If a computer does not have an optical drive, which of the following is the MOST efficient method to install an operating system?
B. USB flash drive
Which of the following is the MAXIMUM number of primary partitions that can be created on a hard drive withFAT32?
B. 4
Phishing is:
A. a technique used to obtain financial information from a user mimicking a legitimate website.
The computer starts up and runs for less than a minute before shutting down or locking up. This is a symptom of:
A. overheating.
When the computer is turned on it emits a series of beeps and does not POST. This can be caused by a bad:
A. video card.
A technician needs to decrease the time it takes to install an operating system on 100 computers. Which of the following installations would the technician use to reduce hands-on time spent on each computer?
B. Unattended installation
A technician is configuring a PC that will have confidential information stored on it. To ensure that only authorized users can access this PC, which of the following should the technician do? (Select TWO).
C. Disable the guest account
E. Change the default username
A company recently had a security breach and is now required to increase the security on their workstations. A technician has been tasked to harden all the workstations on the network. Which of the following should the technician do?
D. Enable screensaver required passwords
A technician recently installed a new video card in a PC. The PC already has integrated video on the motherboard. When the technician turns on the PC, there is no video. Which of the following is MOST likely the cause?
D. The power connector for the video card is unplugged.
QUESTION 10A user receives a phone call from a person claiming to be from technical support. This person knows the user's name and that the user has Windows installed on their computer. The technician directs the user to open Event Viewer and look at some event log entries to demonstrate the effects of a virus on the computer. The technician also asks the user for their user ID and password so that they can clean the computer. This is an example of which of the following security threats?
D. Social engineering
A user has just purchased a wireless router for their home. Which of the following should be done to BEST secure the router from unauthorized access? (Select TWO).
A. Change router default logins
C. Set encryption on the router
A user's CRT display is not displaying colors correctly. Turning the display to the right or left sometimes temporarily corrects the problem. Which of the following should the technician check?
B. The video cable
A laser printer is producing completely blank sheets. Which of the following processes should the technician check FIRST?
C. Development
A Windows user states that every time they hit certain letter keys on their notebook, a number appears insteadof the letter. Which of the following items is MOST likely the cause of this problem?
D. The user enabled num lock.
A Windows 7 desktop PC has crashed (i.e. BSOD) several times indicating a possible RAM problem. Which of the following is an OS built-in tool that can be used to test this problem?
D. Windows Memory Diagnostic
Which of the following should be regularly scheduled to fix hard drive errors?
B. Check Disk
A user is experiencing slow performance with their computer. A technician suspects the computer has a virus and runs antivirus software. A virus is found and removed, but the performance issue is not resolved. Which of the following should the technician perform NEXT?
D. Re-establish a new theory or escalate
After installing a new multifunctional printer, an administrator realizes the flatbed scanner does not scan any documents. Which of the following is the MOST likely reason of the issue?
A. The scanner lock switch on the device is locked.
After replacing a motherboard on a customer's laptop for a no sound issue, a technician realizes that there is intermittent wireless connectivity on the laptop. Which of the following should the technician perform FIRST?
B. Check if the WiFi antenna is connected properly to the wireless card.
The benefit of MAC filtering in wireless networking is that the network:
D. is more secure.
A technician is trying to request a new IP address to a customer's computer through the command prompt. Which of the following commands should the technician use?
D. ipconfig /renew
A customer is not able to connect to any websites. Which of the following commands should a technician run FIRST to identify the issue?
B. IPCONFIG
A technician wants to know the MAC address of a computer. Which of the following commands would the technician use?
A. IPCONFIG
A technician would like to dispose of a hard drive that is no longer needed. According to company policy, all contents on the disk should be deleted before disposal. Which of the following OS command line tools should be used?
D. FORMAT
When securing a new wireless router, which of the following should be changed FIRST?
C. Default password
A computer starts to boot then quickly shuts down. Which of the following should the technician use to troubleshoot this issue?
C. Power supply tester
A client has a computer that is infected with several viruses and spyware. Which of the following should the technician perform FIRST before spyware removal?
D. Disable system restore
A PC is running slower than usual. Which of the following tools would BEST diagnose the possible bottleneck?
B. Task Manager
Which of the following switches should a technician use with the PING command to resolve an IP address to a hostname?
D. -a
A technician is trying to setup a non-domain user account on a workstation, but receives the following error message "Password does not meet the complexity requirements." Which of the following utilities should the technician use to identify the criteria?
A. Local Security Policy
In a SOHO wireless network, which of the following prevents unauthorized users from accessing confidential data?
C. Set encryption
Which of the following commands is used to map a network drive?
C. NET USE
A technician recently setup a new wired network and wants to ensure only their computers can use it. Which of the following is the MOST secure way to accomplish this?
B. Disable the extra ports on the router.
Which of the following BEST describes a method for installing an operating system across the network?
C. PXE
Which of the following would be the BEST format for optical media?
