John Valdes
Quiz von , erstellt am more than 1 year ago

Quiz am CompTia A+ 902 Exam Practice, erstellt von John Valdes am 17/04/2017.

56
2
0
John Valdes
Erstellt von John Valdes vor etwa 7 Jahre
Schließen

CompTia A+ 902 Exam Practice

Frage 1 von 90

1

An engineer working with large detailed CAD files notices over time that the workstation is
taking significantly longer to open files that used to launch quickly. Other applications work
fine, and the engineer confirms all of the data has been backed up the night before. A
technician determines that the workstation is about two years old. Which of the following
would be the technicians FIRST step in troubleshooting the problem?

Wähle eine der folgenden:

  • Run defrag on the hard drive

  • Restore the CAD files from backup

  • Replace the hard drive

  • Remove and reinstall the CAD software

Erklärung

Frage 2 von 90

1

A technician is trying to prevent a local application from reaching the web due to security
concerns. Which of the following solutions could BEST prevent the application from
reaching the web? (Select TWO).

Wähle eine oder mehr der folgenden:

  • Configure the workstation for a static IP

  • Disable all wireless network connections

  • Remove shortcuts to the application

  • Block the application in Windows Firewall

  • Change network location to Work

  • Reroute the web address in HOSTS file

Erklärung

Frage 3 von 90

1

When securing a mobile device, which of the following types of screen locks is the MOST
secure?

Wähle eine der folgenden:

  • Fingerprint lock

  • Swipe lock

  • Passcode lock

  • Face lock

Erklärung

Frage 4 von 90

1

A user reports several technicians have been unable to solve a problem and requests that
the technician on the phone comes out to fix the problem because the user is unable to
work. After the technician has effectively communicated a willingness to help, which of the
following is the NEXT step?

Wähle eine der folgenden:

  • Allow the user to speak with a supervisor.

  • Identify the problem.

  • Establish a theory.

  • Immediately go to the user’s office.

Erklärung

Frage 5 von 90

1

A technician is instructed to configure a new workstation to boot the OS from the network.
The technician must enable which of the following FIRST?

Wähle eine der folgenden:

  • PXE

  • WOL

  • WiFi

  • UPNP

Erklärung

Frage 6 von 90

1

A customer calls an IT consultant to explain an issue they are having with their Windows 7
Professional PC. Windows Update attempts to install patches upon each startup but fails
on the same single update. The customer has attempted to re-run Windows Update from
Control Panel but the issue remains. Which of the following courses of action would BEST
resolve the problem?

Wähle eine der folgenden:

  • Running a full DEFRAG on the system

  • Clearing the AppData temp folder entirely

  • Clearing the Windows Update download cache entirely

  • Uninstalling the Windows Update feature in Windows 7 and reinstalling it directly from the Microsoft website

Erklärung

Frage 7 von 90

1

A technician is tasked with setting up a users webmail on a tablet, phone, and laptop. The
user would like the data synced to all three devices. Which of the following items can be
synced to the devices via webmail? (Select THREE).

Wähle eine oder mehr der folgenden:

  • Free/busy

  • Programs

  • Documents

  • Calendar

  • Favorites

  • Social media

  • Contacts

Erklärung

Frage 8 von 90

1

A technician has imported a .dll to fix a missing .dll issue on a PC. The application still does
not run correctly and is reporting that the .dll is missing. Which of the following tools would
the technician use to complete the import of the .dll?

Wähle eine der folgenden:

  • gpresult

  • msconfig

  • regedit

  • gpupdate

  • regsrv32

Erklärung

Frage 9 von 90

1

A user receives an unsolicited call from a technician claiming to be from a Microsoft
certified partner. The technician tricks the user into allowing them access to their PC
because of malware alerts that were being broadcasted. Which of the following attacks is
this user a victim of?

Wähle eine der folgenden:

  • Shoulder surfing

  • Phishing attack

  • Social engineering

  • Malware infection

Erklärung

Frage 10 von 90

1

Which of the following security threats requires the attacker to be physically located near
the target machine?

