CompTIA 220-802 Practice Exam

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Shellbreiner
S
Shellbreiner
Community Contributor
Quizzes Created: 2 | Total Attempts: 349
| Attempts: 148
SettingsSettings
Please wait...
  • 1/100 Questions

    Your customer's laptop's LCD is being scratched by the keyboard when the lid is closed. What would prevent this from happening?

    • Replace the rubber bumpers
    • Replace the LCD hinges
    • Replace the LCD panel
    • Replace the keyboard
Please wait...
About This Quiz

This CompTIA 220-802 practice exam assesses skills in troubleshooting network connectivity, securing devices, and understanding system security. It prepares learners for IT support roles by testing practical knowledge applicable to CompTIA certification.

CompTIA 220-802 Practice Exam - Quiz

Quiz Preview

  • 2. 

    You want to create a spanned volume over two hard drives that are separate from the system volume of a Windows 7 workstation. What tool can help you determine if the har drives can support spanned volumes?

    • Disk Management

    • Task Mananger

    • Device Manager

    • System Information

    Correct Answer
    A. Disk Management
    Explanation
    Disk Management is the correct answer because it is a Windows utility that allows users to manage and configure disk drives and volumes. It provides information about the available hard drives and their capabilities, including the ability to support spanned volumes. By accessing Disk Management, you can determine if the hard drives in question can be used to create a spanned volume.

    Rate this question:

  • 3. 

    You just installed front panel USB ports that are not functioning properly. However, the ports on the back of the computer works fine. What should you do first?

    • Check the uSB rear panel pinouts to verify that the ports are wired as per manufacturer instructions

    • Check the Device Manager for any alerts of question marks over USB-related devices

    • Test the voltage output of each USB port with a multimeter

    • Make sure that any USB devices are not drawing too much power from the ports

    Correct Answer
    A. Check the Device Manager for any alerts of question marks over USB-related devices
    Explanation
    Checking the Device Manager for any alerts or question marks over USB-related devices is the first step to take because it helps to identify if there are any driver issues or conflicts with the USB ports. This can be a common cause for malfunctioning front panel USB ports. By checking the Device Manager, you can determine if there are any problems with the USB drivers and take appropriate action to resolve them.

    Rate this question:

  • 4. 

    What is the best way to ensure that only certain computers can access your wireless network?

    • Disable the SSID

    • Enable MAC filtering

    • Change the SSID

    • Change the default password

    Correct Answer
    A. Enable MAC filtering
    Explanation
    Enabling MAC filtering is the best way to ensure that only certain computers can access your wireless network. MAC filtering allows you to create a whitelist of specific MAC addresses (unique identifiers for network devices) that are allowed to connect to your network. By enabling this feature, any device that does not have a MAC address on the whitelist will be denied access, providing an additional layer of security for your wireless network.

    Rate this question:

  • 5. 

    You have been asked by a customer to add a second optical drive, to be referenced as M: on a computer running Windows 7. What is the best place to accomplish this?

    • Disk Management

    • Administrative Tools

    • Device Manager

    • Event Viewer

    Correct Answer
    A. Disk Management
    Explanation
    The best place to add a second optical drive, to be referenced as M:, on a computer running Windows 7 is Disk Management. Disk Management is a built-in tool in Windows that allows users to manage their disks and partitions. By accessing Disk Management, the user can initialize, format, and assign drive letters to new disks or partitions, including the second optical drive. This ensures that the drive is recognized by the system and can be accessed properly with the desired drive letter.

    Rate this question:

  • 6. 

    Which command would you use to delete an empty directory?

    • EDIT

    • RD

    • FORMAT

    • DIR

    Correct Answer
    A. RD
    Explanation
    The command "RD" is used to delete an empty directory.

    Rate this question:

  • 7. 

    After replacing a motherboard in a PC, the system overheats and fails to boot. What is the most likely cause?

    • The GPU is not compatible with the CPU

    • The new motherboard's firmware is out of date

    • Thermal paste was not applied between the heat sink and the CPU

    • The case fan failed

    Correct Answer
    A. Thermal paste was not applied between the heat sink and the CPU
    Explanation
    The most likely cause for the system overheating and failing to boot after replacing the motherboard is that thermal paste was not applied between the heat sink and the CPU. Thermal paste is used to improve the transfer of heat between the CPU and the heat sink, ensuring efficient cooling. Without thermal paste, the heat generated by the CPU cannot be effectively dissipated, leading to overheating and system failure.

