CompTaker
Quiz by , created more than 1 year ago

802 Exam Practice

37
1
0
CompTaker
Created by CompTaker almost 9 years ago
Close

802 Exam Volume 1

Question 1 of 100

1

Which of the following BIOS boot methods allows a system to boot from a remote server?

Select one of the following:

  • PXE

  • DVD

  • USB

  • SATA

Explanation

Question 2 of 100

1

Which of the following helps to prevent virus infections from USB flash drives?

Select one of the following:

  • Strong passwords

  • Password protected screen savers

  • Disabling the guest account

  • Disabling the autorun

Explanation

Question 3 of 100

1

Which of the settings MUST be configured in order to turn on a VoIP phone?

Select one of the following:

  • PoE

  • Flow control

  • VPN

  • Duplex speed

Explanation

Question 4 of 100

1

A user is trying to access an application on their home machine from work. The user sets up port forwarding on their router but is still unable to connect to the application. Which of the following should be the user's NEXT step in resolving this issue?

Select one of the following:

  • Configure Wake-on-LAN for the NIC on the Work PC

  • Configure a firewall exception on the Home PC

  • Switch the Work PC network from "Work" to "Home".

  • Disable the Wndows firewall on the Home PC

Explanation

Question 5 of 100

1

Which of the following security threats are MOST often delivered via email? (Select TWO)

Select one or more of the following:

  • Rootkits

  • Phishing

  • Shoulder Surfing

  • Social engineering

  • Spam

Explanation

Question 6 of 100

1

The customer reports their PC freezes up everyday around the same time. Which of the following utilities would be BEST to check for any error codes?

Select one of the following:

  • Windows Updates

  • Task Scheduler

  • Event Viewer

  • Performance Monitor

Explanation

Question 7 of 100

1

A user is looking for the Application Data directory in their profile but cannot see it. Which of the following Control options would correct this?

Select one of the following:

  • System

  • Display

  • User Accounts

  • Folder Options

Explanation

Question 8 of 100

1

While configuring a new email application that POP3 for customer, the technician determines the firewall is blocking the traffic. Which of the following ports should be opened to allow POP3 mail traffic through the firewall?

Select one of the following:

  • 53

  • 110

  • 443

  • 3389

Explanation

Question 9 of 100

1

A user had downloaded and installed a browser add-on that causes the browser to hang. The PC has very slow system response when rebooted. Which of the following should a technician do to trouble shoot this problem?

Select one of the following:

  • Run System Restore, update antivirus program, and run an antivirus scan

  • Remove all Internet temporary files, run an antivirus scan, and reboot using Last Known Good Configuration.

  • Remove all temporary files, turn off System Restore, update and run an antivirus scan

  • Run an antivirus scan, Run Disk Cleanup, and reboot into Safe Mode

Explanation

Question 10 of 100

1

A large magnet is placed too close to a CRT monitor. Which of the following will MOST likely occur?

Select one of the following:

  • Dead pixels

  • Flickering image

  • No image on screen

  • Distorted Image

Explanation

Question 11 of 100

1

In which of the following locations would technician go to show file extensions?

Select one of the following:

  • Security Center

  • Folder Options

  • Display

  • System

Explanation

Question 12 of 100

1

After being relocated to an enclosed position under a desk, a computer experiences intermittent shutdowns. Which of the following conditions is MOST likely the cause?

Select one of the following:

  • Power surges

  • Overheating

  • APIPA addressing

  • RF interference

Explanation

Question 13 of 100

1

A technician is fixing a very slow computer. Antivirus and Malware programs have been run, and some detections have been removed. After running Disk clean up, the system still seems to be slow, especially with multiple programs running . Which of the following should the technician do NEXT?

Select one of the following:

  • Run CHCKDSK

  • Manually erase all cookies

  • Go back to the latest restore point

  • Run defrag

Explanation

Question 14 of 100

1

A technician needs to use a command line tool to determine the network name and the IP address of a resource. Which of the following command line tools will provide an IP address when given a name?

