• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/144

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

144 Cards in this Set

  • Front
  • Back

A user is having trouble connecting to the internet. Which of the following commands should a technician use, from the user's workstation, to ensure that the workstation has a valid IP address?a) NETSTATb) PINGc) IPCONFIGd) TRACERT

c) IPCONFIG

Whicch of the following operating systems supports full BitLocker functionality?a) Windows XPb) Windows 7 Professionalc) Windows Vista Homed) Windows 7 Enterprise

d) Windows 7 Enterprise

Which of the following protocols could a technician use to connect a smartphone to an email server? (Select TWO)a) SMTPb) POP3c) HTTPd) SNTPe) ICMP

a) SMTPb) POP3

Which of the following should a technician do FIRST to secure a mobile device?a) Assign a passcodeb) Download updatesc) Disable GPSd) Install antivirus

a) Assign a passcode

When running Windows XP, which of the following would give a list of switches for the CHKDSK command?a) chkdsk ~?b) chkdsk :?c) chkdsk /?d) chkdsk \?

c) chkdsk /?

Which of the following commands would a technician use to move one directory above or below the one the technician is currently in?a) DIRb) RDc) CDd) MD

c) CD

A virtual machine running locally would be BEST utilized in which of the following situations?a) On a PC with minimal RAMb) Patch testing before rolloutc) Thick client configurationd) Gaming workstation configuration

b) Patch testing before rollout

A user states that the computer takes a long time to load the desktop after login. Which of the following tools should be used to help re-mediate the problem?a) Disk Managementb) FIXMBRc) MSCONFIGd) SFC

c) MSCONFIG

Which of the following security threats involve shoulder surfing and phone phishing?a) Man-in-the-middleb) Social engineeringc) Trojan virusd) Spyware

b) Social engineering

Which of the following operating systems supports full usage of 8GB DDR3 RAM?a) Windows 7 Professional x86b) Windows 7 Home Premium x64c) Windows XP Professionald) Windows Vista Home Premium x86

b) Windows 7 Home Premium x64

A technician would like to ensure all previous data is erased before reloading Windows 7 HomePremium onto a laptop. Which of the following procedures would accomplish this?A. Virtual RAID configurationB. Quick formatC. New partitionD. Full format

D. Full format

Which of the following commands, in Windows 7, could a technician use to schedule a diskintegrity scan upon next boot?A. CHKDSKB. ROBOCOPYC. SCANDISKD. FDISK

A. CHKDSK

Which of the following tabs under MSCONFIG would allow a technician to configure all of theapplications that launch at boot?A. StartupB. ServicesC. ToolsD. Boot

A. Startup

A technician believes a machine loaded with Windows XP Professional has issues with fileintegrity of the core OS components. Which of the following commands could be used to bothcheck and replace damaged files?A. SFC /SCANNOWB. CHKDSK /R /FC. FORMAT C:D. DISKPART

A. SFC /SCANNOW

A technician is tasked with building three systems that are capable of utilizing the new WindowsHomeGroup functionality. Which of the following versions of Windows would need to be used?A. Windows 7 or Windows VistaB. Windows Vista onlyC. Windows XP Professional x64 EditionD. Windows 7 only

D. Windows 7 only

Which of the following security threats does NOT use software to extract sensitive information orcredentials?A. GraywareB. Shoulder surfingC. MalwareD. Man-in-the-Middle exploits

B. Shoulder surfing

A user is reporting that their screen is flickering at a rapid rate. Which of the following ControlPanel paths should a technician use in order to remedy this issue?A. Display -> Settings -> Advanced -> General -> DPIB. Display -> Settings -> ResolutionC. Display -> Settings -> Advanced -> Adapter -> RefreshD. Display -> Appearance -> Effects -> Transition

