logo image

A+-701

To access your company’s internal network from home, you use Telnet. The administrator has recently implemented a firewall at the network perimeter and disabled as many ports as possible.

Which port needs to remain open so you can still work from home?

23
You are responsible for disposing of several old Pentium III 700 MHz workstations formerly used by accountants in your organization’s Finance department. Before being shipped to a computer recycler, you decided to make sure any old data on the hard drives is erased. To do this, you use the Windows 2000 Installation CD that came with the systems to delete all partitions from the hard drives.

Have you properly prepared these systems for disposal?

No, you should use disk wiping software to fully erase the drives.
You have a set of DVD-RW discs that have been used to archive files for your latest development project. You need to dispose of the discs.

Which of the following methods should you use to best prevent extracting data from the discs?

Shredding
Which of the following security measures encrypts the entire contents of a hard drive?

A. DriveLock
B. BIOS password
C. Chassis intrusion detection
D. Trusted Platform Module (TPM)
E. Hard disk password

A. DriveLock
What is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it is found?

A. Java applet
B. Trojan horse
C. Windows Messenger
D. Virus

D. Virus
A VPN is used primarily for what purpose?

A. Allow remote systems to save on long distance charges
B. Allow the use of network-attached printers
C. Support secured communications over an untrusted network
D. Support the distribution of public Web documents

C. support secured communications over an untrusted network
What is a program that appears to be a legitimate application, utility, game, or screensaver and that performs malicious activities surreptitiously?

A. ActiveX control
B. Trojan horse
C. Worm
D. Outlook Express

D. Trojan Horse
Which of the following is a firewall function?

A. FTP hosting
B. Packet rearranging
C. Packet filtering
D. Protocol converting
E. Encrypting

C. Packet Filtering
You need to enable a screen saver password on the Windows XP workstations in your organization. Which Control Panel applet should you use to do this?

A. Screen Saver
B. Display
C. System
D. Power Options
E. Accessibility
F. Security Center

B. Display
While browsing the Internet, you notice that the browser displays pop-ups that are targeted toward recent keyword searches you have performed.

What is this an example of?

A. Grayware
B. Adware
C. Trojan horse
D. Worm

B. Adware
Which of the following is a common form of social engineering attack?

A. Distributing false information about your organization’s financial status.
B. Hoax virus information e-mails.
C. Stealing the key card of an employee and using that to enter a secured building.
D. Using a sniffer to capture network traffic.

B. Hoax virus information emails
Which TCP/IP protocol is a secure form of HTTP that uses SSL as a sublayer for security?

A. SSH
B. HTTPS
C. SMTP
D. DNS

B. HTTPS
Which of the following security solutions would prevent a user from reading a file which she did not create?

A. BitLocker
B. VPN
C. EFS
D. IPSec

C. EFS
Which of the following protocols establish a secure connection and encrypt data for a VPN? (Select three.)

A. IPSec
B. RDP
C. PPTP
D. FTP
E. L2TP

IPSEC, PPTP and L2TP
Which of the following provides security for wireless networks?

A. 802.11a
B. WPA
C. 802.3u
D. CSMA/CD
E. WAP

B. WPA
You are configuring the local security policy of a Windows XP system. You want to require users to create password that are at least 10 characters long. You also want to prevent logon after three unsuccessful logon attempts.

Which policies should you configure? (Select two.)

A. Minimum password length
B. Maximum password age
C. Account lockout threshold
D. Enforce password history
E. Account lockout duration
F. Password complexity

A. Minimum password Length

C. Account Lockout Threshold

You are configuring a firewall to allow access to a server hosted on the demilitarized zone of your network. You open TCP/IP ports 80, 25, 110 and 143. Assuming that no other ports on the firewall need to be configured to provide access, what applications are most likely to be hosted on the server?

A. E-mail server, Newsgroup server, DNS server
B. Web server, DNS server, DHCP server
C. Web server, E-mail server
D. Web server, DNS server, e-mail server

C. Web server, E-mail server
What is the main difference between a worm and a virus?

A. A worm tries to gather information while a virus tries to destroy data.
B. A worm is restricted to one system while a virus can spread from system to system.
C. A worm requires an execution mechanism to start, while a virus can start itself.
D. A worm can replicate itself and does not need a host for distribution.

D. A worm can replicate itself and does not need a host for distribution.
What do biometrics use to perform authentication of identity?

A. Human characteristics
B. Ability to perform tasks
C. Knowledge of passwords
D. Possession of a device

A. Human characteristics
Which of the following password policy will force users to change the password after the specified time interval ?

A. maximum password age
B. enforce password history
C. password complexity
D. minimum password age

A. maximum password age
What is the best countermeasure against social engineering?

A. User awareness training
B. Access auditing
C. Strong passwords
D. Acceptable use policy

A. User awareness training
Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients?

A. WEP
B. WEP, WPA Personal, and WPA2 Personal
C. WPA Enterprise and WPA2 Enterprise
D. WPA Personal and WPA2 Personal
E. WEP, WPA Personal, WPA Enterprise, WPA2 Personal, and WPA2 Enterprise

B. WEP, WPA Personal, and WPA2 Personal
To increase security on your company’s internal network, the administrator has disabled as many ports as possible. Now, however, though you can browse the Internet, you are unable to perform some secure credit card transactions.

Which port needs to be enabled to allow secure transactions?

A. 23
B. 69
C. 80
D. 443
E. 21

D. 443
What is the most common means of virus distribution?

A. Commercial software CDs
B. E-mail
C. Downloading music files from the Internet
D. Floppy disks

B. E-mail
Which of the following actions taken on Windows XP directly improves system security? (Select two.)

A. Install anti-virus software.
B. Configure 802.11g networking.
C. Use Task Schedule to take regular backups.
D. Enable the Windows firewall.
E. Configure Windows Reporting.

A. Install anti-virus software.
D. Enable the Windows firewall
Which of the following is a form of attack that tricks victims into providing confidential information, such as identity information or logon creditials, through e-mails or Web sites that impersonate an online entity that the victim trusts, such as a financial institution or well known e-commerce site?

A. Fraggle attack
B. Social engineering
C. Phishing
D. Session hijacking

C. Phishing
Which of the following is a hardware device that contains identification information and which can be used to control building access or computer logon?

A. WAP
B. Biometric
C. SSID
D. Security Policy
E. Smart card

E. Smart card
Which of the following are biometric devices? (Select two.)

A. Retina scanner
B. Smart card reader
C. Digitizer
D. Face scanner

A. Retina scanner
D. Face scanner
You are configuring the local security policy of a Windows XP system. You want to prevent users from reusing old passwords. You also want to force them to use a new password for at least 5 days before changing it again.

Which policies should you configure? (Select two.)

A. Minimum password age
B. Password complexity
C. Enforce password history
D. Maximum password age

A. Minimum password age
C. Enforce password history
In which of the following situations should you install a firewall?

A. You want to implement a password system for Internet users who access your private website.
B. You want to improve Internet performance by saving popular web sites locally.
C. You want to restrict Internet users from accessing private data on your network.
D. You want Internet users to see a single IP address when accessing your company network.

C. You want to restrict Internet users from accessing private data on your network.
Which type of malicious activity can be described as numerous unwanted and unsolicited e-mail messages sent to a wide range of victims?

A. Spamming
B. Hijacking
C. Brute force
D. Trojan horse

A. Spamming
You want to enable Hibernation on your Windows computer. What does it need to have?

A. A Pentium II or better processor
B. UPS
C. Enough free hard drive space
D. A minimum of 128 MB of RAM

C. Enough free hard drive space
On the main network printer, another user’s print job has stalled. You try to delete the print job, but can’t.

What is the reason why you can’t delete the print job?

A. You do not have the Manage printers permission
B. You do not have the Print permission.
C. You do not have the Manage network printers permission
D. You do not have the Manage documents permission

D. You do not have the Manage documents permission
Your manager has been using the same laptop computer without error for four years. Suddenly, the computer will not start and run correctly. What should you do to isolate the problem?

A. Remove the hard drive and attempt to boot and run from a floppy disk
B. Remove the batteries and attempt to run the computer from a wall outlet
C. Remove the FDD and attempt to boot without it
D. Disconnect the keyboard and attempt to boot without it

B. Remove the batteries and attempt to run the computer from a wall outlet
You have a workstation running Windows Vista, 64-bit edition. A local printer connected to a USB port is shared so that other users can print to that printer.

Users running the 32-bit versions of Windows XP or Vista report that their print jobs aren’t printing correctly. Anyone using the 64-bit version of Windows Vista does not have any problems.

What should you do?

A. On each computer that is having a problem, manually update the printer with the correct driver.
B. Configure one computer running a 32-bit operating system with the correct driver. Share the network printer and have all 32-bit computers connect to that computer.
C. On your computer, add the x86 drivers.
D. Move the printer to a computer running a 32-bit operating system and share the printer.

C. On your computer, add the x86 drivers.
A user is trying to log into Windows XP on her notebook computer. She enters the correct password for her user account, but the system won’t let her authenticate, claiming the wrong password has been entered.

What’s causing the problem?

