CompTIA A+ 220-702 Practical Application Topic 2 Vol.B

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Tmede212
T
Tmede212
Community Contributor
Quizzes Created: 7 | Total Attempts: 999
Questions: 100 | Attempts: 103

SettingsSettingsSettings
CompTIA A+ 220-702 Practical Application Topic 2 Vol.B - Quiz


Questions and Answers
  • 1. 

    A user reports that their system is giving a message stating that their USB 2.0 devices are running at USB 1.1 speed without an external USB hub. The devices run at USB 2.0 when tested on the technicians PC. Which of the following will MOST likely provide USB 2.0 functionality?

    • A.

      Install an IEEE 1394 compliant expansion card.

    • B.

      Install an external USB 2.0 hub.

    • C.

      Install a USB 2.0 firmware update on the motherboard.

    • D.

      Replace USB 1.1 extension cables with USB 2.0 extension cables.

    Correct Answer
    C. Install a USB 2.0 firmware update on the motherboard.
    Explanation
    Installing a USB 2.0 firmware update on the motherboard is the most likely solution to provide USB 2.0 functionality. This update will ensure that the motherboard's USB ports are capable of supporting USB 2.0 speeds. The fact that the devices run at USB 2.0 on the technician's PC suggests that the issue lies with the user's system, specifically the motherboard's firmware. Installing the update will likely resolve the problem and allow the USB 2.0 devices to run at their intended speed.

    Rate this question:

  • 2. 

    Which of the following is the BEST tool to troubleshoot a DB-9 port?

    • A.

      Ohm meter

    • B.

      Anti-static wrist strap

    • C.

      Oscilloscope

    • D.

      Loopback plug

    Correct Answer
    D. Loopback plug
    Explanation
    A loopback plug is the best tool to troubleshoot a DB-9 port because it allows for testing the port's functionality without the need for an external device. When the loopback plug is connected to the DB-9 port, it creates a loopback circuit that simulates the presence of a connected device. This allows for checking if the port is transmitting and receiving data properly. An ohm meter is used to measure resistance and is not specifically designed for troubleshooting DB-9 ports. An anti-static wrist strap is used to prevent electrostatic discharge and is not relevant to troubleshooting a port. An oscilloscope is a tool used for measuring and analyzing electrical signals, but it is not specifically designed for troubleshooting DB-9 ports.

    Rate this question:

  • 3. 

    A customer reports that a networked printer is not printing documents. The technician successfully pings the printers IP address. Which of the following could be the problem? (Select TWO).

    • A.

      The network cable is unplugged.

    • B.

      The printer is low on toner.

    • C.

      The gateway address on the printer is incorrect.

    • D.

      The printer is out of paper.

    • E.

      The spooler is not functioning.

    Correct Answer(s)
    D. The printer is out of paper.
    E. The spooler is not functioning.
    Explanation
    The customer reporting that the printer is not printing documents suggests that there may be an issue with the physical components of the printer. The fact that the technician successfully pings the printer's IP address indicates that the network connection is functioning properly. Therefore, the problem is likely not related to the network cable being unplugged or the gateway address on the printer being incorrect. The fact that the printer is out of paper suggests that this could be a reason for it not printing. Additionally, if the spooler, which manages the print jobs, is not functioning, it could also prevent the printer from printing.

    Rate this question:

  • 4. 

    Which of the following does PING Ct do?

    • A.

      Continuous ping of an IP address until cancelled

    • B.

      Continuous ping of an IP address until the count reaches 1000

    • C.

      Continuous ping of an IP address until the target responds

    • D.

      Continuous ping of an IP address until the target returns

    Correct Answer
    A. Continuous ping of an IP address until cancelled
    Explanation
    The correct answer is "Continuous ping of an IP address until cancelled". This means that the PING Ct command will keep sending ICMP echo request packets to an IP address repeatedly until the user manually cancels the process. This can be useful for monitoring network connectivity and latency over an extended period of time.

    Rate this question:

  • 5. 

    Which of the following is contained in the first sector of the hard disk?

    • A.

      Operating system

    • B.

      Master file table

    • C.

      Boot sector

    • D.

      Master boot record

    Correct Answer
    D. Master boot record
    Explanation
    The first sector of the hard disk contains the Master Boot Record (MBR). The MBR is a small program that is responsible for the booting process of the computer. It contains information about the partitions on the hard disk, as well as the location of the operating system. When the computer starts up, the BIOS reads the MBR from the first sector of the hard disk and transfers control to the operating system. Therefore, the MBR is an essential component for the computer to start up properly.

