You have already completed the Test before. Hence you can not start it again.
Test is loading...
You must sign in or sign up to start the Test.
You have to finish following quiz, to start this Test:
Your results are here!! for" CompTIA A+ (220-1001 & 220-1002) Practice Test 1 "
0 of 60 questions answered correctly
Your time:
Time has elapsed
Your Final Score is : 0
You have attempted : 0
Number of Correct Questions : 0 and scored 0
Number of Incorrect Questions : 0 and Negative marks 0
Average score
Your score
CompTIA A+ (220-1001 & 220-1002)
You have attempted: 0
Number of Correct Questions: 0 and scored 0
Number of Incorrect Questions: 0 and Negative marks 0
You can review your answers by clicking view questions. Important Note : Open Reference Documentation Links in New Tab (Right Click and Open in New Tab).
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
Answered
Review
Question 1 of 60
1. Question
You just installed a maintenance kit to a laser printer. Which of the following steps should you take next?
Correct
Print a test page after doing preventative maintenance to a laser printer.
Incorrect Answers: Normally, when you maintain a laser printer, you power it down and unplug it before any work begins. So, you do not need to restart the printer; when you finish, you simply start it. You also do not need to restore a printer to factory settings unless it fails. Your preventative maintenance will hopefully stave off that dark day. The paper trays probably still have paper in them, and regardless, part of preventative maintenance is to fill the trays. Printing the test page should be last.
Incorrect
Print a test page after doing preventative maintenance to a laser printer.
Incorrect Answers: Normally, when you maintain a laser printer, you power it down and unplug it before any work begins. So, you do not need to restart the printer; when you finish, you simply start it. You also do not need to restore a printer to factory settings unless it fails. Your preventative maintenance will hopefully stave off that dark day. The paper trays probably still have paper in them, and regardless, part of preventative maintenance is to fill the trays. Printing the test page should be last.
Unattempted
Print a test page after doing preventative maintenance to a laser printer.
Incorrect Answers: Normally, when you maintain a laser printer, you power it down and unplug it before any work begins. So, you do not need to restart the printer; when you finish, you simply start it. You also do not need to restore a printer to factory settings unless it fails. Your preventative maintenance will hopefully stave off that dark day. The paper trays probably still have paper in them, and regardless, part of preventative maintenance is to fill the trays. Printing the test page should be last.
Question 2 of 60
2. Question
Which of the following are Microsoft operating systems? (Select all correct answers.)
Correct
Windows 8.1, Windows 10 (version 1803), and Windows 7 are all Microsoft operating systems that you should know for the exam.
Incorrect Answers: iOS is the operating system Apple uses on its mobile devices. Android is the competitor of iOS and is an open-source operating system used on many other manufacturers’ mobile devices. Android is developed from Linux. The original Linux was made for PCs with the goal of being a freely accessible, opensource platform; today it is more commonly found in server form. Okay, that was an easy one…moving on!
Incorrect
Windows 8.1, Windows 10 (version 1803), and Windows 7 are all Microsoft operating systems that you should know for the exam.
Incorrect Answers: iOS is the operating system Apple uses on its mobile devices. Android is the competitor of iOS and is an open-source operating system used on many other manufacturers’ mobile devices. Android is developed from Linux. The original Linux was made for PCs with the goal of being a freely accessible, opensource platform; today it is more commonly found in server form. Okay, that was an easy one…moving on!
Unattempted
Windows 8.1, Windows 10 (version 1803), and Windows 7 are all Microsoft operating systems that you should know for the exam.
Incorrect Answers: iOS is the operating system Apple uses on its mobile devices. Android is the competitor of iOS and is an open-source operating system used on many other manufacturers’ mobile devices. Android is developed from Linux. The original Linux was made for PCs with the goal of being a freely accessible, opensource platform; today it is more commonly found in server form. Okay, that was an easy one…moving on!
Question 3 of 60
3. Question
Where are restore points stored after they are created?
Correct
After a restore point is made, it is stored in the System Volume Information folder. To view this folder, you must log on as an administrator, show hidden files and folders, and then assign permissions to the account that wants to view that folder. It is located in the root of the volume that the restore point was created for.
Incorrect Answers: The Recycler folder is the place where deleted information is stored temporarily (until the Recycle Bin is emptied). The System32 folder houses many of the 64-bit system files for the operating system. The %systemroot% folder is, by default, C:\Windows.
Incorrect
After a restore point is made, it is stored in the System Volume Information folder. To view this folder, you must log on as an administrator, show hidden files and folders, and then assign permissions to the account that wants to view that folder. It is located in the root of the volume that the restore point was created for.
Incorrect Answers: The Recycler folder is the place where deleted information is stored temporarily (until the Recycle Bin is emptied). The System32 folder houses many of the 64-bit system files for the operating system. The %systemroot% folder is, by default, C:\Windows.
Unattempted
After a restore point is made, it is stored in the System Volume Information folder. To view this folder, you must log on as an administrator, show hidden files and folders, and then assign permissions to the account that wants to view that folder. It is located in the root of the volume that the restore point was created for.
Incorrect Answers: The Recycler folder is the place where deleted information is stored temporarily (until the Recycle Bin is emptied). The System32 folder houses many of the 64-bit system files for the operating system. The %systemroot% folder is, by default, C:\Windows.
Question 4 of 60
4. Question
One of your customers has a defective disk. Which command can be used to extract readable information?
Correct
The Recover command can recover readable information from a bad or defective disk. The disk should be attached (slaved) to a working computer to get back the data.
Incorrect Answers: The Replace command replaces source and destination files but does not recover lost information. Convert changes a file system from FAT to NTFS without losing data. REM records comments in a batch file (.bat) or within config.sys, a root file not typically used in Windows.
Incorrect
The Recover command can recover readable information from a bad or defective disk. The disk should be attached (slaved) to a working computer to get back the data.
Incorrect Answers: The Replace command replaces source and destination files but does not recover lost information. Convert changes a file system from FAT to NTFS without losing data. REM records comments in a batch file (.bat) or within config.sys, a root file not typically used in Windows.
Unattempted
The Recover command can recover readable information from a bad or defective disk. The disk should be attached (slaved) to a working computer to get back the data.
Incorrect Answers: The Replace command replaces source and destination files but does not recover lost information. Convert changes a file system from FAT to NTFS without losing data. REM records comments in a batch file (.bat) or within config.sys, a root file not typically used in Windows.
Question 5 of 60
5. Question
What is the delay in the RAM’s response to a request from the memory controller called?
Correct
Memory latency or CAS (column address strobe) latency happens when a memory controller tries to access data from a memory module. It is a slight delay (usually measured in nanoseconds) while the memory module responds to the memory controller. It is also known as CL. The memory controller (also known as the northbridge) has a specific speed at which it operates. If the CPU asks the chip for too much information at once, this might increase latency time while the memory controller works.
Incorrect Answers: The terms standard deviation and fetch interval deal with CPUs. Lag is a term that is similar to latency but is more commonly associated with network connections.
Incorrect
Memory latency or CAS (column address strobe) latency happens when a memory controller tries to access data from a memory module. It is a slight delay (usually measured in nanoseconds) while the memory module responds to the memory controller. It is also known as CL. The memory controller (also known as the northbridge) has a specific speed at which it operates. If the CPU asks the chip for too much information at once, this might increase latency time while the memory controller works.
Incorrect Answers: The terms standard deviation and fetch interval deal with CPUs. Lag is a term that is similar to latency but is more commonly associated with network connections.
Unattempted
Memory latency or CAS (column address strobe) latency happens when a memory controller tries to access data from a memory module. It is a slight delay (usually measured in nanoseconds) while the memory module responds to the memory controller. It is also known as CL. The memory controller (also known as the northbridge) has a specific speed at which it operates. If the CPU asks the chip for too much information at once, this might increase latency time while the memory controller works.
Incorrect Answers: The terms standard deviation and fetch interval deal with CPUs. Lag is a term that is similar to latency but is more commonly associated with network connections.
Question 6 of 60
6. Question
Setting an administrator password in the BIOS accomplishes which of the following?
Correct
Setting an admin password in the UEFI/BIOS prevents a user from rearranging the boot order. The idea behind this is to stop a person from attempting to boot off an optical disc or USB flash drive. As an administrator, you should change the BIOS boot order to hard drive first. Then apply an administrative password. That’ll stop ‘em right in their tracks!
Incorrect Answers: The administrator password does not prevent any of the other listed answers. To prevent a user from reading email, you would have to remove email applications (such as Outlook) and probably take away the browser, too. (Doesn’t sound feasible.) To prevent a virus from infecting the MBR, you could turn on boot sector scanning in the BIOS (if the motherboard supports it). To prevent an attacker from opening the case, use a case lock. To find out if someone attempted to get into the computer itself, turn on the chassis intrusion alert in the BIOS.
Incorrect
Setting an admin password in the UEFI/BIOS prevents a user from rearranging the boot order. The idea behind this is to stop a person from attempting to boot off an optical disc or USB flash drive. As an administrator, you should change the BIOS boot order to hard drive first. Then apply an administrative password. That’ll stop ‘em right in their tracks!
Incorrect Answers: The administrator password does not prevent any of the other listed answers. To prevent a user from reading email, you would have to remove email applications (such as Outlook) and probably take away the browser, too. (Doesn’t sound feasible.) To prevent a virus from infecting the MBR, you could turn on boot sector scanning in the BIOS (if the motherboard supports it). To prevent an attacker from opening the case, use a case lock. To find out if someone attempted to get into the computer itself, turn on the chassis intrusion alert in the BIOS.
Unattempted
Setting an admin password in the UEFI/BIOS prevents a user from rearranging the boot order. The idea behind this is to stop a person from attempting to boot off an optical disc or USB flash drive. As an administrator, you should change the BIOS boot order to hard drive first. Then apply an administrative password. That’ll stop ‘em right in their tracks!
Incorrect Answers: The administrator password does not prevent any of the other listed answers. To prevent a user from reading email, you would have to remove email applications (such as Outlook) and probably take away the browser, too. (Doesn’t sound feasible.) To prevent a virus from infecting the MBR, you could turn on boot sector scanning in the BIOS (if the motherboard supports it). To prevent an attacker from opening the case, use a case lock. To find out if someone attempted to get into the computer itself, turn on the chassis intrusion alert in the BIOS.
Question 7 of 60
7. Question
Which of the following steps should be performed when troubleshooting a Bluetooth connection that is malfunctioning? (Select the two best answers.)
Correct
Check if you are within range; the range of Bluetooth devices is limited; for example, Class 2 devices are limited to 10 meters. Also try power cycling the Bluetooth program by turning Bluetooth off and on. In addition to those correct answers, you can try charging the device, restarting the device, working with a known good Bluetooth device, attempting to forget the device, and reconnecting it.
Incorrect Answers: WLAN is a separate wireless technology from Bluetooth, so it should not have any bearing on how Bluetooth functions. If devices are paired within Bluetooth, they should work; unpairing and repairing should not have any effect.
Incorrect
Check if you are within range; the range of Bluetooth devices is limited; for example, Class 2 devices are limited to 10 meters. Also try power cycling the Bluetooth program by turning Bluetooth off and on. In addition to those correct answers, you can try charging the device, restarting the device, working with a known good Bluetooth device, attempting to forget the device, and reconnecting it.
Incorrect Answers: WLAN is a separate wireless technology from Bluetooth, so it should not have any bearing on how Bluetooth functions. If devices are paired within Bluetooth, they should work; unpairing and repairing should not have any effect.
Unattempted
Check if you are within range; the range of Bluetooth devices is limited; for example, Class 2 devices are limited to 10 meters. Also try power cycling the Bluetooth program by turning Bluetooth off and on. In addition to those correct answers, you can try charging the device, restarting the device, working with a known good Bluetooth device, attempting to forget the device, and reconnecting it.
Incorrect Answers: WLAN is a separate wireless technology from Bluetooth, so it should not have any bearing on how Bluetooth functions. If devices are paired within Bluetooth, they should work; unpairing and repairing should not have any effect.
Question 8 of 60
8. Question
Making data appear as if it is coming from somewhere other than its original source is known as which of the following terms?
Correct
Spoofing is when a malicious user makes web pages, data, or email appear to be coming from somewhere else.
Incorrect Answers: Impersonation is to present oneself as another person, imitating that other person’s characteristics. It is often a key element in what is known as pretexting—the inventing of a scenario in the hopes that a key person will reveal confidential information. Phishing is when a person fraudulently attempts to gain confidential information from unsuspecting users. Zeroday attacks exploit vulnerabilities that haven’t even been discovered yet or have been discovered but have not been disclosed through the proper channels so that security administrators can be aware of them.
