Q1. A technician is trying to prevent a local application from reaching the web due to security concerns. Which of the following solutions could BEST prevent the application from reaching the web? (Select TWO).
A. Configure the workstation for a static IP
B. Disable all wireless network connections
C. Remove shortcuts to the application
D. Block the application in Windows Firewall
E. Change network location to Work
F. Reroute the web address in HOSTS file
Answer: D,F
Q2. A technician has successfully completed a gpupdate from a CMD box of a user’s PC and is ready to move to the next user. Which of the following is the appropriate NEXT step? (Select TWO).
A. View the CMD process in Task Manager
B. Type EXIT at the command prompt and press Enter
C. Minimize the CMD box to the taskbar
D. Click the “x” in the top right of the CMD window
E. Select Switch User on the PC
Answer: B,D
Q3. A customer calls the help desk to report an issue. The customer suggests that the problem is hardware related, but the technician knows from the description that this is not the case. Which of the following is the BEST course of action for the technician?
A. Follow the customer’s prescribed course of action.
B. Convince the customer to take a better course of action to resolve the issue.
C. Explain why the customer’s prescribed course of action is incorrect.
D. Acknowledge the customer’s input, but follow another course of action.
Answer: D
Q4. A technician has been given a PC that is not powering up. After brief troubleshooting, the technician comes to the conclusion the power supply needs to be replaced. Which of the following is the NEXT step in the process of performing the repair?
A. The technician should replace the power supply
B. The technician should review disposal regulations
C. The technician should check the environment
D. The technician should remove jewelry
Answer: D
Q5. A technician has upgraded four computers and would like to securely repurpose the hard drives for later use. Which of the following should the technician do to the drives to prepare them for later use?
A. chkdsk
B. Degauss
C. Quick format
D. Drive wipe
Answer: D
Q6. A networked PC has started to display adware pop-ups when the user opens the browser. Which of the following best practices should the technician employ FIRST when responding to the problem?
A. Disable System Restore
B. Schedule scans and run updates in safe mode
C. Quarantine the system
D. Create a System Restore point
Answer: C
Q7. When removing the top case from a laptop, which of the following, besides hand tools, should a technician have on hand to assure correct disassembly and reassembly? (Select TWO).
A. A multimeter and a toner probe.
B. A large cloth to spread the screws and disassembled parts on.
C. A writing pad for documentation and a marker to label cables.
D. A manufacturer’s technical manual for the model of the laptop.
E. A container with separated areas to store different size screws.
Answer: D,E
Q8. A technician would like to ensure all previous data is erased before reloading Windows 7
Home Premium onto a laptop. Which of the following procedures would accomplish this?
A. Virtual RAID configuration
B. Quick format
C. New partition
D. Full format
Answer: D
Q9. A user, Ann, reports that she suspects her workstation has malware. Joe, the technician, confirms malware exists and starts the process of removing the malware. Which of the
following is the FIRST step he should take in removing the malware?
A. Disable antivirus
B. Disable system restore
C. Enable hard drive encryption
D. Format the hard drive
Answer: B
Q10. A technician is configuring a SOHO wireless router for a small business with three employees. After the three employees’ laptops have successfully connected to the wireless network, the company would like to prevent additional access to the wireless network. The technician enables WPA2 on the wireless router. Which of the following additional settings should the technician change?
A. Enable MAC filtering
B. Disable SSID broadcast
C. Reduce radio power level
D. Update router firmware
Answer: A
Q11. Which of the following Windows utilities would MOST likely be used to identify system errors?
A. System Restore
B. Event Viewer
C. Security Center
D. Windows Defender
Answer: B
Q12. DRAG DROP
A technician has verified that Joe, a user, has a malware infection on his desktop. Drag and drop the following malware remediation techniques in the correct order Joe should follow to alleviate this issue.
Answer:
Q13. A user has installed a legacy application in Windows 7 and reports that only some of the functionality in it is operational. Another user is using the same application on a different Windows 7 machine and doesn’t report those problems. Which of the following features in Windows 7 may be responsible for this problem?
A. System Protection settings
B. User Account Control
C. Action Center
D. Data Execution Prevention
Answer: B
Q14. A customer is experiencing issues with email and calls the help desk. The technician
determines it would help clarify the issue if the customer agrees to share their desktop. Prior to establishing a Remote Desktop Assistance connection with a customer, a technician should ask the customer to:
A. close any items of a personal nature.
B. reboot the computer and log back in.
C. capture a screen-shot of the error message.
D. take steps to reproduce the error.
Answer: A
Q15. A user is installing Windows 7 on a PC with a RAID card. The user has verified all of the cables are connected correctly, but the installation media does not detect any hard drives. Which of the following should the user do to help detect the hard drives?
A. Press F8 when prompted
B. Hit the refresh button to force a re-detect
C. Enable PATA in the BIOS
D. Select load driver
Answer: D