A Plus 702 Mock 2

100 Questions | Attempts: 162
Share
SettingsSettings
Please wait...
  • 1/100 Questions

    A friend tells you that they just brought a hard drive enclosure and it came with a USB lead.  The USB lead has two ends to connect into a computer then a small one into the hard drive.  They are just wondering why it has two connectors when it runs fine on one. What is your  reply?

    • The second USB connector is to provide extra power if needed.
    • The second USB connector allows for two devices on one cable.
    • The second USB allows for sharing between two PCs.
    • The second USB connector is for connection to a UPS.
Please wait...

Quiz Preview

  • 2. 

    Social ________ is a process in which an attacker attempts to acquire information about your  network and system by social means, such as talking to people in the organisation.

    • Networking

    • Engineering

    • Assailing

    • Pinging

    Correct Answer
    A. Engineering
  • 3. 

    In Windows 7, Vista and XP, running REGEDT32 actually summons which program?

    • POLEDIT

    • REGEDIT

    • GRPEDIT

    • REGBACK

    Correct Answer
    A. REGEDIT
  • 4. 

    A technician needs to perform a hardware upgrade on a laptop. He removes the power supply cable. What is the next thing that the technician should remove?

    • The battery pack.

    • The memory card.

    • The hard disk.

    • The CMOS battery.

    Correct Answer
    A. The battery pack.
  • 5. 

    18. A user complains that the screen on his laptop remains blank when he turns on his laptop. A technician ascertains that the power light comes on and that the laptop does boot up. What should the technician do to enable the display?

    • A. Press the Fn and Screen keys until the display appears.

    • B. Attach an external LCD or CRT monitor to the laptop.

    • C. Check that the screen's video cable is plugged into the laptop.

    • D. Check that the monitor is powered on.

    Correct Answer
    A. A. Press the Fn and Screen keys until the display appears.
  • 6. 

    If Windows won’t boot normally, you can reboot into ______ Mode

    • DOS

    • Safe

    • Restricted

    • Protected

    Correct Answer
    A. Safe
  • 7. 

    What is the minimum number of hard drives that you need to implement RAID level 0?

    • 1

    • 2

    • 3

    • 4

    Correct Answer
    A. 2
  • 8. 

    Angelina is configuring her router to allow her to manage her home PC from her work's network. What feature does she need to enable?

    • Port Forwarding

    • MAC Filtering

    • DHCP

    • SSID

    Correct Answer
    A. Port Forwarding
  • 9. 

    20. Which of the following commands would you enter at the command prompt in Windows XP Professional Service Pack 2 when you want to defragment the C drive?

    • A. DEFRAG C:

    • B. FDISK

    • C. SCANDISK

    • D. CHKDSK C: /F

    Correct Answer
    A. A. DEFRAG C:
  • 10. 

    29. Which of the following protocols are used for access across a network to a remote host through a terminal window?

    • A. Telnet

    • B. HTTP

    • C. SFTP

    • D. IMAP4

    Correct Answer
    A. A. Telnet
  • 11. 

    A laptop has 1GB of installed memory, and uses shared video memory. If the video card is using  256MB, how much is left for the rest of the system?

    • 1GB

    • 768MB

    • 512MB

    • Cannot determine

    Correct Answer
    A. 768MB
  • 12. 

    A technician receives a phone call from a user that has forgotten his password. What is the  first thing the technician should do?

    • Reset the user's password.

    • Tell the user to write down his password.

    • Give the user the password.

    • Verify the identity of the user.

    Correct Answer
    A. Verify the identity of the user.
  • 13. 

    You have used a maintenance kit on a laser printer and replaced all paper and toner. What is the next  logical step to perform?

    • Clear the maintenance count.

    • Configure the printer’s IP address.

    • Replace the printer’s cable.

    • Adjust the HVPS for -600V.

    Correct Answer
    A. Clear the maintenance count.
  • 14. 

    What should you do first to remove external devices from your laptop?

    • Click the Safely Remove Hardware icon.

    • Click the Remove Hardware Now icon.