Wähle eine der folgenden:

  • Shoulder surfing

  • Social engineering

  • Phishing

  • Rootkit

Erklärung

Frage 11 von 90

1

A user, Ann, reports that her laptop will no longer connect to wireless. Joe, a technician,
checks the device manager and does not see a wireless networking card or any unknown
devices. Which of the following should Joe do FIRST?

Wähle eine der folgenden:

  • Check to make sure the wireless card was not turned off via the hardware switch or keyboard shortcut.

  • Install a USB wireless card to ensure that Windows networking is working properly.

  • Open the laptop and reseat the network card and both antennas.

  • Download and install the latest wireless driver from the manufacturer’s website.

Erklärung

Frage 12 von 90

1

For the last year, a company has gathered statistics on the most common security
incidents. The highest percentage deals with opening email attachments that contain
malware. Which of the following would mitigate this issue without reducing productivity?

Wähle eine der folgenden:

  • Annual cyber security education

  • Update antivirus signatures more often

  • Block all email attachments

  • Install an IPS on each workstation

Erklärung

Frage 13 von 90

1

A user prefers an external monitor, mouse, and keyboard for a laptop. The user does not
want to use the built-in screen; however, when the laptop lid is closed, it goes into sleep
mode. Which of the following Control Panel items can be used to disable this feature?

Wähle eine der folgenden:

  • Action Center

  • System

  • Display Settings

  • Power Options

Erklärung

Frage 14 von 90

1

An administrator wants to give a user limited access rights in Windows Vista so that the
user can install printers and create local user accounts. Which of the following accounts
should the administrator create for the user?

Wähle eine der folgenden:

  • Power user

  • Administrator

  • Standard

  • Guest

Erklärung

Frage 15 von 90

1

Ann, a home user, brings a Windows XP PC in for repair and reports that several disk read
errors are occurring. She has run check disk and errors have been reported several times.
Which of the following should a technician recommend? (Select TWO).

Wähle eine oder mehr der folgenden:

  • Increase the amount of RAM to improve disk checks

  • Backup all data on the drive

  • Upgrade to a home server

  • Purchase a new hard drive

  • Change the drive configuration to RAID 0

  • Upgrade to Windows 7 Professional

Erklärung

Frage 16 von 90

1

A network administrator is unable to install programs on a workstation. Which of the
following is MOST likely the reason the administrator is not able to install applications?

Wähle eine der folgenden:

  • The workstation is victim of a denial of service attack.

  • The username is not authenticating on the network.

  • The username is not part of the local administrator group.

  • The administrator has not applied appropriate security patches.

Erklärung

Frage 17 von 90

1

A user is experiencing a software application error. The user contacts a technician for
support. Which of the following will allow the user to issue an invitation to the technician in
this scenario?

Wähle eine der folgenden:

  • Remote desktop

  • Remote assistance

  • telnet

  • FTP

Erklärung

Frage 18 von 90

1

An end user needs to completely re-install Windows 7 on a home computer but it did not
come with any OS discs. How would a technician accomplish this?

Wähle eine der folgenden:

  • Recovery partition

  • Primary partition

  • System restore

  • System refresh

Erklärung

Frage 19 von 90

1

A technician has been tasked with loading the operating system on every PC with a blank
hard drive on a network. The technician wishes to install the operating system with minimal
physical interaction with the PCs. Which of the following is the BEST way to accomplish
this?

Wähle eine der folgenden:

  • Clone the operating system from an image onto optical media.

  • Use the original software media to load the operation system on every PC.

  • Set up a central image that the PCs can load from a PXE boot.

  • Create an image and copy it from a USB drive using an unattended answer file.

Erklärung

Frage 20 von 90

1

A technician is tasked with improving the security of a SOHO network. The office is
comprised of a single wireless router located under the front desk where the office
manager sits. All desktop computers are wired into the router which is configured with
strong device credentials. Additionally, wireless is disabled on the router. Which of the
following should the technician perform NEXT to improve the security of the SOHO
network?

Wähle eine der folgenden:

  • Disable the router’s remote management feature.

  • Enable WPA2 wireless encryption.

  • Change the router’s default admin name and password.

  • Place the router in a locked room.

