Professional Documents
Culture Documents
0)
DRAM
RAM
ROM
SRAM
Which two considerations would be of the greatest importance when building a workstation that will run multiple virtual machines? (Choose two.)
water cooling
amount of RAM
digital camera
printer
speakers
projector
headphones
keyboard
fingerprint scanner
monitor
mouse
printer
A user playing a game on a gaming PC with a standard EIDE 5400 RPM hard drive finds the performance unsatisfactory. Which hard drive upgrade would improve performance while providing more reliability and using less power?
an SSD
Which hardware upgrade would allow the processor in a gaming PC to provide the optimal gaming performance?
liquid cooling
Which two storage devices use a magnetic medium for storing data? (Choose two.)
tape drive
network interface
sound
video
RAID
Which component controls the communications and interactions between the CPU and other components on the motherboard?
RAM
CMOS
chipset
BIOS
10
Which two pieces of information are needed before selecting a power supply? (Choose two.)
11
Which memory module has a front side bus speed of 200 MHz?
DDR3-667
PC100 SDRAM
DDR-400
DDR-333
12
What are two factors that must be considered when choosing a computer case? (Choose two.)
1 3
14
gigabytes
15
Refer to the exhibit. Which type of video card expansion slot is depicted?
PCIe
ISA
PCI
AGP
16
What type of connector can be used to connect an eSATA interface to an external SATA drive?
7-pin connector
9-pin connector
15-pin connector
5-pin connector
17
Where can the input voltage selection be changed from 110 volts to 220 volts on a computer system?
on the motherboard
in the BIOS
1 8
19
USB
parallel
FireWire
serial
20
Which two activities are normally controlled by the Northbridge part of the chipset? (Choose two.)
21 A technician looks at a motherboard and sees a 24-pin connector. What component would connect to the motherboard through the use of this 24-pin connector?
power supply
SATA drive
video card
floppy drive
Which tool in Windows XP gives a technician access to initialize disks and create partitions?
Defrag
Scandisk
Format
Disk Management
Disk Cleanup
Which Windows XP command-line utility scans the critical files of the operating system and replaces any files that have been corrupted?
Disk Cleanup
Scan System
Defrag
Disk Management
Chkdsk
Which two types of tools can help protect a computer from malicious attacks? (Choose two.)
Disk Management
Spyware Remover
Antivirus software
Disk Cleanup
Scandisk
Fdisk
A technician wants to limit the chances of ESD affecting the workspace. Which three precautions should be taken? (Choose three.)
infrared mice
electrical storms
RAM modules
power lines
LCD monitors
isopropyl alcohol
rubbing alcohol
Why should a pencil never be used as a tool when working inside a computer?
The performance of a computer is reduced after using the Internet. Which three tools could be run to try to
Fdisk
a BIOS updater
Spyware remover
Defrag
Disk Cleanup
Device Manager
10
Why is documentation of all services and repairs an important organizational tool for a technician?
It provides reference material for similar problems when they are encountered in the future.
11
How does an inline UPS protect computer equipment against electrical power brownouts and blackouts?
12
Which two actions pose a potential safety hazard to a technician? (Choose two.)
13
14
torx driver
phillips screwdriver
hex driver
15
Which tool could potentially cause data loss on hard disk or floppy drives?
compressed air
a magnetic screwdriver
a lead pencil
16
Which condition refers to a reduced voltage level of AC power that lasts for an extended period of time?
sag
spike
surge
brownout
17
A technician accidentally spills a cleaning solution on the floor of the workshop. Where would the technician find instructions on how to properly clean up and dispose of the product?
the regulations provided by the local occupational health and safety administration
18
microwaves
cordless phones
home theaters
Blu-ray players
19
What is a proper directive for using a can of compressed air to clean a PC?
Do not spray the compressed air with the can upside down.
Spray the CPU cooling fan with the compressed air to verify that the fan blade is spinning freely.
slotted screw
torx bolt
A technician has just finished assembling a new computer. When the computer is powered up for the first time, the POST discovers a problem. How does the POST indicate the error?
The LED on the front of the computer case flashes a number of times.
A technician is troubleshooting a PC that will not boot. When the PC is powered on, it emits a series of beeps and indicates that the BIOS settings have changed and need to be reconfigured. The technician reconfigures the BIOS settings, saves them, and the computer boots. Later when the PC is powered off and back on again, the same error message appears, and all the BIOS changes are gone. What should the technician do to fix the problem?
What type of connector would be used to supply power to an PATA optical drive?
PS/2
AT
Berg
Molex
What is the best way to apply thermal compound when reseating a CPU?
Put a thick layer of thermal compound over the existing thermal compound before reseating the CPU.
Clean the CPU and the base of the heat sink with isopropyl alcohol before applying the thermal compound.
Scrape off the old thermal compound on the heat sink with a sharp knife and apply the thermal compound liberally.
Change the base of the heat sink before applying the thermal compound.
Use rubbing alcohol to clean the base of the heat sink before applying thermal compound.
A technician has assembled a new computer and must now configure the BIOS. At which point must a key be pressed to start the BIOS setup program?
A technician has just finished assembling a new computer. When the computer is powered up for the first time, the POST discovers a video subsystem problem. How does the POST indicate the error?
by flashing the LED on the front of the computer case a number of times
You are monitoring a new technician who is installing a device driver on a Windows-based PC. The technician asks why the company requires the use of signed drivers. What would be the best response to give?
A signed driver has been approved by the company that created the device driver.
A signed driver has passed the lab test of Microsoft for quality and helps prevent a system from being compromised.
All companies making devices for a Windows computer have to have Microsoft sign off on the new driver before it can be added to the operating system.
What is an important step when installing a second PATA hard drive in a computer?
Ensure that pin one of the PATA data cable is correctly aligned with the connector.
10
11
A technician is assembling a new computer. Which two components are often easier to install before mounting the motherboard in the case? (Choose two.)
sound card
video card
CPU
NIC
memory
12
A technician is troubleshooting a computer that has a malfunctioning floppy drive. The technician observes that the floppy drive light remains lit constantly. What should the technician do to repair the problem?
Connect the data cable making sure that the colored stripe on the cable is aligned with pin 1 on the drive and the motherboard.
13
A technician is installing additional memory in a computer. How can the technician guarantee that the memory is correctly aligned?
The label on the memory module should always face the CPU.
The arrows on the memory module should be aligned with the arrows on the motherboard slot.
A notch in the memory module should be aligned with a notch in the memory slot.
Memory slots are color coded, with one end red and one end blue.
14
What is used to prevent the motherboard from touching metal portions of the computer case?
ZIF sockets
an I/O shield
thermal compound
standoffs
15
16
hard drive
cache
CMOS
RAM
17
It makes the I/O ports of the motherboard available for connection in a variety of computer cases.
It provides multiple connections for SATA hard drives to connect to the motherboard.
It plugs into the motherboard and expands the number of available slots for adapter cards.
It connects the PCIe adapter slots used for video directly to the CPU for faster processing.
18
What are two examples of settings that can be changed in the CMOS settings? (Choose two.)
boot order
device drivers
19
A technician discovers that the PS/2 mouse port is not working. The technician has several replacement mouse models available. What input port will the technician use to install the replacement mouse?
parallel
USB
FireWire
eSATA
20
What are three important considerations when installing a CPU on a motherboard? (Choose three.)
The CPU heat sink and fan assembly are correctly installed.
Maximum insertion force is applied to the load lever so the CPU is locked in place.
21
A technician has been asked to install a second optical drive in a computer. The technician will need to configure the drive as slave. How can the technician accomplish this desired configuration?
Back up the data, reformat the hard drive, and reinstall the data.
What is the purpose of documenting the information that is obtained from the customer in the work order?
Blow compressed air on cooling fans so that they will spin when dust is being removed.
After a technician tests a theory of probable causes, what two actions should the technician take if the testing did not identify an exact cause? (Choose two.)
Document each test tried that did not correct the problem.
Test all remaining possible causes starting with the most complex.
Which device is most likely to be affected by an incorrect setting saved in CMOS or an incorrect jumper setting?
hard drive
printer
power supply
monitor
A technician is performing hardware maintenance of PCs at a construction site. What task should the technician perform as part of a preventive maintenance plan?
Back up the data, reformat the hard drive, and reinstall the data.
A user has opened a ticket that indicates that the computer clock keeps losing the correct time. What is the most likely cause of the problem?
Which two common computer problems could cause a motherboard to short-circuit? (Choose two.)
An employee reports that each time a workstation is started it locks up after about 5 minutes of use. What is the most likely cause of the problem?
10
An employee reports that the antivirus software cannot obtain updates. The support technician notices that the license for the software has expired. The technician adds a new license to the software and completes the update service. What should the technician do next?
Review the Event Viewer for the date and time that the last software update was performed.
11
Which two items could be used to help establish a plan of action when resolving a computer problem? (Choose two.)