Incorrect
Spoofing is when a malicious user makes web pages, data, or email appear to be coming from somewhere else.
Incorrect Answers: Impersonation is to present oneself as another person, imitating that other person’s characteristics. It is often a key element in what is known as pretexting—the inventing of a scenario in the hopes that a key person will reveal confidential information. Phishing is when a person fraudulently attempts to gain confidential information from unsuspecting users. Zeroday attacks exploit vulnerabilities that haven’t even been discovered yet or have been discovered but have not been disclosed through the proper channels so that security administrators can be aware of them.
Unattempted
Spoofing is when a malicious user makes web pages, data, or email appear to be coming from somewhere else.
Incorrect Answers: Impersonation is to present oneself as another person, imitating that other person’s characteristics. It is often a key element in what is known as pretexting—the inventing of a scenario in the hopes that a key person will reveal confidential information. Phishing is when a person fraudulently attempts to gain confidential information from unsuspecting users. Zeroday attacks exploit vulnerabilities that haven’t even been discovered yet or have been discovered but have not been disclosed through the proper channels so that security administrators can be aware of them.
Question 9 of 60
9. Question
Which of the following is considered to be governmentregulated data?
Correct
PII stands for personally identifiable information. It is regulated by many laws such as the Privacy Act of 1974 and several others, including GDPR and PCI-DSS.
Incorrect Answers: DRM stands for Digital Rights Management, which is a way of protecting data from illegal copying and distribution. EULA stands for enduser licensing agreement, which is an agreement seen in software such as Windows and Office. DMCA stands for the Digital Millennium Copyright Act, which provides laws dealing with digital information and ownership.
Incorrect
PII stands for personally identifiable information. It is regulated by many laws such as the Privacy Act of 1974 and several others, including GDPR and PCI-DSS.
Incorrect Answers: DRM stands for Digital Rights Management, which is a way of protecting data from illegal copying and distribution. EULA stands for enduser licensing agreement, which is an agreement seen in software such as Windows and Office. DMCA stands for the Digital Millennium Copyright Act, which provides laws dealing with digital information and ownership.
Unattempted
PII stands for personally identifiable information. It is regulated by many laws such as the Privacy Act of 1974 and several others, including GDPR and PCI-DSS.
Incorrect Answers: DRM stands for Digital Rights Management, which is a way of protecting data from illegal copying and distribution. EULA stands for enduser licensing agreement, which is an agreement seen in software such as Windows and Office. DMCA stands for the Digital Millennium Copyright Act, which provides laws dealing with digital information and ownership.
Question 10 of 60
10. Question
Your friend is playing the latest first-person game on a PC, but the screen is pausing during game play. Your friend has a high-end graphics card and the maximum memory for the motherboard. Which of the following statements best describes how to remedy the problem?
Correct
If you see video issues such as pausing during game play, upgrade the video drivers. Make sure that you download the latest video driver from the manufacturer’s website. Gamers cannot rely on Microsoft drivers.
Incorrect Answers: Sometimes reinstalling a game is necessary but shouldn’t be in this scenario. Replacing the hard drive and reinstalling the OS are drastic and unnecessary measures for this problem.
Incorrect
If you see video issues such as pausing during game play, upgrade the video drivers. Make sure that you download the latest video driver from the manufacturer’s website. Gamers cannot rely on Microsoft drivers.
Incorrect Answers: Sometimes reinstalling a game is necessary but shouldn’t be in this scenario. Replacing the hard drive and reinstalling the OS are drastic and unnecessary measures for this problem.
Unattempted
If you see video issues such as pausing during game play, upgrade the video drivers. Make sure that you download the latest video driver from the manufacturer’s website. Gamers cannot rely on Microsoft drivers.
Incorrect Answers: Sometimes reinstalling a game is necessary but shouldn’t be in this scenario. Replacing the hard drive and reinstalling the OS are drastic and unnecessary measures for this problem.
Question 11 of 60
11. Question
A user’s time and date keep resetting to January 1, 2012. Which of the following is the most likely cause?
Correct
If the time and date keep resetting—for example, to a date such as January 1, 2012—chances are that the lithium battery needs to be replaced. These are usually nickel-sized batteries; most PCs use a CR2032 lithium battery.
Incorrect Answers: Updating the UEFI/BIOS allows the PC to “see” new devices and communicate with them better, but it will not fix the time issue. Updating Windows will not fix this problem, but it should be done often to keep the computer secure. Other date and time synchronization problems can be fixed in the clock settings within the Notification Area. Windows client computers should be configured to synchronize to a time server.
Incorrect
If the time and date keep resetting—for example, to a date such as January 1, 2012—chances are that the lithium battery needs to be replaced. These are usually nickel-sized batteries; most PCs use a CR2032 lithium battery.
Incorrect Answers: Updating the UEFI/BIOS allows the PC to “see” new devices and communicate with them better, but it will not fix the time issue. Updating Windows will not fix this problem, but it should be done often to keep the computer secure. Other date and time synchronization problems can be fixed in the clock settings within the Notification Area. Windows client computers should be configured to synchronize to a time server.
Unattempted
If the time and date keep resetting—for example, to a date such as January 1, 2012—chances are that the lithium battery needs to be replaced. These are usually nickel-sized batteries; most PCs use a CR2032 lithium battery.
Incorrect Answers: Updating the UEFI/BIOS allows the PC to “see” new devices and communicate with them better, but it will not fix the time issue. Updating Windows will not fix this problem, but it should be done often to keep the computer secure. Other date and time synchronization problems can be fixed in the clock settings within the Notification Area. Windows client computers should be configured to synchronize to a time server.
Question 12 of 60
12. Question
Which of the following commands displays a network interface card’s MAC address?
Correct
Ipconfig/all shows a lot of information, including the MAC address, as well as the DNS server, DHCP information, and more.
Incorrect Answers: Plain old ipconfig shows only the IP address, subnet mask, and gateway address. Ping tests whether other computers are alive on the network. Ipconfig/release is used to troubleshoot DHCP-obtained IP addresses. It is often used in conjunction with ipconfig/renew.
Incorrect
Ipconfig/all shows a lot of information, including the MAC address, as well as the DNS server, DHCP information, and more.
Incorrect Answers: Plain old ipconfig shows only the IP address, subnet mask, and gateway address. Ping tests whether other computers are alive on the network. Ipconfig/release is used to troubleshoot DHCP-obtained IP addresses. It is often used in conjunction with ipconfig/renew.
Unattempted
Ipconfig/all shows a lot of information, including the MAC address, as well as the DNS server, DHCP information, and more.
Incorrect Answers: Plain old ipconfig shows only the IP address, subnet mask, and gateway address. Ping tests whether other computers are alive on the network. Ipconfig/release is used to troubleshoot DHCP-obtained IP addresses. It is often used in conjunction with ipconfig/renew.
Question 13 of 60
13. Question
A customer brings in a computer that doesn’t display anything when it is turned on. You verify that the computer and monitor are receiving power and that the monitor is securely connected to the computer’s only video port. Which of the following is the most likely cause of this problem? (Select all that apply.)
Correct
If the computer is receiving power, everything is hooked up properly, and there is no display, you need to consider the big four: motherboard, CPU, video card, and RAM. These are the four components of the computer that could cause a no-display issue. The most common is the video card. Check whether it is seated properly into the expansion slot. You should also check whether that card works in one of your test systems. Next, check whether the RAM and then the CPU are properly installed and compatible. Finally, check the motherboard, if necessary. Of course, at the beginning of this process, you should inquire of the customer when this computer failed and if anything was recently modified on the system. Doing so might help you troubleshoot the problem. You would question the user during step 1 of the CompTIA A+ troubleshooting process: Identify the problem.
Incorrect Answers: The hard drive won’t even be accessed if the system’s RAM, motherboard, or CPU fails because the system won’t even POST. There will be little to no activity on the hard drive LED. If the video card failed, the system might still boot, but without video, and you would see some hard drive LED activity. However, some systems will not boot; lack of video will cause the system to stop at POST. The DVD-ROM drive won’t cause a no-display issue because it is a secondary device. The power supply is not the cause of the problem in this case. The scenario said that the computer was receiving power. If the power supply failed, nothing would happen when you press the computer’s power-on button. If the SATA data cable were disconnected (and that was the only problem), you would get video; the system would POST (and most likely record a hard drive error); and then when the system attempted to boot to the hard drive, you would get a “missing OS” error or a similar message.
Incorrect
If the computer is receiving power, everything is hooked up properly, and there is no display, you need to consider the big four: motherboard, CPU, video card, and RAM. These are the four components of the computer that could cause a no-display issue. The most common is the video card. Check whether it is seated properly into the expansion slot. You should also check whether that card works in one of your test systems. Next, check whether the RAM and then the CPU are properly installed and compatible. Finally, check the motherboard, if necessary. Of course, at the beginning of this process, you should inquire of the customer when this computer failed and if anything was recently modified on the system. Doing so might help you troubleshoot the problem. You would question the user during step 1 of the CompTIA A+ troubleshooting process: Identify the problem.
Incorrect Answers: The hard drive won’t even be accessed if the system’s RAM, motherboard, or CPU fails because the system won’t even POST. There will be little to no activity on the hard drive LED. If the video card failed, the system might still boot, but without video, and you would see some hard drive LED activity. However, some systems will not boot; lack of video will cause the system to stop at POST. The DVD-ROM drive won’t cause a no-display issue because it is a secondary device. The power supply is not the cause of the problem in this case. The scenario said that the computer was receiving power. If the power supply failed, nothing would happen when you press the computer’s power-on button. If the SATA data cable were disconnected (and that was the only problem), you would get video; the system would POST (and most likely record a hard drive error); and then when the system attempted to boot to the hard drive, you would get a “missing OS” error or a similar message.
Unattempted
If the computer is receiving power, everything is hooked up properly, and there is no display, you need to consider the big four: motherboard, CPU, video card, and RAM. These are the four components of the computer that could cause a no-display issue. The most common is the video card. Check whether it is seated properly into the expansion slot. You should also check whether that card works in one of your test systems. Next, check whether the RAM and then the CPU are properly installed and compatible. Finally, check the motherboard, if necessary. Of course, at the beginning of this process, you should inquire of the customer when this computer failed and if anything was recently modified on the system. Doing so might help you troubleshoot the problem. You would question the user during step 1 of the CompTIA A+ troubleshooting process: Identify the problem.
Incorrect Answers: The hard drive won’t even be accessed if the system’s RAM, motherboard, or CPU fails because the system won’t even POST. There will be little to no activity on the hard drive LED. If the video card failed, the system might still boot, but without video, and you would see some hard drive LED activity. However, some systems will not boot; lack of video will cause the system to stop at POST. The DVD-ROM drive won’t cause a no-display issue because it is a secondary device. The power supply is not the cause of the problem in this case. The scenario said that the computer was receiving power. If the power supply failed, nothing would happen when you press the computer’s power-on button. If the SATA data cable were disconnected (and that was the only problem), you would get video; the system would POST (and most likely record a hard drive error); and then when the system attempted to boot to the hard drive, you would get a “missing OS” error or a similar message.
Question 14 of 60
14. Question
Which of the following is the most secure password?
Correct
A password gets more secure as you increase its length and then add capital letters, numbers, and finally special characters. Note that Marqu1s_De_S0d_ver_2 has a capital M, a 1 in the place of an I, underscores, a capital D, a capital S, and a zero. Plus, it is lengthy; it has 20 characters. Fifteen characters or more is an industry standard for highly secure passwords.
Incorrect Answers: The rest of the passwords are either not as long or not as complex as the correct answer.
Incorrect
A password gets more secure as you increase its length and then add capital letters, numbers, and finally special characters. Note that Marqu1s_De_S0d_ver_2 has a capital M, a 1 in the place of an I, underscores, a capital D, a capital S, and a zero. Plus, it is lengthy; it has 20 characters. Fifteen characters or more is an industry standard for highly secure passwords.
Incorrect Answers: The rest of the passwords are either not as long or not as complex as the correct answer.
Unattempted
A password gets more secure as you increase its length and then add capital letters, numbers, and finally special characters. Note that Marqu1s_De_S0d_ver_2 has a capital M, a 1 in the place of an I, underscores, a capital D, a capital S, and a zero. Plus, it is lengthy; it has 20 characters. Fifteen characters or more is an industry standard for highly secure passwords.
Incorrect Answers: The rest of the passwords are either not as long or not as complex as the correct answer.
Question 15 of 60
15. Question
Which of the following is the best way to ensure that a hard drive is secure for disposal?
