Questions Flashcards

1
Q

An administrator is concerned about users accessing network shares outside of their job role.
Which of the following would BEST prevent this?

A

Set up shares with permissions based upon group membership.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

After accidentally removing a hard drive from a server with three drives in a RAID 5 configuration, a technician notices the server locks up and shuts down. Which of the following can the technician do to quickly fix the problem?

A

Reinsert the drive and boot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

After being relocated to an enclosed position under a desk, a computer experiences intermittent shutdowns. Which of the following conditions is MOST likely the cause?

A

Overheating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

After installing a new printer the organization determines that there are problems printing images and very large files. Which of the following will MOST likely resolve the issue?

A

Install additional memory to the printer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

After installing a single new RIMM memory module the system fails to start properly or recognize the new memory. Which of the following is MOST likely the problem?

A

RIMM modules must be installed in pairs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

After several passes with a malware removal program, the program keeps detecting the same malware infection after a reboot. Which of the following should be done to attempt to remove the offending malware?

A

Run the malware removal program in Windows Safe Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A /all switch is MOST likely to be used with which of the following commands?

A

IPCONFIG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ann, a home user, brings a Windows XP PC in for repair and reports that several disk read errors are occurring. She has run check disk and errors have been reported several times. Which of the following should a technician recommend? (Select TWO).

A

Backup all data on the drive

Purchase a new hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ann, a technician, is trying to recover some files for a user from a damaged laptop. Since the Windows installation has been corrupted and does not boot, Ann plugs the drive into a bench system to attempt a recovery. After trying to access the drive on the bench computer, the following message is displayeD. “Access Denied. Please Enter Encryption Password.” Which of the following is the reason that this error is displayed?

A

BitLocker is being used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ann, a user, has brought her laptop in for service. She reports that her battery is at 100%, but whenever it is unplugged it immediately shuts down. Which of the following should the technician do?

A

Replace the battery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ann recently upgraded a computer from Windows XP to Windows 7, but one of her applications does not work now. Which of the following should be done FIRST?

A

Set the application to run in XP compatibility mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ann reports that printouts from the department laser printer have become faded. She has already replaced the toner cartridge. Which of the following is the MOST likely component causing the faded printing?

A

Transfer roller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An attack that creates a website that looks like another website, with the purpose of learning someone’s account information is called which of the following?

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A client calls after connecting the keyboard and mouse to a new computer. The client indicates that neither the keyboard nor the mouse works. The technician has determined these devices are connected through the PS/2 ports. Which of the following recommendations is BEST?

A

Make sure the PS/2 plugs and ports are color matched.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A company is looking to donate a collection of old PCs that are no longer needed. Which of the following data destruction methods would be MOST secure for highly sensitive information?

A

Low level 7-pass random wipe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A company wants to ensure that the latest cyber security threats are known to the employees across the enterprise to minimize occurrences. Which of the following should be implemented?

A

Regular user education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A company wants to prevent non-authorized users from entering into a secure building. Which of the following will BEST mitigate this activity?

A

Install mantraps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A corporate end user reports that random keys on their laptop are sticking. After taking the laptop in for repair a technician discovers that soda has been spilled inside the keyboard, possibly reaching other components inside the laptop. Which of the following should the technician do?

A

Replace the keyboard and clean the interior of the laptop if necessary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A critical server was replaced by the IT staff the previous night. The following morning, some users are reporting that they are unable to browse to the Internet upon booting their workstations. Users who did not shut down their workstations the previous day are able to connect to the Internet. A technician looks at the following report from a workstation with no Internet connectivity:
IP Address: 192.168.1.101
Netmask: 255.255.255.0
DHCP Server:192.168.1.1
DNS Server:192.168.1.2
Default Gateway:192.168.1.1
Given the above report, which of the following is the cause of why some workstations are unable to browse the Internet?

A

The DHCP server is misconfigured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A customer calls an IT consultant to explain an issue they are having with their Windows 7 Professional PC. Windows Update attempts to install patches upon each startup but fails on the same single update. The customer has attempted to re-run Windows Update from Control Panel but the issue remains. Which of the following courses of action would BEST resolve the problem?

