A+ 220-602 IT Technician

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Stelupo
S
Stelupo
Community Contributor
Quizzes Created: 2 | Total Attempts: 14,975
| Attempts: 13,697 | Questions: 95
Please wait...
Question 1 / 95
0 %
0/100
Score 0/100
1. Which of the following is an important part of preventive maintenance?

Explanation

Getting rid of the dust is an important part of preventive maintenance because dust can accumulate inside a computer and cause overheating, which can lead to hardware failure. Regularly cleaning the computer and removing dust helps to ensure proper airflow and cooling, preventing potential damage and prolonging the lifespan of the computer.

Submit
Please wait...
About This Quiz
A+ 220-602 IT Technician - Quiz

This quiz is for the second A+ exam the 220-602 to become IT Technician certified. For a better experience click yes on shuffle questions. Feel free to write... see moreyour comment or suggestion. Updated April 2008 see less

2. What should you do if you are running 10 minutes late to a customer site?

Explanation

If you are running 10 minutes late to a customer site, it is important to call the customer and let them know about the delay. This shows professionalism and courtesy towards the customer, allowing them to adjust their schedule accordingly. It also helps in maintaining good communication and trust with the customer.

Submit
3. What is the protocol used in Internet?

Explanation

TCP/IP is the correct answer because it is the most widely used protocol in the Internet. TCP/IP stands for Transmission Control Protocol/Internet Protocol and it is a set of rules that governs the transfer of data over the Internet. It provides reliable and secure communication between devices connected to the Internet. TCP/IP is responsible for breaking data into packets, addressing them, and routing them to their destination. It also includes protocols like HTTP, FTP, and SMTP which enable various types of communication and services on the Internet.

Submit
4. You are explaining to Jim that if you don't _______ it can cause PC parts to overheat.

Explanation

You can remove dust with compressed air.

Submit
5. What should you do when interacting with a customer?

Explanation

When interacting with a customer, it is important to listen to them. This allows you to understand their needs, concerns, and preferences. By actively listening, you can provide better assistance and address their issues effectively. It shows respect and empathy towards the customer, making them feel valued and heard. Additionally, listening helps in building rapport and trust, leading to a positive customer experience.

Submit
6. A great way to understand the customer's problem is to:

Explanation

Taking notes while the customer explains the problem is a great way to understand their problem because it allows the customer to fully express their concerns and provides an opportunity to capture important details. By actively listening and jotting down key points, the customer feels heard and understood, and it also helps the support staff to remember and refer back to the information later. This approach demonstrates attentiveness and professionalism, and it enables the support team to provide effective solutions based on the customer's specific needs.

Submit
7. Which version offers a way to automatically download and install updates?

Explanation

Windows XP offers a way to automatically download and install updates. This feature is called Windows Update and it allows users to schedule automatic updates or manually check for updates. By enabling this feature, users can ensure that their operating system is up to date with the latest security patches and bug fixes.

Submit
8. What's important to achieve customer satisfaction?

Explanation

Being prepared is important to achieve customer satisfaction because it allows a business to anticipate and address customer needs and concerns effectively. By being prepared, a company can provide prompt and accurate information, offer solutions to problems, and deliver a high level of service. This helps to build trust and confidence in the business, leading to increased customer satisfaction and loyalty.

Submit
9. A customer reports that she is the only one in the company that cannot access the network resources. She is using Windows XP Professional and her IP is 169.254.107.199. What should you do?

Explanation

The customer is unable to access network resources, which could indicate an issue with her IP address. Running Ipconfig/release and Ipconfig/renew on her computer will release and renew her IP address, allowing her to potentially establish a new connection to the network resources. Reinstalling Windows, running ARP /a, running fix /all, or running Nbstat would not directly address the issue of her inability to access network resources.

Submit
10. What is either hardware or software that protects your computer or network from malicious users?

Explanation

A firewall is a security device, either hardware or software, that acts as a barrier between a computer or network and potential threats from malicious users. It monitors and controls incoming and outgoing network traffic based on predetermined security rules. Its main purpose is to prevent unauthorized access and protect against malicious activities such as hacking, viruses, and malware. Firewalls can be configured to block specific ports, IP addresses, or types of traffic, providing an additional layer of protection for your computer or network.

Submit
11. Part of good communication is :

Explanation

Good communication involves not being judgmental towards others. When we are judgmental, we tend to make assumptions, criticize, or form opinions about others without fully understanding their perspective. This can hinder effective communication as it creates a barrier between individuals and prevents open and honest dialogue. By avoiding judgment, we create a safe and respectful environment where everyone feels heard and valued, leading to better understanding and collaboration.

