1. Which of the following symptoms will most likely indicate that a user’s email account has been compromised
  2. Pop-ups while browsing
  3. Lack of internet connectivity
  4. Change of home page
  5. Undeliverable email returns
  6. Which of the following utilities should be used before installing new hardware in a computer?
  7. System file checker
  8. Windows updates
  9. Security center
  10. System restore
  11. A technician is encountering problems during the upgrade process of a late Pentium 4 HT processor PC from windows XP Professional to a Windows 7 Professional x64 OS. What could be the problem?
  12. Pentium 4 HT Processor are 64-bit compatible but do not support the x64 instruction set
  13. The bios needs to be configured to enable x64 support
  14. Windows XP can only be directly upgraded to windows 7 home basic and home premium editions
  15. Pentium 4 HT processor are not 64-bit compatible
  16. Which is the best way to change the host name of a computer on a company’s domain while still maintaining the access to the individual roaming profile’s network shares
  17. Add the PC to the workgoup and reboot. Rename the PC and reboot. Rejoin the PC to the domain
  18. Change the name of PC. Join it to the workgroup and then to the domain
  19. Add the PC to the workgroup and reboot. Rejoin the PC to the domain. Rename the PC and reboot
  20. Change the name of the PC and reboot. Rejoin it to the domain and reboot
  21. A user report their laptop battery will not charge. Which of the following would be checked first in order to narrow down the issue?
  22. Check the AC voltage at the outlet using a multimeter
  23. Remove the battery and power the laptop using the ac adaptor
  24. Remove the battery and place it in another laptop to see if it works
  25. Use a multimeter to check the output voltage from the ac adapter
  26. A laptop’s number lock and scroll lock lights are blinking in a certain sequence and is not booting. Which of the following would a technician do first in this situation
  27. Install a replacement memory module
  28. Consult the manufacturer website for diagnostics code
  29. Attempt to boot into safe mode
  30. Install a replacement hard drive
  31. How can you get the RAID 5 drive back to work when 2 drives failed in the RAID 5 system
  32. Remove and replace the bad drives, one at a time, the RAID will rebuild and recover
  33. Install 2 new drives, follow RAID recovery instruction, restore the data from the last backup
  34. Remove and replace both drives, the RAID will rebuild with data in place.
  35. Create a VM, copy the data from an external drive and remap the shares
  36. Which of the following describes the main differences between a laptop and a tablet
  37. The are no field serviceable parts
  38. Tablet have a multi-touch interface
  39. Tablet are typically not upgradeable
  40. Tablets use solid state drives for storage
  41. Ann is trying to pair her smartphone with her laptop to re-sync her contacts her smart phone is not discovering the laptop during Bluetooth discovery. Ann reinstalls the Bluetooth drivers but receives an error that no Bluetooth hardware is found. Which of the following is the cause of the problem?
  42. The Wi-Fi antenna around the display is unplugged
  43. Incorrect PIN is being used to pair the device
  44. The smart phone is too far away
  45. Bluetooth is disabled in the bios
  46. Which of the following provides protection against DDos attacks?
  47. RDIF badge
  48. UAC
  49. Firewall
  50. Antivirus
  51. A technician is asked to set up a wired kiosk laptop for office visitors to use for internet access only. Which of the following would be most important in securing this type of setup?
  52. Disabling the administrator account
  53. Requiring personal information be entered before use
  54. Changing the default usernames for all the kiosk accounts
  55. Restricting user permission for the kiosk account
  56. Setting a string password for all kiosk accounts
  57. A website that attempts to mimic a bank website with malicious intent is known as which of the following?
  58. Malware
  59. Shoulder surfing
  60. Social engineering
  61. Phishing
  62. A technician is dispatched to a business where it is discovered that two physical hard drives in RAID 5 configuration have failed. Which of the following is the best solution.
