ITProTV - A+ 1002 Practice Flashcards

1
Q
  • What is the best Implementation of the Principle of Least Privilege?

Issuing the Run As command to execute Administrative tasks during a regular user session.
Issuing a Single Account to each user, regardless of his job function
Completing Administrative tasks at a computer that functions only as a Server
Ensuring that all services use the main Administrative Account to execute their processes.

A

Issuing the Run As command to execute Administrative tasks during a regular user session.

Explanation:
The best implementation of the principle of least privilege is to issue the Run As command to execute administrative tasks during a regular user session. You should never use an Administrative Account to perform routine operations, such as creating a document, checking your email, or so on. Administrative Accounts should only be used when you need to perform an administrative task, such as configuring services or backing up a computer. The principle of least privilege is usually implemented by limiting the number of administrative accounts. Tools that are likely to be used by hackers should have permissions that are as restrictive as possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • You run Systeminfo command on a Windows 7 Computer, what will NOT be displayed?

Domain Name
Virtual Memory Statistics
Installed Hotfixes
Boot Options

A

Boot Options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • You need to access content on a CD or DVD drive when you do not have an Optical Drive in your Mac computer. Which feature should you use?

Finder
Boot Camp
iCloud
Remote Disk

A

Remote Disk

Explanation:
Remote Disk is the Feature of macOS to access content on a CD or DVD drive when you do not have an Optical Drive. When configured, it allows you to access a CD or DVD drive hosted on another Computer. Remote Disk does not work with most copyrighted media.

Boot Camp is a MAC feature that allows you to Install Windows on a MAC Computer.

iCloud is a central internet storage that allows you to store your content and have it accessible on any of your MAC devices.

Finder is the Filing System that you can use to organize your files on macOS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • You decide to edit the boot order for your Windows 8 computer using the MSCONFIG utility. To which file is the Edit Saved?

Ntoskrnl.exe
bootmgr
boot.ini
BCD

A

BCD

Explanation:
BCD is a file that replaced the boot.ini File. Boot.ini was used in Windows XP and earlier, the BCD file was used in Windows Vista and Later. BCD holds configuration data about which OS systems are installed. You cannot copy a BCD file from another computer and expect it to work properly. You can use MSCONFIG utility to edit the BCD File. You can also use BCDEdit.exe in Windows 7 or Later.

bootmgr.exe file is the Boot Loader file for Windows Vista and later.
NTLDR was the Boot Loader for Windows XP and Earlier.

ntoskrnl.exe file is the Windows NT System Kernel, this file should NOT be edited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • You organization is concerned with unauthorized users downloading confidential data to removable media. You decide to encrypt the confidential data using the Encrypting File System (EFS).

You need to copy an EFS-Encrypted File. The File will be copied to an NTFS volume that does not implement EFS. What is the state of the file?

The Original version of the file is decrypted. The new version is decrypted.
The Original version of the file remains encrypted. The new version is decrypted.
The Original version of the file remains encrypted. The new version is encrypted.
The Original version of the file is decrypted. The new version is encrypted.

A

The Original version of the file remains encrypted. The new version is decrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • You have a 3TB drive on which you want to install Windows. How must you format the drive to have the Operating System recognize the entire drive?

MBR
Extended
GPT
Basic

A

GPT

Explanation:
To Install Windows on a 3TB Drive, you must format the drive as a GUID Partition Table (GPT) to have the OS recognize the entire drive. GPT is replacing the Master Boot Record (MBR). MBR supports up to 4 primary partitions and has a disk size limitation of 2TB. GPT requires a UEFI Motherboard.

You cannot install Windows on an Extended Partition. Extended refers to Partitioning, NOT Formatting.

Basic refers to Partitioning, not Formatting. Can be either Primary or Logical and reside on a Physical Drive. Basic Disk can have up to 4 Partitions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • You need to create a Hard Drive Image of a Linux Computer. Which command should you use?

mv
ls
dd
cp

A

dd

Explanation:
dd = Allows you to copy a File and Convert it to another format during the copying process. Used for Hard Drive Images in Linux.

apt-get = Advanced Packaging Tool and Install Packages.
cd = Changes Directory
chmod = Changes Permissions on a File.
chown = Changes the Ownership of a File.
cp = Copies files and directories.
grep = Finds a pattern of text within a file or group of files.
iwconfig/ifconfig = Equal to ipconfig in Windows.
ls = Lists file and directory contents.
mv = renames or moves a file
ps = provides a list of current processes running on a system
pwd = Print Working Directory
passwd = allows you to change the password of a user account
q = quits the VI editor
rm = removes a file
shutdown = turns off the computer
su/sudo = superuser root execute
vi = text editor in Linux
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • A user that has a Windows 7 Laptop is frequently away from the office. During that time, he needs access to several files that are on the Network. What should you do?

Enable BitLocker
Enable BitLocker To Go
Enable Offline Files
Create a Windows 7 Library

A

Enable Offline Files

Explanation:
Offline Files allows users to access network files even when the network is unavailable. When Network is available, the files are synced to ensure that both the online and offline versions are the same. Done in the Control Panel.

Sync Center basically syncs files with other devices on your network.

BitLocker/BitLocker To Go is Encryption Technology. BitLocker To Go encrypts files on removable drives such as USB Flash Drives.

Windows 7 Library are similar to Folders, but libraries do not actually store files. Library’s display files that are stored in several folders at the same time. Libraries allow a user to organize all related document, pictures, and other files so they appear to the user as a single location when they may be stored in separate locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • Ten computers in your department need the BIOS Updated, and it needs to be completed within a two-hour timeframe. What is the fastest way to accomplish this task?

Use a bootable flash drive
Use a boot loader file
Flash the BIOS
Update the EEPROM Chip

A

Flash the BIOS

Explanation:
You should NOT use a bootable flash drive to perform this task because a bootable flash drive does not contain a BIOS update.

Boot Loader is the set of tests or programs that a computer goes through when it initializes and tests system hardware components after the POST is complete.

Electrically Erasable Programmable Read Only Memory (EEPROM) chips are permanent chips that can be over-written or programmed with new info for the BIOS. The process to update these chips was much more difficult than just flashing the BIOS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • Which of the following statements regarding Android Phones is INCORRECT?

The Android GPS needs a view of the sky.
The Android GPS will use battery life.
Android Apps can use Cell Towers, WIFI Hot Spots, or Satellites to obtain a location.
The Android GPS requires the help of Cell Towers to obtain a location.

A

The Android GPS requires the help of Cell Towers to obtain a location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • A User requests that his Windows 7 Computer display dates using the YYYY-MM-DD format. Where should you go to make this change using the least administrative effort?

