A Plus 702 Mock 2

100 Questions | Attempts: 162
Please wait...
Question 1 / 100
0 %
0/100
Score 0/100
1. A friend tells you that they just brought a hard drive enclosure and it came with a USB lead.  The USB lead has two ends to connect into a computer then a small one into the hard drive.  They are just wondering why it has two connectors when it runs fine on one. What is your  reply?
Submit
Please wait...
About This Quiz
A Plus 702 Mock 2 - Quiz

2.
We’ll put your name on your report, certificate, and leaderboard.
2. Social ________ is a process in which an attacker attempts to acquire information about your  network and system by social means, such as talking to people in the organisation.
Submit
3. In Windows 7, Vista and XP, running REGEDT32 actually summons which program?
Submit
4. If Windows won't boot normally, you can reboot into ______ Mode
Submit
5. A technician needs to perform a hardware upgrade on a laptop. He removes the power supply cable. What is the next thing that the technician should remove?
Submit
6. 18. A user complains that the screen on his laptop remains blank when he turns on his laptop. A technician ascertains that the power light comes on and that the laptop does boot up. What should the technician do to enable the display?
Submit
7. A laptop has 1GB of installed memory, and uses shared video memory. If the video card is using  256MB, how much is left for the rest of the system?
Submit
8. What is the minimum number of hard drives that you need to implement RAID level 0?
Submit
9. Angelina is configuring her router to allow her to manage her home PC from her work's network. What feature does she need to enable?
Submit
10. 20. Which of the following commands would you enter at the command prompt in Windows XP Professional Service Pack 2 when you want to defragment the C drive?
Submit
11. 29. Which of the following protocols are used for access across a network to a remote host through a terminal window?
Submit
12. You have used a maintenance kit on a laser printer and replaced all paper and toner. What is the next  logical step to perform?
Submit
13. What should you do first to remove external devices from your laptop?
Submit
14. A technician receives a phone call from a user that has forgotten his password. What is the  first thing the technician should do?
Submit
15. What is the purpose of a DSL filter?
Submit
16. 46. A user has received an error message, but cannot recollect the exact wording. Where would the technician find out more about the error?
Submit
17. 30. Which of the following protocols rely on DNS for host name resolution?
Submit
18. You turn a computer on but it won't boot. From inside the case you hear a rhythmic ticking sound.  What is most likely the problem?
Submit
19. Which Windows Vista utility can identify spyware and unwanted software?
Submit
20. To access Safe Mode during boot, press which key?
Submit
21. What is the maximum data transfer rate that USB 2.0 offers?
Submit
22. All computers on the network are configured with static IP addresses. A Sales representative travels to a customer's office and complains that he cannot connect to the Internet from his Windows XP laptop and cannot access e-mail when at the customer's premises. What should the technician do?
Submit
23. 17. You have purchased a laptop with internal wireless capability; however, the laptop fails to connect to any wireless network at your office. What is the first thing that you should you check?
Submit
24. 23. Which of the following tools can you use to correct corrupt file problems or disk errors?
Submit
25. 38. A technician maps a network drive for a user. The following day, after the user boots the computer, she cannot see the drive in My Computer. What should you do?
Submit
26. Just as you can convert FAT volumes to NTFS without losing data (but there is no way back), you  can similarly convert a disk's type from basic to:
Submit
27. You receive an e-mail message stating that the domain.com administrator wants to verify the complexity of your login password. The e-mail requires that you send your password in a reply e-mail. What should you do?
Submit
28. Which one of the following RAID levels uses disk mirroring?
Submit
29. You are a respected employee in your company. After checking the security logs, it transpires that an attack  was launched on the network and your user account was used. Your boss calls you into the office  and shows you the log, but you deny any involvement and persist in proving your innocence. You  then realise you had a visit from an old colleague that was fired some time back. This person  acquired all the necessary information to perform the attack. What type of attack is this person  performing?
Submit
30. 21. A computer has a single hard disk that is formatted with FAT32 and uses the drive letter C. You are assigned the task of formatting the drive with NTFS, but you do not want to lose any data. Which of the following commands should you use?
Submit
31. 22. On an NTFS volume, which of the following options can be used to control the amount of disk space network users can consume?
Submit
32. 47. A technician wants to implement WEP (Wired Equivalent Privacy) on the domain.com wireless network. What would users require in order to connect to the access point?
Submit
33. Which of the following tools can be used to test a power supply? (Choose TWO)
Submit
34. 14. A user reports that when he types on his laptop, numbers instead of letters appear. What is the reason for this happening?