Erklärung

Frage 21 von 90

1

Ann, a user, has a phablet for personal and work usage. She finds that her phablet starts to
exhibit slow performance after a couple of hours and that the problem worsens as the day
goes by. If Ann restarts the device, it works fine for a couple of hours and then starts to run
slow again. Which of the following is the BEST action to troubleshoot this problem?

Wähle eine der folgenden:

  • Check running apps

  • Reset to factory default

  • Disable cloud syncing

  • Replace the device’s battery

Erklärung

Frage 22 von 90

1

A user needs their email set up on their iOS device. The email needs to synchronize all
changes made with the server and the PC. Which of the following would the technician use
to accomplish this?

Wähle eine der folgenden:

  • IMAP

  • SMTP

  • SMNP

  • POP3

Erklärung

Frage 23 von 90

1

A customer with a PC has requested assistance setting up Windows 7 parental controls
within the web browser. The customer would like to limit how much time a child can spend
on a particular website. Which of the following tabs under Internet Options will allow the
user to create those settings?

Wähle eine der folgenden:

  • Privacy

  • Advanced

  • Security

  • Content

Erklärung

Frage 24 von 90

1

On a corporate network, which of the following features would be used to redirect network
traffic for filtering or monitoring?

Wähle eine der folgenden:

  • Content Advisor

  • Proxy Settings

  • Network Drive Mapping

  • Local Security Policy

Erklärung

Frage 25 von 90

1

A user reports that their wireless connectivity is being spotty. The issue seems to interrupt
their wireless signal connection when the laptop screen is tilted forward or backward during
operation. When this happens, the entire wireless signal drops out until the screen is left in
position for a good minute or so. Which of the following MOST likely explains what is
happening?

Wähle eine der folgenden:

  • The hinges on the laptop screen are not strong enough to support the wireless signal cables.

  • The wireless card is losing contact to its socket when the screen is opening/closing.

  • The laptop is designed to work optimally with wireless when the screen is at a perfect 90 degree angle.

  • The wireless signal cables are being crimped when the screen is opening/closing.

Erklärung

Frage 26 von 90

1

A technician has been informed by the IT security manager that a vulnerability has been
discovered in the wireless router. The vulnerability could allow an attacker to take remote
control of the device. Which of the following should the technician perform to address the
issue?

Wähle eine der folgenden:

  • Power off the device

  • Install an add-on card

  • Update the WiFi antenna

  • Update firmware

Erklärung

Frage 27 von 90

1

Which of the following updates should be performed on a regular basis to ensure the OS
has the latest security patches?

Wähle eine der folgenden:

  • Anti-malware updates

  • Driver updates

  • Windows updates

  • Firmware updates

Erklärung

Frage 28 von 90

1

A customer has recently installed several applications on a Windows 7 workstation and is
now experiencing slow system performance and spontaneous restarts. After removing
some of the recently installed applications, the issue persists. Which of the following tools
could the technician use to troubleshoot the problem while preventing data loss?

Wähle eine der folgenden:

  • Factory restore

  • SecureBoot

  • msconfig

  • diskpart

Erklärung

Frage 29 von 90

1

A technician has configured the ability to connect to a small office server using remote
desktop from a workstation within the office. The technician has reviewed logs that show
constant brute force attacks to that server from outside the network. Which of the following
would prevent this from occurring?

Wähle eine der folgenden:

  • Configure the server to use a static IP

  • Logically move the server to the DMZ

  • Reallocate the server to a different networking closet

  • Disable the remote desktop port

Erklärung

Frage 30 von 90

1

Which of the following file system types is used primarily for optical media?

Wähle eine der folgenden:

  • FAT32

  • NTFS

  • HPFS

  • CDFS

Erklärung

Frage 31 von 90

1

A technician has purchased a new surge protector to protect equipment in the production
environment. The surge protectors features safeguard the connected equipment by
directing surges to the:

Wähle eine der folgenden:

  • path of shortest conductance.

  • path of lowest inductance.

  • path of highest voltage.

  • path of least resistance.

Erklärung

Frage 32 von 90

1

A technician is using a domain account to access files located on a server at the path
\\computername\C$. The technician receives an Access denied error message. Which of
the following is MOST likely the cause of the error?

Wähle eine der folgenden:

  • The server is no longer accepting connections since reaching its limit of open shares.

