\Program Files


C:\Program Files (x86)


C:\Program Files (x64)


C:\Windows\System32

C :\Program Files

You are responsible for purchasing new Windows computers for your company.The computers must be able to joinyour company's domain.Which versions of Windows should you implement?(Choose all that apply.)




Windows 7 Starter


Windows 7 HomePremium


Windows 7 Professional


Windows 7 Ultimate


Windows 8 Professional

Windows 7 Professional
Windows 7 Ultimate
Windows 8 Professional

You do not have the originalinstallation media, but you need to restore Windows to the original factory settings. Whatisthe quickest way to do this?




Email or callthe computer manufacturer and ask for a restore DVD.


Install from the recoverypartition.


Purchase a new copy of Windows.


Boot into Safe Mode.

Install from the recoverypartition.
You are installing an operating systemon a drive that appears to have sector issues. Whichformatting option should you use?

ExFAT
Quick Format
Full Format
NTFS
Full Format

A user needs to install a Language Interface Pack (LIP) on his Windows 7 computer. Which edition of Windows 7 is needed?




Windows 7 HomeBasic


Windows 7 Home Premium


Windows 7 Ultimate


Windows 7 Professional

Windows 7 Ultimate
On your first day on the job asan A+ technician, you observeyour boss executingthe command chkdsk. Which statement is true of this utility?

It detects and fixes file system errors on a Windows disk.
It rearranges a file to enable it to occupy contiguous space on a drive.
It detects Windows disk errors,but fixing errors requires the scandisk utility.
It is a command-line utility that isNOT available in Windows Vista andlater.
It detects and fixes file system errors ona Windows disk.
A user contacts youasking if sheshould run the chkdsk command on his computer. Whywould you use thiscommand?

to manage hard drive partitions
towrite new boot sector code on the system partition
torepair the master boot record (MBR) on the bootpartition
tocheck the specified drive and repair problems, ifany
to checkthe specifieddrive and repairproblems, if any
Youneed to adjust which applications can beloaded at boot time. Which tab ofthe MSCONFIG utility in Windows 7 should you access?

the Startup tab
the Services tab
the Boot tab
the General tab
the Startup tab
A user wants to be ableto restore his Windows 7 computer's system files to anearlierpoint in time. He asksthat youensurethat a restore point is created every dayat the sametime. Which toolshould you use to schedulethe restore point creation?

System Restore
Volume Shadow Copy Service
Task Scheduler
msconfig
Task Scheduler
You need to download and install critical system updates, security patches or hotfixes, andupgrades for Windows components. Which Windows utility allows you accomplish this?

Windows Update
File and Settings Wizard
System Restore
Recovery Console
Windows Update
Auser has connected a second monitor to his Windows 7 Ultimate computer. The new monitoris detected. However, thedual-monitor configuration is not configured as he wantsit. What should the user do to changethe dual-monitor configuration of the monitors?

Navigate to Control Panel\Appearance andPersonalization\Display\AdjustResolution.
Navigate to Control Panel\Appearance andPersonalization\Display\Adjust Resolution\Advanced Settings.
Right-click the desktop, and select Personalize. Right-click thedesktop, and select Gadgets.
Navigate to Control Panel\Appearance and Personalization\Display\Adjust Resolution.
Youneed toconnect tothe Internet ata client site. The system administrator gives you an SSID of Workplace 1 and a password. Which network typeare you goingto use to connect to the Internet?

VPN
broadband
wireless
dialup
wireless
You are working at a client site and need to connect securely to the network at your home office. Whichsecondary network connection will allowyou to do that?

VPN
WWAN
Wireless
Dialup
VPN
You have configured System Restore on the computers in your network. Which condition will NOT result in a restorepoint being created?

installing new device driver
upgrading device driver
installing software
saving a new file
savinga new file
You need to defragment a hard drive.When the defragmentation is complete,you want to view both the analysis and defragmentation reports. Which command should you run?

defrag /a
defrag /v
defrag /a /v
defrag /f
defrag /v
Which Linux command allows you to view the processes running on a system?

ps
grep
apt-get
chmod

ps

Which Mac OS feature allows you to access content on a CD or DVD drive when you do not have an opticaldrive?




