- Which of the following symptoms will most likely indicate that a user’s email account has been compromised
- Pop-ups while browsing
- Lack of internet connectivity
- Change of home page
- Undeliverable email returns
- Which of the following utilities should be used before installing new hardware in a computer?
- System file checker
- Windows updates
- Security center
- System restore
- A technician is encountering problems during the upgrade process of a late Pentium 4 HT processor PC from windows XP Professional to a Windows 7 Professional x64 OS. What could be the problem?
- Pentium 4 HT Processor are 64-bit compatible but do not support the x64 instruction set
- The bios needs to be configured to enable x64 support
- Windows XP can only be directly upgraded to windows 7 home basic and home premium editions
- Pentium 4 HT processor are not 64-bit compatible
- Which is the best way to change the host name of a computer on a company’s domain while still maintaining the access to the individual roaming profile’s network shares
- Add the PC to the workgoup and reboot. Rename the PC and reboot. Rejoin the PC to the domain
- Change the name of PC. Join it to the workgroup and then to the domain
- Add the PC to the workgroup and reboot. Rejoin the PC to the domain. Rename the PC and reboot
- Change the name of the PC and reboot. Rejoin it to the domain and reboot
- A user report their laptop battery will not charge. Which of the following would be checked first in order to narrow down the issue?
- Check the AC voltage at the outlet using a multimeter
- Remove the battery and power the laptop using the ac adaptor
- Remove the battery and place it in another laptop to see if it works
- Use a multimeter to check the output voltage from the ac adapter
- A laptop’s number lock and scroll lock lights are blinking in a certain sequence and is not booting. Which of the following would a technician do first in this situation
- Install a replacement memory module
- Consult the manufacturer website for diagnostics code
- Attempt to boot into safe mode
- Install a replacement hard drive
- How can you get the RAID 5 drive back to work when 2 drives failed in the RAID 5 system
- Remove and replace the bad drives, one at a time, the RAID will rebuild and recover
- Install 2 new drives, follow RAID recovery instruction, restore the data from the last backup
- Remove and replace both drives, the RAID will rebuild with data in place.
- Create a VM, copy the data from an external drive and remap the shares
- Which of the following describes the main differences between a laptop and a tablet
- The are no field serviceable parts
- Tablet have a multi-touch interface
- Tablet are typically not upgradeable
- Tablets use solid state drives for storage
- Ann is trying to pair her smartphone with her laptop to re-sync her contacts her smart phone is not discovering the laptop during Bluetooth discovery. Ann reinstalls the Bluetooth drivers but receives an error that no Bluetooth hardware is found. Which of the following is the cause of the problem?
- The Wi-Fi antenna around the display is unplugged
- Incorrect PIN is being used to pair the device
- The smart phone is too far away
- Bluetooth is disabled in the bios
- Which of the following provides protection against DDos attacks?
- RDIF badge
- UAC
- Firewall
- Antivirus
- A technician is asked to set up a wired kiosk laptop for office visitors to use for internet access only. Which of the following would be most important in securing this type of setup?
- Disabling the administrator account
- Requiring personal information be entered before use
- Changing the default usernames for all the kiosk accounts
- Restricting user permission for the kiosk account
- Setting a string password for all kiosk accounts
- A website that attempts to mimic a bank website with malicious intent is known as which of the following?
- Malware
- Shoulder surfing
- Social engineering
- Phishing
- A technician is dispatched to a business where it is discovered that two physical hard drives in RAID 5 configuration have failed. Which of the following is the best solution.
- Replace the whole array. The other drives will soon fail
- Replace the two failed drives and restore from the latest backup
- Replace only one drive and restore from the latest backup
- Replace one drive at a time and allow the RAID to rebuild
- Which of the following items differentiates windows 7 enterprise from windows 7 Ultimate?
- Support multilingual user interface
- Requires volume licensing
- Can join active directory domain
- Can use Bitlocker encryption
- Which of the following shutdown switch would you use to reboot a computer from a remote computer’s command prompt
- –r
- –s
- –a
- –i
- Which of the following Windows XP location or utilities contains startup commands for the programs that are running?
- MMC
- CMD
- Task Manager
- Task Scheduler
- Which of the following computers would be most suitable to host virtual workstation
- A computer with a 6-core processor, 512MB RAM, 1TB SSD hard drive, and a gigabit NIC
- A computer with a 6 –core processor, 512 MB RAM, 1TB Hard drive, and a gigabit NIC
- A computer with a 6 –core processor, 64GB RAM, 1TB SSD, and a gigabit NIC
- A computer with a 6 –core processor, 64GB RAM, 1TB SSD, and a Fast Ethernet NIC
- A server administrator, has setup a new server on the company’s network to provide centralized user a management. The file permission on the server have been shared over the network based on user groups divided into department and do not have administrative right. This practice is called which pf the following?
