SHARE
TWEET

TestOut CompTIA Certification Chapters 3-13

a guest Nov 17th, 2019 142 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. [VIEW IN RAW FORMAT THEN USE CTRL+F][VIEW IN RAW FORMAT THEN USE CTRL+F][VIEW IN RAW FORMAT THEN USE CTRL+F]
  2.  
  3. [CHAPTER 3]
  4. * Your company has decided to hire a full-time video editor. You have been asked to find a system with the level of display quality needed by someone who will be working with video all day.
  5.  
  6.     Which of the following video card specifications will have the greatest impact on display quality?
  7.     > Refresh rate
  8.     > Resolution
  9.  
  10. * Match the video card types on the left with the appropriate characteristics on the right. Each video card type is used more than once.
  11.     Installed in an expansion card slot on the motherboard.
  12.     > Dedicated video cards
  13.     Has a GPU and a dedicated high-speed video memory bank.
  14.     > Dedicated video cards
  15.     Are more powerful and more expensive.
  16.     > Dedicated video cards
  17.     GPU is integrated with another hardware component, such as a motherboard or CPU.
  18.     > Integrated video cards
  19.     Shares system memory for graphic processing.
  20.     > Integrated video cards
  21.     Are much cheaper and less powerful.
  22.     > Integrated video cards
  23.  
  24. * A customer wants to add an additional video card to her computer so she can play the latest computer games. As a result, this system will now have multi-GPU configuration.
  25.  
  26.     Which of the following statements are true? (Select TWO).
  27.     > The motherboard should support either SLI or CrossFire.
  28.     > For the best performance, both video cards should be identical.
  29.  
  30. * You need to connect a monitor that provides an HDMI port and a VGA port to a video adapter in a P system that uses a DVI-D connector.
  31.  
  32.     Which of the following options would provide the BEST display quality at the lowest cost?
  33.     > Use an adapter to connect the monitor HDMI port to the DVI-D connector on the PC.
  34.  
  35. * You are in the process of building a new computer. You would like to configure your computer to use SLI to improve performance while playing your favorite game.
  36.  
  37.     Which of the following will MOST likely be part of the configuration process? (Select THREE.)
  38.     > Purchase two graphics cards with SLI and similar specifications.
  39.     > Purchase a motherboard with two (or more) PCIe x16 slots.
  40.     > Connect at least one monitor to the graphics card.
  41.  
  42. * You are in the process of building a new computer. You would like to configure your computer to use Crossfire to improve performance when playing your favorite game. Which of the following will be part of the configuration process?
  43.     > Purchase two identical video cards.
  44.  
  45. * The CEO of your small company has asked you to connect his laptop computer to the small conference room LED TV. The CEO will be showing a new promotional video that demonstrates the new company strategy through images and sound.
  46.  
  47.     Which of the following cable types would work BEST for connecting his laptop to the display?
  48.     > HDMI
  49.  
  50. * You have a friend who is offering to sell the monitor and video card from his gaming system along with several PC games. The games have fast-moving graphics, and you want to be able to play them on your own home system. The monitor he is selling is an LCD TN with a 144-Hz refresh rate. The video card he is selling supports a max refresh rate of 144 Hz. You're sure you want to buy the games, but you have a couple of other choices when it comes to the monitor and the video card.
  51.  
  52.     The monitor in your current system has a 60 Hz refresh rate. The video card has a max refresh rate of 75 Hz. This configuration has always worked fine for watching videos. You're also looking at new 60-Hz LCD IPS monitors and several high-end video cards with max refresh rates of up to 240 Hz.
  53.  
  54.     Which of the following will most likely allow you to play the games on your home system with the best gaming experience possible?
  55.     > Buy your friend's games, monitor, and video card. Swap out both your video card and monitor.
  56.  
  57. * Which of the following video card connectors provides digital video output? (Select TWO).
  58.     > DVI-D
  59.     > HDMI
  60.  
  61. * A TV station needs to view and capture high-definition television (HDTV) signals on their computer. This allows the host's staff to prepare audio and sound bites for the show. The station has purchased a TV tuner card but cannot get it to capture video or sound.
  62.  
  63.     Which of the following is MOST likely causing the card to function improperly?
  64.     > They purchased an ATSC card, but did not connect the card to the TV feed cable.
  65.  
  66. * You work for a company that provides technical support for customers. One customer calls wanting to know how to adjust their monitor so they can have the sharpest and most detailed images, words, and icons.
  67.  
  68.     Which Control Panel setting should you adjust to BEST meet the customer's needs?
  69.     > Resolution
  70.  
  71. * You want to be able to watch and record live TV on your computer. Your computer already has a video card, so you want to purchase an additional card that provides TV tuner input capabilities.
  72.  
  73.     Which of the following should MOST likely be part of the configuration process? (Select TWO).
  74.     > Purchase a card that supports ATSC.
  75.     > Connect the TV input to the tuner card using coaxial cable and F-type connectors.
  76.  
  77. * You are installing a high-end PCIe x16 video card in a new computer. The video card has connectors for two displays. The card also has dual fans to cool the unit.
  78.  
  79.     Which of the following will MOST likely be part of the installation?
  80.     > Connect a 6- or 8-pin power connector to the video card.
  81.  
  82. * You have just installed a new video card in Mark's computer. When you power on the computer, Windows automatically detects the new device and tries to locate an applicable device driver. Unfortunately, Windows cannot locate the required driver.
  83.  
  84.     Which of the following would be the BEST administrative tool to fix Mark's computer?
  85.     > Computer Management
  86.  
  87. * A customer would like you to install a high-end video card suitable for gaming.
  88.  
  89.     Your installation and configuration SHOULD include which of the following? (Select THREE).
  90.     > Ensure that the video card is compatible with the expansion slot.
  91.     > Install the new video drivers from CD and then install updated drivers from the Internet.
  92.     > Configure the PC to use the integrated graphics if available and needed.
  93. [CHAPTER 3]
  94.  
  95. [CHAPTER 4]
  96. * The marketing department has hired a new employee. Prior to the new employee's first day at work, you have set up and configured a new laptop computer. The computer and all of the peripherals were purchased from the same vendor. After the new employee begins work, you receive a phone call stating that the wireless mouse is not working.
  97.  
  98.     Which of the following is the MOST likely reason the mouse isn't working?
  99.     > The USB mouse receiver is not plugged into the computer.
  100.  
  101. * You need to connect a new USB scanner to the USB port on your computer. However, the first time you plugged the scanner in, it was not recognized. What should you do?
  102.     > Install the scanner drivers and then connect the scanner to the USB port and complete the Add a Device wizard when it pops up.
  103.  
  104. * You are an IT technician for your company. As part of your job, you must manage and support a wide variety of devices.
  105.  
  106.     Which of the following is the MOST common interface for peripheral devices?
  107.     > USB
  108.  
  109. * Which of the following standards provides data transfer rates of up to 480 Mbps with a maximum cable length of 5 meters?
  110.     > USB 2.0
  111.  
  112. * What is the maximum data transfer speed for USB 3.0 devices?
  113.     > 5 Gbps
  114.  
  115. * Your company has just upgraded your laptop computer. After receiving your new computer, you plug your external USB 2.0 hard disk into your new USB 3.0 port.
  116.  
  117.     Which of the following is the MOST accurate statement regarding how this device will function?
  118.     > The device will work, but will only transfer at USB 2.0 speeds.
  119.  
  120. * You are an IT technician for your company. As part of your job, you must manage and support a wide variety of devices.
  121.  
  122.     Which of the following devices MOST likely uses a micro-USB connector? (Select TWO).
  123.     > Digital cameras
  124.     > Smartphones
  125.  
  126. * Select the aspect ration that applies to the display types listed.
  127.  
  128.     Which aspect ratio applies to displays with resolutions of 800x600 and 1600x1200?
  129.     > 4:3
  130.     Which aspect ratio applies to displays with resolutions of 1680x1050 and 1920x1200?
  131.     > 16:10
  132.     Which aspect ration applies to displays with resolutions of 1280x720 and 1920x1080?
  133.     > 16:9
  134.  
  135. * You recently purchased a laptop computer. As a member of the sales team, you often travel to present sales demonstrations. At one such presentation, you notice that the images being shown by a projector seem large and somewhat skewed.
  136.  
  137.     Which of the following changes would MOST likely give you an accurate projection of your presentation?
  138.     > Configure the projector to use a 16:9 aspect ratio.
  139.  
  140. * You work as the IT administrator for a small news station. Jill, an employee in building 2, works in the audio/video editing department and would like to increase her productivity. For example, she would like to be able to run multiple programs simultaneously and be able to compare video clips side-by-side.
  141.  
  142.     Which of the following configuration changes would provide the BEST solution for Jill?
  143.     > Configure Jill's computer to have dual monitors.
  144.  
  145. * A company is purchasing new laptops for their graphic artist division.
  146.  
  147.     Which of the following display technologies provides better contrast and deeper blacks, resulting in better picture quality?
  148.     > OLED
  149.  
  150. * Which of the following terms describes the difference between white and black in an LCD monitor?
  151.     > Contrast ratio
  152.  
  153. * Which of the following is true of modern LCD monitors regarding backlighting?
  154.     > LEDs are used to backlight the screen.
  155.  
  156. * You are putting together a gaming system and need to make sure you get a display that meets your needs. The display needs to have a very good response time, and you would prefer that it be affordable and power-efficient.
  157.  
  158.     Which of the following types of displays will MOST likely meet these needs?
  159.     > LCD display with TN panel
  160.  
  161. * You are putting together a system for a graphic artist and need to make sure you get a display that meetes her needs. The display needs to have very good color reproduction quality and viewing angles. The display needs to cool and be power-efficient.
  162.  
  163.     Which of the following types of displays will MOST likely meet these needs?
  164.     > LCD display with IPS panel
  165.  
  166. * You are a trainer for your company and often teach courses in a classroom located on-campus or in a hotel conference room. In your office, which is separate from the classroom, you have two external monitors connected to your laptop, and you are able to display different content on each monitor. However, when teaching, you only have your laptop and a projection unit. To make teaching easier, you want to the same content to show on both laptop monitor and the projection screen.
  167.  
  168.     Which of the following multiple display options would be BEST to select when teaching?
  169.     > Duplicate these displays.
  170.  
  171. * Lloyd works for a graphic design company. He needs a monitor that accurately represents colors. Lloyd's monitor recently failed, and you have been asked to purchase a new one. You have been asked to find a monitor with a high pixel refresh rate, low energy consumption, and very accurate colors representation.
  172.  
  173.     Which of the following types of displays will BEST meet the requirements requested?
  174.     > OLED
  175.  
  176. * Ida, one of the employees in the sales department, needs a way to display her PowerPoint sales presentation to a large group of potential customers. She has asked you to set up the conference room in preparation for her presentation. You will need to purchase a display system for the conference room.
  177.  
  178.     Which of the following display systems would be the BEST to purchase?
  179.     > A large screen and a projector
  180.  
  181. * Which of the following are true of the SXGA scren resolution? (Select TWO.)
  182.     > 5:4 aspect ratio
  183.     > 1280 x 1024
  184.  
  185. * What is the difference between UXGA and WUXGA displays?
  186.     > WUXGA has a widescreen aspect ratio.
  187.  
  188. * You have just purchased 10 new notebook systems for your users. You are concerned that users will leave the systems on for long periods of time, which could result in display burn-in.
  189.  
  190.     What should you do to prevent this from happening?
  191.     > Configure a screen saver on each system.
  192.  
  193. * After using your LCD monitor for about three months, you notice a small black dot in one area of the screen. Regardless of what is shown on the monitor, the dot remains the same color and in the same location.
  194.  
  195.     Which of the following is the BEST method for removing the black dot from the monitor?
  196.     > Play a video designed to fix dead pixels.
  197.  
  198. * For several years, the monitor on your laptop has worked perfectly. However, shortly after turning on your laptop today, you noticed a definite dimness.
  199.  
  200.     Which of the following is the MOST likely cause? (Select TWO).
  201.     > The monitor's inverter has gone bad.
  202.     > The power adapter was accidentally unplugged.
  203.  
  204. * Your monitor is displaying images in strange colors.
  205.  
  206.     Which of the following is MOST likely the solution to this problem?
  207.     > Increase the color depth.
  208.  
  209. * A customer complains that a recently purchased monitor no longer displays a picture. You verify that the monitor is powered on and that the video cable is securely fastened to the video port.
  210.  
  211.     Which of the following actions is the BEST to take next?
  212.     > Check the monitor's brightness and contrast settings using the controls on the monitor.
  213.  
  214. * You recently upgraded a client's older workstation from Windows 7 to Windows 10. The client has called to complain that the interface is very slow. For example, after clicking on the Start button, the Start Menu slowly appears on the screen.
  215.  
  216.     Which of the following will MOST likely fix this problem without requiring a hardware upgrade?
  217.     > Set the visual effects for best performance.
  218.  
  219. * You have purchased an LED monitor and connected it to the HDMI port on your computer using an HDMI cable. You configure the screen resolution to 1280 x 1024 with 32-bit color. The geometry of the images displayed on the screen appear to be distorted.
  220.  
  221.     What should you do to correct the problem?
  222.     > Set the display resolution to the native resolution of the monitor.
  223.  
  224. * You have purchased an LED monitor and connected it to the DVI-I port on your computer using a DVI-D cable. You configure the screen resolution to 1440 x 900 with 32-bit color. The display on the screen seems to be pixilated.
  225.  
  226.     Which of the following solutions is MOST likely to fix this problem?
  227.     > Change the screen resolution to the native resolution of the monitor.
  228.  
  229. * You have purchased a 1600 x 1200 LCD monitor and connected it to the DVI-I port on your computer using a DVI-D cable. You configure the screen resolution at 1280 x 1024 with 24-bit color. The display output seems to be fuzzy and stretched.
  230.  
  231.     Which of the following BEST describes the action you should take to correct the problem?
  232.     > Change the screen resolution to the native resolution of the moinitor.
  233.  
  234. * You have purchased an LED monitor and connected it to the HDMI port on your computer using an HDMI cable. You configure the screen resolution to 1280 x 768 with 32-bit color. The images displayed on the screen appear to be overly large.
  235.  
  236.     What should you do to correct the problem?
  237.     > Set the display resolution to the native resolution of the monitor.
  238.  
  239. * As you arrive on-site at a customer's place of business, you go up to the front desk and ask for Mr. Magorium, the head of the IT department. Mr. Magorium meets you, introduces himself as Edward, and escorts you to the printer, which is jammed. After you fix the printer, the existing print job completes. As the paper comes out, you notice that one of them is marked confidential and has to do with an upcoming merger. You go to Mr. Magorium's and say, Hi Edward, your printer is fixed and working perfectly. Mr. Magorium then escorts you off the premises. When you get home that evening, you tell your spouse about the merger document you saw. The next day, you call Mr. Magorium to verify that the printer is still functioning properly.
  240.  
  241.     Which of the following professionalism principles is the technician failing to follow?
  242.     > Deal with confidential materials appropriately.
  243.  
  244. * You've just installed a new video card in a user's Windows workstation. When the system is powered on, the screen is displayed in 16 colors at 640x480 resolution.
  245.  
  246.     Which of the following will BEST resolve this problem?
  247.     > Download and install the latest driver from the video card manufacturer's website.
  248.  
  249. * Alice recently purchased a new cell phone. After her vacation, Alice wanted to transfer her holiday photos to her computer, where she could do some touchup work before sending the pictures to her children. When Alice attached herphone to her computer, she saw that Windows detected her phone and tried to load the applicable software to give her access to her phone. Unforunately, after trying for several minutes, Windows displayed a message indicating that it was unsuccessful. When Alice explored her available drives, her phone was not listed.
  250.  
  251.     Which of the following would be the BEST administrative tool to help Alice gain access to her phone?
  252.     > Device Manager
  253.  
  254. * You have decided to install a new Ethernet network adapter in your Windows 10 desktop computer. After installing the card and booting to Windows, you notice that you have no network connection. After looking in Device Manager, you see that the new network card was detected, but Windows doesn't know what it is. After doing a quick search on the internet, you find what looks like the correct driver and install it. A reboot of Windows is performed, but almost immediately after logging on, your computer crashes. Thinking this must be a fluke, you reboot again with the same result.
  255.  
  256.     Which of the following is the BEST tool to get Windows to load properly?
  257.     > Boot to Safe Mode and uninstall the network driver.
  258.  
  259. * You have just installed a new hardware device, upgraded the driver, and installed the custom software that came with the device. Now you can't get the device to work.
  260.  
  261.     Which of the following troubleshooting steps is the BEST to try first?
  262.     > Run any diagnostic software that came with the device
  263.  
  264. * Which system utility would you use to troubleshoot hardware devices, examine and control the resources used by specific devices, and install updated device drivers?
  265.     > Device Manager
  266.  
  267. * A user complains that his USB scanner no longer works. You check Device Manager and see an icon with a black down arrow on it. What should you do?
  268.     > ERnable the device in Device Manger
  269.  
  270. * You have just installed a new device in your Windows system. After installation, you can't use the device. You check Device Manager and find an icon for the device with a yellow exclamation mark over it. What should you do?
  271.     > Download the latest driver from the manufacturer's website.
  272.  
  273. * A user installs a new graphics application on her Windows system. During the installation process, the application prompts the user to load a custom video driver that has been optimized for the application. She does so and then completes the installation.
  274.  
  275. Several days later, the user reports that her display doesn't seem to be working properly under some conditions. To fix this problem, you need to reload the old video driver.
  276.  
  277.     Which of the following actions are the BEST choices? (Select TWO).
  278.     > Use Device Manager to roll back the video driver.
  279.     > Revert the system to a restore point prior to installing the video driver.
  280.  
  281. * You have just connected a new USB device to your Windows system. You used the installation disc that came with the device to install the drivers needed to support the device. Since the installation, the system frequently crashes when you try to access the new device.
  282.  
  283.     Which of the following steps would MOST likely resolve this issue?
  284.     > Download and install the latest driver from the manufacturer's website.
  285.  
  286. * During the POST, you receive the following message:
  287.  
  288. Keyboard not present. Press F1 to continue.
  289.  
  290.     What are the most likely causes of this error message? (Select TWO.)
  291.     > A poor keyboard connection
  292.     > A stuck key on the keyboard
  293.  
  294. * You have just installed several devices to a computer at once, but now the computer fails to boot properly.
  295.  
  296.     Which of the following troubleshooting steps is the BEST to try first?
  297.     > Remove all of the newly added devices and install them one at a time.
  298.  
  299. * You are trying to connect a new USB device to your computer. You install the driver and then connect the device to an open USB port. The device does not work.
  300.  
  301.     Which of the following troubleshooting steps is the BEST to try first?
  302.     > Make sure the USB device is plugged in properly.
  303.  
  304. * In which of the following situations would driver rollback be the BEST tool to use?
  305.     > You recently installed a new video driver, and now the system behaves erratically.
  306. [CHAPTER 4]
  307.  
  308. [CHAPTER 5]
  309. * Which Blu-ray standrad definse rewritable disks?
  310.     >BD-RE
  311.  
  312. * Which optical media has the greatest storage capactity?
  313.     > Single-layer, single-sided Blu-ray disc
  314.  
  315. * You have a CD-RW drive that advertises speeds of 32x/12x/48x. What is the read speed of the drive?
  316.     > 48x
  317.  
  318. * Match each label on the left with the correct characteristics on the right.
  319.  
  320.     First developed to store digital music. Later, was adapted to store digital computer data.
  321.     > Compact Disc (CD)
  322.     Can be written, read many times, erased, rewritten, and has a capactiy of about 650 MB.
  323.     > Compact Disc (CD-RW)
  324.     Single-sided discs can hold about 4.8 GB of data. Dual-layer discs can hold up to 8.5 GB of data.
  325.     > Digital Versatile Disc (DVD)
  326.     Dual-layer version employs two recordable dye layers, each capable of storing data.
  327.     > Digital Versatile Disc (DVD-RW)
  328.     Uses blue laser light, which has a short wavelength, allowing data to be packed more tightly onto the disc and is rewritable.
  329.     > Blu-ray Disc (BD-RE)
  330.     Was originally developed for high-definition video (and expanded content on movie discs), but can also be used for data storage.
  331.     > Blu-ray Disc (BD)
  332.  
  333. * Which of the following are optical storage devices? (Select THREE.)
  334.     > CD
  335.     > DVD
  336.     > BD
  337.  
  338. * Due to a blackout, power is no longer coming from the wall outlet, and your computer is now off. You do not have a UPS, and you need to remove a disc out of the DVD drive. What is the easiest method for retrieving the disc?
  339.     > Push an unbent paper clip into the hold on the front of the drive.
  340.  
  341. * You work for a small company as the human resources specialist. Since the company is fairly small, you are maintaining all of the employee information on your desktop computer, which is running Windows 10. This computer has two high-capacity hard disks. You want to ensure that the information is protected from a hard disk failure, so you want to set up a Windows software RAID system.
  342.  
  343.     Which of the following would be your BEST solution?
  344.     > Use mirrored volumes.
  345.  
  346. * You are running Windows 10 on your computer. You want to decrease the time it takes to write data to your drives. To do this, you have decided to create a Windows software RAID system using a striped volume.
  347.  
  348.     Before you create the striped volume, which action MUST you take?
  349.     > Convert basic disks to dynamic disks.
  350.  
  351. * One of your customers wants you to build a personal server that he can use in his home. One of his concerns is making sure he has at least one backup of their data stored on the server in the event that a disk fails. You have decided to back up his data using RAID. Since this server is for personal use only, the customer wants to keep costs down. Therefore, he would like to keep the number of drives to a minimum.
  352.  
  353.     Which of the following RAID systems would BEST meet the customer's specifications?
  354.     > RAID 1
  355.  
  356. * Ben is concerned about losing data due to a hard disk failure. His computer will only support a maximum of three disks. To protect his data, you have decided to use RAID (redundant array of independent disks).
  357.     Which of the following RAID types would give Ben the BEST mirrored data protection?
  358.     > RAID 1
  359.  
  360. * You have been asked to configure the drives in a computer. The end user wants to use striping without incorporating any fault tolerance.
  361.  
  362.     Which of the following will BEST meet these requirements?
  363.     > RAID 0
  364.  
  365. * You are building a new computer that will contain two hard disks. To provide increased performance, you have decided to configure the drives using RAID technology.
  366.  
  367.     Which of the following will BEST meet your needs?
  368.     > RAID 0
  369.  
  370. * You have a computer with three hard disks. A RAID 0 volume uses space on Disk 1 and Disk 2. A RAID 1 volume uses space on Disk 2 and Disk 3. Disk 2 fails. Which of the following is true?
  371.     > Data on the RAID 1 volume is accessible; data on the RAID 0 volume is not.
  372.  
  373. * A computer being used by the HR department needs to ensure that all of the data on that computer is protected from a single hard disk failure. The data needs to be read as quickly as possible, and the HR department would like to maxmimize drive use as much as possible. This computer can use up to three hard drives.
  374.  
  375.     Which of the following RAID types would meet these requirements and provide the BEST data protection?
  376.     > RAID 5
  377.  
  378. * What is an advantage of RAID 5 over RAID 1?
  379.     > RAID 5 improves performance over RAID 1.
  380.  
  381. * You ahve been asked to implement a RAID 5 solution for an enginerr's desktop workstation. What is the minimum number of hard disks that can be used to configure RAID 5?
  382.     > 3
  383.  
  384. * One of the video editors in your company is worried that he may lose a lot of data if his hard drive fails. He has hasked you to come up with a solution. To do this, you have decided to implement a RAID 10 solution on his desktop workstation.
  385.  
  386.     Which of the following is the MINIMUM number of hard disks that can be used?
  387.     > 4
  388.  
  389. * Which of the following drive configurations uses striping with parity for fault tolerance?
  390.     > RAID 5
  391.  
  392. * You are configuring a new system, and you want to use a RAID 0 array for the operating system using SATA disks and the RAID functionality built into the motherboard.
  393.  
  394.     Which of the following BEST describes the action you will take as part of the configuration?
  395.     > Load the RAID drivers duing operating system installation.
  396.  
  397. * You have an existing computer running Windows 10. You want to configure a RAID 1 array in the computer. You install two new SATA drives, then use the RAID controller integrated in the motherboard to define a RAID 1 array using them. When you boot the computer, Windows does not show the logical RAID drive. What should you do?
  398.     > Install the drivers for the RAID controller.
  399.  
  400. * You are in the process of preparing a storage device and must determine which file system to use.
  401.  
  402.     Which of the following BEST describes the advantage of using the exFAT file system rather than NTFS?
  403.     > Lower memory and procssor resource use
  404.  
  405. * You have just purchased a new USB drive that you want to use to troubleshoot the computers in your company as well as other network devices, such as printers and projectors. You need to format this new drive with a file system that will be recognized and used on all devices.
  406.  
  407.     When formatting your USB drive, which of the following file system types would meet MOST, if not all, of your needs?
  408.     > FAT32
  409.  
  410. * You are installing Windows 10 on a drive that was previously used for Windows 8.1. This drive has one primary partition. While isntalling Windows, you want to ensure that the old files are deleted and any bad sectors are located and marked as bad.
  411.  
  412.     To achieve your desired goal,w hich of the following is the BEST option to run?
  413.     > Full format
  414.  
  415. * What is required to control access to the file system using file and folder permissions on a Windows-based computer?
  416.     > NTFS-formatted partition
  417.  
  418. * You have added two new hard disks to a Windows computer. The disks are configured as basic disks.
  419.  
  420.     Which of the following could be configured on these disks? (Select TWO).
  421.     > Extended partitions with logical drives
  422.     > Primary partitions
  423.  
  424. * You have an extra disk on your system that has three primary partitions and an extended partition with two logical drives. You want to convert the partitions to simple volumes, preferably without losing any data.
  425.  
  426.     Which of the following is the BEST step to perform?
  427.     > Upgrade the disk to a dynamic disk.
  428.  
  429. * While configuring a computer, you find that you need to create, format, and manage the partitions and volumes on your hard drives.
  430.  
  431.     Which of the following is the BEST command line utility to use?
  432.     > DiskPart
  433.  
  434. * Match each disk type of the left with its corresponding description/features on the right. Each disk type may be used once, more than once, or not at all.
  435.  
  436.     Supports up to 128 volumes.
  437.     > Dynamic disks
  438.     Use primary and extended partitions
  439.     > Basic disks
  440.     Are supported by all operating systems.
  441.     > Basic disks
  442.     Support volumes that use discontigous disk space.
  443.     > Dynamic disks
  444.     Store partitioning information in a hidden database on all such disks in the system.
  445.     > Dynamic disks
  446.     Only support volumes made up of contigous disk space.
  447.     > Basic disks
  448.  
  449. * If you want to boot from a hard drive, what must it have?
  450.     > Active partition
  451.  
  452. * Which partition type identifies the partition as one that holds the boot loader program used to start the operating system?
  453.     > Active
  454.  
  455. * Which of the following is true about primary partitions?
  456.     > The active partition must be a primary partition.
  457.  
  458. * You want to set up a Windows system to also be able to boot to Linux. To be able to dual boot, the system needs a partition on which to install Linux. However, you don't have an extra hard disk that can be used for the Linux partiion. The existing disk has no unpartitioned space available, but it has about 300 GB of free space.
  459.  
  460.     Which of the following disk management operations will BEST prepare your hard disk for dual boot?
  461.     > Shrink the primary partition
  462.  
  463. * Which disk types does Windows support? (Select TWO.)
  464.     > Basic
  465.     > Dynamic
  466.  
  467. * Which of the following conditions would prevent you from using a GUID Partition Table (GPT) when setting up a disk drive?
  468.     > You're setting up the drive to boot Windows 10 on a computer that uses traditional BIOS.
  469.  
  470. * You have four volumes on a basic hard disk. You convert the disk to dynamic.
  471.  
  472.     After the conversion, which of the following are you MOST likely to see as the status of the fourth volume if it is valid and has no errors?
  473.     > Healthy
  474.  
  475. * Match the disk status on the left with the corresponding description on the right. Each status may be used once, more than once, or not at all.
  476.  
  477.     Shows while a disk is being converted from a basic disk to a dynamic disk.
  478.     > Initializing
  479.     Indicates that the disk is turned on and can be accessed and the volume on the disk is valid and has no errors.
  480.     > Healthy
  481.     Indicates that errors have occurred on physical or dynamic disks.
  482.     > Unavailable
  483.     Shows when a dynamic disk has been removed or turned off.
  484.     > Offline
  485.  
  486. * You have four volumes on a basic hard disk.
  487.  
  488.     Which of the following are you MOST likely to see as the status of the fourth volume if it is valid and has no errors?
  489.     > Healthy (Logical Drive)
  490.  
  491. * You have just added a brand new hard disk to your Windows-based computer. When you power on the computer, the disk is not shown in File Explorer. To troubleshoot this issue, you open the Windows Disk Management console and see that the disk is present, but is shown as Unknown.
  492.  
  493.     Which of the following disk management steps is MOST likely required first?
  494.     > The disk needs to be initialized.
  495.  
  496. * You have a disk in your system that is displayed in the Disk Management utility, as shown in the image below. The disk icon includes a red arrow that is pointing down.
  497.  
  498.     Which of the following would you expect to see, in the space where the red outline is, as the status of this disk?
  499.     > Not initialized
  500.  
  501. * You have a DVD-ROM disc with no label, and you want to know if it has any important files on it. You insert the DVD-ROM into your optical media drive, then you double-click the drive letter for the optical drive to see the contents of the disc.
  502.  
  503.     If the DVD-ROM is not a valid disc, which error message will you see?
  504.     > No Media
  505.  
  506. * You have a hard disk that is formatted with the FAT32 file system. You would like to implement file and folder permissions on the Design folder that apply when files are accessed both locally and remotely.
  507.  
  508.     Which of the following BEST describe the next step you need to perform?
  509.     > Use the conver command to conver from FAT32 to NTFS and then configure NTFS permissions.
  510.  
  511. * You have just finished installing Windows on a system that ocntains four physical hard disks. The installation process has created a system volume and  C: volume on the first disk (Disk 0). The installation process also initialized the second disk (Disk 1) and the third disk (Disk 2), but did not create any volumes on these disks.
  512.  
  513.     Which of the following would you expect to see as the status of Disk 1 and Disk 2?
  514.     > Unallocated
  515.  
  516. * Your computer's hard drive is currently formatted as FAT32, but you want to take advantage of the features offered to NTFS drives.
  517.  
  518.     Which of the following steps would MOST likely allow you to do this without losing the existing data?
  519.     > Use the convert command at a command prompt.
  520.  
  521. * You have a computer with a single hard disk configured as a basic disk with a single partition formatted with NTFS. The computer runs Windows 10. The disk has runo ut of space. You need to add space to the disk. You install a new hard drive and start Disk Management.
  522.  
  523.     Which of the following is a required task to add space to the existing volume?
  524.     > On the new hard disk, create a new partition without a drive letter.
  525.  
  526. * Your computer has a single hard disk with a single volume used by the C:\ drive. You have previously upgraded the disk to a dynamic disk. The disk has run out of disk space. You need to add more space to the C:\ volume. You add a new hard disk to the computer.
  527.  
  528.     Which of the following is the BEST step to complete while adding space to the C:\ drive?
  529.     > Create a mount point using space on the second disk.
  530.  
  531. * What tool would you use to create and delete partitions on hard drives?
  532.     > Disk Management
  533.  
  534. * Which of the following is a characteristic of extended partitions?
  535.     > They are subdivided into logical drives.
  536.  
  537. * Your system volume is running out of disk space. You need to extend the system volume to give it more space.
  538.  
  539.     Which of the following conditions MUST be met to extend the system volume? (Select TWO).
  540.     > The disk must have contigous free space on the same disk.
  541.     > The system volume must be formatted with NTFS
  542.  
  543. * You want to combine storage space from two different hard disks into a single logical storage unit on your Windows computer.
  544.  
  545.     Which of the following is the BEST step to perform?
  546.     > Use dynamic disks and a spanned volume.
  547.  
  548. * Check Disk detects disk integrity errors and fixes them. MAtch the types of errors Check Disk detects and fixes on the left with the error descriptions on the right.
  549.  
  550.     A series of used clusters on the hard disk drive that are not associated with a specific file.
  551.     > Lost clusters
  552.     Occurs when two files claim the same cluster.
  553.     > Cross-linked file
  554.     Files that exist on the hard drive but are not associated with a directory in the index.
  555.     > Orphaned files
  556.     A portion of the hard disk that cannot be used
  557.     > Bad sector
  558.  
  559. * You are an IT administrator troubleshooting a computer from within the Windows command prompt. You are trying to execute the chkdsk command line tool, but it keep failing.
  560.  
  561.     Which of the following command switches would give you the BEST information or help on how to run this command?
  562.     > chkdsk /?
  563.  
  564. * Which of the following Windows command line utilities would you use to realign the file structure ont he disk to optimize performance?
  565.     > defrag
  566.  
  567. * Which of the following disk maintenance utilities locates and disposes of files that can be safely removed from the disk?
  568.     > Disk Cleanup
  569.  
  570. * Which of the following disk maintenance utilities optimizes the performance of your hard drive by joining parts of files that are in different locations on your hard drive to a single location?
  571.     > Disk Defragmenter
  572.  
  573. * Which of the following disk maintenance utilities optimizes the performance of your hard drive by verifying the file system integrity of a hard disk and fixing the errors it detects?
  574.     > Check Disk
  575.  
  576. * Your computer currently uses a 5,400 RPM hard disk. You want to improve your computer's overall performance by optimizing your hard disk performance.
  577.  
  578.     Which of the following would be the MOST effective means for optimizing your hard disk performance? (Select TWO).
  579.     > Uprade your hard disk interface to SATA 3.
  580.     > Upgrade to a 10,000 RPM hard disk.
  581.  
  582. * Which of the following utilities checks the disk for bad clusters?
  583.     > chkdsk
  584.  
  585. * Which of the following utilities would you use to correct cross-linked clusters within the file system on a Windows workstation?
  586.     > chkdsk
  587.  
  588. * You have used your computer for several months without any issues. Recently, you have noticed that when you perform specific actions or open certain files, your computer crashes, and programs sometimes freeze. You suspect that hard disk issues are the cause.
  589.  
  590.     Which of the following tools would BEST verify and fix disk errors?
  591.     > chkdsk
  592.  
  593. * One day, while trying to start your Windows 10 system, you see the following error displayed:
  594.  
  595. Could not read from the selected boot disk. Check boot path and disk hardware.
  596.  
  597.     Which of the following will MOST likely fix the problem?
  598.     > Boot into the recovery environment and run the bootrec /rebuildbcd command.
  599.  
  600. * You have just finished upgrading the 250 W power supply in your desktop computer to a 450 W power supply. Now the BIOS doesn't recognize one of the hard disk drives in the system during POST.
  601.  
  602.     Which of the following steps is the BEST to try first?
  603.     > Make sure that the hard disk is connected to the power supply.
  604.  
  605. * You have physically installed a new hard disk drive in your computer and configured the disk in the BIOS using the CMOS setup program. You try to access the hard disk drive in Windows Explorer, but the drive is not displayed.
  606.  
  607.     > Which of the following utilities will you MOST likely use to solve the problem?
  608.     Disk Management
  609.  
  610. * Lately, you hear a clicking noise when reading or writing data from the hard disk. What is the most likely case of the clicking?
  611.     > Failing hard drive
  612.  
  613. * You have just finished upgrading the power supply in your desktop computer. Now the hard disk will not work.
  614.  
  615.     What should you do first?
  616.     > Make sure the power connectors on the hard disk are plugged in all of the way.
  617.  
  618. * You have just finished installing a new SATA hard disk in your computer. Now your SATA DVD drive won't work.
  619.  
  620.     Which of the following troubleshooting steps is the BEST to try first? (Select TWO).
  621.     > Make sure that the DVD power cable is connected.
  622.     > Make sure that the DVD SATA cable is connected.
  623.  
  624. * You have just received a frantic call from a customer. She informs you that after turning her computer on, she received the following error:
  625.  
  626. The SMART hard disk check has detected an imminent failure.
  627.  
  628.     Which of the following is the BEST first step to take?
  629.     > Back up all important data and files.
  630.  
  631. * You have a computer with a removable disk drive that has been formatted with NTFS. You want the drive to use FAT32 to be comptible with more operating systems. The drive is currently configured using drive letter D:.
  632.  
  633.     Which of the following actions MUST you complete to make the desired changes?
  634.     > Back up the data on the D: drive. Reformat the D: drive using FAT32. Restore the data.
  635.  
  636. * You have a computer running Windows 10 Home. You need to access the contents of a flash drive. The flash drive has been formatted with the exFAT file system. You want ot read the flash drive on your computer as quickly as possible with the least amount of effort. What should you do?
  637.     > Do nothing. Windows 10 can natively access exFAT file systems.
  638.  
  639. * While troubleshooting a Windows workstation, you find that the computer has several cross-linked clusers within the file system.
  640.  
  641.     Which of the following utilities would MOST likely fix this issue?
  642.     > chkdsk
  643.  
  644. * Which of the following refers to a situation where two files try to claim the same cluster on the hard disk?
  645.     > Cross-linked clusters
  646.  
  647. * You have physically installed a new hard disk drive in your computer, configured the disk in the BIOS using the CMOS setup program, and partitioned the disk. You try to access the hard disk drive in Windows Explorer, but get an error message. Which utility will you most likely use to solve the problem?
  648.     > format
  649.  
  650. * You have a hard disk that has a single primary partition and has been assigned D: as the drive letter. Which tool would you use to configure the drive to use the FAT32 file system?
  651.     > format
  652.  
  653. * You have an existing computer running Windows 10 Enterprise. You want to configure a RAID 5 array in the computer. You install three new SATA drives and then use the RAID controller integrated into the motherboard to define a RAID 5 array using them. When you boot the computer, Windows does not show the logical RAID drive you just created. What should you do?