BIOS diagnostics
a multimeter
a loopback plug
12
After a new PCIe video card is added, the computer seems to boot successfully but it will not display any video. The computer was working properly before the new video card was installed. What is the most likely cause of the problem?
The saved CMOS settings are set to use the built-in video adapter.
The PC does not have enough RAM to support the new video card.
The new video card is not compatible with the CPU in the PC.
13
A scientific expedition team is using laptops for their work. The temperatures where the scientists are working range from -13 degrees Fahrenheit (-25 degree Celsius) to 80 degrees Fahrenheit (27 degrees Celsius). The humidity level is around 40 percent. Noise levels are low, but the terrain is rough and winds can reach 45 miles per hour (72 kilometers per hour). When needed, the scientists stop walking and enter the data using the laptop. Which condition is most likely to adversely affect a laptop that is used in this environment?
the wind
the humidity
the temperature
14
15
What is the preferred method to remove a disc from an optical drive that fails to eject the disc?
Insert a pin into the small hole on the front of the drive.
16
A customer reports that recently several files cannot be accessed. The service technician decides to check the hard disk status and the file system structure. The technician asks the customer if a backup has been performed on the disk and the customer replies that the backup was done a week ago to a different logical partition on the disk. What should the technician do before performing diagnostic procedures on the disk?
Install a new hard disk as the primary disk, then make the current disk a slave.
Perform file restore from the existing backup copy at the logical partition.
17
During the process of testing a theory of several probable causes to a problem, which should be tested first?
18
During the troubleshooting of a PC that will not boot, it is suspected that the problem is with the RAM modules. The RAM modules are removed and put into another PC, which successfully powers on. The RAM modules are then put back into the original PC and it now successfully powers on as well. What was the most likely cause of the problem?
The RAM modules were inserted backwards into the DIMM slots.
19
Which component can be easily damaged by the direct spray of compressed air when cleaning the inside the computer case?
cable connectors
power supply
fan
heat sink
CPU
20
Which step of the six-step troubleshooting process is where a technician would ask the computer user to print a document on a newly installed printer?
Establish a plan of action to resolve the problem and implement the solution.
21
Which two types of data should be backed up before troubleshooting a computer for a customer? (Choose two.)
22 A web designer installed the latest video editing software and now notices that when the application loads, it responds slowly. Also the hard disk LED is constantly flashing when the application is in use. What is a solution to solve the performance problem?
replacing the video card with a model that has a DVI output
chapter5
What are two features of the active partition of a hard drive? (Choose two.)
The operating system uses the active partition to boot the system.
Which Windows administrative tool displays the usage of a number of computer resources simultaneously and can help a technician decide if an upgrade is needed?
Services
Performance Monitor
Component Services
Event Viewer
A Windows computer locks with a stop error during startup then automatically reboots. The rebooting is making it difficult to see any error messages. What can be done so that the error messages can be viewed?
Use the Event Log and other diagnostic utilities to research the stop error messages.
View the error messages and recover the system using the System Image Recovery tool.
In Safe Mode use the Advanced Startup Options menu to disable the auto restart function.
Use the Last Known Good Configuration option to restart the operating system.
web browsing
managing application s
program compilation
text processing
What two terms can be used to describe the Windows Virtual PC? (Choose two.)
server consolidation
hypervisor
A technician has loaded an incorrect video driver on a Windows 7 computer. How can the technician revert to a previous driver?
Select the video adapter card Properties in Device Manager, select the Driver tab, and click Roll Back Driver.
Use the Devices and Printers control panel to right-click on the monitor, and select Properties.Select Roll Back Driver.
Use regedit to remove the information about the graphics driver from the registry.
Which two Windows utilities can be used to help maintain hard disks on computers that have had long periods of normal use? (Choose two.)
Disk Cleanup
Disk Format
Disk Maintenance
Disk Partition
Disk Defragmenter
Which command is used from the Windows command prompt to schedule a program to run at a specific time?
TASKKILL
AT
CMD
TASKLIST
A user notices that some of the programs that are installed before upgrading to Windows 7 no longer function properly after the upgrade. What can the user do to fix this problem?
Lower the UAC setting in the Change User Account Control settings dialog box of the User Accounts control.
10
A technician notices that a program that is listed in the registry of a Windows computer is not found on that computer. What is a possible solution to the problem?
11
Which Windows 7 feature allows a user to view the contents of the desktop by moving the mouse to the right edge of the taskbar?
thumbnail previews
Search
jump lists
Shake
Snap
Aero Peek
12
A computer with the Windows 7 operating system fails to boot when the system is powered on. The technician suspects that the operating system has been attacked by a virus that rendered the system inoperable. What measure could be taken to restore system functionality?
Run chkdsk on the affected drive to restore system files to their post-installation state.
Use a system image that was created prior to the failure to restore the system.
13
After upgrading a computer to Windows 7, a user notices that the UAC (User Account Control) panel appears more frequently. How can the user reduce the frequency with which the UAC appears?
Replace the graphics card with one that meets the minimum hardware requirements for Windows 7.
In the Performance Options dialog box of the Performance Information and Tools control panel, choose Adjust for Best Performance.
Lower the UAC setting in the Change User Account Control settings dialog box of the User Accounts
control panel.
14
32 GB maximum
64 GB maximum
16 GB maximum
4 GB maximum
128 GB or more
15
What is the term for the ability of a computer to run multiple applications at the same time?
multitasking
multiuser
multiprocessing
multimedia
16
A Windows XP system is unable to boot properly. What is the procedure to use to boot this system into Safe Mode?
Reboot the system, press and hold F8 until a menu is displayed, and then choose Safe Mode.
Run the MSCONFIG utility and choose the option Selective Startup.
17
A technician has installed a new video driver on a Windows XP computer and now the monitor shows distorted images. The technician needs to install a different video driver that is available on a network server. What startup mode should the technician use to access the driver on the network?
Debugging Mode
Safe Mode
18
A technician needs to upgrade the file system on a Windows XP computer from FAT32 to NTFS without losing user data. Which course of action should be taken to upgrade the file system to NTFS?
Use the Disk Management utility to convert the drive from Basic to Dynamic, which changes the file system to NTFS automatically.
Reformat all of the existing partitions and use the NTFS file system.
Reinstall Windows XP and to format the drive choose NTFS when prompted .
19
Type 1
Type 2
Type 3
Type 4
20
A college uses virtualization technology to deploy information security courses. Some of the lab exercises involve studying the characteristics of computer viruses and worms. What is an advantage of conducting the lab exercises inside the virtualized environment as opposed to using actual PCs?
The viruses and worms will have limited functionality inside the virtualized environment.
Virus and worm attacks are more easily controlled in a virtualized environment, thus helping to protect the college network and its devices from attack.
The lab exercises are performed faster inside of the virtualized environment.
21
What are two advantages of the NTFS file system compared with FAT32? (Choose two.)
22
Which two statements are true about restore points? (Choose two.)
A technician should always create them after updating the operating system.
They are useful to restore the computer to an earlier time when the system worked properly.
They contain information about the system and registry settings that are used by the Windows operating system.
23
A user notices that a PC is running slowly and exhibits a delayed response to keyboard commands. What is a probable cause of this symptom?
The video card does not support the resolution that is being used.
Which network device makes forwarding decisions based on the destination MAC address that is contained in the frame?
repeater
hub
switch
router
A customer is considering a multipurpose device to create a home network. Which three devices are usually integrated into a multipurpose network device? (Choose three.)
email server
router
switch
web server
print server
Which technology would be recommended for a business that requires workers to access the Internet while visiting customers at many different locations?
ADSL
VPN
cellular
ISDN
Which type of connection to the Internet is capable of the fastest transfer rates?
ISDN BRI
dial-up
ISDN PRI
cable
ABC Company requires preventive maintenance for all local network cabling once a year. Which task should be included in the preventive maintenance program?
immediately turning off a network device if the network device is making an unusual sound
using cable supports to identify the devices to which the cables are connected
not doing preventive maintenance regularly if the maintenance interrupts network activity
A technician is troubleshooting a problem where the user claims access to the Internet is not working, but there was access to the Internet the day before. Upon investigation, the technician determines that the user cannot access the network printer in the office either. The network printer is on the same network as the computer. The computer has 169.254.100.88 assigned as an IP address. What is the most likely problem?
10
Bluetooth
coaxial cabling
11
Which three layers of the OSI model map to the application layer of the TCP/IP model? (Choose three.)
data link
application
network
transport
physical
session
presentation
12
of the device?
ba01
0607:1234:aa10:ba01
2001:0DB8:75a3
2001:0DB8
13
low overhead
error correction
guaranteed delivery
14
What would be a disadvantage of configuring a wireless router or access point to operate only in accordance with the 802.11g protocol standard?
802.11a wireless devices will not be able to connect to the wireless network.
The 802.11g standard does not support advanced network security features.
15
What is the maximum segment length that is specified by the 1000BASE-T standard?
