802 Exam Volume 1

Description

802 Exam Practice
CompTaker
Quiz by CompTaker, updated more than 1 year ago
CompTaker
Created by CompTaker almost 9 years ago
37
1

Resource summary

Question 1

Question
Which of the following BIOS boot methods allows a system to boot from a remote server?
Answer
  • PXE
  • DVD
  • USB
  • SATA

Question 2

Question
Which of the following helps to prevent virus infections from USB flash drives?
Answer
  • Strong passwords
  • Password protected screen savers
  • Disabling the guest account
  • Disabling the autorun

Question 3

Question
Which of the settings MUST be configured in order to turn on a VoIP phone?
Answer
  • PoE
  • Flow control
  • VPN
  • Duplex speed

Question 4

Question
A user is trying to access an application on their home machine from work. The user sets up port forwarding on their router but is still unable to connect to the application. Which of the following should be the user's NEXT step in resolving this issue?
Answer
  • Configure Wake-on-LAN for the NIC on the Work PC
  • Configure a firewall exception on the Home PC
  • Switch the Work PC network from "Work" to "Home".
  • Disable the Wndows firewall on the Home PC

Question 5

Question
Which of the following security threats are MOST often delivered via email? (Select TWO)
Answer
  • Rootkits
  • Phishing
  • Shoulder Surfing
  • Social engineering
  • Spam

Question 6

Question
The customer reports their PC freezes up everyday around the same time. Which of the following utilities would be BEST to check for any error codes?
Answer
  • Windows Updates
  • Task Scheduler
  • Event Viewer
  • Performance Monitor

Question 7

Question
A user is looking for the Application Data directory in their profile but cannot see it. Which of the following Control options would correct this?
Answer
  • System
  • Display
  • User Accounts
  • Folder Options

Question 8

Question
While configuring a new email application that POP3 for customer, the technician determines the firewall is blocking the traffic. Which of the following ports should be opened to allow POP3 mail traffic through the firewall?
Answer
  • 53
  • 110
  • 443
  • 3389

Question 9

Question
A user had downloaded and installed a browser add-on that causes the browser to hang. The PC has very slow system response when rebooted. Which of the following should a technician do to trouble shoot this problem?
Answer
  • Run System Restore, update antivirus program, and run an antivirus scan
  • Remove all Internet temporary files, run an antivirus scan, and reboot using Last Known Good Configuration.
  • Remove all temporary files, turn off System Restore, update and run an antivirus scan
  • Run an antivirus scan, Run Disk Cleanup, and reboot into Safe Mode

Question 10

Question
A large magnet is placed too close to a CRT monitor. Which of the following will MOST likely occur?
Answer
  • Dead pixels
  • Flickering image
  • No image on screen
  • Distorted Image

Question 11

Question
In which of the following locations would technician go to show file extensions?
Answer
  • Security Center
  • Folder Options
  • Display
  • System

Question 12

Question
After being relocated to an enclosed position under a desk, a computer experiences intermittent shutdowns. Which of the following conditions is MOST likely the cause?
Answer
  • Power surges
  • Overheating
  • APIPA addressing
  • RF interference

Question 13

Question
A technician is fixing a very slow computer. Antivirus and Malware programs have been run, and some detections have been removed. After running Disk clean up, the system still seems to be slow, especially with multiple programs running . Which of the following should the technician do NEXT?
Answer
  • Run CHCKDSK
  • Manually erase all cookies
  • Go back to the latest restore point
  • Run defrag

Question 14

Question
A technician needs to use a command line tool to determine the network name and the IP address of a resource. Which of the following command line tools will provide an IP address when given a name?
Answer
  • verify
  • tracert
  • ipconfig
  • nslookup

Question 15

Question
A user wants to configure their network to support VoIP. Which of the following would BEST support a VoIP installation?
Answer
  • QoS
  • POTS
  • Wake-on-LAN
  • VPN

Question 16

Question
A user is concerned about an issue with iOS. The user MOST likely which of following devices?
Answer
  • iCloud
  • Android phone
  • iPhone
  • Windows Tablet

