You are on page 1of 18

sCert Practice Exam 2 – IT

Essentials (Version 5.0)


1

Refer to the exhibit. In what situation would a technician use this tab?
When the device will not be using the Internet.
When a device is behind a firewall and software is being used that needs
access to a remote network.
When the computer will be using a VPN connection and accessing the
Internet while connected through the VPN.
When a laptop is used both at work with DHCP and at home with a
static IP address.

2
A technician is attempting to repair a Windows 7 laptop that has a missing
or corrupt OS file that prevents Windows 7 from starting up. The
technician reboots the laptop and accesses the WinRE via the F8 key.
Which option must the technician choose in the System Recovery menu
to locate and fix the missing or corrupt system files?
System Restore
Windows Memory Diagnostic
Startup Repair
System Image Recovery
3
After complaints from users, a technician identifies that the college web
server is running very slowly. A check of the server reveals that there are
an unusually large number of TCP requests coming from multiple
locations on the Internet. What is the source of the problem?
The server is infected with a virus.
There is insufficient bandwidth to connect to the server.
There is a replay attack in progress.
A DDoS attack is in progress.
4
A user reports that a laser printer is printing shadow images and letters.
Which part should the technician replace to correct this problem?
pick up roller
fuser
drum
network cable
5
A user has determined that the computer hard drive is failing. Before the
failure, the user implemented a backup scheme running a normal backup
every end of the month and then incremental backups every other day.
What is the correct sequence that the user has to follow in order to
restore the backup?
Restore the last incremental backups in inverse order, and then restore
the last normal backup.
Restore the last normal backup first, then restore the incremental
backups in order.
Restore the last incremental backup and then restore the last normal
backup.
Restore the last normal backup first, then restore the last incremental
backup.
6
What are two possible causes of a computer running slowly? (Choose
two.)
The RAM is not compatible with the motherboard.
The hard drive has been partitioned.
Not enough RAM is installed in the system.
The hard drive is full.
The CPU has been overclocked.
7
A technician connects a new LCD monitor for the first time and finds the
display very pixilated. What is a possible solution to this problem?
Set the screen to native resolution.
Change the monitor video connector from DVI to HDMI.
Power cycle the monitor.
Set the screen resolution to VGA.
8
Which statement that is related to running 64-bit software is correct?
64-bit software requires a 64-bit processor but can run on a 32-bit
operating system.
64-bit software can run on a 32-bit processor but requires a 64-bit
operating system.
64-bit software requires a 64-bit processor and a 64-bit operating
system.
64-bit software can run on a 32-bit processor using a 32-bit operating
system but the software performance will be slower.
9
Which user account should be used only to perform system management
and not as the account for regular use?
standard user
administrator
guest
power user
10
A technician is troubleshooting a network connectivity problem. Pings to
the local wireless router are successful but pings to a server on the
Internet are unsuccessful. Which CLI command could assist the
technician to find the location of the networking problem?
msconfig
ipconfig
ipconfig/renew
tracert
11
What are two features of the Android operating system? (Choose two.)
Android has been implemented on devices such as cameras, smart
TVs, and e-book readers.
Each implementation of Android requires a royalty to be paid to Google.
All available Android applications have been tested and approved by
Google to run on the open source operating system.
Android applications can only be downloaded from Google Play.
Android is open source and allows anyone to contribute to its
development and evolution.
12
Which two guidelines are appropriate for creating strong passwords?
(Choose two.)
Use only upper case and numeric values in passwords.
Include letters, numbers, and symbols.
Use at least eight characters.
Change the password once each year.
Passwords should contain symbols only.
13
A technician is about to install and configure a wireless network at a small
branch office. What is the first security measure the technician should
apply immediately upon powering up the wireless router?
Disable the wireless network SSID broadcast.
Configure encryption on the wireless router and the connected wireless
devices.
Enable MAC address filtering on the wireless router.
Change the default user-name and password of the wireless router.
14
A technician is troubleshooting a Windows 7 laptop that takes significantly
longer than expected when performing a file search. What is the possible
cause?
The file permissions are not set.
The disk type is dynamic.
The disk type is basic.