D. CDFS
After updating the device drivers for a video adapter, a user reports they are only able to view a portion of the screen and the text is very large. Which of the following is MOST likely the cause?
D. Resolution set too low
After connecting a laptop to an external monitor, no display is detected and the monitor goes into sleep mode.Which of the following should be attempted FIRST to correct the problem? (Select TWO).
C. Change the input mode on the monitor
D. Toggle the display using the keyboard shortcut
A technician has been dispatched to a customer site to diagnose an issue where the computer turns off intermittently. Upon arriving at the site, the technician detects a smoke smell coming from the computer. Which of the following is the BEST solution?
D. Power down the system and replace the power supply.
Which of the following security measures is usually found in a laptop?
B. Biometrics
Which of the following can be achieved with Group Policy to help with workstation security measures?
C. Complexity requirements
Which of the following can enable a technician to remove a virus that prevents users from updating their antivirus software?
C. Safe mode
A technician notices that a computer is making a loud clicking noise but continues to run. System speed is barely affected, but they cannot access certain drives. These are the symptoms of which of the following?
A. Failing second hard drive
A user's laptop has died but the hard drive is still functioning. Which of the following is the BEST way for the user to still access and edit all of their data?
D. USB hard drive enclosure
Which of the following is the BEST way to get rid of dead pixels on a laptop screen?
A. Replace the LCD
A technician is tasked with upgrading a network card on a Windows 7 Professional PC. The technician installs the network card, loads Windows XP drivers that came with the network card, and reboots the PC. Upon rebooting, the computer blue screens and the technician cannot get the computer to boot up properly. Which of the following should the technician perform to resolve this issue without any data loss? (Select TWO).
C. Remove network drivers
E. Boot up in safe mode
In which of the following operating systems does Windows XP mode come as a free download to be used for application compatibility?
B. Windows 7 Professional
The Aero feature is found in which of the following operating systems? (Select TWO).
C. Windows 7 Home Premium
C. Windows Vista Enterprise
An audio visual company has decided that they want to migrate from Windows XP Professional SP2. The company has a domain network. A technician is tasked with selecting an operating system. Which of the following should the technician select?
D. Windows 7 Professional
A technician is installing and configuring a SOHO wireless network for a client. The client only wants five authorized computers to connect to the network with a defined IP range. Which of the following should the technician configure on the router? (Select TWO).
C. DHCP
E. MAC filtering
A user calls the helpdesk and states that they are receiving an IP conflict error on their computer. The user is on a company network that uses DHCP. The technician verified the PC is using DHCP to obtain TCP/IP settings. Which of the following commands should the helpdesk technician use to resolve this issue? (Select TWO).
C. Ipconfig /renew
E. Ipconfig /release
A user calls the helpdesk and states that they suddenly cannot connect to the Internet or any other network resources. The user is on a company network that uses DHCP. The technician runs IPCONFIG from the command prompt and the PC has an IP address of 0.0.0.0. Which of the following steps should the technician perform FIRST to troubleshoot this issue?
C. Check the network cable
A technician has installed the hardware for a SOHO wired network. Which of the following is the FIRST step to securing the network?
B. Change default usernames and passwords
A bank is upgrading some clerical users' PCs. Which of the following would be the MOST appropriate method for erasing the data on the old PCs?
B. Drive degauss
Which of the following is a security threat that uses email to trick users?
C. Phishing
A user reports that the desktop PC shuts down 10 minutes after turning it on in the morning. When the technician moves the PC, it sounds like there are loose parts sliding around in the case. Which of the following is the MOST likely explanation for the PC shutting down?
C. The heat sink retaining clip has broken loose.
A technician is diagnosing a PC running Windows 7 which has been affected with an "NTLDR is missing" error message. Which of the following command line tools would BEST resolve the problem?
B. Fixboot
A user reports that people are receiving emails from their account that the user never sent. Which of the following security measures would BEST resolve the problem?
C. Change the account password.
A technician is repairing a workstation that exhibits random reboots at odd times of the day. Which of the following should be performed FIRST when troubleshooting the issue? (Select TWO).
A. Check the PSU integrity
D. Check the memory integrity
A technician is troubleshooting a PC that is not completing POST and merely provides an audible beep code. Which of the following should be the FIRST item checked?
C. The memory configuration
A user has an external hard drive which they forget to unplug before booting their machine. Each time this happens, an error shows on the screen which states "Boot sector missing ?reboot to try again." Which of the following would be the BEST way to resolve this?
A. Change BIOS options to remove USB device from the boot order.
A user states that their old notebook loses connectivity to the Internet several times a day at work and at home. The issue started after the wireless card was replaced. Which of the following items is MOST likely causing the issue?
A. The drivers for the NIC need to be updated.
Which of the following commands may need to be run after a virus removal if the computer will not boot?
D. FIXMBR
A technician would like to map a network drive. Which of the following indicates the correct path for mapping a network drive?
