A Plus 220-702 Questions Flashcards

1
Q
  1. Hidden backdoor to be used for access to workstations on the internet
A

Rootkits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

OS allows the creation of homegroups

A

windows 7 home premium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

completed FIRST in order to run win 7 from a bootable USB drive

A

create a primary partition and make it active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

types of data that can be synchronized to a mobile device

A

pictures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

remove the ability of standard users to shutdown or restart a shared computer. which command is used to accomplish this task?

A

gpedit.msc (group policy editor)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

internet browser’s cookie could be classified as

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

to reach system restore, select:

A

start>right click on computer>properties>system protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

LCD screen only works properly at certain angles. Technician should FIRST check:

A

display harness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

which would you do FIRST if the customer stated their monitor resolution was changed and now the customer does not see a display

A

Boot in safe mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

tape drive is reporting errors. which of the following maintenance procedures should you do FIRST

A

use the included cleaning tape on the drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

technician replaced a floppy drive and now the front indicator light is consistently illuminated. what is the cause of this?

A

data cable was put on backwards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

socket type for a pentium i7 processor

A

1366

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

output voltage on a 4-pin Molex connector

A

5v and 12v

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

voltages found on a 15-pin SATA power connector (name two)

A

3.3v and 12v

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

*which of the following is a requirement of creating a mount point in the windows OS

A

mount point folder must be empty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

customer wants to run an application that is disk I/O intensive. which of the following types should be installed for MAXIMUM performance?

A

SSD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

which of the following internet connections has the GREATEST latency?

A

Satellite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

which of the following would be BEST to use when testing the functionality of a PSU (power supply unit)?

A

power supply tester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

benefit of having a laptop with TPM?

A

entire drive can be encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what command repairs boot sector blocks after a virus has been removed?

A

fixmbr (fix master boot record)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Java 7 runs only on what bit (32 or 64) of browsers?

A

64-bit browsers; Chrome is a 32-bit browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Technician replaced a video card with another manufacturer’s video card. the driver installation does not complete. which of the following steps should the technician take FIRST?

A

Roll back the driver (revert back to the previous driver)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

which of the following recovery options restores the registry and driver settings that were affected since the computer was started successfully?

A

Last known good configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what is the default SMTP port?

A

25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

what should be implemented on a SOHO server?

A

assign static IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

what command can you use to identify a user’s network address?

A

IPCONFIG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

what is the following default install directory in Windows 7?

A

C:\Windows\

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

what is the default directory for User Profiles in Windows 7?

A

C:\users\

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

default location for Fonts in Windows 7?

A

C:\Windows\Fonts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

technician is replacing a motherboard in a user’s desktop PC. what tool should be used before replacing the new motherboard?

A

Power supply tester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

floppy drive is replaced in a computer and now when the computer is turned on the floppy drive light is constantly lit. which of the following is the MOST likely cause?

A

drive cable is connected backwards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

user profiles in windows 7 are stored in what location?

A

C:\users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

technician installed a new application of a windows XP desktop. when the tech tries to launch the application it crashes. what can the tech use to troubleshoot the application

A

application logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

From a command prompt, a tech is removing some old user profiles from a desktop. What command can be used to delete folders after they have been emptied?

A

RD (remove directory)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

tech tries to install a program and a pop-up appears and asks ‘a program needs permission to continue’. what is causing this pop-up to appear?

A

UAC (user account control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

what is used by BitLocker to lock an encryption key and protect data

A

TPM (trusted platform module)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

what built-in applets should a technician use to configure offline files and folders in windows 7?

A

Sync Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

correct sockets for an Intel Core IX series processor

A

1156

1366

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

tech replaced a power supply with an identical power supply, and now the high-end graphics card is not working. what should the technician check?

A

PCIe power jack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

what command will show all active TCP/IP network connections?

A

NETSTAT (displays network connections both incoming and outgoing, routing tables, number of network interfaces, and network protocol statistics)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

what protocol should a tech consider troubleshooting if a user is not receiving incoming emails on their desktop?