  654.     > Install the drivers for the motherboard RAID controller.
  655. [CHAPTER 5]
  656.  
  657. [CHAPTER 6]
  658. * Which of the following terms refers to a network resource sharing model that uses access control lists saved on each computer?
  659.     > Peer-to-peer
  660.  
  661. * Match the network types on the left with the descriptions on the right. Each network type may be used once, more than once, or not at all.
  662.  
  663.     A network in a small geographic area that typically uses wires to connect systems together.
  664.     > Local Area Network (LAN)
  665.     A small network used for connecting devices, such as a notebook computer, a wireless headset, a wireless printer, and a smartphone.
  666.     > Personal Area Network (PAN)
  667.     A network that is typically owned and managed by a city as a public utility.
  668.     > Metropolitan Area Network (MAN)
  669.     A group of networks that are geographically isolated, but are connected to form a large internetwork.
  670.     > Wide Area Network (WAN)
  671.     Similar to a standard LAN, but uses radio signals instead of wires to connect systems together.
  672.     > Wireless Local Area Network (WLAN)
  673.     A network that covers an area as small as a few city blocks to as large as an entire city.
  674.     > Metropolitan Area Network (MAN)
  675.     A set of subnets connected to each other, typically by wires, using at least one router.
  676.     > Local Area Network (LAN)
  677.  
  678. * A group of workers in an office space communicate with each other on their smartphones and tablet devices through an ad hoc network linked using Bluetooth technology protocols.
  679.  
  680.     Which of the following network types is in use?
  681.     > Personal Area Network (PAN)
  682.  
  683. * You have a network that uses a logical bus topology. How do messages travel through the network?
  684.     > Messages are broadcast to all devices connected to the network.
  685.  
  686. * You have a network that uses a logical ring topology. How do messages travel through the network?
  687.     > Messages travel from one device to the next until they reach the destination device.
  688.  
  689. * You have implemented an ad hoc wireless network that doesn't employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network. What type of physical network topology has been implemented in this type of network?
  690.     > Mesh
  691.  
  692. * You have been asked to implement a network infrastructure that will accommodate failed connections. Which of the following network topologies provides redundancy for a failed link?
  693.     > Mesh
  694.  
  695. * Which of the following topologies connects each network device to a central hub?
  696.     > Star
  697.  
  698. * What device is used to create a physical star topology?
  699.     > Switch
  700.  
  701. * Which of the following is the best definition of a LAN?
  702.     > A network in a small geographic area, like in an office.
  703.  
  704. * A customer is upgrading the routers and switches in their network. The signal source in these network devices is a light-emitting diode.
  705.  
  706.     Which of the following network cabling options is MOST likely being used in this upgrade?
  707.     > Multimode fiber
  708.  
  709. * Currently, the users in your company are required to use their IP addresses when connecting to other hosts. Since IP addresses are difficult to remember, you want to implement a protocol on your network that allows computers to automatically find another host's IP address using a logical name.
  710.  
  711.     Which of the following protocols would be the BEST to implement?
  712.     > DNS
  713.  
  714. * A technician determines that an older network hub that connects 24 workstations is performing poorly due to exceissive network collisions.
  715.  
  716.     Which of the following network devices would be the BEST replacement?
  717.     > Switch
  718.  
  719. * Which of the following LAN devices receives a signal on one port and forwards that signal only to the port where the destination device is connected?
  720.     > Switch
  721.  
  722. * Which of the following best describes how a switch functions?
  723.     > It connects multiple cable segments or devices and forwards frames to the appropriate segment.
  724.  
  725. * Which of the following hardware devices regenerates a signal out all connected ports without examining the frame or packet contents?
  726.     > Hub
  727.  
  728. * How do switches and bridges learn where devices are located on a network?
  729.     > When a frame enters a port, the source MAC address is copied from the frame header.
  730.  
  731. * You are the network technician for a small company. One of your responsibilities is to ensure that all new hardware is connected and functioning properly. You have several different types of connections that are used for various types of hardware. One of the types of cable available to you is an RJ45 cable.
  732.  
  733.     Which of the following BEST describes where this cable would most likely be used?
  734.     > Voice over IP connection
  735.  
  736. * Which of the following protocols carry phone calls over an IP-based network?
  737.     > VoIP
  738.  
  739. * Which network component connects a device to the transmission media and allows it to send and receive messages?
  740.     > Network interface card
  741.  
  742. * Which of the following statements accurately describes how a modem works? (Select TWO.)
  743.     > It demodulates analog data from a telephone network into digital PC data.
  744.     > It modulates digital data from the PC into analog data and transmits it on a telephone network.
  745.  
  746. * Which of the following is a valid MAC address?
  747.     > C0-34-FF-15-01-8E
  748.  
  749. * An 8-port switch receives a frame on port number 1. The frame is addressed to an unknown device. What will the switch do?
  750.     > Send the frame out ports 2-8.
  751.  
  752. * You have a computer with an onboard LAN adapter. The LAN adapter has failed, and you are unable to connect the computer to the network. What should you do?
  753.     > Add a network card using a PCI slot.
  754.  
  755. * A technician is replacing a cable mode. The cable from the cable company has an inner solid wire conductor and an outer mesh conductor separated by PVC plastic insulation.
  756.  
  757.     Which of the following network cable types is being used?
  758.     > Coaxial cable
  759.  
  760. * Which of the following are characteristics of coaxial network cable? (Select TWO.)
  761.     > It has a conductor made from copper in the center of the cable.
  762.     > It uses two concentric metallic conductors.
  763.  
  764. * A technician is installing a cable modem that supplies internet connectivitiy for a home office.
  765.  
  766.     Which of the following cabling types would be used to connect the cable modem to the cable wall outlet?
  767.     > RG6
  768.  
  769. * A technician is running a network above a dropped ceiling that is also used for ventiliation. The cable must be twisted pair and must be capable of Gigable Ethernet speeds.
  770.  
  771.     Which of the following cables should be used?
  772.     > Plenum-rated CAT-6a
  773.  
  774. * You are installing networking cable in the air space between the ceiling and the roof of a building. Which type of cabling should you use?
  775.     > Plenum
  776.  
  777. * Which kind of connector do you use to connect a modem to a standard telephone line?
  778.     > RJ11
  779.  
  780. * Which connector is used with unshielded twisted pair (UTP) cable?
  781.     > RJ45
  782.  
  783. * You have recently been called to troubleshoot network connectivity at a user's workstation. You have found that the network cable runs across high-traffic areas on the floor, causing the cable to wear through and break. You have replaced the cable with a plenum-rated and shielded twisted pair cable. You would like to minimize the problem and prevent it from happening again.
  784.  
  785.     Which of the following will BEST protect the cable from further damage?
  786.     > Run the cable through the ceilling area instead of across the floor.
  787.  
  788. * What is a major benefit STP provides that UTP does not?
  789.     > Greater resistance to interference
  790.  
  791. * A technician connects two network switches using a twisted pair cable. Neither switch supports auto-uplinking.
  792.  
  793.     Which of the following identifies the TIA wiring standard required on each end of the cable?
  794.     > One end must be T568A, and the other must be T568B.
  795.  
  796. * You are using a crimper to attach an RJ45 connector to a Cat 6 UTP cable. You need to use the T568A standard to connect the individual wires to the connector. Which wire should be connected to pin 1?
  797.  
  798.     > Green with white
  799.  
  800. * A technician must press a cable connector's retaining tab to remove a faulty fiber optic network cable.
  801.  
  802.     Which of the following connectors does the cable use?
  803.     > LC
  804.  
  805. * Which of the following are advantages of using fiber optic cabling for a network, as opposed to other types of cabling? (Select TWO.)
  806.     > Immunity to electromagnetic interference.
  807.     > Greater cable distances without a repeater
  808.  
  809. * Match the fiber optic cable types on the left with the appropriate characteristics on the right. Each cable type may be used once, more than once, or not at all.
  810.  
  811.     Data transfers through the core using more than one light rays.
  812.     > Multimode
  813.     The core diameter is around 10 microns.
  814.     > Single mode
  815.     Cable lengths can extend a great distance
  816.     > Single mode
  817.     Cable lengths are limited in distance.
  818.     > Multimode
  819.  
  820. * Which of the following is a wired networking method most commonly used today by desktop PCs and other network devices to connect to a local area network?
  821.     > Ethernet
  822.  
  823. * You have just signed up for a broadband home internet service that uses coaxial cable. Which connector type will you most likely use?
  824.     > F-type
  825.  
  826. * Match the types of Ethernet connectivity devices on the left with the corresponding descriptions on the right. Each type of Ethernet connectivitiy device may be used once, more than once, or not at all.
  827.  
  828.     Connects segments on the same subnet. Forwards signals to only the port connected to the destination device.
  829.     > Switch
  830.     Can be used to connect wireless clients to wired clients on the same network.
  831.     > Bridge
  832.     Connects two network segments that have different subnet addresses.
  833.     > Router
  834.     Connects segments on the same subnet. Repeats signals out to all other ports.
  835.     > Hub
  836.     Operates in full-duplex mode, meaning devices can both send and receive data at the same time.
  837.     > Switch
  838.     Operates in half-duplex mode, meaning devices can either send or receive data at any given time.
  839.     > Hub
  840.     Uses the IP addresses within a packet to move packets between networks
  841.     > Router
  842.  
  843. * Which of the following devices allows network communications to be transmitted over existing AC power lines?
  844.     > Ethernet over Power
  845.  
  846. * Which of the following devices can be used to distribute electrical power along with network data on twisted-pair Ethernet cabling (CAT 5 or higher)?
  847.     > Power over Ethernet
  848.  
  849. * Your netowkr follows the 1000Base-T specifications for Gigabit Ethernet.
  850.  
  851.     Which of the following is the MAXIMUM cable segment length allowed?
  852.     > 100 meters
  853.  
  854. * Which of the following is true of a network using the 1000Base-T standard? (Select TWO.)
  855.     > The network uses copper UTP cables.
  856.     > The network operates at one gigabit per second.
  857.  
  858. * A medican center wants to upgrade their network backbone to 10-Gigabit Ethernet (10 Gbps) so they can perform daily backups of large amounts of data to the secure on-site storage area network (SAN) without bogging down the network. Some of the backbone segments will have to reach between buildings that are close to 300 meters apart.
  859.  
  860.     Which of the following cable types BEST supports the 10-Gigabit Ethernet at the necessary segments lengths while keeping costs as low as possible?
  861.     > Multimode fiber optic
  862.  
  863. * Which type of fiber optic cable supports 10 Gigabit Ethernet with a maximum segment length of up to 40 km?
  864.     > 10GBaseER single-mode
  865.  
  866. * Which of the following are valid IP addresses? (Select TWO.)
  867.     > 172.16.1.26
  868.     > 2.2.2.2
  869.  
  870. * Which of the following are not valid IP addresses? (Select THREE.)
  871.     > 257.0.122.55
  872.     > 145.8.260.7
  873.     > 45.22.156.256
  874.  
  875. * You want to implement name resolution on the Linux workstations in your company. Which protocol will you use to do this?
  876.     > DNS
  877.  
  878. * You want to allow your users to download files from a server running the IP protocol. You want to protect access to the files by requiring user authentication to access specific-directories ont he server. Which IP protocol should you implement to provide this capability?
  879.     > FTP
  880.  
  881. * Which of the following protocols is used by an email client to retrieve messages from an email server and gives users the option to keep mail messages on the server?
  882.     > IMAP
  883.  
  884. * You want to use your Windows workstation to browse the websites on the ineternet. You use a broadband DSL connection to access the internet. Which network protocol must be installed on your workstation to do this?
  885.     > IP
  886.  
  887. * Match each port number on the left with its associated protocols on the right.
  888.  
  889.     Secure Shell (SSH)
  890.     > 22
  891.     Apple Filing Protocol (AFP)
  892.     > 548
  893.     HTTP over SSL (HTTPS)
  894.     > 443
  895.     Hypertext Transfer Protocol (HTTP)
  896.     > 80
  897.     Server Message Block (SMB/CIFS) directly over TCP
  898.     > 445
  899.     Service Location Protocol (SLP)
  900.     > 427
  901.     Internet Message Access Protocol (IMAP)
  902.     > 143
  903.  
  904. * An administrator configures a server to run the TCP/IP suite protocol that allows users to download files contained in specific directories on the server and also protects access to those files by requiring user authentication.
  905.  
  906.     Which of the following TCP/IP port numbers allow this protocol to work properly? (Select TWO).
  907.     > 20
  908.     > 21
  909.  
  910. * To assist a user, a help desk technician is able to take advantage of a Windows proprietary network protocol that allows the technician to open a graphical interface to connect with the user's Windows computer.
  911.  
  912.     Which of the following TCP/IP port numbers is the default port used by this protocol?
  913.     > 3389
  914.  
  915. * While making an online bank transaction, a customer checks to see that the web browser is displaying a lock icon that indicates that an encrypted TCP/IP suite protocol is being used.
  916.  
  917.     Which of the following TCP/IP port numbers does this protocol typically use when the browser encrypts its communications with the bank's web server?
  918.     > 443
  919.  
  920. * A user is configuring an email client application and plans to use a standard TCP/IP suite protocol to retrieve email messages from an email server.
  921.  
  922.     Which of the following TCP/IP suite protocols can be used to retrieve email messages? (Select TWO).
  923.     > Internet Message Access Protocol (IMAP)
  924.     > Post Office Protocol (POP3)
  925.  
  926. * While working on a Windows workstation, you've enabled Remote Desktop.
  927.  
  928.     Which of the following ports MUST be opened in the server's firewall to allow remote clients to access the desktop?
  929.     > 3389
  930.  
  931. * You've just installed the DNS server on a Windows server. Which port must be opened inh the server's firewall to allow clients to access the service?
  932.     > 53
  933.  
  934. * Which protocol is used to send email messages from a mail client to a mail server?
  935.     > SMTP
  936.  
  937. * You are a software developer, and you are creating a multimedia streaming application. Data will be streamed from your streaming server to streaming clients over IP networks. Which transport protocol should your application use to send data between the clients and the server?
  938.     > UDP
  939.  
  940. * You have a user who takes his laptop home every day after work. When he's working in the office, the laptop must get an IP address from the DHCP server so you configure it to obtain IP and DNS information automatically. When he's working form home, the laptop must use IP and DNS information that connects with his home network.
  941.  
  942.     Which IP addressing method can you use to make sure he gets a network connection at home?
  943.     > Alternate IP configuration
  944.  
  945. * A Windows workstation is configured to receive its IP configuration information from a DHCP server on the company network.The user at the workstation reports that she cannot use email and is unable to reach the internet. Using the ipconfig command, you see that the workstation has been assigned the following special IP configuration:
  946.  
  947. IP address: 168.254.0.1
  948. Subnet mask: 255.255.0.0
  949.  
  950.     What is this special IP configuration called?
  951.     > Automatic Private IP Addressing (APIPA)
  952.     Why did the workstation recieve this type of configuration?
  953.     > The workstation was unable to contact the DHCP Server
  954.  
  955. * Which of the following IP address ranges is reserved for Automatic Private IP Addressing?
  956.     > 168.254.0.1 - 169.254.255.254
  957.  
  958. * Given that your Windows workstation has Automatic Private IP Addressing (APIPA) implemented using default settings, which of the following TCP/IP addresses could be automatically assigned to the system should your DHCP server go down or become inaccessible?
  959.     > 169.254.1.26
  960.  
  961. * Which TCP/IP configuration parameter identifies the router that is used to reach hosts on remote networks?
  962.     > Default gateway
  963.  
  964. * Which of the following statements abou the Dynamic Host Configuration Protocol (DHCP) are true? (Select TWO.)
  965.     > A workstation must request addressing information from a DHCP server.
  966.     > It can deliver a DNS server address in addition to the host IP address.
  967.  
  968. * You are setting up a small network in your office with one Windows server and 50 Windows workstations. You want to spend as little time as possible configuring the workstations with IP addressing information. What should you do?
  969.     > Install and configure the DHCP service on your server.
  970.  
  971. * As the IT technician for your company, you need to ensure that IP addresses are automatically assigned to hosts while at the same time preventing the same address from being assigned twice.
  972.  
  973.     Which of the following services would be BEST to use?
  974.     > DHCP
  975.  
  976. * You are the IT technician for your company.
  977.  
  978.     Which of the following mechanisms would BEST allow you to resolve a hostname into its associated IP address? (Select TWO).
  979.     > DNS
  980.     > hosts file
  981.  
  982. * Nate, an employee in your organization, has started to work from home two days a week. Nate uses the same company laptop while working in the office and working at home.
  983.  
  984. Nate's laptop automatically connects to the wireless network in the office, but does not automatically connect to his home wireless network. Nate would like the laptop to connect automatically at home and at work.
  985.  
  986.     Which of the following would BEST allow this to happen?
  987.     > Configure an alternate TCP/IP configuration on the laptop's wireless adapater to use a static IP address that is compatible with the home network.
  988.  
  989. * A host on your network that provides a service that requires the server to always use the same IP address. Which IP addressing method can you use to manually assign the specific IP address?
  990.     > Static IP addressing
  991.  
  992. * While setting up a home office, a technician disables the DHCP service on the office router, but does not want to rely on link-local addressing.
  993.  
  994.     Which of the following IP addressing methods should be used?
  995.     > Static
  996.  
  997. * A technician is configuring the static TCP/IP settings on a client computer.
  998.  
  999.     Which of the following configurations are needed for internet communications? (Select THREE.)
  1000.     > DNS server address
  1001.     > Default gateway address
  1002.     > IP address including a subnet mask (IPv4) or subnet prefix length (IPv6)
  1003.  
  1004. * Which of the following are valid IPv6 addresses? (Select TWO.)
  1005.     > 6384:1319:7700:7631:446A:5511:8940:2552
  1006.     > 141:0:0:0:15:0:0:1
  1007.  
  1008. * Which of the following is a valid IPv6 address?
  1009.     > FEC0::AB:9007
  1010.  
  1011. * Which of the following correctly describes the most common format for expressing IPv6 addresses? (Select TWO.)
  1012.     > Hexadecimal numbers
  1013.     > 32 numbers, grouped using colons
  1014.  
  1015. * Which of the following describes an IPv6 address? (Select TWO.)
  1016.     > Eight hexadecimal quartets
  1017.     > 128-bit address
  1018.  
  1019. * Which of the following identifies the Interface ID component of an IPv6 address? (Select TWO.)
  1020.     > The last four quartets of an IPv6 address.
  1021.     > The last 64 bits of an IPv6 address.
  1022.  
  1023. * Which of the following identifies the prefix component of an IPv6 address? (Select TWO.)
  1024.     > The first 64 bits of an IPv6 address.
  1025.     > The first four quartets of an IPv6 address.
  1026.  
  1027. * The following is an example of an IPv6 address:
  1028.  
  1029. FEC0:1319:7700:F631:446A:5511:CC40:25AB
  1030.  
  1031.     Which part of the example IPv6 address is the prefix?
  1032.     > FEC0:1319:7700:F631
  1033.     Which quartet in the example IPv6 prefix is used to identify the subnet?
  1034.     > F631
  1035.     Which part of the example IPv6 address is the interface ID?
  1036.     > 446A:5511:CC40:25AB
  1037.  
  1038. * Which of the following describes the part of the IPv6 address that identifies the subnet address?
  1039.     > The last quartet in the IPv6 address prefix.
  1040.  
  1041. * You are configuring an ADSL connection. Which of the following will be part of the configuration? (Select TWO.)
  1042.     > RJ11 connectors
  1043.     > Filters or splitters
  1044.  
  1045. * Which actions allow you to access the internet on your laptop via a cellular network?
  1046.     > Install a cellular USB adpater in a open poirt on the laptop.
  1047.  
  1048. * Which of the following are options for connecting a computing device, such as a notebook computer or a tablet, to a cellular network? (Select FOUR.)
  1049.     > Use the device's Wi-Fi to connect to the network through a cellular Wi-Fi hot spot.
  1050.     > Use a USB cellular antennae to conect the device directly to the cellular network.
  1051.     > Use a USB cable to connect the device to the network through a smartphone.
  1052.     > Use an integrated cellular antennae to connect the device directly to the cellular network.
  1053.  
  1054. * Which of the following types of internet connection services can allow you to be truly mobile while maintaining your internet connection?
  1055.     > Cellular
  1056.  
  1057. * You are talking with a customer support technician on the telephone. The technician recommends downloading a particular driver from the internet. When you try to connect to the internet using your dial-up modem, you can't. What is the problem?
  1058.     > You need to hang up.
  1059.  
  1060. * Which type of network medium is used by an Integrated Services Digital Network (ISDN) adapter?
  1061.     > Copper telephone wire
  1062.  
  1063. * Which of the following network technologies is packaged as part of a BRI plan?
  1064.     > ISDN
  1065.  
  1066. * Which of the following are features of Basic Rate ISDN (BRI)? (Select THREE.)
  1067.     > One control channel
  1068.     > Dial-up connection
  1069.     > Two data Channels
  1070.  
  1071. * To access the internet through the Publicly Switched Telephone Network (PSTN), what kind of connectivity device must you use?
  1072.     > Modem
  1073.  
  1074. * A homeowner's connection to the internet is through an always-on modem that connects to existing telephone wiring and has a download speed of over 3 Mbps. The homeowner is able to make analog phone calls over the same wiring at the same time.
  1075.  
  1076.     Which of the following internet connection types is being used?
  1077.     > DSL
  1078.  
  1079. * A SOHO's connection to the inernet is through an antenna that sends and receives a microwave signal to the ISP's antenna. There can be no obstacles on the direct path between the two antennae.
  1080.  
  1081.     Which of the following internet connection types is being used?
  1082.     > Line-of-sight wireless
  1083.  
  1084. * A group of workers attend a team-building retreat at a remote cabin. They can place calls on their mobile smartphones, but the cabin has no wired phone, television, or wired internet connectivity. The workers need to access an internet webpage using their laptop computers.
  1085.  
  1086.     Which of the following internet connection types might be available to the workers?
  1087.     > Cellular
  1088.  
  1089. * A healthcare organization provides mobile clinics throughout the world and needs to transfer patients' statistical data to a central database via the internet. Which network technology should you select to ensure network connectivity for any clinic located anywhere in the world, even remote areas?
  1090.     > Satellite
  1091.  
  1092. * You are installing a satellite connection so your home office can connect to the internet. Which of the following statements is true?
  1093.     > The satellite dish must be pointed in the correct direction for communicating with the satellite.
  1094.  
  1095. * You are teh computer specialist in a small business. Your company server is named FS1 and has an IP address of 10.0.0.2. The hardware in your company server started to experience intermittent failures, so you transferred the shares on the server to a spare server and took the main server offline. The spare server has an IP address of 10.0.0.3. You edit the existing A record for FS1 on your company's DNS server and redirect the hostname to the spare server's IP address of 10.0.0.3.
  1096.  
  1097. Afterward, most users are able to access the shares on the spare server by hostname, but several users cannot. Instead, they see an error message indicating that the FS1 server could not be found.
  1098.  
  1099.     Enter the command you can run from the command prompt on these workstations that will allow them to access the shares on FS1 without performing a full restart.
  1100.     > ipconfig /flushdns
  1101.  
  1102. * Which of the following tools allow remote server management? (Select TWO.)
  1103.     > SSH
  1104.     > Telnet
  1105.  
  1106. * Which of the following utilities can you use from the command line on a Linux system to see a list of the installed network interfaces along with their current statuses and configurations?
  1107.     > ifconfig
  1108.  
  1109. * Which utility would you use to view current connections and active sessions and ports on a computer?
  1110.     > netstat
  1111.  
  1112. * You need to view detailed IP configuration information on a Windows workstation. In addition to the IP address, subnet mask, and default gateway configuration, you need to see the network card's MAC address and the addresses of the DHCP and DNS servers the workstation is communicating with.
  1113.  
  1114.     What command would you enter at the command line to see this detailed information?
  1115.     > ipconfig /all
  1116.     When you see the address of the DNS server, you realize that this information needs to be updated. Earlier in the day, you implemented a new DNS server with a new IP address. The workstation will update this information in 24 hours. What command can you enter at the command line to update the DNS server information right away?
  1117.     > ipconfig /flushdns
  1118.  
  1119. * Match each utility on the left with its corresponding description on the right. Each utility may be used once, more than once, or not at all.
  1120.  
  1121.     Resolves (looks up) the IP address of the specified hostname.
  1122.     > nslookup
  1123.     Tests connectivity between devices and shows the routers in the path between the two devices.
  1124.     > tracert
  1125.     Sends an ICMP echo request/reply packet to a remote host.
  1126.     > ping
  1127.     Displays current connections and incoming and outgoing connections
  1128.     > netstat
  1129.     A few simple replies to this request from the remote host indicates that a connection exists between sender and receiver.
  1130.     > ping
  1131.     Displays active sessions, ports, sockets, and the local routing table. 
  1132.     > netstat
  1133.     Performs a continuous connection test when used with the -t option.
  1134.     > ping
  1135.  
  1136. * You are an IT technician for your company and would like to be able to:
  1137. - Establish a remote server management session.
  1138. - Send unencrypted (clear text) transmissions to the remote server.
  1139. - Manage specialized industrial and scientific devices.
  1140.  
  1141.     Which of the following utilities would be the best to use to accomplish these tasks?
  1142.     > Telnet
  1143.  
  1144. * What is the name of the utility that is (1 similar to Telnet and (2 used to establish a secure remote server management session?
  1145.     > SSH
  1146.  
  1147. * A user reports that he can't browse to a specific website on the internet. Form his computer, you find that a ping test to the Web server succeeds. A traceroute test shows 17 hops to the destination web server.
  1148.  
  1149.     What is the most likely cause of the problem?
  1150.     > Incorrect DNS server address
  1151.  
  1152. * A user is having problems connecting to other computers using hostnames.
  1153.  
  1154.     Which of the following commands will BEST help you troubleshoot this problem?
  1155.     > nslookup
  1156.  
  1157. * You work in an office that uses Linux and Windows servers. The network uses the IP protocol. You are sitting at a Windows workstation. An application you are using is unable to connect to a Windows server named FileSrv2.
  1158.  
  1159.     Which of the following commands would work BEST to test network connectivity between your workstation and the server? (Select TWO).
  1160.     > ping
  1161.     > tracert
  1162.  
  1163. * You are troubleshooting network connectivity issues on a Windows workstation. Which command would you use to view the MAC address of the network adapter?
  1164.     > ipconfig /all
  1165.  
  1166. * Examine the following output:
  1167. 4 22 ms 21 ms 22 ms sttlwa01gr02.bb.ispxy.com [154.11.10.26]
  1168. 5 39 ms 39 ms 65 ms plalca01gr00.bb.ispxy.com [154.11.12.11]
  1169. 6 39 ms 39 ms 39 ms Rwest.plalca01gr00.bb.ispxy.com [154.11.3.14]
  1170. 7 40 ms 39 ms 46 ms svl-core-03.inet.ispxy.net [205.171.205.29]
  1171. 8 75 ms 117 ms 63 ms dia-core-01.inet.ispxy.net [205.171.142.1]
  1172.  
  1173.     Which commmand produced this output?
  1174.     > tracert
  1175.  
  1176. * Examine the following output:
  1177. Server: helicuplar.xct.takro.net
  1178. Address: 209.53.4.130
  1179. Name: westsim.com
  1180. Address: 64.78.193.84
  1181.  
  1182.     Which command produced this output?
  1183.     > nslookup
  1184.  
  1185. * You are the network administrator of a branch office of your company. Thebranch office network is part of a WAN that covers most of the United States. Users have been complaining that they are unable to access resources over the WAN at the main headquarters. You suspect that one of the routers between your office and the main headquarters is not working properly.
  1186.  
  1187.     To troubleshoot the routers, which of the followin TCP/IP utilities would be BEST to use?
  1188.     > tracert
  1189.  
  1190. * After several new computers are connected to a network device, every computer connected to the device begins to experience slow transfer speeds.
  1191.  
  1192.     Which of the following is the FIRST step in troubleshooting this problem?
  1193.     > Determine whether the network device is a hub or a switch.
  1194.  
  1195. * A laptop has a wired connection to the network and is configured with a static IP address. The link light on the NIC is lit, but the laptop can't communicate with any hosts on the local network.
  1196.  
  1197.     Which of the following is the MOST likely cause of the issue?
  1198.     > The static IP address and subnet mask are configured with the wrong network address.
  1199.  
  1200. * A laptop has a wired connection to the network and is configured with a static IP address. The link light on the NIC is lit, but the laptop can't communicate with any hosts on the local network.
  1201.  
  1202.     Which of the following is the MOST likely cause of the issue?
  1203.     > The IP address conflicts with another host on the local network.
  1204.  
  1205. * While investigating a network connectivity issue, a technician finds that the link light on a workstation is not lit, and there is no connectivity after replacing the patch cable with one that is known to be good. The wall jack is not labeled, and within the switch room, none of the cables or patch panel ports are labeled.
  1206.  
  1207.     Which of the following tools would the technician MOST likely use next?
  1208.     > Tone generator
  1209.  
  1210. * While investigating a network connectivity issue, a technician finds taht the link light on a workstation is not lit, and there is no connectivity after replacing the patch cable both between the workstation and the wall jack and between the patch panel adn the switch with cables that are known to be good.
  1211.  
  1212.     If the wall jack and patch panel ports are labeled correctly, which of the following tools would the technician MOST likely use next?
  1213.     > Cable tester
  1214.  
  1215. * A user tells a help desk technician that their browser is displaying a message that a site can't be reached. When asked, the user tells the technician that other users in the same office can browse to the site. The technician suspects that the web server's name is not being translated to the correct IP address. The technician asks the user to open a command prompt window.
  1216.  
  1217.     Which of the following commands would confirm the technician's assumption? (Select TWO).
  1218.     > ping
  1219.     > nslookup
  1220.  
  1221. * A technician located at a branch office can't communicate with a company server at the home office.
  1222.  
  1223.     Which of the following commands could be used to determine where the communication is blocked?
  1224.     > tracert
  1225.  
  1226. * You have had several employees call the help desk where you work, complaining that they are not able to reach the www.widgets.com server. To help troubleshoot this issue, you decide to run a variety of commands.
  1227.  
  1228.     Which of the following commands is MOST likely to return the IP address of the desired server? (Select THREE).
  1229.     > nslookup www.widgets.com
  1230.     > tracert www.widgets.com
  1231.     > ping www.widgets.com
  1232.  
  1233. * You are troubleshooting connectivity between your computer and the www.widgets.com server, whose IP address is 192.168.1.1.
  1234.  
  1235.     Which of the following commands tests connectivity to the device as well as name resolution?
  1236.     > ping www.widgets.com
  1237.  
  1238. * You have just connected a new computer to your network. The network uses static IP addressing. You find that the computer can communicate with hosts on the same subnet, but not with hosts on a different subnet. No other computers are having a problem.
  1239.  
  1240.     Which of the configuration values would you most likely need to change?
  1241.     > Default gateway
  1242.  
  1243. * You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0 subnet, which uses the default subnet mask. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following:
  1244.  
  1245. Ethernet adapter Local Area Connection:
  1246. Connection-specific DNS Suffix...: mydomain.local
  1247. Description......................: Broadcom network adapter
  1248. Physical Address.................: 00-AA-BB-CC-74-EF
  1249. DHCP Enabled.....................: No
  1250. Autoconfiguration Enabled........: Yes
  1251. IPv4 Address.....................: 192.168.1.102(Preferred)
  1252. Subnet Mask......................: 255.255.0.0
  1253. Default Gateway..................: 192.168.1.1
  1254. DNS Servers......................: 192.168.1.20 192.168.1.27
  1255.  
  1256.     Which of the following is the MOST likely cause of the problem?
  1257.     > Incorrect subnet mask
  1258.  
  1259. * You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0 subnet using the default subnet mask. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following:
  1260.  
  1261. Ethernet adapter Local Area Connection:
  1262. Connection-specific DNS Suffix...: mydomain.local
  1263. Description......................: Broadcom network adapter
  1264. Physical Address.................: 00-AA-BB-CC-74-EF
  1265. DHCP Enabled.....................: No
  1266. Autoconfiguration Enabled........: Yes
  1267. IPv4 Address.....................: 192.168.1.102(Preferred)
  1268. Subnet Mask......................: 255.255.0.0
  1269. Default Gateway..................: 192.168.2.1
  1270. DNS Servers......................: 192.168.1.20
  1271.  
  1272.     Which of the following is the MOST likely cause of the problem?
  1273.     > Incorrect default gateway
  1274.  
  1275. * An end user claims they are unable to connect to the internet and has called the company's help desk for a solution. Having been assigned to this issue, you decide to first test whether or not TCP/IP is working correctly on the local computer.
  1276.  
  1277.     Which of the following is the BEST command to use for this test?
  1278.     > ping 127.0.0.1
  1279. [CHAPTER 6]
  1280.  
  1281. [CHAPTER 7]
  1282. * Which wireless standard can stream data at a rate of up to 54 Mbps using a frequency of 5 GHz?
  1283.     > 802.11a
  1284.  
  1285. * Which of the following wireless networking standards uses a frequency of 5 GHz and supports trasmission speeds up to 1.3 Gbps?
  1286.     > 802.11ac
  1287.  
  1288. * The 802.11ac wireless networking standard provides increased bandwidth and communication speeds by using which of the following technologies? (Select TWO).
  1289.     > MU-MIMO to allow multiple users to use the same channel.
  1290.     > Channel bonding to combine more channels in the 5 GHz band to allow for up to 160-MHz-wide channels.
  1291.  
  1292. * Which IEEE wireless standards specify transmission speeds up to 54 Mbps? (Select TWO.)
  1293.     > 802.11a
  1294.     > 802.11g
  1295.  
  1296. * Which data transmission rate is defined by the IEEE 802.11b wireless standard?
  1297.     > 11 Mbps
  1298.  
  1299. * Which of the following are characteristics of the 802.11g wireless standard? (Select THREE.)
  1300.     > Backwards compatible with 802.11b devices
  1301.     > Operates in the 2.4 GHz range
  1302.     > Maximum bandwidth of 54 Mbps
  1303.  
  1304. * You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in this situation?
  1305.     > 802.11n
  1306.  
  1307. * You have been contacted by OsCorp to recommend a wireless Internet solution. The wireless strategy must support a trasnsmission range of 150 feet, use a frequency range of 2.4 GHz, and provide the highest possible transmission speeds. Which of the following wireless solutions would you recommend?
  1308.     > 802.11n
  1309.  
  1310. * Which type of configuration would you use if you wanted to deploy 802.11n technology to communicate directly between two computers using a wireless connection?
  1311.     > Ad hoc
  1312.  
  1313. * One of your customers wants to configure a small network in his home. The home has three floors, and there are computers on each floor. This customer needs to share files between computers, print to a centrally located printer, and have access to the internet.
  1314.  
  1315.     Which of the following print solutions would BEST meet this client's needs?
  1316.     > Configure a Wi-Fi instrastructure network.
  1317.  
  1318. * A customer is experiencing a sporadic interruption of their Wi-Fi network in one area of their building. A technician investigates an discovers signal interference caused by a microwave oven. The customer approves replacing the wireless access point that covers the area, but asks that the wireless speed also be increased.
  1319.  
  1320.     Which of the following Wi-Fi standards should the replacement device support to BEST fulfill teh customer's needs?
  1321.     > 802.11ac
  1322.  
  1323. * While configuring a wireless access point device, a technician is presented with several security mode options.
  1324.  
  1325.     Which of the following options will provide the most secure access?
  1326.     > WPA2 and AES
  1327.  
  1328. * You have been asked to help a small office with a limited budget set up and configure a Windows network. There are only five computers in this office. In addition to the ability to share network resources, security is a top priority.
  1329.  
  1330.     Which of the following is the BEST course of action in this situation?
  1331.     > Install a WorkGroup to allow each device to control what is shared and with whom.
  1332.  
  1333. * A technician is installing a new SOHO wireless router.
  1334.  
  1335.     Which of the following is the FIRST thing the technician should do to secure the router?
  1336.     > Change the router's default password
  1337.  
  1338. * A technician is installing a SOHO router at an after-school community center. The customer would like to keep children from accessing inappropriate sites while browsing the web.
  1339.  
  1340.     Which of the following actions would help accomplish this goal?
  1341.     > Enable content filtering
  1342.  
  1343. * A technician receives notification from a SOHO router manufacturer of a specific vulnerability that allows attackers to exploit SNMP traps to take over the router. The technician verifies the settings outlined in the notification.
  1344.  
  1345.     Which of the following actions should the technician take NEXT?
  1346.     > Check for and apply firmware updates.
  1347.  
  1348. * A technician is installing a network-enabled smart home control system in a SOHO.
  1349.  
  1350.     To access the system from the internet, which of the following configurations is MOST likely required on the SOHO router?
  1351.     > Port forwarding
  1352.  
  1353. * A SOHO customer finds that their VoIP conversations frequently break up and being unintelligible. This happens most often when one person in the office streams video from the internet.
  1354.  
  1355.     Which of the following configuration changes on the SOHO router is MOST likely to improve VoIP performance?
  1356.     > Change QoS settings to give VoIP traffic more priority.
  1357.  
  1358. * A technician is replacing a SOHO router and has configured DHCP to assign private IP addresses to hosts on the local network. These hosts can communicate with each other, but users can't browse the internet.
  1359.  
  1360.     Which of the following changes to the SOHO router is MOST likely to restore internet connectivity?
  1361.     > Configure the SOHO router for NAT.
  1362.  
  1363. * You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms.
  1364.  
  1365.     Which of the following features lets you allow or reject client connections by hardware address?
  1366.     > MAC address filtering
  1367.  
  1368. * A technician is tasked with preparing a conference room so that at least 20 guests will be able to wirelessly connect laptop computers to the company network.
  1369.  
  1370.     Which of the following network devices would be the BEST choice for this connectivity?
  1371.     > Access point
  1372.  
  1373. * A technician is installing a new SOHO wireless router in a home office. The customer wants to secure the wireless network so only a smartphone, tablet, and laptop can connect.
  1374.  
  1375.     Which of the following router settings should the technician change?
  1376.     > Enable MAC filtering
  1377.  
  1378. * Which of the following is used on a wireless network to identify the network name?
  1379.     > SSID
  1380.  
  1381. * Which of the following locations will contribute the greatest amount of interference for a wireless access point? (Select TWO.)
  1382.     > Near backup generators
  1383.     > Near cordless phones
  1384.  
  1385. * Which of the following is true when the DHCP setting is disabled in a wireless network?
  1386.     > Wireless clients must use a static IP address within the correct IP address range to connect to the network.
  1387.  
  1388. * Portable devices have a software-controlled switch that disables all wireless functionality.
  1389.  
  1390.     What is the name of this software-controlled switch?
  1391.     > airplane mode
  1392.  
  1393. * Which of the following are antenna types that are commonly used in wireless networks? (Select TWO).
  1394.     > Directional antenna
  1395.     > Omnidirectional antenna
  1396.  
  1397. * You are troubleshooting a client connectivity problem on an Ethernet network. The client system has intermittent connectivity to the network. You discover that the unshielded twisted pair patch cable runs 75 feet from the wall outlet and then passes through the ceiling and over several florescent light fixtures before reaching the client system.
  1398.  
  1399.     Which of the following is the MOST likely cause of the connectivity problem?
  1400.     > EMI interference.
  1401.  
  1402. * A user on your network has been moved to another office down the hall. After the move, she calls you to complain that she has only occasional network access through her wireless connection.
  1403.  
  1404.     Which of the following is the most likely cause of the problem?
  1405.     > The client system has moved too far away from the access point.
  1406.  
  1407. * A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While talking to her, you discover that she is trying to work from teh break room two floors above the floor where she normally works.
  1408.  
  1409.     Which of the following is the MOST likely cause of her connectivity problem?
  1410.     > The user is out of the effective range of the wireless access point on her floor.
  1411.  
  1412. * A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. She can access the network from her usual office, but today, she is trying to access the wireless network from a conference room, which is across the hall and next to the elevator.
  1413.  
  1414.     Which of the following is the MOST likely cause of her connectivity problem?
  1415.     > Interfernce is affecting the wireless signal.
  1416. [CHAPTER 7]
  1417.  
  1418. [CHAPTER 8]
  1419. * Which type of printer uses an inked ribbon?
  1420.     > Dot matrix
  1421.  
  1422. * Which of the following printer types is considered an impact printer?
  1423.     > Dot matrix
  1424.  
  1425. * Which of the following types of printer heats the ink in its print head to print?
  1426.     > Bubble jet (inkjet)
  1427.  
  1428. * You have been asked to recommend a printer that will be used in a travel agency. The printer will be used to print airline tickets. Each ticket has four pages (multi-part carbon-based forms), and the same information must show up on all four pages with a single pass of the printer.
  1429.  
  1430.     Which printer type would you recommend?
  1431.     > Impact
  1432.  
  1433. * Which of the following components are found in dot matrix printers? (Select TWO.)
  1434.     > Tractor feed
  1435.     > Platen
  1436.  
  1437. * You have created a large course that describes how to install and use the software created by your company. You created the document using FrameMaker, which uses its own proprietary file format. Because your customers don't use FrameMaker, you need to print the document in a format that all of your customers can use. Your customers use Windows, Linux, and Mac operating systems.
  1438.  
  1439.     Which of the following print methods would provide the BEST output for your customers to use?
  1440.     > Print the file to PDF.
  1441.  
  1442. * Your company needs to print a lot of high-quality black-and-white text documents. These documents need to be printed as quickly and inexpensively as possible. The printer must also have the capacity to perform duplex printing.
  1443.  
  1444.     Which of the following printers BEST meets the printing requirements for your company?
  1445.     > Laser
  1446.  
  1447. * Which typpe of printer uses a drum, plastic toner, and fuser to create a printed page?
  1448.     > Laser
  1449.  
  1450. * Which type of printer uses lasers and electrical charges to transfer images to paper?
  1451.     > Laser
  1452.  
  1453. * Which component in a laser printer prepares the photosensitive drum for writing by causing it to receive a negative electrostatic charge?
  1454.     > Primary corona
  1455.  
  1456. * Which component in a laser printer charges the paper to attract toner?
  1457.     > Transfer roller
  1458.  
  1459. * Which component in a laser printer applies toner to the drum, causing the toner to stick to the charged areas on teh drum?
  1460.     > Developing roller
  1461.  
  1462. * The manufacturing department consists of 50 employees. Due to the number of employees in this department, the company cannot afford to have a printer for each user. Your company has purchased a new and very expensive laser jet printer for this department's use. This printer needs to be configured so all users in the department have the ability to print to this device from their own computers.
  1463.  
  1464.     Which of the following printer connections would BEST facilitate multiple user access?
  1465.     > Network
  1466.  
  1467. * Which of the following printers would produce the highest print quality?
  1468.     > 600 DPI
  1469.  
  1470. * Jan, a user in the documentation department, printed a very large document. When Jan's boss walked by the printer and saw the large stack of papers, he called you and asked if you could configure the printer to help reduce the amount of paper used by her department.
  1471.  
  1472.     Which of the following printer configuration would BEST facilitate the manager's request?
  1473.     > Duplexing
  1474.  
  1475. * Why would you recommend a dye sublimation printer?
  1476.     > When print jobs are detailed photographic reproductions
  1477.  
  1478. * Which of the following would be a good reason to not recommend a solid ink printer?
  1479.     > The user has a surplus of toner cartridges and would like a printer that can be used with these.
  1480.  
  1481. * Which component in a laser printer charges the paper to attract toner?
  1482.     > Secondary corona
  1483.  
  1484. * Which component in a lser printer prepares the photosensitive drum for writing by causing it to receive a negative electrostatic charge?
  1485.     > Primary corona
  1486.  
  1487. * Which type of printer boils the ink in its print head to print?
  1488.     > Thermal inkjet (bubble jet)
  1489.  
  1490. * Which type of printer has the poorest print quality because the image is created using fairly large dots?
  1491.     > Dot matrix
  1492.  
  1493. * Which type of printer uses a drum, platic toner, and fuser to create a printed page?
  1494.     > Laser
  1495.  
  1496. * Which component in a laser printer applies toner to the drum, causing the toner to stick to the charged areas on the drum?
  1497.     > Developing roller
  1498.  
  1499. * Which of the following printer types is considered an impact printer?
  1500.     > Dot matrix
  1501.  
  1502. * Which of the following compnents are found in dot matrix printers?
  1503.     > Tractor feed
  1504.     > Platen
  1505.  
  1506. * Which of the following are printer languages? (Select THREE).
  1507.     > PCL
  1508.     > PostScript
  1509.     > Escape Codes
  1510.  
  1511. * You've just set up a color laser printer on a customer's Windows workstation. You've connected it to the workstation using a USB cable and have loaded the appropriate drivers.
  1512.  
  1513.     Which of the following are the BEST steps to take next? (Select TWO).  
  1514.     > Verify that it is working by printing a test page
  1515.     > Edit the printer properties to configure paper tray and other device-specific settings
  1516.  
  1517. * You have just set up a new laser printer for the company president on her Windows workstation. You have installed the printer and the drivers. What should you do next?
  1518.     > Edit the printer properties to configure device-specific settings
  1519.  
  1520. * Which of the following allows a computer to communicate with a printer?
  1521.     > Print driver
  1522.  
  1523. * Which of the following virtual printing options allow you to convert a word document into a .jpg file?
  1524.     > Print to Image
  1525.  
  1526. * Which term refers to the portion of the hard drive where print jobs are stored before going to the print device?
  1527.     > Print queue
  1528.  
  1529. * Which connector is most commonly used to connect printers to desktop PC systems?
  1530.     > USB
  1531.  
  1532. * Which of the following methods can be used to connect a printer to a network? (Select TWO.)
  1533.     > Plug an Ethernet cable into the network port in the printer
  1534.     > Connect your printer to an external print server device that is connected to the network
  1535.  
  1536. * Which of the following is an advantage of connecting a printer to a network?
  1537.     > Multiple users can print to the same printer
  1538.  
  1539. * If a printer is connected directly to a Windows workstation, what can be done to allow other workstations on the same network to send print jobs to this printer?
  1540.     > Configure the printer to be a shared printer
  1541.  
  1542. * If a printer is not Wi-Fi capable, how can it be set up to provide the most reliable wireless printing?
  1543.     > If the printer is Ethernet capable, it can be connected to the network through a wireless router
  1544.  
  1545. * Which printer management components would you use to view the port a printer uses? (Select TWO.)
  1546.     > Printer server properties
  1547.     > Printer properties
  1548.  
  1549. * Which printer management component would you use to view the drivers used by a printer?
  1550.     > Printer properties
  1551.  
  1552. * Which printer permission would you assign to a user to that she can pause the printer?
  1553.     > Mange this printer
  1554.  
  1555. * You want to restrict the hours that the QA printer is available from Windows.
  1556.  
  1557.     Which tab on the Printer Properties page would you click so you can restrict the hours the printer is available?
  1558.     > Advanced
  1559.  
  1560. * Your system administrator shared a USB laser printer connected to your Windows 10 system so that others on the network can send jobs to it. A network user has snt a large job to the printer, but the job has stalled. You try to delete the print job, but can't.
  1561.  
  1562.     Why can't you delete this print job?
  1563.     > You do not have the manage documents permissions
  1564.  
  1565. * You're responsible for ordering consumables for your organization's printers. Users print from these printers frequently and demand the utmost in reliability.
  1566.  
  1567.     Which of the following would be the best option when ordering new toner for these printers?
  1568.     > Toner cartridges recommended by the printer manufacturer
  1569.  
  1570. * You replaced the print cartridge on an inkjet printer. What should you do next?
  1571.     > Calibrate the printer
  1572.  
  1573. * You installed a new toner cartridge in a company-owned laser printer and did some maintenance tasks you noticed that needed to be done
  1574.  
  1575.     What should you do next?
  1576.     > Reset the page count
  1577.  
  1578. * You replaced the ink cartridges in a color inkjet printer. Users are now complaining that print quality has degraded, lines are fuzzy, and the colored areas in images are starting or stopping before they should.
  1579.  
  1580.     What inkjet maintenance task do you need to perform?
  1581.     > Printer cartridge calibration
  1582.  
  1583. * You're troubleshooting an older laser printer that is creating accordian jams where the paper is crumpled as it exits the printer moving into the output tray.
  1584.  
  1585.     What can you do to fix this problem?
  1586.     > Install a maintenance kit
  1587.  
  1588. * You have just installed a maintenance kit in your laser printer. Which of the following is the best next step to perform?
  1589.     > Reset the page count
  1590.  
  1591. * You're conducting scheduled maintenance on a laser printer. You notice that there is a build-up of excess toner inside the interior of the printer.
  1592.  
  1593.     Which of the following is the best way to remove the excess toner?
  1594.     > Use an anti-static vacuum
  1595.  
  1596. * One of your customers is still using an old dot matrix printer. While printing, the customer noticed that the text was light or faint. A new print head was installed, but the documents are still faint.
  1597.  
  1598.     Which of the following should you do to troubleshoot the most likely cause?
  1599.     > Check the gap between the printer head and the printer
  1600.  
  1601. * For the past several days, the print jobs from the inkjet printer are missing colors and leaving gaps.
  1602.  
  1603.     Which of the following will most likely resolve the problem?
  1604.     > Use the automatic print head cleaning features
  1605.  
  1606. * After removing the printed paper from your laser printer, the toner smudges can be wiped off in places
  1607.  
  1608.     Which of the following is most likely the problem?
  1609.     > Fuser rollers
  1610.  
  1611. *  Your laser printer prints a verical black line on every page. You change the toner cartridge but the problem does not go away.
  1612.  
  1613.     What is the most likely problem?
  1614.     > A corona wire is dirty
  1615.  
  1616. * Which of the following is the most likely symptom of a dirty drum or roller in a laser printer?
  1617.     > Lines or splotches repeated at regular intervals on the job
  1618.  
  1619. * Which of the following paper types should not be used in inkjet printers?
  1620.     > Very glossy paper
  1621.  
  1622. * When you print from your laser printer, the paper contains faint images from previous printouts.
  1623.  
  1624.     Which of the components is most likely the cause? (Select two.)
  1625.     > Fluorescent lamp
  1626.     > Rubber scraper
  1627.  
  1628. * You replaced the print cartridge on an inkjet printer. What should you do next?
  1629.     > Calibrate the printer
  1630.  
  1631. * After receiving several complaints from the employees in your company, you start to troubleshoot the laser printer. After a short while, you have concluded that the most probably cause is a dirty drum.
  1632.  
  1633.     Which of the following is the most logical reasons for this conclusion?
  1634.     > Spots at regular intervals on the page
  1635.  
  1636. * You are testing a printer you just installed, so you use the operator panel on the printer to print a test page. Later, you use the printer properties on your computer to print a test page. Instead of a normal test page, you receive several pages with garbled characters on them.
  1637.  
  1638.     What is the most likely cause of the problem?
  1639.     > Wrong print driver
  1640.  
  1641. * A user has created a complex spreadsheet on her workstation containing many graphs and charts. She sent the document to an older network laser printer that is shared by everyone in her department. When she picked up the output only the top half of each page was printed and the bottom half was blank.
  1642.  
  1643.     Which of the following will most likely rectify this issue?
  1644.     > Install additional memory in the printer
  1645.  
  1646. * Oliver, a user in your company, is using an inkjet printer. After using the printer for several months, Oliver has noticed that streaks are beginning to appear on his printed pages. Oliver has asked you to fix this issue.
  1647.  
  1648.     Which of the following is most likely causing Oliver's printer to malfunction?
  1649.     > The printer's heads are out of position and need to be aligned
  1650.  
  1651. * Hannah has been working for your company for several years. Recently, she moved to a new department, which is located on a different floor. After the move, Hannah in-forms you that when she tries to print a Microsoft Word document (the same program she has always used), the printer on her new floor prints page after page of seemingly random characters.
  1652.  
  1653.     Which of the following is the most likely cause of Hannah's print problems?
  1654.     > The wrong print driver has been selected
  1655.  
  1656. * One of the employees in your company calls and complains that text printed on the laser printer smudges easily and is staining hands and clothes.
  1657.  
  1658.     Which of the following, if adjust or replaced, would BEST fix the printer?
  1659.     > Fuser unit
  1660.  
  1661. * While changing the toner cartridge in your laser printer, you accidentally spill toner in and around the printer.
  1662.  
  1663.     Which of the following is the best method for cleaning up spilled toner?
  1664.     > Use an anti-static microfiltering vaccuum
  1665.  
  1666. * A manufacturing company has customized a computer application that supervisors will use to track line worker efficiency. Supervisors will interact with the application while walking within and between work areas and will also use the laptop while sitting at their desks.
  1667.  
  1668.     Which of the following laptop features would best minimize the awkward movement of carrying a bulky laptop with a hinged display while providing the flexibility to use the device as a desk?
  1669.     > A rotating or removable screen
  1670.  
  1671. * A sales person typically carries a laptop computer to several off-site customer meetings each day, but needs the flexibility to quickly attach other peripherals and chagne the laptop battery while at their office desk.
  1672.  
  1673.     Which of the following laptop features would best meet these requirements?
  1674.     > A laptop docking station
  1675.  
  1676. * A user wants to use a laptop to display a presentation on a large TV monitor that has an HDMI connection.
  1677.  
  1678.     Which of the following laptop ports or connections can be used to add the display device? (Select TWO).
  1679.     > Displayporty using a displayport-to-hdmi cable
  1680.     > USB port using a USB-to-HDMI adapter
  1681.  
  1682. * Match each notebook FN key icon labels on the left to the corresponding key on the right
  1683.     > Touchpad (on/off)
  1684.     > Screen orientation
  1685.     > Wireless (on/off)
  1686.     > Bluetooth (on/off)
  1687.     > Dual displays
  1688.     > Play/Pause media
  1689.  
  1690. * When a presenter at a conference connects a laptop to a projector, the projector mirrors the laptop's display. The presenter would like it to extend the laptop's desktop instead.
  1691.  
  1692.     Which of the following options is the quickest way to make the change?
  1693.     > Toggle the dual display function key on the laptop
  1694.  
  1695. * A user opens a help desk ticket to replace a laptop keyboard. The user reports that the cursor randomly moves when typing using the laptop keyboard, causing the user to make frequent typing corrections. The problem does not occur when the laptop is attached to a docking station and an external keyboard is used.  You want to find a more affordable solution than replacing the keyboard.
  1696.  
  1697.     Which of the following actions mitigate the problem?
  1698.     > Use the special function key to disable the touchpad when the laptop keyboard is used
  1699.  
  1700. * Which of the following are characteristics of the ExpressCard /54 form factor? (Select TWO.)
  1701.     > L shape
  1702.     > 34mm wide at the connector
  1703.  
  1704. * Your laptop has an ExpressCard /54 slot. Which of the following is true? (Select TWO).
  1705.     > You can use an expresscard /34 card or an expresscard /54 card in the laptop
  1706.     > Compatible expresscards for the laptop include cards that are rectangular shaped
  1707.  
  1708. * Which of the following input devices uses a stylus?
  1709.     > Digitizer
  1710.  
  1711. * Which of the following is an extra button or knob on a laptop keybaord that moves the mouse cursor?
  1712.     > Pointing stick
  1713.  
  1714. * A user needs to use her laptop to give a presentation using a video projector. She called asking you how to switch the display to the external port on her laptop.
  1715.  
  1716.     What should you tell her?
  1717.     > Press and hold the FN key; then press the monitor function key (image of a monitor on it.)
  1718.  
  1719. * Which component lets you use a notebook system as a desktop system by making it possible to connect a normal-sized external mouse, keyboard, monitor, and speakers?
  1720.     > Docking station
  1721.  
  1722. * Which of the following is a 172-pin DIMM often used in laptops?
  1723.     > MicroDIMM
  1724.  
  1725. * Which feature makes it possible to close some notebook computers and still use the touchscreen?
  1726.     > 180 degree rotating touchscreen
  1727.  
  1728. * A technician is tasked with replacing a Wi-Fi antenna in a laptop computer. Which of the following places would the antenna most likely be located?
  1729.     > Around the laptop's bezel
  1730.  
  1731. * A technician is tasked with increasing the RAM memory on a laptop by adding a SODIMM module to an empty memory slot.
  1732.  
  1733.     Which of the following processes will seat the module in the slot?
  1734.     > Align the notch on the long side of the memory module with the rise in the memory slot. Insert the module pins into the slot at a 45-degree angle. Rotate the module by pressing down until the side hold-down clips snap into place
  1735.  
  1736. * A user normally connects a laptop to a company's network using the laptop's internal wireless NIC. The laptop does not have an etehrnet port. The wireless network has failed, and the replacement part will take two days to arrive.
  1737.  
  1738.     Which of the following solutions will connect the laptop to the company's wired network?
  1739.     > Use a USB-to-RJ45 dongle and connect to a wall jack with an Ethernet cable
  1740.  
  1741. * A technician is tasked with replacing an internal laptop hard drive. Which of the following hard drive standards would be of most concern when selecting a replacement?
  1742.     > The hard drive's form factor
  1743.  
  1744. * A user reports that an older laptop is having trouble connecting with newer wireless networks. Which of the following actions should a technician consider as an alternative to replacing the laptop?
  1745.     > Replace the internal wireless card
  1746.  
  1747. * After replacing a laptop touchpad, a technician finds that the touchpad does not move the cursor. However, a USB mouse does. Before opening the laptop case to re-check the connections, which of the following actions should the technician perform?
  1748.     > Unplug the USB mouse and re-check touchpad movements
  1749.  
  1750. * The integrated mouse, the small monitor, and the compact nature of the keyboard are impeding your work when you use a notebook, but you still need a system that is portable if necessary.
  1751.  
  1752.     What is your best option?
  1753.     > Buy a docking station for your notebook
  1754.  
  1755. * As an IT technician, you are often asked to work on laptop computers that included internal wireless network cards.
  1756.  
  1757.     Which of the following is the most commonly used type of card for these internal wireless adapters?
  1758.     > Mini-PCI
  1759.  
  1760. * An internal laptop keyboard is generally connected to the laptop's system board using a
  1761.     > Ribbon cable
  1762.  
  1763. * You have a notebook computer with a built-in wireless network card. One day it stops working. Because the network card is integrated onto the motherboard, you do not want to replace the entire motherboard.
  1764.  
  1765.     What can you use to connect to the wireless network? (Select TWO)
  1766.     > Insert an expresscard wireless network card
  1767.     > Insert a wireless USB network card
  1768.  
  1769. * You need to replace the video card in a laptop. What is the first step?
  1770.     > Find a service manual with correct disassembly procedures
  1771.  
  1772. * Which type of interface is typically used for internal wireless networking cards in the laptops?
  1773.     > Mini-PCI
  1774.  
  1775. * You need to replace the hard disk in your laptop computer. Which of the following hard drive sizes would you likely choose for the laptop?
  1776.     > 2.5"
  1777.  
  1778. * You have removed the bezel from a notebook display that has stopped functioning. You see a DC-to-AC power inverter at the base of the screen.
  1779.  
  1780.     Which of the following best describes the type of display you are working with?
  1781.     > An LCD display that uses CCFL backlighting
  1782.  
  1783. * You're troubleshooting a malfunctioning notebook computer system. The user has indicated that the LCD screen suddenly became dark and difficult to read while he was downloading a large file through his wireless network card while the system was plugged in at his desk. You've checked the system and determined that the backlight has stopped working.
  1784.  
  1785.     Which of the following is the most likely cause? (Select TWO)
  1786.     > The cold cathode fluorescent lamp has burned out and needs to be replaced
  1787.     > The inverter in the LCD assembly has malfunctioned
  1788.  
  1789. * Which of the following battery types offers the greatest shortage capacity in the smallest amount of space?
  1790.     > Lithium ion (LIB)
  1791.  
  1792. * Which of the following battery types has the greatest need to be completely drained before being recharged?
  1793.     > Nickel cadmium (NiCad)
  1794.  
  1795. * From your laptop, you have been working on a large project that has required you to open a lot of items (programs, files, etc.). It is time to leave the office and make the two-hour journey home. You will be working on this project a bit more when you arrive at home. Your computer's battery is failing and only has a very short life span (about one hour) before your computer loses power. When you arrive home and open the lid of your laptop, nothing happens. After plugging in your computer and powering it on, you find that all of your programs and files have been closed. To troubleshoot this, you open control panel and navigate to the settings that control what your computer will do when the laptop lid is closed.
  1796.  
  1797.     Which of the following power settings must you choose to prevent the same problem from happening in the future?
  1798.     > When I close the lid: hibernate
  1799.  
  1800. * You want to configure Power Plans on your Windows 10 laptop computer. Which of the following can do this? (Select TWO)
  1801.     > In the notification area, double click the battery icon. Click power options.
  1802.     > Go to settings > System > Power and sleep
  1803.  
  1804. * Which ACPI power state retains the contents in RAM, but turns all other components off?
  1805.     > Suspend
  1806.  
  1807. * You want to use hibernation on your windows notebook. What does it need to have?
  1808.     > Enough free hard drive space
  1809.  
  1810. * You have just purchased a used laptop and you want to configure it to hibernate when you press the power button. You edit the Power Options settings and enable hibernation, then you configure the power button to trigger hibernation. Everything works find for several weeks. However, one day you press the power button, the laptop does not hibernate.
  1811.  
  1812.     Which of the following will best resolve this issue?
  1813.     > Free up disk space
  1814.  
  1815. * A technician is tasked with repairing a laptop keyboard with sticking keys. Which of the following actions should the technician perform before replacing the keyboard?
  1816.     > Spray repressed air between the keys
  1817.  
  1818. * Recently, your laptop won't power on, and the battery is not charging. You suspect the block on the power cord (also known as a brick) no longer works.
  1819.  
  1820.     Which tool will help you troubleshoot this problem?
  1821.     > Multimeter
  1822.  
  1823. * A user complains that his notebook display has started to go dim intermittently. You suspect the backlight might need to be replaced, but you want to verify that the backlight is failing before you replace it.
  1824.  
  1825.     Which of the following would be best to check before replacing the backlight?
  1826.     > Make sure that the dimming isn't being caused by a power saving method that has been configured to conserve notebook power
  1827.  
  1828. * Vera has brought her notebook computer to you for repair. After listening to her describe it's symptoms, you hypothesize that the notebook may have been a malfunctioning keyboard.
  1829.  
  1830.     Which of the following steps can you take to BEST determine whether the keyboard needs to be replaced? (Select TWO).
  1831.     > Check for special keyboard features that could be enabled that may cause some keys to perform alternate tasks
  1832.     > Connect an external keyboard
  1833.  
  1834. * A user hibernates a laptop after giving a video presentation. Now, when it resumes, the display flickers for a moment, but remains blank. A technician suspects a bad graphics processing unit. (GPU).
  1835.  
  1836.     Which of the following troubleshooting steps should be completed? (Select TWO).
  1837.     > Connect an external display device
  1838.     > Toggle the dual display function key
  1839.  
  1840. * A technician is servicing a laptop that works properly when the power adapter is plugged in. Event hough the battery icon shows that the battery is fully charged, when the laptop is unplugged, the laptop immediately shuts down.
  1841.  
  1842.     Which of the following actions should the technician perform?
  1843.     > Replace the laptop battery
  1844.  
  1845. * A user calls the help desk stating that the touchpad on a laptop does not work. Which of the following actions would best help the technician diagnose the problem?
  1846.     > Toggle the touchpad function key
  1847.  
  1848. * A technician is assisting a user with rebooting a frozen laptop that does not respond to keystrokes or mouse clicks. Which of the following is the most simple way to power down the laptop?
  1849.     > Hold down the power button for several seconds
  1850.  
  1851. * A technician is replacing a hard drive in a laptop. Which of the following is the first action the technician should perform before opening the case?
  1852.     > Review the laptop manufacturer's documentation
  1853.  
  1854. * After arriving in a new city today, a traveling sales team member calls you stating that his wireless connection no longer works. He has checked the wireless configuration and he knows it to be correct because it was working yesterday.
  1855.  
  1856.     What should you do first?
  1857.     > Have him verify that the wireless card's hardware switch is in the on position.
  1858.  
  1859. * You have just purchased a new laptop with built-in 802.11 wireless and Bluetooth capabilities. WHen you boot into Windows, you do not see a Bluetooth adapter listed in device manager.
  1860.  
  1861.     Which of the following would be best to perform first?
  1862.     > Enable Bluetooth in the BIOS/UEFI configuration
  1863.  
  1864. * In preparation to use your laptop on the airplane as you travel to a conference, you disconnected the USB mouse. The cursor drifts consistently to the left side of the screen while using the built-in trackpad and mouse buttons.
  1865.  
  1866.     Which of the following actions would most likely stop the mouse from drifting?
  1867.     > Access the BIOS/UEFI configuration and disable the USB printer option
  1868.  
  1869. * You're troubleshooting a notebook system that uses a digitizer pad and stylus for user input. The user has complained that the digitizer pad registers stylus registers taps about one inch to the right of where the taps actually occur.
  1870.  
  1871.     Which of the following actions would most likely fix this issue?
  1872.     > Recalibrate the digitizer pad
  1873.  
  1874. * A user is trying to log into windows on her notebook computer. She enters the correct password for her user account, but the system won't let her authenticate, claiming the wrong password has been entered.
  1875.  
  1876.     Which of the following is most likely causing the problem?
  1877.     > She has turned num lock on, causing the keyboard to register numbers instead of letters.
  1878.  
  1879. * You are troubleshooting a malfunctioning laptop computer. Nothing appears on the LED display when the system is powered on.
  1880.  
  1881.     Which of the following is the best step to try first?
  1882.     > Plug in an external monitor
  1883.  
  1884. * The human resources department wants to give gifts away at the company's summer party. They would like to have an assortment of fitness tracker wristbands, smartwatches, smart glasses, and virtual reality headsets. They have been trying to locate these on the internet, but have been unsuccessful.
  1885.  
  1886.     Which of the following types of mobile devices should you tell them to search for?
  1887.     > Wearble devices
  1888.  
  1889. * Which component within a tablet device measures acceleration horizontally and vertically at the same time?
  1890.     > Gyroscope
  1891.  
  1892. * You are currently managing a few apple iPad devices that run the iOS operating system. Which of the following BEST describes the architecture used by this device?
  1893.     > ARM
  1894.  
  1895. * Which features allows a tablet to recognize multiple finger touches at the same time?
  1896.     > Multi-touch
  1897.  
  1898. * Match the mobile operating systems on the left with the description on the right:
  1899.    
  1900.     - Closed source and second most popular mobile device operating system
  1901.         > iOS
  1902.     - Device manufacturers are countless
  1903.         > Android
  1904.     - Open source and most popular mobile device operating system
  1905.         > Android
  1906.     - Device manufacturers include Microsoft, Samsung, and HTC
  1907.         > Windows
  1908.     - Devices solely designed and developed by Apple
  1909.         > iOS
  1910.     - Closed source and third most popular mobile device operating system
  1911.         > Windows
  1912.  
  1913. * When a user rotates a mobile device, the operating system changes the screen orientation so that the display remains upright to the user.
  1914.  
  1915.     Which of the following technologies is used to detect thid device movement? (Select TWO).
  1916.     > Gyroscope
  1917.     > Accelerometer
  1918.  
  1919. * Drivers for a small trucking company rely on a smartphone navigation application. When the smartphone loses internet connectivity, the maps don't update properly. Also, the company pays extra for a premium data service plan to support the application.
  1920.  
  1921.     Which of the following mobile devices could replace the smartphone navigation application, could provide map converage when internet connectivity is lost, and not require a data plan?
  1922.     > A GPS-enabled personal navigation device
  1923.  
  1924. * A landscaping company's employees receive payment for their services using a credit card reader that physically attaches to an Apple mobile device.
  1925.  
  1926.     Which of the following connection types is being used?
  1927.     > Lightning
  1928.  
  1929. * While traveling in a car, a user who has an unlimited data plan on a smartphone opens a wireless connection to share the internet with other passengers.
  1930.  
  1931.     Which of the following connection types is most likely being used?
  1932.     > Hotspot
  1933.  
  1934. * A technician is tasked with configuring a mobile device to connect securely to the company network when the device is being used at off-site locations where only internet connectivity is available.
  1935.  
  1936.     Which of the following should the technician configure?
  1937.     > VPN
  1938.  
  1939. * You have recently issued new mobile phones to the sales team in your company. Each phone has the ability to store and transmit encrypted information for such things such as making payments at a checkout counter.
  1940.  
  1941.     Which of the following technologies is being used in these phones?
  1942.     > NFC chips
  1943.  
  1944. * Mobile devices can connect to the internet and other devices using a variety of connection types.
  1945.  
  1946.     - A physical location where you can obtain wireless internet access using a WLAN
  1947.         > Hotspot
  1948.     - A connector used to emulate cryptographic smart card functionalities
  1949.         > NFC
  1950.     - Provides mobile devices with access to network resources and software applications on their home network when they connect using other wireless or wired networks
  1951.         > Mobile VPN
  1952.     - Allows you to share the internet connection of a phone with a laptop
  1953.         >Tethering
  1954.     - A wireless technology standard for exchanging data over short distances
  1955.         > Bluetooth
  1956.  
  1957. * You have just purchased an iPad tablet device. You want to synchronize your photos, music, email, and contacts from your windows 10 PC to the device.
  1958.  
  1959.     How can you connect the device to the PC? (Select two. Each option is a complete solution.)
  1960.     > USB cable
  1961.     > Wi-Fi wireless connection
  1962.  
  1963. * You have subscibed to a cloud-based service to synchronize data between your mobile deviec and your PC. Before allowing the data to be synchronized, this service uses a process where the cloud service and the client on the mobile device verify each other's security certificates.
  1964.  
  1965.     What is this process called?
  1966.     > Mutual authentication
  1967.  
  1968. * A company is considering providing smartphones to their employees and is investigating the interaction of the phones with iTunes, iCloud, Google Drive, Dropbox, and OneDrive.
  1969.  
  1970.     Which of the following data synchronization methods is being considered?
  1971.     > Synchronization to the cloud
  1972.  
  1973. * A technician is tasked to add a valid certificate to a mobile device so that the encrypted emails can be opened. Which of the following email protocols is being used?
  1974.     > S/MIME
  1975.  
  1976. * You currently use the exchange email client on your desktop PC. You use it to connect to an email server provided by a service provider using the IMAP and SMTP protocols. You recently purchased an iPad, and you want to configure its Mail app to connect to your email server.
  1977.  
  1978.     Which of the following BEST describes whether this task can be accomplished?
  1979.     > You can configure the Mail app on an iPad to connect to an email server using the IMAP and SMTP protocols.
  1980.  
  1981. * Which of the following protocols can be enabled so email is encrypted on a mobile device?
  1982.     > SSL
  1983.  
  1984. * You use productivity apps on your iPad tablet device while traveling between client sites. You're concerned that you may lose your iPad while on the road and want to protect the data stored on it from being compromised. Currently, your iPad uses a 4-digit PIN number for a passcode. You also want all data on the device to be erased if the wrong passcode is entered more than 10 consecutive times.
  1985.  
  1986.     What should you do? (Select TWO. Each option is part of the complete solution.)
  1987.     > Disable the simple passcode option
  1988.     > Enable the Erase Data option
  1989.  
  1990. * Which of the following are the BEST steps you can take to avoid having your mobile device exploited by a hacker or infected by a virus? (Select TWO).
  1991.     > Keep the operating system up to date
  1992.     > Lock the screen with some form of authentication
  1993.  
  1994. * Which of the following will improve the security of sensitive information on your device if it is lost or stolen? (Select THREE.)
  1995.     > A screen lock
  1996.     > Remote wipe
  1997.     > Locator application
  1998.  
  1999. * Applications for mobile devices fall into two categories. Some have been reviewed, approved, and signed with a certificate by the app service, and some have not.
  2000.  
  2001.     Which category do apps fall under if they have been signed with a certificate?
  2002.     > Trusted
  2003.     What category do apps fall under if they have not been reviewed, approved, and signed with a certificate?
  2004.     > Untrusted
  2005.  
  2006. * You have an executive user who keeps sensitive information about the company on a company-owned mobile device. You want to be prepared to keep company information secure if he loses this device or if it gets stolen.
  2007.  
  2008.     Which of the following solutions should you use? (Select TWO.)
  2009.     > Mobile device management software that performs full device encryption
  2010.     > Mobile device management software that performs remote wipes
  2011.  
  2012. * Which type of authentication would require a user fingerprint or facial recognition for a user to get past the screen lock on a mobile device and gain access to the device?
  2013.     > Biometric
  2014.  
  2015. * After entering a user ID and password, an online banking user must enter a PIN that was sent as a text message to the user's mobile phone.
  2016.  
  2017.     Which of the following digital security methods is being used?
  2018.     > Multifactor authentication
  2019.  
  2020. * A user is choosing a method to secure a mobile device. Which of the following types of screen locks is LEAST secure?
  2021.     > swipe lock
  2022.  
  2023. * A mobile device has poor performance and is slow to respond to touch inputs. After troubleshooting, a technician decides to perform a factory reset.
  2024.  
  2025.     Which of the following actions should a technician take before doing so?
  2026.     > Back up all data to an attached computer or a could backup service
  2027.  
  2028. * A user has configured his mobile device to unlock using facial recognition. Which of the following methods for securing a mobile device is being used?
  2029.     > Biometric authentication
  2030.  
  2031. * A mobile device user is comparing methods for securing his device. Which of the following methods for securing a mobile device can affect the device's performance?
  2032.     > Full device encryption
  2033.  
  2034. * A technician is tasked with configuring a user's personal tablet to connect to the corporate network. Which of the following should be performed before configuring access?
  2035.     > Check the tablet for unauthorized root access
  2036.  
  2037. * Joe, a user, is walking through a shopping mall. His phone frequently displays a message that additional information is needed to log in.
  2038.  
  2039.     Which of the following is the most likely cause of these messages?
  2040.     > Unintended Wi-Fi connections
  2041.  
  2042. * A technician suspects that data is being leaked from a tablet. Which of the following is the best to troubleshoot this issue?
  2043.     > App scanner
  2044.  
  2045. * A technician suspects that an app on a tablet device may be surreptitiously using the camear without permission.
  2046.  
  2047.     Which of the following would be the best way to troubleshoot this issue?
  2048.     > Run an anti-malware scan
  2049.  
  2050. * A technician installs a new touch screen on a laptop. Directly touching on an onscreen button doesn't depress or activate the button, but touching near the button does.
  2051.  
  2052.     Which of the following actions will correct the misalignment?
  2053.     > Calibrate the touchscreen
  2054.  
  2055. * A technician finds that after restoring the operating system on a mobile device, the touch screen operates unpredictably. This happens in both the default orientation or when the screen is rotated.
  2056.  
  2057.     Which of the following would best correct this problem?
  2058.     > Screen calibration
  2059.  
  2060. * A company executive has just bought a new android mobile device. She wants you to help her make sure it is protected from malware threats.
  2061.  
  2062.     What options are available and important to use to protect android devices? (Select TWO.)
  2063.     > App reviews and ratings will help you choose an effective anti-virus app
  2064.     > Anti-virus apps are available for purchase from Android app stores
  2065.  
  2066. * Why is it important to have your mobile device charger plugged in while it is receiving an operating system upgrade?
  2067.     > If the battery dies during the update, the operating system could become corrupted.
  2068.  
  2069. * What is the surest way to prevent the loss of important information on your mobile device if it is lost, stolen, destroyed, or there is a natural disaster?