A. The Scroll Lock key has been pressed, locking all input from the keyboard.
B. She has entered the wrong password too many times, causing Intruder Detection in Windows to lock the system.
C. The CPU is in a power-save mode causing all login attempts to be denied.
D. The keyboard must be replaced.
E. She has turned Num Lock on causing numbers to be set from the keyboard instead of letters.

E. She has turned Num Lock on causing numbers to be set from the keyboard instead of letters.
A user receives printouts consisting of several pages of seemingly random characters every time he prints to a network printer. The printer seems to work fine for all other users. What is the most likely cause of the problem?

A. The user’s network settings are incorrect
B. The printer is shared with insufficient network privileges
C. The network cable to the printer is defective
D. The user is using an incorrect printer driver

D. The user is using an incorrect printer driver
Your laptop carrying case is designed for a 15-inch laptop, yet you think you can squeeze your 16-inch laptop into it. Before slipping the laptop into the case, what should you do?

A. Shut down the system instead of using sleep or hibernate
B. Eject any CD or DVD discs
C. Remove and PCMCIA cards from their slots
D. Turn off the wireless antenna

C. Remove and PCMCIA cards from their slots
You’re troubleshooting a malfunctioning notebook computer. Nothing appears on the LCD display when the system is powered on. When you connect an external monitor to the system, the Windows XP desktop is displayed properly on the monitor.

What could be causing this problem? (Choose two.)

A. The built-in video card is malfunctioning.
B. The BIOS needs to be updated.
C. The display output has been redirected to the external monitor port using the Fn key.
D. The LCD assembly is malfunctioning.
E. A new driver for the video board needs to be installed.

. The display output has been redirected to the external monitor port using the Fn key.
D. The LCD assembly is malfunctioning.
Which of the following should you do if you cannot turn a laptop off?

A. Unplug the AC power and remove the battery
B. Remove the battery
C. Unplug the AC power
D. Disconnect the keyboard

A. Unplug the AC power and remove the battery
You want to make a printer on a Windows XP computer available only between certain hours. Which path would you use to edit this setting?

A. right-click the printer object and select Printing Preferences….
B. right-click the printer object and select Properties. Use the Advanced tab.
C. right click the File and select Server Properties Use the Advanced tab.
D. right-click the printer object and select Properties. Use the General tab.

B. right-click the printer object and select Properties. Use the Advanced tab.
Six months ago, you purchased a new laptop. Since then, you noticed that the battery life has been steadily going down. When it was new, a full charge lasted about 3 hours. Now you are lucky to get 2 hours before the battery charge level drops below 5%.

What should be your first step to correct this problem?

A. Calibrate the battery.
B. Buy a new battery.
C. Replace the power meter chip on the battery.
D. Clean the contacts on the battery.

A. Calibrate the battery.
Which printer management component would you use to view the drivers used by a printer?

A. Print Spooling service
B. Printer properties
C. Print queue
D. Print spooling service

B. Printer properties
You want to configure Power Schemes on your laptop computer. Which of the following is the best way to do this?

A. Click Start-> open Control Panel->Power Option
B. Right click My Computer->Properties->Device Manager
C. In the System Tray, double-click the battery icon. Click the Power Options tab.

A. Click Start-> open Control Panel->Power Option
Which printer permission would you assign a user so that she can pause the printer?

A. Print
B. Pause printers
C. Manage printers
D. Manage documents

C. Manage printers
Which printer management components would you use to view the port used by a printer? (Select two.)

A. Print server properties
B. Printer properties
C. Print queue
D. Print Spooling service

A. Print server properties
B. Printer properties
All members of the Sales team use laptop computers while traveling to connect to the Internet. Each laptop has a built-in wireless network card that supports both 802.11b and 802.11g. You have trained each user to be able to create new wireless connections in order to connect to wireless networks in airports and at hotels.

You get a call from one user stating that her wireless connection no longer works. She has checked the wireless configuration and she knows it to be correct because other sales people at the same location are able to connect.

What should you do first?

A. Have her purchase a USB wireless card to use until you can check the problem yourself.
B. Have her verify that the wireless card’s hardware switch is in the On position.
C. Have her manually configure the wireless card to use only 802.11b.
D. Have her update the drivers for the wireless card.

B. Have her verify that the wireless card’s hardware switch is in the On position
How do you disable printer spooling?

A. start printing after last page is spooled.
B. print directly to the printer.
C. start printing after first page is spooled.

B. print directly to the printer.
You have just purchased a used laptop and you want to configure it to hibernate when you press the power button. You edit the Power Options settings and enable hibernation, then you configure the power button to trigger hibernation.

Everything works fine for several weeks. However, one day when you press the power button, the laptop does not hibernate. What should you do?

A. Enable ACPI support in the BIOS.
B. Charge the battery before pressing the power button.
C. Free up disk space.
D. Configure the laptop to use the Max Battery power scheme.

C. Free up disk space.
You have a 64-bit Windows Vista workstation with three shared computers. You want to add drivers for 32-bit versions of the operating system.

Which method would you choose to add the drivers with the least amount of effort?

A. For each printer, right-click the printer and choose Properties. Edit the settings on the Sharing tab.
B. For each printer, right-click the printer and choose Properties. Edit the settings on the Device Settings tab.
C. In the Printers folder, right-click and choose Server Properties…. Edit settings on the Drivers tab.
D. For each printer, right-click the printer and choose Properties. Edit the settings on the Advanced tab.
E. In the Printers folder, right-click and choose Server Properties…. Edit settings on the Advanced tab.

C. In the Printers folder, right-click and choose Server Properties…. Edit settings on the Drivers tab.
Four employees use a shared network printer. One of the users tried to increase the CPU efficiency by stopping several unneeded processes in the Task Manager. Now the user’s print jobs never arrive at the printer, but the other three users’ print jobs do not have problems.

The single user calls the Help Desk for assistance. After learning of the user’s actions, what should the Help Desk personnel do?

A. Start the Print Spooling service
B. Give the Manage printers permission to each user
C. Check the printing notifications in the print server
D. Update the user’s computer with the correct driver

A. Start the Print Spooling service
A user in sales cannot get his laptop to display through a projector. He sees the screen output on the built-in LCD display, but the video is not being seen on the projector.

What should you do first?

A. Press the Fn key
B. Replace the liquid crystal display
C. Check the backlight setting
D. Replace the video card
E. Add video RAM

A. Press the Fn key
A user has called to complain that she has sent her presentation file to your organization’s color laser printer, but it didn’t print. Given that the printer is a networked printer, what should you do first? (Select two.)

A. Verify that the user has selected the correct paper try in her printer configuration.
B. Verify that you can ping the printer.
C. Verify that the printer has paper in the paper tray.
D. Install a printer maintenance kit in the printer.
E. Run a self-test on the printer.
F. Download and install the latest printer drivers on the user’s workstation.

A. Verify that the user has selected the correct paper try in her printer configuration.

C. Verify that the printer has paper in the paper tray.

Which of the following methods can you use to connect your printer to an Ethernet network? (Select two.)

A. Connect your printer to an external print server device that connects to the network.
B. Add an Ethernet network card to your printer.
C. Plug a network cable into your printers USB port.
D. Plug a network cable into your printer’s serial port.

A. Connect your printer to an external print server device that connects to the network.
B. Add an Ethernet network card to your printer.
The advantage of connecting a printer to a network is:

A. The ability for many users to print to the same printer.
B. A less costly printer.
C. Increased printing speed.
D. Decreased troubleshooting costs.

A. The ability for many users to print to the same printer.
You’re troubleshooting a malfunctioning notebook computer. Nothing appears on the LCD display when the system is powered on. What is the first thing you should do?

A. Plug in an external monitor
B. Calibrate the battery
C. Replace the video card
D. Replace the motherboard

A. Plug in an external monitor
You’re responsible for ordering consumables for your organization’s printers. These printers are heavily utilized by your users who demand the utmost in reliability. Which of the following would be the best option when ordering new toner for these printers?

A. Toner refill kits
B. Toner cartridges recommended by the printer manufacturer.
C. Remanufactured cartridges from a recycler.
D. Discount toner cartridges from a 3rd party manufacturer.

B. Toner cartridges recommended by the printer manufacturer.
You finish typing your 45-page essay on the influence of Stravinsky’s “The Rite of Spring: on the trends of orchestral music in the Twentieth Century”. You click the Print button in your word processor, but then print job is sent to the wrong print device. What is the reason?

A. Your print device is not turned on.
B. The word processor is incompatible with either the print driver or the print device.
C. Your computer is configured with the wrong default printer.
D. The document is too long for your print device’s spooler.

C. Your computer is configured with the wrong default printer.
Why do you enable printer pooling ?

A. If one is offline, the print job will send to the next available one.
B. Simplify administrative tasks.
C. Both are correct.

C. Both are correct.
What is the default printer permission for “everyone” ?

A. print
B. manage the printer
C. manage documents

A. print
You’re troubleshooting a malfunctioning LCD display on a notebook computer system. After confirming that the notebook is reciving AC power, you plug in an external monitor. The external monitor does not display the output from the notebook after pressing the Fn key to toggle the display.

Which of the following could be the cause?

