CompTIA A+ 220-702 Essentials Practice Test....(Part 1)

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Freddyoca
F
Freddyoca
Community Contributor
Quizzes Created: 5 | Total Attempts: 4,828
| Attempts: 1,395 | Questions: 115 | Updated: Mar 20, 2025
Please wait...
Question 1 / 115
0 %
0/100
Score 0/100
1. After cold booting a computer the system clock displays the wrong date and time. Which of the following is the MOST likely cause of this issue?

Explanation

The CMOS battery is responsible for maintaining the system clock's date and time when the computer is turned off. If the CMOS battery is going bad, it may not be able to hold a charge, causing the system clock to display the wrong date and time after a cold boot. This is the most likely cause of the issue because the other options (hard drive, RAM, video card) do not directly affect the system clock.

Submit
Please wait...
About This Quiz
CompTIA Security Plus Quizzes & Trivia

I will try to do about 5 parts with 100-115 questions each.

2.
We’ll put your name on your report, certificate, and leaderboard.
2. A device is plugged into a computer and a prompt appears that states the device is a hi-speed USB device and is plugged into a non-high speed USB hub. Which of the following explains why this message is appearing?

Explanation

The prompt appears because a USB 2.0 device is plugged into a USB 1.1 port. USB 1.1 ports have a lower data transfer rate compared to USB 2.0 ports, so when a USB 2.0 device is connected to a USB 1.1 port, it will not be able to achieve its full potential speed. This prompt serves as a notification to the user that the device could perform better if it were connected to a USB 2.0 port.

Submit
3. A user installs a laser jet printer on a Windows XP desktop. The user states that Windows XP generic printer drivers were used. When the user prints a document, the pages are printing out with random symbols, letters, and numbers. Which of the following should the technician do?

Explanation

The random symbols, letters, and numbers appearing on the printed documents indicate that the generic printer drivers are not compatible with the laser jet printer. To resolve this issue, the technician should download and install the specific printer drivers provided by the manufacturer. These drivers are designed to work with the specific printer model and will ensure proper communication between the printer and the Windows XP desktop, resulting in correctly printed documents.

Submit
4. Which of the following will happen when a user plugs a USB 1.1 device into a USB 2.0 port?

Explanation

When a user plugs a USB 1.1 device into a USB 2.0 port, the device will operate at the lower speed USB 1.1. This is because USB 2.0 ports are backward compatible with USB 1.1 devices, but they will only operate at the speed of the slower device. In this case, the USB 2.0 port will recognize the USB 1.1 device and adjust its speed accordingly to ensure compatibility.

Submit
5. Which of the following tools can a field technician use to test a faulty power supply?

Explanation

A field technician can use a multimeter to test a faulty power supply. A multimeter is a versatile tool that can measure voltage, current, and resistance. By using the multimeter's probes to make contact with the power supply's terminals, the technician can determine if the power supply is functioning properly or if there are any issues such as a short circuit or insufficient voltage. The multimeter provides accurate readings and allows the technician to troubleshoot and diagnose the problem with the power supply effectively.

Submit
6. Which of the following is an indication a system has become infected by malware?

Explanation

When the browser is redirected from the chosen website, it is a strong indication that the system has become infected by malware. Malware often includes browser hijackers that redirect users to malicious websites or unwanted pages. This can happen when users click on suspicious links or download infected files. The redirection is a tactic used by malware to trick users into visiting harmful websites or to generate revenue through ad clicks. Therefore, this symptom is a clear sign that the system has been compromised by malware.

Submit
7. A laptops LCD is getting scratched by the keyboard when the lid is closed. Which of the following would MOST likely prevent the LCD screen from being damaged further?

Explanation

Rubber bumpers are typically placed on the keyboard side of a laptop lid to provide a cushion between the keyboard and the LCD screen when the lid is closed. If the LCD screen is getting scratched by the keyboard, it suggests that the rubber bumpers have worn out or become damaged. Therefore, replacing the rubber bumpers would most likely prevent further damage to the LCD screen by providing a protective barrier between the keyboard and the screen.

Submit
8. A user reports that every time their machine is powered on a prompt appears to save their settings for the BIOS and clock. Which of the following should the technician try FIRST?

Explanation

The prompt to save BIOS and clock settings upon every power on suggests that the CMOS battery, which provides power to the BIOS chip, may be dead or dying. Replacing the CMOS battery is the first step to try because it is a relatively simple and inexpensive solution that can resolve the issue. Restoring the BIOS to default settings, running a Windows Recovery Disk, or replacing the motherboard would not directly address the problem of the prompt appearing.

Submit
9. Which of the following IP addresses will a technician ping to test the functionality of the network card?

Explanation

The IP address 127.0.0.1 is known as the loopback address and is used to test the functionality of the network card. When a technician pings this address, it sends a signal to the network card to check if it is working properly. This address is often referred to as "localhost" and is used for internal testing purposes.

Submit
10. A technician wants to create a spanned volume on a set of hard drives. Which of the following tools will identify if the drives will support a spanned volume?

Explanation

Disk Management is the correct answer because it is the tool used to manage hard drives and storage devices in Windows operating systems. It allows the technician to view and modify disk partitions and volumes, including creating spanned volumes. By accessing Disk Management, the technician can check if the drives are compatible and have enough free space to create a spanned volume. The other options, System Information, Device Manager, and Task Manager, do not have the specific functionality to identify if the drives will support a spanned volume.

Submit
11. Which of the following is accomplished by running the disk defragmenter on a hard drive?

Explanation

Running the disk defragmenter on a hard drive ensures that file sectors are contiguous. When files are stored on a hard drive, they can become fragmented, meaning that different parts of the file are stored in different locations on the disk. This can slow down the system's performance as the computer has to search for all the fragments of a file when it needs to access it. Disk defragmentation rearranges the fragmented files and puts them back together in contiguous sectors, improving the efficiency and speed of accessing files on the hard drive.

Submit
12. Which of the following would be the correct address to use with the PING command when testing the functionality of a NIC?

Explanation

The correct address to use with the PING command when testing the functionality of a NIC is 127.0.0.1. This address is known as the loopback address and it refers to the local host or the computer itself. Pinging this address allows you to check if the network interface card (NIC) is functioning properly by sending a test packet to the local host and receiving a response.

Submit
13. Which of the following is the MOST effective method of retrieving a screw which has fallen into a computer case?

Explanation

Using an extension magnet to access the screw is the most effective method of retrieving a screw that has fallen into a computer case. This method allows for precise and controlled retrieval of the screw without causing any damage to the internal components of the computer. The magnet can attract and securely hold the screw, making it easier to retrieve from hard-to-reach areas inside the case.

Submit
14. A technician needs to delete an infected file. The system says the file is in use every time the technician attempts to delete the file. Which of the following will be the BEST way to delete the file?

Explanation

Booting into Safe Mode with Command Prompt allows the technician to start the computer with only essential drivers and services, minimizing the chances of the infected file being in use. This will provide a better chance of successfully deleting the file without any interference from other processes or malware.

Submit
15. Which of the following devices can assist a technician in troubleshooting computers that will not start?

