Test B Flashcards

1
Q
  1. In which step of the CompTIA A + troubleshooting process would you question the user?

A. Identify the problem.
B. Establish a theory.
C. Establish a plan of action.
D. Document findings.

A

A. Identify the problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which of the following tools is used when setting the computer to boot with the Selective Startup feature?

A. Task Manager
B. Windows RE
C. Safe Mode
D. Msconfig

A

D. Msconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. You have been given the task of installing a new hard drive on a server for a customer. The customer will be supervising your work. Which of the following questions should be asked of the customer first?

A. “What is the administrator password?”
B. “Are there any current backups?”
C. “Do you want me to shut down the server?”
D. “Which version of Windows Server is this?”

A

B. “Are there any current backups?”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. You just upgraded the president’s computer’s video driver. Now, the Windows 8 system will not boot. Which of the following steps should be taken first?

A. Access Windows RE.
B. Boot into Safe Mode and roll back the driver.
C. Reinstall the operating system.
D. Boot into Directory Services Restore mode.

A

B. Boot into Safe Mode and roll back the driver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Which tool is used to analyze and diagnose a video card?

A. Device Manager
B. DxDiag
C. Services.msc
D. USMT

A

B. DxDiag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Which of the following is a feature of Windows 7 but not Windows Vista?

A. UAC
B. Aero
C. Application dock
D. Sidebar

A

C. Application dock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Where is registry hive data stored?

A. \% systemroot%\ Windows
B. \% systemroot%\ Windows\ System32\ Config
C. \% systemroot%\ System32
D. \% systemroot%\ System32\ Config

A

D. \% systemroot%\ System32\ Config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Which of the following statements best describes how to restart the Print Spooler service? (Select the two best answers.)

A. Enter net stop spooler and then net start spooler in the command line.
B. Enter net stop print spooler and then net start print spooler in the command line.
C. Go to Computer Management > Services and restart the Print Spooler service.
D. Go to Computer Management > Services and Applications > Services and restart the Print Spooler service.

A

A. Enter net stop spooler and then net start spooler in the command line.

D. Go to Computer Management > Services and Applications > Services and restart the Print Spooler service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Clinton needs a more secure partition on his hard drive. Currently, the only partition on the drive (C:) is formatted as FAT32. He cannot lose the data on the drive but must have a higher level of security, so he is asking you to change the drive to NTFS. Which of the following is the proper syntax for this procedure?

A. Change C: /FS:NTFS
B. Change C: NTFS /FS
C. Convert C: /FS:NTFS
D. Convert C: NTFS /FS

A

C. Convert C: /FS:NTFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Which of the following statements best describes a common risk when installing Windows drivers that are unsigned?

A. System stability may be compromised.
B. Files might be cross-linked.
C. The drive might become fragmented.
D. Physical damage to devices might occur.

A

A. System stability may be compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Which of the following utilities can be used to view the startup programs?

A. Ipconfig
B. Ping
C. Regedit
D. DxDiag

A

C. Regedit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Tom has a 200 GB hard drive partition (known as C:) on a Windows Vista computer. He has 20 GB free space on the partition. Which of the following statements best describes how he can defrag the partition?

A. He can run the Disk Defragmenter in Computer Management.
B. He can run defrag.exe –f in the command-line.
C. He can run defrag.exe –v in the command-line.
D. He can run defrag.exe –A in the command-line.

A

B. He can run defrag.exe –f in the command-line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Which of the following settings must be established when you want to make a secure wireless connection? (Select all that apply.)

A. The brand of access point
B. The wireless standard used
C. The encryption standard used
D. The SSID of the access point

A

C. The encryption standard used

D. The SSID of the access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Which Windows utility is used to prepare a drive image for duplication across the network?

A. XCOPY
B. SYSPREP
C. Ghost
D. Image Clone

A

B. SYSPREP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. In Windows, when will a computer dump the physical memory?

A. When the wrong processor is installed B. When a device is missing drivers
C. When the computer was shut down improperly
D. When the computer detects a condition from which it cannot recover

A

D. When the computer detects a condition from which it cannot recover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
16. When a person takes control of a session between a server and a client, it is known as which type of attack? 
A. DDoS 
B. Smurf 
C. Session hijacking 
D. Malicious software
A

C. Session hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. The message “The Windows Boot Configuration Data File Is Missing Required Information” appears on the screen. Which command can repair this issue?

A. bootrec /fixboot
B. bootrec /fixmbr
C. bootrec /rebuildbcd
D. boot\ bcd

A

C. bootrec /rebuildbcd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. Which of the following should be performed during a hard drive replacement to best maintain data privacy?

A. Completely erase the old drive prior to disposal.
B. Format the new hard drive twice prior to installation.
C. Only use FAT32 file systems when formatting the new drives.
D. Install antivirus software on the computer before removing the old hard drive.

A

A. Completely erase the old drive prior to disposal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  1. You are utilizing WSUS and are testing new updates on PCs. What is this an example of?

A. Host-based firewall
B. Application baselining
C. Patch management
D. Virtualization

A

C. Patch management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. Which of the following troubleshooting steps is next after determining the cause?

A. Document findings, actions, and outcomes
B. Verify full system functionality and, if applicable, implement preventative measures
C. Establish a plan of action to resolve the problem and implement the solution
D. Question the user and identify user changes

A

C. Establish a plan of action to resolve the problem and implement the solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  1. Which tool is used to back up data on the C: drive in Windows 8?

A. Backup and Restore
B. Backup Status and Configuration
C. Time Machine
D. File History

A

D. File History

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  1. Which of the following is the minimum processor requirement for Windows 7?

A. 800 MHz
B. 1 GHz
C. 2 GHz
D. 2 GB

A

B. 1 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  1. You create an answer file to aid in installing Windows. Which type of installation are you performing? (Select the best answer.)

A. Drive image installation
B. USB installation
C. Multiboot installation
D. Unattended installation

A

D. Unattended installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  1. How much free drive space is required to install Windows Vista?

A. 20 GB
B. 2 GB
C. 4 GB
D. 15 GB

A

D. 15 GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
  1. How much free drive space is required to install Windows 8? (Select the two best answers.)

A. 8 GB
B. 10 GB
C. 16 GB
D. 20 GB

A

C. 16 GB

D. 20 GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
  1. Which component of the Windows GUI specifically includes the clock and other programs that run in the background?

A. Quick Launch
B. Taskbar
C. Notification Area
D. Desktop

A

C. Notification Area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
  1. Which of the following procedures best describes how to open the Command Prompt as an administrator (known as elevated mode) in Windows 7/ Vista? (Select all that apply.)

A. Click Start > All Programs > Accessories; then right-click Command Prompt and select Run as Administrator.
B. Click Start > All Programs > Accessories; then right-click Command Prompt and select Run in elevated mode.
C. Click Start and type cmd in the search field, and instead of pressing Enter, press Ctrl + Shift + Enter.
D. Click Start and type cmd in Run prompt, and instead of pressing Enter, press Ctrl + Shift + Enter.

A

A. Click Start > All Programs > Accessories; then right-click Command Prompt and select Run as Administrator.

C. Click Start and type cmd in the search field, and instead of pressing Enter, press Ctrl + Shift + Enter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
  1. Which versions of Windows 8 allow for joining domains? (Select the two best answers.)

A. Standard
B. Pro
C. Ultimate
D. Enterprise

A

B. Pro

D. Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
  1. One of your customers reports that there is a large amount of spam in her e-mail inbox. Which of the following statements describes the best course of action to recommend to her?

A. Advise her to create a new e-mail account.
B. Advise her to add the senders to the junk e-mail sender list.
C. Advise her to find a new ISP.
D. Advise her to reply to all spam and opt out of future e-mails.

A

B. Advise her to add the senders to the junk e-mail sender list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
  1. In Windows, where can devices like the display and hard drives be configured to turn off after a certain amount of time?

A. Power plans
B. Display Properties
C. Computer Management
D. Task Manager

A

A. Power plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
  1. Which of the following procedures best describes how to find out which type of connection the printer is using?

A. Right-click the printer, select Properties, and click the Sharing tab.
B. Right-click the printer, select Properties, and click the Advanced tab.
C. Right-click the printer, select Properties, and click the Separator Page button.
D. Right-click the printer, select Properties, and click the Ports tab.

A

D. Right-click the printer, select Properties, and click the Ports tab.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
  1. Your customer is having problems printing from an application. You attempt to send a test page to the printer. Which of the following statements best describes why a test page should be used to troubleshoot the issue?

A. It allows you to see the quality of the printer output.
B. The output of the test page allows you to initiate diagnostic routines on the printer.
C. It verifies the connectivity and illuminates possible application problems.
D. It clears the print queue and resets the printer memory.

A

C. It verifies the connectivity and illuminates possible application problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
  1. A user’s hard drive seems very slow in its reaction time when opening applications. Which of the following statements best describes the most likely cause of this?
    A. The drive needs to be initialized.
    B. The temporary files need to be deleted.
    C. The drive is fragmented.
    D. The drive’s SATA data connector is loose.
A

C. The drive is fragmented.

34
Q
  1. Which of the following actions will not secure a functioning computer workstation?

A. Setting a strong password B. Changing default usernames
C. Disabling the guest account
D. Sanitizing the hard drive

A

D. Sanitizing the hard drive

35
Q
  1. Which utility enables you to implement auditing on a single Windows computer?

A. Local Security Policy
B. Group Policy Editor
C. AD DS
D. Services.msc

A

A. Local Security Policy

36
Q
  1. Which of the following statements best describes the function of a device driver?

A. Modifies applications
B. Works with memory more efficiently
C. Improves device performance
D. Allows the OS to talk to the device

A

D. Allows the OS to talk to the device

37
Q
  1. After installing Windows successfully, which of the following steps should be performed next? (Select the two best answers.)

A. Create policies.
B. Connect to WLANs.
C. Enable the Windows Firewall.
D. Run Windows Update.

A

C. Enable the Windows Firewall.

D. Run Windows Update.

38
Q
  1. Where are restore points stored after they are created?

A. The Recycler folder
B. The System32 folder
C. The %systemroot% folder
D. The System Volume Information folder

A

D. The System Volume Information folder

39
Q
  1. Which of the following are types of social engineering? (Select the two best answers.)

A. Malware
B. Shoulder surfing
C. Tailgating
D. Rootkits

A

B. Shoulder surfing

C. Tailgating

40
Q
  1. Which of the following is the service that controls the printing of documents in a Windows computer.

A. Printer
B. Print server
C. Print pooling
D. Print Spooler

A

D. Print Spooler

41
Q
  1. Which of the following is the best way to ensure that a hard drive is secure for disposal?

A. Magnetically erase the drive.
B. Format the drive.
C. Run bootrec /fixmbr.
D. Convert the drive to NTFS.

A

A. Magnetically erase the drive.

42
Q
  1. A month ago, you set up a wireless access point/ router for a small business that is a customer of yours. Now, the customer calls and complains that Internet access is getting slower and slower. As you look at the WAP/ router, you notice that it was reset at some point and is now set for open access. You then guess that neighboring companies are using the service connection. Which of the following statements best describes how you can restrict access to your customer’s wireless connection? (Select the two best answers.)

A. Configure the wireless access point to use WPA2.
B. Configure MS-CHAP on the WAP/ router. C. Disable SSID broadcasting.
D. Move the WAP/ router to another corner of the office.

A

A. Configure the wireless access point to use WPA2.

C. Disable SSID broadcasting.

43
Q
  1. A first-level help desk support technician receives a call from a customer and works with the customer to resolve the call for several minutes but the technician is unsuccessful. Which of the following steps should the technician perform next?

A. The technician should explain to the customer that he will receive a callback when someone more qualified is available.
B. The technician should escalate the call to another technician.
C. The technician should explain to the customer that the problem cannot be resolved and end the call.
D. The technician should continue working with the customer until the problem is resolved.

A

B. The technician should escalate the call to another technician.

44
Q
  1. A customer complains that there is nothing showing on the display of his laptop. Which of the following should you attempt first on the computer?

A. You should replace the inverter.
B. You should reinstall the video drivers.
C. You should boot into Safe mode.
D. You should check whether the laptop is in Standby or Hibernate mode.

A

D. You should check whether the laptop is in Standby or Hibernate mode.

45
Q
  1. During an installation of Windows 7, you are given an opportunity to load alternative third-party drivers. Which device are you most likely loading drivers for?

A. CD-ROM
B. SCSI drive
C. USB mouse
D. BIOS/ UEFI

A

B. SCSI drive

46
Q
  1. A Windows 8 computer in a Windows workgroup can have how many concurrent connections?

A. 10 or fewer
B. 15 or fewer
C. 20 or fewer
D. 25 or fewer

A

C. 20 or fewer

47
Q
  1. Megan’s laptop runs perfectly when at work, but when she takes it on the road, it cannot get on the Internet. Internally, the company uses static IP addresses for all computers. What should you do to fix the problem?

A. Tell Megan to get a wireless cellular card and service.
B. Tell Megan to use DHCP.
C. Tell Megan to configure the alternate configuration tab of TCP/ IP properties.
D. Configure a static IP address in the Alternate Configuration tab of the user’s TCP/ IP properties and enable DHCP in the General tab.

A

D. Configure a static IP address in the Alternate Configuration tab of the user’s TCP/ IP properties and enable DHCP in the General tab.

48
Q
  1. Before implementing a solution to a problem, which of the following should be done?

A. Verify full system functionality.
B. Perform a system backup.
C. Test the solution.
D. Document the solution.

A

B. Perform a system backup.

49
Q
  1. Which power-saving mode enables for the best power savings, while still allowing the session to be reactivated later?

A. Standby
B. Suspend
C. Hibernate
D. Shutdown

A

C. Hibernate

50
Q
  1. John’s computer has two hard drives, each 300 GB. The first is the system drive and is formatted as NTFS. The second is the data drive and is formatted as FAT32. Which of the following statements are true? (Select the two best answers.)

A. Files on the system drive can be secured.
B. Larger logical drives can be made on the data drive.
C. The cluster size is larger, and storage is more efficient on the system drive.
D. The cluster size is smaller, and storage is more efficient on the system drive.

A

A. Files on the system drive can be secured.

D. The cluster size is smaller, and storage is more efficient on the system drive.

51
Q
  1. When using the command-line, a switch ______.

A. enables the command to work across any operating system
B. is used in application icons
C. changes the core behavior of a command, forcing the command to perform unrelated actions
D. alters the actions of a command, such as widening or narrowing the function of the command

A

D. alters the actions of a command, such as widening or narrowing the function of the command

52
Q
  1. A co-worker was installing a new program when the Windows 7 computer suddenly restarted. Now, when the computer starts, it gets partially through the boot process and then reboots. Which of the following is the quickest method to get the computer running without losing any of the user’s data?

A. Reinstall the OS.
B. Boot using Last Known Good configuration.
C. Boot into Safe Mode and perform a Windows System Restore.
D. Perform a factory restore.

A

B. Boot using Last Known Good configuration.

53
Q
  1. You need to view any application errors that have occurred today. Which tool should be used?

A. Event Viewer
B. Local Security Policy
C. Msconfig
D. sfc /scannow

A

A. Event Viewer

54
Q
  1. Which of the following commands can help you modify the startup environment?

A. Msconfig
B. Ipconfig
C. Boot Config Editor
D. Registry Editor

A

A. Msconfig

55
Q
  1. Which of the following log files references third-party software error messages?

A. Security log
B. System log
C. Application log
D. Setuperr.log

A

C. Application log

56
Q
  1. Which of the following provides the lowest level of wireless security protection?

A. Disable the SSID broadcast.
B. Use RADIUS.
C. Use WPA2.
D. Enable WEP on the wireless access point.

A

A. Disable the SSID broadcast.

57
Q
  1. A customer uses an unencrypted wireless network. One of the users has shared a folder for access by any computer. The customer complains that files sometimes appear and disappear from the shared folder. Which of the following statements best describes how to fix the problem? (Select the two best answers.)

