Class C

  1. If a computer does not have an optical drive, which of the following is the MOST efficient method to install an operating system?




    B. USB flash drive
  2. Which of the following is the MAXIMUM number of primary partitions that can be created on a hard drive withFAT32?




    B. 4
  3. Phishing is:




    A. a technique used to obtain financial information from a user mimicking a legitimate website.
  4. The computer starts up and runs for less than a minute before shutting down or locking up. This is a symptom of:




    A. overheating.
  5. When the computer is turned on it emits a series of beeps and does not POST. This can be caused by a bad:




    A. video card.
  6. A technician needs to decrease the time it takes to install an operating system on 100 computers. Which of the following installations would the technician use to reduce hands-on time spent on each computer?




    B. Unattended installation
  7. A technician is configuring a PC that will have confidential information stored on it. To ensure that only authorized users can access this PC, which of the following should the technician do? (Select TWO).





    • C. Disable the guest account
    • E. Change the default username
  8. A company recently had a security breach and is now required to increase the security on their workstations. A technician has been tasked to harden all the workstations on the network. Which of the following should the technician do?




    D. Enable screensaver required passwords
  9. A technician recently installed a new video card in a PC. The PC already has integrated video on the motherboard. When the technician turns on the PC, there is no video. Which of the following is MOST likely the cause?




    D. The power connector for the video card is unplugged.
  10. QUESTION 10A user receives a phone call from a person claiming to be from technical support. This person knows the user's name and that the user has Windows installed on their computer. The technician directs the user to open Event Viewer and look at some event log entries to demonstrate the effects of a virus on the computer. The technician also asks the user for their user ID and password so that they can clean the computer. This is an example of which of the following security threats?




    D. Social engineering
  11. A user has just purchased a wireless router for their home. Which of the following should be done to BEST secure the router from unauthorized access? (Select TWO).





    • A. Change router default logins
    • C. Set encryption on the router
  12. A user's CRT display is not displaying colors correctly. Turning the display to the right or left sometimes temporarily corrects the problem. Which of the following should the technician check?




    B. The video cable
  13. A laser printer is producing completely blank sheets. Which of the following processes should the technician check FIRST?




    C. Development
  14. A Windows user states that every time they hit certain letter keys on their notebook, a number appears insteadof the letter. Which of the following items is MOST likely the cause of this problem?




    D. The user enabled num lock.
  15. A Windows 7 desktop PC has crashed (i.e. BSOD) several times indicating a possible RAM problem. Which of the following is an OS built-in tool that can be used to test this problem?




    D. Windows Memory Diagnostic
  16. Which of the following should be regularly scheduled to fix hard drive errors?




    B. Check Disk
  17. A user is experiencing slow performance with their computer. A technician suspects the computer has a virus and runs antivirus software. A virus is found and removed, but the performance issue is not resolved. Which of the following should the technician perform NEXT?




    D. Re-establish a new theory or escalate
  18. After installing a new multifunctional printer, an administrator realizes the flatbed scanner does not scan any documents. Which of the following is the MOST likely reason of the issue?




    A. The scanner lock switch on the device is locked.
  19. After replacing a motherboard on a customer's laptop for a no sound issue, a technician realizes that there is intermittent wireless connectivity on the laptop. Which of the following should the technician perform FIRST?




    B. Check if the WiFi antenna is connected properly to the wireless card.
  20. The benefit of MAC filtering in wireless networking is that the network:




    D. is more secure.
  21. A technician is trying to request a new IP address to a customer's computer through the command prompt. Which of the following commands should the technician use?




    D. ipconfig /renew
  22. A customer is not able to connect to any websites. Which of the following commands should a technician run FIRST to identify the issue?




    B. IPCONFIG
  23. A technician wants to know the MAC address of a computer. Which of the following commands would the technician use?




    A. IPCONFIG
  24. A technician would like to dispose of a hard drive that is no longer needed. According to company policy, all contents on the disk should be deleted before disposal. Which of the following OS command line tools should be used?