Control Panel Category View > Clock, Language, and Region - Select Date and Time
Control Panel Category View > Date, Time, Language and Regional Options - Select Regional and Language Options
Control Panel Category View > Clock, Language, and Region - Select Region and Language
Control Panel Category View > Date, Time, Language, Regional Options - Select Date and Time Options

A

Control Panel Category View > Date, Time, Language, Regional Options - Select Date and Time Options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • Which Windows Operating Systems include apps that use the Windows Store Feature? (Choose ALL That Apply)

Windows 8
Windows 10
Windows 8.1
Windows 7

A

Windows 8
Windows 10
Windows 8.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • On which versions of Windows can PowerShell Core 6.0 be used? (Choose ALL That Apply)

Windows 10
Windows 8
Windows 8.1
Windows 7

A

Windows 10
Windows 8
Windows 8.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is described as gaining unauthorized access to the data center by using another user’s credentials?

piggybacking
turnstile
intrusion
mantrap

A

piggybacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Your company has decided it wants to implement multi-factor authentication. What is the BEST implementation you should deploy?

smart cards, usernames, and PIN
usernames, strong passwords, and PIN
smart cards, usernames, and strong passwords
biometrics, smart cards, and strong passwords

A

biometrics, smart cards, and strong passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

As a tech who frequently observes electrostatic discharge (ESD) damage to parts, you have become concerned about the presence of contributing factors in your work area. Which environmental condition is likely to cause ESD problems?

low humidity
high temps
low temps
high humidity

A

low humidity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Aaron is using Microsoft Excel on his portable computer, and reports being unable to move the cursor from one cell to the other cell with the arrow keys. Aaron also confirms that he is able to use the mouse to move the cursor from one cell to the other cell.

What is the reason for this cursor issue?

Shift Key is Pressed
Num LK is On
Scroll LK is On
Application is Corrupt

A

Scroll LK is On

Explanation:
Scroll LK modifies the behavior of the Arrow Keys. When it’s ON, the Arrow Keys will scroll the contents of a text window instead of moving the cursor.

Num LK does not control the scrolling feature. It’s used to switch between Number Entry and Arrow Keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A user wants to be able to restore his system files on his Windows 7 computer to an earlier point in time. He asks that you ensure that a Restore Point is created every day at the same time. Which tool should you use to schedule the Restore Point creation?

Volume Shadow Copy Service
System Restore
Task Scheduler
msconfig

A

Task Scheduler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Management has requested that BitLocker To Go be implemented on all Windows 7 computers. Which hardware is required to implement this Technology?

Network Interface Card
USB Flash Drive
Optical DVD/CD Drive
DirectX 10.0

A

USB Flash Drive

Explanation:
BitLocker to Go is a Technology in Windows 7 that allows you to encrypt the contents of USB Flash Drives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

You upgrade a device driver on your Windows 7 computer and reboot. After logging in, you notice that the device does not perform. How do you go back to older version of the driver that you had installed on your computer?

Use the Last Known Good Configuration
Disconnect and Reattach the Device
Go to the Manufacturer’s Website to get previous version of the driver.
Use Device Manager to roll back to the previous version of the driver.

A

Use Device Manager to roll back to the previous version of the driver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

While discussing a computer problem with a user, you realize that solving the problem requires a level of expertise that you do not have. How should you handle this problem?

Ask the user if you can transfer him to appropriate personnel.
Go through a few troubleshooting steps
Put the user on hold, and call your supervisor
Tell the user you do not know how to fix his problem

A

Ask the user if you can transfer him to appropriate personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Andrea is concerned that she is being lured to provide her financial institution’s credentials on an invalid site via a message she received. Which type of attack is most likely taking place?

IP Spoofing
Email Spoofing
Data Mining
MAC Address Spoofing

A

Email Spoofing

Explanation:
Email Spoofing occurs when an email header to make it look like the message came from a Valid Source, when in actually it comes from someone hoping to gain access to your information or assets.

IP Spoofing is a technique that hackers will use to gain unauthorized access to computers by using valid IP Addresses making it appear to be from a valid trusted host.

Mining or Data Mining is a database application term that examines data to predict behaviors.

MAC Address Spoofing occurs when an attacker changes the MAC Address of his computer to match that of a valid trusted host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Two months after completing a service call, a customer sends you an email message complaining about the work done. The customer also copies the message to your supervisor and other officers in your company.

You locate the follow up report that was completed by the customer the day after the service was completed. In the report, the customer indicated he was satisfied with the work you completed.

What should you do?

Send a reply message and include everyone copied thanking the customer for his input and asking why he indicated satisfaction in your work on the Follow-Up Report after the work was completed.

Have a meeting with all those who received the email message explaining to them why you feel the customer is wrong.

Disregard the email.

Call the customer and tell him why you think his actions are wrong.

A

Send a reply message and include everyone copied thanking the customer for his input and asking why he indicated satisfaction in your work on the Follow-Up Report after the work was completed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

You have discovered that hackers are gaining access to your WEP wireless network. After researching, you discover that hackers are using War Driving. You need to protect against this type of attack. What should you do? (Choose ALL That Apply)

Configure the WEP Protocol to WPA
Disable SSID Broadcast
Configure the Network to use Authenticated Access Only
Change the Default SSID

A

Configure the WEP Protocol to WPA
Disable SSID Broadcast
Configure the Network to use Authenticated Access Only
Change the Default SSID

Explanation:
War Driving is a method of discovering 802.11 Wireless Networks by driving around with a laptop and looking for Open Wireless Networks. NetStumbler is a common War Driving Tool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Jane is new to the PC Tech world and is curious about ESD. Which steps would you tell her to use as a preventative measure against static electricity? (Choose ALL That Apply)

Having proper grounding of building and outlets.
Ensure that sensitive areas, such as server rooms, are carpeted.
Wear Anti-Static Bands while servicing computer components.
Wear leather soled shoes.
Ensure that the humidity level does not become too high.

A

Have proper grounding of building and outlets

Wear Anti-Static Bands while servicing computer components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which factors generate and promote the transmission of electrostatic discharge (ESD) to devices? (Choose ALL That Apply)

moving people
humidity greater than 40%
humidity less than 40%
moving machines
improper grounding
A

moving people
humidity less than 40%
moving machines
improper grounding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following statements is True about an in-place upgrade and a clean installation?

an in-place upgrade can always be used when upgrading from a previous OS version.

an in-place upgrade installs the OS files and retains user settings.

a clean installation installs the OS files and retains user settings.

a clean installation does not require the reinstallation of applications.

A

an in-place upgrade installs the OS files and retains user settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

You are responsible for purchasing New Windows Computers for your company. The Computers must be able to join your Company’s Domain. Which versions of Windows should you implement? (Choose ALL That Apply)

Windows 7 Home Premium
Windows 8 Pro
Windows 7 Pro
Windows 7 Starter
Windows 7 Ultimate
A

Windows 8 Pro
Windows 7 Pro
Windows 7 Ultimate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

You need to provide a physical security measure for a data center located on the Second Floor of a building. Management wants you to implement the highest level of security possible. What physical security should you implement?

ID Badges
Key Fobs
Biometrics
Passwords

A

Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

You launch Performance Monitor in Windows 7 Pro. Which components can you monitor using this tool? (Choose ALL That Apply)

Memory
Network
Processor
Disk

A

Memory
Network
Processor
Disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

You are researching Biometrics for Identification and Verification of employees in an organization. Which attributes or details of an employee can be used by Biometric Devices? (Choose ALL That Apply)

Face
Iris
Fingerprints
Hand Geometry
Signature
Hair
A
Face
Iris
Fingerprints
Hand Geometry
Signature

Explanation:
Others include -
Voice
Retina

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A user informs you that he cannot complete a task for his supervisor without an administrative password. The user will only have to complete this task once.

What should you do to achieve the objective using the least administrator effort?

Options:
Enter the Administrative Credentials yourself at the user’s computer.

Change the user’s account to an administrative level account. Return the account to its original state after the task is complete.

Tell the user to ask his supervisor for the supervisor’s account info.

Create a Temp Administrative Account for the user. Delete the account after the task is complete.