1640 ft (500 m)
984 ft (300 m)
328 ft (100 m)
3280 ft (1000 m)
607 ft (185 m)
16
17
Which three factors are reasons for a company to choose a client/server model for a network instead of peerto-peer? (Choose three.)
All employees passed a strict background check as part of the corporate hiring practices.
The data gathered by the employees is critical and should be backed up on a regular basis.
The users need a central database to store inventory and sales information.
18
increased security
decentralized administration
resource sharing
simplified troubleshooting
19
when it is connected to a PC
20
A user can print to a printer that is on the same network, but the traffic of the user cannot reach the Internet. What is a possible cause of the problem?
21
22
A user installs a new gigabit NIC in a PC. The user notices that the data transfer rate is much slower than expected. What should the user do to fix the problem?
Change the NIC duplex setting from half duplex to full duplex.
23 A company adds a few refurbished computers to a network. The company finds, however, that the refurbished computers perform significantly worse than the original networked computers do. The original computers performed much faster with applications that required the transfer of data over the network. What should the company technicians do?
Check if the network interface cards in the refurbished computers are limited to 10 Mb/s.
Which two statements are true of a laptop CPU when compared to a desktop CPU? (Choose two.)
In the power management settings, which two devices can be set to turn off to conserve battery power? (Choose two.)
cooling fans
memory
display
CPU
What can a user do to reconnect a laptop to a functioning wireless network after a laptop has been moved and the connection has been lost?
An administrator tries to configure Power Options within Windows, but is unable to do so. What is the possible cause?
The administrator does not have user privileges to change the settings.
A technician is trying to remove a SODIMM module from a laptop. What is the correct way to do this?
Press outward on the clips that hold the sides of the SODIMM.
10
Which two internal expansion slots in laptops are commonly used to install wireless adapter cards? (Choose
two.)
ISA
PCIe
Mini-PCIe
PCI
11
What is the next step in the troubleshooting process after a solution has been implemented on a laptop?
12
A technician notices that a laptop display appears stretched and pixelated. What is a probable cause of this?
13
Most of the internal components that are designed for laptops cannot be used for desktops.
14
overclocking
15
16
Which key sequence may be used to control whether the content of the screen will be presented on a built-in display or on an external display?
Fn + <display>
Shift + <display>
Ctrl + <display>
Alt + <display>
17
What would be the most effective preventive maintenance routine for company laptops that are subject to high use?
18
car wax
rubbing alcohol
cotton swabs
ammonia
19
A technician has been asked to decide which laptop components should be cleaned on a monthly basis as part of a maintenance routine. What are two examples of components that should be included? (Choose two.)
CPU
exterior case
keyboard
RAM
20
A technician has installed a wireless Ethernet card in a Windows 7 laptop. Where would the technician configure a new wireless connection?
Control Panel > Networking and Sharing Center > Set up a new connection or network
21
Which component or components would be interchangeable between a laptop and and a desktop PC?
CPU
peripheral devices
motherboard
power supply
22 A user needs to connect a Bluetooth device to a laptop. Which type of cable is needed to accomplish this?
USB cable
parallel cable
VGA cable
iTunes
freeware sites
Google Play
What two functions can be performed with the home button on an iOS mobile device? (Choose two.)
What are two potential user benefits of rooting or jailbreaking a mobile device? (Choose two.)
The operating system can be fine-tuned to improve the speed of the device.
What are two purposes of the passcode lock feature on mobile devices? (Choose two.)
Flash memory has a drive head that moves, reducing the seek time to locate data.
Flash memory requires very little power to store and retrieve data.
What are two touchscreen characteristics that are used by most mobile devices? (Choose two.)
an electrical field of the screen that is interrupted when the user touches the screen
three layers responsible for conducting electricity with a small air gap between them
memory card
RAM
touchscreen
CPU
When a problem appears with a mobile device, the owner should analyze if it is cost-effective to fix it.
Mobile devices change so rapidly in design and functionality it is always better to replace the device rather than repair it.
Mobile device problems always result in sending the device to the manufacturer for troubleshooting.
Every time a mobile devices freezes, the owner can reinitialize it by pressing the reset button.
A user accidentally drops a mobile device into a pool. What corrective action should be taken?
If the mobile device does not turn on, throw it away and buy a new one.
10
After being left in a car for many hours on a hot day, an iPhone cannot be turned on. What should the user do to fix this problem?
Place the phone in a refrigerated space and allow the unit to cool down.
11
After an upgrade to a mobile device, some applications are no longer working, but some work fine. The user can make calls and send and receive email. Which two kinds of problems could be related to these issues? (Choose two.)
a software problem
a touchscreen problem
a memory problem
12
Which scenario or situation would prevent a user from upgrading the OS on an Android device?
13
Which two conditions must be met for mobile device security measures such as remote lock and remote wipe to function? (Choose two.)
14
Which two items common to both Android and iOS devices can be remotely backed up? (Choose two.)
photos
settings
contacts
calendar
messages
15
If the network SSID is not being broadcast, the device will not be able to connect to the network.
When the device roams out of the range of any Wi-Fi networks, it can connect to the cellular data network if this feature is enabled.
The Android OS does not support wireless connectivity that uses WPA2 security.
If a Wi-Fi network is secured with a password, the network must be manually configured on the device.
1 6
17
In the context of mobile devices, what does the term tethering involve?
connecting a mobile device to a USB port on a computer in order to charge the mobile device
connecting a mobile device to another mobile device or computer to share a network connection
18
Third generation cellular standards require a maximum of 1 Gb/s for devices moving slowly, such as when a user has a mobile device and is walking.
Cellular standards have made it more difficult and expensive to make calls to people that are on a different network.
Cell phones that use a single standard can often only be used in specific geographic areas.
19
Motocast USB can be used to synchronize data when using an iOS device.
20
A technician is configuring email on a mobile device. The user wants to be able to keep the original email on the server, organize it into folders, and synchronize the folders between the mobile device and the server. Which email protocol should the technician use?
MIME
POP3
SMTP
IMAP
21
Which mobile device security feature requires the user to slide a finger over the screen in a specific sequence to unlock the device?
simple passcode
pattern
remote wipe
slide
22
Which term describes the ability of a mobile device to recognize when two or more points of contact are made on the screen?
large touch
many touch
multitouch
long touch
chapter9
What are two cables that are used to connect a computer to a printer? (Choose two.)
FireWire
HDMI
serial
PS/2
eSATA
In laser printing, what is the name of the process of applying toner to the latent image on the drum?
fusing
developing
charging
transferring
What is the purpose of the Additional Drivers button in the Sharing tab of the Printer Properties?
A small LAN uses a shared printer that is connected to a computer. None of the users can print but all of the users can access the shared resources on the computer to which the printer is locally connected. What is a possible cause of this?
How would a user install a new USB printer on a PC that is running Windows 7 Professional?
Configure the BIOS to accept the specific model of printer in the USB port.
Click Start > All programs > Control Panel > Printers and Faxes > right-click on the desired printer and choose Add.
Connect the printer and power it on. Windows will detect the printer and install the needed drivers.
A Windows 7 computer has several printers configured in the Control Panel Devices and Printers window. Which printer will the computer choose to be the first option for printing?
infrared
satellite
WiMax
microwave
10
A user discovers that an inkjet color printer is printing different colors from those that are shown on the screen. What can be done to solve this problem?
11
The users on a LAN are reporting that computers respond slowly whenever high resolution photographs are being printed on the color laser printer. What would be the cause of this problem?
The printer does not have enough memory to buffer an entire photograph.
12
13
14
What are two closed-ended questions that a technician could ask a user while trying to identify the problem with a printer? (Choose two.)
What recent software or hardware changes have been made to your computer?
15
After applying a solution to a printer problem, a technician restarts the printer and prints a test page. Which step of the troubleshooting process is the technician applying?
16
A user notices that a job submitted to a printer is displayed in the print queue, but the printer is not printing the document. What is a probable cause of this problem?
17
A technician recorded that a new fuser roller unit was installed in a laser printer to solve a printing problem. Which step in the troubleshooting process did the technician just perform?
18
19
ensure that the connected client computers have up-to-date printer drivers
20
Disconnect the printer from the power source when it is not in use.
21
Which two replacement parts are typically found in a laser printer maintenance kit? (Choose two.)
pack of paper
toner cartridge
transfer rollers
fuser assembly
Clean the inside of the printer with a vacuum cleaner with a HEPA filter.
A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent?
social engineering
anonymous keylogging
spam
DDoS
Which two security precautions will help protect a workplace against social engineering? (Choose two.)
ensuring that each use of an access card allows access to only one user at the time
What are two typical physical security precautions that a business can take to protect its computers and
Which physical security technology can hold user authentication information, include software license protection, provide encryption, and provide hardware and software authentication that is specific to the host system?
biometric authentication
two-factor security
It has been noted that the computers of employees who use removable flash drives are being infected with viruses and other malware. Which two actions can help prevent this problem in the future? (Choose two.)