- Logical separation of data
- User segregation
- Administrative overhead
- Principal of least privilege
- Which of the following is a disadvantage of running a virtual machine
- Decreased performance
- Long recovery time
- Hard drive compatibility
- Difficult software testing
- Which of the following would be most likely third party driver needed during installation of windows 7 on a new pc?
- Network
- Video
- RAID
- Sound
- Which of the following is device intended to prevent physical access to a facility
- Tailgate
- Bollards
- Firewall
- Mantrap
- A company is looking to implement a simple security mechanism to prevent data loss in the event of misplaced company smartphone. Which of the following techniques, in combination would provide this functionality(select 2)
- Synchronization of email, contact, and calendar entries
- Remote wipe
- Remote radio disabling
- Remote file backup
- Auto password lock
- A user claims that they recently had a virus infection and event after the infection was cleaned, the user’s web browser is still redirected to the same incorrect website when it is open. Which of the following should the technician check first
- Verify that the browser’s cookies have been cleared.
- Run an ipconfig /flushdns
- Check that the browser version is the latest release
- Run an ipconfig /all and verify the correct dhcp server
- An user is connected to their home wireless network and can see shared folders on the other computers on the network, but cannot connect to the internet. Which of the following tools would a technician use to best troubleshoot this issue:
- Netstat
- Arp
- Tracert
- Nbtstat
- A laser printer has just had its toner cartridge removed and toner has leaked inside out. The best method to remove spilled toner, both inside and outside of the printer is which of the following?
- ESD vacuum
- Maintenance kit
- Damp towel
- Compressed air
- Which of the following security threats are typically designed to get the user to make a purchase?(select two)
- Worm
- Virus
- Adware
- Spam
- Trojan
- Phishing
- Which of the following would remove all data from a drive and ensure that the drive was no longer readable?(select two)
- Electromagnet
- Overwriting
- Format
- Repartition
- Shredding
- An user reports that she is unable to connect to any local network resources or internet sites. The technician discover that his IP address is 169.254.13.197. Which of the following is most likely the cause?
- Incorrect username and password credentials
- Rogue hosts file entries
- Not able to reach a dhcp server
- Incorrect subnet mask
- A technician wants to test out windows 7 before deploying it on workstation. Which of the following must be completed first in order to run windows 7 from a bootable usb drive
- Format the usb drive to fat 16 file format
- Copy over the boot.in file
- Create a primary partition and make it active
- Copy over the config.sys file
- In windows 7, which of the following is the most restrictive network setting to control sharing files and granting access to a computer over a network
- Home
- public
- Wan
- Work
- Which of the following requires desktop software to synchronize contact with the pc
- iPhone
- andoid
- android tablet
- a verhiclegps device
- after performing a wireless survey, a technician report the following data
WPA NameChannel
WAP16
WAP28
WPA39
Which of the following channels should the technician use for the sohowap to be installed next?
- 1
- 3
- 7
- 11
- A computer system uses a large CRT. The display is experiencing display issues around the edges. The technician suspects something in the computing environment is causing the problem. Which of the following should most likely be moved to reduce the issue?
- Unshielded speakers
- Wireless directional antennas
- Wireless access points
- High speed laser printer
- An android smartphone is most likely to have which of the following types of user-accessible storage in contrast to a traditional laptop
- Flash
- Rom
- Floppy
- hard drive
- a Technician is asked to create a login for each member of a four person family, on a home computer running windows 7. The parents need to have administrative access but the children need to be standard users. Which of the following control panel icons should the technician select to create these logons?
- Parental controls
- User Account control
- User account
- Personalization
- A small business owner is concerned about any non-business owned device being connected to their network. Which of the following actions would be the most secure way to ensure that only business owned device can connect?
- Enable MAC filtering on the router
- Remove all extra patch cable from open ports
- Secure the router and switches in a locked room
- Disable the DHCP service on the router
- When a pc boots, the operating system reports the incorrect day and year for a few minutes before it eventually displays the correct time. Which of the following should the technician do to fix this issue?
- Open the pc and replace the CMOS battery
- Change the PC to use NTP for time synchronization
- Change the time zone from UTC to the correct time zone
- Set the date and time manually in the BIOS
- Which of the following OS features limits access to a workstation(select two)
- User permission
- Strong passwords
- Employee badges
- Privacy filters
- MAC filtering
- A laser printer is printing images tilted on the page. Which of the following components is the cause of the problem
- Paper registration assembly
- Toner cartridge
- Laser scanner assembly
- Fusing assembly
- A user has called in a helpdesk ticket about their monitor not powering on but their PC does. Which of the following would be the first thing the technician would check?
- Power cable
- Power settings
- Video cable
- Video settings
- A customer want to setup soho wired network. The customer needs assistance in setting up static IP address on three computers on the network. Which of the following is the best solution for the technician to implement
- Internet options>Connection>network>LAN setting>choose proxy server , type in the IP address
- Windows firewall>the connections tab>add exception>change scope, type in the IP address
- Internet options>advance tab>LAN settings, type in the IP address
- Local Area Connections>Properties>TCP/IP>Properties>General>specify, type in the IP Address
- A technician recently installed windows 7 on a pc. The technician is unable to connect to the pc remotely using RDP, but is able to ping the P. Which of the following is the most likely cause?