    Rate this question:

  • 8. 

    A laptop you are troubleshooting will not display any video through the laptop's screen or through external monitors. What should you place?

    • Inverter

    • Video card

    • LCD

    • Drivers

    Correct Answer
    A. Video card
    Explanation
    In this scenario, if the laptop is not displaying any video through the laptop's screen or external monitors, the most likely cause is a faulty video card. The video card is responsible for generating and sending the video signal to the display. If it is not functioning properly, it can result in a lack of video output. The other options, such as the inverter (which controls the backlight of the screen), LCD (the screen itself), and drivers (software that allows the operating system to communicate with the video card) may also cause display issues, but they are less likely to be the root cause in this case.

    Rate this question:

  • 9. 

    Which of the following utilities enables a Windows 7 user to edit a file offline, and then automatically update the changes when the user returns back to the office?

    • Sync Center

    • Windows Aero

    • Windows Defender

    • HomeGroup

    Correct Answer
    A. Sync Center
    Explanation
    Sync Center is a utility in Windows 7 that allows users to edit files offline and automatically sync the changes when they return to the office. This feature is particularly useful for users who frequently work on files while traveling or in areas with limited or no internet connectivity. By using Sync Center, users can ensure that their files are always up to date and synced with the latest changes, regardless of their location or internet availability.

    Rate this question:

  • 10. 

    A co-worker attempts to run an old program on his Windows 7 computer. The program briefly opens, but then it closes immediately. What can you do to enable the program to run correctly?

    • Run the program in Windows Compatibility mode

    • Run the program from the Command Prompt

    • Run the program inside a virtual machine

    • Run the program from another computer

    Correct Answer
    A. Run the program in Windows Compatibility mode
    Explanation
    Running the program in Windows Compatibility mode allows it to run correctly on a newer version of Windows. This mode enables the program to emulate an older version of Windows, resolving any compatibility issues that may be causing it to close immediately. By selecting the appropriate compatibility settings, the program can be executed as if it were running on the desired Windows version, ensuring its proper functionality.

    Rate this question:

  • 11. 

    A customer reports to you that he cannot access the company FTP site. He says that he is using the IP address given to him: 86200.43.118. What is most likely the problem?

    • Port 21 is blocked

    • This is an invalid IP address

    • The FTP site is down

    • The FTP program is not working

    Correct Answer
    A. This is an invalid IP address
    Explanation
    The given IP address, 86200.43.118, is not a valid IP address format. IP addresses consist of four sets of numbers separated by periods, with each set ranging from 0 to 255. In this case, the first set of numbers, 86200, is outside the valid range, indicating that it is an invalid IP address. Therefore, the most likely problem is that the customer is using an incorrect or invalid IP address to access the company FTP site.

    Rate this question:

  • 12. 

    Which command should you use to find out the integrity of a hard drive?

    • CHKDSK

    • FDISK

    • FORMAT

    • IPCONFIG

    Correct Answer
    A. CHKDSK
    Explanation
    CHKDSK is the correct answer because it is a command used to check the integrity of a hard drive in Windows operating systems. CHKDSK stands for "Check Disk" and it scans the file system on the hard drive for errors and fixes them if possible. It also identifies and marks bad sectors on the hard drive. FDISK is a command used for disk partitioning, FORMAT is used to format a disk, and IPCONFIG is used to display the IP configuration of a network interface.

    Rate this question:

  • 13. 

    Which version of Windows 7 includes BitLocker encryption?

    • Starter

    • Home Premium

    • Professional

    • Ultimate

    Correct Answer
    A. Ultimate
    Explanation
    The Ultimate version of Windows 7 includes BitLocker encryption. BitLocker is a security feature that allows users to encrypt their drives to protect the data stored on them. This feature is not available in the Starter, Home Premium, or Professional versions of Windows 7.

    Rate this question:

  • 14. 

    One of your customers tries to log in to a bookmarked site but instead of seeing the website expected, the user is prompted for a Social Security number, mother's maiden name, and date of birth. What most likely occurred?