    Rate this question:

  • 6. 

    A technician is tasked with setting up a Windows XP computer with a user account that will only be used to access the Internet. Which account type should the user have access to?

    • A.

      Guest

    • B.

      Administrator

    • C.

      Domain User

    • D.

      Power User

    Correct Answer
    A. Guest
    Explanation
    The user should have access to the Guest account. The Guest account is designed for temporary or occasional use and has limited privileges, making it ideal for situations where the user only needs to access the Internet. The Guest account does not have administrative rights, ensuring that the user cannot make any significant changes to the computer's settings or access sensitive information.

    Rate this question:

  • 7. 

    If a technician suspects that the voltage being delivered to a desktop computers power supply is insufficient or incorrect, which device should be used to determine the correct voltage?

    • A.

      A power supply tester

    • B.

      A multimeter

    • C.

      A loopback adapter

    • D.

      A cable tester

    Correct Answer
    B. A multimeter
    Explanation
    A multimeter is the most appropriate device to determine the correct voltage being delivered to a desktop computer's power supply. A multimeter is a versatile tool that can measure various electrical quantities, including voltage. By connecting the multimeter to the power supply, the technician can accurately measure the voltage and determine if it is sufficient or correct. This helps in diagnosing any potential issues with the power supply and ensures that the desktop computer is receiving the required voltage for proper functioning.

    Rate this question:

  • 8. 

    A virus has been removed from the users machine, but the user still cannot access the Internet. Which of the following should the technician check NEXT?

    • A.

      Disable port forwarding on the router.

    • B.

      Reboot to Safe Mode and see if the Internet is accessible.

    • C.

      Format the machine and reinstall the OS.

    • D.

      Check the web browsers proxy settings.

    Correct Answer
    D. Check the web browsers proxy settings.
    Explanation
    After removing the virus from the user's machine, the next step for the technician should be to check the web browser's proxy settings. Proxy settings can sometimes be altered by viruses or malware, causing issues with internet access. By checking and potentially adjusting the proxy settings, the technician can ensure that the user can access the internet properly. Disabling port forwarding on the router, rebooting to Safe Mode, or formatting and reinstalling the OS may not be necessary or effective in resolving the issue of internet access in this particular scenario.

    Rate this question:

  • 9. 

    After upgrading to Windows Vista, a client states that the run command no longer appears on the Start menu: Which of the following is the reason the user cannot see the run command?

    • A.

      The user must be an administrator to have access to the run command.

    • B.

      The Vista run command is not installed by default during an upgrade.

    • C.

      Vista has replaced the run command with the Power Shell.

    • D.

      The run command is not displayed by default on the start menu.

    Correct Answer
    D. The run command is not displayed by default on the start menu.
    Explanation
    The reason the user cannot see the run command after upgrading to Windows Vista is that the run command is not displayed by default on the start menu.

    Rate this question:

  • 10. 

    A user states that email is not being received. Which of the following protocols should the technician check for incoming mail?

    • A.

      SMTP

    • B.

      POP3

    • C.

      NNTP

    • D.

      HTTP

    Correct Answer
    B. POP3
    Explanation
    The technician should check the POP3 protocol for incoming mail. POP3 (Post Office Protocol version 3) is a standard protocol used for receiving emails from a remote server to a local email client. It allows the client to download and store the emails on their device. Therefore, if the user is not receiving emails, it is important to check the POP3 settings and ensure that the email client is properly configured to retrieve emails using the POP3 protocol.

    Rate this question:

  • 11. 

    On a laptop, which of the following is the name of the socket that a wireless card would typically be inserted into?

    • A.

      PCIe

    • B.

      AGP

    • C.

      Mini PCI

    • D.

      PCI

    Correct Answer
    C. Mini PCI
    Explanation
    A wireless card would typically be inserted into a Mini PCI socket on a laptop.

    Rate this question:

  • 12. 

    A technician has just installed a new hard drive into a Windows Vista desktop computer. The hard drive does not appear in Windows Explorer. Which of the following should the technician perform NEXT to have the drive recognized by the system?

    • A.

      Initialize and format the hard drive through Disk Management

    • B.

      Reboot the system

    • C.

      Assign a drive letter to the hard drive through Disk Management

    • D.

      Configure the drive in the systems CMOS program

    Correct Answer
    A. Initialize and format the hard drive through Disk Management
    Explanation
    The technician should initialize and format the hard drive through Disk Management in order to have the drive recognized by the system. This is because when a new hard drive is installed, it needs to be initialized and formatted before it can be used by the operating system. Initializing the drive prepares it for use by creating a partition table, and formatting the drive sets up the file system. Once this is done, the drive will be recognized by Windows Explorer and can be accessed by the user.