Select one of the following:

  • verify

  • tracert

  • ipconfig

  • nslookup

Explanation

Question 15 of 100

1

A user wants to configure their network to support VoIP. Which of the following would BEST support a VoIP installation?

Select one of the following:

  • QoS

  • POTS

  • Wake-on-LAN

  • VPN

Explanation

Question 16 of 100

1

A user is concerned about an issue with iOS. The user MOST likely which of following devices?

Select one of the following:

  • iCloud

  • Android phone

  • iPhone

  • Windows Tablet

Explanation

Question 17 of 100

1

A user has installed a legacy application in Windows 7 and reports that only some of the functionality in its is operational. Another user is using the same application on a different Windows 7 machine and doesn't report those problems. Which of the following features in Windows 7 may be responsible for this problem?

Select one of the following:

  • System Protection settings

  • User Account Control

  • Action Center

  • Data Execution Prevention

Explanation

Question 18 of 100

1

A user reports that they are getting frequent delayed write messages throughout the day and are experiencing sluggish performance. The technician suspects that the issue relates to the hard disk drive. Which of the following would BEST help validate the diagnosis?

Select one of the following:

  • System Information

  • Event Viewer

  • POST card

  • SMART status

Explanation

Question 19 of 100

1

A user states that they are having a problem with their word processor on their laptop. Whenever they attempt to type letters in with their right hand, numbers and symbols show up instead. Which of the following would address the issue?

Select one of the following:

  • Switch to a standardized font

  • Restore regional settings to a default

  • Toggle the function + num lock combination

  • Connect a full sized external keyboard

Explanation

Question 20 of 100

1

Which of the following security threats is defined by its self propagating characteristics?

Select one of the following:

  • Virus

  • Rootkit

  • Trojan

  • Worm

Explanation

Question 21 of 100

1

Which of the following features allows for easier navigation of long lists on a tablet device?

Select one of the following:

  • Pinch-zoom

  • Multi-touch

  • Scroll bars

  • Touch flow

Explanation

Question 22 of 100

1

Which of the following files system types is used primarily for optical media?

Select one of the following:

  • FAT32

  • NTFS

  • HPFS

  • CDFS

Explanation

Question 23 of 100

1

When moving files from a Microsoft gaming console, which of the following command line utilities is recommended to transfer files?

Select one of the following:

  • IMAP

  • XCOPY

  • DISKPART

  • FDISK

Explanation

Question 24 of 100

1

Which of the following should a technician implement to prevent external contractors from physically plugging devices into the company's network jacks unless jacks are designed to for guest use?

Select one of the following:

  • Disable DHCP and assign a static IP address to each network device physically connected to the network

  • Enable MAC address filtering across all network jacks and record the MAC address of guest devices

  • Disable all switch ports when they are not utilized and enable them on an as needed basis

  • Place guest network jacks in public areas and ll other jacks in secure as needed.

Explanation

Question 25 of 100

1

After installing a new printer the organization determines that there are problems printing images and very large files. Which of the following will MOST likely resolve the issue?

Select one of the following:

  • Update the drivers using WHQL drivers

  • Install additional memory to each computer

  • Install additional memory to the printer

  • Apply the latest OS service pack

Explanation

Question 26 of 100

1

Which of the following command lines tools will terminate a non-system without restarting the computer?

Select one of the following:

  • Shutdown

  • Kill

  • Erase

  • Break

Explanation

Question 27 of 100

1

After accidentally removing a hard drive from a server with three drives in a Raid 5 configuration, a technician notices the serer lock up and shut down. Which of the following can the technician do to quickly fix the problem?

Select one of the following:

  • Replace the RAID controller and boot

  • Reinsert the drive and boot

  • Plug the drive back in, the system will resume automatically

  • Remove all drives and rebuild the array

Explanation

Question 28 of 100

1

A costumer calls an IT consultant to explain an issue they are having with their Windows 7 Professional PC. Windows Update attempts to install patches upon each startup but fails on the same single update. The customer has attempted to re-run Windows Update from Control Panel but the issue remains. Which of the following courses of action would BEST resolve the problem?