A

Clearing the Windows Update download cache entirely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A customer needs to setup their laptop for use with a proxy server to browse the web at work. Which of the following areas would a technician need to visit to configure this on a Windows 7 system?

A

Internet Options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The customer reports their PC freezes up every day around the same time. Which of the following utilities would be BEST to check for any error codes?

A

Event Viewer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A customer states that their laptop has stability issues after a recent memory upgrade. Which of the following is the MOST likely cause?

A

The memory is not properly seated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

An employee at a company lost their mobile device that contains proprietary information. Which of the following methods is the BEST to be implemented to prevent unauthorized users from obtaining this information?

A

Remote wipe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

An end user reports that they are unable to access any websites or network resources by the fully qualified domain name (FQDN); however, the technician is able to access these resources by IP address. Which of the following is the MOST likely cause for this problem?

A

The customer’s DSN server is unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

For the last year, a company has gathered statistics on the most common security incidents. The highest percentage deals with opening email attachments that contain malware. Which of the following would mitigate this issue without reducing productivity?

A

Annual cyber security education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

If a customer wants to create a multi-boot PC with different editions of Windows, which of the following is MOST important to consider?

A

Using multiple partitions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

In order to prevent other users from editing files in `C:\ Files’, which of the following steps should be taken?

A

Set NTFS permissions to read only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

In which of the following locations is the Windows Vista local user settings found?

A

%userprofile%\AppData\Local

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

In which of the following locations would a technician go to show file extensions?

A

Folder Options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Joe, a technician, receives an error message on his tower PC just after POST which reads:
“WARNING! Your drive is about to fail. Please back up your data and run full drive diagnostics.”
Which of the following is generating this error message?

A

S.M.A.R.T.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Joe, a technician, would like to map a network drive when he starts up his computer in the morning. Which of the following commands would he use to accomplish this task?

A

NET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Laptops and tablets have which of the following in common?

A

Solid state drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A large magnet is placed too close to a CRT monitor. Which of the following will MOST likely occur?

A

Distorted image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A local administrator would like to determine why a laptop is taking so long to boot into the operating system. Which of the following tabs in MSCONFIG would the administrator access to BEST determine this?

A

Startup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

An office of 25 computers is interested in employing a file server, network shares, and print server functionality. Which of the following network setups would be BEST suited for this situation?

A

Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

On a corporate network, which of the following features would be used to redirect network traffic for filtering or monitoring?

A

Proxy Settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A PC has sensitive data that must be destroyed, before the PC is redeployed. A technician has been tasked with completely wiping the PC hard drive. Which of the following methods is BEST for the technician to use?

A

Low level format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A PC is powering on but the only activity a technician can see is spinning fans. Which of the following components would MOST likely be at fault for such a condition? (Select TWO).

A

CPU

Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

A PC uses RAID 1. Ann, a technician, has read in the event log that the drive “SATA 1” is no longer in sync with drive “SATA 0”. Which of the following steps should she try FIRST to repair this PC to optimal running conditions?

A

Remove SATA 1 from the RAID group then try to re-add it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A printer is suddenly not printing using Windows XP. Which of the following is the BEST procedure to get the printer restarted?

A

Examine the print queue, stop and then restart the spooler service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Privacy filters applied to users computer screens are used to combat which of the following security risks?

A

Shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which of the following commands, in Windows 7, could a technician use to schedule a disk integrity scan upon next boot?

A

CHKDSK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Which of the following tabs under MSCONFIG would allow a technician to configure all of the applications that launch at boot?

A

Startup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

A technician believes a machine loaded with Windows XP Professional has issues with file integrity of the core OS components. Which of the following commands could be used to both check and replace damaged files?

A

SFC /SCANNOW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

A technician is tasked with building three systems that are capable of utilizing the new Windows HomeGroup functionality. Which of the following versions of Windows would need to be used?

A

Windows 7 only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Which of the following security threats does NOT use software to extract sensitive information or credentials?

A

Shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

A user is reporting that their screen is flickering at a rapid rate. Which of the following Control Panel paths should a technician use in order to remedy this issue?

