CompTIA.Pass4sure.220-802.v2015-02

CompTIA.Pass4sure.220-802.v2015-02
Exam A
QUESTION 1
Which of the following allows a Windows 7 remote user to edit a file offline then automatically update the
changes when back in the office?
A.
B.
C.
D.
Windows Defender
Sync Center
Windows Aero
HomeGroup
QUESTION 2
Which of the following locations would a technician use to add a Windows 7 computer to a domain?
A.
B.
C.
D.
System Properties
Windows Defender
Network and Sharing Center
Device Manager
QUESTION 3
Which of the following is the default directory for User Profiles in Windows 7?
A.
B.
C.
D.
C:\Profiles\
C:\User Profiles\
C:\Users\Profiles\
C:\Users\
QUESTION 4
Which of the following is the default location for Fonts in Windows 7?
A.
B.
C.
D.
C:\System Files\Fonts
C:\Windows\Fonts
C:\Windows\System Files\Fonts
C:\System\Fonts
QUESTION 5
A technician wants to secure a Windows 7 Ultimate notebook hard drive. Which of the following should the
technician do to implement BitLocker? (Select TWO).
A.
B.
C.
D.
E.
Disable TPM in the system BIOS
Run the BitLocker wizard and any necessary partitions
Enable TPM in the system BIOS
Enable TPM in the Windows 7 OS files
Set up the OS and the system files on the same partition
QUESTION 6
User profiles in Windows 7 are stored in which of the following locations?
A.
B.
C.
D.
C:\User Profiles
C:\Documents and Settings\User Profiles
C:\Documents and Settings
C:\Users
QUESTION 7
Which of the following is the default location for the User profiles folder in Windows 7?
A.
B.
C.
D.
C:\Users
C:\Program Files (x86)
C:\Documents and Settings\
C:\Windows\system32
QUESTION 8
Which of the following is the correct path to add new local user accounts to a Windows 7 computer?
A. Click on the Start button> Right click on Computer> Select Manage> Expand Local Users and Groups>
Right click on Users> Select New User
B. Click on the Start button> Right click on My Computer> Select Manage> Right click on Local Users and
Groups> Select Add Users from the menu
C. Click on the Start button> Right click on Computer> Select Manage> Right click on Local Users and
Computers> Select New User
D. Click on the Start button> Right click on Network Neighborhood> Select Manage> Right click on Users>
Select New User
QUESTION 9
Which of the following is a common location of the CMOS battery in a laptop?
A.
B.
C.
D.
Under the keyboard
Behind the removable hard drive
Under the removable CD drive
Behind the laptop battery
QUESTION 10
Which of the following describes a computer in which the HDD LED is lit, but the mouse does not respond and
the computer is unresponsive?
A.
B.
C.
D.
The computer has locked up
Windows Update is running
The computer is in Safe Mode
The reset button is stuck
QUESTION 11
A customer reports that a networked printer is not printing documents. The technician successfully pings the
printer's IP address. Which of the following could be the problem? (Select TWO).
A. The network cable is unplugged.
B. The printer is low on toner.
C. The gateway address on the printer is incorrect.
D. The printer is out of paper.
E. The spooler is not functioning.
QUESTION 12
A technician plugs a USB device into the computer. The system tray displays a message that reports the
device is installed, but may not work properly. Which of the following is the MOST likely cause of the
message?
A.
B.
C.
D.
The device needs a firmware update.
The device needs an updated driver installed.
The plugged in device is too slow for the USB port speed.
The device is incompatible with the installed version of Windows.
QUESTION 13
A technician needs to ping a client's machine that the technician is working on, to ensure that the network card
is functioning correctly. Which of the following IP addresses should be used?
A.
B.
C.
D.
10.76.0.1
127.0.0.1
192.168.0.1
255.255.255.0
QUESTION 14
Which of the following are encrypted protocols? (Select TWO).
A.
B.
C.
D.
E.
TELNET
SSH
POP3
FTP
HTTPS
QUESTION 15
Computers on the network are frequently infected with viruses, malware, worms and Trojans. Which of the
following should Mike, a technician, update automatically to prevent future problems?
A.
B.
C.
D.
Antivirus signatures
Antivirus engines
Malware engines
Virus encyclopedias
QUESTION 16
In which of the following locations is the fonts folder stored in the Windows OS?
A.
B.
C.
D.
\System32
\Temp
\Documents and settings
\Windows
QUESTION 17
Which of the following provides Bob, a technician, with the GREATEST security?
A.
B.
C.
D.
Disabling SSID
WEP
Static IP
WPA
QUESTION 18
Which of the following commands is used to duplicate a directory from one location to another?
A.
B.
C.
D.
MOVE
COPY
XCOPY
EDIT
QUESTION 19
A user is having difficulty installing a program in Windows Vista, as the computer appears to stall prior to the
installation. Which of the following is the BEST choice of why this is occurring?
A.
B.
C.
D.
Aero Settings are not enabled.
Power Settings need to be enabled.
BitLocker is scanning for corrupt software.
UAC is waiting for user input.
QUESTION 20
Which of the following ports will have to be forwarded to allow an RDP connection to a specific machine?
A.
B.
C.
D.
25
110
3389
8080
QUESTION 21
A user states that every print job submitted to a local printer prints out random characters. Which of the
following steps would MOST likely resolve the problem?
A.
B.
C.
D.