Set virus protection software to scan removable media when data is accessed.
Configure the Windows Firewall to block the ports that are used by viruses.
In which situation would a computer technician use the fixmbr command at the command prompt of a Windows XP computer to resolve a security issue?
when unauthorized users have changed the CMOS settings and the CMOS password must be reset
when a virus has damaged the master boot record of the system disk
when a virus has damaged the boot sector of the system disk
when the folder permissions for user members of a group are incorrect
All users working with a particular Windows 7 computer are able to install unauthorized software. In addition to educating the users about correct security behavior, which action should also be performed to solve this issue?
You want to dispose of a 2.5 terabyte hard drive that contains confidential financial information. What is the recommended procedure to achieve this?
WPA2
SSID hiding
WEP
10
a token
a TPM
a private key
a DES key
a public key
11
is self-replicating
12
Which type of security threat uses email that appears to be from a legitimate sender and asks the email recipient to visit a website to enter confidential information?
worm
phishing
adware
stealth virus
13
Which three questions should be addressed by organizations developing a security policy? (Choose three.)
14
What does a malware detection program look for when running a scan?
a service pack
mirror sites
patches that prevent a newly discovered virus or worm from making a successful attack
15
Port triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 as an open port. What effect does this have on network traffic?
Any traffic that is using port 25 going out of the internal network will also be allowed to transmit out port 113.
All traffic that is sent into port 25 to the internal network will also be allowed to use port 113.
All traffic that is sent out port 25 will open port 113 to allow inbound traffic into the internal network through port 113.
Any traffic that comes into port 25 allows outgoing port 113 to be used.
16
Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choose two.)
packet size
physical addresses
protocols
packet speed
ports
17
to prevent the target server from being able to handle additional requests
18
Which question would be an example of an open-ended question that a technician might ask when troubleshooting a security issue?
19
Which action would help a technician to determine if a denial of service attack is being caused by malware on a host?
20
A technician is troubleshooting a computer security issue. The computer was compromised by an attacker as a result of the user having a weak password. Which action should the technician take as a preventive measure against this type of attack happening in the future?
21
A user has reported that a computer web browser will not display the correct home page even if the default page is reset. What is the likely cause of this problem?
mirrors
signatures
grayware
Which two actions should a technician take if illegal content, such as child pornography, is discovered on the hard drive of a customer computer? (Choose two.)
a contract that defines expectations between and organization and IT service vendors for an agreed upon level of support
the process of collecting and analyzing data from computer systems, networks, wireless communications, and storage devices
the collection of international, country, and local laws that affect computer security professionals
When performing computer forensics, what can be prevented with a properly and carefully documented chain of custody?
identity theft
evidence tampering
cyber crime
During the process of troubleshooting, a technician gains access to customer private information. What is expected that the technician do with this information?
Back up the information just in case the customer needs it some day.
Keep it confidential.
Refer to the exhibit. During the troubleshooting of software that is installed on a computer system, a level one technician requires help from a level two technician. The file shown in the exhibit must be sent to the level two
technician. How should the level one technician deliver this file?
Replace all passwords in the file with <password omitted> before emailing the file and then supply the passwords by secure means, if required.
This file should not be shared with the level two technician.
What are two sections that are usually included in an SLA? (Choose two.)
Which two rules pertain to the general daily activities of employees in a call center environment? (Choose two.)
The technician should contact the customer if the technician is going to be late for a follow-up appointment.
The technician should adjust the work chair to a height that is high enough so that wrists angle downwards toward the keyboard.
If a customer complains about another technician, the technician who is taking the call should agree with opinion of the customer.
If a technician takes a call from a customer the technician does not like, the technician should pass the call to another technician.
The technician can take the call of another technician, even without permission to do so.
The technician should give better service to a customer for whom the technician feels more sympathy.
The technician should take the easier calls first, regardless of the urgency.
The technician should make sure to call the customer back as close to the callback time as possible.
Which two statements are correct about level one and level two technicians? (Choose two.)
Level two technicians usually respond to the down calls as they may be able to resolve them faster.
Level one technicians usually work on the problems that require opening up the computer case.
Level two technicians are often referred to as incident screeners, and level one technicians are often referred to as product specialists.
Level two technicians are usually more knowledgeable about technology than the level one technicians are.
Level two technicians prepare a work order and escalate it to a level one technician if a problem cannot be resolved within ten minutes.
10
What should a level two technician do immediately after receiving an escalated work order from a level one technician?
Call the customer back to ask any additional questions and resolve the problem.
Call the level one technician and ask questions about the problem.
Document suggestions to solve the problem in the work order and return it to the level one technician.
Send the work order to a level three technician and ask for support.
11
A customer calls to report a computer problem. Which two actions can the technician take to establish a good rapport with the customer? (Choose two.)
Use technical terms to determine the level of knowledge the customer possesses.
Personalize the call by periodically asking questions unrelated to the computer problem.
12
What is the correct way to conduct a telephone call to troubleshoot a computer problem?
Always gather information from the customer and escalate the problem.
Explain each step to help the customer understand the troubleshooting process.
13
A technician receives a call from a customer who is too talkative. How should the technician handle the call?
Politely step in and gain control of the call by asking the customer social questions.
Allow the customer to speak without interruption and then try to use closed-ended questions to gather data.
Use open-ended questions and repeat all the information back to the customer to politely show that unnecessary information is being given.
Talk over the customer and quickly gather the necessary information to be of help.
14
What are two examples of displaying professional communication skills while talking to a customer? (Choose two.)
focusing on what you cannot do to give customers an idea of the magnitude of the problem
clarifying what customers say after they have finished their explanations
the use of active listening, with occasional interjections such as I see or I understand
15
What are three pieces of information a level one technician should gather from a customer? (Choose three.)
contact information
16
Which situation would require that a support desk call be given the highest priority?
17
Which two data storage locations contain persistent data that can be used by computer forensics specialists? (Choose two.)
CPU registers
RAM
cache
18
In a computer forensics investigation, which type of data is considered volatile data and can be lost if power is removed from the computer?
19
What customer support procedure would likely cause an upset customer to become more upset?
Apologize for the wait time if there has been no wait time.
20
What name is given to a certain set of general rules that apply to written communication over the Internet?
flame wars
online interactions
Internet slang
netiquette
21
an admission of guilt
collected evidence
expert testimony
22 What is a reason to escalate a problem from a level one technician to a level two technician?
A technician arrives and asks a customer, Can you describe the problem? The customer replies, All email messages that I send have the wrong date. I have restarted the computer several times, but this does not seem to help. What could be the problem?
A customer using a Windows XP computer is complaining that a new card reader is not working. A technician tests the card reader on a Windows 7 computer and does not detect any problems. What are two possible solutions to the problem with the XP computer? (Choose two.)
Install the driver from the CD provided with the card reader.
Download and install the driver from the manufacturer of the card reader.
A technician is replacing an internal hard drive used as a secondary drive on a PC. After connecting the new hardware and powering up the computer, an OS not found error message is displayed. What is the most
The motherboard needs replacing to be able to support the new hard drive.
The USB port has too many attached devices to supply adequate power.
A technician is upgrading an older PC with a dual core CPU. When the PC restarts, it is slower than it was before the upgrade. The Performance tab from the Task Manager displays only one CPU graph. What is the most probable solution to this problem?
A laptop that is running Windows XP displays Missing NTLDR after the POST. What are the two most probable reasons for this problem? (Choose two.)
Several times during the last few days, a user has experienced the Blue Screen of Death when plugging an external hard drive into a laptop via USB. What is a possible solution for this problem?
Research the STOP error and the name of the module that produced the error.
Research the boot error beep code to identify the source of the error.
A computer repeatedly locks without any error message. Which two conditions may be the cause of the problem? (Choose two.)
What are two possible solutions to any Windows computer restarting continuously and never displaying the desktop? (Choose two.)
Press F8 to open the Advanced Options menu and choose Disable Automatic Restart on System Failure.
A PC is not able to connect to a wired network. Pinging the loopback address is successful, but the gateway cannot be reached. On the network switch all the interface lights are on, except for the interface connected to the PC. The LED on the network card is off. What is the most likely cause of this problem?
10
Users in a recently installed wireless network are complaining of slow data transfer and frequent loss of connectivity. The technician checks that the wireless security is correctly implemented, and there is no evidence of unauthorized users on the network. Which two problems might the technician suspect? (Choose two.)
11
A group of users is unable to connect to the network. When testing several of the PCs and issuing the command ipconfig, the technician notices that all of them have an IP address in the 169.254.x.x range. What is the most likely cause of this problem?
12
A technician is working on a laptop that has a dark display. After attaching an external display and verifying that it works, the technician now has a better idea as to the problem. What could be the problem?
The power inverter of the LCD screen or backlight lamp has failed.
13
A technician replaces a laptop keyboard that was no longer functioning, and has verified that the newly replaced keyboard functions properly. What is the final step the technician should take as part of the troubleshooting process?
