Q1. A customer with a PC has requested assistance setting up Windows 7 parental controls within the web browser. The customer would like to limit how much time a child can spend on a particular website. Which of the following tabs under Internet Options will allow the
user to create those settings?
A. Privacy
B. Advanced
C. Security
D. Content
Answer: D
Q2. A technician is setting up automatic login to desktop for a non-domain Windows XP system. Which of the following administrative tools would accomplish this?
A. User Accounts
B. Network and Sharing Center
C. Task Manager
D. System Configuration
Answer: A
Q3. A PC uses RAID 1. Ann, a technician, has read in the event log that the drive "SATA 1" is no longer in sync with drive "SATA 0". Which of the following steps should she try FIRST to repair this PC to optimal running conditions?
A. Remove SATA 1 from the RAID group then try to re-add it
B. Replace both drives then restore from a backup
C. Remove both drives then switch the SATA channels
D. Replace SATA 1, rebuild the RAID and replace SATA 0
Answer: A
Q4. In order to prevent other users from editing files in ‘C:\ Files’, which of the following steps should be taken?
A. Set NTFS permissions to read only
B. Set the folder to index files for search
C. Set the local administrator as the owner of the folder
D. Set network share permissions to read only
Answer: A
Q5. An end-user is attempting to access a file-sharing site to download files shared by a customer, but is receiving a message stating the site has been blocked. Which of the following is the MOST likely cause of this issue?
A. Antivirus software
B. Internet connectivity issues
C. Ransomware infection
D. Content-filtering
Answer: D
Q6. A user has installed a legacy application in Windows 7 and reports that only some of the functionality in it is operational. Another user is using the same application on a different Windows 7 machine and doesn’t report those problems. Which of the following features in Windows 7 may be responsible for this problem?
A. System Protection settings
B. User Account Control
C. Action Center
D. Data Execution Prevention
Answer: B
Q7. A company is concerned about users tailgating into restricted areas. In order to prevent unauthorized users from following others, which of the following should be implemented?
A. Biometric locks
B. CCTV
C. Mantraps
D. Badge readers
Answer: C
Q8. A technician receives a call regarding a PC’s slow performance. The client states that most applications are slow to respond; boot up and shutdown take much longer than they used to. Hard drive diagnostics pass, but there are error messages in the event viewer stating that the file system is corrupt. Which of the following should the technician do NEXT?
A. Reload the OS using FAT32 instead of NTFS.
B. Change the disk from basic to dynamic.
C. Run chkdsk with the /r switch and reboot the PC.
D. Open the defrag utility and run a drive analysis.
Answer: C
Q9. Joe, an end-user, reports that the Windows PC he is using automatically locks when he leaves his desk and walks to a printer to retrieve documents. Joe is then required to type in his username and password to unlock the computer. The technician looks at the settings on the PC and notices that the screensaver and screen-lock options are grayed out on the computer and cannot be changed. Which of the following is the MOST likely cause of this issue?
A. Domain-level group policies
B. Antivirus domain-level policies
C. Corrupted registry settings
D. Incorrect local-level user policies
Answer: A
Q10. A technician is configuring a SOHO router to ensure network computers can only use secured protocols on the Internet. Which of the following ports should be allowed?
A. 143
B. 23
C. 443
D. 3269
E. 3389
Answer: C
Q11. A technician is tasked to install a 4TB SATA hard disk. Which of the following partitioning technologies should the technician use to satisfy these requirements?
A. GPT
B. Logical
C. MBR
D. Extended
Answer: A
Q12. A company that manages its own cloud, while utilizing a third-party vendor to help manage storage, is implementing which of the following infrastructure types?
A. Hybrid
B. Community
C. Private
D. Public
Answer: A
Q13. A company is looking to donate a collection of old PCs that are no longer needed. Which of the following data destruction methods would be MOST secure for highly sensitive information?
A. Simple 1-pass zero overwrite
B. Low level 3-pass random wipe
C. Low level 7-pass random wipe
D. High level format 10 times
Answer: C
Q14. A user reports paper jams at the location of the paper trays. Which of the following components would need to be replaced to resolve this issue?
A. Fuser
B. Duplexer
C. Pickup roller
D. Imaging drum
Answer: C
Q15. After several passes with a malware removal program, the program keeps detecting the same malware infection after a reboot. Which of the following should be done to attempt to remove the offending malware?
A. Run the malware removal program while disconnected from the Internet
B. Run the malware removal program in Windows Safe Mode
C. Reinstall the malware removal program from a trusted source
D. Set the malware removal program to run each time the computer is rebooted
Answer: B