A

POP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

default port for POP

A

110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

default port for IMAP

A

143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

default port for SMTP

A

25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

default for FTP

A

20 and 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

channel that connects the processor with main memory

A

FSB (front side bus)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

to enhance security, what can be configured on a wireless router. (name two)

A

disable SSID broadcasting and change default username and password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

what should be done on a PC before performing a virus scan?

A

update the signature definitions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

what is a DAT file

A

primarily associated with ‘data’. can be just about anything; text, graphic or binary data. Generic file extension by various applications with no universal format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

user cannot connect to the network. tech determines that the network settings are correct and that the NIC is fully functional. What tool is BEST used to troubleshoot this problem?

A

Cable tester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

what Windows Vista tool will allow a tech to track system performance over long periods of time?

A

data collector sets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Windows Vista tool allows a tech to collect event records from one computer and store them on another computer?

A

event subscription

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q
  1. what should a tech use FIRST to troubleshoot issues related to software installations and application failures in Windows 7?
A

Reliability Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

what file system theoretically supports up to 64ZB and more than 1000 files per directory?

A

exFAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

BEST tool to move a user’s documents and file settings when upgrading the user from Windows Vista to Windows 7 computer?

A

Easy Transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

BEST tool to use in Windows 7 to backup important system files without requiring external storage?

A

System Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What is a feature of System Protection in Windows 7?

A

Shadow copy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

User’s laptop fan is making an unusually high pitched noice. The FIRST step would be..

A

Blow compressed air through the fan slot out of the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

what command would be used to display the contents of c:\windows\system32\?

A

DIR (directory) - file and directory listing

60
Q

What option would be used to determine the switches for the command IPCONFIG?

A

/?

61
Q

What command would be used to create a directory?

A

md (make directory)

62
Q

Same customer calls the helpdesk every Friday with the same exact issue. Computer locks up when loading payroll files. The solution is to download the file before attempting to open it. What is the BEST way to help the user resolve this problem instead of the weekly call?

A

Set the file to be available offline so the customer is always using the local copy

63
Q

what is nbtstat?

A

diagnostic tool for NetBIOS over TCP/IP; to help troubleshoot NetBIOS name resolution problems

64
Q

nbtstat -S

A

lists sessions tables with destination IP addresses

65
Q

nbtstat -s

A

lists current NetBIOS sessions and their status including their statistics

66
Q

nbtstat -R

A

purges and reloads the remote cache name table

67
Q

nbtstat -RR

A

sends name release packets to WINs and then starts refresh

68
Q

nbtstat -r

A

displays count of all NetBIOS names resolved by broadcast and querying a WINS server

69
Q

nbtstat -n

A

displays the NAMES that have been registered locally on the system

70
Q

nbtstat -c

A

displays the CONTENTS of the NetBIOS name cache, table of NetBIOS names, and their resolved IP addresses

71
Q

Someone is constantly trying to hack into a network. What would be the MOST practical way to protect the network from the intrusion?

A

Install a firewall

72
Q

what utility would a tech use to disable a dial-up modem?

A

device manager

73
Q

what utility would a tech use to look up CPU usage?

A

task manager

74
Q

on a defective disk. which of the following commands would be used to extract readable information?

A

RECOVER

75
Q

tech needs to make sure files are correctly being written to the drive. What command will ensure this is happening?

A

VERIFY

76
Q

tech needs to verify the protected system files in Windows are correct. What command will perform this?

A

SFC (system file checker) - checks Windows files for issues and replaces them if necessary

77
Q

A computer never completes its boot cycle and keeps restarting. Which of the following commands could a tech run to resolve this issue?

A

CHKDSK

78
Q

what is NetBIOS over TCP/IP?

A

networking protocol that allows legacy computer applications relying on the NetBIOS API to be used on modern TCP/IP networks

79
Q

A tech has a SOHO with five computers. What would the tech have to enable on the router to be able to RDP into each computer?

A

port forwarding

80
Q

what tool would you use to test the functionality of CAT5e line?

A

cable tester

81
Q

what tool would you use to trace a network cable?

A

toner probe

82
Q

what tool could you use to determine why a computer is not booting?

A

power supply tester

83
Q

a tech needs to transfer a file folder and all of its contents from one computer to another using a command prompt. What would allow a tech to transfer the folder and all associated files within the folder at one time?