Question 17

Question
A user has installed a legacy application in Windows 7 and reports that only some of the functionality in its is operational. Another user is using the same application on a different Windows 7 machine and doesn't report those problems. Which of the following features in Windows 7 may be responsible for this problem?
Answer
  • System Protection settings
  • User Account Control
  • Action Center
  • Data Execution Prevention

Question 18

Question
A user reports that they are getting frequent delayed write messages throughout the day and are experiencing sluggish performance. The technician suspects that the issue relates to the hard disk drive. Which of the following would BEST help validate the diagnosis?
Answer
  • System Information
  • Event Viewer
  • POST card
  • SMART status

Question 19

Question
A user states that they are having a problem with their word processor on their laptop. Whenever they attempt to type letters in with their right hand, numbers and symbols show up instead. Which of the following would address the issue?
Answer
  • Switch to a standardized font
  • Restore regional settings to a default
  • Toggle the function + num lock combination
  • Connect a full sized external keyboard

Question 20

Question
Which of the following security threats is defined by its self propagating characteristics?
Answer
  • Virus
  • Rootkit
  • Trojan
  • Worm

Question 21

Question
Which of the following features allows for easier navigation of long lists on a tablet device?
Answer
  • Pinch-zoom
  • Multi-touch
  • Scroll bars
  • Touch flow

Question 22

Question
Which of the following files system types is used primarily for optical media?
Answer
  • FAT32
  • NTFS
  • HPFS
  • CDFS

Question 23

Question
When moving files from a Microsoft gaming console, which of the following command line utilities is recommended to transfer files?
Answer
  • IMAP
  • XCOPY
  • DISKPART
  • FDISK

Question 24

Question
Which of the following should a technician implement to prevent external contractors from physically plugging devices into the company's network jacks unless jacks are designed to for guest use?
Answer
  • Disable DHCP and assign a static IP address to each network device physically connected to the network
  • Enable MAC address filtering across all network jacks and record the MAC address of guest devices
  • Disable all switch ports when they are not utilized and enable them on an as needed basis
  • Place guest network jacks in public areas and ll other jacks in secure as needed.

Question 25

Question
After installing a new printer the organization determines that there are problems printing images and very large files. Which of the following will MOST likely resolve the issue?
Answer
  • Update the drivers using WHQL drivers
  • Install additional memory to each computer
  • Install additional memory to the printer
  • Apply the latest OS service pack

Question 26

Question
Which of the following command lines tools will terminate a non-system without restarting the computer?
Answer
  • Shutdown
  • Kill
  • Erase
  • Break

Question 27

Question
After accidentally removing a hard drive from a server with three drives in a Raid 5 configuration, a technician notices the serer lock up and shut down. Which of the following can the technician do to quickly fix the problem?
Answer
  • Replace the RAID controller and boot
  • Reinsert the drive and boot
  • Plug the drive back in, the system will resume automatically
  • Remove all drives and rebuild the array

Question 28

Question
A costumer calls an IT consultant to explain an issue they are having with their Windows 7 Professional PC. Windows Update attempts to install patches upon each startup but fails on the same single update. The customer has attempted to re-run Windows Update from Control Panel but the issue remains. Which of the following courses of action would BEST resolve the problem?
Answer
  • Running a full DEFRAG on the system
  • Clearing the AppData temp folder entirely
  • Clearing the Windows Update in Windows 7 and reinstalling it directly from the Microsoft website
  • Uninstalling the Windows Update

Question 29

Question
A user reports that their wireless connectivity is being spotty. The issue seems to interrupt their wireless singal connection when the laptop screen is tilted forward or backward during operation. When this happens, the entire wireless signal drops out until the screen the screen is left in position for a good minute or so. Which of the following MOST likely explains what is happening?
Answer
  • The hinges on the laptop screen are not strong enough to support the wireless cables
  • The wireless card is losing contact to its socket when the screen is opening/closing
  • The laptop is designed to work optimally with wireless when the screen is at a perfect 90 angle
  • The wireless signal cables are being crimped when the screen is opening/closing

