You have already completed the Test before. Hence you can not start it again.
Test is loading...
You must sign in or sign up to start the Test.
You have to finish following quiz, to start this Test:
Your results are here!! for" CompTIA A+ (220-1001 & 220-1002) Practice Test 2 "
0 of 60 questions answered correctly
Your time:
Time has elapsed
Your Final Score is : 0
You have attempted : 0
Number of Correct Questions : 0 and scored 0
Number of Incorrect Questions : 0 and Negative marks 0
Average score
Your score
CompTIA A+ (220-1001 & 220-1002)
You have attempted: 0
Number of Correct Questions: 0 and scored 0
Number of Incorrect Questions: 0 and Negative marks 0
You can review your answers by clicking view questions. Important Note : Open Reference Documentation Links in New Tab (Right Click and Open in New Tab).
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
Answered
Review
Question 1 of 60
1. Question
Which kinds of data are typically synchronized on a smartphone? (Select the two best answers.)
Correct
Some of the things you might synchronize on a smartphone include contacts, email, programs, pictures, music, and videos.
Incorrect Answers: Mobile devices would not normally synchronize PHP web pages or Microsoft SQL databases. PHP is a commonly used programming language for websites and is often used either by itself or within HTML pages.
Incorrect
Some of the things you might synchronize on a smartphone include contacts, email, programs, pictures, music, and videos.
Incorrect Answers: Mobile devices would not normally synchronize PHP web pages or Microsoft SQL databases. PHP is a commonly used programming language for websites and is often used either by itself or within HTML pages.
Unattempted
Some of the things you might synchronize on a smartphone include contacts, email, programs, pictures, music, and videos.
Incorrect Answers: Mobile devices would not normally synchronize PHP web pages or Microsoft SQL databases. PHP is a commonly used programming language for websites and is often used either by itself or within HTML pages.
Question 2 of 60
2. Question
Users in your accounting department are prompted to provide usernames and passwords to access the payroll system. Which type of authentication method is being requested in this scenario?
Correct
The type of authentication method being used here is single-factor. The only factor of authentication is something the users know—usernames and passwords.
Incorrect Answers: MFA stands for multifactor authentication, which is when two or more types of authentication methods are combined—for example, a password and a fingerprint. RADIUS and TACACS+ are authentication protocols, not authentication methods, and are often involved with single sign-on (SSO), federated identity management (FIM), and MFA authentication schemes. Regardless, the scenario said that the users were logging in to a payroll system, which is a separate entity from any authentication servers.
Incorrect
The type of authentication method being used here is single-factor. The only factor of authentication is something the users know—usernames and passwords.
Incorrect Answers: MFA stands for multifactor authentication, which is when two or more types of authentication methods are combined—for example, a password and a fingerprint. RADIUS and TACACS+ are authentication protocols, not authentication methods, and are often involved with single sign-on (SSO), federated identity management (FIM), and MFA authentication schemes. Regardless, the scenario said that the users were logging in to a payroll system, which is a separate entity from any authentication servers.
Unattempted
The type of authentication method being used here is single-factor. The only factor of authentication is something the users know—usernames and passwords.
Incorrect Answers: MFA stands for multifactor authentication, which is when two or more types of authentication methods are combined—for example, a password and a fingerprint. RADIUS and TACACS+ are authentication protocols, not authentication methods, and are often involved with single sign-on (SSO), federated identity management (FIM), and MFA authentication schemes. Regardless, the scenario said that the users were logging in to a payroll system, which is a separate entity from any authentication servers.
Question 3 of 60
3. Question
Which of the following commands is used to fix errors on the system disk?
Correct
Chkdsk /F allows you to fix errors on a disk. It does not fix all errors, but it checks for disk integrity, bad sectors, and similar issues.
Incorrect Answers: Robocopy copies files and directory trees. Tracert /w analyzes the path to another computer with a specific timeout per reply. Diskpart is the command-line tool that enables you to make changes to the operating system’s partition table.
Incorrect
Chkdsk /F allows you to fix errors on a disk. It does not fix all errors, but it checks for disk integrity, bad sectors, and similar issues.
Incorrect Answers: Robocopy copies files and directory trees. Tracert /w analyzes the path to another computer with a specific timeout per reply. Diskpart is the command-line tool that enables you to make changes to the operating system’s partition table.
Unattempted
Chkdsk /F allows you to fix errors on a disk. It does not fix all errors, but it checks for disk integrity, bad sectors, and similar issues.
Incorrect Answers: Robocopy copies files and directory trees. Tracert /w analyzes the path to another computer with a specific timeout per reply. Diskpart is the command-line tool that enables you to make changes to the operating system’s partition table.
Question 4 of 60
4. Question
Which kind of socket incorporates “lands” to ensure connectivity to a CPU?
Correct
LGA (land grid array) is the type of socket that uses “lands” to connect the socket to the CPU.
Incorrect Answers: PGA (pin grid array) sockets have pinholes that make for connectivity to the CPU’s copper pins. The chipset is either a single chip or the combination of the northbridge and southbridge on the motherboard. LGA sockets are often a brass alloy or have gold contacts; although copper might be a possibility for some sockets, such sockets don’t fit the description of “lands” in the question. LGA is the best answer.
Incorrect
LGA (land grid array) is the type of socket that uses “lands” to connect the socket to the CPU.
Incorrect Answers: PGA (pin grid array) sockets have pinholes that make for connectivity to the CPU’s copper pins. The chipset is either a single chip or the combination of the northbridge and southbridge on the motherboard. LGA sockets are often a brass alloy or have gold contacts; although copper might be a possibility for some sockets, such sockets don’t fit the description of “lands” in the question. LGA is the best answer.
Unattempted
LGA (land grid array) is the type of socket that uses “lands” to connect the socket to the CPU.
Incorrect Answers: PGA (pin grid array) sockets have pinholes that make for connectivity to the CPU’s copper pins. The chipset is either a single chip or the combination of the northbridge and southbridge on the motherboard. LGA sockets are often a brass alloy or have gold contacts; although copper might be a possibility for some sockets, such sockets don’t fit the description of “lands” in the question. LGA is the best answer.
Question 5 of 60
5. Question
You want to upgrade memory in your computer. Which of the following is user-replaceable memory in a PC?
Correct
Dynamic random-access memory (DRAM) is a module (or stick) of memory that you can install into a motherboard. SDRAM, DDR, DDR2, DDR3, and DDR4 are all examples of DRAM.
Incorrect Answers: The complementary metal-oxide semiconductor (CMOS) is a chip soldered onto the motherboard that works in conjunction with the Basic Input/Output System, another chip soldered onto the motherboard. Static RAM (SRAM) is memory that is nonvolatile (as opposed to DRAM); it is also soldered to the circuit board. Read-only memory (ROM) is usually not serviceable. The BIOS resides on a ROM chip, more specifically an electrically erasable programmable ROM (EEPROM) chip.
Incorrect
Dynamic random-access memory (DRAM) is a module (or stick) of memory that you can install into a motherboard. SDRAM, DDR, DDR2, DDR3, and DDR4 are all examples of DRAM.
Incorrect Answers: The complementary metal-oxide semiconductor (CMOS) is a chip soldered onto the motherboard that works in conjunction with the Basic Input/Output System, another chip soldered onto the motherboard. Static RAM (SRAM) is memory that is nonvolatile (as opposed to DRAM); it is also soldered to the circuit board. Read-only memory (ROM) is usually not serviceable. The BIOS resides on a ROM chip, more specifically an electrically erasable programmable ROM (EEPROM) chip.
Unattempted
Dynamic random-access memory (DRAM) is a module (or stick) of memory that you can install into a motherboard. SDRAM, DDR, DDR2, DDR3, and DDR4 are all examples of DRAM.
Incorrect Answers: The complementary metal-oxide semiconductor (CMOS) is a chip soldered onto the motherboard that works in conjunction with the Basic Input/Output System, another chip soldered onto the motherboard. Static RAM (SRAM) is memory that is nonvolatile (as opposed to DRAM); it is also soldered to the circuit board. Read-only memory (ROM) is usually not serviceable. The BIOS resides on a ROM chip, more specifically an electrically erasable programmable ROM (EEPROM) chip.
Question 6 of 60
6. Question
A coworker notices that the battery light on a laptop is flashing when the laptop is in a docking station. Which of the following steps should be performed first to fix the problem?
Correct
You should first attempt reseating the laptop in the docking station; the laptop probably doesn’t have a sturdy connection, resulting in a blinking battery light telling you that the laptop is not charging properly (or at all).
Incorrect Answers: Do this before you attempt to reseat or replace the battery. This is a hardware issue; the operating system does not have an effect on the blinking battery light.
Incorrect
You should first attempt reseating the laptop in the docking station; the laptop probably doesn’t have a sturdy connection, resulting in a blinking battery light telling you that the laptop is not charging properly (or at all).
Incorrect Answers: Do this before you attempt to reseat or replace the battery. This is a hardware issue; the operating system does not have an effect on the blinking battery light.
Unattempted
You should first attempt reseating the laptop in the docking station; the laptop probably doesn’t have a sturdy connection, resulting in a blinking battery light telling you that the laptop is not charging properly (or at all).
Incorrect Answers: Do this before you attempt to reseat or replace the battery. This is a hardware issue; the operating system does not have an effect on the blinking battery light.
Question 7 of 60
7. Question
Which of the following is the second step of the A+ troubleshooting theory?
Correct
The second step is to establish a theory of probable cause. You are looking for the obvious or most probable cause for the problem.
Incorrect Answers: Establishing a theory of probable cause comes after identifying the problem and before testing your theory. Documentation is last. While the troubleshooting process is listed in the 220-1001 objectives, it’s still good practice—you’ll always be using it, regardless of what technology you are working with. You never know what you might see on the exam!
Incorrect
The second step is to establish a theory of probable cause. You are looking for the obvious or most probable cause for the problem.
Incorrect Answers: Establishing a theory of probable cause comes after identifying the problem and before testing your theory. Documentation is last. While the troubleshooting process is listed in the 220-1001 objectives, it’s still good practice—you’ll always be using it, regardless of what technology you are working with. You never know what you might see on the exam!
Unattempted
The second step is to establish a theory of probable cause. You are looking for the obvious or most probable cause for the problem.
Incorrect Answers: Establishing a theory of probable cause comes after identifying the problem and before testing your theory. Documentation is last. While the troubleshooting process is listed in the 220-1001 objectives, it’s still good practice—you’ll always be using it, regardless of what technology you are working with. You never know what you might see on the exam!
Question 8 of 60
8. Question
Which of the following commands makes a duplicate of a file?
Correct
Copy is used to make a duplicate of the file in another location.
Incorrect Answers: Move enables you to take a file and shift it to another location. Dir gives you the contents of a specific folder. Copy, move, and dir are Windows commands. Ls lists the directory contents on a Linuxbased system (as does dir in many Linux distros).
Incorrect
Copy is used to make a duplicate of the file in another location.
Incorrect Answers: Move enables you to take a file and shift it to another location. Dir gives you the contents of a specific folder. Copy, move, and dir are Windows commands. Ls lists the directory contents on a Linuxbased system (as does dir in many Linux distros).
Unattempted
Copy is used to make a duplicate of the file in another location.
Incorrect Answers: Move enables you to take a file and shift it to another location. Dir gives you the contents of a specific folder. Copy, move, and dir are Windows commands. Ls lists the directory contents on a Linuxbased system (as does dir in many Linux distros).
Question 9 of 60
9. Question
You are troubleshooting a computer that has a web browser issue. The end user says that multiple browser pages open by themselves when surfing the Internet. Also, you observe that the computer is running slowly. Which of the following actions should you perform first?
Correct
The first thing you should do is install antimalware software. It would be surprising if the computer doesn’t have any, but it happens.
Incorrect Answers: This could be a virus issue or other malware issue; you wouldn’t know until you investigate further. So, anti-malware is a better solution than just antivirus. After installing the software, you should scan the system for malware, update that software, and then reboot the computer. Use the CompTIA A+ malware removal process to aid in this process. A pop-up blocker is good for ads, but not necessarily for full pages that open by themselves. Plus, because the system is running slowly, the problem appears to be more than just pop-ups and is probably malware related.