  • The password is incorrect, requiring the user to reset it before authentication will proceed.

  • The username should be prefixed by the domain, followed by a backslash (e.g., domain\username).

  • The account does not have local administrative permissions to access the server share.

Erklärung

Frage 33 von 90

1

Which of the following is a security threat that disguises itself as legitimate software?

Wähle eine der folgenden:

  • Trojan

  • Worm

  • Virus

  • Spyware

Erklärung

Frage 34 von 90

1

Which of the following will help to protect an organization from further data exposure
AFTER a list of user passwords has already been leaked due to policy breach? (Select
TWO)

Wähle eine oder mehr der folgenden:

  • Use multi-factor authentication

  • Require strong passwords

  • Enable file encryption

  • Educate end users

  • Restrict user permissions

Erklärung

Frage 35 von 90

1

A technician has been tasked with disposing of hard drives that contain sensitive employee
data. Which of the following would be the BEST method to use for disposing of these
drives?

Wähle eine der folgenden:

  • Recycling

  • Shredding

  • Overwriting

  • Reformatting

Erklärung

Frage 36 von 90

1

A Windows workstation is suspected of having malicious software that created an infected
start-up item or service. Which of the following tools would a technician use to test this
theory?

Wähle eine der folgenden:

  • chkdsk

  • msconfig

  • dxdiag

  • ipconfig

Erklärung

Frage 37 von 90

1

A user needs to shrink the partition size of a hard drive encrypted with BitLocker. Which of
the following is the BEST option to modify the size of the partition?

Wähle eine der folgenden:

  • Credential Manager

  • Computer Management

  • Device Manager

  • TPM Manager

Erklärung

Frage 38 von 90

1

A technician has finished replacing the network card in a laptop and has verified full system
functionality. Which of the following troubleshooting steps should the technician take
NEXT?

Wähle eine der folgenden:

  • Document findings, actions, and outcomes

  • Escalate problem to a senior technician

  • Re-establish new theory of probable cause

  • Perform a full system backup

Erklärung

Frage 39 von 90

1

When the computer is turned on it emits a series of beeps and does not POST. This can be
caused by a bad:

Wähle eine der folgenden:

  • CMOS battery.

  • video card.

  • IDE cable.

  • floppy cable.

Erklärung

Frage 40 von 90

1

A user in a corporate environment needs to have a laptop device repaired and takes the
device to the appropriate technician. Which of the following should the technician offer to
the user in order to maintain professionalism?

Wähle eine der folgenden:

  • Ask to user to wait in the area while repairs are being made.

  • Offer a temporary loaner laptop for the user to work on.

  • Inform the user that it will be ready “sometime” and to come back later.

  • Ask the user to bring the laptop back when the department is less busy.

Erklärung

Frage 41 von 90

1

A technician is installing Bluetooth speakers in a conference room. Which of the following
will be the average operating range of the speakers?

Wähle eine der folgenden:

  • 10 feet (3 meters)

  • 15 feet (5 meters)

  • 30 feet (9 meters)

  • 45 feet (14 meters)

Erklärung

Frage 42 von 90

1

Which of the following Windows utilities would MOST likely be used to identify system
errors?

Wähle eine der folgenden:

  • System Restore

  • Event Viewer

  • Security Center

  • Windows Defender

Erklärung

Frage 43 von 90

1

Ann, a customer, reports that when she occasionally works in the office basement, her
smartphone battery drains faster than normal and she has poor cellular reception. Which of
the following is the reason for the fast battery drain?

Wähle eine der folgenden:

  • Unpaired Bluetooth

  • Weak signal

  • Defective SD card

  • Malware

Erklärung

Frage 44 von 90

1

The type of security threat that uses computers or other networks to accept and pass on
viruses is called:

Wähle eine der folgenden:

  • phishing.

  • botnets.

  • logic bomb.

  • man-in-the-middle.

Erklärung

Frage 45 von 90

1

A user, Joe, calls and states every few hours he is unable to connect to the Internet for
several minutes but is able to access internal sites during this time. Which of the following
tools would be used to find the issue with the network connection?