Explanation

A POST card, or Power-On Self-Test card, is a device that can assist a technician in troubleshooting computers that will not start. It is a diagnostic tool that plugs into a motherboard and provides error codes or beep codes that can indicate the source of the problem. By analyzing these codes, the technician can identify hardware or software issues preventing the computer from starting up properly. This allows for a more efficient and targeted troubleshooting process, saving time and effort in identifying and resolving the problem.

Submit
16. A kiosk computer requires a CD-ROM to be in the drive in order for a program to function properly, but it keeps failing to boot when restarted. Which of the following will correct this?

Explanation

Properly configuring the BIOS settings can correct the issue of the kiosk computer failing to boot when restarted. The BIOS settings control the basic hardware operations of the computer, including the boot order. By configuring the BIOS settings to prioritize the CD-ROM drive as the first boot device, the computer will be able to boot from the CD-ROM and run the program properly.

Submit
17. Which of the following multimeter modes would be used to MOST accurately test the functionality of the black and red wires on a Molex connector of an in use power supply?

Explanation

Voltage mode would be used to accurately test the functionality of the black and red wires on a Molex connector of an in-use power supply. Voltage mode measures the electrical potential difference between two points, which is crucial for determining if there is a proper flow of electricity through the wires. By measuring the voltage, one can assess if the wires are functioning correctly and delivering the expected power. Continuity mode checks for a complete path for the current to flow, while resistance mode measures the resistance in a circuit. Calibrate mode is used to adjust the accuracy of the multimeter itself.

Submit
18. Which of the following is the speed a 1600MHz FSB processor will operate at if the FSB of the motherboard is 1333MHz?

Explanation

The speed at which a 1600MHz FSB processor will operate is determined by the FSB of the motherboard. In this case, the FSB of the motherboard is 1333MHz, so the processor will operate at the same speed as the motherboard, which is 1333MHz.

Submit
19. A mirrored set is another name for which of the following?

Explanation

A mirrored set is another name for RAID 1. RAID 1 is a type of data storage technology that duplicates data across two or more drives, creating an exact copy or mirror of the data. This provides redundancy and improves data protection, as if one drive fails, the data can still be accessed from the mirror drive.

Submit
20. A technician reboots a computer and receives the error, NTLDR is missing, press any key to restart. Which of the following is a MOST likely cause of this error?

Explanation

The error message "NTLDR is missing" indicates that the NTLDR (NT Loader) file, which is a crucial component of the Windows operating system, cannot be found. This error is commonly caused by a corrupt or missing operating system file. Restarting the computer or replacing the RAM or video card would not resolve this issue.

Submit
21. A laser printer is reporting a paper jam in tray two, but there is no paper stuck anywhere in the path. Which of the following is the MOST likely cause?

Explanation

The pickup roller is responsible for picking up the paper from the tray and feeding it into the printer. If the pickup roller is worn out or damaged, it may not be able to properly grip the paper, resulting in a paper jam error even when there is no paper stuck in the path. Replacing the pickup roller should resolve the issue and allow the printer to function properly.

Submit
22. Which of the following is an example of disk duplexing or disk mirroring?

Explanation

RAID 1 is an example of disk duplexing or disk mirroring. In RAID 1, two disks are used to create an exact copy or mirror of the data on one disk onto the other. This provides redundancy and fault tolerance, as if one disk fails, the data can still be accessed from the other disk. RAID 1 offers high data availability and read performance, but it has a lower write performance compared to other RAID levels.

Submit
23. A technician needs to add an expansion card to a computer. The documentation with the card states it requires a PCI x4 slot. The computer has PCI x1 and PCI x16 slots available. Which if the following should the technician do?

Explanation

not-available-via-ai

Submit
24. A user is attempting to connect a laptop to a TV using an HDMI connector. The user reports the video works properly but there is no sound. Which of the following could be the MOST likely cause?

Explanation

The most likely cause for the user's issue is that the HDMI audio service has not been selected. This means that the laptop is not sending the audio signal through the HDMI connection to the TV. The video works properly because the video signal is being transmitted, but the audio is not being sent. By selecting the HDMI audio service, the user should be able to resolve the issue and get sound from the TV.

Submit
25. Which of the following ports should be forwarded on the firewall to make an internal web server accessible from the Internet?

Explanation

Port 80 should be forwarded on the firewall to make an internal web server accessible from the Internet. Port 80 is the default port for HTTP (Hypertext Transfer Protocol) which is used for transmitting web pages and other web content. By forwarding port 80 on the firewall, incoming HTTP requests from the Internet can be directed to the internal web server, allowing users to access the website hosted on that server.

Submit
26. A technician needs to upgrade memory on a laptop with one available memory slot. The type and amount of memory has been confirmed to be correct. Once the new memory is added, the BIOS reports the original memory size. Which of the following is the NEXT step to perform?

Explanation

The correct answer is to reseat the laptop memory. Reseating the memory means removing it from the slot and then reinserting it firmly back into the slot. This can help ensure that the memory module is properly connected and recognized by the BIOS. By reseating the memory, it may resolve any connectivity issues that are causing the BIOS to report the original memory size instead of the upgraded size. This step should be performed before considering other options such as replacing all of the laptop's memory or replacing the motherboard.

Submit
27. A technician is dispatched to a malware infected system. Upon arrival, the technician notices the malwares pop-up on the screen. Which of the following boot methods would the technician utilize?

Explanation

The technician would utilize the "Reboot in Safe Mode" boot method in order to address the malware infection. Safe Mode is a diagnostic mode in which the operating system only loads essential drivers and services, allowing the technician to troubleshoot and remove the malware without interference from unnecessary processes or applications.

Submit
28. Company policy does not allow users to use dial-up connections. A new shipment of laptops contains built-in modems. Which of the following is the BEST way for the technician to setup the laptop to prevent the use of the modem?

Explanation

The best way for the technician to prevent the use of the modem is to use Device Manager to disable it. This will effectively deactivate the modem and prevent any connection through dial-up.

Submit
29. A user states that when a USB drive is plugged into their computer, the drive is not recognized. The drive has been used on other computers without any issues. Which of the following is the MOST likely cause?

Explanation

The most likely cause for the USB drive not being recognized on the user's computer is that the USB BIOS setting is not configured correctly. The BIOS (Basic Input/Output System) is responsible for managing hardware settings, and if the USB setting is not configured properly, the computer may not be able to detect and recognize the USB drive. This can happen if the USB setting is disabled or set to a different mode in the BIOS. Reinstalling the operating system, a dead CMOS battery, or incorrect formatting of the USB drive are less likely to be the cause of the issue.

Submit
30. New memory has been installed into a PC. The PC fails to POST after the memory is installed. The manufacturers website states that the motherboard supports the new memory. Which of the following may resolve the problem?

Explanation

Updating the BIOS may resolve the problem because it ensures that the motherboard has the latest firmware installed, which can provide compatibility with the new memory. By updating the BIOS, the motherboard will be able to properly recognize and utilize the new memory, allowing the PC to successfully POST.

Submit
31. Which of the following file extensions will initialize the program installation process in Microsoft Windows?

Explanation

The file extension *.EXE is used to initialize the program installation process in Microsoft Windows. This file extension stands for "executable" and it contains the necessary instructions for the operating system to run the program. When a user double-clicks on an *.EXE file, it triggers the installation process, allowing the program to be installed and run on the computer.

