CompTIA A+ 220-702 Essentials Practice Test....(Part 2)

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Freddyoca
F
Freddyoca
Community Contributor
Quizzes Created: 5 | Total Attempts: 4,828
| Attempts: 562 | Questions: 113
Please wait...
Question 1 / 113
0 %
0/100
Score 0/100
1. A computer just had a memory upgrade installed on the machine. Upon boot, the system does not recognize the new memory even though it is listed as being compatible on the manufacturers website. Which of the following is MOST likely needed to resolve the issue?

Explanation

The most likely solution to the issue of the system not recognizing the new memory after a memory upgrade is a BIOS update. The BIOS (Basic Input/Output System) is responsible for initializing and configuring hardware components during the boot process. By updating the BIOS, the computer will be able to detect and properly utilize the new memory. This is a common step to take when upgrading hardware components on a computer system.

Submit
Please wait...
About This Quiz
A Plus Certification Quizzes & Trivia

This CompTIA A+ 220-702 Essentials Practice Test assesses key IT support skills and knowledge, focusing on troubleshooting USB speed, DB-9 ports, networked printers, continuous ping operations, and setting... see moreup user accounts on Windows XP. see less

2. A user signs up for every online promotion and mailing list they are prompted with and their mailbox is flooded with email. Which of the following is an example of this?

Explanation

The given scenario describes a situation where a user signs up for multiple online promotions and mailing lists, resulting in their mailbox being flooded with emails. This is a clear example of spam. Spam refers to unsolicited or unwanted emails that are sent in bulk to a large number of recipients, often for advertising or promotional purposes. In this case, the user's decision to sign up for every online promotion and mailing list has led to an overwhelming amount of unwanted emails in their mailbox.

Submit
3. Which of the following can cause a blue screen error?

Explanation

Bad drivers can cause a blue screen error. When a computer's hardware is not properly supported by the installed drivers, it can lead to conflicts and system crashes. These crashes often result in a blue screen error, also known as the "Blue Screen of Death" (BSOD). Updating drivers regularly and ensuring compatibility with the operating system can help prevent such errors.

Submit
4. A technician is experiencing an issue with the computer randomly rebooting throughout the day. The technician suspects the cause is from over heating. Which of the following should the technician check for the cause?

Explanation

The technician should check if the heat sink is firmly attached to the processor. Overheating can cause a computer to randomly reboot, and the heat sink is responsible for dissipating heat from the processor. If the heat sink is not properly attached, it may not be able to effectively cool the processor, leading to overheating and subsequent reboots. Checking the attachment of the heat sink is crucial in troubleshooting the issue.

Submit
5. A user is cleaning up their temporary Internet files and is concerned about the number of cookies discovered. Which of the following is a correct statement about cookies?

Explanation

The correct statement about cookies is that they are not always malicious. Cookies are small text files that websites store on a user's computer to remember information about them. While some cookies can be used for tracking and targeted advertising, not all cookies are harmful. Many cookies are necessary for websites to function properly and provide a personalized user experience. It is important for users to regularly clean up their cookies and be cautious about the types of cookies they allow, but disabling cookies completely is not always necessary.

Submit
6. A computer just had a memory upgrade installed on the machine. Upon boot, the system does not recognize the new memory even though it is listed as being compatible on the manufacturers website. Which of the following is MOST likely needed to resolve the issue?

Explanation

The most likely solution to the issue of the computer not recognizing the new memory after a memory upgrade is a BIOS update. The BIOS (Basic Input/Output System) is responsible for initializing and configuring hardware components, including memory. Updating the BIOS can ensure that the system recognizes and properly utilizes the new memory.

Submit
7. Which of the following tools would be BEST to use to pry open the case of a laptop?

Explanation

A plastic wedge would be the best tool to use to pry open the case of a laptop. Unlike a metal screwdriver or needle-nose pliers, a plastic wedge is less likely to cause damage to the laptop's case or internal components. It is also less conductive, reducing the risk of electrical damage. An extension magnet is not suitable for prying open a laptop case as it is designed for retrieving metal objects and would not provide the necessary leverage.

Submit
8. Which of the following tools can be used prior to installing Windows Vista to find hardware compatibility issues?

Explanation

Upgrade Advisor is the correct answer because it is a tool specifically designed to scan a computer system and check for hardware and software compatibility issues before installing Windows Vista. It helps users determine if their current hardware and software configurations are compatible with Windows Vista, and provides recommendations on necessary upgrades or updates to ensure a smooth installation process.

Submit
9. A technician needs to modify the BIOS settings of a PC; however, the BIOS setup password is unknown to all current employees. How can the technician accomplish this task?

Explanation

The technician can accomplish the task by setting the motherboard configuration jumper to clear the password. This jumper is a small plastic connector that is placed over two pins on the motherboard. By moving the jumper to the "clear" position and then back to its original position, the BIOS password will be reset. This method is commonly used to clear BIOS passwords when the password is unknown.

Submit
10. A user states that the inkjet printer is printing streaks on documents. Which of the following would resolve the issue?

Explanation

Using the printer's clean option can resolve the issue of streaks on documents. This option is designed to clean the printhead and remove any clogs or debris that may be causing the streaks. By running the clean option, the printer can ensure that the ink is flowing properly and that the prints come out without any streaks or smudges.

Submit
11. From a command prompt, a technician is removing some old user profiles from a desktop. Which of the following commands would be used to delete folders after they have been emptied?

Explanation

The command "RD" stands for "Remove Directory" and is used to delete folders from a command prompt. After the technician has emptied the folders, they can use the RD command followed by the folder name to permanently delete the folder and its contents. This command is commonly used to remove old user profiles or any other unnecessary folders from a desktop.

Submit
12. After performing a preventative maintenance on a laser printer, which of the following is the NEXT step a technician should take?

Explanation

After performing a preventative maintenance on a laser printer, the next step a technician should take is to print a test page. This is important to ensure that the printer is functioning properly after the maintenance. By printing a test page, the technician can check if all the components of the printer are working correctly, including the print quality, alignment, and any potential issues that may have arisen during the maintenance. This step helps in verifying that the printer is ready for regular use and ensures that any problems can be identified and resolved promptly.

Submit
13. A technician needs to implement a RAID 1 set on a computer. Which of the following is the MINIMUM number of hard drives that would be required?

Explanation

To implement a RAID 1 set, also known as disk mirroring, the technician needs to have at least two hard drives. In RAID 1, data is written simultaneously to two drives, creating an exact copy or mirror of the data. This redundancy provides data protection in case one of the drives fails. Therefore, the minimum number of hard drives required for RAID 1 is 2.

Submit
14. After replacing the motherboard in a laptop, the system overheats and fails to boot. Which of the following is the MOST likely cause of this error?

Explanation

The most likely cause of the system overheating and failing to boot after replacing the motherboard in a laptop is that the thermal paste was not applied between the heat sink and CPU. Thermal paste is a crucial component that helps to transfer heat from the CPU to the heat sink, ensuring proper cooling. Without thermal paste, the heat cannot be effectively dissipated, leading to overheating and potential damage to the system.

Submit
15. A user reports it takes a long time to load all applications and the hard drive LED is showing constant activity. Which of the following is MOST likely the issue?