    • The browser was hijacked

    • The customer's identity was stolen

    • The website the user accessed has updated their security policies

    • The user typed the wrong URL

    Correct Answer
    A. The browser was hijacked
    Explanation
    If the customer is being prompted for personal information that is not typically required for logging in, it suggests that their browser has been hijacked. This means that someone has gained unauthorized access to their browser and is attempting to gather sensitive information.

    Rate this question:

  • 15. 

    You install a Windows 7 computer for a computer. They already have three Windows XP computers on a network. The new Windows 7 computer can ping the Windows XP computers, but the Windows XP computers cannot ping the Windows 7 computer. What is the reason for this?

    • The firewall is on

    • The network cable is unplugged

    • The operating systems are not compatible

    • Windows updates need to be installed

    Correct Answer
    A. The firewall is on
    Explanation
    The reason for the Windows XP computers not being able to ping the Windows 7 computer is that the firewall is enabled on the Windows 7 computer. The firewall is blocking incoming ping requests from the Windows XP computers, preventing them from establishing a connection with the Windows 7 computer.

    Rate this question:

  • 16. 

    You have determined that the USB controller is malfunctioning. What should you do first to troubleshoot this problem?

    • Replace the USB controller

    • Test the voltage of the USB controller using a multimeter

    • Use the System Information utility

    • Use the Windows Device Manager

    Correct Answer
    A. Use the Windows Device Manager
    Explanation
    To troubleshoot a malfunctioning USB controller, the best first step is to use the Windows Device Manager. This utility allows you to view and manage the hardware devices connected to your computer. By accessing the Device Manager, you can check if the USB controller is recognized by the system, if it has any driver issues, or if there are any conflicts with other devices. This will help you identify and potentially resolve the problem without the need to replace the USB controller or perform any hardware testing.

    Rate this question:

  • 17. 

    A user attempts to print a large image but only half the graphic prints out. What is the most likely reason for this?

    • The printer doesn't support the job's language

    • The printer needs more memory

    • The printer driver needs to be updated

    • The network connection is faulty

    Correct Answer
    A. The printer needs more memory
    Explanation
    The most likely reason for only half of the graphic printing out is that the printer needs more memory. When printing a large image, the printer may not have enough memory to process and print the entire image at once. As a result, it may only be able to print a portion of the image before running out of memory. Increasing the printer's memory capacity should resolve this issue and allow the full image to be printed.

    Rate this question:

  • 18. 

    Which of the following is common e-mail service that people use on their smartphone?

    • POP3

    • Outlook

    • HTTP

    • GMAIL

    Correct Answer
    A. GMAIL
    Explanation
    GMAIL is the correct answer because it is a commonly used email service that people use on their smartphones. It is a free email service provided by Google and is available as an app on both Android and iOS devices. GMAIL offers features such as a user-friendly interface, large storage capacity, efficient spam filtering, and seamless integration with other Google services. Many smartphone users prefer GMAIL for its convenience and reliability in managing their emails on the go.

    Rate this question:

  • 19. 

    At one of your customer's locations, two users share the same Windows 7 computer. The first user creates a document intended to be used by both users and then logs off the computer. The second user logs on and types the name of the document in the Start menu but the document cannot be found. What is the problem?

    • The document is locked

    • The document is set to hidden

    • The document is owned by the first user

    • The document is encrypted

    Correct Answer
    A. The document is owned by the first user
    Explanation
    The problem is that the document is owned by the first user. This means that only the first user has access to the document, and it cannot be accessed or viewed by the second user.

    Rate this question:

  • 20. 

    You receive a message in Windows XP that warns you of a memory-read error. What should you do to fix this?

    • Reseat or replace RAM modules

    • Change the memory settings in the BIOS

    • Replace the hard drive

    • Remove any USB flash drives

    Correct Answer
    A. Reseat or replace RAM modules
    Explanation
    If you receive a message in Windows XP warning you of a memory-read error, the correct action to fix this issue is to reseat or replace the RAM modules. This error indicates a problem with the computer's memory, and reseating the RAM modules can help ensure they are properly connected. If the issue persists, replacing the RAM modules may be necessary to resolve the error. Changing the memory settings in the BIOS, replacing the hard drive, or removing USB flash drives would not directly address a memory-read error.

    Rate this question:

  • 21. 

    Which component is usually removed to access a laptop's motherboard and other internal components?

