Time limit: 0
Quiz-summary
0 of 82 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
Information
Good luck for you!
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 82 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- Answered
- Review
-
Question 1 of 82
1. Question
1 pointsRefer to the exhibit. In what situation would a technician use this tab?Correct
Incorrect
-
Question 2 of 82
2. Question
1 pointsA technician is attempting to repair a Windows 7 laptop that has a missing or corrupt OS file that prevents Windows 7 from starting up. The technician reboots the laptop and accesses the WinRE via the F8 key. Which option must the technician choose in the System Recovery menu to locate and fix the missing or corrupt system files?Correct
Incorrect
-
Question 3 of 82
3. Question
1 pointsAfter complaints from users, a technician identifies that the college web server is running very slowly. A check of the server reveals that there are an unusually large number of TCP requests coming from multiple locations on the Internet. What is the source of the problem?Correct
Incorrect
-
Question 4 of 82
4. Question
1 pointsuser reports that a laser printer is printing shadow images and letters. Which part should the technician replace to correct this problem?Correct
Incorrect
-
Question 5 of 82
5. Question
1 pointsA user has determined that the computer hard drive is failing. Before the failure, the user implemented a backup scheme running a normal backup every end of the month and then incremental backups every other day. What is the correct sequence that the user has to follow in order to restore the backup?Correct
Incorrect
-
Question 6 of 82
6. Question
1 pointsWhat are two possible causes of a computer running slowly? (Choose two.)Correct
Incorrect
-
Question 7 of 82
7. Question
1 pointsA technician connects a new LCD monitor for the first time and finds the display very pixilated. What is a possible solution to this problem?Correct
Incorrect
-
Question 8 of 82
8. Question
1 pointsWhich statement that is related to running 64-bit software is correct?Correct
Incorrect
-
Question 9 of 82
9. Question
1 pointsWhich user account should be used only to perform system management and not as the account for regular use?Correct
Incorrect
-
Question 10 of 82
10. Question
1 pointsA technician is troubleshooting a network connectivity problem. Pings to the local wireless router are successful but pings to a server on the Internet are unsuccessful. Which CLI command could assist the technician to find the location of the networking problem?Correct
Incorrect
-
Question 11 of 82
11. Question
1 pointsWhat are two features of the Android operating system? (Choose two.)Correct
Incorrect
-
Question 12 of 82
12. Question
1 pointsWhich two guidelines are appropriate for creating strong passwords? (Choose two.)Correct
Incorrect
-
Question 13 of 82
13. Question
1 pointsA technician is about to install and configure a wireless network at a small branch office. What is the first security measure the technician should apply immediately upon powering up the wireless router?Correct
Incorrect
-
Question 14 of 82
14. Question
1 pointsA technician is troubleshooting a Windows 7 laptop that takes significantly longer than expected when performing a file search. What is the possible cause?Correct
Incorrect
-
Question 15 of 82
15. Question
1 pointsWhich two methods are used to directly connect mobile devices such as tablets and smartphones to a data network? (Choose two.)Correct
Incorrect
-
Question 16 of 82
16. Question
1 pointsA user is viewing the Disk Management utility on a PC that is running Windows XP and notices that one of the disks is marked as Foreign. What does this mean?Correct
Incorrect
-
Question 17 of 82
17. Question
1 pointsWhat action should a technician take before upgrading computers from Vista to Windows 7?Correct
Incorrect
-
Question 18 of 82
18. Question
1 pointsWhat are two file attributes? (Choose two.)Correct
Incorrect
-
Question 19 of 82
19. Question
1 pointsWhich type of malware is disguised as a legitimate program?Correct
Incorrect
-
Question 20 of 82
20. Question
1 pointsA technician has successfully removed malware from a PC and finds that when the system is rebooted error messages are displayed about missing and corrupt system files. What utility can the technician use to replace or fix any corrupted system files?Correct
Incorrect
-
Question 21 of 82
21. Question
1 pointsAn “OS not found” error message is displayed when a computer is started. The technician determines that the single hard drive is configured as a slave. What needs to be done to correctly configure the hard drive as a master?Correct