A

Enter the Administrative Credentials yourself at the user’s computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

An IT Tech has recently discovered an Evil Twin on your company’s network. What is the best description of an Evil Twin?

unauthorized access point
cracking the WEP secret key using the initialization vector
signals about the wireless network marked on the outside of the building
an access point with the same SSID as the legitimate access point

A

an access point with the same SSID as the legitimate access point

Explanation:
Evil Twin is an access point with the same SSID as a legitimate access point. It’s a special type of unauthorized access point.

Rogue access point is an unauthorized access point that allows access to a secure network. Performing a site survey is the best way to discover rogue access points.

War Chalking is leaving signals about the wireless network on the outside of the building.

An IV attack is cracking WEP secret key using Initialization Vector (IV).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Gloria is holding free computer maintenance classes in her community. In her Class, she emphasizes tools anyone can access and use. She spends alot of time discussing the DEFRAG tool. What should she tell them is the minimum free disk space needed to run this tool?

200 MB
25% of Hard Drive Space
800 MB
15% of Hard Drive Space

A

15% of Hard Drive Space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Deborah has a brand new iPhone that she thinks is defective because it keeps losing battery power. What are three easy fixes she can do herself without having to take it in for a technical service? (Choose ALL That Apply)

Dim the display
Place in Airplane Mode
Turn on Bluetooth
Turn on WIFI
Close out Background Apps
A

Dim the display
Place in Airplane Mode
Close out Background Apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A user contacts you stating that he believes that his computer is infected with Malware. Which symptoms may indicate that he is correct? (Choose ALL That Apply)

low disk space warning alert
browser redirection
slower performance
pop-ups
junk email
security alerts
A

browser redirection
slower performance
pop-ups
security alerts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

You need to view the processes running on a Linux System. Which command should you use?

apt-get
ps
chmod
grep

A

ps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Your organization is adopting a new password policy to increase security. Which policy is the most secure password policy?

Password change requests must be made in writing.
Password change requests must be made by email message.
Password change requests must be made in person.
Password change requests must be made by telephone.

A

Password change requests must be made in person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

You are training two new computer techs on proper repair procedures. Which procedure should be performed off-site by a third party?

flashing a BIOS chip
repairing a power supply for a cathode ray tube (CRT)
disabling bus mastering
resolving an IRQ conflict

A

repairing a power supply for a cathode ray tube (CRT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

You are training new users about software licensing, DRM, and EULA. Which of the following licensing models allow you to modify an application’s code, creating a customized version of the software?

Personal License
Open-Source License
Commercial License
Enterprise License

A

Open-Source License

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

You need to establish a network connection on a Windows computer using the Setup a Connection or Network applet. Which one of these is NOT a valid connection type?

Wireless
VPN
Line of Sight
Dial-Up

A

Line of Sight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

You need to broaden the area to which a wireless access point (AP) can transmit. What should you do?

Relocate the AP
Change the channel used by the AP
Adjust the power level setting slightly higher.
Maximize the power level setting.

A

Adjust the power level setting slightly higher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

You need to access a shared folder named research$. Which fact is true about this shared folder?

It is a local share.
It is visible
It is hidden
It is an administrative share

A

It is hidden

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

You are a desktop engineer for a graphic design company. The network consists of fifteen Windows 7 Client computers. Server users report that the performance of the computers is degrading. You detect that there is low free disk space on the computers. To enhance the performance of the computers, you instruct the users to back up the data and remove unwanted applications that are installed on that computer to free disk space.

What else should you instruct the users to do? (Choose Two)

Run the Disk Defragmenter Utility
Run the Scheduled Tasks Utility
Run the Action Center Utility
Run the Files and Settings Transfer Wizard
Run the Disk Cleanup Utility
A

Run the Disk Defragmenter Utility

Run the Disk Cleanup Utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

You need to download and install critical system updates, security patches or hotfixes, and upgrades for Windows components. Which Windows utility allows you to accomplish this?

File and Settings Wizard
Windows Update
Recovery Console
System Restore

A

Windows Update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Vivian wants to set permissions on a certain folder to allow users to modify data. What is she really allowing them to do with this type of permission?

The user can Read, Write, Execute, and Delete everything, EXCEPT the Folder.
The user can Read, Write, Execute, and Delete everything, including the Folder.
The user can Read Files and View the Contents of a Directory and any of its Subdirectories.
The user has All Rights to Change Permissions and take Ownership of the Directory or any of its Subdirectories.

A

The user can Read, Write, Execute, and Delete everything, including the Folder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

You have configured System Restore on the computers in your Network. Which condition will NOT result in a restore point being created?

Upgrading Device Driver
Saving a New File
Installing New Device Driver
Installing Software

A

Saving a New File

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Elizabeth has given her teenage son an iPhone for his birthday. She has enabled all the services required to use the Find My iPhone feature. Which security risk may occur as a result?

Slow data speeds
unintended WIFI connections
unintended Bluetooth connection
unauthorized location tracking

A

unauthorized location tracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

While installing a web camera on a Windows 7 computer, you receive a blue screen error. You are unable to boot to Windows after installing the web camera. Instead, each time you boot the computer, it shows the blue screen error message. What should you do to troubleshoot the problem using the least administrative effort?

Boot the computer with a bootable USB flash drive.
Boot the computer using the Last Known Good Configuration
Boot the Computer with the Windows 7 bootable disk
Perform a fresh installation of Windows 7

A

Boot the computer using the Last Known Good Configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

A user contacts you asking if she should run the chkdsk command on her computer. Why would you use this command?

To manage hard drive partitions
To check the specified drive and repair possible problems
To write new boot sector code on the system partition
To repair the master boot record (MBR) on the boot partition

A

To check the specified drive and repair possible problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

You have recently been hired as an IT Tech. You need to install Windows 7 on several computers on the Network. There are several installation options available. Move the correct items from the left column to the column on the right to match the installation type with the correct installation situation?

Clean Installation
Upgrade Installation
Multi-Boot Installation
Network Installation

Windows needs to be installed on multiple computers with identical hardware configurations
More than one Windows version needs to be installed on a computer
Windows should ignore the previous installation of Windows
Windows should retain user data and applications

A

Clean Installation – Windows should ignore the previous installation of Windows.
Upgrade Installation – Windows should retain user data and applications.
Multi-Boot Installation – More than one Windows version needs to be installed on a computer.
Network Installation – Windows needs to be installed on multiple computers with identical hardware configurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

You need to schedule several disk maintenance tasks on a Windows computer. Where should you go to schedule these tasks?

Open Task Manager
Open Task Scheduler
Right-Click the commands for the tasks
Double-Click the commands for the tasks

A

Open Task Scheduler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Nicola reports to the security guards that individuals are following closely when she enters buildings, using her credentials to gain access. She knows that some of them are valid employees but is concerned that not all of the people are. What security breach is she reporting?

shoulder surfing
zero-day attack
zombie
tailgating

A

tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

You are concerned that there is an unauthorized open port that is allowing connection to a malicious website. You need to view all of a computer’s connections. Which command-line tool should you use?

ipconfig
netstat
ping
tracert

A

netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

You use two different backup and recovery options. For full backups, you use cloud storage, and for incremental backups you use local storage. What type of backup is an incremental backup?

critical applications
file-level
account recovery
image-level

A

file-level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

You are updating the offboarding procedures and policies for your organization. You need to retain a terminated employee’s data while blocking the terminated employee’s access to that data. Which Active Directory function should you implement?