Wähle eine der folgenden:

  • TRACERT

  • NETSTAT

  • IPCONFIG

  • NSLOOKUP

Erklärung

Frage 46 von 90

1

A company has subscribed to a cloud service, paying monthly for a block of services and
being billed incrementally when they exceed the monthly fee. Which of the following cloud
concepts does this represent?

Wähle eine der folgenden:

  • Measured service

  • Rapid elasticity

  • On-demand

  • Resource pooling

Erklärung

Frage 47 von 90

1

A user has a new web email account and asks a technician for help with setting up email
on a tablet. The user would like for the email to only be stored on this tablet. Which of the
following email server setting types would the technician use to accomplish this task?

Wähle eine der folgenden:

  • POP3

  • IMAP

  • S/MIME

  • SMTP

Erklärung

Frage 48 von 90

1

A technician has just installed a video card in a PC. The video card is not working, although
it was working fine on the test bench. Which of the following Windows tools should the
technician use to start troubleshooting the problem?

Wähle eine der folgenden:

  • Task Manager

  • Device Manager

  • System Configuration

  • Computer Management

Erklärung

Frage 49 von 90

1

A technician must secure company documents from accidental disclosure. Which of the
following should be implemented? (Select TWO).

Wähle eine oder mehr der folgenden:

  • User training

  • Anti-malware

  • Paper shredding

  • Time of day restrictions

  • Employee badges

  • Mantraps

Erklärung

Frage 50 von 90

1

A technician receives a helpdesk ticket about an employee having a problem sending text
messages with a company Android smartphone. It has been determined that it is not a
carrier issue. Which of the following should the technician perform FIRST?

Wähle eine der folgenden:

  • Verify data connectivity

  • Reformat the MicroSD card

  • Replace the SIM card

  • Perform a soft restore

Erklärung

Frage 51 von 90

1

A user needs to connect securely to the company network while working from a hotel room.
Which of the following would the user need available to accomplish this?

Wähle eine der folgenden:

  • AES

  • VPN

  • UTM

  • WPA2

Erklärung

Frage 52 von 90

1

A local administrator would like to determine why a laptop is taking so long to boot into the
operating system. Which of the following tabs in MSCONFIG would the administrator
access to BEST determine this?

Wähle eine der folgenden:

  • Startup

  • Tools

  • General

  • Boot

Erklärung

Frage 53 von 90

1

A users PC breaks and a technician needs to configure a new machine with a copy of their
computer image stored on a remote server. Which of the following technologies would help
RIS install this image?

Wähle eine der folgenden:

  • BRD

  • DVD

  • USB

  • PXE

  • CD

Erklärung

Frage 54 von 90

1

Which of the following is the FASTEST way for a user to synchronize data between an
iPhone and a work PC?

Wähle eine der folgenden:

  • Transfer data via WiFi Direct to the user’s laptop.

  • Use Bluetooth to share data from the phone.

  • Connect the iPhone’s USB cable and use iTunes.

  • Copy the data from the phone to a MicroSD card.

Erklärung

Frage 55 von 90

1

A customer is reporting a burning smell coming from a CRT monitor. Which of the following
should be taken into consideration before attempting to resolve the customers issue?

Wähle eine der folgenden:

  • Disconnect power before inspecting the CRT power supply

  • CRT monitors should be serviced by qualified personnel

  • Have compressed air available to clear out the debris

  • Wear safely goggles to protect from the cathodes

Erklärung

Frage 56 von 90

1

Ann, a technician, is trying to recover some files for a user from a damaged laptop. Since
the Windows installation has been corrupted and does not boot, Ann plugs the drive into a
bench system to attempt a recovery. After trying to access the drive on the bench
computer, the following message is displayeD. Access Denied. Please Enter Encryption
Password. Which of the following is the reason that this error is displayed?

Wähle eine der folgenden:

  • The hard drive is experiencing S.M.A.R.T. failure errors

  • The TPM security chip inside the bench system is not enabled

  • The BIOS of the bench system is out of date

  • BitLocker is being used

Erklärung

Frage 57 von 90

1

A small business owner is setting up their wireless network in their office, which is in a
building shared with several other businesses. The owner does not want to disable the
SSID broadcasting due to visiting customers needing to use the network, but does not want
other businesses to notice the network, let alone access it. Which of the following would
BEST accomplish this?