The file system is corrupt.
The index service is not running.
15
Which two methods are used to directly connect mobile devices such as
tablets and smartphones to a data network? (Choose two.)
wired Ethernet
Bluetooth
Wi-Fi
WiMax
cellular communications
16
A user is viewing the Disk Management utility on a PC that is running
Windows XP and notices that one of the disks is marked as Foreign.
What does this mean?
This is a dynamic disk whose partition has been deleted.
This is a dynamic disk from another PC running Windows XP.
This is a basic disk that has just been converted to a dynamic disk.
This is a disk that does not contain a valid signature.
17
What action should a technician take before upgrading computers from
Vista to Windows 7?
Uninstall all programs.
Run Vista Upgrade Analyzer.
Run Windows 7 Upgrade Advisor.
Upgrade the video card.
18
What are two file attributes? (Choose two.)
details
general
archive
read-only
security
19
Which type of malware is disguised as a legitimate program?
worm
Trojan
spyware
adware
20
A technician has successfully removed malware from a PC and finds that
when the system is rebooted error messages are displayed about missing
and corrupt system files. What utility can the technician use to replace or
fix any corrupted system files?
Regedit
ASR
Fixboot
SFC
Fixmbr
21
An “OS not found” error message is displayed when a computer is
started. The technician determines that the single hard drive is configured
as a slave. What needs to be done to correctly configure the hard drive as
a master?
Change the master/slave setting in System Tools.
Replace the hard drive.
Change the master/slave setting in BIOS.
Change the jumper settings on the hard drive.
22
A technician is troubleshooting a server and wants to see all open shared
files on it. What command could the technician use to do this?
net accounts
net file
nbtstat
net group
ntstat
23
A technician is troubleshooting a problem where many websites return a
“certificate not valid” error. The technician notices that the date and time
are not current and resets these to the correct settings. The previously
inaccessible websites are now accessible. However, when the computer
is restarted the same problem reoccurs. What can the technician do to
prevent the date and time from resetting?
Replace the CMOS battery.
Reinstall the OS.
Upgrade the BIOS.
Change the power settings in the BIOS.
24
Which two issues are likely to cause BSOD errors? (Choose two.)
RAM failing
power supply failure
out-of-date browser
lack of antivirus software
device driver errors
25
A technician wants to use Remote Desktop to configure another PC.
Which firewall port on the remote PC should be open in order for Remote
Desktop to work?
23
20 and 21
80
115
389
3389
26
A technician needs to permanently destroy data on some drives before
disposing of them. What is the best way to do this?
Shatter the drive platters with a hammer.
Overwrite the drives
Partition the hard drives.
Perform a full format.
27
What kind of tool or substance is better to use to remove spilled toner on
a laser printer?
compressed air
mild detergent solution
regular vacuum cleaner
special vacuum cleaner
28
On a PC that is running Windows 7 Ultimate, a user sets up a home
entertainment system and creates a homegroup. The user then joins two
other PCs to the workgroup, one PC running Windows 7 Starter and the
other running Windows 7 Home Basic. What else must the user do in
order to have the user accounts on the Windows 7 Home Basic and
Windows 7 Starter PCs access the shares on the home entertainment
system?
Users have to be added to the user accounts on the home entertainment
PC.
Users on the PC that is running Windows Home Basic will have to be
manually added to the homegroup.
Nothing has to be done. All users accounts on all the PCs will
automatically be added to the homegroup.
User accounts on all three PCs have to be added to the homegroup.
Users on the PC that is running Windows Starter cannot join the
homegroup.
29
A user wants to extend a primary partition formatted with the NTFS file
system with the unallocated space on the hard disk. What must the user
do after the primary partition is extended to make it usable?
Format the disk with the FAT64 file system.
Convert the disk type to dynamic.
Ensure that the disk type is basic.
Partition the new space as a basic disk.
30
A user has detected that one of the virtual machines in a computer is
infected with a virus. Which statement about the situation is likely to be
true?
The host machine antivirus program requires an update.
The host operating system is not necessarily infected with a virus.
All of the virtual machines running on the host are infected with a virus.
The host machine operating system has a bug.
31
What type of file system allows the use of files larger than 5 GB and is
mostly used on internal hard drives?
exFAT
FAT64
CDFS
FAT32
NTFS
32
A user purchases a new 802.11n wireless router and sets it up at home.
The user notices that 802.11n devices can connect to the wireless router
but 802.11g devices cannot connect. What is the problem?
The wireless router is set to use the wrong channel.
The wireless router has not been set for mixed mode.
The wireless router is faulty.
The wireless router is using the wrong SSID.
33
Which two possible errors may be displayed when a laser printer does not
have enough memory to handle the type of printing jobs that the users
are trying to print? (Choose two.)
incorrect type of memory
memory overload
incorrect slot of memory used
print job incomplete
out of memory
buffer overflow
34
What is true about restore points?
Restore points should always be created before making changes to
a system.
Once System Restore is used to restore a system, the change is
irreversible.
Restore points back up personal data files.
Restore points recover corrupted or deleted data files.
35
A technician has created a customized image of Windows 7 and wants to
deploy it to 30 PCs. Which utility can the technician use to do this?
Chkdsk
Sfc
Regedit
Sysprep
36
A user reports that a computer is unable to print on an inkjet printer. The
technician has determined that there is no paper in the paper bin. What is
the next step in the troubleshooting process?
Determine the exact cause.
Establish a plan of action.
Document the findings.
Verify system functionality.
37
A user wants to map a network drive on a PC that is named “WORK2″
and runs Windows 7. The name of the shared resource the user wishes
to map to is called “installs” and is located on a workstation called
“WORK1″. What would be the correct path for mapping the network
drive?
WORK2|installs
\work1installs
\usernamepassword/WORK1/installs
\ usernameWORK2\installs
\usernameWork2installs
// WORK2/installs
38
What are two functions of hypervisors? (Choose two.)
to allocate physical system resources to virtual machines
to manage virtual machines
to partition the hard drive to run virtual machines
to protect the host from malware infection from the virtual machines
to share the antivirus software across the virtual machines
39
What is a possible situation when it might be necessary to boot Windows
7 from a USB device, a CD, or a DVD?
to repair the system
to disable background services
to delete registry keys
to partition the hard drive
40
What is required in order to connect a Wi-Fi enabled laptop to a WPA
secured wireless network?
an updated wireless driver
a security encryption key
a username and password
a MAC address
41
Which security threat hides the resources that it uses from antivirus
programs?
rootkit
worm
Trojan
spyware
42
A technician is troubleshooting a workstation in a domain that has been
infected with a virus. What is the first step the technician should take to
clean the infected workstation?
Run the antivirus software.
Update the antivirus software.
Turn off system restore.
Disconnect the workstation from the network.
43
Which feature of a mobile device uses sensors to detect the orientation of
the screen and changes the display to landscape or portrait as required?
synchronization
GPS
screen calibration
accelerometer
44
A Windows XP PC that was formatted with the NTFS file system displays
a missing or corrupt DLL error message when a certain program is run.
What is the cause of this?
The OS must be 64 bit in order to support the DLL.
The NTFS file system does not support DLLs.
The DLL file was not installed with the program.
The DLL file was not registered during installation of the program.
45
A user has a computer that is infected with spyware. What should be
performed before removing the spyware?
Run Windows Update.
Disable System Restore.
Create a full backup.
Run a disk defragmentation.
46
This is a flash item. Please click below to answer this item.

47
Which expansion card can assist in troubleshooting a computer problem
when no video is available?
BIOS card
USB expansion card
POST card
advanced graphics card
48
A wired network is undergoing several changes that could leave it
vulnerable to connection by unauthorized devices while the work is in
progress. Which two temporary measures would enable the authorized
devices to continue to have network access but prevent unauthorized
devices from connecting? (Choose two.)
Subnet the network.
Disable DHCP.
Disable SSID broadcast.
Disable DNS.
Assign static IP addresses to the authorized devices.
49
A technician successfully removes malware from an infected PC. When
the PC is rebooted it displays error messages about missing system files.
How can the technician fix this problem?
Disable unknown services using Msconfig.
Write a new boot record with Fixboot.
Run Chkdsk.
Run Sfc.
50
A user has shared a directory on the network. The files in the directory
can be modified, created, and deleted when accessed from the local
computer, but when accessed from another computer, the files can only
be viewed. What can the user do to gain all the permissions when the
files are accessed over the network?
Update to the NTFS file system.
Adjust firewall settings.
Run a full antivirus scan.
Adjust share permissions.
51
A technician is trying to troubleshoot a Windows 7 PC remotely and finds
that pings to the target machine fail and that telnetting into it fails as well.
What changes should the technician make on the Windows 7 firewall in
order to telnet into the target PC remotely?
Open ports 20 and 21 on the target machine.
Open port 23 on the target machine.
Open port 80 on the target machine.
Allow ICMP messages on the target machine.
52
Which statement is correct about installing a 32-bit operating system on a
x64 architecture?
The OS will run correctly.
This combination will provide better security.
The OS will always make use of all the RAM available.
The OS can address more than 128 GB of memory.
53
What tool can be used to find and attempt to fix file structural errors on a
hard disk in Windows 7?
Fixmbr
Scandisk
Chkdsk
Format
54
What type of partition has the ability to create volumes spanning across
more than one disk?
dynamic
primary
active
extended
55
A user needs to frequently access data from a shared folder on a remote
computer. Which command would be used to map a network drive to the
remote share?
net use
nbtstat
tasklist
ipconfig
56
A user reports that a PC is losing files, not opening some files, and is
performing slowly. The technician suspects problems with the hard drive.
What should be done to protect the data that is on the PC and to
determine the source of the problem, without risking total drive failure?
Run CHKDSK, then back up all important files.
Run CHKDSK, then run FDISK.
Run FDISK, then replace the hard drive.
Back up all important files, then replace the hard drive.
Back up all important files, then run CHKDSK.
57
Which Windows utility can be used to schedule a regular backup for
preventive maintenance?
Windows Task Manager
System Restore
Windows Task Scheduler
Disk Cleanup
58
Which two mobile device components are field replaceable? (Choose
two.)
internal SSD
battery
Subscriber Identity Module card
touch screen
accelerometer sensors
59
Which two common connection types are used to synchronize mobile
devices with a PC or laptop? (Choose two.)
GPS
Bluetooth
Wi-Fi
USB
SSD
60
A business organization is configuring security on the mobile devices that
are used in the organization. The security policy states that business data
on mobile devices should only ever be accessed by employees. Which
mobile device security feature can be used to best ensure that business
data is rendered completely inaccessible if the device is lost or stolen?
sandbox
remote wipe
passcode lock
remote lock
61
For mobile devices, what are two advantages of using flash memory
storage technology that is the equivalent of solid state drives? (Choose
two.)
light weight components
high capacity
flash memory storage is field-serviceable
power efficiency
ease of upgrading
62
A technician troubleshooting a network problem has used CLI commands
to determine that a computer has not been allocated a correct IP address
from the DHCP server. Which command can the technician use to solve
this problem?
ping
tracert
ipconfig/release
ipconfig/renew
63
A computer technician has successfully returned a laptop to full operation
and verified system functionality. Actions the technician performed
included modifying the registry and applying patches to the operating
systems. What is the next step in the troubleshooting process that the
technician should do?
Consult manufacturer manuals and repair logs.
Reboot the computer.
Re-attach and test all peripherals.
Document the solution.
64
This is a flash item. Please click below to answer this item.

65
How can a user prevent specific applications from accessing a Windows
computer over a network?
Enable MAC address filtering.
Disable automatic IP address assignment.
Block specific TCP or UDP ports in Windows Firewall.
Change default usernames and passwords.
66
When a Windows XP computer starts, a “Missing NTLDR” message is
displayed after the POST. What are two possible solutions to this
problem? (Choose two.)
Use the last known good configuration to boot the computer.
Run fdisk/mbr from the command prompt.
Run the bootrec/fixmbr command from the System Recovery console.
Restore the BOOTMGR file from the Windows installation media.
Restore ntdetect.com from the Windows installation media.