Password reset
Account creation
Disable account
Account detection

A

Disable account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Which activity is covered under the confidentiality objective of the CIA triad, and involves examining someone’s computer to steal confidential information?

social engineering
shoulder surfing
dumpster diving
treason

A

shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Cathy is opening the case of a computer to add some memory and perform some additional maintenance. She wants to ensure that a static charge is not built up in her body. How can she proceed safely?

she should use an ESD strap
she should unplug the computer
she should connect her grounding strap to the system board
she should connect her grounding strap to a line voltage source

A

she should use an ESD strap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Which statement is more effective when dealing with a customer who keeps having the same problem?

“You should have should won your computer properly.”
“Often this type of problem is caused when a computer is not shut down properly.”
“I don’t know what is causing this problem.”
“You should never shut down your computer that way.”

A

“Often this type of problem is caused when a computer is not shut down properly.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

As stated in your organization’s new password policy, you must configure how many new passwords must be created before an old one can be reused. Which policy should you use?

password length
password complexity
password history
password lockout
password age
A

password history

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Your mobile device is fully charged. You have been traveling all day using your mobile device to make calls. However, when you travel into remote areas, calls mysteriously disconnect. What is the most likely problem with the device?

slow data speeds
high resource utilization
signal drop/weak signal
power drain

A

signal drop/weak signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Michael runs a mobile devices repair business and is responsible for keeping up to date with all mobile devices. What is one of the top common software issues he can expect to see on a regular basis?

cracked screens
missing cables
dead battery
no Bluetooth connectivity

A

no Bluetooth connectivity

63
Q

You manage the workstations for your organization. You are concerned about the introduction of malicious software through seemingly harmless activities like listening to music on a flash drive. Which of the following security practices should you implement?

Patch/Update management
Data Encryption
Password Reset/Unlock account procedures
Disable Autorun

A

Disable Autorun

64
Q

When you start Windows 7, an error message is displayed that indicates that a service failed to load.

Which utility can you use to determine why the service failed to load?

Network Monitor
System Configuration
Resource Meter
Event Viewer

A

Event Viewer

65
Q

Lee is complaining that his Windows 7 computer is having performance issues and is running slower. He wants to clean it up so it will run faster and more efficient. Which built-in tools would you recommend he use first? (Choose ALL That Apply)

SFC
Recovery Console
Defrag
Disk Cleanup
Add/Remove Programs
A

Defrag
Disk Cleanup
Add/Remove Programs

66
Q

Mary has inherited a bunch of older laptops that need their batteries replaced. Which statements are true regarding proper disposal of unusable and old Ni-cad batteries that she should utilize?

Unusable Ni-cad batteries can be thrown in the garbage
Unusable alkaline batteries should be handed over to the supplier
Unusable Ni-cad batteries should be thrown in a water body
Unusable alkaline batteries should not be thrown in the garbage
Unusable Ni-cad batteries should be given to a hazardous waste disposal facility

A

Unusable Ni-cad batteries should be given to a hazardous waste disposal facility

67
Q

A user calls the help desk to report that her large Excel spreadsheet is not responding. You decide to examine Task Manager to troubleshoot. Which function of Task Manager will be the most helpful in resolving the issue?

Identify limited connectivity
See application crashes
Restart services
Kill tasks

A

Kill tasks

68
Q

You are a desktop administrator for Nutex Corporation. A user in the human resources department is unable to open the browser on their computer. You go to the customer’s desk to troubleshoot the problem. While you are there, you notice confidential documents regarding an employee’s recent disciplinary action sitting next to the keyboard.

What should you do?

Read the information on the document, and inform your co-workers of its contents.
Turn the documents over.
Read the information on the document, but keep the information confidential
Store the papers in a drawer.

A

Turn the documents over.

69
Q

You are the desktop support technician for your company. You are working on a computer running Windows 7 that has two hard disk drives, named HDD1 and HDD2. You want to copy the entire file and folder structure from HDD1 to HDD2 in the most efficient manner.

Which command-line tool should you use?

xcopy. exe
diskcopy. exe
copy. exe
move. exe

A

xcopy.exe

70
Q

Which two methods would be the most effective in assisting with inventory management? (Choose Two)

Barcodes
Asset Tags
Regulatory and Compliance Policies
Incident Documentation

A

Barcodes

Asset Tags

71
Q

You are creating a presentation for company management on the pros and cons of mobile devices. What is the greatest threat to the security of mobile devices?

GPS location services
unsecured WIFI
excessive permissions
theft

A

theft

72
Q

You are providing remote support to a user with a Windows-Based computer. Which key combination should you tell the user to press to reboot the computer, open the Task Manager, or open the Windows Security window?

ALT + TAB
CTRL + ESC
CTRL + A
CTRL + ALT + DEL

A

CTRL + ALT + DEL

73
Q

A user asks you to describe how computers are infected with viruses. Which option is NOT usually a way that a virus infection occurs?

through file sharing
through the internet
through email
through vendor installation CDs

A

through vendor installation CDs

74
Q

You have instructed users not to store passwords for web sites on their computers. You need to examine a user’s computer to determine if the policy is being followed. Which Control Panel utility should you use?

Programs and Features
Credential Manager
BitLocker Drive Encryption
Network and Sharing Center

A

Credential Manager

75
Q

Andrea is in an airport waiting for her flight to take off and preparing for her work presentation. Although the airport offers free WIFI, she uses her iPAD to edit her presentation and tethers it to her iPhone’s personal hotspot. Why is this most likely a good practice?

Slow data speed
No wireless connectivity
possibility of leaked personal files and data
no bluetooth connectivity

A

possibility of leaked personal files and data

76
Q

You need to install Windows 8 on a client’s computer. The computer does not have a network connection or an optical drive. Which of these installation options are available to you?

PXE
CD/DVD
USB
NetBoot

A

USB

77
Q

You find a solution to a problem that directs you to edit a value in HKEY_CURRENT_USER\Software\Microsoft\Windows\Current\Version\Policies. What system tool will allow you to accomplish this?

REGEDIT
MSTSC Explorer
MMC
MSINFO32

A

REGEDIT

78
Q

You need to refresh the group policy settings. Which command-line utility should you use?

GPUPDATE
You cannot do this from a command line
GPRESULT
GPFIXUP

A

GPUPDATE

79
Q

While performing preventative maintenance on a user’s computer, you notice several offensive files on the user’s computer. Your computer does not have an Acceptable Use Policy. What should you do?

Contact your supervisor
Inform the user that the files must be removed.
Remove the offensive files
Contact the user’s supervisor

A

Contact your supervisor

80
Q

You are a new member of a workgroup, and you need to print a document. You do not have a printer attached to your computer, but a co-worker does. Other employees can print to that printer. What is the easiest way to print your document on the coworker’s printer?

Disconnect the printer from the co-worker’s machine and connect it to yours.
Ask the co-worker to give you permissions to print the printer.
Email the document to your co-worker.
Create a Network Shared Printer by connecting the printer to the network, and assign an IP address to the printer.

A

Ask the co-worker to give you permissions to print to the printer.

81
Q

You are instructing your company’s IT technicians on how to calibrate the screen of a touch screen device. The technicians will need to perform this step only in certain conditions. Which conditions will require this? (Choose ALL That Apply)

Nothing happens when touching an application
battery dies
incorrect applications opens
dirty screen

A

nothing happens when touching an application

incorrect application opens

82
Q

You have just removed malware from a Windows 8 System. But every time you type a URL into Internet Explorer to navigate to a search engine, the same page is being displayed in the browser. After researching the issue, you realize that the computer has been infected with PUM.bad.proxy malware.