C. Display -> Settings -> Advanced -> Adapter -> Refresh

A user has a laptop that they need to get ready for an outdoor presentation. The user is concernedthat the laptop will turn off the screen or go into standby before their presentation is complete.Which of the following Control Panel paths should the technician use in order to prevent this fromoccurring?A. System -> HardwareB. Power Options -> Power SchemesC. System -> Advanced -> PerformanceD. Power Options -> Hibernate

B. Power Options -> Power Schemes

Which of the following data transfers will retain the current NTFS permissions of a file?A. Copying the file to a different location on the same volumeB. Copying the file to a different location on a different volumeC. Moving the file to a different location on a different volumeD. Moving the file to a different location on the same volume

D. Moving the file to a different location on the same volume

A user’s computer keeps producing a “low virtual memory” alert and the speed of the systemdegrades afterwards. Which of the following Control Panel locations can provide information toreview and correct this issue?A. System > RemoteB. System > HardwareC. System > System RestoreD. System > Advanced

D. System > Advanced

A user states their workstation will not reach the login screen. Which of the following commandscan be used to write a new partition boot sector to the system partition in the Recovery Console?A. FIXMBRB. BOOTCFGC. FIXBOOTD. DISKPART

C. FIXBOOT

Which of the following features helps to prevent shoulder surfing?A. Native resolutionB. Auto adjustC. DegaussingD. Privacy screen

D. Privacy screen

A user wants to change the functionality that occurs when the laptop lid is closed. Which of thefollowing Control Panel options is the MOST direct way to adjust this?A. Display B. Power OptionsC. PersonalizationD. Device Management

B. Power Options

Which of the following Control Panel items will allow for easy streaming of pictures, music, andvideos to other Windows 7 PCs?A. Ease of Access CenterB. AutoPlayC. Sync CenterD. HomeGroup

D. HomeGroup

The folder "Documents" is shared. The user can create and delete documents when on the localPC, but can only read documents when accessing them remotely. Which of the following shouldbe adjusted?A. Read Only AttributeB. Share PermissionsC. Firewall SettingsD. NTFS Permissions

B. Share Permissions

Which of the following security controls would be an example of the least privilege principle on ahome PC?A. Install antispyware on the PC.B. Create a standard user account for kids.C. Store all financial data in a separate folder.D. Disable the firewall for online gaming

B. Create a standard user account for kids.

A user regularly has to walk away from their computer and is worried someone may access theirworkstation. Which of the following would BEST prevent this?A. Lock the workstationB. Shutdown the computerC. Logon using the unprivileged guest accountD. Set the screensaver password

A. Lock the workstation

A user has an LCD and a CRT monitor attached to their workstation. The colors are slightly off onthe CRT but not the LCD. Which of the following controls should be used in troubleshooting?A. GeometryB. ContrastC. BrightnessD. Degauss

D. Degauss

A user is installing Windows 7 on a PC with a RAID card. The user has verified all of the cablesare connected correctly, but the installation media does not detect any hard drives. Which of thefollowing should the user do to help detect the hard drives?A. Press F8 when promptedB. Hit the refresh button to force a re-detectC. Enable PATA in the BIOSD. Select load driver

D. Select load driver

Which of the following accounts is MOST restrictive?A. AdministratorB. Standard UserC. GuestD. Power User

C. Guest

QUESTION NO: 31A technician is tasked with installing a legacy application on a Windows 7 computer. When thetechnician tries to install the legacy application, an error is received that the application cannot beinstalled because the OS is not supported. Which of the following should the technician do FIRSTto try to get the application installed in Windows 7?A. Install the application in safe modeB. Install the application with compatibility modeC. Install the latest Windows service packs and updatesD. Install Windows Security updates on the system

B. Install the application with compatibility mode

A user has not received any new emails on their smartphone in the last two days. The user is ableto access the Internet without any problems. Which of the following should the user do FIRST?A. Restart the smartphoneB. Reconfigure the smartphone email accountC. Resynchronize the smart phoneD. Update the operating system

A. Restart the smartphone

A technician needs to format a file system to be compatible with the WIDEST range of operatingsystems. Which of the following file systems should be used?A. NTFSB. FAT16C. CDFS D. FAT32