Incorrect
-
Question 22 of 82
22. Question
1 pointsA technician is troubleshooting a server and wants to see all open shared files on it. What command could the technician use to do this?Correct
Incorrect
-
Question 23 of 82
23. Question
1 pointsA technician is troubleshooting a problem where many websites return a “certificate not valid” error. The technician notices that the date and time are not current and resets these to the correct settings. The previously inaccessible websites are now accessible. However, when the computer is restarted the same problem reoccurs. What can the technician do to prevent the date and time from resetting?Correct
Incorrect
-
Question 24 of 82
24. Question
1 pointsWhich two issues are likely to cause BSOD errors? (Choose two.)Correct
Incorrect
-
Question 25 of 82
25. Question
1 pointsA technician wants to use Remote Desktop to configure another PC. Which firewall port on the remote PC should be open in order for Remote Desktop to work?Correct
Incorrect
-
Question 26 of 82
26. Question
1 pointsA technician needs to permanently destroy data on some drives before disposing of them. What is the best way to do this?Correct
Incorrect
-
Question 27 of 82
27. Question
1 pointsWhat kind of tool or substance is better to use to remove spilled toner on a laser printer?Correct
Incorrect
-
Question 28 of 82
28. Question
1 pointsOn a PC that is running Windows 7 Ultimate, a user sets up a home entertainment system and creates a homegroup. The user then joins two other PCs to the workgroup, one PC running Windows 7 Starter and the other running Windows 7 Home Basic. What else must the user do in order to have the user accounts on the Windows 7 Home Basic and Windows 7 Starter PCs access the shares on the home entertainment system?Correct
Incorrect
-
Question 29 of 82
29. Question
1 pointsA user wants to extend a primary partition formatted with the NTFS file system with the unallocated space on the hard disk. What must the user do after the primary partition is extended to make it usable?Correct
Incorrect
-
Question 30 of 82
30. Question
1 pointsA user has detected that one of the virtual machines in a computer is infected with a virus. Which statement about the situation is likely to be true?Correct
Incorrect
-
Question 31 of 82
31. Question
1 pointsWhat type of file system allows the use of files larger than 5 GB and is mostly used on internal hard drives?Correct
Incorrect
-
Question 32 of 82
32. Question
1 pointsA user purchases a new 802.11n wireless router and sets it up at home. The user notices that 802.11n devices can connect to the wireless router but 802.11g devices cannot connect. What is the problem?Correct
Incorrect
-
Question 33 of 82
33. Question
1 pointsWhich two possible errors may be displayed when a laser printer does not have enough memory to handle the type of printing jobs that the users are trying to print? (Choose two.)Correct
Incorrect
-
Question 34 of 82
34. Question
1 pointsWhat is true about restore points?Correct
Incorrect
-
Question 35 of 82
35. Question
1 pointsWhat is true about restore points?Correct
Incorrect
-
Question 36 of 82
36. Question
1 pointsA technician has created a customized image of Windows 7 and wants to deploy it to 30 PCs. Which utility can the technician use to do this?Correct
Incorrect
-
Question 37 of 82
37. Question
1 pointsA user reports that a computer is unable to print on an inkjet printer. The technician has determined that there is no paper in the paper bin. What is the next step in the troubleshooting process?Correct
Incorrect
-
Question 38 of 82
38. Question
1 pointsA user wants to map a network drive on a PC that is named “WORK2″ and runs Windows 7. The name of the shared resource the user wishes to map to is called “installs” and is located on a workstation called “WORK1″. What would be the correct path for mapping the network drive?Correct
Incorrect
-
Question 39 of 82
39. Question
1 pointsWhat are two functions of hypervisors? (Choose two.)Correct
Incorrect
-
Question 40 of 82
40. Question
1 pointsWhat is a possible situation when it might be necessary to boot Windows 7 from a USB device, a CD, or a DVD?Correct
Incorrect
-
Question 41 of 82
41. Question
1 pointsWhat is required in order to connect a Wi-Fi enabled laptop to a WPA secured wireless network?Correct
Incorrect
-
Question 42 of 82
42. Question
1 pointsWhich security threat hides the resources that it uses from antivirus programs?Correct
Incorrect
-
Question 43 of 82
43. Question