    Rate this question:

  • 13. 

    A workstation is not booting correctly. The technician wants to locate bad sectors and recover readable information. Which of the following commands would the technician use?

    • A.

      Chkdsk c: /f

    • B.

      Chkdsk c: /i

    • C.

      Chkdsk c: /c

    • D.

      Chkdsk c: /r

    Correct Answer
    D. Chkdsk c: /r
    Explanation
    The technician would use the "chkdsk c: /r" command to locate bad sectors and recover readable information. The "/r" parameter in the command stands for "repair" and it instructs the chkdsk (check disk) utility to locate bad sectors on the disk and attempt to recover any readable information from them. This command is commonly used to fix disk errors and recover data from damaged sectors on a hard drive.

    Rate this question:

  • 14. 

    A technician adds a video card to a single monitor system with an existing on-board video controller. After powering on the system, an error message appears on the monitor stating No Input Detected. Which of the following is the problem?

    • A.

      The add-on video card is conflicting with the onboard video controller.

    • B.

      The add-on video card is incompatible with the system.

    • C.

      The monitor is still connected to the onboard video controller.

    • D.

      The monitor cannot support the video resolution of the add-on video card.

    Correct Answer
    C. The monitor is still connected to the onboard video controller.
    Explanation
    The error message "No Input Detected" indicates that the monitor is not receiving any signal from the video source. In this case, the problem is that the monitor is still connected to the onboard video controller instead of the newly added video card. The monitor needs to be connected to the add-on video card in order to receive the video signal and display the output.

    Rate this question:

  • 15. 

    Which of the following is the MAXIMUM allowable cable length of CAT5?

    • A.

      100 meters (328 feet)

    • B.

      250 meters (820 feet)

    • C.

      500 meters (1640 feet)

    • D.

      1000 meters (3280 feet)

    Correct Answer
    A. 100 meters (328 feet)
    Explanation
    The maximum allowable cable length of CAT5 is 100 meters (328 feet). This is because CAT5 cables are designed to transmit data reliably up to this distance without significant loss or degradation of signal quality. Going beyond this distance can result in signal attenuation and data errors. Therefore, it is important to adhere to the maximum cable length to ensure optimal performance and reliable data transmission.

    Rate this question:

  • 16. 

    An internal IEEE 1394 expansion card should be installed on which port type?

    • A.

      AMR

    • B.

      AGP

    • C.

      ISA

    • D.

      PCI

    Correct Answer
    D. PCI
    Explanation
    An internal IEEE 1394 expansion card should be installed on the PCI port type. PCI (Peripheral Component Interconnect) is a standard expansion slot used in computers for connecting various hardware devices. IEEE 1394, also known as FireWire or i.LINK, is a high-speed serial bus interface that allows for fast data transfer between devices. Therefore, installing an IEEE 1394 expansion card on a PCI port would provide the necessary connection and compatibility for the device to function properly.

    Rate this question:

  • 17. 

    A technician is troubleshooting problems with a hard drive. After checking the drive in another computer and finding no issues, the technician takes voltage readings on the Molex connector from the power supply. Which of the following represents the readings the technician should find?

    • A.

      -5V and +12V

    • B.

      +3.3V and -5V

    • C.

      +3.3V and +12V

    • D.

      +5V and +12V

    Correct Answer
    D. +5V and +12V
    Explanation
    The technician should find voltage readings of +5V and +12V on the Molex connector from the power supply. This is because the Molex connector typically provides these two voltages to power various components, including hard drives. The +5V voltage is used to power the logic circuits, while the +12V voltage is used to power the motor and other mechanical components of the hard drive.

    Rate this question:

  • 18. 

    A user powers up their desktop PC, and instead of booting up normally, the user is taken into the BIOS setup. Which of the following is the MOST likely problem?

    • A.

      The MBR is corrupt

    • B.

      NTLDR cannot be found by the system

    • C.

      A faulty CMOS battery

    • D.

      The BIOS requires a firmware update

    Correct Answer
    C. A faulty CMOS battery
    Explanation
    A faulty CMOS battery is the most likely problem in this scenario. The CMOS battery is responsible for providing power to the BIOS chip, which stores the system's basic settings. If the CMOS battery is faulty or depleted, it may cause the BIOS to lose its settings and default to the setup screen when the computer is powered on. This can result in the computer not booting up normally and instead entering the BIOS setup.