    • Unplug the power to the device, and then remove the device.

    • Nothing. Just remove the device.

    Correct Answer
    A. Click the Safely Remove Hardware icon.
  • 15. 

    30. Which of the following protocols rely on DNS for host name resolution?

    • A. TCP/IP

    • B. IPX/SPX

    • C. NetBEUI

    • D. AppleTalk

    Correct Answer
    A. A. TCP/IP
  • 16. 

    46. A user has received an error message, but cannot recollect the exact wording. Where would the technician find out more about the error?

    • A. In System Information.

    • B. On the Internet.

    • C. In Event Viewer.

    • D. In My Documents.

    Correct Answer
    A. C. In Event Viewer.
  • 17. 

    What is the purpose of a DSL filter?

    • It resolves names to IP addresses

    • It blocks MAC addresses

    • It prevents interference between telephones and a DSL service operating on the same line

    • It blocks ports by using an ACL

    Correct Answer
    A. It prevents interference between telephones and a DSL service operating on the same line
  • 18. 

    What is the maximum data transfer rate that USB 2.0 offers?

    • 512 Mbps

    • 480 Mbps

    • 100 Mbps

    • 128 Mbps

    Correct Answer
    A. 480 Mbps
  • 19. 

    All computers on the network are configured with static IP addresses. A Sales representative travels to a customer’s office and complains that he cannot connect to the Internet from his Windows XP laptop and cannot access e-mail when at the customer's premises. What should the technician do?

    • Enable DHCP on the laptop and configure the static IP address in the Alternate Configuration tab of the user's TCP/IP properties.

    • Install a wireless network interface card (NIC).

    • Add the address of the ISP's DNS server to the TCP/IP configuration.

    • Enable Internet Connection Sharing (ICS) on the laptop.

    Correct Answer
    A. Enable DHCP on the laptop and configure the static IP address in the Alternate Configuration tab of the user's TCP/IP properties.
  • 20. 

    17. You have purchased a laptop with internal wireless capability; however, the laptop fails to connect to any wireless network at your office. What is the first thing that you should you check?

    • A. That the latest Service Pack is installed.

    • B. The switch that activates the wireless antenna.

    • C. That the wireless access point is active.

    • D. That the laptop is equipped with a built-in modem.

    Correct Answer
    A. B. The switch that activates the wireless antenna.
  • 21. 

    23. Which of the following tools can you use to correct corrupt file problems or disk errors?

    • A. REGEDIT

    • B. ATTRIB

    • C. CHKDSK

    • D. FDISK

    Correct Answer
    A. C. CHKDSK
  • 22. 

    You turn a computer on but it won’t boot. From inside the case you hear a rhythmic ticking sound.  What is most likely the problem?

    • The hard drive

    • The video card

    • The motherboard

    • The power supply fan

    Correct Answer
    A. The hard drive
  • 23. 

    Which Windows Vista utility can identify spyware and unwanted software?

    • Windows DNS

    • Windows Security Lock

    • Windows Defender

    • Windows Hardening Tool

    Correct Answer
    A. Windows Defender
  • 24. 

    To access Safe Mode during boot, press which key?

    • F8

    • F12

    • Del

    • Alt

    Correct Answer
    A. F8
  • 25. 

    Which one of the following RAID levels uses disk mirroring?

    • RAID-0

    • RAID-5

    • RAID-3

    • RAID-1

    Correct Answer
    A. RAID-1
  • 26. 

    21. A computer has a single hard disk that is formatted with FAT32 and uses the drive letter C. You are assigned the task of formatting the drive with NTFS, but you do not want to lose any data. Which of the following commands should you use?

    • A. format c: /fs:ntfs

    • B. convert c: /fs:ntfs

    • C. fdisk c: /fs:ntfs

    • D. defrag c: -f:ntfs

    Correct Answer
    A. B. convert c: /fs:ntfs
  • 27. 

    22. On an NTFS volume, which of the following options can be used to control the amount of disk space network users can consume?

    • A. Disk Cleanup

    • B. Security Center

    • C. Disk Quotas

    • D. Disk Defragmenter

    Correct Answer
    A. C. Disk Quotas
  • 28. 

    38. A technician maps a network drive for a user. The following day, after the user boots the computer, she cannot see the drive in My Computer. What should you do?

    • A. In Folder Options, select the 'Show hidden files and folders' radio button.

    • B. Remap the drive each time a user logs on.

    • C. Instruct the user to refresh the display.

    • D. Remap the drive and select the 'Reconnect at Logon' check box.

    Correct Answer
    A. D. Remap the drive and select the 'Reconnect at Logon' check box.
  • 29. 

    You receive an e-mail message stating that the domain.com administrator wants to verify the complexity of your login password. The e-mail requires that you send your password in a reply e-mail. What should you do?

    • A. Send the password in a reply but encrypt the e-mail before sending it.

    • B. Inform the Network Administrator about the e-mail message.

    • C. Ignore the request and delete the e-mail message.

    • D. Send a reply message with an encrypted signature attached.

    Correct Answer
    A. B. Inform the Network Administrator about the e-mail message.
  • 30. 

    You are a respected employee in your company. After checking the security logs, it transpires that an attack  was launched on the network and your user account was used. Your boss calls you into the office  and shows you the log, but you deny any involvement and persist in proving your innocence. You  then realise you had a visit from an old colleague that was fired some time back. This person  acquired all the necessary information to perform the attack. What type of attack is this person  performing?

    • Trojan Horse

    • Social engineering

    • Phage Virus

    • Armored Virus

    Correct Answer
    A. Social engineering
  • 31. 

    Just as you can convert FAT volumes to NTFS without losing data (but there is no way back), you  can similarly convert a disk’s type from basic to:

    • Dynamic

    • Active

    • Passive

    • Dedicated

    Correct Answer
    A. Dynamic
  • 32. 

    47. A technician wants to implement WEP (Wired Equivalent Privacy) on the domain.com wireless network. What would users require in order to connect to the access point?

    • A. The password for the Local Administrator account.

    • B. An appropriate IP address.

    • C. The name of the DNS server.

    • D. The correct WEP (Wired Equivalent Privacy) key.

    Correct Answer
    A. D. The correct WEP (Wired Equivalent Privacy) key.
  • 33. 

    14. A user reports that when he types on his laptop, numbers instead of letters appear. What is the reason for this happening?

    • A. The keyboard is faulty.

    • B. The number lock function is turned on.

    • C. The Fn key is turned on.

    • D. The keyboard controller is not seated properly.

    Correct Answer
    A. B. The number lock function is turned on.
  • 34. 

    Which of the following tools can be used to test a power supply? (Choose TWO)

    • A Multimeter

    • A Wire Crimper

    • An Optical Tester

    • Time-Domain Reflectometer

    • Power Supply Tester

    Correct Answer(s)
    A. A Multimeter
    A. Power Supply Tester
  • 35. 

    41. Which of the following preventive maintenance tasks should be performed regularly on a computer that has Internet access?

    • A. Disable the use of cookies.

    • B. Disable all unused features of the web browser.

    • C. Run a virus scan of the hard disk drives.

    • D. Enable the Windows Firewall.

    Correct Answer
    A. C. Run a virus scan of the hard disk drives.
  • 36. 

    What is it called when an attacker makes data to look like it's coming from a legitimate source?

    • Hacking

    • Spoofing

    • Hijacking

    • Multithreading

    Correct Answer
    A. Spoofing
  • 37. 

    A technician is preparing a hard disk for BitLocker Drive Encryption. To encrypt drives and to verify  boot integrity, BitLocker requires at least ______ partitions.

    • One

    • Two

    • Three

    • Five

    Correct Answer
    A. Two
  • 38. 

    You install a single new RIMM memory module, but the computer fails to recognise the newly  installed module. Why is the computer failing to recognise the memory module?

    • The memory is not seated properly.

    • RIMM modules must be installed in pairs.

    • BIOS has not been flashed.