D. FAT32

For any given 802.11n wireless Internet signal, which of the following is needed to establish aconnection?A. MAC address filteringB. Windows passwordC. Proper SSIDD. SSL certificate

C. Proper SSID

A user reports that a file they shared out on their computer for another network user is notaccessible to the third party. The user insists they specifically gave this third party Allow rights forRead and Write access. Which of the following could explain the problem at hand?A. The parent folder has explicit Allow rights set for this user.B. The parent folder has explicit Deny rights set for this user.C. The user forgot to share the parent folder and only shared the specific file.D. The parent folder likely has the “archive” attribute enabled.

B. The parent folder has explicit Deny rights set for this user

A company is experiencing issues with third parties tailgating authorized users during entry tosecure server rooms. Which of the following would BEST alleviate this problem?A. Retinal scannersB. MantrapsC. Door locksD. Smart card badges

B. Mantraps

A consultant is looking to consolidate six company servers onto one physical system. Which of thefollowing requirements is MOST important on the new setup to ensure stable functionality of thevirtual environment?A. Client hardware requirementsB. Server software security requirementsC. Server hardware resourcesD. Network resources

C. Server hardware resources

Which of the following security concepts establishes the notion that a user should only be givensufficient access to the resources they need to perform their job function?A. Deny allB. Allow allC. Most privilegeD. Least privilege

D. Least privilege

A technician is trying to diagnose a laptop that is experiencing heavy artifact corruption and random loss of video during operation. Which of the following are MOST likely causes of this problem? (Select TWO).A. Integrated system video chip is failing and/or near death.B. Video drivers were not installed directly from Microsoft update.C. Incompatible or untested video drivers have been installed.D. The BIOS is not set for the proper operation temperature of the video chipset.E. The BIOS is underclocking the video card’s operating speed.

A. Integrated system video chip is failing and/or near death.C. Incompatible or untested video drivers have been installed.

A user reports that every time they use a search engine and click on a link to go to a website, theyinstead are taken to a site blocked by their company’s content filter. The user is not trying to go tothe blocked site and needs to be able to successfully use the search engine to complete theirassignment. Which of the following tools would a technician use to BEST resolve this issue?A. Anti-malware softwareB. Factory pre-installationC. System restoreD. Recovery console

A. Anti-malware software

After being infected with a virus, a user’s computer does not recognize the user as having localadministrator rights to the computer. After troubleshooting the issue, a technician determines thecomputer needs to be rebuilt and data needs to be restored from the user’s backup. Which of thefollowing tools would BEST reset the computer to how it worked when first purchased?A. Recovery ConsoleB. Factory restore CDC. Anti-malware softwareD. System Restore

B. Factory restore CD

A technician installed a second hard drive in a computer. Upon restart, a message appears stating. “primary drive 0 not found. Press F1 to continue." Which of the following should the technician check FIRST?A. That NTLDR and boot.ini are not missingB. Proper drive installation (e.g. cables/jumpers)C. If computer can boot into safe modeD. If the BIOS boot settings are correct

B. Proper drive installation (e.g. cables/jumpers)

The shared folder named C$ is an example of which of the following?A. Local shareB. Permission propagationC. Inheritance D. Administrative share

D. Administrative share

Which of the following is BEST used to prevent other people from viewing a user’s computerscreen?A. Anti-virus softwareB. Key fobC. Biometric deviceD. Privacy filter

D. Privacy filter

A pest exterminator tries to gain access to a company’s computer lab, but the receptionist doesnot see an extermination scheduled on the calendar and denies the exterminator access to thelab. Which of the following security threats almost occurred?A. War drivingB. Social engineeringC. Shoulder surfingD. Phishing

B. Social engineering

Which of the following can be used as an appropriate boot device?A. USB driveB. HDMIC. OEM recovery mediaD. FDISK

A. USB drive

A user tries to connect to the Internet using a dial-up modem and receives a “No dial tone detected” message. Which of the following is the FIRST thing the technician should check to troubleshoot the issue?A. Check if the cable is connected on the modem’s phone RJ-45 port.B. Check if the cable is connected on the modem’s line RJ-11 port.C. Check if the cable is connected on the modem’s line RJ-45 port.D. Check if the cable is connected on the modem’s phone RJ-11 port.