Submit
32. A users system is infected with a worm and has propagated to 30 company systems so far. Which of the following is the FIRST step the technician should take before attempting to remove the worm from the customers system?

Explanation

The first step the technician should take before attempting to remove the worm from the customer's system is to disconnect the network cable from the user's system. This is important because it will isolate the infected system from the network, preventing the worm from spreading further to other company systems. By disconnecting the network cable, the technician can ensure that the worm does not have any external communication or access to other systems, allowing for a more controlled and effective removal process.

Submit
33. A laptop is received for repair indicating that the screen is very dim. The technician has confirmed that it is a hardware issue. Which of the following parts should be replaced FIRST?

Explanation

The LCD inverter should be replaced first. The LCD inverter is responsible for providing power to the backlight of the LCD panel, which controls the brightness of the screen. If the screen is very dim, it indicates a problem with the backlight, and replacing the LCD inverter is the logical first step in resolving the issue.

Submit
34. A user requires more storage space on their computer. After a technician installs a second IDE drive in the computer, the system will not recognize that there are any hard drives installed. Which of the following is the MOST likely cause of the problem?

Explanation

The most likely cause of the problem is that the jumpers on both drives are set to the master position. When two IDE drives are installed in a computer, one should be set to master and the other to slave. If both drives are set to master, the computer will not recognize them correctly, resulting in the system not recognizing any hard drives installed.

Submit
35. Which of the following should be installed to support Gigabit Ethernet within a home network?

Explanation

To support Gigabit Ethernet within a home network, the appropriate installation would be 1000BaseT. This is because 1000BaseT is a standard for Gigabit Ethernet over twisted pair copper wiring, which is commonly used in home networks. The other options listed, 10Base2 and 100Base2, are both older standards for Ethernet that do not support Gigabit speeds. 100BaseT is a Fast Ethernet standard, which also does not support Gigabit speeds. Therefore, 1000BaseT is the correct choice for supporting Gigabit Ethernet within a home network.

Submit
36. Which of the following commands allows the technician to copy subdirectories from the command prompt?

Explanation

XCOPY is the correct answer because it is a command prompt command that allows the technician to copy not only files but also entire directories and subdirectories. XCOPY stands for "extended copy" and it provides more functionality compared to the basic COPY command. It allows for the copying of multiple files and directories, including all their subdirectories, with various options for customization. Therefore, XCOPY is the appropriate command for copying subdirectories from the command prompt.

Submit
37. Which of the following access levels allows a user to perform normal day to day work with their own files but does not allow them to change system files or computer performance?

Explanation

The access level that allows a user to perform normal day to day work with their own files but does not allow them to change system files or computer performance is "User." This access level typically grants users the necessary permissions to create, modify, and delete their own files and folders, as well as perform regular tasks on the computer. However, it restricts their ability to make changes to system files or alter the overall performance of the computer, ensuring system stability and security.

Submit
38. When doing a clean installation, which of the following is the default location for System Files in Windows XP?

Explanation

The default location for System Files in Windows XP is C:\Windows\system32\. This directory contains important system files and libraries that are necessary for the operating system to function properly. Storing these files in a separate directory helps to organize and manage them effectively.

Submit
39. Which of the following is the default HTTPS port?

Explanation

The default HTTPS port is 443. HTTPS (Hypertext Transfer Protocol Secure) is the secure version of HTTP, where data is encrypted and secure communication is established between the client and the server. Port 443 is specifically designated for HTTPS traffic, ensuring that the data transmitted over this port is encrypted and protected from unauthorized access.

Submit
40. In Windows Vista, a users documents can be stored on a drive other than the default C drive location by changing the:

Explanation

In Windows Vista, the location of a user's documents can be changed by modifying the documents folder location in the folders properties. This means that users can choose to store their documents on a drive other than the default C drive. By accessing the properties of the documents folder, users can specify a different location where their documents will be stored. This allows for flexibility in organizing and managing files, as users can choose a drive that has more storage space or is better suited for document storage.

Submit
41. Which of the following could cause an NTLDR error on reboot?

Explanation

A corrupt Boot.ini file can cause an NTLDR error on reboot. The Boot.ini file is a crucial system file that contains information about the operating system and its startup options. If this file becomes corrupted or missing, the system may fail to locate the NTLDR (NT Loader) file, which is responsible for loading the operating system. As a result, the system will display an error message indicating the NTLDR error.

Submit
42. A technician needs to get a quick overview of a computer. Which of the following tools will BEST provide the overview required?

Explanation

System Information is the best tool to provide a quick overview of a computer. It provides detailed information about the hardware and software components of the system, including the operating system version, processor, memory, storage, and installed software. This tool allows the technician to quickly gather essential information about the computer without having to navigate through various menus or windows. Performance Monitor, Task Manager, and Device Manager are useful for monitoring and managing specific aspects of the computer, but they do not provide the comprehensive overview that System Information does.

Submit
43. A user has a server with Windows 2008 Server, a desktop, and a laptop with Windows 7 in the network. They want to be able to log into the server from the laptop while at home. Which of the following would be the BEST solution?

Explanation

Enabling remote access on both the server and the clients would allow the user to log into the server from the laptop while at home. This would enable them to access the server's resources and perform necessary tasks remotely without physically being present at the server location. This solution would provide the required flexibility and convenience for the user to connect to the server from any location.

Submit
44. Which of the following is the default SMTP port?

Explanation

The default SMTP (Simple Mail Transfer Protocol) port is 25. SMTP is used for sending emails over the internet, and port 25 is the standard port for SMTP communication.

Submit
45. A client can no longer print from their computer to the default printer. The client successfully prints a test page directly from the printer. The printers queue shows the job ready to print. Which of the following is the BEST recommendation that the technician can make?

Explanation

The best recommendation that the technician can make is to restart the print spooler service. This is because the client is able to print a test page directly from the printer, indicating that the printer itself is functioning properly. However, the fact that the job is not being printed from the computer suggests that there may be an issue with the print spooler service, which manages print jobs on the computer. Restarting the service can help resolve any potential issues and allow the client to print again.

Submit
46. Which of the following contains the user profile directory for Microsoft Windows 2000 and XP?

Explanation

The user profile directory for Microsoft Windows 2000 and XP is located in the "Documents and Settings" folder. This folder contains individual user profiles, including user-specific settings, documents, and application data.

Submit
47. Which of the following is used to test all computer hardware before installing an operating system?

Explanation

A POST card is used to test all computer hardware before installing an operating system. POST stands for Power-On Self-Test, which is a diagnostic testing process that occurs during the computer's boot-up sequence. The POST card is a hardware device that plugs into the computer's motherboard and provides real-time diagnostic information about the hardware components. It helps to identify any errors or issues with the hardware before proceeding with the operating system installation. This ensures that the computer is in a stable and functional state before installing the operating system.

Submit
48. A technician is renaming files on a PC from a command prompt and is currently in the root of drive C:. Which of the following commands should the technician use to move to a different directory?

Explanation

The technician should use the "CD" command to move to a different directory. "CD" stands for "Change Directory" and allows the user to navigate to a different directory or folder within the file system.

Submit
49. A technician upgraded a motherboard and CPU. The computer will not POST under the assembled configuration. Which of the following would be the BEST place to start troubleshooting?