Submit
12. What is the term when we speak about a device that can be plugged into a USB port while the computer is on?

Explanation

Hot-swappable refers to a device that can be plugged into a USB port while the computer is on, without the need to restart or shut down the computer. This allows for easy and convenient connection and disconnection of devices without disrupting the computer's operation.

Submit
13. What you shouldn't forget to do in front of a customer?

Explanation

In front of a customer, it is important to identify yourself and your organization. This helps establish credibility and professionalism. By introducing yourself and your company, the customer knows who they are dealing with and can trust the information or services being provided. It also creates a personal connection and allows the customer to address any concerns or inquiries directly to the appropriate person or organization.

Submit
14. What is used from Microsoft to prevent unlicensed use of software?

Explanation

Windows product activation is used by Microsoft to prevent unlicensed use of software. This feature requires users to activate their copy of Windows by entering a unique product key. This helps ensure that only genuine and licensed copies of the software are being used, discouraging piracy and unauthorized use.

Submit
15. What should you try first when an application locks up?

Explanation

You press Ctrl + alt + delete to call the task manager

Submit
16. Which of the following passwords will probably be the most secure one?

Explanation

The combination of letters numbers and non alphanumeric make the strongest password.

Submit
17. The printer suddenly stops working and you see smoke coming out. What should you do first?

Explanation

The fire has not started yet.

Submit
18. Using a normal vacuum cleaner inside a PC can cause

Explanation

Using a normal vacuum cleaner inside a PC can cause ESD (Electrostatic Discharge). ESD occurs when there is a sudden flow of electricity between two objects with different electrical charges. The vacuum cleaner, being an electrical device, can generate static electricity which can discharge onto sensitive electronic components inside the PC. This can lead to damage or malfunctioning of the components. Therefore, it is important to use specialized ESD-safe tools and equipment when cleaning the inside of a PC to prevent any potential harm.

Submit
19. When a user boots his computer the monitor goes black. After investigating you find out that he set the refresh rate to high. How can you fix this problem?

Explanation

On safe mode allow you to have simple video settings. Then you can fix the problem.

Submit
20. What is a feature of virus shields?

Explanation

A feature of virus shields is that they automatically scan e-mails, downloads, and running programs. This means that the virus shield software is designed to continuously monitor and check these aspects of a computer system for any potential threats or malicious files. By doing so, it helps to detect and prevent the spread of viruses, malware, and other harmful elements that could harm the system or compromise the user's data and privacy.

Submit
21. What type of printer has a print head with pins that moves across the paper?

Explanation

A dot matrix printer has a print head with pins that moves across the paper. These pins strike an ink ribbon, transferring ink onto the paper to create characters and images. This type of printer is known for its ability to produce high-quality, durable prints, making it suitable for applications such as printing receipts, invoices, and forms.

Submit
22. What is the term to describe the right to use the software?

Explanation

A license is a legal agreement that grants the right to use a software. It outlines the terms and conditions under which the software can be used, including any restrictions or limitations. Obtaining a license is necessary to legally use the software and ensures that the user has the right to access and utilize its functionalities. Therefore, the term to describe the right to use the software is "License".

Submit
23. Select the correct order in installing a CPU. 1. Install the cooling system 2. Lower the release lever arm 3. Holding the CPU by its edges, position it over the socket 4. Lift the release lever arm 5. Locate the orientation mark on the corner of the CPU and socket

Explanation

The correct order in installing a CPU is 4 5 3 2 1. First, you need to lift the release lever arm to prepare the socket. Then, locate the orientation mark on the corner of the CPU and socket to ensure proper alignment. Holding the CPU by its edges, position it over the socket. Lower the release lever arm to secure the CPU in place. Finally, install the cooling system to ensure proper heat dissipation.

Submit
24. What type of service is DHCP?

Explanation

DHCP stands for Dynamic Host Configuration Protocol, which is a network management protocol used to assign IP addresses and other network configuration parameters to devices on a network. Therefore, the correct answer is "Addressing" as DHCP is primarily responsible for providing addressing information to devices on a network.

Submit
25. What are the symptoms of a dried out ink nozzle?

Explanation

When an ink nozzle is dried out, it can result in missing lines or dots on the printed page. This occurs because the dried ink prevents the nozzle from properly dispensing ink onto the paper. As a result, certain areas of the page may appear blank or have incomplete printing.