  2070.     > Configure your device to remotely back up important data to the cloud
  2071.  
  2072. * You are updating the operating system on your iPad. Your iPad is connected to your computer and you are using iTunes to install the update.
  2073.  
  2074.     Which of the following best describes what would happen to your iPad if you disconnect it before the operating system update is complete?
  2075.     > If you disconnect during the update, teh operating system could become corrupted.
  2076.  
  2077. * Your iPad is configured to do remote backups everyday to iCloud. Which conditions are required for the iCloud backup to take place? (Select THREE)
  2078.     > The iPad has to have an internet connection
  2079.     > The iPad screen has to be locked
  2080.     > The iPad has to be plugged into a power source
  2081.  
  2082. * A technician is assiting Ann, who reports that the display on her company-issued smartphone is too dim to read in a dark room, even after she adjusts tht brightness setting.
  2083.  
  2084.     Which of the following actions should the technician perform first? (Choost TWO)
  2085.     > Adjust the adaptive or automatic brightness control
  2086.     > Adjust the battery saver setting
  2087.  
  2088. * Joe, a frequent visitor to a branch office, attempts to connect his tablet to the office wireless network, but is unable to connect to the internet, even though he has verified that the SSID and password are correct. Joe attempts to connect to a coworkers hotspot, but is still unable to connect to the internet.
  2089.  
  2090.     Which of the following is the most likely cause of the problem?
  2091.     > Airplane mode has been set up on the tablet
  2092.  
  2093. * Travis, a long-haul truck driver, reports that when driving on remote highways, his smartphone battery drains faster tha normal, and his phone calls often cut out.
  2094.  
  2095.     Which of the following is the most likely reason for the fast battery drain?
  2096.     > Signal drop or weak signal
  2097.  
  2098. * Joe has been issued a company-owned tablet. He finds that the performance decreases after a few hours of use. After he power-cycles the tablet, performance returns, but the tablet begins to slow again after an hour of use.
  2099.  
  2100.     Which of the followins is the best action to troubleshoot the problem?
  2101.     > Check the number apps that are running
  2102.  
  2103. * For the past few days, a mobile phone has stopped functioning and will not respond to touchscreen input. A soft reset no longer returns functionality.
  2104.  
  2105.     Which of the following is the best step the user can take to fix this problem?
  2106.     > Reset to factory default
  2107.  
  2108. * After a user checks the volume settings and makes sure its not muted, sound still isn't coming from the internal speaker on a tablet device.
  2109.  
  2110.     Which of the following is most likely the reason?
  2111.     > The audio output is being directed to a Bluetooth speaker
  2112.  
  2113. * A technician is troubleshooting a company cell phone that is overheating. Which of the following is the first action the technician should perform?
  2114.     > Determine whether the battery is warped or swollen
  2115. [CHAPTER 8]
  2116.  
  2117. [CHAPTER 9]
  2118. * A manufacturing company has customized a computer application that supervisor to track line worker efficiency. Supervisors will interact with the application within and between work areas and will also use the laptop while sitting at their
  2119.  
  2120.     Which of the following laptop features would BEST minimize the awkward move carrying a bulky laptop with a hinged display providing the flexibility to use device at a desk?
  2121.     > A rotating or removable screen
  2122.  
  2123. * A sales person typically carries a laptop computer to several offsite customer me each day, but needs the flexibilty to quickly attach other peripherals and charge the battery while at their office desk.
  2124.  
  2125.     Which of the following laptop features would BEST meet these requirements?
  2126.     > A laptop docking station
  2127.  
  2128. * A user wants to use a laptop to display a presentation on a large TV monitor that has an HDMI connection.
  2129.  
  2130.     Which of the following laptop ports or connections can be used to add this display device?
  2131.     > DisplayPort using a DisplayPort-to-HDMI cable
  2132.     > USB port using a USB-to-HDMI adapter
  2133.  
  2134. * When a presenter at a conference connects a laptop to a projector, the projector mirrors the laptop's display. The presenter would like it to extend the laptop's desktop instead.
  2135.  
  2136.     Which of the following options is the quickest way to make the change?
  2137.     > Toggle the dual display function key on the laptop
  2138.  
  2139. * A user opens a help desk ticket to replace a laptop keyboard. The user reports the cursor randomly moves when typing using the laptop keyboard, causing the user frequent typing corrections. The problem does not occur when the laptop is attached to a docking station and an external keyboard is used. You want to find a more affordable solution than replacing the keyboard.
  2140.  
  2141.     Which of the following actions would mitigate the problem?
  2142.     > Use the special function key to disable the touchpad when the laptop keyboard is used
  2143.  
  2144. * Which of the following are characteristics of the ExpressCard /54 form factor?
  2145.     > L shape
  2146.     > 34mm wide at the connector
  2147.  
  2148. * You laptop has an ExpressCard /54 slot. Which of the following is true? (Select TWO)
  2149.     > YOu can use an ExpressCard /34 card or an ExpressCard /54 in the laptop
  2150.     > Compatible ExpressCards for the laptop include cards that are rectangular shaped
  2151.  
  2152. * Which of the following input devices uses a stylus?
  2153.     > Digitizer
  2154.  
  2155. * Which of the following is an extra button or knob on a laptop that moves the mouse cursor?
  2156.     > Pointing Stick
  2157.  
  2158. * A user needs to use her laptop to give a presentation using a video projector. She is asking you how to switch the display to the external monitor port on her laptop.
  2159.  
  2160.     What should you tell her?
  2161.     > Press and hold the Fn key; then press the monitor function key (image of a monitor on it)
  2162.  
  2163. * Which component lets you use a notebook system as a desktop system by making it possible to connect a normal-sized external mouse, keyboard, monitor, and speakers?
  2164.     > Docking station
  2165.  
  2166. * Which of the following is a 172-pin DIMM often used in laptops?
  2167.     > MicroDIMM
  2168.  
  2169. * Which feature makes it possible to close some notebook computers and still use the touchscreen?
  2170.     > 180 degree rotating touchscreen
  2171.  
  2172. * A technician is tasked with replacing a Wi-Fi antenna in a laptop computer. Which of the following places would the antenna most likely be located?
  2173.     > Around the laptop's bezel
  2174.  
  2175. * A technician is tasked with increasing the RAM memory on a laptop by adding a SODIMM module to an empty memory slot.
  2176.  
  2177.     Which of the following processes will seat the module in the slot?
  2178.     > Align the notch on the long side of the memory module with the rise in the memory slot. Insert the module pins into the slot at a 45-degree angle. Rotate the module by pressing down until the slide hold-down clips snap into place
  2179.  
  2180. * A user normally connects a laptop to a company's network using the laptop's internal wireless NIC. The laptop does not have an Ethernet port. The wireless network and the replacement part will take two days to arrive.
  2181.  
  2182.     Which of the following solutions will connect the laptop to the company's wired network?
  2183.     > Use a USB-to-RJ45 dongle and connect to a wall jack with an ethernet cable
  2184.  
  2185. * A technician is tasked with replacing an internal hard drive. Which of the following hard drive standards would be of most concern when selecting a replacement?
  2186.     > The hard drive's form factor
  2187.  
  2188. * A user reports that an older laptop is having trouble connecting with newer wireless networks. Which of the following actions should a technician consider as an alternative to replacing the laptop?
  2189.     > Replace the internal wireless card
  2190.  
  2191. * After replacing a laptop touchpad, a technician finds that the touchpad does not move the cursor. However, a USB mouse does.
  2192.  
  2193.     Before opening the laptop case to recheck the connection, which of the following should the technician perform?
  2194.     > Unplug the USB mouse and recheck touchpad movements
  2195.  
  2196. * The integrated mouse, the small monitor, and the compact nature of the keyboard are impeding your work when you use a notebook, but you still need a system that is portable if necessary.
  2197.  
  2198.     What is your best option?
  2199.     > Buy a docking station for your notebook
  2200.  
  2201. * As an IT technician, you are often asked to work on laptop computers that include wireless network cards.
  2202.  
  2203.     Which of the following is the most commonly used type of card for these internal wireless adapters?
  2204.     > Mini-PCI
  2205.  
  2206. * An internal laptop keyboard is generally connected to the laptop's system board using a:
  2207.     > Ribbon cable
  2208.  
  2209. * You have a notebook computer with a built-in wireless network card. One day, it stops working. Because the network card is integrated onto the motherboard, you do not want to replace the entire motherboard.
  2210.  
  2211.     What can you use to connect to the wireless network? (Select TWO.)
  2212.     > Insert an ExpressCard wireless network card
  2213.     > Insert a wireless USB network card
  2214.  
  2215. * You need to replace the video card in a laptop. What is the first step?
  2216.     > Find a service manual with correct disassembly procedures
  2217.  
  2218. * Which type of interface is typically used for internal wireless networking cards in the laptops?
  2219.     > Mini-PCI
  2220.  
  2221. * You need to replace the hard disk in your laptop computer. Which of these hard drive sizes would you likely choose for the laptop?
  2222.     > 2.5"
  2223.  
  2224. * You have removed the bezel from a notebook display that has stopped functioning. You see a DC-to-AC power inverter at the base of the screen.
  2225.  
  2226.     Which of the following BEST describes the type of display you are working with?
  2227.     > An LCD display that uses CCFL backlighting
  2228.  
  2229. * You're troubleshooting a malfunctioning notebook computer system. The user has indicated that the LCD screen suddenly became dark and difficult to read while he was downloading a large file through his wireless network card while the system was plugged in at his desk. You've checked the system and determined that the backlight has stopped working.
  2230.  
  2231.     Which of the following is the MOST likely cause? (Select TWO).
  2232.     > The inverter in the LCD assembly has malfunctioned
  2233.     > The cold cathode fluorescent lamp has burned out and needs to be replaced
  2234.  
  2235. * A technician installs a new touch screen on a laptop. Directly touching on an onscreen button doesn't depress or activate the button, but touching near the button does.
  2236.  
  2237.     Which of the following actions will correct the misalignment?
  2238.     > Calibrate the touchscreen
  2239.  
  2240. * A technician finds that after restoring the operating system on a mobile device, the touchscreen operates unpredictably. This happens in both the default orientation or when the screen is rotated.
  2241.  
  2242.     Which of the following would BEST correct the problem?
  2243.     > Screen calibration
  2244.  
  2245. * A company executive has just bought a new Android mobile device. She wants you to help her make sure that it is protected from malware threats.
  2246.  
  2247.     What options are available and important to use to protect Android devices? (Select TWO.)
  2248.     > Anti-virus apps are available for purchase from android app stores
  2249.     > App reviews and ratings will help you choose an effective anti-virus app
  2250.  
  2251. * Why is it important to have your mobile device charger plugged in while it is receiving an operating system update?
  2252.     > If the battery dies during the update, the operating system could become corrupted
  2253.  
  2254. * What is the surest way to prevent the loss of important information on your mobile device if it is lost, stolen, destroyed, or there is a natural disaster?
  2255.     > Configure your device to remotely back up important data to the cloud
  2256.  
  2257. * You are updating the operating system on your iPad. Your iPad is connected to your computer and you are using iTunes to install the update.
  2258.  
  2259.     Which of the following BEST describes what would happen to your iPad if you disconnect it before the operating system update is complete?
  2260.     > If you disconnect during the update, the operating system could become corrupted
  2261.  
  2262. * Your iPad is configured to do remote backups everyday to iCloud. What conditions are required for the iCloud backup to take place? (Select THREE)
  2263.     > The iPad has to have an internet connection
  2264.     > The iPad has to be plugged into a power source
  2265.     > The iPad screen has to be locked
  2266.  
  2267. * A technician is assisting Ann, who reports that the display on her company issused smartphone is too dim to read in a dark room, even after she adjusts the brightness setting.
  2268.  
  2269.     Which of the following actions should the technician perform FIRST? (Select TWO)
  2270.     > Adjust the battery saver setting
  2271.     > Adjust the adapative or automatic brightness control
  2272.  
  2273. * Joe, a frequent visitor to a branch office, attempts to connect his tablet to the office wireless network, but is unable to connect to the internet, even though he has verified that the SSID and password are correct. Joe attempts to connect to a coworker's hotspot, but is still unable to connect to the internet.
  2274.  
  2275.     Which of the following is the MOST likely cause of this issue?
  2276.     > Airplane mode has been set on the tablet
  2277.  
  2278. * Travis, a longhaul truck driver, reports that when driving on remote highways, his smartphone battery drains faster than normal, and his phone calls often cut out.
  2279.  
  2280.     Which of the following is the MOST likely reason for the fast battery drain?
  2281.     > Signal drop or weak signal
  2282.  
  2283. * Joe has been issued a company owned tablet. He finds that the performance decreases after a few hours of use. After he powercycles the tablet, performance returns, but the tablet begins to slow again after an hour of use.
  2284.  
  2285.     Which of the following is the BEST action to troubleshoot the problem?
  2286.     > Check the number of apps that are running
  2287.  
  2288. * For the past few days, a mobile phone has stopped functioning and will not respond to touchscreen input. A soft reset no longer returns functionality.
  2289.  
  2290.     Which of the following is the BEST step the user can take to fix this problem?
  2291.     > Reset to factory default
  2292.  
  2293. * After a user checks the volume settings and makes sure it's not muted, sound still isn't coming from the internal speaker on a tablet device.
  2294.  
  2295.     Which of the following is MOST likely the reason?
  2296.     > The audio output is being directed to a Bluetooth speaker
  2297.  
  2298. * A technician is troubleshooting a company cell phone that is overheating. Which of the following is the first action the technician should perform?
  2299.     > Determine whether the battery is warped or swollen
  2300.  
  2301. * Which of the following battery types offers the greatest storage capacity in the smallest amount of space?
  2302.     > Lithium ion (LIB)
  2303.  
  2304. * Which of the following battery types has the greatest need to be completely drained before being recharged?
  2305.     > Nickel cadmium (NiCad)
  2306.  
  2307. * From your laptop, you have been working on a large project that has required you to open a lot of items (programs, files, etc). It is time to leave the office and make the two hour journey home. You will be working on this project a bit more when you arrive at home. Your computer's battery is failing and only has a very short life span (about one hour) before your computer loses power. When you arrive home and open the lid of your laptop, nothing happens. After plugging in your computer and powering it on, you find that all of your programs and files have been closed. To troubleshoot this, you open Control Panel and navigate to the settings that control what your computer will do when the laptop lid is closed.
  2308.  
  2309.     Which of the following power settings MUST you choose to prevent the same problem in the future?
  2310.     > Which I close the lid: Hibernate
  2311.  
  2312. * You want to configure Power Plans on your Windows 7 laptop computer. Which of the following can do this? (Select TWO)
  2313.     > Go to settings > System > Power & Sleep
  2314.     > In the notification area, double-click the battery icon. Click Power Options.
  2315.  
  2316. * Which ACPI power state retains the contents in RAM, but turns all other components off?
  2317.     > Suspend
  2318.  
  2319. * You want to use Hibernation on your Windows notebook. What does it need to have?
  2320.     > Enough free hard drive space
  2321.  
  2322. * You have just purchased a used laptop, and you want to configure it to hibernate when you press the power button. You edit the Power Options settings and enable hibernation, then you conigure the power button to trigger hibernation. Everything works fine for several weeks. However, one day when you press the power button, the laptop does not hibernate.
  2323.  
  2324.     Which of the following will BEST resolve this issue?
  2325.     > Free up disk space
  2326.  
  2327. * A technician is tasked with repairing a laptop with sticking keys. Which of the following actions should the technician perform before replacing the keybaord?
  2328.     > Spray compressed air between the keys
  2329.  
  2330. * Recently, your laptop won't power on, and the battery is not charging. You suspect the block on the power cord (also known as a brick) no longer works.
  2331.  
  2332.     Which tool wil help you troubleshoot this problem?
  2333.     > Multimeter
  2334.  
  2335. * A user complains that his notebook display has started to go dim intermittently. You suspect the backlight might need to be replaced, but you want to verify that the backlight is failing before you replace it.
  2336.  
  2337.     Which of the following would be BEST to check before replacing the backlight?
  2338.     > Make sure that the dimming isn't being caused by a power saving method that has been configured to conserve notebook power
  2339.  
  2340. * Vera has brought her notebook computer to you for repair. After listening to her describe its symptoms, you hypothesize that the notebook may have a malfunctioning keyboard.
  2341.  
  2342.     Which of the following steps can you take to BEST determine whether the keyboard needs to be replaced? (Select TWO)
  2343.     > Check for special keyboard features that could be enabled that may cause some keys to perform alternate tasks
  2344.     > Connect an external keyboard
  2345.  
  2346. * A user hibernates a laptop after giving a video presentation. Now, when it resumes, the display flickers for a moment, but remains blank. A technician suspects a bad graphics processing unit (GPU).
  2347.  
  2348.     Which of the following troubleshooting steps should be completed? (Select TWO)
  2349.     > Toggle the dual display function key
  2350.     > Connect an external display device
  2351.  
  2352. * A technician is servicing a laptop that works properly when the power adapter is plugged in. Even though the battery icon shows that the battery is fully charged, when the laptop is unplugged, the laptop immediately shuts down.
  2353.  
  2354.     Which of the following actions should the technician perform?
  2355.     > Replace the laptop battery
  2356.  
  2357. * A user calls the help desk stating that the touchpad on a laptop does not work. Which of the following actions would BEST help the technician diagnose the problem?
  2358.     > Toggle the trouchpad function key
  2359.  
  2360. * A technician is assisting a user with rebooting a frozen laptop that does not respond to keystrokes or mouse clicks.
  2361.  
  2362.     Which of the following is the SIMPLEST way to power down the laptop?
  2363.     > Hold down the power button for several seconds
  2364.  
  2365. * A technician is replacing a hard drive in a laptop. Which of the following is the FIRST action the technician should perform before opening the laptop case?
  2366.     > Review the laptop manufacturer's documentation
  2367.  
  2368. * After arriving in a new city today, a traveling sales team member calls you stating that his wireless connection no longer works. He has checked the wireless configuration, and he knows it to be correct because it was working yesterday.
  2369.  
  2370.     What should you do first?
  2371.     > Have him verify that the wireless card's hardware switch is in the On position
  2372.  
  2373. * You have just purchased a new laptop with built-in 802.11 wireless and Bluetooth capabilities. When you boot into Windows, you do not see a Blueooth adapter listed in Device Manager.
  2374.  
  2375.     Which of the following would be BEST to perform first?
  2376.     > Enable Bluetooth in the BIOS/UEFI configuration
  2377.  
  2378. * In preparation to use your laptop on the airplane as you travel to a conference, you disconnected the USB mouse. The cursor drifts consistently to the left side of the screen while using the built-in trackpad and mouse buttons.
  2379.  
  2380.     Which of the following actions would MOST likely stop the mouse from drifting?
  2381.     > Access the BIOS/UEFI configuration and disable the USB pointer option
  2382.  
  2383. * You're troubleshooting a notebook system that uses a digitizer pad and stylus for user input. The user has complained that the digitizer pad registers stylus registers taps about one inch to the right of where the taps actually occur.
  2384.  
  2385.     Which of the following actions would MOST likely fix this issue?
  2386.     > Recalibrate the digitizer pad
  2387.  
  2388. * A user is trying to log into Windows on her notebook computer. She enters the correct password for her user account, but the system won't let her authenticate, claiming the wrong password has been entered.
  2389.  
  2390.     Which of the following is MOST likely causing this problem?
  2391.     > She has turned Num Lock on, causing the keyboard to register numbers instead of letters
  2392.  
  2393. * You are troubleshooting a malfunctioning laptop computer. Nothing appears on the LED display when the system is powered on.
  2394.  
  2395.     Which of the following is the BEST step to try first?
  2396.     > Plug in an external monitor
  2397.  
  2398. * The human resources department wants to give gifts away at the company's summer party. They would like to have an assortment of fitness tracker wristbands, smartwatches, smart glasses, and virtual reality headsets. They have been trying to locate these on the internet, but have been unsuccessful.
  2399.  
  2400.     Which of the following types of mobile devices should you tell them to search for?
  2401.     > Wearable devices
  2402.    
  2403. * Which component within a tablet device measures acceleration horizontally and vertically at the same time?
  2404.     > Gyroscope
  2405.  
  2406. * You are currently managing a few Apple iPad devices that run the iOS operating system. Which of the following BEST describes the architecture used by this device?
  2407.     > ARM
  2408.  
  2409. * Which feature allows a tablet to recognize multiple finger touches at the same time?
  2410.     > Multi-touch
  2411.  
  2412. * Closed source and second most popular mobile device operating system
  2413.     > iOS
  2414.  
  2415. * Device manufacturers are countless
  2416.     > Android
  2417.  
  2418. * Open source and most popular mobile device operating system
  2419.     > Android
  2420.  
  2421. * Device manufacturers include Microsoft, Samsung, and HTC.
  2422.     > Windows
  2423.  
  2424. * Devices solely designed and developed by Apple
  2425.     > iOS
  2426.  
  2427. * Closed source and third most popular mobile device operating system
  2428.     > Windows
  2429.  
  2430. * When a user rotates a mobile device, the operating system changes the screen orientation so that the display remains upright to the user.
  2431.  
  2432.     Which of the following technologies is used to detect this device movement? (Select TWO)
  2433.     > Accelerometer
  2434.     > Gyroscope
  2435.  
  2436. * Drivers for a small trucking company rely on a smartphone navigation application. When the smartphone loses internet connectivity, the maps don't update properly. Also, the company pays extra for a premium data service plan to support the application.
  2437.  
  2438.     Which of the following mobile devices could replace the smartphone navigation application, could provide map coverage when internet connectivity is lost, and does not require a data plan?
  2439.     > A GPS-enabled personal navigation device
  2440.  
  2441. * A landscaping company's employees receive payment for their services using a credit card reader that physically attaches to an Apple mobile device.
  2442.  
  2443.     Which of the following connection types is being used?
  2444.     > Lightning
  2445.  
  2446. * While traveling in a car, a user who has an unlimited data plan on a smartphone opens a wireless connection to share the internet with other passengers.
  2447.  
  2448.     Which of the following connection types is MOST likely being used?
  2449.     > Hotspot
  2450.  
  2451. * A technician is tasked with configuring a mobile device to connect securely to the company network when the device is used at offsite locations where only internet connectivity is available.
  2452.  
  2453.     Which of the following should the technician configure?
  2454.     > VPN
  2455.  
  2456. * You have recently issued new mobile phones to the sales team in your company. Each phone has the ability to store and transmit encrypted information for such things as making payments at a checkout counter.
  2457.  
  2458.     Which of the following technologies is being used in these phones?
  2459.     > NFC chips
  2460.  
  2461. * A physical location where you can obtain wireless internet access using a WLAN
  2462.     > Hotspot
  2463.  
  2464. * A connector used to emulate cryptographic smart card functionalities
  2465.     > NFC
  2466.  
  2467. * Provides mobile devices with access to network resources and software applications on their home network when they connect using other wireless or wired networks.
  2468.     > Mobile VPN
  2469.  
  2470. * Allows you to share the internet connection of a phone with a laptop
  2471.     > Tethering
  2472.  
  2473. * A wireless technology standard for exchanging data over short distances
  2474.     > Bluetooth
  2475.  
  2476. * You just purchased an iPad tablet device. You want to synchronize your photos, music, email, and contacts from your Windows 10 PC to the device.
  2477.  
  2478.     How can you connect the device to the PC? (Select TWO) (Each option is a complete solution)
  2479.     > USB cable
  2480.     > Wi-Fi wireless connection
  2481.  
  2482. * You have subscribed to a cloud-based service to synchronize data between your mobile device and your PC. Before allowing the data to be synchronized, this service uses a process where the cloud service and the client on the mobile device verify each other's security certificates.
  2483.  
  2484.     What is this process called?
  2485.     > Mutual authentication
  2486.  
  2487. * A company is considering providing smarphones to their employees and is investigating the interaction of the phones with iTunes, iCloud, Google Drive, Dropbox, and OneDrive.
  2488.  
  2489.     Which of the following data synchronization methods is being considered?
  2490.     > Synchronization to the cloud
  2491.  
  2492. * A technician is tasked to add a valid certificate to a mobile device so that encrypted emails can be opened.
  2493.  
  2494.     Which of the following email protocols is being used?
  2495.     > S/MIME
  2496.  
  2497. * You currently use the Exchange email client on your desktop PC. You use it to connect to an email server provided by a service provider using the IMAP and SMTP protocols. You recently purchased an iPad, and you want to configure its Mail app to connect to your email server.
  2498.  
  2499.     Which of the following BEST describes whether this task can be accomplished?
  2500.     > You can configure the Mail app on an iPad to connect to an email server using the IMAP and SMTP protocols
  2501.  
  2502. * Which of the following protocols can be enabled so email is encrypted on a mobile device?
  2503.     > SSL
  2504.  
  2505. * You use productivity apps on your iPad tablet device while traveling between client sites. You're converned that you may lose your iPad while on the road and want to protect the data stored on it from being compromised. Currently, your iPad uses a 4-digit PIN number for a passcode. You want to use a more complex alphanumeric passcode. You also want all data on the device to be erased if the wrong passcode is entered more than 10 consecutive times.
  2506.  
  2507.     What should you do? (Select TWO) (Each option is part of the complete solution)
  2508.     > Enable the Erase Data option
  2509.     > Disable the Simple Passcode option
  2510.  
  2511. * Which of the following are the BEST steps you can take to avoid having your mobile device exploited by a hacker or infect by a virus? (Select TWO)
  2512.     > Lock the screen with some form of authentication
  2513.     > Keep the operating system up to date
  2514.  
  2515. * Which of the following will improve the security of sensitive information on your device if it is lost or stolen? (Select THREE)
  2516.     > Remote wipe
  2517.     > Locator application
  2518.     > A screen lock
  2519.  
  2520. * Applications for mobile devices fall into two categories. Some have been reviewed, approved, and signed with a certificate by the app service, and some have not.
  2521.  
  2522.     Which category do apps fall into if they have been signed with a certificate?
  2523.     > Trusted
  2524.  
  2525. * Applications for mobile devices fall into two categories. Some have been reviewed, approved, and signed with a certificate by the app service, and some have not.
  2526.  
  2527.     What category do apps fall into if they have note been reviewed, approved, and signed with a certificate?
  2528.     > Untrusted
  2529.  
  2530. * You have an executive user who keeps sensitive information about the company on a company-owned mobile device. You want to be prepared to keep company information secure if he loses this device or gets it stolen.
  2531.  
  2532.     Which of the following solutions should you use? (Select TWO)
  2533.     > Mobile device management software that performs remote wipes
  2534.     > Mobile device management software that performs full device encryption
  2535.  
  2536. * Which type of authentication would require a user fingerprint or facial recognition for a user to get past the screen lock on a mobile device and gain access to the device?
  2537.     > Biometric authentication
  2538.  
  2539. * After entering a user id and password, an online banking user must enter a PIN that was sent as a text message to the user's mobile phone.
  2540.  
  2541.     Which of the following digital security methods is being used?
  2542.     > Multifactor authentication
  2543.  
  2544. * A user is choosing a method to secure a mobile device. Which fo the following types of screen locks is LEAST secure?
  2545.     > Swipe lock
  2546.  
  2547. * A mobile device has poor performance and is slow to respond to screen inputs. After troubleshooting, a technician decides to perform a factory reset.
  2548.  
  2549.     Which of the following actions should a technician take before doing so?
  2550.     > Back up all data to an attached computer or a cloud backup service
  2551.  
  2552. * A user has configured his mobile device to unlock facial recognition. Which of the following methods for securing a mobile device is being used?
  2553.     > Biometic authentication
  2554.  
  2555. * A mobile device user is comparing methods for securing the device. Which of the following methods for securing a mobile device can affect the device's performance?
  2556.     > Full device encryption
  2557.  
  2558. * A technician is tasked with configuring a user's personal tablet to connect to the corporate network. Which of the following should be performed before configuring access?
  2559.     > Check the tablet for unauthorized root access
  2560.  
  2561. * Joe, a user, is walking through a shopping mall. His phone frequently displays a message that additional information is needed to log in.
  2562.  
  2563.     Which of the following is the MOST likely cause of these messages?
  2564.     > Unintended Wi-Fi connections
  2565.  
  2566. * A technician suspects that data is being leaked from a tablet. Which of the following is the BEST tool to troubleshoot this issue?
  2567.     > App scanner
  2568.  
  2569. * A technician suspects that an app on a tablet device amy be surreptitiously using the camera without permission.
  2570.  
  2571.     Which of the following would be the BEST way to troubleshoot this issue?
  2572.     > Run an anti-malware scan
  2573.  
  2574. * A user has called to complain that he can't connect to your organization's wireless network from his laptop. You know that the wireless signal is strong in his location.
  2575.  
  2576.     What should you do?
  2577.     > Check to see if the wireless adapter is switched off
  2578.  
  2579. * Your lobby receptionist uses a laptop computer to complete her day-to-day tasks. You are concerned about the security of her system.
  2580.  
  2581.     What should you do?
  2582.     > Configure the laptop with a biometric fingerprint scanner
  2583.     > Secure the laptop to the desk using a cable lock
  2584.  
  2585. * Laptop memory uses SODIMM and UniDIMM packages with SDRAM and DDR/DDR2/DDR3/DDR4 memory.
  2586.  
  2587.     What are these modules sometimes called?
  2588.     > MicroDIMMs
  2589.  
  2590. * Which type of interface is most commonly used for internal hard disks in notebook systems?
  2591.     > SATA
  2592.  
  2593. * The power cord for the laptop has a block on it (sometimes called a brick). What does this block do?
  2594.     > Converts AC power to DC power
  2595.  
  2596. * You have been told to replace the hard drive on a laptop computer that has a drive bay accessible from the outside of the computer.
  2597.  
  2598.     Which of the following should you do after powering down the system? (Select TWO)
  2599.     > Remove the battery
  2600.     > Unplug the AC power
  2601.  
  2602. * You want to upgrade the memory modules in a notebook computer. What are the most common ways to access the memory slots? (Select TWO)
  2603.     > Open a panel on the bottom of the notebook
  2604.     > Remove the keyboard
  2605.  
  2606. * You're troubleshooting a malfunctioning notebook computer system. The user has indicated that the screen is always dark and difficult to read even while the system is plugged into a wall outlet. You checked the system and determined the backlight isn't working.
  2607.  
  2608.     Which of the following could be the cause?
  2609.     > The LCD cutoff switch is stuck in the Off position
  2610.  
  2611. * A user in sales cannot get hit laptop to display through a projector. He sees the screen output ont he built-in display, but the video is not being seen on the projector.
  2612.  
  2613.     What should you do first?
  2614.     > Use the Fn key to redirect display to the external video port
  2615.  
  2616. * Six months ago, you purchased a new laptop. Since then, you have noticed that the battery life has been steadily going down. When it was new, a full charge lasted about 3 hours. Now you are lucky to get 2 hours before the battery charge drops below 5%.
  2617.  
  2618.     What shoulds be your first step to correct this problem?
  2619.     > Calibrate the battery
  2620.  
  2621. * You recently replaced a malfunctioning video card on your laptop. After reassembling the laptop, everythign works well except for the wireless network connection. The wireless adapter functioned correctly before you replaced the video card.
  2622.  
  2623.     What would most likely resolve this problem?
  2624.     > Reconnect the antenna connections
  2625.  
  2626. * You're troubleshooting a malfunctioning LED display on a notebook computer system. An external monitor correctly displays the output from the notebook.
  2627.  
  2628.     Which of the following could be the cause?
  2629.     > Failed backlight
  2630.  
  2631. * A panicked user comes to you at the support desk and asks you to come to his office because his notebook has no power. He's positive that his battery has completely failed because he came in this morning and there is no power at all to his laptop. He left it plugged in on his desk all night, but it will not turn on. He has an important presentation to make in a couple of hours and insists that you bring a replacement battery.
  2632.  
  2633.     What troubleshooting steps should you do before replacing the battery? (Select TWO)
  2634.     > Make sure the AC cord is securely plugged into both the wall outlet and the power adapter
  2635.     > Make sure the DC cord from the power adapter is plugged firmly into the notebook power connector
  2636.  
  2637. * A user recently used her notebook to make a presentation that required her to display her screen from a projector in the conference room. She is now back at her desk, her notebook is still on, but the display is blank.
  2638.  
  2639.     What should you do first to try to restore the display?
  2640.     > Use the Fn keys to toggle the display output to the laptop monitor
  2641.  
  2642. * If a notebook is exhibiting symptoms that seem to indicate a malfunctioning keyboard, what troubleshooting steps can you take to determine if the keyboard needs to be replaced? (Select TWO)
  2643.     > Connect an external keyboard
  2644.     > Check for special keyboard functions that could be enabled that may cause some keys to perform alternate tasks
  2645.  
  2646. * If a notebook computer with an intergrated wireless network adapter shows that there is no wireless network connection, what should you check first?
  2647.     > Make sure the switch that turns the wireless network card on and off is in the On position
  2648. [CHAPTER 9]
  2649.  
  2650. [CHAPTER 10]
  2651. * You are purchasing several PC systems that will be used as thin clients in a large organization.
  2652.  
  2653.     Which hardware selection criteria would be most important for this system?
  2654.     > Gigabit Ethernet adapter
  2655.  
  2656. * You want to purchase a home theater. Which hardware selection criteria would be most important for this system? (Select TWO).
  2657.     > Video card with HDMI output
  2658.     > HTPC form factor
  2659.  
  2660. * You have been tasked with designing a workstation that will run VMware Workstation hypervisor software. It will be used by a software engineer to run virtual machines for app testing.
  2661.  
  2662.     Which criteria should be included in your design for this system? (Select TWO).
  2663.     > 64-bit processer with 6 cores
  2664.     > RAM configured to run in triple-channel mode
  2665.  
  2666. * You are purchasing a PC system that will be used as a file and printer server in a small business.
  2667.  
  2668.     Which hardware selection criteria would be most important for this system? (Select TWO).
  2669.         > RAID 1+0 array
  2670.         > 64-bit multi-core processor
  2671.    
  2672. * You have been tasked with designing a workstation that will run VMware Workstation virtualization software. It will be used by a software engineer to run virtual machines for application development and testing.
  2673.  
  2674.     Which criteria should be includede in your design for this system? (Select TWO).
  2675.     > 64-bit processor with 8 cores
  2676.     > RAM configured to run in quad-channel mode
  2677.  
  2678. * You want to purchase a home theater computer system. Which hardware selection criteria would be most important for this system? (Select TWO).
  2679.     > HTPC form factor
  2680.     > Video card with HDMI output
  2681.  
  2682. * You are purchasing a PC system that will be used as a file and print server in a small business.
  2683.  
  2684.     Which hardware selection criteria would be most important for this system? (Select TWO).
  2685.     > RAID 1+0 array
  2686.     > 64-bit multicore processor
  2687.  
  2688. * You own a custom PC retail store. A small business client asks you to build three workstations for her organization: Virtualization Workstation, Video Editing Workstation, Thin Client PC
  2689.  
  2690.     Drag and drop each workstation type onto the most appropriate PC hardware on the left.
  2691.     > Virtualization Workstation
  2692.         > AMD 12-core
  2693.         > 4 GHz CPU
  2694.         > 4 TB SATA HD
  2695.         > 32 GB DDR4 RAM
  2696.         > HAV
  2697.     > Video Editing Workstation
  2698.         > Intel Core i7 sixcore
  2699.         > 3.4 GHz CPU
  2700.         > 2 TB SSD SATA HD
  2701.         > 16 GB DDR4 RAM
  2702.         > Video capture card
  2703.     > Thin Client PC
  2704.         > Intel Celeron dual-core
  2705.         > 2.7 GHz CPU
  2706.         > 500 GB SATA HD
  2707.         > 2 GB DDR3 RAM
  2708.         > Few or no applications installed
  2709.  
  2710. * You are a PC technician for a national computer retailer. A customer asks you to build three custom computers for him to use at his home office: Gaming PC, Home Office Server, Thick Client Workstation
  2711.  
  2712.     Drag and drop each workstation type onto the most appropriate PC hardware on the left. Each workstation type can be used more than once.
  2713.     > Home Office Server
  2714.         > 2 TB RAID 5 disk array
  2715.         > 600 W power supply
  2716.         > No audio adapter
  2717.         > Integrated video adapter
  2718.     > Gaming PC
  2719.         > 1000 W power supply
  2720.         > 1 TB SATA HD
  2721.         > Dual SLI 6 GB PCIe video adapter
  2722.         > 5.1 channel surround sound adapter
  2723.         > Liquid CPU cooler
  2724.     > Thick Client Workstation
  2725.         > 400 W power supply
  2726.         > 500 GB SATA HD
  2727.         > 512 MB PCIe video adapter
  2728.         > Basic desktop applications installed
  2729.    
  2730. * You are a PC technician for a national computer retailer. A business customer asks you to build three custom computers to be used by employees at a branch office: CAD / CAM Design Workstation, Home Theater PC, Virtualization Workstation
  2731.  
  2732.     Drag and drop each workstation type onto the most appropriate PC hardware on the left. Each workstation type can be used more than once
  2733.     > CAD / CAM Design Workstation
  2734.         > 6 GB GDDR5 PCIe video adapter
  2735.         > 32 GB PC42130 DDR4 ECC RAM
  2736.         > 1 TB SATA HD
  2737.     > Home Theater PC (HTPC)
  2738.         > HDMI output
  2739.         > Compact form factor
  2740.         > 5.1 channel surround sound adapter
  2741.         > TV tuner adapter
  2742.         > Remote control
  2743.     > Virtualization Workstation
  2744.         > 32 GB PC42130 DDR4 RAM
  2745.         > 4 TB SATA HD
  2746.         > Integrated video adapter
  2747.  
  2748. * You are a PC technician for a national computer retailer. You are asked to build each of the systems listed on the right. You need to use the most appropriate hardware components to ensure that each of these systems will fulfill its intended role.
  2749.  