Reboot the computer and reset the printer
Clear the NVRAM on the printer
Reload the printer drivers
Replace the printer cable
QUESTION 22
A technician is attempting to install a RAID 1 configuration. Which of the following is the MINIMUM amount of
disks that can be used to create a RAID 1 array?
A.
B.
C.
D.
1
2
3
4
QUESTION 23
A technician is attempting to install a RAID 5 configuration. Which of the following is the
MINUMUM amount of disks that can be used to create a RAID 5 array?
A.
B.
C.
D.
1
2
3
4
QUESTION 24
A user has a computer with a 100GB IDE hard drive formatted as a single FAT32 partition. This drive is only
used to store data. The user adds a second 100GB hard drive and wants to mirror the two drives. When the
user goes to disk management there is no option to mirror the drives.
Which of the following will resolve this issue?
A.
B.
C.
D.
Convert the partition to NTFS.
Change the partition to be an extended partition.
Convert both drives to a dynamic disk.
Change the partition to be the active partition.
QUESTION 25
Mike, a technician, is getting ready to upgrade the graphics card in a customer's computer with a performance
PCIe graphics card. The customer has verified that she has a 16x PCIe slot on her motherboard. Which of the
following may also need to be upgraded?
A.
B.
C.
D.
RAM
Motherboard
Power supply
Processor
QUESTION 26
A technician is replacing a processor in a workstation. After installation, the workstation starts up and
immediately shuts down; the technician tries to start the workstation several more times and gets the same
result. Which of the following is the cause of this issue?
A.
B.
C.
D.
The workstation is not plugged in.
The thermal paste was not applied.
The memory was not installed properly.
The L2 cache was not cleared.
QUESTION 27
Which of the following is the correct socket type for a Pentium 4 processor?
A.
B.
C.
D.
478
939
1366
AM2+
QUESTION 28
Which of the following is an advantage of installing a 64-bit processor versus a 32-bit processor?
A.
B.
C.
D.
Uses less bandwidth on the front side bus
Only requires half of the clock speed
Able to access a larger amount of RAM memory
Able to be used as two 32-bit processors
QUESTION 29
Which of the following resources is MOST important for a network server running a virtual machine and guest
operating systems?
A.
B.
C.
D.
Redundant power supplies
Memory speed
RAID type used
Multi-core CPU
QUESTION 30
A customer calls and explains they just moved and their computer will now not boot up and is making a loud
clicking noise. Which of the following is the MOST likely cause?
A.
B.
C.
D.
CMOS battery is loose
Optical drive is stuck
RAM is loose
Hard drive has crashed
QUESTION 31
A user has installed a new USB port replicator for use with their notebook PC. When the replicator monitor port
is connected to a monitor, the monitor will only display at its lowest resolution. Which of the following is the
MOST likely cause of this issue?
A.
B.
C.
D.
The monitor self adjustment control must be configured.
The monitor is failing and needs to be checked by a technician.
The drivers for the port replicator may not be current.
The notebook BIOS is not current and must be updated.
QUESTION 32
A user would like to purchase a computer with 8GB of memory installed and recognized by the operating
system. Which of the following operating systems could be installed on the computer to meet their
requirements? (Select TWO).
A. Windows 7 Home Premium 32-bit
B.
C.
D.
E.
Windows 7 Professional 64-bit
Windows XP Professional 32-bit
Windows Vista Business 64-bit
Windows Vista Enterprise 32-bit
QUESTION 33
An inkjet printer used for printing marketing brochures is losing color stability (e.g. orange appears brown, red
appears purple). Which of the following items should a technician do FIRST?
A.
B.
C.
D.
Replace the failing print heads.
Clean the print heads.
Update the drivers.
Recycle the printer.
QUESTION 34
A technician needs to view some hidden files on the clients computer. Which of the following utilities would the
technician use to unhide these files?
A.
B.
C.
D.
Action Center
Utility Manger
Offline Files
Folder Options
QUESTION 35
Which of the following is an advantage of MOST tablets over laptops?
A.
B.
C.
D.
Larger storage space
Upgradeable parts
GPS tracking software
Multi-touch screens
QUESTION 36
Which of the following UNC paths would be considered an administrative share?
A.
B.
C.
D.
\\Workstation\D$
\\Workstation\Admin
\\Workstation\D
\\Workstation\System
QUESTION 37
If a technician knows a clients IP address, which of the following command tools can be used to resolve this to
the DNS name?
A.
B.
C.
D.
NET USE
TRACERT
NSLOOKUP
CMD
QUESTION 38
Which of the following OS features is unique to Windows 7?
A.
B.
C.
D.
Action Center
Automatic Updates
Add/Remove Programs
Tablet PC Settings
QUESTION 39
A customer calls and states that on two corners of their screen all the colors are distorted, but if they move the
monitor forward or backwards the image is fine. Which of the following is the MOST likely cause of this issue?
A.
B.
C.
D.
Video cable is going bad
The HDMI cable is coming loose
The display needs to have the geometry adjusted
Speakers were placed too close to the display
QUESTION 40
Which of the following are the BEST operating system security practices for a secure workstation? (Select
TWO).
A.
B.
C.
D.
E.
Install a privacy filter
Run CHKDSK regularly
Updated malware and virus definitions
Regularly schedule defragmentation
Enable active scanning
QUESTION 41
When installing Hyper-V, which of the following is a hardware requirement?
A.
B.
C.
D.