Question 30

Question
A user states that they cannot connect to the network or the Internet. The technician determines the issues is the computer has a static IP address and needs to use DHCP to work correctly. The technician sets the NIC to automatically assign an IP address. Which of the following should the technician perform NEXT?
Answer
  • Identify the type of network card and what Operating System the computer is running
  • Confirm the computer the is back on the network and has internet connectivity
  • They need to annotate what the static IP address was and inform the employee's manager
  • They need to determine what why the NIC was assigned to a static IP address

Question 31

Question
After several passes with malware removal program, the program keeps detecting the same amlware infection after a reboot. Which of the following should be done to attempt to remove the offending malware?
Answer
  • Run the malware removal program while disconnected from the Internet
  • Run the malware removal program in Windows Safe Mode
  • Reinstall the malware removal program from a trusted source
  • Set the malware removal removal program to run each time the computer is rebooted

Question 32

Question
A user, Joe, calls and states every few hours he is unable to connect to the Internet for several minutes but is able to access internal sites during this time. Which of the following tools would be used to find the issue with the network connection?
Answer
  • Tracert
  • NETSTAT
  • IPCONFIG
  • NSLOOKUP

Question 33

Question
A technician is trying to a prevent a local application from reaching the web due to security concerns. Which of the following solutions could BEST prevent the application from reaching the web? (Select TWO)
Answer
  • Configure the workstation for a static IP
  • Disable all wireless network connections
  • Remove shortcuts to the application
  • Block the application in Windows Firewall
  • Change network location to work
  • Reroute the web address in HOSTS file

Question 34

Question
For the last year, a company has gathered statistics on the most common security incidents threats are known to the employees across the enterprise to minimize occurrences. Which of the following should be implemented?
Answer
  • Message of the Day
  • Email lists
  • Company forums
  • Regular user education

Question 35

Question
For last year, a company has gather statistics on the most common security incidents. The highest percentage deals with open email attachments that contain malware. Which of the following mitigate this issue without reducing productivity?
Answer
  • Annual cyber security education
  • Update antivirus signatures more often
  • Block all email attachments
  • Install an IPS on each workstation

Question 36

Question
Which is following operating systems can be upgraded directly to Windows 7 Professional by default installation?
Answer
  • Windows 7 Home Premium
  • Windows Vista Business
  • Windows XP Home
  • Windows XP Professional 64-bit
  • Windows XP Media Center

Question 37

Question
A technician has finished replacing the network card in laptop and has verified fully system functionality. Which of the following troubleshooting steps should the technician take NEXT?
Answer
  • Document findings, actions, and outcomes
  • Escalate problem to a senior technician
  • Re-establish new theory of probable cause
  • Perform a full system backup

Question 38

Question
A technician is implementing a SOHO wireless network for Company A that shares a floor with Company B. Which of the following would BEST secure the wireless network so that they only Company A employees are allowed access?
Answer
  • Turning down the radio power level
  • Enabling MAC filtering
  • Setting a high encryption level
  • Disabling the SSID broadcast

Question 39

Question
A technician enabled remote management on the small office to manage this device from another location. Users are reporting that the WAP has changed its SSID with anyone's knowledge. Which of the following should prevent this from occurring?
Answer
  • Change to user MAC filtering
  • Change default usernames and passwords
  • Disable the SSID from broadcasting
  • Enable static IP addresses

Question 40

Question
A technician enabled remote management on the small office WAP to manage this device from another location. Users are reporting that the WAP has changed its SSID without anyone's knowledge. Which of the following would prevent this from occurring?
Answer
  • Configure the server to use a static IP
  • Logically move the server to the DMZ
  • Reallocate the server to a different networking closet
  • Disable the remote desktop port

Question 41

Question
Which of the following is an example of client-side virtualization?
Answer
  • Compatibility mode on a program icon properties menu
  • Running a DOS application on a Windows 7 32-bit operating system
  • Cloud hosted office applications
  • XP mode running in Windows 7 64-bit operating system

Question 42

Question
Laptops and tablets have which of the following in common?
Answer
  • Solid State Drives
  • Contain an accelerometer
  • No field serviceable parts
  • Not upgradable

Question 43

Question
Joe, a technician, would like to map a network drive when he starts up his computer in the morning. Which of the following commands would he use to accomplish this task?
Answer
  • NSLOOKUP
  • NETSTAT
  • NBSTAT
  • NET