Submit
35. You install a single new RIMM memory module, but the computer fails to recognise the newly  installed module. Why is the computer failing to recognise the memory module?
Submit
36. You are going to run a network cable in the space above the drop ceiling in your office. What do you  need to use?
Submit
37. 41. Which of the following preventive maintenance tasks should be performed regularly on a computer that has Internet access?
Submit
38. What is it called when an attacker makes data to look like it's coming from a legitimate source?
Submit
39. A technician is preparing a hard disk for BitLocker Drive Encryption. To encrypt drives and to verify  boot integrity, BitLocker requires at least ______ partitions.
Submit
40. After installing a 64-bit Windows 7 operating system, you notice you have two ___________  directories.
Submit
41. 44. A user account named Test on a Windows XP Professional SP2 computer is a member of a workgroup. A  technician changes the Test account to Limited. Which of the following will the user now be unable to do?
Submit
42. You run the following command on your desktop PC: PING server -t. This results in your system  continuously pinging the classroom server. What keyboard shortcut will stop this endless loop?
Submit
43. Which of the following options are advantages that the NTFS file system has over the FAT file  system? (Select 2 answers.)
Submit
44. When you install an IDE CD-ROM drive on a computer with a single IDE hard drive on the primary chain already configured as master, which of the following would be the best configuration for the CD-ROM drive?
Submit
45. 19. Jason's C: drive is filling up. He needs to install a bigger drive and reinstall Windows onto the larger drive, but he's short on time. Instead, he installs the much larger drive, partitions it into a single simple volume and formats it as NTFS. Instead of giving the new volume a drive letter, he configures it as C:\NEW. We call this feature of Windows:
Submit
46. 27. A technician has installed a new network printer, but users complain that the printer is printing unusual characters. What should the technician do to resolve this problem?
Submit
47. 32. Which of the following is responsible for resolving a fully qualified domain name to the IP address?
Submit
48. A user reports that they have paper jams far too often on their laser printer, but each time they check  there is no jam and there is paper in the tray. Which of the following could be the cause?
Submit
49. What is the name of the service that formats print jobs to get them ready for the printer?
Submit
50. Which Windows 7 feature has the sole purpose of keeping the user from running programs that could  pose a potential threat by escalating privileges to that of administrator?
Submit
51. The electrical power to your office has become unstable and brownouts have become a regular occurrence. Which of the following should you implement to protect your computer from these brownouts?
Submit
52. 48. You are a desktop support technician (DST) for IT Support. You are configuring a customer's computer which has two hard drives called HDD00 and HDD01. You want to copy the contents of HDD01 to HDD00 and retain the entire file and folder structure. How would you do this in the most efficient manner possible?
Submit
53. What is the best thing to use to clean a laptop display?
Submit
54. 15. The Security Accounts Manager (SAM) file in Windows 7 can be found in:
Submit
55. On a laser printer, the printed characters on the left side of documents are faint compared to the letters on the right. How can you quickly resolve this problem?
Submit
56. To prevent a computer & components from being damaged by electrostatic discharge while you are  working on it, what should you use? (Select 3 answers.)
Submit
57. By what name is a PC Card also known as?
Submit
58. 16. A user reports that when he plugged his power adapter into his laptop, he saw a spark and now the screen is dim. What would you suspect is the cause of this problem?
Submit
59. A _________ hard drive requires you to set jumpers to match the cabling configuration of the drives  within the PC?
Submit
60. The ________ command can be used to display print and file shares on a PC?
Submit
61. 43. Several users want to make system changes on their Windows XP Professional computers. What would be the best action that the technician should take?
Submit
62. An IT Technician needs to access stored files on a primary partition, on a networked computer named  BETA. The user of that computer has not setup any shared files or folders. Which of the following is  an administrative share?
Submit
63. Which of the following is required to set up a secure wireless connection? (Select 2 answers)
Submit
64. When accessing data, which of the following has the fastest throughput?
Submit
65. 24. Which of the following recovery options are available when booting from the Windows XP installation CD?
Submit
66. 31. Which of the following protocols is used to transmit e-mail between the two e-mail servers?
Submit
67. Spyware differs from other malware in that it:
Submit
68. 28. Users complain that a laser printer with multiple trays kept getting paper jams. To resolve the problem, a technician installed a maintenance kit in the laser printer. What should the technician do next?
Submit
69. 36. If you have an IP address of 192.168.10.10, the default subnet mask is?
Submit
70. You have a computer with the IP address 163.208.199.8. What class is this address?
Submit
71. Which two of the following are steps in drive preparation before its first use?
Submit
72. A user with a tablet computer wants to print directly to printer. Which of the following technologies will allow the user to set up a direct wireless connection to the printer, assuming the printer is correctly equipped?
Submit
73. 45. Where would you find a record of the users that have successfully logged on to a computer?
Submit
74. 49. The best way to secure a wireless network would be to?
Submit
75. Which of the following devices would be hot-swappable on a laptop?
Submit
76. What should you use with a laptop to avoid frequent insertion and removal of external input and  video devices?
Submit
77. What device in a laser printer provides voltages to the corona wires?
Submit
78. 25. When you are logged on to the Recovery Console, which of the following commands can you use to write new Windows boot sector code on a boot partition?
Submit
79. 40. You receive no response when you PING the loopback address 127.0.0.1. What is the MOST probable cause of this problem?
Submit
80. Start > Run > type "mstsc" will do what?
Submit
81. 33. Which IEEE standard provides a wireless solution for network printing?
Submit
82. A preferred protocol to use in place of Telnet, that provides the same functionality, is:
Submit
83. What should you use to clean electronic connectors on expansion cards?
Submit
84. 39. A printer attached to a Windows XP Professional computer is being shared by a workgroup. You must control which users can have access to the printer. How would you access the permissions tab for the printer?
Submit
85. An autoswitching power adapter for a laptop accepts what approximate range of voltages as input?
Submit
86. 34. A network printer is connected to a Fast Ethernet adapter. What would be the maximum network transmission speed to the printer?
Submit
87. You are the technician tasked with upgrading all of the PC cards in the company's laptops to a newer supported Type II PC Card. What is the thickness of the Type II PCMCIA card?
Submit
88. 37. Which of the following is a valid IP address for use on the Internet?
Submit
89. 42. Which additional security measure does Network Address Translation (NAT) provide for computers behind a gateway router?
Submit
90. In Device Manager, a yellow exclamation mark means ________?
Submit
91. 26. You are troubleshooting a NetBIOS name resolution issue. From your A+ training you know that NetBIOS over TCP/IP resolves NetBIOS names to IP addresses. You need to see a list of current NetBIOS sessions and their status, including statistics. Which command do you use?
Submit
92. Microsoft provides a tool for establishing a security baseline and for subsequent evaluations of  security on Windows 2000 and higher Operating Systems with the:
Submit
93. 35. What should you do first if a user complains that he or she cannot access network resources?
Submit
94. What should a technician do to determine the right amperage of the alternating current (AC) adapter for a laptop? (Select 2 answers.)
Submit
95. Which of the following usually can be measured directly by using a multimeter?
Submit
96. When a dot-matrix printer prints, there is always a blank horizontal line in the middle of each line of  output. What is the most likely cause of the problem?
Submit
97. A technician needs to determine which switches for the DEFRAG command he should use to  force defragmentation, even though the free space on a hard disk is low. Which of the following  commands can the technician use? (Choose all that apply).
Submit
98. You are trying to enable Offline Folders within Windows Vista but cannot see the check box to do  so. What might you need to turn off in order the see this option?
Submit
99. Which of the following must you configure on a computer that needs to be connected to the Internet?  (Select 2 answers.)
Submit
100. A Windows Vista machine has an error with the file which controls how the operating system  is started. Which of the following is most likely to be corrupted/missing?
Submit
View My Results
Cancel
  • All
    All (100)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
A friend tells you that they just brought a hard drive enclosure and...
Social ________ is a process in which an attacker attempts to acquire...
In Windows 7, Vista and XP, running REGEDT32 actually summons which...
If Windows won't boot normally, you can reboot into ______ Mode
A technician needs to perform a hardware upgrade on a laptop. He...
18. A user complains that the screen on his laptop remains blank when...
A laptop has 1GB of installed memory, and uses shared video memory. If...
What is the minimum number of hard drives that you need to implement...
Angelina is configuring her router to allow her to manage her home PC...
20. Which of the following commands would you enter at the command...
29. Which of the following protocols are used for access across a...
You have used a maintenance kit on a laser printer and replaced all...
What should you do first to remove external devices from your laptop?
A technician receives a phone call from a user that has forgotten his...
What is the purpose of a DSL filter?
46. A user has received an error message, but cannot recollect the...
30. Which of the following protocols rely on DNS for host name...
You turn a computer on but it won't boot. From inside the case you...