Wähle eine der folgenden:

  • Configure the access point encryption from unsecured access to WEP.

  • Adjust the radio power so that coverage is restricted to the business.

  • Change the SSID to reflect the business name instead of a public access point.

  • Enable MAC filtering and restrict access to other company’s devices.

Erklärung

Frage 58 von 90

1

A technician is in need of a device that would give the BEST network protection within a
single device. Which of the following devices would the technician use?

Wähle eine der folgenden:

  • NLX

  • IDS

  • UTM

  • ATX

Erklärung

Frage 59 von 90

1

A technician opens a customers computer and sees large amounts of accumulated dust.
Which of the following is the BEST method of removing the dust from the computer?

Wähle eine der folgenden:

  • Use compressed air to free the dust from the components and remove it with an ESD vacuum.

  • Dampen an ESD cloth with denatured alcohol and use it to gently wipe the dust away.

  • Use a shop vacuum with enough power to ensure all dust has been removed.

  • Remove as much dust as possible by hand and use compressed air to blow the rest out.

Erklärung

Frage 60 von 90

1

A customer reports very slow wireless connection speeds in the new office. Which of the
following tools should a technician use to troubleshoot the issue?

Wähle eine der folgenden:

  • WiFi analyzer

  • Loopback plug

  • Signal booster

  • Packet sniffer

Erklärung

Frage 61 von 90

1

A technician suspects that a computer issue is caused by a failed NIC. Following the
troubleshooting theory, which of the following is the NEXT step the technician should take?

Wähle eine der folgenden:

  • Identify the problem

  • Document findings, actions and outcome

  • Verify full system functionality

  • Establish a theory of probable cause

  • Test the theory to determine cause

Erklärung

Frage 62 von 90

1

An administrator is in a Remote Assistance session, sharing a users desktop. While trying
to map a shared network drive for the user, an access denied error is encountered while
using the users credentials. Which of the following should be the administrators NEXT
step?

Wähle eine der folgenden:

  • Ensure the user’s account is not locked out

  • Use the fully qualified domain name of the share

  • Open the location with administrator privileges

  • Try mapping with a different drive letter

Erklärung

Frage 63 von 90

1

After accidentally removing a hard drive from a server with three drives in a RAID 5
configuration, a technician notices the server locks up and shuts down. Which of the
following can the technician do to quickly fix the problem?

Wähle eine der folgenden:

  • Replace the RAID controller and boot.

  • Reinsert the drive and boot.

  • Plug the drive back in, the system will resume automatically.

  • Remove all drives and rebuild the array.

Erklärung

Frage 64 von 90

1

A company wants to ensure that the latest cyber security threats are known to the
employees across the enterprise to minimize occurrences. Which of the following should be
implemented?

Wähle eine der folgenden:

  • Message of the Day

  • Email lists

  • Company forums

  • Regular user education

Erklärung

Frage 65 von 90

1

Which of the following command line tools will terminate a non-system process without
restarting the computer?

Wähle eine der folgenden:

  • Shutdown

  • Kill

  • Erase

  • Break

Erklärung

Frage 66 von 90

1

A company is concerned about users tailgating into restricted areas. In order to prevent
unauthorized users from following others, which of the following should be implemented?

Wähle eine der folgenden:

  • Biometric locks

  • CCTV

  • Mantraps

  • Badge readers

Erklärung

Frage 67 von 90

1

Which of the following should a technician implement to prevent external contractors from
physically plugging devices into the companys network jacks unless such jacks are
designated for guest use?

Wähle eine der folgenden:

  • Disable DHCP and assign a static IP address to each network device physically connected to the network.

  • Enable MAC address filtering across all network jacks and record the MAC address of guest devices.

  • Disable all switch ports when they are not utilized and enable them on an as needed basis.

  • Place guest network jacks in public areas and all other jacks in secure areas as needed.

Erklärung

Frage 68 von 90

1

A technician responds to a hardware issue with a server. The technician discovers that one
of the hard drives in the server has failed. The server is set up in a RAID 1 configuration.
Which of the following steps would the technician perform NEXT?