A

Display -> Settings -> Advanced -> Adapter -> Refresh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

A user has a laptop that they need to get ready for an outdoor presentation. The user is concerned that the laptop will turn off the screen or go into standby before their presentation is complete. Which of the following Control Panel paths should the technician use in order to prevent this from occurring?

A

Power Options -> Power Schemes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Which of the following data transfers will retain the current NTFS permissions of a file?

A

Moving the file to a different location on the same volume

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

A user’s computer keeps producing a “low virtual memory” alert and the speed of the system degrades afterwards. Which of the following Control Panel locations can provide information to review and correct this issue?

A

System > Advanced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

A user states their workstation will not reach the login screen. Which of the following commands can be used to write a new partition boot sector to the system partition in the Recovery Console?

A

FIXBOOT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Which of the following features helps to prevent shoulder surfing?

A

Privacy screen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

A user wants to change the functionality that occurs when the laptop lid is closed. Which of the following Control Panel options is the MOST direct way to adjust this?

A

Power Options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Which of the following Control Panel items will allow for easy streaming of pictures, music, and videos to other Windows 7 PCs?

A

HomeGroup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

The folder “Documents” is shared. The user can create and delete documents when on the local PC, but can only read documents when accessing them remotely. Which of the following should be adjusted?

A

Share Permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Which of the following security controls would be an example of the least privilege principle on a
home PC?

A

Create a standard user account for kids.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

A user regularly has to walk away from their computer and is worried someone may access their workstation. Which of the following would BEST prevent this?

A

Lock the workstation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

A user has an LCD and a CRT monitor attached to their workstation. The colors are slightly off on the CRT but not the LCD. Which of the following controls should be used in troubleshooting?

A

Degauss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

A user is installing Windows 7 on a PC with a RAID card. The user has verified all of the cables are connected correctly, but the installation media does not detect any hard drives. Which of the following should the user do to help detect the hard drives?

A

Select load driver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Which of the following accounts is MOST restrictive?

A

Guest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

A technician is tasked with installing a legacy application on a Windows 7 computer. When the technician tries to install the legacy application, an error is received that the application cannot be installed because the OS is not supported. Which of the following should the technician do FIRST to try to get the application installed in Windows 7?

A

Install the application with compatibility mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

A user has not received any new emails on their smartphone in the last two days. The user is able to access the Internet without any problems. Which of the following should the user do FIRST?

A

Restart the smartphone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

A technician needs to format a file system to be compatible with the WIDEST range of operating systems. Which of the following file systems should be used?

A

FAT32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

For any given 802.11n wireless Internet signal, which of the following is needed to establish a connection?

A

Proper SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

A user reports that a file they shared out on their computer for another network user is not accessible to the third party. The user insists they specifically gave this third party Allow rights for Read and Write access. Which of the following could explain the problem at hand?

A

The parent folder has explicit Deny rights set for this user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

A company is experiencing issues with third parties tailgating authorized users during entry to secure server rooms. Which of the following would BEST alleviate this problem?

A

Mantraps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

A consultant is looking to consolidate six company servers onto one physical system. Which of the following requirements is MOST important on the new setup to ensure stable functionality of the virtual environment?

A

Server hardware resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Which of the following security concepts establishes the notion that a user should only be given sufficient access to the resources they need to perform their job function?

A

Least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

A technician is trying to diagnose a laptop that is experiencing heavy artifact corruption and random loss of video during operation. Which of the following are MOST likely causes of this problem? (Select TWO).

A

Integrated system video chip is failing and/or near death.

Incompatible or untested video drivers have been installed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

A user reports that every time they use a search engine and click on a link to go to a website, they instead are taken to a site blocked by their company’s content filter. The user is not trying to go to the blocked site and needs to be able to successfully use the search engine to complete their assignment. Which of the following tools would a technician use to BEST resolve this issue?

A

Anti-malware software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

After being infected with a virus, a user’s computer does not recognize the user as having local administrator rights to the computer. After troubleshooting the issue, a technician determines the computer needs to be rebuilt and data needs to be restored from the user’s backup. Which of the following tools would BEST reset the computer to how it worked when first purchased?