Explanation

The best place to start troubleshooting in this scenario would be to ensure that the RAM is correctly seated. If the RAM is not properly seated in its slots, it can cause the computer to fail to power on and display any output. By checking and reseating the RAM, the technician can eliminate this potential issue and move on to other troubleshooting steps if necessary.

Submit
50. Which of the following IP addresses would MOST likely be the default gateway for 10.1.16.184?

Explanation

The default gateway is the IP address of the router that connects a local network to the internet. In this case, the default gateway for the IP address 10.1.16.184 would most likely be 10.1.16.1, as it is in the same network subnet (10.1.16.x). The other options, 10.1.16.254, 10.10.144.1, and 105.24.133.1, are not in the same network subnet and therefore would not be the default gateway for 10.1.16.184.

Submit
51. A technician is going to use an extension magnet to pick up a screw dropped inside a computer case. Which of the following MUST be done before the technician attempts to do this?

Explanation

Before attempting to use an extension magnet to pick up a screw inside a computer case, it is essential to unplug the power cord. This is necessary to prevent any possible shorts or electrical accidents that could occur while the technician is working inside the case. By disconnecting the power source, the technician ensures their safety and minimizes the risk of damaging the computer components or causing any electrical malfunctions.

Submit
52. Which of the following would a technician MOST likely use after terminating an Ethernet cable?

Explanation

After terminating an Ethernet cable, a technician would most likely use a cable tester. This device is used to check the continuity and proper functioning of the cable connections. It can identify any faults or issues with the cable, such as shorts or open circuits, ensuring that the cable is properly terminated and ready for use. A multimeter is used to measure voltage, resistance, and current, but it is not specifically designed for testing cables. Extension magnets are used to retrieve metallic objects from hard-to-reach places, and a toner probe is used for tracing and identifying cables in a network.

Submit
53. Which of the following is the difference between a stop error (e.g. stop C0021xxx) and a Dr. Watson error?

Explanation

A stop error, also known as a blue screen, refers to a situation where the operating system encounters a critical error and cannot recover, resulting in a complete system failure. This error is displayed as a blue screen with error codes and can force the system to restart. On the other hand, a Dr. Watson error occurs before the Windows GUI (Graphical User Interface) appears and is often related to issues with the graphics adaptor or memory chip. It does not cause a complete system failure like a stop error.

Submit
54. Which of the following is the default directory for User Profiles in Windows XP?

Explanation

The correct answer is "C:\Documents and Settings\". This is the default directory for User Profiles in Windows XP. It is where user-specific data and settings are stored for each individual user on the computer.

Submit
55. A technician is called to troubleshoot a computer that is giving a non-system disk error. Which of the following is the MOST likely cause of the issue?

Explanation

The most likely cause of the non-system disk error is that there is a disk in the floppy drive. This error typically occurs when the computer is trying to boot from a non-bootable disk, such as a floppy disk, instead of the hard drive where the operating system is installed. By removing the disk from the floppy drive, the technician can resolve the issue and allow the computer to boot from the correct drive.

Submit
56. A system administrator has disabled USB ports after experiencing several virus outbreaks. A user needs to transfer several extremely large work related files from their home desktop computer to their work desktop computer. Which of the following will allow the user to transfer the needed files?

Explanation

An IEEE-1394 device, also known as FireWire or iLink, is a high-speed data transfer technology that allows for fast and efficient file transfers. Unlike USB ports, which have been disabled, IEEE-1394 ports may still be enabled on the work desktop computer, allowing the user to connect their home desktop computer and transfer the large work-related files.

Submit
57. A laser printer keeps printing out crumpled pages from the third tray. Which of the following is the MOST likely explanation?

Explanation

The crumpled pages from the third tray indicate that there is an issue with the pickup rollers. Pickup rollers are responsible for feeding the paper from the tray into the printer. If they are worn out or damaged, they may not be able to grip the paper properly, causing it to crumple. Replacing the pickup rollers should resolve the problem and ensure smooth paper feeding.

Submit
58. When attempting to check the DHCP status of a client machine, which of the following commands is the BEST option to use?

Explanation

The best option to use when attempting to check the DHCP status of a client machine is "IPCONFIG /all". This command displays detailed configuration information for all network interfaces on the machine, including the DHCP status. It provides information such as the IP address, subnet mask, default gateway, DNS servers, and DHCP lease information. This command is commonly used to troubleshoot network connectivity issues and verify DHCP settings.

Submit
59. Which of the following is applicable when attempting to upgrade an older PC that currently only has USB 1.1 to USB 2.0?

Explanation

When attempting to upgrade an older PC that currently only has USB 1.1 to USB 2.0, the applicable solution is to add a USB 2.0 expansion card. This will allow the PC to have USB 2.0 ports, which provide faster data transfer speeds compared to USB 1.1. Changing the legacy device settings in the BIOS or using an IEEE 1394 adapter are not relevant solutions in this case. A USB 1.1 to 2.0 adapter may not provide the desired upgrade in terms of speed and functionality.

Submit
60. A technician wants to verify a remote printer that has been power cycled is back online. The technician would use which of the following commands and switch?

Explanation

The technician would use the "ping -t" command and switch to verify if the remote printer is back online. The "ping" command is used to send a network request to a specific IP address or domain name and receive a response back. The "-t" switch is used to continuously ping the target until it is manually stopped. By using this command, the technician can check if the remote printer is responding to network requests, indicating that it is online and operational.

Submit
61. A technician is able to connect to the Internet but cannot connect to a remote machine through Remote Desktop in Windows XP. Each time the technician attempts to connect to a remote location, the software times out. Which of the following is the MOST likely problem?

Explanation

The most likely problem in this scenario is that the port forwarding settings are not correct. Port forwarding is a technique used to allow external devices to connect to specific ports on a network. If the technician is able to connect to the internet but cannot connect to a remote machine through Remote Desktop, it suggests that the necessary ports for Remote Desktop are not properly forwarded. This could be due to incorrect configuration or settings in the router or firewall.

Submit
62. Which of the following is the correct path to disable a service in Windows XP?

Explanation

The correct path to disable a service in Windows XP is through Control Panel > Administrative Tools > Services. In the Services window, you can find a list of all the services running on your computer. From there, you can select the service you want to disable, right-click on it, and choose "Properties". In the Properties window, you can change the startup type to "Disabled" to prevent the service from starting automatically.

Submit
63. A computer is generating a missing NTLDR error. From the Recovery Console, which of the following commands would BEST resolve this issue?

Explanation

FIXMBR is the best command to resolve the missing NTLDR error. NTLDR (NT Loader) is a critical system file used by Windows operating systems to start the system. If it is missing or corrupted, the computer will not be able to boot properly. FIXMBR command is used to repair the Master Boot Record (MBR) of the system, which contains important information for the boot process. By fixing the MBR, it can restore the NTLDR file and resolve the error. FORMAT, DISKPART, and FDISK /MBR commands are not specifically designed to fix the NTLDR error.

Submit
64. If a technician was going to test connectivity on port 25, which of the following application type is being checked?

Explanation

The correct answer is Mail because port 25 is commonly used for SMTP (Simple Mail Transfer Protocol), which is responsible for sending and receiving email messages. By testing connectivity on port 25, the technician is specifically checking the functionality of the email application.

Submit
65. A company needs network access to 50 computers transferring large amounts of data to various servers, all located within a single room. Which of the following recommendations is MOST suitable for this situation?