1 pointsA technician is troubleshooting a workstation in a domain that has been infected with a virus. What is the first step the technician should take to clean the infected workstation?Correct
Incorrect
-
Question 44 of 82
44. Question
1 pointsWhich feature of a mobile device uses sensors to detect the orientation of the screen and changes the display to landscape or portrait as required?Correct
Incorrect
-
Question 45 of 82
45. Question
1 pointsA Windows XP PC that was formatted with the NTFS file system displays a missing or corrupt DLL error message when a certain program is run. What is the cause of this?Correct
Incorrect
-
Question 46 of 82
46. Question
1 pointsA user has a computer that is infected with spyware. What should be performed before removing the spyware?Correct
Incorrect
-
Question 47 of 82
47. Question
1 pointsThis is a flash item. Please click below to answer this item.Sort elements
- Automatic Updates
- Add or Remote Program
- Add hardwave
- Programs
-
Only Windows XP 1
-
Only Windows XP 2
-
Window XP and Vista
-
Window Vista and 7
Correct
Incorrect
-
Question 48 of 82
48. Question
1 pointsWhich expansion card can assist in troubleshooting a computer problem when no video is available?Correct
Incorrect
-
Question 49 of 82
49. Question
1 pointsA wired network is undergoing several changes that could leave it vulnerable to connection by unauthorized devices while the work is in progress. Which two temporary measures would enable the authorized devices to continue to have network access but prevent unauthorized devices from connecting? (Choose two.)Correct
Incorrect
-
Question 50 of 82
50. Question
1 pointsA technician successfully removes malware from an infected PC. When the PC is rebooted it displays error messages about missing system files. How can the technician fix this problem?Correct
Incorrect
-
Question 51 of 82
51. Question
1 pointsA user has shared a directory on the network. The files in the directory can be modified, created, and deleted when accessed from the local computer, but when accessed from another computer, the files can only be viewed. What can the user do to gain all the permissions when the files are accessed over the network?Correct
Incorrect
-
Question 52 of 82
52. Question
1 pointsA technician is trying to troubleshoot a Windows 7 PC remotely and finds that pings to the target machine fail and that telnetting into it fails as well. What changes should the technician make on the Windows 7 firewall in order to telnet into the target PC remotely?Correct
Incorrect
-
Question 53 of 82
53. Question
1 pointsWhich statement is correct about installing a 32-bit operating system on a x64 architecture?Correct
Incorrect
-
Question 54 of 82
54. Question
1 pointsWhat tool can be used to find and attempt to fix file structural errors on a hard disk in Windows 7?Correct
Incorrect
-
Question 55 of 82
55. Question
1 pointsWhat type of partition has the ability to create volumes spanning across more than one disk?Correct
Incorrect
-
Question 56 of 82
56. Question
1 pointsA user needs to frequently access data from a shared folder on a remote computer. Which command would be used to map a network drive to the remote share?Correct
Incorrect
-
Question 57 of 82
57. Question
1 pointsWhich Windows utility can be used to schedule a regular backup for preventive maintenance?Correct
Incorrect
-
Question 58 of 82
58. Question
1 pointsWhich two mobile device components are field replaceable? (Choose two.)Correct
Incorrect
-
Question 59 of 82
59. Question
1 pointsWhich two common connection types are used to synchronize mobile devices with a PC or laptop? (Choose two.)Correct
Incorrect
-
Question 60 of 82
60. Question
1 pointsA business organization is configuring security on the mobile devices that are used in the organization. The security policy states that business data on mobile devices should only ever be accessed by employees. Which mobile device security feature can be used to best ensure that business data is rendered completely inaccessible if the device is lost or stolen?Correct
Incorrect
-
Question 61 of 82
61. Question
1 pointsFor mobile devices, what are two advantages of using flash memory storage technology that is the equivalent of solid state drives? (Choose two.)Correct
Incorrect
-
Question 62 of 82
62. Question
1 pointsA technician troubleshooting a network problem has used CLI commands to determine that a computer has not been allocated a correct IP address from the DHCP server. Which command can the technician use to solve this problem?Correct
Incorrect
-
Question 63 of 82
63. Question