A

Factory restore CD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

A technician installed a second hard drive in a computer. Upon restart, a message appears stating. “primary drive 0 not found. Press F1 to continue.” Which of the following should the technician check FIRST?

A

Proper drive installation (e.g. cables/jumpers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

The shared folder named C$ is an example of which of the following?

A

Administrative share

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Which of the following is BEST used to prevent other people from viewing a user’s computer screen?

A

Privacy filter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

A pest exterminator tries to gain access to a company’s computer lab, but the receptionist does not see an extermination scheduled on the calendar and denies the exterminator access to the lab. Which of the following security threats almost occurred?

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Which of the following can be used as an appropriate boot device?

A

USB drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

A user tries to connect to the Internet using a dial-up modem and receives a “No dial tone detected” message. Which of the following is the FIRST thing the technician should check to troubleshoot the issue?

A

Check if the cable is connected on the modem’s line RJ-11 port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Which of the following software types would need to be installed on a mobile device to help prevent data from being viewed if the device is lost?

A

Remote wipe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Which of the following is the BEST tool to verify the cable is plugged into the correct port on the patch panel?

A

Toner probe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Which of the following is the BEST tool for a technician to use to make sure the network wires are securely fastened in a wall jack?

A

Punch down

82
Q

Which of the following is the BEST tool for a technician to use to make sure the network cable is securely fastened in the RJ-45 connector?

A

Crimper

83
Q

A technician is using the troubleshooting theory to help resolve a problem that is occurring with a client’s machine. The technician has verified system functionally. Which of the following is the NEXT step in the troubleshooting theory?

A

Document findings, actions, and outcomes

84
Q

A client reports that their VoIP phone screen displays duplicate IP address. Which of the following is the FIRST action to try to resolve this problem?

A

Reboot the phone

85
Q

After an installation of a video adapter, the screen on a Windows 7 system cannot be seen. Which of the following Windows 7 functions will resolve this?

A

Startup Repair

86
Q

A user gets an error message that the trust relationship to the domain has been broken. Which of the following can be done to resolve this from the client desktop?

A

Re-join the computer to the domain

87
Q

Which of the following resources is MOST important for accessing remote virtual environments on a client machine?

A

Network speed

88
Q

The practice of following an authorized person through an entrance without using a badge to defeat security is called:

A

tailgating.

89
Q

Turnstiles and other mantraps will prevent which of the following security threats?

A

Tailgating

90
Q

Which of the following encryption standards is found on older wireless devices and provides minimal security?

A

WEP

91
Q

An IR printer stops working for half of an office while the other half is able to print. Which of the following should be checked FIRST?

A

Physical obstructions

92
Q

If a computer does not have an optical drive, which of the following is the MOST efficient method to install an operating system?

A

USB flash drive

93
Q

Which of the following is the MAXIMUM number of primary partitions that can be created on a hard drive with FAT32

A

4

94
Q

Phishing is:

A

a technique used to obtain financial information from a user mimicking a legitimate website.

95
Q

The computer starts up and runs for less than a minute before shutting down or locking up. This is a symptom of:

A

overheating.

96
Q

When the computer is turned on it emits a series of beeps and does not POST. This can be caused by a bad:

A

video card.

97
Q

A technician needs to decrease the time it takes to install an operating system on 100 computers. Which of the following installations would the technician use to reduce hands-on time spent on each computer?

A

Unattended installation

98
Q

A technician is configuring a PC that will have confidential information stored on it. To ensure that only authorized users can access this PC, which of the following should the technician do? (Select TWO).

A

Disable the guest account

Change the default username

99
Q

A company recently had a security breach and is now required to increase the security on their workstations. A technician has been tasked to harden all the workstations on the network. Which of the following should the technician do?

A

Enable screensaver required passwords

100
Q

A technician recently installed a new video card in a PC. The PC already has integrated video on the motherboard. When the technician turns on the PC, there is no video. Which of the following is MOST likely the cause?

A

The power connector for the video card is unplugged.