Boot Camp


iCloud


Remote Disk


Finder

Remote Disk
You areresponsible for managing the virtual computers on your network. Whichguideline is important when managing virtual computers?r

Updatethe operating system and applications only on the host computer.
Implement a firewall only on the host computer .
Isolate thehost computerand eachvirtual computer from each other.
Install and update the antivirus program onlyon the host computer.
Isolatethe host computer and each virtualcomputer from each other
Which cloud computing term refers to a feature that allows a provider to dynamically adjust resource allocation, based on demand?

rapid elasticity
resource pooling
measured service
on demand

rapid elasticity

Which termrefers to a cloud infrastructure that provides services to many related organizations?

public cloud
private cloud
hybrid cloud
community cloud
community cloud
Which iPhone feature allows you towirelessly backup yourmobile device data, includingapp,pictures, and music, so that youcanlater retrieve the data on any mobile device, even if thedata ison another mobiledevice?

Passbook
App Store
iTunes
iCloud
iCloud
Which feature of a mobile device measures the directional movement of the device, but not the tilt of the device relative to a horizontal plane?

Geotracking
GPS
gyroscope
accelerometer
accelerometer
You are on an Android phone and frequently roam outside of your local area. You need to update the list of cell towersto provide better coverage. Which updatewould you perform?

PRI update
PRL update
Baseband update
None of the above

PRL update


preferred roaminglist

You need to configureyour Android phone so that you can receiveyour Yahoo email on the device. What information would youneed to provide?

email address, password, IMAP servermail.yahoo.com, SMTP serversmtp.mail.yahoo.com device's IP address, password,IMAP server mail.yahoo.com, SMTPserver smtp.mail.yahoo.com
email address, password, IMAP server mail.yahoo.com, SMTPserver ftp.yahoo.com
email address, password,IMAP server mail.yahoo.com
email address, password, IMAP server mail.yahoo.com, SMTPserver ftp.yahoo.com
You are configuring the e-mail settings for the phones. Your organization's e-mail servers are as follows:
•POP3 mail server - pop3.dreamsuites.com
•IMAP mail server - imap.dreamsuites.com
•SMTP mail server - smtp.dreamsuites.com The POP3 and IMAP servers use the default ports. The SMTP server requiresSSL and uses port 587. Management has requestedthat their e-mails retainthe Readstatus no matter where the e-mailwas read. What shouldyou do? (Choose two.)

Configure pop3.dreamsuites.com as the incoming server usingport 110.
Configure pop3.dreamsuites.com as the incoming server usingport 143.
Configure imap.dreamsuites.com as the incoming serverusing port 110.
Configure imap.dreamsuites.com as the incomingserver using port143.
Configure smtp.dreamsuites. com as the outgoing server using port 25.
Configure smtp.dreamsuites. comas theoutgoing server usingport 587.
Configure imap.dreamsuites.com asthe incomingserver using port 143.
Configure smtp.dreamsuites.com as theoutgoing server using port 587.
Yourcompany is implementing anew application. Authenticationwithin theapplication includesthe client authenticating with theserver and theserver authenticatingwith the client. Whattype of authentication is this?

mutual authentication
multifactorauthentication
single sign-on
biometricauthentication
mutualauthentication
Which of the following types of data can be synchronizedto the cloud?

calendar
pictures
documents
all ofthe above
all ofthe above
You are a network administrator for Nutex Corporation.Your organization implements anetwork. You have been tasked with designing theend-user security training that will be given to all employees regarding the network. Whichsecurity issue should you cover?

denial of service (DOS) attacks
physical security issues
social engineering attacks
smart card usage
social engineering attacks
A hacker has called a company employeeand learned the employee's user name and password by posingas a memberof corporate technical support.
Which type of attack has the company suffered?

buffer overflow
denial of service
brute force
social engineering
social engineering
Which of the following is an example of phishing?

a Visual Basic scriptattached to an e-mail that infects your system
anattack thatuses drones to obtain e-mail accounts to sendspam
a program that sends out your personalinformation to an advertiser
ane-mail request from a financial institution askingyou to log in and changeyour password usingtheprovided link
ane-mail request from a financial institution askingyou to log in and changeyour password usingtheprovided link
Which malicious program replicates itself to computers on a networkthrough security loopholes?

worm
boot virus
e-mail virus
trojan horse
worm
After determining the scope of a user's job, what is the next step in implementing theprincipleof least privilege?