A. Failed video adapter
B. Failed inverter
C. Failed battery
D. Failed backlight

A. Failed video adapter
Which of the following actions will secure your wireless network?

A. Add CSMA/CD
B. Add WAP
C. Add WEP
D. Add 802.11a

C. Add WEP
Which of the following command is to request new IP configuration information from the DHCP server ?

A. ipconfig/all
B. ipconfig/release
C. ipconfig/renew

C. ipconfig/renew
Which of the following is part of TCP/IP suite and is used to retrieve e-mail from a remote server to a lcoal client over a TCP/IP connection.

A. POP3
B. FTP
C. HTTP

A. POP3
FTP uses port ______.

A. 20
B. 21
C. 23

B. 21
You’ve just finished installign a wireless access point for a client. Which action best protects the access point from unauthorized configuration settings?

A. Changing the administrative password
B. Disabling DHCP
C. Implementing MAC address filtering
D. Disabling SSID broadcast

A. Changing the administrative password
You have physically added a wireless access point to your network and installed a wireless networking card in two laptops running Windows XP. Neither laptop can find the network and you have come to the conclusion that you must manually configure the wireless access point (AP).

Which of the following values uniquely identifies the network AP?

A. WEP
B. SSID
C. Channel
D. PS

B. SSID
You are configuring an ADSL connection. Which of the following will be part of the configuration? (Select two.)

A. Analog modem
B. RJ-11 connectors
C. Filters or splitters
D. F-type connectors
E. RG-6 cable

B. RJ-11 connectors
C. Filters or splitters
Which of the following are used to connect a cable modem to the Internet connection? (Select two.)

A. RJ-11 connectors
B. RJ-45 connectors
C. Cat5 UTP cable
D. F-type connectors
E. RG-6 coaxial cable

D. F-type connectors
E. RG-6 coaxial cable
You need to place a wireless access point in your two-story building. While trying to avoid interference, which of the following is the best location for the access point?

A. In the kitchen area
B. In the basement
C. Near the backup generators
D. In the top floor

D. In the top floor
Which of the following are good reasons to enable NAT?

A. To prevent hackers from accessing your network
B. To cache web pages
C. To limit public access to just your DHCP server instead of your whole network
D. To translate between Internet IP addresses and the IP addresses on your private network

D. To translate between Internet IP addresses and the IP addresses on your private network
To connect to a Bluetooth device, your computer will need a Bluetooth adapter, typically connected through a ___port.

A. COM
B. Parallel
C. USB

C. USB
You are talking with a customer support technician on the telephone. The technician reccomends downloading a particular driver from Internet. When you try to connect to the Internet using your modem, you can’t. What is the problem?

A. The ISP access number is incorrect.
B. You need to hang up.
C. You need to disable call waiting.
D. You need to install and configure TCP/IP.

B. You need to hang up.
To access the Internet through the Pubicly Switched Telephone Network (PSTN), what kind of connectivity device must you use?

A. CSU/DSU
B. DTE
C. Switch
D. TDM
E. Modem

E. Modem
Which of the following IP address ranges is reserved for Automatic Private IP Addressing?

A. 192.168.0.0 – 192.168.255.254
B. 169.192.0.0 – 169.192.254.255
C. 169.254.0.1 – 169.254.255.254
D. 192.168.0.1 – 192.168.254.255
E. 192.168.0.1 – 169.168.255.255

C. 169.254.0.1 – 169.254.255.254
POP3 use port ____.

A. 25
B. 143
C. 110
D. 23

C. 110
You need to secure your wireless network. Which security protocols could you implement? (Select two.)

A. WPA
B. WEP
C. EFS
D. BitLocker
E. 802.11n

A. WPA
B. WEP
You have been contacted by a company to recommend a wireless Internet solution. The wireless strategy must support a transmission range of 150 feet and above, use a frequency range of 2.4 GHz, and provide the highest possible transmission speeds.

Which of the following wireless solutions would you recommend?

A. WEP (Wireless over Ethernet Protocol)
B. 802.11g
C. Bluetooth
D. 802.11b
E. 802.11a

B. 802.11g
You recently installed a small office home office wireless router. To avoid security holes and bugs, what should you do to the router?

A. Enable NAT
B. Configure port triggering
C. Configure the DHCP service
D. Update the firmware

D. Update the firmware
A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While she normally works from her office, today she is trying to access the wireless network from a conference room which is across the hall and next to the elevator.

What is the most likely cause of her connectivity problem?

A. MAC filtering is preventing the computer from connecting.
B. The user has not yet rebooted her laptop computer while at her new location.
C. SSID broadcast has been disabled.
D. The client computer is using the wrong channel number.
E. Interference is affecting the wireless signal.

E. Interference is affecting the wireless signal.
To view detailed configuration information including MAC address, you should use_____.

A. ipconfig
B. ipconfig/all
C. ipconfig/release
D. ipconfig/renew

B. ipconfig/all
Which of the following is not one of the ranges of IP address defined in RFC 1918 that are commonly used behind a NAT server?

A. 169.254.0.1 – 169.254.255.254
B. 192.168.0.1 – 192.168.255.254
C. 10.0.0.1 – 10.255.255.254
D. 172.16.0.1 – 172.31.255.254

A. 169.254.0.1 – 169.254.255.254
A healthcare organization provides mobile clinics throughout the world. Which network technology should you select to transfer patient statistical data to a central database via the Internet to ensure network connectivity for any clinic located anywhere in the world, even remote areas?

A. Dial-up
B. DSL
C. Satellite
D. ISDN
E. Cable modem

A. Dial-up
You have a small wireless network that uses multiple access points. The network uses WPA and broadcasts the SSID. WPA2 is not supported by the wireless access points.

You want to connect a laptop computer to the wireless network. Which of the following parameters will you need to configure on the laptop? (Select two.)

A. AES encryption
B. BSSID
C. TKIP encryption
D. Preshared key
E. Channel

C. TKIP encryption
D. Preshared key
You are installing a satellite connection so your home office can connect to the Internet. Which of the following statements is true?

A. The connection between the satellite modem and dish uses a USB cable and connector.
B. The connection to your computer from the satellite modem may be RJ-11 or F-type.
C. You must, at the least, have a single line for data uploads.
D. The satellite dish must be pointed in the correct direction for communicating with the satellite.

D. The satellite dish must be pointed in the correct direction for communicating with the satellite.
You’ve just installed a wireless access point (AP) for your organization’s network. You know that the radio signals used by the AP extend beyond your organization’s building and are concerned that unauthorized users outside may be able to access your internal network.

What can you do to protect the wireless network? (Select two.)

A. Configure the AP to filter out unauthorized MAC addresses.
B. Disable DHCP on the AP.
C. Install a radio signal jammer at the perimeter of your organization’s property.
D. Disable the spread-spectrum radio signal feature on the AP.
E. Implement an AP with a shorter range.
F. Use the AP configuration utility to reduce the radio signal strength.

A. Configure the AP to filter out unauthorized MAC addresses.
B. Disable DHCP on the AP.
You need to add security for your wireless network. You would like to use the most secure method.

Which method should you implement?

A. WPA2
B. Kerberos
C. WPA
D. WEP

A. WPA2
Which of the following locations will contribute the greatest amount of interference for a wireless access point? (Select two.)

A. Near cordless phones
B. In the top floor of a two-story building
C. Near backup generators
D. Near DCHP servers

A. Near cordless phones
C. Near backup generators
Which actions allow you to access the Internet on your laptop via a cellular network? (Select two.)

A. Install a cellular card in a PCMCIA card on the laptop.
B. Connect the cell phone to the PHONE part on the dialup modem in your office, and connect the laptop to the LINE port on the modem.
C. Connect the laptop to the RJ-11 connection in your office.
D. Connect the cell phone to the laptop and configure the phone as a network bridge.

A. Install a cellular card in a PCMCIA card on the laptop.
D. Connect the cell phone to the laptop and configure the phone as a network bridge.
Which of the following recommendations should you follow when placing access points to provide wireless access for users within your company building?

A. Place access points above where most clients are.
B. Place access points in the basement.
C. Place multiple access points in the same area.
D. Place access points near outside walls.

A. Place access points above where most clients are.
Which of the following is used to route electronic mail between mail servers for sending and relaying mail ?

A. POP3
B. SMTP
C. FTP

B. SMTP
What is the least secure place to locate the access point when creating a wireless network?

A. Above the 3rd floor
B. In the center of the building
C. Near a window
D. In common or community work areas

C. Near a window
Which of the following is used to check the path of a “ping” ?

A. tracert
B. traceroute
C. both are correct

C. both are correct
You have purchased a used wireless access point and want to set up a small wireless network at home. The access point only supports WEP.

You want to configure the most secure settings on the acces point. Which of the following would you configure? (Select two.)

A. Preshared key
B. AES
C. Open authentication
D. TKIP

A. Preshared key

C. Open authentication

Which of the following protocols store e-mail on the mail server and gives users a choice to download mail or keep it on the server?

A. POP3
B. SMTP
C. NTP
D. IMAP

D. IMAP
Which of the following is a valid IP address? (Select two.)

A. 10.384.0.3
B. 172.16.1.26
C. 254.7.1.417
D. 256.0.0.1
E. 2.2.2.2
F. 1.254.1.1024
G. 192.168.1.512

B. 172.16.1.26
E. 2.2.2.2
Which of the following terms refers to a network resource sharing model that uses access control lists saved on each computer? (Select two.)

A. Client/server
B. Workgroup
C. Peer-to-peer
D. Directory
E. Local account access
F. Domain

B. Workgroup
C. Peer-to-peer
Which of the following is the best definition for a LAN?

A. The interconnection of components, such as laptops, printers, keyboard, and other wireless devices within a personal range (typically 10 meters).
B. An extension of a private network over a shared or public network such as the Internet.
C. A network in a small geographic area, like in an office.
D. A network whose computers and servers are geographically far apart but still connected.

C. A network in a small geographic area, like in an office.
Which of the following is true when the DHCP setting is disabled in a wireless network?

A. Wireless clients must use the corret encryption key with its packets.
B. Wireless clients must use the correct wireless access point identifier (i.e., SSID) to connect to the network.
C. Wireless clients must use a static IP addres within the corret IP address range to connect to the network.
D. Wireless clients with specific MAC addresses are denied access to the network

C. Wireless clients must use a static IP addres within the corret IP address range to connect to the network.
Which of the following features is supplied by WPA on a wireless network?

A. Centralized access point for clients
B. Filtering of traffic based on packet characteristics
C. Encryption
D. Refusal of client connections based on MAC address
E. Identification of the network

C. Encryption
Which of the following terms describes a group of computers and users with centralized administration and the security settings?

A. Internetwork
B. Workgroup
C. Domain
D. Local area network

C. Domain
You have a small network. All computers are running Windows 7. You have created a HomeGroup for your network.

You have a laptop that you use at work that runs Windows 7 Professional. You connect the laptop to the network.

You are unable to see shared files on other computers. What should you do?

A. Join the laptop to the HomeGroup
B. Reconfigure NTFS permissions on all shared resources.
C. Set the profile for the network connection to Home.
D. Create a HomeGroup on the laptop; add other computers to that HomeGroup.

A. Join the laptop to the HomeGroup
Which of the following IP addresses belong to the Class A network 114.0.0.0? (Select three.) Tip: Assume the network is indicated by the default portion of the IP address.

A. 114.58.12.0
B. 115.77.89.4
C. 114.122.66.12
D. 115.0.0.66
E. 115.88.0.55
F. 114.0.0.15

A. 114.58.12.0
C. 114.122.66.12
F. 114.0.0.15
On a wireless network that is employing WEP, which type of users are allowed to authenticate through the access points?

A. Users with the correct WEP key
B. Users within the 80% strength radius
C. Only users with remote access privileges
D. Users with proper company IDs

A. Users with the correct WEP key
You are troubleshooting network connections in Windows XP and you want to view the list of connectons on the computer. How can you do this? (Select two.)

A. On the Start menu, right-click My Network Places and select Properties.
B. On the desktop, right-click Network Neighborhood and select Properties.
C. On the Start menu, click Control Panel, then click Network Connections.

A. On the Start menu, right-click My Network Places and select Properties.

C. On the Start menu, click Control Panel, then click Network Connections.

Which of the following TCP/IP protocols do e-mail clients use to download messages from a remote mail server?

A. POP3
B. SMTP
C. FTP
D. SNMP

A. POP3
Which protocol is used on the World Wide Web to transmit Web pages to Web browsers?

A. SMTP
B. HTTP
C. HTML
D. NNTP

B. HTTP
What is a workgroup also known as?

A. Windows network
B. Peer-to-peer
C. Client group
D. Server-based network

B. Peer-to-peer
Which of the following statements about the Dynamic Host Configuration Protocol (DHCP) are true? (Select two.)

A. It is used only to deliver IP addresses to hosts.
B. It cannot be configured to assign the same IP address to the same host each time it boots.
C. A DHCP server assigns addresses to requesting hosts.
D. It can deliver other configuration information in addition to IP addresses.

C. A DHCP server assigns addresses to requesting hosts.
D. It can deliver other configuration information in addition to IP addresses
Which of the following is used on a wireless network to identify the network name?

A. SSID
B. MAC address
C. IP address
D. Subnet mask

A. SSID
What is the default subnet mask for the IP address 203.111.3.3?

A. 255.255.0.0
B. 255.255.255.255
C. 255.255.255.0
D. 255.0.0.0

C. 255.255.255.0
Which TCP/IP protocol is a data format that is used to create hypertext documents that can be viewed from multiple platforms?

A. HTTP
B. SSL
C. SMTP
D. HTML

D. HTML
Which of the following are not valid IP addresses? (Select three.)

A. 116.0.0.116
B. 1.55.254.3
C. 122.0.0.0
D. 257.0.122.55
E. 145.8.260.7
F. 132.64.32.8
G. 45.22.156.256

D. 257.0.122.55
E. 145.8.260.7
G. 45.22.156.256
Gustav wants to use his Windows XP-based computer to browse the World Wide Web. He will use a modem connection. Which network protocol must be installed?

A. NWLink
B. SLIP
C. TCP/IP
D. NetBEUI
E. IPX/SPX

C. TCP/IP
You are troubleshooting network connectivity issues on a Windows XP workstation. Which command would you use to see if a network device is up and connected?

A. ipconfig /all
B. ping
C. nslookup
D. ipconfig

B. ping
Which tool in Windows XP would you use to browse all networks and shared folders to which a user has access?

A. Windows Explorer
B. My Computer
C. Network Neighborhood
D. My Network Places

D. My Network Places
You have a Windows 7 computer connected to a small network that is not part of a domain. You want to see the computers and printers on the network.

Which feature would you use?

A. HomeGroup
B. My Network Places
C. Devices and Printers
D. Device Manager

A. HomeGroup
Which of the following features on a wireless network allows or rejects client connections based on the hardware address?

A. SSID
B. WEP
C. WPA
D. DHCP
E. MAC address filtering

E. MAC address filtering
You want to allow your users to download files from a server running the TCP/IP protocol. You want to require user authentication to gain access to specific directories on the server. Which TCP/IP protocol should you implement to provide this capability?

A. TFTP
B. HTML
C. HTTP
D. FTP
E. IP
F. TCP

D. FTP
Which of the following IP addresses are Class C addresses? (Select three.)

A. 192.15.5.55
B. 222.55.0.0
C. 240.0.0.0
D. 189.189.5.2
E. 125.166.11.0
F. 223.16.5.0

A. 192.15.5.55
B. 222.55.0.0
F. 223.16.5.0
You want to implement name resolution on UNIX computers in your company. Which of the following will you use?

A. LMHOSTS file
B. NTP
C. SMTP
D. WINS
E. DNS

E. DNS
Which type of configuration would you use if you wanted to deploy 802.11g technology to communicate directly between two computers?

A. Ad hoc
B. WEP
C. Infrastructure
D. WAP

A. Ad hoc
Which of the following are advantages of using a domain to manage a network? (Select two.)

A. Scalable
B. High-speed network links
C. Little or no configuration
D. Centralized administration

A. Scalable
D. Centralized administration
Which of the following IP addresses have a default subnet mask of 255.255.0.0? (Select three.)

A. 1.6.45.254
B. 228.62.18.6
C. 123.254.19.6
D. 168.16.5.1
E. 129.0.0.1
F. 191.168.2.15

D. 168.16.5.1
E. 129.0.0.1
F. 191.168.2.15
Which TCP/IP configuration paramater identifies the router that is used to reach hosts on remote networks?

A. WINS server address
B. Subnet mask
C. Host name
D. IP address
E. DNS server address
F. Default gateway

F. Default gateway
Which of the following are security protocols for wireless networks? (Select two.)

A. WEP
B. 802.11n
C. VPN
D. Bitlocker
E. WPA

A. WEP
E. WPA
Which of the following best describes an IP address class?

A. The class refers to the range of IP addresses that a DHCP server has been authorized to assign.
B. The class is the version of IP addressing standard used by the address.
C. The class defines the default network address portion of the IP address
D. The class defines the type of device that the address is assigned to (i.e server, printer, workstation).

C. The class defines the default network address portion of the IP address
Which of the following types of software protection will help mitigate any threats coming from worm and Trojans?
A. Spam Blocker
B. Antivirus
C. Anti Spyware
D. Anti Adware
B. Antivirus
An end user is having problems printing from an application. The technician attempts to send a
test page to printer. Which of the following BEST explains the reason the technician used a test
page to trouble shoot the issue?
A. It clears the print queue and resets the printer memory.
B. It allows the technician to see the quality of the printer output.
C. The output of the test page allows the technician to initiate diagnostic routines on the printer.
D. It verifies connectivity and eliminates possible application problems.
D. It verifies connectivity and eliminates possible application problems.
Which of the following protocols is used to retrieve email?
A. SFTP
B. FTP
C. SMTP
D. POP3
D. POP3
On Windows 7, which of the following paths allows a user to configure a fingerprint reader?
A. Start > Settings > Device Manager > Biometric Devices
B. Start > Computer > Devices > Biometric Devices
C. Start > Settings > Control Panel > Biometric Devices
D. Start > Programs > System Settings > Biometric Devices
C. Start > Settings > Control Panel > Biometric Devices
A computer in a warehouse experiences hardware faults and often requires replacement of power
supplies, CPUs and CD ROM drives. Which of the following tools will help prevent the hardware
faults?
A. Anti-static wrist straps
B. Compressed air
C. Anti-static wipes
D. Operating system rescue disk
B. Compressed air
Which of the following is the MOST effective means for a technician to prevent ESD damage when
installing RAM?
A. Touching grounded metal before contacting components
B. Ensuring the AC plug has a ground post
C. Wearing a grounded wristband
D. Wearing rubber-soled shoes
C. Wearing a grounded wristband
Which of the following processor types is manufactured by AMD?
A. Celeron
B. Athlon
C. Pentium
D. Core 2 Quad
B. Athlon
A laptop with an external USB hard drive and an external monitor is not booting from the internal
hardware drive. Power has been verified and the battery is fully charged. But the laptop appears to
be stopping after POST. Which of the following will help troubleshoot the cause of problem?
A. Format the external USB hare drive.
B. Turn off the external monitor
C. Disconnect the external monitor
D. Remove and reset the laptop battery
C. Disconnect the external monitor
A technician has completed upgrading a computer from Windows Vista to Windows 7. According
to the system and video drivers need to be upgraded. Which of the following is BEST source for theses drivers?
A. The Microsoft Windows 7 website
B. The manufacturer’s website
C. The windows Hardware Compatibility List
D. The drivers that came in the original Windows Vista Installation CD
C. The windows Hardware Compatibility List
A user made a change to their windows XP system that caused problems. The technician wants to
restore the system on previous state. The technician cannot find the previous restore point. Which
of the following is problem?
A. The technician is not in administrator mode.
B. System restore is turned off.
C. System 32 folder has been removed.
D. System restore is not supported on the OS version.
B. System restore is turned off.
Which of the following is LAST step of troubleshooting theory?
A. Establish a plan of action to restore the problem and implement the solution.
B. Verify full system functionality and if applicable implement preventative measures.
C. Document findings, actions, and outcomes.
D. Question the user and identify user charges.
C. Document findings, actions, and outcomes.
A technician is installing a program on a Windows Vista computer and the installation fails. Which
of the following is NEXT step?
A. Reinstall Windows XP on the computer.
B. Contact the program’s manufacturer.
C. Run the installer as an administrator.
D. Upgrade to Windows 7
C. Run the installer as an administrator.
Which of the following is the MAXIMUM number of devices connected per IEEE 1394 controller?
A. 4
B. 63
C. 64
D. 128
B. 63
Which of the following printer types requires the use of toner?
A. Impact
B. Inkjet
C. Laser
D. Thermal
C. Laser
Which of the following will BEST conserve resources and prolong equipment life?
A. Firmware updates
B. Power Management
C. Disk Defragmenter
D. Clean with a lint-free cloth
B. Power Management
Which of the following describes keeping the desk area free of trip hazards such as loose cables?
A. Network interface
B. Client Configuration
C. Cable management
D. Personal Area Network (PAN)
C. Cable management
Which of the following Network cables would a technician find on RJ-45 connector?
A. UTP
B. Coaxial
C. USB
D. Fiber
A. UTP
Which of the following ports does an impact printer use?
A. Wi – Fi
B. PS/2
C. USB
D. LPT
D. LPT
Which of the following functions can be performed by using the msconfig command?
A. Update the product key information for the Microsoft OS.
B. Prevent specific programs from beginning at the system startup.
C. Find specific information about the system hardware configuration.
D. Configure the boot order of the system hardware devices.
B. Prevent specific programs from beginning at the system startup.
Which of the following would a technician use to install a manufacturer’s image on a notebook?
(Select two)
A. Recovery CD
B. System Restore Utility
C. Access a recent data backup
D. Utilize a Recovery Agent feature
E. Factory recover partition
A. Recovery CD
B. System Restore Utility
Which of the following differentiates between passive and active cooling?
A. Active cooling allows heat to be transferred to a heat sink and distributed in a radiant fashion.
B. Passive cooling allows heat to be radiated away from the CPU by dispersion.
C. Active cooling does not require a thermal compound to sit between the CPU and the heat sink.
D. Passive cooling occurs when cool air or a liquid medium is passed across a surface of the
CPU.
B. Passive cooling allows heat to be radiated away from the CPU by dispersion.
A user states that their laptop is not working. A technician determines the laptop is booting. But
there is no image on the LCD Next, the technician plugs an external monitor into the laptop and it
functions correctly. Which of the following should the technician do NEXT in troubleshooting this
issue?
A. Reload the LCD drivers.
B. Check the alternate display switch.
C. Replace the LCD.
D. Check the back light is functioning correctly.
B. Check the alternate display switch.
Which of the following security measures ensures an unauthorized user cannot boot to the OS without physical case?
A. Kerberos authentication
B. BitLocker encryption
C. BIOS password
D. Disabling USB ports
C. BIOS password
In Windows Vista, in order to create a spanned volume, the additional disk(s) MUST.
A. Have unallocated space
B. Be compressed
C. Be encrypted
D. Contain the operating system
A. Have unallocated space
Which of the following interfaces would a technician use the launch IPCONFIG from?
A. MMC
B. Control Panel
C. Command Prompt
D. Task Manager
C. Command Prompt
A user reports that they are unable to connect to any wireless network. The laptop technician
verifies that the latest wireless drivers have been installed. Which of the following trouble shooting
steps should also be taken to kept resolve this issue?
A. Remove unneeded peripherals
B. Check the switch for built – WIFI antenna
C. Replace network cable
D. Ensure NIC disabled
B. Check the switch for built – WIFI antenna
Which of the following commands will allow a technician to test a network card?
A. tracert comptia.org
B. ping 127.0.0.1
C. msconfig
D. ip config
B. ping 127.0.0.1
A travelling user needs to use a printer in the business room in their hotel. They have a laptop with
Windows 7. The printer has USB and Ethernet ports. The user connects the laptop to the USB
post, and after the laptop installs the device the user cannot print. How can the user verify the
connection?
A. Restart the print spooler service
B. Ping the printer
C. Try to print from another computer in the business room
D. Check the online status of the printer.
D. Check the online status of the printer.
Which of the following is feature of a Docking Station?
A. Provides additional connectivity
B. Expands the laptop memory
C. Provides a built in tape device
D. Provides power surge protection
A. Provides additional connectivity
Which of the following is commonly used to create a LAN in home network? (Select two)
A. Switch
B. Satellite
C. DSL
D. Dial-up
E. Ethernet
A. Switch
E. Ethernet
Which of the following should be checked prior to an operating system being installed?
A. HDD
B. USB
C. RAM
D. HCL
D. HCL
Which of the following is a power supply that has one single plug and socket?
A. Heat sink
B. AT
C. ATX
D. UPS
C. ATX
Which of the following interfaces can support the MOST devices per port?
A. USB 1.1
B. Bluetooth
C. IEEE 1394
D. RS-232
A. USB 1.1
Which of the following is an example of a serial port?
A. LPT1
B. PRN
C. COM1
D. VGA
C. COM1
Which of the following ports does Windows firewall open by default for Remote Desktop to work?
A. 25
B. 80
C. 3389
D. 8080
C. 3389
Which of the following are advantages of NTFS over FAT32? (Select TWO)
A. Read-only capabilities
B. Hidden files
C. Encryption
D. Full control capabilities
E. Increased security
C. Encryption
E. Increased security
Which of the following steps BEST describes how to replace a defective sound card in a desktop
PC?
A. Put on anti-static strap, replace power supply, uninstall drivers, remove cover and cables
including power cord, and put in new sound card
B. Uninstall drivers, remove all cables including power cord, remove cover, put on anti-static strap,
remove memory, remove sound card, put in new sound card.
C. Put on anti-static strap, remove cover, remove all cables, remove sound card, put in new sound
card
D. Remove cover, uninstall drivers, remove all cables including power cord, remove sound card,
and put in new sound card.
C. Put on anti-static strap, remove cover, remove all cables, remove sound card, put in new sound
card
When looking for 32-bit applications installed on a 64-bit version of Windows Vista, a technician
should look in which of the following default locations?
A. C WindowsSystem32
B. C:ProgramFiles
C. C:Users
D. C:Program Files (x86)
D. C:Program Files (x86)
Which of the following is the MOST secure communication method for a wireless network?
A. MAC filtering
B. WPA
C. WPA2
D. WEP
C. WPA2
A technician installs a new video card in a desktop with onboard video. The technician boots the unit but sees no display. The monitor power light is on and the OS seems to be loading. Which of the following is the MOST likely cause?
A. The display is defective.
B. The video card needs to be flashed.
C. The internal adapter has not been disabled.
D. The new video card is defective.
C. The internal adapter has not been disabled.
Which of the following features are available in Windows 7 Professional beyond those available in
Windows 7 Home Premium?
A. Home Group
B. Windows XP Mode
C. Aero Desktop
D. Internet Explorer 8
B. Windows XP Mode
Antistatic devices should be used when:
A. Replacing hardware.
B. Lifting heavy equipment.
C. Updating software.
D. Cooling equipment.
A. Replacing hardware.
Which of the following describes a secure connection over the Internet between two sites?
A. FTP
B. VLAN
C. VPN
D. HTTP
C. VPN
On a Windows XP machine, which of the following settings should be configured to allow dragging of files without holding the mouse button?
A. Scroll Lock
B. Sticky Keys
C. MouseKeys
D. Click Lock
D. Click Lock
A laser printer has an error ‘tray two paper jam’ but tray two does not have any paper in it. Which
of the following should the technician do FIRST?
A. Replace the tray two paper sensor and run the printer self test.
B. Remove the tray two paper sensor and clean the printhead
C. Check the tray two paper sensors for blockage and run the printer self test.
D. Check the tray two paper rollers for blockage clean the printhead, and run the printer self test.
C. Check the tray two paper sensors for blockage and run the printer self test.
A technician troubleshooting an issue has implemented a solution. Which of the following is the NEXT troubleshooting step the technician should take?
A. Test the theory and validate the plan.
B. Ask the customer to describe the symptoms and identify any changes made to the computer.
C. Document findings, actions and outcomes.
D. Verify and implement preventative measures.
D. Verify and implement preventative measures.
Which of the following is the LAST step of the troubleshooting theory?
A. Establish a plan of action to resolve the problem and implement the solution.
B. Verify full system functionality and if applicable implement preventative measures.
C. Document findings, actions, and outcomes.
D. Question the user and identify user changes
C. Document findings, actions, and outcomes.
Which of the following is a networking technology used to create a Personal Area Network (PAN)?
A. Dial-up
B. Broadband
C. Bluetooth
D. Satellite
C. Bluetooth
A user can no longer launch their word processing program. The program worked fine yesterday. Which of the following options could BEST be used to fix the word processing program?
A. Safe Mode
B. Automated System Recovery
C. Last Known Good Configuration
D. System Restore
D. System Restore
Which of the following printers uses toner to transfer an image onto paper?
A. Inkjet
B. Laser
C. Impact
D. Thermal
B. Laser
Which of the following cables can be used to directly connect a laptop to a PC for ICS?
A. IEEE 1394 cable
B. CAT5 crossover cable
C. CAT5e patch cable
D. Parallel cable
B. CAT5 crossover cable
A user reports a problem with a PC located in the same room as cement testing equipment. The
room has adequate cooling. The PC will boot up but locks up after 5 to 10 minutes of use. After a
lockup, it will not reboot immediately. Which of the following is the MOST likely problem?
A. The PC air intakes are clogged with cement dust.
B. The PC has a virus.
C. The power supply is underrated for the electrical load of the PC.
D. The CPU heat sink underrated for the CPU.
A. The PC air intakes are clogged with cement dust.
Which of the following is commonly used to restrict access to a network, based on the physical hardware address of the client’s network device?
A. DHCP settings
B. MAC filtering
C. SSID broadcast
D. WEP key
B. MAC filtering
Which of the following should be done FIRST when identifying and troubleshooting a problem?
A. Question the user and identify any user changes to the computer.
B. Establish a theory of probable cause.
C. Establish a plan of action to resolve the problem and implement the solution.
D. Test the theory to determine cause.
A. Question the user and identify any user changes to the computer
Which of the following protocols is used to connect to a secure Internet website?
A. POP3
B. FTP
C. HTTPS
D. HTTP
C. HTTPS
A military member has just returned to the United States from Europe and reports their personal
desktop computer does not work. Which of the following i s the MOST logical solution to this
problem?
A. The computer is unable to work in the US because of EU licensing arrangements
B. The power supply needs to be replaced with one rated for 110 watts
C. The power supply needs a power inverter to handle the change in cycles
D. The power supply voltage needs to be switched to 110 from 220
D. The power supply voltage needs to be switched to 110 from 220
A user states that a new graphical intensive application they are using will not load because it
requires Direct3D to be enabled. Which of the following utilities would be used to enable this?
A. services.msc
B. appwiz.cpl
C. dxdiag.exe
D. msconfig.exe
C. dxdiag.exe
Which of the following board types can transmit data up to 8GB/s?
A. AGP
B. CNR
C. PCI
D. PCIe
D. PCIe
The Complete PC Backup feature is available in which of the following versions of Windows?
(Select TWO)
A. Windows Vista Ultimate
B. Windows Vista Business
C. Windows XP Professional SP2
D. Windows 2000 Professional
E. Windows Vista Home Basic
F. Windows Vista Home Premium
G. Windows XP Home
A. Windows Vista Ultimate
B. Windows Vista Business
Which of the following cable types is not affected by electromagnetic interference but requires
specialized tools and techniques to install?
A. CAT5e
B. Plenum coated STP
C. CAT6
D. Fiber optic
D. Fiber optic
Which of the following DSL types has the same upstream and downstream bandwidth?
A. IDSL
B. FIOS
C. ADSL
D. SDSL
D. SDSL
Which of the following types of printers uses a fuser to print a document?
A. Thermal
B. Laser
C. Inkjet
D. Dot Matrix
B. Laser
A technician receives a request to build a machine and install a 64-bit operating system. Which of the following processors would the technician use in this system?
A. Pentium 4
B. Athlon XP
C. Celeron
D. Itanium 2
D. Itanium 2
Which of the following is the key combination to resolve an inverted display?
A. Windows Key + ALT + U
B. CTR + ALT + Down arrow
C. SHIFT+ HOME + PG UP
D. CTR + TAB + Enter
B. CTR + ALT + Down arrow
Which of the following network types allows for high speed data communication and is the MOST difficult to splice into?
A. Cable
B. DSL
C. Satellite
D. Fiber
D. Fiber
Which of the following provides the BEST transfer speed for a HDD?
A. SATA
B. IEEE 1394
C. EIDE
D. IDE
A. SATA
A technician turns on the computer and a blue screen appears on the monitor with an error code. Which of the following is the BEST place for the technician to find out what this error code means?
A. Hardware manufacturer’s website
B. Third party websites
C. OS manufacturer’s website
D. Installation manuals
C. OS manufacturer’s website
Which of the following is commonly used to create a LAN in a home network? (Select TWO)
A. Switch
B. Satellite
C. DSL
D. Dial-up
E. Ethernet
A. Switch
E. Ethernet
A technician has had several support requests for one PC. The technician has reseated the PCI
cards and replaced the hard drive in the PC located in a school cafeteria kitchen. PCs located in the business office or the classrooms have not had this issue. Which of the following is MOST likely causing this PC s issue?
A. Faulty RAM
B. 240 volt Kitchen outlets
C. Power Brownouts
D. Excessive Heat
D. Excessive Heat
A technician inserts a Windows OS install disk into the CD-ROM to upgrade the OS on a computer but after several restarts, the computer does not boot from the disk. Which of the following MOST likely needs to be configured?
A. BIOS settings
B. Network Configuration
C. Repair Options
D. Wake On LAN settings
A. BIOS settings
A laptop with an external USB hard drive and an external monitor is not booting from the internal
hard drive. Power has been verified and the battery is fully charged „ but the laptop appears to be stopping after POST. Which of the following will help troubleshoot the cause of this problem?
A. Format the external USB hard drive.
B. Turn off the external monitor
C. Disconnect the external devices.
D. Remove and reseat the laptop battery
C. Disconnect the external devices.
Which of the following Internet connections has the HIGHEST latency?
A. Cable
B. Satellite
C. DSL
D. Dial-up
B. Satellite
A customer reports the optical drive is no longer responding. Which of the following questions
should be asked FIRST?
A. “Did you log in with an administrator account?”
B. “Have you been to any inappropriate websites?”
C. “What have you changed since the optical drive worked properly?”
D. “What has changed since the optical drive worked properly?”
D. “What has changed since the optical drive worked properly?”
A technician installs a new graphics card in a computer and upon booting up nothing happens.
The technician puts the old graphics card back into the computer and the computer boots up
normally. Which of the following would be the BEST source of information to solve the problem?
(Select TWO).
A. Chat room discussion online
B. Installation manual
C. Ask another technician
D. Manufacturer’s website
E. OS forum online
B. Installation manual
D. Manufacturer’s website
Which of the following is the MINIMUM memory requirement for installing Windows Vista Home
Basic?
A. 1GB
B. 128MB
C. 256MB
D. 512MB
D. 512MB
Which of the following should be The FIRST step in troubleshooting a problem?
A. Establish a theory of probable cause
B. Establish a plan of action
C. Verify full system functionality
D. Identify the problem
D. Identify the problem
A technician installs an additional hard drive controller. Which of the following processes will
MOST likely prevent errors?
A. 1) Apply System Updates
2) Update the BIOS
3) Install the card
4) Install the driver
5) Upgrade the Card Firmware
A company printer is used to print payroll checks on paper forms with carbon backing. Which of
the following is the BEST type of printer for this scenario?
A. Laser
B. Impact
C. Inkjet
D. Thermal
B. Impact
Which of the following types of security concepts describe securing ports and protocols on a
system?
A. Disk Encryption
B. Data classification
C. Social Engineering
D. Software Firewall
D. Software Firewall
Which of the following connectors uses the main board ATX connector type?
A. Centro nix
B. 20/24 pin
C. BNC
D. Molex
B. 20/24 pin
Which of the following helps protect important confidential information from being publicly