  63. Replace the whole array. The other drives will soon fail
  64. Replace the two failed drives and restore from the latest backup
  65. Replace only one drive and restore from the latest backup
  66. Replace one drive at a time and allow the RAID to rebuild
  67. Which of the following items differentiates windows 7 enterprise from windows 7 Ultimate?
  68. Support multilingual user interface
  69. Requires volume licensing
  70. Can join active directory domain
  71. Can use Bitlocker encryption
  72. Which of the following shutdown switch would you use to reboot a computer from a remote computer’s command prompt
  73. –r
  74. –s
  75. –a
  76. –i
  77. Which of the following Windows XP location or utilities contains startup commands for the programs that are running?
  78. MMC
  79. CMD
  80. Task Manager
  81. Task Scheduler
  82. Which of the following computers would be most suitable to host virtual workstation
  83. A computer with a 6-core processor, 512MB RAM, 1TB SSD hard drive, and a gigabit NIC
  84. A computer with a 6 –core processor, 512 MB RAM, 1TB Hard drive, and a gigabit NIC
  85. A computer with a 6 –core processor, 64GB RAM, 1TB SSD, and a gigabit NIC
  86. A computer with a 6 –core processor, 64GB RAM, 1TB SSD, and a Fast Ethernet NIC
  87. A server administrator, has setup a new server on the company’s network to provide centralized user a management. The file permission on the server have been shared over the network based on user groups divided into department and do not have administrative right. This practice is called which pf the following?
  88. Logical separation of data
  89. User segregation
  90. Administrative overhead
  91. Principal of least privilege
  92. Which of the following is a disadvantage of running a virtual machine
  93. Decreased performance
  94. Long recovery time
  95. Hard drive compatibility
  96. Difficult software testing
  97. Which of the following would be most likely third party driver needed during installation of windows 7 on a new pc?
  98. Network
  99. Video
  100. RAID
  101. Sound
  102. Which of the following is device intended to prevent physical access to a facility
  103. Tailgate
  104. Bollards
  105. Firewall
  106. Mantrap
  107. A company is looking to implement a simple security mechanism to prevent data loss in the event of misplaced company smartphone. Which of the following techniques, in combination would provide this functionality(select 2)
  108. Synchronization of email, contact, and calendar entries
  109. Remote wipe
  110. Remote radio disabling
  111. Remote file backup
  112. Auto password lock
  113. A user claims that they recently had a virus infection and event after the infection was cleaned, the user’s web browser is still redirected to the same incorrect website when it is open. Which of the following should the technician check first
  114. Verify that the browser’s cookies have been cleared.
  115. Run an ipconfig /flushdns
  116. Check that the browser version is the latest release
  117. Run an ipconfig /all and verify the correct dhcp server
  118. An user is connected to their home wireless network and can see shared folders on the other computers on the network, but cannot connect to the internet. Which of the following tools would a technician use to best troubleshoot this issue:
  119. Netstat
  120. Arp
  121. Tracert
  122. Nbtstat
  123. A laser printer has just had its toner cartridge removed and toner has leaked inside out. The best method to remove spilled toner, both inside and outside of the printer is which of the following?
  124. ESD vacuum
  125. Maintenance kit
  126. Damp towel
  127. Compressed air
  128. Which of the following security threats are typically designed to get the user to make a purchase?(select two)
  129. Worm
  130. Virus
  131. Adware
  132. Spam
  133. Trojan
  134. Phishing
  135. Which of the following would remove all data from a drive and ensure that the drive was no longer readable?(select two)
  136. Electromagnet
  137. Overwriting
  138. Format
  139. Repartition
  140. Shredding
  141. An user reports that she is unable to connect to any local network resources or internet sites. The technician discover that his IP address is 169.254.13.197. Which of the following is most likely the cause?
  142. Incorrect username and password credentials
  143. Rogue hosts file entries
  144. Not able to reach a dhcp server
  145. Incorrect subnet mask
  146. A technician wants to test out windows 7 before deploying it on workstation. Which of the following must be completed first in order to run windows 7 from a bootable usb drive
  147. Format the usb drive to fat 16 file format
  148. Copy over the boot.in file
  149. Create a primary partition and make it active
  150. Copy over the config.sys file
  151. In windows 7, which of the following is the most restrictive network setting to control sharing files and granting access to a computer over a network
  152. Home
  153. public
  154. Wan
  155. Work
  156. Which of the following requires desktop software to synchronize contact with the pc
  157. iPhone
  158. andoid
  159. android tablet
  160. a verhiclegps device
  161. after performing a wireless survey, a technician report the following data

WPA NameChannel

WAP16

WAP28

WPA39

Which of the following channels should the technician use for the sohowap to be installed next?