B. Check if the cable is connected on the modem’s line RJ-11 port.

Which of the following software types would need to be installed on a mobile device to help prevent data from being viewed if the device is lost?A. Remote wipeB. AntivirusC. GPS locatorD. Remote backup application

A. Remote wipe

Which of the following is the BEST tool to verify the cable is plugged into the correct port on thepatch panel?A. Cable certifierB. Punch downC. Toner probeD. Cable tester

C. Toner probe

Which of the following is the BEST tool for a technician to use to make sure the network wires are securely fastened in a wall jack?A. CrimperB. Small flat screwdriverC. Wire strippersD. Punch down

D. Punch down

Which of the following is the BEST tool for a technician to use to make sure the network cable issecurely fastened in the RJ-45 connector?A. Cable testerB. CrimperC. Small flat screwdriverD. Punch down

B. Crimper

A technician is using the troubleshooting theory to help resolve a problem that is occurring with aclient’s machine. The technician has verified system functionally. Which of the following is theNEXT step in the troubleshooting theory?A. Identify the problemB. Establish a plan of action to resolve the problemC. Test the theory to determine causeD. Document findings, actions, and outcomes

D. Document findings, actions, and outcomes

A client reports that their VoIP phone screen displays duplicate IP address. Which of the following is the FIRST action to try to resolve this problem?A. Change MAC address settingsB. Call the vendorC. Try another LAN connectionD. Reboot the phone

D. Reboot the phone

After an installation of a video adapter, the screen on a Windows 7 system cannot be seen. Whichof the following Windows 7 functions will resolve this?A. Component ManagementB. Startup RepairC. Device ManagerD. Task Manager

B. Startup Repair

A user gets an error message that the trust relationship to the domain has been broken. Which of the following can be done to resolve this from the client desktop?A. Re-join the computer to the domainB. Reboot the PC as the domain will automatically rebuild the relationshipC. Update the BIOS using the latest versionD. Run CHKDSK

A. Re-join the computer to the domain

Which of the following resources is MOST important for accessing remote virtual environments on a client machine?A. Network speedB. CPU speedC. High speed memoryD. Drive space

A. Network speed

A computer program that functions normally while quietly installing malicious software on a machine is known as a:A. DDoS attack.B. Worm.C. Phishing attack.D. Trojan.

D. Trojan.

Which of the following security threats is BEST mitigated through proper user training?A. A WormB. RootkitsC. Social EngineeringD. Browser Adware

C. Social Engineering

A user sent an email requesting that a technician check if a computer is on and connected to the Internet so the user can login from home. Which of the following commands in the command prompt would a technician use to verify if the computer is on and connected without having to go to the computer?A. NSLOOKUPB. NETSTATC. PINGD. IPCONFIG

C. PING

A technician recently removed spyware from a computer and now the user is getting error messages about system files. Which of the following tools would a technician use to verify all system files are intact and in their original versions?A. Repair DiskB. SFCC. FIXMBRD. ASR

B. SFC

A technician gets a call from a customer stating that their computer will not boot. They are getting the following error “invalid system disk”. Which of the following should the technician check FIRST?A. Verify the operating system is installed correctly.B. Verify that all removable drives are empty.C. Verify Boot.ini is on the hard drive.D. Verify the computer will boot into safe mode.

B. Verify that all removable drives are empty.

The practice of following an authorized person through an entrance without using a badge to defeat security is called:A. tailgating.B. spamming.C. shredding.D. phishing.