Correct
Magnetically erase the drive; for example, degauss the drive. Degaussing a drive is an excellent way to remove all traces of data, but only if the drive is electromagnetic! Of course, physical destruction is better (shredding, pulverizing); and degaussing might be used on top of physical destruction.
Incorrect Answers: Formatting the drive is not enough due to the data residue that is left behind. Running bootrec /fixmbr rewrites the master boot record of the hard drive (not applicable if a GPT drive), but the data remains. Converting the drive from FAT32 to NTFS (with the convert command) keeps the data intact.
Incorrect
Magnetically erase the drive; for example, degauss the drive. Degaussing a drive is an excellent way to remove all traces of data, but only if the drive is electromagnetic! Of course, physical destruction is better (shredding, pulverizing); and degaussing might be used on top of physical destruction.
Incorrect Answers: Formatting the drive is not enough due to the data residue that is left behind. Running bootrec /fixmbr rewrites the master boot record of the hard drive (not applicable if a GPT drive), but the data remains. Converting the drive from FAT32 to NTFS (with the convert command) keeps the data intact.
Unattempted
Magnetically erase the drive; for example, degauss the drive. Degaussing a drive is an excellent way to remove all traces of data, but only if the drive is electromagnetic! Of course, physical destruction is better (shredding, pulverizing); and degaussing might be used on top of physical destruction.
Incorrect Answers: Formatting the drive is not enough due to the data residue that is left behind. Running bootrec /fixmbr rewrites the master boot record of the hard drive (not applicable if a GPT drive), but the data remains. Converting the drive from FAT32 to NTFS (with the convert command) keeps the data intact.
Question 16 of 60
16. Question
You have been asked to move data from one user’s laptop to another user’s laptop, each of which has EFS functioning. Which of the following statements best describes the first step you should take to remedy the problem?
Correct
The first thing you should do is export the user’s certificate from the first laptop to the second laptop. You can do this by clicking Start and typing certmgr.msc in the Search box; then locate and export the correct Personal Certificate. The Certificates console window can also be added to an MMC. The Encrypting File System (EFS) is the standard single-file encryption method for Windows (if the version supports it).
Incorrect Answers: Administrative privileges won’t help immediately because the encryption would still be in effect, but an administrator can deal with the importing and exporting of certificates from one computer to another, whereas a typical user cannot. Networking need not be disabled, and you aren’t sure which user is being referred to in the answers, but if the certificate has been exported, that user should be able to read the files. Partitions can be converted from FAT32 to NTFS but not vice versa.
Incorrect
The first thing you should do is export the user’s certificate from the first laptop to the second laptop. You can do this by clicking Start and typing certmgr.msc in the Search box; then locate and export the correct Personal Certificate. The Certificates console window can also be added to an MMC. The Encrypting File System (EFS) is the standard single-file encryption method for Windows (if the version supports it).
Incorrect Answers: Administrative privileges won’t help immediately because the encryption would still be in effect, but an administrator can deal with the importing and exporting of certificates from one computer to another, whereas a typical user cannot. Networking need not be disabled, and you aren’t sure which user is being referred to in the answers, but if the certificate has been exported, that user should be able to read the files. Partitions can be converted from FAT32 to NTFS but not vice versa.
Unattempted
The first thing you should do is export the user’s certificate from the first laptop to the second laptop. You can do this by clicking Start and typing certmgr.msc in the Search box; then locate and export the correct Personal Certificate. The Certificates console window can also be added to an MMC. The Encrypting File System (EFS) is the standard single-file encryption method for Windows (if the version supports it).
Incorrect Answers: Administrative privileges won’t help immediately because the encryption would still be in effect, but an administrator can deal with the importing and exporting of certificates from one computer to another, whereas a typical user cannot. Networking need not be disabled, and you aren’t sure which user is being referred to in the answers, but if the certificate has been exported, that user should be able to read the files. Partitions can be converted from FAT32 to NTFS but not vice versa.
Question 17 of 60
17. Question
Which of the following is a common type of CPU for a smartphone?
Correct
System on a chip (SoC) is a type of CPU used in smartphones and tablet computers. The 64-bit versions are common in mobile devices; they incorporate a variety of functionality within the CPU.
Incorrect Answers: LGA 2011 is a type of CPU socket used in PCs. It is designed for Intel Core i7 and other Intel CPUs. LPDDR is a common type of RAM used in mobile devices.
Incorrect
System on a chip (SoC) is a type of CPU used in smartphones and tablet computers. The 64-bit versions are common in mobile devices; they incorporate a variety of functionality within the CPU.
Incorrect Answers: LGA 2011 is a type of CPU socket used in PCs. It is designed for Intel Core i7 and other Intel CPUs. LPDDR is a common type of RAM used in mobile devices.
Unattempted
System on a chip (SoC) is a type of CPU used in smartphones and tablet computers. The 64-bit versions are common in mobile devices; they incorporate a variety of functionality within the CPU.
Incorrect Answers: LGA 2011 is a type of CPU socket used in PCs. It is designed for Intel Core i7 and other Intel CPUs. LPDDR is a common type of RAM used in mobile devices.
Question 18 of 60
18. Question
A customer reports that print jobs sent to a local printer are printing as blank pieces of paper. Which of the following can help you determine the cause?
Correct
First, try printing an internal test page, meaning from the printer’s onscreen display. If that doesn’t work, you need to start troubleshooting the printer. Perhaps the toner cartridge is empty, or maybe a corona wire is malfunctioning.
Incorrect Answers: If the test page prints fine, you can check the printer drivers and other settings at the computer that uses the printer. Restarting the spooler should not help in this situation. If the spooler stalled, no paper should come out of the printer. Likewise, the printer cable should not have to be replaced.
Incorrect
First, try printing an internal test page, meaning from the printer’s onscreen display. If that doesn’t work, you need to start troubleshooting the printer. Perhaps the toner cartridge is empty, or maybe a corona wire is malfunctioning.
Incorrect Answers: If the test page prints fine, you can check the printer drivers and other settings at the computer that uses the printer. Restarting the spooler should not help in this situation. If the spooler stalled, no paper should come out of the printer. Likewise, the printer cable should not have to be replaced.
Unattempted
First, try printing an internal test page, meaning from the printer’s onscreen display. If that doesn’t work, you need to start troubleshooting the printer. Perhaps the toner cartridge is empty, or maybe a corona wire is malfunctioning.
Incorrect Answers: If the test page prints fine, you can check the printer drivers and other settings at the computer that uses the printer. Restarting the spooler should not help in this situation. If the spooler stalled, no paper should come out of the printer. Likewise, the printer cable should not have to be replaced.
Question 19 of 60
19. Question
While troubleshooting a network problem, you discover that one set of LED lights on a switch is blinking rapidly even when all other nodes are disconnected. Which of the following is the most likely cause of this problem? (Select the two best answers.)
Correct
If only one computer is connected to the switch, there shouldn’t be much activity. Rapidly blinking LED lights might lead you to believe that the computer’s network card (NIC) or the port on the switch is faulty. The problem could be that the person is sending a lot of data to himself while you are testing the network, but that would be strange and rare.
Incorrect Answers: Switches are not plugged into servers; however, they facilitate network connections between many computers. A defective hard drive would cause some kind of boot failure. The server doesn’t have anything to do with this scenario.
Incorrect
If only one computer is connected to the switch, there shouldn’t be much activity. Rapidly blinking LED lights might lead you to believe that the computer’s network card (NIC) or the port on the switch is faulty. The problem could be that the person is sending a lot of data to himself while you are testing the network, but that would be strange and rare.
Incorrect Answers: Switches are not plugged into servers; however, they facilitate network connections between many computers. A defective hard drive would cause some kind of boot failure. The server doesn’t have anything to do with this scenario.
Unattempted
If only one computer is connected to the switch, there shouldn’t be much activity. Rapidly blinking LED lights might lead you to believe that the computer’s network card (NIC) or the port on the switch is faulty. The problem could be that the person is sending a lot of data to himself while you are testing the network, but that would be strange and rare.
Incorrect Answers: Switches are not plugged into servers; however, they facilitate network connections between many computers. A defective hard drive would cause some kind of boot failure. The server doesn’t have anything to do with this scenario.
Question 20 of 60
20. Question
A customer complains that there is nothing showing on the display of his laptop. Which of the following should you attempt first on the computer?
Correct
The computer might need a special keystroke, a press of the power button, or just a little more time to come out of Hibernation mode. Remember, check the simple, quick solutions first because they are usually the culprits.
Incorrect Answers: Booting into Safe Mode, reinstalling video drivers, and replacing the inverter are all quite time-consuming but, if necessary, should be attempted in that order—after checking the power state.
.
Incorrect
The computer might need a special keystroke, a press of the power button, or just a little more time to come out of Hibernation mode. Remember, check the simple, quick solutions first because they are usually the culprits.
Incorrect Answers: Booting into Safe Mode, reinstalling video drivers, and replacing the inverter are all quite time-consuming but, if necessary, should be attempted in that order—after checking the power state.
.
Unattempted
The computer might need a special keystroke, a press of the power button, or just a little more time to come out of Hibernation mode. Remember, check the simple, quick solutions first because they are usually the culprits.
Incorrect Answers: Booting into Safe Mode, reinstalling video drivers, and replacing the inverter are all quite time-consuming but, if necessary, should be attempted in that order—after checking the power state.
.
Question 21 of 60
21. Question
You are required to implement an organizational policy that states user passwords can’t be used twice in a row. Which of the following policies should be configured?
Correct
You should configure the Enforce password history policy and set it to a number higher than zero. This way, when a user is prompted to change her password every 42 days (which is the default minimum password age), that user will not be able to use the same password. Password policies can be accessed in Windows within Local Security Policy window > Security Settings > Account Policies > Password Policy.
Incorrect Answers: Minimum password length is the policy that states the fewest characters a password must contain. Eight is a decent setting, but to be full-on secure, many organizations require 15 minimum. There are several technical reasons for this, but the A+ exam does not go into that kind of depth. Complexity requirements policy, if enabled, forces a user to select a password that meets three of the following five categories: uppercase characters, lowercase characters, numbers, special characters (such as ! or #), and Unicode characters (not often implemented). As of 2017, the National Institute of Standards and Technology (NIST) has leaned toward lengthy passwords as opposed to complex passwords.
Incorrect
You should configure the Enforce password history policy and set it to a number higher than zero. This way, when a user is prompted to change her password every 42 days (which is the default minimum password age), that user will not be able to use the same password. Password policies can be accessed in Windows within Local Security Policy window > Security Settings > Account Policies > Password Policy.
Incorrect Answers: Minimum password length is the policy that states the fewest characters a password must contain. Eight is a decent setting, but to be full-on secure, many organizations require 15 minimum. There are several technical reasons for this, but the A+ exam does not go into that kind of depth. Complexity requirements policy, if enabled, forces a user to select a password that meets three of the following five categories: uppercase characters, lowercase characters, numbers, special characters (such as ! or #), and Unicode characters (not often implemented). As of 2017, the National Institute of Standards and Technology (NIST) has leaned toward lengthy passwords as opposed to complex passwords.
Unattempted
You should configure the Enforce password history policy and set it to a number higher than zero. This way, when a user is prompted to change her password every 42 days (which is the default minimum password age), that user will not be able to use the same password. Password policies can be accessed in Windows within Local Security Policy window > Security Settings > Account Policies > Password Policy.
Incorrect Answers: Minimum password length is the policy that states the fewest characters a password must contain. Eight is a decent setting, but to be full-on secure, many organizations require 15 minimum. There are several technical reasons for this, but the A+ exam does not go into that kind of depth. Complexity requirements policy, if enabled, forces a user to select a password that meets three of the following five categories: uppercase characters, lowercase characters, numbers, special characters (such as ! or #), and Unicode characters (not often implemented). As of 2017, the National Institute of Standards and Technology (NIST) has leaned toward lengthy passwords as opposed to complex passwords.
Question 22 of 60
22. Question
Which of the following components could cause the POST to beep several times and fail during boot?
Correct
RAM is one of the big four (RAM, CPU, motherboard, and video) that can cause the POST to fail. Different RAM errors can cause the POST to make a different series of beeps. Consult your motherboard documentation for more information about the different beep codes.
Incorrect Answers: The sound card does not have an effect on the POST. If the power supply has a problem, the computer either will not boot at all (and not even enter POST) or will have intermittent problems—for example, shutting down unpredictably. Hard drive problems result in a variety of errors. Although the POST will complete in these cases, the operating system will not boot.
Incorrect
RAM is one of the big four (RAM, CPU, motherboard, and video) that can cause the POST to fail. Different RAM errors can cause the POST to make a different series of beeps. Consult your motherboard documentation for more information about the different beep codes.