A

XCOPY

84
Q

describe what TRACERT command does?

A

trace route - lists the number of hops to reach destination address; determine the path that an IP packet has taken to reach its destination

85
Q

what is NetBIOS

A

provides services related to the session layer of the OSI Model allowing applications on separate computers to communicate over a LAN (local area network).

86
Q

what is an OSI Model

A

conceptual model that characterizes and standardizes the internal functions of a communication system by partitioning it into abstraction layers

87
Q

what is a conceptual model

A

model is anything used in any way to represent anything else. some models are physical objects. for instance, a toy which may be assembled, and may even be made to work like the object it represents. Whereas a CONCEPTUAL MODEL is a model that exist only in the mind - to help us know and understand the subject matter they represent.

88
Q

what location will a tech start and stop the print spooler

A

Click Start, select run and type Services.msc

89
Q

what tool can be used prior to installing Windows Vista to find hardware compatibility issues

A

upgrade advisor

90
Q

what group should a user be added to for the ability to restore files, without granting any ownership privileges

A

backup operators

91
Q

most common spooling application is the print spooling.. what does it do?

A

docs formatted for printing are stored into an area on a disk and retrieved and printed by a printer at its own rate (spool stands for simultaneous peripheral operations on-line)

92
Q

laptop is going into standby mode unexpectedly. what hardware component MOST likely causes this issue?

A

LCD cutoff switch

93
Q

user reports that their laptop computer can no longer connect to a server. computer works correctly in a different office. what tool would be used to troubleshoot this issue?

A

cable tester

94
Q

a tech needs to install a new internal flash memory card reader into an available floppy drive bay. Prior to installation, which of the following connectors needs to be available?

A

USB header (which is a group of pins, typically on a computer motherboard or expansion card, to which an internal USB cable can be attached to provide extra USB ports. Typically, one header is a group of two USB ports

95
Q

what command will allow modification of the file C:\BOOT.INI

A

attrib-s-h-r C:\BOOT.INI

96
Q

what is NTFS

A

new technology file system (NTFS) which is part of the OS that determines how files are name, stored and organized on a volume. manages files and folders and the information needed to locate and access these items by local and remote users

97
Q

what is FAT

A

File allocation table (FAT) was used in earlier versions of Windows such as Windows 95, windows 98 and windows millenium edition. This DOES NOT have the security that NTFS provides. so if you have FAT32 partition or volume on PC, any user who has access to that can read any file on it. Size limitations - can’t create a FAT32 partition greater than 32GB in this version of windows and can’t store a file larger than 4GB

98
Q

what is attrib

A

a command which is to set and remove file attributes. file attributes are - read-only, archived, system, and hidden.

99
Q

what are file attributes

A

are metadata associated with computer files that define file system behavior

100
Q

what is metadata

A

refers to ‘data about data’
structural metadata - design and specification of data structures. “data about the containers of data”
descriptive metadata - individual instances of application data; data content

101
Q

what is disk partitioning

A

act of dividing a hard disk drive (HDD) into multiple logical storage units, referred to as partitions. to treat one physical disk drive as if it were multiple disks. So that different file systems can be used on each partition

102
Q

what is a mount point

A

physical location in the partition used a root filesystem

103
Q

what system utility would be used to change a drive type from dynamic to basic

A

disk management

104
Q

a tech needs to modify the BIOS settings of a PC; however, the BIOS setup password is unknown to all current employees. how can the tech accomplish this task?

A

set the motherboard configuration jumper to clear the password

105
Q

what uses port 143 by default

A

IMAP

106
Q

a sound card on the back of a PC is emitting a red, laser-type light. Explain this occurrence

A

sound card’s optical plug is not connected

107
Q

a program is crashing and causing the computer to lockup. what is the BEST location for a tech to check for further information about the cause of the crash?

A

application log

108
Q

what command can be used to change a file from read-only to writable state?

A

attrib

109
Q

what feature in Windows Vista Ultimate allow a user to encrypt their entire hard drive and OS?

A

Bitlocker

110
Q

a tech wants to create a spanned volume on a set of hard drives. what tool will identify if the drives will support a spanned volume?

