• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/186

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

186 Cards in this Set

  • Front
  • Back

After moving your PC to a different office, your internal modem can no longer detect a dial tone. What should you check? (Select two.)




A. Make sure the telephone cable is inserted all the way




B. Make sure the telephone outlet is active




C. Make sure your modem is turned on




D. Make sure that your ISP isn't down

A. Make sure the telephone cable is inserted all the way




B. Make sure the telephone outlet is active






Two reasons that a user might not hear a dial tone are that the cable is unplugged or the outlet isn't getting a signal. You should also check to make sure that the cable isn't broken or defective.




Internal modems don't need to be turned on like external modems. If you're not getting a dial tone, it's usually not your ISP's fault.




Ref. Ch. 24 (8th Ed.)

A user reports that he cleared a paper jam and now cannot print. The technician reseats the paper and then prints a test page from the printer. A test page sent from the workstation does not print. Which of the following actions should the technician take first?




A. Clear the print queue




B. Stop and start the printer




C. Reboot the computer




D. Check the printer connection

A. Clear the print queue






It's possible that the print queue is backed up, so clearing it might help things get moving again.




It's possible that the printer's connection has come loose, but if the printer hasn't been moved recently, it's probably a better idea to simply clear the print queue.




Ref. Ch. 28 (8th Ed.)

A laser printer keeps getting a MEM OVERFLOW error. Which of the following would most likely fix the problem while still maintaining quality?




A. Replace the printer's RAM




B. Add more RAM to the printer




C. Reduce the RET




D. Reduce the print resolution

B. Add more RAM to the printer






Add more RAM to the printer. Reduce the RET might help, but it'll reduce the quality of your printouts and isn't the best solution available.




Ref. Ch. 28 (8th Ed.)

What is the maximum size a partition can be using the FAT32 file system?




A. 32768 MB




B. 4096 MB




C. 2048 GB




D. 1024 GB

C. 2048 GB






2048 GB. Which, normally would be written out as 2 TB. But I wanted to see if you could move your decimal point around. Did you know that even though Windows won't let you CREATE a FAT32 partition over 32 GB, you can still make one with another partitioning tool and then just load up Windows and it will recognize it just fine?




4096 MB (4 GB) is the maximum size a file can be using the FAT32 file system.




Ref. Ch. 12 (8th Ed.)

A newly assembled PC is giving beep codes at boot, but you don't recognize the code. Which of the following would be the best places to look first. (Select two.)




A. Hard Drive




B. Video Card




C. CPU




D. RAM

B. Video Card




D. RAM






Almost all POST beeps on modern PCs point to either the video card or RAM.




Without a working CPU, you won't even get POST errors.




Ref. Ch. 7 (8th Ed.)

A technician needs to configure her neighbor's iPad. The neighbor wants to access his work e-mail. The technician requires some information from her neighbor's work IT department. Which of the following information does the technician need?




A. IP address and domain




B. Server and domain




C. IP address and DNS




D. Server and gateway

B. Server and domain






The technician needs to know the neighbor's work e-mail server and work domain name.




You don't need to know IP address info, or DNS info to set this up.




Ref. Ch. 27 (8th Ed.)

Tammy's CRT monitor needs degaussing. How does she do this?




A. CRT monitors do not need degaussing




B. She needs to run the Windows Degaussing Control Panel applet




C. She needs to take it to a professional monitor repair shop




D. She needs to run the degaussing tool built into the monitor

D. She needs to run the degaussing tool built into the monitor






All modern CRT monitors come with a built-in degaussing tool; usually a simple button press is all that is needed.




CRT monitors DO need to be degaussed from time to time.




Ref. Ch. 21 (8th Ed.)

A technician is trying to troubleshoot an issue on a Windows 7 computer remotely, but is unable to PING the computer. The technician verified that the computer is turned on, has network connectivity, and can get to the Internet. Which of the following is most likely the issue?




A. The technician does not have permissions




B. Wake-on-LAN is disabled




C. Windows firewall is enabled




D. Local security policy settings are incorrect

C. Windows firewall is enabled






Windows Firewall blocks PINGs by default. PING doesn't require any permissions.




Ref. Ch. 22 (8th Ed.)

After installing a thumbprint reader, you must also ________ it.




A. Enable




B. Reset




C. Defrag




D. Train

D. Train






Training is the process by which the reader scans and stores the fingerprints you want to use.




Defragmenting is for hard drives. The other answers are made up.




Ref. Ch. 29 (8th Ed.)

The command line interface command to delete a directory in Windows 7 Professional is _________.




A. DEL




B. ERASE




C. RD




D. REMOVE

C. RD






The RD command removes directories if the directory is empty.




DEL and ERASE both erase files, but not directories.




Ref. Ch. 18 (8th Ed.)

Which best illustrates the definition of geotracking?




A. It allows you to locate hidden treasures left by others around the world




B. It allows you to track the location of a lost phone




C. It provides location information on mobile apps that use mapping functions




D. It adds meta data to pictures taken with a mobile phone

C. It provides location information on mobile apps that use mapping functions






Geotracking provides location information to your mobile apps that make use of mapping functions.




The other answers are all things you can DO with geotracking. With geotracking you can find a lost phone using an app such as the Find iPhone app. You can also locate hidden treasures, also known as geocaching. Finally, you can add meta data to pictures that you took with your mobile phone, also known as geotagging.




Ref. Ch. 27 (8th Ed.)

Which of the following happens during POST?




A. System RAM is checked




B. The MBR is checked




C. The OS will load




D. The CMOS setup screen is loaded

A. System RAM is checked






Your system RAM is being checked. You can see this if you turn off quick boot in CMOS. Your PC should count all the RAM in your computer.




The MBR loads just after POST completes by a service called the bootstrap loader.




Ref. Ch. 8 (8th Ed.)

Sarah upgraded from Windows Vista to Windows 7 on her laptop. After enjoying the enhanced performance and new interface for a few days, she realized what was missing: the Windows Sidebar with its friendly clock and weather gadgets. How can she add gadgets to her Windows 7 computer?




A. In Control Panel, select Appearance and Personalization | Desktop Gadgets




B. In Control Panel, select Appearance and Personalization | Windows Sidebar Properties




C. Right-click on the desktop, select Personalization | Aero Themes | Gadgets




D. Right-click on the desktop, select Properties |Add Gadget

A. In Control Panel, select Appearance and Personalization | Desktop Gadgets






Microsoft integrated gadgets into the desktop in Windows 7. To add gadgets, go to Control Panel, select Appearance and Personalization | Desktop Gadgets. You can also right-click the desktop and select Gadgets. Double-click a gadget to add it to your desktop.




The path to the Windows Sidebar Properties applies to Windows Vista, not Windows 7.




Ref. Ch. 4 (8th Ed.)

Turnstiles and other mantraps will prevent which of the following security threats?




A. Tailgating




B. Rootkits




C. Shoulder surfing




D. Viruses

A. Tailgating






An attacker can't follow victims through turnstiles as easily as through a door, and a mantrap enables a building's security staff to prevent a suspected attacker from leaving.




Shoulder surfing is looking over a user's shoulder to see sensitive information on the user's screen.




Ref. Ch. 29 (8th Ed.)

A client's C: drive is badly fragmented and needs to be defragmented. What percentage of the drive must be free to finish the job completely?




A. 30%




B. 2%




C. 15%




D. 10%

C. 15%






A volume must have at least 15% free space for defrag to work completely andadequately. Defrag uses this space as a sorting area for file fragments. If a volume hasless than 15% free space, defrag will only partially defragment it. To increase the freespace on a volume, delete unneeded files or move them to another disk.




2%, 10%, and 30% are all either too little or not enough.




Ref. Ch. 17 (8th Ed.)

Which of the following is NOT a way to stop a service in Vista?


A. Control Panel | Administrative Tools | Services | (select service from list) | Stop



B. Command Prompt | winsrv.msc | (select service from list) | Stop



C. Right-click Computer | Manage | Services and Applications | Services | (select service from list) | Stop



D. Command Prompt | Net stop

B. Command Prompt | winsrv.msc | (select service from list) | Stop




You can open up Services from a command prompt but the correct command would be services.msc, not winsrv.msc.


The other three steps would let you stop a service in Windows Vista.



Ref. Ch. 19 (8th Ed.)

A technician has a clients laptop that is randomly shutting down. Which of the following is the first step of the troubleshooting theory that the technician should perform to resolve the laptop's issue?




A. Document finding, actions, and outcomes




B. Establish a plan of action to resolve the problem




C. Establish a theory




D. Identify the problem

D. Identify the problem




First off, you've got to identify the problem. No sense in fixing it before you understand what it is.




All of the other options come later in the troubleshooting process.




Ref. Ch. 32 (8th Ed.)

Which of the following is the most secure method, short of physical destruction, that would be used to ensure that data on a hard drive cannot be recovered?



A. Use a degaussing tool



B. Format the drive



C. Use an overwrite program



D. Repartition the drive

A. Use a degaussing tool



A degaussing tool is a big magnet that will completely erase any magnetic hard drive you use it on.



The other answers will delete the contents of a drive, but these methods can all potentially be recovered. Degaussing the drive is the only way to be really sure.



Ref. Ch. 14 (8th Ed.)

Tammy's computer is generating seemingly random Blue Screens of Death, making her suspect a bad device driver. What handy Windows tool can she run to check all her device drivers?




A. Device Manager




B. Driver Verifier Manager




C. Debug Mode




D. Sigverif

B. Driver Verifier Manager






Driver Verifier Manager enables you to test some or all device drivers at boot up and will give a Blue Screen of Death with information about a bad driver if any are found.




Device Manager could help some, but won't specifically show a bad driver.




Ref. Ch. 9 (8th Ed.)

There are only two issues that take place on a modern PC that generate beep codes. What are they? (Select two.)




A. Problem with CPU




B. BIOS needs updating




C. No video card detected




D. Bad or Missing RAM

C. No video card detected




D. Bad or Missing RAM






The only two common POST beep codes are: No video card detected and Bad or Missing RAM.




If the CPU is bad, then the POST can't start. There is no error code for an outdated BIOS.




Ref. Ch. 8 (8th Ed.)

By default, hibernation is not enabled on a Windows XP install. Which of the following paths will enable you to turn on Hibernation?


A. Start | Run | Hibernate /Y


B. Desktop | Properties | Screensaver | Monitor Power | Power | Hibernate


C. Start | Control Panel | Laptop | Power | Settings | Hibernate


D. Start | Programs | Accessories | System Tools | Power | Hibernate

B. Desktop | Properties | Screensaver | Monitor Power | Power | Hibernate



Power Management always goes with Screensavers in Windows Desktop | Properties | Screensaver | Monitor Power | Power | Hibernate.


There is no Power tool under System Tools.


Ref. Ch. 26 (8th Ed.)

You are trying to decide which OS to purchase with your new computer. You want to have the option of using Microsoft's Complete PC Backup utility. Which operating system would you choose? (Choose three.)




A. Windows Vista Business




B. Windows XP Professional




C. Windows XP Home




D. Windows Vista Home Basic




E. Windows Vista Enterprise




F. Windows Vista Ultimate




G. Windows Vista Home Premium

A. Windows Vista Business




E. Windows Vista Enterprise




F. Windows Vista Ultimate






Windows Vista Business, Enterprise, and Ultimate can all take advantage of the Complete PC Backup Utility.




Note: In Windows 7, the Complete PC Backup Utility is now simply called System Image. All Windows 7 operating systems can take advantage of System Image.




Legacy OSes such as Windows 2000, XP Home, and XP Professional do not offer this feature.




Ref. Ch. 17 (8th Ed.)

You are on a service call. The customer tells you that he keeps finding new folders with names like "music" and "games" that he did not place there. After talking to the other employees to verify they did not place those files, you see they have an unencrypted wireless network. Which of the following actions is the LEAST NECESSARY response?



A. Update the NTFS permissions on the system to prevent users from accessing any folder other than necessary ones



B. Change all usernames and passwords



C. Use only wired networking



D. Configure the wireless network for security

C. Use only wired networking.



Even though the wireless network is surely the route used, there's no reason to only use wired networks when proper security is all that is needed.