Determine the minimumset of privileges neededto perform the user'sjob.
Determine the maximumset of privileges needed toperform the user's job.
Configure the appropriate privileges forthe user's account.
Configure the appropriate group memberships for the user's account.
Determine the minimumset of privileges neededto perform the user'sjob.
What is a smart card?

ahardware device that has an embedded microchip that contains authentication orsecurity information
atechnology thatmeasures a humancharacteristic for authentication
anelectronic file that establishes youridentity via a public key infrastructure (PKI) to complete transactions
anelectronic signature that can be used to prove the sender's identity or a document's signer
ahardware device that has an embedded microchip that contains authentication orsecurity information
You want to provide secure access to the research laboratoryand ensure that only authorized persons canenter thelaboratory. Which system does NOT provide aneffective means of ensuring that only authorizedpersons can enter the server room?

smart card system
swipe card system
single sign-on system
biometric access controlsystem
single sign-on system
You have stored criticalinformation about your companyin the computers in yourserver room. You want only authorized peopleto be allowed entry into the server room. Whichmethod will be MOST effective to maintain the security of the serverroom?

Employ an access controlsystem on the entrance of theserver room.
Employ a securitystaff at the entry of the serverroom to checkthe individuals who enterthe server room.
Place a safe lock on the serverdoor and give the key only to the authorized persons.
Position a surveillance cameraat the entranceof the serverroom.
Employ an access controlsystem on the entrance of theserver room.
What is thepurpose of a privacy filter?

tofilter confidential information that is contained in any networkcommunication
to prevent othersfrom viewing what you are enteringon your keyboard
toprevent others fromviewing what you have displayed on your monitor
tofilter confidential information that is contained in any e-mail
to prevent others from viewing what you have displayed on your monitor
What is the aim of security awareness training?

All employees must understand their security responsibilities.
Allemployees in the IT department shouldbe able to handle security incidents.
All employees excludingtop management should understand the legal implications of loss of information.
All employees in the IT department shouldbe able to handle social engineering attacks.
All employees must understand their security responsibilities.
Whenusers log in tothe network locally,they must provide their username and password. When users log in to the network remotely, theymust provide theirusername, password,and smartcard. Which two statements are true regarding your organization'ssecurity? {Choose two.)

The local networklogin uses one-factor authentication.
The local network login uses two-factor authentication.
The remote network login uses three-factor authentication.
The remote network login usestwo-factor authentication.
The local network login uses one-factor authentication.
The remote network login uses two-factor authentication.
You have installedseveral 32-bit and 64-bit applications on a Windows 7 Ultimate 64-bit computer. What is the installation folder for the 32-bit applications?

C:\Program Files
C:\ProgramFiles (x86)
C:\Program Files (x64)
C:\Windows\System32
C:\Program Files (x86)
Yourorganization is concerned with unauthorized users downloading confidential datato removable media.You decide to encrypt the confidentialdata using the Encrypting File System (EFS) in Windows XP. You need to copy an EFS-encrypted file. The file will be copied to an NTFS volume that does not implement EFS.What is the state of the file?

The original versionof the file is decrypted.The newversionof the file is encrypted.
The originalversion of the file remainsencrypted.The new version of the file is encrypted.
The original versionof the file remains encrypted.The newversion of the file is decrypted.
The original versionof the file is decrypted.The new version of the file is decrypted.
The original version of the fileremains encrypted. The new version of the fileisdecrypted.
Whatis the quickest way to lock a Windows7 computer?

Press Ctrl+Alt+Del, and select Lock this computer. Press the Windows + L keys.
Right-click the taskbar , andselect Lock the taskbar.
Click Start.Clicktheright arrow next to Shutdown, andselect Lock.
Pressthe Windows + L keys.
Which password policy setting can you configure on a Windows 7 computer to define the number of days that a password must be kept beforethe user can change it?

the Enforce password history setting
the Maximum password age setting
the Minimum password age setting
the Minimumpassword lengthsetting
the Minimumpassword age setting
What is thegreatest threat to the securityof mobile devices?

excessive permissions
GPS location services
theft
unsecured WiFi

Theft




Thetop threats to mobile devicesecurity are as follows .




•Theft


•Excessivepermissions


•Geolocation and GPS locationservices


•Unsecured WiFi


•Mobile application vulnerabilities

A user from your organization contacts you that a company-issued iPhone has been lost. The iPhone contained confidential information. You need to remove all thedata from this iPhone. What should you do?

Log in toiCloud.com, andselect Find MyiPhone. Select the devicefrom theDevices list, and click Erase iPhone.
Login to iCloud.com,and selectFind My iPhone.Select thedevice from theDevices list, and click Lock.
Login to iTunes,andselect Find My iPhone. Select the device from the Deviceslist, and clickErase iPhone.
Login to iTunes,and selectFind My iPhone. Select the device from the Deviceslist, and click Lock.
Log in to iCloud.com, and select Find My iPhone. Select the device from the Devices list,and click Erase iPhone.
You need to ensure thatdata on storagemedia is properly classified to ensure that the appropriate data is retained. Whichoperation mustyou undertake to avoidmishandlingof tapes,CD-ROMs,floppy disks, and printed material?

labeling
degaussing
zeroization
offsite storage
labeling


You are creating a wireless network for your company. You need to implement a wireless protocolthat provides maximum security while providingsupport for olderwireless clients. Whichprotocol should you choose?

