Which of the following statements is true regarding upgrading to Windows 10 select the best option

A PC has sensitive data that must be destroyed, before the PC is redeployed. A technician has been tasked with completely wiping the PC hard drive. Which of the following methods is BEST for the technician to use? A. Quick format B. FDISK C. Low level format D. Standard format

An attack that creates a website that looks like another website, with the purpose of learning someone's account information is called which of the following? A. Virus B. Shoulder surfing C. Trojan D. Phishing

A technician is creating a batch script that auto-assigns a particular drive share to a drive letter upon login. Which of the following commands can accomplish this? A. NET USE B. PING C. XCOPY D. IPCONFIG

An office of 25 computers is interested in employing a file server, network shares, and print server functionality. Which of the following network setups would be BEST suited for this situation? A. Ad-hoc B. Workgroup C. Domain D. Token ring

Which of the following terms BEST describes the software or hardware used to manage virtual machines? A. Hypervisor B. Cloud Server Manager C. Supervisor D. Virtual Disk Manager

A technician is required to change a setting for HKEY_Local_Machine. Which of the following would the technician use to change this? A. BCEDIT B. WEP setup C. MSCONFIG D. REGEDIT

A technician is working on a PC that utilizes a RAID array for operation. The user of the system has reported that random files are becoming corrupted on creation with no pattern to the activity. One drive in the array is likely failing and causing the read/write failures. Which of the following Types of RAID is MOST likely in use? A. RAID 0 B. RAID 1 C. RAID 5 D. RAID 10

Which of the following Control Panel utilities will allow a technician to change the associated file type in a Windows XP machine? A. Folder options B. Administrator tools C. Accessibility options D. Regional and language options

Which of the following keys, when pressed immediately after the BIOS test, will display Windows Boot Manager on a Windows 7 PC? A. f2 B. f8 C. esc D. delete

Which of the following Windows 7 versions comes with the LARGEST number of multimedia features? A. Enterprise B. Home Premium C. Professional D. Starter

A technician wants to know if a PC has an embedded wireless card. Which of the following tools should be used? A. Device Manager B. Component Services C. Services D. System Configuration

A technician notices multiple disk errors in the Event Viewer. Which of the following tools would BEST diagnose this issue? A. CHKDSK B. FDISK C. BOOTREC D. DISKPART

Which of the following BIOS boot methods allows a system to boot from a remote server? A. PXE B. DVD C. USB D. SATA

Which of the following settings MUST be configured in order to turn on a VoIP phone? A. PoE B. Flow control C. VPN D. Duplex speed

A user is trying to access an application on their home machine from work. The user sets up port forwarding on their router but is still unable to connect to the application. Which of the following should be the user's NEXT step in resolving this issue? A. Configure Wake-on-LAN for the NIC on Work PC. B. Configure a firewall exception on the Home PC. C. Switch Work PC network from "Work" to "Home". D. Disable the Windows firewall on the Home PC.

B. Configure a firewall exception on the Home PC.

Which of the following security threats are MOST often delivered via email? (Select TWO). A. Rootkits B. Phishing C. Shoulder surfing D. Social engineering E. Spam

The customer reports their PC freezes up every day around the same time. Which of the following utilities would be BEST to check for any error codes? A. Windows Updates B. Task Scheduler C. Event Viewer D. Performance Monitor

A user is looking for the Application Data directory in their profile but cannot see it. Which of the following Control Panel options would correct this? A. System B. Display C. User Accounts D. Folder Options

While configuring a new email application that uses POP3 for a customer, the technician determines the firewall is blocking the traffic. Which of the following ports should be opened to allow POP3 mail traffic through the firewall? A. 53 B. 110 C. 443 D. 3389

A user has downloaded and installed a browser add-on that causes the browser to hang. The PC has very slow system response when rebooted. What should a technician do to troubleshoot this problem?

Remove all temporary files, turn off System Restore, update and run an antivirus scan.