The other answers are reasonable responses.



Ref. Ch. 23 (8th Ed.)

Which of the following types of hardware is least likely to be used as a security device?




A. SD flash card




B. Smart card




C. Key fob




D. Biometric thumbprint reader

A. SD flash card






SD flash RAM is not a common type of device used for security.




Key fobs, biometric thumbprint readers, and smart cards are all used as security devices.




Ref. Ch. 29 (8th Ed.)

You are a technician working from the command-line environment and you need to give access rights to others on your network to allow remote access to a folder on your computer. Which command would you use?




A. NET SHARE




B. NET USE




C. NET FILE




D. NET USER

A. NET SHARE






NET SHARE is the command used to share files and folders.




NET USE is used to map drives.




Ref. Ch. 22 (8th Ed.)

If a computer is running normally except that the hard drive is shut down, the power management is in ________ mode.




A. Full On




B. Enabled




C. Hibernate




D. Suspend

B. Enabled






Enabled mode means the system is running at full power, even though a device might be shut down.




Suspend means the PC is shut down or at its lowest power-consumption setting.




Ref. Ch. 26 (8th Ed.)

Which of the following is the lowest-privilege account required to install most programs on Windows XP?




A. Standard user




B. Administrator




C. Guest




D. Power user

D. Power user






Power users are the least-privileged account that can install most programs.




Standard users cannot install many programs.




Ref. Ch. 16 (8th Ed.)

A customer calls and states the new plasma display he just received has tiny yellow spots all over the screen. Which of the following is the most likely cause of this issue?



A. Dropped in shipping



B. Incorrect installation



C. Dead pixels



D. Using wrong video connector

C. Dead pixels




Dead pixels show up on a monitor as tiny, unchanging discolored spots. Super annoying!



A dropped monitor tends to look like a dropped piece of glass.



Ref. Ch. 21 (8th Ed.)

John's laptop won't recharge and he suspects the AC adapter is the problem. Which tool should he use to test it?



A. Induction toner



B. Multimeter



C. Power supply tester



D. Paper clip

B. Multimeter



Use a multi meter to test the AC adapter's output voltage.



A power supply tester enables you to test a power supply when it's not plugged into a computer-a handy device, but not for testing an AC adapter.



Ref. Ch. 10 (8th Ed.)

A technician is installing and configuring a SOHO wireless network for a client. The client only wants five authorized computers to connect to the network within a defined IP range. Which of the following should the technician configure on the router? (Select two.)



A. ARP



B. SSID



C. DMZ



D. MAC filtering


E. DHCP

D. MAC filtering


E. DHCP




DHCP is the technology in charge of handing out IP addresses dynamically, and you can configure it to stay within a certain range of IP addresses. Meanwhile, MAC filtering enables you to create a list of PCs allowed on the network based on their MAC addresses.


SSID refers to the name of a wireless network.



Ref. Ch. 22 (8th Ed.)

What does the Filter Keys setting do in Windows Vista?



A. Enables you to press key combinations (i.e. CTRL+ALT+DEL) one key at a time.



B. Plays a tone when you press either the CAPS LOCK, NUM LOCK, or SCROLL LOCK keys.


C. Provides advanced spell-checking by filtering your keystrokes through a dictionary.



D. Ignores or slows down repeated keystrokes and adjusts the repeat rates.

D. Ignores or slows down repeated keystrokes and adjusts the repeat rates.




Ignores or slows down repeated keystrokes and adjusts the repeat rates. This helps individuals who may have jittery or shaky hands.



Sticky Keys enables you to press key combinations (i.e. CTRL+ALT+DEL) one key ata time.



Ref. Ch. 20 (8th Ed.)

A client reports that their VoIP phone screen displays a "Duplicate IP address" error. Which of the following is the first action to try to resolve this problem?




A. Call the vendor




B. Reboot the phone




C. Try another LAN connection




D. Change MAC address settings

B. Reboot the phone






Rebooting the phone is almost always the first thing you should do when trying to fix a problem.




Trying another LAN connection is another of those "do it, but not first" solutions.




Ref. Ch. 24 (8th Ed.)

Ellen's laptop has a built-in 802.11n-capable wireless NIC. The wireless NIC worked perfectly yesterday when she loaned it to her friend Tom. Today, she cannot access the Internet via her wireless NIC. The NIC is not visible in Network Connections nor is it visible in Device Manager. What should she assume first?




A. The NIC is disabled in Device Manager




B. The NIC's hardware switch is set to off




C. The NIC is bad




D. The NIC is disabled in CMOS

D. The NIC is disabled in CMOS






The NIC is disabled in CMOS. Granted, this is not a common problem, but of the options listed, it's the only one that would absolutely prevent the NIC from showing up in Device Manager.




While there's not hard and fast rule here, a device with a hardware switch will still show up in both Device Manager and, in the majority of cases, in Network Connections as well.




Ref. Ch. 22 (8th Ed.)

Which of the following options will easily enable you to enable File and Print sharing on a network of three workstations running Windows 7 Home Edition x64?




A. Workgroup




B. HomeGroup




C. Active Directory




D. Domain Setup

B. HomeGroup






Setting up a HomeGroup enables you to turn on File and Print sharing with very little difficulty.




A Workgroup is Microsoft's earlier, less easy attempt at creating a simple SOHO network system.




Ref. Ch. 22 (8th Ed.)

When doing a clean installation of Windows XP using the FAT32 file system, what can the maximum partition size be?




A. 16 EB




B. 2 TB




C. 2 GB




D. 32 GB

D. 32 GB






During the installation process of Windows 2000 or XP, you can make a partition using FAT32 up to 32 GB in size.




FAT16 has a maximum partition size of 2 GB. Windows can detect drives up to 2 TB with FAT32, however, it can only create them up to 32 GB. 16 Exabytes is the maximum partition size in NTFS.




Ref. Ch. 12 (8th Ed.)

A technician wants to know the MAC address of a computer. Which of the following commands would the technician use?




A. IPCONFIG




B. PING




C. NETSTAT




D. NSLOOKUP

A. IPCONFIG






The IPCONFIG command, when combined with the /ALL switch, displays the MAC address for all of a computer's network adapters.




NETSTAT shows all of a computer's network connections.




Ref. Ch. 22 (8th Ed.)

Using your Web browser, you can access a number of Web sites. However, certain sites just give a screen saying, "You may not access this page." Which of the following is the most likely reason for this?




A. You do not have HTTPS enabled




B. The problem sites all require usernames and passwords




C. DNS is down on those sites




D. Your Web browser is using a proxy server

D. Your Web browser is using a proxy server






Your Web browser is using a proxy server. One of the main reasons for using a proxy server is to block unacceptable sites. The error described in the question is indicative of a proxy server.




If the problem sites all required usernames and passwords, you would get a prompt for a username and password.




Ref. Ch. 29 (8th Ed.)

Which Control Panel applet enables you to view but not change the status of critical security information for a Windows Vista computer?




A. Security Center




B. Internet Options




C. Windows Defender




D. Programs and Features

A. Security Center






Windows Security Center provides a quick overview of the status of your firewall, automatic updating, malware protection, and other security settings.



Windows Defender provides protection against spyware and other malware. You can actively run a scan from this applet. It's a good answer, in other words, but not the best answer here.

Ref. Ch. 29 (8th Ed.)

A user states that his workstation will not reach the login screen. Which of the following commands can be used to write a new partition boot sector to the system partition in the Recovery Console?




A. DISKPART




B. BOOTCFG




C. FIXMBR




D. FIXBOOT

D. FIXBOOT






The FIXBOOT command, well, fixes your boot sector, enabling your recalcitrant computer to once more boot properly by writing a new partition boot sector to the system partition.




DISKPART enables you to repartition a hard disk.






Ref. Ch. 19 (8th Ed.)

A program that is not malware but does actions that approach the idea of malware is called:




A. Trojan




B. Worm




C. Virus




D. Grayware

D. Grayware






Grayware is any program that borders on the concept of malware but is not actually malware.




Trojans, Viruses, and Worms are all considered malware.




Ref. Ch. 29 (8th Ed.)

You have been contracted by a local school to evaluate their computer labs for security threats. They are most worried about the hard drives and RAM being stolen from inside the computers. What could they do to prevent this from happening?



A. Implement auditing on the system event log



B. Install fingerprint scanners on the PCs for user access



C. Replace the PC's with proprietary security screws



D. Install cable locks on the towers and attach them to the desks

C. Replace the PC's with proprietary security screws



Replace the screws with security screws. Now, no one but the person with the magic screwdriver can open those cases!



Cable locks would be a great addition as well, but it will only help against them stealing the case itself. Remember, we don't want them getting inside the towers.



Ref. Ch. 29 (8th Ed.)

You recently told your friend about how amazing Blu-Ray is, so they decided to install a BD-ROM in their PC. After installation, they call you because now their existing DVD-RW and the new drive aren't working. What should you tell them they need to replace?




A. DVD-RW




B. SATA controller




C. Power supply




D. BD-ROM

C. Power supply






Time to upgrade that power supply unit! Looks like the addition of a new drive just tilted the scale and now your PSU can't power all your devices. Get a 1000-watt PSU... You'll never worry about power again.




Replacing the SATA controller wouldn't be the fix here. For starters, we don't even know if the drives were SATA or PATA. (Well, I can pretty much guarantee that the BD-ROM was SATA. This question writer has never seen a PATA BD-ROM before.) Not only that, but most SATA controllers are soldered onto motherboards. How handy are you with a soldering iron?




Ref. Ch. 13 (8th Ed.)

Browser redirection is caused by which of the following types of viruses?




A. Trojan




B. Worm




C. Hijack




D. Keylogger

C. Hijack






A browser hijack causes a browser to go to sites that it didn't intend.




A trojan is a type of malware that pretends to be a legitimate piece of software.




Ref. Ch. 29 (8th Ed.)

A user wants to prevent access to specific Web sites to prevent his children from accidentally accessing them. Which of the following can be implemented?




A. A switch




B. Anti-virus software




C. A firewall




D. Anti-spyware software

C. A firewall






Some firewalls can be used to block access to specific Web sites. Windows Firewall doesn't have this capability, so the user would need a third-party firewall.




A switch won't help




Ref. Ch. 29 (8th Ed.)

Which of the following is a hive in the Windows registry?




A. HKEY_CLASSES_USER




B. HKEY_ROOT_CLASSES




C. HKEY_CLASSES_ROOT




D. HKEY_USERS_CLASSES

C. HKEY_CLASSES_ROOT






The other answers are a rearrangement of the correct answer.




Ref. Ch. 15 (8th Ed.)

How would you define an accelerometer?




A. It tilts the screen when I rotate my iPad




B. Gives the device a longer battery life




C. Increases the speed of the CPU




D. It measures the velocity of the device

D. It measures the velocity of the device






The definition of an accelerometer is a device that measures proper acceleration (speed, velocity). These devices are built-in to many of our mobile devices, including smart phones and tablets. We also see accelerometers in cars to monitor when a crash has occurred so that 911 can be called. We also see accelerometers in your Nintendo Wii controllers so you can play games!




It also does not tilt the screen on your iPad. The accelerometer measures and detects the tilt in your screen, iOS then performs a function to tilt the screen for you. Yes, it's a mean answer, but I'm looking for a definition of an accelerometer, not the effect of one.




Ref. Ch. 27 (8th Ed.)

Which of the following files must be in the root directory of the bootable volume for Windows XP? (Select three.)




A. NTBOOTDD.SYS




B. NTDETECT.COM




C. NTLDR




D. BOOT.INI

B. NTDETECT.COM




C. NTLDR




D. BOOT.INI






Windows XP requires NTLDR, NTDETECT.COM, and BOOT.INI to boot.




NTBOOTDD.SYS is only needed if booting to a SCSI drive connected to a SCSI host adapter without a ROM chip for BIOS support.




Ref. Ch. 15 (8th Ed.)

Which of the following is the best tool for a technician to use to make sure that network wires are securely fastened in a wall jack?




