Class D

  1. Browser redirection is caused by which of the following types of viruses?




    B. Hijack
  2. A technician receives an error every time a workstation boots up. The technician needs to find out what process is responsible for the error. Which of the following utilities would be used FIRST?




    B. Event Viewer
  3. Which of the following tools would be used to connect CAT5e cabling to a patch panel?




    B. Punch down
  4. A user has a perimeter firewall and up-to-date antivirus software. The user is asking what else they can do to improve their security. Which of the following will have the MOST impact on network security? (Select TWO).

    A. Install additional antivirus software
    B. Disable screen savers
    C. Conduct a daily security audit
    D. Assign security rights based on job roles
    E. Use strong passwords
    • D. Assign security rights based on job roles
    • E. Use strong passwords
  5. A user states that when they power on their computer, they receive a "Non-bootable drive" error. The user works with external storage devices to transport data to their computer. The user stated that the computer worked fine the day before. Which of the following should be checked FIRST to resolve this issue?




    D. Device boot order
  6. A service technician is installing a second hard drive on a desktop PC running Windows 7. The second hard drive is the same make and model of the first hard drive. The technician would like to provide data redundancy. Which of the following should the technician use to accomplish this?




    C. Disk Management
  7. A technician is trying to troubleshoot an issue on a Windows 7 computer remotely, but is unable to PING the computer. The technician verified that the computer is turned on, has network connectivity, and can get to the Internet. Which of the following is MOST likely the issue?




    A. Windows firewall is enabled
  8. An Internet browser's cookie could be classified as which of the following?




    B. Spyware
  9. A technician is working on a workstation that is receiving read/write failures when trying to access a particular file. Which of the following commands should the technician use to resolve this issue?




    B. CHKDSK
  10. A technician is tasked with changing the account lockout threshold to 30 minutes in Windows 7. Which of the following should the technician use to accomplish this task?




    B. Local Security Policy
  11. A technician needs to change the minimum password length to 8 characters to make it more secure. Which of the following system settings should the technician configure?




    B. Local Security Policy
  12. A technician is creating an image that will be used to deploy Windows 7 to 100 PCs. Which of the following tools should be used to accomplish this?




    A. SYSPREP
  13. A technician needs to create a new folder from the command line on the root of the C. drive. Which of the following is the correct command to use?




    A. MD
  14. A technician notices a computer is overheating after 30 minutes of use. Which of the following is the MOST likely cause?




    B. Internal dust buildup
  15. A technician is having boot issues with a newly built PC, and notices the following jumper configurations for each PATA device: HARD DRIVE. MASTEROPTICAL DRIVE. CABLE SELECT Which of the following jumper configurations should be used instead?




    C. HDD. Cable Select; Optical Drive. Cable Select
  16. A technician troubleshoots a broken PC only to find that a strong burning odor is coming from inside the case. Which of the following parts MOST likely experienced a level of electrical burn?




    A. PSU
  17. A computer is showing the "No boot device found" message even though a technician has verified that the hard drive is set as Device 1 in the BIOS boot order. Which of the following causes is MOST likely at play?




    D. Both PATA devices are incorrectly set to the master jumper setting.
  18. A technician is troubleshooting a RAID 6 array on a high end CAD/CAM workstation. Two disk drives have their fault lights on. Which of the following is the BEST action for the technician to perform when fixing this problem?




    C. Replace the failed drives and verify the RAID rebuilds completely.
  19. A technician is called in to troubleshoot a four disk RAID 10 array on a high end Windows 7 Enterprise workstation. One drive has failed. Which of the following should the technician do to fix the problem?




    C. Replace the failed drive and verify the RAID is healthy.
  20. A user states their Windows XP desktop PC fails to boot to the Windows logo. Which of the following tools could a technician use to help diagnose if there is a pre-boot failure?




    C. POST card
  21. A technician would like to limit computer access to certain users. Which of the following should be configured?




    A. Local security policy
  22. A user's computer will not boot. A technician notices four indicator lights on the backside of the computer. Two of the lights are green, and two are amber. Which of the following documentation should the technician read to determine what the lights are indicating?




    D. Computer manual
  23. Which of the following options is MOST likely active on a network of three workstations, running Windows 7 Home Edition x64, to enable File and Print sharing?