Explanation

In this situation, where there are 50 computers transferring large amounts of data to various servers in a single room, the most suitable recommendation is to use switched full-duplex connections. Switched full-duplex connections provide dedicated bandwidth for each computer, allowing them to transmit and receive data simultaneously without any collisions or interruptions. This ensures efficient and high-speed data transfer between the computers and servers, making it the best option for this scenario.

Submit
66. A laptop LCD screen needs to be replaced. Which of the following tools would be BEST used to open the case?

Explanation

A plastic shim would be the best tool to open the case of a laptop LCD screen because it is less likely to cause damage to the delicate components inside. Using a flathead screwdriver or metal shim could potentially scratch or puncture the screen or other internal parts. Pliers would not be suitable for this task as they are not designed for opening cases.

Submit
67. A technician is installing an IDE hard drive in a SATA hard drive workstation. When the computer is booted up the IDE hard drive does not show up in the operating system. Which of the following is the MOST likely cause?

Explanation

The most likely cause for the IDE hard drive not showing up in the operating system is that the primary controller BIOS setting is incorrect. The BIOS controls the basic functions of the computer and if the setting for the primary controller is not configured properly, it can prevent the operating system from recognizing the IDE hard drive. This can be resolved by accessing the BIOS settings and ensuring that the primary controller is set correctly.

Submit
68. A technician installs and tests a new program on a computer using an administrative account. When a user runs the program, it fails to keep configuration changes the user makes. Which of the following is the MOST likely cause of the problem?

Explanation

The most likely cause of the problem is that the software requires the user to be an administrator. Since the technician installed and tested the program using an administrative account, it is possible that the program has certain features or functionality that can only be accessed or modified by an administrator. Therefore, when a regular user runs the program and makes configuration changes, the program fails to keep those changes because the user does not have the necessary administrative privileges.

Submit
69. When installing a wireless access point, which of the following should the technician perform FIRST?

Explanation

When installing a wireless access point, the technician should first change the default password. This is important for security purposes as leaving the default password unchanged makes it easier for unauthorized individuals to gain access to the access point. By changing the default password, the technician ensures that only authorized individuals can access and configure the wireless access point.

Submit
70. A laptop is going into standby mode unexpectedly. Which of the following hardware components is MOST likely causing the issue?

Explanation

The LCD cutoff switch is most likely causing the laptop to go into standby mode unexpectedly. The cutoff switch is responsible for detecting whether the laptop lid is closed or open. If the switch is faulty or stuck, it may send incorrect signals to the laptop, causing it to enter standby mode even when the lid is open.

Submit
71. Which of the following is correct for dual band routers?

Explanation

Dual band routers allow for the simultaneous transmission of 802.11n at both 5.8GHz and 2.4GHz frequencies. This means that the router can support devices that are compatible with either of these frequencies, allowing for greater flexibility and improved performance. By transmitting on both frequencies simultaneously, the router can provide a more stable and reliable connection, as well as better coverage throughout the network. This makes dual band routers a popular choice for homes and offices that have multiple devices and require a strong and consistent Wi-Fi signal.

Submit
72. A user is browsing to a newly created internal site called www.comptia.org . After putting in credentials the page comes up blank. Which of the following is MOST likely the cause?

Explanation

The most likely cause for the blank page after entering credentials on the newly created internal site is that a proxy exception has not been configured. When a user accesses a website through a proxy server, the proxy server may block certain sites by default. In this case, since the internal site is newly created, it is possible that the proxy server is blocking access to it. By configuring a proxy exception specifically for the new site, the user will be able to access it without any issues.

Submit
73. Which of the following commands will connect to and map a shared drive from a remote computer?

Explanation

The correct answer is NET USE. The NET USE command is used to connect to and map a shared drive from a remote computer. This command allows users to access files and folders on a network share by assigning a drive letter to the shared resource. The TRACERT command is used to trace the route that packets take to reach a destination, the IPCONFIG command is used to display the IP configuration of a network interface, and the NSLOOKUP command is used to query DNS servers for information about domain names.

Submit
74. Which of the following is the default location for temp files in Windows 7?

Explanation

The default location for temp files in Windows 7 is C:\Windows\Temp.

Submit
75. A technician has booted Windows XP Professional to the command line and needs to view a text file on the hard drive. Which of the following tools will allow this?

Explanation

The TYPE command is used to display the contents of a text file on the command line in Windows XP Professional. This command allows the technician to view the text file without opening any additional applications or programs.

Submit
76. A technician needs to plug a network cable into an inactive network drop in a user s cubicle. Which of the following will allow the technician to find the correct drop in the network room to make the port hot?

Explanation

A toner probe is a tool used to trace and identify network cables. It consists of two parts - a tone generator and a probe. The tone generator is connected to the network drop in the user's cubicle, and it sends a signal through the cable. The technician can then use the probe in the network room to trace the signal and find the correct drop. This allows the technician to identify the specific network drop that needs to be activated, making the port hot.

Submit
77. A laser printer has a blank streak along one edge of each page but is otherwise printing normally. Which of the following is the MOST likely reason for this?

Explanation

The fuser is responsible for melting the toner onto the paper, and if it is damaged, it may not be able to properly fuse the toner onto the paper in that particular area, resulting in a blank streak. The other options, such as rebooting the printer, having thick paper, or a low toner cartridge, would not typically cause a specific blank streak along one edge of each page.

Submit
78. A technician discovers that RAM modules are overheating. Which of following is best practice in this situation?

Explanation

Installing heat sinks on the RAM modules is the best practice in this situation because heat sinks help to dissipate the heat generated by the RAM modules, preventing them from overheating. This can improve the overall performance and stability of the system. Installing additional CPU fans may help with overall system cooling, but it may not specifically address the overheating issue of the RAM modules. Replacing the RAM slots is not necessary unless they are physically damaged. Installing a heat sink on the chipset driver is not relevant to the overheating issue of the RAM modules.

Submit
79. A user reports their laptop computer can no longer connect to a server. The computer works correctly in a different office. Which of the following tools would be used to troubleshoot this issue?

Explanation

A cable tester would be used to troubleshoot this issue because it can help identify if there is a problem with the network cable connecting the laptop to the server. By using the cable tester, the technician can check for any breaks or faults in the cable that may be causing the connection issue. This tool can help pinpoint the specific problem and determine if the cable needs to be replaced or repaired.

Submit
80. A user installs a PostScript driver for a printer that supports only PCL. Which of the following is the MOST likely result?

Explanation

When a user installs a PostScript driver for a printer that only supports PCL (Printer Control Language), the printer will not be able to understand the PostScript commands sent by the driver. As a result, the printer will print garbage or unreadable characters instead of the expected output. This is because the printer lacks the necessary capabilities to interpret and process the PostScript language.

Submit
81. For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? (Select TWO)

Explanation

Disabling the SSID from broadcasting prevents the wireless network from being visible to unauthorized users, making it more difficult for them to discover and connect to the network. Changing the default admin password adds an extra layer of security by preventing unauthorized access to the network settings and configuration.

Submit
82. A sound card on the back of a PC is emitting a red, laser-type light. Which of the following explains this occurrence?