Submit
26. Your new laptop has built-in wireless but it isn't connecting to the access point. Which of the following could be the cause?

Explanation

The most likely cause for the laptop not connecting to the access point is that the NIC (Network Interface Card) is turned off. If the NIC is turned off, it will not be able to establish a connection with the access point. The other options, such as incorrect driver, encryption not enabled, or shorted out NIC, may also cause connectivity issues, but the most common and simplest explanation would be that the NIC is turned off.

Submit
27. Which protocol is used to transfer files between TCP/IP systems?

Explanation

FTP (File Transfer Protocol) is the correct answer because it is the protocol specifically designed for transferring files between TCP/IP systems. TFP, POP3, HTTPS, and SMTP are all different protocols used for various purposes such as email communication (POP3 and SMTP) and secure web browsing (HTTPS), but they are not specifically designed for file transfer between systems.

Submit
28. If you have a PC with an ATX motherboard and case, can you replace it with a BTX motherboard?

Explanation

No they are not interchangeable

Submit
29. Which one of the following errors, means that the BIOS cannot read the partition table information?

Explanation

Invalid drive or drive specification means that the BIOS is unable to read the partition table information. This error occurs when the BIOS is unable to recognize the drive or the drive's specifications are not compatible with the system. It could be due to incorrect settings in the BIOS, faulty cables or connections, or a defective drive.

Submit
30. While troubleshooting a printing problem. The customer start explaining in great detail what he was trying to do, when he tried to print and the fix he tried to do. At what point should you interrupt him?

Explanation

The customer should never be interrupted while explaining the problem, regardless of how much detail they provide. It is important to listen attentively to the customer's explanation in order to fully understand the issue and gather all relevant information. Interrupting the customer may cause frustration and hinder effective troubleshooting.

Submit
31. You want to assign a specific drive letter to a CD-ROM. which utility would allow you to do that.?

Explanation

Disk Management is the utility that allows you to assign a specific drive letter to a CD-ROM. This utility allows you to manage and configure disk drives, including assigning drive letters to different devices. By using Disk Management, you can easily assign a specific drive letter to your CD-ROM, making it easier to access and use the device.

Submit
32. If loose toner come out from a page. What can be the cause?

Explanation

If loose toner is coming out from a page, it indicates that the fuser is not reaching the proper temperature. The fuser is responsible for melting the toner onto the paper, and if it is not reaching the correct temperature, the toner will not properly adhere to the page and may come loose. This can result in smudging or loose toner particles on the printed page.

Submit
33. What tool is used to troubleshoot problems with windows, applications, etc...?

Explanation

You can click on run and type eventvwr.

Submit
34. What is the process of using or manipulating people to gain access to network resources?

Explanation

Social engineering is the process of using manipulation or deception to gain unauthorized access to network resources. It involves exploiting human psychology and social interactions to trick individuals into revealing sensitive information or performing actions that compromise the security of a network. Unlike hacking or network engineering, social engineering relies on exploiting human vulnerabilities rather than technical vulnerabilities. Overclocking and social attack are unrelated to the process of gaining access to network resources through manipulation.

Submit
35. Which of the following user account is created on a local computer and allow a user access to only that computer?

Explanation

On a local computer is local user on a domain is global user

Submit
36. Can be used to test a serial, parallel, USB, Network or other ports.

Explanation

A loop back plug can be used to test a serial, parallel, USB, network, or other ports by creating a loop within the system. It allows the signal to be sent from the port and looped back to the same port, effectively testing the functionality of the port. This is useful for diagnosing any issues or faults in the port and ensuring that it is working properly.

Submit
37. When should you ask permission to use customer property?

Explanation

You should always ask for permission when using customer's property.

Submit
38. The ____ is a plan that helps prevent failures and reduce repair costs and downtime:

Explanation

A preventive maintenance plan is a strategy put in place to proactively address potential failures and minimize repair costs and downtime. It involves regularly scheduled inspections, maintenance tasks, and repairs to keep equipment and systems in good working condition. By identifying and addressing issues before they become major problems, a preventive maintenance plan helps to prevent failures and reduce the need for costly repairs or replacements. This approach can also help to extend the lifespan of equipment and improve overall operational efficiency.

Submit
39. What term is used to describe one way to replicate an entire drive?

Explanation

Disk imaging is the term used to describe one way to replicate an entire drive. Disk imaging involves creating an exact copy or image of the entire drive, including all partitions, files, and data. This image can then be used to restore the drive to its original state or to transfer the entire drive to another system. Disk imaging is commonly used for backup and recovery purposes, as well as for system migration or deployment.

