Pre-Assessment Flashcards
- Which of the following drive types can benefit from a periodic disk fragmentation?
(A) HDD
(B) DVD-RW
(C) Compact Flash
(D) SSD
(A) HDD
The magnetic hard disk drive (HDD) definitely benefits from periodic disk fragmentation because its mechanical operation lends itself to fragmentation
- You’re assisting a customer in an upgrade from Windows 7 to Windows 8.1. Which upgrade method would you recommend if the user states that the computer has been infected by malware in the near past?
(A) Unattended installation
(B) Clean install
(C) Repair installation
(D) System reset
(B)
Personally, I wouldn’t take a chance on an upgrade if the system is suspect. I would recommend backing up the user state, performing a clean Windows 8.1 installation, and restoring the user state (which doesn’t include program files) to the upgraded system
- The appearance of a proprietary crash screen is likely an indicator of:
(A) Improperly disconnected USB drive
(B) Corrupted Windows Update
(C) Hardware incompatibility
(D) Missing GRUB Loader
(C) Hardware incompatibility
Normally, the appearance of the “Blue Screen of Death” in Windows of the “Spinning Beach Ball of Death” (OSX) signifies a hardware incompatibility. For instance, you may have inadvertently installed the wrong RAM type in the system
- Which of the following Windows 8.1 features restores the entire system to its state at a previous point in time?
(A) Windows RE
(B) System Restore
(C) System Refresh
(D) System Image Recovery
(D) System Image Recovery
System Image Recovery involves creating an image of the entire system drive. Therefor restoring a computer with a previously created recovery image restores the entire operating system environment to its state at the previous point in time.
- Which of the following devices should you use if you need to share one keyboard and most with multiple computers?
(A) KVM
(B) Port replicator
(C) Set-top box
(D) Riser card
(A)
Keyboard-video-mouse (KVM) switch is exactly what you need in this situation. You’ll oftentimes find KVMs in data centers so that engineers can easily manager several systems located in the same server rack.
- You plan to secure a network printer for a customer by implementing the WPA encryption protocol. Which connectivity method for the printer should you use?
(A) Bluetooth
(B) 802.11
(C) Infared
(D) USB 3.0
(B) 802.11
WiFi Protected Access (WPA) encryption is available on IEEE 802.11 WiFi networks only. While we’re on the subject, be sure to never use Wired Equivalent Privacy (WEP) which is fundamentally broken WiFi security protocol
- You’re helping a customer who needs a second wired Ethernet interface on her laptop computer. Which of the following is the recommended option?
(A) Install a PCI Ethernet card
(B) Use a USB-to-RJ-11 dongle
(C) Use a USB-to-RJ-45 dongle.
(C) Disable the on-board WiFi adapter
(C) Use a USB-to-RJ-45 dongle
If you remember that Ethernet uses the RJ-45 connector type then you’ll answer this question correctly every time. Recall that RJ-11 is used for traditional telephones and (yuck) analog modem connections.
- Which of the following file systems is common on Linux Systems?
(A) HFS
(B) FAT32
(C) NTFS
(D) EXT3
(D) EXT3
Linux computers typically use the EXT3 or EXT4 file systems, although they can support other file systems for compatibility with other operating system platforms.
- A customer has dropped off a system to have the processor upgraded. Which of the following features of CPU sockets make replacement of the CPU easier?
(A) XD-bit
(B) Virtualization
(C) Cores
(D) ZIF
(D) ZIF
A zero insertion force (ZIF) socket is a type of socket used with PGA and LGA chips to allow removal and installation of the processor chip. A ZIF socket has a lever that allows releases the processor and allows it to be lifted out of the socket.
- You are a service technician for an account firm and need to upgrade the RAM on a high-end desktop workstation. You grab an 8GB SODIMM module from inventory and are having trouble installing it. Which of the following represents the reason for the installation problem?
(A) The workstation only takes 4GB modules.
(B) The module is not compatible
(C) High-end workstations use flash memory
(D) High-end workstations use solid state memory
(B) The module is not compatible.
Desktop computers use DIMM when installing RAM into the computer. SODIMM are used by laptop computers
- You a re installing a new motherboard for a workstation within your office. When connection the power to the motherboard, you notice a 6-pin power connector. What component does that typically supply power to?
(A) Graphics card
(B) CPU
(C) SATA drives
(D) EIDE drives
(A) Graphics card
The 6-pin power connector is typically used to supply power to the PCIe graphics card.
- You are configuring the security for a customer’s wireless network. Which of the following identifies the least secure wireless encryption protocol?
(A) WPA
(B) WPA2
(C) WEP
(D) TKIP
(C) WEP
In today’s day and age you should avoid the WEP encryption protocol when configuring wireless security because the encryption with WEP is easy to crack. When encrypting wireless traffic always use the newer protocols such as WP2
- You are configuring a small LAN for one of your customers. You would like to implement NAT. Which of the following devices would you use?
(A) Hub
(B) Switch
(C) Modem
(D) Router
(D) Router
Network address translation, or NAT, is a network service that allows multiple systems and devices on the network to access the Internet using a single IP address. NAT is typically a service provided with routers.
- You are configuring the security on a folder that resides on an NTFS volume and has been shared as Data. The NTFS permissions to the folder , but the folder has been shared giving Bob the the read permission. What are Bob’s effective permissions when he connects to the shared folder?
(A) Full control
(B) Read
(C) Modify
(D) No permission
(B) Read
When NTFS permissions conflict with shared folder permissions, the most restrictive permission will be the effective permission. In this case, read is more restrictive than modify.
- You have installed virtualization software on the computer and are trying to create a virtual machine but you continue to receive an error. What is most likely the cause?
(A) Disable cache memory in the BIOS
(B) Enable XD-bit in the BIOS
(C) Change the boot order in the BIOS
(D) Enable virtualization in the BIOS
(D) Enable virtualization in the BIOS
Before trying to configure virtual machines son the system you should verify that virtualization support has been enabled within the BIOS.