Which Windows Vista utility can identify spyware and unwanted...
To access Safe Mode during boot, press which key?
What is the maximum data transfer rate that USB 2.0 offers?
All computers on the network are configured with static IP addresses....
17. You have purchased a laptop with internal wireless capability;...
23. Which of the following tools can you use to correct corrupt file...
38. A technician maps a network drive for a user. The following day,...
Just as you can convert FAT volumes to NTFS without losing data (but...
You receive an e-mail message stating that the domain.com...
Which one of the following RAID levels uses disk mirroring?
You are a respected employee in your company. After checking the...
21. A computer has a single hard disk that is formatted with FAT32 and...
22. On an NTFS volume, which of the following options can be used to...
47. A technician wants to implement WEP (Wired Equivalent Privacy) on...
Which of the following tools can be used to test a power supply?...
14. A user reports that when he types on his laptop, numbers instead...
You install a single new RIMM memory module, but the computer fails to...
You are going to run a network cable in the space above the drop...
41. Which of the following preventive maintenance tasks should be...
What is it called when an attacker makes data to look like it's...
A technician is preparing a hard disk for BitLocker Drive Encryption....
After installing a 64-bit Windows 7 operating system, you notice you...
44. A user account named Test on a Windows XP Professional SP2...
You run the following command on your desktop PC: PING server -t. This...
Which of the following options are advantages that the NTFS file...
When you install an IDE CD-ROM drive on a computer with a single IDE...
19. Jason's C: drive is filling up. He needs to install a bigger drive...
27. A technician has installed a new network printer, but users...
32. Which of the following is responsible for resolving a fully...
A user reports that they have paper jams far too often on their laser...
What is the name of the service that formats print jobs to get them...
Which Windows 7 feature has the sole purpose of keeping the user from...
The electrical power to your office has become unstable and brownouts...
48. You are a desktop support technician (DST) for IT Support. You are...
What is the best thing to use to clean a laptop display?
15. The Security Accounts Manager (SAM) file in Windows 7 can be found...
On a laser printer, the printed characters on the left side of...
To prevent a computer & components from being damaged by...
By what name is a PC Card also known as?
16. A user reports that when he plugged his power adapter into his...
A _________ hard drive requires you to set jumpers to match the...
The ________ command can be used to display print and file shares on a...
43. Several users want to make system changes on their Windows XP...
An IT Technician needs to access stored files on a primary partition,...
Which of the following is required to set up a secure wireless...
When accessing data, which of the following has the fastest...
24. Which of the following recovery options are available when booting...
31. Which of the following protocols is used to transmit e-mail...
Spyware differs from other malware in that it:
28. Users complain that a laser printer with multiple trays kept...
36. If you have an IP address of 192.168.10.10, the default subnet...
You have a computer with the IP address 163.208.199.8. What class is...
Which two of the following are steps in drive preparation before its...
A user with a tablet computer wants to print directly to printer....
45. Where would you find a record of the users that have successfully...
49. The best way to secure a wireless network would be to?
Which of the following devices would be hot-swappable on a laptop?
What should you use with a laptop to avoid frequent insertion and...
What device in a laser printer provides voltages to the corona wires?
25. When you are logged on to the Recovery Console, which of the...
40. You receive no response when you PING the loopback address...
Start > Run > type "mstsc" will do what?
33. Which IEEE standard provides a wireless solution for network...
A preferred protocol to use in place of Telnet, that provides the same...
What should you use to clean electronic connectors on expansion cards?
39. A printer attached to a Windows XP Professional computer is being...
An autoswitching power adapter for a laptop accepts what approximate...
34. A network printer is connected to a Fast Ethernet adapter. What...
You are the technician tasked with upgrading all of the PC cards in...
37. Which of the following is a valid IP address for use on the...
42. Which additional security measure does Network Address Translation...
In Device Manager, a yellow exclamation mark means ________?
26. You are troubleshooting a NetBIOS name resolution issue. From your...
Microsoft provides a tool for establishing a security baseline and for...
35. What should you do first if a user complains that he or she cannot...
What should a technician do to determine the right amperage of the...
Which of the following usually can be measured directly by using a...
When a dot-matrix printer prints, there is always a blank horizontal...
A technician needs to determine which switches for the DEFRAG command...
You are trying to enable Offline Folders within Windows Vista but...
Which of the following must you configure on a computer that needs to...
A Windows Vista machine has an error with the file which controls how...
Alert!

Back to Top Back to top
Advertisement