  2750.     Drag and drop the most appropriate list of components on the left to the system type on the right that needs those components to accomplish the work it is expected to do. (One list of components will not be the most appropriate for any of the systems listed on the right)
  2751.     > Home Office Server
  2752.         > 2 TB RAID 5 disk array
  2753.         > 600 W power supply
  2754.         > No audio adapter
  2755.         > Integrated video adapter
  2756.     > Gaming PC
  2757.         > 1000 W power supply
  2758.         > 1 TB SATA HD
  2759.         > Dual SLI 6 GB PCIe video adapters
  2760.         > 5.1 channel surround sound adapter
  2761.         > Liquid CPU cooler
  2762.     > Home Theater PC
  2763.         > HDMI output
  2764.         > Compact form factor
  2765.         > 5.1 channel surround sound adapter
  2766.         > TV tuner adapter
  2767.     > Virtualization Workstation
  2768.         > AMD 12-core
  2769.         > 4 GHz CPU
  2770.         > 4 TB SATA HD
  2771.         > 32 GB DDR4 RAM
  2772.         > Hardware-assisted virtualization
  2773.     > Thin Client Workstation
  2774.         > Intel Celeron dual-core
  2775.         > 2.7 GHz CPU
  2776.         > 500 GB SATA HD
  2777.         > 2 GB DDR3 RAM
  2778.         > Few or no applications installed
  2779.     > Audio/Video Editing Workstation
  2780.         > Intel Core i7 six-core
  2781.         > 3.4 GHz CPU
  2782.         > 2 TB SSD SATA HD
  2783.         > 16 GB DDR4 RAM
  2784.         > High-end audio adapter with speaker system
  2785.         > High-end video adapter with dual displays
  2786.  
  2787. * You have a computer currently running Windows 7. Which of the following reasons would justify performing a clean installation of Windows 10 on the system instead of an upgrade?
  2788.     > You want to dual-boot both operating systems
  2789.  
  2790. * You are preparing for an installion of 64-bit Windows 10 on a computer that is currently running a 64-bit version of Windows 7. You perform a hardware inventory on the coputer and note the following: 2.0 GHz Processor, 200 GB Free Hard Drive Space, 1 GB RAM, 18x DVD drive, 100 Mbps NIC
  2791.  
  2792.     You need to prepare this computer to ensure that it meets the minimum hardware requirements of Windows 7. What should you do?
  2793.     > Upgrade to at least 2 GB of RAM
  2794.  
  2795. * You are working as a desktop technician for a small company. You recently bought a new desktop computer with 6 GB RAM and a video card with 512 MB of memory. You want to install Windows 10 on this system. You need to use the edition of Windows 10 that will use the full 6 GB of available RAM.
  2796.  
  2797.     What should you do?
  2798.     > Install Windows 10 64-bit Enterprise edition
  2799.  
  2800. * You have a workstation running Windows Vista Business edition that you would like to upgrade to Windows 10 Enterprise edition. You want to perform the upgrade with the least amount of effort and cost.
  2801.  
  2802.     What should you do?
  2803.     > Purchase a full version of Windows 10
  2804.     > Perform a custom installation
  2805.  
  2806. * You're about to begin an upgrade of a Windows 7 workstation to Windows 10. What should you do before beginning? (Select TWO)
  2807.     > Create a system backup of the hard drive prior to running the upgrade
  2808.     > Verify that the computer meets the minimum requirements
  2809.  
  2810. * You manage the desktop computers at a company. You are in charge of 100 computers, all of which run Windows 7. You want to upgrade all computers to Windows 10. Prior to the upgrade, you need to verify the compatibilty of each computer with Windows 10.  You want to gather the necessary information as quickly as possible.
  2811.  
  2812.     What should you do?
  2813.     > Use the Microsoft Assessment and Planning Toolkit (MAP)
  2814.  
  2815. * You have a computer with a 64-bit dual-core processor that runs the 32-bit version of Windows 7 Professional edition.  You would like to upgrade to the 64-bit version of Windows 10 Professional. You want to perform the upgrade with the least amount of effort possible.
  2816.  
  2817.     Which of the following steps are required to accomplish this? Select TWO.
  2818.     > Get 64-bit drivers for all hardware
  2819.     > Perform a clean installation
  2820.  
  2821. * You have a workstation running a 64-bit version of Windows 8.1 Professional that you would like to upgrade to Windows 10 Professional. You want to perform the upgrade with the least amount of effort and cost.
  2822.  
  2823.     What should you do?
  2824.     > Purchase a 64-bit upgrade version of Windows 10
  2825.     > Perform an inplace upgrade
  2826.  
  2827. * You want to upgrade your Windows 7 Professional computer to Windows 10 Professional. You begin by checking the hardware and discover it has 1 GB of RAM, a 2.0 GHz dual-core processor, a 128 GB solid state drive, and a video adpater with 128 MB RAM and DirectX 9 support. You want to install the 64-bit version of Windows 10.
  2828.     > Add more memory
  2829.  
  2830. * Match the Windows version on the left with the appropriate system requirements or features on the right. Each Windows version may be used only once.
  2831.     > Windows Vista
  2832.         > 800 MHz processor
  2833.     > Windows 7
  2834.         > 1 GHz processor (support for PAE, NX, and SSE2 not required)
  2835.     > Windows 8/8.1
  2836.         > Metro design interface
  2837.     > Windows 10
  2838.         > 2 GB RAM for a 64-bit system
  2839.  
  2840. * Match each Windows version on the left with its associated features on the right. Each Windows version can be used once, more than once, or not at all.
  2841.     > Windows Vista
  2842.         > Windows Sidebar
  2843.     >Windows 7
  2844.         > Enhanced Aero features including Snap, Shake, and Peek
  2845.         > Introduced the Libraries feature
  2846.     > Windows 8/8.1
  2847.         > Start Screen similar to the Windows Phone
  2848.         > Metro design interface
  2849.     > Windows 10
  2850.         > Free upgrade available
  2851.         > Microsoft Edge web browser
  2852.  
  2853. * You have been asked to install Windows 7 on 10 different computers for a new branch office your company is setting up. The computers have been purchased from different companies and have different hardware.
  2854.  
  2855.     Which method should you use to reduce the installation time and the effort you need to spend?
  2856.     > Unattended
  2857.  
  2858. * Your supervisor recently purchased 100 desktop computer systems and 100 new Windows 10 licenses for your organization's Accounting department. She received a single Windows 10 installation disc with the licenses.
  2859.  
  2860.     Which of the following would be the best installation methods to use? (Select TWO)
  2861.     > Install one system and image it to the other systems
  2862.     > Use a network installation
  2863.  
  2864. * Which installation method is best for large numbers of computers that share the same hardware configuration? (Select TWO)
  2865.     > Disk image
  2866.     > Network installation
  2867.  
  2868. * You want to install Windows on a mirrored disk array. You run the motherboard disk configuration utility and create the RAID 1 array, then configure the system to boot from the Windows installation disc. The installation starts but does not detect the RAID array.
  2869.  
  2870.     What should you do?
  2871.     > During the install, browse to and select the appropriate driver for your RAID controller when prompted where you want to install Windows
  2872.  
  2873. * You need to install Windows 10 on a new computer system that uses a SATA SSD device to store data. What should you do to complete this installation?
  2874.     > Install Windows in the same way you would a system that uses a standard hard disk drive
  2875.  
  2876. * You recently purchased a copy of Windows 10 from a retail store. However, the system you want to install Windows on doesn't have an optical drive.
  2877.  
  2878.     What is the best option to install Windows in this scenario?
  2879.     > Use the Windows 7 USB/DVD Download Tool to copy the installation files to a USB flash drive
  2880.  
  2881. * You're formatting a newly installed hard disk with Disk Management and are at the point where you need to select the type of file system to be used.
  2882.  
  2883.     Which of the following scenarios would require selecting the FAT32 file system?
  2884.     > You need the disk to be backwards compatible with older versions of Windows
  2885.  
  2886. * You have a computer where a removable disk drive has been formatted with NTFS. You want the drive to use FAT32 to be compatible with more operating systems. The drive is currently configured using drive letter D:
  2887.  
  2888.     What should you do?
  2889.     > Back up the data on the D: drive
  2890.     > Reformat the D: drive using FAT32
  2891.     > Restore the data
  2892.  
  2893. * Under what conditions should you choose exFAT over FAT32 or NTFS? (Select TWO)
  2894.     > When formatting removable flash devices
  2895.     > When storing files larger than 4 GB in sized
  2896.  
  2897. * Which of the following is an advantage of the exFAT file system over NTFS?
  2898.     > Lower memory and processor resource use
  2899.  
  2900. * You have a computer running Windows 7 Home Premium and need to access the contents of a flash drive. The flash drive has been formatted with the exFAT file system. You want to read the flash drive on your computer as quickly as possible with the least amount of effort.
  2901.  
  2902.     What should you do?
  2903.     > Do nothing. Windows 7 can natively access exFAT file systems
  2904.  
  2905. * You have a computer running Windows 7. You need to format a 64 GB flash drive as a single volume. You want the drive to support quick removal, and minimize memory and processor use when reading and writing to the drive.
  2906.  
  2907.     Which file system should you choose?
  2908.     > FAT64
  2909.  
  2910. * You are the network administrator for a small company. You purchase eight copies of Windows at a local retail outlet. You install Windows successfully on eight computers in the office. A month later you start receiving calls from those who have used those copies of Windows saying that they are no longer able to log on to their computers.
  2911.  
  2912.     What should you do?
  2913.     > Instruct the employees to activate their Windows installation
  2914.  
  2915. * You want to upgrade your Windows 7 system to Windows 10. You want to keep your personal settings intact and complete the upgrade as quickly as possible. You purchase an upgrade version of Windows and perform an inplace upgrade.
  2916.  
  2917.     What should you do next?
  2918.     > Make sure that all installed applications run correctly
  2919.  
  2920. * You have a computer that currently has Windows Vista installed. You want to upgrade the system to Windows 10. You want to retain as much of the application, user profile, and user data as possible. You want to perform the upgrade with the least amount of effort possible.
  2921.  
  2922.     What should you do?
  2923.     > Run Scanstate in Windows Vista
  2924.     > Perform a clean (custom) installation of Window 10 on the existing hard drive
  2925.     > Boot into Windows 10 and reinstall all applications
  2926.     > Run Loadstate
  2927.  
  2928. * You manage over 100 desktop computers, all currently running Windows Vista. You recently purchased replacement computers that have Windows 10 preinstalled. You want to move user data and settings from the old computers to the new computers.
  2929.  
  2930.     What tool should you use?
  2931.     > User State Migration Tool
  2932.  
  2933. * You have two computers: Computer A is running Windows Vista and Computer B is running Windows 10. You need to transfer user profile information and data files from Computer A to Computer B.
  2934.  
  2935.     Which tools could you use to do this? (Select TWO) (Each answer is a complete solution)
  2936.     > User State Migration Tool (USMT)
  2937.     > Windows Easy Transfer
  2938.  
  2939. * You have just purchased a new computer that runs Windows 10. You would like to transfer all of the applications and user data from your old computer running Windows Vista to the new computer.
  2940.  
  2941.     How can you do this with the least amount of effort?
  2942.     > Run Windows Easy Transfer on the old computer and the new computer
  2943.     > Reinstall any applications
  2944.  
  2945. * You have just purchased a new computer that runs Windows 7. You would like to transfer all of teh applications and user data from your old computer running Windows XP to the new computer.
  2946.  
  2947.     How can you do this with the least amount of effort?
  2948.     > Run Windows Easy Transfer of the old computer and the new computer
  2949.     > Reinstall any applications
  2950.  
  2951. * Your Windows 7 client systems are joined to the WestSim.com domain. To ensure correct time stamps are used, you need to verify that these clients are configured for themost appropriate time zone.
  2952.  
  2953.     Which command can you use to do this?
  2954.     > w32tm /tz
  2955.  
  2956. * Which term describes the layer of software that resides between the virtual operating system and the physical hardware it is running on in a virtualization environment?
  2957.     > Hypervisor
  2958.  
  2959. * Which term refers to a software implementation of a computer system that executes programs like a physical machine?
  2960.     > Virual machine
  2961.  
  2962. * The sales engineers in your organization use virtual machines to model deployments in the lab prior to actually implementing them in your customers' physical environments. You are concerned that a malicious insider could gain access to the sensitive data on these virtual machines.
  2963.  
  2964.     What should you do? (Select TWO)
  2965.     > Disable the USB ports on the hypervisor hardware
  2966.     > Use file and folder permissions to restrict the access to the virtual hard disk files
  2967.  
  2968. * You just created a snapshot of a virtual machine while it was running. What information is saved in the snapshot? (Select TWO)
  2969.     > The current contents of the virtual machine's CPU registers
  2970.     > The current contents of the virtual machine's RAM
  2971.  
  2972. * Match the virtualization implementations on the left with the appropriate characteristic on the right. Each type of implementation may be used once, more than once, or not at all.
  2973.     > Full Virtualization
  2974.         > The virtual machine completely simulates a physical computer system
  2975.         > Operating systems do not need modification to run within virtual machines
  2976.     > Partial Virtualization
  2977.         > Only some of the components of a virtual machine are virtualized
  2978.     > Paravirtualization
  2979.         > Guest operating systems directly access hardware resources in the hypervisor host system
  2980.  
  2981. * Match each cloud computing definition on the left with the appropriate characteristic on the right. Each characteristic may be used once, more than once, or not at all.
  2982.     > Private Cloud
  2983.         > Provides resources to a single organization
  2984.         > Keeps the organization data separate and secure from any other organization using the same service provider
  2985.     > Hybrid Cloud
  2986.         > Combines public, private, and community cloud resources from different service providers
  2987.     > Community Cloud
  2988.         > Designed to be shared by several organizations
  2989.     > Public Cloud
  2990.         > Provides computing resources that are accessible by the general public
  2991.  
  2992. * Which of the following best describes the use of Libraries in Windows?
  2993.     > Special folders that group files and folders, possibly stored in both local or network locations, into a single logical folder
  2994.  
  2995. * Which of the following are true of Libraries? (Select TWO)
  2996.     > Each Library cfan contain multiple folders from different file system locations
  2997.     > A single folder can be added to multiple Libraries
  2998.  
  2999. * You have created a custom Library using D:\Stats as the path to the Library. You want the files in the D:\Reports folder to be available in the Library you created. The files should also still be accessible using the D:\ Reports folder
  3000.  
  3001.     What should you do?
  3002.     > Include the D:\Reports folder in the Library
  3003.  
  3004. * You need to install a 32-bit application on a 64-bit version of Windows 7. Where is the default directory where the application will be installed?
  3005.     > %systemdrive%\Program Files (x86)
  3006.  
  3007. * You need to install a 32-bit application on a 32-bit version of Windows 10. In which directory will the application be installed?
  3008.     > %systemdrive%\Program Files
  3009.  
  3010. * You recently purchased a new computer running Windows 7 for your company's graphic designer. The graphic designer needs his design fonts removed from his old Windows 2000 computer and placed on his new computer.
  3011.  
  3012.     Assuming the default directories were used during installation for both systems, which action is correct?
  3013.     > Copy the fonts from C:\WinNT\Fonts to C:\Windows\Fonts
  3014.  
  3015. * You need to see the temporary files on a machine running Windows 7. Which directory holds the user temporary files, and which environment variable stores the temporary directory path? (Select TWO)
  3016.     > %tmp%
  3017.     > C:\Users\username\AppData\Local\Temp
  3018.  
  3019. * Where system root is the C: drive, what is the path to the system files that hold user profiles in Windows 10?
  3020.     > C:\Users\username
  3021.  
  3022. * Where are fonts stored on a Windows 7 system?
  3023.     > %systemroot%\Fonts\
  3024.  
  3025. * Which file system path is the default location for system files in Windows 10?
  3026.     > C:\Windows
  3027.  
  3028. * Which of the following file extension types can be run from the command prompt? (Select THREE)
  3029.     > .bat
  3030.     > .com
  3031.     > .exe
  3032.  
  3033. * Which command would you use to copy all files in a directory, including all subdirectories (as well as empty ones)?
  3034.     > xcopy /e
  3035.  
  3036. * Which command lets you delete subdirectories in addition to files in the current directory?
  3037.     > rd /s
  3038.  
  3039. * What does the rd command do when used with the /q switch?
  3040.     > Will not prompt you to confirm deletions
  3041.  
  3042. * Which option used with the copy command makes sure that all copies files are writted correctly after they have been copied?
  3043.     > /v
  3044.  
  3045. * You need to copy several hundred files from one directory to another. Most of the files exist in the target directory, but you want to overwrite the existing files with the ones you will copy. You want the file copy to proceed automatically without prompting you to overwrite existing files.
  3046.  
  3047.     Which copy command switch should you use?
  3048.     > /y
  3049.  
  3050. * What does the /a switch used with the copy command indicate?
  3051.     > That the file is an ASCII text file
  3052.  
  3053. * How do you set file attributes? (Select TWO)
  3054.     > Right-click the file, then select Properties
  3055.     > Use the attrib command
  3056.  
  3057. * You have a file which you would like other users to see, but not modify. Which file attribute should you use?
  3058.     > R
  3059.  
  3060. * Which of the following file extensions indicates a Windows system file? (Select TWO)
  3061.     > .vxd
  3062.     > .dll
  3063.  
  3064. * You want to set the encryption attribute for the C:\payroll.xls file. What should you do?
  3065.     > Edit the properties of the file in Windows Explorer
  3066.  
  3067. * What does the following command do? attrib +s +r a myfile.dll
  3068.     > Adds the System file attribute, adds the Read-only attribute, and removes the Archive attribute to the file myfile.dll
  3069.  
  3070. * How can you reformat a drive from FAT32 to NTFS without losing the existing data?
  3071.     > Use the convert command at a command prompt
  3072.  
  3073. * Which of the following utilities checks the disk for bad clusters?
  3074.     > chkdsk
  3075.  
  3076. * A user needs to copy a file from an NTFS partition to a FAT32 partition. The file has NTFS permissions and the following attributes: Read only (R) and Encryption.
  3077.  
  3078.     When the folder is copied, which of the following is true?
  3079.     > The R attribute is retained on the file
  3080.  
  3081. * If a folder exists on an NTFS partition, what is the minimum permission needed by a user to set any security permissions on the folder?
  3082.     > Full Control
  3083.  
  3084. * Susan in accounting has left the company and been replaced by Manuel. You create a user account for Manuel on Susan's computer. Manuel calls you and says that he can't open a specific file on the computer.
  3085.  
  3086.     Which of the following will most likely correct the problem?
  3087.     > Make Manuel the owner of the file
  3088.  
  3089. * Mary and Pablo share a workstation doing customer support. Mary works int he morning, and Pablo works int he evening. One day Mary is helping a customer with a support issue. Because her shift is over, she creates a word document with details about the customer she is helping. SHe saves ist to the C:\Customer folder on the computer.
  3090.  
  3091.     When Pablo comes in, he is unable to open the file. What should you do?
  3092.     > Modify the permissions on the document
  3093.  
  3094. * Your computer has a single NTFS partition used for the C: drive with the following folders: C:\Confidential, C:\PublicReports You configure NTFS permissions on the C:\Confidential folder and deny the Read permission to the Users group. For the C:\PublicReports folder, you allow Full Control permission to the Users group. You have not configured any permissions other than the defaults on any other folders or files. YOu take the following actions: Move Reports.doc from C:\Confidential to C:\PublicReports, Copy Costs.doc from C:\Confidential to C:\PublicReports
  3095.  
  3096.     What permissions do members of the Users group have to these two files in the C:\PublicReports folder?
  3097.     > Allow Full Control to both
  3098.  
  3099. * Your computer has a single NTFS partition used for the C: drive with the following folders: C:\Confidential, C:\PublicReports In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permissio to the Users group: Reports.doc, Costs.doc The C:\PublicReports folder allows the Full COntrol permission to the Users groups. There are no other permissions assigned except for the default permissions. You then take the following actions: Move Reports.doc from C:\Confidential to C:\PublicReports, Copy Costs.doc from C:\Confidential to C:\PublicReports
  3100.  
  3101.     What permissions do members of the Users group have to these two files in the C:\PublicReports folder?
  3102.     > Deny Read to Reports.doc
  3103.     > Allow Full Control to Costs.doc
  3104.  
  3105. * You manage two folders in your computer as follows: C:\Confidential, D:\PublicReports Both the C:\ an D:\ drives are formatted with the NTFS file system. In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: Reports.doc, Costs.doc The D:\ drive allows the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions. You then take the following actions: Move Reports.doc from C:\Confidential to D:\PublicReports Copy Costs.doc from C:\Confidential to D:\PublicReports
  3106.  
  3107.     What permissions do members of the Users group have to these two files in the D:\PublicReports folder?
  3108.     > Allow Full Control to both
  3109.  
  3110. * You manage two folders in your computer as follows: C:\Confidential, D:\PublicReports The C:\ drive is formatted with NTFS, and the D:\ drive is formatted with FAT32. In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: Reports.doc, Costs.doc You then take the following actions: Move Reports.doc from C:\Confidential to D:\PublicReports Copy Costs.doc from C:\Confidential to D:\PublicReports
  3111.  
  3112.     What happens to the permissions for both files as they are created in the D:\PublicReports folder?
  3113.     > Permissions are removed from both files
  3114.  
  3115. * The D:\ drive in your computer has been formatted with NTFS. The Mary user account has been assigned the following permissions: Allow Full Control to the D:\Reports folder, Deny Full Control to the D:\Sales folder, Deny Full Control to the D:\Reports\2010reports.doc file, Allow Full Control to the D:\Sales\2010sales.doc file
  3116.  
  3117.     What effective permissions does Mary have to both files?
  3118.     > Deny Full Control to both
  3119.  
  3120. * The D:\ drive in your computer has been formatted with NTFS. The Sales group on your computer has been given Allow Full Control to the D:\Sales folder. The Mary user account is a member of the Sales group.
  3121.  
  3122.     How can you prevent Mary from accessing the D:\Sales\2010sales.doc file without affecting her ability to access any other files in that folder and without affecting the abilities of any other users?
  3123.     > Edit the properties for the file, assign Mary the Deny Full Control permission
  3124.  
  3125. * You have a hard disk that is formatted with the FAT32 file system. You would like to implement file and folder permissions on the Design folder that apply when files are accessed both locally and remotely.
  3126.  
  3127.     What should you do?
  3128.     > Use the convert command to convert from FAT32 to NTFS, then configure NTFS permissions
  3129.  
  3130. * A user has a problem accessing several shared folders on the network. After determining the issue is not from his computer's IP configuration, you suspect the shared folders are not currently connected.
  3131.  
  3132.     Which of the following commands will confirm your suspicions?
  3133.     > net use
  3134.  
  3135. * How can you see a list of valid command parameters for the net use command?
  3136.     > net use /?
  3137.  
  3138. * You have a folder that you would like members of your development team to access. You want to restrict network and local access to only specific users. All others must not be able to view or modify the files in the folder.
  3139.  
  3140.     What should you do? (Select TWO)
  3141.     > Place the files on an NTFS partition
  3142.     > Configure both share and NTFS permissions
  3143.  
  3144. * You want to use the Universal Naming Convention (UNC) format to access a shared folder called Pictures on a computer named Home1. Which format would you use?
  3145.     > \\Home1\Pictures\
  3146.  
  3147. * Which of the following statements are true regarding administrative shares? (Select TWO)
  3148.     > To connect to an administrative share, you must use the UNC path
  3149.     > By default, Windows automatically creates an administrative share for every volume
  3150.  
  3151. * Which of the following permissions are not available when sharing a folder on a Windows 7 workstation? (Select TWO)
  3152.     > Write
  3153.     > Modify
  3154.  
  3155. * Bob is a member of the Accounting group. The Accounting group has been granted the Read and Write NTFS permissions to the WeeklyReport.xls file. Bob is attempting to access the report through a share with the Full Control permission assigned to the Everyone group.
  3156.  
  3157.     Which of the following statements correctly describes Bob's ability to access the WeeklyReport.xls file?
  3158.     > Bob can open, read, and write changes to the file
  3159.  
  3160. * You have a folder on your Windows 7 computer that you would like to share with members of your development team. Users should be able to veiw and edit any file in the shared folder. You share the folder and give Everyone Full Control permission to the shared folder. Users connect to the shared folder and report theat they can open the files, but they cannot modify any of the files.
  3161.  
  3162.     What should you do?
  3163.     > Modify the NTFS permission on the folder
  3164.  
  3165. * Which tool in Windows 10 would you use to browse all networks and shared folders to which a user has access to? (Select THREE)
  3166.     > File Explorer
  3167.     > Network
  3168.     > (My) Computer / This PC
  3169.  
  3170. * You're using the vi editor to manage a text file on a Linux system.  You want to type new text into the file, when you type you want the existing text that comes after the cursor to be pushed down.
  3171.  
  3172.     What mode do you need to be in to do this?
  3173.     > Insert Mode
  3174.  
  3175. * You've just opened a text file in the vi editor and you're in Command Mode by default. There is more than one way to get from Command Mode to Replace Mode.
  3176.  
  3177.     Which of the following keypress sequences will get you into Replace Mode? (Select THREE)
  3178.     > Press Insert, then press Insert again
  3179.     > Press the 's' key, then press Insert
  3180.     > Press the 'i' key, then press Insert
  3181.  
  3182. * You need to see what kind of CPU is being used on a Linux system. The /proc directory contains a text file called cpuinfo that will give you the information you're looking for.
  3183.  
  3184.     Which of the following commands will display the entire contents of the cpuinfo text file on the screen?
  3185.     > cat /proc/cpuinfo
  3186.  
  3187. * You need to view the contents of /var/log/auth.log fil eto get information about the users that have been logging on to the system. The auth.log file is a plain text file so you decide to use the cat command to review the file. However, the display fills up with text for several pages and you can't see the entire file.
  3188.  
  3189.     What commands can you use to view the content of the auth.log file page by page? (Select TWO)
  3190.     > more /var/log/auth.log
  3191.     > less /var/log/auth.log
  3192.  
  3193. * You find that someone has set up an unauthorized account, with the username badmin, on the Linux server. You have disabled the account but you need to find out when and how this user has been gaining access to the system. The first step you decide to take is to inspect the contents of the /var/log/auth.log file to find information related to badmin logging into the system.
  3194.  
  3195.     Which command can you use to search through the auth.log for lines that contain the username you're looking for?
  3196.     > grep "badmin" /var/log/auth.log
  3197.  
  3198. * You are the administrator of a Linux server. Following best practices for system security and effective administratiion, you always login to the system with a standard nonroot user account. You only elevate your privileges to root user level when you need to do an administrative task.
  3199.  
  3200.     What do you enter at the command prompt that will, by default, switch you to the root user and require you to enter the root password?
  3201.     > su -
  3202.  
  3203. * You have been tasked with designing a workstation that will run VMware Workstation hypervisor software. It will be used by a software engineer to run virtual machine for app testing.
  3204.  
  3205.     Which criteria should be included in your design for this system? (Select TWO)
  3206.     > RAM configured to run in triple-channel mode
  3207.     > 64-bit processor with 6 cores
  3208.  
  3209. * You are purchasing a PC system that will be used as a file and print server in a small business. Which hardware selection criteria would be most important for this system? (Select TWO)
  3210.     > 64-bit multi-core processor
  3211.     > RAID 1+0 array
  3212.  
  3213. * You are purchasing several PC systems that will be used as thin clients in a large organization. Which hardware selection criteria would be most important for this system?
  3214.     > Gigabit Ethernet adapter
  3215.  
  3216. * You want to purchase a home theater. Which hardware selection criterias would be most important for this system? (Select TWO)
  3217.     > HTCP form factor
  3218.     > Video card with HDMI output
  3219.  
  3220. * You are preparing for an installation of a 64-bit Windows 7 on a computer that is currently running a 64-bit version of Windows Vista. You perform a hardware inventory on the computer and note the following: Processor = 2.0 GHz, Free Hard Drive Space = 200 GB, RAM = 1GB, DVD Drive = 18x, 100 Mbps NIC You need to prepare this computer to ensure that is meets the minimum hardware requirements of Windows 7
  3221.  
  3222.     What should you do?
  3223.     > Upgrade to at least 2 GB of RAM
  3224.  
  3225. * You want to upgrade your Windows XP Professional computer to Windows 7 Professional (32-bit). You begin by checking the hardware and discover it has 1 GB of RAM, a Pentium 2.2 GHz processor, an 8 GB solid state drive, and a video adapter with 256 MB RAM and DirectX support.
  3226.  
  3227.     What should you do to ensure that you have a successful installation?
  3228.     > Install a larger solid state drive or hard drive
  3229.  
  3230. * You're about to begin an upgrade of a Windows Vista workstation to Windows 7. What should you do before beginning? (Select TWO)
  3231.     > Back up the existing data on the hard drive prior to running the upgrade
  3232.     > Verify that the computer meets the minimum requirements
  3233.  
  3234. * You are working as a desktop technician for a small company. You recently bought a new desktop computer with 6 GB RAM and a video card with 512 MB of memory. YOu want to install Windows 7. You need to use the edition of Windows 7 that will use the full 6 GB of available RAM.
  3235.  
  3236.     What should you do?
  3237.     > Install Windows 7 64-bit Enterprise edition
  3238.  
  3239. * You manage the desktop computer at your company. You are in charge of 100 computers, all of which run Windows XP. You want to upgrade all the computers to Windows 7. Prior to the update, you need to verify the compatibilty of each computer with Windows 7. You want to gather the necessary information as quickly as possible.
  3240.  
  3241.     What should you do?
  3242.     > Use the Microsoft Assessment and Planning Toolkit (MAP)
  3243.  
  3244. * You have a workstation running Windows XP Professional that you would like to upgrade to Windows 7 Enterprise edition. You want to performt he upgrade with the least amount of effort and cost.
  3245.  
  3246.     What should you do?
  3247.     > Purchase a full version of Windows 7
  3248.     > Perform a new or custom installation
  3249.  
  3250. * You have a computer with a 64-bit processor that runs the 32-bit version of Windows Vista Businses edition. You would like to upgrade to the 64-bit version of Windows 7 Professional. You want to perform the upgrade with the least amount of effort possible.
  3251.  
  3252.     Which of the following are required? (Select TWO)
  3253.     > Get 64-bit drivers for all hardware
  3254.     > Perform a clean installation
  3255.  
  3256. * Aero is a feature of which Windows version(s)?
  3257.     > Windows Vista
  3258.     > Windows 7
  3259.  
  3260. * You have a computer that runs Windows XP Professional. You would like to upgrade the computer to Windows 7. Before doing the upgrade, you want to verify that the computer meets the hardware and software requirements for Windows 7.
  3261.  
  3262.     Which tool should you use?
  3263.     > Upgrade Adviser for Windows 7
  3264.  
  3265. * You are getting ready to upgrade your Windows Vista system to Windows 7. You want to make sure that everything in your current system is compatible with Windows 7.
  3266.  
  3267.     Which of the following is the best method for accomplishing this?
  3268.     > Download and install the Windows 7 upgrade advisor
  3269.  
  3270. * You want to upgrade your Windows XP Professional computer to Windows 7 Professional. You begin by checking the hardware and discover it has 1 GB of RAM, a Pentium 1 GHz processor, a 32 GB solid state drive, and a video adapter with 128 MB RAM and DirectX 9 support.  You want to install the 64-bit version of Windows 7.
  3271.  
  3272.     What should you do?
  3273.     > Add more memory
  3274.  
  3275. * You have a computer currently running Windows Vista. Which of the following reasons would justify doing a clean installation of Windows 7 instead of performing an upgrade?
  3276.     > You want to dual boot
  3277.  
  3278. * You have a workstation running Windows Vista Business that you would like to upgrade to Windows 7 Ultimate. You want to perform the least amount of effort and cost.
  3279.  
  3280.     What should you do?
  3281.     > Purchase an upgrade version of Windows 7
  3282.     > Perform an inplace upgrade
  3283.  
  3284. * You have been tasked with designing a workstation that will run VMware workstation virtualization software. It will be used by a software engineer to run virtual machines for application development and testing
  3285.  
  3286.     Which criteria should be included in your design for this system?
  3287.     > 64-bit processor with 8 cores
  3288.     > RAM configured to run in a quad-channel mode
  3289.  
  3290. * You want to purchase a home theater computer system. Which hardware selection criteria would be most important for this system?
  3291.     > Video card with HDMI output
  3292.     > HTPC form factor
  3293.  
  3294. * You are purchasing a PC system that will be used as a file and print server in a small businses. Which hardware selection criteria would be most important for this system?
  3295.     > RAID 1+0 array
  3296.     > 64-bit multi-core processor
  3297.  
  3298. * You are purchasing several PC systems that will be used as thin clients in a large organization. Which hardware selection would be most important for this system?
  3299.     > Gigabit Ethernet adapter
  3300.  
  3301. * You own a custom PC retail store. A small business client asks you to build three workstations for her organization: Virtualization Workstation, Video Editing Workstation, Thin Client PC
  3302.     > Virtualization Workstation
  3303.         > AMD 12-core, 4 GHz CPU
  3304.         > 4 TB SATA HD
  3305.         > 32 GB DDR4 RAM
  3306.         > HAV
  3307.     > Video Editing Workstation
  3308.         > Intel Core i7 six-core, 3.4 GHz CPU
  3309.         > 2 TB SSD SATA HD
  3310.         > 16 GB DDR4 RAM
  3311.         > Video capture card
  3312.     > Thin Client PC
  3313.         > Intel Celeron dual-core, 2.7 GHz CPU
  3314.         > 500 GB SATA HD
  3315.         > 2 GB DDR3 RAM
  3316.         > Few or no applications installed
  3317.  
  3318. * YOu are a PC technician for a national computer retailer. A customer asks you to build three custom computers for him to use at his home office: Gaming PC, Home Office Server, Thick Client Workstation
  3319.     > Gaming PC
  3320.         > 1000 W Power Supply
  3321.         > 1 TB SATA HD
  3322.         > Dual SLI 6 GB PCIe video adapters
  3323.         > 5.1 channel surround sound adapter
  3324.         > Liquid CPU cooler
  3325.     > Home Office Server
  3326.         > 2 TB RAID 5 disk array
  3327.         > 600 W power supply
  3328.         > No audio adapter
  3329.         > Integrated video adapter
  3330.     > Thick Client Workstation
  3331.         > 400 W power supply
  3332.         > 500 GB SATA HD
  3333.         > 512 MB PCIe video adapter
  3334.         > Basic desktop applications installed
  3335.  
  3336. * You are a PC technician for a national computer retailer. A businses customer asks you to build three custom computers to be used by employees at a branch office: CAD / CAM Design Workstation, Home Theater PC, Virtualization Workstation
  3337.     > CAD / CAM Design Workstation
  3338.         > 6 GB GDDR5 PCIe video adapter
  3339.         > 32 GB PC4-21300 DDR4 ECC RAM
  3340.         > 1 TB SATA HD
  3341.     > Home Theater PC
  3342.         > HDMI output
  3343.         > Compact form factor
  3344.         > 5.1 channel surround sound adapter
  3345.         > TV tuner adapter
  3346.     > Virtualization Workstation
  3347.         > 32 GB PC4-21300 DDR4 RAM
  3348.         > 4 TB SATA HD
  3349.         > Integrated video adapter
  3350.  
  3351. * You are a PC technician for a national computer retailer. You are asked to build each of the systems listed on the right. You need to use the most appropriate hardware components to ensure that each of these systems will fulfill its intended role.
  3352.     > Home Office Server
  3353.         > 2 TB RAID 5 disk array
  3354.         > 600 W power supply
  3355.         > No audio adapter
  3356.         > Integrated video adapter
  3357.     > Gaming PC
  3358.         > 1000 W power supplyg
  3359.         > 1 TB SATA HD
  3360.         > Dual SLI 6 GB PCIe video adapters
  3361.         > 5.1 channel surround sound adapter
  3362.         > Liquid CPU cooler
  3363.     > Home Theater PC
  3364.         > HDMI output
  3365.         > Compact form factor
  3366.         > 5.1 channel surround sound adapter
  3367.         > TV tuner adapter
  3368.     > Virtualization Workstation
  3369.         > AMD 12-core, 4 GHz CPU
  3370.         > 4 TB SATA HD
  3371.         > 32 GB DDR4 RAM
  3372.         > Hardware-assisted virtualization
  3373.     > Thin Client Workstation
  3374.         > Intel Celeron dual-core, 2.7 GHz CPU
  3375.         > 500 GB SATA HD
  3376.         > 2 GB DDR3 RAM
  3377.         > Few or no applications installed
  3378.     > Audio/Video Editing Workstation
  3379.         > Intel Core i7 six-core, 3.4 GHz CPU
  3380.         > 2 TB SSD SATA HD
  3381.         > 16 GB DDR4 RAM
  3382.         > High-end audio adapter with speaker system
  3383.         > High-end video adapter with dual displays
  3384.  
  3385. * You have just purchased a new home and want to purchase a home theater computer system. Which of the following hardware selection criteria is the most important for this system? (Select TWO)
  3386.     > Video card with HDMI output
  3387.     > HTPC form factor
  3388.  
  3389. * Joe is working on a design team that uses a computer-aided design (CAD) system. Joe has been complaining that it takes too long to perform tasks such as panning, rotating, and zooming. You have been asked to look at Joe's computer and to make any changes required to increase Joe's productivity.
  3390.  
  3391.     Which of the following changes would best meet Joe's needs?
  3392.     > Add a very high-end video board
  3393.  
  3394. * You are the IT administrator for your company. You have several users who want to work from home by connecting to a server running at the corporate headquarters. Your manager has asked you keep costs to a minimum as you provide computers for this environment.
  3395.  
  3396.     Which of the following types of PCs would best work for these remote users?
  3397.     > Thin client
  3398.  