Wähle eine der folgenden:

  • Remove the hard drive and back up the data

  • Run CONVERT on the hard drive

  • Reboot the server

  • Swap hard drive and rebuild array

Erklärung

Frage 69 von 90

1

A user states that they cannot connect to the network or the Internet. The technician
determines the issue is that the computer has a static IP address and needs to use DHCP
to work correctly. The technician sets the NIC to automatically assign an IP address. Which
of the following should the technician perform NEXT?

Wähle eine der folgenden:

  • Identify the type of network card and what Operating System the computer is running

  • Confirm the computer is back on the network and has Internet connectivity

  • They need to annotate what the static IP address was and inform the employees manager

  • They need to determine why the NIC was assigned a static IP address

Erklärung

Frage 70 von 90

1

A technician installed a second hard drive in a computer. Upon restart, a message appears
statinG. primary drive 0 not found. Press F1 to continue." Which of the following should the
technician check FIRST?

Wähle eine der folgenden:

  • That NTLDR and boot.ini are not missing

  • Proper drive installation (e.g. cables/jumpers)

  • If computer can boot into safe mode

  • If the BIOS boot settings are correct

Erklärung

Frage 71 von 90

1

When dealing with a difficult customer, which of the following is the BEST way to handle
the situation?

Wähle eine der folgenden:

  • Do not argue with the customer and/or be defensive

  • Use technical terms to assure customer confidence

  • Escalate the customer’s issue to a supervisor

  • Sympathize with the customer about issue

Erklärung

Frage 72 von 90

1

A user reports unexpected icons appearing on the desktop. The technician identifies that
the symptoms point to a malware infection. Which of the following procedures would be
performed NEXT?

Wähle eine der folgenden:

  • Quarantine infected system

  • Schedule scans and run updates

  • Report the issue to the information security officer

  • Disable System Restore (in Windows)

  • Educate end user

Erklärung

Frage 73 von 90

1

Which of the following should be used to ensure that a Windows OS is functioning
optimally?

Wähle eine der folgenden:

  • Driver updates

  • Scheduled backups

  • Application updates

  • Restore points

Erklärung

Frage 74 von 90

1

Joe, an end-user, reports that the Windows PC he is using automatically locks when he
leaves his desk and walks to a printer to retrieve documents. Joe is then required to type in
his username and password to unlock the computer. The technician looks at the settings
on the PC and notices that the screensaver and screen-lock options are grayed out on the
computer and cannot be changed. Which of the following is the MOST likely cause of this
issue?

Wähle eine der folgenden:

  • Domain-level group policies

  • Antivirus domain-level policies

  • Corrupted registry settings

  • Incorrect local-level user policies

Erklärung

Frage 75 von 90

1

An IT manager needs to reimage 30 computers in a lab. The image has already been
created and is ready to be deployed via the network. Which of the following tasks should be
completed FIRST?

Wähle eine der folgenden:

  • Boot from PXE.

  • Install Windows using DVD.

  • Reboot computers with USB drive.

  • Press F8 while rebooting.

Erklärung

Frage 76 von 90

1

A newly deployed Windows PC cannot connect to the antivirus server on the local network
for updates, but it can connect to other file servers and printers without issue. Which of the
following is the MOST likely cause of this issue?

Wähle eine der folgenden:

  • The PC’s Windows firewall is misconfigured

  • The PC has an incorrect IP address configured

  • The PC is on the wrong wireless network

  • The PC does not have remote assistance turned on

Erklärung

Frage 77 von 90

1

A technician needs to install a clean Windows OS on several laptops in the office. The
office is running a 100Base-T network. The owner would like the installations completed as
soon as possible. Which of the following installation methods should the technician use?

Wähle eine der folgenden:

  • FireWire External Hard Drive

  • PXE-based Network Installation

  • USB 3.0 Flash Drive

  • DVD-ROM

Erklärung

Frage 78 von 90

1

A technician has been given a PC that is not powering up. After brief troubleshooting, the
technician comes to the conclusion the power supply needs to be replaced. Which of the
following is the NEXT step in the process of performing the repair?

