Q1. DRAG DROP
Drag and drop the following Windows 7 versions in order according to their feature-sets, from MOST to LEAST.
Answer:
Q2. A customer calls an IT consultant to explain an issue they are having with their Windows 7 Professional PC. Windows Update attempts to install patches upon each startup but fails on the same single update. The customer has attempted to re-run Windows Update from Control Panel but the issue remains. Which of the following courses of action would BEST resolve the problem?
A. Running a full DEFRAG on the system
B. Clearing the AppData temp folder entirely
C. Clearing the Windows Update download cache entirely D. Uninstalling the Windows Update feature in Windows 7 and reinstalling it directly from the Microsoft website
Answer: C
Q3. A technician opens a customer’s computer and sees large amounts of accumulated dust. Which of the following is the BEST method of removing the dust from the computer?
A. Use compressed air to free the dust from the components and remove it with an ESD vacuum.
B. Dampen an ESD cloth with denatured alcohol and use it to gently wipe the dust away.
C. Use a shop vacuum with enough power to ensure all dust has been removed.
D. Remove as much dust as possible by hand and use compressed air to blow the rest out.
Answer: A
Q4. CORRECT TEXT
A Windows 7 machine appears to have a failure. Every time it is rebooted, the message "BOOTMGR is missing" appears. You have previously inserted a Windows 7 installation DVD into the DVD-ROM. Please repair this failure without overwriting the customers' local user profiles.
Instructions:
Launch the simulation to repair the failure
Type Help in command line to show list of available commands
When you have completed the simulation, please select the done button.
Answer: Please review explanation for detailed answer.
Q5. A user receives an unsolicited call from a technician claiming to be from a Microsoft certified partner. The technician tricks the user into allowing them access to their PC because of malware alerts that were being broadcasted. Which of the following attacks is this user a victim of?
A. Shoulder surfing
B. Phishing attack
C. Social engineering
D. Malware infection
Answer: C
Q6. A technician is trying to install Windows on a computer. The install process reports there are no storage devices available, but the BIOS shows a hard drive is installed. Which of the following does the technician need to do?
A. Create a primary partition
B. Use NTFS
C. Enable PXE
D. Install third-party drivers
Answer: D
Q7. Which of the following should a technician implement to prevent external contractors from physically plugging devices into the company’s network jacks unless such jacks are designated for guest use?
A. Disable DHCP and assign a static IP address to each network device physically connected to the network.
B. Enable MAC address filtering across all network jacks and record the MAC address of guest devices.
C. Disable all switch ports when they are not utilized and enable them on an as needed basis.
D. Place guest network jacks in public areas and all other jacks in secure areas as needed.
Answer: C
Q8. A recent data breach has revealed that compromised files contained employee photos, names, and addresses. This information is sensitive because it is considered to be:
A. a detriment to employer/employee relations.
B. personally identifiable information.
C. a violation of information access policies.
D. proof of employee corporate affiliation.
Answer: B
Q9. A technician has just fixed a user’s PC and successfully removed a virus and malware from the machine. Which of the following is the LAST thing the technician should do?
A. Educate the user regarding Internet browsing best practices
B. Update the anti-malware software on the user’s PC
C. Schedule scans and run updates
D. Enable system restore and create restore point
Answer: A
Q10. A user has been granted permission to access the corporate network from a personal smartphone. Which of the following should a technician perform before configuring the phone for access?
A. Check the phone for unauthorized root access
B. Disable the phone’s Bluetooth chip
C. Erase all personal data from the phone
D. Check the phone for location tracking
Answer: A
Q11. A technician needs to log into a user's computer to fix the user's corrupt local profile. Which of the following connectivity tools will allow the technician to connect to the user’s computer?
A. Remote Assistance
B. Virtual Private Network
C. Computer Management
D. Remote Desktop
Answer: D
Q12. CORRECT TEXT
A Windows 7 machine appears to have a failure. Every time it is rebooted, the message "BOOTMGR is missing" appears. You have previously inserted a Windows 7 installation DVD into the DVD-ROM. Please repair this failure without overwriting the customers' local user profiles.
Instructions:
. Launch the simulation to repair the failure
. Type Help in command line to show list of available commands
. When you have completed the simulation, please select the done button.
Answer: Review the explanation for all details:
Q13. A user wants to configure a smartphone to save all attachments from an Outlook.com email to a cloud-based service. Which of the following would be BEST to use to accomplish this?
A. Google Drive
B. iCloud
C. One Drive
D. FTP
Answer: C
Q14. A user states that when typing in directions on a navigation website, the map is not viewable in a newer web browser. The technician runs updates to Java, but is still unable to view the map. The technician should change which of the following Internet Options?
A. Compatibility view
B. Manage add-ons
C. Clear browser cache
D. Pop-up blocker
Answer: A
Q15. A turnstile is an example of which of the following forms of physical security?
A. Entry control roster
B. Biometrics
C. Mantrap
D. Cipher lock
Answer: C