64-bit processor
32GB of RAM
1TB of storage space
Multi-display video card
QUESTION 42
A user has reported a file permissions issue to the network administrator. The administrator tries to recreate
the problem on their computer but has no trouble accessing the file. Which of the following BEST describes
what is occurring?
A.
B.
C.
D.
The user did not taken ownership of the file from the server.
The user is logged in using the wrong local profile.
The user is not in the appropriate group to have access to the file.
The user has been granted "read only" access to the file.
QUESTION 43
A customer calls a technician frequently for the same problem. Which of the following troubleshooting steps
MUST the technician perform NEXT to attempt to permanently solve this issue?
A.
B.
C.
D.
Establish a plan of action to resolve the problem and implement the solution.
Document findings, actions, and outcomes.
Verify full system functionality and implement preventive measures.
Identify the problem or symptoms.
QUESTION 44
Which of the following describes the function of a firewall?
A.
B.
C.
D.
Hardware or software designed to analyze data packets to determine the origin or destination of the packet
Hardware or software designed to block packets based on traffic behavior over time
Hardware or software designed to compare data packets to known signatures
Hardware or software designed to block certain packets from entering or leaving a network
QUESTION 45
Which of the following Windows installations is MOST likely to contain custom user settings and files?
A.
B.
C.
D.
Clean Install
Imaging
Unattended Installation
Remote Network Installation
QUESTION 46
Which of the following is the BEST example of social engineering?
A.
B.
C.
D.
Impersonation
Key logger
Virus
Malicious cookie
QUESTION 47
A user on a domain PC needs to leave their desk immediately, but does not want to compromise displayed
content. Which of the following should be done?
A.
B.
C.
D.
Screensaver password
Restart PC
Lock screen
Reset user password
QUESTION 48
A SOHO location is being remodeled and the users are concerned about unauthorized traffic on their network
during the remodel. The WLAN needs to be able to allow various types of devices to securely connect 24
hours a day while requiring the least amount of overhead to manage. Which of the following security
implementations would MOST likely be implemented?
A. Setting encryption
B. Resetting all user-names and passwords
C. Assign static IP addresses
D. Enable MAC filtering
QUESTION 49
A SOHO has had several issues with various unauthorized devices consuming the network's bandwidth. There
are only four network devices that are authorized to access the Internet as well as the local LAN's resources.
Which of the following security implementations would MOST likely help disable network access to the
unauthorized devices?
A.
B.
C.
D.
Using complex passwords
Disabling the use of static IP addresses
Disabling ports
MAC filtering
QUESTION 50
A new LAN drop has been activated but users report that they are unable to connect to the Internet and are
receiving an IP address of 169.254.255.55 from that Windows workstation. Which of the following symptoms
has occurred? (Select TWO).
A.
B.
C.
D.
E.
F.
DHCP server unavailable
IP address assigned by NAT
Limited connectivity
APIPA address assigned
IP conflict detected
Statically assigned IP address
QUESTION 51
A technician has been dispatched to a SOHO to troubleshoot an issue with a USB printer shared on the
network. All networked devices obtain their IP address automatically from the router. Additionally, all
computers were printing fine the previous day, when the printer was first installed. Which of the following
should the technician implement to fix the printing issue?
A.
B.
C.
D.
A DHCP reservation should be made for the host computer.
The printer should be connected to a USB hub.
An updated printer driver should be installed on all office computers.
The printer should be configured with a static IP address.
QUESTION 52
Which of the following BEST describes geotracking?
A.
B.
C.
D.
An enabled cookie that sends user location data to vendors
Location software to locate a users missing cellular device
SMS information that is sent to people in their contacts
Location data embedded into pictures that have been taken
QUESTION 53
A technician is troubleshooting a computer that will not boot. They have verified the power outlet and cable are
working properly, and the power cable is properly connected. However, when the technician presses the
power button on the computer, nothing happens. Which of the following tools should the technician use to
further troubleshoot the issue?
A.
B.
C.
D.
Punch down tool
POST card
Power supply tester
Loopback plug
QUESTION 54
A server is configured to boot with a "mirrored" RAID configuration. Which of the following BEST describes this
configuration?
A.
B.
C.
D.
RAID 0
RAID 1
RAID 3
RAID 5
QUESTION 55
Which of the following accounts should be disabled after successful installation of Windows XP?
A.
B.
C.
D.
Remote Desktop User
Administrator
Guest
Power User
QUESTION 56
A user reports that when printing from a warehouse to an accounting printer, the printer is only printing random
symbols. Which of the following is the MOST likely cause?
A.
B.
C.
D.
The accounting printer does not have enough memory for the job
The accounting printer was recently restarted
The user did not have proper print permissions
The print driver is corrupt and needs to be reinstalled
QUESTION 57
A technician discovers slow data transfer speeds in a wired network. Which of the following would be the
MOST probable cause?
A.
B.
C.
D.
Using APIPA address
Outdated NIC drivers
Too many simultaneous connections
CAT5 cable connection
QUESTION 58
A customer calls and states that when they have been using their computer for a long time the computer
reboots itself with no error. Which of the following is the MOST likely cause of the issue?
A. BIOS settings
B. Faulty RAM
C. Faulty processor
D. Overheating
QUESTION 59
Which of the following technologies involves device pairing?
A.
B.
C.
D.
WEP
IR
Bluetooth
IMAP
QUESTION 60
A user reports that they are unable to use their DVD-ROM drive in their Windows 7 desktop PC. Which of the
following could be a possible cause to this problem?
A.
B.
C.
D.
Media Player is not installed
DVD drivers need to be updated
DVD drive is not set to boot in BIOS
SATA port is not on in BIOS
QUESTION 61
A technician needs to create a private shared folder for each employee at a small business to store their files.
The technician wants the main folder to be called "Employee Documents" and the subfolders to be named
after each employee (e.g. "John Smith"). The technician wants to map the "Employee Documents" folder on all
computers as the M:\ drive for all users. Each employee should only have access to their own folder without
the ability to change permissions. Which of the following permissions should the technician set?
A. Set share permissions for "Employee Documents" to Everyone = Read, and set NTFS permissions for all
subfolders to Creator Owner = Read & Execute
B. Set share permissions for "Employee Documents" to Everyone = Full Control, and set NTFS permissions
for all subfolders to Creator Owner = Full Control
C. Set share permissions for "Employee Documents" to Everyone = Change, and set NTFS permissions for all
subfolders to Creator Owner = List Folder Contents
D. Set share permissions for "Employee Documents" to Everyone = Full Control, and set NTFS permissions
for all subfolders to Creator Owner = Modify
QUESTION 62
Which of the following can cause a popup box to display on a laptop, alerting a user that they have performed
the same action 5 times, and asking them to click OK to enable this feature?
A.
B.
C.
D.
Lock indicator lights
Flickering display
Ghost cursor
Sticky keys
QUESTION 63
A user receives an unsolicited email stating that they need to follow a link to change their username and
password because their bank account has been compromised. Of which of the following is this an example?
A.
B.
C.
D.
SPAM
Spyware
Phishing
Malware
QUESTION 64
Following an authorized person through a door or other security check point without showing proper
identification or defeating a security mechanism is known as which of the following?
A.
B.
C.
D.
Hacking
Emulating
Partitioning
Tailgating
QUESTION 65
When cutting back the protective coating on CAT5 wiring, which of the following is the recommended tool?
A.
B.
C.
D.
Punchdown tool
Basic crimper
Wire strippers
Degausser
QUESTION 66
Recently, a user built a new gaming PC and is testing it out by running graphic intensive games. After a short
time playing a game, the computer reboots with an error "a thermal event has occurred". Which of the following
is the MOST likely cause of this issue?
A.
B.
C.
D.
Processor is under-clocked
Insufficient power to the motherboard
Hard drive is overheating
Video card is overheating
QUESTION 67
A user regularly calls and states that they have a computer with possibly corrupt system files and wants to
know how to repair them. Which of the following utilities would resolve the problem?
A.
B.
C.
D.
ASR
FIXMBR
SFC
MSCONFIG
QUESTION 68
A customer calls and states when they are typing on their keyboard certain letters consistently display
numbers instead of letters. Which of the following is the cause of the issue?
A. Bluetooth keyboard did not pair properly
B. Scroll lock is on
C. Num lock is on
D. Keyboard connector is coming loose
QUESTION 69
A technician has developed training material to ensure employees physically secure company laptops from
being stolen. Which of the following is a preventative directive that MUST be included in the training material?
A. RFID tags must be attached to all laptops and receivers to all doors to alert when a laptop leaves the
designated area.
B. Biometrics devices must be installed on all laptops.
C. All computers must be equipped with privacy filters.
D. Employees must remember to lock their office doors when leaving even for a short period of time.
QUESTION 70
Which of the following is the MAIN difference between a rootkit and a virus?
A.
B.
C.
D.
Rootkits encrypt the operating system while viruses encrypt documents
Rootkits execute as super user while viruses execute as regular users
Rootkits modify the BIOS while viruses cannot access the BIOS
Rootkits infiltrate the kernel while viruses infiltrate files
QUESTION 71
An administrator has advised against providing any information over the phone as a way to prevent against
which of the following threats?
A.
B.
C.
D.
Session hijacking
Social engineering
Man-in-the-middle
Shoulder surfing
QUESTION 72
A user reports that they are seeing odd shapes or blocks on their monitor that seem to be random, but stay
until the system is rebooted. The monitor has been connected to another computer of the exact make and
model and has shown no adverse issues. However, the problem returns once the monitor is connected to the
original computer. Which of the following is MOST likely the issue?
A.
B.
C.
D.
The monitor is overheating into above-optimal temperatures.
The monitor is experiencing low voltage conditions.
The video card is incompatible with the monitor.
The video card on the problem computer is failing.
QUESTION 73
A prospective employee asks for wired Internet access while waiting for a job interview. Later, it is discovered
that spyware was uploaded to the network from this particular location and the prospective employee cannot
be contacted with the information provided. Which of the following security threats is this an example of?
A. Phishing
B. Shoulder surfing
C. Viruses
D. Social engineering
QUESTION 74
A technician is installing a new operating system. The company policy requires that the file system used must
support file permissions and security. Which of the following should the technician use to BEST meet the
company needs?
A.
B.
C.
D.
NTFS
CDFS
FAT32
UDF
QUESTION 75
A user calls the corporate helpdesk stating that their battery is not charging. The operating system shows that
there is a problem with the battery. Which of the following should the technician do FIRST to determine what
the issue is without erasing the users unsaved data?
A.
B.
C.
D.
Using a known-good computer of the same type, switch batteries between the two laptops.
Remove the A/C adapter while the system is running and observe if the screen dims.
Completely shut down the laptop, remove the A/C power source and restart the laptop.
Using a known-good computer of the same type, switch A/C adapters between the two laptops.
QUESTION 76
A user suspects that everything they type is being captured. Which of the following security threats would this
indicate?
A.
B.
C.
D.
Worm
Keylogger
Trojan
Rootkit
QUESTION 77
A remote Windows XP user believes unauthorized software has been installed on their laptop. The technician
must direct the user to which of the following locations to remove the application?
A.
B.
C.
D.
Action Center
Add/remove Programs
Windows Firewall
Computer Management
QUESTION 78
An employee recently departed under bad terms, and the client is concerned for their SOHO network security.
Which of the following should the technician do FIRST?
A.
B.
C.
D.
Physically secure the access point
Change default password
Lower the transmission power
Assign static IP addresses
QUESTION 79
A client requests a small SOHO wireless network setup. The client has only three devices that will require
access to the Internet. The client is also concerned that a neighboring business will attempt to access the
Internet without permission. Which of the following should the technician ensure when setting up the SOHO
network? (Select TWO).
A.
B.
C.
D.
E.
F.
Enable client isolation
Lower radio power levels
Physically secure the access point
Disable unused ports
Enable MAC filtering
Enable short preambles
QUESTION 80
A technician needs to create a new directory from a command line on a Windows XP machine. Which of the
following commands should be used?
A.
B.
C.
D.
MD
SFC
RD
CD
QUESTION 81
A technician must copy data over an unreliable network connection. Which of the following tools will BEST
satisfy this requirement?
A.
B.
C.
D.
ROBOCOPY
XCOPY
FDISK
FTP
QUESTION 82
A customer is reporting that since switching from an XP to a Windows 7 computer, the main application they
use no longer starts. The vendor of the application no longer exists and the customer does not want to find an
alternative replacement at the moment. Which of the following can a technician do to try to get the application
running?
A.
B.
C.
D.
Uninstall the application and re-install it as user so that it would have the standard rights and privileges.
Right-click on the application and under "Troubleshoot Compatibility," select the correct mode.
Re-install the application, but install it onto the users Desktop in their account profile.
Right-click on the application, select Properties and make sure that the Hidden attribute checkbox is
unchecked.
QUESTION 83
A user calls the helpdesk to report that their local printer is not printing any of the jobs that have been
submitted this morning. Other users in the vicinity are not having any issues printing to the same unit via the
network. The user in question connects to the printer over USB cable that connects to a laptop dock. Which of
the following is MOST likely at fault here?
A.
B.
C.
D.
The users dock has a power problem with its built-in USB port(s).
The printer only supports USB 2.0 and the user has a USB 3.0 enabled dock.
The printer accidentally had its onboard wired network jack disabled.
Other users are overloading the printer causing it to run out of memory.
QUESTION 84
A user states that every time they turn on their computer they have to change the computers time and date.
Which of the following should the technician perform FIRST to resolve this issue?
A.
B.
C.
D.
Change time zones
Synchronize with a different time date server
Replace the drive cache battery
Perform a firmware update
QUESTION 85
A new network drop was just installed and the technician determined it was not terminated correctly. Which of
the following tools would the technician use to terminate a network wall jack correctly?
A.
B.
C.
D.
Cable crimper
Cable tester
Punchdown
Wire strippers
QUESTION 86
A network DHCP server crashes and has to be rebuilt from scratch. Shortly afterwards many users report an
"Address Conflict" alert on their computers. Which of the following tools should the users run to help fix this
issue?
A.
B.
C.
D.
route
ipconfig
netstat
nbtstat
QUESTION 87
A technician has installed a replacement motherboard in a desktop case with no other modifications. All power
connectors and drive data connectors have been connected to the new motherboard; however, the system will
not power on. Which of the following is MOST likely the cause?
A.
B.
C.
D.
An incorrect firmware version resides on the motherboard
The voltage selection on the power supply is set incorrectly
The front panel connector is not connected properly
The RAM is not correctly installed in the new motherboard
QUESTION 88
A technician is using a test tool that is displaying the current voltage output of a power supply on the tool.
Which of the following tools is the technician using?
A.
B.
C.
D.
Loopback plug
Cable tester
POST card
Multimeter
QUESTION 89
A technician is testing a connection from the main building to a newly networked off-site location. The main
network and off-site both have fast transfer times, however any data sent between the two sites is taking much
longer than expected. Which of the following command line tools could the technician use to determine where
this slowness is originating?
A.
B.
C.
D.
NETSTAT
TRACERT
NSLOOKUP
PING
QUESTION 90
A technician is trying to remove a resilient computer virus. The virus keeps coming back after rebooting the
system because some program or service has locked some of the virus files and is preventing the AV from
cleaning the system. Which of the following is the BEST approach to try and remove the virus while minimizing
negative impact to the system?
A.
B.
C.
D.
Use REGSRV32 to deregister the virus DLLs.
Run the antivirus after rebooting in safe mode.
Use the repair disk and follow the prompts.
Use the recovery console to disable all windows services.
QUESTION 91
A technician was asked by a user to setup IMAP sync for their Android smartphone. No other helper
applications were installed by the technician to assist with syncing. Which of the following types of data can the
user expect to be synced to their phone automatically from the company server?
A.
B.
C.
D.
Calendar entries
Sent/received text messages
Sent/received emails
Contacts
QUESTION 92
A technician is working on a Windows 7 computer that will not boot correctly; it is stuck in a constant loop.
Which of the following should the technician perform FIRST to try and resolve this issue?
A.
B.
C.
D.
Repair installation
A recovery from a shadow copy
System restore
Factory restore
QUESTION 93
Which of the following will help limit unauthorized access to a mobile device?
A.
B.
C.
D.
Remote wipes
Screen locks
Geotracking
Antivirus software
QUESTION 94
Which of the following is one of the key differences between iOS smartphones and Android- based
smartphones?
A.
B.
C.
D.
Android phones cannot adjust Bluetooth visibility timeouts
iOS phones have to install apps from a PC
Android has an open source application store
iOS phones cannot use "Airplane Mode"
QUESTION 95
A technician is concerned that archiving computers over the network is taking too long to finish each night. A
vendor suggests incremental backups. Incremental backups would accomplish which of the following?
A.
B.
C.
D.
Limited number of computers would be fully archived each night
Backup an increasing number of files until the backup window closes
Backup only changed items on each computer
Limited number of directories on each computer each night
QUESTION 96
Which of the following drive destruction methods is considered the MOST secure when dealing with highly
sensitive data?
A.
B.
C.
D.
Degaussing
Wiping
Magnetizing
Shredding
QUESTION 97
Joe, a client, wants to allow only specific portable devices to connect to his wireless network. Which of the
following methods would BEST accomplish this?
A.
B.
C.
D.
Disabling SSID broadcast
MAC filtering
Lower radio power levels
Directional antennas
QUESTION 98
A technician has one computer and needs to create a multiboot to test all Windows environments. Which of the
following shows the BEST order for installing the operating systems?
A. Windows XP Professional, Windows Vista Business, Windows 7 Professional
B. Windows Vista Business, Windows 7 Professional, Windows XP Professional
C. Windows 7 Professional, Windows Vista Business, Windows XP Professional
D. Windows 7 Professional, Windows XP Professional, Windows Vista Business
QUESTION 99
A user needs to find the MAC address for a Windows computer. Which of the following is the correct
command?
A.
B.
C.
D.
ipconfig
ifconfig
ipconfig /all
ifconfig -a
QUESTION 100
An administrative assistant receives a phone call from the IT department asking for personal information to
update their records. One of the questions asked is the password to the companys administrative portal.
Which of the following is occurring?
A.
B.
C.
D.
Shoulder surfing
Configuration management
Helpdesk troubleshooting methodology
Social engineering
QUESTION 101
Which of the following security methods requires that a user enter a passcode that is changed at regular
intervals?
A.
B.
C.
D.
WPA encryption
Biometrics
PSK
RSA token
QUESTION 102
A loud clicking noise in a RAID array indicates which of the following is MOST likely failing?
A.
B.
C.
D.
Hard drive
Power supply
Audio adapter
RAID controller
QUESTION 103
Which of the following can a technician implement to ensure that only company owned mobile devices can
connect to the wireless network?
A.
B.
C.
D.
Deploy a script to auto-configure employees mobile devices wireless settings.
Configure MAC address filtering on the access points.
Implement a wireless policy and train all users.
Enable WPA2-Personal with a strong password.
QUESTION 104
Ann, the network administrator, is notified that the server is responding very slowly. Upon entering the server
room, she notices one of the drives in a RAID1 array has failed. Which of the following would BEST restore full
functionality of the server while preserving redundancy?
A.
B.
C.
D.
Use Disk Management to remove the RAID array and use the drive standalone.
Use the RAID configuration tool to remove the RAID array and use the drive standalone.
Remove the failed drive in device manager and continue operating.
Replace the drive with a new drive and repair the RAID.
QUESTION 105
A technician is tasked with resolving a display issue with a laptop. The technician has determined that the
laptops display needs to be replaced. Which of the following is the NEXT step the technician should perform?
A.
B.
C.
D.
Identify the problem that caused the display to fail.
Establish a theory of the probable cause.
Verify full system functionality and implement preventive measures.
Establish an action plan to resolve the problem.
QUESTION 106
A company has purchased new computers. The old computers will be donated to a local charity. Before the
computers are picked up, the president of the company wants to make sure that the computers do not have
confidential company information on them. Which of the following is the BEST method to accomplish this?
A.
B.
C.
D.
Run CHKDSK
Format the hard drive
Use a degaussing tool
Defragment the hard drive
QUESTION 107
Which of the following activities would BEST be described as social engineering?
A.
B.
C.
D.
Downloading Spyware
Bribery
Writing down passwords
Brute force
QUESTION 108
Which of the following methods of securing mobile devices will prevent data loss due to corruption?
A.
B.
C.
D.
Enforce pass code locks
Install location monitoring application
Perform remote wipe after failed login
Perform remote application back-up
QUESTION 109
The mouse arrow on Joes laptop screen is unexpectedly moving around while he types on the built-in
keyboard. Which of the following would be the lowest cost solution to the problem?
A.
B.
C.
D.
Use of an external keyboard.
Use of an external mouse.
Use of Fn key to lock the keypad.
Use of Fn key to disable the touchpad.
QUESTION 110
A technician just finished replacing the system board of a users laptop. Now, every time the unit attempts to
boot into Windows 7, the laptop goes through an automatic restart midway through the OS boot screen
process. Which of the following MOST likely needs to be fixed?
A.
B.
C.
D.
The optical drive needs to be moved lower in the boot process, below the hard disk.
The BIOS version on the motherboard is stock, and needs to be updated to the latest release.
The technician forgot to enable the SATA controller in the BIOS.
The hard drive operation setting in BIOS needs to be changed from AHCI to IDE.
QUESTION 111
Which of the following is the MINIMUM group permissions needed to access the share \\myserver\c$?
A.
B.
C.
D.
Administrator
Remote User
Domain User
Power User
QUESTION 112
Which of the following is the correct term for the local platform on which client virtual machines run?
A.
B.
C.
D.
Administrative shares
Guest OS
Cloud
Hypervisor
QUESTION 113
A small library has an integrated switch and router that is not wireless. All of the public PCs in the library are
connected to the device. Which of the following is the FIRST thing the library should do to deter curious
patrons from interfering with the device?
A.
B.
C.
D.
Configure DNS to resolve externally rather than internally
Enable MAC filtering to permit public PCs
Change the default user name and password
Set up the DHCP server to use a different gateway option
QUESTION 114
A user has recently purchased and installed a new top of the line video card for playing games on Windows 7.
However, during game play the images are blurred and artifacts appear. Once the user returns to the Windows
desktop, everything returns to normal. Which of the following could be the problem? (Select TWO).
A. The video card requires an adapter to output to the monitor
B. User Access Control is preventing the game from functioning
C.
D.
E.
F.
The video card requires a driver update
The game is not compatible with Windows 7
The graphics card is faulty and should be replaced
The IRQ channel must be appropriately set for the video card
QUESTION 115
Joe, a technician, recently built a new gaming PC for Ann, a customer, with two hard drives configured in RAID
0. Ann calls and states she was playing a game online and the computer shut off. Now the computer will not
boot. Which of the following is a cost effective way to correct the issue?
A.
B.
C.
D.
Remove both drives from the RAID array
Reformat both drives and reload windows
Replace both of the drives and load windows
Replace one of the drives and rebuild the array
QUESTION 116
A technician, Joe, is running a diagnostic program on a laptop when it shuts down after running for 10 minutes.
Which of the following should he do before disassembling the laptop?
A.
B.
C.
D.
Use compressed air to blow the dust out of all the fans
Hard reset the computer and attempt to boot it into the operating system
Run CHKDSK on the laptops hard drive
Remove the battery and re-run the diagnostic program
QUESTION 117
An Android mobile device will easily synchronize with which of the following services? (Select TWO)
A.
B.
C.
D.
E.
Email
SMS
Passwords
Calendar
Incoming calls
QUESTION 118
A technician is setting up new partitions on a 1TB drive for the purpose of running multiple operating systems.
Which of the following represents the MAXIMUM number of primary partitions the drive can hold?
A.
B.
C.
D.
4
8
64
1024
QUESTION 119
Ann, a technician, is taking apart a laptop to replace some components. Which of the following will allow Ann
to put the laptop back together properly and in a timely fashion?
A. Have an identical laptop on hand to compare
B. Label screws and their location
C. Use a magnetic screwdriver
D. Ask a fellow technician to help
QUESTION 120
Drag and drop the following Windows 7 versions in order according to their feature-sets, from MOST to
LEAST.
Select and Place:
QUESTION 121
Select and Place:
QUESTION 122
You need to configure your mobile device to send and receive electronic messages from your company. Your
mobile device must be able to truly synchronize the message state with your desktop so that when a message
is read on your desktop it is marked as read on your mobile device These are the proper parameters:
Email address tech@techies com
Password P@SSwOrd
Pop techies com Port 110 Security. None
IMAP techies com Port 993 Security SSL
Smtp.techies.com Port 465 Security: TLS
Company SSID Techies
Security WPA2
Passphrase P@SSwOrd
SSID is not broadcasted
Instructions You are not authorized to use the Company's WLAN The outgoing server does not require login
credentials When you have completed the simulation, please select the done button to submit your answer.
QUESTION 123
A technician has just removed malware from a Windows 7 system, but the user reports that every time they
type a URL into Internet Explorer to navigate to a search engine the same
standard page is being displayed on the browser. The page is asking the user to purchase antivirus software.
Please resolve the problem using the available tools shown When you have completed the simulation, please
select the done button to submit your answer.
Answer:
QUESTION 124
A Windows 7 machine appears to have a failure. Every time it is rebooted, the message "BOOTMGR is
missing" appears. You have previously inserted a Windows 7 installation DVD into the DVD-ROM. Please
repair this failure without overwriting the customers' local user profiles. Instructions:
Launch the simulation to repair the failure
Type Help in command line to show list of available commands
When you have completed the simulation, please select the done button.
QUESTION 125
The network administrator has changed the IP address of Computer A from 192. 168. 120 to 10. 10. 1020 and
now Jane a user, is unable to connect to file shares on Computer A from Computers using the computer name.
Instructions: Using the available tools, resolve the connectivity issues. When you have completed the
simulation, please select the done button to submit your answer.
QUESTION 126
Two components of Genericwafe2.0 are causing performance issues on a Windows 7 PC One
Genencware2.0 component is currently not responding and needs to be disabled upon reboot. To prevent
further performance issues ensure both components are no longer running upon reboot without making any
other changes to the current system or without deleting registry keys or shortcuts. Instructions: When you have
completed the simulation, please select the done button to submit your answer.
QUESTION 127
A technician has verified that Joe, a user, has a malware infection on his desktop. Drag and drop the following
malware remediation techniques in the correct order Joe should follow to alleviate this issue.
Select and Place:
QUESTION 128
A technician is creating a batch script that auto-assigns a particular drive share to a drive letter upon login.
Which of the following commands can accomplish this?
A.
B.
C.
D.
NET USE
PING
XCOPY
IPCONFIG
QUESTION 129
An office of 25 computers is interested in employing a file server, network shares, and print server functionality.
Which of the following network setups would be BEST suited for this situation?
A. Ad-hoc
B. Workgroup
C. Domain
D. Token ring
QUESTION 130
Which of the following terms BEST describes the software or hardware used to manage virtual machines?
A.
B.
C.
D.
Hypervisor
Cloud Server Manager
Supervisor
Virtual Disk Manager
QUESTION 131
A technician is required to change a setting for HKEY_Local_Machine. Which of the following would the
technician use to change this?
A.
B.
C.
D.
BCEDIT
WEP setup
MSCONFIG
REGEDIT
QUESTION 132
Which of the following Control Panel utilities will allow a technician to change the associated file type in a
Windows XP machine?
A.
B.
C.
D.
Folder options
Administrator tools
Accessibility options
Regional and language options
QUESTION 133
Which of the following keys, when pressed immediately after the BIOS test, will display Windows Boot
Manager on a Windows 7 PC?
A.
B.
C.
D.
f2
f8
esc
delete
QUESTION 134
Which of the following Windows 7 versions comes with the LARGEST number of multimedia features?
A.
B.
C.
D.
Enterprise
Home Premium
Professional
Starter
QUESTION 135
A technician wants to know if a PC has an embedded wireless card. Which of the following tools should be
used?
A.
B.
C.
D.
Device Manager
Component Services
Services
System Configuration
QUESTION 136
A technician notices multiple disk errors in the Event Viewer. Which of the following tools would BEST
diagnose this issue?
A.
B.
C.
D.
CHKDSK
FDISK
BOOTREC
DISKPART
QUESTION 137
Which of the following BIOS boot methods allows a system to boot from a remote server?
A.
B.
C.
D.
PXE
DVD
USB
SATA
QUESTION 138
Which of the following settings MUST be configured in order to turn on a VoIP phone?
A.
B.
C.
D.
PoE
Flow control
VPN
Duplex speed
QUESTION 139
In which of the following locations would a technician go to show file extensions?
A.
B.
C.
D.
Security Center
Folder Options
Display
System
QUESTION 140
A technician needs to build a PC to act as a home virtual server. Which of the following would be the BEST
choice?
A. Dual Core CPU, 6GB DDR3 RAM, 320GB of hard drive space
B. Dual Core CPU, 8GB DDR RAM, 1TB of hard drive space
C. QUAD Core CPU, 6GB DDR3 RAM, 320GB of hard drive space
D. QUAD Core CPU, 4GB DDR2 RAM, 1TB of hard drive space
QUESTION 141
Windows XP Mode is available in which of the following Microsoft Windows environments?
A.
B.
C.
D.
Windows Vista Ultimate
Windows 7 Business Edition
Windows XP Professional
Windows Server 2008 R2
QUESTION 142
Which of the following are true regarding Windows 32-bit versus Windows 64-bit Operating Systems? (Select
TWO).
A.
B.
C.
D.
E.
CPUs that can run Windows 32-bit can also run Windows 64-bit.
Device drivers for Windows 32-bit and Windows 64-bit are the same.
Not all CPUs are capable of running Windows 64-bit.
Windows 64-bit can address larger amounts of RAM.
Windows 64-bit is a more secure OS and less susceptible to viruses.
QUESTION 143
Which of the following statements is true about XP mode in Windows 7?
A.
B.
C.
D.
Windows XP mode was only available in Windows Vista and it is not available in Windows 7.
Only the Professional and the Ultimate versions support Windows XP mode.
All versions of Windows 7 support Windows XP mode when the feature is installed.
Only the Ultimate version of Windows 7 supports Windows XP mode.
QUESTION 144
Which of the following is true about a file when it is copied from an NTFS to a FAT32 partitions?
A.
B.
C.
D.
The file owner is preserved
All of the file permissions are lost
All file permissions must be reassigned
The file name becomes case insensitive
QUESTION 145
If a customer wants to create a multi-boot PC with different editions of Windows, which of the following is
MOST important to consider?
A.
B.
C.
D.
Using multiple partitions
Using multiple hard drives
Using a single partition
Using a PXE boot scheme
QUESTION 146
A technician suspects that a recent virus they removed may have corrupted a necessary system file. Which of
the following utilities can the technician use to verify the integrity of these critical files?
A.
B.
C.
D.
msconfig
sfc
regsrv32
fixmbr
QUESTION 147
Which of the following System Tools would be the BEST one to perform a regular archiving of information on a
PC?
A.
B.
C.
D.
ROBOCOPY
XCOPY
Backup
System Restore
QUESTION 148
Which of the following is the correct UNC path to use when mapping a network drive?
A.
B.
C.
D.
\\share\password
\\share\server
\\server\username
\\server\share
QUESTION 149
Which of the following can be used to remove a virus from a computer?
A.
B.
C.
D.
Anti-spyware software
Anti-malware software
System Restore
Event Viewer
QUESTION 150
Which of the following operating systems is capable of fully utilizing more than 4GB of system RAM?
A.
B.
C.
D.
Windows Vista Ultimate
Windows 7 32-bit
Windows 7 64-bit
Windows XP Professional
QUESTION 151
A /all switch is MOST likely to be used with which of the following commands?
A.
B.
C.
D.
NET
NBTSTAT
PING
IPCONFIG
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertising