final exam Flashcards
What two motherboard components control the system boot operations? (Choose two.)
BIOS chip
UEFI chip
Northbridge chip
Southbridge chip
CPU
BIOS chip
UEFI chip
What motherboard chip controls high speed CPU communication to RAM and the video card?
Northbridge
Southbridge
BIOS
UEFI
Northbridge
Which two procedures can help protect against ESD when working on a computer system? (Choose two.)
the use of an antistatic wrist strap
the use of magnetized tools
the use of an antistatic mat
the use of safety glasses
the use of polyester clothing
use of antistatic wrist wrap
use of antistatic mat
- Which software tool will protect against viruses and spyware on a Windows PC?
Windows 8 Action Centre
Scandisk
Windows Defender
System File Checker
windows defender
. Which cleaning material should be used to clean component contacts?
isopropyl alcohol
compressed air
cotton swabs and cloths
dishwashing liquid and water
isopropyl alcohol
A technician is troubleshooting a problem where many websites return a “certificate not valid” error. The technician notices that the date and time are not current and resets these to the correct settings. The previously inaccessible websites are now accessible. However, when the computer is restarted the same problem reoccurs. What can the technician do to prevent the date and time from resetting?
Reinstall the OS.
Upgrade the BIOS.
Change the power settings in the BIOS.
Replace the CMOS battery.
replace the CMOS battery
When a new motherboard is being installed, between which two components must thermal compound be applied? (Choose two.)
CPU
RAM
chassis
heat sink
chipset
motherboard
CPU
Heat sink
A specific computer has an issue that could not be resolved by the help desk technician. The on-site technician finds that Windows updates have been disabled. The technician re-enables the update service, configures the computer for automatic updates, downloads and installs all missing updates, ensures the computer boots successfully, and verifies with the customer that the issue has been resolved. Which step, if any, is next?
Document the findings, actions, and outcomes.
No further action is needed.
Establish a plan of action to resolve the problem and implement the solution.
Verify full system functionality and, if applicable, implement preventive measures.
Test the theory to determine the cause.
document the findings actions and outcomes
What should a technician do before beginning any troubleshooting steps on a customer computer?
Perform a data backup.
Document the findings.
Identify the problem.
Establish a plan of action
perform a data backup
Which document can be signed by both a user and a computer repair shop to release the shop from backing up user data?
preventive maintenance plan
work order
liability release form
warranty form
liability release form
A technician is troubleshooting a 4-year-old computer that takes a long time to boot, and identifies that the BIOS rediscovers all the hardware at every boot. What action would fix this problem?
Replace the CMOS battery.
Launch Device Manager to discover new hardware.
Reset the BIOS using the CMOS jumper.
Start the computer with the last known good configuration.
replace the CMOS battery
Which location on a hard disk is used by the BIOS to search for operating system instructions in order to boot a PC?
the logical drive
the active partition
the Windows partition
the extended partition
the active partition
A technician is asked to set up one hard drive that will support two operating systems and will store data files in three separate drive locations. Which partition settings will support these requirements?
1 primary, 3 active, 1 extended, 2 logical
2 logical, 2 active, 3 extended
2 primary, 1 active, 1 extended, 3 logical
3 primary, 1 active, 2 extended
2 primary, 1 active, 1 extended, 3 logical
A user installs a new sound card driver in a computer that is working properly. After the installation of the drivers for the new sound card, the computer fails to boot. Which quick fix can the user implement to return to the previous working state?
Boot to Emergency Recovery State.
Boot to Last Known Good Configuration.
Boot to Recovery Console.
Boot to Start Windows Normally
Boot to Last Known Good Configuration.
. A technician is using the six troubleshooting steps in an attempt to repair a PC. After completing the steps needed to test a theory and determine the cause, the technician still has not solved the problem. Which two steps are likely to be taken next by the technician to establish a plan of action and resolve the problem? (Choose two)
Perform an Internet search.
Ask other users in the area.
Access helpdesk repair logs.
Speak with the supervisor of the user.
Call the helpdesk to log the problem.
perform an internet search
access helpdesk repair logs
On a computer that will not boot, which two actions are recommended in the troubleshooting process after verifying the obvious issues such as power to the computer and display, non-bootable media, and the BIOS boot order options? (Choose two.)
Remove unnecessary peripherals.
Reinstall the operating system.
Reset the BIOS settings to factory default.
Use the Last Known Good Configuration.
Replace computer components one at a time until the problem is solved.