  3399. * You are running a 64-bit version of Windows 7. You performa  hardware inventory on the computer and note the following: Processor = 2.0 GHz, Free hard drive space = 200 GB, RAM = 1 GB, DVD Drive = 18x, 100 Mbps NiCad You need to prepare this computer to ensure that it meets the miniumum hardware requirements of Windows 10.
  3400.  
  3401.     What should you do?
  3402.     > Upgrade to at least 2 GB of RAM
  3403.  
  3404. * You are in the process of preparing a storage device and must determine which file system to use. Under which of the following conditions are you most likely to choose exFAT over FAT32 or NTFS? (Select TWO)
  3405.     > When storing files larger than 4 GB in size
  3406.     > When formatting removable flash devices
  3407.  
  3408. * Your company has issued you a new laptop computer that ocntains a lot of memory and two very large hard disks. Since your computer at home is old and slow, you want to use your work computer for personal use as well. To keep your applications and files totally separate from the company's, you have been told you can run more than one version of Windows on the same computer, one for work, and one for personal use.
  3409.  
  3410.     Which of the following technologies would best meet your needs?
  3411.     > Dual boot
  3412.  
  3413. * You have a fairly new computer that was installed with an old version of Windows Vista. This was reuqired to fix some software your company is still supporting. To maintain the data collected while running Vista, you decvide that it would be best to upgrade this computer to Windows 10 instead of doing a clean install. Knowing that you can't upgrade directly to Windows 10 from Vista, you plant o first upgrade to Windows 7 and then upgrade from Windows 7 to Windows 10.
  3414.  
  3415.     Which of the following would best help you determine whether the computer will support Windows 7?
  3416.     > Windows upgrade advisor
  3417.  
  3418. * You need to install Windows 10 on a new computer system that uses a SATA SSD device to store data. Which of the following is the best method for installing Windows 10 on this system?
  3419.     > Install Windows the same way you would a system that uses a standard hard disk drive
  3420.  
  3421. * You have been asked to install Windows 10 on 30 different computers for a new branch office your company is setting up. The computers have been purchased from different companies and have different hardware.
  3422.  
  3423.     Which method should you use to reduce the installation time and effort you need to spend?
  3424.     > Unattended
  3425.  
  3426. * You are an IT administrator for a large company that is doing very well in their business endevours. As a result, the company is hiring new employees on a regular basis. In addition to your normal workload, you have been asked to install and configure the new employees' computers with a Windows operating system and the applications your company uses to do their business. To make this process easier, you only give new employees the choice of one of two laptops.
  3427.  
  3428.     Which of the installation types would make the best use of your time installing and configuring these laptops?
  3429.     > Image deployment
  3430.  
  3431. * You are an IT administrator for your company. You have been tasked with the assignment of installing 300 copies of Windows 10. You need to finish this task as quickly and efficiently as possible.
  3432.  
  3433.     Which of the following boot methods would be the best method for installing Windows under these circumstances?
  3434.     > PXE
  3435.  
  3436. * You are the network administrator for a small company. You purchase eight copies of Windows 10 at a local retail outlet. You successfully install Windows on eight computers in the office. A month later, you start receiving calls from those who have used those copies of Windows saying that they are no longer able to log on to their computers.
  3437.  
  3438.     Which of the following will best resolve this issue?
  3439.     > Instruct the users to activate their Windows installation
  3440.  
  3441. * You have just purchased a new computer that runs Windows 10. You would like to transfer all of the applications and user data from your old computer, which is running Windows 7, to the new computer.
  3442.  
  3443.     Which of the following steps is the best course of action?
  3444.     > Manually install application, copy data, and configure settings on the new computer
  3445.  
  3446. * After installation, your Windows 10 client systems are joined to the WestSim.com domain. You need to verify that these clients are configured to get time from the correct time provider.
  3447.  
  3448.     Which commands can you use to do this? (Select TWO)
  3449.     > w32tm /query / source
  3450.     > w32tm / query / status
  3451.  
  3452. * You want to be able to monitor and filter VM-to-VM traffic within a virtual network. What should you do?
  3453.     > Implement a virtual firewall within the hypervisor
  3454.  
  3455. * What key advantage does a virtual router have over a physical router?
  3456.     > Multiple networks can be connected to a single interface
  3457.  
  3458. * The servers for the company are all virtual machines and hosted on the same hypervisor.  You need to keep users in all other departments from accessing the virtual servers used by the finance department.
  3459.  
  3460.     Which of the following technologies should you use to logically isolate the network?
  3461.     > VLANs
  3462.  
  3463. * A technician is unable to install virtualization software on a host computer. The host has more free disk space than required.
  3464.  
  3465.     Which of the following is most likely to be the cause?
  3466.     > The motherboard UEFI/BIOS doesn't support hardware assisted virtualization
  3467.  
  3468. * Rachel, an employee in the support department, wants to run a virtual machine on her computer from which she can troubleshoot customer issues.
  3469.  
  3470.     Which of the following must you complete before virtualization will work on her computer?
  3471.     > Enable virtualization support in the BIOS settings
  3472.  
  3473. * Which of the following statements about NICS is true? (Select TWO)
  3474.     > Virtual NICs need the appropriate driver installed to function
  3475.     > Multiple virtual NICs can be added to a virtual machine
  3476.  
  3477. * A company has subscribed to a cloud service that offers cloud applications and storage space. Through acquisition, the number of copany employees quickly doubled. The cloud service vendor was able to add cloud services to these additional employees without repeating hardware changes.
  3478.  
  3479.     Which of the following cloud concepts does this represent?
  3480.     > Rapid elasticity
  3481.  
  3482. * What type of resources offer the following advantages? Flexibilty of access, Ease of use, Self-service provisioning resources, API ability, Metering of services, Ability to try out software applications
  3483.     > Cloud
  3484.  
  3485. * You were recently hired by a small startup company. The company is in a small office and has several remote employees. You have been asked to find a business service that would accommodate the current size of the company but would also be able to scale as the company grows. The service needs to provide adequate storage, as well as additional computing power.
  3486.  
  3487.     Which cloud service model should you use?
  3488.     > IaaS
  3489.  
  3490. * Which of the following best describes the3 Plastform as a Service (PaaS) cloud computing service model?
  3491.     > PaaS delivers everything a developer needs to build an application onto the cloud infrastructure
  3492.  
  3493. * Which of the following cloud computing solutions delivers software applications to a client either over the internet or on a local area network?
  3494.     > SaaS
  3495.  
  3496. * You need to install a 32-bit version of Windows of Windows 10. In which directory will the application be installed?
  3497.     > %systemdrive%\Program Files
  3498.  
  3499. * Where system root is the C: drive, what is the path to the directories that hold user profiles in Windows 10?
  3500.     > C:\Users\username
  3501.  
  3502. * Where system root is the C: drive, where are fonts stored on a Windows 10 system?
  3503.     > C:\Windows\Fonts\
  3504.  
  3505. * Which file system path is the default location for system files in Windows 10?
  3506.     > C:\Windows
  3507.  
  3508. * Which of the following best describes the use of libraries in Windows?
  3509.     > Special folders that group files and folders, possible stored in both local or network locations, into a single logical folder
  3510.  
  3511. * You have created a custom library using D:\Stats as the apth to the library. You want the files in the D:\Reports folder to be available in the Library you created. The files should also be accessible using the D:\Reports folder.
  3512.  
  3513.     Which of the following steps would best meet your requirements?
  3514.     > Include the D:\Reports folder in the library
  3515.  
  3516. * Which of the following extensions identifies a program packaged for use by Windows Installer?
  3517.     > .msi
  3518.  
  3519. * Which of the following file extensions indicate a Windows system file? (Select TWO)
  3520.     > .vxd
  3521.     > .dll
  3522.  
  3523. * Which file attribute identifies the file as having been modified since the last backup?
  3524.     > Archive
  3525.  
  3526. * You have a file which you would like other users to see, but not modify. Which file attribute should you use?
  3527.     > -R
  3528.  
  3529. * Which commands can you use to create a new directory? (Select TWO)
  3530.     > md
  3531.     > mkdir
  3532.  
  3533. * Which command would you use to copy all files and subdirectories, including empty subdirectories?
  3534.     > xcopy /e
  3535.  
  3536. * Which command lets you delete subdirectories in addition to files in the current directory?
  3537.     > rd /s
  3538.  
  3539. * Which command would you use to change the current directory to the immediate parent directory?
  3540.     > cd..
  3541.  
  3542. * Which option, used with the copy command, makes sure that all copied files are written copied files are written correctly after they have been copied?
  3543.     > /v
  3544.  
  3545. * You are working at the command line and want to add the Read-only attribute to a file and remove the Hidden attribute. Which command would you use?
  3546.     > attrib +r -h
  3547.  
  3548. * Which Windows command displays a list of files and subdirectories in a directory?
  3549.     > dir
  3550.  
  3551. * Which command is used to copy entire folder structures between volumes or across a network while maintaining all NTFS file permissions and attributes?
  3552.     > robocopy
  3553.  
  3554. * While troubleshooting a Windows computer, you open a command prompt to explore the folders (directories) on the hard drive. You notice that one of the folders required for your project is missing.
  3555.  
  3556.     Which of the following Microsoft command line tools would allow you to quickly create the missing folder?
  3557.     > md
  3558.  
  3559. * Ted, an employee in the Sales department, has asked a coworker, Ann, to update the product descriptions contained in a sales document. Ann can open the file, can't save her chagnes to it.
  3560.  
  3561.     Which of the following digital security methods is most likely preventing her from saving the file?
  3562.     > Directory permissions
  3563.  
  3564. * Using the Windows OS, Joe transfers a file in his documents folder to a folder that has been configured to give Ann full control of all files. Instead of copying all the files, Joe uses a move operation. Ann can read the file, but can't save any changes to the file.
  3565.  
  3566.     Which of the following is most likely the reason that Ann can't update the file?
  3567.     > The Modify and Write permissions for Ann were set to Deny when the file was in Joe's document folder
  3568.  
  3569. * If a folder exists on an NTFS partition, which permission does a user need to set security permissions on the folder?
  3570.     > Full Control
  3571.  
  3572. * A help desk technician determines that a user's issue is caused by a corrupt file on their computer. Which of the following is the fastest way to transfer a good file to the computer?
  3573.     > Use the C$ administrative share to copy the file
  3574.  
  3575. * What command lets you see a list of valid command parameters for the net use command?
  3576.     > net use /?
  3577.  
  3578. * Ben, an employee in the legal department, has created several sensitive documents on his computer that must be made available to all members of the executive staff working in the same building. Due to the sensitive nature of this document, Ben not only want to restrict access to the files, but also make it impossible for anyone else in the company to even known where they are stored unless specifically told.
  3579.  
  3580.     Which of the following would most likely fulfill Ben's needs?
  3581.     > Hidden share
  3582.  
  3583. * Jane, an employee in the human resources department, has created several important PDF documents on her computer that all office managers in her building must read. She would like to make locating these files simple and maintain them as little as possible. It is important that no other users are permitted to view these documents. As the IT technician for your company, Jane has asked you to make this possible.
  3584.  
  3585.     Which of the following would most likely fulfill Jane's needs?
  3586.     > Network share
  3587.  
  3588. * A technician uses the ps command to find information about a process that is running a browser application on a Linux computer. The technician knows the name of the process, but the list is very long.
  3589.  
  3590.     Which of the following commands would help the technician find and display only the information about the browser process?
  3591.     > grep
  3592.  
  3593. * A technician attempts to run an executable file on a Linux computer and receives a permission denied message.
  3594.  
  3595.     Which of the following command should the technician use?
  3596.     > chmod
  3597.  
  3598. * You need to see what kind of CPU is being used on a Linux system. The /proc directory contains a text file called cpuinfo that will give you the information you're looking for.
  3599.  
  3600.     Which of the following commands will dispaly the entire contents of the cpuinfo text file on the screen?
  3601.     > cat /proc/cpuinfo
  3602. [CHAPTER 10]
  3603.  
  3604. [CHAPTER 11]
  3605. * Which of the following best describes the use of Libraries in Windows?
  3606.     > Special folders that group files and folders, possibly stored in both local or network locations into a single logical folder.
  3607.  
  3608. * Which of the following are true of Libraries? (Select TWO)
  3609.     > A single folder can be added to multiple Libraries
  3610.     > Each library can contain multiple folders from different file system locations
  3611.  
  3612. * You have created a custom library using D:\Stats as the path to the library. Y:ou want the files in the D:\Reports folder to be available in the library you created. The files should also still be accessible using the D:\Reports folder. What should you do?
  3613.     > Include the D:\Reports folder in the library
  3614.  
  3615. * You need to install a 32-bit application on a 64-bit version of Windows 7. Where is the defauy directory where the application will be installed?
  3616.     > %systemdrive%\Program Files (x86)
  3617.  
  3618. * You need to install a 32-bit application on a 32-bit version of Windows 10. In which default directory will the application be installed?
  3619.     > %systemdrive%\Program Files
  3620.  
  3621. * You recently purchased a new computer running Windows 7 for your company's graphic designer. The graphic designer needs his design fonts removed from his old Windows 2000 computer and placed on his new computer. Assuming the default directories were used during installation for both systems, which action is correct?
  3622.     > Copy the fonts from C:\WinNT\Fonts to C:\Windows\Fonts
  3623.  
  3624. * You need to see the temporary files on a machine running Windows 7. Which directory holds the user temporary files, and which environment variable stores the temporary directory path?
  3625.     > C:\Users\username\AppData\Local\Temp
  3626.     > %tmp%
  3627.  
  3628. * Where system root is the C: drive, which is the path to the directories that hold user profiles in Windows 10?
  3629.     > C:\Users\username
  3630.  
  3631. * Where are fonts stored on a Windows 7 system?
  3632.     > %systemroot%\Fonts\
  3633.  
  3634. * Which file system path is the default location for system files in Windows 10?
  3635.     > C:\Windows
  3636.  
  3637. * You need to install a 32-bit application on a 32-bit version of Windows 10. In which default directory will the application be installed?
  3638.     > %systemdrive%\Program Files
  3639.  
  3640. * Where system root is the C: drive, what is the path to the directories that hold user profiles in Windows 10?
  3641.     > C:\Users\username
  3642.  
  3643. * Where system root is the C: drive, where are fonts stored on a Windows 10 system?
  3644.     > C:\Windows\Fonts
  3645.  
  3646. * Which file system path is the default location for system files in Windows 10?
  3647.     > C:\Windows
  3648.  
  3649. * Which of the following best describes the user of Libraries in Windows?
  3650.     > Special folders that group files and folders, possibly stored in both local or network locations, into a single logical folder
  3651.  
  3652. * Which of the following are true of libraries? (Select TWO)
  3653.     > Each library can contain multiple folders from different file system locations
  3654.     > A single folder can be added to multiple libraries
  3655.  
  3656. * You have created a custom Library using D:\Stats as the path to the Library. You want the files in the D:\Reports folder to be available in the Library you created. The files should also still be accessible using the D:\Reports folder. Which of the following steps would BEST meet your requirements?
  3657.     > Include the D:\Reports folder in the library
  3658.  
  3659. * Which of the following file extension types can be run from the command prompt? (Select THREE)
  3660.     > .exe
  3661.     > .bat
  3662.     > .com
  3663.  
  3664. * Which of the following extensions identifies a program packaged for use by Windows Installer?
  3665.     * .msi
  3666.  
  3667. * Which of the following file extensions indicates a Windows system file? (Select TWO)
  3668.     > .dll
  3669.     > .vxd
  3670.  
  3671. * Which file attributes identifies the file as having been modified since the last backup?
  3672.     > Archive
  3673.  
  3674. * You have a file which you would like other users to see, but not modify. Which file attribute should you use?
  3675.     > R
  3676.  
  3677. * Which commands can you use to create a new directory? (Select TWO)
  3678.     > mkdir
  3679.     > md
  3680.  
  3681. * Which command would you use to copy all files and subdirectories in a directory, including empty subdirectories?
  3682.     > xcopy /e
  3683.  
  3684. * Which command lets you delete subdirectories in addition to files in the current directory?
  3685.     > rd /s
  3686.  
  3687. * Which command would you use to change the current directory to the immediate parent directory?
  3688.     > cd..
  3689.  
  3690. * Which option, used with the copy command, makes sure that all copied files are written correctly after they have been copied?
  3691.     > /v
  3692.  
  3693. * You need to copy several hundred files from one directory to another. Most of the files exist in the target directory, but you want to overwrite the existing files with the ones you will copy. You want the file copy to proceed automatically without prompting you to overwrite existing files. Which copy command switch should you use?
  3694.     > /y
  3695.  
  3696. * You are working at the command line and want to add the Read-only attribute to a file and remove the Hidden attribute. Which command would you use?
  3697.     > attrib +r h
  3698.  
  3699. * Which Windows command display a list of files and subdirectories in a directory?
  3700.     > dir
  3701.  
  3702. * Which command is used to copy entire folder structures between volumes or across a network while maintaining all NTFS file permissions and attributes?
  3703.     > robocopy
  3704.  
  3705. * Which troubleshooting an Windows computer, you open a command prompt to explore the folders (directories) on the hard drive. You notice that one of the folders required for your project is missing. Which of the following Microsoft command line tools would allow you to QUICKLY create the missing folder?
  3706.     > md
  3707.  
  3708. * Ted, an employee in the sales department, has asked a coworker, Ann, to update the product descriptions contained in a sales document. Ann can open the file, but can't save her changes to it. Which of the following digital security methods is MOST likely preventing her from saving the file?
  3709.     > Directory permissions
  3710.  
  3711. * Using the Windows OS, Joe transfers a file in his Documents folder to a folder that has been configured to give Ann full control of all files. Instead of copying the files, Joe uses a move operation. Ann can read the file, but can't save any changes to the file. Which of the following is MOST likely the reason that Ann can't update the file?
  3712.     > The Modify and Write permissions for Ann were set to Deny when the file was in Joe's Documents folder
  3713.  
  3714. * If a folder exists on an NTFS partition, which permission does a user need to set security permisisons on the folder?
  3715.     > Full Control
  3716.  
  3717. * Mary and Pablo share a customer support workstation. Mary works in the morning, and Pablo works in the evening. One day Mary is helping a customer with a support issue. Because her shift is over, she creates a Word document with details about the customer she is helping. She saves it to the C:\Customer folder on the computer. When Pablo comes in, he is unable to open the file. Which of the following will MOST likely allow Pablo to open the file?
  3718.     > Modify the permissions on the document
  3719.  
  3720. * Susan has left the company and been replaced by Manuel. You create a user account for Manuel on Susan's computer. Manuel calls you and says that he can't open a specific file on the computer. Which of the following will MOST likely correct the problem?
  3721.     > Make Manuel the owner of the file
  3722.  
  3723. * Your computer has a single NTFS partition used for the C: drive with the following folders: C:\Confidential , C:\PublicReports . You configure NTFS permissions on the C:\Confidential folder and deny the Read permimssion to the Users group. For the C:\PublicReports folder, you allow Full Control permission to the Users group. You have not configured any permissions other than the defaults on any other folders or files. You take the following actions: Move Reports.doc from C:\Confidential to C:\PublicReports , Copy Costs.doc from C:\Confidential to C:\PublicReports . Which of the following BEST describes the permission the members of the Users group will have for the two files in the C:\PublicReports folder?
  3724.     > Allow Full Control to both
  3725.  
  3726. * Your computer has a single NTFS partition used for the C: drive with the following folders: C:\Confidential , C:\PublicReports . In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: Reports.doc , Costs.doc . The C:\PublicReports folder allows Full Control permission to the Users group. There are no other permimssions assigned except for the default permissions. You then take the following actions: Move Reports.doc from C:\Confidential to C:\PublicReports . Copy Costs.doc from C:\Confidential to C:\PublicReports . Which of the following BEST describes the permission the members of the Users group will have for the two files in the C:\PublicReports folder?
  3727.     > Deny Read to Reports.doc
  3728.     > Allow Full Control to Costs.doc
  3729.  
  3730. * You manage two folders in your computer as follows: C:\Confidential , D:\PublicReports . Both the C:\ and D:\ drives are formatted with the NTFS file system. In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: Reports.doc , Costs.doc . The D:\ drive allows the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions. You then take the following actions: Move Reports.doc from C:\Confidential to D:\PublicReports . Copy Costs.doc from C:\Confidential to D:\PublicReports . Which of the following BEST describes the permission members of the Users group will have for the two files in the D:\PublicReports folder?
  3731.     > Allow Full Control to both
  3732.  
  3733. * You manage two folders in your computer as follows: C:\Confidential , D:\PublicReports . The C:\ drive is formatted with NTFS, and the D:\ drive is formatted with FAT32. In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read perission to the Users group: Reports.doc , Costs.doc . You then take the following actions: Move Reports.doc from C:\Confidential to D:\PublicReports , Copy Costs.doc ffrom C:\Confidential to D:\PublicReports . Which of the following BEST describes what happens to the permission for both files as they are created in the D:\PublicReports folder?
  3734.     > Permissions are removed from both files
  3735.  
  3736. * The D:\ drive in your computer has been formatted with NTFS. The Rachel user account has been assigned the followinng permissions: Allow Full Control to the D:\Reports folder , Deny Full Control to the D:\Sales folder , Deny Full Control to the D:\Reports\2010reports.doc file , Allow Full Control to the D:\Sales\2010sales.doc file. Which of the following BEST describes the effective permisisons Rachel will have for both files?
  3737.     > Deny Full Control to D:\Reports\2010reports.doc
  3738.     > Allow Full Control to D:\Sales\2010sales.doc
  3739.  
  3740. * The D:\ drive in your computer has been formatted with NTFS. The Sales group on your computer has been given Allow Full Control to the D:\Sales folder. The Rachel user accoutn is a member of the Sales group. Which of the following will BEST prevent Rachel from accessing the D:\Sales\2010sales.doc file (1. without affecting her ability to access any other files in that folder and (2. without affecting the abilities of any other users?
  3741.     > Edit the properties for the file
  3742.     > Assign Rachel the Deny Full Control permission
  3743.  
  3744. * A help desk technician determines that a user's issue is caused by a corrupt file on their computer. Which of the following is the FASTEST way to transfer a good file to the computer?
  3745.     > Use the C$ administrative share to copy the file
  3746.  
  3747. * A user has a problem accessing several shared folders on the network. After determining the issue is not from his computer's IP configuration, you suspect the shared folders are not currently connected. Which of the following commands will MOST likely confirm your suspicions?
  3748.     > net use
  3749.  
  3750. * What command lets you see a list of valid command parameters for the net use command?
  3751.     > net use /?
  3752.  
  3753. * You have a folder that you would like members of your development team to access. You want to restrict network and local access to only specific users. All other users must not be able to view or modify the files in the folder. Which of the following would be the BEST actions to take next? (Select TWO)
  3754.     > Place the files on an NTFS partition
  3755.     > Configure both share and NTFS permissions
  3756.  
  3757. * You want to use the Universal Naming Convention (UNC) format to access a shared folder called Pictures on a computer named Home1. Which of the following is an example of the UNC format?
  3758.     > \\Home1\Pictures
  3759.  
  3760. * Which of the following statements are true regarding administrative shares? (Select TWO)
  3761.     > By default, Windows automatically creates an administrative share for every volume
  3762.     > To connect to an administrative share, you must use the UNC path
  3763.  
  3764. * Bob is a member of the Accounting group. The accounting group has been granted the Read and Write NTFS permissions to the WeeklyReports.xls file. Bob is also a member of the Everyone group, which has been given the Full Control permission to the WeeklyReport.xls file. Which of the following statements MOST likely correctly describes Bob's ability to access the WeeklyReport.xls file?
  3765.     > Bob can open, read, and write changes to the file
  3766.  
  3767. * You have a folder on your Windows computer that you would like to share with members of your development team. Users should be able to view and edit any file in the shared folder. You share the folder and give Everyone Full Control permission to the shared folder. Users connect to the shared folder and report that they can open the files, but they cannot modify any of the files. Which of the following would be the BEST action to take next?
  3768.     > Modify the NTFS permissions on the folder
  3769.  
  3770. * Which tool in Windows 10 would you use to browse all networks and shared folders to which a user has access? (Select THREE)
  3771.     > This PC
  3772.     > File Explorer
  3773.     > Network
  3774.  
  3775. * Ben, an employee in the legal department, has created several sensitive documents on his computer that must be made available to all members of the executive staff working in the same building. Due to the sensitive nature of these documents, Ben not only wants to restrict access to the files, but also make it impossible for anyone else in the company to even know where they are stored unless specifically told. Which of the following would MOST likely fulfill Ben's needs?
  3776.     > Hidden share
  3777.  
  3778. * Jane, an employee in the human resources department, has created several important PDF documents on her computer that all office managers in her building must read. She would like to make locating these files simple and maintain them as little as possible. It is important that no other users are permitted to view these documents. As the IT technician for your computer, Jane has asked you to make this possible. Which of the following would MOST likely fulfill Jane's needs?
  3779.     > Network Share
  3780. [CHAPTER 11]
  3781.  
  3782. [CHAPTER 12]
  3783. * On a Windows system, which Task Manager tab would you use to adjust the priority given to a specific program?
  3784.     > Details
  3785.  
  3786. * You manage a Windows system. You want to view information about your computer, including the CPU utilization and info about disk I/O operations.
  3787.  
  3788.     Which tool could you use to do this? (Select TWO)
  3789.     > Task Manager
  3790.     > Performance Monitor
  3791.  
  3792. * You manage a Windows system. You want to view information about all of the programs running your system and sort each program by the amount of memory and CPU that the program uses. Which tool should you use?
  3793.     > Task Manager
  3794.  
  3795. * Which tool can you use to display hardware utilization statistics that tell you abotu the operation of your computer?
  3796.     > Resource Monitor
  3797.  
  3798. * You are an IT technician for your company. Jodie, a receptionist, thinks her Windows 10 machine is running slowly totday and calls you to see if you can speed it up.
  3799.  
  3800.     Which of the following tabs would be the most helpful for getting an overall view of how Jodie's computer is running? (Select TWO)
  3801.     > Processes
  3802.     > Performance
  3803.  
  3804. * Bryce's computer is acting unusually sluggish today. He calls you, an IT technician, to see if you can find out what is going on to improve his computer's performance. You run task manager on Bryce's computer and find that a suspicious application has nearly 90% CPU utilization.
  3805.  
  3806.     Which of the following can be used from task manager to stop the application from running?
  3807.     > Right-click > End task
  3808.  
  3809. * You are working on your computer when a person from the shipping department delilvers a new external solid state drive (SSD) you ordered. When you plug the drive into your USB port, Windows cannot find a suitable device driver for the drive.
  3810.  
  3811.     To BEST resolve this issue, from which of the following Windows consoles would you access Device Manager?
  3812.     > Control Panel
  3813.  
  3814. * Which of the following paths opens the Computer Management tool in Windows 10? (Select TWO)
  3815.     > Right-click the Windows icon and select Computer Management
  3816.     > In the Control Panel, open System and Security > Administrative Tools and then double-click the Computer Management icon
  3817.  
  3818. * What is the purpose of the Microsoft management console (MMC)? (Select TWO)
  3819.     > Provide a shell for running snap-ins
  3820.     > Provide a common user interface for performing system administrative tasks
  3821.  
  3822. * You work in the IT department. To perform your daily tasks you often use many of the Windows consoles, such as the device manager, hyper v manager, and the performance monitor. Although each of these can be accessed from various locations in Windows, you want one location from which these common tools can be accessed.
  3823.  
  3824.     Which of the following system utilities would best provide this capability?
  3825.     > MMC
  3826.  
  3827. * Which tool can you use to view, but not modify hardware and configuration information for your computer?
  3828.     > Msinfo32
  3829.  
  3830. * Which utility allows you to choose selective startup in Windows?
  3831.     > Msconfig (System Configuration)
  3832.  
  3833. * Which tool lets you view and directly edit the registry?
  3834.     > Regedit
  3835.  
  3836. * What is the purpose of the dxdiag tool?
  3837.     > View information related to DirectX operation
  3838.  
  3839. * What is the purpose of the services snap-in?
  3840.     > View and manage software programs running in the background
  3841.  
  3842. * While using a new Windows system, you find that the mouse pointer tracks much more slowly on the screen than you would prefer. You want to increase the mouse pointer speed.
  3843.  
  3844.     Click the tab you would use in the Mouse Properties window to do this. (Click choice)
  3845.     > Pointer Options
  3846.  
  3847. * While using a new Windows system, you find that the double-click speed setting on the mouse pointer is set much sllower than you would prefer. You want to increase the double-click speed setting.
  3848.  
  3849.     Click the tab you would use in the Mouse Properties to do this. (Click choice)
  3850.     > Buttons
  3851.  
  3852. * Which category can you use in Control Panel to control how times, dates, numbers, and currency are formatted and displayed for your computer?
  3853.     > Clock and Region
  3854.  
  3855. * You use your computer to type documents in Portuguese that will be sent to Brazil. You purchase a second keyboard designed specifically for Portuguese.
  3856.  
  3857.     Which tool would you use to configure your computer for the new keyboard so you can switch between the Portuguese and English keyboards?
  3858.     > Time and Language
  3859.  
  3860. * You have a Windows system shared by three shift workers. Files that are used by all users are stored on the D:\ drive in various folders. The users have created hundreds of files on this drive and sometimes experience difficulty finding the files they need.
  3861.  
  3862.     What should you do?
  3863.     > Configure indexing to include the D:\ drive
  3864.  
  3865. * You need to use Task Manager to analyze memory utilization on a Windows system. For example, you need to see how much system RAM is currently in use and how much is available.
  3866.  
  3867.     Click on the tab in Task Manager that you would use to do this. (Click choice)
  3868.     > Performance
  3869.  
  3870. * You recently installed several applications on a Windows system. After doing so, you notice that the system takes much longer to boot up. You suspect that the new applications include one or more helper applications that are automatically floaded when the system boots. To increase performance, you want to identify any such helper applications and disable them.
  3871.  
  3872.     Click on the tab in Task Manager that you would use to do this. (Click answer)
  3873.     > Startup
  3874.  
  3875. * Drag each definition on the left to its corresponding performance counter on the right
  3876.     > Disk queue length
  3877.         > The number of read and write requests that are waiting to be processed
  3878.     > Processor utilization
  3879.         > The amount of time the processor spends performing non idle tasks
  3880.     > Commit charge
  3881.         > The amount of memory that has been assigned to running processes
  3882.     > Disk time
  3883.         > The amount of time that the disk subsystem is busy reading from and writing to disk
  3884.     > Page file usage
  3885.         > Blank
  3886.     > Memory pages per second
  3887.         > The number of hard faults that occur each second
  3888.  
  3889. * Which tool can you use to gather display statistics that help you monitor the operation of a Windows system?
  3890.     > Performance Monitor
  3891.  
  3892. * Your computer has a quad-core processor that supports multi-threading installed. Given that the system is running Windows, how can you verify whether the multi-threading has been enabled?
  3893.     > Task Manager can display CPU utilization graphs for eight processors
  3894.  
  3895. * Your computer seems to be running slowly. In particular, you notice that the hard drive activity light stays lit constantly when running multiple applications and switching between open windows, even though you aren't saving large files.
  3896.  
  3897.     What could you do to troubleshoot the problem? (Select TWO)
  3898.     > Use Task Manager to monitor memory utilization
  3899.     > Use resource monitor to monitor memory utilization
  3900.  
  3901. * Your job functions have recently changed. As a result, you find that you are needing to work with more running programs on your Windows 10 computer at a time. Although you haven't seen these in the past, you are not starting to receive error messages warning you or low virtual memory. However, no additional RAM can be added to your computer.
  3902.  
  3903.     Which of the following Control Panel utilities would best allow you to eliminate or reduce the number of error messages?
  3904.     > System
  3905.  
  3906. * Jodie's computer is acting unusually sluggish today. She calls you, an IT technician, to see if you can find out what is going on and to improve her computer's performance.
  3907.  
  3908.     Which of the following actions can you take from Task Manager to stop the application from running?
  3909.     > Right-click > End task
  3910.  
  3911. * You are an IT technician for your company. Rachel, who works at the receptionist desk, thinks her Windows 10 machine is running slowly today and calls you to see if you can speed it up.
  3912.  
  3913.     Which of the following tabs would be the most helpful for getting an overall view of how her computer is running? (Select TWO)
  3914.     > Processes
  3915.     > Performance
  3916.  
  3917. * Match each active directory on the left with the appropriate description on the right. Each component may be used once, more than once, or not at all.
  3918.     > Logical organization of resources
  3919.         > Organizational unit
  3920.     > Collection of network resources
  3921.         > Domain
  3922.     > Collection of related domain trees
  3923.         > Forest
  3924.     > Network resource in the directory
  3925.         > Object
  3926.     > Group of related domains
  3927.         > Tree
  3928.  
  3929. * Match the active directory
  3930.     > Domain controller
  3931.         > A server that holds a copy of the active directory database that can be written to
  3932.     > Site
  3933.         > Represents a group of networks that are connected with high speed links
  3934.     > Subnet
  3935.         > Represents a physical network segment
  3936.     > Forest root domain
  3937.         > The first domain created in an active directory forest
  3938.     > Tree root domain
  3939.         > The highest level domain in a tree
  3940.  
  3941. * What is the name of the service included with the Windows Server operating system that manages a centralized database containing user account and security info?
  3942.     > Active directory
  3943.  
  3944. * A new computer has been added to the sales department and needs to be joined to the Corpnet domain
  3945.  
  3946.     Which of the following system properties setting  must be used to make the change?
  3947.     > System Properties > Computer Name
  3948.  
  3949. * You are the owner of a small startup company consisting of only five employees. Each employee has their own computer. Due to the type of services your company offers, you don't foresee the employee count increasing much in the next year or two. As a startup company, you want to keep costs low and facilitate easier file sharing, internet access, printers, and other local network resources.
  3950.     > A workgroup
  3951.  
  3952. * The hide programs option setting is configured for a specific user as follows
  3953.  
  3954.     After logging in the user is able to see the programs option. Why does this happen?
  3955.     > The GPO linked to the users organizational unit is applied last, so this setting takes precedence
  3956.  
  3957. * You manage a large number of workstations that belong to a Windows domain. You want to prevent anyone that might try to gain access to a computer from guessing login info by trying multiple passwords
  3958.  
  3959.     Which default GPO contains a policy you can enable to guard all computers in the domain against this security breach?
  3960.     > Default domain policy
  3961.  
  3962. * A user has complained about not being able to remove a program that is no longer needed in a computer. The program option is not available in Control Panel
  3963.     > GPOs linked to organizational units that contain this users object
  3964.  
  3965. * You are managing a workstation that is not part of a Windows domain. Users on this computer should not be permitted to download applications from the Windows Store.
  3966.  
  3967.     Which administation tool can you use to enable a policy that turns off the store application for all users on this computer?
  3968.     > Local group policy editor
  3969.  
  3970. * You manage a group of 20 Windows workstations that are currently configured as a workgroup. You have been thinking about switching to an active directory configuration.
  3971.  
  3972.     Which advantages would you gain by switching to an active directory? (Select TWO)
  3973.     > Centralized authentication
  3974.     > Centralized configuration control
  3975.  
  3976. * Drag the group policy setting on the left to the appropriate description of how the setting is enforced on the right
  3977.     > Causes the policy to be enforced
  3978.         > Enabled
  3979.     > Does not change the current setting for the policy
  3980.         > Not configured
  3981.     > Prevents the policy from being enforced
  3982.         > Disabled
  3983.  
  3984. * You are an IT administator troubleshooting a Windows based computer. After a while, you determine that you need to refresh the group policy on that computer
  3985.  
  3986.     Which of the following is the best command line tool to run to accomplish this task?
  3987.     > Gpupdate
  3988.  
  3989. * Which Windows tool lets you perform automatic backups at regular times (such as on specific days at specific times)?
  3990.     > Task Scheduler
  3991.  
  3992. * You have an application that you would like to run on your Windows workstation every Monday at 3 PM. Which tool would you use to configure the application to run automatically?
  3993.     > Task Scheduler
  3994.  
  3995. * Don is an accountant in the Finance Department, and for the last several months has been testing an online accounting program. After speaking with his manager, Don received permission to download a steamlined version of the software which requires a local installation. After downloading, Don tried to install the application, but the OS will not allow it. Out of frustration, he called the Help Desk. The Help Desk personnel came to Don's machine and installed the application without issue.
  3996.  
  3997.     Which of the following is the most likely reason Don could not install the application?
  3998.     > Insufficient permissions
  3999.  
  4000. * You manage Windows desktops for your organization. You recently updated all of your workstations to Windows 10.
  4001.  
  4002.     What are your options for running the application? (Select TWO)
  4003.     > Create a virtual computer that runs Windows 7. Run the virtual computer each time the application runs
  4004.     > Run the application in compatibility mode
  4005.  
  4006. * Which tool can you use to view (but not modify) hardware and configuration information for your computer?
  4007.     > Msinfo32
  4008.  
  4009. * You manage a Windows system. You want to view information about your computer including the CPU utilization information about disk I/O operations.
  4010.    
  4011.     Which tools could you use to do this?
  4012.     > Performane Monitor
  4013.     > Task Manager
  4014.  
  4015. * What is the purpose of the dxdiag tool?
  4016.     > View information related to DirectX operation
  4017.  
  4018. * Which of the following is true of the Guest user account on a Windows system?
  4019.     > It is disabled by default
  4020.  
  4021. * Which tool lets you automatically start an application or run a script based on triggers?
  4022.     > Task Scheduler
  4023.  
  4024. * You have an application that renders videos used in your online business. You want to make sure that the application continues to receive adequate attention fro the system CPU, even if you open other applications.
  4025.  
  4026.     How can you adjust the amount of attention given to that application?
  4027.     > Use Task Manger to modify the process priority
  4028.  
  4029. * You have an application that you would like to run every Monday at 3PM on your Windows workstation.
  4030.  