Incorrect
The first thing you should do is install antimalware software. It would be surprising if the computer doesn’t have any, but it happens.
Incorrect Answers: This could be a virus issue or other malware issue; you wouldn’t know until you investigate further. So, anti-malware is a better solution than just antivirus. After installing the software, you should scan the system for malware, update that software, and then reboot the computer. Use the CompTIA A+ malware removal process to aid in this process. A pop-up blocker is good for ads, but not necessarily for full pages that open by themselves. Plus, because the system is running slowly, the problem appears to be more than just pop-ups and is probably malware related.
Unattempted
The first thing you should do is install antimalware software. It would be surprising if the computer doesn’t have any, but it happens.
Incorrect Answers: This could be a virus issue or other malware issue; you wouldn’t know until you investigate further. So, anti-malware is a better solution than just antivirus. After installing the software, you should scan the system for malware, update that software, and then reboot the computer. Use the CompTIA A+ malware removal process to aid in this process. A pop-up blocker is good for ads, but not necessarily for full pages that open by themselves. Plus, because the system is running slowly, the problem appears to be more than just pop-ups and is probably malware related.
Question 10 of 60
10. Question
How should you hold RAM when installing it?
Correct
Hold RAM by the edges to avoid contact with the pins, chips, and circuitry.
Incorrect Answers: Touching the front and back is not advised because it requires touching the chips on the RAM module. Tools are not needed, and if they are used, metallic ones could be damaging to the module. Plastic tweezers are used to remove screws that fall into toughto-reach places in the case. A punchdown tool is used to terminate networking cables to patch panels or to punch blocks.
Incorrect
Hold RAM by the edges to avoid contact with the pins, chips, and circuitry.
Incorrect Answers: Touching the front and back is not advised because it requires touching the chips on the RAM module. Tools are not needed, and if they are used, metallic ones could be damaging to the module. Plastic tweezers are used to remove screws that fall into toughto-reach places in the case. A punchdown tool is used to terminate networking cables to patch panels or to punch blocks.
Unattempted
Hold RAM by the edges to avoid contact with the pins, chips, and circuitry.
Incorrect Answers: Touching the front and back is not advised because it requires touching the chips on the RAM module. Tools are not needed, and if they are used, metallic ones could be damaging to the module. Plastic tweezers are used to remove screws that fall into toughto-reach places in the case. A punchdown tool is used to terminate networking cables to patch panels or to punch blocks.
Question 11 of 60
11. Question
Which of the following is the local loopback IPv6 address?
Correct
The IPv6 loopback address used for testing is ::1. This determines if IPv6 is working correctly on the network card but does not generate network traffic. It exists on every computer that runs IPv6.
Incorrect Answers: 127.0.0.1 is the IPv4 loopback address. 192.168.0.0 is simply a private IP network number. FE80::/10 is the link-local prefix—a range of auto-assigned addresses in IPv6.
Incorrect
The IPv6 loopback address used for testing is ::1. This determines if IPv6 is working correctly on the network card but does not generate network traffic. It exists on every computer that runs IPv6.
Incorrect Answers: 127.0.0.1 is the IPv4 loopback address. 192.168.0.0 is simply a private IP network number. FE80::/10 is the link-local prefix—a range of auto-assigned addresses in IPv6.
Unattempted
The IPv6 loopback address used for testing is ::1. This determines if IPv6 is working correctly on the network card but does not generate network traffic. It exists on every computer that runs IPv6.
Incorrect Answers: 127.0.0.1 is the IPv4 loopback address. 192.168.0.0 is simply a private IP network number. FE80::/10 is the link-local prefix—a range of auto-assigned addresses in IPv6.
Question 12 of 60
12. Question
Which of the following steps should be taken to connect a Bluetooth headset to a smartphone? (Select the two best answers.)
Correct
To connect a Bluetooth headset to a smartphone, you must pair the device to the phone; then, if necessary, you enter a passcode into the phone to use the device.
Incorrect Answers: Drivers are usually not necessary; most mobile devices have Bluetooth installed and usually recognize devices automatically. If not, you might have to update Bluetooth on the device or update the device’s OS. Disabling Wi-Fi is not necessary; however, Wi-Fi and Bluetooth have been known to have conflicts, and sometimes one must be disabled to use the other.
Incorrect
To connect a Bluetooth headset to a smartphone, you must pair the device to the phone; then, if necessary, you enter a passcode into the phone to use the device.
Incorrect Answers: Drivers are usually not necessary; most mobile devices have Bluetooth installed and usually recognize devices automatically. If not, you might have to update Bluetooth on the device or update the device’s OS. Disabling Wi-Fi is not necessary; however, Wi-Fi and Bluetooth have been known to have conflicts, and sometimes one must be disabled to use the other.
Unattempted
To connect a Bluetooth headset to a smartphone, you must pair the device to the phone; then, if necessary, you enter a passcode into the phone to use the device.
Incorrect Answers: Drivers are usually not necessary; most mobile devices have Bluetooth installed and usually recognize devices automatically. If not, you might have to update Bluetooth on the device or update the device’s OS. Disabling Wi-Fi is not necessary; however, Wi-Fi and Bluetooth have been known to have conflicts, and sometimes one must be disabled to use the other.
Question 13 of 60
13. Question
You successfully modified the Registry on a customer’s PC. Now the customer’s system gets onto the Internet normally. Which of the following steps should be performed next?
Correct
Documentation is the final step in the troubleshooting theory. This helps you better understand and articulate exactly what the problem (and solution) was. If you see this problem in the future, you can consult your documentation for the solution. Plus, others on your team can do the same. In addition, it is common company policy to document all findings as part of a trouble ticket.
Incorrect Answers: Generally, as a technician working for individual customers on the road, you would present a bill at the end of your technical visit (after everything else is complete). But for many technicians, billing is not a responsibility; someone else takes care of that task. Always document the solution before moving on to the next computer. Running programs such as Disk Defrag (Optimize Drives) is something you would do during an earlier phase of troubleshooting.
Incorrect
Documentation is the final step in the troubleshooting theory. This helps you better understand and articulate exactly what the problem (and solution) was. If you see this problem in the future, you can consult your documentation for the solution. Plus, others on your team can do the same. In addition, it is common company policy to document all findings as part of a trouble ticket.
Incorrect Answers: Generally, as a technician working for individual customers on the road, you would present a bill at the end of your technical visit (after everything else is complete). But for many technicians, billing is not a responsibility; someone else takes care of that task. Always document the solution before moving on to the next computer. Running programs such as Disk Defrag (Optimize Drives) is something you would do during an earlier phase of troubleshooting.
Unattempted
Documentation is the final step in the troubleshooting theory. This helps you better understand and articulate exactly what the problem (and solution) was. If you see this problem in the future, you can consult your documentation for the solution. Plus, others on your team can do the same. In addition, it is common company policy to document all findings as part of a trouble ticket.
Incorrect Answers: Generally, as a technician working for individual customers on the road, you would present a bill at the end of your technical visit (after everything else is complete). But for many technicians, billing is not a responsibility; someone else takes care of that task. Always document the solution before moving on to the next computer. Running programs such as Disk Defrag (Optimize Drives) is something you would do during an earlier phase of troubleshooting.
Question 14 of 60
14. Question
Which tool in Windows enables a user to easily see how much memory a particular process uses?
Correct
The Task Manager enables a user to see the amount of memory and the percentage of processing power a particular process uses in real time. This can be done on the Processes tab.
Incorrect Answers: System Information gives you information about the hardware and software of the computer, but it is static (text only) and doesn’t change in real time. The Registry stores all of the settings of Windows and is modified with the Registry Editor. Performance Monitor can graph the performance of the different components in the computer and, if configured properly, can do the same thing as the Task Manager in this scenario, but not as easily.
Incorrect
The Task Manager enables a user to see the amount of memory and the percentage of processing power a particular process uses in real time. This can be done on the Processes tab.
Incorrect Answers: System Information gives you information about the hardware and software of the computer, but it is static (text only) and doesn’t change in real time. The Registry stores all of the settings of Windows and is modified with the Registry Editor. Performance Monitor can graph the performance of the different components in the computer and, if configured properly, can do the same thing as the Task Manager in this scenario, but not as easily.
Unattempted
The Task Manager enables a user to see the amount of memory and the percentage of processing power a particular process uses in real time. This can be done on the Processes tab.
Incorrect Answers: System Information gives you information about the hardware and software of the computer, but it is static (text only) and doesn’t change in real time. The Registry stores all of the settings of Windows and is modified with the Registry Editor. Performance Monitor can graph the performance of the different components in the computer and, if configured properly, can do the same thing as the Task Manager in this scenario, but not as easily.
Question 15 of 60
15. Question
You are tasked with disabling services from starting on a Windows PC. Which command should be run to bring up a window to make these changes?
Correct
Msconfig is the only option listed where you can disable services. The key in the question is the phrase “bring up a window.” Msconfig runs in a window, whereas the rest of the answers run as text on the command line. Msconfig can also be used to modify how the system boots. (The Services console window can also be used to disable services, as well as start and stop them.)
Incorrect Answers: SFC is the System File Checker; it scans the integrity of protected system files and repairs problems if necessary and if possible. Contrast this with chkdsk, which can locate and repair errors on the disk, but not within system files. GPUpdate can update user and computer policy settings on the local computer or on remote computers.
Incorrect
Msconfig is the only option listed where you can disable services. The key in the question is the phrase “bring up a window.” Msconfig runs in a window, whereas the rest of the answers run as text on the command line. Msconfig can also be used to modify how the system boots. (The Services console window can also be used to disable services, as well as start and stop them.)
Incorrect Answers: SFC is the System File Checker; it scans the integrity of protected system files and repairs problems if necessary and if possible. Contrast this with chkdsk, which can locate and repair errors on the disk, but not within system files. GPUpdate can update user and computer policy settings on the local computer or on remote computers.
Unattempted
Msconfig is the only option listed where you can disable services. The key in the question is the phrase “bring up a window.” Msconfig runs in a window, whereas the rest of the answers run as text on the command line. Msconfig can also be used to modify how the system boots. (The Services console window can also be used to disable services, as well as start and stop them.)
Incorrect Answers: SFC is the System File Checker; it scans the integrity of protected system files and repairs problems if necessary and if possible. Contrast this with chkdsk, which can locate and repair errors on the disk, but not within system files. GPUpdate can update user and computer policy settings on the local computer or on remote computers.
Question 16 of 60
16. Question
You have been tasked with setting up a specialized computer for video editing. Which of the following should you include with the computer? (Select the two best answers.)
Correct
You should incorporate a solid-state drive (SSD) and dual monitors for the video editing workstation. Video files, such as .MP4 and .AVI, are considerable; they are big files that require a decent-size hard drive. An SSD, possibly an M.2 or similar drive, helps to work with these files efficiently, especially in the video rendering stage. And having dual monitors (or more than two) is important when editing. You will generally want to have an editing window and a separate playback window.
Incorrect Answers: A gigabit NIC is quite common. Chances are that the computer will have it already, but this, and especially 10 Gbit NICs, are more important for servers. The hypervisor is the type of virtualization software manager that you are using—for example, VMware or VirtualBox. A docking station is a device used with a laptop to charge it and to replicate video and other peripherals. Network-attached storage (NAS) is a storage device with multiple hard drives that connects directly to the network. It often uses magnetic drives; SSDs are not required. It doesn’t use a screen; instead, you remotely administer it, usually from a browser.
Incorrect
You should incorporate a solid-state drive (SSD) and dual monitors for the video editing workstation. Video files, such as .MP4 and .AVI, are considerable; they are big files that require a decent-size hard drive. An SSD, possibly an M.2 or similar drive, helps to work with these files efficiently, especially in the video rendering stage. And having dual monitors (or more than two) is important when editing. You will generally want to have an editing window and a separate playback window.