Select the steps that could be used to resolve the malware infection. Only use those steps that will fix the problem.

Choices:
On the Connections Tab of the Internet Properties Dialog Box, click LAN Settings. In the LAN Settings Dialog Box, clear the Use a Proxy Server for your Lan Checkbox.

Edit the ProxyServer and ProxyEnable Registry keys in the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings Hive.

On the Connections Tab of the Internet Properties Dialog Box, Click LAN Settings. In the LAN Settings Dialog Box, clear the Automatically Detect Settings Checkbox.

On the Connections Tab of the Internet Properties Dialog box, check LAN Settings. In the LAN Settings Dialog Box, check the Bypass Proxy Server for Local Addressed Checkbox.

A

On the Connections Tab of the Internet Properties Dialog Box, click LAN Settings. In the LAN Settings Dialog Box, clear the Use a Proxy Server for LAN Checkbox.

Edit the ProxyServer and ProxyEnable Registry Keys in the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings Hive.

83
Q

Kristen purchased a new laptop for her daughter Kate for her birthday. You have been asked to give Kate specific instructions on why she should avoid placing her new laptop on her lap without a laptop cooling pad underneath. What is the reason for this?

It causes the hard drive to operate at an angle
It causes repetitive stress issues for the users
It prohibits airflow through the openings on the bottom.
It causes static electricity to be transmitted to the notebook

A

It prohibits airflow through the openings on the bottom.

84
Q

Which statement is true regarding smart cards?

Smart cards do not contain a microprocessor
Smart cards use infrared
Smart cards are used only as hotel room keys
Smart cards can be deactivated or replaced

A

Smart cards can be deactivated or replaced

85
Q

Your company has recently adopted several new security policies regarding mobile devices. Which mobile device application helps when a mobile device is stolen, but also raises privacy concerns?

passcode applications
remote wipe applications
locator application
remote backup applications

A

locator application

86
Q

You need to change a user’s password on a Linux computer. Which command should you use?

pwd
chown
passwd
vi

A

passwd

87
Q

You are working at a client site and need to connect securely to the network at your home office. Which secondary network connection will allow you to do that?

Wireless
Dial-Up
VPN
WWAN

A

VPN

88
Q

A user named Mary reports receiving a Servce Failed to start error message every time she restarts her Windows 7 computer. Which utility should you use to determine which service is failing to start?

Event Viewer
Task Manager
My Computer
Performance Monitor

A

Event Viewer

89
Q

During a recent security audit, you discovered that several computers were infected with software that uses tracking cookies to collect and report a user’s activities. Of which type of malware infection is this an example?

virus
worm
spyware
Trojan horse

A

spyware

90
Q

You need to configure your Windows 7 computer so that it automatically connects to the Research share on a server named SRV1 each time your computer boots. You want this to be configured as the R Drive.

You click Start and Computer. You select the Map Network Drive Option. The Map Network Drive Dialog Box is displayed. What should you do?

In the Drive Field, select R. In the Folder Field, Enter \Research\SRV1. Select the Reconnect at Logon Option. Click Finish
In the Drive Field, select R. In the Folder Field, Enter \SRV1\Research. Clear the Reconnect at Logon Option. Click Finish
In the Drive Field, select R. In the Folder Field, Enter \Research\SRV1. Clear the Reconnect at Logon Option. Click Finish
In the Drive Field, select R. In the Folder Field, Enter \SRV1\Research. Select Reconnect at Logon Option. Click Finish

A

In the Drive Field, select R. In the Folder Field, Enter \SRV1\Research. Select Reconnect at Logon Option. Click Finish

91
Q
  • A technician contacts you and says that he needs to access the System Recovery Options on a Windows 7 computer. Which Procedure or Special Key should he use?

Press F2 during the text mode of booting.
Press F6 during the text mode of booting.
Press F8 during the text mode of booting.
Boot from the Installation CD/DVD.

A

Boot from the Installation CD/DVD

Explanation:
When a tech needs to use the System Recovery Options on a Windows 7 computer, he needs to boot the computer from the Installation CD/DVD.

Pressing F2 to start Automatic System Recovery is for Windows XP.

Pressing F6 does not start ASR. F6 key is required to install a third-party SCSI or RAID driver during the Setup Process. The F6 key is provided strictly as a means to install OEM drivers for mass storage devices Only.

Pressing F8 does not start ASR in Windows 7. F8 key is used to accept the End-User License Agreement during the setup process. You can also access the Advanced Boot Options Menu and the Windows Startup Menu by pressing F8 before Windows Starts.

92
Q
  • Luther wants to know a quick way to revive his mobile device battery that has been not holding a charge for as long. What should he do FIRST to keep from having to replace his mobile device?

Replace the Battery
Replace the Battery App
Place the Mobile Device into Battery-Saving Mode.
Completely drain the battery’s charge, and then recharge it.

A

Completely drain the battery’s charge, and then recharge it.

Explanation:
Letting the battery drain and then recharging it will allow the battery life to improve. However, if this does not fix the problem, Luther will have to replace the battery.

Placing the battery into Battery-Saving Mode will not resolve the issue. It is just keeping the battery from dying as quickly.

93
Q
  • You are accessing the Tools Tab of the Hard Drive’s Properties Dialog Box on Windows 7. Which of the following is NOT a disk maintenance utility found there?

Backup
Defragmentation
Error-Checking
Format

A

Backup

94
Q
  • You purchased several new computers with dual physical processor configurations. The new computers have dual 1-gigahertz processors and 2 gigabytes of RAM. Which edition of Windows 7 could you install to be able to utilize all components? (Choose ALL That Apply)

Windows 7 Home Basic
Windows 7 Professional
Windows 7 Home Premium
Windows 7 Enterprise

A

Windows 7 Professional

Windows 7 Enterprise

95
Q
  • Before you go to the change board, you need to discuss the post-implementation impact on the workforce. The proposed change would have significant initial impact on the technical support team. In which portion of the change request would you address this?

Documented business process
Document changes
Plan for changes
End-user acceptance

A

Document business processes

Explanation:
Documented Business Processes include items such as Technical Support Procedures, Customer Service, Ordering Procedures. Deals with Company Policies and Procedures.

End User Acceptance is often critical to the successful implementation of change. Things like open communication, how the change will impact their work life, the necessity of the change, and training will all go a long way towards ensuring end user acceptance.

Plan for Change should not only address the known issues within the scope of the plan, but also address contingencies. What happens if additional personnel or resources are needed? What happens if the plan runs over budget, in terms of time and finances? What if the equipment does not perform as expected?

Document Changes is not usually included in a Change Request although you should include it and it is very helpful.

96
Q
  • Howard the maintenance supervisor has identified several devices in your company’s facility that contain phosphorous. Which guidelines would you need to emphasize to his team regarding how to properly dispose of phosphorus? (Choose ALL That Apply)

FDA Guidelines
EPA Guidelines
OSHA Guidelines
MSDS

A
EPA Guidelines (Environmental Protection Agency)
OSHA Guidelines (Occupational Safety and Health Administration)
MSDS (Material Safety Data Sheet)

Explanation:
FDA (Food and Drug Administration)

97
Q
  • Which of the following is based on the Security concept of “Something You Have”? (Choose ALL That Apply)

Door Lock
Biometric Lock
Server Lock
Hardware Token

A
Door Lock (KEY)
Server Lock (KEY)
Hardware Token (Token)

Explanation:
Hardware Tokens, Sever Locks, and Door Locks are security concepts considered to be “Something You Have”. If they are the sole method of user authentication, safeguards, must be put in place to ensure security should they are lost or stolen. They are best implemented as part of a multifactor authentication system.