Submit
40. You have accepted a certificate but you are not sure if you did the right thing. How can you remove the certificate?

Explanation

On the content tab in Internet options there are 3 buttons to clear the SSL state, certificates and Publishers

Submit
41. Which component(s) prevent reflection on a bus topology network?

Explanation

Terminators are the components that prevent reflection on a bus topology network. Reflection occurs when a signal bounces back and interferes with the original signal, causing errors and data loss. Terminators are placed at both ends of the network to absorb and terminate the signal, preventing it from bouncing back. They ensure that the signal travels in only one direction, maintaining the integrity and efficiency of the network.

Submit
42. What's the first step in troubleshooting a printer or scanner?

Explanation

The first step in troubleshooting a printer or scanner is to interview the user. By speaking with the user, you can gather information about the issue they are experiencing, any error messages they have encountered, and any recent changes or incidents that may have caused the problem. This step helps to identify the specific problem and provides valuable insights for further troubleshooting steps.

Submit
43. What should you do when cleaning the glass of a flat bed scanner?

Explanation

When cleaning the glass of a flat bed scanner, it is important to unplug the scanner before starting the cleaning process. This is necessary to ensure safety and prevent any potential damage to the scanner or risk of electric shock. Unplugging the scanner ensures that there is no power supply to the device, reducing the chances of accidents or malfunctions during the cleaning process.

Submit
44. When troubleshooting, what is the first step?

Explanation

The first step in troubleshooting is to check the obvious. This means looking for any obvious issues or problems that may be causing the trouble. This could include checking if all cables are properly connected, if the device is powered on, or if any error messages are displayed. By checking the obvious first, it helps to quickly identify and resolve any simple or easily fixable problems before moving on to more complex troubleshooting steps.

Submit
45. In a Dot Matrix printer if you get a poor print quality, what should you check first?

Explanation

If you get a poor print quality in a Dot Matrix printer, the first thing you should check is the ribbon. The ribbon is responsible for transferring ink onto the paper, so if it is worn out or not properly aligned, it can result in poor print quality.

Submit
46. Select the true statement about notched ribbon cables.

Explanation

In Floppy Drive cables the first pin is marked with red.
Notched cables goes only in one way.

Submit
47. What conditions are optimal in the area where you are storing computer components? Select all that apply.

Explanation

Cool and Dry is a good environment for storing components, while is not so good when you need to work with ESD sensitive components.

Submit
48. What is the best action during an lighting storm?

Explanation

During a lightning storm, the best action to take is to unplug all the cables from the outlet. This is because lightning can cause power surges that can damage electronic devices and appliances. By unplugging the cables, you are effectively disconnecting the devices from the electrical source, protecting them from potential damage. Praying that the storm stops or turning off the computer may not be effective in preventing damage from a power surge. Using a surge suppressor can offer some protection, but unplugging the cables is the safest option.

Submit
49. A temporary voltage reduction is referred as ______

Explanation

A Sag is a drop in voltage for a shorter period than Brownouts

Submit
50. The _____ has a map to the partitions on the Hard Disk Drive

Explanation

The partition table is a data structure that stores information about the partitions on a hard disk drive. It contains the starting and ending addresses of each partition, as well as other details such as the file system type. This information is crucial for the operating system to locate and access the different partitions on the hard disk drive. Therefore, the partition table acts as a map that helps the system to identify and utilize the partitions effectively.

Submit
51. While printing you see on the display "memory overflow error". What should you do in this situation?

Explanation

The "memory overflow error" message indicates that there is not enough memory available for the printer to complete the printing task. Adding more RAM to the printer would increase its memory capacity, allowing it to handle larger printing jobs without encountering this error.

Submit
52. You are not able to send e-mails. Which of the following is the cause?

Explanation

SMTP stands for Simple Mail Transfer Protocol, which is the standard protocol used for sending emails. If you are not able to send emails, the cause could be an issue with the SMTP server. This could be due to various reasons such as incorrect SMTP server settings, network connectivity issues, or problems with the SMTP server itself. It is important to check the SMTP server settings and troubleshoot any potential issues to resolve the problem of not being able to send emails.

Submit
53. You want to protect your computer from high voltages. What should you buy?

Explanation

A surge suppressor is the correct answer because it is designed to protect electronic devices, such as computers, from sudden spikes in electrical voltage. These spikes, also known as power surges, can be caused by lightning strikes, utility grid fluctuations, or the operation of high-powered electrical equipment. Surge suppressors work by diverting excess voltage away from the connected devices, preventing them from being damaged. Therefore, purchasing a surge suppressor is an effective way to safeguard your computer from high voltages.

Submit
54. You are on site working on a computer, while a user comes to you and start asking detailed questions about what you are doing. He seems really interested in your job. What should you do?

Explanation

You are there to do your job not to teach.

Submit
55. What benefit has a laptop that uses shared memory compared to one with a separate video Ram?

Explanation

A laptop that uses shared memory instead of separate video RAM has a lower price because it does not require the additional cost of dedicated memory for graphics processing. Shared memory systems allocate a portion of the computer's main memory for graphics processing, which reduces the overall cost of the laptop. However, this may result in a slightly lower performance compared to laptops with separate video RAM, as the shared memory has to be shared between the CPU and GPU.

Submit
56. In Windows 2000/XP the _____ can read from and write to parts of the system other than their own local drive, install applications and perform limited administrative task.

Explanation

A power user in Windows 2000/XP has the ability to read from and write to parts of the system other than their own local drive, install applications, and perform limited administrative tasks. This means that they have elevated privileges and can access and modify system files and settings, but their level of access is still restricted compared to an administrator.

Submit
57. Which of the following plans help to manage a failure.

Explanation

A disaster recovery plan is designed to manage and recover from a failure or disaster situation. It outlines the steps and procedures to be followed in the event of a failure, such as a natural disaster or system crash, and includes measures to ensure the continuity of operations and minimize downtime. This plan includes strategies for data backup, system restoration, and alternative resources to be used in case of failure. It helps organizations to quickly recover and resume normal operations after a failure, minimizing the impact on business continuity.

Submit
58. What is the maximum range of current Bluetooth devices?

Explanation

10 meters are approximately 30 feet

Submit
59. Mike sets up a small LAN of five Windows XP PC connected to a router that connects to a DSL connection. What kind of network has he set up?

Explanation

There is no server involved.

Submit
60. Which of the following is needed to configure a Plug and Play NIC in a Windows 2000 system?

Explanation

To configure a Plug and Play NIC in a Windows 2000 system, a device driver is needed. A device driver is a software program that allows the operating system to communicate with and control the hardware device, in this case, the Network Interface Card (NIC). The device driver provides the necessary instructions and settings for the operating system to recognize and utilize the NIC properly. Without the device driver, the NIC would not be recognized by the system and would not function correctly.

Submit
61. Which of the following is a common event to audit?

Explanation

One common event to audit is the number of times a user login fails. This is important for security reasons as it allows organizations to track and identify any potential unauthorized access attempts or suspicious activity. Monitoring failed login attempts can help detect and prevent unauthorized access to systems and protect sensitive information from being compromised.

Submit
62. After you got a call from a company. You have the task to dispose of a storage media. What would you do with it?

Explanation

You destroy it so that important information are safe

Submit
63. You fixed a user printer. She tells you that she had two jobs waiting in the printer spool. What can you do to continue the printing process? Select two.

Explanation

You can continue the printing process by right-clicking on each printer job and selecting "resume printing". Additionally, you can choose to do nothing as the print jobs will probably start on their own.

Submit
64. In a monitor what can be the cause for the flickering?

Explanation

A poor cable connection is the most common cause.
A low refresh rate is also another cause.

Submit
65. Jim tried to install a printer on his XP Professional but he can't go on because he doesn't have permission. Why he doesn't have permission?

Explanation

When logged on as a guest, the user has limited privileges and does not have permission to perform certain tasks, such as installing a printer.

Submit
66. You want to make sure that a new scanner is working properly. What is the best test you can do?

Explanation

To ensure that a new scanner is functioning correctly, the best test would be to scan using a test pattern. This test pattern is specifically designed to assess the scanner's performance and accuracy. By scanning the test pattern, any potential issues with the scanner's scanning capabilities, such as clarity, resolution, or color accuracy, can be identified and addressed. This test helps to verify that the scanner is working properly and producing accurate and high-quality scans.

Submit
67. NTFS uses

Explanation

The correct answer is "Master file table". NTFS (New Technology File System) uses a Master File Table (MFT) to keep track of all the files and directories on a disk. The MFT is a database that stores information about each file, such as its name, size, location, and permissions. It acts as a central index for the file system, allowing quick access to file metadata and improving the overall performance of the file system.

Submit
68. You are installing an additional drive into a working computer. The computer won't power up at all, no lights, no spinning drives, nothing.What's most likely the problem?

Explanation

When adding new devices you need more DC wattage

Submit
69. The achronym of HTTPS stands for

Explanation

HTTPS stands for Hypertext Transfer Protocol over Secure Sockets Layer. The secure sockets layer (SSL) is a protocol that provides encryption and authentication for secure communication over a network. HTTPS is used to secure communication between a web browser and a web server, ensuring that the data transmitted is encrypted and protected from unauthorized access.

Submit
70. Which of the following threats are categorized as social engineering? Select all that apply

Explanation

Social engineering refers to the manipulation of individuals to gain unauthorized access or obtain confidential information. Telephone scams and dumpster diving both involve manipulating individuals to deceive them or gain access to their personal information. Spyware, rootkits, and Trojans, on the other hand, are forms of malicious software that are not categorized as social engineering, as they do not involve manipulating individuals directly.

Submit
71. What is it that uses a single public IP address to access internet on behalf of all hosts on the network using IP addresses?

Explanation

NAT is Network Address Translation

Submit
72. Which device amplifies the incoming signal and noise?

Explanation

An amplifier repeater is a device that amplifies both the incoming signal and the accompanying noise. It boosts the strength of the signal to ensure that it can travel over long distances without losing clarity or strength. By amplifying both the signal and the noise, the device helps to maintain the integrity of the original signal while also boosting its overall strength. This can be particularly useful in situations where the incoming signal is weak or when there is a lot of noise present that could potentially interfere with the transmission.

Submit
73. A user report that the stylus in his Tablet PC is not working well. What should you try first?

Explanation

Aligning the screen should be tried first because if the screen is not properly aligned, it can cause issues with the stylus functionality. By aligning the screen, the tablet PC can accurately track the movements of the stylus, ensuring that it works well. This is a simple and quick troubleshooting step that can potentially resolve the issue without the need for further troubleshooting or more complex solutions.

Submit
74. How do you correct the memory condition in a Ni-Cd battery? Select all that apply.

Explanation

A battery need a cool place but the freezer is a bit too much

Submit
75. Which part of a dox-matrix is the most dangerous?

Explanation

The print head gets very hot and can burn you

Submit
76. You have two hard drives set to cable select. Where should you place the drive that you want to be the C: drive?

Explanation

When using the cable select setting, the drive that is placed at the end of the cable will be recognized as the C: drive. This is because the cable select setting relies on the position of the drive on the cable to determine its role. Therefore, to designate the desired drive as the C: drive, it should be placed at the end of the cable.

Submit
77. What is the maximun speed of IrDA?

Explanation

IrDA stands for Infrared Data Association, which is a wireless communication technology used for short-range data transfer. The maximum speed of IrDA is 4 Mb/s, as stated in the given answer. This means that IrDA can transfer data at a rate of up to 4 megabits per second.

Submit
78. Which of the following tools would enable you to stop a user from logging into a local machine but still enable him to log in onto the domain?

Explanation

Local security settings would enable you to stop a user from logging into a local machine but still allow them to log in onto the domain. This is because local security settings can be configured to control the authentication and access permissions for local user accounts on a specific machine. By adjusting these settings, you can prevent a user from logging into the local machine while still allowing them to authenticate and access resources on the domain.

Submit
79. What is the first step in preparing the motherboard to go in the case?

Explanation

The first step in preparing the motherboard to go in the case is to set the jumpers. Jumpers are small connectors on the motherboard that are used to configure various settings, such as the CPU speed, voltage, or system clock. By setting the jumpers correctly, the motherboard will be properly configured to work with the other components in the computer system.

Submit
80. How many beeps would you hear if you have a problem with the motherboard?

Explanation

When a problem occurs with the motherboard, it typically produces a series of beeps as an error code. The correct answer suggests that you would hear 1 initial beep followed by 3-4 or 5 beeps. This indicates a specific error pattern that can help diagnose the issue with the motherboard.

Submit
81. What file should you check if your Windows XP installation has failed?

Explanation

The correct answer is Setuplog.txt. This file should be checked if a Windows XP installation has failed. It is likely to contain information about the installation process, including any errors or issues that occurred. By reviewing the contents of this log file, it may be possible to determine the cause of the installation failure and take appropriate action to resolve it.

Submit
82. Which of the following command would you use to install the Recovery Console?

Explanation

To install the Recovery Console, you would use the command "d:\i386\winnt32/cmdcons". This command specifies the location of the Recovery Console files and initiates the installation process.

Submit
83. What is the best way to clean an LCD screen? Select all that apply

Explanation

Clean water is distilled water.

