Term
Which of the following RAID levels uses striping across three or more disks with parity? (select two) A. RAID 1 B. RAID 3 C. RAID 5 D. RAID 10 |
|
Definition
|
|
Term
A customer reports that while attempting to print a document it seems to queue up fine, but the printer does not print the job. Which of the following may be the cause? A. Outdated or corrupt print driver. B. The application used to create the document is incompatible with the printer. C. A print job is waiting in the print queue. D. Printer configuration is incorrect. |
|
Definition
|
|
Term
A print job fails to leave the queue. Which of the following services may need to be restarted? A. Printer Driver B. Windows Spool Service C. Print Spooler D. NIC driver |
|
Definition
|
|
Term
A technicians company prints forms on multi-layer carbonless copy paper. When asked to replace the printer, which of the following printing technologies will allow the technician to continue to use the companys copy paper? A. Transfer B. Dot Matrix C. Thermal D. Laser |
|
Definition
|
|
Term
A customers computer crashes consistently when a specific application is launched. The technician has looked at the computer and confirmed the cause of the crash. Which of the following is the NEXT troubleshooting step the technician should take? A. Verify full system functionality. B. Document the findings, actions, and outcomes. C. Establish a plan of action to resolve the problem. D. Question the user and identify changes the user has made to the system. |
|
Definition
|
|
Term
Which of the following programs can be scheduled to delete unwanted compressed old files? A. Disk Management B. Check Disk C. Disk Cleanup D. Disk Defragmenter |
|
Definition
|
|
Term
Which of the following chipsets is responsible for controlling the data flow between a PATA optical drive and the processor? A. Northbridge B. BIOS C. Southbridge D. DMA controller |
|
Definition
|
|
Term
A KVM will allow the user to: A. prevent unauthorized users from removing devices from a computer. B. network multiple computers to gain optimum use of system resources. C. connect multiple computers to save on resources. D. allow multiple users the ability to share a single computer. |
|
Definition
|
|
Term
Which of the following bus slots is in a laptop? A. AGP B. PCMCIA C. PCI D. AMR |
|
Definition
|
|
Term
A technician is called to a school lab to fix a computer. The computer worked fine the day before, but now does not power on. The computer is plugged into a power strip with another computer. The other computer works fine. Which of the following could be the problem? (Select TWO). A. The power strip is overloaded. B. The monitor is unplugged. C. The power cable is unplugged from the computer. D. The power strip is unplugged. E. The voltage switch on the computer is set incorrectly. |
|
Definition
|
|
Term
The FASTEST cache in a computer is: A. L1. B. L2. C. L3. D. L4. |
|
Definition
|
|
Term
Which of the following uses pair authentication to provide a wireless connection between two devices? A. 802.11n B. Bluetooth C. Infrared D. Cellular |
|
Definition
|
|
Term
Which of the following should a technician be cautious of when removing a fuser from a printer that has been recently operational? A. The fuser being fragile B. The fuser being wet C. The fuser being hot D. The fuser containing toner |
|
Definition
|
|
Term
Which of the following will help dissipate heat through the heat sink when upgrading a CPU? A. Case fan B. Thermal compound C. Motherboard riser D. Power supply |
|
Definition
|
|
Term
Which of the following would accommodate the installation of an upgraded video card? (Select TWO). A. AGP B. VGA C. DVI D. SCSI E. PCIe |
|
Definition
|
|
Term
A technician has replaced a memory stick in a computer. After the operating system starts to boot, the computer displays a BSOD. Which of the following is the MOST likely cause? A. The chipset firmware needs to be updated B. The motherboard has failed C. The hard drive has failed D. The memory is not seated properly |
|
Definition
|
|
Term
Which of the following is the MOST secure form of wireless security? A. WPA2 B. MAC filtering C. SSID D. WEP |
|
Definition
|
|
Term
The process of a virus or worm copying itself, then propagating to multiple systems is known as: A. repudiation B. replication C. duplication D. redundancy |
|
Definition
|
|
Term
Which of the following is a user replaceable memory in a computer system? A. SRAM B. CMOS C. ROM D. DRAM |
|
Definition
|
|
Term
Computers should NEVER be placed on which of the following materials? A. Carpet B. Wood C. Tile D. Plastic |
|
Definition
|
|
Term
A user needs to transfer numerous personal financial documents from an existing hard drive to a new hard drive. Which of the following should the technician perform? A. Copy all data over without viewing them B. Review all data and write down important account numbers in case information is lost C. Remove all financial documents since they are confidential D. Print out all personal financial documents in case information is deleted |
|
Definition
|
|
Term
Which of the following BEST describes a situation that would require STP cable? A. Installation in an area with low EMI B. Installation in an area with high EMI C. Installation in an air handling space D. Installation is an area with high humidity |
|
Definition
|
|
Term
Which of the following connectors is MOST commonly used for POTS lines? A. BNC B. SC C. RJ-11 D. RJ-45 |
|
Definition
|
|
Term
Which of the following is the difference between a Cellular WAN and a WLAN card? A. A WLAN card generally has a range of 6 miles (9.7 kilometers), while a Cellular WAN card is limited in range to 1200 feet (365 meters). B. A Cellular WAN card will work on most public Wireless Access Points, while a WLAN card is more proprietary. C. A Cellular WAN card requires subscription to a cellular provider, while a WLAN card can work without provider payment. D. A WLAN card is usually an external card, while a Cellular WAN card is usually an internal card. |
|
Definition
|
|
Term
A technician has rebooted a PC, and the machine has paused on a black screen with a white blinking underscore on the top left of the screen. Which of the following is the MOST likely problem? A. PC is running in Safe Mode B. Boot order C. Recovery Console is running D. BIOS update in process |
|
Definition
|
|
Term
SCSI uses which of the following connector types? A. DB-25 B. DB-9 C. RJ-45 D. RJ-11 |
|
Definition
|
|
Term
Which of the following devices would MOST likely require a serial adapter to be installed on a modern PC? A. External modem B. TV tuner C. Mouse D. Keyboard |
|
Definition
|
|
Term
An end user reports that their laptop cannot access the wireless network. The user had access to the network yesterday, before taking the laptop out of the office. Which of the following is the MOST likely reason for the connection problem? A. The wireless network is down. B. The user turned the wireless switch off. C. The battery needs to be charged. D. The wireless antenna has become disconnected. |
|
Definition
|
|
Term
A technician would like to rebuild the MBR without reinstalling Windows. Which of the following recovery options would be used to build a new MBR? A. Recovery Console B. System Restore C. Automated System Recovery D. Emergency Repair Disk |
|
Definition
|
|
Term
A technician notices that there are two appointments scheduled for the same time. Which of the following should the technician do to resolve the issue? A. Call one of the clients and apologize, then reschedule B. Do not go to the second scheduled appointment C. Email each client for rescheduling D. Go to the first scheduled appointment then after completion go to the next |
|
Definition
|
|
Term
Which of the following wireless technology standards can operate at either 2.4GHz or 5GHz frequencies? A. 802.11a B. 802.11b C. 802.11g D. 802.11n |
|
Definition
|
|
Term
Which of the following protocols are commonly used for Windows Remote Desktop? A. NTP B. PPTP C. RDP D. LDAP |
|
Definition
|
|
Term
Which of the following ports does the Simple Mail Transfer Protocol use? A. 21 B. 25 C. 80 D. 443 |
|
Definition
|
|
Term
Which of the following log files references Windows specific errors? A. Archive Logs B. Application Logs C. Security Logs D. System Logs |
|
Definition
|
|
Term
Which of the following is a function of the PS/2 port? A. Connection of a gaming controller B. Connection of a keyboard or mouse C. Connection of a biometric device D. Connection of an external optical drive |
|
Definition
|
|
Term
The PING command can be used to determine which of the following? (Select TWO). A. If there is connection to a specified IP address B. The gateway address of a currently logged on user C. The response time of the connection to a specific IP address D. The amount of hops it takes to reach destination computer E. The active connections to a computer |
|
Definition
|
|
Term
Which of the following would a technician enable on a router to allow specific devices to connect to the Internet? A. DHCP B. MAC filtering C. DNS D. SSID |
|
Definition
|
|
Term
A technician has been taken to a users desk to resolve a problem. The users desk is covered with papers and it is obvious to the technician that these papers are of a confidential nature. Which of the following is the BEST course of action? A. Put the confidential papers in a neat pile at the side of the desk. B. Ask the user to clear the desk of the confidential papers. C. Work around the papers to resolve the problem. D. Refuse to work until the user has cleared the desk. |
|
Definition
|
|
Term
Which of the following is the NEXT step in the troubleshooting theory after identifying the problem? A. Establish a theory of probable cause B. Test the theory C. Implement preventative measures D. Establish a plan of action |
|
Definition
|
|
Term
Which of the following is the number of devices that can be daisy-chained to an IEEE 1394 port? A. 7 B. 15 C. 63 D. 127 |
|
Definition
|
|
Term
A customer reports that their computer is displaying operating system not found while booting. The technician confirms that the computer booted fine the previous day and that no devices were added. The technician also confirms that no software changes were made to the system from the previous day. Which of the following is the problem? A. The network cable is unplugged. B. A diskette was placed in the disk drive. C. The keyboard is unplugged. D. The system has been infected with spyware. |
|
Definition
|
|
Term
Which of the following are digital audio-only formats? (Select TWO). A. AAC B. WMV C. WMA D. AVI E. DES |
|
Definition
|
|
Term
Which of the following wireless technology standards can operate at a MAXIMUM of 54Mbps? (Select TWO). A. 802.11a B. 802.11b C. 802.11g D. 802.11k E. 802.11n |
|
Definition
|
|
Term
After verifying full system functionality, which of the following should a technician do NEXT when troubleshooting a problem? A. Establish a theory of probable cause. B. Identify user changes to the computer. C. Move on to the next issue that requires troubleshooting. D. Document findings, actions, and outcomes. |
|
Definition
|
|
Term
A user notices that the battery light on the laptop is flashing when the laptop is on a docking station. Which of the following should the technician perform FIRST? A. Reseat in the docking station B. Reinstall the operating system C. Remove and reseat the battery D. Replace the laptop battery |
|
Definition
|
|
Term
Which of the following explains a yellow exclamation point next to a device in the Device Manager? A. A driver was installed but was not digitally signed. B. A usable driver could not be installed for this device. C. The device is operable, but not at full capacity. D. The device is built-in and not upgradable. |
|
Definition
|
|
Term
Corrupt Windows XP system files are keeping a PC from booting. Which of the following is the BEST option to resolve this issue? A. Automated System Recovery B. Emergency Repair Disk C. Recovery Console D. NT Repair Disk |
|
Definition
|
|
Term
Which of the following occurs by default when a file is copied from a CD-ROM to a folder on an NTFS partition? A. The file inherits the permissions of the folder it is copied to. B. The CD structure is indexed and the index is stored in the folder. C. The file is copied with the Read Only attribute. D. A shortcut is created on the drive pointing to the CD file. |
|
Definition
|
|
Term
Which of the following BEST describes attempts to guess a password by trying possible combination of letters, numbers, and symbols? A. Social engineering B. Phreaking C. Brute force D. War driving |
|
Definition
|
|
Term
A new video card requires a 600 watt power supply. The power supply should have how many pins on the main cable? A. 12 B. 20 C. 24 D. 26 |
|
Definition
|
|