Wireless Application Protocol (WAP)
Wired Equivalent Privacy (WEP)
Wi-Fi Protected Access (WPA)
Wi-Fi Protected Access 2 (WPA2)
You should implementWPA. WPA was created to fix core problems with WEP. WPA isdesigned to work with olderwireless clientswhile implementing the 802.11istandard.
You have twowireless networks in your building.The wireless networks do notoverlap. Bothof them use Wi-FiProtected Access (WPA). You want to ensure that no unauthorized wirelessaccess points are established. What should you do?

Change the twowireless networks to WPA2. Change the two wirelessnetworks to WEP.
Periodically complete a site survey.
Disable SSID broadcasts for the two wireless networks.
Periodically complete a site survey.

Sitesurveys generally produceinformation on the typesof systemsin use,theprotocols in use,and other critical information. You need to ensure that hackerscannot use sitesurveys toobtain this information. To protect against unauthorized site surveys, you should changethe default Service Set Identifier (SSID} and disable SSIDbroadcasts. Immediately upon discovering a wireless accesspoint using a site survey, youshould physically locate the device anddisconnect it.
Thomas contacts you that a motherboard manufacturer has announced that arecent firmware update will provide additional functionality and increased performance for hisWindows 7 computer. What would you tell Thomas to do?

Download the new driver,and install it in the operating system.
Flash the BIOS.
Select the Update Driver Software option in Device Manager.
Use theSystem Configuration utility to reboot the computer in Diagnostic startup mode, andthen install the update.
Flash the BIOS
Ten computers in your department need the BIOS updated, and it needs to be completed within a two-hour timeframe. What is the fastest way to accomplish this task?

Flash the BIOS.
Usea bootable flash drive.
Usea boot loader file.
Update the EEPROM chip.
Flash the BIOS.
A user has recently upgradedthe video adapter drivers on a Windows Vista computer . Since thattime, thecomputer has been continuously restarting. You tried rebooting thecomputer using the Last Known Good Configuration, but it does not affect the problem. What should you do to fix the problem using the least administrative effort? (Choose two.)

Boot thecomputer witha Windows Vista bootable disk.
Restart thecomputer inSafe Mode.
Roll backthe video adapter drivers.
Perform afresh installation of Windows Vista.
Restart thecomputer,press the F8key, and select the Command prompt only option.

Restart thecomputer in SafeMode.


Roll back the videoadapterdrivers.

You need totroubleshoot a driverissue. When Windows Vistais booting, you press F8to enter the AdvancedBoot Options menu. Whichoption is NOTan optionlisted in themenu?

Safe Mode
Safe Mode withNetworking
Directory Services Restore Mode
Automated System Recovery
Automated System Recovery
Asthe desktop engineer in your company , youare responsible fortier-onesupport, meaning that youcompile all problems and report themto the proper technician. Several users report thatwhen they boot their computer it generates a screen with hexadecimalcodes on a blue background. Which type of Windows error code is this??

a POST error
a runtime error
an illegal operation
a STOP error
a STOP error
A user has a WindowsVista computer with 128 MB of RAM and two hard drives, named drive C and drive D. The pagingfile is locatedon drive C. The user complainsthat his computer does not performwell after running for a couple hours. What should you tell the userto do?

Move the paging file to drive D.
Increase thesize of thepaging file.
Disable the paging file.
Defragment the hard drives
Move the paging fileto drive D.
After George works with his Windows computerfor several minutes,a blue screen erroroccurs. His computer reboots, andno error reportnotification is received.You want Microsoftto be notifiedof theerror, and you suspect that the error-reporting feature is disabled. You must enable it. You openthe System Properties dialog box. Where should you enable this feature?

the Advanced tab
the System Restore tab
the Hardware tab
the General tab
the Advanced tab
A user contacts you to report that a "NTLDR is missing or corrupt" message is appearingon his computer. After researching this issue, you discoverthat the master boot record is corrupt. Which tool should you use to correct thisproblem?

System Recovery Options
Windows Update
MSCONFIG
Event Viewer
System Recovery Options
WindowsVista could not start because the following fileis missing or corrupt: \WINDOWS\SYSTEM32\CONFIG\SYSTEM What doesthe error message indicate?