A. Punch down




B. Wire strippers




C. Small flat screwdriver




D. Crimper

A. Punch down






A punch down tool will securely fasten wires to a wall jack or a patch panel.




A crimper is used to attach RJ-45 plugs onto Ethernet cables. They don't attach wires to wall jacks directly.




Ref. Ch. 22 (8th Ed.)

A customer reports that after a technician cleaned up a rogue anti-virus program, the customer cannot browse the Web. Which of the following should the technician check to resolve the situation?




A. Firewall settings




B. Browsing history




C. User privileges




D. Proxy settings

D. Proxy settings






Some viruses change a computer's proxy settings to use a proxy server controlled by the virus' creator.




It's unlikely that a virus would change a computer's firewall settings to be more restrictive. If anything, you would expect a virus to turn off the firewall.




Ref. Ch. 24 (8th Ed.)

Lou passed his A+ exams two months ago and immediately implemented the wireless security ideas he learned while studying for the exam to his home network. He has three computers at home, all connected wirelessly and all working just fine. This week he bought a new laptop and brought it home. He connects to his SSID using the correct WPA2 passphrase, but he keeps getting an APIPA address. Which of the following should he consider checking FIRST?




A. MAC address filtering




B. Proxy server settings




C. Wrong SSID




D. DHCP server is down

A. MAC address filtering






MAC address filtering would prevent a new system from joining the SSID.




Checking if the DHCP server is down has some merit, but he does have three other systems working "just fine" and the question is driving you to think security.




Ref. Ch. 23 (8th Ed.)

Alex has just purchased a new 802.11n Wi-Fi router for his home. He powers it up and configures it. He then proceeds to connect his current 802.11g devices, as well as his brand new laptop. Even though the laptop has a built-in 802.11n antenna, he is still not noticing any speed increase. Which of the following is the most likely cause?




A. The router is broadcasting a mixed mode




B. The laptop needs a dedicated access point




C. The router should be configured to "G-Only"




D. The laptop is not close enough to the router

A. The router is broadcasting a mixed mode






By default, many Wi-Fi routers broadcast their signal in mixed mode. By broadcasting in mixed mode, the access point portion of your Wi-Fi router will allow any devices that use 802.11b, 802.11g, or 802.11n to connect to the network. The big catch is that by doing this, your network throughput will drop down to the speed of the slowest device. Ouch!




While the distance between the laptop and wireless router is definitely a factor, there is nothing in the scenario that states the new laptop's position in relation to the router. We are forced to assume that since he hasn't noticed any speed increases, Alex has already tried positioning himself in many different places.




Ref. Ch. 23 (8th Ed.)

Which of the following is NOT an APM/ACPI level?




A. Standby




B. Full On




C. Enabled




D. Shut Down

D. Shut Down






There is no APM Shut Down level.




You can enable power management, put the system in standby, or tell it to run full on, but you don't use APM to shut down.




Ref. Ch. 26 (8th Ed.)

How does the Windows 7 Experience Index generate its base score?




A. Based on an average of your subscores




B. Based on the age of the computer




C. Based on the lowest of your subscores




D. Based on the highest of your subscores

C. Based on the lowest of your subscores






The Windows Experience Index in both Vista and 7 generates its base score from the lowest of your subscore categories.




Not from an average or the highest score.




Ref. Ch. 14 (8th Ed.)

What is your first step before performing an operating system upgrade?




A. Back up essential data




B. Back up your current OS




C. Use Disk Management to partition the drive




D. FORMAT the drives with the new OS

A. Back up essential data






Your data is the only thing that's completely irreplaceable! Always back it up.




Back up your current OS. If you're performing an upgrade, chances are you have an older version on disc somewhere anyway, so this answer doesn't make sense.




Ref. Ch. 14 (8th Ed.)

Where will you find the Windows Backup program in Windows XP?




A. Disk Management




B. System Tools




C. My Computer's properties




D. Control Panel

B. System Tools






In Windows XP, the Windows Backup utility is located in the System Tools folder.




The other answers have little to do with reality and are incorrect.




Control Panel has many applets to control many settings, but none are for the Windows Backup utility.




Ref. Ch. 17 (8th Ed.)

A Windows system is unable to connect to the network. A ping loopback test verifies that the network card is working. What is your next step in troubleshooting the problem?




A. Verify that the switch is working properly




B. Install the driver for the network card




C. Check to see if the link light on the NIC is on




D. Run IPCONFIG

C. Check to see if the link light on the NIC is on






The next step is to check for connectivity. Look at the link light on the NIC to see that it is on, indicating a good connection to the hub or switch.




The other options might be helpful, but they are not your next step.




Ref. Ch. 22 (8th Ed.)

Your new office networked printer is having trouble. You set the IP address 192.168.4.3. It self-tests just fine and everything is properly configured, but no one can print to it. When you try to PING the printer, you can't get a response. All computers can access the server and the Internet-you even PING the router at 192.168.41.1 and it responds nicely. What should you now suspect?



A. The printer's NIC



B. The subnet mask for the entire network



C. The network switch



D. The printer's IP address

D. The printer's IP address




The printer's IP address looks like it is not the same network as the rest of the PCs-certainly worth checking next!



The printer's NIC is probably not the issue if it can self-test okay.



Ref. Ch. 22 (8th Ed.)

When connecting a Bluetooth device to a mobile device, which of the following best describes the purpose of discovery mode?




A. Allows two Bluetooth devices to connect to each other without a mobile device




B. Disconnects all devices and connects to the closest powered on device




C. Instructs the phone to seek out all nearby devices and connect to them




D. Allows a peripheral to be contacted by the mobile device

D. Allows a peripheral to be contacted by the mobile device






Discovery mode enables a mobile device to "discover" a bluetooth peripheral so they can connect.




Discovery mode doesn't do any of the other things.




Ref. Ch. 26 (8th Ed.)

Which of the following is true about the CONVERT command in Windows XP?




A. You can convert from NTFS to FAT32




B. The process is completely safe and there is not need to back up important files




C. You can convert from FAT16 to FAT32




D. The syntax used is "convert C: /FS:NTFS"

D. The syntax used is "convert C: /FS:NTFS"






CONVERT can be used to make a file system go from FAT to NTFS by using the command "convert C: /FS:NTFS."




The process of changing your file system CAN have adverse effects on your system. Care should always be taken. You can never go backwards in file systems using the Microsoft utility CONVERT.




Ref. Ch. 12 (8th Ed.)

A customer reports that their wireless laptop cannot connect after removing it from its carrying case. The laptop boots and the user is able to login. Which of the following should be checked first?




A. Laptop battery levels




B. Available hard drive space




C. Status in Device Manager




D. External Wi-Fi switch

D. External Wi-Fi switch






It's highly likely that the Wi-Fi switch got knocked into the wrong position during transport. Just flip the switch back into the correct position and you're good to go!




It's possible that the wireless card got disabled in Device Manager somehow, it's far more likely that the Wi-Fi switch got turned to the wrong position.




Ref. Ch. 26 (8th Ed.)

A user regularly has to walk away from her computer and is worried someone may access her workstation. Which of the following would best prevent this?




A. Set the screensaver password




B. Logon using the unprivileged guest account




C. Lock the workstation




D. Shutdown the computer

C. Lock the workstation






Locking your workstation is the simplest and most effective way to keep others from accessing your computer.




Setting a screensaver password is a great idea, but what if someone gets to your computer before the screensaver activates?




Ref. Ch. 29 (8th Ed.)

What location on your Windows 7 system will hold all the temp files left behind by applications?




A. C:\Windows\System32\Temp




B. C:\Temporary




C. C:\Windows\Temp




D. C:\Users\Temp

C. C:\Windows\Temp






C:\Windows\Temp is the special holding area for temp files.




All of the other locations don't exist.




Ref. Ch. 4 (8th Ed.)

What Windows feature enables an administrator to limit the amount of disk space used on an NTFS formatted drive?




A. Disk Management




B. Disk Defragmenter




C. Disk Quota




D. Sysprep

C. Disk Quota






The Disk Quota tool is used to limit the amount of disk space used by users on a Windows system.




Disk Management is for formatting and partitioning disks.




Ref. Ch. 12 (8th Ed.)

Duran has opened his Windows XP registry. He is trying to find any registry key that has "norton" in it. Normally, he would just press Ctrl-F and search through the entire registry, but he feels like using the mouse instead of the short-cut key combination. Help him find the best way to search through his registry.




A. Click File > Import




B. Click Edit > Find




C. Click File > Find




D. Click View > Search

B. Click Edit > Find






By clicking Edit, then Find, he'll be able to search through the entire registry in just a few clicks.




File > Find - File menu exists, but Find does not.




Ref. Ch. 15 (8th Ed.)

Tammy wants to scan her Vista system for a virus. Which built-in application will do this for her?




A. Windows Firewall




B. Windows Defender




C. Vista does not come with a built-in anti-virus application




D. Microsoft Security Essentials

C. Vista does not come with a built-in anti-virus application






Vista does not come with a built-in anti-virus application.




Windows Defender protects against spyware and adware, but does not have a way to scan for viruses.




Ref. Ch. 29 (8th Ed.)

Which of the following user accounts should be renamed to adhere to security best practices?




A. Administrator




B. Guest




C. Power User




D. Standard User

A. Administrator






Using the default name for the Administrator account helps prevent people from using that account for nefarious purposes.




It's probably a good idea to rename any accounts you have, but renaming the Administrator account is by far the most important.




Ref. Ch. 16 (8th Ed.)

Sam installs a brand-new second drive into his Windows Vista system. The drive shows up in CMOS, but when he boots into Windows, he can't see the drive in Computer. What's wrong?




A. The drive isn't mounted




B. The drive is fragmented




C. The drive isn't partitioned




D. The drive isn't dynamic

C. The drive isn't partitioned






The drive isn't partitioned. Computer only shows partitions.




Drives aren't mounted-only partitions can be mounted. This brand-new drive does not have any partitions.




Ref. Ch. 12 (8th Ed.)

A technician arrives to troubleshoot a problem. Which of the following troubleshooting steps should the technician perform AFTER identifying the problem?




A. Establish a plan of action and implement a solution




B. Document findings, actions, and outcomes




C. Establish a theory of probable cause




D. Verify full functionality and implement preventative measures

C. Establish a theory of probable cause






Figure out what caused the problem in the first place.




You can't establish a plan of action without first identifying the problem.




Ref. Ch. 32 (8th Ed.)

When configuring user accounts, which of the following should a technician perform?




A. Make all users local administrators




B. Assign the maximum required access to the users




C. Assign the minimum required access to the users




D. Make all users standard users

C. Assign the minimum required access to the users






The principle of least privilege states that you shouldn't give users any more access to resources than they absolutely need.




Making all users standard users is a fine idea in theory, but some users will need either more or less access than a standard account will provide.




Ref. Ch. 16 (8th Ed.)

What's the first thing you should do when your computer gets a Blue Screen of Death?




A. Write down the error




B. Go to Recovery Console




C. Reboot




D. Go into Safe Mode

A. Write down the error






The first step in troubleshooting a Blue Screen of (technically known as a Windows Stop error) is to write down the entire error.




Once you've written down the entire error, then go through these other options as needed.




Ref. Ch. 17 (8th Ed.)

Which of the following switches should a technician use with the PING command to resolve an IP address to a hostname?




A. -t




B. -n




C. -a




D. -f

C. -a






The -a switch resolves IP addresses to hostnames.




The -f switch sets the don't fragment flag on the PING packets.




Ref. Ch. 22 (8th Ed.)

A user has set up a SOHO network and needs to implement a network configuration that enables the sharing of devices and files across the network without the complexity of a centralized server. Which of the following would be most appropriate?




A. WorkGroup




B. Domain




C. PAN




D. WAN

A. WorkGroup






A WorkGroup enables Windows computers to connect to one another in a small network without much hassle.




A PAN is personal area network that is created by Bluetooth hardware.




Ref. Ch. 22 (8th Ed.)

Which of the following symptoms is most indicative of a bad sensor on a laser printer?




A. Spontaneous printer reboots




B. Paper jam error but no jammed paper




C. Blank pages printed without errors




D. Paper is picked up in twos and threes

B. Paper jam error but no jammed paper






A paper jam error with no jammed paper is a clear sign of a faulty sensor.