A. tailgating.

Turnstiles and other mantraps will prevent which of the following security threats?A. Shoulder surfingB. TailgatingC. RootkitsD. Viruses

B. Tailgating

Which of the following encryption standards is found on older wireless devices and provides minimal security?A. WPAB. WPA2C. WEPD. AES

C. WEP

An IR printer stops working for half of an office while the other half is able to print. Which of the following should be checked FIRST?A. Proper lightingB. Paper levelsC. Physical obstructionsD. Printer share name

C. Physical obstructions

If a computer does not have an optical drive, which of the following is the MOST efficient methodto install an operating system?A. Emergency Restore CDB. Floppy diskC. USB flash driveD. Bluetooth connection

C. USB flash drive

Which of the following is the MAXIMUM number of primary partitions that can be created on a hard drive with FAT32?A. 2B. 4C. 6D. 8

B. 4

Phishing is:A. an infection that causes a web browser to go to a different site than the one intended from a search result page.B. a technique used to obtain financial information from a user mimicking a legitimate website.C. an infection that causes a computer to behave erratically by playing music and launching browser windows.D. a technique used to obtain financial information from a user by compiling information from social networks and their friends

B. a technique used to obtain financial information from a user mimicking a legitimate website.

The computer starts up and runs for less than a minute before shutting down or locking up. This is a symptom of:A. overheating.B. incompatible RAM.C. a faulty hard drive.D. a bad internal USB hub

A. overheating.

When the computer is turned on it emits a series of beeps and does not POST. This can be caused by a bad:A. CMOS battery.B. video card.C. IDE cable.D. floppy cable.

B. video card.

A technician needs to decrease the time it takes to install an operating system on 100 computers.Which of the following installations would the technician use to reduce hands-on time spent oneach computer?A. Upgrade installationB. USB installationC. Unattended installationD. Clean installation

C. Unattended installation

A technician is configuring a PC that will have confidential information stored on it. To ensure thatonly authorized users can access this PC, which of the following should the technician do? (SelectTWO).A. Disable the guest accountB. Install antivirus applicationsC. Disable DHCPD. Change the SSIDE. Change the default username

A. Disable the guest accountE. Change the default username

A company recently had a security breach and is now required to increase the security on their workstations. A technician has been tasked to harden all the workstations on the network. Which of the following should the technician do?A. Enable Windows automatic updatesB. Enable screensaver required passwordsC. Enable MAC filteringD. Enable wireless encryption

B. Enable screensaver required passwords

A technician recently installed a new video card in a PC. The PC already has integrated video on the motherboard. When the technician turns on the PC, there is no video. Which of the following is MOST likely the cause?A. The motherboard BIOS version is out of date.B. The incorrect video card drivers are installed.C. The power connector for the video card is unplugged.D. The video card is unsupported by the motherboard.

C. The power connector for the video card is unplugged.

A user receives a phone call from a person claiming to be from technical support. This person knows the user’s name and that the user has Windows installed on their computer. The technician directs the user to open Event Viewer and look at some event log entries to demonstrate the effects of a virus on the computer. The technician also asks the user for their user ID andpassword so that they can clean the computer. This is an example of which of the following security threats?A. Social engineeringB. PhishingC. MalwareD. Virus

A. Social engineering

A user has just purchased a wireless router for their home. Which of the following should be doneto BEST secure the router from unauthorized access? (Select TWO).A. Change router default loginsB. Change the security settings on their computerC. Set encryption on the routerD. Update router firmwareE. Change the encryption on the computer’s wireless adapter

A. Change router default loginsC. Set encryption on the router

A user’s CRT display is not displaying colors correctly. Turning the display to the right or left sometimes temporarily corrects the problem. Which of the following should the technician check?A. The video card display driverB. The CRT power cableC. The video cableD. The CRT On Screen Display (OSD)

C. The video cable

A laser printer is producing completely blank sheets. Which of the following processes should the technician check FIRST?A. FusingB. Paper handlingC. TransferD. Development

D. Development

A Windows user states that every time they hit certain letter keys on their notebook, a number appears instead of the letter. Which of the following items is MOST likely the cause of this problem? A. The user enabled sticky keys.B. The user changed the keyboard character set.C. The user enabled accessibility options.D. The user enabled num lock.