Incorrect Answers: The sound card does not have an effect on the POST. If the power supply has a problem, the computer either will not boot at all (and not even enter POST) or will have intermittent problems—for example, shutting down unpredictably. Hard drive problems result in a variety of errors. Although the POST will complete in these cases, the operating system will not boot.
Unattempted
RAM is one of the big four (RAM, CPU, motherboard, and video) that can cause the POST to fail. Different RAM errors can cause the POST to make a different series of beeps. Consult your motherboard documentation for more information about the different beep codes.
Incorrect Answers: The sound card does not have an effect on the POST. If the power supply has a problem, the computer either will not boot at all (and not even enter POST) or will have intermittent problems—for example, shutting down unpredictably. Hard drive problems result in a variety of errors. Although the POST will complete in these cases, the operating system will not boot.
Question 23 of 60
23. Question
Signal strength for a laptop’s wireless connection is low (yellow in color and only one bar). The laptop is on the first floor of a house. The wireless access point (WAP) is in the basement. Which of the following can improve signal strength? (Select the two best answers.)
Correct
The easiest and (probably) cheapest way is to move the WAP. Basements are usually the worst place for an access point because of concrete foundations and walls, electrical interference, and so on. Signal boosters might also work, but often the cost of a signal booster is the same as buying a newer, more powerful WAP.
Incorrect Answers: Unfortunately, new drivers and firmware usually do not help the situation. It’s possible that a new driver can make better use of the wireless network adapter hardware, but it won’t necessarily offer a better connection. It’s a good idea in any event, but it’s not one of the best answers listed.
Incorrect
The easiest and (probably) cheapest way is to move the WAP. Basements are usually the worst place for an access point because of concrete foundations and walls, electrical interference, and so on. Signal boosters might also work, but often the cost of a signal booster is the same as buying a newer, more powerful WAP.
Incorrect Answers: Unfortunately, new drivers and firmware usually do not help the situation. It’s possible that a new driver can make better use of the wireless network adapter hardware, but it won’t necessarily offer a better connection. It’s a good idea in any event, but it’s not one of the best answers listed.
Unattempted
The easiest and (probably) cheapest way is to move the WAP. Basements are usually the worst place for an access point because of concrete foundations and walls, electrical interference, and so on. Signal boosters might also work, but often the cost of a signal booster is the same as buying a newer, more powerful WAP.
Incorrect Answers: Unfortunately, new drivers and firmware usually do not help the situation. It’s possible that a new driver can make better use of the wireless network adapter hardware, but it won’t necessarily offer a better connection. It’s a good idea in any event, but it’s not one of the best answers listed.
Question 24 of 60
24. Question
You are called to a school lab to fix a computer. The computer supposedly worked fine the day before, but now it does not power on. The computer is plugged into a power strip with another computer. The other computer works fine. Which of the following is the most likely cause of this problem? (Select the two best answers.)
Correct
Check the basics first! Make sure the power cable isn’t disconnected from the computer, and verify that the voltage switch on the power supply is in the correct position (if the PSU is not auto-switching). Kids like to play tricks on lab computers!
Incorrect Answers: A standard power strip should not overload with just two computers connected to it, but if it does, press the reset switch on the power strip. The monitor being unplugged could be a separate problem, but it won’t prevent the computer from powering on. If the second computer works fine, that tells you the power strip is plugged in.
Incorrect
Check the basics first! Make sure the power cable isn’t disconnected from the computer, and verify that the voltage switch on the power supply is in the correct position (if the PSU is not auto-switching). Kids like to play tricks on lab computers!
Incorrect Answers: A standard power strip should not overload with just two computers connected to it, but if it does, press the reset switch on the power strip. The monitor being unplugged could be a separate problem, but it won’t prevent the computer from powering on. If the second computer works fine, that tells you the power strip is plugged in.
Unattempted
Check the basics first! Make sure the power cable isn’t disconnected from the computer, and verify that the voltage switch on the power supply is in the correct position (if the PSU is not auto-switching). Kids like to play tricks on lab computers!
Incorrect Answers: A standard power strip should not overload with just two computers connected to it, but if it does, press the reset switch on the power strip. The monitor being unplugged could be a separate problem, but it won’t prevent the computer from powering on. If the second computer works fine, that tells you the power strip is plugged in.
Question 25 of 60
25. Question
Which of the following is the most secure for your wireless network?
Correct
WPA2 is superior to WPA and WEP and takes much longer to crack (if it is crackable at all). It works best with AES.
Incorrect Answers: Wired Equivalent Privacy (WEP) is deprecated (outdated) and is considered insecure. It should be avoided unless it is the only encryption option you have; even then, you should consider new hardware and software. TKIP stands for Temporal Key Integrity Protocol; it is a deprecated encryption protocol used with WEP and WPA. The replacement is either AES or (less commonly) CCMP.
Incorrect
WPA2 is superior to WPA and WEP and takes much longer to crack (if it is crackable at all). It works best with AES.
Incorrect Answers: Wired Equivalent Privacy (WEP) is deprecated (outdated) and is considered insecure. It should be avoided unless it is the only encryption option you have; even then, you should consider new hardware and software. TKIP stands for Temporal Key Integrity Protocol; it is a deprecated encryption protocol used with WEP and WPA. The replacement is either AES or (less commonly) CCMP.
Unattempted
WPA2 is superior to WPA and WEP and takes much longer to crack (if it is crackable at all). It works best with AES.
Incorrect Answers: Wired Equivalent Privacy (WEP) is deprecated (outdated) and is considered insecure. It should be avoided unless it is the only encryption option you have; even then, you should consider new hardware and software. TKIP stands for Temporal Key Integrity Protocol; it is a deprecated encryption protocol used with WEP and WPA. The replacement is either AES or (less commonly) CCMP.
Question 26 of 60
26. Question
During an installation of Windows, you are given an opportunity to load alternative third-party drivers. Which device are you most likely loading drivers for?
Correct
The SCSI hard drive is the most likely answer. SCSI hard drives (such as SAS SCSI) and RAID controllers need special drivers during the Windows installation process if they are not recognized automatically. Click the option for loading third-party drivers when the installation begins.
Incorrect Answers: Optical drives and USB devices do not require third-party drivers. The BIOS/UEFI doesn’t use a driver; it is firmware.
Incorrect
The SCSI hard drive is the most likely answer. SCSI hard drives (such as SAS SCSI) and RAID controllers need special drivers during the Windows installation process if they are not recognized automatically. Click the option for loading third-party drivers when the installation begins.
Incorrect Answers: Optical drives and USB devices do not require third-party drivers. The BIOS/UEFI doesn’t use a driver; it is firmware.
Unattempted
The SCSI hard drive is the most likely answer. SCSI hard drives (such as SAS SCSI) and RAID controllers need special drivers during the Windows installation process if they are not recognized automatically. Click the option for loading third-party drivers when the installation begins.
Incorrect Answers: Optical drives and USB devices do not require third-party drivers. The BIOS/UEFI doesn’t use a driver; it is firmware.
Question 27 of 60
27. Question
You are working on a computer in which you just installed a new hard drive. The system already runs Windows. The new hard drive does not appear in Explorer. Which of the following statements best describes the next step you should take to ensure the drive will be recognized by the operating system?
Correct
When you add a second drive to a system that already has Windows installed, you will probably have to initialize the drive and format it in the Disk Management utility.
Incorrect Answers: Rebooting the computer does not help the system see the drive. You can configure the drive in the BIOS to a certain extent, but that won’t help Windows see the drive. When you format the drive, Disk Management asks you to assign a drive letter. You don’t need to set the drive to active because this drive does not have an OS to be booted to.
Incorrect
When you add a second drive to a system that already has Windows installed, you will probably have to initialize the drive and format it in the Disk Management utility.
Incorrect Answers: Rebooting the computer does not help the system see the drive. You can configure the drive in the BIOS to a certain extent, but that won’t help Windows see the drive. When you format the drive, Disk Management asks you to assign a drive letter. You don’t need to set the drive to active because this drive does not have an OS to be booted to.
Unattempted
When you add a second drive to a system that already has Windows installed, you will probably have to initialize the drive and format it in the Disk Management utility.
Incorrect Answers: Rebooting the computer does not help the system see the drive. You can configure the drive in the BIOS to a certain extent, but that won’t help Windows see the drive. When you format the drive, Disk Management asks you to assign a drive letter. You don’t need to set the drive to active because this drive does not have an OS to be booted to.
Question 28 of 60
28. Question
Which of the following has the fastest data throughput?
Correct
RAM is much faster than the rest of the options listed. For instance, if you have PC4-25600 DDR4 RAM (aka DDR4-3200), your peak transfer rate is 25,600 MB/s.
Incorrect Answers: The rest of the devices in the Incorrect Answers are listed in descending order of data throughput: Hard drive: for example, 600 MB/s for SATA 3.0, 1969 MB/s for SATA Express, and 3500 MB/s for typical M.2 drives. M.2 is very fast but still a fraction of RAM speeds (as of the writing of this book in 2019). USB: for example, 5 Gbps for version 3.0 and 20 Gbps for version 3.2 (which equates to 2.5 GB/s) CD-ROM (typically 7.5 MB/s).
Incorrect
RAM is much faster than the rest of the options listed. For instance, if you have PC4-25600 DDR4 RAM (aka DDR4-3200), your peak transfer rate is 25,600 MB/s.
Incorrect Answers: The rest of the devices in the Incorrect Answers are listed in descending order of data throughput: Hard drive: for example, 600 MB/s for SATA 3.0, 1969 MB/s for SATA Express, and 3500 MB/s for typical M.2 drives. M.2 is very fast but still a fraction of RAM speeds (as of the writing of this book in 2019). USB: for example, 5 Gbps for version 3.0 and 20 Gbps for version 3.2 (which equates to 2.5 GB/s) CD-ROM (typically 7.5 MB/s).
Unattempted
RAM is much faster than the rest of the options listed. For instance, if you have PC4-25600 DDR4 RAM (aka DDR4-3200), your peak transfer rate is 25,600 MB/s.
Incorrect Answers: The rest of the devices in the Incorrect Answers are listed in descending order of data throughput: Hard drive: for example, 600 MB/s for SATA 3.0, 1969 MB/s for SATA Express, and 3500 MB/s for typical M.2 drives. M.2 is very fast but still a fraction of RAM speeds (as of the writing of this book in 2019). USB: for example, 5 Gbps for version 3.0 and 20 Gbps for version 3.2 (which equates to 2.5 GB/s) CD-ROM (typically 7.5 MB/s).
Question 29 of 60
29. Question
You are troubleshooting a computer that can’t communicate with other computers on the network. An ipconfig shows an APIPA IP address (169.254.21.184). What is the most likely problem?
Correct
The most likely issue is a DHCP failure. Link-local IP addresses such as APIPA on 169.254.0.0 usually kick in when the client computer cannot locate a DHCP server. There are several possible reasons why this might happen: lack of network connectivity, incorrect client configuration, DHCP server failure, and so on. The best way to troubleshoot this situation would be to start at the client and check its network cable (or wireless connection) and then its TCP/IP configuration. You could also try configuring a static IP address on the client to see if it allows the client to communicate over the network. If those things don’t solve the problem or give you any clues, you can look at the network switch, DHCP server, and so on.
Incorrect Answers: DNS resolution has to do with the translation between hostnames and IP addresses: no hostnames are a part of this scenario; we are troubleshooting at the IP level. Duplicate IP addresses happen when two computers are statically configured with the same IP address; they are uncommon (if not rare) in DHCP environments or when APIPA is involved. The Address Resolution Protocol is responsible for converting IP addresses to MAC addresses. The ARP cache is built off the current IP address and the IP and MAC addresses of other computers. Clearing the cache won’t solve the problem, but it won’t make things any worse either. However, you might consider clearing the ARP cache after the problem is fixed, or you might restart the computer.
Incorrect
The most likely issue is a DHCP failure. Link-local IP addresses such as APIPA on 169.254.0.0 usually kick in when the client computer cannot locate a DHCP server. There are several possible reasons why this might happen: lack of network connectivity, incorrect client configuration, DHCP server failure, and so on. The best way to troubleshoot this situation would be to start at the client and check its network cable (or wireless connection) and then its TCP/IP configuration. You could also try configuring a static IP address on the client to see if it allows the client to communicate over the network. If those things don’t solve the problem or give you any clues, you can look at the network switch, DHCP server, and so on.