Paper picked up in twos and threes is indicative of too much moisture in the paper.




Ref. Ch. 28 (8th Ed.)

A technician is working on an issue and has identified the problem and worked out the cause. Which of the following would most likely be the next step the technician should make?



A. Document the cause and solution



B. Establish a plan of action



C. Inform the user



D. Identify the problem

B. Establish a plan of action




After you've figured out the problem, it's time to figure out what you're going to do about it.



Documentation comes last.



Ref. Ch. 32 (8th Ed.)

A frustrated user calls in for tech support. She installed three new programs, but now Windows 7 won't load. What can she do to determine which program is at fault? She doesn't want to uninstall all three programs. Select the best answer.



A. She needs to uninstall the three programs and reinstall them one at a time, testing Windows startup



B. Boot the computer into Safe Mode with Networking and do an Internet search for the three programs to see if other people have had problems



C. Boot the computer into Safe Mode with Command Prompt. At the prompt, type CHKDSK/PROGRAMS to run a scan on installed applications



D. Boot the computer into Safe Mode. Go to the Control Panel | Administrative Tools | Event Viewer

D. Boot the computer into Safe Mode. Go to the Control Panel | Administrative Tools | Event Viewer



Event Viewer will quickly tell her which program(s) made Windows fail to load.



Uninstalling and reinstalling one by one will certainly work, but also requires the most work out of the options.



Ref. Ch. 19 (8th Ed.)

Which of the following actions would best show a computer was connected to the Internet?




A. Pinging your router




B. Pinging your DNS server




C. Pinging www.comptia.org




D. Pinging localhost

C. Pinging www.comptia.org






Pinging a remote system means you have to use the Internet. In this case, www.comptia.org is a great example.




Both your router and your localhost do not require you to go out to the Internet.




Ref. Ch. 22 (8th Ed.)

You upgrade your network to 1000 Mbps from 100 Mbps. You install a new 1000-Mbps network adapter into your Windows Vista system. You check the device manager and see no errors or warning. You configure the TCP/IP settings to be as they were for the previous network adapter. Upon restarting the computer, you cannot access the network. You ping your IP address locally and receive the error message, "Request timed out." You then ping 127.0.0.1 and receive the same error message. What do you do?



A. Replace the NIC



B. Replace the network card drivers



C. Set the network adapter to run at 100 Mbps only



D. Replace the network cabling

A. Replace the NIC




You tried to ping 127.0.0.1, which is the loopback address, as well as your local IP address and received the same error messages both times. This would indicate a faulty NIC in your workstation.



Typically driver problems result in an error message during installation, so it's not the drivers. Also, you checked the device manager and everything was OK.



Ref. Ch. 22 (8th Ed.)

Luigi needs to find the PID of a specifc application on his Windows 7 computer. What utility will help him locate it?




A. Computer Management




B. Task Manager




C. Performance Monitor




D. Registry Editor

B. Task Manager






Under the services tab in the Task Manager will show you a list of all the different services running or not running on the system. Next to the name of the service will be a process identifier (PID). This PID can be very useful when starting and ending tasks from a command-line interface.




The Performance Monitor does exactly what it says. It will monitor the performance of your computer, allowing users to establish a base-line.




Ref. Ch. 15 (8th Ed.)

You are working with a customer and want to tell them all the new features of Windows 7 so they'll upgrade from Windows Vista. What is one thing you could tell them.



A. It comes with the all-new Aero interface



B. It has a feature called UAC, which prevents programs from running unless given specific permission



C. It has a Side Bar, which enables you to install Gadgets



D. It features a new Task Bar that enables you to pin items to it like a dock

D. It features a new Task Bar that enables you to pin items to it like a dock



That new Task Bar is totally cool, isn't it? You can pun just about any application to it. I have 10 applications pinned to mine. It's really helped in cleaning up my desktop.



The UAC, Aero, and Side Bar were all features introduced in Windows Vista.



Ref. Ch. 17 (8th Ed.)

Intermittent lockups and reboots are most likely caused by _____________.




A. bad hard drives




B. corrupted drivers




C. resource conflicts




D. failing power supply

D. failing power supply






Failing power supplies are a major cause of intermittent lockups and reboots.




The others will create lockups/reboots, but are far more predictable.




Ref. Ch. 32 (8th Ed.)

Most laptops show they are in hibernation mode by:




A. A flashing Power LED




B. A flashing NumLock or CapsLock LED




C. A flashing Battery Power LED




D. A flashing Sleep LED

A. A flashing Power LED






On the vast majority of laptops, a slowly flashing Power LED indicates the laptop is in Hibernation mode.




There are no common features on laptops called Sleep LEDs or Battery Power LEDs, although many smart batteries do have a button you can press to show the remaining power.




Ref. Ch. 26 (8th Ed.)

While trying to access a secure Web page, Karen gets an error telling her the domain names for the site and the certificate are mismatched. The site is a small "Mom and Pop" Web site, but she's about to order $1500.00 worth of merchandise. What should she do?




A. Try using TCP port 8080 to confirm the HTTPS is intact




B. Stop and call the store




C. Do not accept the certificate, but to the transaction anyway




D. Go ahead and make the transaction

B. Stop and call the store






While you can risk ignoring problems with some certificates, any time money or personal information is involved, one should take the safe route. In this case, Karen needs to stop and call the company.




The 'port 8080' choice is meaningless




Ref. Ch. 24 (8th Ed.)

Cletus receives a computer that has a Trojan horse virus. Which of the following should you do first?



A. Rollback to the System Restore Point



B. Establish how the virus was acquired


C. Run the System Recovery utility



D. Identify the malware

D. Identify the malware




Identify the type of malware that poor Cletus acquired. We know it's a Trojan, but exactly what kind of Trojan did he get?



After he finds out what kind of Trojan it is, he'll most likely be pointed in the direction of how the PC acquired the malware. Run the System Recovery utility or System Restore after you've found out all the above information.



Ref. Ch. 32 (8th Ed.)

Which of the following programs enables you to edit NTFS permissions from a command line?




A. NTFS




B. ROOT




C. CHMOD




D. CACLS

D. CACLS






The CACLS command enables you to edit NTFS permissions from the command line.




CHMOD is the UNIX/Linux command for changing permissions.




Ref. Ch. 16 (8th Ed.)

A user reports that every time he uses a search engine and clicks on a link to go to a Web site, he is instead taken to a site blocked by his company's content filter. The user is not trying to go to the blocked site, but needs to be able to successfully use the search engine to complete his assignment. Which of the following tools would a technician use to best resolve this issue?




A. Recovery console




B. Anti-malware software




C. System restore




D. Factory pre-installation

B. Anti-malware software






It sounds like the user has gotten some malware on his PC, so it's time to run an anti-malware scan. Sit back and let the software do all the work!




All the other answers involve lengthy processes that would necessitate data backups, application reinstallation, and all sorts of other hassles. Use them as last resorts!




Ref. Ch. 29 (8th Ed.)

Windows Virtual PC can be used to:



A. Give the user the ability to run 64-bit applications in virtual mode



B. Enable the user to share a printer to any user on the Internet



C. Enable the user to run older programs in a Windows XP environment



D. Give the user the ability to run multiple operating systems on a tablet

C. Enable the user to run older programs in a Windows XP environment



Windows XP Mode, which uses Windows Virtual PC, is used to run older programs that no longer work in Windows 7.



The other answers are nonsense.



Ref. Ch. 30 (8th Ed.)

A technician is repairing a workstation that exhibits random reboots at odd times of the day. Which of the following should be performed first when troubleshooting the issue? (Select two.)



A. Check the memory integrity



B. Check the PSU integrity



C. Check the video card integrity



D. Check the CMOS battery



E. Check the optical drive integrity

A. Check the memory integrity



B. Check the PSU integrity



Start by checking both the power supply and RAM, as those are the two components most likely to cause random reboots when they begin to fail.



A dying video card usually results in video corruption.



Ref. Ch. 10 (8th Ed.)

Harriet's printer wasn't working properly, but you've fixed it. She's got two jobs waiting in the print spool. What two choices are viable options for you in response to her request to have the jobs printed? (Select two.)



A. Right-click on each print job and select Start printing



B. Do nothing, the print jobs will probably start on their own



C. Stalled print jobs cannot be restarted



D. Right-click on each print job and select Resume printing

B. Do nothing, the print jobs will probably start on their own



D. Right-click on each print job and select Resume printing



Most print jobs will restart on their own, but you may also press Resume printing on each print job if they do not.



The other choices are untrue and incorrect.



Ref. Ch. 28 (8th Ed.)

Paul has just finished landing a major order. He needs to get this order to the main office over a thousand miles away. This order is massive and contains a tremendous amount of highly sensitive data. What's the best way for him to send this data?



A. Dial-up



B. VPN



C. E-mail attachment



D. Dedicated T1

B. VPN




VPN. A Virtual Private Network can use the Internet to send the data cheaply with good security, and at a relatively fast speed.



Dedicated T1 is very expensive.



Ref. Ch. 24 (8th Ed.)

You are a technician working for a large company and you notice a user has left a Post-it note attached to her monitor of a new password that she was just given. What should the technician do?




A. Take it and give it to her when she gets back from lunch




B. Log in with it and change her password to teach her a lesson




C. Inform their supervisor




D. Explain to her how dangerous it is to leave passwords lying around

C. Inform their supervisor






Any incident that threatens the security of the organization must be reported!




While the other answers are plausible solutions, they aren't the best ones, so they are wrong.




Ref. Ch. 29 (8th Ed.)

A company recently had a security breach and is now required to increase the security on their workstations. A technician has been tasked to harden all the workstations on the network. Which of the following should the technician do?




A. Enable wireless encryption




B. Enable Windows automatic updates




C. Enable MAC filtering




D. Enable screensaver required passwords

D. Enable screensaver required passwords






Enabling screensaver passwords makes it so that a user must enter their password to disable the screensaver. This prevents unauthorized users from simply walking up to an unattended PC and accessing the network.




MAC filtering and wireless encryption will help prevent unauthorized computers from accessing the network, but they're not ways to harden individual workstations.




Ref. Ch. 29 (8th Ed.)

A user calls the help desk and states that she suddenly cannot connect to the Internet or any network resources. The user is on a company network that uses DHCP. The technician runs IPCONFIG from the command prompt and the PC has an IP address of 0.0.0.0. Which of the following steps should the technician perform first to troubleshoot this issue?



A. Assign a static IP address



B. Replace a network card



C. Check the network cable



D. Reinstall the network drivers

C. Check the network cable



First off, make sure you check the network cable. A 0.0.0.0 address means that the computer isn't connected to any network.



Assigning a static IP address won't fix the problem.



Ref. Ch. 24 (8th Ed.)

Tim needs to register an important .DLL file as a command component in the Registry. What command-line tool should he use?




A. regedt64




B. regedt32




C. regsvr32




D. regmgr64

C. regsvr32






The regsvr32 command is used to register dynamic link library (DLL) files as command components in the Registry.




Ref. Ch. 13 (9th Ed.)

Which tool or mechanism defines what resources a user may access and what he or she may do with those resources?



A. Authentication through user accounts and passwords



B. Authorization through user accounts and passwords



C. Authentication through NTFS



D. Authorization through NTFS

D. Authorization through NTFS



Authorization through NTFS defines resources a user may access and what he or she can do with those resources



Ref. Ch. 14 (9th Ed.)

Which of the following commands is used to change file permissions in Linux?




A. chmod




B. chown




C. users




D. pwn

A. chmod






The chmod command enables you to change file permissions in Linux.




Ref. Ch. 14 (9th Ed.)

Which tool in Windows 8.1 enables you to create a new user account based on a global Microsoft account?




A. User Accounts in Control Panel




B. Users and Groups in Control Panel




C. Settings charm




D. Users charm

C. Settings charm






The Settings charm in Windows 8.1 enables you to create a new user account based on a global Microsoft account.




Ref. Ch. 14 (9th Ed.)

What tool enables you to modify which programs start when Windows 8.1 starts?




A. msstartup




B. msinfo32




C. msconfig




D. Task Manager

D. Task Manager






Task Manager enables you to modify the applications and services that start with Windows 8 and later.




Ref. Ch. 15 (9th Ed.)

A directory on a server is configured with a share permission that allows all users to modify files. The same directory is configured with an NTFS permission that denies all access to the folder. If you connect to the share from a remote computer, what access would you expect to have?




A. No access




B. Depends on the user permissions




C. Read access




D. Modify files




E. Full control

A. No access






NTFS permissions apply from local and network connections whereas Share permissions only apply to connections over the network, so the most restrictive setting wins in this case.

In which of the following would you be most likely to use a Windows PE?



A. Defragment a storage drive



B. Modify a registry setting on a locked hive



C. Disable a service from starting automatically during boot



D. Filter Event Viewer entries



E. Perform a backup of all files in the /User directory

C. Disable a service from starting automatically during boot




In a Windows Pre-installation environment, you may often use this for troubleshooting such as temporarily disabling a service with issues.


Ref. Ch. 19 (8th Ed.)

What happens when you attempt to print to a phantom print device?



A. Windows will display an "Invalid print device" error



B. Windows will display an "Invalid print device" error and prompt for a valid print device



C. Nothing. The print job goes to the printer, but no output occurs



D. Windows will display a "Print device not found" error

C. Nothing. The print job goes to the printer, but no output occurs



When you print to a phantom or virtual print device, the software printer takes the print job and processes it. Then nothing else happens.



As long as the printer software is valid, Windows will not report anything unusual or missing.



Ref. Ch. 28 (8th Ed.)

A user has not received any new e-mails on his smartphone in the last two days. The user is able to access the Internet without any problems. Which of the following should the user do first?



A. Resynchronize the smart phone



B. Update the operating system



C. Reconfigure the smartphone's e-mail account



D. Restart the smartphone

D. Restart the smartphone




"Have you tried turning it off and on again?" Sometimes restarting a device can solve unexpected problems.



If the problem persists after a restart, you might try to reset the e-mail settings.



Ref. Ch. 27 (8th Ed.)

A user can edit the services that start up in Windows by using what tool?



A. Add/Remove hardware



B. Event Viewer



C. Service snap-in for MMC



D. Add/Remove programs

C. Service snap-in for MMC



By using the Microsoft Management Console's Service Snap-in, the user can edit startup services.



The other tools cannot control services.



Ref. Ch. 17 (8th Ed.)

A technician is using the troubleshooting theory to help resolve a problem that is occurring with a client's machine. The technician has verified system functionally. Which of the following is the next step in the troubleshooting theory?



A. Test the theory to determine cause



B. Document findings, actions, and outcomes



C. Identify the problem



D. Establish a plan of action to resolve the problem

B. Document findings, actions, and outcomes




After fixing everything and verifying that it all works, the lest step is to document everything that you did. For posterity.



Identifying the problem is the first step.



Ref. Ch. 32 (8th Ed.)

Lenny has just learned that laptops can have shared video memory, and he is curious to find out how much RAM his own laptop reserves for video. He is surprised to discover that all of his 1 GB of memory is shown being used by Windows. What's happening?



A. This laptop does not need any type of RAM for video



B. This laptop does not use shared memory



C. He has turned sharing off



D. The shared memory is so small that it's not even listed



E. His video is not currently sharing

B. This laptop does not use shared memory



Higher-end laptops have dedicated video cards with their own RAM, just like many desktops (although some desktops do use shared memory for video!).



The other answers are made up and incorrect.



Ref. Ch. 26 (8th Ed.)

A customer's PC is making a loud clicking noise that is coming from the hard drive and it refuses to boot. Which of the following should the technician do first?



A. Format the HDD and restore the computer with a system image



B. Visit the hard disk manufacturer's Web site and run a diagnostic check on the drive



C. Run CHKDSK immediately and replace the drive if it is bad



D. Put the hard drive in another system and back up all data from it

D. Put the hard drive in another system and back up all data from it



Back it up! That should always be the first thing you do with ANY and ALL hard drive problems that made loud clicking noises. The fact that the drive refuses to boot may even mean that the chances of getting data from it will be slim-to-none, but you must try!



Running CHKDSK and replacing the drive while not a terrible idea, definitely wouldn't be my first plan of attack. This sounds like a mechanical failure. CHKDSK can't do much for those types of errors.



Ref. Ch. 12 (8th Ed.)

Aaron wants to encrypt his hard drive on his Windows Vista Business system. What options does he have?



A. WPA



B. BitLocker



C. Third-party encryption tool



D. NTFS

C. Third-party encryption tool




Windows Vista Business does not come with a tool to encrypt an entire hard drive.



BitLocker enables you to encrypt a full drive, but it's only available in Windows Vista Ultimate and Enterprise.



Ref. Ch. 29 (8th Ed.)

Which tool in Windows Vista enables an administrator to create a log that shows all of the applications a user runs or attempts to run?




A. User Account Control




B. NTFS




C. Parental Controls




D. Create Log

C. Parental Controls






Parental Controls is used to create a log showing all of the applications a user runs or attempts to run.




Create Log is a made up answer.




Ref. Ch. 29 (8th Ed.)

Anakin is running defrag on his Windows computer. About half way through running the defrag, a random power outage occurs and his computer shuts down abruptly. What should he do next to finish his defrag?



A. Nothing-restart your computer and run defrag



B. Start in Safe Mode and run defrag



C. Install a UPS



D. Run CHKDSK on your drive to ensure data integrity

A. Nothing-restart your computer and run defrag



Defrag is totally safe. When it's working it's actually copying the files to new contiguous locations on the drive. That's why you need 15% of your drive free. That's a lot of copying going on!



Installing a UPS would be great for getting around the random power outages, but our real concern here was defrag.



Ref. Ch. 17 (8th Ed.)

A technician would like to map a network drive. Which of the following indicates the correct path for mapping a network drive using the UNC?




A. \\servername\share




B. \\share\servername




C. \\username\servername




D. \\password\share

A. \\servername\share






The correct syntax for the Universal Naming Convention (UNC) is \\servername\share. Simply map to that UNC and you will be able to access the folder "share" on the computer "servername" any time.




All of the other answers mislabel the Universal Naming Convention (UNC). The server needs to go first, then the shared resource.




Ref. Ch. 22 (8th Ed.)

Your company has been experiencing issues with third parties tailgating authorized users when they enter a secure server room. Which of the following would best resolve this problem?



A. Retinal scanners



B. Mantraps



C. Door locks



D. Smart card badges

B. Mantraps




A man trap refers to a small space having two sets of interlocking doors, such that the first set of doors must close before the second set opens. They are also known as airlocks in the security industry.



Retinal scanners, door locks, and smart card badges are all great examples of security measures you would want to have installed, but they won't stop tailgating as well as a mantrap.



Ref. Ch. 29 (8th Ed.)

Which of the following are good reasons to update a driver in Windows? (Select two.)



A. The current driver is not working properly



B. The driver is unencrypted



C. The new driver has new features



D. The current driver is over 12 months old



E. The new driver is signed by Windows

A. The current driver is not working properly



C. The new driver has new features



There are only two reasons to update a driver: it isn't working, or there's something in the new one that makes the update compelling.



Just because the driver is new or signed by Windows doesn't mean you should get the update. A driver that works correctly should not be replaced simply because it's old, and drivers are never encrypted.



Ref. Ch. 19 (8th Ed.)

You turn on your computer and you get a "Date and Time Not Set" message on the screen immediately after the manufacturer's logo. What is the most likely cause of this message?



A. The CR-2032 battery needs to be replaced



B. The computer was incorrectly shut down



C. The system BIOS is corrupted



D. The OS has stopped sync'ing with the time server

A. The CR-2032 battery needs to be replaced



The technical name for a CMOS battery is CR-2032. You can pick them up cheaply at your local Radio Shack or electronics store. When you see the message, "Date and Time Not Set," it usually always points to the CMOS forgetting what time it is because its battery has run out of juice. Get a new one and you'll be good to go!



While it may be possible that your operating system isn't syncing up with the time server, we haven't even gotten to a place to view the operating system. We're still trying to get past this bootup error message.



Ref. Ch. 8 (8th Ed.)

David attempts to connect to a game server on the Internet, but he can't connect even though others on his network can connect. His e-mail client and Web browser work fine. Reading the documentation for the game, he discovers it uses TCP port 13897. What's the likely fix?



A. Configure the anti-spyware software to accept incoming packets on port 13897



B. Create an exception for port 13897 in the Windows Firewall



C. Open the router's firewall to accept incoming packets on port 13897



D. Turn off the router

B. Create an exception for port 13897 in the Windows Firewall



Create an exception for port 13897 in the Windows Firewall. This allows the system to accept incoming traffic on the specific port.



Given that other players on his network can connect to the game server, the router already accepts incoming packets for port 13897.



Ref. Ch. 29 (8th Ed.)

A computer starts to boot, but then quickly shuts down. Which of the following should a technician use to troubleshoot this issue?




A. Toner probe




B. Event logs




C. Power supply tester




D. Loopback plugs

C. Power supply tester






Use a power supply tester to make sure your power supply isn't failing. Many early-boot issues like this are due to a failing power supply.




You can't look at event logs if you can't boot into your OS.




Ref. Ch. 10 (8th Ed.)

Jan says that when she walks away from her laptop for a long period of time, she has to reconnect to the wireless network when she gets back. Which of the following will most likely correct this issue?




A. Install a higher-capacity battery




B. Replace the Wi-Fi card




C. Disable screensaver




D. Adjust advanced power settings

D. Adjust advanced power settings






In the advanced power settings, there should be a section to modify the power saving mode of your wireless adapter. Jan is most likely set to a power-saving mode that causes her Wi-Fi card to go to sleep after a period of time. Having this feature enabled will force her to reconnect every time she comes back to use her computer.




There's nothing that really says the Wi-Fi card could be on its way to the "big network in the sky," but based on the information we are given about Jan's problem, we should most likely assume that it's a power management issue.




Ref. Ch. 26 (8th Ed.)

What does the BOOT.INI file do in the Windows XP boot process?



A. It loads the BOOTMGR



B. It loads all of the necessary device drivers and hardware devices



C. It lists the locations of all Windows operating systems on the system



D. It takes control of the system from the BIOS

C. It lists the locations of all Windows operating systems on the system



The BOOT.INI file lists the locations of all Windows operating systems on the system.



The master boot record takes control of the system from the BIOS.



Ref. Ch. 15 (8th Ed.)

If you want to take advantage of Wake on LAN (WOL), what two areas do you need to configure/verify to do so? (Select two.)



A. TCP/IP settings in Network Properties



B. Window's Power Management



C. WOL settings in CMOS



D. NIC's Properties in Device Manager

C. WOL settings in CMOS



D. NIC's Properties in Device Manager



On the vast majority of systems, you need to configure the WOL settings in CMOS and the NIC's Properties in Device Manager.



Windows Power Management has no settings for WOL nor does TCP/IP settings.



Ref. Ch. 22 (8th Ed.)

A user will be installing a switch in a public location and will allow the six users in the office to connect to it with CAT6 Ethernet. Which of the following actions would best ensure that there is no unauthorized access to the switch?



A. Disable PoE



B. Disable unused ports



C. Assign static IP addresses



D. Disable new VLANs

B. Disable unused ports



Disabling the unused ports on the switch will prevent anyone from plugging a computer into an unused port without authorization.



Static IP addresses won't prevent unauthorized users from plugging into the network.



Ref. Ch. 29 (8th Ed.)

You have just installed a new biometric device using the driver supplied to you on the CD provided by the manufacturer. After confirming the device functions properly, you proceed to download the latest Windows updates as well as download the latest antivirus definitions for your antivirus scanner. Now your biometric devices refuses to work. Which of the following would best explain why the biometric device no longer functions?



A. The recently installed Windows updates overwrote the manufacturer's supplied biometric device driver



B. The recently updated AV software is interfering with the operations of your newly installed biometric device



C. The biometric device has failed at a hardware level and needs to be replaced



D. Malware that specifically targets retinal scanning software infected the computer because the user was late applying the latest definitions

A. The recently installed Windows updates overwrote the manufacturer's supplied biometric device driver



After you installed the latest Windows updates, you probably picked up a Microsoft driver for your biometric device. Looks like this driver isn't playing very nice and needs to be removed and never installed again!



Updating virus definitions won't effect your drivers for any of your hardware installed.



Ref. Ch. 29 (8th Ed.)

You are troubleshooting a computer that reboots at strange times. Even when you try and access the CMOS setup, the computer will reboot. What should you check FIRST?


A. Replace the CR-2032 battery


B. Check to see if your operating system is corrupted


C. Check to see if the case fan is spinning


D. Check for blown capacitors

D. Check for blown capacitors




Do a google search for "blown capacitor" and you will see exactly what I'm talking about. That is a rough situation there. When this happens, it will short circuit the conductors that are carrying power, causing random reboots, among many other types of errors.



Replacing the CR-2032, or CMOS battery, will just give you a brand new CMOS battery, it won't stop the reboots from happening.



Ref. Ch. 9 (8th Ed.)

Eric is trying to run the classic first person shooter Quake on his Windows Vista machine. In order to do this, he needs to run at 8-bit color depth, but doesn't want to change the system-wide color settings. What is the best fix for this problem?


A. Run as administrator


B. Run in 256 colors


C. Disable Visual Themes


D. Run in 640x480 screen resolution

B. Run in 256 colors



Running in 256 colors will give the application what it needs to run properly in this crazy Windows Vista world we live in.


All of the other choices will not change the color depth. Yes, even the all-powerful "Run as Administrator."


Ref. Ch. 21 (8th Ed.)

A computer starts up and runs for less than a minute before shutting down or locking up. This is a symptom of:


A. Overheating


B. Incompatible RAM


C. A bad internal USB hub


D. A faulty hard drive

A. Overheating



If a computer is shutting down after a few minutes of operation, that's a good sign that it's overheating. Dust out your computer or get a better heat sink.


A faulty hard drive would prevent you from booting into the OS.


Ref. Ch. 6 (8th Ed.)

Cheryl has purchased and installed a contact management program on her non-networked laptop. She keeps getting an "Unable to connect to contact database - 3256" error message. What should she do next?


A. Uninstall/reinstall the program


B. Reboot the PC


C. Call the company help desk


D. Check for vendor documentation

D. Check for vendor documentation



Bizarre, meaningless errors like this one are common in this business. Check the vendor documentation to see if there's a good answer to this problem.


Uninstalling/reinstalling the program or rebooting the PC might make the error go away, but it doesn't really solve the problem.


Ref. Ch. 32 (8th Ed.)

I have a bunch of files on my PC and I want to delete them. And when I say delete them, I don't even want them going to the Recycle Bin. How can I do that in Windows?


A. Hold Ctrl, then press Delete


B. Hold Caps Lock, then press Backspace


C. Hold Shift, then press Delete


D. Press the Backspace key

C. Hold Shift, then press Delete



Hold Shift down, then press Delete on any file you want. It won't go to the Recycle Bin. It's buh-bye gone!


Holding Ctrl won't do anything. Any answer involving the Backspace key won't have an effect, either.


Ref. ch. 4 (8th Ed.)

You are using Windows Vista, but you miss the good ol' days of Windows 2000's Start Menu. How would you go about changing your Start Menu to a more "classic" style?


A. Alt. click on the desktop > Personalize > Start Menu


B. Start > Control Panel > System and Maintenance


C. Start > Control Panel > Ease of Access


D. Alt. click on the Start Menu > Properties > Start Menu tab

D. Alt. click on the Start Menu > Properties > Start Menu tab



Alt. click on the Start Menu > Properties > Start Menu tab. After that, you'll have all kinds of choices as to how your Start Menu works.


Note: This option is not present in Windows 7.


The Ease of Access applet, along with System and Maintenance, will not have this option available.


Ref. Ch. 4 (8th Ed.)

When scheduling a backup for preventative maintenance, which of the following would ensure all data was captured?


A. Differential


B. Incremental


C. Full


D. Daily

C. Full



A full backup backs up everything that is set to be backed up, whether the archive bit is on or not.


Incremental backups save only the data that has changed since the last backup of any kind.


Ref. Ch. 17 (8th Ed.)

Is a user required to use the Windows wireless client on Windows XP?


A. Yes


B. Yes, but only if you have Service Pack 2


C. Not if you have a third party wireless client


D. No. Windows does not have a true wireless client

C. Not if you have a third party wireless client



You are not required to use the Windows wireless client and there are many fine third-party wireless clients available.


The other answers are incorrect.



Ref. Ch. 23 (8th Ed.)

You drop a screw down into a PC's case and need to retrieve it. Which of the following tools would be the best to use in this situation?



A. Fingers



B. Needle-nosed pliers



C. Plastic tweezers



D. Magnetic screwdriver

C. Plastic tweezers



Plastic tweezers are best for reaching tiny things in your PC.



A magnetic screwdriver might affect the tiny components on the motherboard.



Ref. Ch. 3 (8th Ed.)

In Windows, what is the key combination to open the start menu?


A. F1


B. ALT + ESC


C. ENTER
D. CTRL + ESC

D. CTRL + ESC



The CTRL + ESC combination opens the Start Menu.


F1 brings up Help, while ALT + ESC controls window resizing. ENTER does many things, but it won't open the Start menu.


Ref. Ch. 4 (8th Ed.)

A laser printer is producing completely blank sheets. Which of the following processes should the technician check first?


A. Fusing


B. Paper handling


C. Cleaning


D. Transfer

D. Transfer



The transfer roller is responsible for giving the paper a positive electrical charge, which attracts the negatively charged toner. If that's not working, then the toner doesn't go anywhere.


A non-working fuser just creates smudges.


Ref. Ch. 28 (8th Ed.)

Even after his impassioned secure password meeting, Paul is frustrated by the overly simplistic passwords his users use to login into Windows. What can Paul do to make sure his users create truly random, challenging passwords?


A. Have users use a password generator program to make their passwords


B. Make users change their passwords every 30 days


C. Have users make passwords of at least 15 characters in length


D. Show users how to combine a pet's name with his or her own name

A. Have users use a password generator program to make their passwords



Have users use a password generator program to make their passwords. Password generators make truly random passwords.


Longer passwords are better, but longer does not mean more random.


Ref. Ch. 29 (8th Ed.)

A user on a domain network cannot install software that they need. Which of the following user groups is the user most likely associated with?


A. Administrator


B. Standard user


C. Power user


D. Guest user

D. Guest user



Guest users cannot install any software.


Every other user type can install software on a PC unless the default group permissions have been changed.


Ref. Ch. 2 (8th Ed.)

Jabba is working on a Windows Vista computer. He has just saved his new Microsoft Word document into his Documents folder. He now wants to copy that file to his flash drive, but doesn't know where to go in order to copy it. Guide him to the correct path.


A. C:\Documents and Settings\Jabba\My Documents


B. C:\Users\Jabba\My Documents


C. C:\Users\Jabba\Documents



D. C:Documents and Settings\Jabba\Documents

C. C:\Users\Jabba\Documents



C:\Users\Jabba\Documents


Anything with Documents and Settings belongs to Windows 2000 or XP. Also, in Vista they took away the "My" Document. It's just Documents in Vista.


Ref. Ch. 4 (8th Ed.)

Which command prompt command will enable you to see all the files in the C:\FRED folder with the extension EXE?




A. DIR *.EXE C:\FRED




B. DIR C:\FRED\?.EXE




C. DIR C:\FRED\*.EXE




D. DIR FRED *.EXE

C. DIR C:\FRED\*.EXE






The command DIR C:\FRED\*.EXE is the only command prompt command that will list only the files in the C:\FRED folder with the extension EXE.




The other commands are incorrect.




Ref. Ch. 18 (8th Ed.)

An alert needs to be sent to the administrator when the CPU usage stays above 90% for a period of time. Which of the following tools would best be used to accomplish this?




A. Task Scheduler




B. Performance Monitor




C. System Configuration




D. Task Manager

B. Performance Monitor






The Performance Monitor can be used to send alerts when certain conditions are met.




The Task Scheduler is used to schedule automated events.




Ref. Ch. 17 (8th Ed.)

You want to install Windows 7 32-bit onto your computer. What is the bare minimum amount of hard drive space required to do this?




A. 12 GB




B. 20 GB




C. 16 GB




D. 8 GB

C. 16 GB






You'll need 16 GB of hard drive space. That is the bare minimum.




8 GB and 12 GB are not correct. 20 GB is the minimum requirement for a Windows 7 64-bit PC.




Ref. Ch. 14 (8th Ed.)

Which of the following operating systems allows a user to enable Windows XP mode?




A. Windows 7 Home Premium




B. Windows Vista Home Premium




C. Windows 7 Professional




D. Windows Vista Ultimate

C. Windows 7 Professional






Windows 7 Professional can download and run Windows XP Mode. This feature will enable your computer to run Windows XP in a virtual environment for maximum backwards compatibility with your legacy applications.




Note - Windows 7 Enterprise and Windows 7 Ultimate also support Windows XP Mode.




None of the Windows Vista product line allows for Windows XP Mode.




Ref. Ch. 14 (8th Ed.)

You have just turned on your Windows 7 computer and you decided to do a bit of Internet surfing. While cruising the Internet, you download a ZIP file. How would you go about opening the ZIP file?




A. Right-click the file and rename the ZIP extension to EXE




B. Use regedit.exe to change the registry to enable the use of ZIP files




C. Download a 3rd party application, such as 7zip to open the file




D. Just double-click it

D. Just double-click it






Just double-click and open it! Ever since Windows XP, we have had native (built-in) support for files with the ZIP extension.




Renaming it to an EXE file will just render the file unusable.




Ref. Ch. 4 (8th Ed.)

Angie wants to upgrade a Windows XP computer to Windows 7. What should she do to see if the computer can handle the new operating system? Select the best answer.




A. Check the manufacturer's Web site for upgrade information




B. Check the Microsoft Web site hardware compatibility list




C. Run Windows 7 Upgrade Advisor on the computer




D. Run the Windows XP Upgrade Advisor on the computer

C. Run Windows 7 Upgrade Advisor on the computer






Run the Windows 7 Upgrade Advisor on the computer




Checking the manufacturer's Web site or Microsoft's HCL are both viable options, just not the best answer here. The computer could have had upgrades internally, for example, between the initial purchase and the desire to upgrade to Windows 7.




Ref. Ch. 14 (8th Ed.)

You are working with files on your NTFS partition. Which of the following actions will cause the files to inherit permissions of the new container? (Choose three.)




A. Copying a file to a different NTFS partition




B. Moving a file to a different NTFS partition




C. Copying a file to a new location on the same partition




D. Copying a file to a FAT32 partition




E. Moving a file to a new location on the same partition

A. Copying a file to a different NTFS partition




B. Moving a file to a different NTFS partition




C. Copying a file to a new location on the same partition






This will all cause the file to inherit the permissions of the new container it inhabits.




Moving a file to a new location on the same partition will cause the file to RETAIN its original permissions.




Ref. Ch. 16 (8th Ed.)

Windows provides a number of ready-made MMC Snap-ins stored in the ________ applet in the Control Panel.




A. Network




B. System




C. MMC




D. Administrative Tools

D. Administrative Tools






The Administrative tools applet contains many useful tools that can be added to the MMC as Snap-ins.




There is not an MMC applet. The system and network applets in the Control Panel don't contain MMC Snap-ins.




Ref. Ch. 4 (8th Ed.)

A user calls the helpdesk and states that they are receiving an IP conflict error on their computer. The user is on a company network that uses DHCP. The technician verifies the PC is using DHCP to obtain TcP/IP settings. Which of the following commands should the helpdesk technician use to resolve this issue? (Select two.)


A. IPCONFIG /RELEASE


B. IPCONFIG /REGISTERDNS


C. IPCONFIG /FLUSHDNS


D. IPCONFIG /ALL


E. IPCONFIG /RENEW

A. IPCONFIG /RELEASE


E. IPCONFIG /RENEW



The IPCONFIG /RELEASE command releases a computer's IP address, and the IPCONFIG /RENEW command gets the computer a new one.


The IPCONFIG /ALL command displays a comprehensive list of a computer's IP information.


IPCONFIG /FLUSHDNS deletes a computer's DNS cache.


Ref. Ch. 22 (8th Ed.)

You are about to install a brand new copy of Windows 7 Ultimate 64-bit. What should be your primary concern given the options? (Choose the BEST option.)


A. How fast the processor is


B. How fast your RAM is


C. What type of RAM is installed


D. What type of processor is installed

D. What type of processor is installed



The type of processor installed is easily the most important thing here. Is the CPU a 32-bit processor or a 64-bit capable processor? That can be a difference maker on installing your new OS.


While concern for CPU speed is valid, it is not as important as the type of CPU being installed. The minimum CPU requirement for Windows 7 is a 1 GHz processor. We have had 1 GHz processors in the mainstream consumer market since the year 2000. So in this instance, the concern for the type of processor is more important than how fast it is.


Ref. Ch. 14 (8th Ed.)

You are working on a computer for a client. They want you to install an additional PATA HDD into their Windows 7 desktop. After installing, the PC boots up without any errors. When you get into Windows, you click on the Start button, then go to Computer. You immediately notice the drive is not listed. What is MOST likely the issue? (Select two.)


A. The drive is formatted with FAT16


B. You need to partition the drive


C. Windows 7 is not compatible with the PATA interface


D. You need to assign the drive letter


E. The drive is not set for cable select

B. You need to partition the drive


D. You need to assign the drive letter



Since you can't see the drive in Computer, it looks like you need to do some additional configuring. Go to Disk Management then partition, format, and give that drive a letter or mount it.


The drive was configured correctly from a hardware level, as stated in the original question when it said that you booted up and reported no errors. So you don't need to worry about master, slave, or cable select.


Ref. Ch. 12 (8th Ed.)

You are running Windows XP on your workstation. You need the ability to back up files, share resources, and install applications, but you don't need to be able to read other users' files. Which of the following will accomplish this? (Select two.)


A. Add your user account to the Power Users group


B. Add your user account to the Administrators group


C. Add your user account to the Interactive group


D. Add your user account to the Backup Operators group

A. Add your user account to the Power Users group


D. Add your user account to the Backup Operators group




By adding your user account to the Power Users group, you inherit the ability to share resources and install programs on the computer. When you are added to the Backup Operators group, you will have permission to back up files. You will not have permission to read other users' files, as neither the Power Users group nor the Backup Operators group grants permission to do that.


There is no Interactive group, and if you're not an Admin, you can't add yourself to the Admin group. Additionally, since you don't need to read others files, Admin is overkill.


Ref. Ch. 16 (8th Ed.)

Which of the following tools allows a person with administrator privileges to add local users to a Windows system?


A. The Local Users and Groups tab in the properties for My Computer


B. The Local Users and Groups Control Panel applet


C. The Local Users and Groups tab in the properties for My Network Places


D. The Local Users and Groups Snap-in under Computer Management

D. The Local Users and Groups Snap-in under Computer Management




Local Users and Groups is a Snap-in under Computer Management


None of the other options are viable paths to Local Users and Groups.


Ref. Ch. 16 (8th Ed.)

When setting up a new wireless router, which of the following actions should the technician take first in order to secure the network? (Select two.)


A. Disable unused ports


B. Change the default user name


C. Change the SSID


D. Position the antennas to prevent outside access


E. Enable MAC filtering

B. Change the default user name


C. Change the SSID




By changing the SSID and default user name (also the password, but that's not an option here), you make it more difficult for outsiders to log into your network or router.


Disabling unused ports and enabling MAC filtering might help increase security on your network, but they're not the things you should do FIRST.


Ref. Ch. 23 (8th Ed.)

Where would you go in Internet Explorer to delete an unwanted Browser Helper Object?


A. Tools | Manage BHOs


B. Tools | Pop-Up Blocker


C. Tools | Internet Options | Manage BHOs


D. Tools | Manage Add-ons

D. Tools | Manage Add-ons




Tools | Manage Add-ons is where you'd find how to turn off BHOs.


The other paths are incorrect.


Ref. Ch. 29 (8th Ed.)

A user is installing Windows 7 on a PC with a RAID card. The user has verified all of the cables are connected correctly, but the installation media does not detect any hard drives. Which of the following should the user do to help detect the hard drives?


A. Press F8 when prompted


B. Hit the refresh button to force a re-detect


C. Select load driver


D. Enable PATA in the BIOS

C. Select load driver




Loading a driver for your RAID controller enables the Windows install process to communicate with your fancy multi-drive array.


Enabling PATA in the BIOS won't help if you're using a RAID card.


Ref. Ch. 12 (8th Ed.)

A user reports that her desktop PC shuts down 10 minutes after turning it on in the morning. When the technician moves the PC, it sounds like there are loose parts sliding around in the case. Which of the following is the most likely explanation for the PC shutting down?


A. The heat sink retaining clip has broken loose


B. A memory module has become unseated


C. The CMOS battery is bad


D. The hard drive cable has become unseated

A. The heat sink retaining clip has broken loose




If the heat sink has come loose, the CPU will gradually build up heat until it overheats and shuts off. You'd also hear the heatsink clunking around inside the case, letting you know that something's loose in there!


An unseated memory module wouldn't cause a PC to randomly shut down.


Ref. Ch. 6 (8th Ed.)

Kevin gets a call from a user who is trying to install a new piece of software. The user doesn't have administrative rights, so she's unable to install the software. What tool can Kevin use to install the software for the user without giving the user the local administrator password?


A. Remote Assistance



B. Computer Management



C. Remote Desktop



D. Regedit

C. Remote Desktop



Kevin can use Remote Desktop to login to the computer with administrative rights and perform the install for the user.


Computer Management has nothing to help solve this issue.


Remote Assistance, which is similar to Remote Desktop, would require an invitation by the user, which might not be possible. Remote Desktop requires no such invitation.


Ref. Ch. 24 (8th Ed.)

A user gets an error message that the trust relationship to the domain has been broken. Which of the following can be done to resolve this from the client desktop?


A. Run CHKDSK


B. Update the BIOS using the latest version


C. Reboot the PC as the domain will automatically rebuild the relationship


D. Re-join the computer to the domain

D. Re-join the computer to the domain




Re-joining the computer to the domain will rebuild the trust relationship.


None of the other options will rebuild the trust relationship.


Ref. Ch. 14 (8th Ed.)

Which of the following commands can be used in Windows XP to modify when the CHKDSK command runs?


A. SCANDSK


B. CHKNTFS


C. IPCONFIG


D. CONVERT

B. CHKNTFS




The CHKNTFS command enables you to change when the CHKDSK command runs.


SCANDISK is the old tool that CHKDSK replaced.


Ref. Ch. 18 (8th Ed.)

A client has a computer that is infected with several viruses and spyware. Which of the following should the technician perform first before spyware removal?


A. Disable network cards


B. Run the CHKDSK /R command


C. Run Windows Update


D. Disable System Restore

D. Disable System Restore




System Restore points can become infected by certain malware, so it's always a good idea to disable System Restore on an infected machine.


If you disable your network cards, your anti-malware tools won't be able to download new malware definitions.


Ref. Ch. 29 (8th Ed.)

Help, my mobile phone is missing! Thank goodness I made sure to enable the: (Select two.)


A. Mobile Device Insurance Tool (MDIT)


B. Device finding service


C. Auto Return function


D. Anti-theft app


E. Passcode lock

B. Device finding service


E. Passcode lock




The passcode lock will keep people out if it was stolen, at least for a while, and the device finding service can let me use a program to help locate the device if it's just lost.


If you create the "Auto Return" function, you will be rich! Unfortunately, that and the "anti-theft app" don't exist today. Similarly, the MDIT is a fictitious tool, sorry.


Ref. Ch. 27 (8th Ed.)

In which Start menu folder will you find the Windows XP Disk Defragmenter utility?


A. Accessories | System Tools


B. Control Panel | Administrative Tools


C. Control Panel | Accessories


D. System Tools | Accessories

A. Accessories | System Tools




Window's Disk Defragmenter is located in the Accessories | System Tools folder.


The other paths are incorrect.


Ref. Ch. 17 (8th Ed.)

Which of the following commands would you use to install the Recovery Console?


A. Start | Run, then type d:\i386\winnt32 /cmdcons


B. Start | Run, then type d:\i386\winnt32 /cmd:command_line


C. Start the computer with the Windows Vista installation disc


D. Start | Run, then type d:\i386\winnt32 /copydir:recovery_console

A. Start | Run, then type d:\i386\winnt32 /cmdcons




d:\i386\winnt32 /cmdcons is what you would type in at the run dialog box to install the Recovery console on a Windows XP computer. WINNT32 is the setup file to run an installation of Windows XP while in the GUI. By adding the switch /cmdcons, you will enable setup to install the Recovery Console.


/cmd:command_line doesn't exist and neither does /copydir:recovery_console


Ref. Ch. 19 (8th Ed.)

Tom's C:drive is filling up. He needs to install a bigger drive and reinstall Windows onto the larger drive, but he's short on time. Instead, he intalls the much larger drive, partitions it into a single volume and formats it as NTFS. Instead of giving the new volume a drive letter, he configures it as C:\NEW. We call this feature of Windows:


A. UAC


B. ATAPI


C. Mount point


D. Dynamic disk

C. Mount point




Mount point. Whenever a volume is assigned a folder name on another existing volume instead of a drive letter, it's called a mount point.


Dynamic disk is a proprietary Windows feature that enables more advanced features for hard drives.


Ref. Ch. 12 (8th Ed.)

Which of the following is NOT controlled by Windows' Parental Controls?


A. Torrents


B. Time of day


C. Web site filters


D. Games

A. Torrents




Parental Controls have no control over torrents.


Parental Controls enables control of time of day, games, and Web filters.


Ref. Ch. 29 (8th Ed.)

How can you preview fonts in Windows 7? (Select two.)


A. In Control Panel, select Appearance and Personalization | Fonts


B. You can't preview fonts without a word processing program


C. Go to Documents | Fonts | Preview


D. In Control Panel, select Fonts | Preview

A. In Control Panel, select Appearance and Personalization | Fonts


D. In Control Panel, select Fonts | Preview




In Control Panel, select Appearance and Personalization (assuming you're using the categories view) | Fonts.


In Control Panel, select (assuming you're using the icons view) | Fonts.


For the record, you can also preview fonts at Start, type "fonts," and press [Enter]; plus you can preview in the Fonts folder directly:C:\Windows\Fonts


Documents does not have a Fonts folder by default.


Ref. Ch. 4 (8th Ed.)

Where are software firewalls usually located?


A. On the routers


B. On every node


C. On the client systems


D. On the servers

C. On the client systems



Software firewalls typically reside on the client systems.


Software firewalls do not typically reside on routers, servers or every node. A router would be considered a hardware firewall.


Ref. Ch. 29 (8th Ed.)

Can you encrypt a single file using Windows XP's EFS? If so, how? If not, why?


A. It's a setting under the file's properties and is not tied to either volumes or folders


B. You first enable EFS on the folder, then you can encrypt individual files in the folder


C. You cannot. EFS only works on entire volumes


D. You cannot. EFS only works on folders

A. It's a setting under the file's properties and is not tied to either volumes or folders.




EFS works on any single file. Go to Properties | General Tab | Advanced | Encrypt contents to secure data.


The other answers are untrue and incorrect.


Ref. Ch. 16 (8th Ed.)

Running CHKDSK by itself only inspects the partition for problems. To get CHKDSK to fix anything, you must run it with the ________ switch.


A. /H


B. /R


C. /F


D. /ALL

C. /F




CHKDSK /F fixes errors on the disk.


/R searches for defective sectors and recovers legible information in CHKDSK.


Ref. Ch. 18 (8th Ed.)

According to the CompTIA A+ troubleshooting methodology, at what point during the troubleshooting process should you back up the computer?


A. When establishing a plan of action to resolve the problem and implementing the solution


B. When establishing a theory of probable cause


C. When testing the theory to determine cause


D. When identifying the problem

D. When identifying the problem




When identifying the problem is the best time to do some back ups. Before making any changes to the system, you should always back it up.


When you're establishing a theory, testing your theory, or implementing a plan of action, you are more likely to be doing some significant changes to their computer. Back up before any of that!


Ref. Ch. 32 (8th Ed.)

A user reports that a file she shared on her computer for another network is not accessible to the third party. The user insists they specifically gave this third party Allow rights for Read and Write access. Which of the following could explain the problem at hand?


A. The parent folder likely has the "archive" attribute enabled


B. The parent folder has explicit Deny rights set for this user


C. The parent folder has explicit Allow rights set for this user


D. The user forgot to share the parent folder and only shared the specific file

B. The parent folder has explicit Deny rights set for this user



Deny rights override Allow rights, so if there are Deny rights set for the third party on the parent folder, they won't be able to access the file.


You can't share files in Windows; only folders.


Ref. Ch. 16 (8th Ed.)

The one thing that CHKDSK does NOT repair is ________________.


A. bad clusters


B. cross-linked files


C. directory structures


D. fragmented files

D. fragmented files



CHKDSK does not repair fragmented files; that is the job of DEFRAG.


CHKDSK does fix the other issues.


Ref. Ch. 12 (8th Ed.)

Which of the following is the best way to ensure you've made a quality backup?


A. Always close all files before a backup


B. Run backups when the least number of users are online


C. Do only full backups


D. Verify your backup

D. Verify your backup



The only true test of a backup's quality is to restore it and see the results - but that is practically difficult to do. Instead, use the backup software's verification utility - verifiers are quite good at determining the quality of a backup job.


Closing all files before a backup is good practice, but does not ensure a quality backup.


Ref. Ch. 17 (8th Ed.)

A user is having a difficult time printing certain types of documents to her laser printer. When she sends complex, multi-page, multi-color PDF files to the printer, it refuses to print. What is most likely the solution?


A. Update her printer driver from PCL to Post Script


B. Add more RAM to her PC


C. Add more RAM to the laser printer


D. Flash the firmware of the laser printer

C. Add more RAM to the laser printer



Throw more RAM in that printer. We have these old HP LaserJet 4s in our offices at Total Seminars. They are from the late 90s and they still work! We at Total Seminars are very conscientious with our hardware maintenance. In order to print complex documents in this day and age, we just updated the RAM on the printers. Sure, it still takes about 5 minutes to print a PDF, but it works!


Flashing the firmware of the printer will not change the outcome of complex documents being printed.


Ref. Ch. 28 (8th Ed.)

Which of the following operating systems supports full BitLocker functionality?


A. Windows Vista Home Premium


B. Windows 7 Enterprise


C. Windows 7 Professional


D. Windows XP

B. Windows 7 Enterprise



Windows 7 Enterprise and Ultimate both support BitLocker functionality.


None of the other versions of Windows 7 support BitLocker.


Ref. Ch. 16 (8th Ed.)

Which of the following types of security threats include shoulder surfing and phishing?


A. Man-in-the-middle


B. Trojan virus


C. Social engineering


D. Spyware

C. Social engineering



Shoulder surfing and phishing are social engineering attacks, because they both involve hackers interacting with people directly.



A man-in-the-middle attack is a form of eavesdropping where an attacker acts as an invisible intermediary between two parties that believe they are communicating solely with one another.


Ref. Ch. 29 (8th Ed.)

A drive configured as a basic disk in Disk Management cannot support what feature?


A. NTFS


B. Disk Administration


C. RAID


D. Sharing

C. RAID



Windows requires Dynamic disk drives to support RAID.


NTFS and sharing are both supported by Basic and Dynamic disks.


Ref. Ch. 12 (8th Ed.)

Which Control Panel applet and path are used in Windows XP to change your computer's language?


A. Regional and Language Options | Advanced Tab | Details button


B. Regional and Language Options | Languages Tab | Change button


C. Regional and Language Options | Advanced Tab | Change button


D. Regional and Language Options | Languages Tab | Details button

D. Regional and Language Options | Languages Tab | Details button



Regional and Language Options | Languages Tab | Details button


None of the other options are valid paths.


Ref. Ch. 17 (8th Ed.)

A technician installed a second hard drive in a computer. Upon restart, a message appears stating, "Primary drive 0 not found. Press F1 to continue." Which of the following should the technician check first?


A. Proper drive installation (e.g. cables/jumpers)


B. If the BIOS boot settings are correct


C. If computer can boot into Safe Mode


D. That NTLDR and boot.ini are not missing

A. Proper drive installation (e.g. cables/jumpers)



Error messages after a drive installation is a good sign that you might have installed the drive improperly.


If everything's installed properly, then you'd check the boot settings in BIOS. But not first.


Ref. Ch. 12 (8th Ed.)

What is the generic term used for the process to determine the identity of a user logging into a system?


A. Indemnification


B. Authorization


C. Identification


D. Authentication

D. Authentication



Authentication is the generic term used for determining the identity of a user logging into a system.


The other answers are incorrect. Authorization is for determining what a user can and cannot do.


Ref. ch. 29 (8th Ed.)

Which of the following is most commonly a local security policy?


A. Use a password to log in


B. RAID


C. Soft Power


D. Password length

D. Password length



Password length is a common local security policy.


Using a password to log in is controlled in Control Panel.


Ref. Ch. 16 (8th Ed.)

Jennifer is sharing her brand new, ultra-deluxe laser printer with the Sales workgroup on a Windows XP workstation. She wants to control which users can access this printer, but cannot find the permissions tab. What should she do?


A. Go into the printer setup routing and adjust permissions on the printer itself


B. Turn on the check box for Advanced File Sharing and then set the permissions for the shared printer


C. There is no way to do this in a workstation setting. She needs to be in a domain setting


D. Uncheck the Simple File Sharing option then set the permissions for the shared printer

D. Uncheck the Simple File Sharing option then set the permissions for the shared printer




By default, the simple file sharing option is enabled on Windows XP Professional. She needs to turn this off in order to see more advanced options.


There is no Advanced File Sharing check box to turn on.


Ref. Ch. 16 (8th Ed.)

Which of the following BEST represents a security vulnerability of mobile devices? (Select TWO.)


A. Theft


B. Phishing


C. Viruses


D. Improper file permissions


E. Unauthorized downloads

A. Theft


C. Viruses




Viruses and theft - Mobile devices these days are increasingly targeted by viruses, and phone theft is a constant threat.


Phishing is the act of using e-mail to pretend to be a trusted authority in order to obtain sensitive information.


Ref. Ch. 27 (8th Ed.)

Which of the following should be regularly scheduled to fix hard drive errors?


A. System Restore


B. Check Disk


C. Anti-virus scan


D. Defragmentation

B. Check Disk




The Check Disk utility scans a hard drive for errors and repairs any that it finds.


Defragmentation fixes what's called "file fragmentation," where individual files are stored in many different places on a drive.


Ref. Ch. 17 (8th Ed.)

How do you update a sound card driver in Windows Vista?


A. In the Control Panel, select Sound Devices, click the Drivers Tab, and then click Update


B. In Computer Management, select Device Manager, right-click the sound device and select Properties, click the Driver tab, and click Update Driver


C. In the Control Panel, select System, select Drivers, select Sound Devices, then click Update Driver


D. Right-click My Computer and select Properties, select the Hardware tab, select Drivers, select Sound Devices, then click Update My Driver

B. In Computer Management, select Device Manager, right-click the sound device and select Properties, click the Driver tab, and click Update Driver




In Computer Management, select Device Manager, right-click the sound device and select Properties, click the Driver tab, and click Update Driver.


You cannot update a sound card driver from the Control Panel or from the Hardware tab of My Computer Properties.


Ref. Ch. 9 (8th Ed.)

What does the Windows feature "Sticky Keys" do for users?


A. Locks down the function key to Enable mode


B. Lets you press key combinations such as (Windows Key+Tab) one key at a time


C. Tells the computer to ignore quick or repeated keystrokes


D. Plays a tone when you press Caps Lock, Num Lock, or Scroll Lock

B. Lets you press key combinations such as (Windows Key+Tab) one key at a time




These features are accessed in the Control Panel under Accessibility Options in XP and Ease of Access in Windows Vista. In this case, Sticky Keys lets you press key combinations, such as Windows Key+Tab, one key at a time.


The Filter Keys feature tells the computer to ignore quick or repeated keystrokes.


Ref. Ch. 20 (8th Ed.)

There are two users, Marcy and Gladys, with administrative privileges on a single Windows XP system. The Windows system is not on a network and it is using Simple File Sharing. Marcy doesn't want Gladys to access her My Documents folder. Which of the following will best-and most easily-help her achieve this goal?


A. Do nothing. By default Gladys will not have access to other accounts' personal files


B. Set her My Documents Folder as Private


C. Rename the Shared Documents folder


D. Turn off Simple File Sharing and deprive Gladys any access to My Documents

B. Set her My Documents Folder as Private




Setting her My Documents folder to Private will prevent anyone from using Windows Explorer to access that folder.


Turning off Simple File Sharing and depriving Gladys any access to My Documents will work, but it requires substantial configuration.


Ref. Ch. 16 (8th Ed.)

Which of the following best describes the function of Windows Defender?


A. Windows Defender displays system events


B. Windows Defender reduces the effects of a malware attack


C. Windows Defender prevents accidental partitioning


D. Windows Defender prevents malware attacks

D. Windows Defender prevents malware attacks




Windows Defender helps prevent malware attacks.


Data Execution Prevention (DEP) reduces the effects of malware attacks.


Ref. Ch. 29 (8th Ed.)

A wireless network is experiencing intermittent connectivity. Which of the following would best resolve this issue?


A. Enable MAC filtering


B. Change broadcast channel


C. Enable wireless encryption


D. Disable SSID broadcasting

B. Change broadcast channel




Changing your broadcast channel to a less-used one can prevent interference caused by other nearby wireless networks.


MAC filtering, wireless encryption, and disabling SSID broadcasting are all security measures, not solutions to intermittent connectivity.


Ref. Ch. 23 (8th Ed.)

Mike has a Windows XP system that fails at boot with an "NTLDR missing or corrupt" message. His system has one drive formatted as NTFS. He does not have any floppy boot disks, but his system can boot to a CD-ROM. Which of the following methods will get his system working again?


A. Boot to the CD-ROM and load a new copy of NTLDR


B. Boot the recovery console and use the Repair utility


C. Boot from a Windows 98 startup disk and copy NTLDR from C:\WINNT to the C:\drive


D. Boot to the CD-ROM and do a repair

D. Boot to the CD-ROM and do a repair




Mike should run the install program off the CD-ROM. When prompted for install or repair, he should select R to repair.


The Recovery Console could help you, but there is no Repair utility.


Ref. Ch. 19 (8th Ed.)

Tammy can successfully run the command PING 192.168.4.1 on her system. If Tammy types PING -t 192.168.4.1 on her system, how will the "-t" switch change the results of the PING command?


A. The "-t" switch tells the PING command to ping showing time-to-live values


B. The "-t" switch tells the PING command to ping continuously


C. The "-t" switch tells the PING command to ping 10 times


D. The "-t" switch tells the PING command to ping 4 times

B. The "-t" switch tells the PING command to ping continuously




The "-t" switch tells the PING command to ping continuously.


The PING -n switch tells the ping command to ping a certain number of times.


Ref. Ch. 22 (8th Ed.)

Which command in a Windows 7 computer can you use to stop the print spooler service?


A. MSTSC STOP SPOOLER


B. SPOOLER /END


C. SPOOLER /STOP


D. NET STOP SPOOLER

D. NET STOP SPOOLER




NET STOP SPOOLER from the command prompt will stop the print spooler service. Note that you'll need to open the command line interface with elevated privileges. Right-click and select "Run as administrator."


MSTSC will open a Remote Desktop session, the rest of the command is bogus. There is no SPOOLER command by default in Windows.


Ref. Ch. 28 (8th Ed.)