Hardware Tokens are some types of physical object that a user must have during the login process to provide possession of the device.

Door Locks require a KEY (Something you have…) to OPEN.

Server Locks restrict access to the devices in the Server Cabinet and can only be open with a KEY (Something you have…)

Biometric Devices are based on the security concept of “Something You Are”. They match a user’s uniquely identifiable physical attribute to a previously stored value. They are among the most secure physical security measures.

98
Q
  • After performing a vulnerability analysis, a security auditor alerts you that a server has been infected with a rootkit. Which statement best defines this type of malware?

Software application that displays advertisements while the application is executing.
Program that spreads itself through network connections
Collection of programs that grants a hacker administrative access to a computer or network
Application that uses tracking cookies to collect and report a user’s activities.

A

Collection of programs that grants a hacker administrative access to a computer or network

Explanation:
Rootkit is a System-Level Kernel Module that modifies file system operations.

Adware is software application that displays advertisements while the application is executing.

Spyware often uses tracking cookies to collect and report a user’s activities.

Worm is a program that spreads itself through network connections.

Malware is a term used to describe a group of malicious software applications that include:
Viruses
Worms
Spyware
Trojans
Rootkits
Backdoors
Logic Bombs
Botnets
99
Q
  • Edith and Clarence are studying for their A+ exam and want to learn more about NTFS permissions versus Share permissions on Windows 8 Computers. Which of the following statements is FALSE?

Share Permissions include Read, Write, Modify, and Full Control
NTFS Permissions can be assigned to users and groups.
Share Permissions can be assigned to users and groups.
NTFS Permissions include Read, Write, Modify, and Full Control

A

Share Permissions include Read, Write, Modify, and Full Control

Explanation:
Share Permissions do NOT include Read, Write, Modify, and Full Control. They only include Read, Change, and Full Control.

100
Q
  • Alan of Northern Company is traveling to several conferences in various states to present his new product line to consumers. He usually uses a Slimport to project his Android Screen but accidently left his cables at the last site where he was. His next presentation is in 4 hours. What can he request from the Hotel Tech Team to keep the show rolling for Alan? (Choose Two)

HDMI Cable
Micro HDMI Cable
Mini USB Cable
Miracast or Chromecast

A

Micro HDMI Cable

Miracast or Chromecast

101
Q
  • Your company has several security measures that they have implemented on all mobile devices. Which of the following is NOT a Security Measure for Mobile Devices?
patching/updates
anti-virus
logic attempt restrictions
geotracking
passcode locks
A

geotracking

Explanation:
Geotracking is NOT a Security Measure for Mobile Devices. Geotracking occurs when a Mobile Device records the location of the device periodically and stores the information in a Central Location. This is actually a security concern for many Mobile Device users because law enforcement may be able to access this information. The United States Department of Homeland Security retains the right to access this information when they deem necessary.

102
Q
  • You need to troubleshoot a driver issue. When Windows 7 is booting, you press F8 to enter the Advanced Boot Options Menu. Which option is NOT an option listed in the menu?

Safe Mode with Networking
Directory Services Restore Mode
Safe Mode
Automated System Recovery

A

Automated System Recovery

103
Q
  • Daniel is new to your department and is asking about wireless networks. What would you tell him are three conditions that affect the external vulnerabilities of Wireless Networks? (Choose Three)
Speed of Connection
Number of Users
Antenna Placement
Antenna Selection
Access Point Power
A

Antenna Placement
Antenna Selection
Access Point Power

104
Q

You are creating a wireless network for your company. You need to implement a wireless protocol that provides maximum security while providing support for older wireless clients. Which protocol should you choose?

WIFI Protected Access (WPA)
WIFI Protected Access 2 (WPA2)
Wired Equivalent Privacy (WEP)
Wired Application Protocol (WAP)

A

WIFI Protected Access (WPA)

Explanation:
WPA was created to fix the core problems with WEP. WPA is designed to work with Older Wireless Clients while implementing 802.11i Standard.

105
Q

Which of the following is an example of Phishing?

email request from a financial institution asking you to log in and change your password using the provided link
an attack that uses drones to obtain email accounts to send spam
program that sends out your personal information to an advertiser
Visual Basic script attached to an email that infects your system

A

email request from a financial institution asking you to login in and change your password using the provided link

106
Q

You need to implement security measures for the mobile devices that have been issued to company employees. Which security measure is considered to be the easiest to implement for mobile devices?

GPS Locator Apps
Remote Wipes
Passcode Locks
Remote Locks

A

Passcode Locks

107
Q

Christine, a user, has contacted you saying she wants to organize the contents of her My Documents folder into Subfolders. Which command should she use?

dir
ren
cd
md

A

md (Make Directory - used to create new folders and subfolders.)

Explanation:
ren - used to rename a file folder
dir - display the contents of a directory or folder
cd - change directory
rd - remove directory
deltree - removes the specified directory and all the files and subdirectories within that directory
del - deletes one or more files

108
Q

Barry wants to keep his data secure on his Android Device. Which feature should you advice him to use?

PIN Lock
Screen Swipe
Encryption
Password Lock

A

Encryption

109
Q

You arrive at a customer’s home to fix a computer. The computer is located in the bedroom of the customer’s 8 year old daughter. While attempting to fix the problem, the child repeatedly interrupts you and asks questions. What should you do?

Take the computer back to your office to complete the repair.
Ask the parent to take the child into another room while you are working.
Tell the child to leave you alone while you are working.
Move the computer into another room where the parent is located.

A

Ask the parent to take the child into another room while you are working.

110
Q

A user has connected a second monitor to his Windows 7 Ultimate Computer. The new monitor is detected, however, the dual-monitor configuration is NOT configured as he wants it. What should the user do to change the dual-monitor configuration of the monitors?

Right-Click the desktop and select Gadgets
Navigate to Control Panel > Appearance and Personalization > Display > Adjust Resolution
Navigate to Control Panel > Appearance and Personalization > Display > Adjust Resolution > Advanced Settings
Right-Click the desktop and select Personalize

A

Navigate to Control Panel > Appearance and Personalization > Display > Adjust Resolution

111
Q

While servicing some computer equipment, you overhear a conversation about company-wide pay raises. What should you do?

Tell your supervisor about the pay raise.
Tell your co-workers about the pay raise.
Keep the information confidential.
Send an anonymous email to all company employees about the pay raise.

A

Keep the information confidential.

112
Q

Thomas is teaching a class for New Users and wants to cover what to do and what not to do Online. He specifically discusses spyware and malware infections and how they occur. What are some of the Warning Signs he should teach them to be aware of? (Choose ALL That Apply)

Taskbar or System Tray has strange icons.
Firewall and Antivirus programs are randomly Disabled.
Add/Remove Programs console has programs you do not recognize.
Browser’s Home Page changes unexpectedly.

A

Taskbar or System Tray has strange icons.
Firewall and Antivirus programs are randomly Disabled.
Add/Remove Programs console has programs you do not recognize.
Browser’s Home Page changes unexpectedly.

113
Q

Which technology allows users to freely access all systems to which their account has been granted access after performing an initial authentication?