disclosed?
A. Hard drive wiping
B. Social Engineering
C. Classification
D. RAS server
C. Classification
Which of the following devices is used to move frames between a source and destination based
on a MAC address?
A. Repeater
B. Hub
C. Router
D. Switch
D. Switch
Which of the following methods is the correct use of a KVM switch?
A. To connect multiple monitors to one computer.
B. To connect multiple computers to one set user interface.
C. To connect multiple computers to each other.
D. To connect multiple keyboards to one computer.
B. To connect multiple computers to one set user interface.
While accessing the Internet in an external environment (i.e. while traveling), a Windows 7 firewall should be set to which of the following?
A. Block incoming and outgoing connections.
B. Turned off or disabled.
C. Block outgoing connections.
D. Block incoming connections.
D. Block incoming connections.
Which of the following network cable types is MOST often used in environments where physical
security of the data is the top priority?
A. UTP
B. Coaxial
C. Fiber optic
D. STP
C. Fiber optic
The most important customer a technician has is:
A. The customer standing right in front of them.
B. The customer who owes the company the most money.
C. The customer calling on the phone.
D. The customer they have an appointment with in an hour.
A. The customer standing right in front of them.
Of the ports below which of the following is the standard HTTP port?
A. 25
B. 80
C. 110
D. 443
B. 80
Which key combination allows the choice of Task Manager or the computer to be locked in
Windows XP Professional?
A. Shift+ F5
B. Ctrl + Alt+ T
C. Ctrl + Alt + Esc
D. Ctrl + Alt+ Del
D. Ctrl + Alt+ Del
A technician just finished installing a new printer on an end user’s computer. Which of the following will enable the technician to see the test page option for the printer1?
A. Right-click on the printer and select Properties
B. Double click on the printer icon
C. Right-click on the printer and select Set as Default
D. Right-click on the printer and select Open
A. Right-click on the printer and select Properties
Which of the following processors would provide the BEST performance?
A. Pentium 4 with Hyper-Threading
B. Pentium Core 2 Duo
C. Single-Core Athlon64
D. 64-bit Core 2 Quad
D. 64-bit Core 2 Quad
If a technician is getting frustrated during a support call, which of the following could the technician employ to avoid irritating the customer?
A. End the call quickly, even if a solution has not been found.
B. Ask the caller to call back in a while.
C. Put the caller on hold briefly and take a deep breath,
D. Pass the caller to another support representative.
C. Put the caller on hold briefly and take a deep breath
In Windows XP, which of the following locations allows the mouse pointer to snap to the default
button in a window?
A. Start>Settings>ControlPanel>System>Hardware
B. start>Settings>ControlPanel>Display>Appearance
C. Start>Settings>ControlPanel>Mouse>PointerOptions
D. Start>Settings>ControlPanel>Mouse>Pointers
C. Start>Settings>ControlPanel>Mouse>PointerOptions
Which of the following are advantages of using Dynamic Host Configuration Protocol? (Select
TWO).
A. IP addresses can be managed from a central point
B. Computers can automatically get new addressing when moved to a different network segment
C. Media Access Control addresses can be changed automatically
D. The network speed can automatically adjust based on the type of traffic being generated
E. The HOSTS file on the computer can be validated for proper entries
A. IP addresses can be managed from a central point
B. Computers can automatically get new addressing when moved to a different network segment
Which of the following MUST be configured to turn a computer on remotely with a network packet?
A. Sleep timers
B. Hibernate
C. Standby
D. WOL
D. WOL
Which of the following should be completed NEXT, after testing the theory of probable cause?
A. Verify full system functionality
B. Implement preventative measures
C. Establish a plan of action to resolve the problem
D. Implement the solution to the problem
C. Establish a plan of action to resolve the problem
A user states that whenever they try to launch a certain installed application, they hear unusual
whirring/clicking sounds from their machine and the application never loads. Which of the following
components would a technician MOST likely need to replace?
A. Hard Disk Drive
B. Optical Drive
C. Power Supply Unit
D. Case Fan
A. Hard Disk Drive
Which of the following voltages is MOST commonly associated with DIMMS?
A. +3.3V
B. +5V
C. -12V
D. +12V
A. +3.3V
Which of the following wireless standards has the potential for having the MOST bandwidth?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
D. 802.11n
Which of the following adapter types uses a 7-pin cable to transmit video signals?
A. RGB
B. DVI
C. HDMI
D. S-Video
D. S-Video
A user states that their computer is running but they have no image on their monitor. Given this
information, which of the following should a technician do NEXT?
A. Explain the process to the user
B. Test several possible causes
C. Ensure that the monitor is functional
D. Determine the cause of the problem
D. Determine the cause of the problem
Which of the following BEST describes a hub?
A. Determines the best route to transmit data
B. Inspects traffic and accepts or declines transmission
C. Broadcasts data to specific network devices
D. Broadcasts data to all network devices
D. Broadcasts data to all network devices
A user has purchased a laptop that has no means to charge the battery. Which of the following
would the user MOST likely purchase?
A. USB cable
B. AC adapter
C. PCMCIA card
D. Replacement battery
B. AC adapter
The contrast ratio for an LCD monitor is BEST defined as the ratio between:
A. display resolution and brightness
B. power consumption and output intensity
C. power savings of a comparable CRT monitor and the LCD
D. the darkest and lightest displayed output
D. the darkest and lightest displayed output
A user plugs in a new USB barcode reader and the computer recognizes it, but the reader is
unable to work property. Which of the following is the MOST likely reason?
A. Software drivers need to be updated
B. OS software needs to be updated
C. Too many USB devices are plugged in
D. Bad USB cable
A. Software drivers need to be updated
Which of the following describes the random access memory limitations with Vista 64-bit operating system?
A. 2GB
B. 4GB
C. 8GB
D. 128GB
D. 128GB
A frustrated customer has called about their computer that is not functioning correctly. Which of the following is the BEST question to ask the user?
A. “Can you avoid using the PC that crashed?”
B. “What was the last thing that occurred before the PC had problems?”
C. “What were you doing before the PC went down?”
D. “What was the last thing you did before the PC crashed?”
B. “What was the last thing that occurred before the PC had problems?”
A technician is trying to install a previous-generation expansion card into their new laptop.
However, the card refuses to fit into the expansion slot. Which of the following is MOST likely the
reason?
A. The card needs to have the compatibility jumpers set before it can be installed into the system.
B. The card is a PCI Express card and the laptop supports PCMCIA.
C. The expansion slot needs to be enabled in the BIOS first.
D. The card is a PCMCIA card and the laptop supports PCI Express cards.
D. The card is a PCMCIA card and the laptop supports PCI Express cards.
Which of the following utilities would a technician use to determine network utilization?
A. Start Menu
B. My Network Places
C. Administrative Tools
D. Task Manager
D. Task Manager
A technician needs to upgrade the memory in a laptop. Which of the following memory types
would be the correct type?
A. RIMM
B. DDR RAM
C. SDRAM
D. SODIMM
D. SODIMM
An end user reports that they cannot access any of the features of a particular printer. Which of
the following is the MOST likely cause?
A. The document the user is printing is not formatted properly.
B. The user has the wrong cable type connected to the printer.
C. The printer is in a low power mode.
D. The user has the wrong driver installed for the printer
D. The user has the wrong driver installed for the printer
Which of the following ports is the default for HTTP?
A. 21
B. 25
C. 80
D. 110
C. 80
A user reports that print jobs sent to a local printer are printing out as blank pieces of paper. Which
of the following steps should the technician perform FIRST on the printer to determine the cause?
A. Stop and restart the print spooler
B. Reload the printer drivers
C. Print an internal test page
D. Replace the printer cable
C. Print an internal test page
Which of the following describes the number of processors supported in Windows XP Professional 32-bit edition?
A. One
B. 2
C. 3
D. 4
B. 2
Which of the following steps would be performed FIRST to install a fresh copy of Windows 7
Professional on a new hard drive?
A. Format the partition
B. Load any RAID or SATA drivers needed
C. Partition the drive
D. Configure Windows settings
B. Load any RAID or SATA drivers needed
Which of the following connectors is commonly used on a shielded twisted pair cable?
A. BNC
B. RJ-45
C. F
D. HDMI
B. RJ-45
Which of the following display ports sends video output over pure digital signal?
A. VGA and HDMI
B. S-Video and DVI
C. HDMI and DVI
D. VGA and DVI
C. HDMI and DVI
Which of the following devices is the MOST appropriate to limit network broadcasts, segment
logical address ranges, and interconnect different physical media?
A. Router
B. Switch
C. Firewall
D. Hub
A. Router
Which of the following is a feature of a Docking station?
A. Provides additional connectivity options
B. Expands the laptop memory
C. Provides a built in tape drive
D. Provides power surge protection
A. Provides additional connectivity options
Which of the following utilities would be used to configure energy saving measures when a laptop
switches to battery power?
A. MSTSC
B. ACPI
C. GDI
D. MSCONFIG
B. ACPI
Which of the following keys is pressed lo enter the Windows boot options after POST?
A. F1
B. F8
C. F10
D. F12
B. F8
Which of the following would BEST provide cooling to a processor?
A. Case fan
B. Heal sink
C. Liquid cooling system
D. CPU fan
C. Liquid cooling system
Which of the following tools can be used for system maintenance and troubleshooting?
A. Automated System Recovery
B. Disk Probe
C. Last Known Good Configuration
D. Recovery Console
D. Recovery Console
Which of the following motherboard components quality can be measured using DPI?
A. PS/2 port
B. Audio interface
C. Display adapter
D. IEEE 1394 port