The registry is corrupt.
A configuration file has problems.
Anewly installed application is corrupt.
A Windows startup file iscorrupt
The registry is corrupt.
What will enable you to change the Screen area setting to 1024 x 768 pixels?r Restart your WindowsVista computer.

Start your Windows Vistacomputer in Safe Mode.
Install the appropriate device driverfor the videocard.
Replace the monitor connected to yourWindows Vistacomputer.
Install the appropriate device driver for thevideo card.
Amyis an IT trainer and is training a group of technicians on how to look forcertain attacks and security threats. She is discussing software included in Windows Vista that helps prevent malwareand spyware infections. Whatis the name of this software?

Event Viewer
Windows Defender
Microsoft AntiSpyware
Ad-Aware SE Personal
Windows Defender
A user contacts you stating thathe believes that his computer is infected with malware. Whichsymptoms may indicate that he is correct? (Choose all that apply.)

pop-ups
browser redirection
low diskspace warning alert
security alerts
junkemail
slower performance
pop-upsbrowser redirection security alerts slower performance
Users in your department are noticing thattheir computers are not acting normal. Whenyou ask them to explain, theysay that their computers are sluggish and slower than usual. You need to rule out a virus infection. What is the first question you will ask them to help determinewhether they have a virus or not?

Have you opened any email attachments lately?
Haveyou run your virus scan software recently?
Haveyou rebooted yourcomputer lately? Haveyou opened Task Manager recently?

Have you opened any emailattachments lately?
You suspectthat Alice's computer isinfected with malware by identifying certain symptoms of malware. What is the next stepin the malware removalprocess?

Disable system restore onAlice's computer. Quarantine Alice's computer.
Remediate Alice's computer.
Educate Alice on malware.
Quarantine Alice's computer.
Hannah ishaving issues withher new headphones directly connected to her mobile device. She cannot hear anything even though sheis connected. Whatis the firstthing she coulddo totroubleshoot thisproblem?

Check the headphone volume.
Check theheadphone connection.
Check WiFi connectivity.
Check Bluetooth connectivity.
Check the headphone volume.
Isaac purchased a refurbished iPhone andhas loaded the latest version of iOS. However his iPhoneseems to not hold a charge for very long.What can you recommend he try so he can alleviate his extremely short battery life?

Use the battery usage report.
Use the Low Power Mode setting.
Delete some apps.
Enable WiFi.
Use theLow Power Mode setting.
Alanof Northern Company is traveling to several conferences in various statesto present his new product line to consumers.He usually uses a Slim portto project his Android screen but accidentally left his cables at the last site where he was. His next presentation is in four hours. What can he request from the hotel technical team to keep theshow rolling for Alan? (Choose two.)

a Micro HDMI cable
a Miracast or Chromecast
an HDMI cable
a mini USB cable
a Micro HDMI cable
a Miracast orChromecast
Shelly was in the workout room listening to her music via her Bluetooth headphones on her iPhone 6 which was in her pocket. When she was finished shewent into sauna but soon noticed her music stopped playing. What most likely happened?

Lost Bluetooth signal
Lost WiFi signal
iPhone overheated
Headphones lost power
iPhoneoverheated
Susan has calledthe help desk and is complaining about a frozenscreen on her mobile device.After troubleshooting, you determine that she has a frozen system. What instructions will you give her to doover the phone to save you a trip?

Press CTRL+ALT+DEL keys.
Force a restart by holding downthe Power button.
Elevate to next level oftechnical support.
Callthe mobile device technical support.
Force arestart by holding down the Powerbutton.
Andrea is inan airport waiting for herflightto takeoff andpreparingfor herwork presentation. Although the airport offers free WiFi, she usesher iPadto edither presentation and tethers it to her iPhone's personal hotspot. Why is this most likely a goodpractice?

slow data speed
no wireless connectivity
no Bluetooth connectivity
possibility of leaked files and data
possibility of leaked files and data
Yourmobile deviceis fully charged.You havebeen travelling all day using your mobile device tomake calls. However, when you travelinto remote areas, calls mysteriously disconnect. What is the most likely problem with thedevice?

Power drain
Signal drop/weaksignal
Slow data speeds
High resource utilization
Signal drop/weaksignal
There are many occupationalprocedures thatshould be modeledas an A+ certified technician. Withthat in mind, what is the most important equipment you needto transport a CRT monitorto another part of a facility?

an anti-static wrist strap
a back brace
rubber-soled shoes
a cart
a cart
Michael is learning about hard drives and how they should be properly installed. What factor do you tell himis MOST likely to harm the data on SATAhard drives and backup tapes?