Reinstall the user applications.
Remove unnecessary peripherals
use the last known good configuration
What is the distance limitation of a single data run for UTP cabling without adding networking devices?
33 ft (10 m)
100 ft (31 m)
330 ft (100 m)
500 ft (154 m)
330ft (100m)
What is the default subnet mask for a Class A network?
0.0.0.255
0.0.255.255
0.255.255.255
255.0.0.0
255.255.0.0
255.255.255.0
255.0.0.0
Which network protocol is used to automatically assign an IP address to a computer on a network?
FTP
DHCP
ICMP
SMTP
APIPA
DHCP
Which open standards-based wireless security mode supports the highest level of security?
WEP
WPA2
WPA
LEAP
WPA2
What are two network requirements necessary to establish a VPN connection between a remote computer and a private company LAN? (Choose two.)
low latency network connection
secure web server
Internet access
PSTN access
VPN client
internet access
VPN client
The corporate security policy states that all remote connections use only secure tunnels for data communications. Which encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN?
MD5
VPN
WEP
WPA
VPN
What type of WAN connection would use 3G or 4G?
DSL
satellite
cable
POTS
cellular
cellular
True or False?
An intrusion detection system works inline and has the ability to drop malicious traffic.
true
false
false
Where can a technician enable ACPI mode on a laptop?
BIOS
Task Manager
Device Manager
Personalization
BIOS
Which two actions must be performed before installing RAM into a laptop? (Choose two.)
Use thermal compound to attach the memory to the motherboard.
Before installing the RAM, update the saved CMOS settings to the newly configured amount of RAM.
Remove the battery.
Disconnect the display from the bottom of the laptop.
Disconnect AC power.
Remove the memory module retaining clips from the slots where the new RAM will insert.
remove the battery
disconnect ac power
Which two items would be part of a laptop preventive maintenance kit? (Choose two.)
compressed air
plastic scribe
soft cloth
antistatic wrist strap
flat-head screwdriver
compressed air
soft cloth
. What is the purpose of running mobile device apps in a sandbox?
to enable the phone to run multiple operating systems
to prevent malicious programs from infecting the device
to enable separate app icons to be displayed on the home screen
to bypass phone carrier restrictions that prevent access to unauthorized apps
to prevent malicious programs from infecting the device
A user has installed a new printer. Which two pieces of information about the printer operation are provided by printing a test page from the computer? (Choose two.)
confirmation that the color calibration is optimized
verification of print spool settings
confirmation that duplex (double-sided) printing is working correctly
verification that driver software is working correctly
confirmation that printer and computer are communicating
working correctly
verification that driver software is working correctly
confirmation that printer and computer are communicating
A technician wants to add a new shared network printer to a computer. The printer is not shown in the list of available printers. What two actions can the technician take to add the printer? (Choose two.)
Enter the printer model.
Enter the printer IP address.
Access a command prompt and use the net use command to locate the printer and printer path.
Browse for the printer on the network.
Enter the name of the computer used to share the printer.
enter the printer ip address
browse for the printer on the network
A technician is installing a new printer in a cool, damp environment. After the printer cabling is done, and the software and print driver are installed, the printer test page jams. What is the most likely cause of the print failure
incorrect printer driver
too much humidity
not enough printer memory
loose printer cables
too much humidity
What type of security attack is being launched when a hacker calls a company to obtain computer login information and pretends to be an employee?
spyware
phishing
adware
Trojan
social engineering
social engineering
Which two aspects of a computer can be protected by setting the BIOS password? (Choose two.)
network address assignment method
hard drive settings
operating system login
operating system booting
file system management
firewall settings
hard drive settings
operating system booting
After logging into a computer, a user can view files but is unable to download the files. What action can the administrator take to allow the user to download the files while preventing deletion of the files?
Set the folder permissions to Read.
Set the file permissions to Modify.
Set the file permissions to Full Control
Set the file permissions to Read and Execute
set the file permissions to read and execute
The PC support person has heard of an instance where departmental secretaries go to lunch and leave their computers unlocked and remain logged into their account. Which Windows feature would the technician use to help in this situation
AutoRun
BIOS/UEFI password
idle timeout and screen lock
Windows firewall
idle timeout and screen lock
A customer is angry and calls to complain that the service scheduled on the computer took longer than expected. The technician reviews the work order and notices that the service was performed by a new employee. How should the technician respond?
Verify that the computer is working properly now.