Explanation

The correct answer is that the sound card's optical plug is not connected. This explanation suggests that the red, laser-type light is emitted when the optical plug is not properly connected, indicating a connectivity issue rather than a defect or failure of the sound card.

Submit
83. In Windows XP, how can a user change the programs that run at startup? (Select TWO).

Explanation

A user can change the programs that run at startup in Windows XP by adding or removing programs from the startup folder. This folder contains shortcuts to programs that are automatically launched when the computer starts up. Additionally, the user can run msconfig (Microsoft System Configuration Utility) and configure startup programs. This utility allows the user to enable or disable programs that are set to run at startup, providing more control over the startup process.

Submit
84. A Sales Manager is a member of both the Sales group and the Managers group. The Sales Manager is attempting to update a file but is getting an Access Denied error. The file is secured through NTFS. The Sales group has the NTFS permissions: Read C Allow List Folder Contents C Allow Modify C Deny The Managers group has the NTFS permission: Full Control C Allow Why is the Manager receiving this error?

Explanation

The Manager is receiving this error because the Sales group, of which the Manager is a member, has the NTFS permission "Deny" for modifying the file. Even though the Managers group has the NTFS permission "Full Control Allow", the "Deny" permission takes precedence and overrides the "Allow" permission. Therefore, the Manager is denied access to update the file.

Submit
85. Which of the following laptop components are FRUs? (Select TWO).

Explanation

The correct answer is hard drive and memory. FRU stands for Field Replaceable Unit, which refers to components that can be easily replaced by the user or a technician without having to send the entire device for repair. Both the hard drive and memory modules in a laptop can be easily replaced by the user or a technician, making them FRUs. The sound card, modem, and video card, on the other hand, are not typically considered as FRUs as they require more technical expertise and may involve disassembling the laptop to replace them.

Submit
86. Which of the following is the access level of a user that belongs to both the Administrators and Users groups?

Explanation

A user that belongs to both the Administrators and Users groups would have the access level of an Administrator. This is because the Administrators group typically has the highest level of privileges and permissions in a system, allowing them to perform administrative tasks and make changes to the system settings. Being a member of both groups would grant the user all the privileges and permissions associated with the Administrator group.

Submit
87. Which of the following is the MOST important factor when using offline files on a networked computer?

Explanation

The size of the computer hard drive is the most important factor when using offline files on a networked computer because offline files are stored locally on the computer's hard drive. The larger the hard drive, the more offline files can be stored, allowing for greater accessibility and productivity when the computer is not connected to the network.

Submit
88. A laser printer keeps displaying, Paper Jam C Front Door. It does not matter which tray or paper type the printer is using. Which of the following is the MOST likely reason why the printer is having this issue?

Explanation

The most likely reason why the printer is displaying "Paper Jam C Front Door" is that something is stuck inside the pickup assembly. This could be causing the printer to have difficulty picking up the paper properly, resulting in paper jams. Replacing the fuser assembly, pickup rollers, or toner cartridge would not directly address this issue.

Submit
89. A technician needs to change the process priority of a background program. Which of the following tools is BEST for performing this function?

Explanation

Task Manager is the best tool for changing the process priority of a background program. Task Manager allows the technician to view and manage all running processes on the computer, including background programs. It provides options to change the priority of a process, allowing the technician to allocate more system resources to the background program if needed. MSCONFIG is used for managing startup programs, Computer Management is used for managing system settings and resources, and Task Scheduler is used for scheduling tasks to run at specific times.

Submit
90. A technician is replacing a processor that is attached parallel to the motherboard. Which of the following processor types is needed?

Explanation

The technician is replacing a processor that is attached parallel to the motherboard. The Pin grid array processor is the correct type needed in this case. Pin grid array processors have an array of pins on the bottom that fit into corresponding holes on the motherboard, allowing for parallel attachment. Slot 2 and Slot 1 processors are not parallel attachment types, and a socket to slot adapter is not necessary in this scenario.

Submit
91. Network communication on a laptop needs to be tested. Which of the following will verify that the network adapter is functioning properly and communicating on the LAN?

Explanation

Using PING to attempt to reach the default gateway will verify that the network adapter is functioning properly and communicating on the LAN. The default gateway is the IP address of the router that connects the local network to other networks. By successfully pinging the default gateway, it confirms that the network adapter is able to send and receive data on the local network.

Submit
92. Which of the following will occur if %temp% is executed from the run command?

Explanation

Executing %temp% from the run command will open the current user's temporary folder. The %temp% variable is a system variable that represents the path to the temporary folder for the currently logged-in user. Opening this folder allows users to access and manage temporary files that are created and used by various applications and processes on the operating system.

Submit
93. A technician installs a new 802.11n network adaptor for a desktop computer. The technician tries to connect to an access point, but sees no available access points in the Wireless Configuration Manager. Which of the following is the BEST explanation to why none of the access points are listed?

Explanation

The best explanation for why none of the access points are listed is that they are out of range. This means that the desktop computer with the new 802.11n network adaptor is not within the range of any available access points.

Submit
94. Which of the following will MOST likely happen if a laser printer displays 15% fuser remaining?

Explanation

If a laser printer displays 15% fuser remaining, it means that the fuser, which is responsible for bonding the toner to the paper, is nearing the end of its lifespan. However, it still has enough remaining to continue printing without any issues. Therefore, the printer will print according to specification, meaning it will continue to print normally until the fuser needs to be replaced.

Submit
95. A user reports that their Windows XP machine, which has a 250 GB hard drive, can only recognize 137GB during usage. Which of the following is the MOST likely problem?

Explanation

Windows XP has a limitation where it can only recognize and utilize up to 137GB of storage on a hard drive without the installation of Service Pack 1. Therefore, the most likely problem in this scenario is that Service Pack 1 has not been installed on the machine, causing the limitation in recognizing the full 250GB capacity of the hard drive.

Submit
96. A workstation no longer has network connectivity. Upon visual inspection, all connectors and settings seem to be properly configured. Which of the following tools should the technician use to troubleshoot this issue?

Explanation

A cable tester should be used to troubleshoot the issue of a workstation no longer having network connectivity. This tool is specifically designed to test the integrity and connectivity of network cables. By using a cable tester, the technician can verify if the network cable is functioning properly or if there is a fault in the cable that is causing the connectivity issue. This will help identify if the problem lies with the cable itself, allowing the technician to take appropriate steps to resolve the issue.

Submit
97. A customers system is infected with hundreds of viruses, including spyware and malware. The customer has critical data on the system that needs to be recovered within 30 minutes. Which of the following is the BEST course of action the technician should take?

Explanation

The customer's system is infected with multiple viruses, including spyware and malware. In such a situation, it is important to prioritize the recovery of critical data. By removing the hard drive and copying the critical data to another system using an external dock, the technician can ensure that the data is safely transferred without the risk of further infecting the system. This method allows for a quick and efficient recovery of the important data within the given time frame.

Submit
98. Which of the following groups should a user be added to for the ability to restore files, without granting any ownership privileges?

Explanation

A user should be added to the "Backup Operators" group for the ability to restore files without granting any ownership privileges. This group is specifically designed to allow users to perform backup and restore operations on a system without having full administrative control. By adding a user to this group, they will have the necessary permissions to restore files from backups, but they will not have the ability to make any other significant changes or modifications to the system. This helps to maintain security and prevent unauthorized access or modifications.