Incorrect Answers: A gigabit NIC is quite common. Chances are that the computer will have it already, but this, and especially 10 Gbit NICs, are more important for servers. The hypervisor is the type of virtualization software manager that you are using—for example, VMware or VirtualBox. A docking station is a device used with a laptop to charge it and to replicate video and other peripherals. Network-attached storage (NAS) is a storage device with multiple hard drives that connects directly to the network. It often uses magnetic drives; SSDs are not required. It doesn’t use a screen; instead, you remotely administer it, usually from a browser.
Unattempted
You should incorporate a solid-state drive (SSD) and dual monitors for the video editing workstation. Video files, such as .MP4 and .AVI, are considerable; they are big files that require a decent-size hard drive. An SSD, possibly an M.2 or similar drive, helps to work with these files efficiently, especially in the video rendering stage. And having dual monitors (or more than two) is important when editing. You will generally want to have an editing window and a separate playback window.
Incorrect Answers: A gigabit NIC is quite common. Chances are that the computer will have it already, but this, and especially 10 Gbit NICs, are more important for servers. The hypervisor is the type of virtualization software manager that you are using—for example, VMware or VirtualBox. A docking station is a device used with a laptop to charge it and to replicate video and other peripherals. Network-attached storage (NAS) is a storage device with multiple hard drives that connects directly to the network. It often uses magnetic drives; SSDs are not required. It doesn’t use a screen; instead, you remotely administer it, usually from a browser.
Question 17 of 60
17. Question
Which of the following statements is correct concerning IPv6 addresses?
Correct
The only statement that is correct concerning IPv6 is that it uses 128-bit addressing. This is compared to IPv4, which uses 32-bit addresses.
Incorrect Answers: IPv6 and IPv4 can cohabit a computer with no problems. IPv6 is not necessarily supported by all routers. Some routers still only support IPv4. IPv6 is a logical concept. The physical cable that connects to the computer has no bearing over which IP version is used.
Incorrect
The only statement that is correct concerning IPv6 is that it uses 128-bit addressing. This is compared to IPv4, which uses 32-bit addresses.
Incorrect Answers: IPv6 and IPv4 can cohabit a computer with no problems. IPv6 is not necessarily supported by all routers. Some routers still only support IPv4. IPv6 is a logical concept. The physical cable that connects to the computer has no bearing over which IP version is used.
Unattempted
The only statement that is correct concerning IPv6 is that it uses 128-bit addressing. This is compared to IPv4, which uses 32-bit addresses.
Incorrect Answers: IPv6 and IPv4 can cohabit a computer with no problems. IPv6 is not necessarily supported by all routers. Some routers still only support IPv4. IPv6 is a logical concept. The physical cable that connects to the computer has no bearing over which IP version is used.
Question 18 of 60
18. Question
A computer’s CPU overheats and shuts down the system intermittently. Which of the following steps should be taken to fix the problem? (Select the two best answers.)
Correct
You should make sure that the heat sink is secure and that the fan is connected. Either of these issues could cause the CPU to overheat. Also, make sure that thermal compound was applied to the heat sink. If you didn’t log in writing somewhere that you did this, you will have to take the heat sink off and inspect it. It’s a good idea to log when you apply thermal compound because if you remove the heat sink, you will need to reapply thermal compound before reinstalling it.
Incorrect Answers: The BIOS temperature threshold is what tripped, causing the system to shut down. You could increase the threshold, which would fix the problem temporarily but could cause permanent damage to the CPU. The threshold is there to protect the CPU; therefore, “Check the BIOS temperature threshold” is not the best answer. If the RAM needed to be reseated, you might get one of several errors or beeps, but the system should not automatically shut down.
Incorrect
You should make sure that the heat sink is secure and that the fan is connected. Either of these issues could cause the CPU to overheat. Also, make sure that thermal compound was applied to the heat sink. If you didn’t log in writing somewhere that you did this, you will have to take the heat sink off and inspect it. It’s a good idea to log when you apply thermal compound because if you remove the heat sink, you will need to reapply thermal compound before reinstalling it.
Incorrect Answers: The BIOS temperature threshold is what tripped, causing the system to shut down. You could increase the threshold, which would fix the problem temporarily but could cause permanent damage to the CPU. The threshold is there to protect the CPU; therefore, “Check the BIOS temperature threshold” is not the best answer. If the RAM needed to be reseated, you might get one of several errors or beeps, but the system should not automatically shut down.
Unattempted
You should make sure that the heat sink is secure and that the fan is connected. Either of these issues could cause the CPU to overheat. Also, make sure that thermal compound was applied to the heat sink. If you didn’t log in writing somewhere that you did this, you will have to take the heat sink off and inspect it. It’s a good idea to log when you apply thermal compound because if you remove the heat sink, you will need to reapply thermal compound before reinstalling it.
Incorrect Answers: The BIOS temperature threshold is what tripped, causing the system to shut down. You could increase the threshold, which would fix the problem temporarily but could cause permanent damage to the CPU. The threshold is there to protect the CPU; therefore, “Check the BIOS temperature threshold” is not the best answer. If the RAM needed to be reseated, you might get one of several errors or beeps, but the system should not automatically shut down.
Question 19 of 60
19. Question
Buzz gets an error that says “Error log full.” Where should you go to clear his error log?
Correct
The Event Viewer contains the error logs; they are finite in size. You could either clear the log or increase the size of the log.
Incorrect Answers: The other three applications do not contain error logs. The Recovery Console is a repair utility used in older versions of Windows; it is unlikely that you will see it.
Incorrect
The Event Viewer contains the error logs; they are finite in size. You could either clear the log or increase the size of the log.
Incorrect Answers: The other three applications do not contain error logs. The Recovery Console is a repair utility used in older versions of Windows; it is unlikely that you will see it.
Unattempted
The Event Viewer contains the error logs; they are finite in size. You could either clear the log or increase the size of the log.
Incorrect Answers: The other three applications do not contain error logs. The Recovery Console is a repair utility used in older versions of Windows; it is unlikely that you will see it.
Question 20 of 60
20. Question
Windows was installed on a computer with two hard drives: a C: drive and a D: drive. Windows is installed to C:, and it works normally. The user of this computer complains that his applications are drive intensive and that they slow down the computer. Which of the following statements best describes how to resolve the problem?
Correct
By moving the paging file (or swap file, aka virtual memory) to the D: drive, you are freeing up C: to deal with those drive-intensive programs.
Incorrect Answers: Reinstalling Windows is a huge process that you should avoid at all costs, especially when unnecessary, such as in this example. Defragging the C: drive would help if that is where the OS and applications are, but defragging the D: drive will not speed up the applications. Decreasing the page file size never helps. However, increasing the size, moving it, and adding RAM are all ways to make applications run faster.
Incorrect
By moving the paging file (or swap file, aka virtual memory) to the D: drive, you are freeing up C: to deal with those drive-intensive programs.
Incorrect Answers: Reinstalling Windows is a huge process that you should avoid at all costs, especially when unnecessary, such as in this example. Defragging the C: drive would help if that is where the OS and applications are, but defragging the D: drive will not speed up the applications. Decreasing the page file size never helps. However, increasing the size, moving it, and adding RAM are all ways to make applications run faster.
Unattempted
By moving the paging file (or swap file, aka virtual memory) to the D: drive, you are freeing up C: to deal with those drive-intensive programs.
Incorrect Answers: Reinstalling Windows is a huge process that you should avoid at all costs, especially when unnecessary, such as in this example. Defragging the C: drive would help if that is where the OS and applications are, but defragging the D: drive will not speed up the applications. Decreasing the page file size never helps. However, increasing the size, moving it, and adding RAM are all ways to make applications run faster.
Question 21 of 60
21. Question
In Windows, which of the following folders might be stored in a hidden partition by default?
Correct
The \Boot folder can be located in a hidden partition (100 MB in size), by default, which is separate from the C: drive.
Incorrect Answers: The \Windows folder is the place where the operating system is installed; it is also known by the variable %systemroot% or %WINDIR% and is located in the C: drive by default. \Documents and Settings is also located in C: by default. Bootmgr is the Windows Boot Manager, which is the Windows loader program; it is a file, not a folder.
Incorrect
The \Boot folder can be located in a hidden partition (100 MB in size), by default, which is separate from the C: drive.
Incorrect Answers: The \Windows folder is the place where the operating system is installed; it is also known by the variable %systemroot% or %WINDIR% and is located in the C: drive by default. \Documents and Settings is also located in C: by default. Bootmgr is the Windows Boot Manager, which is the Windows loader program; it is a file, not a folder.
Unattempted
The \Boot folder can be located in a hidden partition (100 MB in size), by default, which is separate from the C: drive.
Incorrect Answers: The \Windows folder is the place where the operating system is installed; it is also known by the variable %systemroot% or %WINDIR% and is located in the C: drive by default. \Documents and Settings is also located in C: by default. Bootmgr is the Windows Boot Manager, which is the Windows loader program; it is a file, not a folder.
Question 22 of 60
22. Question
How many pins are inside an SATA 3.0 data connector?
Correct
The SATA version 3.0 data connector has seven pins. Note: SATA Express uses a triple connector with 18 pins (7 + 7 + 4).
Incorrect Answers: The SATA power connector has 15 pins. ATX 12V 2.0 and higher power connections have 24 pins. Among other things, 127 is the maximum number of USB devices you can connect to the computer.
Incorrect
The SATA version 3.0 data connector has seven pins. Note: SATA Express uses a triple connector with 18 pins (7 + 7 + 4).
Incorrect Answers: The SATA power connector has 15 pins. ATX 12V 2.0 and higher power connections have 24 pins. Among other things, 127 is the maximum number of USB devices you can connect to the computer.
Unattempted
The SATA version 3.0 data connector has seven pins. Note: SATA Express uses a triple connector with 18 pins (7 + 7 + 4).
Incorrect Answers: The SATA power connector has 15 pins. ATX 12V 2.0 and higher power connections have 24 pins. Among other things, 127 is the maximum number of USB devices you can connect to the computer.
Question 23 of 60
23. Question
Which of the following operating CPU temperatures is typical?
Correct
A typical operating temperature for CPUs is 60° Celsius. Keep in mind that the operating range may be above or below that. Many computers hover around 30° to 35° Celsius.
Incorrect Answers: On the other hand, 72° Celsius becomes much less typical, even if the user is overclocking the system. A temperature of 60° Fahrenheit is equal to 15.5° Celsius. A processor will not run that cold (but it would be pretty efficient if it did!). A temperature of 72° Fahrenheit falls within the range of room temperature and is what you should set the room temperature for computers to run at their best.
Incorrect
A typical operating temperature for CPUs is 60° Celsius. Keep in mind that the operating range may be above or below that. Many computers hover around 30° to 35° Celsius.
Incorrect Answers: On the other hand, 72° Celsius becomes much less typical, even if the user is overclocking the system. A temperature of 60° Fahrenheit is equal to 15.5° Celsius. A processor will not run that cold (but it would be pretty efficient if it did!). A temperature of 72° Fahrenheit falls within the range of room temperature and is what you should set the room temperature for computers to run at their best.
Unattempted
A typical operating temperature for CPUs is 60° Celsius. Keep in mind that the operating range may be above or below that. Many computers hover around 30° to 35° Celsius.
Incorrect Answers: On the other hand, 72° Celsius becomes much less typical, even if the user is overclocking the system. A temperature of 60° Fahrenheit is equal to 15.5° Celsius. A processor will not run that cold (but it would be pretty efficient if it did!). A temperature of 72° Fahrenheit falls within the range of room temperature and is what you should set the room temperature for computers to run at their best.
Question 24 of 60
24. Question
A burning smell comes from the computer. Which of the following is the most likely source?
Correct
The power supply is the most likely source of a burning smell. If it is a very slight smell, the power supply could be brand new. New power supplies have a “burn-in” period of 24–48 working hours. However, you should be very careful with this. If the power supply is about to fail, or if it does fail, it could burn up the motor that drives the fan. This situation could be an electrical and/or fire hazard. So, to be safe, you should remove the power supply and test it in your lab, or call the manufacturer for a replacement.