RFI
ESD
magnets
EMI
magnets
You have been hired as an IT technician to repair computers and other devices for a large corporation. Which device is most likely to contain internal components that can cause burns?

desktop computer
laser printer
nkjet printer
laptopcomputer
laserprinter
A major fire is detected in the basement of yourcompany and a fire alarm is raised. What should be the FIRST step?

Evacuate thebuilding.
Locate thefire extinguisher to douse the fire. Turnoff theelectricity.
Call the emergency personnel.
Determine the type of fire.

Evacuate thebuilding.

An electrical fire has started in your server room. Which type of fireextinguisher should you use?

Class A
Class B
Class C
Class D

Class C

Jane is new to the PC technician world and is curious about ESD. Which steps would you tell her to useas preventive measures against static electricity? (Choose all that apply.)

Wear anti-static bands while servicing computer components.
Ensure that the humidity leveldoes notbecome toohigh.
Wear leathersoleshoes.
Have proper grounding of building and outlets. Ensure that sensitive areas, such as server rooms, are carpeted.
Wearanti-static bands while servicing computer components.
Have proper grounding of building and outlets.
Howard the maintenance supervisor hasidentified several devices in yourcompany's facility that contain phosphorous. Which guidelines wouldyou need to emphasize his team regardinghow to properly dispose ofphosphorus? (Chooseall that apply.)

IMSDS
OSHAguidelines
EPA guidelines
FDA guidelines
MSDS (Material Safety Data Sheet )
OSHA guidelines ( Occupational Safety and Health Administration )
EPA guidelines ( Environmental Protection Agency )
You have been given a form to reviewduring the interview process for a new job. The form includes sections requesting safety measures,fire-fighting procedures,transportation requirements, andfirst aid measures. Whichform are you reviewing?

Cascading StyleSheet (CSS)
Material Safety Data Sheet(MSDS)
Manager's Safety DataSheet
Employee Information Data Sheet
Material Safety DataSheet (MSDS)
What should you do if you discover inappropriate material on a company-owned computer and a company computer-use policy existsthat addresses this specific situation?

Inform your supervisor of the inappropriate material.
Inform the user'ssupervisor of the inappropriate material.
Askthe userto remove the inappropriate material.
Follow the procedures for dealing with thisviolation.
Follow theprocedures fordealing with this violation.
While performing preventativemaintenance on a user's computer,you notice severaloffensive files on the user's computer.Your company does not have an Acceptable Use policy. What should you do?


Contact your supervisor.
Contact the user's supervisor.
Inform the user that the files must be removed.
Remove the offensive files.
Contact your supervisor.
While discussing a computer problemwith a user, you realize that solving the problem requires a level of expertise that you do not have. How should you handle this problem?

Tellthe useryou do not know how to fix his problem.
Gothrough a few troubleshooting steps.
Askthe user if you can transferhim toappropriate personnel.
Put the user on hold,and call yoursupervisor.

Askthe user if you can transferhim toappropriate personnel.

All of your telephone support technicians are trainedin proper telephoneetiquette, but you notice that sometimes youoverhear some of them notfollowing all of the techniques suggested. In yourweekly team meeting what can you specifically address that they NOT exercise when dealing withan aggressive customer?

Ask for clarification.
Match the customer's tone of voice.
Askwhat would make the situation better. Paraphrase what the customer said.
Match the customer's tone of voice.
Which statement is more effective when dealingwith a customer who keepshaving the same problem?

"I do not know what is causing this problem." "You should nevershut down your computer that way."
"You should have shutdown your computerproperly."
"Often thistype of problem is caused when a computer is not shut down properly."

"Often thistype of problem is caused when a computer is not shut down properly."

When explaining new equipment features to a customer, all of the following areacceptable practices,EXCEPT:




Sit beside the customer.


Usedirectstatements to the customer.


Avoid interrupting the customer.


Use acronyms to sound more intelligent.

Use acronyms to sound more intelligent.
A customer contacts you with a technical issue you must research. After obtaining permission, you place the customeron hold to complete the research. What is the maximum amount of time thecustomer should remain on holdbefore receiving an update?

30 seconds
1 minute
2 minutes
5 minutes
2 minutes
While servicing some computer equipment,youoverhear a conversation about company-widepay raises. What should you do?

Keep the information confidential.
Tellyour co-workers about the pay raise.
Tellyour supervisor about the pay raise.
Sendan anonymous e-mailto all companyemployees about the pay raise.
Keep the information confidential.
A customer calls you to reporta video problem with his computer . The customer starts to explainthe symptoms of the problem.What should you do first?