14
A user complains that when a page is printed on a laser printer, the page smears when touched. What is a possible cause of this issue?
15
A technician finds that occasionally when a network printer is restarted, clients are unable to print to it, receiving a Document failed to print message. What is a probable cause of this?
16
A user complains that a printer is outputting random characters instead of the desired document. What is a probable cause of this?
17
A freshly installed Windows 7 laptop is plugged into the network and configured with an IP address. The technician then attempts to ping the laptop from another computer. While the laptop is able to connect to other devices, the ping requests fail. What is the likely cause?
18
A computer displays this message when the computer boots: MBR has been changed or modified. What could cause this problem?
19
Users are complaining that they are receiving spam from the email account that belongs to a co-worker. What could cause this problem?
A virus has damaged the master boot record on the system that is used by the co-worker.
The network adapter on the computer that is used by the co-worker is malfunctioning.
The email account belonging to the co-worker was hijacked because of malware.
20
A technician is troubleshooting a laptop that has the power light on and the hard drive spinning. However, the laptop only displays vertical lines that change color. What is the problem?
21
A technician is troubleshooting a laser printer that outputs blank paper for all print jobs including printer test pages. What is a probable cause?
22 A technician is troubleshooting a Windows 7 laptop infected with a virus that has damaged the master boot record. The technician has booted the laptop using the installation media and is attempting to repair the laptop from the command line interface. Which two commands can the technician use to repair the corrupt master boot record? (Choose two.)
regedit
chkdsk
regedt32
bootrec /fixboot
bootrec /fixmbr
Which two elements should typically be included in a computer security policy? (Choose two.)
Which type of power connector is used to connect devices such as optical drives and hard drives?
24-pin
Molex
P8
P9
20-pin
Berg
A network administrator has been informed about a problem with the network printer. What is the most reliable way to prevent print jobs from being added to the queue while the printer is being repaired?
Send a network message to all users telling them to stop sending any print jobs to the printer.
Send an email to all users telling them to stop sending any print jobs to the printer.
A client has provided a 4 GB SODIMM module to a technician to perform a memory upgrade on a workstation, but the technician is having problems installing it. What is a probable cause for this?
How should a hard drive be partitioned to support a Windows 7 installation over a network?
A new technician has joined the IT team and is about to service a heavy printer. What advice would you give this technician to avoid any injury when transporting the heavy printer to the service area?
Bend your knees to use the strength in your legs to lift the printer.
A customer used the Convert utility to take advantage of NTFS security features. The customer later discovered that the applications on the computer can only read FAT32 files. After the hard drive was formatted back to FAT32, the customer noticed all of the data files were missing. What should the customer do next?
Run convertfat32.
Restore the data files that were backed up in preparation for the conversion.
A technician is trying to determine where a network cable terminates in the wiring closet. Which tool is best suited for this task?
toner probe
POST card
multimeter
loopback adaptor
Which component uses the greatest amount of power on most mobile devices?
camera
media player
CPU
LCD screen
10
A technician is troubleshooting a printer that prints unknown characters instead of the correct document. What are two probable causes for this? (Choose two.)
11
Which two memory types are installed using DIMM slots? (Choose two.)
SDRAM
cache memory
FPM DRAM
SRAM
DDR SDRAM
12
Employees in the financial department have reported that an unknown technician has been asking questions about the network. Which type of attack might the employees be observing?
spamming
spoofing
phishing
social engineering
13
A customer reports that after booting a Windows Vista computer with a CD and running antivirus software to remove a boot sector virus, the computer still fails to boot from the hard disk. What should the technician do to try to solve this problem?
Boot the computer from the Vista installation media, select R Recovery Console and then issue the fixmbr command.
Enter the BIOS settings when the computer starts up and enable Boot Recovery.
Boot the computer from the Vista installation media and select Repair your computer from the Install Windows screen.
14
A technician needs to add a new wireless device to a small WLAN. The WLAN is a mixture of old and newer 802.11b and 802.11g devices. What choice for the new device would provide the most interoperability for present and future growth?
15
A user notices that some of the programs that are installed before upgrading to Windows 7 no longer function properly. What can the user do to fix this problem?
Lower the UAC setting in the Change User Account Control settings dialog box of the User Accounts control.
16
A technician installed a network adapter in a computer and wants to test network connectivity. The ping command can only receive a response from local workstations. What could be causing the problem?
17
A technician has repaired a failing laser printer that was not able to pull the paper from the input tray. After installing the replacement parts, the technician tested the printer with a test page and everything worked as expected. Which would be a possible next step to complete the troubleshooting process?
18
Which wireless security mode supports government grade security and offers both personal and enterprise authentication?
LEAP
WPA
WEP
WPA2
19
20
Which type of security threat can be transferred through email and is used to gain sensitive information by recording the keystrokes of the email recipient?
grayware
virus
adware
Trojan
worm
21
A technician is troubleshooting a network where it is suspected that a defective node in the network path is causing packets to be dropped. The technician only has the IP address of the end point device and does not have any details of the intermediate devices. What command can the technician use to identify the faulty node?
ipconfig /flushdns
ping
tracert
ipconfig /displaydns
22
Hard drives in a grocery warehouse keep failing because of the adverse warehouse environment. What would be a possible solution for this high failure rate?
23
A technician is asked to configure the time that the system must be idle before the hard disk spins down on all the Windows-based laptops in the company. The technician configured the power options in Windows but it appears to have no effect. Where should the technician look to enable power management?
Administrative Tools
Command Prompt
BIOS
Safe mode
System Registry
24
What are three common input devices found on laptops? (Choose three.)
AC power connector
external monitor
PS/2 keyboard
touchpad
fingerprint reader
web camera
25
On which two occasions is it most likely that a technician will have to perform a clean operating system installation if a backup has not been performed? (Choose two.)
26
A customer reports poor telephone communications when using a copper telephone line that also has a DSL service. What is the most likely cause of the problem?
The telephone does not comply with the IEEE 802.15.1 standard.
The HSDPA (High Speed Data Packet Access) is interfering with the telephone operation.
27
The signals in the wires in each twisted-pair circuit generate magnetic fields which cancel each other out.
Fiber optic cables use light-emitting diodes to cancel noise on the cable.
Twisted-pair cabling pairs two positively-charged wires or two negatively-charged wires, which doubles the signal strength and cancels noise.
Coaxial cables have a positively-charged end and a negatively-charged end, which cancel each others magnetic fields.
28
29
A technician is asked to wire a network that supports CSMA/CD. Which architecture and physical topology should the technician use for supporting this access control method?
30
It is an encryption protocol that is used to encrypt data as the data is sent over the VPN.
It is an encryption process that uses identical keys on both ends to establish the VPN.
It is an encryption process that uses a public and private key pair to encrypt/decrypt data.
Asymmetric encryption is an encryption process that compares traffic on both ends to make sure the traffic has not been altered.
31
Which software installation method is used when a customer runs Google play from a mobile device?
synchronize
pull
push
load
32
When a Windows XP computer has completed the POST for each adapter card that has a BIOS, what is the next step during the boot sequence?
33
A technician wants to allow users to backup and restore all the files on their computers, but does not want the users to be able to make changes to the system. How should the technician give users this functionality?
Check the Folder is Ready for Archiving box in the properties of each folder.
34
A technician recently implemented security on a new computer used by a web-based program developer. Initially the computer was allowed to access a number of programs over the network, but now the developer has found that new programs cannot be accessed. Which firewall setting should the technician apply to allow new programs while also keeping the computer secure?
35
Which technology allows a user to securely access a company LAN across a public network?
MD5
VPN
SHA
TCP
36
A technician is troubleshooting a 4-year-old computer that takes a long time to boot, and identifies that the BIOS rediscovers all the hardware at every boot. The technician thinks that the CMOS battery is losing the
37
A computer technician has decided that a problem with a laptop can be solved by repairing a hardware component. What should be done first before attempting to repair a hardware component on a laptop?
38
A business is concerned that computers are susceptible to malware infection. Which two actions will help solve this problem? (Choose two.)
Configure antimalware software to run whenever the computer is experiencing heavy usage.
39
A support desk trainer is teaching a new support desk technician some basic rules about starting a conversation with a customer. Which statement describes the rules the trainer should be teaching?
Start by asking close-ended questions about what the customer understands of the problem and then direct the customer through the correction process.
Learn the name of the customer and create a connection with the customer. Next ask questions that assess the knowledge level of the customer.
Ask the customer what the problem is and then introduce yourself.
Assess what the customer knows of the support desk process and then use close-ended questions to guide the customer through the correction process.
40
Which three components are typically found in laser printer maintenance kits? (Choose three.)
paper trays
primary corona
fuser assembly
pickup rollers
transfer rollers
secondary corona
41
A supervisor received a complaint that one of the technicians was rude and disrespectful. Which action by the technician most likely caused the customer to complain?
The technician ended the call without saying Have a nice day.