    • Display

    • Bezel

    • Keyboard

    • Battery

    Correct Answer
    A. Keyboard
    Explanation
    The keyboard is usually removed to access a laptop's motherboard and other internal components. This is because the keyboard is attached to the top case of the laptop, and removing it allows access to the screws and connectors that hold the top case in place. Once the keyboard is removed, the top case can be lifted off, providing access to the motherboard and other internal components for repairs or upgrades.

    Rate this question:

  • 22. 

    What is another name for a mirrored set?

    • RAID 0

    • RAID 1

    • RAID 5

    • RAID 6

    Correct Answer
    A. RAID 1
    Explanation
    RAID 1 is another name for a mirrored set. In RAID 1, data is duplicated across multiple drives, creating an exact copy or mirror of the data. This provides redundancy and fault tolerance, as if one drive fails, the data can still be accessed from the other drive. RAID 1 is commonly used in situations where data integrity and reliability are crucial, such as in critical database systems or important backup storage.

    Rate this question:

  • 23. 

    Which of the following programs are commonly found on a smartphone? (Select the three best answers)

    • E-mail programs

    • Microsoft Word

    • Visual Basic

    • Contacts programs

    • Texting programs

    Correct Answer(s)
    A. E-mail programs
    A. Contacts programs
    A. Texting programs
    Explanation
    E-mail programs, Contacts programs, and Texting programs are commonly found on a smartphone. These programs allow users to send and receive emails, manage their contacts, and send text messages, respectively. Microsoft Word and Visual Basic are not commonly found on smartphones as they are more commonly used on computers for word processing and programming purposes.

    Rate this question:

  • 24. 

    Which of the following could be defined as standing behind a person at a desk attempting to view confidential information?

    • Root Kit

    • Phishing

    • Shoulder Surfing

    • Tailgating

    Correct Answer
    A. Shoulder Surfing
    Explanation
    Shoulder Surfing could be defined as standing behind a person at a desk attempting to view confidential information. This term refers to the act of trying to obtain sensitive information by visually observing someone's computer screen or keypad entries without their knowledge or consent. It is considered a form of information theft and invasion of privacy.

    Rate this question:

  • 25. 

    Which command would you use to display the contents of C:\Windows\System32\?

    • NET

    • CD

    • System Information Tool

    • DIR

    Correct Answer
    A. DIR
    Explanation
    The correct answer is DIR. The DIR command is used to display the contents of a directory. In this case, it would display the contents of the C:\Windows\System32 directory. This command is commonly used in command prompt or terminal to view the files and folders within a specific directory.

    Rate this question:

  • 26. 

    A user tells you taht his PC is making a strange noise. What is the most likely the cause?

    • The CPU needs to be reseated

    • A network cable is vibrating against the system case

    • The thermal grease died out and needs to tbe reapplied

    • An internal wire is improperly routed and is hitting the CPU fan

    Correct Answer
    A. An internal wire is improperly routed and is hitting the CPU fan
    Explanation
    An internal wire being improperly routed and hitting the CPU fan is the most likely cause of the strange noise in the PC. This can result in the wire interfering with the rotation of the fan, causing it to make a noise. Reseating the CPU, a vibrating network cable, or dried out thermal grease would not typically cause a strange noise.

    Rate this question:

  • 27. 

    One of tour co-workers is attempting to access a file on a share located on a remote computer. The file's share permissions are set to allow the user full control; however, the NTFS permissions allow the user to have read access. What will be the user's resulting access level for the file?

    • Read

    • Write

    • Modify

    • Full Control

    Correct Answer
    A. Read
    Explanation
    The user's resulting access level for the file will be Read. This is because NTFS permissions take precedence over share permissions. Even though the share permissions allow the user full control, the more restrictive NTFS permissions only allow read access. Therefore, the user will only have read access to the file.

    Rate this question:

  • 28. 

    Which of the following answers can be the cause of a blue screen error?

    • Rogue DHCP server

    • Incorrect router configuration

    • Bad driver

    • Incompatible USB device

    Correct Answer
    A. Bad driver
    Explanation
    A bad driver can be a cause of a blue screen error. When a driver is corrupted, outdated, or incompatible with the operating system or other hardware components, it can result in system instability and crashes, leading to a blue screen error. Drivers act as a bridge between the hardware and the operating system, and any issues with them can disrupt the communication and functionality of the system, causing the blue screen error to occur.

    Rate this question:

  • 29. 