Explanation

The most likely issue in this scenario is that the file system is fragmented. Fragmentation occurs when files are stored in non-contiguous blocks on the hard drive, leading to slower performance as the system needs to search for and retrieve scattered pieces of data. The constant activity of the hard drive LED suggests that the system is struggling to load all applications due to the fragmented file system. This issue can be resolved by defragmenting the hard drive, which rearranges the fragmented files and improves overall system performance.

Submit
16. Which of the following is the MAXIMUM allowable cable length of CAT5?

Explanation

The maximum allowable cable length of CAT5 is 100 meters (328 feet). This is because CAT5 cables are designed to transmit data over short distances and exceeding this length can result in signal degradation and loss.

Submit
17. A technician has deleted all the files in the directory C:\tempfiles. Which of the following commands should the technician use to delete this directory?

Explanation

The technician should use the "RD" command to delete the directory C:\tempfiles. RD stands for "Remove Directory" and is used to delete directories in the Windows command prompt.

Submit
18. If a computer has an IP address of 169.254.6.15, which of the following has failed?

Explanation

If a computer has an IP address of 169.254.6.15, it means that the computer was unable to obtain an IP address from a DHCP server. DHCP (Dynamic Host Configuration Protocol) is responsible for assigning IP addresses to devices on a network. When a device fails to obtain an IP address through DHCP, it falls back to using Automatic Private IP Addressing (APIPA) in the range of 169.254.x.x. Therefore, the failure of DHCP is the reason for the computer having an IP address of 169.254.6.15.

Submit
19. A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the users resulting access level for the remotely shared directory?

Explanation

The user's resulting access level for the remotely shared directory is "Read" because even though the file share permissions allow the user to have full control, the NTFS permissions override it and only grant read access to the user.

Submit
20. A technician troubleshooting an issue over the phone determines that a home user has a faulty hard drive. The only information the home user can give is that the PC is ten years old, and the drive capacity is 40GB. Which of the following drive types should the technician bring to the service call?

Explanation

Based on the given information that the PC is ten years old, it is likely that the PC is using an older technology for its hard drive. PATA (Parallel ATA) is an older interface commonly found in older PCs, while SATA (Serial ATA) is a newer interface. Therefore, the technician should bring a PATA drive to the service call.

Submit
21. A computer is not able to access Internet websites, internal company servers, or other networked resources. Which of the following is the FIRST step to help identify the cause of the problem?

Explanation

To identify the cause of the problem, the first step is to check the Ethernet link light. This light indicates whether there is a physical connection between the computer and the network. If the light is not lit, it suggests that there may be an issue with the network cable or the network port on the computer. By checking the link light, it helps in determining if the problem lies in the physical connection, which can then be further troubleshooted.

Submit
22. A technician plugs a USB device into the front panel of a desktop computer and nothing happens. The technician knows that plug-n-play is enabled. Which of the following BEST describes a possible cause to this issue?

Explanation

The front panel connectors not being plugged into the motherboard is the best explanation for the issue because if they are not connected properly, the USB device will not be recognized by the computer. Plugging a USB 2.0 device into a USB 1.1 port or vice versa would still allow the device to be recognized, although it may not function at its optimal speed. Rebooting the computer is not necessary for a USB device to work, as plug-n-play should automatically detect and install the necessary drivers.

Submit
23. A second optical drive has been added to the computer and needs to be referenced as the R: drive by the Microsoft Windows operating system. Which of the following places in Microsoft Windows will BEST accomplish this task?

Explanation

Disk Management is the best place in Microsoft Windows to accomplish the task of referencing a second optical drive as the R: drive. Disk Management allows users to manage and configure disk drives, including assigning drive letters to new drives. By accessing Disk Management, the user can assign the letter R: to the newly added optical drive, ensuring that it is recognized and accessible by the operating system.

Submit
24. Under which of the following circumstances would a technician use IPCONFIG /RENEW?

Explanation

A technician would use IPCONFIG /RENEW after using IPCONFIG /RELEASE. When a user runs IPCONFIG /RELEASE, it releases the current IP address assigned to the computer. After releasing the IP address, the computer needs to obtain a new IP address to establish a network connection again. Therefore, the technician would use IPCONFIG /RENEW to request a new IP address from the DHCP server.

Submit
25. A user is playing a new first person game on the computer and the screen is pausing during game play. The user has a high-end graphics card and is maxed out in memory. Which of the following should the technician perform?

Explanation

The screen pausing during gameplay can be caused by outdated or incompatible graphics drivers. Upgrading the drivers can resolve this issue by providing better compatibility and performance for the high-end graphics card. Reinstalling the game, replacing the hard drive, or reinstalling the OS would not directly address the problem with the screen pausing.

Submit
26. A user is connected to a stand alone printer. The user is receiving an out of memory error when printing large graphic files. Which of the following should the technician perform?

Explanation

The user is receiving an out of memory error when printing large graphic files. This suggests that the printer's current RAM is insufficient to handle the large files. Therefore, upgrading the RAM on the printer will increase its memory capacity and allow it to process the large graphic files without encountering memory errors.

Submit
27. A technician is dispatched to a system that will not go beyond the Windows XP splash screen. Which of the following, after restart, would allow the technician to load Windows XP?

Explanation

Pressing F8 and selecting Last Known Good Configuration allows the technician to load Windows XP because this option loads a previous configuration that was known to work properly. This can help to resolve any issues that may have caused the system to not go beyond the splash screen. Logging in after selecting this option will allow the technician to access the system and continue troubleshooting if necessary.

Submit
28. A user is not able to receive files off the FTP server. Which of the following default ports needs to be opened for FTP to work properly?

Explanation

Port 21 is the default port for FTP (File Transfer Protocol). When a user wants to receive files from an FTP server, they need to have port 21 opened on their network or firewall. This is because FTP uses port 21 for its control connection, which is responsible for sending commands and responses between the client and server. By opening port 21, the user will be able to establish a connection with the FTP server and receive files successfully.

Submit
29. A user has just moved to a new office and is unable to access the network. The technician suspects the users network settings need to be changed. Which of the following tools would the technician use on the Windows XP computer to view the network settings?

Explanation

The technician would use IPCONFIG on the Windows XP computer to view the network settings. IPCONFIG is a command-line tool that displays the current configuration of all network interfaces on the computer, including IP addresses, subnet masks, and default gateways. By using IPCONFIG, the technician can check if the user's network settings are correctly configured and make any necessary changes to allow access to the network.

Submit
30. A user reports that after installing a PCIe video card into a system, the onboard video no longer displays. Which of the following is MOST likely the cause?

Explanation

The most likely cause for the onboard video no longer displaying after installing a PCIe video card is that the BIOS detected the PCIe video card and disabled the onboard video. When a PCIe video card is installed, the BIOS typically recognizes it as the primary display device and automatically disables the onboard video to avoid conflicts. This allows the system to prioritize the use of the PCIe video card for graphics processing.

Submit
31. A technician is upgrading memory in a desktop PC. The user purchased two 2GB DIMMS from the PC manufacturer. The PC powers on and POST shows 2GB of RAM. Which of the following is the FIRST action to perform?