Interrupt him, and obtain only the relevantinformation.
Interrupt him,and obtain onlythe basic information.
Allowhim to finishhis explanation, andrecord all the details he gives you.
Allow him tofinish his explanation, butrecord only the information you feel is relevant.
Allow himto finish his explanation, and record allthe details he gives you.
A customer calls with a desktop computerissue. After actively listening to the customer,you have several questions you need answered.What is the purpose of asking pertinent questions AFTER using activelistening during a customer call?

to develop trust
to develop understanding
to develop dialogue
to show interest
to develop understanding
You are troubleshooting a problem with a computer. After analyzingthe problem, youdetermine a possible causeof the problem.Youtest your theory, but determine that thetheoryis not correct.Which two steps could you take next? (Choose two.)

Establish a new theory.
Establish a planof action.
Implement asolution.
Escalate theproblem.
Establisha new theory.
Escalate theproblem.
You have an application thatwill only run properlyon Windows XP Professional. A user has a Windows 7 Ultimate computer on which the applicationis installed. You right-click the application and select Properties. Which tab shouldyou select to configure the application to run in a Windows XP environment?

the General tab
the Compatibility tab
the Securitytab
thePrevious Versionstab
the Compatibility tab
When you start WindowsVista,an error message is displayed that indicates that a servicefailed to load. Which utility can you use to determine why the service failed to load?

Event Viewer
Resource Meter
Network Monitor
System Configuration
Event Viewer
A user wants you to ensure that his Windows Vista computer uses Windows Flip3D. Which feature should youenable?

UAC
Windows Aero
Compatibility mode
Windows Sidebar

Windows Aero

Whatis the recommended setting for the User Account Control: Behavior ofthe elevation prompt for administrators in Admin Approval Mode group policy in ahighly secure environment for Windows7 computers?

Prompt for consent
Prompt for credentials
Prompt for consent on the securedesktop Prompt for credentials on the securedesktop
Prompt for credentials onthe secure desktop
You need to upgrade a computerrunning Windows Vista HomePremium with ServicePack 2 to Windows 7. To whicheditions of Windows 7 can this computer be upgraded? (Choose all that apply.)

Windows 7 Starter
Windows 7 HomePremium
Windows 7 Professional
Windows 7 Ultimate
Windows7 Home Premium
Windows 7 Ultimate
You have purchased several new computers with dual processor configurations. The new computers have dual 1- gigahertz (GHz) processors and 2 gigabytes (GB) of RAM. Which editions of Windows Vista could you installtobe able to utilize all components? (Choose all that apply.)

Windows Vista Home Basic
Windows Vista Home Premium
Windows Vista Business
Windows Vista Ultimate
Windows Vista Business
Windows Vista Ultimate
You need to locally install Windows 7 Ultimate on anew computer. What is themost likely installation method?

network
DVD
PXE
CD

DVD



Youare settingup a new Windows Vista computer. Several users willbe using this computer. You decide to configurea local user account foreach user.You need to ensure that users can control who has access to theirfiles. What shouldyou do?

Use FAT.
Use NTFS.
Use EFS.
Use smart cards.

Use NTFS.

You are the desktop support technician foryour company. You are working on a computer running Windows 7 thathas two hard disk drives, named HDD1 and HDD2. You want to copy the entire file andfolder structure from HDD1 to HDD2 in the most efficientmanner. Which command-line toolshould you use?

copy.exe
xcopy.exe
diskcopy.exe
move.exe
xcopy.exe
An ITtechnician reports that he ran the sfc utilityon a user's computer. Why would thisutility be used?

It detects signed and unsigned device drivers on a computer.
Itlists information aboutdrivers running on acomputer.
It monitors changes to protected system files. It repopulates the dll cache folder when contents are corrupted.

It repopulates the dll cache folder when contents are corrupted.

You runthe systeminfo command on a Windows 7 computer. Which information will NOT be displayed?

hotfixes installed
boot options
domain name
virtual memory statistics
boot options
You launch Performance Monitor in Windows 7 Professional. Which components can you monitorusingthis tool? (Choose all that apply.)

processor
memory
network
disk
processor
memory
network
disk
All company computers have been upgraded to Windows 7. A user complains that the Run dialog box is no longer available from the Start menu. You want torestore this functionalityfor the user. What shouldyoudo?