Incorrect Answers: It is possible but unlikely that the thermal compound would cause a burning smell; however, if this were to occur, it would be much less noticeable and more chemical in nature. The keyboard should not present a burning smell no matter how fast you type on it. The AC outlet could possibly be the cause of a burning smell, and that would be very bad news. In that case, disconnect devices from that outlet, turn off the circuit breaker immediately, and call an electrician. However, the AC outlet is not part of the computer.
Incorrect
The power supply is the most likely source of a burning smell. If it is a very slight smell, the power supply could be brand new. New power supplies have a “burn-in” period of 24–48 working hours. However, you should be very careful with this. If the power supply is about to fail, or if it does fail, it could burn up the motor that drives the fan. This situation could be an electrical and/or fire hazard. So, to be safe, you should remove the power supply and test it in your lab, or call the manufacturer for a replacement.
Incorrect Answers: It is possible but unlikely that the thermal compound would cause a burning smell; however, if this were to occur, it would be much less noticeable and more chemical in nature. The keyboard should not present a burning smell no matter how fast you type on it. The AC outlet could possibly be the cause of a burning smell, and that would be very bad news. In that case, disconnect devices from that outlet, turn off the circuit breaker immediately, and call an electrician. However, the AC outlet is not part of the computer.
Unattempted
The power supply is the most likely source of a burning smell. If it is a very slight smell, the power supply could be brand new. New power supplies have a “burn-in” period of 24–48 working hours. However, you should be very careful with this. If the power supply is about to fail, or if it does fail, it could burn up the motor that drives the fan. This situation could be an electrical and/or fire hazard. So, to be safe, you should remove the power supply and test it in your lab, or call the manufacturer for a replacement.
Incorrect Answers: It is possible but unlikely that the thermal compound would cause a burning smell; however, if this were to occur, it would be much less noticeable and more chemical in nature. The keyboard should not present a burning smell no matter how fast you type on it. The AC outlet could possibly be the cause of a burning smell, and that would be very bad news. In that case, disconnect devices from that outlet, turn off the circuit breaker immediately, and call an electrician. However, the AC outlet is not part of the computer.
Question 25 of 60
25. Question
Which of the following tools checks protected system files?
Correct
System File Checker (SFC) checks protected system files and replaces incorrect versions.
Incorrect Answers: None of the other options check system files. Chkdsk can check for and repair errors, but just regular files. Dism is a tool used to work with Windows images. Scandisk is an older command-line scanning tool that today’s versions of Windows don’t use. It was replaced by Chkdsk.
Incorrect
System File Checker (SFC) checks protected system files and replaces incorrect versions.
Incorrect Answers: None of the other options check system files. Chkdsk can check for and repair errors, but just regular files. Dism is a tool used to work with Windows images. Scandisk is an older command-line scanning tool that today’s versions of Windows don’t use. It was replaced by Chkdsk.
Unattempted
System File Checker (SFC) checks protected system files and replaces incorrect versions.
Incorrect Answers: None of the other options check system files. Chkdsk can check for and repair errors, but just regular files. Dism is a tool used to work with Windows images. Scandisk is an older command-line scanning tool that today’s versions of Windows don’t use. It was replaced by Chkdsk.
Question 26 of 60
26. Question
You are running some cable from an office to a computer located in a warehouse. As you are working in the warehouse, a 55-gallon drum falls from a pallet and spills what smells like ammonia. Which of the following statements best describes the first step you should take in your efforts to resolve this problem?
Correct
If something is immediately hazardous to you, you must leave the area right away.
Incorrect Answers: Afterward, you can call 911, the building supervisor, or your manager, depending on the severity of the situation. Computers and all other technology come second after human life. Remember that. Plus, if backup systems have been implemented properly, you have nothing to lose if a computer is damaged. If the situation is not an emergency, be sure to reference the material safety data sheet (MSDS) for the substance you encounter.
Incorrect
If something is immediately hazardous to you, you must leave the area right away.
Incorrect Answers: Afterward, you can call 911, the building supervisor, or your manager, depending on the severity of the situation. Computers and all other technology come second after human life. Remember that. Plus, if backup systems have been implemented properly, you have nothing to lose if a computer is damaged. If the situation is not an emergency, be sure to reference the material safety data sheet (MSDS) for the substance you encounter.
Unattempted
If something is immediately hazardous to you, you must leave the area right away.
Incorrect Answers: Afterward, you can call 911, the building supervisor, or your manager, depending on the severity of the situation. Computers and all other technology come second after human life. Remember that. Plus, if backup systems have been implemented properly, you have nothing to lose if a computer is damaged. If the situation is not an emergency, be sure to reference the material safety data sheet (MSDS) for the substance you encounter.
Question 27 of 60
27. Question
One of your customers has a wireless network that is secured with WEP. The customer wants to improve data encryption so that the transmission of data has less of a chance of being compromised. Which of the following statements best describes the recommended course of action?
Correct
The best solution is to upgrade the wireless network from WEP to at least WPA2. WEP is a deprecated wireless encryption protocol and should be updated to a newer and more powerful protocol if at all possible. If this is not possible, it would be wise to use a strong WEP key and modify it often.
Incorrect Answers: MAC address filtering does not increase the level of data encryption, but it does filter out unwanted computers when they attempt to connect to the wireless access point. Disabling the SSID broadcast deters new computers from making initial connections to the wireless access point.
Incorrect
The best solution is to upgrade the wireless network from WEP to at least WPA2. WEP is a deprecated wireless encryption protocol and should be updated to a newer and more powerful protocol if at all possible. If this is not possible, it would be wise to use a strong WEP key and modify it often.
Incorrect Answers: MAC address filtering does not increase the level of data encryption, but it does filter out unwanted computers when they attempt to connect to the wireless access point. Disabling the SSID broadcast deters new computers from making initial connections to the wireless access point.
Unattempted
The best solution is to upgrade the wireless network from WEP to at least WPA2. WEP is a deprecated wireless encryption protocol and should be updated to a newer and more powerful protocol if at all possible. If this is not possible, it would be wise to use a strong WEP key and modify it often.
Incorrect Answers: MAC address filtering does not increase the level of data encryption, but it does filter out unwanted computers when they attempt to connect to the wireless access point. Disabling the SSID broadcast deters new computers from making initial connections to the wireless access point.
Question 28 of 60
28. Question
Which type of adapter card is normally plugged into a PCIe x16 adapter card slot?
Correct
The PCI Express (PCIe) x16 expansion slot is used primarily for video.
Incorrect Answers: Modems, network interface cards (NICs), and sound cards usually connect to a PCIe x1 slot. Sometimes, cards require a minimum of PCIe x4.
Incorrect
The PCI Express (PCIe) x16 expansion slot is used primarily for video.
Incorrect Answers: Modems, network interface cards (NICs), and sound cards usually connect to a PCIe x1 slot. Sometimes, cards require a minimum of PCIe x4.
Unattempted
The PCI Express (PCIe) x16 expansion slot is used primarily for video.
Incorrect Answers: Modems, network interface cards (NICs), and sound cards usually connect to a PCIe x1 slot. Sometimes, cards require a minimum of PCIe x4.
Question 29 of 60
29. Question
Which of the following printer technologies should be used to print payroll checks on paper forms that have a carbon backing?
Correct
Incorrect
Unattempted
Question 30 of 60
30. Question
A user recently purchased a new wireless 802.11ac router. After connecting a laptop with an 802.11ac wireless adapter to the wireless network, he notices that the signal strength on the laptop is poor and only connects at 54 Mbps. The user moved the laptop next to the WAP but is still experiencing the same issue. Which of the following is most likely the cause?
Correct
The laptop is probably connecting to a different wireless network, either in the home next door or an adjacent business—one without encryption, it would seem. Based on the speed—54 Mbps—you could safely assume that the connection being made is to either an 802.11g or an 802.11a network. The best course of action is to verify the SSID name of the 802.11ac router, forget the current wireless network, and connect to the new network. You might find that in some cases a laptop connects at a slower speed (such as 802.11g), even though faster speeds (such as 802.11n and 802.11ac) are available. The reason could be due to the configuration of the WAP or the wireless adapter on the laptop. That’s not one of the listed answers and is not the case here because of the poor signal strength mentioned in the scenario.
Incorrect Answers: The cable modem isn’t a part of the equation in this scenario. You are only interested in connecting to the wireless network to start. A router (wireless access point) doesn’t have a wireless card such as the ones in a PC or laptop. Also, you don’t know whether the device is faulty yet because the laptop never connected to it. The same goes for the wireless antennas.
Incorrect
The laptop is probably connecting to a different wireless network, either in the home next door or an adjacent business—one without encryption, it would seem. Based on the speed—54 Mbps—you could safely assume that the connection being made is to either an 802.11g or an 802.11a network. The best course of action is to verify the SSID name of the 802.11ac router, forget the current wireless network, and connect to the new network. You might find that in some cases a laptop connects at a slower speed (such as 802.11g), even though faster speeds (such as 802.11n and 802.11ac) are available. The reason could be due to the configuration of the WAP or the wireless adapter on the laptop. That’s not one of the listed answers and is not the case here because of the poor signal strength mentioned in the scenario.
Incorrect Answers: The cable modem isn’t a part of the equation in this scenario. You are only interested in connecting to the wireless network to start. A router (wireless access point) doesn’t have a wireless card such as the ones in a PC or laptop. Also, you don’t know whether the device is faulty yet because the laptop never connected to it. The same goes for the wireless antennas.
Unattempted
The laptop is probably connecting to a different wireless network, either in the home next door or an adjacent business—one without encryption, it would seem. Based on the speed—54 Mbps—you could safely assume that the connection being made is to either an 802.11g or an 802.11a network. The best course of action is to verify the SSID name of the 802.11ac router, forget the current wireless network, and connect to the new network. You might find that in some cases a laptop connects at a slower speed (such as 802.11g), even though faster speeds (such as 802.11n and 802.11ac) are available. The reason could be due to the configuration of the WAP or the wireless adapter on the laptop. That’s not one of the listed answers and is not the case here because of the poor signal strength mentioned in the scenario.
Incorrect Answers: The cable modem isn’t a part of the equation in this scenario. You are only interested in connecting to the wireless network to start. A router (wireless access point) doesn’t have a wireless card such as the ones in a PC or laptop. Also, you don’t know whether the device is faulty yet because the laptop never connected to it. The same goes for the wireless antennas.
Question 31 of 60
31. Question
Which utility enables you to troubleshoot an error with a file such as ntoskrnl.exe?
Correct
The Event Viewer logs all errors that occur on a system. Particularly, the System log would contain the information useful in troubleshooting this error.
Incorrect Answers: The Windows Registry is a database that stores the settings for Windows. It contains hardware and software information, plus user settings. If you need to troubleshoot certain Dynamic-Link Libraries (DLLs) or ActiveX controls (for example, ones that work with Internet Explorer), you can manipulate them with the REGSVR32 command. macOS and Linux use a utility called Terminal that allows you to manipulate data and make configuration changes similar to the Command Prompt in Windows.
Incorrect
The Event Viewer logs all errors that occur on a system. Particularly, the System log would contain the information useful in troubleshooting this error.
Incorrect Answers: The Windows Registry is a database that stores the settings for Windows. It contains hardware and software information, plus user settings. If you need to troubleshoot certain Dynamic-Link Libraries (DLLs) or ActiveX controls (for example, ones that work with Internet Explorer), you can manipulate them with the REGSVR32 command. macOS and Linux use a utility called Terminal that allows you to manipulate data and make configuration changes similar to the Command Prompt in Windows.
Unattempted
The Event Viewer logs all errors that occur on a system. Particularly, the System log would contain the information useful in troubleshooting this error.
Incorrect Answers: The Windows Registry is a database that stores the settings for Windows. It contains hardware and software information, plus user settings. If you need to troubleshoot certain Dynamic-Link Libraries (DLLs) or ActiveX controls (for example, ones that work with Internet Explorer), you can manipulate them with the REGSVR32 command. macOS and Linux use a utility called Terminal that allows you to manipulate data and make configuration changes similar to the Command Prompt in Windows.
Question 32 of 60
32. Question
Which of the following statements best describes the recommended solution for a lithium-ion battery that won’t hold a charge any longer?