Explanation

The first action to perform in this scenario is to update the PC BIOS and verify all memory is seen in POST. This is because the technician has upgraded the memory in the desktop PC, but the POST is only showing 2GB of RAM instead of the expected 4GB. Updating the PC BIOS can help ensure that the system recognizes and utilizes the full amount of installed memory. Verifying this in the POST will confirm that the memory upgrade was successful.

Submit
32. A home user wants to setup a wireless network. Which of the following would be the MOST important consideration?

Explanation

The most important consideration when setting up a wireless network is the location of the wireless router. This is because the location of the router affects the signal strength and coverage of the network. Placing the router in a central location, away from obstacles and interference, ensures that all devices connected to the network can receive a strong and reliable signal.

Submit
33. A technician is tasked with setting up a Windows XP computer with a user account that will only be used to access the Internet. Which account type should the user have access to?

Explanation

The user should have access to the Guest account. The Guest account is designed for temporary or occasional use and has limited privileges, making it suitable for a user who only needs to access the internet. The Administrator account has full control over the computer and should not be used for regular internet access. Domain User accounts are typically used in a networked environment, and Power User accounts have elevated privileges that may not be necessary for internet access.

Submit
34. An internal IEEE 1394 expansion card should be installed on which port type?

Explanation

An internal IEEE 1394 expansion card should be installed on the PCI port type. PCI stands for Peripheral Component Interconnect, which is a standard expansion bus that allows devices to be connected to the computer's motherboard. This type of port is commonly used for various expansion cards, including IEEE 1394 (also known as FireWire) cards, which are used for high-speed data transfer and connecting devices such as cameras and external hard drives.

Submit
35. A user can receive email but cannot send email with the email client software. Which of the following protocols is incorrectly configured?

Explanation

SMTP stands for Simple Mail Transfer Protocol, which is responsible for sending email messages from a client to a server. In this scenario, if a user can receive emails but cannot send them, it indicates that the SMTP protocol is incorrectly configured. This means that there may be an issue with the SMTP settings or the server may not be properly configured to allow outgoing email messages.

Submit
36. After installing a replacement floppy disk drive, the LED on the drive stays constantly lit and the drive does not work. Which of the following is the MOST likely cause of the problem?

Explanation

The most likely cause of the problem is that the floppy ribbon is reversed. This means that the ribbon cable connecting the floppy disk drive to the motherboard has been inserted incorrectly. Reversing the ribbon cable can result in improper communication between the drive and the motherboard, causing the LED to stay constantly lit and the drive to not work.

Submit
37. Which of the following is a difference between a worm and spyware?

Explanation

A worm is a type of malware that is capable of replicating itself and spreading to other systems without any user intervention. It can exploit vulnerabilities in a network to propagate and infect multiple systems. On the other hand, spyware is a type of malware that is designed to collect information about a user's activities without their knowledge or consent. It may replicate multiple times on a single system, but it does not typically infect other systems. Therefore, the difference between a worm and spyware is that a worm replicates itself before infecting other systems.

Submit
38. Which of the following will occur if an AGP 4x video card is used in an AGP 2x slot?

Explanation

If an AGP 4x video card is used in an AGP 2x slot, the video card will run at the slower AGP 2x speed. This is because the video card is designed to be backward compatible with lower speed slots. The AGP 2x slot cannot support the higher speed of AGP 4x, so the video card will automatically adjust to the maximum speed supported by the slot, which is AGP 2x.

Submit
39. A user reports that a laser printer is printing out pages with blurry text that smudges when touched. Which of the following is the MOST likely reason for this?

Explanation

The fuser is responsible for melting the toner onto the paper during the printing process. If the fuser is not getting hot enough, the toner will not properly adhere to the paper, resulting in blurry text that smudges when touched. This is the most likely reason for the issue described by the user.

Submit
40. A technician needs a list of all the routers along a given path over multiple networks. Which of the following commands will accomplish this task?

Explanation

The TRACERT command is used to trace the route that packets take from the source to the destination. It displays a list of all the routers along the path that the packets traverse. This command is commonly used to troubleshoot network connectivity issues and identify the network hops between two endpoints. Therefore, TRACERT is the correct command to accomplish the task of obtaining a list of all the routers along a given path over multiple networks.

Submit
41. A user states that the wireless router keeps rebooting while the power to the other equipment stays on. Which of the following should the technician perform to prevent users from rebooting the router?

Explanation

Changing the default administrator password is the correct answer because it helps prevent unauthorized access to the router's settings. By changing the default password, the technician can ensure that only authorized users can access and modify the router's configuration. This helps in preventing any malicious activity or unauthorized changes that could cause the router to reboot.

Submit
42. Which of the following is the BEST source for information about malware detected on a computer?

Explanation

The best source for information about malware detected on a computer is the anti-spyware software website. This is because the website is specifically dedicated to providing information and updates about the software, including any malware that has been detected. The README.TXT file included with the anti-spyware software installation may provide some information, but it is likely to be limited compared to the comprehensive information available on the software website. The user of a previously infected computer may have some insights, but their knowledge may not be as reliable or up-to-date as the information provided by the software website. The operating system documentation is unlikely to provide specific information about malware detection.

Submit
43. A user reports that after working for a while with their PC, the computer reboots without warning. The technician has ruled out a virus infection, and when examining the motherboard discovers that some of the capacitors look distended and out of shape. Which of the following should the technician do to fix the users PC?

Explanation

The technician should replace the motherboard because the distended and out of shape capacitors indicate a hardware issue. This hardware issue is likely causing the computer to reboot without warning. Reconfiguring the BIOS settings or replacing the hard drive would not address the problem with the capacitors.

Submit
44. After rebooting a workstation a message pops up saying one or more services failed to start. Which of the following will provide information about this issue?

Explanation

The system event logs would provide information about the issue of one or more services failing to start after rebooting a workstation. These logs record events related to the operating system and its components, including service start and stop events. By examining the system event logs, one can identify any errors or warnings related to the failed services and troubleshoot the issue accordingly.

Submit
45. A user reports that when typing on the laptop keyboard, the mouse pointer scrolls across the screen. Which of the following would MOST likely resolve this issue?

Explanation

Disabling the touchpad would most likely resolve the issue because it seems that the touchpad is sensitive and causing the mouse pointer to scroll across the screen when typing. By disabling the touchpad, the user can prevent any accidental movements of the mouse pointer while typing on the laptop keyboard.

Submit
46. An inkjet printer prints faded and smeared pages. Which of the following would be the MOST appropriate solution for this issue?

Explanation

Running the printer's cleaning routine would be the most appropriate solution for the issue of faded and smeared pages. This routine is specifically designed to clean the print heads and remove any clogs or debris that may be causing the poor print quality. By running this routine, the printer will be able to clear any blockages and ensure that the ink is properly distributed, resulting in clearer and sharper prints.

Submit
47. Which of the following commands would be used to go from c:\windows to c:\windows\system32?

Explanation

To go from the "c:\windows" directory to the "c:\windows\system32" directory, the correct command to use is "CD". The CD command stands for "change directory" and is used to navigate through different directories within the file system. By typing "CD c:\windows\system32", the user will be able to change their current directory to the "system32" directory, which is located within the "windows" directory.

Submit
48. Which of the following is contained in the first sector of the hard disk?

Explanation

The first sector of a hard disk contains the Master Boot Record (MBR). The MBR is a small program that is executed when the computer is powered on and it contains information about the disk's partitions and the location of the operating system. It also contains the partition table, which helps the computer locate and access the different partitions on the disk. The MBR is crucial for the computer to boot up properly and initiate the operating system.

Submit
49. The technician is moving a users files from a Windows XP PC to a Windows Vista PC. Which of the following directories corresponds to each operating system?

Explanation

The correct answer is c:\documents and settings\user1\my documents to c:\users\user1\documents. In Windows XP, the default directory for user documents is "c:\documents and settings\user1\my documents", while in Windows Vista, it is "c:\users\user1\documents". Therefore, when moving the user's files from Windows XP to Windows Vista, the files in the "c:\documents and settings\user1\my documents" directory should be moved to the "c:\users\user1\documents" directory.

Submit
50. Given the following TCP/IP information for a computer, which of the following is the cause of a communication failure? IP Address: 192.168.1.5 Subnet Mask: 255.255.255.0 Default Gateway: 255.168.1.254 DNS Server: 172.16.4.1 WINS Server: 10.0.4.1

Explanation

The default gateway is responsible for routing network traffic between different networks. If the default gateway is incorrect or not reachable, it will cause a communication failure as the computer will not be able to send or receive data outside of its own network. Therefore, the default gateway is the cause of the communication failure in this scenario.

Submit
51. Which of the following is fault tolerant and allows for disk mirroring?

Explanation

RAID 1 is fault tolerant and allows for disk mirroring. In RAID 1, data is mirrored on two or more drives simultaneously, providing redundancy. This means that if one drive fails, the data can still be accessed from the remaining drives. Disk mirroring ensures that the same data is written to multiple drives simultaneously, providing a backup in case of drive failure. Therefore, RAID 1 is a reliable option for fault tolerance and disk mirroring.

Submit
52. A virus has been removed from the users machine, but the user still cannot access the Internet. Which of the following should the technician check NEXT?

Explanation

After removing the virus from the user's machine, the technician should check the web browser's proxy settings next. Proxy settings can sometimes be modified by malware, causing issues with internet access. By checking and potentially adjusting the proxy settings, the technician can ensure that the user can access the internet properly. Disabling port forwarding on the router, rebooting to Safe Mode, and formatting the machine and reinstalling the OS are not necessary steps in this scenario as the issue is likely related to the proxy settings.

Submit
53. A technician is replacing a motherboard in a laptop. After completing the install, the laptop shuts down after a few seconds of being on. Which of the following is the causing the laptop to shutdown?

Explanation

If the CPU is not locked into the socket properly, it can cause the laptop to shutdown. The CPU needs to be securely fastened in the socket for proper functioning. If it is not locked in properly, it can cause an unstable connection and result in the laptop shutting down after a few seconds of being on.

Submit
54. Which of the following does PING -t do?

Explanation

The correct answer is continuous ping of an IP address until cancelled. The "-t" option in the PING command allows the user to continuously ping an IP address until they manually cancel the command. This is useful for monitoring network connectivity and latency over an extended period of time. The other options mentioned, such as reaching a count of 1000 or waiting for a response or return from the target, do not accurately describe the functionality of the "-t" option.

Submit
55. After upgrading to Windows Vista, a client states that the run command no longer appears on the Start menu: Which of the following is the reason the user cannot see the run command?

Explanation

The reason the user cannot see the run command after upgrading to Windows Vista is because the run command is not displayed by default on the start menu.

Submit
56. A technician is attempting to configure Windows XP Media Center on a desktop from a CD. The message that comes up on the screen says Missing NTLDR press any key to reboot . Which of the following should the technician do NEXT?

Explanation

The message "Missing NTLDR press any key to reboot" indicates that the computer is unable to find the NTLDR file, which is a critical component for the Windows XP operating system to start. This error is commonly caused by an incorrect boot order in the BIOS. By verifying the boot order in the BIOS, the technician can ensure that the computer is attempting to boot from the correct device, such as the CD drive, where the Windows XP Media Center installation files are located.

Submit
57. If a technician suspects that the voltage being delivered to a desktop computers power supply is insufficient or incorrect, which device should be used to determine the correct voltage?

Explanation

A multimeter is the correct device to determine the correct voltage being delivered to a desktop computer's power supply. A multimeter is a versatile tool that can measure various electrical properties, including voltage. By connecting the multimeter to the power supply, the technician can accurately measure the voltage and determine if it is within the required range or not. This allows them to identify any issues with the voltage and take necessary steps to rectify them.

Submit
58. A user states that email is not being received. Which of the following protocols should the technician check for incoming mail?

Explanation

The technician should check the POP3 protocol for incoming mail. POP3 (Post Office Protocol version 3) is a standard protocol used for receiving emails from a remote server to a local email client. It allows the user to download and access their emails from the server onto their device. By checking the POP3 protocol, the technician can troubleshoot any issues related to the user not receiving emails.

Submit
59. On a laptop, which of the following is the name of the socket that a wireless card would typically be inserted into?

Explanation

A wireless card on a laptop is typically inserted into a Mini PCI socket. This socket is specifically designed to accommodate Mini PCI cards, which are commonly used for wireless connectivity. PCIe and PCI are different types of expansion slots found on desktop computers, while AGP is an outdated graphics card slot. Therefore, Mini PCI is the correct answer for a laptop's wireless card socket.

Submit
60. Which of the following commands will be run at a command prompt to determine which Windows OS is running on the computer?

Explanation

The VER command is used to display the current version of the operating system running on a Windows computer. By running this command at a command prompt, the user can determine which Windows OS is installed on their computer.

Submit
61. A technician has just installed a new hard drive into a Windows Vista desktop computer. The hard drive does not appear in Windows Explorer. Which of the following should the technician perform NEXT to have the drive recognized by the system?

Explanation

To have the newly installed hard drive recognized by the system, the technician should initialize and format the hard drive through Disk Management. This process will prepare the hard drive for use by creating a partition and formatting it with a file system that Windows can recognize. Once the hard drive is initialized and formatted, it will be visible in Windows Explorer and ready for use.

Submit
62. A technician is replacing a hard drive with a new 30GB drive formatted with FAT32. While transferring a 5GB file an error appears indicating that the new drive has insufficient space for the transfer. Which of the following is the cause of the problem?

Explanation

The cause of the problem is that FAT32 cannot handle single files larger than 4GB. This means that when trying to transfer a 5GB file to the new drive, the file size exceeds the maximum limit supported by the FAT32 file system.

Submit
63. A user states that a small office home office (SOHO) router constantly reboots and new workstations show up under network neighborhood. Which of the following should be completed to prevent this scenario from happening again?

Explanation

Enabling MAC filtering will prevent unauthorized devices from connecting to the network. By specifying the MAC addresses of the allowed devices, the router will only allow those devices to connect, thereby preventing new workstations from showing up under network neighborhood. This will also help in preventing the constant reboots of the SOHO router, as it will only allow authorized devices to connect and reduce the network traffic.

Submit
64. After the network printer has been rebooted none of the users are able to print. After verifying that the printer was plugged in and that a test page can print locally, the technician realizes that the printer was never properly configured. Which of the following should be done NEXT on the printer?

