Q1. A technician is tasked to install a 4TB SATA hard disk. Which of the following partitioning technologies should the technician use to satisfy these requirements?
A. GPT
B. Logical
C. MBR
D. Extended
Answer: A
Q2. Which of the following tools is used to type or paste recovery commands directly into a Linux box?
A. Shell/terminal
B. Backup/time machine
C. Command/cmd
D. Restore/snapshot
Answer: A
Q3. A user, Ann, has reported that she lost a laptop. The laptop had sensitive corporate information on it that has been published on the Internet. Which of the following is the FIRST step in implementing a best practice security policy?
A. Require biometric identification to log into the laptop.
B. Require multifactor authentication to log into laptop.
C. Require laptop hard drives to be encrypted.
D. Require users to change their password at frequent intervals.
E. Require users to have strong passwords.
Answer: C
Q4. A technician is installing Bluetooth speakers in a conference room. Which of the following will be the average operating range of the speakers?
A. 10 feet (3 meters)
B. 15 feet (5 meters)
C. 30 feet (9 meters)
D. 45 feet (14 meters)
Answer: C
Q5. Which of the following network hosts would MOST likely provide the services needed to allow client access to Internet web pages?
A. File server
B. Web server
C. WINS server
D. Proxy server
Answer: D
Q6. A company has subscribed to a cloud service, paying monthly for a block of services and being billed incrementally when they exceed the monthly fee. Which of the following cloud concepts does this represent?
A. Measured service
B. Rapid elasticity
C. On-demand
D. Resource pooling
Answer: A
Q7. A PC is powering on but the only activity a technician can see is spinning fans. Which of the following components would MOST likely be at fault for such a condition? (Select TWO).
A. SATA controller
B. CPU
C. Memory
D. Hard drive
E. Sound card
Answer: B,C
Q8. A technician is trying to install Windows on a computer. The install process reports there are no storage devices available, but the BIOS shows a hard drive is installed. Which of the following does the technician need to do?
A. Create a primary partition
B. Use NTFS
C. Enable PXE
D. Install third-party drivers
Answer: D
Q9. A technician needs to perform a backup while a system is running. Which of the following services allows this task to be accomplished?
A. Robocopy
B. Shadow copy
C. Xcopy
D. System restore
Answer: B
Q10. Joe, a user, is using his smartphone for navigation while driving. As he drives, an icon frequently appears on the screen informing the user additional information is required to log in. Which of the following is causing this?
A. Unintended WiFi connections
B. Cellular data roaming notifications
C. Weak cellular signal
D. Unintended Bluetooth connections
Answer: A
Q11. A technician receives a report that the pages coming out of a laser printer are smearing when touched. Which of the following components should the technician check FIRST to
resolve this issue?
A. Drum
B. Fuser
C. Pickup roller
D. Corona wire
Answer: B
Q12. Which of the following prevention methods is considered to be digital security?
A. RFID badge
B. Mantrap
C. Biometrics
D. Firewalls
E. ID badge
Answer: D
Q13. A technician is tasked with setting up a user’s webmail on a tablet, phone, and laptop. The user would like the data synced to all three devices. Which of the following items can be synced to the devices via webmail? (Select THREE).
A. Free/busy
B. Programs
C. Documents
D. Calendar
E. Favorites
F. Social media
G. Contacts
Answer: A,D,G
Q14. An end-user is attempting to access a file-sharing site to download files shared by a customer, but is receiving a message stating the site has been blocked. Which of the following is the MOST likely cause of this issue?
A. Antivirus software
B. Internet connectivity issues
C. Ransomware infection
D. Content-filtering
Answer: D
Q15. A technician has been tasked with limiting the users who can connect to a network printer located centrally within an office environment. Which of the following tools would be the BEST to utilize to achieve this goal?
A. VPN
B. ACL
C. RDP
D. DLP
Answer: B