Incorrect Answers: DNS resolution has to do with the translation between hostnames and IP addresses: no hostnames are a part of this scenario; we are troubleshooting at the IP level. Duplicate IP addresses happen when two computers are statically configured with the same IP address; they are uncommon (if not rare) in DHCP environments or when APIPA is involved. The Address Resolution Protocol is responsible for converting IP addresses to MAC addresses. The ARP cache is built off the current IP address and the IP and MAC addresses of other computers. Clearing the cache won’t solve the problem, but it won’t make things any worse either. However, you might consider clearing the ARP cache after the problem is fixed, or you might restart the computer.
Unattempted
The most likely issue is a DHCP failure. Link-local IP addresses such as APIPA on 169.254.0.0 usually kick in when the client computer cannot locate a DHCP server. There are several possible reasons why this might happen: lack of network connectivity, incorrect client configuration, DHCP server failure, and so on. The best way to troubleshoot this situation would be to start at the client and check its network cable (or wireless connection) and then its TCP/IP configuration. You could also try configuring a static IP address on the client to see if it allows the client to communicate over the network. If those things don’t solve the problem or give you any clues, you can look at the network switch, DHCP server, and so on.
Incorrect Answers: DNS resolution has to do with the translation between hostnames and IP addresses: no hostnames are a part of this scenario; we are troubleshooting at the IP level. Duplicate IP addresses happen when two computers are statically configured with the same IP address; they are uncommon (if not rare) in DHCP environments or when APIPA is involved. The Address Resolution Protocol is responsible for converting IP addresses to MAC addresses. The ARP cache is built off the current IP address and the IP and MAC addresses of other computers. Clearing the cache won’t solve the problem, but it won’t make things any worse either. However, you might consider clearing the ARP cache after the problem is fixed, or you might restart the computer.
Question 30 of 60
30. Question
Tracy cannot connect to the network and asks you to help. Which of the following steps should be performed first?
Correct
Start with the physical! Check for a link light on the NIC first. This light tells you whether there is physical connectivity.
Incorrect Answers: Then, if necessary, you can, in order, test the patch cable, reconfigure TCP/IP, install drivers (from the manufacturer’s website, mind you), and, finally, replace the NIC.
Incorrect
Start with the physical! Check for a link light on the NIC first. This light tells you whether there is physical connectivity.
Incorrect Answers: Then, if necessary, you can, in order, test the patch cable, reconfigure TCP/IP, install drivers (from the manufacturer’s website, mind you), and, finally, replace the NIC.
Unattempted
Start with the physical! Check for a link light on the NIC first. This light tells you whether there is physical connectivity.
Incorrect Answers: Then, if necessary, you can, in order, test the patch cable, reconfigure TCP/IP, install drivers (from the manufacturer’s website, mind you), and, finally, replace the NIC.
Question 31 of 60
31. Question
A customer’s Windows computer needs a new larger, faster hard drive. Another technician in your company installs the new drive and then formats the old drive before delivering it to you for disposal. How secure is the customer’s data?
Correct
The data is very insecure. Many tools can recover data from a drive after it is formatted. Some companies will “low-level” format the drive, or sanitize the drive (as opposed to a standard format in Windows, for example) and keep it in storage indefinitely. The organization might go further and use data wiping software; in fact, this might be a policy for the organization. Always check your organization’s policies to be sure you are disposing of or recycling hard drives properly.
Incorrect Answers: Confidential is a term used to classify data. For example, personally identifiable information should be kept confidential (where only the appropriate personnel can access it). Secure is a relative term. Remember: nothing is ever completely secured.
Incorrect
The data is very insecure. Many tools can recover data from a drive after it is formatted. Some companies will “low-level” format the drive, or sanitize the drive (as opposed to a standard format in Windows, for example) and keep it in storage indefinitely. The organization might go further and use data wiping software; in fact, this might be a policy for the organization. Always check your organization’s policies to be sure you are disposing of or recycling hard drives properly.
Incorrect Answers: Confidential is a term used to classify data. For example, personally identifiable information should be kept confidential (where only the appropriate personnel can access it). Secure is a relative term. Remember: nothing is ever completely secured.
Unattempted
The data is very insecure. Many tools can recover data from a drive after it is formatted. Some companies will “low-level” format the drive, or sanitize the drive (as opposed to a standard format in Windows, for example) and keep it in storage indefinitely. The organization might go further and use data wiping software; in fact, this might be a policy for the organization. Always check your organization’s policies to be sure you are disposing of or recycling hard drives properly.
Incorrect Answers: Confidential is a term used to classify data. For example, personally identifiable information should be kept confidential (where only the appropriate personnel can access it). Secure is a relative term. Remember: nothing is ever completely secured.
Question 32 of 60
32. Question
Megan’s laptop runs perfectly when she is at work, but when she takes it on the road, it cannot get on the Internet. Internally, the company uses static IP addresses for all computers. What should you do to fix the problem?
Correct
The issue is that Megan needs to obtain an IP address through DHCP when on the road. But setting the network adapter to obtain an IP address automatically is not enough. To connect to the internal company network, the Alternate Configuration tab must be configured as a “User Configured” static IP address. This solution enables Megan to connect to networks while on the road by obtaining IP addresses automatically and allows her to connect to the internal company network with the static IP address.
Incorrect Answers: Megan shouldn’t do anything. As a technician, you should fix the problem, so the other options where Megan is doing her own troubleshooting are incorrect.
Incorrect
The issue is that Megan needs to obtain an IP address through DHCP when on the road. But setting the network adapter to obtain an IP address automatically is not enough. To connect to the internal company network, the Alternate Configuration tab must be configured as a “User Configured” static IP address. This solution enables Megan to connect to networks while on the road by obtaining IP addresses automatically and allows her to connect to the internal company network with the static IP address.
Incorrect Answers: Megan shouldn’t do anything. As a technician, you should fix the problem, so the other options where Megan is doing her own troubleshooting are incorrect.
Unattempted
The issue is that Megan needs to obtain an IP address through DHCP when on the road. But setting the network adapter to obtain an IP address automatically is not enough. To connect to the internal company network, the Alternate Configuration tab must be configured as a “User Configured” static IP address. This solution enables Megan to connect to networks while on the road by obtaining IP addresses automatically and allows her to connect to the internal company network with the static IP address.
Incorrect Answers: Megan shouldn’t do anything. As a technician, you should fix the problem, so the other options where Megan is doing her own troubleshooting are incorrect.
Question 33 of 60
33. Question
Which command in the Linux terminal enables you to find out information about a wireless network adapter?
Correct
Use iwconfig (or ifconfig) to analyze a wireless network adapter in the Linux terminal. (Note that iwconfig does not work in macOS, but ifconfig does.) Also, as of the writing of this book, the ip a command can be used as well.
Incorrect Answers: Ipconfig is a similar tool in Windows. Regedit is the executable that opens the Registry Editor in Windows. Apt-get is used for installing and uninstalling applications in the command line in Linux.
Incorrect
Use iwconfig (or ifconfig) to analyze a wireless network adapter in the Linux terminal. (Note that iwconfig does not work in macOS, but ifconfig does.) Also, as of the writing of this book, the ip a command can be used as well.
Incorrect Answers: Ipconfig is a similar tool in Windows. Regedit is the executable that opens the Registry Editor in Windows. Apt-get is used for installing and uninstalling applications in the command line in Linux.
Unattempted
Use iwconfig (or ifconfig) to analyze a wireless network adapter in the Linux terminal. (Note that iwconfig does not work in macOS, but ifconfig does.) Also, as of the writing of this book, the ip a command can be used as well.
Incorrect Answers: Ipconfig is a similar tool in Windows. Regedit is the executable that opens the Registry Editor in Windows. Apt-get is used for installing and uninstalling applications in the command line in Linux.
Question 34 of 60
34. Question
You are tasked with fixing a problem with a video editing workstation. There is an unexpected clicking noise every time the video editing program is started. The case fans have been replaced, but the noise remains. Diagnostics have also been run on the video card, and it appears to be operating normally. What action should you take first?
Correct
The first action you should take is to perform a full data backup. Clicking noises can indicate that the computer’s magnetic-based hard drive is damaged and might fail. Immediately back up the drive’s contents before taking any other action.
Incorrect Answers: It is less likely, but the clicking noise can also be caused by a fan. However, the case fans have already been replaced, and it is uncommon for a video card fan to make that noise unless a cable is brushing against it (which is also unlikely). As you gain experience, you will find that fan noise and hard disk drive clicking are usually two different sounds. The damage to the hard drive could possibly be caused by malware. After backing up data, scan the drive, and if necessary, run a System Restore. The video card should not need to be replaced because the diagnostics indicate that it is running normally. After the backup, you should strongly consider replacing the hard drive, for two reasons: (1) the drive is clicking and is probably going to fail, and (2) video editing workstations require faster hard drives. The scenario implies that the system is using a magnetic-based hard drive. A solid-state drive (SATA or M.2) would run the video editing program more efficiently and would be better in the file-rendering phase
Incorrect
The first action you should take is to perform a full data backup. Clicking noises can indicate that the computer’s magnetic-based hard drive is damaged and might fail. Immediately back up the drive’s contents before taking any other action.
Incorrect Answers: It is less likely, but the clicking noise can also be caused by a fan. However, the case fans have already been replaced, and it is uncommon for a video card fan to make that noise unless a cable is brushing against it (which is also unlikely). As you gain experience, you will find that fan noise and hard disk drive clicking are usually two different sounds. The damage to the hard drive could possibly be caused by malware. After backing up data, scan the drive, and if necessary, run a System Restore. The video card should not need to be replaced because the diagnostics indicate that it is running normally. After the backup, you should strongly consider replacing the hard drive, for two reasons: (1) the drive is clicking and is probably going to fail, and (2) video editing workstations require faster hard drives. The scenario implies that the system is using a magnetic-based hard drive. A solid-state drive (SATA or M.2) would run the video editing program more efficiently and would be better in the file-rendering phase
Unattempted
The first action you should take is to perform a full data backup. Clicking noises can indicate that the computer’s magnetic-based hard drive is damaged and might fail. Immediately back up the drive’s contents before taking any other action.
Incorrect Answers: It is less likely, but the clicking noise can also be caused by a fan. However, the case fans have already been replaced, and it is uncommon for a video card fan to make that noise unless a cable is brushing against it (which is also unlikely). As you gain experience, you will find that fan noise and hard disk drive clicking are usually two different sounds. The damage to the hard drive could possibly be caused by malware. After backing up data, scan the drive, and if necessary, run a System Restore. The video card should not need to be replaced because the diagnostics indicate that it is running normally. After the backup, you should strongly consider replacing the hard drive, for two reasons: (1) the drive is clicking and is probably going to fail, and (2) video editing workstations require faster hard drives. The scenario implies that the system is using a magnetic-based hard drive. A solid-state drive (SATA or M.2) would run the video editing program more efficiently and would be better in the file-rendering phase
Question 35 of 60
35. Question
Which of the following servers is responsible for resolving a name such as dprocomputer.com to its corresponding IP address?
Correct
A Domain Name System (DNS) server is responsible for resolving (or converting) hostnames and domain names to their corresponding IP addresses. To see this in action, open the command line and try connecting to a domain (such as dprocomputer.com) and run a ping, tracert (or traceroute in Linux and macOS), nslookup, or dig (or all of those) against the domain name. These commands can supply you with the IP address of the host. Remember, always practice in a hands-on manner on real computers to reinforce your knowledge!
Incorrect Answers: A web server is in charge of storing websites and presenting them to users on the Internet or intranet. File Transfer Protocol (FTP) servers are used to upload and download files. A proxy server facilitates web page caching for client computers. A syslog server is used to send out log file information of networking devices in real time to an administrator’s workstation for analysis. Know your server roles!
Incorrect
A Domain Name System (DNS) server is responsible for resolving (or converting) hostnames and domain names to their corresponding IP addresses. To see this in action, open the command line and try connecting to a domain (such as dprocomputer.com) and run a ping, tracert (or traceroute in Linux and macOS), nslookup, or dig (or all of those) against the domain name. These commands can supply you with the IP address of the host. Remember, always practice in a hands-on manner on real computers to reinforce your knowledge!
Incorrect Answers: A web server is in charge of storing websites and presenting them to users on the Internet or intranet. File Transfer Protocol (FTP) servers are used to upload and download files. A proxy server facilitates web page caching for client computers. A syslog server is used to send out log file information of networking devices in real time to an administrator’s workstation for analysis. Know your server roles!
Unattempted
A Domain Name System (DNS) server is responsible for resolving (or converting) hostnames and domain names to their corresponding IP addresses. To see this in action, open the command line and try connecting to a domain (such as dprocomputer.com) and run a ping, tracert (or traceroute in Linux and macOS), nslookup, or dig (or all of those) against the domain name. These commands can supply you with the IP address of the host. Remember, always practice in a hands-on manner on real computers to reinforce your knowledge!