    Rate this question:

  • 19. 

    A user reports that when typing on the laptop keyboard, the mouse pointer scrolls across the screen. Which of the following would MOST likely resolve this issue?

    • A.

      Reboot the laptop

    • B.

      Use an external monitor

    • C.

      Disable the touchpad

    • D.

      Plug in an external mouse

    Correct Answer
    C. Disable the touchpad
    Explanation
    Disabling the touchpad would most likely resolve the issue of the mouse pointer scrolling across the screen while typing on the laptop keyboard. This is because the touchpad may be overly sensitive and detecting unintended movements, causing the cursor to scroll. By disabling the touchpad, the user can prevent any accidental input from interfering with their typing.

    Rate this question:

  • 20. 

    A computer is responding slowly and the Task Manager shows that spool.exe is using 95% of system resources. Which of the following is MOST likely the cause of this problem?

    • A.

      Printing subsystem

    • B.

      Windows Update is running

    • C.

      A virus infection has occurred

    • D.

      Hyper threading has been disabled

    Correct Answer
    A. Printing subsystem
    Explanation
    The most likely cause of the computer responding slowly and spool.exe using 95% of system resources is the printing subsystem. Spool.exe is responsible for managing print jobs in Windows, and if there is an issue with the printing subsystem, it can cause high CPU usage and slow down the computer's performance.

    Rate this question:

  • 21. 

    Which of the following should MOST likely be replaced if the laptop will not display any video through the laptops screen or an external monitor?

    • A.

      LCD

    • B.

      Power inverter

    • C.

      Video drivers

    • D.

      Video card

    Correct Answer
    D. Video card
    Explanation
    If the laptop is not displaying any video through the laptop screen or an external monitor, the most likely component that needs to be replaced is the video card. The video card is responsible for generating and outputting video signals to the display. If the video card is faulty or not functioning properly, it can result in a lack of video output. Replacing the video card should resolve the issue and allow for video to be displayed on the laptop screen or external monitor.

    Rate this question:

  • 22. 

    A technician is replacing a motherboard in a users desktop PC. Which of the following tools should be used before replacing the new motherboard?

    • A.

      Power supply tester

    • B.

      BIOS update disk

    • C.

      Loopback plug

    • D.

      Wire tester

    Correct Answer
    A. Power supply tester
    Explanation
    Before replacing the new motherboard, a technician should use a power supply tester. This tool is used to check if the power supply unit is functioning properly. By testing the power supply, the technician can ensure that the motherboard will receive the correct amount of power and prevent any potential issues that may arise from a faulty power supply.

    Rate this question:

  • 23. 

    A computer just had a memory upgrade installed on the machine. Upon boot, the system does not recognize the new memory even though it is listed as being compatible on the manufacturers website. Which of the following is MOST likely needed to resolve the issue?

    • A.

      OS update

    • B.

      Adjust jumper settings

    • C.

      BIOS update

    • D.

      New CMOS battery

    Correct Answer
    C. BIOS update
    Explanation
    The most likely solution to the issue of the computer not recognizing the new memory after a memory upgrade is a BIOS update. The BIOS (Basic Input/Output System) is responsible for initializing hardware components during the boot process, and updating it can help the system recognize and properly utilize the new memory.

    Rate this question:

  • 24. 

    USER1 is part of the Users Group and is attempting to access files via UNC path \\SERVER\FILESHARE. \\ SERVER\FILESHARE has the following share permissions: AdministratorsFull ControlUsersRead OnlyGuestsNo AccessThe directory on the hard drive where the share is located has the following permissions: AdministratorsFull ControlUsersChangeGuestsNo AccessWhich of the following levels of access will login account USER1 have?

    • A.

      Read Only

    • B.

      Full Control

    • C.

      Change

    • D.

      No Access

    Correct Answer
    A. Read Only
    Explanation
    Based on the given information, USER1 is part of the Users Group and is attempting to access files via the UNC path. The share permissions for the FILESHARE on SERVER are set to "Read Only" for the Users group. Additionally, the directory on the hard drive where the share is located has permissions set to "Change" for the Users group. Therefore, when USER1 attempts to access the files, they will have the level of access that is more restrictive between the share permissions and the directory permissions. In this case, the more restrictive permission is "Read Only", so USER1 will have "Read Only" access to the files.

    Rate this question:

  • 25. 

    A user states that the computer is too slow when capturing video from an HD camera. Upon inspection the technician realizes that the computer is state-of-the-art in hardware, but it is using an external legacy USB 1.1 video capture card. The camera has USB 2.0 and IEE1394b outputs. Which of the following is the BEST recommendation to increase the video capture capabilities in this situation?