    • The Add Hardware Wizard should be run.

    Correct Answer
    A. RIMM modules must be installed in pairs.
  • 39. 

    You are going to run a network cable in the space above the drop ceiling in your office. What do you  need to use?

    • PVC

    • Coaxial

    • Plenum

    • Fiber-optic

    Correct Answer
    A. Plenum
  • 40. 

    When you install an IDE CD-ROM drive on a computer with a single IDE hard drive on the primary chain already configured as master, which of the following would be the best configuration for the CD-ROM drive?

    • Master on the secondary IDE controller.

    • Slave on the primary IDE controller.

    • Master on the primary IDE controller.

    • Slave on the secondary IDE controller.

    Correct Answer
    A. Master on the secondary IDE controller.
  • 41. 

    19. Jason’s C: drive is filling up. He needs to install a bigger drive and reinstall Windows onto the larger drive, but he’s short on time. Instead, he installs the much larger drive, partitions it into a single simple volume and formats it as NTFS. Instead of giving the new volume a drive letter, he configures it as C:\NEW. We call this feature of Windows:

    • A. ATAPI

    • B. UAC

    • C. BitLocker

    • D. Mount Point

    Correct Answer
    A. D. Mount Point
  • 42. 

    27. A technician has installed a new network printer, but users complain that the printer is printing unusual characters. What should the technician do to resolve this problem?

    • A. Verify the IP address for the printer.

    • B. Restart the spooler service.

    • C. Download and install the latest patches for the operating system.

    • D. Download and install the latest software and drivers for the printer.

    Correct Answer
    A. D. Download and install the latest software and drivers for the printer.
  • 43. 

    32. Which of the following is responsible for resolving a fully qualified domain name to the IP address?

    • A. ARP

    • B. DNS

    • C. DHCP

    • D. WINS

    Correct Answer
    A. B. DNS
  • 44. 

    44. A user account named Test on a Windows XP Professional SP2 computer is a member of a workgroup. A  technician changes the Test account to Limited. Which of the following will the user now be unable to do?

    • A. Browse through the files on the computer

    • B. Send and receive e-mail messages

    • C. Log on to the Internet

    • D. Install programs

    Correct Answer
    A. D. Install programs
  • 45. 

    After installing a 64-bit Windows 7 operating system, you notice you have two ___________  directories.

    • C:\Public

    • C:\Windows

    • C:\Program Files

    • C:\Users

    Correct Answer
    A. C:\Program Files
  • 46. 

    You run the following command on your desktop PC: PING server -t. This results in your system  continuously pinging the classroom server. What keyboard shortcut will stop this endless loop?

    • WIN + L

    • WIN + E

    • CTRL + C

    • CTRL + L

    Correct Answer
    A. CTRL + C
  • 47. 

    Which of the following options are advantages that the NTFS file system has over the FAT file  system? (Select 2 answers.)

    • It is compatible with DOS and Windows 9x dual-boot configurations.

    • It supports larger partition sizes.

    • It can be accessed and modified using many standard DOS disk utilities.

    • It supports compression, encryption, disk quotas, and file ownership.

    Correct Answer(s)
    A. It supports larger partition sizes.
    A. It supports compression, encryption, disk quotas, and file ownership.
  • 48. 

    The electrical power to your office has become unstable and brownouts have become a regular occurrence. Which of the following should you implement to protect your computer from these brownouts?

    • A power conditioner.

    • A surge protector.

    • A generator.

    • An Uninterruptible Power Supply (UPS).

    Correct Answer
    A. An Uninterruptible Power Supply (UPS).
  • 49. 

    A user reports that they have paper jams far too often on their laser printer, but each time they check  there is no jam and there is paper in the tray. Which of the following could be the cause?

    • Faulty static eliminator strip

    • A paper sensor is stuck

    • Faulty fuser assembly

    • Incorrect platen position

    Correct Answer
    A. A paper sensor is stuck

Quiz Review Timeline (Updated): Mar 19, 2022 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 29, 2013
    Quiz Created by
    Philanderson888
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.