D. The user enabled num lock.

A Windows 7 desktop PC has crashed (i.e. BSOD) several times indicating a possible RAMproblem. Which of the following is an OS built-in tool that can be used to test this problem?A. Windows System RestoreB. Windows System File CheckerC. MSCONFIGD. Windows Memory Diagnostic

D. Windows Memory Diagnostic

Which of the following should be regularly scheduled to fix hard drive errors?A. DefragmentationB. Check DiskC. System RestoreD. Antivirus Scan

B. Check Disk

A user is experiencing slow performance with their computer. A technician suspects the computer has a virus and runs antivirus software. A virus is found and removed, but the performance issue is not resolved. Which of the following should the technician perform NEXT?A. Document findings, actions, and outcomesB. Establish a plan of action to resolve the problemC. Re-establish a new theory or escalateD. Implement preventative measures

C. Re-establish a new theory or escalate

After installing a new multifunctional printer, an administrator realizes the flatbed scanner does not scan any documents. Which of the following is the MOST likely reason of the issue?A. The scanner lock switch on the device is locked.B. The printer driver was installed incorrectly.C. The multifunction printer’s USB cable was plugged into the incorrect port.D. The scanner’s alignment and calibration was not performed.

A. The scanner lock switch on the device is locked.

After replacing a motherboard on a customer’s laptop for a no sound issue, a technician realizes that there is intermittent wireless connectivity on the laptop. Which of the following should the technician perform FIRST?A. Reinstall the driver of the WiFi card.B. Check to see if there is a wireless switch on the laptop and its current position.C. Replace the wireless card because it is not fully compatible with the new motherboard.D. Check if the WiFi antenna is connected properly to the wireless card.

D. Check if the WiFi antenna is connected properly to the wireless card.

The benefit of MAC filtering in wireless networking is that the network:A. is encrypted.B. is not visible.C. uses static IP addresses.D. is more secure.

D. is more secure.

A technician is trying to request a new IP address to a customer’s computer through the command prompt. Which of the following commands should the technician use?A. ipconfig /flushdnsB. ipconfig /renewC. ipconfig /allD. ipconfig /release

B. ipconfig /renew

A customer is not able to connect to any websites. Which of the following commands should a technician run FIRST to identify the issue?A. NETSTATB. NET SHOWC. IPCONFIGD. TRACERT

B. NET SHOW

A technician wants to know the MAC address of a computer. Which of the following commands would the technician use?A. IPCONFIGB. NSLOOKUPC. NETSTATD. PING

A. IPCONFIG

A technician would like to dispose of a hard drive that is no longer needed. According to company policy, all contents on the disk should be deleted before disposal. Which of the following OS command line tools should be used?A. CHKDSKB. DELC. SCANDSKD. FORMAT

D. FORMAT

When securing a new wireless router, which of the following should be changed FIRST?A. Default SSIDB. Radio power levelsC. Default passwordD. DHCP settings

C. Default password

A computer starts to boot then quickly shuts down. Which of the following should the technician use to troubleshoot this issue?A. Toner probeB. Power supply testerC. Loopback plugsD. Events logs

B. Power supply tester

A client has a computer that is infected with several viruses and spyware. Which of the following should the technician perform FIRST before spyware removal?A. Run Windows UpdateB. Disable system restoreC. Run the chkdsk /r commandD. Disable network cards

B. Disable system restore

A PC is running slower than usual. Which of the following tools would BEST diagnose the possible bottleneck?A. CHKDSKB. Device ManagerC. Task Scheduler

D. Task Manager

Which of the following switches should a technician use with the PING command to resolve an IP address to a hostname?A. -aB. -fC. -nD. -t