Explanation

The correct next step would be to assign a static IP to the printer. Since the printer was never properly configured, it is likely that it does not have a valid IP address. By assigning a static IP, the printer will have a fixed address on the network, allowing users to connect to it and print. This step should be taken after verifying that the printer is plugged in and can print locally, as mentioned in the question.

Submit
65. A computer is responding slowly and the Task Manager shows that spool.exe is using 95% of system resources. Which of the following is MOST likely the cause of this problem?

Explanation

The most likely cause of the computer responding slowly and spool.exe using 95% of system resources is the printing subsystem. The spool.exe process is responsible for managing print jobs in the Windows operating system. If there is a problem with the printing subsystem, such as a large number of print jobs or a printer driver issue, it can cause the spool.exe process to consume excessive system resources and slow down the computer.

Submit
66. A customer reports that a workstation no longer connects to the network. The technician has the customer connect another workstation with the same cable and network port, which works successfully. Which of the following actions should the technician have the customer take FIRST?

Explanation

The technician should have the customer run the loopback command first. Running the loopback command allows the technician to check if the network interface card (NIC) is functioning properly. If the loopback command is successful, it indicates that the issue is with the workstation's configuration or software. This helps narrow down the problem and eliminates the need to replace hardware components like the NIC or motherboard.

Submit
67. Which of the following is the BEST tool to troubleshoot a DB-9 port?

Explanation

A loopback plug is the best tool to troubleshoot a DB-9 port because it allows for testing the port's functionality by creating a loop within the port itself. This means that any issues with the port, such as connectivity or signal problems, can be identified and resolved. Unlike the other options listed, a loopback plug specifically targets the DB-9 port and provides a simple and effective method for troubleshooting. An ohm meter measures resistance, an anti-static wrist strap prevents static discharge, and an oscilloscope is used for analyzing waveforms, but none of these tools are specifically designed for troubleshooting a DB-9 port.

Submit
68. Which of the following is the MOST important reason for ensuring a RJ-11 phone line jack is not connected to a RJ-45 Ethernet network port?

Explanation

Phone line voltages can damage Ethernet equipment. RJ-11 jacks are designed for phone lines, which typically carry lower voltages compared to Ethernet networks. Connecting a RJ-11 phone line jack to a RJ-45 Ethernet network port can result in higher voltages being applied to the Ethernet equipment, potentially causing damage. Therefore, it is important to ensure that a RJ-11 phone line jack is not connected to a RJ-45 Ethernet network port to prevent any potential damage to the equipment.

Submit
69. A home user is setting up a wireless network. Which of the following could be used to prevent a neighbor from accessing the network? (Select TWO).

Explanation

Enabling wireless encryption adds a layer of security to the wireless network by encrypting the data transmitted between devices. This prevents unauthorized access as the neighbor would need the encryption key to decrypt the data.

Disabling SSID broadcasting hides the network's name from being broadcasted publicly, making it more difficult for the neighbor to discover and connect to the network. They would need to manually enter the network name to connect, which adds an extra layer of security.

Submit
70. A technician is troubleshooting problems with a hard drive. After checking the drive in another computer and finding no issues, the technician takes voltage readings on the Molex connector from the power supply. Which of the following represents the readings the technician should find?

Explanation

The technician should find voltage readings of +5V and +12V on the Molex connector. This is because the Molex connector is commonly used to provide power to hard drives, and the standard voltage outputs for the Molex connector are +5V and +12V. These voltage readings indicate that the power supply is providing the correct power levels to the hard drive, suggesting that the issue lies elsewhere in the troubleshooting process.

Submit
71. Which of the following should MOST likely be replaced if the laptop will not display any video through the laptops screen or an external monitor?

Explanation

If the laptop is not displaying any video through the laptop screen or an external monitor, the most likely component that needs to be replaced is the video card. The video card is responsible for generating and sending video signals to the display. If the video card is faulty or not functioning properly, it can result in no video output on the screen. Replacing the video card should resolve the issue and restore video display on the laptop.

Submit
72. USER1 is part of the Users Group and is attempting to access files via UNC path \\SERVER\FILESHARE. \\ SERVER\FILESHARE has the following share permissions: AdministratorsFull ControlUsersRead OnlyGuestsNo AccessThe directory on the hard drive where the share is located has the following permissions: AdministratorsFull ControlUsersChangeGuestsNo AccessWhich of the following levels of access will login account USER1 have?

Explanation

Based on the given information, the share permissions for \\SERVER\FILESHARE are set to "Read Only" for the Users group. Therefore, the login account USER1, being a part of the Users group, will have "Read Only" access to the files via the UNC path \\SERVER\FILESHARE. The directory permissions on the hard drive are not relevant in this case, as the share permissions take precedence.

Submit
73. Users in the office report that the speed of the Internet has drastically decreased since the recent network hardware refresh. Which of the following could be attributed to the problem?

Explanation

The correct answer is that the new switches are configured for 10MB. This means that the switches are set to operate at a maximum speed of 10 megabits per second, which is significantly slower than what the office network requires. As a result, the speed of the Internet has drastically decreased since the network hardware refresh.

Submit
74. A computer running Windows 7 will not boot up. A user is receiving an Invalid boot disk error. Which of the following is the cause of this error?

Explanation

The cause of the Invalid boot disk error is that there is a CD-ROM in the drive. When a computer is trying to boot up, it checks various boot devices in a specific order, such as the hard drive, floppy drive, and CD-ROM. If there is a CD-ROM in the drive, the computer may try to boot from it instead of the hard drive, resulting in the error message. To fix this issue, the user should remove the CD-ROM from the drive and try booting up again.

Submit
75. Which of the following devices has the options of: master, slave and cable select?  (Select THREE).

Explanation

CD-ROM, Hard drive, and DVD-ROM are the correct answers because these devices have the options of master, slave, and cable select. These options determine the device's role and behavior when connected to the computer's motherboard or controller. The master device typically controls the communication on the data cable, while the slave device follows the commands of the master. Cable select allows the devices to automatically determine their roles based on their position on the cable. This flexibility in configuration is commonly found in optical drives (CD-ROM and DVD-ROM) and hard drives.

Submit
76. Malware is removed and a computer is rebooted. Later, the malware is found on the computer again. Which of the following would permanently solve this problem?

Explanation

Going back to a previous restore point would permanently solve the problem of malware reappearing on the computer. A restore point is a snapshot of the computer's system files, settings, and installed applications at a specific point in time. By restoring the computer to a previous restore point, any changes made by the malware, including its presence on the system, would be undone, effectively removing the malware and preventing it from reoccurring.

Submit
77. A user reports that a network printer will not print, however, other users are not experiencing any problems. The user has rebooted their computer twice and it is still not printing. Which of the following should the technician check?

Explanation

The technician should check the local print queue for a failed print job. This is because the user has already rebooted their computer twice and other users are not experiencing any problems, indicating that the issue is likely specific to the user's computer. Checking the local print queue will help identify if there is a failed print job stuck in the queue, which could be causing the printer to not print.

Submit
78. A technician is replacing a motherboard in a users desktop PC. Which of the following tools should be used before replacing the new motherboard?

Explanation

Before replacing the new motherboard, a technician should use a power supply tester. This tool is used to check if the power supply unit (PSU) is functioning properly. By testing the PSU, the technician can ensure that the motherboard will receive the correct amount of power and prevent any potential issues that may arise from a faulty power supply.

Submit
79. Using the NET command which variable would be used to find out the number of files sent by the workstation service?

Explanation

The correct answer is "statistics" because the question is asking about the variable used to find out the number of files sent by the workstation service when using the NET command. The "statistics" variable would provide this information.

Submit
80. An office laser printer is printing lighter in random areas. Which of the following is the EASIEST solution to implement for this issue?

Explanation

The easiest solution to implement for the issue of random lighter printing areas in an office laser printer is to replace the toner cartridge. This is because the toner cartridge is responsible for supplying the toner, which is used to create the image on the drum and transfer it onto the paper. If the toner cartridge is old or faulty, it may not be distributing the toner evenly, resulting in lighter areas on the printed pages. By replacing the toner cartridge, the printer will have a fresh supply of toner and should be able to print evenly again.

Submit
81. Which of the following is a method used in the removal of a boot sector virus?

Explanation

Booting from the floppy disk or CD-ROM prior to scanning is a method used in the removal of a boot sector virus. This is because booting from a clean and trusted source, such as a floppy disk or CD-ROM, allows the computer to bypass the infected boot sector on the hard drive. By doing so, the virus is not loaded into memory, which enables the antivirus software to effectively scan and remove the virus from the system.

Submit
82. A yellow exclamation mark next to a device in Device Manager indicates which of the following?

Explanation

A yellow exclamation mark next to a device in Device Manager indicates that the device driver is missing. This means that the operating system is unable to locate the necessary software to communicate with the device. Without the driver, the device will not function properly, if at all.

Submit
83. A user is attempting to access a website but is getting a Page cannot be displayed error. The technician checks the IP address of the computer and sees that it has been assigned 169.254.10.70. Which of the following is the MOST likely cause?

Explanation

The most likely cause for the Page cannot be displayed error is that the device cannot locate a DHCP server. This is indicated by the IP address assigned to the computer (169.254.10.70), which falls within the Automatic Private IP Addressing (APIPA) range. When a device is unable to obtain an IP address from a DHCP server, it automatically assigns itself an IP address within this range. This suggests that there is no DHCP server available to provide the device with a valid IP address, resulting in the inability to access the website.

Submit
84. Which of the following requires an adapter when connecting to a Molex connector?

Explanation

A SATA drive requires an adapter when connecting to a Molex connector. Molex connectors are typically used for older power supply units, while SATA drives use a different type of power connector. Therefore, an adapter is needed to convert the Molex connector to the appropriate power connector for the SATA drive.

Submit
85. Which of the following will occur if an NTFS-formatted USB drive is inserted into a USB port on a second computer?

Explanation

When an NTFS-formatted USB drive is inserted into a USB port on a second computer, the accessibility of the files and folders on the drive will depend on the set permissions. This means that if the second computer has different permission settings compared to the original computer, the files and folders may or may not be accessible. The permissions determine whether the user has the necessary rights to access the files and folders on the drive. Therefore, the answer "Files and folders may or may not be accessible depending on set permissions" is correct.

Submit
86. A user is running Windows Vista Ultimate with a 1GHz processor, 1GB of RAM, and a 64MB video card. The user states the computer performance is slow when the Aero settings are enabled.  Which of the following can the technician do to increase performance?

Explanation

Upgrading the video card can increase performance in this case because the user states that the computer performance is slow when the Aero settings are enabled. Aero is a graphical user interface feature in Windows Vista that requires a certain level of graphics processing power. By upgrading the video card to a more powerful one, the computer will be able to handle the Aero settings more efficiently, resulting in improved overall performance.

Submit
87. A workstation is not booting correctly. The technician wants to locate bad sectors and recover readable information. Which of the following commands would the technician use?

Explanation

The technician would use the "chkdsk c: /r" command to locate bad sectors and recover readable information. The "/r" parameter stands for "repair" and instructs the chkdsk command to locate bad sectors on the hard drive and attempt to recover any readable information from them. This command is commonly used to fix disk errors and recover data on a malfunctioning workstation.

Submit
88. How can a technician confirm that a new virus definition file is authentic?

Explanation

To confirm the authenticity of a new virus definition file, a technician can check the hash key. A hash key is a unique alphanumeric value generated by a cryptographic algorithm. By comparing the hash key of the downloaded file with the official hash key provided by the antivirus software vendor, the technician can verify if the file has not been tampered with or modified in any way, ensuring its authenticity. This method ensures that the file has not been compromised or infected with malware during the download process.

Submit
89. Which of the following is the BEST method of connecting a home computer to the Internet in order to protect and secure the computer from malicious Internet attacks and scans?

Explanation

Putting a firewall or router with NAT (Network Address Translation) between the computer and the Internet is the best method of connecting a home computer to the Internet in order to protect and secure the computer from malicious Internet attacks and scans. NAT acts as a barrier between the Internet and the computer, hiding the computer's IP address and providing an extra layer of security. It helps to prevent unauthorized access and filters incoming and outgoing traffic, reducing the risk of malicious attacks. This method provides a secure and controlled connection for the home computer.

Submit
90. A technician has just installed a new computer running Windows 7 in a home office, with five other computers running Windows XP. The new computer is able to connect to the other computers on the network, but the Windows XP computers are unable to connect to the new computer. Which of the following is the cause of this issue?

Explanation

The firewall being turned on is the likely cause of the issue. Windows XP computers may not be able to connect to the new computer because the firewall on the new computer is blocking incoming connections. To resolve this, the firewall settings on the new computer should be adjusted to allow incoming connections from the Windows XP computers.

Submit
91. A customer reports that a networked printer is not printing documents. The technician successfully pings the printers IP address. Which of the following could be the problem? (Select TWO).

Explanation

The printer being out of paper could be a possible problem because if there is no paper, the printer will not be able to print the documents. Additionally, if the spooler is not functioning, it can cause issues with the printing process as the spooler is responsible for managing print jobs.

Submit
92. A technician adds a video card to a single monitor system with an existing on-board video controller. After powering on the system, an error message appears on the monitor stating No Input Detected. Which of the following is the problem?

Explanation

The error message "No Input Detected" suggests that the monitor is not receiving any signal from the video source. Since a video card has been added to the system, it is likely that the monitor is still connected to the on-board video controller instead of the newly installed add-on video card.

Submit
93. A user states that the computer is too slow when capturing video from an HD camera. Upon inspection the technician realizes that the computer is state-of-the-art in hardware, but it is using an external legacy USB 1.1 video capture card. The camera has USB 2.0 and IEE1394b outputs. Which of the following is the BEST recommendation to increase the video capture capabilities in this situation?

Explanation

The technician should recommend installing an IEEE1394b video capture card. This is because the computer is already state-of-the-art in terms of hardware, so the issue lies with the external legacy USB 1.1 video capture card. By installing an IEEE1394b video capture card, which is a faster and more modern connection, the computer will be able to capture video from the HD camera at a higher speed and improve its video capture capabilities.

Submit
94. Users are reporting that a Vista feature asks them for confirmation before running most applications or making system changes. Which of the following is the name of this Vista feature and where should the technician direct users to turn the functionality off?

Explanation

The correct answer is User Account Control; it can be turned off under User Accounts in the Control Panel. User Account Control (UAC) is a feature in Windows Vista that prompts users for confirmation before running most applications or making system changes. To turn off this functionality, users should navigate to the User Accounts section in the Control Panel and disable UAC.

Submit
95. Which of the following tools would gather the MOST detailed statistics about disk I/O?

Explanation

Performance Monitor is the correct answer because it is a tool in Windows that provides detailed statistics and performance data about various system resources, including disk I/O. It allows users to monitor and analyze the performance of their computer's hardware and software components, and provides detailed information such as disk read/write speeds, disk queue length, and other relevant metrics. Task Manager, Computer Management, and Device Manager may provide some information about disk I/O, but Performance Monitor is specifically designed to gather the most detailed statistics in this regard.

Submit
96. The system administrator has setup an administrative share on the companys file server called documents$. Which of the following are necessary to be able to access the administrative share from a computer on the companys intranet? (Select TWO).

Explanation

To access the administrative share on the company's file server called "documents$", two requirements must be met. First, the user must know the exact network path to the folder, which means they need to know the specific location of the administrative share on the network. Second, the user must have proper access rights assigned to the folder, indicating that they have the necessary permissions to access and interact with the administrative share. These two factors are crucial for accessing the administrative share from a computer on the company's intranet.

Submit
97. Which of the following private IP addresses is commonly used for internal IP addressing?

Explanation

192.168.0.1 is commonly used for internal IP addressing because it belongs to the private IP address range specified by the Internet Assigned Numbers Authority (IANA) for use in private networks. This address range is reserved for use within local area networks (LANs) and is not routable on the internet. 192.168.0.1 is often used as the default gateway IP address for home routers and is commonly used for configuring network devices within a private network.

Submit
98. A user wants to simplify the opening of Control Panel options in Windows Vista. Which of following is the BEST way to accomplish this task?

Explanation

not-available-via-ai

Submit
99. A user is reporting that their computer is making strange noises and randomly powers off. Which of the following tools would MOST likely be used to troubleshoot this problem?

Explanation

A power supply tester would be the most suitable tool to troubleshoot the reported issue. Strange noises and random power offs are often caused by a faulty power supply. By using a power supply tester, the technician can check if the power supply is providing the correct voltage and if it is functioning properly. This will help identify if the power supply is the root cause of the problem and determine if it needs to be replaced.

Submit
100. Which of the following BEST explains a system experiencing intermittent memory errors?

Explanation

The best explanation for a system experiencing intermittent memory errors is that the memory sticks have corroded contacts. Corroded contacts can cause poor electrical connections between the memory sticks and the motherboard, leading to intermittent errors. This can result in data corruption, system crashes, and other memory-related issues.

Submit
101. The Device Manager lists a disk as foreign. Which of the following MUST be done to make the disk usable?

Explanation

When a disk is listed as foreign in the Device Manager, it means that the disk was previously used in another system with a different configuration. To make the disk usable, it needs to be imported. Importing the disk will allow the current system to recognize and access the disk's data. This is necessary before any further actions, such as converting the disk to basic or dynamic, can be performed. Running Windows Update is not relevant in this scenario.

Submit
102. The purpose of NSLOOKUP is to:

Explanation

NSLOOKUP is a command-line tool used to query the Domain Name System (DNS) to obtain information about a specific domain or IP address. It is primarily used to translate an IP address to a corresponding hostname or domain name. By entering an IP address into NSLOOKUP, it will retrieve the associated domain name, providing a reverse DNS lookup. This can be useful for troubleshooting network connectivity issues or verifying the ownership of a particular IP address. Therefore, the correct answer is "translate an IP address to a name."

Submit
103. Which of the following files have replaced NTLDR in the Windows Vista startup process?

Explanation

The correct answer is bootmgr.exe, winload.exe, winresume.exe. In the Windows Vista startup process, NTLDR has been replaced by bootmgr.exe, which is responsible for locating the operating system and loading it into memory. Winload.exe is then used to load the Windows operating system kernel (ntoskrnl.exe) and essential system files. Finally, winresume.exe is responsible for resuming the system from hibernation or sleep mode.

Submit
104. A user powers up their desktop PC, and instead of booting up normally, the user is taken into the BIOS setup. Which of the following is the MOST likely problem?

Explanation

A faulty CMOS battery is the most likely problem in this scenario. The CMOS battery is responsible for providing power to the CMOS chip, which stores the BIOS settings. If the battery is faulty, it may not be able to provide sufficient power to the CMOS chip, causing the BIOS to reset and take the user into the BIOS setup instead of booting up normally. This can be resolved by replacing the faulty CMOS battery.

Submit
105. Which of the following are items that can be configured on a wireless router to make it more difficult for attackers to gain access? (Select TWO).

Explanation

Disabling SSID broadcast and changing the SSID from default are two items that can be configured on a wireless router to make it more difficult for attackers to gain access. Disabling SSID broadcast prevents the router from broadcasting its network name, making it less visible to potential attackers. Changing the SSID from default adds an extra layer of security as attackers often target routers with default settings. By changing the SSID, the attacker would need to spend more time figuring out the network name, making it harder for them to gain access.

Submit
106. A technician is setting up a SOHO and has configured the wireless NIC on the laptop with WPA2. While configuring the WAP, WPA2 is not listed as an option. Which of the following should the technician do NEXT?

Explanation

The technician should install the latest WAP firmware. This is because the WAP (Wireless Access Point) is not listing WPA2 as an option, indicating that it may not be compatible with the current firmware. By installing the latest firmware, the technician can ensure that the WAP supports WPA2 and can properly configure it for the SOHO setup.

Submit
107. Which of the following tools allows the technician to copy a file without prompts?

Explanation

The correct answer is COPY /Y because the /Y switch in the COPY command allows the technician to copy a file without prompts. When the /Y switch is used, any existing file with the same name as the file being copied will be automatically overwritten without any prompts or confirmation messages. This saves time and allows for a quicker and more efficient file copy process.

Submit
108. A customer is trying to copy a DVD with a third-party application. The program reads the source DVD fine, but when the blank is inserted, the program continuously prompts to insert blank media. Which of the following are possible causes? (Select THREE).

Explanation

The possible causes for the program continuously prompting to insert blank media are:
1) A CD is inserted into the drive, which is not compatible for copying a DVD.
2) A DVD is inserted upside down in the drive, preventing the program from recognizing it as blank media.
3) The wrong DVD type is inserted into the drive, meaning it is not compatible for copying.

Submit
109. A user reports that their system is giving a message stating that their USB 2.0 devices are running at USB 1.1 speed without an external USB hub. The devices run at USB 2.0 when tested on the technicians PC. Which of the following will MOST likely provide USB 2.0 functionality?

Explanation

Installing a USB 2.0 firmware update on the motherboard is the most likely solution to provide USB 2.0 functionality in this scenario. This update will ensure that the motherboard's firmware is compatible with USB 2.0 devices and will enable them to run at the correct speed. This solution is preferred over the other options because it directly addresses the issue with the system's USB functionality and does not require any additional hardware or cables.

Submit
110. Which of the following ports should be forwarded on the firewall to make SSH management accessible from the Internet?

Explanation

Port 22 should be forwarded on the firewall to make SSH management accessible from the Internet. SSH (Secure Shell) is a protocol that allows secure remote access to a computer or server. By forwarding port 22, incoming SSH connections can reach the server through the firewall, enabling remote management and administration.

Submit
111. Which of the following commands would output the line below? 00:0C:24:09:08:07 10.0.0.1

Explanation

The correct answer is "arp -a" because the "arp -a" command is used to display the ARP (Address Resolution Protocol) cache table, which contains the IP address to MAC address mappings. In this case, the line "00:0C:24:09:08:07 10.0.0.1" represents an entry in the ARP cache table, where the MAC address "00:0C:24:09:08:07" is associated with the IP address "10.0.0.1".

Submit
112. A new computer has an odor near the power supply when turned on. Which of the following should be done?

Explanation

not-available-via-ai

Submit
113. Which of the following is a DHCP server capable of providing to a DHCP client?

Explanation

A DHCP server is responsible for assigning IP addresses, as well as other network configuration parameters, to DHCP clients. Among the options provided, a DHCP server can provide the IP addresses of WINS server, DNS server, and the default gateway to the DHCP client. The WINS server is used for NetBIOS name resolution, the DNS server is used for domain name resolution, and the default gateway is the router that connects the local network to other networks.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 17, 2011
    Quiz Created by
    Freddyoca
Cancel
  • All
    All (113)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
A computer just had a memory upgrade installed on the machine. Upon...
A user signs up for every online promotion and mailing list they are...
Which of the following can cause a blue screen error?
A technician is experiencing an issue with the computer randomly...
A user is cleaning up their temporary Internet files and is concerned...
A computer just had a memory upgrade installed on the machine. Upon...
Which of the following tools would be BEST to use to pry open the case...
Which of the following tools can be used prior to installing Windows...
A technician needs to modify the BIOS settings of a PC; however, the...
A user states that the inkjet printer is printing streaks on...
From a command prompt, a technician is removing some old user profiles...
After performing a preventative maintenance on a laser printer, which...
A technician needs to implement a RAID 1 set on a computer. Which of...
After replacing the motherboard in a laptop, the system overheats and...
A user reports it takes a long time to load all applications and the...
Which of the following is the MAXIMUM allowable cable length of CAT5?
A technician has deleted all the files in the directory C:\tempfiles....
If a computer has an IP address of 169.254.6.15, which of the...
A user is attempting to access files shared on a remote computer. The...
A technician troubleshooting an issue over the phone determines that a...
A computer is not able to access Internet websites, internal company...
A technician plugs a USB device into the front panel of a desktop...
A second optical drive has been added to the computer and needs to be...
Under which of the following circumstances would a technician use...
A user is playing a new first person game on the computer and the...
A user is connected to a stand alone printer. The user is receiving an...
A technician is dispatched to a system that will not go beyond the...
A user is not able to receive files off the FTP server. Which of the...
A user has just moved to a new office and is unable to access the...
A user reports that after installing a PCIe video card into a system,...
A technician is upgrading memory in a desktop PC. The user purchased...
A home user wants to setup a wireless network. Which of the following...
A technician is tasked with setting up a Windows XP computer with a...
An internal IEEE 1394 expansion card should be installed on which port...
A user can receive email but cannot send email with the email client...
After installing a replacement floppy disk drive, the LED on the drive...
Which of the following is a difference between a worm and spyware?
Which of the following will occur if an AGP 4x video card is used in...
A user reports that a laser printer is printing out pages with blurry...
A technician needs a list of all the routers along a given path over...
A user states that the wireless router keeps rebooting while the power...
Which of the following is the BEST source for information about...
A user reports that after working for a while with their PC, the...
After rebooting a workstation a message pops up saying one or more...
A user reports that when typing on the laptop keyboard, the mouse...
An inkjet printer prints faded and smeared pages. Which of the...
Which of the following commands would be used to go from c:\windows to...
Which of the following is contained in the first sector of the hard...
The technician is moving a users files from a Windows XP PC to a...
Given the following TCP/IP information for a computer, which of the...
Which of the following is fault tolerant and allows for disk...
A virus has been removed from the users machine, but the user still...
A technician is replacing a motherboard in a laptop. After completing...
Which of the following does PING -t do?
After upgrading to Windows Vista, a client states that the run command...
A technician is attempting to configure Windows XP Media Center on a...
If a technician suspects that the voltage being delivered to a desktop...
A user states that email is not being received. Which of the following...
On a laptop, which of the following is the name of the socket that a...
Which of the following commands will be run at a command prompt to...
A technician has just installed a new hard drive into a Windows Vista...
A technician is replacing a hard drive with a new 30GB drive formatted...
A user states that a small office home office (SOHO) router constantly...
After the network printer has been rebooted none of the users are able...
A computer is responding slowly and the Task Manager shows that...
A customer reports that a workstation no longer connects to the...
Which of the following is the BEST tool to troubleshoot a DB-9 port?
Which of the following is the MOST important reason for ensuring a...
A home user is setting up a wireless network. Which of the following...
A technician is troubleshooting problems with a hard drive. After...
Which of the following should MOST likely be replaced if the laptop...
USER1 is part of the Users Group and is attempting to access files via...
Users in the office report that the speed of the Internet has...
A computer running Windows 7 will not boot up. A user is receiving an...
Which of the following devices has the options of: master, slave and...
Malware is removed and a computer is rebooted. Later, the malware is...
A user reports that a network printer will not print, however, other...
A technician is replacing a motherboard in a users desktop PC. Which...
Using the NET command which variable would be used to find out the...
An office laser printer is printing lighter in random areas. Which of...
Which of the following is a method used in the removal of a boot...
A yellow exclamation mark next to a device in Device Manager indicates...
A user is attempting to access a website but is getting a Page cannot...
Which of the following requires an adapter when connecting to a Molex...
Which of the following will occur if an NTFS-formatted USB drive is...
A user is running Windows Vista Ultimate with a 1GHz processor, 1GB of...
A workstation is not booting correctly. The technician wants to locate...
How can a technician confirm that a new virus definition file is...
Which of the following is the BEST method of connecting a home...
A technician has just installed a new computer running Windows 7 in a...
A customer reports that a networked printer is not printing documents....
A technician adds a video card to a single monitor system with an...
A user states that the computer is too slow when capturing video from...
Users are reporting that a Vista feature asks them for confirmation...
Which of the following tools would gather the MOST detailed statistics...
The system administrator has setup an administrative share on the...
Which of the following private IP addresses is commonly used for...
A user wants to simplify the opening of Control Panel options in...
A user is reporting that their computer is making strange noises and...
Which of the following BEST explains a system experiencing...
The Device Manager lists a disk as foreign. Which of the following...
The purpose of NSLOOKUP is to:
Which of the following files have replaced NTLDR in the Windows Vista...
A user powers up their desktop PC, and instead of booting up normally,...
Which of the following are items that can be configured on a wireless...
A technician is setting up a SOHO and has configured the wireless NIC...
Which of the following tools allows the technician to copy a file...
A customer is trying to copy a DVD with a third-party application. The...
A user reports that their system is giving a message stating that...
Which of the following ports should be forwarded on the firewall to...
Which of the following commands would output the line below?...
A new computer has an odor near the power supply when turned on. Which...
Which of the following is a DHCP server capable of providing to a DHCP...
Alert!

Advertisement