Select one of the following:

  • Running a full DEFRAG on the system

  • Clearing the AppData temp folder entirely

  • Clearing the Windows Update in Windows 7 and reinstalling it directly from the Microsoft website

  • Uninstalling the Windows Update

Explanation

Question 29 of 100

1

A user reports that their wireless connectivity is being spotty. The issue seems to interrupt their wireless singal connection when the laptop screen is tilted forward or backward during operation. When this happens, the entire wireless signal drops out until the screen the screen is left in position for a good minute or so. Which of the following MOST likely explains what is happening?

Select one of the following:

  • The hinges on the laptop screen are not strong enough to support the wireless cables

  • The wireless card is losing contact to its socket when the screen is opening/closing

  • The laptop is designed to work optimally with wireless when the screen is at a perfect 90 angle

  • The wireless signal cables are being crimped when the screen is opening/closing

Explanation

Question 30 of 100

1

A user states that they cannot connect to the network or the Internet. The technician determines the issues is the computer has a static IP address and needs to use DHCP to work correctly. The technician sets the NIC to automatically assign an IP address. Which of the following should the technician perform NEXT?

Select one of the following:

  • Identify the type of network card and what Operating System the computer is running

  • Confirm the computer the is back on the network and has internet connectivity

  • They need to annotate what the static IP address was and inform the employee's manager

  • They need to determine what why the NIC was assigned to a static IP address

Explanation

Question 31 of 100

1

After several passes with malware removal program, the program keeps detecting the same amlware infection after a reboot. Which of the following should be done to attempt to remove the offending malware?

Select one of the following:

  • Run the malware removal program while disconnected from the Internet

  • Run the malware removal program in Windows Safe Mode

  • Reinstall the malware removal program from a trusted source

  • Set the malware removal removal program to run each time the computer is rebooted

Explanation

Question 32 of 100

1

A user, Joe, calls and states every few hours he is unable to connect to the Internet for several minutes but is able to access internal sites during this time. Which of the following tools would be used to find the issue with the network connection?

Select one of the following:

  • Tracert

  • NETSTAT

  • IPCONFIG

  • NSLOOKUP

Explanation

Question 33 of 100

1

A technician is trying to a prevent a local application from reaching the web due to security concerns. Which of the following solutions could BEST prevent the application from reaching the web? (Select TWO)

Select one or more of the following:

  • Configure the workstation for a static IP

  • Disable all wireless network connections

  • Remove shortcuts to the application

  • Block the application in Windows Firewall

  • Change network location to work

  • Reroute the web address in HOSTS file

Explanation

Question 34 of 100

1

For the last year, a company has gathered statistics on the most common security incidents threats are known to the employees across the enterprise to minimize occurrences. Which of the following should be implemented?

Select one of the following:

  • Message of the Day

  • Email lists

  • Company forums

  • Regular user education

Explanation

Question 35 of 100

1

For last year, a company has gather statistics on the most common security incidents. The highest percentage deals with open email attachments that contain malware. Which of the following mitigate this issue without reducing productivity?

Select one of the following:

  • Annual cyber security education

  • Update antivirus signatures more often

  • Block all email attachments

  • Install an IPS on each workstation

Explanation

Question 36 of 100

1

Which is following operating systems can be upgraded directly to Windows 7 Professional by default installation?

Select one or more of the following:

  • Windows 7 Home Premium

  • Windows Vista Business

  • Windows XP Home

  • Windows XP Professional 64-bit

  • Windows XP Media Center

Explanation

Question 37 of 100

1

A technician has finished replacing the network card in laptop and has verified fully system functionality. Which of the following troubleshooting steps should the technician take NEXT?