Single Sign-On (SSO)
MAC
DAC
Biometric Device
Smart Cards
A

Single Sign-On (SSO)

114
Q

You need to update your backup and recovery policy. You have read that a company was out of business for quite some time when a tornado destroyed their neighborhood bank, and with it, the company’s backup media. You want to re-examine and re-evaluate your backup and recovery policy to address this issue. What specific area should you re-evaluate?

image-level backups
account recovery options
backup testing
cloud storage VS local storage backups

A

cloud storage VS local storage backups

115
Q

You need to locally install Windows 7 Ultimate on a new computer. Which installation method is most likely?

Network
CD
PXE
DVD

A

DVD

116
Q

When explaining the differences between NTFS and FAT32 to a user installing Windows 7, which three benefits would you share with them regarding NTFS?

virus protection
malware protection
file encryption
better security
better disk space management
A

file encryption
better security
better disk space management

117
Q

Recently, you upgraded a user’s computer to a dual-core processor. The user complains that an applications performance did not increase after the upgrade. You need to ensure that the application fully utilizes the dual-core processor. What should you do?

Upgrade the application to a version that supports multithreading
Enable multithreading in the BIOS
Enable multithreading in the OS
Upgrade the OS to a version that supports multithreading

A

Upgrade the application to a version that supports multithreading

118
Q

A user has Windows 78 computer with 512 MB of RAM and two hard drives, named drive C and drive D. The Paging File is located on Drive C. The user complains that his computer does not perform well after running for a couple of hours. What should you tell the user to do?

increase the size of the paging file
defragment the hard drives
disable the paging file
move the paging file to drive D

A

move the paging file to drive D

119
Q

All of the following are examples of Pirated Software - EXCEPT?

installing software from the same installation CD using multiple licenses.
installing software from the same installation CD on multiple computers
installing an application using an installation CD with the application name written on it
installing OEM software from the same installation CD on multiple computers

A

installing software from the same installation CD using multiple licenses.

120
Q

Sam is an experienced Android user. He has been hired by your department to support all the Mobile Devices in user by your organization. You must instruct him on backing up the data on an Apple Device. Your company only wants to use a solution that would allow devices to be restored from any location. Which app should you recommend?

Google Drive
iTunes
Microsoft One Drive
iCloud

A

iCloud

121
Q

When explaining new equipment features to a customer, all of the following are acceptable practices EXCEPT?

Avoid interrupting the customer
Use the correct acronyms with the customer
Sit beside the customer
Make direct statements to the customer

A

Use the correct acronyms with the customer

122
Q

A user reports that her mobile device is not working properly. When you research the issue, you discovery that she accidently deleted all of the data on her device. What has most likely occurred?

factory reset
force stop
soft reset
data backup

A

factory reset

123
Q

You are attending a class on network identification and authentication. What is the most common form of identification and authentication?

biometrics
user identification with reusable password
two-factor authentication
smart cards

A

user identification with reusable password

124
Q

You are assembling a personal computer. You remove the packaging material from different hardware components, such as memory chip and motherboard.

Where should you place these hardware components to prevent damage from positive and negative charges?

Place them on a tile floor
Hold them in your hands while wearing a pair of lint-free gloves
Place them in an anti-static bag
Place them on a piece of newspaper
Place them on a wooden table
A

Place them in an anti-static bag

125
Q

You are sharing a portable computer with a vendor to work on a legacy application. What should you do to secure this computer from theft?

Enable BitLocker
Use a T-bar locking mechanism
Enable encrypting file system (EFS)
Implement password protection on the computer

A

Use a T-bar locking mechanism

Explanation:
T-bar locking mechanism helps protect your devices from physical theft by locking the device to the desk.

126
Q

Wendy has decided to implement an uninterruptible power supply for several servers. Which functions can it provide her? (Choose ALL That Apply)

surge protection
warning when the power source fails
data backup
short-term battery backup

A

surge protection
warning when the power source fails
short-term battery backup

127
Q

You know the IP Address of a computer that is downloading copyrighted material. Which of the following would help you to identify the location of that computer?

Acceptable use policy
Knowledge base/articles
Password Policy
Network topology diagrams

A

Network topology diagrams

128
Q

You are an onsite tech for your company and have been assigned the task of replacing a damaged motherboard in a customer’s computer. You must carry the replacement working motherboard to the customer’s residence. Which is the BEST method to carry the motherboard to the customer’s residence?

Carry the motherboard in a paper bag lined with Styrofoam.
Carry the motherboard in a metal-lined wooden box
Wrap the motherboard in a piece of lint-free cloth
Carry the motherboard in an anti-static bag.

A

Carry the motherboard in an anti-static bag

129
Q

You need to resize the disk partition to increase the storage capacity. Which OS Feature should you use?

Disk Management
Recovery Console
MSConfig
MSINFO32

A

Disk Management

130
Q

Which Active Directory logical security concept would you implement to best protect a user’s data in the event of a hard drive crash?

Organizational Unit
Domain Membership
Login Scripts
Folder Redirection

A

Folder Redirection

Explanation:
Instead of storing the user’s data on the local hard drive, Folder Redirection points to a Network Storage Location such as a Server or a Cloud Location.

131
Q

Which of the following tablet operating systems typically follows a Yearly Schedule for major version updates?

Microsoft Windows
Chrome OS
Android
iOS

A

Android

132
Q

A user has recently upgraded the video adapter drivers on a Windows 7 computer. Since that time, the computer has been continuously restarting. You tried rebooting the computer using the Last Known Good Configuration, but it does not affect the problem. What should you do to fix the problem using the least administrative effort? (Choose Two)

Perform a fresh install of Windows 7
Restart the Computer, press the F8 Key, and select the Command Prompt Only Option.
Roll back the video adapter drivers.
Restart the computer in Safe Mode.
Boot the computer with a Windows 7 Bootable Disk

A

Roll back the video adapter drivers.

Restart the computer in Safe Mode.

133
Q

You have several old computer parts in a storage room. Because you work for a company with an aggressive green policy, you want to reclaim as much material as possible from the components. What CANNOT be reclaimed?

metal from the computer case
metal from the circuit board
phosphorus from a CRT monitor with a broken screen
lead from an intact CRT monitor

A

phosphorus from a CRT monitor with a broken screen

134
Q

Melissa loves to listen to music while she is working out. However, every time she walks into the gym, her Bluetooth headphones stop working. What could be the problem? (Choose Two)

Other WIFI devices are trying to connect.
Her device is in discoverable mode.
Headphones are not charged.
Other Bluetooth devices are trying to connect.

A

Her device is in discoverable mode.

Other Bluetooth devices are trying to connect.

135
Q

Clara took her son swimming and left her mobile device in the sun for too long. What can she do to get the Mobile device to turn on again?

Replace the battery.
Remove the protective cover, and place the phone in a cooler environment.
Reinstall the OS
Turn off Bluetooth

A

Remove the protective cover, and place the phone in a cooler environment.

136
Q

You need to Enable Wake on LAN. Where would you go first to do this?

On the NIC
On the Router
In the BIOS
In Device Manager

A

In the BIOS

137
Q

You have two wireless networks in your building. The wireless networks do not overlap. Both of them use WIFI Protected Access (WPA). You want to ensure that no unauthorized wireless access points are established. What should you do?

Change the two wireless networks to WEP
Disable SSID broadcasts for the two wireless networks
Periodically complete a Site Survey
Change the two wireless networks to WPA2.