D. \servernameshare
Which of the following is the MINIMUM account required to install most programs on Windows XP?
A. Power user
Which of the following security methods is BEST used to track access to a server room?
A. Biometric lock
Which of the following user accounts should be disabled to adhere to security best practices?
D. Guest
Which of the following user accounts should be renamed to adhere to security best practices?
D. Administrator
When walking past a server with a RAID 5 array, a technician hears a loud clicking noise. Which of the following could MOST likely occur?
B. Hard drive failure
A wireless network is experiencing intermittent connectivity. Which of the following would BEST resolve this issue?
B. Change broadcast channel
When configuring user accounts, which of the following should a technician perform?
C. Assign the minimum required access to the users
A technician needs to rebuild a computer that had a virus. Which of the following data destruction methods should be used to ensure the virus has been successfully erased before reinstalling the operating system, programs, and all user data?
C. Standard format
Which of the following security threats do shredders help prevent?
A. Dumpster diving
A user states when they press certain letters on their laptop's keyboard, a number is displayed on the screen. Which of the following can the technician perform to resolve this issue?
A. Turn off number lock
Which of the following is the correct path to determine the IP address on an iOS device?
B. Settings> General> Network> Wi-Fi> SSID Name> IP address
A contractor needs to destroy several drives containing confidential information so that they can never be used again. Which of the following destruction methods would BEST accomplish this task?
C. Drill into the hard drives.
A customer purchases a new 802.11n router for their home. They connect it to their current 801.11g devices, as well as their new laptop. Even though the laptop has a built-in 802.11n antenna, they are not noticing any speed increase. Which of the following is the MOST likely cause?
B. The router is broadcasting in Mixed Mode.
Which of the following home computer synchronization methods are possible with an iOS device? (Select TWO).
A. USB
D. Wi-Fi
A customer states their laptop screen is very dim. In order to avoid going to the client site, which of the following is the FIRST action the customer should perform?
C. Use function keys
A customer says they cannot access the network printer. The technician cannot PING the printer from their location. Which of the following should be the NEXT step in troubleshooting this issue?
C. Check the link lights on printer NIC
A user has too many applications starting when they log into windows. From the command line, which of the following tools is the FASTEST option to prevent these applications from running on startup?
C. MSCONFIG
From which of the following tools can a technician locate the PID of an application?
C. Task Manager
A technician has a computer locked in a cabinet in the office that shares a printer and some files. The computer must remain on. Which of the following Control Panel options would be used to control the users that are able to shut the computer down?
A. Local security policy
A customer states that another technician just removed some viruses and now they are not able to connect to websites such as Windows Update, but are able to connect to others. Which of the following is the MOST likely cause of the issue?
B. Host file has been manipulated
Which of the following file system types is used for optical media?
A. CDFS
A user has setup a SOHO and needs to implement a network configuration that allows for sharing of devices and files across the network without the complexity of a centralized server. Which of the following would be MOST appropriate?
C. WorkGroup
A customer reports that their wireless laptop cannot connect after removing it from its carrying case. The laptop boots and the user is able to log in. Which of the following should be checked FIRST?
C. External antenna switch
Which of the following supports IP telephony devices without requiring external power?
B. PoE
A customer is concerned about a computer that repeatedly beeps when attempting to power on. Which of the following is MOST likely the cause?
B. RAM not seated properly
A customer wants to use VoIP phones without having to plug them into an electrical outlet. Which of the following switch features would a technician recommend?
D. PoE
A customer reports that after a technician cleaned up a rogue antivirus program, the customer cannot browse the web. Which of the following should the technician check to resolve the situation?
B. Proxy settings
A technician has 50 identical computers that need to be upgraded to the Windows 7 OS, and are capable of booting from the network. They are running a Gigabit network with a Windows deployment server. Which of the following will be the BEST to use in this scenario?
C. PXE
A computer program that functions normally while quietly installing malicious software on a machine is known as a:
A. Trojan.
Which of the following security threats is BEST mitigated through proper user training?
C. Social Engineering
A user sent an email requesting that a technician check if a computer is on and connected to the Internet so the user can login from home. Which of the following commands in the command prompt would a technician use to verify if the computer is on and connected without having to go to the computer?
C. PING
A technician recently removed spyware from a computer and now the user is getting error messages about system files. Which of the following tools would a technician use to verify all system files are intact and in their original versions?
C. SFC
A technician gets a call from a customer stating that their computer will not boot. They are getting the following error "invalid system disk". Which of the following should the technician check FIRST?
B. Verify that all removable drives are empty.
The practice of following an authorized person through an entrance without using a badge to defeat security is called:
B. tailgating
Turnstiles and other mantraps will prevent which of the following security threats?
A. Tailgating
Which of the following encryption standards is found on older wireless devices and provides minimal security?
B. WEP
An IR printer stops working for half of an office while the other half is able to print. Which of the following should be checked FIRST?