Select one of the following:

  • Document findings, actions, and outcomes

  • Escalate problem to a senior technician

  • Re-establish new theory of probable cause

  • Perform a full system backup

Explanation

Question 38 of 100

1

A technician is implementing a SOHO wireless network for Company A that shares a floor with Company B. Which of the following would BEST secure the wireless network so that they only Company A employees are allowed access?

Select one of the following:

  • Turning down the radio power level

  • Enabling MAC filtering

  • Setting a high encryption level

  • Disabling the SSID broadcast

Explanation

Question 39 of 100

1

A technician enabled remote management on the small office to manage this device from another location. Users are reporting that the WAP has changed its SSID with anyone's knowledge. Which of the following should prevent this from occurring?

Select one of the following:

  • Change to user MAC filtering

  • Change default usernames and passwords

  • Disable the SSID from broadcasting

  • Enable static IP addresses

Explanation

Question 40 of 100

1

A technician enabled remote management on the small office WAP to manage this device from another location. Users are reporting that the WAP has changed its SSID without anyone's knowledge. Which of the following would prevent this from occurring?

Select one of the following:

  • Configure the server to use a static IP

  • Logically move the server to the DMZ

  • Reallocate the server to a different networking closet

  • Disable the remote desktop port

Explanation

Question 41 of 100

1

Which of the following is an example of client-side virtualization?

Select one of the following:

  • Compatibility mode on a program icon properties menu

  • Running a DOS application on a Windows 7 32-bit operating system

  • Cloud hosted office applications

  • XP mode running in Windows 7 64-bit operating system

Explanation

Question 42 of 100

1

Laptops and tablets have which of the following in common?

Select one of the following:

  • Solid State Drives

  • Contain an accelerometer

  • No field serviceable parts

  • Not upgradable

Explanation

Question 43 of 100

1

Joe, a technician, would like to map a network drive when he starts up his computer in the morning. Which of the following commands would he use to accomplish this task?

Select one of the following:

  • NSLOOKUP

  • NETSTAT

  • NBSTAT

  • NET

Explanation

Question 44 of 100

1

A local administrator would like to determine why a laptop is taking so long to boot into the operating system. Which of the following tabs in MSCONFIG would be administrator access to BEST determine files?

Select one of the following:

  • Startup

  • Tools

  • General

  • Boot

Explanation

Question 45 of 100

1

A user, Ann, reports that she suspects her workstation has malware. Joe, the technician, confirms maleware exists and starts the process of removing the malware. Which of the following is the FIRST step he should take in removing the malware?

Select one of the following:

  • Disable antivirus

  • Disable system restore

  • Enable hard drive encryption

  • EFormat the hard drive

Explanation

Question 46 of 100

1

A user reports paper jam at the location of the paper trays. Which of the following components would need to be replaced to resolve this issue?

Select one of the following:

  • Fuser

  • Duplexer

  • Pickup roller

  • Imaging Drum

Explanation

Question 47 of 100

1

A user had plugged in a mobile phone to a PC and received a message that the driver was not successful installed. Which of the following system tools should be used to troubleshoot this error?

Select one of the following:

  • Device Manager

  • Component Service

  • Windows Memory Diagnostics

  • Data Sources

Explanation

Question 48 of 100

1

On a corporate network, which of the following features would be used to redirect network traffic for filtering or monitoring?

Select one of the following:

  • Content Advisor

  • Proxy Settings

  • Network Drive Mapping

  • Local Security Policy

Explanation

Question 49 of 100

1

Which of the following describes when an application is able to reuse Windows login credentials?

Select one of the following:

  • Access control list

  • Principle of least privilege

  • Single sign-on

  • Pass-through authentication

Explanation

Question 50 of 100

1

In order to prevent others users from editing files in 'C:\Files' which of the following steps should be taken?

Select one of the following:

  • Set NTFS permissions to read only

  • Set the folder to index files for search

  • Set the local administrator as the owner of the folder

  • Set network share permissions to read only

Explanation

Question 51 of 100

1

Which of the following security threats requires the attacker to be physically located near the target machine?