    • A.

      Recommend using lower resolution in the video signal.

    • B.

      Install an IEEE1394b video capture card.

    • C.

      Recommend replacing the camera with a USB 1.1 connection.

    • D.

      Install a USB 2.0 video capture card.

    Correct Answer
    B. Install an IEEE1394b video capture card.
    Explanation
    The computer is currently using an external legacy USB 1.1 video capture card, which is causing the slow video capture from the HD camera. The camera has USB 2.0 and IEE1394b outputs, so the best recommendation would be to install an IEEE1394b video capture card. This would allow the computer to capture video at a faster speed and take advantage of the camera's capabilities.

    Rate this question:

  • 26. 

    A technician needs to implement a RAID 1 set on a computer. Which of the following is the MINIMUM number of hard drives that would be required?

    • A.

      1

    • B.

      2

    • C.

      3

    • D.

      5

    Correct Answer
    B. 2
    Explanation
    To implement a RAID 1 set, also known as mirroring, at least two hard drives are required. In RAID 1, data is duplicated on two or more drives, providing redundancy and fault tolerance. This means that if one drive fails, the data can still be accessed from the other drive(s). Therefore, the minimum number of hard drives required to implement RAID 1 is 2.

    Rate this question:

  • 27. 

    Which of the following is a method used in the removal of a boot sector virus?

    • A.

      Performing a standard format of the hard drive partitions

    • B.

      Booting the computer with peripheral devices disconnected

    • C.

      Scanning all CD-R and CD-RW media prior to initial use

    • D.

      Booting from the floppy disk or CD-ROM prior to scanning

    Correct Answer
    D. Booting from the floppy disk or CD-ROM prior to scanning
    Explanation
    Booting from the floppy disk or CD-ROM prior to scanning is a method used in the removal of a boot sector virus. This is because booting from a different source allows the computer to bypass the infected boot sector and load a clean operating system. By doing this, the virus is unable to activate and can be effectively detected and removed by scanning the system.

    Rate this question:

  • 28. 

    A user is not able to receive files off the FTP server. Which of the following default ports needs to be opened for FTP to work properly?

    • A.

      21

    • B.

      80

    • C.

      110

    • D.

      443

    Correct Answer
    A. 21
    Explanation
    To receive files off the FTP server, port 21 needs to be opened. Port 21 is the default port for FTP (File Transfer Protocol), which is used for transmitting files between a client and a server on a computer network. By opening port 21, the user will be able to establish a connection with the FTP server and receive files successfully.

    Rate this question:

  • 29. 

    Which of the following is the MOST important reason for ensuring a RJ-11 phone line jack is not connected to a RJ-45 Ethernet network port?

    • A.

      RJ-11 jacks do not support full duplex.

    • B.

      Ethernet supports pulse dialing, not tone dialing.

    • C.

      The public telephone network uses token-ring, not Ethernet.

    • D.

      Phone line voltages can damage Ethernet equipment.

    Correct Answer
    D. Phone line voltages can damage Ethernet equipment.
    Explanation
    Phone line voltages can damage Ethernet equipment. RJ-11 phone lines typically carry a higher voltage than Ethernet cables. Connecting a RJ-11 phone line jack to a RJ-45 Ethernet network port can result in a power surge that can damage the sensitive electronic components in the Ethernet equipment. Therefore, it is important to ensure that a RJ-11 phone line jack is not connected to a RJ-45 Ethernet network port to avoid potential damage.

    Rate this question:

  • 30. 

    Users are reporting that a Vista feature asks them for confirmation before running most applications or making system changes. Which of the following is the name of this Vista feature and where should the technician direct users to turn the functionality off?

    • A.

      User Account Control; it can be turned off under Security in the Control Panel.

    • B.

      Security Center; it can be turned off in the Services MMC snap-in.

    • C.

      User Account Control; it can be turned off under User Accounts in the Control Panel.

    • D.

      Windows Firewall; it can be turned off under System Properties.

    Correct Answer
    C. User Account Control; it can be turned off under User Accounts in the Control Panel.
    Explanation
    The correct answer is User Account Control; it can be turned off under User Accounts in the Control Panel. User Account Control is a feature in Windows Vista that prompts users for confirmation before running most applications or making system changes. To turn off this functionality, users should go to the Control Panel, navigate to User Accounts, and disable User Account Control.

    Rate this question:

  • 31. 

    After replacing the motherboard in a laptop, the system overheats and fails to boot. Which of the following is the MOST likely cause of this error?