Right-click the taskbar and select Properties. Onthe Toolbars tab, select Start.
Right-click the taskbar and select Properties. On the Start Menu tab, select Customize. Right-click the taskbar and select Properties. On the Taskbar tab,select Customize. Right-click the taskbar and select Properties. On the Toolbars tab,select Run.
Right-click thetaskbar andselect Properties. On the Start Menu tab, select Customize.
You need to make sure that no old user application data is still locatedon a Windows Vista computer. Which hidden folder in Windows Vista storesthisdata?

%systemdrive%\Users\user_name\AppData %systemdrive%\Documents and Settings\AppData
%systemdrive%\Loca lSettings\Application Data
%systemdrive%\Documents and Settings\Local Settings\Application Data
%systemdrive%\Users\user_name\AppData
You need to adjust the microphonerecording levels on a Windows Vistacomputer. Where should you go?

ClickStart and Control Panel. Click Sounds and Audio Devices,andselect the Voicetab. In the Voice Recording section, click the Volume button.
ClickStart and Control Panel. Click Sound, and select theRecording tab. Select the microphone you want to adjust, andclickProperties. In the Microphone Propertiesdialog box,select the Levels tab.
ClickStart and ControlPanel. Double-click Speech. Choose the SpeechRecognition tab. Select the Audio Input button, and then click theProperties button.
Click Start and Control Panel. Click Ease of Access and Speech Recognition. ClickSet up microphone.
Click Start and Control Panel. Click Sound, and select the Recording tab. Select the microphone you want to adjust, and click Properties. In the Microphone Properties dialog box, select the Levels tab
You needto enable Wake on LAN. Where would you go first todo this?

on the NIC
in Device Manager
on the router
in theBIOS
in theBIOS
You need todo a backup. You onlywant to back up thosefile that havechanged or havenot been previously backed up.You also do not wantthem to be marked as backed up. Which type of backupwould you choose?

copy
daily
normal
incremental
differential
differential
Which of these is a system tool withinMac operating systems?

Force Quit
Task Manager
TaskScheduler
Dolphin
Force Quit
You have an unresponsive application,and you wish to end it. Which toolwill allow you to do that?

Time Machine
Force Quit
Snapshot
Image recovery
Force Quit
You are responsible for managing a Windows Vista computer that hostsseveral virtual computers.You need to install the latest patchesfor the operating system. Where should you installthe patches?

on the host computer only
on each Windows Vista virtual computer only
on the physical computer only
onboth the host computer and allWindow Vista virtual computers
onboth the host computer and allWindow Vista virtual computers
Which of these cloud services typically provides the hardware and software necessary for application development?

laaS
Saas
Paas
public cloud
PaaS
Which of these terms refers to a foundation service upon which theother two are built?

Saas
laas
PaaS
hybrid cloud
laas
Which of the following is NOT an Internet appliance?

UTM
IDS
IPS
DNS

DNS

Which of the following statements regarding Android phones is INCORRECT?

The Android GPS needs a view of thesky.
The Android GPSwill use battery life.
TheAndroid GPSrequires the help of cell towers to obtain a location.
Android Apps canuse celltowers,WiFi hot spots,or satellites toobtaina location.
The Android GPSrequires the help of cell towers to obtain a location.
The Android GPS uses satellites toobtain a location.
Which of the following is NOT disabled whenan iPhone is placed in Airplane Mode?

cellular
Siri
WiFi
GPS
Siri

You wish to send encrypted emails. What option should you enable?




POP3


IMAP


S/MIME


ISP

S/MIME

A company representative has justlanded a significant order at atrade show. He has all the necessary information on his laptop and needs to transmit it to the homeoffice for processing. However, he calls you on his company-issued Android phone and notifies you that Internet access is down at the trade show. He is on an LTE connection. What should you recommend?

Enable tethering on theAndroid phone.
Pair the phone and laptop via Bluetooth.
Setthe Android phone to AirplaneMode.
Connect the laptop to the company network over a VPN.
Enable tethering on the Android phone.
You need to synchronize your mobiledevice data with your desktop computer. For security reasons,your organization prohibitssyncing devices over wireless connectionsor the Internet. Which connection(s) could you use to performthe synchronization?

802.11
USB
Bluetooth
Ethernet

USB

Whatis the processwhereby data, including pictures, music, andcontacts, on your mobile device is uploaded to your desktop computer?

remote wipe
remote backup
synchronization
patching
synchronization
Which type of malicious software infects through the Internet to collectuser information, including browsinghabits?

spyware
viruses
worms
Trojan horses

spyware

Which malicious software relies on other applications to executeand infect thesystem?

a virus
a worm
a logic bomb
a Trojan horse

a virus