Class A

  1. A PC has sensitive data that must be destroyed, before the PC is redeployed. A technician has been tasked with completely wiping the PC hard drive. Which of the following methods is BEST for the technician to use?




    B. Low level format
  2. An attack that creates a website that looks like another website, with the purpose of learning someone's account information is called which of the following?




    A. Phishing
  3. A technician is creating a batch script that auto-assigns a particular drive share to a drive letter upon login. Which of the following commands can accomplish this?




    D. NET USE
  4. An office of 25 computers is interested in employing a file server, network shares, and print server functionality. Which of the following network setups would be BEST suited for this situation?




    B. Domain
  5. Which of the following terms BEST describes the software or hardware used to manage virtual machines?




    C. Hypervisor
  6. A technician is required to change a setting for HKEY_Local_Machine. Which of the following would the technician use to change this?




    C. REGEDIT
  7. A technician is working on a PC that utilizes a RAID array for operation. The user of the system has reported that random files are becoming corrupted on creation with no pattern to the activity. One drive in the array is likely failing and causing the read/write failures. Which of the following Types of RAID is MOST likely in use?




    C. RAID 0
  8. Which of the following Control Panel utilities will allow a technician to change the associated file type in a Windows XP machine?




    B. Folder options
  9. Which of the following keys, when pressed immediately after the BIOS test, will display Windows Boot Manager on a Windows 7 PC?




    B. esc
  10. Which of the following Windows 7 versions comes with the LARGEST number of multimedia features?




    D. Home Premium
  11. A technician wants to know if a PC has an embedded wireless card. Which of the following tools should be used?




    A. Device Manager
  12. A technician notices multiple disk errors in the Event Viewer. Which of the following tools would BEST diagnose this issue?




    D. CHKDSK
  13. Which of the following BIOS boot methods allows a system to boot from a remote server?




    D. PXE
  14. Which of the following helps to prevent virus infections from USB flash drives?




    D. Disabling t
  15. Which of the following settings MUST be configured in order to turn on a VoIP phone?




    D. PoE
  16. A user is trying to access an application on their home machine from work. The user sets up port forwarding on their router but is still unable to connect to the application. Which of the following should be the user's NEXT step in resolving this issue?




    A. Configure a firewall exception on the Home PC.
  17. Which of the following security threats are MOST often delivered via email? (Select TWO).





    • E. Phishing
    • E. Spam
  18. The customer reports their PC freezes up every day around the same time. Which of the following utilities would be BEST to check for any error codes?




    B. Event Viewer
  19. A user is looking for the Application Data directory in their profile but cannot see it. Which of the following Control Panel options would correct this?




    A. Folder Options
  20. While configuring a new email application that uses POP3 for a customer, the technician determines the firewall is blocking the traffic. Which of the following ports should be opened to allow POP3 mail traffic through the firewall?




    C. 110
  21. A user has downloaded and installed a browser add-on that causes the browser to hang. The PC has very slow system response when rebooted. Which of the following should a technician do to troubleshoot this problem?




    C. Remove all temporary files, turn off System Restore, update and run an antivirus scan.
  22. A large magnet is placed too close to a CRT monitor. Which of the following will MOST likely occur?




    B. Distorted image
  23. In which of the following locations would a technician go to show file extensions?




    D. Folder Options
  24. After being relocated to an enclosed position under a desk, a computer experiences intermittent shutdowns. Which of the following conditions is MOST likely the cause?




    D. Overheating
  25. A technician is fixing a very slow computer. Antivirus and Malware programs have been run, and some detection have been removed. After running Disk Cleanup, the system still seems to be slow, especially with multiple programs running. Which of the following should the technician do NEXT?




    C. Run defrag
  26. A technician needs to build a PC to act as a home virtual server. Which of the following would be the BEST choice?




    D. QUAD Core CPU, 6GB DDR3 RAM, 320GB of hard drive space
  27. Windows XP Mode is available in which of the following Microsoft Windows environments?




    D. Windows 7 Business Edition
  28. A user is advised by the software vendor that the user must have elevated privileges in order to run a program. The user should do which of the following to BEST accomplish this?




    D. Right click select "run as" and select administrator
  29. A company wants to prevent non-authorized users from entering into a secure building. Which of the following will BEST mitigate this activity?




    A. Install mantraps
  30. An employee at a company lost their mobile device that contains proprietary information. Which of the following methods is the BEST to be implemented to prevent unauthorized users from obtaining this information?