A. -a

A technician is trying to setup a non-domain user account on a workstation, but receives the following error message “Password does not meet the complexity requirements.” Which of the following utilities should the technician use to identify the criteria?A. Local Security PolicyB. Users and GroupsC. Performance MonitorD. MSCONFIG

A. Local Security Policy

In a SOHO wireless network, which of the following prevents unauthorized users from accessing confidential data?A. Reduce broadcast powerB. Change SSID nameC. Set encryptionD. Enable MAC filtering

C. Set encryption

Which of the following commands is used to map a network drive?A. NBTSTATB. NET USEC. NETMAPD. NETSTAT

B. NET USE

A technician recently setup a new wired network and wants to ensure only their computers can use it. Which of the following is the MOST secure way to accomplish this?A. Make sure the computers are using strong passwords.B. Enable an intrusion detection system.C. Assign the computers static IP addresses.D. Disable the extra ports on the router.

D. Disable the extra ports on the router.

Which of the following BEST describes a method for installing an operating system across the network?A. USB 3.0B. IEEE 1394C. PXED. NTFS

C. PXE

Which of the following would be the BEST format for optical media?A. FAT32B. EXT3C. CDFSD. NTFS

C. CDFS

After updating the device drivers for a video adapter, a user reports they are only able to view a portion of the screen and the text is very large. Which of the following is MOST likely the cause?A. Refresh rate set too lowB. Refresh rate set too highC. Resolution set too lowD. Resolution set too high

C. Resolution set too low

After connecting a laptop to an external monitor, no display is detected and the monitor goes into sleep mode. Which of the following should be attempted FIRST to correct the problem? (Select TWO).A. Change the input mode on the monitorB. Reboot the operating systemC. Reload the display adapter driversD. Toggle the display using the keyboard shortcutE. Verify network connectivity

A. Change the input mode on the monitorD. Toggle the display using the keyboard shortcut

A technician has been dispatched to a customer site to diagnose an issue where the computer turns off intermittently. Upon arriving at the site, the technician detects a smoke smell coming from the computer. Which of the following is the BEST solution?A. Power down the system and replace the CPU.B. Power down the system and replace the power supply.C. Install an additional case fan for proper ventilation.D. Remove the side panel for proper ventilation.

B. Power down the system and replace the power supply.

Which of the following security measures is usually found in a laptop?A. BiometricsB. BollardC. HypervisorD. Key fobs

A. Biometrics

Which of the following can be achieved with Group Policy to help with workstation security measures?A. BitLocker passwordB. Complexity requirementsC. BIOS passwordD. Wake on LAN

B. Complexity requirements

Which of the following can enable a technician to remove a virus that prevents users from updating their antivirus software?A. Recovery consoleB. REGEDITC. Safe modeD. MSCONFIG

C. Safe mode

A technician notices that a computer is making a loud clicking noise but continues to run. System speed is barely affected, but they cannot access certain drives. These are the symptoms of which of the following?A. Failing second hard driveB. Failing system hard driveC. Bad CMOS chipD. Bad CPU fan

A. Failing second hard drive

A user’s laptop has died but the hard drive is still functioning. Which of the following is the BEST way for the user to still access and edit all of their data?A. Burn their data to DVDsB. Use a SCSI to USB adaptorC. USB hard drive enclosureD. Copy their data to a USB flash drive

C. USB hard drive enclosure

Which of the following is the BEST way to get rid of dead pixels on a laptop screen?A. Replace the inverterB. Replace the back bezelC. Replace back lightD. Replace the LCD

D. Replace the LCD

A technician is tasked with upgrading a network card on a Windows 7 Professional PC. The technician installs the network card, loads Windows XP drivers that came with the network card, and reboots the PC. Upon rebooting, the computer blue screens and the technician cannot get the computer to boot up properly. Which of the following should the technician perform to resolve this issue without any data loss? (Select TWO).A. Remove network driversB. Install Windows XP Service Pack 3C. Reinstall Windows 7 ProfessionalD. Install Windows 7 Service Pack 1E. Boot up in safe mode