    • A.

      Thermal paste was not applied between the heat sink and CPU.

    • B.

      The fan is not compatible with the new motherboard.

    • C.

      The GPU is not compatible with the CPU.

    • D.

      The replacement motherboard firmware is out of date.

    Correct Answer
    A. Thermal paste was not applied between the heat sink and CPU.
    Explanation
    The most likely cause of the system overheating and failing to boot after replacing the motherboard in a laptop is the absence of thermal paste between the heat sink and CPU. Thermal paste is used to improve the transfer of heat from the CPU to the heat sink, ensuring efficient cooling. Without thermal paste, heat cannot be properly dissipated, leading to overheating and potential system failure.

    Rate this question:

  • 32. 

    Which of the following is the default FTP port?

    • A.

      21

    • B.

      22

    • C.

      23

    • D.

      25

    Correct Answer
    A. 21
    Explanation
    The default FTP port is 21. FTP (File Transfer Protocol) is a standard network protocol used for transferring files between a client and a server on a computer network. The default port number for FTP is 21, which is used for establishing the connection between the client and the server.

    Rate this question:

  • 33. 

    Which of the following tools allows the technician to copy a file without prompts?

    • A.

      XCOPY

    • B.

      COPY /Y

    • C.

      COPY /Z

    • D.

      COPY /A

    Correct Answer
    B. COPY /Y
    Explanation
    The correct answer is COPY /Y. The /Y option in the COPY command allows the technician to copy a file without any prompts for confirmation. This means that the technician can copy a file without being asked for permission or confirmation each time a file is copied. This can be useful when the technician wants to automate the copying process or when they want to copy multiple files without interruptions.

    Rate this question:

  • 34. 

    Which of the following devices has the options of: master, slave and cable select? (Select THREE).

    • A.

      CD-ROM

    • B.

      Floppy drive

    • C.

      Internal modem

    • D.

      Hard drive

    • E.

      Network card

    • F.

      DVD-ROM

    Correct Answer(s)
    A. CD-ROM
    D. Hard drive
    F. DVD-ROM
    Explanation
    CD-ROM, Hard drive, and DVD-ROM are the correct answers because these devices can be configured as either master, slave, or cable select. The master and slave settings determine the device's priority in accessing the computer's resources, while the cable select setting allows the device to automatically determine its priority based on its position on the IDE cable.

    Rate this question:

  • 35. 

    Using the NET command which variable would be used to find out the number of files sent by the workstation service?

    • A.

      Group

    • B.

      View

    • C.

      File

    • D.

      Statistics

    Correct Answer
    D. Statistics
    Explanation
    The correct answer is "statistics" because when using the NET command, the "statistics" variable would be used to find out the number of files sent by the workstation service.

    Rate this question:

  • 36. 

    A technician plugs a USB device into the front panel of a desktop computer and nothing happens. The technician knows that plug-n-play is enabled. Which of the following BEST describes a possible cause to this issue?

    • A.

      The technician plugged a USB 2.0 device into a USB 1.1 port.

    • B.

      The technician needs to reboot the computer for the device to work.

    • C.

      The technician plugged a USB 1.1 device into a USB 2.0 port.

    • D.

      The front panel connectors are not plugged into the motherboard.

    Correct Answer
    D. The front panel connectors are not plugged into the motherboard.
    Explanation
    The most likely cause for the USB device not working when plugged into the front panel of the desktop computer is that the front panel connectors are not properly connected to the motherboard. This could result in a lack of power or data connection, preventing the device from being recognized or functioning properly.

    Rate this question:

  • 37. 

    An office laser printer is printing lighter in random areas. Which of the following is the EASIEST solution to implement for this issue?

    • A.

      Clean the drum with a computer vacuum.

    • B.

      Replace the toner cartridge.

    • C.

      Clean the fuser area with a lint free cloth.

    • D.

      Use a can of compressed air to clean the pickup assembly.

    Correct Answer
    B. Replace the toner cartridge.
    Explanation
    Replacing the toner cartridge is the easiest solution to implement for this issue because a lighter print in random areas indicates that the toner cartridge is likely running low on toner or the toner is unevenly distributed. By replacing the toner cartridge, the printer will have a fresh supply of toner and should print at the appropriate darkness level consistently.

    Rate this question:

  • 38. 

    Which of the following private IP addresses is commonly used for internal IP addressing?

    • A.

      127.0.0.1

    • B.

      169.254.0.1

    • C.

      192.168.0.1

    • D.