A

disk management

111
Q

how many logical partitions are allowed on a single NTFS drive?

A

4

112
Q

a small momentary button on the inside of a computer case is MOST likely what?

A

intrusion detection

113
Q

a user reports it takes a long time to load all applications and the hard drive LED is showing constant activity. what is MOST likely the cause?

A

the file system is fragmented

114
Q

what is the MOST important factor when using offline files on a networked computer?

A

size of the computer hard drive

115
Q

when doing a clean installation, which of the following is the default location for System Files in Windows XP?

A

C:\Windows\system32\

116
Q

offline files and folders are available on what versions of Windows (name two)

A

Windows 7 Ultimate and Windows XP Professional

117
Q

computer running windows 7 will not boot up. a user is receiving an ‘invalid boot disk’ erro. what is the cause of this error?

A

there is a CD-ROM in the drive

118
Q

Name two encrypted protocols

A

SSH and HTTPS

119
Q

what network modifications should be implemented to extend the wireless network range and allow out-of-range users to share the internet connection?

A

add a wireless access point

120
Q

what command would be used to move the working directory from C:\ to C:\Windows?

A

CD

121
Q

command that will make exact duplicates of files and directory trees

A

XCOPY

122
Q

FIRST step to ensure the IP address assigned does not change

A

disable DHCP

123
Q

what command would be used to verify and troubleshoot DNS settings of a particular host on a Windows computer?

A

NSLOOKUP

124
Q

what is IPP

A

provides a standard network protocol for remote printing

125
Q

network printer is being replaced (identical model as the old one). what is the EASIEST way to ensure all the branch clients can still connect to the replacement printer via IPP

A

in DHCP, set reservation by MAC address

126
Q

administrator wants to put an icon on the desktop of all users of a Windows 7 PC. What directory would the icon be placed?

A

C:\Users\Public\Desktop

127
Q

PC administrator is trying to implement BitLocker full disk encryption but the PC reports that a security module is not found. What should the administrator do to correct this?

A

enable TPM module in the BIOS

128
Q

upon starting a computer, the CHKDSK utility always runs before the operating system loads. what component should the tech check in order to more closely diagnose the problem?

A

hard drive and connecting cables

129
Q

a tech receives a service call about a printer producing wrinkled pages. what can cause this? name two

A

new paper was stored in damp location OR fuser unit is reaching the end of its life

130
Q

during start up an error message ‘one or more services failed to start’ appears. what methods can be used to examine the status of the services running on the computer?

A

click Start > Control Panel > Administrative Tools

right click on My Computer and select Manage from the context menu

131
Q

which OS supports full BitLocker functionality?

A

Windows 7 Enterprise

132
Q

what protocols could a tech use to connect a smartphone to an email server?

A

SMTP and POP3

133
Q

when running Windows XP, what gives you a list of switches for the CHKDSK command?

A

chkdsk /? forward slash

134
Q

what security threat would cause a computer to run slow and redirect HTTP sites?

A

Malware

135
Q

user states their workstation will not reach the login screen. what command can be used to write a new partition boot sector to the system partition in the Recovery Console?

A

FIXBOOT

136
Q

what item in Control Panel will allow for easy streaming of pictures, music, and videos to other Windows & PCs?

A

HomeGroup

137
Q

what resource is the MOST important for accessing remote virtual environments on a client machine?

A

Network speed

138
Q

computer program that functions normally while quietly installing malicious software on a machine is known as

A

Trojan

139
Q

when the computer is turned on it emits a series of beeps and does not POST. this can be caused by a bad….

A

…video card

140
Q

laser printer is producing completely blank sheets. what process should the tech check FIRST?

A

Development

141
Q

what should be scheduled regularly to MNIMIZE non-contiguous files?

A

Defragmentation

142
Q

a tech just installed a new NIC in a desktop. what should a tech perform NEXT according to the troubleshooting theory?

A

verify full system functionality

143
Q

what is the valid local loopback address test command

A

PING 127.0.0.1

144
Q

MOST likely reason for a low wireless signal

A

distance from the access point

145
Q
  1. a tech needs to know which programs are running during start up. what OS command line tool would assist the tech in identifying the running programs?
A

MSCONFIG