A. Remove network driversE. Boot up in safe mode

In which of the following operating systems does Windows XP mode come as a free download to be used for application compatibility?A. Windows 7 StarterB. Windows 7 ProfessionalC. Windows Vista BusinessD. Windows 7 Home Premium

B. Windows 7 Professional

The Aero feature is found in which of the following operating systems? (Select TWO).A. Windows 7 Home PremiumB. Windows 7 StarterC. Windows Vista EnterpriseD. Windows XP Media CenterE. Windows XP 64-bit Professional

A. Windows 7 Home PremiumC. Windows Vista Enterprise

An audio visual company has decided that they want to migrate from Windows XP Professional SP2. The company has a domain network. A technician is tasked with selecting an operating system. Which of the following should the technician select?A. Windows 7 Home PremiumB. Windows Vista Home PremiumC. Windows 7 ProfessionalD. Windows XP Media Center

C. Windows 7 Professional

A technician is installing and configuring a SOHO wireless network for a client. The client only wants five authorized computers to connect to the network with a defined IP range. Which of the following should the technician configure on the router? (Select TWO).A. DMZB. DHCPC. ARP D. SSIDE. MAC filtering

B. DHCPE. MAC filtering

What are the minimal requirements for Windows 7? (CPU, RAM, and free disk space)

CPU=1GHz, RAM=1GB(2GB for 64-bit), Free disk space=16GB(20 GB for 64-bit)

What are the minimal requirements for Windows Vista? (CPU, RAM, and free disk space)

CPU=800MHz, RAM=512MB, Free disk space=15GB

What is the name of the new GUI introduced in Windows Vista?

Aero

What new partition feature was introduced in Vista?

Extended partitions

What is the name of the feature first introduced in Windows Vista that requires administrator credentials from users to accomplish certain tasks?

UAC (Usear Account Control)

What are the minimal requirements for Windows XP? (CPU, RAM, and free disk space)

CPU=233MHz, RAM=64MB, Free disk space=1.5GB

What is the name of the file that contains setup errors during an installation of Windows?

setuperr.log

Name five things that are commonly found on a Windows desktop?

Icons, taskbar, Start menu, Quick Launch, and System Tray.

What is the name of the Windows 7 feature that allows small information portals and apps on the desktop?

Gadgets

Where must you navigate if you wish to run the Command Prompt in elevated mode?

Click Start > All Programs > Accessories then right-click Command Prompt and select Run as Adminstrator

What does MMC stand for?

Microsoft Management Console

What is the name of the console windows that can be added to the MMC?

Snap-ins

What are Libraries in Windows 7?

User-defined collections of folders

Name four common system tools.

Device Manager, System Information tool, Task Manager, and Msconfig

What does USMT stand for?

User State Migration Tool

Name three ways that data can be migrated using Windows tools.

Windows Easy Transfer (WET - Win7 & Vista only), User State Migration Tool (USMT), and Files and Settings Transfer Wizard (XP)

What Windows database stores the settings for Windows?

The registry

Hives store settings in the Registry; name a commonly modified hive.

HKEY_LOCAL-MACHINE

Where is the %systemroot% in Windows 7/Vista/XP?

C:\Windows

Where is the %systemroot% in Windows 2000?

C:\Winnt

Name two common Windows7/Vista boot files?

Bootmgr, BCD

What are the three Windows XP boot files?

NTLDR, Boot.ini, and NTdetect.com

What does SFC stand for?

System File Checker

What built-in feature of Windows 7/Vista is used for backups?

Backup and Restore

What can Windows XP use for backups?

NTBackup

What does WinRE stand for?

Windows Recovery Environment

Name three features of the Windows 7/Vista Windows Recovery Environment?

Startup Repair, System Restore, and Command Prompt

What does Win XP use for its repair environment?

Recovery Console

Name three common error logs contained within the Event Viewer.

System, Application, and Security

The Security log found in the Event Viewer only contains information if you turn on what feature?

Auditing