Submit
99. The technician has suspicions that a browser has been hijacked. Which of the following should the technician look for in this situation?

Explanation

The technician should look for a proxy server that has been enabled in this situation. A proxy server acts as an intermediary between a user's computer and the internet, allowing it to control and monitor internet traffic. If a browser has been hijacked, it is possible that a proxy server has been enabled without the user's knowledge or consent. This can redirect internet traffic, collect sensitive information, or inject malicious content into web pages. Therefore, identifying and disabling any unauthorized proxy server is crucial to resolving the issue.

Submit
100. Which of the following commands will allow modification of file C:\BOOT.INI?

Explanation

The correct answer is "attrib -s -h -r C:\BOOT.INI". This command will allow modification of the file C:\BOOT.INI by removing the "system" (-s), "hidden" (-h), and "read-only" (-r) attributes from the file.

Submit
101. A technician wants to secure a Windows 7 Ultimate notebook hard drive. Which of the following should the technician do to implement BitLocker? (Select TWO).

Explanation

To implement BitLocker on a Windows 7 Ultimate notebook hard drive, the technician should run the BitLocker wizard and any necessary partitions. This will allow the technician to set up BitLocker encryption on the hard drive. Additionally, the technician should enable TPM (Trusted Platform Module) in the system BIOS. TPM is a hardware component that provides additional security for encryption keys. By enabling TPM, the technician ensures that the encryption keys used by BitLocker are securely stored and protected.

Submit
102. A customer states that their Internet connection is extremely slow. The technician suspects a failing NIC. Which of the following command line tools would verify this?

Explanation

The correct answer is "ping -t". The technician suspects a failing NIC, which could result in slow internet connection. By using the "ping -t" command, the technician can continuously send ICMP echo requests to a specified IP address and check for any dropped packets or high latency. If the NIC is failing, it may cause delays or packet loss, indicating a problem with the internet connection. The other options, such as "ipconfig /all" and "ping -a", provide information about network configurations and resolve IP addresses respectively, but they do not specifically test the performance of the NIC. "netsh winsock reset" is used to reset the Windows Socket API configuration and would not directly verify the failing NIC.

Submit
103. An office provides its users network access speeds of 1Gbps over its wired network. The manager frequently develops large files out of the office on a laptop that need to be transferred to the desktop at work, but states that it takes too long to transfer these files using the network. The laptop has an 802.11g NIC and a 100Mbps Ethernet adapter. Which of the following can the technician do to increase the transfer speed?

Explanation

Installing a 1Gbps network adapter in the manager's laptop would increase the transfer speed because the current network adapter (802.11g NIC and 100Mbps Ethernet adapter) is limiting the transfer speed to 100Mbps. By upgrading to a 1Gbps network adapter, the laptop will be able to take full advantage of the 1Gbps network access speeds provided by the office, resulting in faster file transfers.

Submit
104. A client cannot connect to the Internet. The technician executes ipconfig at the command line and notices the IP address is 169.254.64.102. Which of the following is the NEXT command the technician should execute?

Explanation

The technician should execute the "ipconfig /release" command next. This command will release the current IP address lease from the DHCP server, allowing the client to obtain a new IP address. This can help in resolving connectivity issues and establishing a proper connection to the Internet.

Submit
105. A user has just updated application software on a PC and now finds the video display does not work with the new application. Which of the following should the technician do FIRST?

Explanation

The technician should first check the application website for known hardware compatibility issues. This is because the user updated the application software and now the video display is not working with the new application. By checking the application website, the technician can determine if there are any known compatibility issues between the application and the hardware. This will help identify if the issue is due to compatibility and if any specific steps need to be taken to resolve it.

Submit
106. A program is crashing and causing the computer to lockup. Which of the following is the BEST location for a technician to check for further information about the cause of the crash?

Explanation

The application log is the best location for a technician to check for further information about the cause of the crash. The application log records events and errors specific to the applications running on the computer. By analyzing the entries in the application log, the technician can identify any errors or issues that may have caused the program to crash and the computer to lock up. This log provides valuable information for troubleshooting and resolving the crash.

Submit
107. A technician needs to install a new internal flash memory card reader into an available floppy drive bay. Prior to installation, which of the following connectors needs to be available?

Explanation

The technician needs to have a USB header available before installing the new internal flash memory card reader into the floppy drive bay. This is because the flash memory card reader will require a USB connection in order to function properly. The USB header will provide the necessary connection for the device to communicate with the computer.

Submit
108. The technician has added a second hard disk to a Windows 2000 Professional computer. Which of the following commands is used to make the new drive accessible to users?

Explanation

The correct answer is FORMAT because the FORMAT command is used to prepare a new disk for use by creating a file system on it. By running the FORMAT command on the new hard disk, the technician can make it accessible to users by formatting it with a compatible file system such as NTFS or FAT32.

Submit
109. Which of the following utilities can a technician use to display NetBIOS over TCP/IP information?

Explanation

A technician can use NBTSTAT utility to display NetBIOS over TCP/IP information. NBTSTAT is a command-line tool that shows the current NetBIOS over TCP/IP connections, including the local NetBIOS name table, the remote NetBIOS name table, and the NetBIOS session table. It provides information about NetBIOS names, IP addresses, and MAC addresses of connected devices, allowing technicians to troubleshoot and diagnose network connectivity issues related to NetBIOS.

Submit
110. A technician replaced a suspected failed SATA drive with a new drive and data cable, then discovers that the new drive is not recognized in the system BIOS. Which of the following is the MOST likely problem?

Explanation

The most likely problem is that the SATA port is faulty. This means that the port on the motherboard where the data cable connects to is not functioning properly, causing the new drive to not be recognized in the system BIOS. The other options are less likely to be the problem in this scenario. The jumper on the drive is not set would only be relevant if the drive was an older IDE drive, not a SATA drive. The drive not being formatted would not prevent it from being recognized in the BIOS. The BIOS not supporting SATA is also unlikely, as most modern motherboards have SATA support.

Submit
111. Which of the following ways of manipulating a file will retain its NTFS permissions?

Explanation

Moving the file to a new location on the same volume will retain its NTFS permissions. When a file is moved within the same volume, the file's metadata, including its NTFS permissions, is preserved. This is because the file system keeps track of the file's metadata and updates the file's location in the file system's master file table (MFT) without changing its permissions. On the other hand, copying the file to a new location on the same volume or moving the file to another NTFS volume will also retain the permissions. However, copying the file to another FAT32 volume will not retain the NTFS permissions as FAT32 does not support the same level of file permissions as NTFS.

Submit
112. A technician restored a backup to a client s workstation, but the client is unable to open any of the files. Which of the following should the technician have completed when restoring?

Explanation

When restoring a backup, it is important to enable the restore to include security settings. This ensures that the files being restored retain their original permissions and access rights. By enabling the restore to include security, the technician would have allowed the client to open the files without any issues.

Submit
113. A user reports that their computer is taking a long time to save large files. The user is currently using an EIDE drive formatted with NTFS for storage. Which of the following options would improve the performance of the system?

Explanation

Installing a PATA drive formatted with NTFS would improve the performance of the system. This is because PATA (Parallel ATA) drives have a higher data transfer rate compared to EIDE (Enhanced Integrated Drive Electronics) drives, which would allow for faster saving of large files. Additionally, formatting the drive with NTFS (New Technology File System) provides better performance and security features compared to FAT32 (File Allocation Table), further enhancing the system's performance.