Submit
84. The printouts of an impact printer are good on the left but fade when is printing on the right. What is most likely the cause?

Explanation

A misaligned platen can cause the printouts to be good on the left but fade when printing on the right. The platen is the roller that feeds the paper through the printer, and if it is misaligned, it can cause uneven pressure on the paper, resulting in faded printouts.

Submit
85. Which tool allows you to view logs and monitor real time data?

Explanation

The Performance console is the correct answer because it is a tool that allows users to view logs and monitor real-time data. It provides detailed information about system performance, including CPU usage, memory usage, disk activity, and network activity. Users can use the Performance console to analyze system performance, identify bottlenecks, and troubleshoot issues. It is a valuable tool for system administrators and IT professionals to monitor and optimize system performance.

Submit
86. When troubleshooting a possible hardware problem, which of the following should you first suspect? Select two.

Explanation

As written in the A+ objective, check the obvious first.

Submit
87. Which of the following is a type of authentication? Select all that apply.

Explanation

A smart card is a type of authentication method that uses a physical card embedded with a microchip to verify the identity of the user. It is commonly used in access control systems and digital signatures. A password is also a type of authentication where the user has to provide a unique combination of characters to gain access to a system or account. Both smart card and password are valid types of authentication methods.

Submit
88. Which of the following type of damage is caused by ESD?

Explanation

ESD, or Electrostatic Discharge, refers to the sudden flow of electricity between two objects with different electrical potentials. This discharge can cause damage to electronic components and systems. Upset failure refers to a temporary malfunction or disruption in the normal functioning of a system or component. Therefore, it can be inferred that ESD can cause upset failure, as the sudden discharge of electricity can temporarily disrupt the normal operation of electronic systems.

Submit
89. Which utilities are used to isolate a problem between two computers on a TCP/IP network? Select two.

Explanation

Tracert and Pathping are both network diagnostic tools that can be used to isolate a problem between two computers on a TCP/IP network. Tracert (traceroute) is used to trace the route packets take from the source computer to the destination computer, helping identify any network issues along the way. Pathping combines the features of both Ping and Tracert, providing information about packet loss and latency at each hop along the route. By using these utilities, network administrators can pinpoint where the problem lies and troubleshoot accordingly.

Submit
90. John bought a new motherboard with 3 DIMM slots. He purchased two 256MB PC100 DIMM. He then installed a 128 MB PC66 DIMM in the third slot. What will happen when he boots the system?

Explanation

When John boots the system, the PC100 DIMM will operate at the same speed as the PC66 DIMM. This is because the motherboard will automatically adjust the speed of the faster DIMM to match the slower one. However, there may be an issue with the mismatched speeds of the DIMMs, which could cause the system to not boot up properly.

Submit
91. If you get a continuous beep, you have a problem with the ____

Explanation

Even if there are different BIOS, a continuous beep is just present in one BIOS the standard IBM

Submit
92. Which of the following actions should you always take when upgrading RAM in a laptop? Select all that apply.

Explanation

When upgrading RAM in a laptop, it is important to remove the battery to prevent any electrical mishaps. Wearing an anti-static wrist strap is also necessary to protect the sensitive electronic components from static electricity. Removing all the old RAM modules is necessary to make space for the new RAM. However, removing the power supply and the keyboard are not necessary steps for upgrading RAM in a laptop.

Submit
93. What is critical to a successful OS load?

Explanation

The system state data is critical to a successful OS load because it contains important information about the current state of the operating system. This data includes the registry settings, active directory database, system files, and other configuration settings that are necessary for the OS to function properly. Without the system state data, the OS may not be able to boot up or operate correctly. Therefore, ensuring the integrity and availability of the system state data is crucial for a successful OS load.

Submit
94. Which of the following features are present in Windows XP Professional but lacks in Windows Home? Select all that apply

Explanation

Windows XP Professional has support for remote desktop, support for group policy, and encryption of files/folders. These features allow users to remotely access their desktops, manage group policies for multiple users, and secure their files and folders with encryption. Windows Home lacks these features, making them exclusive to Windows XP Professional.

Submit
95. Which of the following advantages does WPA have over WEP? Select all that apply.