Listen to the complaint and then apologize for any inconvenience caused by the lengthy service on the computer.
Explain that the repair technician sent to perform the service is inexperienced.
Put the customer on hold until a supervisor is available
Listen to the complaint and then apologize for any inconvenience caused by the lengthy service on the computer
Refer to the exhibit. During the troubleshooting of software that is installed on a computer system, a level one technician requires help from a level two technician. The file shown in the exhibit must be sent to the level two technician. How should the level one technician deliver this file?
This file should not be shared with the level two technician.
Replace all passwords in the file with <password> before emailing the file and then supply the passwords by secure means, if required.
Send the file as it is to the level two technician.
Deliver the file in printed format only.</password>
This file should not be shared with the level two technician.
Replace all passwords in the file with <password> before emailing the file and then supply the passwords by secure means, if required.</password>
What determines the level of support that a call centre technician will provide to an individual customer
Support is based on the SLA for that customer.
All customers receive the same level of support by the call center.
A level one technician will provide a higher level of support than a level two technician.
An individual call centre technician chooses the level of support based on the time available to assist the customer.
support is based on the SLA for that customer
After resolving an intermittent CD-ROM drive fault by firmly reconnecting a loose cable, the technician then decides to inspect all other cable connections to prevent other faults from occurring. Which two conditions will help to prevent future cable and connector faults? (Choose two.)
There are no missing or bent connector pins.
Cables are stretched tight between connectors.
Cables are not bent sharply around adapter cards.
Device data cables exceed manufacturer specifications.
The connector retaining screws have been over tightened with a screwdriver.
there are no missing or bent connecter pins
cables are not bent sharply around adapter cards
A technician has been asked to reinstall the OS on a computer that has a corrupted operating system. The technician inserts the installation media in the optical drive. What would be the most likely action the technician should perform next?
Change the boot sequence in the BIOS.
Change the BIOS password.
Flash the BIOS for a firmware upgrade.
Change clock speeds in the BIOS
change the boot sequence in the BIOS
What are three common causes of operating systems problems? (Choose three.)
a corrupted registry
incorrect IP addressing information
loose cable connections
failed service pack installation
CMOS battery problem
virus infection
a corrupted registry
failed service pack installation
virus infection
Which built-in BIOS diagnostic test would a technician run to check a computer boot problem
memory test
POST test
start test
battery test
start test
What are three features of GPS on mobile devices? (Choose three.)
phone number lookup
navigation
specialized search results
device tracking
remote wipe
gas mileage calculations
navigation
specialized search results
device tracking
In Windows 7, which path will give access to parental control?
Start > Control Panel > Network and Internet > Internet Options > Security tab
Start > Control Panel > User Accounts and Family Safety > Parental Controls
Start > Control Panel > User Accounts and Family Safety > User Accounts > Change User Account Control settings
Start > Control Panel > Network and Internet > Internet Options > Parental Control link
Start > Control Panel > User Accounts and Family Safety > Parental Controls
A user calls the help desk reporting that a laptop with Linux freezes on startup and displays kernel panic. What could cause this problem?
A driver has become corrupted.
GRUB or LILO has been deleted.
GRUB or LILO has been corrupted.
An application is using a resource that has become unavailable.
a driver has become corrupted
What are two potential risks that could result from rooting or jailbreaking a mobile device? (Choose two.)
improving device performance
not properly creating or maintaining sandboxing features
enabling app access to the root directory
allowing the user interface to be extensively customized
enabling features that are disabled by a cellular carrier
not properly creating or maintaining sandboxing features
enabling app access to the root directory
What two tasks should be done regularly to preserve the security and integrity of data and applications on mobile devices. (Choose two.)
Password protect iTunes or Google Play accounts.
Use airplane mode if you are accessing the Internet at an open Wi-Fi site.
Ensure that the operating system software and applications contain the latest updates.
Unmount all unused disk partitions.
Back up user data on a regular basis.
Execute a factory reset once a month to remove all unidentified malicious software
Ensure that the operating system software and applications contain the latest updates
Back up user data on a regular basis
A user notices that a mobile device is draining power faster than is normal. What are three causes of quick battery drain? (Choose three.)
The display is set to a high level of brightness.
The airplane mode is turned on.
The device is connecting over a VPN.
An app is not compatible with the device.
An app is using too many resources.
The device is roaming between call towers.
The display is set to a high level of brightness
An app is not compatible with the device.
An app is using too many resources.
The device is roaming between call tower