Submit
114. A technician is unable to associate a wireless laptop to an IEEE 802.11a wireless access point. The wireless laptop is configured to connect to the SSID, and the wireless client scans all 11 wireless channels, however, the network still cannot be found. Which of the following is the MOST likely the cause of this problem?

Explanation

The most likely cause of the problem is that the wireless client is using the wrong wireless adapter. This means that the adapter being used is not compatible with the IEEE 802.11a standard, which is the standard used by the wireless access point. As a result, the laptop is unable to connect to the network despite being configured correctly.

Submit
115. A technician has received a report of a network outage. Which of the following should a technician use to pinpoint the location of a UTP cable break?

Explanation

A TDR (Time Domain Reflectometer) is used to locate cable breaks in UTP (Unshielded Twisted Pair) cables. It works by sending a signal down the cable and measuring the time it takes for the signal to reflect back. By analyzing the time and intensity of the reflected signal, a technician can determine the distance to the break. This helps to pinpoint the exact location of the cable break, allowing for quicker and more accurate repairs.

Submit
View My Results
Cancel
  • All
    All (115)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
After cold booting a computer the system clock displays the wrong date...
A device is plugged into a computer and a prompt appears that states...
A user installs a laser jet printer on a Windows XP desktop. The user...
Which of the following will happen when a user plugs a USB 1.1 device...
Which of the following tools can a field technician use to test a...
Which of the following is an indication a system has become infected...
A laptops LCD is getting scratched by the keyboard when the lid is...
A user reports that every time their machine is powered on a prompt...
Which of the following IP addresses will a technician ping to test the...
A technician wants to create a spanned volume on a set of hard drives....
Which of the following is accomplished by running the disk...
Which of the following would be the correct address to use with the...
Which of the following is the MOST effective method of retrieving a...
A technician needs to delete an infected file. The system says the...
Which of the following devices can assist a technician in...
A kiosk computer requires a CD-ROM to be in the drive in order for a...
Which of the following multimeter modes would be used to MOST...
Which of the following is the speed a 1600MHz FSB processor will...
A mirrored set is another name for which of the following?
A technician reboots a computer and receives the error, NTLDR is...
A laser printer is reporting a paper jam in tray two, but there is no...
Which of the following is an example of disk duplexing or disk...
A technician needs to add an expansion card to a computer. The...
A user is attempting to connect a laptop to a TV using an HDMI...
Which of the following ports should be forwarded on the firewall to...
A technician needs to upgrade memory on a laptop with one available...
A technician is dispatched to a malware infected system. Upon arrival,...
Company policy does not allow users to use dial-up connections. A new...
A user states that when a USB drive is plugged into their computer,...
New memory has been installed into a PC. The PC fails to POST after...
Which of the following file extensions will initialize the program...
A users system is infected with a worm and has propagated to 30...
A laptop is received for repair indicating that the screen is very...
A user requires more storage space on their computer. After a...
Which of the following should be installed to support Gigabit Ethernet...
Which of the following commands allows the technician to copy...
Which of the following access levels allows a user to perform normal...
When doing a clean installation, which of the following is the default...
Which of the following is the default HTTPS port?
In Windows Vista, a users documents can be stored on a drive other...
Which of the following could cause an NTLDR error on reboot?
A technician needs to get a quick overview of a computer. Which of the...
A user has a server with Windows 2008 Server, a desktop, and a laptop...
Which of the following is the default SMTP port?
A client can no longer print from their computer to the default...
Which of the following contains the user profile directory for...
Which of the following is used to test all computer hardware before...
A technician is renaming files on a PC from a command prompt and is...
A technician upgraded a motherboard and CPU. The computer will not...
Which of the following IP addresses would MOST likely be the default...
A technician is going to use an extension magnet to pick up a screw...
Which of the following would a technician MOST likely use after...
Which of the following is the difference between a stop error (e.g....
Which of the following is the default directory for User Profiles in...
A technician is called to troubleshoot a computer that is giving a...
A system administrator has disabled USB ports after experiencing...
A laser printer keeps printing out crumpled pages from the third tray....
When attempting to check the DHCP status of a client machine, which of...
Which of the following is applicable when attempting to upgrade an...
A technician wants to verify a remote printer that has been power...
A technician is able to connect to the Internet but cannot connect to...
Which of the following is the correct path to disable a service in...
A computer is generating a missing NTLDR error. From the Recovery...
If a technician was going to test connectivity on port 25, which of...
A company needs network access to 50 computers transferring large...
A laptop LCD screen needs to be replaced. Which of the following tools...
A technician is installing an IDE hard drive in a SATA hard drive...
A technician installs and tests a new program on a computer using an...
When installing a wireless access point, which of the following should...
A laptop is going into standby mode unexpectedly. Which of the...
Which of the following is correct for dual band routers?
A user is browsing to a newly created internal site called...
Which of the following commands will connect to and map a shared drive...
Which of the following is the default location for temp files in...
A technician has booted Windows XP Professional to the command line...
A technician needs to plug a network cable into an inactive network...
A laser printer has a blank streak along one edge of each page but is...
A technician discovers that RAM modules are overheating. Which of...
A user reports their laptop computer can no longer connect to a...
A user installs a PostScript driver for a printer that supports only...
For added security, a network administrator has decided to lock down...
A sound card on the back of a PC is emitting a red, laser-type light....
In Windows XP, how can a user change the programs that run at startup?...
A Sales Manager is a member of both the Sales group and the Managers...
Which of the following laptop components are FRUs? (Select TWO).
Which of the following is the access level of a user that belongs to...
Which of the following is the MOST important factor when using offline...
A laser printer keeps displaying, Paper Jam C Front Door. It does not...
A technician needs to change the process priority of a background...
A technician is replacing a processor that is attached parallel to the...
Network communication on a laptop needs to be tested. Which of the...
Which of the following will occur if %temp% is executed from the run...
A technician installs a new 802.11n network adaptor for a desktop...
Which of the following will MOST likely happen if a laser printer...
A user reports that their Windows XP machine, which has a 250 GB hard...
A workstation no longer has network connectivity. Upon visual...
A customers system is infected with hundreds of viruses, including...
Which of the following groups should a user be added to for the...
The technician has suspicions that a browser has been hijacked. Which...
Which of the following commands will allow modification of file...
A technician wants to secure a Windows 7 Ultimate notebook hard drive....
A customer states that their Internet connection is extremely slow....
An office provides its users network access speeds of 1Gbps over its...
A client cannot connect to the Internet. The technician executes...
A user has just updated application software on a PC and now finds the...
A program is crashing and causing the computer to lockup. Which of the...
A technician needs to install a new internal flash memory card reader...
The technician has added a second hard disk to a Windows 2000...
Which of the following utilities can a technician use to display...
A technician replaced a suspected failed SATA drive with a new drive...
Which of the following ways of manipulating a file will retain its...
A technician restored a backup to a client s workstation, but the...
A user reports that their computer is taking a long time to save large...
A technician is unable to associate a wireless laptop to an IEEE...
A technician has received a report of a network outage. Which of the...
Alert!

Back to Top Back to top
Advertisement