Q1. A technician must secure company documents from accidental disclosure. Which of the following should be implemented? (Select TWO).
A. User training
B. Anti-malware
C. Paper shredding
D. Time of day restrictions
E. Employee badges
F. Mantraps
Answer: A,C
Q2. DRAG DROP
Drag and drop the following Windows 7 versions in order according to their feature-sets, from MOST to LEAST.
Answer:
Q3. A technician troubleshooting a computer finds a faulty video card and needs to replace it. Which of the following safety procedures should be used to prevent damaging the new part?
A. Ground the computer and remove jewelry.
B. Self ground and handle the new card by the edges.
C. Place the computer on an ESD mat.
D. Attach an ESD strap to the new card during handling.
Answer: B
Q4. A technician is tasked to change the number of CPU cores available to the OS to enhance productivity. Which of the following tools would allow the technician to perform this task?
A. msconfig
B. perfmon
C. taskmgr
D. dxdiag
Answer: A
Q5. Which of the following security threats happens when another person enters a secured area with an authorized person?
A. Tailgating
B. Shoulder surfing
C. Spoofing
D. Phishing
Answer: A
Q6. A technician has been tasked with loading the operating system on every PC with a blank hard drive on a network. The technician wishes to install the operating system with minimal physical interaction with the PCs. Which of the following is the BEST way to accomplish this?
A. Clone the operating system from an image onto optical media.
B. Use the original software media to load the operation system on every PC.
C. Set up a central image that the PCs can load from a PXE boot.
D. Create an image and copy it from a USB drive using an unattended answer file.
Answer: C
Q7. Which of the following should a technician implement to prevent external contractors from physically plugging devices into the company’s network jacks unless such jacks are designated for guest use?
A. Disable DHCP and assign a static IP address to each network device physically connected to the network.
B. Enable MAC address filtering across all network jacks and record the MAC address of guest devices.
C. Disable all switch ports when they are not utilized and enable them on an as needed basis.
D. Place guest network jacks in public areas and all other jacks in secure areas as needed.
Answer: C
Q8. When removing the top case from a laptop, which of the following, besides hand tools, should a technician have on hand to assure correct disassembly and reassembly? (Select TWO).
A. A multimeter and a toner probe.
B. A large cloth to spread the screws and disassembled parts on.
C. A writing pad for documentation and a marker to label cables.
D. A manufacturer’s technical manual for the model of the laptop.
E. A container with separated areas to store different size screws.
Answer: D,E
Q9. A critical server was replaced by the IT staff the previous night. The following morning, some users are reporting that they are unable to browse to the Internet upon booting their workstations. Users who did not shut down their workstations the previous day are able to connect to the Internet. A technician looks at the following report from a workstation with no Internet connectivity:
IP Address: 192.168.1.101
Netmask: 255.255.255.0
DHCP Server:192.168.1.1
DNS Server:192.168.1.2
Default Gateway:192.168.1.1
Given the above report, which of the following is the cause of why some workstations are unable to browse the Internet?
A. The workstation has an APIPA address.
B. The DHCP server is unavailable.
C. The default gateway router is misconfigured.
D. The DHCP server is misconfigured.
Answer: D
Q10. The system administrator is tasked with installing Windows to 100 computers over the network. The systems administrator needs to remove system-specific identifiers. Which of the following would the system administrator use to accomplish this?
A. Windows Deployment Services
B. Remote Installation Services
C. System Preparation Tool
D. Unattended installation
Answer: C
Q11. A technician has just installed a video card in a PC. The video card is not working, although
it was working fine on the test bench. Which of the following Windows tools should the technician use to start troubleshooting the problem?
A. Task Manager
B. Device Manager
C. System Configuration
D. Computer Management
Answer: B
Q12. How would a technician install Windows OS on a MAC OS computer without using third-party software?
A. Terminal
B. Boot Disk
C. Disk Utility
D. Boot Camp
Answer: D
Q13. A small business owner is setting up their wireless network in their office, which is in a building shared with several other businesses. The owner does not want to disable the SSID broadcasting due to visiting customers needing to use the network, but does not want other businesses to notice the network, let alone access it. Which of the following would BEST accomplish this?
A. Configure the access point encryption from unsecured access to WEP.
B. Adjust the radio power so that coverage is restricted to the business.
C. Change the SSID to reflect the business name instead of a public access point.
D. Enable MAC filtering and restrict access to other company’s devices.
Answer: B
Q14. A customer calls an IT consultant to explain an issue they are having with their Windows 7 Professional PC. Windows Update attempts to install patches upon each startup but fails on the same single update. The customer has attempted to re-run Windows Update from Control Panel but the issue remains. Which of the following courses of action would BEST resolve the problem?
A. Running a full DEFRAG on the system
B. Clearing the AppData temp folder entirely
C. Clearing the Windows Update download cache entirely D. Uninstalling the Windows Update feature in Windows 7 and reinstalling it directly from the Microsoft website
Answer: C
Q15. Which of the following describes when an application is able to reuse Windows login credentials?
A. Access control list
B. Principle of least privilege
C. Single sign-on
D. Pass-through authentication
Answer: C