    D. FORMAT
  25. When securing a new wireless router, which of the following should be changed FIRST?




    C. Default password
  26. A computer starts to boot then quickly shuts down. Which of the following should the technician use to troubleshoot this issue?




    C. Power supply tester
  27. A client has a computer that is infected with several viruses and spyware. Which of the following should the technician perform FIRST before spyware removal?




    D. Disable system restore
  28. A PC is running slower than usual. Which of the following tools would BEST diagnose the possible bottleneck?




    B. Task Manager
  29. Which of the following switches should a technician use with the PING command to resolve an IP address to a hostname?




    D. -a
  30. A technician is trying to setup a non-domain user account on a workstation, but receives the following error message "Password does not meet the complexity requirements." Which of the following utilities should the technician use to identify the criteria?




    A. Local Security Policy
  31. In a SOHO wireless network, which of the following prevents unauthorized users from accessing confidential data?




    C. Set encryption
  32. Which of the following commands is used to map a network drive?




    C. NET USE
  33. A technician recently setup a new wired network and wants to ensure only their computers can use it. Which of the following is the MOST secure way to accomplish this?




    B. Disable the extra ports on the router.
  34. Which of the following BEST describes a method for installing an operating system across the network?




    C. PXE
  35. Which of the following would be the BEST format for optical media?




    D. CDFS
  36. After updating the device drivers for a video adapter, a user reports they are only able to view a portion of the screen and the text is very large. Which of the following is MOST likely the cause?




    D. Resolution set too low
  37. After connecting a laptop to an external monitor, no display is detected and the monitor goes into sleep mode.Which of the following should be attempted FIRST to correct the problem? (Select TWO).





    • C. Change the input mode on the monitor
    • D. Toggle the display using the keyboard shortcut
  38. A technician has been dispatched to a customer site to diagnose an issue where the computer turns off intermittently. Upon arriving at the site, the technician detects a smoke smell coming from the computer. Which of the following is the BEST solution?




    D. Power down the system and replace the power supply.
  39. Which of the following security measures is usually found in a laptop?




    B. Biometrics
  40. Which of the following can be achieved with Group Policy to help with workstation security measures?




    C. Complexity requirements
  41. Which of the following can enable a technician to remove a virus that prevents users from updating their antivirus software?




    C. Safe mode
  42. A technician notices that a computer is making a loud clicking noise but continues to run. System speed is barely affected, but they cannot access certain drives. These are the symptoms of which of the following?




    A. Failing second hard drive
  43. A user's laptop has died but the hard drive is still functioning. Which of the following is the BEST way for the user to still access and edit all of their data?




    D. USB hard drive enclosure
  44. Which of the following is the BEST way to get rid of dead pixels on a laptop screen?




    A. Replace the LCD
  45. A technician is tasked with upgrading a network card on a Windows 7 Professional PC. The technician installs the network card, loads Windows XP drivers that came with the network card, and reboots the PC. Upon rebooting, the computer blue screens and the technician cannot get the computer to boot up properly. Which of the following should the technician perform to resolve this issue without any data loss? (Select TWO).





    • C. Remove network drivers
    • E. Boot up in safe mode
  46. In which of the following operating systems does Windows XP mode come as a free download to be used for application compatibility?




    B. Windows 7 Professional
  47. The Aero feature is found in which of the following operating systems? (Select TWO).





    • C. Windows 7 Home Premium
    • C. Windows Vista Enterprise
  48. An audio visual company has decided that they want to migrate from Windows XP Professional SP2. The company has a domain network. A technician is tasked with selecting an operating system. Which of the following should the technician select?




    D. Windows 7 Professional
  49. A technician is installing and configuring a SOHO wireless network for a client. The client only wants five authorized computers to connect to the network with a defined IP range. Which of the following should the technician configure on the router? (Select TWO).





    • C. DHCP
    • E. MAC filtering
  50. A user calls the helpdesk and states that they are receiving an IP conflict error on their computer. The user is on a company network that uses DHCP. The technician verified the PC is using DHCP to obtain TCP/IP settings. Which of the following commands should the helpdesk technician use to resolve this issue? (Select TWO).