42
What precaution should a technician take when checking a thermal printer that suddenly stops functioning?
43
A technician wishes to secure the network authentication for all remote users. Which security technology uses radio communication with a computer before accepting a username and password?
security dongles
biometrics
key fobs
44
Which two actions must be performed before installing RAM into a laptop? (Choose two.)
Disconnect AC power.
Before installing the RAM, update the saved CMOS settings to the newly configured amount of RAM.
Remove the memory module retaining clips from the slots where the new RAM will insert.
45
A call center technician is on a call with a customer when a colleague indicates that there is something to discuss. What should the technician do?
Tell the customer that the call will be put on hold for a few minutes.
Mute the line to the customer while discussing the issue with the colleague.
Interrupt the customer and ask whether the customer would mind going on hold for a few minutes.
46
What category of technician uses remote access software to update a computer belonging to a customer?
bench technicians
field technicians
47
What determines to which device the computer searches first to locate boot files?
partition size
type of partition
the order in which the operating system or operating systems were installed
48
parallel
PS/2
network
DVI
speaker
49
When a dual core CPU with Hyper-Threading features is installed on a motherboard, how many instructions can the CPU simultaneously process?
50
Which two pieces of software are included with most new printers and are installed by the user? (Choose two.)
operating system
configuration software
word processor
printer patches
printer driver
BIOS update
51
Ensure the humidity and temperature levels are set as low as possible.
Ensure the wireless network is on a different frequency than the offending source.
Ensure the number of wireless NICs exceeds the number of wireless phones.
Ensure each wireless NIC is configured to operate at different frequencies from all other wireless NICs.
52
What are two reasons why static IP addressing would be configured instead of DHCP when setting up a wireless network? (Choose two.)
53
internet
transport
application
network access
54
A technician is attempting to install an application that is not supported by the Windows XP operating system on the PC. How can the technician make this application run on the PC?
Create a virtual machine with an operating system that supports the application.
55
Which factor should be considered when selecting cooling fans for a PC case?
56
A technician is replacing a failing keyboard on a laptop computer. After the installation, the technician finds that none of the keys on the keyboard are working. What should the technician do next?
Open Device Manager then use the option Scan for New Hardware.
57
A network administrator has a user that is changing the rights to files in a folder for other users. What rights does the administrator need to remove from the user?
Full Control
Modify
58
Which two wireless configuration features make it harder for a hacker to see and attach to a wireless network? (Choose two.)
59
A user installs a new sound card driver in a computer that is working properly. After the installation of the drivers for the new sound card, the computer fails to boot. Which quick fix can the user implement to return to the previous working state?
60 A technician is tasked with connecting a printer directly to the network and making it accessible to all staff in the general vicinity. What type of network cable is most likely used to connect the printer?
coaxial
RJ-11
fiber-optic
twisted-pair
Which three PC desktop functions are typically provided on the front panel and must be connected to the motherboard? (Choose three.)
PC power button
USB connectors
What wireless networking standard has a range of 250 meters (820 feet)?
802.11a
802.11g
802.11b
802.11n
A customer asks for a solution to a printer problem that is beyond the knowledge level of the technician. What should the technician do?
Ask the customer to call again when another technician can provide a solution to the problem.
Tell the customer to call the printer manufacturer to fix the problem.
The user can select the upload and download rates based on need.
A technician attempts to increase the brightness of a laptop screen by using the function keys but the attempt fails. What could be the problem?
A user is reporting that an inkjet printer is printing colors different from what the printer should be printing. The printer has separate cartridges for each color and the user changed the cyan cartridge recently. What is the action that could fix the problem?
10
Which two statements are correct about the inverter and backlight display components in a laptop? (Choose two.)
11
A technician is required to replace a faulty power supply in a desktop PC. The PC motherboard has a 24-pin ATX socket but the only available replacement power supply is one with a 20-pin connector. Delivery of new power supplies with 24-pin connectors is not expected until the next day, but the user requires the PC to be operational as soon as possible. What can the technician do in these circumstances?
The technician can install the power supply and insert the 20-pin connector into the 24-pin socket on the motherboard.
The technician can recover the 24-pin connector from the faulty power supply and attach it to the replacement power supply for connection to the motherboard.
The technician can use a 20-pin-to-24-pin adaptor to connect the power supply to the motherboard.
Power supplies with 20-pin connectors are not compatible with motherboards with 24-pin sockets, so the technician can do nothing until the new power supplies arrive.
12
A computer technician has recommended a data storage system that combines data striping and parity. The user has a limited budget and is prepared to forego performance to implement this system. Which RAID system would meet these requirements?
RAID 0
RAID 1
RAID 5
RAID 0+1
13
A technician is troubleshooting a PC unable to connect to the network. What command should be issued to check the IP address of the device?
nslookup
ipconfig
tracert
ping
1 4
15
Which feature will assign a computer an IP address even if there is no working DHCP server in the network?
WINS
APIPA
ARP
DNS
16
Which two motherboard components connect to the Northbridge chipset? (Choose two.)
RAM
video card
FireWire devices
NIC
17
What are the two widths of internal hard drives in laptops? (Choose two.)
3.5 inches
5.25 inches
1.8 inches
2.5 inches
3.8 inches
18
A user has a computer with a single hard drive and a RAID adapter installed. Which additional component is necessary to complete the RAID installation?
a DVD drive
a USB connection
19
What are two examples of component information that can usually be displayed when using the BIOS utility of a computer? (Choose two.)
RAM capacity
POST results
20
A user has just upgraded a gaming system with 8GB of DDR3 800 MHz RAM and still finds that the system lags during gameplay. The system has a high end graphics card, liquid cooling, and a 7,200 rpm EIDE drive. What can the user do to improve system performance?
Replace the liquid cooling system with a high speed ball bearing fan cooling system.
21
A PC has one floppy drive, two EIDE drives, and one EIDE DVD drive. Which two connector types would have to exist on the power supply unit to power on all these devices? (Choose two.)
PS2
FireWire
SATA
Berg
Molex
22
A user wants to purchase a monitor that will be light, consume the least amount of power, and provide deep dark levels in the display. Which display type would best meet these requirements?
plasma
LED
OLED
LCD
23
A user has connected a USB 3.0 device to a computer using a 3 ft (1m) USB 3.0 cable. However, instead of an expected data transfer rate of up to 5 Gb/s, the user notes a data transfer rate of no more than 450 Mb/s. What is the most probable reason for this lower than expected data transfer rate?
The cable used exceeds the maximum length that allows USB 3.0 to transfer data at 5Gb/s.
24
DDR SDRAM modules have double the number of pins of SDRAM memory modules.
It transfers data twice per clock cycle compared to once per clock cycle for SDRAM.
25
on the keyboard
26
Because of limited space on a laptop keyboard, some keys have a dual-purpose. What are these keys called?
function keys
alternate keys
control keys
27
Windows Firewall
Sharing
28
A technician working on a computer discovers what is suspected to be illegal activity. Which three pieces of information should be immediately documented? (Choose three.)
29
Which two PC settings can be configured using the BIOS setup utility? (Choose two.)
POST
boot sequence
virtualization support
30
A technician wants to allow many computers to print to the same printer, but does not want to affect the performance of the computers. What will the technician do to achieve this?
31
DDR2-800
DDR3-1333
DDR2-1600
DDR3-1600
32
Which protocol automates assignment of IP addresses on a network, and which port number does it use? (Choose two.)
DHCP
DNS
SMB
53
67
80
33
Which two motherboard components are directly managed by the Southbridge chipset? (Choose two.)
video card
RAM
FireWire devices
CPU
34
Which laptop component is required to be replaced or upgraded by a technician rather than by a computer user?
inverter
RAM
battery
hard drive
35
Which two field replaceable units could be found in a laser printer maintenance kit? (Choose two.)
fuser assembly
toner cartridge
drum
pickup rollers
paper trays
power supply
36
What is a feature that can be used by an administrator to prevent unauthorized users from connecting to a wireless access point?
MAC filtering
software firewall
WPA encryption
proxy server
37
What technology is an IP based 4G broadband technology that offers high speed Internet access for distances up to 30 miles (48 km)?
Wi-Fi
fiber broadband
WiMAX
satellite
38
Which design specification criterion is most important when designing a computer that will be a thin client whose applications are accessed from a remote virtual server?
amount of RAM
39
Which adapter would a technician install in a desktop computer to enable a video signal to be recorded from a video recorder to the computer hard drive?
video adapter
TV tuner card
40
A support desk technician is dealing with an angry customer. Which two approaches should the technician take in dealing with the customer? (Choose two.)
Ask socially related questions to direct the customer away from the problem.
41
Which type of network consists of several geographically dispersed networks that cover a large area?
LAN
WAN
PAN
SAN
42
Which three components would a technician use in building a CAD workstation? (Choose three.)
multicore processors
TV Tuner card
maximum RAM
43
Refill it.
Throw it away.