Wähle eine der folgenden:

  • The technician should replace the power supply

  • The technician should review disposal regulations

  • The technician should check the environment

  • The technician should remove jewelry

Erklärung

Frage 79 von 90

1

A technician troubleshooting a computer finds a faulty video card and needs to replace it.
Which of the following safety procedures should be used to prevent damaging the new
part?

Wähle eine der folgenden:

  • Ground the computer and remove jewelry.

  • Self ground and handle the new card by the edges.

  • Place the computer on an ESD mat.

  • Attach an ESD strap to the new card during handling.

Erklärung

Frage 80 von 90

1

A user is configuring the email settings on a smartphone. Which of the following
configurations will allow the user to synchronize email from multiple devices?

Wähle eine der folgenden:

  • IMAP

  • S/MIME

  • POP3

  • SMTP

Erklärung

Frage 81 von 90

1

A technician recently replaced a users monitor and now the user is reporting that the
screen is filled with static and appears distorted. Which of the following will resolve the
issue?

Wähle eine der folgenden:

  • Lower refresh rate

  • Lower the resolution

  • Raise the resolution

  • Increase refresh rate

Erklärung

Frage 82 von 90

1

A technician has just upgraded RAM on a users workstation from 4GB to 8GB. The
technician now wants to adjust the page file size on the system to the recommended
Microsoft settings. Which of the following should be entered for the Min portion of the
page file setting if using these best practices?

Wähle eine der folgenden:

  • 4096MB

  • 8192MB

  • 12288MB

  • 16328MB

Erklärung

Frage 83 von 90

1

How would a technician install Windows OS on a MAC OS computer without using third-
party software?

Wähle eine der folgenden:

  • Terminal

  • Boot Disk

  • Disk Utility

  • Boot Camp

Erklärung

Frage 84 von 90

1

A technician is tasked with enabling TLS version 1.0, 1.1, and 1.2 on a client Internet
Explorer browser. Which of the following Internet Options Tabs should the technician look
to enable the aforementioned TLS settings?

Wähle eine der folgenden:

  • Advanced

  • Security

  • Privacy

  • Connections

Erklärung

Frage 85 von 90

1

A user has plugged in a mobile phone to a PC and received a message that the driver was
not successfully installed. Which of the following system tools should be used to
troubleshoot this error?

Wähle eine der folgenden:

  • Device Manager

  • Component Services

  • Windows Memory Diagnostics

  • Data Sources

Erklärung

Frage 86 von 90

1

Which of the following is the BEST license type to comply with end user licensing
agreement (EULA) terms for commercial software used by multiple users in a corporate
environment?

Wähle eine der folgenden:

  • Commercial license

  • Enterprise license

  • Seat license

  • Open source license

Erklärung

Frage 87 von 90

1

Which of the following prevention methods is considered to be digital security?

Wähle eine der folgenden:

  • RFID badge

  • Mantrap

  • Biometrics

  • Firewalls

  • ID badge

Erklärung

Frage 88 von 90

1

A user, Ann, has reported that she lost a laptop. The laptop had sensitive corporate
information on it that has been published on the Internet. Which of the following is the
FIRST step in implementing a best practice security policy?

Wähle eine der folgenden:

  • Require biometric identification to log into the laptop.

  • Require multifactor authentication to log into laptop.

  • Require laptop hard drives to be encrypted.

  • Require users to change their password at frequent intervals.

  • Require users to have strong passwords.

Erklärung

Frage 89 von 90

1

A user leaves the workstation frequently and does not want sensitive material to be
accessed. In addition, the user does not want to turn off the computer every time in the
evening. Which of the following is the BEST solution for securing the workstation?

Wähle eine der folgenden:

  • Set a strong password that requires a renewal every 30 days.

  • Run a screensaver after one minute of nonuse and fingerprint lock for afterhours.

  • Apply a screen lock after five minutes of nonuse and login time restrictions for afterhours.

  • Require a password and fingerprint lock afterhours.

Erklärung

Frage 90 von 90

1

A technician needs to quickly destroy data on several hard drives that are no longer
wanted. Which of the following methods is MOST effective?

Wähle eine der folgenden:

  • Physical destruction

  • Quick format

  • Low level format

  • Overwrite

Erklärung