A. Enable encryption on the router and the clients.
B. Encrypt the drive that has the share using EFS (Encrypting File System).
C. Increase the level of security on the NTFS folder by changing the permissions.
D. Change the share-level permissions on the shared folder.

A

A. Enable encryption on the router and the clients.

C. Increase the level of security on the NTFS folder by changing the permissions.

58
Q
  1. A customer is having difficulties with his hard drive, and the system won’t boot. You discover that the operating system has to be reloaded. Which of the following statements best describes how to explain this to the customer?

A. “I need to rebuild the computer.”
B. “I need to format the hard drive and reload the software.”
C. “I need to run a bootrec /fixmbr on the computer.”
D. “I need to restore the system; data loss might occur.”

A

D. “I need to restore the system; data loss might occur.”

59
Q
  1. Which of the following commands makes a duplicate of a file?

A. Move
B. Copy
C. Dir
D. Ls

A

B. Copy

60
Q
  1. Which of the following is the correct sequence to install a keyboard layout in Windows 7?

A. Control Panel > Display
B. Control Panel > Region and Language > Keyboards and Languages > Change Keyboards
C. Control Panel > Languages and Region > Personalization
D. Control Panel > Region and Language > Change Keyboard

A

B. Control Panel > Region and Language > Keyboards and Languages > Change Keyboards

61
Q
  1. Which tool in Windows enables a user to easily see how much memory a particular process uses?

A. System Information Tool
B. Registry
C. Task Manager
D. Performance Monitor

A

C. Task Manager

62
Q
  1. Windows was installed on a computer with two hard drives: a C: drive and a D: drive. Windows is installed to C:, and it works normally. The user of this computer complains that his applications are drive intensive and that they slow down the computer. Which of the following statements best describes how to resolve the problem?

A. Move the paging file to the D: drive.
B. Reinstall Windows on the D: drive rather than on the C: drive.
C. Defrag the D: drive.
D. Decrease the paging file size.

A

A. Move the paging file to the D: drive.

63
Q
  1. Which of the following tools should be used to protect a computer from electrostatic discharge (ESD) while you are working inside it?

A. Multimeter
B. Crimper
C. Antistatic wrist strap
D. PSU tester

A

C. Antistatic wrist strap

64
Q
  1. You are running some cable from an office to a computer located in a warehouse. As you are working in the warehouse, a 55-gallon drum falls from a pallet and spills what smells like ammonia. Which of the following statements best describes the first step you should take in your efforts to resolve this problem?

A. Call 911.
B. Call the building supervisor.
C. Get out of the area.
D. Save the computer.

A

C. Get out of the area.

65
Q
  1. While you are upgrading a customer’s server hard drives, you notice looped network cables lying all over the server room floor. Which of the following statements best describes how to resolve this issue?

A. Ignore the problem.
B. Call the building supervisor.
C. Tell the customer about safer alternatives.
D. Notify the administrator.

A

C. Tell the customer about safer alternatives.

66
Q
  1. Which of the following statements best describes the recommended solution for a lithium-ion battery that won’t hold a charge any longer?

A. Throw it in the trash.
B. Return it to the battery manufacturer.
C. Contact the local municipality and inquire as to their disposal methods.
D. Open the battery and remove the deposits.

A

C. Contact the local municipality and inquire as to their disposal methods.

67
Q
  1. Which of the following statements is not assertive communication?

A. “I certainly know how you feel— losing data is a terrible thing.”
B. “Could you explain again exactly what you would like done?”
C. “Do your employees always cause issues on computers like these?”
D. “What can I do to help you?”

A

C. “Do your employees always cause issues on computers like these?”

68
Q
  1. A customer has a malfunctioning PC, and as you are about to begin repairing it, the customer proceeds to tell you about the problems with the server. Which of the following statements best describes how to respond to the customer?

A. “Wait until I finish with the PC.”
B. “I’m sorry, but I don’t know how to fix servers!”
C. “Is the server problem related to the PC problem?”
D. “I have to call my supervisor.”