Incorrect Answers: A web server is in charge of storing websites and presenting them to users on the Internet or intranet. File Transfer Protocol (FTP) servers are used to upload and download files. A proxy server facilitates web page caching for client computers. A syslog server is used to send out log file information of networking devices in real time to an administrator’s workstation for analysis. Know your server roles!
Question 36 of 60
36. Question
At 16x speed, how much data can a Blu-ray drive read per second?
Correct
At 16x speed, 576 Mb/s is the answer. The default 1x speed of Blu-ray allows a data rate of 36 Mb/s (4.5 MB/s).
Incorrect Answers: The maximum storage capacity of a standard size dual-layer Blu-ray disc is 50 GB. The 1x data rate of a CD-ROM drive is 150 KB/s.
Incorrect
At 16x speed, 576 Mb/s is the answer. The default 1x speed of Blu-ray allows a data rate of 36 Mb/s (4.5 MB/s).
Incorrect Answers: The maximum storage capacity of a standard size dual-layer Blu-ray disc is 50 GB. The 1x data rate of a CD-ROM drive is 150 KB/s.
Unattempted
At 16x speed, 576 Mb/s is the answer. The default 1x speed of Blu-ray allows a data rate of 36 Mb/s (4.5 MB/s).
Incorrect Answers: The maximum storage capacity of a standard size dual-layer Blu-ray disc is 50 GB. The 1x data rate of a CD-ROM drive is 150 KB/s.
Question 37 of 60
37. Question
Which protocol encrypts transactions through a website?
Correct
Secure Sockets Layer (SSL) and the newer Transport Layer Security (TLS) encrypt the transactions through the website. These SSL certificates are often accompanied by the protocol HTTPS.
Incorrect Answers: HTTP by itself is not secure. PuTTY is a tool used for secure text-based connections to hosts and does not involve the website. Kerberos is the protocol used on a Microsoft domain to encrypt passwords.
Incorrect
Secure Sockets Layer (SSL) and the newer Transport Layer Security (TLS) encrypt the transactions through the website. These SSL certificates are often accompanied by the protocol HTTPS.
Incorrect Answers: HTTP by itself is not secure. PuTTY is a tool used for secure text-based connections to hosts and does not involve the website. Kerberos is the protocol used on a Microsoft domain to encrypt passwords.
Unattempted
Secure Sockets Layer (SSL) and the newer Transport Layer Security (TLS) encrypt the transactions through the website. These SSL certificates are often accompanied by the protocol HTTPS.
Incorrect Answers: HTTP by itself is not secure. PuTTY is a tool used for secure text-based connections to hosts and does not involve the website. Kerberos is the protocol used on a Microsoft domain to encrypt passwords.
Question 38 of 60
38. Question
John’s computer has two hard drives, each 1 TB. The first is the system drive and is formatted as NTFS. The second is the data drive and is formatted as FAT32. Which of the following statements are true? (Select the two best answers.)
Correct
NTFS can use NTFS file-level security, whereas FAT32 cannot. NTFS cluster sizes are smaller than FAT32 clusters. NTFS partitions are therefore more efficient (when installed correctly) than FAT32 partitions.
Incorrect Answers: NTFS can create larger partitions (or logical drives) than FAT32 in general, so larger logical drives would exist on an NTFS partition, not a FAT32 partition. Also, logical drives are based on the older MBR partitioning scheme and are not necessary on most of today’s computers that use a GPT partitioning scheme.
Incorrect
NTFS can use NTFS file-level security, whereas FAT32 cannot. NTFS cluster sizes are smaller than FAT32 clusters. NTFS partitions are therefore more efficient (when installed correctly) than FAT32 partitions.
Incorrect Answers: NTFS can create larger partitions (or logical drives) than FAT32 in general, so larger logical drives would exist on an NTFS partition, not a FAT32 partition. Also, logical drives are based on the older MBR partitioning scheme and are not necessary on most of today’s computers that use a GPT partitioning scheme.
Unattempted
NTFS can use NTFS file-level security, whereas FAT32 cannot. NTFS cluster sizes are smaller than FAT32 clusters. NTFS partitions are therefore more efficient (when installed correctly) than FAT32 partitions.
Incorrect Answers: NTFS can create larger partitions (or logical drives) than FAT32 in general, so larger logical drives would exist on an NTFS partition, not a FAT32 partition. Also, logical drives are based on the older MBR partitioning scheme and are not necessary on most of today’s computers that use a GPT partitioning scheme.
Question 39 of 60
39. Question
Which switch of the Robocopy command copies subdirectories but skips empty ones?
Correct
/S copies subdirectories but skips any empty ones.
Incorrect Answers: /E copies all subdirectories, including empty ones. /B copies files in backup mode. /DCOPY:T also copies timestamps of files and folders.
Incorrect
/S copies subdirectories but skips any empty ones.
Incorrect Answers: /E copies all subdirectories, including empty ones. /B copies files in backup mode. /DCOPY:T also copies timestamps of files and folders.
Unattempted
/S copies subdirectories but skips any empty ones.
Incorrect Answers: /E copies all subdirectories, including empty ones. /B copies files in backup mode. /DCOPY:T also copies timestamps of files and folders.
Question 40 of 60
40. Question
Which of the following is necessary for a CAD/CAM workstation? (Select the two best answers.)
Correct
A computer-aided design/computer-aided manufacturing workstation requires an SSD, high-end video, and as much RAM as possible. The CPU can also be important to run the latest design applications such as AutoCAD. Always check the minimum and recommended requirements for applications.
Incorrect Answers: HDMI output and surround sound are often necessary on gaming computers and home theater PCs (HTPCs).
Incorrect
A computer-aided design/computer-aided manufacturing workstation requires an SSD, high-end video, and as much RAM as possible. The CPU can also be important to run the latest design applications such as AutoCAD. Always check the minimum and recommended requirements for applications.
Incorrect Answers: HDMI output and surround sound are often necessary on gaming computers and home theater PCs (HTPCs).
Unattempted
A computer-aided design/computer-aided manufacturing workstation requires an SSD, high-end video, and as much RAM as possible. The CPU can also be important to run the latest design applications such as AutoCAD. Always check the minimum and recommended requirements for applications.
Incorrect Answers: HDMI output and surround sound are often necessary on gaming computers and home theater PCs (HTPCs).
Question 41 of 60
41. Question
Which of the following statements describe advantages of using the Dynamic Host Configuration Protocol (DHCP)? (Select the two best answers.)
Correct
Advantages of using DHCP include the following: IP addresses can be managed from a central location, and computers can automatically get new addressing when moved to a different network segment (perhaps one that uses a different DHCP server).
Incorrect Answers: Quality of service (QoS) adjusts the network speed based on the type of traffic generated. DHCP has nothing to do with the Hosts.txt file; that file contains static entries of hostname-to-IP address conversions. Media access control addresses are usually not changed on a network adapter, although they can be masked. MAC filtering maintains a list of MAC addresses that are allowed to access a network, but once again, this is a different concept from DHCP.
Incorrect
Advantages of using DHCP include the following: IP addresses can be managed from a central location, and computers can automatically get new addressing when moved to a different network segment (perhaps one that uses a different DHCP server).
Incorrect Answers: Quality of service (QoS) adjusts the network speed based on the type of traffic generated. DHCP has nothing to do with the Hosts.txt file; that file contains static entries of hostname-to-IP address conversions. Media access control addresses are usually not changed on a network adapter, although they can be masked. MAC filtering maintains a list of MAC addresses that are allowed to access a network, but once again, this is a different concept from DHCP.
Unattempted
Advantages of using DHCP include the following: IP addresses can be managed from a central location, and computers can automatically get new addressing when moved to a different network segment (perhaps one that uses a different DHCP server).
Incorrect Answers: Quality of service (QoS) adjusts the network speed based on the type of traffic generated. DHCP has nothing to do with the Hosts.txt file; that file contains static entries of hostname-to-IP address conversions. Media access control addresses are usually not changed on a network adapter, although they can be masked. MAC filtering maintains a list of MAC addresses that are allowed to access a network, but once again, this is a different concept from DHCP.
Question 42 of 60
42. Question
Which of the following can be described as a mobile device sharing its Internet connection with other Wi-Fi– capable devices?
Correct
A mobile hotspot, when enabled, allows a mobile device to share its Internet connection with other Wi-Fi–capable devices. This might also be referred to as “Wi-Fi tethering.”
Incorrect Answers: In USB tethering, a mobile device shares its Internet connection with a PC or laptop via USB. The term Wi-Fi sharing is not typically used. For Internet passthrough, a mobile device connects to a PC via USB, making use of the PC’s Internet connection— basically the reverse of USB tethering.
Incorrect
A mobile hotspot, when enabled, allows a mobile device to share its Internet connection with other Wi-Fi–capable devices. This might also be referred to as “Wi-Fi tethering.”
Incorrect Answers: In USB tethering, a mobile device shares its Internet connection with a PC or laptop via USB. The term Wi-Fi sharing is not typically used. For Internet passthrough, a mobile device connects to a PC via USB, making use of the PC’s Internet connection— basically the reverse of USB tethering.
Unattempted
A mobile hotspot, when enabled, allows a mobile device to share its Internet connection with other Wi-Fi–capable devices. This might also be referred to as “Wi-Fi tethering.”
Incorrect Answers: In USB tethering, a mobile device shares its Internet connection with a PC or laptop via USB. The term Wi-Fi sharing is not typically used. For Internet passthrough, a mobile device connects to a PC via USB, making use of the PC’s Internet connection— basically the reverse of USB tethering.
Question 43 of 60
43. Question
A coworker downloads a game that ends up stealing information from the computer system. What is this known as?
Correct
A Trojan is a disguised program that is used to gain access to a computer and either steal information or take control of the computer.
Incorrect Answers: A worm is code that infects a system and self-replicates to other systems. Spam is the abuse of email and the bane of mankind. Spyware is software unwittingly downloaded from the Internet that tracks a user’s actions while surfing the web.
Incorrect
A Trojan is a disguised program that is used to gain access to a computer and either steal information or take control of the computer.
Incorrect Answers: A worm is code that infects a system and self-replicates to other systems. Spam is the abuse of email and the bane of mankind. Spyware is software unwittingly downloaded from the Internet that tracks a user’s actions while surfing the web.
Unattempted
A Trojan is a disguised program that is used to gain access to a computer and either steal information or take control of the computer.
Incorrect Answers: A worm is code that infects a system and self-replicates to other systems. Spam is the abuse of email and the bane of mankind. Spyware is software unwittingly downloaded from the Internet that tracks a user’s actions while surfing the web.
Question 44 of 60
44. Question
You need to view any application errors that have occurred today. Which tool should be used?
Correct
The Event Viewer contains the log files of all the errors that occur on the machine. In this case, you would go to the Application log. Another common log is the System log, which shows errors concerning the OS and drivers.
Incorrect Answers: In the Local Security Policy, you can set up auditing and create password policies for the computer. Msconfig enables you to boot the computer in different modes and enable or disable services and applications. Sfc /scannow is a command run in the Command Prompt (as an administrator only) that scans the integrity of the protected system files and repairs them if possible.
Incorrect
The Event Viewer contains the log files of all the errors that occur on the machine. In this case, you would go to the Application log. Another common log is the System log, which shows errors concerning the OS and drivers.
Incorrect Answers: In the Local Security Policy, you can set up auditing and create password policies for the computer. Msconfig enables you to boot the computer in different modes and enable or disable services and applications. Sfc /scannow is a command run in the Command Prompt (as an administrator only) that scans the integrity of the protected system files and repairs them if possible.
Unattempted
The Event Viewer contains the log files of all the errors that occur on the machine. In this case, you would go to the Application log. Another common log is the System log, which shows errors concerning the OS and drivers.
Incorrect Answers: In the Local Security Policy, you can set up auditing and create password policies for the computer. Msconfig enables you to boot the computer in different modes and enable or disable services and applications. Sfc /scannow is a command run in the Command Prompt (as an administrator only) that scans the integrity of the protected system files and repairs them if possible.
Question 45 of 60
45. Question
You are designing the environmental controls for a server room that contains several servers and other network devices. Which of the following statements best describes the role of an HVAC system in this environment? (Select the two best answers.)
Correct
The HVAC system’s primary responsibilities are to provide an appropriate ambient temperature for the equipment and to maintain appropriate humidity levels. This keeps the equipment from overheating and prevents electrostatic discharge (ESD).