Correct
Every municipality has its own way of recycling batteries. They might be collected by the town or county yearly, or perhaps there are other recycling programs that are sponsored by recycling companies. Always call the municipality to find out exactly what to do.
Incorrect Answers: You should definitely recycle batteries and not throw them in the trash. Manufacturers probably won’t be interested in batteries that don’t charge any longer. It is more likely that you will recycle them. Be safe—never open a battery!
Incorrect
Every municipality has its own way of recycling batteries. They might be collected by the town or county yearly, or perhaps there are other recycling programs that are sponsored by recycling companies. Always call the municipality to find out exactly what to do.
Incorrect Answers: You should definitely recycle batteries and not throw them in the trash. Manufacturers probably won’t be interested in batteries that don’t charge any longer. It is more likely that you will recycle them. Be safe—never open a battery!
Unattempted
Every municipality has its own way of recycling batteries. They might be collected by the town or county yearly, or perhaps there are other recycling programs that are sponsored by recycling companies. Always call the municipality to find out exactly what to do.
Incorrect Answers: You should definitely recycle batteries and not throw them in the trash. Manufacturers probably won’t be interested in batteries that don’t charge any longer. It is more likely that you will recycle them. Be safe—never open a battery!
Question 33 of 60
33. Question
After you install a new video card, the PC loads Windows and continuously reboots. Which of the following statements best describes the first course of action?
Correct
Try accessing Safe Mode first and see if the problem continues. It probably won’t, and you will need to roll back the driver and locate, download, and install the correct one. Remember to get your drivers from the manufacturer’s website, and don’t forget to download the correct driver for your particular operating system.
Incorrect Answers: Chkdsk checks the integrity of files and fixes them if necessary. Msconfig is used to boot the computer in different ways. Although you normally could select Safe Boot in msconfig, it is not possible in this scenario because the system won’t boot into Windows properly. You could check the System log while in Safe Mode, but it won’t explain much except that the system shut down improperly and rebooted continuously.
Incorrect
Try accessing Safe Mode first and see if the problem continues. It probably won’t, and you will need to roll back the driver and locate, download, and install the correct one. Remember to get your drivers from the manufacturer’s website, and don’t forget to download the correct driver for your particular operating system.
Incorrect Answers: Chkdsk checks the integrity of files and fixes them if necessary. Msconfig is used to boot the computer in different ways. Although you normally could select Safe Boot in msconfig, it is not possible in this scenario because the system won’t boot into Windows properly. You could check the System log while in Safe Mode, but it won’t explain much except that the system shut down improperly and rebooted continuously.
Unattempted
Try accessing Safe Mode first and see if the problem continues. It probably won’t, and you will need to roll back the driver and locate, download, and install the correct one. Remember to get your drivers from the manufacturer’s website, and don’t forget to download the correct driver for your particular operating system.
Incorrect Answers: Chkdsk checks the integrity of files and fixes them if necessary. Msconfig is used to boot the computer in different ways. Although you normally could select Safe Boot in msconfig, it is not possible in this scenario because the system won’t boot into Windows properly. You could check the System log while in Safe Mode, but it won’t explain much except that the system shut down improperly and rebooted continuously.
Question 34 of 60
34. Question
An exclamation point next to a device in the Device Manager indicates which of the following?
Correct
If you see an exclamation point in the Device Manager, this indicates that the device does not have a proper driver.
Incorrect Answers: If the device is disabled, it will have a down arrow. If a driver was not digitally signed, the device might show up in the Unknown Devices category until it is installed properly. If a device has a working driver, upgrading it will be up to you, but you won’t necessarily be notified that the driver needs to be upgraded. This question may seem more like a 220-1002 question, but you have to be prepared for some overlap. Remember, some of the concepts of the 220-1001 and the 220-1002 are heavily intertwined!
Incorrect
If you see an exclamation point in the Device Manager, this indicates that the device does not have a proper driver.
Incorrect Answers: If the device is disabled, it will have a down arrow. If a driver was not digitally signed, the device might show up in the Unknown Devices category until it is installed properly. If a device has a working driver, upgrading it will be up to you, but you won’t necessarily be notified that the driver needs to be upgraded. This question may seem more like a 220-1002 question, but you have to be prepared for some overlap. Remember, some of the concepts of the 220-1001 and the 220-1002 are heavily intertwined!
Unattempted
If you see an exclamation point in the Device Manager, this indicates that the device does not have a proper driver.
Incorrect Answers: If the device is disabled, it will have a down arrow. If a driver was not digitally signed, the device might show up in the Unknown Devices category until it is installed properly. If a device has a working driver, upgrading it will be up to you, but you won’t necessarily be notified that the driver needs to be upgraded. This question may seem more like a 220-1002 question, but you have to be prepared for some overlap. Remember, some of the concepts of the 220-1001 and the 220-1002 are heavily intertwined!
Question 35 of 60
35. Question
Which of the following traits and port numbers are associated with POP3? (Select the two best answers.)
Correct
POP3 is a protocol used by email clients to receive email. It makes use of either port 110 (considered insecure) or port 995 (a default secure port).
Incorrect Answers: SMTP is used by email clients to send email. It uses port 25 and the more secure port 587.
Incorrect
POP3 is a protocol used by email clients to receive email. It makes use of either port 110 (considered insecure) or port 995 (a default secure port).
Incorrect Answers: SMTP is used by email clients to send email. It uses port 25 and the more secure port 587.
Unattempted
POP3 is a protocol used by email clients to receive email. It makes use of either port 110 (considered insecure) or port 995 (a default secure port).
Incorrect Answers: SMTP is used by email clients to send email. It uses port 25 and the more secure port 587.
Question 36 of 60
36. Question
Which of the following terminates a coaxial cable?
Correct
The F connector (also known as F-type) is commonly used to terminate coaxial cable that is used for television or cable Internet. Generally, it is used to terminate RG-6 cable but might also be seen with RG-59 cable, which has a thinner conductor and therefore isn’t used as much. Note: RG-59 cable may also be terminated with BNC connectors for professional video applications.
Incorrect Answers: The DB-9 connector (more accurately named the DE-9) is used for serial connections between computers. RJ11 plugs are used with telephone lines. RJ45 plugs are commonly found as the terminators of patch cables in twisted-pair networks.
Incorrect
The F connector (also known as F-type) is commonly used to terminate coaxial cable that is used for television or cable Internet. Generally, it is used to terminate RG-6 cable but might also be seen with RG-59 cable, which has a thinner conductor and therefore isn’t used as much. Note: RG-59 cable may also be terminated with BNC connectors for professional video applications.
Incorrect Answers: The DB-9 connector (more accurately named the DE-9) is used for serial connections between computers. RJ11 plugs are used with telephone lines. RJ45 plugs are commonly found as the terminators of patch cables in twisted-pair networks.
Unattempted
The F connector (also known as F-type) is commonly used to terminate coaxial cable that is used for television or cable Internet. Generally, it is used to terminate RG-6 cable but might also be seen with RG-59 cable, which has a thinner conductor and therefore isn’t used as much. Note: RG-59 cable may also be terminated with BNC connectors for professional video applications.
Incorrect Answers: The DB-9 connector (more accurately named the DE-9) is used for serial connections between computers. RJ11 plugs are used with telephone lines. RJ45 plugs are commonly found as the terminators of patch cables in twisted-pair networks.
Question 37 of 60
37. Question
A blue screen is most often caused by ____________.
Correct
The most common reason for a BSOD (blue screen of death, otherwise known as a stop error) is driver failure.
Incorrect Answers: Second on the list is memory/processor-related errors. Hard drives and optical drives themselves should not cause stop errors, but their drivers might.
Incorrect
The most common reason for a BSOD (blue screen of death, otherwise known as a stop error) is driver failure.
Incorrect Answers: Second on the list is memory/processor-related errors. Hard drives and optical drives themselves should not cause stop errors, but their drivers might.
Unattempted
The most common reason for a BSOD (blue screen of death, otherwise known as a stop error) is driver failure.
Incorrect Answers: Second on the list is memory/processor-related errors. Hard drives and optical drives themselves should not cause stop errors, but their drivers might.
Question 38 of 60
38. Question
Which language support for representing characters is built into Windows?
Correct
Answer: A Explanation: Unicode is the code used to represent characters among multiple computers’ language platforms. It is commonly used in Microsoft Word and other Office programs. For example, to show the logical equivalence symbol (?), you would type U+2261, then highlight that text, and then press the Alt+X shortcut on the keyboard, which changes the text into the symbol (?).Unicode works regardless of the language a person is working in.
Incorrect Answers: ASCII and EBCDIC are different types of character encoding sets in the English language only. ITU-T deals with standards for telecommunications. .ps1 is the main file extension used for PowerShell scripts.
Incorrect
Answer: A Explanation: Unicode is the code used to represent characters among multiple computers’ language platforms. It is commonly used in Microsoft Word and other Office programs. For example, to show the logical equivalence symbol (?), you would type U+2261, then highlight that text, and then press the Alt+X shortcut on the keyboard, which changes the text into the symbol (?).Unicode works regardless of the language a person is working in.
Incorrect Answers: ASCII and EBCDIC are different types of character encoding sets in the English language only. ITU-T deals with standards for telecommunications. .ps1 is the main file extension used for PowerShell scripts.
Unattempted
Answer: A Explanation: Unicode is the code used to represent characters among multiple computers’ language platforms. It is commonly used in Microsoft Word and other Office programs. For example, to show the logical equivalence symbol (?), you would type U+2261, then highlight that text, and then press the Alt+X shortcut on the keyboard, which changes the text into the symbol (?).Unicode works regardless of the language a person is working in.
Incorrect Answers: ASCII and EBCDIC are different types of character encoding sets in the English language only. ITU-T deals with standards for telecommunications. .ps1 is the main file extension used for PowerShell scripts.
Question 39 of 60
39. Question
Which of the following statements is not assertive communication?
Correct
Asking a customer if employees always cause issues is just plain rude; this type of communication should be avoided.
Incorrect Answers: The other three statements are positive and helpful, or at least consoling. Stay away from being judgmental of the customer.
Incorrect
Asking a customer if employees always cause issues is just plain rude; this type of communication should be avoided.
Incorrect Answers: The other three statements are positive and helpful, or at least consoling. Stay away from being judgmental of the customer.
Unattempted
Asking a customer if employees always cause issues is just plain rude; this type of communication should be avoided.
Incorrect Answers: The other three statements are positive and helpful, or at least consoling. Stay away from being judgmental of the customer.
Question 40 of 60
40. Question
Which of the following statements best describes how to prepare a mobile device in case it is stolen or lost? (Select the three best answers.)
Correct
First, you should configure some kind of remote backup. This way, if the device is compromised, you have the confidential data backed up outside of the device at another location. The other half of this solution (not mentioned in the answers) is remote wipe. When you are positive that the device is stolen or lost, and you know the data was backed up at some point, trigger a remote wipe to remove all data from the device. Second, enable GPS on the device so that it can be tracked if it is lost or stolen. Third, configure a screenlock of some sort, be it a pattern that is drawn on the display, a PIN, or a password. A strong password is usually the best form of screenlock and the hardest to crack.
Incorrect Answers: It doesn’t make a difference how Bluetooth and Wi-Fi are configured. They won’t help protect confidential data in the case of theft. Instead of Wi-Fi encryption, a mobile device should be prepared with a file encryption or full drive encryption tool.
Incorrect
First, you should configure some kind of remote backup. This way, if the device is compromised, you have the confidential data backed up outside of the device at another location. The other half of this solution (not mentioned in the answers) is remote wipe. When you are positive that the device is stolen or lost, and you know the data was backed up at some point, trigger a remote wipe to remove all data from the device. Second, enable GPS on the device so that it can be tracked if it is lost or stolen. Third, configure a screenlock of some sort, be it a pattern that is drawn on the display, a PIN, or a password. A strong password is usually the best form of screenlock and the hardest to crack.
Incorrect Answers: It doesn’t make a difference how Bluetooth and Wi-Fi are configured. They won’t help protect confidential data in the case of theft. Instead of Wi-Fi encryption, a mobile device should be prepared with a file encryption or full drive encryption tool.