C. Display adapter
Which of the following is the PRIMARY difference between a Celeron and a Pentium chip?
A. A Celeron chip has a higher performance index than a similar speed Pentium chip
B. A Celeron chip is more expensive than a similar speed Pentium chip.
C. A Celeron chip has less cache than a similar speed Pentium chip
D. A Celeron chip has built-in extra features such as wireless support
C. A Celeron chip has less cache than a similar speed Pentium chip
The help desk technician receives a call from an irate user who is using profanity and yelling at the
technician. To BEST defuse the situation, the technician should:
A. Hang up and let the caller calm down for a while.
B. Speak louder and use profanity to mimic the users tone.
C. Converse with the user in a soft voice and low tone.
D. Place the caller back in the queue and answer another call
C. Converse with the user in a soft voice and low tone.
Which of the following are correct sequences to install a keyboard layout in Windows 7? (Select two).
A. Start > Control Panel > Region & Languages > Keyboards & Languages
B. Right click > Personalize > ease of access center > make the keyboard easier to use
C. Start > Control Panel > Display
D. Start > Control Panel > Clock Languages & Region>personalization
E. Start > Control Panel > Clock languages & region > Change Keyboards & other input methods
> change Keyboard
A. Start > Control Panel > Region & Languages > Keyboards & Languages
E. Start > Control Panel > Clock languages & region > Change Keyboards & other input methods
> change Keyboard
Which of the following network types uses telephone lines as its ONLY medium for connectivity?
A. DSL
B. Cellular
C. Fiber
D. Satellite
A. DSL
An email i s received from the user’s bank. It is asking for the user to reply with their account
number and access code to verify their identity. Which of the following attack types does this
describe?
A. Phishing
B. Rootkit
C. Hoax
D. Adware
A. Phishing
A customer reports that when their computer is turned on. the screen is blank with some gray text
and a flashing cursor. The customer also says that there are numbers counting upward when the
computer beeps and freezes. Which of the following is the MOST likely cause of this problem?
A. The hard drive has no MBR
B. Computer has faulty memory
C. The operating system is corrupted
D. Network login account expired
B. Computer has faulty memory
A user recently purchased a new wireless 802.11n router and noticed that the wireless signal
strength on the laptop is poor and only connects at 11Mbps even with default settings. The user
moved the laptop next to the WAP and is still experiencing the same issue. Which of the following is MOST likely the cause?
A. The laptop is connecting to the incorrect wireless network
B. The router1 s wireless card drivers are faulty.
C. The cable modem is faulty
D. The wireless antennas on the router need to be replaced.
A. The laptop is connecting to the incorrect wireless network
A user reports that at times the display on their monitor gets shaky and wavy. Which of the
following describes a possible reason that this occurs?
A. The refresh rate of the monitor was set too high causing the video card to become over-utilized.
B. The resolution on the monitor was set too high and caused the display to become unstable.
C. The user was visiting websites that were not approved by the company and were blocked.
D. The user has a portable heater plugged into the same circuit causing electrical interference.
D. The user has a portable heater plugged into the same circuit causing electrical interference
A technician is installing BitLocker in Microsoft Vista, but the operating system gives an error
stating the computer does not support BitLocker. Which of the following is MOST likely the cause?
A. Windows Vista does not support BitLocker
B. TPM is disabled in the BIOS
C. The hard drive does not support BitLocker
D. Insufficient memory to support BitLocker
B. TPM is disabled in the BIOS
Which of the following is an alternate HTTP port that can be used commonly in business
environments?
A. 180
B. 255
C. 443
D. 8080
D. 8080
A user contacts the helpdesk about a problem connecting to the Internet. Which of the following troubleshooting steps should the helpdesk technician perform FIRST?
A. Document the problem and resolution for future reference.
B. Have the user go to an Internet site to verify connectivity issues.
C. Determine a plan of action to resolve the Internet problem.
D. Ask a question about the local ISP equipment being serviced lately
D. Ask a question about the local ISP equipment being serviced lately
Which of the following represents a valid APIPA address?
A. 10.22.51.194
B. 169.254.13.237
C. 172.40.0.155
D. 192.168.3.7
B. 169.254.13.237
A technician is installing a motherboard that has a 24-pin connector from the power supply to the
motherboard. Which of the following devices are the additional four pins used?
A. Extra drives
B. The processor
C. Extra RAM
D. Cooling system
B. The processor
Active heat sinks incorporate which of the following into their design?
A. Gas
B. Water
C. Fans
D. Grease
C. Fans
A laptop with an integrated 802.11b/g card is unable to connect to any wireless networks. The
laptop was previously able to connect to wireless networks. Which of the following is MOST likely
the cause of this issue?
A. The wireless card is disabled in BIOS.
B. The wireless card drivers are not installed.
C. The wireless hardware switch is turned off.
D. The wireless card firmware requires an update
C. The wireless hardware switch is turned off.
Which of the following ports would a technician enable ECP?
A. USB
B. LPR
C. COM
D. LPT
D. LPT
When trying to secure a password against a brute force attack, which of the following is the MOST
important attribute?
A. Upper and lower case characters
B. Length
C. Complexity
D. Difficult to remember
A. Upper and lower case characters
A technician determines that a SCSI card needs an update to its embedded code. This is
commonly referred to as updating the:
A. driver
B. operating system
C. system
D. firmware
D. firmware
Which of the following describes how many toner cartridges are in a monochrome laser printer?
A. Zero
B. One
C. Two
D. Four
B. One
APIPA addressing uses which of the following network classes?
A. A
B. B
C. C
D. D
B. B
Which of the following is the BEST reason why VoIP should not be used with satellite Internet?
A. Difficulty in installation
B. High latency
C. Bandwidth limitations
D. High cost
B. High latency
When installing a printer shared from a Windows print server, an error is received that the 64-bit
driver is not available. Which of the following is the NEXT step the technician should take?
A. Download the 64-bit driver from the manufacturer’s website.
B. Use a 64-bit driver on the server from the same manufacturer.
C. Use Windows Update to locate the proper driver.
A. Download the 64-bit driver from the manufacturer’s website.
All of the following Windows editions have the aero theme EXCEPT: (Select TWO).
A. Windows Vista Home
B. Windows 7 Professional
C. Windows XP Professional
D. Windows 7 Starter
E. Windows Vista Business
C. Windows XP Professional
D. Windows 7 Starter
A technician has a laptop that is booting but nothing appears on the LCD. Which of the following should the technician press to make video transfer to the external monitor?
A. Function keys
B. Alt-insert keys
C. Power button
D. Control and escape keys
A. Function keys
Which of the following cables consists of only two twisted pairs of copper wires?
A. Coaxial
B. Fiber
C. POTS line
D. UTP
C. POTS line
A laser printer is received for repair work with a description of failing to pick up paper during prints,
even with a full paper tray. Which of the following is the cause of such an occurrence?
A. The automatic document feeder is faulty and needs replacing
B. The rollers are dirty and need to be cleaned
C. The incorrect print driver is installed
D. The drum is dirty and needs to be cleaned
B. The rollers are dirty and need to be cleaned
A customer brings in a desktop PC that runs fine for an hour and then shuts down. Which of the
following should be checked FIRST?
A. Power supply voltages
B. Hard disk drive
C. CD-ROM drive
D. CPU fan
D. CPU fan
Which of the following printer technologies provides the LOWEST cost per page?
A. Laser
B. Dot matrix
C. Dye-sublimation
D. Inkjet
A. Laser
A technician prints a test page from the printer” s front panel and the printer consistently print one
page of data across two pages of paper. Which of the following is the cause of the problem?
A. The fuser is not functioning
B. The printer driver needs to be updated
C. The paper tray media type is not set up
D. The paper tray media size is wrong
D. The paper tray media size is wrong
Raising the voltage or multiplier of a CPU is known as:
A. Over clocking.
B. Hype threading.
C. Turbo-boost.
D. Overcharging
A. Over clocking.
A networking device that sends packets to all connections is a:
A. gateway
B. hub
C. switch
D. router
B. hub
A user reports that the battery in their Windows 7 laptop is constantly low on power. Which of the
following should a technician suggest to help the user conserve laptop battery power?
A. Have the user run the laptop using the battery until all the power is depleted, and then recharge
the battery.
B. Have the user remove the battery and run the notebook using the electrical cord only.
C. Configure the laptop power options to restore power usage when the laptop is unattended.
D. Configure the laptop power option to power saver plan.
D. Configure the laptop power option to power saver plan.
A network extension needs to be run 50 meters (164 feet) across a machine shop. The path will
take the extension near a number of fluorescent light fixtures and a large electric motor. Which of
the following cable types would be BEST suited for this environment?
A. Fiber
B. UTPCat3
C. STPCat5
D. Coaxial
A. Fiber
Which of the following are the default libraries in the Windows 7 OS?
A. Documents, Media. Pictures, Programs, and Videos
B. Files, Music, Pictures, Online, and Videos
C. Documents, Music, Pictures, and Videos
D. Files, Media, Programs, and Online
C. Documents, Music, Pictures, and Videos
Which of the following wireless networking standards operates at only 5GHz?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
A. 802.11a
Which of the following cables uses an ST connector by default?
A. CAT5e
B. Fiber
C. CAT5
D. CAT6
B. Fiber

Need essay sample on "A+-701"? We will write a custom essay sample specifically for you for only .90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register
Signup & Access Essays

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy