Term
A client reports that their VoIP phone screen displays duplicate IP address. Which of the following is the FIRST action to try to resolve this problem? Choose one answer. a. Try another LAN connection b. Change MAC address settings c. Reboot the phone d. Call the vendor |
|
Definition
|
|
Term
A company customer wants to upgrade the RAM on her laptop. Which memory modules would the customer use? |
|
Definition
|
|
Term
A company is experiencing issues with third parties tailgating authorized users during entry to secure server rooms. Which of the following would BEST alleviate this problem? Choose one answer. a. Mantraps b. Smart card badges c. Door locks d. Retinal scanners |
|
Definition
|
|
Term
A company user complains hat foreign letters and numbers are appearing on screen while he is typing on a laptop. What would the cause be? |
|
Definition
|
|
Term
A customer connects a projector to their laptop, but no display shows on the screen. The projector is turned on. Which of the following could the technician do to send the display to the projector? |
|
Definition
Use appropriate function toggle key to switch display mode. |
|
|
Term
A customer has a laptop computer. In the office they want to use a 24 LCD monitor, full size keyboard, and a regular mouse without having to connect all of the devices each time. Which of the following will allow this functionality? |
|
Definition
|
|
Term
A customer has returned to the office after lunch and their laptop has become unresponsive to all key strokes, mouse movement and the power light is blinking. Which of the following is causing this to happen? |
|
Definition
The system is in hibernation mode. |
|
|
Term
A customer has security concerns about classified local data being compromised if the laptop is stolen. The customers laptop has Windows 2000 utilizing the FAT16 file system. Which of the following actions should be used? |
|
Definition
Have the customer convert NTFS and enable data encryption. |
|
|
Term
A customer has two computers with NICs installed. The customer has called a technician to propose the minimum cost of networking these computers for file and printer sharing. Which of the following would be the BEST recommendation to the customer? |
|
Definition
|
|
Term
A customer reports that his laptop can no longer print to the printer, after relocating a Wireless IrDA (infrared data association) printer. Explain by choosing from the following what the MOST likely cause of this problem would be. |
|
Definition
The printer is more than one meter (3 feet) from the laptop. |
|
|
Term
A laptop boots up but the screen appears dark even during the power-on self test (POST) except when viewed from an angle. Adjusting the brightness and contrast has not resolved the problem. Which of the following is MOST likely the cause? |
|
Definition
The backlight or inverter has failed. |
|
|
Term
A technician determines that a laptop is not properly cooling due to excessive dust in the vents. Which of the following is the BEST preventive maintenance procedure that the technician should perform? |
|
Definition
Periodically clean the vents using a small vacuum cleaner. |
|
|
Term
A technician has connected a cable to an RJ-45 connector on the back of a computer. Which of the following devices is MOST likely connected to the other end of the cable? |
|
Definition
|
|
Term
A technician is asked to add a PCMCIA bus card to a laptop that will allow the laptop high-speed wireless capability. Which of the following provides the BEST solution? |
|
Definition
|
|
Term
A technician is called in to repair a 2.4GHz wireless access point that drops connections. Which of the following would MOST likely cause the connection drops? |
|
Definition
|
|
Term
A technician receives a laptop computer for repair. The work order states that the wireless network device has stopped working. The technician should check whether the: |
|
Definition
wireless device is turned off. |
|
|
Term
A technician receives a laptop that is running out of battery power more quickly than expected. Which of the following can the technician do to correct the problem? |
|
Definition
Replace the battery by purchasing a new battery from the manufacturer |
|
|
Term
A user gets an error message that the trust relationship to the domain has been broken. Which of the following can be done to resolve this from the client desktop? Choose one answer. a. Reboot the PC as the domain will automatically rebuild the relationship b. Update the BIOS using the latest version c. Run CHKDSK d. Re-join the computer to the domain |
|
Definition
d. Re-join the computer to the domain |
|
|
Term
A user has an issue with phantom cursor movements on their laptop where the pointer suddenly jumps across the screen when using the built-in touchpad. Which of the following is the BEST option to solve this issue? |
|
Definition
Update the drivers for the touchpad. |
|
|
Term
A user has not received any new emails on their smartphone in the last two days. The user is able to access the Internet without any problems. Which of the following should the user do FIRST? Choose one answer. a. Reconfigure the smartphone email account b. Restart the smartphone c. Update the operating system d. Resynchronize the smart phone |
|
Definition
b. Restart the smartphone |
|
|
Term
A user reports that their laptop has frozen up and will not shut down or log off. The technician removed the external power adapter and held the power button down for ten seconds but the problem still exists. Which of the following should the technician do NEXT? |
|
Definition
Remove the internal main battery. |
|
|
Term
After being infected with a virus, a user’s computer does not recognize the user as having local administrator rights to the computer. After troubleshooting the issue, a technician determines the computer needs to be rebuilt and data needs to be restored from the user’s backup. Which of the following tools would BEST reset the computer to how it worked when first purchased? Choose one answer. a. Factory restore CD or partition b. Recovery Console c. Anti-malware software d. System Restore |
|
Definition
a. Factory restore CD or partition |
|
|
Term
After servicing a laptop, the system will not perform power-on self test (POST). Which of the following may not be seated correctly? |
|
Definition
|
|
Term
As a company technician you are sent to troubleshoot a workstation that is unable to access the Internet. All your company's workstations are set to automatically obtain an IP address from your company's DHCP server. An IPCONFIG /ALL command reveals that the computer has the IP address 169.254.0.2.No other users in the organization has reported any problems similar to this one. What is the FIRST thing you should check? |
|
Definition
That the network cable is plugged into the computer. |
|
|
Term
Diagnostics on a laptop that is under warranty indicate a failed motherboard. Which of the following would be the BEST action to take? |
|
Definition
Obtain and replace a motherboard for the model that is being repaired. |
|
|
Term
During boot up, a laptop screen displays vertical colored lines and then the LCD screen goes blank. There are no display problems when connected to an external monitor. Which of the following actions should be taken to resolve the problem? |
|
Definition
|
|
Term
If you have two computers that are configured to the same IP address, what is going to happen? |
|
Definition
The first computer to link to the network will be fine. The second one will be denied access. |
|
|
Term
If you have two computers that are configured to the same NetBIOS name, what is going to happen? |
|
Definition
The first computer to link to the network will be fine. The second one will be denied access. |
|
|
Term
If you wanted to use a single DUN connection to bring Internet services to two different computers, what service MUST be installed? |
|
Definition
|
|
Term
In which of the following locations can a browser pull files in order to avoid pulling them from the Internet? |
|
Definition
|
|
Term
On a Windows XP laptop, how do you enable Hibernation? |
|
Definition
Right Click on the Desktop > Properties then: Screen Savers > Monitor Power > Power > Hibernate |
|
|
Term
SSL technology is used to: |
|
Definition
secure communications with websites. |
|
|
Term
The practice of following an authorized person through an entrance without using a badge to defeat security is called: Choose one answer. a. trailing. b. tailgating. c. spamming. d. shredding. |
|
Definition
|
|
Term
The shared folder named C$ is an example of which of the following? Choose one answer. a. Permission propagation b. Administrative share c. Local share d. Inheritance |
|
Definition
|
|
Term
Two wireless access points are located near each other, which of the following settings should be changed to prevent interference between the two devices? |
|
Definition
|
|
Term
Wake on LAN describes the PCs ability to: |
|
Definition
resume from a low power state when it receives a network packet telling it to do so. |
|
|
Term
What is the maximum length a piece of CAT5 cable can be run without external support? |
|
Definition
|
|
Term
What is the maximum speed of a T1 Internet connection? |
|
Definition
|
|
Term
When a user would like to access a file server with Universal Name Convention (UNC), which of the following information is needed? |
|
Definition
|
|
Term
Which connectors does 1000BASE-TX use? |
|
Definition
|
|
Term
Which of the following BEST describes what a VPN is? |
|
Definition
A secured line of communication between two points through a public network. |
|
|
Term
Which of the following Ethernet cable standards supports transmission speeds of over 200 Mbps? |
|
Definition
|
|
Term
Which of the following IP blocks are reserved for private networks? |
|
Definition
|
|
Term
Which of the following Wireless standards has a maximum transmission speed of 54 Mbps? (Choose TWO) |
|
Definition
|
|
Term
Which of the following addresses would be assigned by APIPA? |
|
Definition
|
|
Term
Which of the following below is a valid default subnet mask for a Class A network? |
|
Definition
|
|
Term
Which of the following cable types is LEAST affected by electromagnetic interference (EMI)? |
|
Definition
|
|
Term
Which of the following cable types uses a BNC? |
|
Definition
|
|
Term
Which of the following can limit specific devices from being able to connect to a small office home office (SOHO) network? |
|
Definition
|
|
Term
Which of the following connectors are used on the end of a fiber cable? |
|
Definition
|
|
Term
Which of the following descriptions best defines Ethernet? |
|
Definition
a collision detection network |
|
|
Term
Which of the following features helps to prevent shoulder surfing? Choose one answer. a. Auto adjust b. Degaussing c. Privacy screen d. Native resolution |
|
Definition
|
|
Term
Which of the following hardware is hot pluggable? (Select THREE). |
|
Definition
eSATA/USB/Express Card/54 |
|
|
Term
Which of the following is a cost effective technology that can be implemented on desktops and laptops to meet security considerations and reduce internal password reset costs? |
|
Definition
Biometric fingerprint reader |
|
|
Term
Which of the following is a loopback address on a computer with an IP address of 192.168.0.12, a subnet mask of 255.255.255.0 and a gateway of 192.168.0.1? |
|
Definition
|
|
Term
Which of the following is a private IP address and will not be routable on the Internet? |
|
Definition
|
|
Term
Which of the following is an example of a MAC address? Choose one answer. a. 192.17.2.1 b. 4309:FD21:ACB3:0012 c. http://www.comptia.org d. 00-00-00-1B-02-55 |
|
Definition
|
|
Term
Which of the following is not a modem? |
|
Definition
|
|
Term
Which of the following is the BEST tool for a technician to use to make sure the network wires are securely fastened in a wall jack? Choose one answer. a. Punch down b. Small flat screwdriver c. Wire strippers d. Crimper |
|
Definition
|
|
Term
Which of the following is the BEST tool to verify the cable is plugged into the correct port on the patch panel? Choose one answer. a. Cable tester b. Toner probe c. Punch down d. Cable certifier |
|
Definition
|
|
Term
Which of the following is used to control access to a broadcasted wireless network based on a user supplied key? |
|
Definition
|
|
Term
Which of the following methods can a technician use to find the IP address of a computer? (Select TWO). |
|
Definition
Open a command window and run ipconfig from the command line/Open Network Connections from the control panel, right click the Local Area Connection, select Status, and then select the Support tab. |
|
|
Term
Which of the following network ports is normally associated with unencrypted web traffic? a. 80 b. 53 c. 443 d. 110 |
|
Definition
|
|
Term
Which of the following networking protocols uses a 32-bit address that defines both the network and the host? |
|
Definition
|
|
Term
Which of the following protocols could a technician use to connect a smartphone to an email server? (Select TWO). Choose at least one answer. a. ICMP b. POP3 c. SMTP d. SNTP e. HTTP |
|
Definition
|
|
Term
Which of the following security concepts establishes the notion that a user should only be given sufficient access to the resources they need to perform their job function? Choose one answer. a. Allow al b. Least privilege c. Most privilege d. Deny all |
|
Definition
|
|
Term
Which of the following services uses the TCP port 21 by default?
a. TELNET b. HTTPS c. SMTP d. FTP |
|
Definition
|
|
Term
Which of the following should a technician do FIRST to secure a mobile device? a. Assign a passcode b. Download updates c. Disable GPS d. Install antivirus |
|
Definition
|
|
Term
Which of the following software types would need to be installed on a mobile device to help prevent data from being viewed if the device is lost? a. Remote wipe b. GPS locator c. Remote backup application d. Antivirus |
|
Definition
|
|
Term
Which of the following switches should a technician use with the PING command to resolve an IP address to a hostname? a. -a b. -n c. -f d. -t |
|
Definition
|
|
Term
Which of the following tabs in the Windows XP Power Options applet configures a laptop to go into hibernation when the LCD panel is closed? |
|
Definition
|
|
Term
Which of the following types of batteries provides the longest running time for portable devices? |
|
Definition
|
|
Term
Which of the following usually has the HIGHEST latency? a. Cable b. DSL c. Fiber d. Satellite |
|
Definition
|
|
Term
Which of the following will BEST prevent theft of monitors and laptops? Choose one answer. a. Pad locks b. RSA keys c. Cable locks d. Logical Token |
|
Definition
|
|
Term
Which of the following will be true of the battery with 9 cells instead of 6 cells? Choose one answer. a. More horsepower will be provided. b. Higher electricity measured in volts. c. More devices can be powered at one time. d. Greater duration of power availability. |
|
Definition
d. Greater duration of power availability. |
|
|
Term
Which of the following would be the correct way to dispose of a laptop battery? |
|
Definition
Refer to the disposal information located on the battery. |
|
|
Term
Which of the following would be the main purpose of the Fn key on a laptop? |
|
Definition
Expand functionality of the keyboard |
|
|
Term
You are the company technician charged with setting up a Wireless network on some laptops and notebooks for ten users. You must decide whether it is better to operate the wireless network in ad-hoc mode or infrastructure mode. The wireless network must be able to bridge to wired networks or routing to the Internet? |
|
Definition
Create an infrastructure network |
|
|
Term
You are the network administrator at your company. Two Microsoft Windows XP workstations on the company network have the same IP address, resulting in an IP address conflict. Which command can you use to identify the conflicting computers? |
|
Definition
|
|
Term
You are working as a Technician at your company. You are asked to troubleshoot an internet network access problem. You are able to PING a public IP address but you cannot PING the same public address using the fully qualified domain name. Which of the following IP settings should be verified? |
|
Definition
|
|
Term
You are working as a network technician at your company. A user that has heard that microwave Ovens sometimes disturb WLAN's wants to know in what radio frequency 802.11a operates. What will you answer him? |
|
Definition
|
|
Term
You are working as a technician at your company. You are visiting a user that has complaining about the loud and noisy fan in his laptop. When you receive on site the user reports that all fan noise has just recently stopped. Which of the following is MOST likely the problem? |
|
Definition
The fan has stopped completely and the laptop should be serviced before there is heat damage |
|
|
Term
You are working as a technician at your company. You have just finished the upgrade of the memory in a laptop. When booting up the laptop you notice that the touchpad is functioning but the keyboard is not functioning. Which of the following is MOST likely the cause? |
|
Definition
The keyboard connector is not seated properly. |
|
|
Term
You are working as a technician at your company. Your boss asks for your opinion in the best method to help prevent malware threats. Which of the following alternatives would you suggest as a good starting point? |
|
Definition
Inform users about the risks involved and how to avoid the risks |
|
|
Term
You can determine the connection speed and signal strength of a wireless network connection on a Windows XP computer by using ______. |
|
Definition
|
|
Term
You work as a technician at your company. A user on a network requests assistance with installing some software as he does not have administrative rights on the workstation himself. Which of the following tools can you use in order to login with administrative rights and perform the installation for all users? |
|
Definition
|
|
Term
You work as the security administrator at company. You want to implement a solution which will secure the wireless network. The company wireless network environment uses access points as repeaters. What should you do next to secure the wireless network? |
|
Definition
Implement WEP (Wired Equivalent Privacy). |
|
|
Term
You work as the security administrator at your company. You plan to implement a VPN (Virtual Private Network). Which security consideration should you be aware of? |
|
Definition
Firewalls cannot inspect traffic that is encrypted. |
|
|
Term
You work as the security administrator at your company. You want to implement a remote access solution that will enable mobile users to access the corporate network. All mobile users will be using laptops that have Ethernet adapters to access shared files and e-mail on the corporate network. Half of the laptops are equipped with modems. What solution should you use? |
|
Definition
Use a VPN (Virtual Private Network) connection. |
|
|