101
Q

A user receives a phone call from a person claiming to be from technical support. This person knows the user’s name and that the user has Windows installed on their computer. The technician directs the user to open Event Viewer and look at some event log entries to demonstrate the effects of a virus on the computer. The technician also asks the user for their user ID and password so that they can clean the computer. This is an example of which of the following
security threats?

A

Social engineering

102
Q

A user has just purchased a wireless router for their home. Which of the following should be done to BEST secure the router from unauthorized access? (Select TWO).

A

Change router default logins

Set encryption on the router

103
Q

A user’s CRT display is not displaying colors correctly. Turning the display to the right or left sometimes temporarily corrects the problem. Which of the following should the technician check?

A

The video cable

104
Q

A laser printer is producing completely blank sheets. Which of the following processes should the technician check FIRST?

A

Development

105
Q

A technician has been dispatched to a customer site to diagnose an issue where the computer turns off intermittently. Upon arriving at the site, the technician detects a smoke smell coming from the computer. Which of the following is the BEST solution?

A

Power down the system and replace the power supply.

106
Q

Which of the following security measures is usually found in a laptop?

A

Biometrics

107
Q

Which of the following can be achieved with Group Policy to help with workstation security measures?

A

Complexity requirements

108
Q

Which of the following can enable a technician to remove a virus that prevents users from updating their antivirus software?

A

Safe mode

109
Q

A technician notices that a computer is making a loud clicking noise but continues to run. System speed is barely affected, but they cannot access certain drives. These are the symptoms of which of the following?

A

Failing second hard drive

110
Q

A user’s laptop has died but the hard drive is still functioning. Which of the following is the BEST way for the user to still access and edit all of their data?

A

USB hard drive enclosure

111
Q

Which of the following is the BEST way to get rid of dead pixels on a laptop screen?

A

Replace the LCD

112
Q

A technician is tasked with upgrading a network card on a Windows 7 Professional PC. The technician installs the network card, loads Windows XP drivers that came with the network card, and reboots the PC. Upon rebooting, the computer blue screens and the technician cannot get the computer to boot up properly. Which of the following should the technician perform to resolve this issue without any data loss? (Select TWO).

A

Remove network drivers

Boot up in safe mode

113
Q

In which of the following operating systems does Windows XP mode come as a free download to be used for application compatibility?

A

Windows 7 Professional

114
Q

The Aero feature is found in which of the following operating systems? (Select TWO).

A

Windows 7 Home Premium

Windows Vista Enterprise

115
Q

An audio visual company has decided that they want to migrate from Windows XP Professional SP2. The company has a domain network. A technician is tasked with selecting an operating system. Which of the following should the technician select?

A

Windows 7 Professional

116
Q

A technician is installing and configuring a SOHO wireless network for a client. The client only wants five authorized computers to connect to the network with a defined IP range. Which of the following should the technician configure on the router? (Select TWO).

A

DHCP

MAC filtering

117
Q

A user calls the helpdesk and states that they are receiving an IP conflict error on their computer. The user is on a company network that uses DHCP. The technician verified the PC is using DHCP to obtain TCP/IP settings. Which of the following commands should the helpdesk technician use to resolve this issue? (Select TWO).

A

Ipconfig /renew

Ipconfig /release

118
Q

A user calls the helpdesk and states that they suddenly cannot connect to the Internet or any other network resources. The user is on a company network that uses DHCP. The technician runs IPCONFIG from the command prompt and the PC has an IP address of 0.0.0.0. Which of the following steps should the technician perform FIRST to troubleshoot this issue?

A

Check the network cable

119
Q

A technician has installed the hardware for a SOHO wired network. Which of the following is the FIRST step to securing the network?

A

Change default usernames and passwords

120
Q

A bank is upgrading some clerical users’ PCs. Which of the following would be the MOST appropriate method for erasing the data on the old PCs?

A

Drive degauss

121
Q

Which of the following is a security threat that uses email to trick users?

A

Phishing

122
Q

A user reports that the desktop PC shuts down 10 minutes after turning it on in the morning. When the technician moves the PC, it sounds like there are loose parts sliding around in the case. Which of the following is the MOST likely explanation for the PC shutting down?

