• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/15

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

15 Cards in this Set

  • Front
  • Back

Which of the following does PXE use?



a) USB
b) DVD-ROM
c) CD-ROM
d) NIC

d) NIC

Which of the following application stores are compatible with iOS?



a) Android Market
b) Windows Marketplace
c) App Store
d) Amazon Appstore

c) App Store

A company would like to increase the security on their company’s smart phones. Which of the following should be configured to ensure information stored on a smart phone can be removed if it is lost or stolen?



a) Username and passwords
b) Remote wipe
c) Strong password complexity
d) Failed login attempts restrictions

b) Remote wipe

Which of the following disk defragmentation command line options is used to perform operation on ALL volumes in Windows OS?



a) /A
b) /C
c) /H
d) /E

b) /C

A technician just finished removing spyware from a computer and now they are not able to connect to any websites. Which of the following is the MOST likely cause?



a) Automatic configuration
b) Network card driver is damaged
c) Proxy settings
d) The Internet is not functioning

c) Proxy settings

Which of the following network devices allows for full-duplex communication?



a) Hub
b) Bridge
c) Switch
d) Firewall

c) Switch

A customer reports that their computer crashes during usage. Which of the following is a common acronym used to describe this condition?



a) RAID
b) VPN
c) BSOD
d) LAN

c) BSOD

Software threats to a computer are commonly referred to as:



a) device drivers.
b) malware.
c) biometrics.
d) SOHO.

b) malware.

Which of the following user accounts has the LEAST access privileges?



a) Standard
b) Guest
c) Administrator
d) Power

b) Guest

A user wishes to secure their tablet from unauthorized access. The BEST option is to:?



a) enable RFID authentication.
b) establish a remote wipe policy.
c) setup a strong passcode.
d) establish strong email passwords.

c) setup a strong passcode.

Which of the following is MOST likely an advantage that a tablet has over a laptop PC??



a) A tablet is easily upgraded.
b) A tablet is lightweight.
c) A tablet has a larger screen.
d) A tablet can natively run most software.

b) A tablet is lightweight.

Which of the following is a common type of biometric authentication on a laptop? (Select TWO).?



a) Facial recognition
b) Blood sample
c) Retinal
d) Voice recognition
e) Fingerprint

a) Facial recognition


e) Fingerprint


A user calls about their workstation not powering on in the morning. According to the troubleshooting theory, which of the following steps should the technician perform NEXT??



a) Document the resolution to problem.
b) Purchase the appropriate replacement part.
c) Verify that the workstation is able to boot up.
d) Ask the user about any previous changes.

d) Ask the user about any previous changes.


A customer wants games from their child’s Windows XP computer removed. Which of the following is the BEST way to accomplish this task?



a) Control Panel > Game Controller > Select controller > click Remove
b) Control Panel > Administrative Tools > Computer Management
c) Control Panel > Add/Remove programs > Add/Remove Windows Components > select Accessories and Utilities > uncheck Games
d) Programs menu > Right click Games > select Properties > select the Hidden check box

c) Control Panel > Add/Remove programs > Add/Remove Windows Components > select Accessories and Utilities > uncheck Games

Which of the following should be performed regularly in order to help restore a computer’s data after a hard drive failure??



a) Windows Memory Diagnostics
b) Factory Restore
c) System Restore
d) Scheduled Backups

d) Scheduled Backups