Time limit: 0
Quiz-summary
0 of 45 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
Information
good luck for you!
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 45 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- Answered
- Review
-
Question 1 of 45
1. Question
1 pointsA server administrator needs to set up a new server with disk fault tolerance technology. The administrator decides to deploy RAID 0+1 technology. What is the minimum number of disks needed to deploy the disk array setting?Correct
Incorrect
-
Question 2 of 45
2. Question
1 pointsA user has detected that one of the virtual machines in a computer is infected with a virus. Which statement about the situation is likely to be true?Correct
Incorrect
-
Question 3 of 45
3. Question
1 pointsWhich fire protection system would be best for a university computer/electronics lab?Correct
Incorrect
-
Question 4 of 45
4. Question
1 pointsWhy should a technician avoid opening the casing of a power supply?Correct
Incorrect
-
Question 5 of 45
5. Question
1 pointsWhat is the first step a technician should take when preparing to work on the inside of a computer?Correct
Incorrect
-
Question 6 of 45
6. Question
1 pointsWhat tool can be used to find and attempt to fix file structural errors on a hard disk in Windows 7?Correct
Incorrect
-
Question 7 of 45
7. Question
1 pointsA customer asks for a solution to a printer problem that is beyond the knowledge level of the technician. What should the technician do?Correct
Incorrect
-
Question 8 of 45
8. Question
1 pointsWhich statement that is related to running 64-bit software is correct?Correct
Incorrect
-
Question 9 of 45
9. Question
1 pointsWhich statement is correct about installing a 32-bit operating system on a x64 architecture?Correct
Incorrect
-
Question 10 of 45
10. Question
1 pointsWhat action should a technician take before upgrading computers from Vista to Windows 7?Correct
Incorrect
-
Question 11 of 45
11. Question
1 pointsWhat is a possible situation when it might be necessary to boot Windows 7 from a USB device, a CD, or a DVD?Correct
Incorrect
-
Question 12 of 45
12. Question
1 pointsWhat type of partition has the ability to create volumes spanning across more than one disk?Correct
Incorrect
-
Question 13 of 45
13. Question
1 pointsWhat type of file system allows the use of files larger than 5 GB and is mostly used on internal hard drives?Correct
Incorrect
-
Question 14 of 45
14. Question
1 pointsWhich user account should be used only to perform system management and not as the account for regular use?Correct
Incorrect
-
Question 15 of 45
15. Question
1 pointsWhich type of user account is created automatically during a Windows 8.1 installation?Correct
Incorrect
-
Question 16 of 45
16. Question
1 pointsA technician is attempting to repair a Windows 7 laptop that has a missing or corrupt OS file that prevents Windows 7 from starting up. The technician reboots the laptop and accesses the WinRE via the F8 key. Which option must the technician choose in the System Recovery menu to locate and fix the missing or corrupt system files?Correct
Incorrect
-
Question 17 of 45
17. Question
1 pointsWhen would the PXE option be used when repairing a PC?Correct
Incorrect
-
Question 18 of 45
18. Question
1 pointsA user wants to extend a primary partition formatted with the NTFS file system with the unallocated space on the hard disk. What must the user do after the primary partition is extended to make it usable?Correct
Incorrect
-
Question 19 of 45
19. Question
1 pointsA user is viewing the Windows Disk Management utility and notices that one of the disks is marked as Foreign. What does this mean?Correct
Incorrect
-
Question 20 of 45
20. Question
1 pointsWhat are two file attributes in the Windows environment? (Choose two.)Correct
Incorrect
-
Question 21 of 45
21. Question
1 pointsWhat are two functions of hypervisors? (Choose two.)Correct
Incorrect
-
Question 22 of 45
22. Question
1 pointsWhich Windows utility can be used to schedule a regular backup for preventive maintenance?Correct
Incorrect
-
Question 23 of 45
23. Question
1 pointsWhich statement is correct about applying firmware updates?Correct
Incorrect
-
Question 24 of 45
24. Question
1 pointsWhat is true about restore points?Correct
Incorrect
-
Question 25 of 45
25. Question
1 pointsA user has a computer that is infected with spyware. What should be performed before removing the spyware?Correct
Incorrect
-
Question 26 of 45
26. Question
1 pointsA technician is troubleshooting a Windows 7 laptop that takes significantly longer than expected when performing a file search. What is the possible cause?Correct
Incorrect
-
Question 27 of 45
27. Question
1 pointsA user reports that a PC is losing files, not opening some files, and is performing slowly. The technician suspects problems with the hard drive. What should be done to protect the data that is on the PC and to determine the source of the problem, without risking total drive failure?Correct
Incorrect
-
Question 28 of 45
28. Question
1 pointsA user logs into Active Directory on a workstation and the user home directory does not redirect to a network share on a file server. A technician suspects that the group policy setting is incorrect. Which command can the technician use to verify the group policy settings?Correct
Incorrect
-
Question 29 of 45
29. Question
1 pointsA company has recently deployed Active Directory and now a workstation cannot connect to a network resource. A technician takes corrective action by modifying group policy settings. Which command should the technician use to make the workstation synchronize with the new settings?Correct
Incorrect
-
Question 30 of 45
30. Question
1 pointsA wired network is undergoing several changes that could leave it vulnerable to connection by unauthorized devices while the work is in progress. Which two temporary measures would enable the authorized devices to continue to have network access but prevent unauthorized devices from connecting? (Choose two.)Correct
Incorrect
-
Question 31 of 45
31. Question
1 pointsRefer to the exhibit. In what situation would a technician use this tab?Correct
Incorrect
-
Question 32 of 45
32. Question
1 pointsOn a PC that is running Windows 7 Ultimate, a user sets up a home entertainment system and creates a homegroup. The user then joins two other PCs to the workgroup, one PC running Windows 7 Starter and the other running Windows 7 Home Basic. What else must the user do in order to have the user accounts on the Windows 7 Home Basic and Windows 7 Starter PCs access the shares on the home entertainment system?Correct
Incorrect
-
Question 33 of 45
33. Question
1 pointsA user is reporting that a file has been shared specifically with another user on the network, but the other user opens the file and is unable to save it once edited. What is the probable cause?Correct
Incorrect
-
Question 34 of 45
34. Question
1 pointsWhich character of the Cloud model provides easy monitoring, controlling, reporting, and billing for both the provider and customers?Correct
Incorrect
-
Question 35 of 45
35. Question
1 pointsA business organization is configuring security on the mobile devices that are used in the organization. The security policy states that business data on mobile devices should only ever be accessed by employees. Which mobile device security feature can be used to best ensure that business data is rendered completely inaccessible if the device is lost or stolen?Correct
Incorrect
-
Question 36 of 45
36. Question
1 pointsAn administrative assistant tries to link a Bluetooth keyboard and mouse to a computer. The keyboard does not work, but the mouse works fine. What are two issues that could cause this situation? (Choose two.)Correct
Incorrect
-
Question 37 of 45
37. Question
1 pointsWhat is needed from Apple and Google in order for individual programmers to develop apps for iOS and Android devices?Correct
Incorrect
-
Question 38 of 45
38. Question
1 pointsWhich type of malware is disguised as a legitimate program?Correct
Incorrect
-
Question 39 of 45
39. Question
1 pointsAfter complaints from users, a technician identifies that the college web server is running very slowly. A check of the server reveals that there are an unusually large number of TCP requests coming from multiple locations on the Internet. What is the source of the problem?Correct
Incorrect
-
Question 40 of 45
40. Question
1 pointsWhich security threat hides the resources that it uses from antivirus programs?Correct
Incorrect
-
Question 41 of 45
41. Question
1 pointsA user receives an email requesting verification of the password that is used to access bank files. What type of security threat is this?Correct
Incorrect
-
Question 42 of 45
42. Question
1 pointsA cleaner attempts to enter a computer lab but is denied entry by the receptionist because there is no scheduled cleaning for that day. What type of attack was just prevented?Correct
Incorrect
-
Question 43 of 45
43. Question
1 pointsWhich two precautions can help prevent social engineering? (Choose two.)Correct
Incorrect
-
Question 44 of 45
44. Question
1 pointsA company has replaced five desktop computers in the accounting and finance department with new computers. The plan is to donate the recovered computers in a fully functional state to a not-for-profit community organization. How can the company ensure that sensitive financial data cannot be accessed once the computers are donated?Correct
Incorrect
-
Question 45 of 45
45. Question
1 pointsMatch the task to the Windows Control Panel utility. (Not all options are used.)Sort elements
- view hidden files
- configure PC to DHCP
- change color quality
- change account setting
- view hardware status
- allow ICMP packet in
-
Folder option
-
Network and security center
-
Display / Display setting
-
User accounts
-
Devices and printers
Correct
Incorrect