      224.0.0.1

    Correct Answer
    C. 192.168.0.1
    Explanation
    The private IP address commonly used for internal IP addressing is 192.168.0.1. This is because the IP address range 192.168.0.0 to 192.168.255.255 is reserved for private networks and is not routable on the internet. It is frequently used by home and small office networks for local communication and device configuration.

    Rate this question:

  • 39. 

    A technician has deleted all the files in the directory C:\tempfiles. Which of the following commands should the technician use to delete this directory?

    • A.

      CD

    • B.

      SFC

    • C.

      MD

    • D.

      RD

    Correct Answer
    D. RD
    Explanation
    The technician should use the RD command to delete the directory C:\tempfiles. RD stands for "remove directory" and is used to delete directories in the Windows command prompt.

    Rate this question:

  • 40. 

    A home user is setting up a wireless network. Which of the following could be used to prevent a neighbor from accessing the network? (Select TWO).

    • A.

      Ensure all PCs are turned off when not in use

    • B.

      Enable wireless encryption

    • C.

      Create a DMZ for the main PC

    • D.

      Disable SSID broadcasting

    • E.

      Enable DHCP on the router

    Correct Answer(s)
    B. Enable wireless encryption
    D. Disable SSID broadcasting
    Explanation
    To prevent a neighbor from accessing the wireless network, enabling wireless encryption is necessary. This will encrypt the data transmitted over the network, making it difficult for unauthorized users to decipher. Additionally, disabling SSID broadcasting will hide the network's name from being visible to others, making it harder for them to find and connect to the network.

    Rate this question:

  • 41. 

    A user has just moved to a new office and is unable to access the network. The technician suspects the users network settings need to be changed. Which of the following tools would the technician use on the Windows XP computer to view the network settings?

    • A.

      NETDIAG

    • B.

      TRACERT

    • C.

      IPCONFIG

    • D.

      PATHPING

    Correct Answer
    C. IPCONFIG
    Explanation
    The technician would use IPCONFIG on the Windows XP computer to view the network settings. IPCONFIG is a command-line tool that displays the current configuration of the IP address, subnet mask, default gateway, and other network settings of the computer. By using IPCONFIG, the technician can check if the user's network settings are configured correctly or if they need to be changed in order to access the network.

    Rate this question:

  • 42. 

    The technician is moving a users files from a Windows XP PC to a Windows Vista PC. Which of the following directories corresponds to each operating system?

    • A.

      C:\users\user1\documents to c:\users\user1\documents

    • B.

      C:\documents and settings\user1\my documents to c:\users\user1\documents

    • C.

      C:\documents and settings\user1\my documents to c:\documents and settings\user1\my documents

    • D.

      C:\users\user1\my documents to c:\users\user1\documents

    Correct Answer
    B. C:\documents and settings\user1\my documents to c:\users\user1\documents
    Explanation
    In Windows XP, the user's documents are stored in the "c:\documents and settings\user1\my documents" directory. However, in Windows Vista and newer versions, the directory structure changes and the user's documents are stored in the "c:\users\user1\documents" directory. Therefore, when moving the user's files from a Windows XP PC to a Windows Vista PC, the correct corresponding directories would be "c:\documents and settings\user1\my documents" on the Windows XP PC to "c:\users\user1\documents" on the Windows Vista PC.

    Rate this question:

  • 43. 

    Which of the following are items that can be configured on a wireless router to make it more difficult for attackers to gain access? (Select TWO).

    • A.

      Change the wireless channel

    • B.

      Disable SSID broadcast

    • C.

      Change SSID from default

    • D.

      Enable DES encryption

    • E.

      Turn on port forwarding

    Correct Answer(s)
    B. Disable SSID broadcast
    C. Change SSID from default
    Explanation
    Disabling SSID broadcast and changing the SSID from default are two measures that can be taken to make it more difficult for attackers to gain access to a wireless router. Disabling SSID broadcast prevents the router from broadcasting its network name, making it harder for attackers to identify and target the network. Changing the SSID from its default value adds an additional layer of security, as attackers often target networks with default configurations. These two actions combined can help enhance the security of a wireless router and make it more challenging for attackers to gain unauthorized access.

    Rate this question:

  • 44. 

    Users in the office report that the speed of the Internet has drastically decreased since the recent network hardware refresh. Which of the following could be attributed to the problem?

    • A.

      The firewall was not powered back on.

    • B.

      The DHCP server is not working correctly.

    • C.

      The cellular repeater installed is interfering with the network speed.

    • D.

      The new switches are configured for 10MB.