Incorrect Answers: HVAC equipment, by its very nature, is a producer of electromagnetic interference (EMI); it does not shield equipment from EMI—quite the reverse. HVAC equipment often needs to be shielded to reduce EMI after it is installed. Isolation can be provided by other methods such as the material used in the perimeter of the room. A separate ventilation system can be installed to vent fumes away from the server room; however, there shouldn’t be any fumes. Products that contain fumes should be stored in a separate and specially secured area. And if a fire were to occur, the sprinkler system or special hazards system should end that threat, eliminating any fumes that were a result of the fire.
Incorrect
The HVAC system’s primary responsibilities are to provide an appropriate ambient temperature for the equipment and to maintain appropriate humidity levels. This keeps the equipment from overheating and prevents electrostatic discharge (ESD).
Incorrect Answers: HVAC equipment, by its very nature, is a producer of electromagnetic interference (EMI); it does not shield equipment from EMI—quite the reverse. HVAC equipment often needs to be shielded to reduce EMI after it is installed. Isolation can be provided by other methods such as the material used in the perimeter of the room. A separate ventilation system can be installed to vent fumes away from the server room; however, there shouldn’t be any fumes. Products that contain fumes should be stored in a separate and specially secured area. And if a fire were to occur, the sprinkler system or special hazards system should end that threat, eliminating any fumes that were a result of the fire.
Unattempted
The HVAC system’s primary responsibilities are to provide an appropriate ambient temperature for the equipment and to maintain appropriate humidity levels. This keeps the equipment from overheating and prevents electrostatic discharge (ESD).
Incorrect Answers: HVAC equipment, by its very nature, is a producer of electromagnetic interference (EMI); it does not shield equipment from EMI—quite the reverse. HVAC equipment often needs to be shielded to reduce EMI after it is installed. Isolation can be provided by other methods such as the material used in the perimeter of the room. A separate ventilation system can be installed to vent fumes away from the server room; however, there shouldn’t be any fumes. Products that contain fumes should be stored in a separate and specially secured area. And if a fire were to occur, the sprinkler system or special hazards system should end that threat, eliminating any fumes that were a result of the fire.
Question 46 of 60
46. Question
Which of the following are components you might find inside a PC? (Select the three best answers.)
Correct
Common components inside a PC include the CPU, motherboard, and RAM, along with the power supply, adapter cards, and hard drives.
Incorrect Answers: Keyboards (and mice) are input devices that are located outside the PC. Printers (and displays) are output devices that are located outside the PC. A cable modem is an Internet communication device that is outside the PC. Know the internal components of a PC!
Incorrect
Common components inside a PC include the CPU, motherboard, and RAM, along with the power supply, adapter cards, and hard drives.
Incorrect Answers: Keyboards (and mice) are input devices that are located outside the PC. Printers (and displays) are output devices that are located outside the PC. A cable modem is an Internet communication device that is outside the PC. Know the internal components of a PC!
Unattempted
Common components inside a PC include the CPU, motherboard, and RAM, along with the power supply, adapter cards, and hard drives.
Incorrect Answers: Keyboards (and mice) are input devices that are located outside the PC. Printers (and displays) are output devices that are located outside the PC. A cable modem is an Internet communication device that is outside the PC. Know the internal components of a PC!
Question 47 of 60
47. Question
Which of the following technologies can be used to make wireless payments?
Correct
Near-field communication (NFC) is a wireless technology that allows mobile devices to transfer data simply by touching or being in close proximity to each other, as well as make payments wirelessly to some point-of-sale (POS) systems.
Incorrect Answers: Bluetooth is a wireless technology that is used with peripherals such as headsets and speakers. IR stands for infrared, a technology that can be used to beam information, but today it is not used often with mobile devices. Long-Term Evolution (LTE) is a data communications technology used by cellular phones and smartphones; it is based on GSM and is often found in conjunction with 4G.
Incorrect
Near-field communication (NFC) is a wireless technology that allows mobile devices to transfer data simply by touching or being in close proximity to each other, as well as make payments wirelessly to some point-of-sale (POS) systems.
Incorrect Answers: Bluetooth is a wireless technology that is used with peripherals such as headsets and speakers. IR stands for infrared, a technology that can be used to beam information, but today it is not used often with mobile devices. Long-Term Evolution (LTE) is a data communications technology used by cellular phones and smartphones; it is based on GSM and is often found in conjunction with 4G.
Unattempted
Near-field communication (NFC) is a wireless technology that allows mobile devices to transfer data simply by touching or being in close proximity to each other, as well as make payments wirelessly to some point-of-sale (POS) systems.
Incorrect Answers: Bluetooth is a wireless technology that is used with peripherals such as headsets and speakers. IR stands for infrared, a technology that can be used to beam information, but today it is not used often with mobile devices. Long-Term Evolution (LTE) is a data communications technology used by cellular phones and smartphones; it is based on GSM and is often found in conjunction with 4G.
Question 48 of 60
48. Question
Which of the printers would display an error that says: “replace filament”?
Correct
Three-dimensional (3D) printers use filaments (often made of plastic) to build threedimensional objects.
Incorrect Answers: Laser printers use toner cartridges. Inkjet printers use ink cartridges. Thermal printers use specially coated paper that is super-heated.
Incorrect
Three-dimensional (3D) printers use filaments (often made of plastic) to build threedimensional objects.
Incorrect Answers: Laser printers use toner cartridges. Inkjet printers use ink cartridges. Thermal printers use specially coated paper that is super-heated.
Unattempted
Three-dimensional (3D) printers use filaments (often made of plastic) to build threedimensional objects.
Incorrect Answers: Laser printers use toner cartridges. Inkjet printers use ink cartridges. Thermal printers use specially coated paper that is super-heated.
Question 49 of 60
49. Question
Which of the following is an open-source operating system?
Correct
Android is an open-source OS. It is freely downloadable and can be modified by manufacturers of mobile devices to suit their specific hardware.
Incorrect Answers: Apple’s iOS and macOS and Microsoft’s OSs are closed source; a company would have to pay a fee for every license of the OS—that is, if it were even available to them.
Incorrect
Android is an open-source OS. It is freely downloadable and can be modified by manufacturers of mobile devices to suit their specific hardware.
Incorrect Answers: Apple’s iOS and macOS and Microsoft’s OSs are closed source; a company would have to pay a fee for every license of the OS—that is, if it were even available to them.
Unattempted
Android is an open-source OS. It is freely downloadable and can be modified by manufacturers of mobile devices to suit their specific hardware.
Incorrect Answers: Apple’s iOS and macOS and Microsoft’s OSs are closed source; a company would have to pay a fee for every license of the OS—that is, if it were even available to them.
Question 50 of 60
50. Question
Which of the following provides the lowest level of wireless security protection?
Correct
Disabling the SSID broadcast is a security precaution, but it only keeps out the average user. Any attacker with two bits of knowledge can scan for other things the wireless access point broadcasts.
Incorrect Answers: Using WEP is more secure than not using any encryption and disabling the SSID. RADIUS is an external method of authenticating users; it often requires a Windows Server. WPA2 is very secure; if you had one security option you could enable, make it WPA2.
Incorrect
Disabling the SSID broadcast is a security precaution, but it only keeps out the average user. Any attacker with two bits of knowledge can scan for other things the wireless access point broadcasts.
Incorrect Answers: Using WEP is more secure than not using any encryption and disabling the SSID. RADIUS is an external method of authenticating users; it often requires a Windows Server. WPA2 is very secure; if you had one security option you could enable, make it WPA2.
Unattempted
Disabling the SSID broadcast is a security precaution, but it only keeps out the average user. Any attacker with two bits of knowledge can scan for other things the wireless access point broadcasts.
Incorrect Answers: Using WEP is more secure than not using any encryption and disabling the SSID. RADIUS is an external method of authenticating users; it often requires a Windows Server. WPA2 is very secure; if you had one security option you could enable, make it WPA2.
Question 51 of 60
51. Question
Users are reporting to you that a Windows feature asks them for confirmation before running certain applications or when making system changes. What is the name of this Windows feature, and where should you direct users to turn the functionality off?
Correct
User Account Control (UAC) is the portion of Windows that asks for confirmation of administrative rights before allowing a user to make system changes or run certain applications. It can be disabled within the User Accounts applet within the Control Panel by clicking the Change User Account Control Settings link. But beware; only users who have administrative rights should even be permitted to turn off this setting. UAC can be further configured in the Group Policy Editor and in the Registry Editor. For more information about how UAC works, see the following link: https://docs.microsoft.com/enus/windows/security/identity-protection/user-accountcontrol/how-user-account-control-works
Incorrect Answers: UAC is not turned off in the Security Center or with the Windows Defender Firewall. It has separate functionality that is built into Control Panel > User Accounts. It cannot be turned off as a service in the Services console window (services.msc), though there is a related service called the Application Information service (using the service name appinfo), which deals with the usage of additional administrative privileges.
Incorrect
User Account Control (UAC) is the portion of Windows that asks for confirmation of administrative rights before allowing a user to make system changes or run certain applications. It can be disabled within the User Accounts applet within the Control Panel by clicking the Change User Account Control Settings link. But beware; only users who have administrative rights should even be permitted to turn off this setting. UAC can be further configured in the Group Policy Editor and in the Registry Editor. For more information about how UAC works, see the following link: https://docs.microsoft.com/enus/windows/security/identity-protection/user-accountcontrol/how-user-account-control-works
Incorrect Answers: UAC is not turned off in the Security Center or with the Windows Defender Firewall. It has separate functionality that is built into Control Panel > User Accounts. It cannot be turned off as a service in the Services console window (services.msc), though there is a related service called the Application Information service (using the service name appinfo), which deals with the usage of additional administrative privileges.
Unattempted
User Account Control (UAC) is the portion of Windows that asks for confirmation of administrative rights before allowing a user to make system changes or run certain applications. It can be disabled within the User Accounts applet within the Control Panel by clicking the Change User Account Control Settings link. But beware; only users who have administrative rights should even be permitted to turn off this setting. UAC can be further configured in the Group Policy Editor and in the Registry Editor. For more information about how UAC works, see the following link: https://docs.microsoft.com/enus/windows/security/identity-protection/user-accountcontrol/how-user-account-control-works
Incorrect Answers: UAC is not turned off in the Security Center or with the Windows Defender Firewall. It has separate functionality that is built into Control Panel > User Accounts. It cannot be turned off as a service in the Services console window (services.msc), though there is a related service called the Application Information service (using the service name appinfo), which deals with the usage of additional administrative privileges.
Question 52 of 60
52. Question
Which process of the computer checks all your components during boot?
Correct
The POST (power-on self-test) is part of the Basic Input/Output System (BIOS) or Unified Extensible Firmware Interface (UEFI). It runs a selfcheck of the computer system during boot and stores many of the parameters of the components within the CMOS.
Incorrect Answers: BIOS is known as firmware. The lithium battery powers the CMOS while the computer is off. It remembers settings such as the time and date and passwords. The CMOS, BIOS, and the lithium battery are not processes, but they do work hand in hand with each other.
Incorrect
The POST (power-on self-test) is part of the Basic Input/Output System (BIOS) or Unified Extensible Firmware Interface (UEFI). It runs a selfcheck of the computer system during boot and stores many of the parameters of the components within the CMOS.
Incorrect Answers: BIOS is known as firmware. The lithium battery powers the CMOS while the computer is off. It remembers settings such as the time and date and passwords. The CMOS, BIOS, and the lithium battery are not processes, but they do work hand in hand with each other.
Unattempted
The POST (power-on self-test) is part of the Basic Input/Output System (BIOS) or Unified Extensible Firmware Interface (UEFI). It runs a selfcheck of the computer system during boot and stores many of the parameters of the components within the CMOS.
Incorrect Answers: BIOS is known as firmware. The lithium battery powers the CMOS while the computer is off. It remembers settings such as the time and date and passwords. The CMOS, BIOS, and the lithium battery are not processes, but they do work hand in hand with each other.
Question 53 of 60
53. Question
You just upgraded the CPU. Which of the following issues can make your computer shut down automatically after a few minutes? (Select the best answer.)
Correct
The CPU could overheat if thermal compound has not been applied correctly (which is common) or if it is not seated properly (which is rare).
Incorrect Answers: As part of the boot process, power needs to verify the CPU. If the wrong voltage is running to the CPU, the system won’t even boot. If an incorrect CPU has been installed, the system will probably not boot, especially if the BIOS doesn’t recognize it. Finally, the CPU doesn’t use a driver; instead, the BIOS recognizes it (or doesn’t, if it needs a BIOS update) and passes that information to the operating system.
Incorrect
The CPU could overheat if thermal compound has not been applied correctly (which is common) or if it is not seated properly (which is rare).