    One of your organization's technicians reconfigures the BIOS boot order on a PC and sees that the system time is incorrect. The technician resets the clock to the correct time but sees that a couple days later, the system time is wrong again. What is the most likely cause?

    • The motherboard is not seated properly

    • The time zone settings are incorrect in the OS

    • The CMOS battery has failed

    • The power supply is not providing the correct voltage

    Correct Answer
    A. The CMOS battery has failed
    Explanation
    The most likely cause for the system time being incorrect again after resetting it is that the CMOS battery has failed. The CMOS battery is responsible for powering the Real Time Clock (RTC) on the motherboard, which keeps track of the system time even when the computer is turned off. If the CMOS battery fails, the RTC will not be able to keep accurate time, leading to the system time being wrong.

    Rate this question:

  • 30. 

    What can the command ping -t do?

    • Continuous ping of an IP address until the responds

    • Continuous ping of an IP address until it's canceled

    • Continuous ping of an IP address until the count reaches 20

    • Continuous ping of an IP address where each packet is equal to 1000 bytes

    Correct Answer
    A. Continuous ping of an IP address until it's canceled
    Explanation
    The command "ping -t" allows for continuous pinging of an IP address until it is manually canceled. This means that the command will keep sending ping requests to the specified IP address without stopping, providing a continuous stream of data. The user can choose to cancel the command at any time to stop the continuous pinging process.

    Rate this question:

  • 31. 

    You are installing a 32-bit program in a 64-bit version of Windows 7?

    • C:\

    • C:\Program Files

    • C:\Windows

    • C:\Program Files (x86)

    Correct Answer
    A. C:\Program Files (x86)
    Explanation
    The correct answer is "C:\Program Files (x86)". In a 64-bit version of Windows 7, the "Program Files (x86)" directory is used to install 32-bit programs. This directory is specifically designed to separate 32-bit applications from 64-bit applications, allowing them to coexist on the same system. By installing the 32-bit program in the "Program Files (x86)" directory, it ensures compatibility and proper functioning of the program within the 64-bit operating system.

    Rate this question:

  • 32. 

    Which of the following paths is the default directory for the user profiles in Windows 7?

    • C:\Program Files

    • C:\Users

    • C:\Users and Settings\

    • C:\Document and Settings\

    Correct Answer
    A. C:\Users
    Explanation
    The default directory for user profiles in Windows 7 is C:\Users. This is where all user profiles and their associated files and settings are stored. The other options, C:\Program Files, C:\Users and Settings\, and C:\Document and Settings\, are not the default directories for user profiles in Windows 7.

    Rate this question:

  • 33. 

    You co-worker is having trouble tapping icons on his smartphone. What should you check first?

    • Screen orientation

    • Geotracking

    • Global positioning

    • Screen calibration

    Correct Answer
    A. Screen calibration
    Explanation
    If your co-worker is having trouble tapping icons on his smartphone, the first thing you should check is the screen calibration. Screen calibration ensures that the touch input is accurately registered by the device. If the calibration is off, the touch inputs may not be accurately recognized, causing difficulty in tapping icons or using the touchscreen effectively. Checking the screen calibration settings and recalibrating if necessary can help resolve the issue.

    Rate this question:

  • 34. 

    A co-worker suspects that the AC voltage supplied to a PC power supply is flawed. What tool should be used to confirm this suspicsion?

    • Oscilloscope

    • Cable tester

    • Multimeter

    • PSU tester

    Correct Answer
    A. Multimeter
    Explanation
    A multimeter is the appropriate tool to confirm the suspicion of a flawed AC voltage supplied to a PC power supply. A multimeter can measure various electrical parameters, including voltage, current, and resistance. By connecting the multimeter to the power supply, the co-worker can measure the AC voltage and determine if it is within the expected range. This will help in confirming whether the AC voltage is indeed flawed or not.

    Rate this question:

  • 35. 

    Which command is the best option for verifying that the protected system files in Windows 7 are correct?

    • DISKPART

    • SFC

    • SCANDISK

    • FIXMBR

    Correct Answer
    A. SFC
    Explanation
    The best option for verifying that the protected system files in Windows 7 are correct is the SFC (System File Checker) command. SFC scans the integrity of all protected system files and replaces incorrect versions with the correct Microsoft versions. This helps ensure the stability and functionality of the operating system by ensuring that important system files are not corrupted or modified.