A

Periodically complete a Site Survey

138
Q

You want to provide secure access to the research laboratory and ensure that only authorized persons can enter the laboratory’s server room. Which system does NOT provide an effective means of ensuring that only authorized persons can enter the server room?

biometric access control system
swipe card system
single sign-on system
smart card system

A

single sign-on system

139
Q

You install a New Device driver on your Windows 7 Computer. Upon restarting, the computer continuously reboots. You attempt to use the Last Known Good Configuration, but the computer still continuously reboots. What should you do next to fix the problem?

Boot in Safe Mode, and reinstall the drivers.
Boot from the Windows DVD into the Command Prompt, and reinstall the drivers.
Boot from the Windows DVD, and use Recovery Console
Use Add/Remove Programs to uninstall the device driver.

A

Boot in Safe Mode, and Reinstall the Drivers.

140
Q

You are setting up networking on your work computer. You were given unique login credentials by the system administrator, who manages all credentials for thousands of employees. What type of network would this be?

workgroup
homegroup
public
domain

A

domain

141
Q

A user’s computer is infected with malicious software that spreads through the internet to collect user information, including browser habits. Which type of malware has infected this computer?

viruses
spyware
worms
Trojan Horse

A

spyware

142
Q

You plan to replace some components within a computer. As a recommended practice, what should be the FIRST step towards disassembling a computer?

The Processor should be removed from the Motherboard
The Power Supply should be disconnected from the Motherboard
The Memory Modules should be removed from the Motherboard
The Power Cord of the system case should be disconnected

A

The Power Cord of the system case should be disconnected

143
Q

You want to prevent your computer from any type of Electrostatic Discharge (ESD) while servicing the computer. Which actions should you NOT perform while servicing the computer? (Choose Two)

Ensure that the room in which the computer is serviced is carpeted.
Keep your one hand in contact with bare metal frame of the computer at all times.
Ensure that the room in which the computer is serviced is cool and dry.
Wear cotton clothes
Wear an anti-static wristband.

A

Ensure that the room in which the computer is serviced is carpeted.
Ensure that the room in which the computer is serviced is cool and dry.

Explanation:
Carpets - Should not be placed in the computer rooms.

Cool and Dry conditions are prone to static electricity, and therefore should not service a computer in a cool and dry room. To prevent ESD, humidity in the server room should be maintained above and average of 45%.

You should wear Anti-static Wristbands while servicing a computer.

You should keep one hand in contact with the bare metal frame of the computer at all times.

You should wear cotton clothes to prevent against ESD because other materials, such as synthetic and nylon are known to be conductors of static charge.

144
Q

A major system change is needed, and you are preparing a document for the Change Board. What is the Change Board’s ultimate responsibility?

identify the scope of the change
define the purpose of the change
document the change
approve or reject the change

A

approve or reject the change

145
Q

Susan is constantly shutting down her laptop improperly due to moving from meeting to meeting. Which file is in jeopardy of being affected the most?

Registry
DLL file
System Restore Points
BCD File

A

Registry

146
Q

You need to view the contents of a Windows 10 update. Which command-line tool should you use?

EXPAND
XCOPY
EXTRACT
COPY

A

EXPAND

Explanation:
Expand also works on Windows 7 and Windows 8/8.1.

Extract - Allowed you to pull one or more files out of a CAB file. Deprecated in Windows XP and later.

Copy - Allows you to duplicate a File or Folder

XCopy - Duplicates a folder, including subfolders and files.

Help - Can be used to display the contents of the Help File for a Command

Exit - Used to Exit a Script or Batch File

147
Q

You want to define the number of days a password can be used before the user is required to change it. Which password policy should you configure?

Enforce Password History
Minimum Password Length
Maximum Password Age
Passwords must meet complexity requirements.

A

Maximum Password Age

148
Q

You are installing an OS on a Drive that appears to have Sector Issues. Which formatting option should you use?

ExFAT
Full Format
NTFS
Quick Format

A

Full Format

Explanation: (My Own)
ExFAT and NTFS are not types of Formats, they are File Systems.

Quick Format is a Quick Format that only formats a drive, does no Error Checking or Fixing.

Full Format does a FULL System Check, Error Check, Fix and does a Format but takes alot longer to finish.

FAT - File Allocation Table is the legacy File System for Windows. Supports Partition size of 2GB.
FAT32 - File System introduced in Windows 95. Supports Partition size of 2TB.
NTFS - File System introduced in Windows NT. Provides support for file compression, encryption, and file/folder Security.
CDFS - File System used in CDROM Drives
ExFAT - File System is the successor to FAT32. Allows for Larger Files, particularly Media Files, and compatibility with Flash Media.
NFS - File System used primarily in Linux Systems. Allows access to Remote Files.
EXT3 - Common Linux File System, allows for journaling, which protects against File System corruption in the event of a crash. Supports 2TB file sizes.
EXT4 - Newer version of EXT3. Supports 6TB file sizes. Max file system size is 1 EB.
HFS - Hierarchical File System, supported by MAC OSx 8.0 or Later. Latest version is HFS+.
Swap Partition - Special Partition created to store the Paging File. Used as Virtual Memory.
Quick Format VS Full Format - Choosing between these types of formats, keep in mind that quick does NOT check for Bad Sectors. Full will take much longer because it checks for Bad Sectors.

149
Q

You are an IT Tech for a Company. You are required to implement CAT5 cabling for your company’s network. The cable will run to each workstation along the floor. What should you do to secure the cables?

Install cables using a protective channel
Install CAT6 cable instead of CAT5 cable.
Implement a Wireless Network
Use Duct Tape to secure the cable.

A

Install cables using a protective channel

150
Q

You open Device Manager and notice a RED X next to your Wireless Network Adapter. What does this indicate?

The adapter was not installed properly
The adapter is experiencing a resource conflict
The adapter is disabled
The adapter’s drivers need to be updated/reinstalled

A

The adapter is disabled

151
Q

You are troubleshooting a computer issue at a customer location. Which guidelines should you follow? (Choose ALL That Apply)

Ask clarifying questions
Avoid using technical jargon
Skip any steps that the customer has already taken
Respect the customer’s property

A

Ask clarifying questions
Avoid using technical jargon
Respect the customer’s property

152
Q

You are documenting the proposal for a major change. What part of the documentation would address potential impact of failure?

Risk analysis
Backout plan
Documented business processes
Scope of the change

A

Risk analysis

Explanation:
Risk analysis identifies problems that might arise, the likelihood that the problem may occur, the impact if it does occur, and an action plan should the problem manifest itself. Ideally, the Risk analysis should also explain why the change is worth undertaking, despite the risks involved.

Documented business practices include items such as technical support procedures, customer service, ordering procedures. In general, this deals with company policies and procedures. Change request should thoroughly address the effect on documented business processes.

Backout plan is a document that would outline how you will recover should something go awry. When you see that the implementation is not going as planned, the backout plan will allow you to get the systems back to an operating state. The backout plan does not address potential impact of the failure (Risk analysis), it only documents how to revert any changes to infrastructure and restore the earlier functionality or business systems.

Scope of the change defines, among other things, the areas that will be address by the change, who will be responsible for implementing the change, what resources are needed, and a method to verify that the change has been completed, successfully or unsuccessfully. Also who is impacted by the change.

153
Q

You need to restore a Windows OS system to the way it was when the computer was shipped from the factory. What should you do?

Press F8 during POST and select Advanced Boot > Repair Your Computer > System Image Recovery
Use the Format Command
Create a Restore Point
Use the Disk Management Utility

A

Press F8 during POST and select Advanced Boot > Repair Your Computer > System Image Recovery