A

The heat sink retaining clip has broken loose.

123
Q

A technician is diagnosing a PC running Windows 7 which has been affected with an “NTLDR is missing” error message. Which of the following command line tools would BEST resolve the problem?

A

Fixboot

124
Q

A user reports that people are receiving emails from their account that the user never sent. Which of the following security measures would BEST resolve the problem?

A

Change the account password.

125
Q

A technician is repairing a workstation that exhibits random reboots at odd times of the day. Which of the following should be performed FIRST when troubleshooting the issue? (Select TWO).

A

Check the PSU integrity

Check the memory integrity

126
Q

A technician is troubleshooting a PC that is not completing POST and merely provides an audible beep code. Which of the following should be the FIRST item checked?

A

The memory configuration

127
Q

A user has an external hard drive which they forget to unplug before booting their machine. Each time this happens, an error shows on the screen which states “Boot sector missing ?reboot to try again.” Which of the following would be the BEST way to resolve this?

A

Change BIOS options to remove USB device from the boot order.

128
Q

A user states that their old notebook loses connectivity to the Internet several times a day at work and at home. The issue started after the wireless card was replaced. Which of the following items is MOST likely causing the issue?

A

The drivers for the NIC need to be updated.

129
Q

Which of the following commands may need to be run after a virus removal if the computer will not boot?

A

FIXMBR

130
Q

A technician would like to map a network drive. Which of the following indicates the correct path for mapping a network drive?

A

\servername\share

131
Q

Which of the following is the MINIMUM account required to install most programs on Windows XP?

A

Power user

132
Q

Which of the following security methods is BEST used to track access to a server room?

A

Biometric lock

133
Q

Which of the following user accounts should be disabled to adhere to security best practices?

A

Guest

134
Q

Which of the following user accounts should be renamed to adhere to security best practices?

A

Administrator

135
Q

When walking past a server with a RAID 5 array, a technician hears a loud clicking noise. Which of the following could MOST likely occur?

A

Hard drive failure

136
Q

A wireless network is experiencing intermittent connectivity. Which of the following would BEST resolve this issue?

A

Change broadcast channel

137
Q

When configuring user accounts, which of the following should a technician perform?

A

Assign the minimum required access to the users

138
Q

A technician needs to rebuild a computer that had a virus. Which of the following data destruction methods should be used to ensure the virus has been successfully erased before reinstalling the operating system, programs, and all user data?

A

Standard format

139
Q

Which of the following security threats do shredders help prevent?

A

Dumpster diving

140
Q

A user states when they press certain letters on their laptop’s keyboard, a number is displayed on the screen. Which of the following can the technician perform to resolve this issue?

A

Turn off number lock

141
Q

Which of the following is the correct path to determine the IP address on an iOS device?

A

Settings> General> Network> Wi-Fi> SSID Name> IP address

142
Q

A contractor needs to destroy several drives containing confidential information so that they can never be used again. Which of the following destruction methods would BEST accomplish this task?

A

Drill into the hard drives.

143
Q

A customer purchases a new 802.11n router for their home. They connect it to their current 801.11g devices, as well as their new laptop. Even though the laptop has a built-in 802.11n antenna, they are not noticing any speed increase. Which of the following is the MOST likely cause?

A

The router is broadcasting in Mixed Mode.

144
Q

Which of the following home computer synchronization methods are possible with an iOS device? (Select TWO).

A

USB

Wi-Fi

145
Q

A customer states their laptop screen is very dim. In order to avoid going to the client site, which of the following is the FIRST action the customer should perform?

A

Use function keys

146
Q

A customer says they cannot access the network printer. The technician cannot PING the printer from their location. Which of the following should be the NEXT step in troubleshooting this issue?

A

Check the link lights on printer NIC

147
Q

A user has too many applications starting when they log into windows. From the command line, which of the following tools is the FASTEST option to prevent these applications from running on startup?

A

MSCONFIG

148
Q

From which of the following tools can a technician locate the PID of an application?