Question 44

Question
A local administrator would like to determine why a laptop is taking so long to boot into the operating system. Which of the following tabs in MSCONFIG would be administrator access to BEST determine files?
Answer
  • Startup
  • Tools
  • General
  • Boot

Question 45

Question
A user, Ann, reports that she suspects her workstation has malware. Joe, the technician, confirms maleware exists and starts the process of removing the malware. Which of the following is the FIRST step he should take in removing the malware?
Answer
  • Disable antivirus
  • Disable system restore
  • Enable hard drive encryption
  • EFormat the hard drive

Question 46

Question
A user reports paper jam at the location of the paper trays. Which of the following components would need to be replaced to resolve this issue?
Answer
  • Fuser
  • Duplexer
  • Pickup roller
  • Imaging Drum

Question 47

Question
A user had plugged in a mobile phone to a PC and received a message that the driver was not successful installed. Which of the following system tools should be used to troubleshoot this error?
Answer
  • Device Manager
  • Component Service
  • Windows Memory Diagnostics
  • Data Sources

Question 48

Question
On a corporate network, which of the following features would be used to redirect network traffic for filtering or monitoring?
Answer
  • Content Advisor
  • Proxy Settings
  • Network Drive Mapping
  • Local Security Policy

Question 49

Question
Which of the following describes when an application is able to reuse Windows login credentials?
Answer
  • Access control list
  • Principle of least privilege
  • Single sign-on
  • Pass-through authentication

Question 50

Question
In order to prevent others users from editing files in 'C:\Files' which of the following steps should be taken?
Answer
  • Set NTFS permissions to read only
  • Set the folder to index files for search
  • Set the local administrator as the owner of the folder
  • Set network share permissions to read only

Question 51

Question
Which of the following security threats requires the attacker to be physically located near the target machine?
Answer
  • Shoulder Surfing
  • Social engineering
  • Phishing
  • Rootkit

Question 52

Question
A technician recently replaced a user;s monitor and now the user is reporting that the screen is filled with static and appears distorted. Which of the following will resolve the issue?
Answer
  • Lower the refresh rate
  • Lower the resolution
  • Raise the resolution
  • Increase the resolution

Question 53

Question
A user recently installed a new video driver on PC but now it will not boot. Which of the following is the BEST option to correct the issue?
Answer
  • Emergency system recovery
  • Emergency repair disks
  • FIXBOOT
  • Safe Mode

Question 54

Question
An authorized user observing system security procedures is known as:
Answer
  • A worm
  • Shoulder surfing
  • Phishing
  • Spyware

Question 55

Question
Privacy filters applied to users computer screens are used to combat which of the following security risks?
Answer
  • Rootkits
  • Spear Fishing
  • Shoulder Surfing
  • Social Engineering

Question 56

Question
A critical server was replaced by the IT staff the previous night. The following morning, some users are reporting that they are unable to browse to the Internet upon booting their workstations. Users who did not shut down their workstations the previous day are able to connect to the Internet. A technician looks at the following report from a workstation with no Internet connectivity: IP Address: 192. 168.1.101 Netmask: 255.255.255.0 DCHP Server: 192.168.1.2 Default Gateway: 192.168.1.1 Given the above report, which of the following is the cause of why some workstations are unable to browse the Internet?
Answer
  • The workstation has an APIPA address
  • The DHCP server is unavailable
  • The default gateway router is misconfigured
  • The DHCP server is misconfigured

Question 57

Question
Which of the following is solely designed to avoid detection by antivirus program by using the underlying operating system to it it advantage?
Answer
  • Rootkit
  • Virus
  • Trojan
  • Worm

Question 58

Question
Joe, a technician, receives an error message on his lower PC just after POST which reads: "WARNING! Your drive is about to fail. Please back up your data and run full drive diagnostics." Which of the following is generating this error message?
Answer
  • CHKDSK
  • S.M.A.R.T.
  • eSATA
  • QoS