Explanation

EAP is Extensible Authentication Protocol

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2022 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 30, 2008
    Quiz Created by
    Stelupo
Cancel
  • All
    All (95)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following is an important part of preventive maintenance?
What should you do if you are running 10 minutes late to a customer...
What is the protocol used in Internet?
You are explaining to Jim that if you don't _______ it can cause PC...
What should you do when interacting with a customer?
A great way to understand the customer's problem is to:
Which version offers a way to automatically download and install...
What's important to achieve customer satisfaction?
A customer reports that she is the only one in the company that cannot...
What is either hardware or software that protects your computer or...
Part of good communication is :
What is the term when we speak about a device that can be plugged into...
What you shouldn't forget to do in front of a customer?
What is used from Microsoft to prevent unlicensed use of software?
What should you try first when an application locks up?
Which of the following passwords will probably be the most secure one?
The printer suddenly stops working and you see smoke coming out. ...
Using a normal vacuum cleaner inside a PC can cause
When a user boots his computer the monitor goes black. After...
What is a feature of virus shields?
What type of printer has a print head with pins that moves across the...
What is the term to describe the right to use the software?
Select the correct order in installing a CPU. ...
What type of service is DHCP?
What are the symptoms of a dried out ink nozzle?
Your new laptop has built-in wireless but it isn't connecting to the...
Which protocol is used to transfer files between TCP/IP systems?
If you have a PC with an ATX motherboard and case, can you replace it...
Which one of the following errors, means that the BIOS cannot read the...
While troubleshooting a printing problem. The customer start...
You want to assign a specific drive letter to a CD-ROM. which utility...
If loose toner come out from a page. What can be the cause?
What tool is used to troubleshoot problems with windows, applications,...
What is the process of using or manipulating people to gain access to...
Which of the following user account is created on a local computer and...
Can be used to test a serial, parallel, USB, Network or other ports.
When should you ask permission to use customer property?
The ____ is a plan that helps prevent failures and reduce repair costs...
What term is used to describe one way to replicate an entire drive?
You have accepted a certificate but you are not sure if you did the...
Which component(s) prevent reflection on a bus topology network?
What's the first step in troubleshooting a printer or scanner?
What should you do when cleaning the glass of a flat bed scanner?
When troubleshooting, what is the first step?
In a Dot Matrix printer if you get a poor print quality, what should...
Select the true statement about notched ribbon cables.
What conditions are optimal in the area where you are storing computer...
What is the best action during an lighting storm?
A temporary voltage reduction is referred as ______
The _____ has a map to the partitions on the Hard Disk Drive
While printing you see on the display "memory overflow error". What...
You are not able to send e-mails. Which of the following is the cause?
You want to protect your computer from high voltages. ...
You are on site working on a computer, while a user comes to you and...
What benefit has a laptop that uses shared memory compared to one with...
In Windows 2000/XP the _____ can read from and write to parts of the...
Which of the following plans help to manage a failure.
What is the maximum range of current Bluetooth devices?
Mike sets up a small LAN of five Windows XP PC connected to a router...
Which of the following is needed to configure a Plug and Play NIC in a...
Which of the following is a common event to audit?
After you got a call from a company. You have the task to dispose of a...
You fixed a user printer. She tells you that she had two jobs waiting...
In a monitor what can be the cause for the flickering?
Jim tried to install a printer on his XP Professional but he can't go...
You want to make sure that a new scanner is working properly. ...
NTFS uses
You are installing an additional drive into a working computer. ...
The achronym of HTTPS stands for
Which of the following threats are categorized as social engineering?...
What is it that uses a single public IP address to access internet on...
Which device amplifies the incoming signal and noise?
A user report that the stylus in his Tablet PC is not working well. ...
How do you correct the memory condition in a Ni-Cd battery? ...
Which part of a dox-matrix is the most dangerous?
You have two hard drives set to cable select. Where should you place...
What is the maximun speed of IrDA?
Which of the following tools would enable you to stop a user from...
What is the first step in preparing the motherboard to go in the case?
How many beeps would you hear if you have a problem with the...
What file should you check if your Windows XP installation has failed?
Which of the following command would you use to install the Recovery...
What is the best way to clean an LCD screen? Select all that apply
The printouts of an impact printer are good on the left but fade when...
Which tool allows you to view logs and monitor real time data?
When troubleshooting a possible hardware problem, ...
Which of the following is a type of authentication? ...
Which of the following type of damage is caused by ESD?
Which utilities are used to isolate a problem between two computers on...
John bought a new motherboard with 3 DIMM slots. He purchased two...
If you get a continuous beep, you have a problem with the ____
Which of the following actions should you always take when upgrading...
What is critical to a successful OS load?
Which of the following features are present in Windows XP Professional...
Which of the following advantages does WPA have over WEP? Select all...
Alert!

Advertisement