Unattempted
First, you should configure some kind of remote backup. This way, if the device is compromised, you have the confidential data backed up outside of the device at another location. The other half of this solution (not mentioned in the answers) is remote wipe. When you are positive that the device is stolen or lost, and you know the data was backed up at some point, trigger a remote wipe to remove all data from the device. Second, enable GPS on the device so that it can be tracked if it is lost or stolen. Third, configure a screenlock of some sort, be it a pattern that is drawn on the display, a PIN, or a password. A strong password is usually the best form of screenlock and the hardest to crack.
Incorrect Answers: It doesn’t make a difference how Bluetooth and Wi-Fi are configured. They won’t help protect confidential data in the case of theft. Instead of Wi-Fi encryption, a mobile device should be prepared with a file encryption or full drive encryption tool.
Question 41 of 60
41. Question
Which of the following indicates that a printer is networkready?
Correct
The RJ45 jack enables a connection to a twisted-pair (most likely Ethernet) network. Printers with a built-in RJ45 connector are network-ready; so are printers that are Wi-Fi enabled.
Incorrect Answers: RJ11 ports are used by modems and dial-up Internet connections. If a printer has this port, it is a multifunction printer acting as a fax machine. USB is the standard port for a printer. This port allows it to connect to a PC or to a print server. SCSI connectors are not often found on today’s printers; regardless, they indicate a local connection, not a network connection.
Incorrect
The RJ45 jack enables a connection to a twisted-pair (most likely Ethernet) network. Printers with a built-in RJ45 connector are network-ready; so are printers that are Wi-Fi enabled.
Incorrect Answers: RJ11 ports are used by modems and dial-up Internet connections. If a printer has this port, it is a multifunction printer acting as a fax machine. USB is the standard port for a printer. This port allows it to connect to a PC or to a print server. SCSI connectors are not often found on today’s printers; regardless, they indicate a local connection, not a network connection.
Unattempted
The RJ45 jack enables a connection to a twisted-pair (most likely Ethernet) network. Printers with a built-in RJ45 connector are network-ready; so are printers that are Wi-Fi enabled.
Incorrect Answers: RJ11 ports are used by modems and dial-up Internet connections. If a printer has this port, it is a multifunction printer acting as a fax machine. USB is the standard port for a printer. This port allows it to connect to a PC or to a print server. SCSI connectors are not often found on today’s printers; regardless, they indicate a local connection, not a network connection.
Question 42 of 60
42. Question
Which type of cable should be used to connect a laptop directly to a PC?
Correct
To connect one computer to another directly by way of network adapter cards, use a crossover cable. (The category such as 5e or 6 doesn’t matter.) That cable is designed to connect like devices. It is wired as T568B on one end and T568A on the other. Those standards are ratified by the Telecommunications Industry Association/Electronic Industries Alliance (TIA/EIA).
Incorrect Answers: A regular (and more common) Cat 6 patch cable is known as a straight-through cable. It is used to connect unlike devices, such as a computer to a switch. Normally, it is wired with the T568B standard on each end. A parallel cable might be used to connect an older printer to a computer or an external hard drive to a SCSI card. Rolled cable is a less commonly used term for a cable that administrators use to connect from a serial port on a PC to a console port on a router. Its proper name is a null-modem cable, but it might also be referred to as a rollover cable or a console cable.
Incorrect
To connect one computer to another directly by way of network adapter cards, use a crossover cable. (The category such as 5e or 6 doesn’t matter.) That cable is designed to connect like devices. It is wired as T568B on one end and T568A on the other. Those standards are ratified by the Telecommunications Industry Association/Electronic Industries Alliance (TIA/EIA).
Incorrect Answers: A regular (and more common) Cat 6 patch cable is known as a straight-through cable. It is used to connect unlike devices, such as a computer to a switch. Normally, it is wired with the T568B standard on each end. A parallel cable might be used to connect an older printer to a computer or an external hard drive to a SCSI card. Rolled cable is a less commonly used term for a cable that administrators use to connect from a serial port on a PC to a console port on a router. Its proper name is a null-modem cable, but it might also be referred to as a rollover cable or a console cable.
Unattempted
To connect one computer to another directly by way of network adapter cards, use a crossover cable. (The category such as 5e or 6 doesn’t matter.) That cable is designed to connect like devices. It is wired as T568B on one end and T568A on the other. Those standards are ratified by the Telecommunications Industry Association/Electronic Industries Alliance (TIA/EIA).
Incorrect Answers: A regular (and more common) Cat 6 patch cable is known as a straight-through cable. It is used to connect unlike devices, such as a computer to a switch. Normally, it is wired with the T568B standard on each end. A parallel cable might be used to connect an older printer to a computer or an external hard drive to a SCSI card. Rolled cable is a less commonly used term for a cable that administrators use to connect from a serial port on a PC to a console port on a router. Its proper name is a null-modem cable, but it might also be referred to as a rollover cable or a console cable.
Question 43 of 60
43. Question
Mary’s printer is printing hundreds of pages, and she can’t get it to stop. She has tried to delete the job by doubleclicking the printer and deleting the print job. Which of the following steps represents the best way to stop the printer?
Correct
Clear the printer spooler. You do this by stopping the Print Spooler service in Computer Management (or in the Command Prompt by entering net stop spooler) and then deleting the files in the path C:\Windows\System32\Spool\Printers.
Incorrect Answers: Try not to turn off or unplug the printer unless absolutely necessary. Resetting the printer is somewhat vague but would most likely result in a need for printer reconfiguration.
Incorrect
Clear the printer spooler. You do this by stopping the Print Spooler service in Computer Management (or in the Command Prompt by entering net stop spooler) and then deleting the files in the path C:\Windows\System32\Spool\Printers.
Incorrect Answers: Try not to turn off or unplug the printer unless absolutely necessary. Resetting the printer is somewhat vague but would most likely result in a need for printer reconfiguration.
Unattempted
Clear the printer spooler. You do this by stopping the Print Spooler service in Computer Management (or in the Command Prompt by entering net stop spooler) and then deleting the files in the path C:\Windows\System32\Spool\Printers.
Incorrect Answers: Try not to turn off or unplug the printer unless absolutely necessary. Resetting the printer is somewhat vague but would most likely result in a need for printer reconfiguration.
Question 44 of 60
44. Question
Which Windows System Recovery Option attempts to automatically fix problems?
Correct
The best answer is Startup repair. Startup repair attempts to fix issues automatically. This is available in the Windows RE System Recovery Options.
Incorrect Answers: Although System Restore can “fix” problems, it only does this by resetting the computer to an earlier point in time, and as such, this is not the best answer. File History is the file backup program for Windows 10 and 8 but is not available within the system recovery environment. Reset Your PC is a Windows Recovery Environment. This might fix a problem, but it wipes settings and data in Windows 8, making it a possible solution, but only after you have tried other methods. (Instead of Reset Your PC, consider Refresh Your PC on Windows 8 systems first.) In Windows 10, Reset Your PC reinstalls but allows you to choose whether or not you want to wipe all data.
Incorrect
The best answer is Startup repair. Startup repair attempts to fix issues automatically. This is available in the Windows RE System Recovery Options.
Incorrect Answers: Although System Restore can “fix” problems, it only does this by resetting the computer to an earlier point in time, and as such, this is not the best answer. File History is the file backup program for Windows 10 and 8 but is not available within the system recovery environment. Reset Your PC is a Windows Recovery Environment. This might fix a problem, but it wipes settings and data in Windows 8, making it a possible solution, but only after you have tried other methods. (Instead of Reset Your PC, consider Refresh Your PC on Windows 8 systems first.) In Windows 10, Reset Your PC reinstalls but allows you to choose whether or not you want to wipe all data.
Unattempted
The best answer is Startup repair. Startup repair attempts to fix issues automatically. This is available in the Windows RE System Recovery Options.
Incorrect Answers: Although System Restore can “fix” problems, it only does this by resetting the computer to an earlier point in time, and as such, this is not the best answer. File History is the file backup program for Windows 10 and 8 but is not available within the system recovery environment. Reset Your PC is a Windows Recovery Environment. This might fix a problem, but it wipes settings and data in Windows 8, making it a possible solution, but only after you have tried other methods. (Instead of Reset Your PC, consider Refresh Your PC on Windows 8 systems first.) In Windows 10, Reset Your PC reinstalls but allows you to choose whether or not you want to wipe all data.
Question 45 of 60
45. Question
While you are upgrading a customer’s server hard drives, you notice looped network cables lying all over the server room floor. Which of the following statements best describes how to resolve this issue?
Correct
You need to explain to the customer that there is a safer way. Cable management is very important when it comes to the safety of employees. Trip hazards such as incorrectly routed network cables can have devastating effects on a person.
Incorrect Answers: Never ignore the problem. It is not your place to notify the building supervisor or administrator because this is not your company. However, you might opt to tell your manager about the event. A wise consulting company wants to protect its employees and should want to know of potential hazards at customer locations.
Incorrect
You need to explain to the customer that there is a safer way. Cable management is very important when it comes to the safety of employees. Trip hazards such as incorrectly routed network cables can have devastating effects on a person.
Incorrect Answers: Never ignore the problem. It is not your place to notify the building supervisor or administrator because this is not your company. However, you might opt to tell your manager about the event. A wise consulting company wants to protect its employees and should want to know of potential hazards at customer locations.
Unattempted
You need to explain to the customer that there is a safer way. Cable management is very important when it comes to the safety of employees. Trip hazards such as incorrectly routed network cables can have devastating effects on a person.
Incorrect Answers: Never ignore the problem. It is not your place to notify the building supervisor or administrator because this is not your company. However, you might opt to tell your manager about the event. A wise consulting company wants to protect its employees and should want to know of potential hazards at customer locations.
Question 46 of 60
46. Question
Which of the following commands is used to display hidden files?
Correct
Dir /a can be used to display hidden files. Specifically, dir /ah can be used to show hidden files only.
Incorrect Answers: Dir /o deals with various sort orders of files—for example, alphabetical. Dir /d sorts files by column in wide format, and dir /? displays the help file for the dir command.
Incorrect
Dir /a can be used to display hidden files. Specifically, dir /ah can be used to show hidden files only.
Incorrect Answers: Dir /o deals with various sort orders of files—for example, alphabetical. Dir /d sorts files by column in wide format, and dir /? displays the help file for the dir command.
Unattempted
Dir /a can be used to display hidden files. Specifically, dir /ah can be used to show hidden files only.
Incorrect Answers: Dir /o deals with various sort orders of files—for example, alphabetical. Dir /d sorts files by column in wide format, and dir /? displays the help file for the dir command.
Question 47 of 60
47. Question
For which type of PC component are 80 mm and 120 mm common sizes?
Correct
Case fans are measured in mm (millimeters); 80 mm and especially 120 mm are very common. They are used to exhaust heat out of the case. These fans aid in keeping the CPU and other devices cool. The 120 mm is quite common in desktop and tower PCs, and the 80 mm is more common in smaller systems and 1U and 2U rackmount servers.
Incorrect Answers: CPUs commonly use a heat sink/fan combination. However, the two are often connected. Memory modules don’t use fans, but they can be equipped (or purchased) with heat sinks of their own.
Incorrect
Case fans are measured in mm (millimeters); 80 mm and especially 120 mm are very common. They are used to exhaust heat out of the case. These fans aid in keeping the CPU and other devices cool. The 120 mm is quite common in desktop and tower PCs, and the 80 mm is more common in smaller systems and 1U and 2U rackmount servers.
Incorrect Answers: CPUs commonly use a heat sink/fan combination. However, the two are often connected. Memory modules don’t use fans, but they can be equipped (or purchased) with heat sinks of their own.
Unattempted
Case fans are measured in mm (millimeters); 80 mm and especially 120 mm are very common. They are used to exhaust heat out of the case. These fans aid in keeping the CPU and other devices cool. The 120 mm is quite common in desktop and tower PCs, and the 80 mm is more common in smaller systems and 1U and 2U rackmount servers.