Select one of the following:

  • Shoulder Surfing

  • Social engineering

  • Phishing

  • Rootkit

Explanation

Question 52 of 100

1

A technician recently replaced a user;s monitor and now the user is reporting that the screen is filled with static and appears distorted. Which of the following will resolve the issue?

Select one of the following:

  • Lower the refresh rate

  • Lower the resolution

  • Raise the resolution

  • Increase the resolution

Explanation

Question 53 of 100

1

A user recently installed a new video driver on PC but now it will not boot. Which of the following is the BEST option to correct the issue?

Select one of the following:

  • Emergency system recovery

  • Emergency repair disks

  • FIXBOOT

  • Safe Mode

Explanation

Question 54 of 100

1

An authorized user observing system security procedures is known as:

Select one of the following:

  • A worm

  • Shoulder surfing

  • Phishing

  • Spyware

Explanation

Question 55 of 100

1

Privacy filters applied to users computer screens are used to combat which of the following security risks?

Select one of the following:

  • Rootkits

  • Spear Fishing

  • Shoulder Surfing

  • Social Engineering

Explanation

Question 56 of 100

1

A critical server was replaced by the IT staff the previous night. The following morning, some users are reporting that they are unable to browse to the Internet upon booting their workstations. Users who did not shut down their workstations the previous day are able to connect to the Internet. A technician looks at the following report from a workstation with no Internet connectivity:
IP Address: 192. 168.1.101
Netmask: 255.255.255.0
DCHP Server: 192.168.1.2
Default Gateway: 192.168.1.1
Given the above report, which of the following is the cause of why some workstations are unable to browse the Internet?

Select one of the following:

  • The workstation has an APIPA address

  • The DHCP server is unavailable

  • The default gateway router is misconfigured

  • The DHCP server is misconfigured

Explanation

Question 57 of 100

1

Which of the following is solely designed to avoid detection by antivirus program by using the underlying operating system to it it advantage?

Select one of the following:

  • Rootkit

  • Virus

  • Trojan

  • Worm

Explanation

Question 58 of 100

1

Joe, a technician, receives an error message on his lower PC just after POST which reads:
"WARNING! Your drive is about to fail. Please back up your data and run full drive diagnostics."
Which of the following is generating this error message?

Select one of the following:

  • CHKDSK

  • S.M.A.R.T.

  • eSATA

  • QoS

Explanation

Question 59 of 100

1

Ann, a technician, is trying to recover some files for a user from a damaged laptop. Since the Windows installation has been corrupted and does not boot, Ann plugs the drive into a bench system to attempt a recovery. After trying to access the drive on the bench computer, the following message is displayed." Access Denied. Please Enter the Encryption Password." Which of the following is the reason that this erro is displayed?

Select one of the following:

  • The hard drive is experiencing S.M.A.R.T. failure errors

  • The TPM security chip inside the bench system is not enabled

  • The BIOS of the bench system is out date

  • Bitlocker is being unused

Explanation

Question 60 of 100

1

A technician is tasked with repairing a Windows 7 system including the removal of recently installed files and software. Which of the following system restoration methods would be the LEAST destructive way to achieve this?

Select one of the following:

  • System Restore

  • System Image Recovery

  • CHKDSK

  • Windows Memory Diagnostic

Explanation

Question 61 of 100

1

A user, Ann, reports that her computer is able to connect to devices on her local network but not on the remote office network. Ann's computer shows the following ipconfig information:
IP Address: 192.168.10.45
Subnet Mask: 255.255.255.0
Default Gateway: 192.168.11.1
DNS server 1: 192.168.10.2
DNS server 2: 8.8.8.8
Which of the following is the cause of the problem?

Select one of the following:

  • DNS server 2 is set incorrectly

  • DNS server 1 is set incorrectly

  • IP address is set incorrectly

  • Gateway is set incorrectly

Explanation

Question 62 of 100

1

Ann reports that printouts from the department laser printer have become faded. She has already replaced the toner cartridge. Which of the following is the MOST likely component causing the faded printing?

Select one of the following:

  • Transfer rollers

  • Fusing assembly

  • Registration

  • Duplexing assembly

Explanation

Question 63 of 100

1

A user, Ann, reports that her laptop will no longer connect to wireless. Joe, a technician, checks the device manager and does not see a wireless networking card or any unknown devices. Which of the following should Joe do FIRST?

Select one of the following:

  • Check to make sure the wireless card was not turned off via the hardware switch or keyboard shortcut

  • Install a USB wireless card to ensure that Windows networking is working properly

  • Open the laptop and reseat the network card and both antennas

  • Download and install the latest wireless driver from the manufacturer's website.

Explanation

Question 64 of 100

1

Which of the following passwords is the MOST secure according to industry best practices?

Select one of the following:

  • VeryStrongPassword

  • SimpleAnswer1234

  • E@sy2Remember

  • thisthecorrectanswer1

Explanation

Question 65 of 100

1

A user, Joe, has just finished upgrading his computer with a wireless keyboard/mouse combination, additional memory, installed new speakers and replaced his 15 inch flat screen with a 24 inch flat screen. When he boots the computer it immediately starts making a loud beeping noise and will go no further in the boot process. Which of Joe's system upgrades is the cause of the problem?

Select one of the following:

  • The DVI cable is not properly seated

  • Speakers are not properly connected

  • Battery low on wireless mouse

  • Memory is mismatched

Explanation

Question 66 of 100

1

A PC uses RAID 1. Ann, a technician, has read in the event log that the drive "SATA 1" is no longer in sync with the drive "SATA 0". Which of the following steps should she try FIRST to repair this PC to optimal running conditions?

Select one of the following:

  • Remove SATA 1 FROM THE RAID group then try to re-add it

  • Replace both drives then restore from a backup

  • Remove both drives then switch the SATA channels

  • Replace SATA 1, rebuild the RAID and replace SATA 0

Explanation

Question 67 of 100

1

A user, Ann, receives a call from Joe who states that he is brand new in the help desk. Joe states that he needs help to update Ann's email client to prevent corruption. At Joe's request, Ann discloses her user name and password. She later discovers that Joe is not a member of the help desk. Which of the following has occurred?

Select one of the following:

  • Social engineering

  • Phishing

  • Spear fishing

  • Hijacking

Explanation

Question 68 of 100

1

Ann recently upgraded a computer from Windows XP to Windows 7, but one of her applications does not work now. Which of the following should be done FIRST?

Select one of the following:

  • Set the application to run in XP compatibility mode

  • Reinstall Windows XP

  • Configure a duel boot with XP and 7

  • Install the application in XP mode

Explanation

Question 69 of 100

1

Which of the following security practices would prevent a program on a CD from immediately launching when inserted into a computer?

Select one of the following:

  • MISCONFIG > Start up tag

  • Disable the Guest Account

  • Rename the Administrator account

  • Disable autorun

  • Restrict user permissions

Explanation

Question 70 of 100

1

Which of the following is one of the major differences between a new tablet and a new laptop computer

Select one of the following:

  • Tablet has no field serviceable parts

  • Laptop has less field functionality

  • Tablet has faster Ethernet capability

  • Laptops have slower responsiveness than tablets

Explanation

Question 71 of 100

1

Ann, a home user brings a Windows XP PC in for repair and reports that several disk read errors are occurring. She has run check disk and errors have been reported several times. Which of the following should a technician recommend?

Select one or more of the following:

  • Increase the amount of RAM to improve disk checks

  • Backup all data on the drive

  • Upgrade to a home server

  • Purchase a new drive

  • Change the drive configuration to RAID 0

  • Upgrade to Windows 7 Professional

Explanation

Question 72 of 100

1

Which of the following data types can be synchronized to a mobile device by default?

Select one or more of the following:

  • Biometric information

  • Pictures

  • Contacts

  • Credentials

  • SMS

Explanation

Question 73 of 100

1

Which of the following mobile device features disable cellular and wireless communication?

Select one of the following:

  • Hotspot

  • Pairing Mode

  • Settings Reset

  • Airplane Mode

Explanation

Question 74 of 100

1

Ann, a user, has brought her laptop in for service. She reports that her battery is at 100% but whenever it is unplugged it immediately shuts down. Which of the following should the technician do?

Select one of the following:

  • Replace the battery

  • Change power settings to balanced

  • Replace the power adapter

  • Enable APM in the BIOS

Explanation

Question 75 of 100

1

A technician recently created an email account for a new user, Joe. On the second day, Joe reports his email account is full of spam even though he has not given out his address Which of the following should the technician do to resolve the issue?

Select one of the following:

  • Turn on Windows Firewall

  • Click the unsubscribe link in the spam

  • Run an anti-spyware scan

  • Install privacy filter

Explanation

Question 76 of 100

1

A technician recently created an email account for a new user, Joe. On the second day, Joe reports his email account is full of spam even though he has not given out his address Which of the following should the technician do to resolve the issue?

Select one of the following:

  • Turn on Windows Firewall

  • Click the unsubscribe link in the spam

  • Run an anti-spyware scan

  • Install privacy filter

Explanation

Question 77 of 100

1

A user is having trouble connecting to the Internet. Which of the following commands should a technician use, from the user's workstation, to ensure that the workstation has a valid IP address?

Select one of the following:

  • NETSTAT

  • PING

  • IPCONFIG

  • TRACERT

Explanation

Question 78 of 100

1

Which is the correct order from MOST to LEAST:

Select one of the following:

  • Enterprise, Home Premium, Professional, Starter, Ultimate

  • Ultimate, Enterprise, Professional, Home Premium, Starter

  • Starter, Home Premium, Professional, Enterprise, Ultimate

  • Starter, Enterprise, Home Premium, Ultimate, Professional

Explanation

Question 79 of 100

1

Which of the following operating systems supports full Bitlocker functionality?

Select one of the following:

  • Windows XP

  • Windows 7 Professional

  • Windows Vista Home

  • Windows 7 Enterprise

Explanation

Question 80 of 100

1

Which of the following protocols could a technician use to connect a smartphone to an email server? (Select TWO)

Select one or more of the following:

  • SMTP

  • POP3

  • HTTP

  • SNTP

Explanation

Question 81 of 100

1

Which of the following should a technician do FIRST to secure a mobile device?

Select one of the following:

  • Assign a passcode

  • Download updates

  • Disable GPS

  • Install antivirus

Explanation

Question 82 of 100

1

When running Windows XP, which of the following give a list of switches for the CHKDSK command?

Select one of the following:

  • chkdsk ~?

  • chkdsk :?

  • chkdsk /?

  • chkdsk \?

Explanation

Question 83 of 100

1

Which of the following commands would a technician use to move one directory above or below the one the technician is currently in?

Select one of the following:

  • DIR

  • RD

  • CD

  • MD

Explanation

Question 84 of 100

1

A virtual machine running locally would BEST utilized in which of the following situations?

Select one of the following:

  • On a PC with minimal RAM

  • Patch testing before rollout

  • Thick client configuration

  • Gaming workstation

Explanation

Question 85 of 100

1

A user states that the computer takes a long time to load the desktop after following tools should be used to help re-mediate the problem?

Select one of the following:

  • Disk Management

  • FIXMBR

  • MSCONFIG

  • SFC

Explanation

Question 86 of 100

1

Which of the following security threats involve should surfing and phone phishing?

Select one of the following:

  • Man-in-the-Middle

  • Social Engineering

  • Trojan Virus

  • Spyware

Explanation

Question 87 of 100

1

Which of the following operating systems supports full usage of 8 GB DDR3 RAM?