A

Task Manager

149
Q

A technician has a computer locked in a cabinet in the office that shares a printer and some files. The computer must remain on. Which of the following Control Panel options would be used to control the users that are able to shut the computer down?

A

Local security policy

150
Q

A customer states that another technician just removed some viruses and now they are not able to connect to websites such as Windows Update, but are able to connect to others. Which of the following is the MOST likely cause of the issue?

A

Host file has been manipulated

151
Q

Which of the following file system types is used for optical media?

A

CDFS

152
Q

A user has setup a SOHO and needs to implement a network configuration that allows for sharing of devices and files across the network without the complexity of a centralized server. Which of the following would be MOST appropriate?

A

WorkGroup

153
Q

A customer reports that their wireless laptop cannot connect after removing it from its carrying case. The laptop boots and the user is able to log in. Which of the following should be checked FIRST?

A

External antenna switch

154
Q

Which of the following supports IP telephony devices without requiring external power?

A

PoE

155
Q

A customer is concerned about a computer that repeatedly beeps when attempting to power on. Which of the following is MOST likely the cause?

A

RAM not seated properly

156
Q

A customer wants to use VoIP phones without having to plug them into an electrical outlet. Which of the following switch features would a technician recommend?

A

PoE

157
Q

A customer reports that after a technician cleaned up a rogue antivirus program, the customer cannot browse the web. Which of the following should the technician check to resolve the situation?

A

Proxy settings

158
Q

A technician has 50 identical computers that need to be upgraded to the Windows 7 OS, and are capable of booting from the network. They are running a Gigabit network with a Windows deployment server. Which of the following will be the BEST to use in this scenario?

A

PXE

159
Q

Browser redirection is caused by which of the following types of viruses?

A

Hijack

160
Q

A technician receives an error every time a workstation boots up. The technician needs to find out what process is responsible for the error. Which of the following utilities would be used FIRST?

A

Event Viewer

161
Q

Which of the following tools would be used to connect CAT5e cabling to a patch panel?

A

Punch down

162
Q

A user has a perimeter firewall and up-to-date antivirus software. The user is asking what else they can do to improve their security. Which of the following will have the MOST impact on network security? (Select TWO).

A

Assign security rights based on job roles

Use strong passwords

163
Q

A user states that when they power on their computer, they receive a “Non-bootable drive” error. The user works with external storage devices to transport data to their computer. The user stated that the computer worked fine the day before. Which of the following should be checked FIRST to resolve this issue?

A

Device boot order

164
Q

A service technician is installing a second hard drive on a desktop PC running Windows 7. The second hard drive is the same make and model of the first hard drive. The technician would like to provide data redundancy. Which of the following should the technician use to accomplish this?

A

Disk Management

165
Q

A technician is trying to troubleshoot an issue on a Windows 7 computer remotely, but is unable to PING the computer. The technician verified that the computer is turned on, has network connectivity, and can get to the Internet. Which of the following is MOST likely the issue?

A

Windows firewall is enabled

166
Q

An Internet browser’s cookie could be classified as which of the following?

A

Spyware

167
Q

A technician is working on a workstation that is receiving read/write failures when trying to access a particular file. Which of the following commands should the technician use to resolve this issue?

A

CHKDSK

168
Q

A technician is tasked with changing the account lockout threshold to 30 minutes in Windows 7. Which of the following should the technician use to accomplish this task?

A

Local Security Policy

169
Q

A technician needs to change the minimum password length to 8 characters to make it more secure. Which of the following system settings should the technician configure?

A

Local Security Policy

170
Q

A technician is creating an image that will be used to deploy Windows 7 to 100 PCs. Which of the following tools should be used to accomplish this?

A

SYSPREP

171
Q

A technician needs to create a new folder from the command line on the root of the C. drive. Which of the following is the correct command to use?

A

MD

172
Q

A technician notices a computer is overheating after 30 minutes of use. Which of the following is the MOST likely cause?

A

Internal dust buildup

173
Q

Which of the following should a technician do LAST after cleaning up a virus infection?

A

Educate the end user

174
Q

A user does not want their kids to be able to install software on their home desktop. Which of the following types of accounts should the user set up in Windows 7?