  4031.     Which tool would you use to configure the appilcation to run automatically?
  4032.     > Task Scheduler
  4033.  
  4034. * Which System Utility would you use to troubleshoot hardware devices, examine and control the resources used by specific devices, and install updated device drivers?
  4035.     > Device Manager
  4036.  
  4037. * Your Windows 7 client systems are joinedd to the WestSim.com domain. You need to verify that these clients are configured to get time from the correct time provider.
  4038.  
  4039.     Which commands can you use to do this?
  4040.     > w32tm /query /source
  4041.     > w32tm /query /status
  4042.  
  4043. * You need to configure when Windows checks for and downloads updates from Microsoft's update servers on a Windows 7 system.
  4044.  
  4045.     Which option in Control Panel should you use to do this?
  4046.     > System and Security
  4047. [CHAPTER 12]
  4048.  
  4049. [CHAPTER 13]
  4050. * You work as the IT administrator for a small startup company. Lily's computer has two internal hard drives and runs Windows 10. She is concerned she may accidentally delete a file or that her primary hard disk may fail at some future time. She has come to you for suggestions about how to protect her files. Due to the size and revenue of this startup company, resources are somewhat limited.
  4051.  
  4052.     Which of the following would BEST protect Lily's files?
  4053.     > Back up her files using File History
  4054.  
  4055. * You have configured your Windows systems to automatically back up user data every night at midnight. You also take a system image back up once a month.
  4056.  
  4057.     What else should you do to ensure that you are protected against data loss? (Select TWO)
  4058.     > Regularly test restoration procedures
  4059.     > Store a copy of all backups off-site
  4060.  
  4061. * Why should backup media be stored offsite?
  4062.     > To prevent the same disaster from affecting both the system as well as its associated backup media
  4063.  
  4064. * You have implemented a regular backup schedule for a Windows system, backing up data files every night and creating a system image backup once a week. For security reasons, your company has decided to not store a redundant copy of the backup media at an offsite location.
  4065.  
  4066.     Where would be the next best place to keep your backup media?
  4067.     > In a locked fireproof safe
  4068.  
  4069. * You need to protect the user data on a Windows 7 system. Which tools could you use to do this? (Select TWO)
  4070.     > Previous Versions
  4071.     > Backup and Restore
  4072.  
  4073. * You need to protect the user data on a Windows 8.1 system. Which tools could you use to do this? (Select TWO)
  4074.     > File History
  4075.  
  4076. * You need to protect the user data on a Windows 10 system. Which tools could you use to do this? (Select TWO)
  4077.     > Backup and Restore
  4078.     > File History
  4079.  
  4080. * You need to backup user data on a Windows 10 system. The computer has a single SSD storage device installed that contains both the Windows operating system (in C:\Windows) and user profile data (in C:\Users). You plan to do the following:
  4081.  
  4082.     - User Backup and Restore to backup user data
  4083.     - Run the backup automatically every night at 11 PM
  4084.     - Store the backups in the C:\Backups folder
  4085.     - Include a system image in each backup
  4086.    
  4087.     Will this configuration work?
  4088.     > No, backups created with Backup and Restore can't be stored on the same drive containing the information being backed up
  4089.  
  4090. * You need to backup user data on a Windows 8.1 system. The computer has an SSD drive (C:) and a hard disk drive (D:) installed. The SSD drive contains both the Windows operating system and user profile data. You plan to do the following:
  4091.  
  4092.     - User Backup and Restore to backup user data
  4093.     - Run the backup automatically every night at 1 AM
  4094.     - Store the backups in the C:\Backups folder
  4095.     - Include a system image in each backup
  4096.    
  4097.     Will this configuration work?
  4098.     > No, Windows 8.1 does not include the Backup and Restore utility. File History must be used instead.
  4099.  
  4100. * You need to protect user data on a Windows 8.1 system. The computer has a single SSD drive (C:) installed. The SSD drive contains both the Windows operating system and user profile data. You plan to do the following:
  4101.  
  4102.     - Use File History to protect user data
  4103.     - Configure snapshots to be automatically taken every 30 minutes
  4104.     - Store the backups in the C:\FileHistory folder
  4105.     - Include the files in the C:\WidgerProject folder in the backup process
  4106.    
  4107.     Will this configuration work?
  4108.     > No, backups created with File History must be stored on a drive other than the one containing the information being backed up
  4109.  
  4110. * You need to configure File History to automatically delete any stored snapshots that are older than one month.
  4111.  
  4112.     Click the option you would use in Contol Panel to do this.
  4113.     > Advanced settings
  4114.  
  4115. * Even if you perform regular backups, what must be done to ensure that you are protected against data loss?
  4116.     > Regularly test restoration procedures
  4117.  
  4118. * Which Windows tool lets you perform automatic backups at regular times (such as on specific days at specific times)?
  4119.     > Task Scheduler
  4120.  
  4121. * To protect your Windows 7 system, you've used System Restore to automatically protect your system using restore points. You've also used Backup and Restore in Control Panel to configure a nightly backup of your user's data files.
  4122.     > No, you need to create an image of your Windows system as well
  4123.  
  4124. * Why should backup media be stored offsite?
  4125.     > To prevent the same disaster from affecting both the network and the backup media
  4126.  
  4127. * You have implemented a regular backup schedule for your Windows server, backing up all data every weekend with incremental backups every other night. Your company has decided against storing backup tapes at an offstie location.
  4128.  
  4129.     Where would be the next best place to keep your backup tapes?
  4130.     > In a fireproof, locked safe
  4131.  
  4132. * You have configured your Windows system to automatically backup user data every night at midnight. You also take a system image backup once a month.
  4133.  
  4134.     What else should you do to ensure that you are protected against data loss? (Select TWO)
  4135.     > Regularly test restoration procedures
  4136.     > Store a copy of all backups off-site
  4137.  
  4138. * Why should backup media be stored offsite?
  4139.     > To prevent the same disaster from affecting both the system as well as its associated backup media.
  4140.    
  4141. * Where would be the next best place to keep your backup media?
  4142.     > In a locked fireproof safe
  4143.  
  4144. * You need to protect the user data on a Windows 7 system. Which tools could you use to do this?
  4145.     > Previous Versions
  4146.     > Backup and Restore
  4147.  
  4148. * You need to protect the user data on a Windows 8.1 system. Which tools could you use to do this?
  4149.     > File History
  4150.  
  4151. * You need to protect the user data on a Windows 10 system. Which tools could you use to do this? (Select TWO)
  4152.     > Backup and Restore
  4153.     > File History
  4154.  
  4155. * You need to configure File History to automatically delete any stored snapshots that are older than one month.
  4156.  
  4157.     Click the option you would use in Control Panel to do this.
  4158.     > Advanced settings
  4159.  
  4160. * Is an operating system patch that fixes bugs and other vulnerabilities in the software
  4161.     > Hotfix
  4162.  
  4163. * Is a collection of hotfixes and other system enhancements.
  4164.     > Service Pack (SP)
  4165.  
  4166. * Software that is permanently stored in a chip. The BIOS on a motherboard is an example of firmware.
  4167.     > firmware
  4168.  
  4169. * Firmware updates
  4170.     > Flashing
  4171.  
  4172. * Which of the following actions directly improves system security on a Windows workstaion?
  4173.     > Install latest updates
  4174.  
  4175. * Users have been experiencing periodic system lockups that generate the same error message. After checking Microsoft's website, you find that a hotfix is available to address the issue.
  4176.  
  4177.     What should you do next?
  4178.     > Deploy the hotfix on a test computer
  4179.  
  4180. * Which of the following terms describes a Windows operating system patch that corrects a specific problem and is released on a short-term periodic basic?
  4181.     > Hotfix
  4182.  
  4183. * You want to make sure that you always have the latest patches installed on your workstation for an older entry application created by DataComLink corporation.
  4184.  
  4185.     What should you do? (Select TWO)
  4186.     > Check the DataComLink Website regularly for patches and updates to the software
  4187.     > Configure the application to automatically download and install updates as they are released
  4188.  
  4189. * You would like to run an application on your Windows workstation every Monday at 3:00 PM.
  4190.  
  4191.     Which tool would you use to configure the application to run automatically?
  4192.     > Task Scheduler
  4193.  
  4194. * Recently, a Windows 10 update was automatically downloaded and installed on your Windows 10 system. After you install the update, your contact manager database application no longer works correctly. You want to uninstall the latest updates to see if the application starts working again.
  4195.  
  4196.     Click the option you would use in the Settings app to do this.
  4197.     > View your update history
  4198.  
  4199. * You want to configure your Windows 10 workstation so that it can get Windows updates directly from other Windows 10 systems on the network that have already downloaded them from Microsoft.
  4200.  
  4201.     Click the Settings app option you would use to do this.
  4202.     > Choose how updates are delivered
  4203.  
  4204. * You work for a large company as the IT administrator. With the many external attacks perpetrated in the form of security breaches being found in applications, you are concerned that your Windows 10 computers may be vulnerable. You also want to ensure that Windows is using the latest features.
  4205.  
  4206.     Which of the following would BEST protect your computers?
  4207.     > Windows updates
  4208.  
  4209. * To improve the safety of your location and to comply with regulations regarding work environments with hazardous materials, you have been assigned to assemble Material Safety Data Sheets (MSDS) for all chemicals used in your shop.
  4210.  
  4211.     How should you obtain these documents?
  4212.     > Download them from the chemical manufacturer's websites
  4213.  
  4214. * You are filling out a change order form. Toward ites end, you explain how you will return affected hardware and software to its original state if the change fails.
  4215.  
  4216.     What is this plan called?
  4217.     > Backout Plan
  4218.  
  4219. * While on a service call at a customer site, you are discussing the problem with the customer when your cell phone rings. You check the caller ID, and you see that the call is related to parts you ordered for another customer.
  4220.  
  4221.     Which of the following is the MOST professional way to handle the situation?
  4222.     > Ask the customer if it is okay to take the call, and then step into the hallway to briefly talk on the phone
  4223.  
  4224. * What is the best countermeasure against social engineering?
  4225.     > User awareness training
  4226.  
  4227. * Which of the following are the BEST steps you can take to avoid having your mobile device exploited by a hacker or infected by a virus? (Select TWO)
  4228.     > Keep the operating system up to date
  4229.     > Lock the screen with some form of authentication
  4230.  
  4231. * A new laptop was delivered to your home and left on the porch while you were at work. It is very cold outside, and you don't know how long it has been there. You unpack the computer. YOu would like to know if it is working properly.
  4232.  
  4233.     Which of the following is the BEST action to take?
  4234.     > Let the computer warm up to room temperature before turning it on
  4235.  
  4236. * A technician is installing a new SOHO wireless router. Which of the following is the FIRST thing the technician should do to secure the router?
  4237.     > Change the router's default password
  4238.  
  4239. * After removing the printer paper from your laser printer, the toner smudges and can be wiped off in places.
  4240.  
  4241.     Which of the following is the MOST likely problem?
  4242.     > Fuser rollers
  4243.  
  4244. * A salesperson in your organization spends most of her time travelling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database. Because she rarely comes back to your home office, she usually accesses the network from her notebook computer using Wi-Fi access provided by hotels, restaurants, and airports. Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection.
  4245.  
  4246.     Which of the following key steps should you take when implementing this configuration? (Select TWO) (Each option is part of the complete solultion)
  4247.     > Configure the VPN connection to use IPsec
  4248.     > Configure the browser to send HTTPS requests through the VPN connection
  4249.  
  4250. * Your computer seems to be running slowly. In particular, you notice that the hard drive activity light stays lit constantly when running multiple applications and switching between open windows, even though you aren't saving large files.
  4251.  
  4252.     What could you do to troubleshoot the problem? (Select TWO)
  4253.     > Use Task Manager to monitor memory utilization
  4254.     > Use Resource Monitor to monitor memory utilization
  4255.  
  4256. * Which option, used with the copy command, makes sure that all copied files are written correctly after they have been copied?
  4257.     > /v
  4258.  
  4259. * For the past several days, the print jobs from the inkjet printer are missing colors and leaving gaps. Which of the following will MOST likely solve the problem?
  4260.     > Use the automatic print cleaning feature
  4261.  
  4262. * You have physically installed a new hard disk drive in your computer and configured the disk in the BIOS using the CMOS setup program. You try to access the hard disk drive in Windows Explorer, but the drive is not displayed.
  4263.  
  4264.     Which of the following utilities will you MOST likely use to solve the problem?
  4265.     > Disk Management
  4266.  
  4267. * You need to create a user account on a Windows system that can create files, run applications, and install printers when the driver for the printer already exists on the computer. You want the user to have only the minimum rights necessary on the computer.
  4268.    
  4269.     Which group should this user be a member of?
  4270.     > users
  4271.  
  4272. * A technician assists Joe, an employee in the sales department who needs access to the client database, by granting him administrator privileges. Later, Joe discovers he has access to the salaries in the payroll database.
  4273.  
  4274.     Which of the following security practices was violated?
  4275.     > Principle of least privilege
  4276.  
  4277. * Your laser printer prints a vertical black line on every page. You change the toner cartridge, but the problem does not go away.
  4278.  
  4279.     What is the MOST likely problem?"
  4280.     > A corona wire is dirty
  4281.  
  4282. * You have a computer that runs Windows 10. Where would you go to verify that the system has recognized the anti-malware software installed on the system?
  4283.     > Security and Maintenance
  4284.  
  4285. * What command lets you see a list of valid command parameters for the net use command?
  4286.     > net use /?
  4287.  
  4288. * Of the following choices, which action could be most physically harmful to you?
  4289.     > Looking into the end of a fiber optic cable
  4290.  
  4291. * A user generates printouts consisting of several pages of seemingly random characters every time he prints to a network printer. The printer seems to work fine for all other users.
  4292.    
  4293.     What is the most likely cause of the problem?
  4294.     > The user is using an incorrect printer driver
  4295.  
  4296. * A customer who uses a Windows computer recently purchased an inkjet printer from your store. She is now calling to complain that the colors in the photos she printed on her new printer don't match the colors in the original photos created by the photo shop.
  4297.  
  4298.     Which of the following actions will MOST likely resolve the issue? (Select TWO)
  4299.     > Use the color management tab of the printer driver to calibrate the driver's color settings
  4300.     > Download and install the latest printer drivers
  4301.  
  4302. * Which of the following disk maintenance utilities optimizes the performance of your hard drive by verifying the file system integrity of a hard disk and fixing the errors it detects?
  4303.     > Check disk
  4304.  
  4305. * You have installed a new computer with a quad-core 64-bit processor, 6 GB of memory, and a PCIe video card with 512 MB of memory. After installing the operating system, you see less than 4 GB of memory showing as available in Windows.
  4306.  
  4307.     Which of the following actions would MOST likely rectify this issue?
  4308.     > Install a 64-bit version of the operating system
  4309.  
  4310. * During an airline flight, a laptop user makes last-minute changes to a presentation that contains sensitive company information.
  4311.  
  4312.     Which of the following would make it difficult for other passengers to view this information on the laptop display?
  4313.     > Privacy filter
  4314.  
  4315. * Your computer has a single NTFS partition used for the C: drive with the following folders: C:\Confidential, C:\PublicReports
  4316.  
  4317.     In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: Reports.doc, Costs.doc
  4318.    
  4319.     The C:\PublicReports folder allows the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions. You then take the following actions: Move Reports.doc from C:\Confidential to C:\PublicReports, Copy Costs.doc from C:\Confidential to C:\PublicReports
  4320.    
  4321.     Which of the following BEST describes the permission the members of the Users group will have for the two files in the C:\PublicReports folder?
  4322.     > Deny read to Reports.doc
  4323.     > Allow full control to Costs.doc
  4324.  
  4325. * Since it has no moving parts, a CPU will usually work properly for several years. Which of the following is a common factor that MIGHT cause a CPU to fail prematurely?
  4326.     > Electostatic discharge (ESD)
  4327.  
  4328. * One of the Windows workstations you manage has four user accounts defined on it. Two of the users are limited users while the third (your account) is an administrative user. The fourth account is the Guest user account, which has been enabled to allow management employees convenient workstation access. Each limited and administrative user has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. Autorun has been disabled on the system.
  4329.  
  4330.     Which of the following actions is MOST likely to increase the security of this system?
  4331.     > Disable the Guest account
  4332.  
  4333. * You manage Windows desktops for your organization. You recently updated all of your workstations to Windows 10. Your organization relies on a particular application, which worked correctly on Windows 7, but now does not run in Windows 10. You have checked the application vendor's website, but they do not provide a Windows 10 update.
  4334.  
  4335.     What are your options for running the application? (Select TWO)
  4336.     > Create a virtual computer that runs Windows 7. Run the virtual computer each time the application runs.
  4337.     > Run the application in Compatibility Mode.
  4338.  
  4339. * While reviewing video files from your organization's security cameras, you notice a suspicious person using piggy- backing to gain access to your building. The individual in question did not have a security badge.
  4340.  
  4341.     Which of the following would you MOST likely implement to keep this from happening in the future?
  4342.     > Mantraps
  4343.  
  4344. * You have just received a call from one of your customers. He informs you that after turning his computer on, he received the following error:
  4345.     - Error loading operating system BOOTMGR is missing
  4346.     - Press Ctrl+Alt+Del to restart
  4347.     Every time he restarts his computer, the same error is shown.
  4348.    
  4349.     Which of the following tools is BEST for fixing this issue?
  4350.     > bootrec
  4351.  
  4352. * Employees complain to the company IT division that they are spending considerable time and effort discarding unwanted junk email.
  4353.  
  4354.     Which of the following should be implemented?
  4355.     > Email filtering
  4356.  
  4357. * You want to be able to monitor and filter VM-to-VM traffic within a virtual network. What should you do?
  4358.     > Implement a virtual firewall within the hypervisor
  4359.  
  4360. * Aubrey, an employee in the marketing department, has told you that when she prints to her laser printer, faint ghost-like images are being printed on her new page. As an IT administrator, you check with other employees who use the same printer and find that they are not experiencing the same problem.
  4361.  
  4362.     Which of the following would be the BEST fix for this issue?
  4363.     > Use preprinter paper that has been printer with laser-compatible printer toner
  4364.  
  4365. * In which of the following situations should install a firewall?
  4366.     > You want to restrict internet users from accessing private data on your network
  4367.  
  4368. * To tightly control the anti-malware settings on your computer, you elect to update the signature file manually. Even though you vigilantly update the signature file, the machine becomes infected with a new type of malware.
  4369.  
  4370.     Which of the following actions would BEST prevent this scenario from occurring again?
  4371.     > Configure the software to automatically download the definition file updates as soon as they become
  4372.  
  4373. * You have booted your Windows workstation into Safe Mode and enabled Boot Logging. To which log file is the boot logging information now being written?
  4374.     > Ntbtlog.txt
  4375.  
  4376. * You have an existing computer running Windows 10 Enterprise. You want to configure a RAID 5 array in the computer. You install three new SATA drives and then use the RAID controller integrated into the motherboard to define a RAID 5 array using them. When you boot the computer, Windows does not show the logical RAID drive you just created.
  4377.  
  4378.     What should you do?
  4379.     > Install the drivers for the motherboard RAID controller.
  4380.  
  4381. * You manage two folders in your computer as follows: C:\Confidential, D:\PublicReports
  4382.     Both the C:\ and D:\ drives are formatted with the NTFS file system. In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: Reports.doc, Costs.doc
  4383.     The D:\ drive allows the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions. You then take the following actions: Move Reports.doc from C:\Confidential to D:\PublicReports, Copy Costs.doc from C:\Confidential to D:\PublicReports.
  4384.    
  4385.     Which of the following BEST describes the permission the members of the Users group will have for the two files in the D:\PublicReports folder?
  4386.     > Allow Full Control to both
  4387.  
  4388. * Your organization employs a group of traveling salespeople who need to access the corporate home network through the internet while they are on the road. You want to funnel remote access to the internal network through a single server.
  4389.  
  4390.     Which of the following solutions would be BEST to implement?
  4391.     > VPN concentrator
  4392.  
  4393. * Why should backup media be stored offsite?
  4394.     > To prevent the same disaster from affecting both the network and the backup media
  4395.  
  4396. * While changing the toner cartridge in your laser printer, you accidently spill toner in and around the printer.
  4397.  
  4398.     Which of the following is the BEST method for cleaning up the spilled toner?
  4399.     > Use an anti-static micro-filtering vacuum
  4400.  
  4401. * What is name of the utility that is (1 similar to Telnet and (2 used to establish a secure remote server management session?
  4402.     > SSH
  4403.  
  4404. * A series of used clusters on the hard disk drive that are not associated with a specific file.
  4405.     > Lost clusters
  4406.  
  4407. * Occurs when two files claim the same cluster.
  4408.     > Cross-linked file
  4409.  
  4410. * Files that exist on the hard drive but are not associated with a directory in the index.
  4411.     > Orphaned files
  4412.  
  4413. * A portion of the hard disk that cannot be used.
  4414.     > Bad sector
  4415.  
  4416. * Who needs to approve a change before it is initiated? (Select TWO.)
  4417.     > Change board
  4418.     > Client or end user
  4419.  
  4420. * You have a network that uses a logical ring topology. How do messages travel through the network?
  4421.     > Messages travel from one device to the next until they reach the destination device.
  4422.  
  4423. * You have just connected a new USB device to your Windows system. You used the installation disc that came with the device to install the drivers needed to support the device. Since the installation, the system frequently crashes when you try to access the new device.
  4424.  
  4425.     Which of the following steps would MOST likely resolve this issue?
  4426.     > Download and install the latest driver from the manufacturer's website.
  4427.  
  4428. * What is the purpose of an MSDS?
  4429.     > To document how to safely handle and dispose of hazardous materials.
  4430.  
  4431. * Device manufacturers are constantly finding bugs, vulnerabilities, or better ways for their devices to communicate with the operating system.
  4432.  
  4433.     Because of this, which of the following is the BEST practice to do before installing a new device?
  4434.     > Obtain the latest driver from the manufacturer's website
  4435.  
  4436. * You have a computer with a removable disk drive formatted with NTFS. You want the drive to use FAT32 so it is compatible with more operating systems. The drive is currently configured using drive letter D:.
  4437.  
  4438.     Which of the following MUST you complete to accomplish this task?
  4439.     > Back up the data on the D: drive
  4440.     > Reformat the D: drive using FAT32
  4441.     > Restore the data
  4442.  
  4443. * Which of the following actions directly improves system security on a Windows workstation?
  4444.     > Install the latest updates.
  4445.  
  4446. * Nathan, a long-time Mac user, has been using his Mac computer for some time now with no issues. Recently, however, he reported that his Mac will unexpectedly tell him that his computer must be restarted by holding down the Power button for several seconds or by pressing the Restart button.
  4447.  
  4448.     Assuming that this is a symptom of kernel panic, which of the following steps would be the BEST first step for troubleshooting this issue?
  4449.     > Do a safe boot
  4450.  
  4451. * A PC technician knows he will be late to an appointment with a customer. Which of the following actions should the technician take? (Select TWO)
  4452.     > Contact the customer and apologize.
  4453.     > Give a realistic timeframe for your arrival.
  4454.  
  4455. * A mobile device user is comparing methods for securing the device. Which of the following methods for securing a mobile device can affect the device's performance?
  4456.     > Full device encryption
  4457.  
  4458. * You have just installed a new video card in Mark's computer. When you power on the computer, Windows automatically detects the new device and tries to locate an applicable device driver. Unfortunately, Windows cannot locate the required driver.
  4459.  
  4460.     Which of the following would be the BEST administrative tool to fix Mark's computer?
  4461.     > Computer Management
  4462.  
  4463. * Jane, an employee in the human resources department, has created several important PDF documents on her computer that all office managers in her building must read. She would like to make locating these files simple and maintain them as little as possible. It is important that no other users are permitted to view these documents. As the IT technician for your company, Jane has asked you to make this possible.
  4464.  
  4465.     Which of the following would MOST likely fulfill Jane's needs?
  4466.     > Network share
  4467.  
  4468. * Which of the following networking devices or services is LEAST likely to be compatible with VPN connections?
  4469.     > NAT
  4470.  
  4471. * You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms.
  4472.  
  4473.     Which of the following features lets you allow or reject client connections by hardware address?
  4474.     > MAC address filtering
  4475.  
  4476. * Which of the following security measures is a form of biometrics?
  4477.     > Fingerprint scanner
  4478.  
  4479. * You use productivity apps on your iPad tablet device while traveling between client sites. You're concerned that you may lose your iPad while on the road and want to protect the data stored on it from being compromised. Currently, your iPad uses a 4-digit PIN number for a passcode. You want to use a more complex alpha-numeric passcode. You also want all data on the device to be erased if the wrong passcode is entered more than 10 consecutive times.
  4480.  
  4481.     What should you do? (Select TWO) (Each option is part of the complete solution)
  4482.     > Enable the Erase Data option.
  4483.     > Disable the Simple Passcode option.
  4484.  
  4485. * You have installed anti-malware software that checks for viruses in e-mail attachments. You configure the software to quarantine any files with problems. You receive an email with an important attachment, but the attachment is not there. Instead, you see a message that the file has been quarantined by the anti-malware software.
  4486.  
  4487.     Which of the following BEST describes what happened to the file?
  4488.     > It has been moved to a folder on your computer
  4489.  
  4490. * While running a full system scan using your anti-malware software, three files have been identified as possible problems. You want to keep the files intact so you can review them later, but you also need to ensure they can't harm anything else on your computer.
  4491.  
  4492.     Which of the following is the BEST next step?
  4493.     > Quarantine the files
  4494.  
  4495. * You work for a company that provides technical support for customers. One customer calls wanting to know how to adjust their monitor so they can have the sharpest and most detailed images, words, and icons.
  4496.  
  4497.     Which Control Panel setting should you adjust to BEST meet the customer's needs?
  4498.     > Resolution
  4499.  
  4500. * You work for a company based in Phoenix, Arizona, which is a very hot and dry area. Several people in the research department have reported that even though their files are printing to their laser printer correctly, a much lighter copy of the same text also prints within 2 to 3 cm of the original text.
  4501.  
  4502.     Which of the following would MOST likely fix this type of ghosting image?
  4503.     > Replace the imaging drum, as it is probably at end of life.
  4504.  
  4505. * How can you keep a Windows 10 system from automatically restarting after a critical system error occurs?
  4506.     > Use the Disable automatic restart after failure option on the Advanced Startup Options menu.
  4507.  
  4508. * You need to boot a Windows 10 system into Safe Mode. Which steps will accomplish this task? (Select TWO) (Each choice is a complete solution)
  4509.     > Press F8 at Startup
  4510.     > in Safe mode, select start > settings > Update&security > recovery > advanced startup > restart now
  4511.  
  4512. * As you troubleshoot a problem during a customer appointment, you discover the problem is directly related to the customer's actions.
  4513.  
  4514.     Which of the following is the BEST way to address the situation?
  4515.     > Tactfully explain the problem without accusing or judging the customer.
  4516.  
  4517. * Which port must be opened in the firewall of a Windows system so that a Remote Desktop connection can be established?
  4518.     > 3389
  4519.  
  4520. * You have been having trouble with your laptop crashing. You would like your computer to create a memory dump file when it crashes.
  4521.  
  4522.     Where should you place the paging file?
  4523.     > On the system volume
  4524.  
  4525. * You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0 subnet using the default subnet mask. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following:
  4526.     Ethernet adapter Local Area Connection:
  4527.     Connection-specific DNS Suffix . : mydomain.local
  4528.     Description . . . . . . . : Broadcom network adapter
  4529.     Physical Address. . . . . . :   00-AA-BB-CC-74-EF
  4530.     DHCP Enabled . . . . . . . : No
  4531.     Autoconfiguration Enabled. . . : Yes
  4532.     IPv4 Address . . . . . . . : 192.168.1.102(Preferred)
  4533.     Subnet Mask . . . . . . . : 255.255.255.0
  4534.     Default Gateway. . . . . . . . . : 192.168.2.1
  4535.     DNS Servers. . . . . . . . . . . : 192.168.2.20
  4536.    
  4537.     Which of the following is the MOST likely cause of the problem?
  4538.     > Incorrect default gateway
  4539.  
  4540. * Wendy had been searching the internet for a great deal on jewelry. While looking at one site, a pop-up was displayed that told her she had just been chosen as the winner of a nice prize. Being excited to win, Wendy clicked on the link provided to claim her prize. The next day, when Wendy tried to turn on her computer, her computer displayed the Blue Screen of Death (BSOD). After interviewing Wendy, you suspect that the pop-up she clicked on installed some malicious software that has caused her computer to lock up.
  4541.  
  4542.     Which of the following is the BEST place to begin repairing Wendy's computer?
  4543.     > Boot the computer from the windows installation disc and run startup repair
  4544.  
  4545. * When you print from your laser printer, the paper contains faint images from previous printouts.
  4546.  
  4547.     Which of the following components is MOST likely the cause? (Select TWO)
  4548.     > Rubber scraper
  4549.     > Fluorescent lamp
  4550.  
  4551. * You're conducting scheduled maintenance on a laser printer. You notice that there is a build-up of excess toner inside the interior of the printer.
  4552.  
  4553.     Which of the following is the BEST way to remove the excess toner?
  4554.     > Use an anti-static vacuum
  4555.  
  4556. * You want to build a new system that supports 6 GB of memory. Which of the following will be the MOST important consideration when building the computer?
  4557.     > 64-bit processor
  4558.  
  4559. * An administrator configures the Time Machine application on Mac OS computers and develops scripts that use the tar command on Linux computers.
  4560.  
  4561.     Which of the following best practices is the administrator following?
  4562.     > Scheduled backups
  4563.  
  4564. * Which of the following is not a form of biometrics?
  4565.     > Smart card
  4566.  
  4567. * You work as the IT administrator for a small startup company. Lily's computer has two internal hard drives and runs Windows 10. She is concerned that she may accidently delete a file or that her primary hard disk may fail at some future time. She has come to you for suggestions about how to protect her files. Due to the size and revenue of this startup company, resources are somewhat limited.
  4568.  
  4569.     Which of the following would BEST protect Lily's files?
  4570.     > Backup her files using File History
  4571.  
  4572. * Consider the virtual memory configuration for the Windows 10 system shown in the exhibit. Given that this Windows 10 system has 16 GB of system RAM and three hard disks installed, which configuration.
  4573.  
  4574.     What change could you make to the paging file to increase system performance?
  4575.     > Add paging files to the E: and F: volumes
  4576.  
  4577. * Which utility allows you to choose Selective Startup in Windows?
  4578.     > msconfig
  4579.  
  4580. * You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems installing a new device. You try to tell the user how to update the driver for the device over the phone, but he is having a hard time understanding your directions and is becoming frustrated.
  4581.  
  4582.     What should you do?
  4583.     > Establish a Remote Desktop connection and update the driver.
  4584.  
  4585. * You have a computer that runs Windows 7, and you want to install Windows 10. You are not concerned about keeping any of the existing data currently on the drive, and you want to do a clean install. After placing the Windows 10 installation DVD in the optical drive, you restart the computer, but it does not boot to the DVD, and you are unable to install Windows.
  4586.  
  4587.     Which of the following are the BEST methods for installing Windows from the DVD? (Select TWO) (Each choice is a complete solution)
  4588.     > While the computer is rebooting, press the boot menu function key
  4589.     > From the UEFI or BIOS firmware, change the boot order
  4590.  
  4591. * A user has created a complex spreadsheet on her workstation containing many graphs and charts. She sent the document to an older network laser printer that is shared by everyone in her department. When she picked up the output, only the top half of each page was printed, and the bottom half was blank.
  4592.  
  4593.     Which of the following will MOST likely rectify this issue?
  4594.     > Install additional memory in the printer.
  4595.  
  4596. * While using a Windows 10 system, you accidentally downloaded and installed a malware package from a phishing email exploit. You were able to reboot the system into Safe Mode and use System Restore to revert the system to a point in time before the malware infection occurred.
  4597.  
  4598.     Given this information, which of the following are true? (Select TWO)
  4599.     > You must reinstall any applications that were installed after the restore point was taken.
  4600.     > Your user files were not affected when the system was reverted to the restore point.
  4601.  
  4602. * Which of the following paper types should not be used in inkjet printers?
  4603.     > Very glossy paper
  4604.  
  4605. * Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a paper license and a single key for updating 10 users. Since this is an enterprise paper license, there is no mechanism that enforces a limit to the number of times the key can be used, so you decide to go ahead and update all 20 users.
  4606.  
  4607.     What are the possible consequences of this decision? (Select TWO)
  4608.     > You expose your company to litigation by violating the software license agreement
  4609.     > You risk losing your job
  4610.  
  4611. * What is the IPv4 address of the workstation?
  4612.     > 169.254.201.11
  4613.  
  4614. * What is the subnet mask?
  4615.     > 255.255.255.0
  4616.  
  4617. * How did the computer get its IP configuration information?
  4618.     > APIPA
  4619.  
  4620. * What type of internet access would this computer have?
  4621.     > No Access
  4622.  
  4623. * Provides a high-level overview of the organization's security program.
  4624.     > Organizational security policy
  4625.  
  4626. * Defines an employee's rights to use company property.
  4627.     > Acceptable use policy
  4628.  
  4629. * Identifies the requirements for credentials used to authenticate to company-owned systems.
  4630.     > Password policy
  4631.  
  4632. * Identifies a set of rules or standards that define personal behaviors.
  4633.     > Code of ethics
  4634.  
  4635. * Sets expectations for user privacy when using company resources.
  4636.     > Acceptable use policy
  4637.  
  4638. * Specifies that user accounts should be locked after a certain number of failed login attempts.
  4639.     > Password policy
  4640.  
  4641. * You have a workstation running Windows 10, 64-bit edition. A local printer connected to a USB port is shared so that other users can print to that printer. Users running 32-bit versions of Windows report that they can't install the driver for the shared printer. Users running a 64-bit version of Windows do not have any problems.
  4642.  
  4643.     Which of the following actions will MOST likely fix this problem? (Select TWO)
  4644.     > Manually install the correct driver on each computer that is having a problem
  4645.     > On your computer, add the x86 drivers
  4646.  
  4647. * You have just installed anti-malware software on all computers on your company's network. Which of the following additional actions would be BEST to take to help protect systems from malicious software? (Select TWO)
  4648.     > Configure the software to automatically update its definition files
  4649.     > Train users to scan removable storage devices before copying files
  4650.  
  4651. * Resolves (looks up) the IP address of the specified hostname.
  4652.     > nslookup
  4653.  
  4654. * Tests connectivity between devices and shows the routers in the path between the two devices.
  4655.     > tracert
  4656.  
  4657. * Sends an ICMP echo request/reply packet to a remote host.
  4658.     > ping
  4659.  
  4660. * Displays current connections and incoming and outgoing connections.
  4661.     > netstat
  4662.  
  4663. * A few simple replies to this request from the remote host indicates that a connection exists between sender and receiver.
  4664.     > ping
  4665.  
  4666. * Displays active sessions, ports, sockets, and the local routing table.
  4667.     > netstat
  4668.  
  4669. * Performs a continuous connection test when used with the -t option.
  4670.     > ping
  4671.  
  4672. * What is the difference between UXGA and WUXGA displays?
  4673.     > WUXGA has a widescreen aspect ratio
  4674.  
  4675. * You have been asked to implement a network infrastructure that will accommodate failed connections. Which of the following network topologies provides redundancy for a failed link?
  4676.     > mesh
  4677.  
  4678. * What do biometrics use to authenticate identity?
  4679.     > Biological attributes
  4680.  
  4681. * To protect a Windows 10 system, you've configured System Restore to automatically protect your system using restore points.
  4682.  
  4683.     Will this adequately protect the user data on the system?
  4684.     > No, you need to enable File History
  4685.  
  4686. * You want to make sure that you always have the latest patches installed on your workstation for an order entry application created by DataComLink corporation.
  4687.  
  4688.     What should you do? (Select TWO)
  4689.     > Configure the application to automatically download and install updates as they are released
  4690.     > Check the DataComLink Website regularly for patches and updates to the software
  4691.  
  4692. * A user has created a complex spreadsheet on her workstation containing many graphs and charts. She sent the document to an older network laser printer that is shared by everyone in her department. When she picked up the output, only the top half of each page was printed, and the bottom half was blank.
  4693.  
  4694.     Which of the following will MOST likely rectify this issue?
  4695.     > Install additional memory in the printer
  4696.  
  4697. * You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network.
  4698.  
  4699.     Which of the following protocols is suitable for this task?
  4700.     > PPTP
  4701.  
  4702. * You are working at the command line and want to add the read-only attribute to a file and remove the hidden attribute.
  4703.  
  4704.     Which command would you use?
  4705.     > attrib +r -h
  4706.  
  4707. * You're using a Linux distribution that uses RPM for package management. Which command would you use to check to see if the httpd package, the Apache HTTP Server package, is installed?
  4708.  
  4709.     > yum list installed httpd
  4710.  
  4711. * Which of the following utilities checks the disk for bad clusters?
  4712.     > chkdsk
  4713.  
  4714. * A user is having problems connecting to other computers using hostnames. Which of the following commands will BEST help you troubleshoot this problem?
  4715.     > nslookup
  4716.  
  4717. * After receiving several complaints from the employees in your company, you start to troubleshoot a laser printer. After a short while, you have concluded that the most probable cause is a dirty drum.
  4718.  
  4719.     Which of the following is the MOST logical reasons for this conclusion?
  4720.     > Spots at regular intervals on the page
  4721.  
  4722. * A technician receives notification from a SOHO router manufacturer of a specific vulnerability that allows attackers to exploit SNMP traps to take over the router. The technician verifies the settings outlined in the notification.
  4723.  
  4724.     Which of the following actions should the technician take NEXT?
  4725.     > Check for and apply firmware updates.
  4726.  
  4727. * A service running on your Windows system has hung badly and will not respond when you try to use the Services console to restart it. You run the tasklist command at the command prompt and find that the service's process has a PID of 1234 assigned to it and that it has an image name of telecom.exe.