    Correct Answer
    D. The new switches are configured for 10MB.
    Explanation
    The correct answer is that the new switches are configured for 10MB. This means that the switches are set to operate at a speed of 10 megabits per second, which is significantly slower than the previous network hardware. This configuration mismatch could explain the drastic decrease in internet speed that the users are experiencing.

    Rate this question:

  • 45. 

    A user can receive email but cannot send email with the email client software. Which of the following protocols is incorrectly configured?

    • A.

      FTP

    • B.

      SMTP

    • C.

      POP

    • D.

      SNMP

    Correct Answer
    B. SMTP
    Explanation
    SMTP (Simple Mail Transfer Protocol) is used for sending emails, not receiving them. If a user can receive emails but cannot send them, it means that the SMTP protocol is incorrectly configured. SMTP is responsible for the outgoing mail server settings, so if it is not properly configured, the user will not be able to send emails.

    Rate this question:

  • 46. 

    A technician is setting up a SOHO and has configured the wireless NIC on the laptop with WPA2. While configuring the WAP, WPA2 is not listed as an option. Which of the following should the technician do NEXT?

    • A.

      Install the latest wireless NIC drivers

    • B.

      Install the latest wireless NIC firmware

    • C.

      Install the latest WAP firmware

    • D.

      Install the latest WAP drivers

    Correct Answer
    C. Install the latest WAP firmware
    Explanation
    The technician should install the latest WAP firmware. If the WPA2 option is not listed while configuring the WAP, it indicates that the current firmware on the WAP may be outdated and does not support WPA2. By installing the latest WAP firmware, the technician can ensure that the WAP supports WPA2 and can configure it accordingly.

    Rate this question:

  • 47. 

    Which of the following BEST explains a system experiencing intermittent memory errors?

    • A.

      Southbridge is faulty

    • B.

      Memory sticks have corroded contacts

    • C.

      BIOS memory settings are misconfigured

    • D.

      Memory socket is faulty

    Correct Answer
    B. Memory sticks have corroded contacts
    Explanation
    Memory sticks can develop corroded contacts over time due to exposure to moisture or other environmental factors. Corroded contacts can result in intermittent memory errors because they can cause poor electrical connections between the memory stick and the memory socket. This can lead to data corruption or loss, resulting in memory errors. Therefore, the best explanation for a system experiencing intermittent memory errors is that the memory sticks have corroded contacts.

    Rate this question:

  • 48. 

    A second optical drive has been added to the computer and needs to be referenced as the R: drive by the Microsoft Windows operating system. Which of the following places in Microsoft Windows will BEST accomplish this task?

    • A.

      Administrative Tools

    • B.

      Disk Management

    • C.

      Device Manager

    • D.

      Event Viewer

    Correct Answer
    B. Disk Management
    Explanation
    Disk Management is the best place in Microsoft Windows to accomplish the task of referencing the second optical drive as the R: drive. Disk Management allows users to manage and configure disk drives and their associated partitions on a computer. By accessing Disk Management, the user can assign a drive letter, such as R:, to the newly added optical drive, ensuring that it is recognized and accessible by the operating system.

    Rate this question:

  • 49. 

    A yellow exclamation mark next to a device in Device Manager indicates which of the following?

    • A.

      The device driver is outdated.

    • B.

      The device driver is missing.

    • C.

      The device driver is corrupt.

    • D.

      The device is disabled.

    Correct Answer
    B. The device driver is missing.
    Explanation
    A yellow exclamation mark next to a device in Device Manager indicates that the device driver is missing. This means that the operating system cannot find the necessary software to communicate with the device, resulting in its malfunction or inability to work properly.

    Rate this question:

  • 50. 

    A technician is replacing a hard drive with a new 30GB drive formatted with FAT32. While transferring a 5GB file an error appears indicating that the new drive has insufficient space for the transfer. Which of the following is the cause of the problem?

    • A.

      FAT32 cannot handle single files larger than 4GB.

    • B.

      FAT32 cannot handle single files larger than 2GB.

    • C.

      The old drive uses NTFS and is incompatible with the new drive.

    • D.

      The file is formatted with NTFS and is incompatible with the new drive.

    Correct Answer
    A. FAT32 cannot handle single files larger than 4GB.
    Explanation
    The cause of the problem is that FAT32 cannot handle single files larger than 4GB. This means that when trying to transfer a 5GB file to the new drive, it exceeds the maximum file size limit of FAT32, resulting in the error indicating insufficient space for the transfer.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Feb 28, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 29, 2012
    Quiz Created by
    Tmede212
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.