1 pointsA computer technician has successfully returned a laptop to full operation and verified system functionality. Actions the technician performed included modifying the registry and applying patches to the operating systems. What is the next step in the troubleshooting process that the technician should do?Correct
Incorrect
-
Question 64 of 82
64. Question
1 pointsThis is a flash item. Please click below to answer this item.Sort elements
- Printers and Faxes
- Devices and Printers
- Device Manager
- Easy of Access
- Display
- Folder Options
-
Only Windows XP
-
Only Windows 7
-
Only Windows Vista and 7 (1)
-
Only Windows Vista and 7 (2)
-
Windows XP, Vista and 7
Correct
Incorrect
-
Question 65 of 82
65. Question
1 pointsHow can a user prevent specific applications from accessing a Windows computer over a network?Correct
Incorrect
-
Question 66 of 82
66. Question
1 pointsWhen a Windows XP computer starts, a “Missing NTLDR” message is displayed after the POST. What are two possible solutions to this problem? (Choose two.)Correct
Incorrect
-
Question 67 of 82
67. Question
1 pointsA computer locks up frequently, and no error message can be seen on screen. The problem occurs every time the user attempts to restart the computer. What is the most likely reason for this problem?Correct
Incorrect
-
Question 68 of 82
68. Question
1 pointsA technician has replaced the power supply unit of a PC, but notices that when the PC boots up the RAID array cannot be found. The technician verifies that the wattage of the replaced power supply unit matches the original one and that the RAID controller is receiving adequate power. What is the problem?Correct
Incorrect
-
Question 69 of 82
69. Question
1 pointsA user notices that there is intermittent wireless connectivity on a laptop that is running a wireless PCI Express Micro card using the wireless 802.11n standard. What should the user do to fix the problem?Correct
Incorrect
-
Question 70 of 82
70. Question
1 pointsWhich type of user account is created automatically during a Windows XP installation?Correct
Incorrect
-
Question 71 of 82
71. Question
1 pointsA cleaner attempts to enter a computer lab but is denied entry by the receptionist because there is no scheduled cleaning for that day. What type of attack was just prevented?Correct
Incorrect
-
Question 72 of 82
72. Question
1 pointsAfter consulting the manufacturer manuals, a technician applies a series of recommended solutions that resolve a problem with a workstation computer. What is the next step in the troubleshooting process that the technician should perform?Correct
Incorrect
-
Question 73 of 82
73. Question
1 pointsA user is able to only access files required to perform a specific task. What type of security practice is being applied?Correct
Incorrect
-
Question 74 of 82
74. Question
1 pointsA user replaced a PC CPU with a faster one, but now the PC displays a BSOD on bootup. What is the problem?Correct
Incorrect
-
Question 75 of 82
75. Question
1 pointsA user receives an email requesting verification of the password that is used to access bank files. What type of security threat is this?Correct
Incorrect
-
Question 76 of 82
76. Question
1 pointsA company has replaced five desktop computers in the accounting and finance department with new computers. The plan is to donate the recovered computers in a fully functional state to a not-for-profit community organization. How can the company ensure that sensitive financial data cannot be accessed once the computers are donated?Correct
Incorrect
-
Question 77 of 82
77. Question
1 pointsWhich ping command option would be used to resolve the hostname when testing connectivity to a specific IP address?Correct
Incorrect
-
Question 78 of 82
78. Question
1 pointsWhich two precautions can help prevent social engineering? (Choose two.)Correct
Incorrect
-
Question 79 of 82
79. Question
1 pointsA company has a guest wireless network available for visitors while on the company premises. A technician has noted that unauthorized users are connecting to this wireless network from outside the premises. Which action can be taken to reduce unauthorized connections to the guest wireless network while enabling visitors to still connect quickly and easily without assistance while on the company premises?Correct
Incorrect
-
Question 80 of 82
80. Question
1 pointsWhich three items are biometric security devices? (Choose three.)Correct
Incorrect
-
Question 81 of 82
81. Question
1 pointsWhich statement is correct about applying firmware updates?Correct
Incorrect
-
Question 82 of 82
82. Question
1 pointsWhen a user tries to run a program a missing or corrupt DLL message is displayed. What are two possible solutions to this problem? (Choose two.)Correct
Incorrect