    Rate this question:

  • 36. 

    Which of the following is stored in the first sector of the hard drive?

    • Boot sector

    • Operating System

    • Master boot record

    • Master file table

    Correct Answer
    A. Master boot record
    Explanation
    The first sector of a hard drive typically contains the Master Boot Record (MBR). The MBR is a small program that is responsible for booting the computer and loading the operating system. It contains information about the partitions on the hard drive and the location of the operating system files. The MBR is crucial for the computer to start up properly and is therefore stored in the first sector of the hard drive.

    Rate this question:

  • 37. 

    You turn in a computer, and a blue screen appears with an error code, Where should you go to find out what this error code means?

    • Third-party website

    • OS manufacturer's website

    • Hardware manufacturer's website

    • Installation manual

    Correct Answer
    A. OS manufacturer's website
    Explanation
    To find out what the error code on the blue screen means, it is best to visit the OS manufacturer's website. The OS manufacturer will have the most up-to-date and accurate information about their operating system and its error codes. They will likely have a support section or knowledge base that can provide detailed explanations and possible solutions for the specific error code encountered. Third-party websites may have information as well, but it is always recommended to go directly to the official source for the most reliable information. The hardware manufacturer's website may be useful for hardware-related errors, but for an error code displayed on the blue screen, the OS manufacturer's website is the most appropriate choice.

    Rate this question:

  • 38. 

    A customer complains that they can only view their tablet vertically, and that it won't display horizontally. What is the problem?

    • Screen calibration

    • Screen orientation

    • Geotracking

    • The touchscreen needs to be replaced

    Correct Answer
    A. Screen orientation
    Explanation
    The problem is with the screen orientation. The customer's tablet is only displaying vertically and not horizontally. This suggests that the screen is locked in a specific orientation and is not rotating when the tablet is turned. To fix this issue, the screen orientation settings need to be adjusted to allow for automatic rotation or to manually select the desired orientation.

    Rate this question:

  • 39. 

    A two-year-old inkjet printer just started printing faded and smeared pages. What is the best solution for this?

    • Reseat the print cartridges

    • Use a lint-free cloth to clean the print heads

    • Use compressed air on the print cartridges

    • Run the printer's cleaning routine

    Correct Answer
    A. Run the printer's cleaning routine
    Explanation
    Running the printer's cleaning routine is the best solution for a two-year-old inkjet printer that is printing faded and smeared pages. This routine is specifically designed to clean the print heads and remove any clogs or debris that may be causing the printing issues. Reseating the print cartridges may help ensure they are properly installed, but it may not address the underlying issue. Using a lint-free cloth to clean the print heads can also be helpful, but it may not be sufficient to fully resolve the problem. Using compressed air on the print cartridges can potentially damage the printer if not done correctly, so it is not the best solution in this case.

    Rate this question:

  • 40. 

    A program is no longer responding. Where would a technician go to end the program?

    • Computer Management

    • Task Manager

    • Registry

    • Services console

    Correct Answer
    A. Task Manager
    Explanation
    When a program becomes unresponsive, a technician would typically use the Task Manager to end the program. Task Manager is a system utility in Windows that provides information about the processes and applications running on a computer. It allows users to view and manage running programs, monitor system performance, and end unresponsive tasks or processes. Therefore, Task Manager is the appropriate tool for a technician to terminate a program that is no longer responding.

    Rate this question:

  • 41. 

    What color do EFS files display in by default?

    • Blue

    • Black

    • Green

    • Red

    Correct Answer
    A. Green
    Explanation
    EFS files display in green color by default. This color is used to indicate that the file is encrypted using the Encrypting File System (EFS) feature in Windows. Green color helps users easily identify which files are encrypted and provides a visual cue for their security status.

    Rate this question:

  • 42. 

    What would you replace in a laser printer if you see ghosted images?

    • Fuser

    • Cartridge

    • Drum

    • Printhead

    Correct Answer
    A. Drum
    Explanation
    If you see ghosted images in a laser printer, the most likely component that needs to be replaced is the drum. The drum is responsible for transferring toner onto the paper during the printing process. If the drum becomes worn or damaged, it can result in ghosted images, where faint copies of previous images appear on subsequent prints. Replacing the drum should resolve this issue and ensure that the printer produces clean and clear prints.

    Rate this question:

  • 43. 