- The PC is infected with a virus
- The network card is defective
- The router firewall is enabled
- The remote assistance is disabled
- A User states they constantly get pop-ups on their computer asking them to buy a product. Which of the following is this known as?
- Shoulder surfing
- Phishing
- Social engineering
- Malware
- A user want to view and change the file name extensions, which of the following options in the control panel should be used to accomplish this?
- Folder Options
- System
- Security Center
- User Account
- When running a combination of full and incremental backups, which of the following represents the required tapes in order to completely restore a system
- The system cannot be restored completely using full and incremental backup
- Only the latest incremental backup in required
- Only the latest full backup is required
- The latest full and all incremental backups since the last full backup
- A user downloaded an android app directly from a developer’s website and is unable to install it on their smartphone. Which of the following allow the user to install the app
- Install a recovery image
- Allow apps from unknown source
- Enable near field communication
- Gain root access
- A printer has been repurposed to another part of the building. When configured to work with the new department, it intermittently prints and at times prints unrequested jobs. The cable tester reveals the Ethernet cable is properly configured.
- Incorrect driver
- Ip conflict
- Slow transfer speeds
- Limited connectivity
- After gaining administrative access, a malicious intruder might leave which of the following behind on a compromised system to allow for continued monitoring and access?
- Trojan Horse
- Logic Bomb
- Spyware
- Rootkit
- A technician has booted computer several times. Each time the technician observes a BSOD with the same stop error. This indicates which of the following
- Incorrect set hard drive jumpers
- Failing hard drive
- Bad CPU
- Failing network card
- The manager had requested that their laptop be setup so that a static IP can be assigned to the wireless card while in the office, but have the ability to utilize DHCP when at home. Which of the following windows 7 options can accomplish this?
- Ipconfig command utility
- Client for Microsoft networks
- Manager Wireless Networks
- Alternate configuration
- A computer is displaying an “operating system is not found “error whenever it is powered on. The computer is secured in a cabinet, so that only the front panel is accessible. The technician boot from a windows installation CD and finds that there is a windows folder on the computer. Before attempting a re-installationoff the operating system, which of the following should the technician do next?
- Change the boot order in the bios so that hard drive is the first boot order
- Start the recovery console from the windows installation cd and run fdisk
- Start the recovery console from the windows installation cd and run a chkdsk /r
- Perform a side by side installation of windows on the hard drive from the installation CD
- A user has a remote share that requires them to authenticate with a different set of credentials. Which of the following commands could a technician use to map this share?
- Tracert
- Net use
- Nslookup
- Netstat
- Which of the following actions can power users perform?
- Create local user accounts
- Backup the operating system and system files
- Install computer applications that requires administrative privileges
- Modify any local user account
- Which of the following is a valid local loopback address test command
- Ping 10.10.1.1
- Ping 127.0.0.1
- Ping 192.168.0.1
- Ping 255.255.255.0
- When using a pc on a windows domain, which of the followingis the most critical services when connecting to multiple files, print, and email server?
- Internet connection sharing services
- Windows firewall services
- Computer browser services
- Dns services
- Which of the following can be used to help recover a lost smartphone?
- Remote support software
- Locator application
- Nfc enabled device
- Gps navigation software
- A technician is asked by another technician at his company to identify the host name of a device using a specified ip address. Which of the following commands would be used to obtain this information
- Nslookup
- Ipconfig
- Ping
- Netstat
- A user cannot connect to their home wireless network. Which of the following should a technician do first
- Identify user changes to the computer
- Establish a plan of action to resolve the problem
- Establish a theory of probable cause
- Verify full system functionality
- A user report that random pages are being printed on his printer. Which of the following can mitigate this from occurring
- Enable static IP’s
- Change the network frequency
- Change the default encryption key
- Disable the SSID broadcasting
- A technician is troubleshooting a reported wireless connectivity problem with a user’s laptop. The 02.11a access point is located in one of the corners of a square office with 100 meters walls, while the user’s office is on the opposite corner. The user’s laptop is able to wirelessly pair with a printer located in the middle of the office and the user can print in ad hoc mode. Which of the following is the reason the user is unable to connect to the internet
- 802.11a only support ad-hoc mode
- The laptop nic is faulty
- Rf signal is not received from the wap
- The printer is not connected to the wap
- A computer’s first boot device is set to CD ROM drive, but there is no bootable disk inserted in the cd rom. Which of the following will occur
- The system will restart until a bootable media is inserted in the cd rom drive
- The system will hang and the non-bootable device found error message will appear on the screen
- The system will attempt to boot from the next device listed in the boot options of the bios
- The system will hang and the operating system missing error will appear on the screen
- An administrator would like a file to retain its archival bit status, but wishes to store it on another driver tan the one it was created on.