Select one of the following:

  • Window 7 Professional x86

  • Window 7 Home Premium x64

  • Windows XP Professional

  • Windows Vista Home Premium x86

Explanation

Question 88 of 100

1

A technician would like to ensure all previous data is erased before reloading Windows 7 Home Premium onto a laptop. Which of the following procedures would accomplish this?

Select one of the following:

  • Virtual RAID configuration

  • Quick Format

  • New Partition

  • Full Format

Explanation

Question 89 of 100

1

Which of the following commands, in Windows 7, could a technician use to schedule a disk integrity scan upon next boot?

Select one of the following:

  • CHKDSK

  • ROBOCOPY

  • SCANDISK

  • FDISK

Explanation

Question 90 of 100

1

Which of the following tabs under MSCONFIG would allow technician to configure all of the applications that launch at boot?

Select one of the following:

  • Startup

  • Services

  • Tools

  • Boot

Explanation

Question 91 of 100

1

A technician believes a machine loaded with Windows XP Professional has issues with file integrity of the core OS components. Which of the following commands could be used to both check and replace damaged files?

Select one of the following:

  • SFC /SCANNOW

  • CHKDSK /R /F

  • FORMAT C:

  • DISKPART

Explanation

Question 92 of 100

1

A technician is tasked with building three systems that are capable of utilizing the new Windows HomeGroup functionality. Which of the following versions of Windows would need to be used?

Select one of the following:

  • Windows 7 or Windows Vista

  • Windows Vista only

  • Windows XP Professional x64 Edition

  • Windows 7 only

Explanation

Question 93 of 100

1

Which of the following security threats does NOT use software to extract sensitive information credentials?

Select one of the following:

  • Grayware

  • Shoulder surfing

  • Malware

  • Man-in-the-Middle exploits

Explanation

Question 94 of 100

1

A user is reporting that their screen is flickering at a rapid rate. Which of the following Control panel paths should a technician use in order to remedy this issue?

Select one of the following:

  • Display -> Settings -> Advanced-> General -> DPI

  • Display -> Settings -> Resolution

  • Display -> Settings -> Advanced-> Adapter -> Refresh

  • Display -> Appearance-> Effects-> Transistion

Explanation

Question 95 of 100

1

A user has a laptop that they need to get ready for an outdoor presentation. The user is concerned that the laptop will turn off of the screen or go into standby before their before their presentation complete. Which of the following Control Panel paths should the technician use in order to prevent this from occurring?

Select one of the following:

  • System -> Hardware

  • Power Options -> Power Schemes

  • System ->Advanced-> Performance

  • Power Options -> Hibernate

Explanation

Question 96 of 100

1

Which of the following data transfers will retain the current NTFS permissions of a file?

Select one of the following:

  • Copying the file to a different location on the same volume

  • Copying the file to a different location on a different volume

  • Moving the file to a different location on a different volume

  • Moving the file to a different location on the same volume

Explanation

Question 97 of 100

1

A user's computer keeps producing a "low virtual memory" alert and the speed of the system degrades afterwards. Which of the following Control Panel locations can provide information to review and correct this issue?

Select one of the following:

  • System > Remote

  • System > Hardware

  • System > System Restore

  • System > Advanced

Explanation

Question 98 of 100

1

A user states their workstation will not reach the login screen. Which of the following commands can be uised to write a new partition boot sector to the system partition in the Recovery Console ?

Select one of the following:

  • FIXMBR

  • BOOTCFG

  • FIXBOOT

  • DISKPART

Explanation

Question 99 of 100

1

Which of the following features helps to prevent shoulder surfing?

Select one of the following:

  • Native resolution

  • Auto adjust

  • Degaussing

  • Privacy screen

Explanation

Question 100 of 100

1

A user wants to change the functionality that occurs when the laptop lid is closed. Which of the following Control Panel options is the MOST direct way to adjust this?

Select one of the following:

  • Display

  • Power Options

  • Personalization

  • Device Management

Explanation