Incorrect Answers: CPUs commonly use a heat sink/fan combination. However, the two are often connected. Memory modules don’t use fans, but they can be equipped (or purchased) with heat sinks of their own.
Question 48 of 60
48. Question
Which of the following is not a configuration that can be made in the UEFI/BIOS?
Correct
You cannot install drivers to the UEFI/BIOS. Drivers are software that allows the operating system to communicate with hardware; they can be configured in the Device Manager in Windows.
Incorrect Answers: The rest of the answers can be configured in the BIOS. The boot sequence (also known as boot priority or boot order) allows you to select which device will be booted off first. (The hard drive is the most secure.) Temperature thresholds allow you to set alerts and possibly shut down the system if the CPU runs too hot. Overclocking occurs when the CPU’s voltage is raised and the speed is increased. Overclocking is not recommended, but if you do configure it, you should set temperature thresholds. Intrusion detection can be enabled and will log if a person opened the computer case.
Incorrect
You cannot install drivers to the UEFI/BIOS. Drivers are software that allows the operating system to communicate with hardware; they can be configured in the Device Manager in Windows.
Incorrect Answers: The rest of the answers can be configured in the BIOS. The boot sequence (also known as boot priority or boot order) allows you to select which device will be booted off first. (The hard drive is the most secure.) Temperature thresholds allow you to set alerts and possibly shut down the system if the CPU runs too hot. Overclocking occurs when the CPU’s voltage is raised and the speed is increased. Overclocking is not recommended, but if you do configure it, you should set temperature thresholds. Intrusion detection can be enabled and will log if a person opened the computer case.
Unattempted
You cannot install drivers to the UEFI/BIOS. Drivers are software that allows the operating system to communicate with hardware; they can be configured in the Device Manager in Windows.
Incorrect Answers: The rest of the answers can be configured in the BIOS. The boot sequence (also known as boot priority or boot order) allows you to select which device will be booted off first. (The hard drive is the most secure.) Temperature thresholds allow you to set alerts and possibly shut down the system if the CPU runs too hot. Overclocking occurs when the CPU’s voltage is raised and the speed is increased. Overclocking is not recommended, but if you do configure it, you should set temperature thresholds. Intrusion detection can be enabled and will log if a person opened the computer case.
Question 49 of 60
49. Question
You have been tasked with upgrading a desktop computer’s internal storage to allow for storage room for backups, videos, and photos. This storage solution should be large enough to avoid scaling it again in the next 6 months. Which of the following is the appropriate solution?
Correct
The best of the listed answers is 3 TB HDD, meaning a 3 terabyte magnetic-based hard disk drive. It can be installed internally to the computer, is relatively inexpensive, and offers a good storage size that probably won’t be exceeded in the next 6 months (although anything can happen!).
Incorrect Answers: A 500 TB storage-area network (SAN) is an entire network of storage devices that exists outside the desktop computer. Also, for a typical PC, it is way bigger than you need. A 50 GB network-attached storage (NAS) device also exists outside the desktop computer. In addition, the storage size is quite limited. A 512 GB SSD is a possibility, but it doesn’t have as much space as the 3 TB HDD, and it will be more expensive per megabyte. A good rule of thumb is to use SSDs for the OS, apps, and working projects. Then use an HDD for backup and long-term storage. Keep in mind that this does not take into account any fault tolerance.
Incorrect
The best of the listed answers is 3 TB HDD, meaning a 3 terabyte magnetic-based hard disk drive. It can be installed internally to the computer, is relatively inexpensive, and offers a good storage size that probably won’t be exceeded in the next 6 months (although anything can happen!).
Incorrect Answers: A 500 TB storage-area network (SAN) is an entire network of storage devices that exists outside the desktop computer. Also, for a typical PC, it is way bigger than you need. A 50 GB network-attached storage (NAS) device also exists outside the desktop computer. In addition, the storage size is quite limited. A 512 GB SSD is a possibility, but it doesn’t have as much space as the 3 TB HDD, and it will be more expensive per megabyte. A good rule of thumb is to use SSDs for the OS, apps, and working projects. Then use an HDD for backup and long-term storage. Keep in mind that this does not take into account any fault tolerance.
Unattempted
The best of the listed answers is 3 TB HDD, meaning a 3 terabyte magnetic-based hard disk drive. It can be installed internally to the computer, is relatively inexpensive, and offers a good storage size that probably won’t be exceeded in the next 6 months (although anything can happen!).
Incorrect Answers: A 500 TB storage-area network (SAN) is an entire network of storage devices that exists outside the desktop computer. Also, for a typical PC, it is way bigger than you need. A 50 GB network-attached storage (NAS) device also exists outside the desktop computer. In addition, the storage size is quite limited. A 512 GB SSD is a possibility, but it doesn’t have as much space as the 3 TB HDD, and it will be more expensive per megabyte. A good rule of thumb is to use SSDs for the OS, apps, and working projects. Then use an HDD for backup and long-term storage. Keep in mind that this does not take into account any fault tolerance.
Question 50 of 60
50. Question
A technician is installing a program on a Windows computer and the installation fails. Which of the following statements describes the next best step?
Correct
Run the installer as an administrator. Programs cannot be installed by standard users or guests. You must have administrative rights to do so.
Incorrect Answers: You should try to resolve the problem yourself before contacting the manufacturer, but in the end, the manufacturer might not be able to provide meaningful help. Be ready to solve problems on your own. Upgrading to a new version of Windows and reinstalling Windows are a bit extreme. Always remember to install as an admin and, if necessary, run older programs in compatibility mode.
Incorrect
Run the installer as an administrator. Programs cannot be installed by standard users or guests. You must have administrative rights to do so.
Incorrect Answers: You should try to resolve the problem yourself before contacting the manufacturer, but in the end, the manufacturer might not be able to provide meaningful help. Be ready to solve problems on your own. Upgrading to a new version of Windows and reinstalling Windows are a bit extreme. Always remember to install as an admin and, if necessary, run older programs in compatibility mode.
Unattempted
Run the installer as an administrator. Programs cannot be installed by standard users or guests. You must have administrative rights to do so.
Incorrect Answers: You should try to resolve the problem yourself before contacting the manufacturer, but in the end, the manufacturer might not be able to provide meaningful help. Be ready to solve problems on your own. Upgrading to a new version of Windows and reinstalling Windows are a bit extreme. Always remember to install as an admin and, if necessary, run older programs in compatibility mode.
Question 51 of 60
51. Question
A customer has a malfunctioning PC, and as you are about to begin repairing it, the customer proceeds to tell you about the problems with the server. Which of the following statements best describes how to respond to the customer?
Correct
Ask if the server problem is related to the PC problem. Try to understand the customer before making any judgments about the problems. Make sure it isn’t a bigger problem than you realize before making repairs that could be futile. If you find out that it is a separate problem, ask the customer which issue should be resolved first.
Incorrect Answers: You never know if problems are interrelated, so always listen to the customer and be patient before starting any work. If necessary—and if it is a separate problem—you can escalate the server issue to another technician, but state that you will do that. Statements about what you know and don’t know are rarely necessary. You might have to ultimately call your supervisor about the server issue. But as an A+ technician you might have the server knowledge required. It depends on the problem. Find out the entire scope of the issues at hand and whether or not they are related before beginning any work.
Incorrect
Ask if the server problem is related to the PC problem. Try to understand the customer before making any judgments about the problems. Make sure it isn’t a bigger problem than you realize before making repairs that could be futile. If you find out that it is a separate problem, ask the customer which issue should be resolved first.
Incorrect Answers: You never know if problems are interrelated, so always listen to the customer and be patient before starting any work. If necessary—and if it is a separate problem—you can escalate the server issue to another technician, but state that you will do that. Statements about what you know and don’t know are rarely necessary. You might have to ultimately call your supervisor about the server issue. But as an A+ technician you might have the server knowledge required. It depends on the problem. Find out the entire scope of the issues at hand and whether or not they are related before beginning any work.
Unattempted
Ask if the server problem is related to the PC problem. Try to understand the customer before making any judgments about the problems. Make sure it isn’t a bigger problem than you realize before making repairs that could be futile. If you find out that it is a separate problem, ask the customer which issue should be resolved first.
Incorrect Answers: You never know if problems are interrelated, so always listen to the customer and be patient before starting any work. If necessary—and if it is a separate problem—you can escalate the server issue to another technician, but state that you will do that. Statements about what you know and don’t know are rarely necessary. You might have to ultimately call your supervisor about the server issue. But as an A+ technician you might have the server knowledge required. It depends on the problem. Find out the entire scope of the issues at hand and whether or not they are related before beginning any work.
Question 52 of 60
52. Question
Two coworkers share the same file inside a folder. User A works on the file, makes changes, and saves the file. User B then works on the file, makes changes, and saves the file as well. The next time User A attempts to open the file, she receives an access denied error. Which of the following statements best describes the most likely cause of this error message?
Correct
Most likely User B moved the file to another location outside of the current partition, made the changes (which is possible since User B is the one who moved it), and then moved it back to the original location. Whenever a file is moved to another partition or volume, the file takes on the permissions of the parent folder. However, if the file had been moved within the volume, the permissions would have been retained. Tricky. Remember this: If the file is moved within the same volume, it retains permissions, so the permissions don’t change. But if a file is moved to another volume, it takes on the permissions of the folder it is moved into. As for copying, the file’s copy always takes on the permissions of the parent regardless of where that copy is placed.
Incorrect Answers: If NTFS permissions were changed to allow execute, User A should have been able to open the file. If the file was set with the hidden attribute, User A should not have been able to see the file. Accounts Receivable might or might not set a file to read-only. However, User A should still be able to open the file, but in read-only mode.
Incorrect
Most likely User B moved the file to another location outside of the current partition, made the changes (which is possible since User B is the one who moved it), and then moved it back to the original location. Whenever a file is moved to another partition or volume, the file takes on the permissions of the parent folder. However, if the file had been moved within the volume, the permissions would have been retained. Tricky. Remember this: If the file is moved within the same volume, it retains permissions, so the permissions don’t change. But if a file is moved to another volume, it takes on the permissions of the folder it is moved into. As for copying, the file’s copy always takes on the permissions of the parent regardless of where that copy is placed.
Incorrect Answers: If NTFS permissions were changed to allow execute, User A should have been able to open the file. If the file was set with the hidden attribute, User A should not have been able to see the file. Accounts Receivable might or might not set a file to read-only. However, User A should still be able to open the file, but in read-only mode.
Unattempted
Most likely User B moved the file to another location outside of the current partition, made the changes (which is possible since User B is the one who moved it), and then moved it back to the original location. Whenever a file is moved to another partition or volume, the file takes on the permissions of the parent folder. However, if the file had been moved within the volume, the permissions would have been retained. Tricky. Remember this: If the file is moved within the same volume, it retains permissions, so the permissions don’t change. But if a file is moved to another volume, it takes on the permissions of the folder it is moved into. As for copying, the file’s copy always takes on the permissions of the parent regardless of where that copy is placed.
Incorrect Answers: If NTFS permissions were changed to allow execute, User A should have been able to open the file. If the file was set with the hidden attribute, User A should not have been able to see the file. Accounts Receivable might or might not set a file to read-only. However, User A should still be able to open the file, but in read-only mode.
Question 53 of 60
53. Question
You just turned off a printer to maintain it. Which of the following should you be careful of when removing the fuser?
Correct
The fuser heats paper to around 400° Fahrenheit (204° Celsius). That’s like an oven. If you need to replace the fuser, let the printer sit for 10 or 15 minutes after shutting it down and before maintenance.
Incorrect Answers: The fuser is not wet or fragile, and it does not contain toner; that is contained by the cartridge.
Incorrect
The fuser heats paper to around 400° Fahrenheit (204° Celsius). That’s like an oven. If you need to replace the fuser, let the printer sit for 10 or 15 minutes after shutting it down and before maintenance.
Incorrect Answers: The fuser is not wet or fragile, and it does not contain toner; that is contained by the cartridge.
Unattempted
The fuser heats paper to around 400° Fahrenheit (204° Celsius). That’s like an oven. If you need to replace the fuser, let the printer sit for 10 or 15 minutes after shutting it down and before maintenance.