A

Standard

175
Q

A technician is about to put a computer back into service that has not been turned on for many months. It was healthy when taken out of service and boots quickly without any problems. Which of the following actions would be a best practice to begin computer maintenance? (Select TWO).

A

Run antivirus updates.

Run Windows updates.

176
Q

A technician discovers a networked computer has been infected with a zero day virus. Which of the following is the FIRST thing that should be done to the workstation?

A

Unplug it from the network.

177
Q

Which of the following is the BEST definition of what an accelerometer does?

A

Measures velocity in a given direction

178
Q

Which of the following are examples of physical security? (Select TWO).

A

Badges

Locked doors

179
Q

Which of the following scenarios BEST defines phishing?

A

A user receives an email from a person in another country with a story as to why they need help with a financial arrangement.

180
Q

Which of the following would be the BEST way to combat social engineering?

A

User education

181
Q

Which of the following components would a user MOST need when building a virtual server? (Select TWO).

A

RAM

CPU

182
Q

Which of the following commands would a technician use to map a network share?

A

NET

183
Q

A user is reporting their web browser is not going to the site they are attempting to access. Which of the following would BEST resolve this?

A

Ensure the user is not utilizing a proxy server.

184
Q

A technician is called onsite to solve a network connection error. Upon arrival, the technician observes a message on the screen stating there is no boot drive found. Which of the following steps should the technician take NEXT?

A

Restart the system to verify the proper boot sequence.

185
Q

The technician is dispatched to a user’s home to secure a wireless network. The SOHO user has only one system to connect wirelessly, yet wishes to protect their Wi-Fi from unauthorized use. Which of the following will BEST meet the user’s requirements?

A

Configure the router to allow access by MAC address.

186
Q

A user has installed a new wireless router and is unable to connect their game console to the manufacturer’s service. Which of the following should the technician look for FIRST?

A

Ensure the correct ports are open.

187
Q

A technician needs to use Remote Desktop Connection in order to get access to a remote Windows workstation. However, the Programs menu has been hidden and they only have access to the Run command utility or a command-line prompt. Which of the following is the utility that the technician should use to access Remote Desktop Connection?

A

MSTSC

188
Q

A user reports that they cleared a paper jam and now cannot print. The technician reseats the paper and then prints a test page from the printer. A test page sent from the workstation does not print. Which of the following actions should the technician take FIRST?

A

Clear the print queue.

189
Q

A workstation is making a loud clicking noise that is originating from the hard drive and it is not booting. Which of the following should the technician do FIRST?

A

Put the hard drive in another system and back up all data from it.

190
Q

A user is reporting that they cannot connect to the wireless network from their office but they were able to connect yesterday. Which of the following would be the MOST likely reason?

A

Radio switch on laptop is disabled

191
Q

A user on a domain network cannot install software that they need. Which of the following user groups is this user MOST likely associated with?

A

Standard user

192
Q

A user reports that their PC does not work. Which of the following would be the BEST question for the technician to ask the user to get further information?

A

“What exactly does not work?”

193
Q

A user reports that their PC boots up to a screen that reads “OS not found”. Which of the following would be the MOST likely cause of this problem?

A

The user has a USB key attached.

194
Q

A technician is working on an issue and has identified the problem and worked out the cause. Which of the following would MOST likely be the NEXT step the technician should make?

A

Establish a plan of action

195
Q

Which of the following paths would a technician use to map a network drive?

A

\servername\usershare

196
Q

Which of the following is considered a method of physical security?

A

Cipher locked doors

197
Q

A user is operating a virtual machine (VM) and discovers it has been infected with malware. Which of the following applies?

A

The VM can be shut down with no harm to the host PC.

198
Q

Which of the following ports MUST be open in order for Remote Desktop to function?

A

3389

199
Q

A technician is dispatched to a location that has multiple laser printers. One of the network printers is printing what appears to be a shadow image. The technician could solve this issue by:

A

replacing the drum.

200
Q

A user wants to quickly install the most recent security patch released. Which of the following options can be selected from the Windows Update website?

A

Express settings