Q1. A technician recently installed a new video card in a PC. The PC already has integrated video on the motherboard. When the technician turns on the PC, there is no video. Which of the following is MOST likely the cause?
A. The motherboard BIOS version is out of date.
B. The incorrect video card drivers are installed.
C. The power connector for the video card is unplugged.
D. The video card is unsupported by the motherboard.
Answer: C
Q2. A technician is trying to prevent a local application from reaching the web due to security concerns. Which of the following solutions could BEST prevent the application from reaching the web? (Select TWO).
A. Configure the workstation for a static IP
B. Disable all wireless network connections
C. Remove shortcuts to the application
D. Block the application in Windows Firewall
E. Change network location to Work
F. Reroute the web address in HOSTS file
Answer: D,F
Q3. A technician has been notified that recent vulnerabilities have been discovered related to a type of SOHO router. The technician has verified that all connections and settings are appropriate. Which of the following actions should the technician take NEXT?
A. Change the router firewall settings
B. Check for and apply a firmware update
C. Reconfigure the QoS settings
D. Change router user-names and passwords
Answer: B
Q4. A user wants to configure a smartphone to save all attachments from an Outlook.com email to a cloud-based service. Which of the following would be BEST to use to accomplish this?
A. Google Drive
B. iCloud
C. One Drive
D. FTP
Answer: C
Q5. Which of the following command line tools will terminate a non-system process without restarting the computer?
A. Shutdown
B. Kill
C. Erase
D. Break
Answer: B
Q6. A technician is called into the office during a thunderstorm. Users are reporting that machines are intermittently powering off. Which of the following will BEST prevent user data loss?
A. Auto save
B. A surge protector
C. An ESD mat
D. A UPS
Answer: D
Q7. CORRECT TEXT
A user has installed two new drives in one of the computers in the computer lab and has been unable to format Disk1 from the command prompt.
The lab requires that Disk1 be a dynamic disk configured with two partitions. The first partition must be 256,000 MB in size and mapped to drive F. The second partition must be 512,000 MB in size and mapped to drive G.
The new partitions must be formatted to ensure that users' files can be secured from other users and that the disk must be configured to account for future redundancy.
Instructions: Conduct the necessary steps within the Disk Manager to accomplish these tasks. When you have completed the simulation, please select the Done button to submit.
Answer: Review the explanation for all details:
Q8. A user’s PC breaks and a technician needs to configure a new machine with a copy of their computer image stored on a remote server. Which of the following technologies would help RIS install this image?
A. BRD
B. DVD
C. USB
D. PXE
E. CD
Answer: D
Q9. A networked PC has started to display adware pop-ups when the user opens the browser. Which of the following best practices should the technician employ FIRST when responding to the problem?
A. Disable System Restore
B. Schedule scans and run updates in safe mode
C. Quarantine the system
D. Create a System Restore point
Answer: C
Q10. A user reports that any URL entered redirects to the same web page. A technician concludes that the user’s computer has been compromised. Which of the following tools would the technician use to resolve the issue?
A. Last known good configuration
B. Anti-malware
C. System restore
D. Rogue antivirus
Answer: B
Q11. A technician is tasked with setting up a user’s webmail on a tablet, phone, and laptop. The user would like the data synced to all three devices. Which of the following items can be synced to the devices via webmail? (Select THREE).
A. Free/busy
B. Programs
C. Documents
D. Calendar
E. Favorites
F. Social media
G. Contacts
Answer: A,D,G
Q12. An unauthorized user observing system security procedures is known as:
A. a worm.
B. shoulder surfing.
C. phishing.
D. spyware.
Answer: B
Q13. A user is unable to find the preferred default network printer in the printers list in the user profile. Which of the following is the FIRST step that should be taken?
A. Map printer
B. Reboot computer
C. Check to see if printer is turned on
D. Log in as a different user and see if printer is mapped
Answer: A
Q14. A technician has purchased a new surge protector to protect equipment in the production environment. The surge protector’s features safeguard the connected equipment by directing surges to the:
A. path of shortest conductance.
B. path of lowest inductance.
C. path of highest voltage.
D. path of least resistance.
Answer: D
Q15. Which of the following is the command line entry to start an archive or restore a process on a Windows XP computer?
A. RECOVER
B. REPLACE
C. NTBACKUP
D. COPY
Answer: C