  4728.  
  4729.     Which commands could you run to shut down the service? (Select TWO)
  4730.     > taskkill /F /PID 1234
  4731.     > taskkill /F /IM telecom.exe
  4732.  
  4733. * You recently purchased a new sound card and installed it in a free PCI slot in your computer. You plug in your old speakers, but you don't get any sound. You have checked all cable connections, and they are secure. You have also ensured that the speaker volume is appropriately adjusted and isn't muted.
  4734.  
  4735.     Which of the following BEST describes the next step you should perform?
  4736.     > Check the vendor's website for an updated driver
  4737.  
  4738. * You have a folder on your Windows computer that you would like to share with members of your development team. Users should be able to view and edit any file in the shared folder. You share the folder and give Everyone Full Control permission to the shared folder. Users connect to the shared folder and report that they can open the files, but they cannot modify any of the files.
  4739.  
  4740.     Which of the following would be the BEST action to take next?
  4741.     > Modify the NTFS permissions on the folder
  4742.  
  4743. * Employees in a small business have a habit of transferring files between computers using a USB flash drive and often bring in files from outside the company. Recently, a computer was infected with malware from a USB flash drive even though the employee did not access any files.
  4744.  
  4745.     Which of the following options would prevent this issue in the future?
  4746.     > Disable autorun
  4747.  
  4748. * What is the surest way to prevent the loss of important information on your mobile device if it is lost, stolen, destroyed, or there is a natural disaster?
  4749.     > Configure your device to back up important data to your personal computer
  4750.  
  4751. * Which tool can you use to display hardware utilization statistics that tell you about the operation of your computer?
  4752.     > Resource Monitor
  4753.  
  4754. * You have implemented a regular backup schedule for a Windows system, backing up data files every night and creating a system image backup once a week. For security reasons, your company has decided to not store a redundant copy of the backup media at an offsite location.
  4755.  
  4756.     Where would be the next best place to keep your backup media?
  4757.     > In a locked fireproof safe.
  4758.  
  4759. * A technician is assisting a user with rebooting a frozen laptop that does not respond to keystrokes or mouse clicks. Which of the following is the SIMPLEST way to power down the laptop?
  4760.     > Hold down the power button for several seconds
  4761.  
  4762. * To protect user data on a Windows 7 system, you've configured System Restore to automatically create restore points for the C:\ volume.
  4763.  
  4764.     Given that your user profile data is stored in the default directory (C:\Users), will this strategy adequately protect your users' data?
  4765.     > No, you need to create a backup of your user data as well
  4766.  
  4767. * While using a Windows 8.1 system, you accidentally downloaded and installed a malware package from a phishing email exploit. You were able to reboot the system into Safe Mode and use System Restore to revert the system to point in time before the malware infection occurred.
  4768.  
  4769.     Given this information, which of the following are true?
  4770.     > Your user files were not affected when the system was reverted to the restore point.
  4771.     > You must reinstall any applications that were installed after the restore point was taken.
  4772.  
  4773. * System Restore is currently disabled for all volumes on a Windows 10 system. You need to enable System Protection for the C: volume.
  4774.     > Click on Configure
  4775.  
  4776. * System Restore has been enabled for all volumes on a Windows 7 system. Recently, a new network driver was installed on the system. However, the driver code contained bugs and now your network board no longer functions. You are unable to access the Internet to download an older version of the driver. You need to revert the system to a prior restore point that was taken before the driver was installed.
  4777.     > Click on System Restore
  4778.  
  4779. * A file you have been working on for several days was corrupted when you shut your Windows 7 system down uncleanly. You want to restore a previous version of the file, overwriting the existing file that has been corrupted.
  4780.     > Click on Restore
  4781.  
  4782. * To protect user data on a Windows 8.1 system, you've configured System Restore to automatically protect your system using restore points.
  4783.  
  4784.     Will this adequately protect the user data on the system?
  4785.     > No, you need to enable File History
  4786.  
  4787. * To protect user data on a Windows 10 system, you've configured System Restore to automatically create restore points for the C: volume.
  4788.  
  4789.     Given that your user profile data is stored in the default directory (C:\Users), will this strategy adequately protect your users' data? (Select TWO)
  4790.     > No. You need to enable File History
  4791.     > No. You need to create a backup of your user data as well
  4792.  
  4793. * You want to perform a Windows update on your Windows 10 computer. Before doing so, you want to make sure you can easily go back to the state it was in prior to the update.
  4794.  
  4795.     Which of the following Control Panel utilities is BEST to enable and use prior to the update?
  4796.     > System protection
  4797.    
  4798. * On a Windows System, which task manager tab would you use to adjust the priority given to a specific program?
  4799.     > Details
  4800.  
  4801. * You manage a Windows system. You want to view information about your computer, including the CPU utilization and information about disk I/O operations.
  4802.  
  4803.     Which tools could you use to do this? (Select TWO)
  4804.     > Task Manager
  4805.     > Performance Monitor
  4806.  
  4807. * You manage a Windows system. You want to view information about all of your programs running on your system and sort each program by the amount of memory and CPU that the program uses.
  4808.  
  4809.     Which tool should you use?
  4810.     > Task Manager
  4811.  
  4812. * Which tool can you use to display hardware utilization statistics that tell you about the operation of your computer?
  4813.     > Resource Monitor
  4814.  
  4815. * You are an IT technician for your company. Jodie, a receptionist, thinks her Windows 10 machine is running slowly today and calls you to see if you can speed it up. None of the other employees have called regarding any related issues, so you suspect it is an issue with Jodie's computer, perhaps a malfunctioning application. To help troubleshoot Jodie's computer, you run task manager.
  4816.  
  4817.     Which of the following tabs would be the most helpful for getting an overall view of how Jodie's computer is running? (Select TWO)
  4818.     > Performance
  4819.     > Processes
  4820.  
  4821. * Bryce's computer is acting unusually sluggish today. He calls you, an IT technician, to see if you can find out what is going on and to improve his computer's performance. You run task manager on Bryce's computer and find that a suspicious application has nearly 90% CPU utilization.
  4822.  
  4823.     Which of the following can be used from Task manger to stop the application from running?
  4824.     > Right-click > End Task
  4825.  
  4826. * You are working on your computer when a person from the shipping department delivers a new external solid state drive (SSD) you ordered. When you plug the drive into your USB port, Windows cannot find a suitable device driver for the drive.
  4827.  
  4828.     To best resolve the issue, from which of the following windows consoles would you access device manager?
  4829.     > Control Panel
  4830.  
  4831. * Which of the following paths opens the computer management tool in windows 10? (Select TWO)
  4832.     > Right-click the windows icon and select computer management
  4833.     > In the control panel, open system and security > administrative tools and then double-click the computer management icon
  4834.  
  4835. * What is the purpose of the Microsoft management console (MMC)? (Select TWO)
  4836.     > Provide a common user interface for performing system administration tasks
  4837.     > Provide a shell for running snap-ins
  4838.  
  4839. * You work in the IT department. To perform your daily tasks, you often use many of the windows consoles, such as the device manager, hyper-v manager, and the performance monitor. Although each of these can be accessed from various locations in windows, you want one location from which these common tools can be accessed.
  4840.  
  4841.     Which of the following system utilities would best provide this capability?
  4842.     > MMC
  4843.  
  4844. * Which tool can you use to view (but not modify) hardware and configuration information for your computer?
  4845.     > Msinfo32
  4846.  
  4847. * Which utility allows you to choose selective startup in windows?
  4848.     > Msconfig (System Configuration)
  4849.  
  4850. * Which tool lets you view and directly edit the registry?
  4851.     > Regedit
  4852.  
  4853. * What is the purpose of the dxdiag tool?
  4854.     > View information related to DirectX operation
  4855.  
  4856. * What is the purpose of the services snap-in?
  4857.     > View and manage software programs running in the background
  4858.  
  4859. * While using a new windows system, you find that the mouse pointer tracks much more slowly on the screen than you would prefer. You want to increase the mouse pointer speed.
  4860.  
  4861.     Click the tab you would use in the Mouse Properties window to do this.
  4862.     > Pointer Options
  4863.  
  4864. * While using a new Windows system, you find that the double-click speed setting on the mouse pointer is set much slower than you would prefer. You want to increase the double-click speed setting.
  4865.  
  4866.     Click the tab you would use in the Mouse Properties window to do this.
  4867.     > Buttons
  4868.  
  4869. * Which category can you use in control panel to control how times, dates, numbers, and currency are formatted and displayed for your computer?
  4870.     > Clock and Region
  4871.  
  4872. * You use your computer to type documents in Portuguese that will be sent to Brazil. You purchase a second keyboard designed specifically for Portuguese.
  4873.  
  4874.     Which tool would you use to configure your computer for the new keyboard so you can switch between the Portuguese and English keyboards?
  4875.     > Time and Language
  4876.  
  4877. * You have a windows system shared by three shift workers. Files that are used by all users are stored on the D:\ drive in various folders. The users have created hundreds of files on this drive and sometimes experience difficulty finding the files they need.
  4878.  
  4879.     What should you do?
  4880.     > Configure indexing to include the D:\ drive
  4881.  
  4882. * You need to use Task Manager to analyze memory utilization on a Windows system. For example, you need to see how much system RAM is currently in use and how much is available.
  4883.  
  4884.     Click on the tab in Task Manager that you would use to do this.
  4885.     > Performance
  4886.  
  4887. * You recently installed several applications on a Windows system. After doing so, you notice that the system takes much longer to boot up. You suspect that the new applications include one or more helper applications that are automatically loaded when the system boots. To increase performance, you want to identify any such helper applications and disable them.
  4888.  
  4889.     Click on the tab in Task Manager that you would use to do this.
  4890.     > Startup
  4891.  
  4892. * Drag each definition on the left to its corresponding performance counter on the right. Each definition may be used once, more than once, or not at all.
  4893.     > Disk queue length
  4894.         > The number of read and write requests that are waiting to be processed
  4895.     > Processor utilization
  4896.         > The amount of time the processor spends performing non-idle tasks.
  4897.     > Commit Charge
  4898.         > The amount of memory that has been assigned to running processes
  4899.     > Disk time
  4900.         > The amount of time that the disk subsystem is busy reading from and writing to disk
  4901.     > Page file usage
  4902.         > (Leave Blank)
  4903.     > Memory pages per second
  4904.         > The number of hard faults that occur each second
  4905.  
  4906. * Which tool can you use to gather and display statistics that help you monitor the operation of a windows system?
  4907.     > Performance Monitor
  4908.  
  4909. * Your computer has a quad-core processor that supports multithreading installed. Given that the system is running windows, how can you verify whether multithreading has been enabled?
  4910.     > Task Manager can display CPU utilization graphs for eight processors
  4911.  
  4912. * Your computer seems to be running slowly. In particular, you notice that the hard drive activity light stays lit constantly when running multiple applications and switching between open windows, even though you aren't saving large files.
  4913.  
  4914.     What could you do to troubleshoot the problem? (Select TWO)
  4915.     > Use task manager to monitor memory utilization
  4916.     > Use resource monitor to monitor memory utilization
  4917.  
  4918. * Your job functions have recently changed. As a result, you find that you are needing to work with more running programs on your windows 10 computer at a time. Although yo haven't seen these in the past, you are now starting to receive error messages warning you of low virtual memory. However, no additional RAM can be added to your computer.
  4919.  
  4920.     Which of the following control panel utilities would best allow you to eliminate or reduce the number of error messages?
  4921.     > System
  4922.  
  4923. * Jodie's computer is acting unusually sluggish today. She calls you, an IT technician, to see if you can find out what is going on and to improve her computer's performance. You run task manager on Jodie's computer and find that a suspicious application has nearly 90% CPU utilization.
  4924.  
  4925.     Which of the following actions can you take from task manager to stop the application from running?
  4926.     > Right-click > end task
  4927.  
  4928. * You are an IT technician for your company. Rachel, a receptionist, thinks her Windows 10 machine is running slowly today and calls you to see if you can speed it up. None of the other employees have called regarding any related issues, so you suspect it is an issue with Rachel's computer, perhaps a malfunctioning application. To help troubleshoot Rachel's computer, you run task manager.
  4929.  
  4930.     Which of the following tabs would be the most helpful for getting an overall view of how Rachel's computer is running? (Select TWO)
  4931.     > Processes
  4932.     > Performance
  4933.  
  4934. * Match each active directory term on the left with its corresponding definition on the right.
  4935.     > Logical organization of resources
  4936.         > Organizational unit
  4937.     > Collection of network resources
  4938.         > Domain
  4939.     > Collection of related domain trees
  4940.         > Forest
  4941.     > Network resource in the directory
  4942.         > Object
  4943.     > Group of related domains
  4944.         > Tree
  4945.  
  4946. * Match each active directory definition on the left with its corresponding term on the right. (Some definitions do not have an associated term on the right.)
  4947.     > Domain controller
  4948.         > A server that holds a copy of the active directory database that can be written to
  4949.     > Sire
  4950.         > Represents a group of networks that are connected with high-speed links
  4951.     > Subnet
  4952.         > Represents a physical network segment
  4953.     > Forest root domain
  4954.         > The first domain created in an active directory forest
  4955.     > Tree root domain
  4956.         > The highest-level domain in a tree
  4957.  
  4958. * What is the name of the service included with the windows server operating system that manages a centralized database containing user account and security information?
  4959.     > Active directory
  4960.  
  4961. * A new computer has been added to the sales department and needs to be joined to the corpnet domain. Which of the following system properties settings must be used to make the change?
  4962.     > System Properties > Computer Name
  4963.  
  4964. * You are the owner of a small startup company consisting of only five employees. Each employee has their own computer. Due to the type of services your company offers, you don't foresee the employee count increasing much in the next year or two. As a startup company, you want to keep costs low and facilitate easier file sharing, internet access, printers, and other local network resources.
  4965.  
  4966.     Which of the following would be the best implementation for your business?
  4967.     > A workgroup
  4968.  
  4969. * The hide programs option setting is configured for a specific user as follows:
  4970.     Local Group Policy: Enabled
  4971.     Default domain policy GPO: Not configured
  4972.     GPO linked to the user's organizational unit: Disabled
  4973.    
  4974.     After logging in, the user is able to see the programs option. Why does this happen?
  4975.     > The GPO linked to the user's organizational unit is applied last, so this setting takes precedence.
  4976.  
  4977. * You manage a large number of workstations that belong to a windows domain. You want to prevent anyone that might try to gain access to a computer from guessing login information by trying multiple passwords. Which default GPO contains a policy you can enable to guard all computers in the domain against this security breach?
  4978.     > Default domain policy
  4979.  
  4980. * A user has complained about not being able to remove a program that is no longer needed on a computer. The programs option is not available in control panel. You suspect that a policy is enabled that hides this option from the user. But after opening the local group policy editor, you see that the policy to hide programs is not configured. You know that other users in this domain can access the programs option.
  4981.  
  4982.     To determine whether the policy is enabled, where should you look next?
  4983.     > GPOs linked to organizational units that contain this user's object
  4984.  
  4985. * You are managing a workstation that is not part of a windows domain. Users on this computer should not be permitted to download applications from the windows store.
  4986.  
  4987.     Which administration tool can you use to enable a policy that turns off the store application for all users on this computer?
  4988.     > Local Group Policy Editor
  4989.  
  4990. * You manage a group of 20 windows workstations that are currently configured as a workgroup. You have been thinking about switching to an active directory configuration.
  4991.  
  4992.     Which advantages would you gain by switching to active directory? (Select TWO)
  4993.     > Centralized configuration control
  4994.     > Centralized authentication
  4995.  
  4996. * Drag the group policy setting on the left to the appropriate description of how the setting is enforced on the right.
  4997.     > Causes the policy to be enforced
  4998.         > Enabled
  4999.     > Does not change the current setting for the policy
  5000.         > Not configured
  5001.     > Prevents the policy from being enforced
  5002.         > Disabled
  5003.  
  5004. * You are an IT administrator troubleshooting a windows-based computer. After a while, you determine that you need to refresh the group policy on that computer. Rather than rebooting the computer, you open a command prompt from which the refresh can manually be completed.
  5005.  
  5006.     Which of the following is the best command line tool to run to accomplish this task?
  5007.     >gpupdate
  5008.  
  5009. * On a windows system, which of the following is true of groups?
  5010.     > Group members have the access rights assigned to the group
  5011.  
  5012. * A user calls to report a problem. She is trying to install an application on her new windows 10 system, but cannot. Her user account is a member of the users group on the system.
  5013.  
  5014.     What do you suspect is causing the installation issue?
  5015.     > Her group membership does not allow her to install new software
  5016.  
  5017. * You need to create a user account on a Windows system that can create files, run applications, and install printers when the driver for the printer already exists on the computer. You want the user to have only minimum rights necessary on the computer.
  5018.  
  5019.     Which group should this user be a member of?
  5020.     > Users
  5021.  
  5022. * You want to create a new user account on a Windows system that can create and edit private files, start and stop the system, install applications, and add new device drivers.
  5023.  
  5024.     Which group should this user be a member of?
  5025.     > Administrators
  5026.  
  5027. * A small business hires an after-hours cleaning service that is known to have a high turnover of employees. They want to prevent unauthorized access to their computers, but do not want to send money on new hardware.
  5028.  
  5029.     Which of the following is the best solution?
  5030.     > Set login time restrictions
  5031.  
  5032. * A home office user employs a technician to secure a windows computer. To secure the local accounts, which of the following actions should the technician perform? (Select TWO)
  5033.     > Rename the administrator account
  5034.     > Disable the guest account
  5035.  
  5036. * You recently installed a windows 10 system. During the installation process, you elected to sign into the system using a local user account. After using the system for a time, you decide to begin using an online Microsoft account to authenticate to the system instead.
  5037.     > Accounts
  5038.  
  5039. * Which windows component prompts the user for credentials or permission to protect against unauthorized activities, such as an unintended software installation
  5040.     > User Account Control (UAC)
  5041.  
  5042. * You want to configure User access control so that you see the permission prompt only when programs try to make changes to your computer (Not when you make changes). You do not want the desktop to be dimmed when the prompt is shown.
  5043.  
  5044.     What should you do?
  5045.     > Disable secure desktop
  5046.  
  5047. * You want to configure user account control so that when a UAC prompt is shown, the desktop is not dimmed, allowing you to continue working without responding to the prompt immediately.
  5048.  
  5049.     What should you do?
  5050.     > Edit settings in the local security policy
  5051.  
  5052. * You have a laptop running windows 10. User account control (UAC) has been disabled. How would you re-enable UAC on the laptop? (Select TWO) (Each choice is complete solution)
  5053.     > In the control Panel, select system and security and then security and maintenance
  5054.     > In the control panel, select user accounts and then user accounts
  5055.  
  5056. * Which port does telnet use?
  5057.     > 23
  5058.  
  5059. * Which of the following network services or protocols uses TCP/IP port 22?
  5060.     > SSH
  5061.  
  5062. * Which of the following can be used to create a secure connection to a remote server?
  5063.     > SSH
  5064.  
  5065. * You provide desktop support for small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems installing a new device. You try to tell the user how to update the driver for the device over the phone, but he is having a hard time understanding your directions and is becoming frustrated.
  5066.  
  5067.     What should you do?
  5068.     > Establish a remote desktop connection and update the driver
  5069.  
  5070. * You need to enable remote desktop on a user's windows 10 system so that you can manage it over the network from your office. Click the control panel option you use to accomplish this task.
  5071.     > System and Security
  5072.  
  5073. * A user works primarily in your organization's production area. However, she frequently needs to access data stored on her Windows 10 desktop system in her office while on the production floor. She would like to be able to use a system in the production are to remotely access her desktop system using a network connection.
  5074.  
  5075.     Which groups on her desktop system could you make her user account a member of to enable this configuration? (Select TWO)
  5076.     > Administrators
  5077.     > Remote desktop users
  5078.  
  5079. * Which port must be opened in a firewall of a Windows system in order Remote Desktop connections to be established with it?
  5080.     > 3389
  5081.  
  5082. * You provide desktop support for small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems with an application. He tries to describe what he is doing in the application, but you just can't understand what he is doing that might be causing the problem.
  5083.  
  5084.     What should you do?
  5085.     > Establish a remote assistance connection and watch what the user is doing
  5086.  
  5087. * Which of the following remote access mechanisms on a windows system lets you watch what a user is doing and, if necessary, take control of the user's desktop to perform configuration tasks?
  5088.     > Remote assistance
  5089.  
  5090. * Occasionally, Rachel works from another Mac in her office, rather than her own, and needs to be able to access her Mac while she is away from her desk.
  5091.  
  5092.     Which option can Rachel use to access her Mac?
  5093.     > Screen sharing
  5094.  
  5095. * Which Windows tool lets you perform automatic backups at regular times (such as on specific days at specific times)?
  5096.     > Task scheduler
  5097.  
  5098. * You have an application that you would like to run on your windows workstation every monday at 3:00 p.m. Which tool would you use to configure the application to run automatically?
  5099.     > Task scheduler
  5100.  
  5101. * Don is an accountant in the Finance department, and for the last several months has been testing an online accounting program. After speaking with his manager, Don received permission to download a steamlined version of the software which requires a local installation. After downloading, Don tried to install the application, but the OS will not allow it. Out of frustration, he called the Help Desk. The Help Desk personnel came to Don's machine and installed the application without issue.
  5102.  
  5103.     Which of the following is the most likely reason Don could not install the application?
  5104.     > Insufficient permissions
  5105.  
  5106. * You manage windows desktops for your organization. You recently updated all of your workstations to windows 10. Your organization relies on a particular application, which worked correctly on windows 7, but now does not run in windows 10. You have checked the application vendor's website, but they do not provide a windows 10 update.
  5107.  
  5108.     What are your options for running the application? (Select TWO)
  5109.     > Run the application in compatibility mode
  5110.     > Create a virtual computer that runes windows 7. Run the virtual computer each time the application runs.
  5111.  
  5112. * Which command would you use to display a simple list of all processes running on a Linux distribution that uses either RPM of dpkg for package management?
  5113.     > ps -e
  5114.  
  5115. * When assisting users, a technician often uses the Mac OS force quit functions and the linux kill command. Which of the following situations would require their use?
  5116.     > A runaway application does not respond to user input
  5117.  
  5118. * Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a paper license and a single key for updating 10 users. Since this is an enterprise paper license, there is no mechanism that enforces a limit to the number of times the key can be used, so you decide to go ahead and update all 20 users.
  5119.  
  5120.     What are the possible consequences of this decision? (Select TWO)
  5121.     > You risk losing your job
  5122.     > You expose your company to litigation by violating the software license agreement
  5123.  
  5124. * Which of the following is true of the way many large digital media vendors are using digital rights management technology? (Select TWO)
  5125.     > They are moving away from DRM because of several key shortcomings in the technology
  5126.     > They are adopting alternatives to DRM such as encouraging customers to not illegally share digital files
  5127.  
  5128. * Which of the following is true of online software activation? (Select THREE)
  5129.     > With personal software licenses, the limit is usually one to three online activation
  5130.     > Before running a newly installed application, the user must activate their license online on the software vendor's website.
  5131.     > Persistent activation may require the license to be continuously re-activated online at a preconfigured interval
  5132.  
  5133. * One software license model allows software to be freely distributed, downloaded, and installed without paying a license fee, but often requires a fee for support, training, or added functionality.
  5134.  
  5135.     What is the name of this model?
  5136.     > Open source
  5137.  
  5138. * What is the technology that protects the intellectual property rights of publishers and restricts the use of copyrighted works to those who have paid the necessary licensing fees?
  5139.     > DRM
  5140.  
  5141. * Which of the following actions directly improves system security on a windows workstation?
  5142.     > Install the lastest updates
  5143.  
  5144. * Users have been experiencing periodic system lockups that generate the same error message. After checking Microsoft's Web site, you find that a hotfix is available to address the issue.
  5145.  
  5146.     What should you do next?
  5147.     > Deploy the hotfix on a test computer
  5148.  
  5149. * Which of the following terms describes a windows operating system patch that corrects a specific problem and is released on a short-term, periodic basis?
  5150.     > Hotfix
  5151.  
  5152. * You want to make sure that you always have the latest patches installed for an order entry application created by DataComLink corporation.
  5153.  
  5154.     What should you do? (Select TWO)
  5155.     > Configure the application to automatically download and install updates as they are released
  5156.     > Check the datacomlink website regularly for patches and updates to the software
  5157.  
  5158. * You would like to run an application on your windows workstation every Monday at 3:00 p.m. Which tool would you use to configure the application to run automatically?
  5159.     > Task Scheduler
  5160.  
  5161. * Recently, a Windows 10 update was automatically download and installed on your Windows 10 system. After you install the update, your contact manager database application no longer works correctly. You want to uninstall the latest updates to see if the application starts working again.
  5162.  
  5163.     Click the option you would use in the settings app to do this.
  5164.     > View your update history
  5165.  
  5166. * You want to configure your windows 10 workstation so that it can get windows updates direclty from other windows 10 systems on the network that have already downloaded them from Microsoft.
  5167.  
  5168.     Click the settings app option you would use to do this.
  5169.     > Choose how updates are delivered
  5170.  
  5171. * You work for a large company as the IT administrator. With the many external attacks being perpetrated in the form of security breaches being found it applications, you are concerned that your windows 10 computers may be vulnerable. You also want to ensure that windows is using the latest features.
  5172.  
  5173.     Which of the following would best protect your computers?
  5174.     > Windows updates
  5175.  
  5176. * You work as the IT administrator for a small startup company. Lily's computer has two internal hard drives and runs Windows 10. She is concerned that she may accidentally delete a file or that her primary hard disk may fail at some future time. She has come to you for suggestions about how to protect her files. Due to the size and revenue of this startup company, resources are somewhat limited.
  5177.  
  5178.     Which of the following would best protect Lily's files?
  5179.     > Back up her files using file history
  5180.  
  5181. * You need to protect the user data on a windows 10 system. Which tools could you use to do this?
  5182.     > File history
  5183.     > Windows 7 (Backup and Restore)
  5184.  
  5185. * Why should backup media be stored offsite?
  5186.     > To prevent the same disaster from affecting both the system and its associated backup media
  5187.  
  5188. * You need to back up user data on a windows 10 system. The computer has a single SSD storage device installed that contains both the windows operating system (in c:\windows) and user profile data (in C:\users). You plan to do the following:
  5189.     - Use backup and restore to backup user data
  5190.     - Run the backup automatically every night at 11:00 PM
  5191.     - Store the backups in the C:\backups folder
  5192.     - Include a system image in each backup
  5193.    
  5194.     Will this configuration work?
  5195.     > No. Backups created with backup and restore can't be stored on the drive that contains the information being backed up.
  5196.  
  5197. * You need to configure file history to automatically delete any stored snapshots that are older than one month.
  5198.  
  5199.     Click the control panel option you would use to do this.
  5200.     > Advanced Settings
  5201.  
  5202. * You have configured your windows systems to automatically back up user data every night at midnight. You also take a system image backup once per month.
  5203.  
  5204.     What else should you do to ensure that you are protected from data loss? (Select TWO)
  5205.     > Regularly test restoration procedures
  5206.     > Store a copy of all backups off-site
  5207.  
  5208. * An administrator configures the time machine application on Mac OS computer and develops scripts that use the tar command on Linux computers.
  5209.  
  5210.     Which of the following best practices is the administrator following?
  5211.     > Scheduled backups
  5212.  
  5213. * To protect a windows 10 system, you've configured system restore to automatically protect your system using restore points. Will this adequately protect the user data on the system?
  5214.     > No. You need to enable file history
  5215.  
  5216. * While using a windows 10 system, you accidentally downloaded and installed a malware package from a phishing email exploit. You were able to reboot the system into safe mode and use system restore to revert the system to a point in time before the malware infection occurred.
  5217.  
  5218.     Given this information, which of the following are true?
  5219.     > You must reinstall any applications that were installed after the restore point was taken
  5220.     > Your user files were not affected when the system was reverted to the restore point
  5221.  
  5222. * System restore is currently disabled for all volumes on a windows 10 system. You need to enable system protection for the C: volume.
  5223.  
  5224.     Click the option you would select to do this.
  5225.     > Configure
  5226.  
  5227. * System restore point has been enabled for all volumes on a windows system. Recently, a new network driver was installed on the system. However, the driver code contained bugs and now your network board no longer functions. You are unable to access the internet to download an older version of the driver. You need to revert the system to a prior restore point that was taken before the driver was installed.
  5228.  
  5229.     Click the option you would use to do this.
  5230.     > System Restore
  5231.  
  5232. * To protect user data on a windows 10 system, you've configured system restore to automatically create restore points for the C: volume. Given that your user profile data is stored in the default directory (C:\Users), will this strategy adequately protect your users' data? (Select TWO).
  5233.     > No. You need to create a backup of your user data as well
  5234.     > No. You need to enable file history
  5235.  
  5236. * You want to perform a windows update on your windows 10 computer. Before doing so, you want to make sure you can easily go back to the state it was in prior to the update.
  5237.  
  5238.     Which of the following control panel utilities is best to enable and use prior to the update?
  5239.     > System Protection
  5240.  
  5241. * You have just installed the latest windows updates on your windows 10 computer. After the computer has rebooted, you get the following error message: Error: Windows failed to start. A recent hardware or software change might have caused the issue after you installed windows updates. Since your computer wont start, you have booted your computer into the advanced options section of the windows 10 recovery environment (see image). While troubleshooting this issue, which of the advanced options would be the best to try first?
  5242.     > Startup repair
  5243.  
  5244. * Micka, a tech-savy employee, tried to upgrade her computer from Windows 7 to windows 10 from the internet. Something went wrong during the upgrade, and Micka's computer will no longer boot to windows. She has brought her computer to the IT department for you to repair. You have tried to repair the computer, but you are unable to boot to windows.
  5245.  
  5246.     Which of the following methods would be the quicest way to get Micka's computer back to its original windows 7 operating system?
  5247.     > Restore her system using the recovery partition
  5248.  
  5249. * You are an IT technician for your company. Fred calls you complaining that every time he opens his internet browser. the default home page has been changed to a site he is not familiar with. You suspect this change is being caused by a malware infection on his system. However, after you run antimalware and antivirus software on Fred's system, it is still having the same issue.
  5250.  
  5251.     Which of the following would be the best way to remove the malware?
  5252.     > Restore Fred's computer back to a previous restore point
  5253.  
  5254. * Which tool would you use to configure the paging file location and size on a windows system?
  5255.     > Advanced system settings in control panel
  5256.  
  5257. * Which of the following is another name for the paging file?
  5258.     > Virtual memory
  5259.  
  5260. * What is the recommended size of the paging file under normal circumstances on a windows 10 system with 8 GB of RAM installed?
  5261.     > Equal to the amount of physical ram
  5262.  
  5263. * Which aspects of virtual memory can you configure on a windows workstation? (Select TWO)
  5264.     > Location of the paging file
  5265.     > Maximum size of the paging file
  5266.  
  5267. * Consider the virtual memory configuration for the Windows 10 system shown in the exhibit. Given that this Windows 10 system has 16 GB of system RAM and three hard disks installed, which configuration change could you make to the paging file to increase system performance?
  5268.     > Add paging files to the E: and F: volumes
  5269.  
  5270. * You have been having trouble with your laptop crashing. You would like your computer to create a memory dumb file when it crashes.
  5271.  
  5272.     Where should you place the paging file?
  5273.     > On the system volume
  5274.  
  5275. * You're troubleshooting a computer that runs windows 10. The operating system has halted, and a blue screen isdisplayed on the monitor with an error message.
  5276.  
  5277.     What is the first step you should take to troubleshoot the issue?
  5278.     > Search for the error in Microsoft's knowledge base
  5279.  
  5280. * Wendy has been searching the internet for a great deal on jewelry. While looking at one site, a pop-up was displayed that told her she had just been chosen as the winner of a nice prize. Being excited to win, Wendy clicked on the link provided to claim her prize. The next day, when Wendy tried to turn on her computer, her computer displayed the blue screen of death (BSOD). After interviewing Wendy, you suspect that the pop-up she clicked on installed some malicious software that has caused her computer to lock up.
  5281.  
  5282.     Which of the following is the best place to begin repairing Wendy's computer?
  5283.     > Boot the computer from the windows installation disk and run startup repair
  5284.  
  5285. * Nathan, a long tmie Mac user, has been using his Mac computer for some time now with no issues. Recently, however, he reported that his mac will unexpectedly tell him that his computer must be restated by holding down the power button for several seconds or by pressing the restart button.
  5286.  
  5287.     Assuming that this is a symptom of kernel panic, which of the following steps would be the best first step for troubleshooting this issue?
  5288.     > Do a safe boot
  5289.  
  5290. * As you are working on your windows 10 computer during a fierce thunderstorm, lightning strikes the nearby transformer, and your office loses all power. Since your laptops battery is dead, your computer instantly turns off. Once power to the building has been restored, you turn your computer on and notice that you are now getting a missing DLL error message.
  5291.  
  5292.     Which of the following tools is most likely to rectify this issue?
  5293.     > sfc
  5294.  
  5295. * You need to boot a windows 10 system into safe mode. Which steps will accomplish this task? (Select TWO) (Each choice is a complete solution)
  5296.     > In safe mode, select start > settings > update & security > recovery > advanced startup > restart now
  5297.     > Press F8 at startup
  5298.  
  5299. * You have a computer that runs windows 7, and you want to install windows 10. You are not concerned about keeping any of the existing data currently on the drive, and you want to do a clean install. After placing the windows 10 installation DVD in the optical drive, you restart the computer, but it does not boot to the DVD, and you are unable to install windows. Which of the following are the best methods for installing windows from the DVD? (Select TWO) (Each choice is a complete solution)
  5300.     > From the UEFI or BIOS firmware, change the boot order
  5301.     > While the computer is rebooting, press the boot menu function key
  5302.  
  5303. * You have booted your Windows workstation into Safe Mode and enabled Boot logging. To which log file is the boot logging information now being written?
  5304.     > Ntbtlog.txt
  5305.  
  5306. * Rodney, a user in the research department, reports that he is experiencing blue screen errors while using his windows computer. You ask Rodney if anything has changed on the computer recently. Rodney explains that he recently installed a TV turner board in an expansion slot. Now he has to reboot the computer every time he loads the TV tuner application to watch TV> You need to fix Rodney's computer and prevent Rodney from using the T until you can install an update driver.
  5307.  
  5308.     What should you do?
  5309.     > Boot the system into safe mode. Disable the TV tuner driver in device manager.
  5310.  
  5311. * How can you keep a windows 10 system from automatically restarting after a critical system error occurs?
  5312.     > Use the Disable automatic restart after failure option on the advanced startup options menu
  5313.  
  5314. * You turn on your desktop computer. You can hear the fans start up, but the monitor remains blank. You wait a while, but it doesn't appear that anything else is happening . The hard drive activity light doesn't show activity, and you never hear the sound that plays when Windows loads up.
  5315.  
  5316.     Which of the following are the most likely cause of the problem? (Select THREE)
  5317.     > Video card
  5318.     > Processor
  5319.     > Memory
  5320.  
  5321. * You have a windows system with two sata hard drives, one used for the operating system and the other used for storing data. You have traced recent problems to a fault in the system motherboard. You replaced the motherboard and reconnected all the hardware. When you started the computer, the system showed the startup information screen, but then returned an error that an operating system could not be found.
  5322.  
  5323.     What should you do? (Select TWO) (Each option is part of the complete solution)
  5324.     > Change the boot order in the UEFI configuration
  5325.     > Verify the operating system sata drive is configured as the boot drive in the UEFI configuration
  5326.  
  5327. * You have just received a call from one of your customers. He informs you that after turning his computer on, he recieved the following error: Error loading operating system BOOTMGR is missing Press Ctrl+Alt+Del to restart. Every time he restarts his computer, the same error is shown.
  5328.  
  5329.     Which of the following tools is best for fixing this issue?
  5330.     > bootrec
  5331.  
  5332. * Marcus was attempting to tweak the way his Windows 10 workstation boots when he inadvertently corrupted his system boot files. It will now no longer boot to a logon prompt. He boots the system from the Windows installation disc and accesses the Recovery Environment.
  5333.  
  5334.     What should he do next?
  5335.     > Select troubleshoot > advanced options > startup repair
  5336.  
  5337. * You want to scan the integrity of all protected system files on your Windows 10 system, but not repair them.
  5338.  
  5339.     Which command should you use?
  5340.     > sfc /verifyonly
  5341.  
  5342. * One day while trying to start your Windows 10 computer, the system displays the following error: Windows could not start. Could not read from the selected boot disk. Check boot path and disk hardware.
  5343.  
  5344.     Which of the following will most likely fix the problem?
  5345.     > Boot into the recovery environment and run the bootrec /rebuildbcd command
  5346.  
  5347. * You are troubleshooting a windows 10 system that won't boot. The system appears to initialize just fine and post completes correctly. However, Windows doesn't load, and an error message is displayed on the screen, indicating the operating system couldn't be found. You determine that the master boot record (MBR) is corrupt. To fix the issue, you do the following:
  5348.     1. Boot the system from the windows 10 installation DVD.
  5349.     2. Access the recovery environment
  5350.     3. Open a command window.
  5351.    
  5352.     Enter the command you can run at command prompt to address this issue.
  5353.     > bootrec /fixmbr
  5354.  
  5355. * You are an IT technician for your company. One of your employees calls and tells you that every time they turn their computer on, they hear three beeps.
  5356.  
  5357.     Which of the following best describes an accurate replay to this employee?
  5358.     > Three repeated beeps may mean different things. First, we need to check the motherboard documentation.
  5359. [CHAPTER 13]
  5360.  
  5361. [VIEW IN RAW FORMAT THEN USE CTRL+F][VIEW IN RAW FORMAT THEN USE CTRL+F][VIEW IN RAW FORMAT THEN USE CTRL+F]
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top