  1. 1
  2. 3
  3. 7
  4. 11
  1. A computer system uses a large CRT. The display is experiencing display issues around the edges. The technician suspects something in the computing environment is causing the problem. Which of the following should most likely be moved to reduce the issue?
  2. Unshielded speakers
  3. Wireless directional antennas
  4. Wireless access points
  5. High speed laser printer
  6. An android smartphone is most likely to have which of the following types of user-accessible storage in contrast to a traditional laptop
  7. Flash
  8. Rom
  9. Floppy
  10. hard drive
  11. a Technician is asked to create a login for each member of a four person family, on a home computer running windows 7. The parents need to have administrative access but the children need to be standard users. Which of the following control panel icons should the technician select to create these logons?
  12. Parental controls
  13. User Account control
  14. User account
  15. Personalization
  16. A small business owner is concerned about any non-business owned device being connected to their network. Which of the following actions would be the most secure way to ensure that only business owned device can connect?
  17. Enable MAC filtering on the router
  18. Remove all extra patch cable from open ports
  19. Secure the router and switches in a locked room
  20. Disable the DHCP service on the router
  21. When a pc boots, the operating system reports the incorrect day and year for a few minutes before it eventually displays the correct time. Which of the following should the technician do to fix this issue?
  22. Open the pc and replace the CMOS battery
  23. Change the PC to use NTP for time synchronization
  24. Change the time zone from UTC to the correct time zone
  25. Set the date and time manually in the BIOS
  26. Which of the following OS features limits access to a workstation(select two)
  27. User permission
  28. Strong passwords
  29. Employee badges
  30. Privacy filters
  31. MAC filtering
  32. A laser printer is printing images tilted on the page. Which of the following components is the cause of the problem
  33. Paper registration assembly
  34. Toner cartridge
  35. Laser scanner assembly
  36. Fusing assembly
  37. A user has called in a helpdesk ticket about their monitor not powering on but their PC does. Which of the following would be the first thing the technician would check?
  38. Power cable
  39. Power settings
  40. Video cable
  41. Video settings
  42. A customer want to setup soho wired network. The customer needs assistance in setting up static IP address on three computers on the network. Which of the following is the best solution for the technician to implement
  43. Internet options>Connection>network>LAN setting>choose proxy server , type in the IP address
  44. Windows firewall>the connections tab>add exception>change scope, type in the IP address
  45. Internet options>advance tab>LAN settings, type in the IP address
  46. Local Area Connections>Properties>TCP/IP>Properties>General>specify, type in the IP Address
  47. A technician recently installed windows 7 on a pc. The technician is unable to connect to the pc remotely using RDP, but is able to ping the P. Which of the following is the most likely cause?
  48. The PC is infected with a virus
  49. The network card is defective
  50. The router firewall is enabled
  51. The remote assistance is disabled
  52. A User states they constantly get pop-ups on their computer asking them to buy a product. Which of the following is this known as?
  53. Shoulder surfing
  54. Phishing
  55. Social engineering
  56. Malware
  57. A user want to view and change the file name extensions, which of the following options in the control panel should be used to accomplish this?
  58. Folder Options
  59. System
  60. Security Center
  61. User Account
  62. When running a combination of full and incremental backups, which of the following represents the required tapes in order to completely restore a system
  63. The system cannot be restored completely using full and incremental backup
  64. Only the latest incremental backup in required
  65. Only the latest full backup is required
  66. The latest full and all incremental backups since the last full backup
  67. A user downloaded an android app directly from a developer’s website and is unable to install it on their smartphone. Which of the following allow the user to install the app
  68. Install a recovery image
  69. Allow apps from unknown source
  70. Enable near field communication
  71. Gain root access
  72. A printer has been repurposed to another part of the building. When configured to work with the new department, it intermittently prints and at times prints unrequested jobs. The cable tester reveals the Ethernet cable is properly configured.
  73. Incorrect driver
  74. Ip conflict
  75. Slow transfer speeds
  76. Limited connectivity
  77. After gaining administrative access, a malicious intruder might leave which of the following behind on a compromised system to allow for continued monitoring and access?
  78. Trojan Horse
  79. Logic Bomb
  80. Spyware
  81. Rootkit
  82. A technician has booted computer several times. Each time the technician observes a BSOD with the same stop error. This indicates which of the following
  83. Incorrect set hard drive jumpers
  84. Failing hard drive
  85. Bad CPU
  86. Failing network card
  87. The manager had requested that their laptop be setup so that a static IP can be assigned to the wireless card while in the office, but have the ability to utilize DHCP when at home. Which of the following windows 7 options can accomplish this?
  88. Ipconfig command utility
  89. Client for Microsoft networks
  90. Manager Wireless Networks
  91. Alternate configuration
  92. A computer is displaying an “operating system is not found “error whenever it is powered on. The computer is secured in a cabinet, so that only the front panel is accessible. The technician boot from a windows installation CD and finds that there is a windows folder on the computer. Before attempting a re-installationoff the operating system, which of the following should the technician do next?
  93. Change the boot order in the bios so that hard drive is the first boot order
  94. Start the recovery console from the windows installation cd and run fdisk
  95. Start the recovery console from the windows installation cd and run a chkdsk /r
  96. Perform a side by side installation of windows on the hard drive from the installation CD
  97. A user has a remote share that requires them to authenticate with a different set of credentials. Which of the following commands could a technician use to map this share?
  98. Tracert
  99. Net use
  100. Nslookup
  101. Netstat
  102. Which of the following actions can power users perform?
  103. Create local user accounts
  104. Backup the operating system and system files
  105. Install computer applications that requires administrative privileges
  106. Modify any local user account
  107. Which of the following is a valid local loopback address test command
  108. Ping 10.10.1.1
  109. Ping 127.0.0.1
  110. Ping 192.168.0.1
  111. Ping 255.255.255.0
  112. When using a pc on a windows domain, which of the followingis the most critical services when connecting to multiple files, print, and email server?
  113. Internet connection sharing services
  114. Windows firewall services
  115. Computer browser services
  116. Dns services
  117. Which of the following can be used to help recover a lost smartphone?
  118. Remote support software
  119. Locator application
  120. Nfc enabled device
  121. Gps navigation software
  122. A technician is asked by another technician at his company to identify the host name of a device using a specified ip address. Which of the following commands would be used to obtain this information
  123. Nslookup
  124. Ipconfig
  125. Ping
  126. Netstat
  127. A user cannot connect to their home wireless network. Which of the following should a technician do first
  128. Identify user changes to the computer
  129. Establish a plan of action to resolve the problem
  130. Establish a theory of probable cause
  131. Verify full system functionality
  132. A user report that random pages are being printed on his printer. Which of the following can mitigate this from occurring
  133. Enable static IP’s
  134. Change the network frequency
  135. Change the default encryption key
  136. Disable the SSID broadcasting
  137. A technician is troubleshooting a reported wireless connectivity problem with a user’s laptop. The 02.11a access point is located in one of the corners of a square office with 100 meters walls, while the user’s office is on the opposite corner. The user’s laptop is able to wirelessly pair with a printer located in the middle of the office and the user can print in ad hoc mode. Which of the following is the reason the user is unable to connect to the internet
  138. 802.11a only support ad-hoc mode
  139. The laptop nic is faulty
  140. Rf signal is not received from the wap
  141. The printer is not connected to the wap
  142. A computer’s first boot device is set to CD ROM drive, but there is no bootable disk inserted in the cd rom. Which of the following will occur
  143. The system will restart until a bootable media is inserted in the cd rom drive
  144. The system will hang and the non-bootable device found error message will appear on the screen
  145. The system will attempt to boot from the next device listed in the boot options of the bios
  146. The system will hang and the operating system missing error will appear on the screen
  147. An administrator would like a file to retain its archival bit status, but wishes to store it on another driver tan the one it was created on.