    C. Remote wipe
  31. Which of the following is the command line entry to start an archive or restore a process on a Windows XPcomputer?




    B. NTBACKUP
  32. Which of the following would be the QUICKEST means of removing data from a hard drive, when there is no consideration regarding the total destruction of the data?




    D. Standard format
  33. Which of the following is MOST effective in preventing security breaches on a network? (Select THREE).

    A. Bandwidth throttling
    B. Eliminate password history
    C. Enable QoS
    D. Antivirus software
    E. User education
    F. Enforced login/logoff hours
    • D. Antivirus software
    • E. User education
    • F. Enforced login/logoff hours
  34. Which of the following areas of a file system should a standard user have restricted permissions to in order to promote a security best practice? (Select TWO).





    • E. Windows System Files
    • E. Program Files
  35. A user recently purchased a new PC with a 500GB hard drive. However, they are reporting that their C. Drive is only 420GB. Which of the following BEST explains this?




    D. A Factory Recovery Partition is using the 80GB.
  36. Which of the following are true regarding Windows 32-bit versus Windows 64-bit Operating Systems? (Select TWO).

    A. CPUs that can run Windows 32-bit can also run Windows 64-bit.
    B. Device drivers for Windows 32-bit and Windows 64-bit are the same.
    C. Not all CPUs are capable of running Windows 64-bit.
    D. Windows 64-bit can address larger amounts of RAM.
    E. Windows 64-bit is a more secure OS and less susceptible to viruses.
    • C. Not all CPUs are capable of running Windows 64-bit.
    • D. Windows 64-bit can address larger amounts of RAM.
  37. A technician receives a report that the pages coming out of a laser printer are smearing when touched. Which of the following components should the technician check FIRST to resolve this issue?




    A. Fuser
  38. A user just bought an Android tablet and wants to connect to their work email. The user's employer has a Microsoft Exchange server for email. Which of the following would the technician configure to allow the user to access email on the Android tablet?




    D. POP3, SMTP
  39. A technician is working on a user's PC. After testing the theory of the cause, which of the following could the technician perform NEXT? (Select TWO).





    • C. Resolve issue
    • C. New theory or escalate
  40. Which of the following would a technician use to install applications onto an iPad? (Select TWO).





    • B. App Store
    • C. iTunes
  41. A technician responds to a hardware issue with a server. The technician discovers that one of the hard drives in the server has failed. The server is set up in a RAID 1 configuration. Which of the following steps would the technician perform NEXT?




    A. Swap hard drive and rebuild array
  42. When removing the top case from a laptop, which of the following, besides hand tools, should a technician have on hand to assure correct disassembly and reassembly? (Select TWO).

    A. A millimeter and a toner probe.
    B. A large cloth to spread the screws and disassembled parts on.
    C. A writing pad for documentation and a marker to label cables.
    D. A manufacturer's technical manual for the model of the laptop.
    E. A container with separated areas to store different size screws.
    • D. A manufacturer's technical manual for the model of the laptop.
    • E. A container with separated areas to store different size screws.
  43. A user states that when they logon to their computer sometimes they get an IP conflict error. The user computer is configured with a static IP. Which of the following is the problem?




    C. Duplicate IP exist on the network
  44. A user has recently installed Windows 7 on a computer. They ran Windows updates, updated the firmware and installed a printer. The user accessed a P2P application and now they are getting a large amount of browser pop-ups. Which of the following is MOST likely the cause of the pop-ups?




    B. Malware
  45. Users are reporting that their laser printer is picking up multiple pages. The printer has very high utilization. Which of the following should be performed to resolve this issue?




    D. Use a maintenance kit
  46. Which of the following statements is true about XP mode in Windows 7?




    D. Only the Professional and the Ultimate versions support Windows XP mode.
  47. Which of the following is true about a file when it is copied from an NTFS to a FAT32 partitions?




    D. All of the file permissions are lost
  48. A technician wants to ensure that only authorized administrators can make configuration changes to the company's wireless router. Which of the following MUST the technician change to prevent unauthorized users from modifying the access point configuration?




    D. Manufacturer password
  49. If a customer wants to create a multi-boot PC with different editions of Windows, which of the following is MOST important to consider?




    C. Using multiple partitions
  50. Which of the following utilities would a technician use on a Windows Vista or Windows 7 machine to configure what applications are allowed to send/receive data over the LAN connection?




    D. Windows Firewall
  51. A customer needs to setup their laptop for use with a proxy server to browse the web at work. Which of the following areas would a technician need to visit to configure this on a Windows 7 system?




    C. Internet Options
  52. Which of the following mobile device sync methods is easiest for the end user but requires more configuration on the part of the technician?




    D. Wireless sync
  53. A PC is powering on but the only activity a technician can see is spinning fans. Which of the following components would MOST likely be at fault for such a condition? (Select TWO).

    A. SATA controller
    B. CPU
    C. Memory
    D. Hard drive
    E. Sound card
    • B. CPU
    • C. Memory
  54. A user realizes they left their mobile phone in a taxi minutes after the car departs. Which of the following should be done to BEST ensure none of the private data on the phone is accessed?




    A. Remote Wipe
  55. A user's PC has four hard drives in a RAID setup. After a single drive fails, the system will no longer boot and even rescue disks cannot see or access the volume. Which of the following RAID types was the user MOST likely using?




    C. 0
  56. A technician suspects that a recent virus they removed may have corrupted a necessary system file. Which of the following utilities can the technician use to verify the integrity of these critical files?




    A. sfc
  57. A corporate end user reports that random keys on their laptop are sticking. After taking the laptop in for repair a technician discovers that soda has been spilled inside the keyboard, possibly reaching other components inside the laptop. Which of the following should the technician do?




    C. Replace the keyboard and clean the interior of the laptop if necessary
  58. Which of the following System Tools would be the BEST one to perform a regular archiving of information on aPC?




    C. Backup
  59. A user states they have to reset the date and time on their computer every day. Which of the following hardware needs to be replaced to resolve this issue?




    A. CMOS battery
  60. A user reports that they are receiving intermittent BSOD error messages. Which of the following tools should a technician use to determine which hardware is failing?




    D. Memory diagnostics
  61. Which of the following is the correct UNC path to use when mapping a network drive?




    C. \servershare
  62. Which of the following can be used to remove a virus from a computer?




    C. Anti-malware software
  63. A technician is called to assist a customer. The customer reports when they powered on the system, they heard a loud noise, saw a spark, and smelled a burning smell. Which of the following should the technician advise the customer to do FIRST?




    C. Unplug the system from the power source.
  64. Which of the following operating systems is capable of fully utilizing more than 4GB of system RAM?




    D. Windows 7 64-bit
  65. A /all switch is MOST likely to be used with which of the following commands?




    C. IPCONFIG
  66. A user states that their machine is taking much longer to boot than usual. Which of the following utilities would BEST allow a technician to limit what is launched at startup?




    A. MSCONFIG
  67. A technician wants to create a customized list of common utilities that are easily accessible in the same location. Which of the following tools would allow them to build such a list?




    B. MMC
  68. A technician needs to use a command line tool to determine the network name and the IP address of are source. Which of the following command line tools will provide an IP address when given a name?




    C. nslookup
  69. A user wants to configure their network to support VoIP. Which of the following would BEST support a VoIP installation?




    A. QoS
  70. A user is concerned about an issue with iOS. The user MOST likely has which of the following devices?




    D. iPhone
  71. A user has installed a legacy application in Windows 7 and reports that only some of the functionality in it is operational. Another user is using the same application on a different Windows 7 machine and doesn't report those problems. Which of the following features in Windows 7 may be responsible for this problem?




    B. User Account Control
  72. A user reports that they are getting frequent delayed write messages throughout the day and are experiencing sluggish performance. The technician suspects that the issue relates to the hard disk drive. Which of the following would BEST help validate the diagnosis?




    D. SMART status
  73. A user states that they are having a problem with their word processor on their laptop. Whenever they attempt to type letters with their right hand, numbers and symbols show up instead. Which of the following would address this issue?




    A. Toggle the function + num lock combination
  74. Which of the following security threats is defined by its self-propagating characteristic?




    A. Worm
  75. Which of the following features allows for easier navigation of long lists on a tablet device?




    B. Touch flow
  76. Which of the following file system types is used primarily for optical media?




    C. CDFS
  77. When moving files from a Microsoft gaming console, which of the following command line utilities is recommended to transfer files?




    A. XCOPY
  78. Which of the following should a technician implement to prevent external contractors from physically plugging devices into the company's network jacks unless such jacks are designated for guest use?




    A. Disable all switch ports when they are not utilized and enable them on an as needed basis.
  79. A small business owner is setting up their wireless network in their office, which is in a building shared with several other businesses. The owner does not want to disable the SSID broadcasting due to visiting customers needing to use the network, but does not want other businesses to notice the network, let alone access it. Which of the following would BEST accomplish this?