    D. HomeGroup
  24. A technician is reconfiguring an email account for off-line mode. Which of the following will describe the expected time of account synchronization with the email server?




    C. It will depend on the time when the account was last synchronized.
  25. An entry level network analyst calls and is not sure which Windows OS features to use to check for users who are currently logged on. Which of the following features would BEST assist this analyst?




    C. Task Manager
  26. Which of the following common security threats could be occurring when a user calls and requests his coworker's password?




    C. Social engineering
  27. A technician has a client's laptop that is randomly shutting down. Which of the following is the FIRST step of the troubleshooting theory that the technician will perform to resolve the laptop's issue?




    D. Identify the problem
  28. An alert needs to be sent to the administrator when the CPU stays above 90% for a period of time. Which of the following tools would BEST be used to accomplish this?




    A. Performance Monitor
  29. Which of the following Control Panel utilities would be BEST to use to remove a Windows 7 application?




    A. Programs and Features
  30. A customer calls and states the new plasma display they just received has yellow spots all over the screen. Which of the following is the MOST likely cause of this issue?




    D. Dead pixels
  31. A customer calls and reports that when they walk away from their laptop for an extended period of time they have to reconnect to wireless when they get back. Which of the following will MOST likely correct this issue?




    B. Adjust power settings
  32. Which of the following BEST describes the Apple utility used with iOS devices to synchronize, upgrade, and restore to factory default if needed?




    C. iTunes
  33. Which of the following tools and test equipment is routinely magnetized and should be used with caution around magnetic media?




    A. Screwdrivers
  34. Which of the following utilities will display a listing of active IP ports on the computer being tested?




    D. NETSTAT
  35. Which of the following commands may be used on a computer, running Windows 7, to stop a single process from the command line?




    A. KILL
  36. When securing a small office home office (SOHO) that has empty cubicles with unused network ports, which of the following can be used to secure ONLY the unused ports?




    C. Disable the ports on the router or switch.
  37. QUESTION 37New smart phones have features that allow them to be backed up to a remote location. Of which of the following is this an example?




    C. iCloud
  38. Which of the following should a technician do LAST after cleaning up a virus infection?




    D. Educate the end user
  39. A user does not want their kids to be able to install software on their home desktop. Which of the following types of accounts should the user set up in Windows 7?




    A. Standard
  40. A technician is about to put a computer back into service that has not been turned on for many months. It was healthy when taken out of service and boots quickly without any problems. Which of the following actions would be a best practice to begin computer maintenance? (Select TWO).

    A. Run a full antivirus scan.
    B. Defragment the hard disk.
    C. Run antivirus updates.
    D. Run Windows updates.
    E. Configure the firewall to access the Internet.
    • C. Run antivirus updates.
    • D. Run Windows updates.
  41. A technician discovers a networked computer has been infected with a zero day virus. Which of the following is the FIRST thing that should be done to the workstation?




    C. Unplug it from the network.
  42. Which of the following is the BEST definition of what an accelerometer does?




    C. Measures velocity in a given direction
  43. Which of the following are examples of physical security? (Select TWO).





    • B. Badges
    • E. Locked doors
  44. Which of the following scenarios BEST defines phishing?




    D. A user receives an email from a person in another country with a story as to why they need help with a financial arrangement.
  45. Which of the following would be the BEST way to combat social engineering?




    D. User education
  46. Which of the following components would a user MOST need when building a virtual server? (Select TWO).






    • B. RAM
    • F. CPU
  47. Which of the following commands would a technician use to map a network share?




    C. NET
  48. A user is reporting their web browser is not going to the site they are attempting to access. Which of the following would BEST resolve this?




    B. Ensure the user is not utilizing a proxy server.
  49. A technician is called onsite to solve a network connection error. Upon arrival, the technician observes a message on the screen stating there is no boot drive found. Which of the following steps should the technician take NEXT?




    B. Restart the system to verify the proper boot sequence.
  50. The technician is dispatched to a user's home to secure a wireless network. The SOHO user has only one system to connect wirelessly, yet wishes to protect their Wi-Fi from unauthorized use. Which of the following will BEST meet the user's requirements?




    D. Configure the router to allow access by MAC address.
  51. A user has installed a new wireless router and is unable to connect their game console to the manufacturer's service. Which of the following should the technician look for FIRST?