    • C. Ipconfig /renew
    • E. Ipconfig /release
  51. A user calls the helpdesk and states that they suddenly cannot connect to the Internet or any other network resources. The user is on a company network that uses DHCP. The technician runs IPCONFIG from the command prompt and the PC has an IP address of 0.0.0.0. Which of the following steps should the technician perform FIRST to troubleshoot this issue?




    C. Check the network cable
  52. A technician has installed the hardware for a SOHO wired network. Which of the following is the FIRST step to securing the network?




    B. Change default usernames and passwords
  53. A bank is upgrading some clerical users' PCs. Which of the following would be the MOST appropriate method for erasing the data on the old PCs?




    B. Drive degauss
  54. Which of the following is a security threat that uses email to trick users?




    C. Phishing
  55. A user reports that the desktop PC shuts down 10 minutes after turning it on in the morning. When the technician moves the PC, it sounds like there are loose parts sliding around in the case. Which of the following is the MOST likely explanation for the PC shutting down?




    C. The heat sink retaining clip has broken loose.
  56. A technician is diagnosing a PC running Windows 7 which has been affected with an "NTLDR is missing" error message. Which of the following command line tools would BEST resolve the problem?




    B. Fixboot
  57. A user reports that people are receiving emails from their account that the user never sent. Which of the following security measures would BEST resolve the problem?




    C. Change the account password.
  58. A technician is repairing a workstation that exhibits random reboots at odd times of the day. Which of the following should be performed FIRST when troubleshooting the issue? (Select TWO).





    • A. Check the PSU integrity
    • D. Check the memory integrity
  59. A technician is troubleshooting a PC that is not completing POST and merely provides an audible beep code. Which of the following should be the FIRST item checked?




    C. The memory configuration
  60. A user has an external hard drive which they forget to unplug before booting their machine. Each time this happens, an error shows on the screen which states "Boot sector missing ?reboot to try again." Which of the following would be the BEST way to resolve this?




    A. Change BIOS options to remove USB device from the boot order.
  61. A user states that their old notebook loses connectivity to the Internet several times a day at work and at home. The issue started after the wireless card was replaced. Which of the following items is MOST likely causing the issue?




    A. The drivers for the NIC need to be updated.
  62. Which of the following commands may need to be run after a virus removal if the computer will not boot?




    D. FIXMBR
  63. A technician would like to map a network drive. Which of the following indicates the correct path for mapping a network drive?




    D. \servernameshare
  64. Which of the following is the MINIMUM account required to install most programs on Windows XP?




    A. Power user
  65. Which of the following security methods is BEST used to track access to a server room?




    A. Biometric lock
  66. Which of the following user accounts should be disabled to adhere to security best practices?




    D. Guest
  67. Which of the following user accounts should be renamed to adhere to security best practices?




    D. Administrator
  68. When walking past a server with a RAID 5 array, a technician hears a loud clicking noise. Which of the following could MOST likely occur?




    B. Hard drive failure
  69. A wireless network is experiencing intermittent connectivity. Which of the following would BEST resolve this issue?




    B. Change broadcast channel
  70. When configuring user accounts, which of the following should a technician perform?




    C. Assign the minimum required access to the users
  71. A technician needs to rebuild a computer that had a virus. Which of the following data destruction methods should be used to ensure the virus has been successfully erased before reinstalling the operating system, programs, and all user data?




    C. Standard format
  72. Which of the following security threats do shredders help prevent?




    A. Dumpster diving
  73. A user states when they press certain letters on their laptop's keyboard, a number is displayed on the screen. Which of the following can the technician perform to resolve this issue?




    A. Turn off number lock
  74. Which of the following is the correct path to determine the IP address on an iOS device?




    B. Settings> General> Network> Wi-Fi> SSID Name> IP address
  75. A contractor needs to destroy several drives containing confidential information so that they can never be used again. Which of the following destruction methods would BEST accomplish this task?