Question 59

Question
Ann, a technician, is trying to recover some files for a user from a damaged laptop. Since the Windows installation has been corrupted and does not boot, Ann plugs the drive into a bench system to attempt a recovery. After trying to access the drive on the bench computer, the following message is displayed." Access Denied. Please Enter the Encryption Password." Which of the following is the reason that this erro is displayed?
Answer
  • The hard drive is experiencing S.M.A.R.T. failure errors
  • The TPM security chip inside the bench system is not enabled
  • The BIOS of the bench system is out date
  • Bitlocker is being unused

Question 60

Question
A technician is tasked with repairing a Windows 7 system including the removal of recently installed files and software. Which of the following system restoration methods would be the LEAST destructive way to achieve this?
Answer
  • System Restore
  • System Image Recovery
  • CHKDSK
  • Windows Memory Diagnostic

Question 61

Question
A user, Ann, reports that her computer is able to connect to devices on her local network but not on the remote office network. Ann's computer shows the following ipconfig information: IP Address: 192.168.10.45 Subnet Mask: 255.255.255.0 Default Gateway: 192.168.11.1 DNS server 1: 192.168.10.2 DNS server 2: 8.8.8.8 Which of the following is the cause of the problem?
Answer
  • DNS server 2 is set incorrectly
  • DNS server 1 is set incorrectly
  • IP address is set incorrectly
  • Gateway is set incorrectly

Question 62

Question
Ann reports that printouts from the department laser printer have become faded. She has already replaced the toner cartridge. Which of the following is the MOST likely component causing the faded printing?
Answer
  • Transfer rollers
  • Fusing assembly
  • Registration
  • Duplexing assembly

Question 63

Question
A user, Ann, reports that her laptop will no longer connect to wireless. Joe, a technician, checks the device manager and does not see a wireless networking card or any unknown devices. Which of the following should Joe do FIRST?
Answer
  • Check to make sure the wireless card was not turned off via the hardware switch or keyboard shortcut
  • Install a USB wireless card to ensure that Windows networking is working properly
  • Open the laptop and reseat the network card and both antennas
  • Download and install the latest wireless driver from the manufacturer's website.

Question 64

Question
Which of the following passwords is the MOST secure according to industry best practices?
Answer
  • VeryStrongPassword
  • SimpleAnswer1234
  • E@sy2Remember
  • thisthecorrectanswer1

Question 65

Question
A user, Joe, has just finished upgrading his computer with a wireless keyboard/mouse combination, additional memory, installed new speakers and replaced his 15 inch flat screen with a 24 inch flat screen. When he boots the computer it immediately starts making a loud beeping noise and will go no further in the boot process. Which of Joe's system upgrades is the cause of the problem?
Answer
  • The DVI cable is not properly seated
  • Speakers are not properly connected
  • Battery low on wireless mouse
  • Memory is mismatched

Question 66

Question
A PC uses RAID 1. Ann, a technician, has read in the event log that the drive "SATA 1" is no longer in sync with the drive "SATA 0". Which of the following steps should she try FIRST to repair this PC to optimal running conditions?
Answer
  • Remove SATA 1 FROM THE RAID group then try to re-add it
  • Replace both drives then restore from a backup
  • Remove both drives then switch the SATA channels
  • Replace SATA 1, rebuild the RAID and replace SATA 0

Question 67

Question
A user, Ann, receives a call from Joe who states that he is brand new in the help desk. Joe states that he needs help to update Ann's email client to prevent corruption. At Joe's request, Ann discloses her user name and password. She later discovers that Joe is not a member of the help desk. Which of the following has occurred?
Answer
  • Social engineering
  • Phishing
  • Spear fishing
  • Hijacking

Question 68

Question
Ann recently upgraded a computer from Windows XP to Windows 7, but one of her applications does not work now. Which of the following should be done FIRST?
Answer
  • Set the application to run in XP compatibility mode
  • Reinstall Windows XP
  • Configure a duel boot with XP and 7
  • Install the application in XP mode

Question 69

Question
Which of the following security practices would prevent a program on a CD from immediately launching when inserted into a computer?
Answer
  • MISCONFIG > Start up tag
  • Disable the Guest Account
  • Rename the Administrator account
  • Disable autorun
  • Restrict user permissions