67
A computer locks up frequently, and no error message can be seen on
screen. The problem occurs every time the user attempts to restart the
computer. What is the most likely reason for this problem?
The power supply has failed.
The computer is overheating.
The index service is not running.
A startup file has become corrupted
68
A technician has replaced the power supply unit of a PC, but notices that
when the PC boots up the RAID array cannot be found. The technician
verifies that the wattage of the replaced power supply unit matches the
original one and that the RAID controller is receiving adequate power.
What is the problem?
The RAID controller requires a higher voltage setting.
The CMOS settings have not been saved.
The power cables were incorrectly reconnected to the array of
drives.
The power supply unit is not supplying the correct voltage.
69
A user notices that there is intermittent wireless connectivity on a laptop
that is running a wireless PCI Express Micro card using the wireless
802.11n standard. What should the user do to fix the problem?
Replace the OS on the laptop.
Move the laptop to a new location.
Replace the PCI Express Micro card with a Mini-PCIe card.
Replace the PCI Express Micro card with a Mini-PCI card.
70
Which type of user account is created automatically during a Windows XP
installation?
Administrator
Guest
Standard user
Power user
71
A cleaner attempts to enter a computer lab but is denied entry by the
receptionist because there is no scheduled cleaning for that day. What
type of attack was just prevented?
shoulder surfing
social engineering
war driving
Trojan
phishing
72
After consulting the manufacturer manuals, a technician applies a series
of recommended solutions that resolve a problem with a workstation
computer. What is the next step in the troubleshooting process that the
technician should perform?
Determine the next steps to resolve the problem.
Test the theory of probable cause.
Document the findings, actions, and outcomes.
Verify the solution and confirm full system functionality.
73
A user is able to only access files required to perform a specific task.
What type of security practice is being applied?
principle of least privilege
principle of necessary privilege
principle of most privilege
principle of privileges
74
A user replaced a PC CPU with a faster one, but now the PC displays a
BSOD on bootup. What is the problem?
The CMOS settings have not been saved on bootup.
The CPU multiplier has not been set.
The front side bus is set too low.
The CPU voltage is set too high.
75
A user receives an email requesting verification of the password that is
used to access bank files. What type of security threat is this?
malware
social engineering
virus
phishing
76
A company has replaced five desktop computers in the accounting and
finance department with new computers. The plan is to donate the
recovered computers in a fully functional state to a not-for-profit
community organization. How can the company ensure that sensitive
financial data cannot be accessed once the computers are donated?
Perform a high-level format on the hard drives.
Drill holes through the hard drive platters.
Data wipe the hard drives by using specialized software.
Delete all the files and directories on the hard drives.
77
Which ping command option would be used to resolve the hostname
when testing connectivity to a specific IP address?
ping -a
ping -t
ping -s
ping -n
78
Which two precautions can help prevent social engineering? (Choose
two.)
Always require a user name and password to be configured.
Keep your password securely under your keyboard.
Escort all visitors.
Do not allow any customers into the workplace.
Always ask for the ID of unknown persons.
79
A company has a guest wireless network available for visitors while on
the company premises. A technician has noted that unauthorized users
are connecting to this wireless network from outside the premises. Which
action can be taken to reduce unauthorized connections to the guest
wireless network while enabling visitors to still connect quickly and easily
without assistance while on the company premises?
Disable SSID broadcast.
Configure WPA encryption.
Reduce the radio power level.
Enable MAC address filtering.
80
Which three items are biometric security devices? (Choose three.)
voice recognition
fingerprint reader
retina scanner
smart card
password
key fob
81
Which statement is correct about applying firmware updates?
Firmware updates should not be included as part of the preventive
maintenance program.
It is possible to use the Roll Back feature to reverse the change.
Firmware updates are sometimes irreversible.
The firmware updates can be installed automatically using the Windows
Service Pack utility.
82
When a user tries to run a program a missing or corrupt DLL message is
displayed. What are two possible solutions to this problem? (Choose
two.)
Run sfc/scannow in Safe Mode.
Run Windows Startup Repair.
Use the msconfig command to adjust the startup settings for the program.
Register the DLL file using the regsvr32 command.
Reinstall the correct drivers.

You might also like