44
LED
OLED
plasma
LCD
45
for cables that are installed inside the floors and ceilings of buildings
46
A technician opens up a PC to work on it, and finds that it is very dusty inside. What should the technician do?
Use a lint-free cloth sprayed with a cleaning solution to remove excess dust.
4 7
48
A technician is building a workstation that will be used for virtualization. Which two components would the technician use? (Choose two.)
dual monitors
multicore processors
liquid cooling
49
A technician is troubleshooting a PC in a workplace environment and finds many pirated movies on the hard drive. What should the technician do?
Make a copy of all the pirated content and send it to the law enforcement authorities.
Advise the user that downloading pirated content is illegal and that the user should refrain from doing so.
50
Which two adapter card slots are used by video adapter cards installed in desktop PCs? (Choose two.)
DIMM
AGP
ISA
MCA
PCIe
51
Which device provides a consistent quality of power when brownouts and blackouts occur, and may enable a computer to safely shut down after saving data when a power outage occurs?
EMI shield
generator
surge suppressor
52
Which two hardware features would a technician monitor within the BIOS if a computer was suspected of overheating? (Choose two.)
motherboard voltage
54
Only the power supply manufacturer can open the casing of a power supply.
55
Which three features can be configured in the BIOS settings to secure a computer? (Choose three.)
file encryption
passwords
TPM
TKIP key
drive encryption
MAC filtering
56
What process takes place in a laser printer after the drum is conditioned for the new latent image?
exposing
developing
transferring
charging
fusing
57
Which two items are expansion options for a laptop? (Choose two.)
PCI Card
ExpressCard
PCI-e Card
ISA Card
PC Card
58
Which security mode supports robust encryption, and can be enabled with password authentication (personal) or server authentication (enterprise)?
TKIP
WEP
WPA2
WPA
59
A technician is configuring a PC for maximum performance and the highest level of data protection. Which RAID configuration would the technician use?
0+1
60
A technician is performing a memory upgrade. What would be the result of attempting to install a DDR2-800 module in a computer that already has a DDR2-667 module installed?
It will be necessary to configure the BIOS to recognize the different memory speeds.
61
Which type of storage would be best in a tablet computer that belongs to a small child?
SATA
PATA
eSATA
SSD
62
A user needs to connect a cable to the PC to deliver digital video signals only. Which type of cable should be used?
Mini-HDMI
composite
VGA
HDMI
DVI-D
63
Which two types of connector are used for fiber optic cable? (Choose two.)
SC
ST
BNC
RJ-11
RCA
RJ-45
64
SDRAM
EEPROM
ROM
SODIMM
65
Which topology type describes the process that hosts use to access and communicate on a network?
physical
star
bus
logical
66
Which resolution would provide the best visual quality on a plasma monitor?
XGA
VGA
native
SVGA
6 7
68
Which three connection technologies allow a user to connect a printer to a computer using a wired connection? (Choose three.)
Bluetooth
infrared
Ethernet
USB
802.11x
parallel
69
A customer who travels frequently wants to know which technology is the most suitable for being connected to the corporate network at all times at low cost. Which network technology would a network administrator recommend?
ISDN
cellular
satellite
microwave
70
A user is configuring a wireless access point and wants to prevent any neighbors from discovering the network. What action does the user need to take?
71
A technician is building a thick client workstation that would be used to run a database and wants to ensure the best protection against errors. What type of memory would be best suited for this?
ECC
DDR3
RDRAM
DDR2
72
In which situation would it be appropriate for a technician to back up personal and confidential data from a computer belonging to a customer?
73
On a laptop keyboard, which three functions can typically be accessed through the use of special function keys? (Choose three.)
wireless functionality
display brightness
Task Manager
Control Panels
volume settings
74
Which device converts digital signals to analog signals and vice versa?
modem
switch
router
hub
75
Which fire protection system would be best for a university computer/electronics lab?
76
What is the first step a technician should take when preparing to work on the inside of a computer?
77
What is an advantage of using a printer that is connected to a hardware print server compared with a computer-shared printer?
A hardware print server will have more memory to store the print job than a computer will have that shares a printer.
A computer that shares a printer always allows for faster printing of documents.
78
DVI
eSATA
SATA
PATA
S/PDIF
79
A technician is setting up a network in a new room. What is the best device to use to connect the PCs to each other and to the rest of the LAN?
switch
router
firewall
gateway
80
A user is connecting a home entertainment system and wants to use one cable to carry all the digital video and audio signals from the source device to the LCD TV. What type of cable should the user use?
DVI-D
VGA
S-Video
HDMI
81
Which RAID level allows for extension of a dynamic volume without any redundancy?
82
What type of printer requires the ribbon to be changed when producing faded and light characters?
laser
thermal
inkjet
impact
What wireless networking standard has a maximum available bandwidth of 11 Mb/s? 802.11b
Refer to the exhibit. In what situation would a technician use this tab?
When a device is behind a firewall and software is being used that needs access to a remote network.
When the computer will be using a VPN connection and accessing the Internet while connected through the VPN.
When a laptop is used both at work with DHCP and at home with a static IP address.
A technician is attempting to repair a Windows 7 laptop that has a missing or corrupt OS file that prevents Windows 7 from starting up. The technician reboots the laptop and accesses the WinRE via the F8 key. Which option must the technician choose in the System Recovery menu to locate and fix the missing or corrupt system files?
System Restore
Startup Repair
After complaints from users, a technician identifies that the college web server is running very slowly. A check of the server reveals that there are an unusually large number of TCP requests coming from multiple locations on the Internet. What is the source of the problem?
A user reports that a laser printer is printing shadow images and letters. Which part should the technician replace to correct this problem?
pick up roller
fuser
drum
network cable
A user has determined that the computer hard drive is failing. Before the failure, the user implemented a backup scheme running a normal backup every end of the month and then incremental backups every other day. What is the correct sequence that the user has to follow in order to restore the backup?
Restore the last incremental backups in inverse order, and then restore the last normal backup.
Restore the last normal backup first, then restore the incremental backups in order.
Restore the last incremental backup and then restore the last normal backup.
Restore the last normal backup first, then restore the last incremental backup.
What are two possible causes of a computer running slowly? (Choose two.)
A technician connects a new LCD monitor for the first time and finds the display very pixilated. What is a possible solution to this problem?
64-bit software requires a 64-bit processor but can run on a 32-bit operating system.
64-bit software can run on a 32-bit processor but requires a 64-bit operating system.
64-bit software can run on a 32-bit processor using a 32-bit operating system but the software performance will be slower.
Which user account should be used only to perform system management and not as the account for regular use?
standard user
administrator
guest
power user
10
A technician is troubleshooting a network connectivity problem. Pings to the local wireless router are successful but pings to a server on the Internet are unsuccessful. Which CLI command could assist the technician to find the location of the networking problem?
msconfig
ipconfig
ipconfig/renew
tracert
11
What are two features of the Android operating system? (Choose two.)
Android has been implemented on devices such as cameras, smart TVs, and e-book readers.
All available Android applications have been tested and approved by Google to run on the open source operating system.
Android is open source and allows anyone to contribute to its development and evolution.
12
Which two guidelines are appropriate for creating strong passwords? (Choose two.)
13
A technician is about to install and configure a wireless network at a small branch office. What is the first security measure the technician should apply immediately upon powering up the wireless router?
Configure encryption on the wireless router and the connected wireless devices.
14
A technician is troubleshooting a Windows 7 laptop that takes significantly longer than expected when performing a file search. What is the possible cause?
15
Which two methods are used to directly connect mobile devices such as tablets and smartphones to a data network? (Choose two.)
wired Ethernet
Bluetooth
Wi-Fi
WiMax
cellular communications
16
A user is viewing the Disk Management utility on a PC that is running Windows XP and notices that one of the disks is marked as Foreign. What does this mean?
This is a basic disk that has just been converted to a dynamic disk.
17
What action should a technician take before upgrading computers from Vista to Windows 7?
18
details
general
archive
read-only
security
19
worm
Trojan
spyware
adware
20
A technician has successfully removed malware from a PC and finds that when the system is rebooted error messages are displayed about missing and corrupt system files. What utility can the technician use to replace or fix any corrupted system files?
Regedit
ASR
?Fixboot
SFC
Fixmbr
21
An OS not found error message is displayed when a computer is started. The technician determines that the single hard drive is configured as a slave. What needs to be done to correctly configure the hard drive as a master?
22
A technician is troubleshooting a server and wants to see all open shared files on it. What command could the technician use to do this?
net accounts
net file
nbtstat
net group
ntstat
23
A technician is troubleshooting a problem where many websites return a certificate not valid error. The technician notices that the date and time are not current and resets these to the correct settings. The previously inaccessible websites are now accessible. However, when the computer is restarted the same problem reoccurs. What can the technician do to prevent the date and time from resetting?
24
Which two issues are likely to cause BSOD errors? (Choose two.)