Incorrect Answers: As part of the boot process, power needs to verify the CPU. If the wrong voltage is running to the CPU, the system won’t even boot. If an incorrect CPU has been installed, the system will probably not boot, especially if the BIOS doesn’t recognize it. Finally, the CPU doesn’t use a driver; instead, the BIOS recognizes it (or doesn’t, if it needs a BIOS update) and passes that information to the operating system.
Unattempted
The CPU could overheat if thermal compound has not been applied correctly (which is common) or if it is not seated properly (which is rare).
Incorrect Answers: As part of the boot process, power needs to verify the CPU. If the wrong voltage is running to the CPU, the system won’t even boot. If an incorrect CPU has been installed, the system will probably not boot, especially if the BIOS doesn’t recognize it. Finally, the CPU doesn’t use a driver; instead, the BIOS recognizes it (or doesn’t, if it needs a BIOS update) and passes that information to the operating system.
Question 54 of 60
54. Question
Which of the following steps should be taken first when a printer fails to print very large documents but still prints smaller documents without a problem?
Correct
Add memory to the printer. Large documents, especially ones with graphics, require more memory to print. A printer’s memory can be upgraded in a similar manner to a PC’s.
Incorrect Answers: The paper doesn’t have an effect on large documents, but it could be an issue if the entry rollers are grabbing more than one piece of paper at a time; that would indicate that the pound size of the paper is too thin. If the communications cable were faulty, no pages would print at all; you would probably get a message on the printer’s display warning of a bad connection. If a toner cartridge began to fail, you would see white lines, smearing, or faded ink.
Incorrect
Add memory to the printer. Large documents, especially ones with graphics, require more memory to print. A printer’s memory can be upgraded in a similar manner to a PC’s.
Incorrect Answers: The paper doesn’t have an effect on large documents, but it could be an issue if the entry rollers are grabbing more than one piece of paper at a time; that would indicate that the pound size of the paper is too thin. If the communications cable were faulty, no pages would print at all; you would probably get a message on the printer’s display warning of a bad connection. If a toner cartridge began to fail, you would see white lines, smearing, or faded ink.
Unattempted
Add memory to the printer. Large documents, especially ones with graphics, require more memory to print. A printer’s memory can be upgraded in a similar manner to a PC’s.
Incorrect Answers: The paper doesn’t have an effect on large documents, but it could be an issue if the entry rollers are grabbing more than one piece of paper at a time; that would indicate that the pound size of the paper is too thin. If the communications cable were faulty, no pages would print at all; you would probably get a message on the printer’s display warning of a bad connection. If a toner cartridge began to fail, you would see white lines, smearing, or faded ink.
Question 55 of 60
55. Question
You need to locate a mobile device that was stolen. Which technology can aid in this?
Correct
The Global Positioning System (GPS) technology (or location services) can be instrumental in locating lost or stolen mobile devices. Many devices have this installed; others rely on geotracking or Wi-Fi hotspot locating techniques. (You are being watched!)
Incorrect Answers: Screen orientation is how the screen is displayed depending on how you hold the device— vertical or horizontal (or upside down). It can be calibrated on Android devices with the G-Sensor calibration tool. Passcode locks are sets of numbers that are required to be entered when a mobile device is turned on or taken out of sleep mode. Gmail is a web-based email service by Google. It is incorporated into the Android operating system.
Incorrect
The Global Positioning System (GPS) technology (or location services) can be instrumental in locating lost or stolen mobile devices. Many devices have this installed; others rely on geotracking or Wi-Fi hotspot locating techniques. (You are being watched!)
Incorrect Answers: Screen orientation is how the screen is displayed depending on how you hold the device— vertical or horizontal (or upside down). It can be calibrated on Android devices with the G-Sensor calibration tool. Passcode locks are sets of numbers that are required to be entered when a mobile device is turned on or taken out of sleep mode. Gmail is a web-based email service by Google. It is incorporated into the Android operating system.
Unattempted
The Global Positioning System (GPS) technology (or location services) can be instrumental in locating lost or stolen mobile devices. Many devices have this installed; others rely on geotracking or Wi-Fi hotspot locating techniques. (You are being watched!)
Incorrect Answers: Screen orientation is how the screen is displayed depending on how you hold the device— vertical or horizontal (or upside down). It can be calibrated on Android devices with the G-Sensor calibration tool. Passcode locks are sets of numbers that are required to be entered when a mobile device is turned on or taken out of sleep mode. Gmail is a web-based email service by Google. It is incorporated into the Android operating system.
Question 56 of 60
56. Question
A customer is having difficulties with his hard drive, and the system won’t boot. You discover that the operating system has to be reloaded. Which of the following statements best describes how to explain this to the customer?
Correct
Always explain specifically and exactly what you must do and what the ramifications are. Verify that the customer agrees to the proposed work (in writing).
Incorrect Answers: Try to avoid being vague (“I need to rebuild the computer”), and conversely, avoid technical acronyms or jargon. Always make sure the customer is fully aware of the situation.
Incorrect
Always explain specifically and exactly what you must do and what the ramifications are. Verify that the customer agrees to the proposed work (in writing).
Incorrect Answers: Try to avoid being vague (“I need to rebuild the computer”), and conversely, avoid technical acronyms or jargon. Always make sure the customer is fully aware of the situation.
Unattempted
Always explain specifically and exactly what you must do and what the ramifications are. Verify that the customer agrees to the proposed work (in writing).
Incorrect Answers: Try to avoid being vague (“I need to rebuild the computer”), and conversely, avoid technical acronyms or jargon. Always make sure the customer is fully aware of the situation.
Question 57 of 60
57. Question
Your manager’s Windows computer locks up after the graphical user interface starts to load. However, the computer will boot in Safe Mode. When you access the Event Viewer, you see an entry stating that a driver failed. Which of the following steps will help you further diagnose the problem?
Correct
Boot Logging can be enabled from the Windows Recovery Environment (WinRE) in Startup Settings or in the Windows Advanced Boot Options menu. After this option is enabled, the system automatically creates a file called ntbtlog.txt. Afterward, you can access the system by booting into Safe Mode, once again from the recovery environment.
Incorrect Answers: Sigverif is a program that can be run in Windows that verifies whether drivers have been signed by Microsoft. Disabling Driver Signature Enforcement is another Startup Settings (WinRE) option; you might use this to help fix the issue but not to diagnose the problem. Debugging Mode is another option. In this scenario you don’t necessarily need to debug the system, but rather you should repair the individual driver that failed to load.
Incorrect
Boot Logging can be enabled from the Windows Recovery Environment (WinRE) in Startup Settings or in the Windows Advanced Boot Options menu. After this option is enabled, the system automatically creates a file called ntbtlog.txt. Afterward, you can access the system by booting into Safe Mode, once again from the recovery environment.
Incorrect Answers: Sigverif is a program that can be run in Windows that verifies whether drivers have been signed by Microsoft. Disabling Driver Signature Enforcement is another Startup Settings (WinRE) option; you might use this to help fix the issue but not to diagnose the problem. Debugging Mode is another option. In this scenario you don’t necessarily need to debug the system, but rather you should repair the individual driver that failed to load.
Unattempted
Boot Logging can be enabled from the Windows Recovery Environment (WinRE) in Startup Settings or in the Windows Advanced Boot Options menu. After this option is enabled, the system automatically creates a file called ntbtlog.txt. Afterward, you can access the system by booting into Safe Mode, once again from the recovery environment.
Incorrect Answers: Sigverif is a program that can be run in Windows that verifies whether drivers have been signed by Microsoft. Disabling Driver Signature Enforcement is another Startup Settings (WinRE) option; you might use this to help fix the issue but not to diagnose the problem. Debugging Mode is another option. In this scenario you don’t necessarily need to debug the system, but rather you should repair the individual driver that failed to load.
Question 58 of 60
58. Question
Which of the following might you find as part of a tablet computer? (Select the two best answers.)
Correct
A tablet computer will almost always contain flash memory as main storage and a multi-touch touchscreen.
Incorrect Answers: SATA hard drives and 24-inch displays are more likely to be found on PCs, not tablet computers.
Incorrect
A tablet computer will almost always contain flash memory as main storage and a multi-touch touchscreen.
Incorrect Answers: SATA hard drives and 24-inch displays are more likely to be found on PCs, not tablet computers.
Unattempted
A tablet computer will almost always contain flash memory as main storage and a multi-touch touchscreen.
Incorrect Answers: SATA hard drives and 24-inch displays are more likely to be found on PCs, not tablet computers.
Question 59 of 60
59. Question
Which of the following addresses is a valid IPv4 address for a network host?
Correct
Of the answers listed, 172.17.58.254 is the only valid IPv4 address for a network host. A host on the network is any computer or network device that uses an IP address to communicate with other computers or devices. 172.17.58.254 is a class B private IP address, so it fits the description of a valid IPv4 address for a network host.
Incorrect Answers: 127.0.0.1 is the IPv4 local loopback address. Every computer using TCP/IP gets this address; it is used for testing. It cannot be used to communicate with other hosts on the network. 169.254.0.0/16 means an IP address of 169.254.0.0 with a default subnet mask of 255.255.0.0, indicating the network number is 169.254. It is not a valid host IP address because it ends in 0.0. The first IP address of a network is always reserved for the network number; it cannot be used by a host. Otherwise, if the address were, say, 169.254.0.1, the address would work, but because it is an APIPA address, it would be able to communicate only with other systems using APIPA addresses. 255.10.15.7 is not valid. That address is within the class E reserved range. For normal host IP addresses, the first octet is either between 1 and 126 or between 128 and 223, but not between 224 and 255.
Incorrect
Of the answers listed, 172.17.58.254 is the only valid IPv4 address for a network host. A host on the network is any computer or network device that uses an IP address to communicate with other computers or devices. 172.17.58.254 is a class B private IP address, so it fits the description of a valid IPv4 address for a network host.
Incorrect Answers: 127.0.0.1 is the IPv4 local loopback address. Every computer using TCP/IP gets this address; it is used for testing. It cannot be used to communicate with other hosts on the network. 169.254.0.0/16 means an IP address of 169.254.0.0 with a default subnet mask of 255.255.0.0, indicating the network number is 169.254. It is not a valid host IP address because it ends in 0.0. The first IP address of a network is always reserved for the network number; it cannot be used by a host. Otherwise, if the address were, say, 169.254.0.1, the address would work, but because it is an APIPA address, it would be able to communicate only with other systems using APIPA addresses. 255.10.15.7 is not valid. That address is within the class E reserved range. For normal host IP addresses, the first octet is either between 1 and 126 or between 128 and 223, but not between 224 and 255.
Unattempted
Of the answers listed, 172.17.58.254 is the only valid IPv4 address for a network host. A host on the network is any computer or network device that uses an IP address to communicate with other computers or devices. 172.17.58.254 is a class B private IP address, so it fits the description of a valid IPv4 address for a network host.
Incorrect Answers: 127.0.0.1 is the IPv4 local loopback address. Every computer using TCP/IP gets this address; it is used for testing. It cannot be used to communicate with other hosts on the network. 169.254.0.0/16 means an IP address of 169.254.0.0 with a default subnet mask of 255.255.0.0, indicating the network number is 169.254. It is not a valid host IP address because it ends in 0.0. The first IP address of a network is always reserved for the network number; it cannot be used by a host. Otherwise, if the address were, say, 169.254.0.1, the address would work, but because it is an APIPA address, it would be able to communicate only with other systems using APIPA addresses. 255.10.15.7 is not valid. That address is within the class E reserved range. For normal host IP addresses, the first octet is either between 1 and 126 or between 128 and 223, but not between 224 and 255.
Question 60 of 60
60. Question
You print an image to your printer, but the page shows a ghosted image. Which of the following could be the cause?
Correct
A ghosted image or one that seems to repeat usually means the drum (or the entire toner cartridge including the drum) needs to be replaced.
Incorrect Answers: If the printer is offline, you cannot print to the printer. An incorrect driver often results in a garbage printout (garbled characters) that is quite unreadable (unless you know garbage printout language). A dirty primary corona wire often results in lines or smearing.
Incorrect
A ghosted image or one that seems to repeat usually means the drum (or the entire toner cartridge including the drum) needs to be replaced.
Incorrect Answers: If the printer is offline, you cannot print to the printer. An incorrect driver often results in a garbage printout (garbled characters) that is quite unreadable (unless you know garbage printout language). A dirty primary corona wire often results in lines or smearing.
Unattempted
A ghosted image or one that seems to repeat usually means the drum (or the entire toner cartridge including the drum) needs to be replaced.
Incorrect Answers: If the printer is offline, you cannot print to the printer. An incorrect driver often results in a garbage printout (garbled characters) that is quite unreadable (unless you know garbage printout language). A dirty primary corona wire often results in lines or smearing.
X
Use Page numbers below to navigate to other practice tests