Question 70

Question
Which of the following is one of the major differences between a new tablet and a new laptop computer
Answer
  • Tablet has no field serviceable parts
  • Laptop has less field functionality
  • Tablet has faster Ethernet capability
  • Laptops have slower responsiveness than tablets

Question 71

Question
Ann, a home user brings a Windows XP PC in for repair and reports that several disk read errors are occurring. She has run check disk and errors have been reported several times. Which of the following should a technician recommend?
Answer
  • Increase the amount of RAM to improve disk checks
  • Backup all data on the drive
  • Upgrade to a home server
  • Purchase a new drive
  • Change the drive configuration to RAID 0
  • Upgrade to Windows 7 Professional

Question 72

Question
Which of the following data types can be synchronized to a mobile device by default?
Answer
  • Biometric information
  • Pictures
  • Contacts
  • Credentials
  • SMS

Question 73

Question
Which of the following mobile device features disable cellular and wireless communication?
Answer
  • Hotspot
  • Pairing Mode
  • Settings Reset
  • Airplane Mode

Question 74

Question
Ann, a user, has brought her laptop in for service. She reports that her battery is at 100% but whenever it is unplugged it immediately shuts down. Which of the following should the technician do?
Answer
  • Replace the battery
  • Change power settings to balanced
  • Replace the power adapter
  • Enable APM in the BIOS

Question 75

Question
A technician recently created an email account for a new user, Joe. On the second day, Joe reports his email account is full of spam even though he has not given out his address Which of the following should the technician do to resolve the issue?
Answer
  • Turn on Windows Firewall
  • Click the unsubscribe link in the spam
  • Run an anti-spyware scan
  • Install privacy filter

Question 76

Question
A technician recently created an email account for a new user, Joe. On the second day, Joe reports his email account is full of spam even though he has not given out his address Which of the following should the technician do to resolve the issue?
Answer
  • Turn on Windows Firewall
  • Click the unsubscribe link in the spam
  • Run an anti-spyware scan
  • Install privacy filter

Question 77

Question
A user is having trouble connecting to the Internet. Which of the following commands should a technician use, from the user's workstation, to ensure that the workstation has a valid IP address?
Answer
  • NETSTAT
  • PING
  • IPCONFIG
  • TRACERT

Question 78

Question
Which is the correct order from MOST to LEAST:
Answer
  • Enterprise, Home Premium, Professional, Starter, Ultimate
  • Ultimate, Enterprise, Professional, Home Premium, Starter
  • Starter, Home Premium, Professional, Enterprise, Ultimate
  • Starter, Enterprise, Home Premium, Ultimate, Professional

Question 79

Question
Which of the following operating systems supports full Bitlocker functionality?
Answer
  • Windows XP
  • Windows 7 Professional
  • Windows Vista Home
  • Windows 7 Enterprise

Question 80

Question
Which of the following protocols could a technician use to connect a smartphone to an email server? (Select TWO)
Answer
  • SMTP
  • POP3
  • HTTP
  • SNTP

Question 81

Question
Which of the following should a technician do FIRST to secure a mobile device?
Answer
  • Assign a passcode
  • Download updates
  • Disable GPS
  • Install antivirus

Question 82

Question
When running Windows XP, which of the following give a list of switches for the CHKDSK command?
Answer
  • chkdsk ~?
  • chkdsk :?
  • chkdsk /?
  • chkdsk \?

Question 83

Question
Which of the following commands would a technician use to move one directory above or below the one the technician is currently in?
Answer
  • DIR
  • RD
  • CD
  • MD

Question 84

Question
A virtual machine running locally would BEST utilized in which of the following situations?
Answer
  • On a PC with minimal RAM
  • Patch testing before rollout
  • Thick client configuration
  • Gaming workstation

Question 85

Question
A user states that the computer takes a long time to load the desktop after following tools should be used to help re-mediate the problem?
Answer
  • Disk Management
  • FIXMBR
  • MSCONFIG
  • SFC

Question 86

Question
Which of the following security threats involve should surfing and phone phishing?
Answer
  • Man-in-the-Middle
  • Social Engineering
  • Trojan Virus
  • Spyware

Question 87

Question
Which of the following operating systems supports full usage of 8 GB DDR3 RAM?
Answer
  • Window 7 Professional x86
  • Window 7 Home Premium x64
  • Windows XP Professional
  • Windows Vista Home Premium x86