    D. Adjust the radio power so that coverage is restricted to the business.
  80. An administrator is concerned about users accessing network shares outside of their job role. Which of the following would BEST prevent this?




    A. Set up shares with permissions based upon group membership.
  81. A company is looking to donate a collection of old PCs that are no longer needed. Which of the following data destruction methods would be MOST secure for highly sensitive information?




    C. Low level 7-pass random wipe
  82. A user receives an unsolicited call from a technician claiming to be from a Microsoft certified partner. The technician tricks the user into allowing them access to their PC because of malware alerts that were being broadcasted. Which of the following attacks is this user a victim of?




    B. Social engineering
  83. A user's PC breaks and a technician needs to configure a new machine with a copy of their computer image stored on a remote server. Which of the following technologies would help RIS install this image?





    E. PXE
  84. Which of the following identifies traffic based upon its physical network address?




    A. MAC filtering
  85. QUESTION 85A technician must secure company documents from accidental disclosure. Which of the following should be implemented? (Select TWO).






    • F. User training
    • C. Paper shredding
  86. Which of the following is TRUE about the difference between a worm and a virus?




    D. Worms self-propagate while viruses need human intervention to replicate.
  87. A technician is tasked with improving the security of a SOHO network. The office is comprised of a single wireless router located under the front desk where the office manager sits. All desktop computers are wired into the router which is configured with strong device credentials. Additionally, wireless is disabled on the router. Which of the following should the technician perform NEXT to improve the security of the SOHO network?




    C. Place the router in a locked room.
  88. A technician is setting up automatic login to desktop for a non-domain Windows XP system. Which of the following administrative tools would accomplish this?




    D. User Accounts
  89. A user calls the help desk to report about their smartphone not being able to make any phone calls. The user admits that the smartphone can still send/receive email, browse all websites, and utilize all Internet-capable applications. Which of the following issues is MOST likely affecting the smartphone?




    A. The cellular antenna is turned off; Wi-Fi is still on.
  90. A technician is troubleshooting a customer's computer that will not turn on. The user stated that the computer was working fine until there was a thunderstorm the other night. Which of the following tools would the technician use to determine what is wrong with the computer?




    C. Power supply tester
  91. A senior technician requests a diagnostic tool for checking external ports and connectors on computers and laptops. Which of the following tools would BEST accomplish this task?




    D. Loopback plugs
  92. After installing a new printer the organization determines that there are problems printing images and very large files. Which of the following will MOST likely resolve the issue?




    D. Install additional memory to the printer
  93. Which of the following command line tools will terminate a non-system process without restarting the computer?




    A. Kill
  94. After accidentally removing a hard drive from a server with three drives in a RAID 5 configuration, a technician notices the server locks up and shuts down. Which of the following can the technician do to quickly fix the problem?




    B. Reinsert the drive and boot.
  95. A customer calls an IT consultant to explain an issue they are having with their Windows 7 Professional PC. Windows Update attempts to install patches upon each startup but fails on the same single update. The customer has attempted to re-run Windows Update from Control Panel but the issue remains. Which of the following courses of action would BEST resolve the problem?




    D. Clearing the Windows Update download cache entirely
  96. A user reports that their wireless connectivity is being spotty. The issue seems to interrupt their wireless signal connection when the laptop screen is tilted forward or backward during operation. When this happens, the entire wireless signal drops out until the screen is left in position for a good minute or so. Which of the following MOST likely explains what is happening?




    D. The wireless signal cables are being crimped when the screen is opening/closing.
  97. A user states that they cannot connect to the network or the Internet. The technician determines the issue is that the computer has a static IP address and needs to use DHCP to work correctly. The technician sets the NIC to automatically assign an IP address. Which of the following should the technician perform NEXT?




    C. Confirm the computer is back on the network and has Internet connectivity
  98. After several passes with a malware removal program, the program keeps detecting the same malware infection after a reboot. Which of the following should be done to attempt to remove the offending malware?




    B. Run the malware removal program in Windows Safe Mode
  99. A user, Joe, calls and states every few hours he is unable to connect to the Internet for several minutes but is able to access internal sites during this time. Which of the following tools would be used to find the issue with the network connection?




    D. TRACERT
  100. A technician is trying to prevent a local application from reaching the web due to security concerns. Which of the following solutions could BEST prevent the application from reaching the web? (Select TWO).






    • D. Block the application in Windows Firewall
    • F. Reroute the web address in HOSTS file
Author
raschwe
ID
239857
Card Set
Class A
Description
A
Updated