A

C. “Is the server problem related to the PC problem?”

69
Q
  1. Which of the following could be described as the chronological paper trail of evidence?

A. First response
B. Chain of custody
C. Setting and meeting expectations
D. Data preservation

A

B. Chain of custody

70
Q
  1. Which of the following statements best describes how what not to do when moving servers and server racks?

A. Remove jewelry.
B. Move a 70-pound wire rack by yourself.
C. Disconnect power to the servers before moving them.
D. Bend at the knees and lift with your legs.

A

C. Disconnect power to the servers before moving them.

71
Q
  1. Active communication includes which of the following?

A. Filtering out unnecessary information
B. Declaring that the customer doesn’t know what he or she is doing
C. Clarifying the customer’s statements
D. Mouthing off

A

C. Clarifying the customer’s statements

72
Q
  1. You are troubleshooting a tablet PC that has a frozen application. You have attempted to end the underlying task of the application but have not succeeded. Which of the following statements best describes the next recommended course of action?

A. Hard reset
B. Force quit the app
C. Soft reset
D. Bring the tablet to an authorized service center.

A

C. Soft reset

73
Q
  1. Which of the following statements best describes the first course of action to removing malware?
A. Identify malware symptoms. 
B. Quarantine infected systems. 
C. Disable System Restore. 
D. Remediate infected systems. 
E. Schedule scans and run updates. 
F. Enable System Restore. 
G. Educate the end user.
A

A. Identify malware symptoms.

74
Q
  1. A customer reports that an optical drive in a PC is no longer responding. Which of the following statements best describes the first question you should ask the customer?

A. “What has changed since the optical drive worked properly?”
B. “Did you log in with your administrator account?”
C. “What did you modify since the optical drive worked?”
D. “Have you been to any inappropriate websites?”

A

A. “What has changed since the optical drive worked properly?”

75
Q
  1. A co-worker is traveling to Europe and is bringing her desktop computer. She asks you what safety concerns there might be. Which of the following statements best describes how to respond to the customer?

A. Advise her that the computer is not usable in other countries.
B. Advise her to check for a compatible power adapter for that country.
C. Advise her to use a line conditioner for the correct voltage.
D. Advise her to check the voltage selector on the power supply.

A

D. Advise her to check the voltage selector on the power supply.

76
Q
  1. After removing malware/ spyware from a customer’s PC for the third time, which of the following steps should be taken next?

A. Tell him you can’t fix the system again.
B. Do nothing; the customer pays every time.
C. Show him how to avoid the problem.
D. Change his user permissions.

A

C. Show him how to avoid the problem.

77
Q
  1. Which of the following is the most important consideration when installing Windows 7 Ultimate 64-bit?

A. Memory type
B. Processor speed
C. Memory speed
D. Processor type

A

D. Processor type

78
Q
  1. You are asked to fix a problem with a customer’s Active Directory Domain Services domain controller that is outside the scope of your knowledge. Which of the following statements best describes the recommended course of action?

A. Learn on the job by trying to fix the problem.
B. Tell the customer that the problem should be reported to another technician. C. Assure the customer that the problem will be fixed very soon.
D. Help the customer find the appropriate channels to fix the problem.

A

D. Help the customer find the appropriate channels to fix the problem.

79
Q
  1. When working on a computer, which of the following should be disconnected to prevent electrical shock? (Select the two best answers.)

A. Printer
B. Mouse
C. Telephone cord
D. Power cord

A

C. Telephone cord

D. Power cord

80
Q
  1. You are troubleshooting a Windows Server 2012 computer that you have little knowledge about. The message on the screen says that there is a “DHCP partner down” error. There are no other technicians available to help you and your manager wants the server fixed ASAP or you are fired. Which of the following statements best describes the recommended course of action? (Select the two best answers.)
A. Identify the problem. 
B. Escalate the problem. 
C. Establish a plan of action. 
D. Call tech support. 
E. Verify full system functionality. 
F. Test the theory to determine cause.
A

A. Identify the problem.

D. Call tech support.