    C. Drill into the hard drives.
  76. A customer purchases a new 802.11n router for their home. They connect it to their current 801.11g devices, as well as their new laptop. Even though the laptop has a built-in 802.11n antenna, they are not noticing any speed increase. Which of the following is the MOST likely cause?




    B. The router is broadcasting in Mixed Mode.
  77. Which of the following home computer synchronization methods are possible with an iOS device? (Select TWO).





    • A. USB
    • D. Wi-Fi
  78. A customer states their laptop screen is very dim. In order to avoid going to the client site, which of the following is the FIRST action the customer should perform?




    C. Use function keys
  79. A customer says they cannot access the network printer. The technician cannot PING the printer from their location. Which of the following should be the NEXT step in troubleshooting this issue?




    C. Check the link lights on printer NIC
  80. A user has too many applications starting when they log into windows. From the command line, which of the following tools is the FASTEST option to prevent these applications from running on startup?




    C. MSCONFIG
  81. From which of the following tools can a technician locate the PID of an application?




    C. Task Manager
  82. A technician has a computer locked in a cabinet in the office that shares a printer and some files. The computer must remain on. Which of the following Control Panel options would be used to control the users that are able to shut the computer down?




    A. Local security policy
  83. A customer states that another technician just removed some viruses and now they are not able to connect to websites such as Windows Update, but are able to connect to others. Which of the following is the MOST likely cause of the issue?




    B. Host file has been manipulated
  84. Which of the following file system types is used for optical media?




    A. CDFS
  85. A user has setup a SOHO and needs to implement a network configuration that allows for sharing of devices and files across the network without the complexity of a centralized server. Which of the following would be MOST appropriate?




    C. WorkGroup
  86. A customer reports that their wireless laptop cannot connect after removing it from its carrying case. The laptop boots and the user is able to log in. Which of the following should be checked FIRST?




    C. External antenna switch
  87. Which of the following supports IP telephony devices without requiring external power?




    B. PoE
  88. A customer is concerned about a computer that repeatedly beeps when attempting to power on. Which of the following is MOST likely the cause?




    B. RAM not seated properly
  89. A customer wants to use VoIP phones without having to plug them into an electrical outlet. Which of the following switch features would a technician recommend?




    D. PoE
  90. A customer reports that after a technician cleaned up a rogue antivirus program, the customer cannot browse the web. Which of the following should the technician check to resolve the situation?




    B. Proxy settings
  91. A technician has 50 identical computers that need to be upgraded to the Windows 7 OS, and are capable of booting from the network. They are running a Gigabit network with a Windows deployment server. Which of the following will be the BEST to use in this scenario?




    C. PXE
  92. A computer program that functions normally while quietly installing malicious software on a machine is known as a:



    A. Trojan.
  93. Which of the following security threats is BEST mitigated through proper user training?




    C. Social Engineering
  94. A user sent an email requesting that a technician check if a computer is on and connected to the Internet so the user can login from home. Which of the following commands in the command prompt would a technician use to verify if the computer is on and connected without having to go to the computer?




    C. PING
  95. A technician recently removed spyware from a computer and now the user is getting error messages about system files. Which of the following tools would a technician use to verify all system files are intact and in their original versions?




    C. SFC
  96. A technician gets a call from a customer stating that their computer will not boot. They are getting the following error "invalid system disk". Which of the following should the technician check FIRST?




    B. Verify that all removable drives are empty.
  97. The practice of following an authorized person through an entrance without using a badge to defeat security is called:




    B. tailgating
  98. Turnstiles and other mantraps will prevent which of the following security threats?




    A. Tailgating
  99. Which of the following encryption standards is found on older wireless devices and provides minimal security?




    B. WEP
  100. An IR printer stops working for half of an office while the other half is able to print. Which of the following should be checked FIRST?




    A. Physical obstructions
Author
raschwe
ID
239882
Card Set
Class C
Description
C
Updated