Question 88

Question
A technician would like to ensure all previous data is erased before reloading Windows 7 Home Premium onto a laptop. Which of the following procedures would accomplish this?
Answer
  • Virtual RAID configuration
  • Quick Format
  • New Partition
  • Full Format

Question 89

Question
Which of the following commands, in Windows 7, could a technician use to schedule a disk integrity scan upon next boot?
Answer
  • CHKDSK
  • ROBOCOPY
  • SCANDISK
  • FDISK

Question 90

Question
Which of the following tabs under MSCONFIG would allow technician to configure all of the applications that launch at boot?
Answer
  • Startup
  • Services
  • Tools
  • Boot

Question 91

Question
A technician believes a machine loaded with Windows XP Professional has issues with file integrity of the core OS components. Which of the following commands could be used to both check and replace damaged files?
Answer
  • SFC /SCANNOW
  • CHKDSK /R /F
  • FORMAT C:
  • DISKPART

Question 92

Question
A technician is tasked with building three systems that are capable of utilizing the new Windows HomeGroup functionality. Which of the following versions of Windows would need to be used?
Answer
  • Windows 7 or Windows Vista
  • Windows Vista only
  • Windows XP Professional x64 Edition
  • Windows 7 only

Question 93

Question
Which of the following security threats does NOT use software to extract sensitive information credentials?
Answer
  • Grayware
  • Shoulder surfing
  • Malware
  • Man-in-the-Middle exploits

Question 94

Question
A user is reporting that their screen is flickering at a rapid rate. Which of the following Control panel paths should a technician use in order to remedy this issue?
Answer
  • Display -> Settings -> Advanced-> General -> DPI
  • Display -> Settings -> Resolution
  • Display -> Settings -> Advanced-> Adapter -> Refresh
  • Display -> Appearance-> Effects-> Transistion

Question 95

Question
A user has a laptop that they need to get ready for an outdoor presentation. The user is concerned that the laptop will turn off of the screen or go into standby before their before their presentation complete. Which of the following Control Panel paths should the technician use in order to prevent this from occurring?
Answer
  • System -> Hardware
  • Power Options -> Power Schemes
  • System ->Advanced-> Performance
  • Power Options -> Hibernate

Question 96

Question
Which of the following data transfers will retain the current NTFS permissions of a file?
Answer
  • Copying the file to a different location on the same volume
  • Copying the file to a different location on a different volume
  • Moving the file to a different location on a different volume
  • Moving the file to a different location on the same volume

Question 97

Question
A user's computer keeps producing a "low virtual memory" alert and the speed of the system degrades afterwards. Which of the following Control Panel locations can provide information to review and correct this issue?
Answer
  • System > Remote
  • System > Hardware
  • System > System Restore
  • System > Advanced

Question 98

Question
A user states their workstation will not reach the login screen. Which of the following commands can be uised to write a new partition boot sector to the system partition in the Recovery Console ?
Answer
  • FIXMBR
  • BOOTCFG
  • FIXBOOT
  • DISKPART

Question 99

Question
Which of the following features helps to prevent shoulder surfing?
Answer
  • Native resolution
  • Auto adjust
  • Degaussing
  • Privacy screen

Question 100

Question
A user wants to change the functionality that occurs when the laptop lid is closed. Which of the following Control Panel options is the MOST direct way to adjust this?
Answer
  • Display
  • Power Options
  • Personalization
  • Device Management
Show full summary Hide full summary

Similar

Project Communications Management
farzanajeffri
Common Technology Terms
Julio Aldine Branch-HCPL
Network Protocols
Shannon Anderson-Rush
Abstraction
Shannon Anderson-Rush
Computing
Kwame Oteng-Adusei
HTTPS explained with Carrier Pigeons
Shannon Anderson-Rush
Introduction to the Internet
Shannon Anderson-Rush
Construcción de software
CRHISTIAN SUAREZ
Historical Development of Computer Languages
Shannon Anderson-Rush
Useful String Methods
Shannon Anderson-Rush
Web Designing & Development Full Tutorial
Nandkishor Dhekane