Incorrect Answers: The fuser is not wet or fragile, and it does not contain toner; that is contained by the cartridge.
Question 54 of 60
54. Question
To perform a network installation of Windows, which of the following must be supported by the computer’s network interface card?
Correct
Network installations require that the network card be configured for Preboot eXecution Environment (PXE). This allows the network card to boot off the network, locate a network installation server, and request that the installation begin. This configuration might be done in the UEFI/BIOS of the computer (if the network adapter is integrated to the motherboard), within a special program in Windows, or in one that boots from disc or other removable media (if the network adapter is an adapter card).
Incorrect Answers: Peripheral Component Interconnect Express (PCIe) is an expansion bus that accepts video cards, network adapter cards, sound cards, and so on. PCL stands for Printer Command Language, developed by HP so that a computer can properly communicate with impact or thermal printers. PnP stands for plug and play, a Windows technology that allows devices to be located and installed automatically.
Incorrect
Network installations require that the network card be configured for Preboot eXecution Environment (PXE). This allows the network card to boot off the network, locate a network installation server, and request that the installation begin. This configuration might be done in the UEFI/BIOS of the computer (if the network adapter is integrated to the motherboard), within a special program in Windows, or in one that boots from disc or other removable media (if the network adapter is an adapter card).
Incorrect Answers: Peripheral Component Interconnect Express (PCIe) is an expansion bus that accepts video cards, network adapter cards, sound cards, and so on. PCL stands for Printer Command Language, developed by HP so that a computer can properly communicate with impact or thermal printers. PnP stands for plug and play, a Windows technology that allows devices to be located and installed automatically.
Unattempted
Network installations require that the network card be configured for Preboot eXecution Environment (PXE). This allows the network card to boot off the network, locate a network installation server, and request that the installation begin. This configuration might be done in the UEFI/BIOS of the computer (if the network adapter is integrated to the motherboard), within a special program in Windows, or in one that boots from disc or other removable media (if the network adapter is an adapter card).
Incorrect Answers: Peripheral Component Interconnect Express (PCIe) is an expansion bus that accepts video cards, network adapter cards, sound cards, and so on. PCL stands for Printer Command Language, developed by HP so that a computer can properly communicate with impact or thermal printers. PnP stands for plug and play, a Windows technology that allows devices to be located and installed automatically.
Question 55 of 60
55. Question
You are troubleshooting a coworker’s computer. When you ping the loopback address, you receive no response. Which of the following is the most likely cause of this problem?
Correct
Pinging the loopback address should return results even if you are not physically connected to the network. This trick deals with the computer internally and doesn’t even need a LAN. You can ping the local computer with the commands ping loopback and ping localhost; however, the best option is to ping the actual IPv4 loopback IP address by typing ping 127.0.0.1 (or ping ::1 for IPv6). This removes any possible name resolution that might occur in Windows. Note that name resolution happens whenever you connect to a system by name (such as computerA, workstationB, and so on); the name must ultimately be translated to its corresponding IP address. So, to avoid any name resolution issues, we computer techs like to go right to the source and ping the IP address directly. This way, we can troubleshoot whether or not the TCP/IP protocol suite is functioning properly, without being concerned with any other services and name resolution getting in the way. It’s a good general practice for connecting to systems directly.
Incorrect Answers: Pinging the loopback address doesn’t make use of the network, so the LAN, DHCP servers, and the Ethernet cable do not play into the scenario.
Incorrect
Pinging the loopback address should return results even if you are not physically connected to the network. This trick deals with the computer internally and doesn’t even need a LAN. You can ping the local computer with the commands ping loopback and ping localhost; however, the best option is to ping the actual IPv4 loopback IP address by typing ping 127.0.0.1 (or ping ::1 for IPv6). This removes any possible name resolution that might occur in Windows. Note that name resolution happens whenever you connect to a system by name (such as computerA, workstationB, and so on); the name must ultimately be translated to its corresponding IP address. So, to avoid any name resolution issues, we computer techs like to go right to the source and ping the IP address directly. This way, we can troubleshoot whether or not the TCP/IP protocol suite is functioning properly, without being concerned with any other services and name resolution getting in the way. It’s a good general practice for connecting to systems directly.
Incorrect Answers: Pinging the loopback address doesn’t make use of the network, so the LAN, DHCP servers, and the Ethernet cable do not play into the scenario.
Unattempted
Pinging the loopback address should return results even if you are not physically connected to the network. This trick deals with the computer internally and doesn’t even need a LAN. You can ping the local computer with the commands ping loopback and ping localhost; however, the best option is to ping the actual IPv4 loopback IP address by typing ping 127.0.0.1 (or ping ::1 for IPv6). This removes any possible name resolution that might occur in Windows. Note that name resolution happens whenever you connect to a system by name (such as computerA, workstationB, and so on); the name must ultimately be translated to its corresponding IP address. So, to avoid any name resolution issues, we computer techs like to go right to the source and ping the IP address directly. This way, we can troubleshoot whether or not the TCP/IP protocol suite is functioning properly, without being concerned with any other services and name resolution getting in the way. It’s a good general practice for connecting to systems directly.
Incorrect Answers: Pinging the loopback address doesn’t make use of the network, so the LAN, DHCP servers, and the Ethernet cable do not play into the scenario.
Question 56 of 60
56. Question
Which of the following statements best describes how to apply spray cleaner to a monitor?
Correct
Spray on a lint-free cloth first, and then wipe the display gently. A lot of companies sell products that are half isopropyl alcohol and half water. You could also make this cleaner yourself. Again, remember to put the solution on a lint-free cloth first.
Incorrect Answers: Never spray any cleaner directly on a display. Try not to get any liquid in the cracks at the edge of the screen because it could get behind the display and possibly cause damage to circuitry (especially over time).
Incorrect
Spray on a lint-free cloth first, and then wipe the display gently. A lot of companies sell products that are half isopropyl alcohol and half water. You could also make this cleaner yourself. Again, remember to put the solution on a lint-free cloth first.
Incorrect Answers: Never spray any cleaner directly on a display. Try not to get any liquid in the cracks at the edge of the screen because it could get behind the display and possibly cause damage to circuitry (especially over time).
Unattempted
Spray on a lint-free cloth first, and then wipe the display gently. A lot of companies sell products that are half isopropyl alcohol and half water. You could also make this cleaner yourself. Again, remember to put the solution on a lint-free cloth first.
Incorrect Answers: Never spray any cleaner directly on a display. Try not to get any liquid in the cracks at the edge of the screen because it could get behind the display and possibly cause damage to circuitry (especially over time).
Question 57 of 60
57. Question
Which of the following could be described as the chronological paper trail of evidence?
Correct
Chain of custody is the chronological paper trail of evidence that may or may not be used in court.
Incorrect Answers: First response describes the steps a person takes when first responding to a computer with prohibited content or illegal activity: it includes identifying what exactly is happening, reporting through proper channels, and preserving data and devices. Setting and meeting expectations deal with customer service; this is something you should do before you start a job for a customer. Data (and device) preservation is a part of first response; a person who first arrives at the scene of a computer incident will be in charge of preserving data and devices in their current state.
Incorrect
Chain of custody is the chronological paper trail of evidence that may or may not be used in court.
Incorrect Answers: First response describes the steps a person takes when first responding to a computer with prohibited content or illegal activity: it includes identifying what exactly is happening, reporting through proper channels, and preserving data and devices. Setting and meeting expectations deal with customer service; this is something you should do before you start a job for a customer. Data (and device) preservation is a part of first response; a person who first arrives at the scene of a computer incident will be in charge of preserving data and devices in their current state.
Unattempted
Chain of custody is the chronological paper trail of evidence that may or may not be used in court.
Incorrect Answers: First response describes the steps a person takes when first responding to a computer with prohibited content or illegal activity: it includes identifying what exactly is happening, reporting through proper channels, and preserving data and devices. Setting and meeting expectations deal with customer service; this is something you should do before you start a job for a customer. Data (and device) preservation is a part of first response; a person who first arrives at the scene of a computer incident will be in charge of preserving data and devices in their current state.
Question 58 of 60
58. Question
In Windows, which of the following commands should be used to verify that a previous system shutdown was completed successfully?
Correct
Chkntfs can check to see whether a previous system shutdown completed successfully. This command must be run in elevated mode to function properly. Generally, you would check this on the system drive (for example, C:). If the drive is okay and the system did complete the shutdown successfully, you’ll get a message such as “C: is not dirty.” Otherwise, you’ll get a message telling of the error.
Incorrect Answers: Chkdsk checks the integrity of the disk. Ipconfig displays the configuration of your network adapters. SFC scans the integrity of all protected system files and can replace them with the correct versions if necessary.
Incorrect
Chkntfs can check to see whether a previous system shutdown completed successfully. This command must be run in elevated mode to function properly. Generally, you would check this on the system drive (for example, C:). If the drive is okay and the system did complete the shutdown successfully, you’ll get a message such as “C: is not dirty.” Otherwise, you’ll get a message telling of the error.
Incorrect Answers: Chkdsk checks the integrity of the disk. Ipconfig displays the configuration of your network adapters. SFC scans the integrity of all protected system files and can replace them with the correct versions if necessary.
Unattempted
Chkntfs can check to see whether a previous system shutdown completed successfully. This command must be run in elevated mode to function properly. Generally, you would check this on the system drive (for example, C:). If the drive is okay and the system did complete the shutdown successfully, you’ll get a message such as “C: is not dirty.” Otherwise, you’ll get a message telling of the error.
Incorrect Answers: Chkdsk checks the integrity of the disk. Ipconfig displays the configuration of your network adapters. SFC scans the integrity of all protected system files and can replace them with the correct versions if necessary.
Question 59 of 60
59. Question
Which of the following connectors is used for musical equipment?
Correct
The Musical Instrument Digital Interface (MIDI) connector is used for musical equipment such as keyboards, synthesizers, and sequencers. MIDI is used to create a clocking signal that all devices can synchronize to.
Incorrect Answers: The other three connectors, HDMI, DVI, and DisplayPort, are all video connectors.
Incorrect
The Musical Instrument Digital Interface (MIDI) connector is used for musical equipment such as keyboards, synthesizers, and sequencers. MIDI is used to create a clocking signal that all devices can synchronize to.
Incorrect Answers: The other three connectors, HDMI, DVI, and DisplayPort, are all video connectors.
Unattempted
The Musical Instrument Digital Interface (MIDI) connector is used for musical equipment such as keyboards, synthesizers, and sequencers. MIDI is used to create a clocking signal that all devices can synchronize to.
Incorrect Answers: The other three connectors, HDMI, DVI, and DisplayPort, are all video connectors.
Question 60 of 60
60. Question
Which of the following devices is the least likely to be replaced on a laptop?
Correct
The CPU is the least likely to be replaced. You would probably need to replace other equipment, too, in this case. Just like PCs, though, the CPU should rarely fail.
Incorrect Answers: However, you might upgrade, replace, or add to RAM. M.2 cards are internal cards that can be added or upgraded to incorporate better video or WLAN and Bluetooth. Laptop keyboards fall victim to spilled coffee, overuse, and other damage over time and sometimes need to be replaced.
Incorrect
The CPU is the least likely to be replaced. You would probably need to replace other equipment, too, in this case. Just like PCs, though, the CPU should rarely fail.
Incorrect Answers: However, you might upgrade, replace, or add to RAM. M.2 cards are internal cards that can be added or upgraded to incorporate better video or WLAN and Bluetooth. Laptop keyboards fall victim to spilled coffee, overuse, and other damage over time and sometimes need to be replaced.
Unattempted
The CPU is the least likely to be replaced. You would probably need to replace other equipment, too, in this case. Just like PCs, though, the CPU should rarely fail.
Incorrect Answers: However, you might upgrade, replace, or add to RAM. M.2 cards are internal cards that can be added or upgraded to incorporate better video or WLAN and Bluetooth. Laptop keyboards fall victim to spilled coffee, overuse, and other damage over time and sometimes need to be replaced.
X
Use Page numbers below to navigate to other practice tests