RAM failing
out-of-date browser
25
A technician wants to use Remote Desktop to configure another PC. Which firewall port on the remote PC should be open in order for Remote Desktop to work?
23
20 and 21
80
115
389
3389
26
A technician needs to permanently destroy data on some drives before disposing of them. What is the best way to do this?
27
What kind of tool or substance is better to use to remove spilled toner on a laser printer?
compressed air
28
On a PC that is running Windows 7 Ultimate, a user sets up a home entertainment system and creates a homegroup. The user then joins two other PCs to the workgroup, one PC running Windows 7 Starter and the other running Windows 7 Home Basic. What else must the user do in order to have the user accounts on the Windows 7 Home Basic and Windows 7 Starter PCs access the shares on the home entertainment system?
Users have to be added to the user accounts on the home entertainment PC.
Users on the PC that is running Windows Home Basic will have to be manually added to the homegroup.
Nothing has to be done. All users accounts on all the PCs will automatically be added to the homegroup.
Users on the PC that is running Windows Starter cannot join the homegroup.
29
A user wants to extend a primary partition formatted with the NTFS file system with the unallocated space on the hard disk. What must the user do after the primary partition is extended to make it usable?
30
A user has detected that one of the virtual machines in a computer is infected with a virus. Which statement about the situation is likely to be true?
All of the virtual machines running on the host are infected with a virus.
31
What type of file system allows the use of files larger than 5 GB and is mostly used on internal hard drives?
exFAT
FAT64
CDFS
FAT32
NTFS
32
A user purchases a new 802.11n wireless router and sets it up at home. The user notices that 802.11n devices can connect to the wireless router but 802.11g devices cannot connect. What is the problem?
The wireless router has not been set for mixed mode.
33
Which two possible errors may be displayed when a laser printer does not have enough memory to handle the type of printing jobs that the users are trying to print? (Choose two.)
memory overload
out of memory
buffer overflow
34
35
A technician has created a customized image of Windows 7 and wants to deploy it to 30 PCs. Which utility can the technician use to do this?
Chkdsk
Sfc
Regedit
Sysprep
36
A user reports that a computer is unable to print on an inkjet printer. The technician has determined that there is no paper in the paper bin. What is the next step in the troubleshooting process?
37
A user wants to map a network drive on a PC that is named WORK2 and runs Windows 7. The name of the shared resource the user wishes to map to is called installs and is located on a workstation called WORK1.
What would be the correct path for mapping the network drive?
\WORK2|installs
\\work1\installs
\\username\password/WORK1/installs
\\ username\WORK2\\installs
\\username\Work2\installs
// WORK2/installs
38
to protect the host from malware infection from the virtual machines
39
What is a possible situation when it might be necessary to boot Windows 7 from a USB device, a CD, or a
DVD?
40
What is required in order to connect a Wi-Fi enabled laptop to a WPA secured wireless network?
a MAC address
41
Which security threat hides the resources that it uses from antivirus programs?
rootkit
worm
Trojan
spyware
42
A technician is troubleshooting a workstation in a domain that has been infected with a virus. What is the first step the technician should take to clean the infected workstation?
43
Which feature of a mobile device uses sensors to detect the orientation of the screen and changes the display to landscape or portrait as required?
synchronization
GPS
screen calibration
accelerometer
44
A Windows XP PC that was formatted with the NTFS file system displays a missing or corrupt DLL error message when a certain program is run. What is the cause of this?
The DLL file was not registered during installation of the program.
45
A user has a computer that is infected with spyware. What should be performed before removing the spyware?
4 6
47
Which expansion card can assist in troubleshooting a computer problem when no video is available?
BIOS card
POST card
48
A wired network is undergoing several changes that could leave it vulnerable to connection by unauthorized devices while the work is in progress. Which two temporary measures would enable the authorized devices to continue to have network access but prevent unauthorized devices from connecting? (Choose two.)
Disable DHCP.
Disable DNS.
49
A technician successfully removes malware from an infected PC. When the PC is rebooted it displays error messages about missing system files. How can the technician fix this problem?
Run Chkdsk.
Run Sfc.
50
A user has shared a directory on the network. The files in the directory can be modified, created, and deleted when accessed from the local computer, but when accessed from another computer, the files can only be viewed. What can the user do to gain all the permissions when the files are accessed over the network?
51
A technician is trying to troubleshoot a Windows 7 PC remotely and finds that pings to the target machine fail and that telnetting into it fails as well. What changes should the technician make on the Windows 7 firewall in order to telnet into the target PC remotely?
52
Which statement is correct about installing a 32-bit operating system on a x64 architecture?
53
What tool can be used to find and attempt to fix file structural errors on a hard disk in Windows 7?
Fixmbr
Scandisk
Chkdsk
Format
54
What type of partition has the ability to create volumes spanning across more than one disk?
dynamic
primary
active
extended
55
A user needs to frequently access data from a shared folder on a remote computer. Which command would be used to map a network drive to the remote share?
net use
nbtstat
tasklist
ipconfig
56
A user reports that a PC is losing files, not opening some files, and is performing slowly. The technician suspects problems with the hard drive. What should be done to protect the data that is on the PC and to determine the source of the problem, without risking total drive failure?
57
Which Windows utility can be used to schedule a regular backup for preventive maintenance?
System Restore
Disk Cleanup
58
Which two mobile device components are field replaceable? (Choose two.)
internal SSD
battery
touch screen
accelerometer sensors
59
Which two common connection types are used to synchronize mobile devices with a PC or laptop? (Choose two.)
GPS
Bluetooth
Wi-Fi
USB
SSD
60
A business organization is configuring security on the mobile devices that are used in the organization. The security policy states that business data on mobile devices should only ever be accessed by employees. Which
mobile device security feature can be used to best ensure that business data is rendered completely inaccessible if the device is lost or stolen?
sandbox
remote wipe
passcode lock
remote lock
61
For mobile devices, what are two advantages of using flash memory storage technology that is the equivalent of solid state drives? (Choose two.)
high capacity
power efficiency
ease of upgrading
62
A technician troubleshooting a network problem has used CLI commands to determine that a computer has not been allocated a correct IP address from the DHCP server. Which command can the technician use to solve this problem?
ping
tracert
ipconfig/release
ipconfig/renew
63
A computer technician has successfully returned a laptop to full operation and verified system functionality. Actions the technician performed included modifying the registry and applying patches to the operating systems. What is the next step in the troubleshooting process that the technician should do?
6 4
65
How can a user prevent specific applications from accessing a Windows computer over a network?
66
When a Windows XP computer starts, a Missing NTLDR message is displayed after the POST. What are two
67
A computer locks up frequently, and no error message can be seen on screen. The problem occurs every time the user attempts to restart the computer. What is the most likely reason for this problem?
68
A technician has replaced the power supply unit of a PC, but notices that when the PC boots up the RAID array cannot be found. The technician verifies that the wattage of the replaced power supply unit matches the original one and that the RAID controller is receiving adequate power. What is the problem?
69
A user notices that there is intermittent wireless connectivity on a laptop that is running a wireless PCI Express Micro card using the wireless 802.11n standard. What should the user do to fix the problem?
70
Administrator
Guest
Standard user
Power user
71
A cleaner attempts to enter a computer lab but is denied entry by the receptionist because there is no scheduled cleaning for that day. What type of attack was just prevented?
shoulder surfing
social engineering
war driving
Trojan
phishing
72
After consulting the manufacturer manuals, a technician applies a series of recommended solutions that resolve a problem with a workstation computer. What is the next step in the troubleshooting process that the technician should perform?
73
A user is able to only access files required to perform a specific task. What type of security practice is being applied?
principle of privileges
74
A user replaced a PC CPU with a faster one, but now the PC displays a BSOD on bootup. What is the problem?
75
A user receives an email requesting verification of the password that is used to access bank files. What type of security threat is this?
malware
social engineering
virus
phishing
76
A company has replaced five desktop computers in the accounting and finance department with new computers. The plan is to donate the recovered computers in a fully functional state to a not-for-profit community organization. How can the company ensure that sensitive financial data cannot be accessed once the computers are donated?
77
Which ping command option would be used to resolve the hostname when testing connectivity to a specific IP address?
ping -a
ping -t
ping -s
ping -n
78
Which two precautions can help prevent social engineering? (Choose two.)
79
A company has a guest wireless network available for visitors while on the company premises. A technician has noted that unauthorized users are connecting to this wireless network from outside the premises. Which action can be taken to reduce unauthorized connections to the guest wireless network while enabling visitors to still connect quickly and easily without assistance while on the company premises?
80
voice recognition
fingerprint reader
retina scanner
smart card
password
key fob
81
Firmware updates should not be included as part of the preventive maintenance program.
The firmware updates can be installed automatically using the Windows Service Pack utility.
82 When a user tries to run a program a missing or corrupt DLL message is displayed. What are two possible solutions to this problem? (Choose two.)
Use the msconfig command to adjust the startup settings for the program.