    B. Ensure the correct ports are open.
  52. A technician needs to use Remote Desktop Connection in order to get access to a remote Windows workstation. However, the Programs menu has been hidden and they only have access to the Run command utility or a command-line prompt. Which of the following is the utility that the technician should use to access Remote Desktop Connection?




    A. MSTSC
  53. A user reports that they cleared a paper jam and now cannot print. The technician reseats the paper and then prints a test page from the printer. A test page sent from the workstation does not print. Which of the following actions should the technician take FIRST?




    B. Clear the print queue.
  54. A workstation is making a loud clicking noise that is originating from the hard drive and it is not booting. Which of the following should the technician do FIRST?




    A. Put the hard drive in another system and back up all data from it.
  55. A user is reporting that they cannot connect to the wireless network from their office but they were able to connect yesterday. Which of the following would be the MOST likely reason?




    D. Radio switch on laptop is disabled
  56. A user on a domain network cannot install software that they need. Which of the following user groups is this user MOST likely associated with?




    B. Standard user
  57. A user reports that their PC does not work. Which of the following would be the BEST question for the technician to ask the user to get further information?




    C. "What exactly does not work?"
  58. A user reports that their PC boots up to a screen that reads "OS not found". Which of the following would be the MOST likely cause of this problem?




    A. The user has a USB key attached.
  59. QUESTION 59A technician is working on an issue and has identified the problem and worked out the cause. Which of the following would MOST likely be the NEXT step the technician should make?




    A. Establish a plan of action
  60. Which of the following paths would a technician use to map a network drive?




    A. \servernameusershare
  61. Which of the following is considered a method of physical security?




    A. Cipher locked doors
  62. A user is operating a virtual machine (VM) and discovers it has been infected with malware. Which of the following applies?




    A. The VM can be shut down with no harm to the host PC.
  63. Which of the following ports MUST be open in order for Remote Desktop to function?




    B. 3389
  64. A technician is dispatched to a location that has multiple laser printers. One of the network printers is printing what appears to be a shadow image. The technician could solve this issue by:




    B. replacing the drum.
  65. A user wants to quickly install the most recent security patch released. Which of the following options can be selected from the Windows Update website?




    C. Express settings
  66. Which of the following has the HIGHEST level rights?




    B. Power User
  67. Which of the following allows a user to reset their password with a series of security questions that only the user should know?




    C. Authentication
  68. A technician needs to configure their neighbor's iPad. The neighbor wants to access their work email. The technician requires some information from their neighbor's work IT department. Which of the following information does the technician need?




    A. Server and domain
  69. Which of the following is an advantage of a virtual machine hosted on a PC?




    B. Reduces the amount of physical hardware required.
  70. When scheduling a backup for preventative maintenance, which of the following would ensure all data was captured?




    B. Full
  71. Which of the following commands can be used in Windows XP to modify when the CHKDSK command runs?




    A. CHKNTFS
  72. A user gets a warning from their ISP about illegally downloading copyrighted movies. The user insists that they did not download any movies and calls a technician to implement stronger small office home office (SOHO)security. Which of the following will allow only known workstations to connect to the SOHO router?




    C. MAC filtering
  73. A technician is installing a webcam in a nursery for a user to monitor their baby. The user wants to ensure that the webcam is not broadcasting externally. Which of the following would the technician implement on the SOHO router to prevent the broadcast?




    D. Block the outbound port
  74. A user installed a new SOHO router and new wireless NICs to increase their transmission speed from 802.11b to 802.11g with the manufacturer's default settings. The user lives in an apartment building and is still experiencing slowness to the Internet after the installations. Which of the following is the MOST secure option that a technician could implement to resolve this issue?




    D. Enable MAC filtering
  75. A user wants to prevent access to specific websites to prevent their children from accidently accessing them. Which of the following can be implemented?




    C. A firewall
  76. A technician has upgraded an internal WiFi card on a laptop and now the signal power to connect to a WAP is low. Which of the following is the MOST likely cause of the issue?




    C. One of the antenna wires is unplugged.
  77. A custom configured PC with a powerful processor, high-end video, upgraded audio, and increased cooling would be MOST suited to which of the following applications?




    A. Gaming PC
  78. When comparing laptops and tablet PCs which of the following is true?




    D. Tablets typically use solid state drives
  79. Which of the following is the MOST secure method, short of physical destruction, that would be used to ensure that data on a hard drive cannot be recovered?




    B. Use an overwrite program
  80. A user will be installing a switch in a public location and will allow the six users in the office to connect to it withCAT6 Ethernet. Which of the following actions would BEST ensure that there is no unauthorized access to the switch?




    C. Disable unused ports
  81. A user would like to run a copy of Windows XP for testing; however, the user is currently using a Windows 7PC. Which of the following technologies should a technician recommend in order for the user to have access to both systems simultaneously?




    C. Virtualization
  82. When putting a mobile device into airplane mode, which of the following features is typically disabled? (Select TWO).

    A. Bluetooth
    B. Multi-touch ability
    C. Data encryption
    D. Cellular data
    E. Wireless
    • D. Cellular data
    • E. Wireless
  83. QUESTION 83IT suspects that other people are frequently making changes to a computer when a user leaves their desk. Which of the following security policies can be implemented in order to prevent this situation?




    A. Auto-lock
  84. A client has asked a technician about drive sanitation and wants to know what the difference is between overwriting a drive and formatting a drive. Which of the following would be the BEST response from the technician?




    D. "Overwriting writes 1s and 0s to a hard drive replacing the data, while formatting only clears the reference to the data and only overwrites as space is used."
  85. Windows Virtual PC is designed to:




    D. allow a user to run older programs in a Windows XP environment.
  86. Which of the following is a new feature of iOS 5?




    A. Ability to perform untethered updates
  87. The technician is dispatched to look at a user's laptop. The user reports the system shuts down after 30 minutes of field use. The technician notices the battery is not fully charging. Which of the following should the technician perform to resolve this?




    B. Replace the battery.
  88. A new application is installed which adds three new services to a customer's PC. The customer asks for help, because the new application will not start. A technician investigates and finds that one of the services has failed to start. They attempt to manually start the service but it fails. Where should the technician look NEXT for more information? (Select TWO).

    A. Task Manager
    B. System registry
    C. Log files for the new application
    D. Event Viewer
    E. %SystemDir%System32Drivers
    • C. Log files for the new application
    • D. Event Viewer
  89. A technician is installing a new wired router and needs to disable all the ports currently not in use. The documentation for router mentions the web interface for the router is available by default at 192.168.1.1. In which of the following ways would the technician go about doing this?




    D. Use an Internet browser to access the router configuration at 192.168.1.1.
  90. A technician is changing out a toner cartridge in a high volume printer. As they are removing the empty cyan cartridge, a large amount of blue powder falls out onto rollers in the immediate area. Which of the following should the technician do NEXT?




    A. Use a toner vacuum to remove the spilled toner from the undesired surfaces.
  91. When setting up a Microsoft Exchange mail account to synchronize with an iPhone, which of the following items can be configured to synchronize besides the mail? (Select TWO).

    A. Shared calendars
    B. Archives
    C. Global address list
    D. Calendar
    E. Address book
    • D. Calendar
    • E. Address book
  92. Which of the following allows a user to pinch zoom on an Android device?




    D. Multi-touch
  93. An administrator has taken steps to secure a SOHO wired network, but as a result the users report that they can no longer access the Internet but can still see other computers on the network. Which of the following would have caused this issue?




    D. Port 80 has been disabled
  94. Which of the following mobile phone features redirects the screen orientation as the user turns their phone?




    B. Gyroscope
  95. While using a mapping program, which of the following functions shows the user's location on the map as well as movements on the map as they travel?




    B. GPS
  96. Which of the following BEST represents a security vulnerability of mobile devices? (Select TWO).





    • A. Viruses
    • E. Theft
  97. Which of the following BEST describes the security term known as tailgating?




    C. Following behind someone when entering a secure area
  98. When connecting a Bluetooth device to a mobile device, which of the following BEST describes the purpose of discovery mode?




    D. Allows a peripheral to be contacted by the mobile device
  99. Which of the following devices is MOST likely to come standard with a solid state hard drive?




    C. Tablet
  100. A user launches a software application on their Android tablet device. Once the software has loaded, the user reports that when turning the tablet to work the application in landscape mode, the software does not automatically adjust to landscape mode. Which of the following is the cause of the issue?




    B. The application was not developed to react to changes to the gyroscope.
Author
raschwe
ID
239885
Card Set
Class D
Description
D
Updated