    A user can no longer print from their computer to the default printer. You can print a test page from the printer, and the printer's queue shows that the job is ready to print. What hsould you do to resolve the situation?

    • Delete the job and resubmit it

    • Reinstall the print drivers

    • Reset the printer

    • Restart the printer spooler service

    Correct Answer
    A. Restart the printer spooler service
    Explanation
    Restarting the printer spooler service can resolve the situation where a user is unable to print from their computer to the default printer. The printer's queue shows that the job is ready to print, indicating that there may be an issue with the printer spooler service. Restarting this service can help refresh the printing system and resolve any potential errors or conflicts that may be preventing the printing process.

    Rate this question:

  • 44. 

    You just installed a new computer for a customer who complains that there is an odor near the power supply when it is turned on. What should you do?

    • Replace the power supply

    • Unplug the computer and contact the manufacturer

    • Use compressed air to flush the odor from the power supply

    • Run the computer for 48 hours and disregard if the odor goes away

    Correct Answer
    A. Run the computer for 48 hours and disregard if the odor goes away
    Explanation
    Running the computer for 48 hours and disregarding if the odor goes away is the correct answer because it is possible that the odor is just a result of the new components settling in and will dissipate over time. By allowing the computer to run for a period of time, any initial manufacturing residue or other sources of odor can potentially be eliminated. If the odor persists after 48 hours, further investigation or contacting the manufacturer may be necessary.

    Rate this question:

  • 45. 

    Which versions of Windows offer offline files and folders? (Select the two best answers)

    • Windows XP Home

    • Windows 7 Ultimate

    • Windows Vista Home Premium 64-bit

    • Windows XP Professional

    Correct Answer(s)
    A. Windows 7 Ultimate
    A. Windows XP Professional
    Explanation
    Windows 7 Ultimate and Windows XP Professional offer offline files and folders. Offline files and folders allow users to access and work on files even when they are not connected to the network. This feature is useful for users who need to access their files while traveling or in areas with limited or no internet connectivity. Windows XP Home and Windows Vista Home Premium 64-bit do not offer this feature.

    Rate this question:

  • 46. 

    You want to utilize the NET command to tell you how many Server Message Blocks (SMB) were received by the workstation service. Which NET command should you use?

    • View

    • Statistics

    • Stop

    • Use

    Correct Answer
    A. Statistics
    Explanation
    To determine the number of Server Message Blocks (SMB) received by the workstation service using the NET command, the correct command to use is "Statistics". This command will provide the necessary information and statistics related to the SMBs received by the workstation service.

    Rate this question:

  • 47. 

    Which tool would you use if you want to do a Startup Repair in Windows 7?

    • Safe Mode

    • Recovery Console

    • WinRE

    • System Image Recovery

    Correct Answer
    A. WinRE
    Explanation
    WinRE stands for Windows Recovery Environment, which is a tool that is used to troubleshoot and repair issues in the Windows operating system. It provides various options for repairing the system, including Startup Repair. Therefore, if you want to perform a Startup Repair in Windows 7, you would use the WinRE tool.

    Rate this question:

  • 48. 

    You just finished removing malware from a customer's computer located in a small office, but the Internet browser cannot access any websites. What should you do first?

    • Reset the router

    • Remove the browser proxy settings

    • Reboot the computer

    • Install the latest service pack

    Correct Answer
    A. Remove the browser proxy settings
    Explanation
    Removing the browser proxy settings should be done first because malware often modifies these settings to redirect internet traffic through a malicious server. By removing the proxy settings, the browser will be able to access websites directly without any redirection or interference from the malware. This will help restore the internet connectivity and ensure a secure browsing experience for the customer.

    Rate this question:

  • 49. 

    Which type of malware self-replicates?

    • Virus

    • Worm

    • Trojan

    • Spyware

    Correct Answer
    A. Worm
    Explanation
    A worm is a type of malware that is capable of self-replicating and spreading across networks without any human intervention. Unlike viruses, worms do not need to attach themselves to a host file or program in order to propagate. They exploit vulnerabilities in computer systems and use network connections to spread from one computer to another. Once a worm infects a computer, it can create copies of itself and distribute them to other vulnerable systems, causing widespread damage and disruption.

    Rate this question:

Quiz Review Timeline (Updated): May 30, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • May 30, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 05, 2013
    Quiz Created by
    Shellbreiner
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.