A large magnet is placed too close to a CRT monitor. Which of the following will MOST likely occur? A. Dead pixels B. Flickering image C. No image on screen D. Distorted image

In which of the following locations would a technician go to show file extensions? A. Security Center B. Folder Options C. Display D. System

After being relocated to an enclosed position under a desk, a computer experiences intermittent shutdowns. Which of the following conditions is MOST likely the cause? A. Power surges B. Overheating C. APIPA addressing D. RF interference

A technician is fixing a very slow computer. Antivirus and Malware programs have been run, and some detection have been removed. After running Disk Cleanup, the system still seems to be slow, especially with multiple programs running. Which of the following should the technician do NEXT? A. Run CHKDSK B. Manually erase all cookies C. Go back to the latest restore point D. Run defrag

A technician needs to build a PC to act as a home virtual server. Which of the following would be the BEST choice? A. Dual Core CPU, 6GB DDR3 RAM, 320GB of hard drive space B. Dual Core CPU, 8GB DDR RAM, 1TB hard drive C. QUAD Core CPU, 6GB DDR3 RAM, 320GB of hard drive space D. QUAD Core CPU, 4GB DDR2 RAM, 1TB of hard drive space

C. QUAD Core CPU, 6GB DDR3 RAM, 320GB of hard drive space

Windows XP Mode is available in which of the following Microsoft Windows environments? A. Windows Vista Ultimate B. Windows 7 Business Edition C. Windows XP Professional D. Windows Server 2008 R2

B. Windows 7 Business Edition

A user is advised by the software vendor that the user must have elevated privileges in order to run a program. The user should do which of the following to BEST accomplish this? A. Run in Windows XP compatibility mode B. Run the program in a virtual PC environment C. Log out of the system and login under another user's name D. Right click select "run as" and select administrator

D. Right click select "run as" and select administrator

A company wants to prevent non-authorized users from entering into a secure building. Which of the following will BEST mitigate this activity? A. Train users on tailgating B. Implement an escort policy C. Install mantraps D. Require all users to have badges

An employee at a company lost their mobile device that contains proprietary information. Which of the following methods is the BEST to be implemented to prevent unauthorized users from obtaining this information? A. Lock screen pattern B. Cancel mobile service C. Remote wipe D. Six character password

Which of the following is the command line entry to start an archive or restore a process on a Windows XP computer? A. RECOVER B. REPLACE C. NTBACKUP D. COPY

Which of the following would be the QUICKEST means of removing data from a hard drive, when there is no consideration regarding the total destruction of the data? A. Standard format B. Low level format C. Overwrite program D. Drive wipe

Which of the following is MOST effective in preventing security breaches on a network? (Select THREE). A. Bandwidth throttling B. Eliminate password history C. Enable QoS D. Antivirus software E. User education F. Enforced login/logoff hours

D. Antivirus software E. User education F. Enforced login/logoff hours

Which of the following areas of a file system should a standard user have restricted permissions to in order to promote a security best practice? (Select TWO). A. Temporary Internet Files B. My Document Files C. Windows System Files D. Network Files E. Program Files

C. Windows System Files E. Program Files

A user recently purchased a new PC with a 500GB hard drive. However, they are reporting that their C. Drive is only 420GB. Which of the following BEST explains this? A. The manufacturer blocks off that 80GB so that user cannot exceed the drive space. B. The file system is using the 80GB for tables. C. BIOS and systems files are hidden in the 80GB. D. A Factory Recovery Partition is using the 80GB.

D. A Factory Recovery Partition is using the 80GB.

Which of the following are true regarding Windows 32-bit versus Windows 64-bit? ( TWO). A. CPUs that can run Windows 32-bit can also run Windows 64-bit. B. Device drivers for Windows 32-bit and Windows 64-bit are the same. C. Not all CPUs are able to run Windows 64-bit. D. Windws 64-bit can address larger amnts of RAM. E. Windows 64-bit is a more secure OS and less susceptible to viruses.

C. Not all CPUs are able to run Windows 64-bit. D. Windows 64-bit can address larger amounts of RAM.

A technician receives a report that the pages coming out of a laser printer are smearing when touched. Which of the following components should the technician check FIRST to resolve this issue? A. Drum B. Fuser C. Pickup roller D. Corona wire

A user just bought an Android tablet and wants to connect to their work email. The user's employer has a Microsoft Exchange server for email. Which of the following would the technician configure to allow the user to access email on the Android tablet? A. DNS, DHCP B. IMAP, SNTP C. POP3, SMTP D. Devices are incompatible

A technician is working on a user's PC. After testing the theory of the cause, which of the following could the technician perform NEXT? (Select TWO). A. Resolve issue B. Inform user C. New theory or escalate D. Document issue E. Verify system functionality

A. Resolve issue C. New theory or escalate

Which of the following would a technician use to install applications onto an iPad? (Select TWO). A. App Store B. Market Place C. iTunes D. Exchange E. Mobile Market

A technician responds to a hardware issue with a server. The technician discovers that one of the hard drives in the server has failed. The server is set up in a RAID 1 configuration. Which of the following steps would the technician perform NEXT? A. Remove the hard drive and back up the data B. Run CONVERT on the hard drive C. Reboot the server D. Swap hard drive and rebuild array

D. Swap hard drive and rebuild array

When removing the top case from a laptop, which of the following, besides hand tools, should a technician have on hand to assure correct disassembly and reassembly? (Select TWO). A. A millimeter and a toner probe. B. A large cloth to spread the screws and disassembled parts on. C. A writing pad for documentation and a marker to label cables. D. A manufacturer's technical manual for the model of the laptop. E. A container with separated areas to store different size screws.

D. A manufacturer's technical manual for the model of the laptop. E. A container with separated areas to store different size screws.

A user states that when they logon to their computer sometimes they get an IP conflict error. The user computer is configured with a static IP. Which of the following is the problem? A. Duplicate IP exist on the network B. DHCP server needs to be rebooted C. Network adapter driver needs to be updated D. Bad network adapter

A. Duplicate IP exist on the network

A user has recently installed Windows 7 on a computer. They ran Windows updates, updated the firmware and installed a printer. The user accessed a P2P application and now they are getting a large amount of browser pop-ups. Which of the following is MOST likely the cause of the pop-ups? A. Phishing B. Malware C. Proxy redirect D. Firmware

Users are reporting that their laser printer is picking up multiple pages. The printer has very high utilization. Which of the following should be performed to resolve this issue? A. Use a maintenance kit B. Calibrate the printer C. Replace the toner D. Replace the fuser

Which of the following statements is true about XP mode in Windows 7? A. Windows XP mode was only available in Windows Vista and is not available in Windows 7. B. Only the Professional and the Ultimate versions support Windows XP mode. C. All versions of Windows 7 support Windows XP mode when the feature is installed. D. Only the Ultimate version of Windows 7 supports Windows XP mode.

B. Only the Professional and the Ultimate versions support Windows XP mode.

Which of the following is true about a file when it is copied from an NTFS to a FAT32 partitions? A. The file owner is preserved B. All of the file permissions are lost C. All file permissions must be reassigned D. The file name becomes case insensitive

B. All of the file permissions are lost

A technician wants to ensure that only authorized administrators can make configuration changes to the company's wireless router. Which of the following MUST the technician change to prevent unauthorized users from modifying the access point configuration? A. MAC address filters B. Manufacturer password C. Default SSID D. Configure encryption

If a customer wants to create a multi-boot PC with different editions of Windows, which of the following is MOST important to consider? A. Using multiple partitions B. Using multiple hard drives C. Using a single partition D. Using a PXE boot scheme

A. Using multiple partitions

Which of the following utilities would a technician use on a Windows Vista or Windows 7 machine to configure what applications are allowed to send/receive data over the LAN connection? A. Users and Groups B. Windows Firewall C. Registry Editor D. Task Scheduler

A customer needs to setup their laptop for use with a proxy server to browse the web at work. Which of the following areas would a technician need to visit to configure this on a Windows 7 system? A. System Protection B. Security Center C. Windows Firewall D. Internet Options

Which of the following mobile device sync methods is easiest for the end user but requires more configuration on the part of the technician? A. Dock sync B. Encrypted wired sync C. Wireless sync
D. Wired Sync

A PC is powering on but the only activity a technician can see is spinning fans. Which of the following components would MOST likely be at fault for such a condition? (Select TWO). A. SATA controller B. CPU C. Memory D. Hard drive E. Sound card

A user realizes they left their mobile phone in a taxi minutes after the car departs. Which of the following should be done to BEST ensure none of the private data on the phone is accessed? A. Passcode Lock B. GPS Tracking C. Remote Backup D. Remote Wipe

A user's PC has four hard drives in a RAID setup. After a single drive fails, the system will no longer boot and even rescue disks cannot see or access the volume. Which of the following RAID types was the user MOST likely using? A. 0 B. 1 C. 5 D. 6

A technician suspects that a recent virus they removed may have corrupted a necessary system file. Which of the following utilities can the technician use to verify the integrity of these critical files? A. msconfig B. sfc C. regsrv32 D. fixmbr

A corporate end user reports that random keys on their laptop are sticking. After taking the laptop in for repair a technician discovers that soda has been spilled inside the keyboard, possibly reaching other components inside the laptop. Which of the following should the technician do?

Replace the keyboard and clean the interior of the laptop if necessary

Which of the following System Tools would be the BEST one to perform a regular archiving of information on a PC? A. ROBOCOPY B. XCOPY C. Backup D. System Restore

A user states they have to reset the date and time on their computer every day. Which of the following hardware needs to be replaced to resolve this issue? A. Processor B. Hard drive C. CMOS battery D. Memory

A user reports that they are receiving intermittent BSOD error messages. Which of the following tools should a technician use to determine which hardware is failing? A. POST card B. Memory diagnostics C. Performance monitor D. Loopback plug

Which of the following is the correct UNC path to use when mapping a network drive? A. \\share\password B. \\share\server C. \\server\username D. \\server\share

Which of the following can be used to remove a virus from a computer? A. Anti-spyware software B. Anti-malware software C. System Restore D. Event Viewer

A technician is called to assist a customer. The customer reports when they powered on the system, they heard a loud noise, saw a spark, and smelled a burning smell. Which of the following should the technician advise the customer to do FIRST? A. Power on the system, to see if it happens again. B. Immediately notify the fire department. C. Unplug the system from the power source. D. Turn off the circuit breaker to the building

C. Unplug the system from the power source.

Which of the following operating systems is capable of fully utilizing more than 4GB of system RAM? A. Windows Vista Ultimate B. Windows 7 32-bit C. Windows 7 64-bit D. Windows XP Professional

A /all switch is MOST likely to be used with which of the following commands? A. NET B. NBTSTAT C. PING D. IPCONFIG

A user states that their machine is taking much longer to boot than usual. Which of the following utilities would BEST allow a technician to limit what is launched at startup? A. APPWIZ.CPL B. DXDIAG C. MSCONFIG D. REGEDIT

A technician wants to create a customized list of common utilities that are easily accessible in the same location. Which of the following tools would allow them to build such a list? A. MSCONFIG B. MMC C. MSTSC D. MSINFO32

A technician needs to use a command line tool to determine the network name and the IP address of a resource. Which of the following command line tools will provide an IP address when given a name? A. verify B. tracert C. ipconfig D. nslookup

A user wants to configure their network to support VoIP. Which of the following would BEST support a VoIP installation? A. QoS B. POTS C. Wake-on-LAN D. VPN

A user is concerned about an issue with iOS. The user MOST likely has which of the following devices? A. iCloud B. Android Phone C. iPhone D. Windows Tablet

A user has installed a legacy application in Windows 7 and reports that only some of the functionality in it is operational. Another user is using the same application on a different Windows 7 machine and doesn't report those problems. Which of the following features in Windows 7 may be responsible for this problem? A. System Protection settings B. User Account Control C. Action Center D. Data Execution Prevention

A user reports that they are getting frequent delayed write messages throughout the day and are experiencing sluggish performance. The technician suspects that the issue relates to the hard disk drive. Which of the following would BEST help validate the diagnosis? A. System information B. Event viewer C. POST card D. SMART status

A user states that they are having a problem with their word processor on their laptop. Whenever they attempt to type letters with their right hand, numbers and symbols show up instead. Which of the following would address this issue? A. Switch to a standardized font B. Restore regional settings to default C. Toggle the function + num lock combination D. Connect a full sized external keyboard

C. Toggle the function + num lock combination

Which of the following security threats is defined by its self-propagating characteristic? A. Virus B. Rootkit C. Trojan D. Worm

Which of the following features allows for easier navigation of long lists on a tablet device? A. Pinch-zoom B. Multitouch C. Scrollbars D. Touch flow

Which of the following file system types is used primarily for optical media? A. FAT32 B. NTFS C. HPFS D. CDFS

When moving files from a Microsoft gaming console, which of the following command line utilities is recommended to transfer files? A. IMAP B. XCOPY C. DISKPART D. FDISK

What should a technician implement to prevent external contractors from physically plugging devices into the company's network jacks unless such jacks are designated for guest use?

Disable all switch ports when they are not utilized and enable them on an as needed basis.

A small business owner is setting up their wireless network in their office, which is in a building shared with several other businesses. The owner does not want to disable the SSID broadcasting due to visiting customers needing to use the network, but does not want other businesses to notice the network, let alone access it. How could he BEST accomplish this?

Adjust the radio power so that coverage is restricted to the business.

An administrator is concerned about users accessing network shares outside of their job role. Which of the following would BEST prevent this? A. Set up shares with permissions based upon group membership. B. Implement a written policy addressing the issue for all users. C. Monitor access to the network shares using SNMP. D. Prevent remote logins to all network shares and drives.

A. Set up shares with permissions based upon group membership.

A company is looking to donate a collection of old PCs that are no longer needed. Which of the following data destruction methods would be MOST secure for highly sensitive information? A. Simple 1-pass zero overwrite B. Low level 3-pass random wipe C. Low level 7-pass random wipe D. High level format 10 times

C. Low level 7-pass random wipe

A user receives an unsolicited call from a technician claiming to be from a Microsoft certified partner. The technician tricks the user into allowing them access to their PC because of malware alerts that were being broadcasted. Which of the following attacks is this user a victim of? A. Shoulder surfing B. Phishing attack C. Social engineering D. Malware infection

A user's PC breaks and a technician needs to configure a new machine with a copy of their computer image stored on a remote server. Which of the following technologies would help RIS install this image? A. BRD B. DVD C. USB D. PXE E. CD

Which of the following identifies traffic based upon its physical network address? A. Phishing B. Hashing C. MAC filtering D. Geotracking

A technician must secure company documents from accidental disclosure. Which of the following should be implemented? (Select TWO). A. User training B. Anti-malware C. Paper shredding D. Time of day restrictions E. Employee badges F. Mantraps

A. User training C. Paper shredding

Which of the following is TRUE about the difference between a worm and a virus? A. Worms are written in assembly while viruses are written with scripting languages. B. Viruses hide in the boot record while worms hide within the file system. C. Worms self-propagate while viruses need human intervention to replicate. D. Viruses disable the antivirus update service while worms kill the antivirus process.

C. Worms self-propagate while viruses need human intervention to replicate.

A technician is tasked with improving the security of a SOHO network. The office is comprised of a single wireless router located under the front desk where the office manager sits. All desktop computers are wired into the router which is configured with strong device credentials. Additionally, wireless is disabled on the router. What should the technician perform NEXT to improve the security of the SOHO network?

D. Place the router in a locked room.

A technician is setting up automatic login to desktop for a non-domain Windows XP system. Which of the following administrative tools would accomplish this? A. User Accounts B. Network and Sharing Center C. Task Manager D. System Configuration

A user calls the help desk to report their smartphone not being able to make any phone calls. The user admits that the smartphone can still send/receive email, browse websites, and utilize all Internet-capable apps. Which of the following is MOST likely affecting the phone? A. Wi-Fi is off; the cellular antenna is on. B. The cellular antenna is off; Wi-Fi is on. C. The user forgot to turn off Bluetooth before trying to make a call. D. User has 4G turned off, and is only on 2G.

B. The cellular antenna is turned off; Wi-Fi is still on.

A technician is troubleshooting a customer's computer that will not turn on. The user stated that the computer was working fine until there was a thunderstorm the other night. Which of the following tools would the technician use to determine what is wrong with the computer? A. Factory diagnostic CD B. POST card C. Toner probe D. Power supply tester

A senior technician requests a diagnostic tool for checking external ports and connectors on computers and laptops. Which of the following tools would BEST accomplish this task? A. Wireless locator B. Corona wire C. Toner probe D. Loopback plugs

After installing a new printer the organization determines that there are problems printing images and very large files. Which of the following will MOST likely resolve the issue? A. Update the drivers using WHQL drivers B. Install additional memory to each computer C. Install additional memory to the printer D. Apply the latest OS service pack

C. Install additional memory to the printer

Which of the following command line tools will terminate a non-system process without restarting the computer? A. Shutdown B. Kill C. Erase D. Break

After accidentally removing a hard drive from a server with three drives in a RAID 5 configuration, a technician notices the server locks up and shuts down. Which of the following can the technician do to quickly fix the problem? A. Replace the RAID controller and boot. B. Reinsert the drive and boot. C. Plug the drive back in, the system will resume automatically. D. Remove all drives and rebuild the array.

B. Reinsert the drive and boot.

A customer calls an IT consultant to explain an issue they are having with their Windows 7 Professional PC. Windows Update attempts to install patches upon each startup but fails on the same single update. The customer has attempted to re-run Windows Update from Control Panel but the issue remains. What course of action would BEST resolve the problem?

Clearing the Windows Update download cache entirely

A user reports that their wireless connectivity is being spotty. The issue seems to interrupt their wireless signal connection when the laptop screen is tilted forward or backward during operation. When this happens, the entire wireless signal drops out until the screen is left in position for a good minute or so. What MOST likely explains what is happening?

The wireless signal cables are being crimped when the screen is opening/closing.

A user states that they cannot connect to the network or the Internet. The technician determines the issue is that the computer has a static IP address and needs to use DHCP to work correctly. The technician sets the NIC to automatically assign an IP address. Which of the following should the technician perform NEXT?

Confirm the computer is back on the network and has Internet connectivity

After several passes with a malware removal program, the program keeps detecting the same infection after a reboot. Which of the following should be done to attempt to remove the malware? A. Run the malware removal program while disconnected from the Internet B. Run the malware removal program in Windows Safe Mode C. Reinstall the malware removal program from a trusted source D. Set the malware removal program to run each time the computer is rebooted

B. Run the malware removal program in Windows Safe Mode

A user, Joe, calls and states every few hours he is unable to connect to the Internet for several minutes but is able to access internal sites during this time. Which of the following tools would be used to find the issue with the network connection? A. TRACERT B. NETSTAT C. IPCONFIG D. NSLOOKUP

A technician is trying to prevent a local application from reaching the web due to security concerns. Which of the following solutions could BEST prevent the application from reaching the web? (Select TWO). A. Configure the workstation for a static IP B. Disable all wireless network connections C. Remove shortcuts to the application D. Block the application in Windows Firewall E. Change network location to Work F. Reroute the web address in HOSTS file

D. Block the application in Windows Firewall F. Reroute the web address in HOSTS file

For the last year, a company has gathered statistics on the most common security incidents. The highest percentage deals with opening email attachments that contain malware. Which of the following would mitigate this issue without reducing productivity? A. Annual cyber security education B. Update antivirus signatures more often C. Block all email attachments D. Install an IPS on each workstation

A. Annual cyber security education

A company wants to ensure that the latest cyber security threats are known to the employees across the enterprise to minimize occurrences. Which of the following should be implemented? A. Message of the Day B. Email lists C. Company forums D. Regular user education

D. Regular user education

Which of the following operating systems can be upgraded directly to Windows 7 Professional by a default installation? (Select TWO). A. Windows 7 Home Premium B. Windows Vista Business C. Windows XP Home D. Windows XP Professional 64-bit E. Windows XP Media Center

A. Windows 7 Home Premium B. Windows Vista Business

A technician has finished replacing the network card in a laptop and has verified full system functionality. Which of the following troubleshooting steps should the technician take NEXT? A. Change to user MAC filtering B. Change default usernames and passwords C. Disable the SSID from broadcasting D. Enable static IP addresses

B. Change default usernames and passwords

A technician has configured the ability to connect to a small office server using remote desktop from a workstation within the office. The technician has reviewed logs that show constant brute force attacks to that server from outside the network. Which of the following would prevent this? A. Configure the server to use a static IP B. Logically move the server to the DMZ C. Reallocate server to different networking closet D. Disable the remote desktop port

D. Disable the remote desktop port

Which of the following is an example of client-side virtualization? A. Compatibility mode on a program icon properties menu B. Running a DOS application on a Windows 7 32-bit operating system C. Cloud hosted office applications D. XP mode running in Windows 7 64-bit operating system

D. XP mode running in Windows 7 64-bit operating system

Laptops and tablets have which of the following in common? A. Solid state drives B. Contain an accelerometer C. No field serviceable parts D. Not upgradable

Joe, a technician, would like to map a network drive when he starts up his computer in the morning. Which of the following commands would he use to accomplish this task? A. NSLOOKUP B. NETSTAT C. NBTSTAT D. NET

A local administrator would like to determine why a laptop is taking so long to boot into the operating system. Which of the following tabs in MSCONFIG would the administrator access to BEST determine this? A. Startup B. Tools C. General D. Boot

A user, Ann, reports that she suspects her workstation has malware. Joe, the technician, confirms malware exists and starts the process of removing the malware. Which of the following is the FIRST step he should take in removing the malware? A. Disable antivirus B. Disable system restore C. Enable hard drive encryption D. Format the hard drive

B. Disable system restore

A user reports paper jams at the location of the paper trays. Which of the following components would need to be replaced to resolve this issue? A. Fuser B. Duplexer C. Pickup roller D. Imaging drum

A user has plugged in a mobile phone to a PC and received a message that the driver was not successfully installed. Which of the following system tools should be used to troubleshoot this error? A. Device Manager B. Component Services C. Windows Memory Diagnostics D. Data Sources

On a corporate network, which of the following features would be used to redirect network traffic for filtering or monitoring? A. Content Advisor B. Proxy Settings C. Network Drive Mapping D. Local Security Policy

Which of the following describes when an application is able to reuse Windows login credentials? A. Access control list B. Principle of least privilege C. Single sign-on D. Pass-through authentication

In order to prevent other users from editing files in `C:\ Files', which of the following steps should be taken? A. Set NTFS permissions to read only B. Set the folder to index files for search C. Set the local administrator as the owner of the folder D. Set network share permissions to read only

A. Set NTFS permissions to read only

Which of the following security threats requires the attacker to be physically located near the target machine? A. Shoulder surfing B. Social engineering C. Phishing D. Rootkit

A technician recently replaced a user's monitor and now the user is reporting that the screen is filled with static and appears distorted. Which of the following will resolve the issue? A. Lower refresh rate B. Lower the resolution C. Raise the resolution D. Increase refresh rate

A user recently installed a new video driver on a PC but now it will not boot. Which of the following is the BEST option to correct the issue? A. Automated system recovery B. Emergency repair disks C. FIXBOOT D. Safe mode

An unauthorized user observing system security procedures is known as: A. a worm. B. shoulder surfing. C. phishing. D. spyware.

Privacy filters applied to users computer screens are used to combat which of the following security risks? A. Rootkits B. Spear phishing C. Shoulder surfing D. Social Engineering

A critical server was replaced overnight. The next morning, some users (only those who shut their computers down) report that they are unable to browse to the Internet . A technician looks at the following report from a workstation with no connectivity: IP Address: 192.168.1.101; Netmask: 255.255.255.0 DHCP Server:192.168.1.1; DNS Server:192.168.1.2 Default Gateway:192.168.1.1 Given the report, what is blocking the Internet ?

The DHCP server is misconfigured.

Which of the following is solely designed to avoid detection by an antivirus program by using the underlying operating system to its advantage? A. Rootkit B. Virus C. Trojan D. Worm

Joe, a technician, receives an error message on his tower PC just after POST which reads: "WARNING! Your drive is about to fail. Please back up your data and run full drive diagnostics." Which of the following is generating this error message? A. CHKDSK B. S.M.A.R.T. C. eSATA D. QoS

A technician is trying to recover some files for a user from a damaged laptop. Since the Windows installation has been corrupted and does not boot, she plugs the drive into a bench system to attempt a recovery. After trying to access the drive on the bench computer, the following message is displayeD. "Access Denied. Please Enter Encryption Password." What is the reason that this error is displayed?

D. BitLocker is being used

A technician is trying to recover some files for a user from a damaged laptop. Since the Windows installation has been corrupted and does not boot, she plugs the drive into a bench system to attempt a recovery. After trying to access the drive on the bench computer, the following message is displayeD. "Access Denied. Please Enter Encryption Password." What is the reason that this error is displayed?

D. BitLocker is being used

A technician is tasked with repairing a Windows 7 system including the removal of recently installed files and software. Which of the following system restoration methods would be the LEAST destructive way to achieve this? A. System Restore B. System Image Recovery C. CHKDSK D. Windows Memory Diagnostic

A user, Ann, reports that her computer is able to connect to devices on her local network but not on the remote office network. Ann's computer shows the following ipconfig information: IP address: 192.168.10.45; Subnetmask: 255.255.255.0 Gateway: 192.168.11.1; DNS server 1: 192.168.10.2 DNS server 2: 8.8.8.8 Which is causing the problem ? A. DNS server 2 is set incorrectly.; B. DNS server 1 is set incorrectly. ; C. IP address is set incorrectly. D. Gateway is set incorrectly.

D. Gateway is set incorrectly.

Ann reports that printouts from the department laser printer have become faded. She has already replaced the toner cartridge. Which of the following is the MOST likely component causing the faded printing? A. Transfer roller B. Fusing assembly C. Registration assembly D. Duplexing assembly

A user reports that her laptop will no longer connect to wireless. Joe, a technician, checks the device manager and does not see a wireless networking card or any unknown devices. What should Joe do FIRST?

A. Check to make sure the wireless card was not turned off via the hardware switch or keyboard shortcut.

Which of the following passwords is the MOST secure according to industry best practices? A. VeryStrongPassword B. SimpleCorrect Answer1234 C. E@sy2Remember D. thisisthecorrectCorrect Answer1

A user, Joe, has just finished upgrading his computer with a wireless keyboard/mouse combination, additional memory, installed new speakers, and replaced his 15 inch flat screen with a 24 inch flat screen. When he boots the computer it immediately starts making a loud beeping noise and will go no further in the boot process. Which of Joe's system upgrades is the cause of the problem?

A PC uses RAID 1. Ann, a technician, has read in the event log that the drive "SATA 1" is no longer in sync with drive "SATA

A. Remove SATA 1 from RAID group then re-add it

A user, Ann, receives a call from Joe who states that he is brand new in the help desk. Joe states that he needs to update Ann's email client to prevent corruption. At Joe's request, Ann discloses her user name and password. She later discovers that Joe is not a member of the help desk. Which of the following has occurred? A. Social engineering   B. Phishing C. Spear phishing   D. Hijacking

Ann recently upgraded a computer from Windows XP to Windows 7, but one of her applications does not work now. Which of the following should be done FIRST? A. Set the application to run in XP compatibility mode B. Reinstall Windows XP C. Configure a dual boot with XP and 7 D. Install the application in XP mode

A. Set the application to run in XP compatibility mode

Which of the following security best practices would prevent a program on a CD from immediately launching when inserted into a computer? A. MSCONFIG >Startup Tab B. Disable the Guest account C. Rename the Administrator account D. Disable autorun E. Restrict user permissions

Which of the following is one of the major differences between a new tablet and a new laptop computer? A. Tablet has no field serviceable parts. B. Laptop has less field functionality. C. Tablet has faster Ethernet capability. D. Laptops have slower responsiveness than tablets.

A. Tablet has no field serviceable parts.

Ann, a home user, brings a Windows XP PC in for repair & reports several disk read errors are occurring. She has run check disk and errors have been reported several times. Which of the following should a tech recommend? (TWO). A. Increase amount of RAM to improve disk checks B. Backup all data on the drive C. Upgrade to a home server D. Purchase a new hard drive E. Change the drive configuration to RAID   F. Upgrade to Windows 7 Professional

B. Backup all data on the drive D. Purchase a new hard drive

Which of the following data types can be synchronized to a mobile device by default? (Select TWO). A. Biometric information B. Pictures C. Contacts D. Credentials E. SMS

Which of the following mobile device features disables cellular and wireless communication? A. Hotspot Mode B. Pairing Mode C. Settings Reset D. Airplane Mode

Ann, a user, has brought her laptop in for service. She reports that her battery is at 100%, but whenever it is unplugged it immediately shuts down. Which of the following should the technician do? A. Replace the battery B. Change power settings to balanced C. Replace the power adapter D. Enable APM in the BIOS

A technician recently created an email account for a new user, Joe. On the second day, Joe reports his email account is full of spam even though he has not given out his address. Which of the following should the technician do to resolve the issue? A. Turn on windows firewall B. Click the unsubscribe link in the spam C. Run an anti-spyware scan D. Install privacy filter

C. Run an anti-spyware scan

Order, Most to Least: Enterprise Home Premium Professional Starter Ultimate

Ultimate, Enterprise, Professional, Home Premium, Starter

A user is having trouble connecting to the Internet. Which of the following commands should a technician use, from the user's workstation, to ensure that the workstation has a valid IP address? A. NETSTAT B. PING C. IPCONFIG D. TRACERT

Which of the following operating systems supports full BitLocker functionality? A. Windows XP B. Windows 7 Professional C. Windows Vista Home D. Windows 7 Enterprise

Which of the following protocols could a technician use to connect a smartphone to an email server? (Select TWO). A. SMTP B. POP3 C. HTTP D. SNTP E. ICMP

Which of the following should a technician do FIRST to secure a mobile device? A. Assign a passcode B. Download updates C. Disable GPS D. Install antivirus

When running Windows XP, which of the following would give a list of switches for the CHKDSK command? A. chkdsk ~? B. chkdsk :? C. chkdsk /? D. chkdsk \?

Which of the following commands would a technician use to move one directory above or below the one the technician is currently in? A. DIR B. RD C. CD D. MD

A virtual machine running locally would be BEST utilized in which of the following situations? A. On a PC with minimal RAM B. Patch testing before rollout C. Thick client configuration D. Gaming workstation configuration

B. Patch testing before rollout

A user states that the computer takes a long time to load the desktop after login. Which of the following tools should be used to help remediate the problem? A. Disk Management B. FIXMBR C. MSCONFIG D. SFC

Which of the following security threats involve shoulder surfing and phone phishing? A. Man-in-the-Middle B. Social engineering C. Trojan virus D. Spyware

Which statement best describes the Windows 10 feature updates?

Which statement best describes the Windows 10 Feature Updates? These are cumulative monthly updates. These provide emergency hotfixes and security patches.

Which of the following is a Windows feature that enables a computer to find other computers and devices such as printers on a connected network?

Network discovery is turned on for home networks, which allows you to see other computers and devices on the network and allows other network users to see your computer. Work network Choose this network for small office or other workplace networks.

Which utility is no longer in the Control Panel in Windows 10?

But Homegroup has now been removed from Windows 10. And the Homegroup applet is no longer available on the Windows 10 control panel. If you are setting up a Homegroup and Windows 7, 8, or 8.1, you want to make sure that your network profile is set to home. You can then create a Homegroup.

What Windows 10 tool can be used to move desktop settings and applications from one computer to another?

Windows Easy Transfer is a software wizard for transferring files and settings from one computer that is running Windows to another. It helps you select what to move to your new computer, enables you to set which migration method to use, and then performs the transfer.