CompTIA 220-802 Practice Exam

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Shellbreiner
S
Shellbreiner
Community Contributor
Quizzes Created: 2 | Total Attempts: 356
| Attempts: 155 | Questions: 100
Please wait...
Question 1 / 100
0 %
0/100
Score 0/100
1. You just installed front panel USB ports that are not functioning properly. However, the ports on the back of the computer works fine. What should you do first?

Explanation

Checking the Device Manager for any alerts or question marks over USB-related devices is the first step to take because it helps to identify if there are any driver issues or conflicts with the USB ports. This can be a common cause for malfunctioning front panel USB ports. By checking the Device Manager, you can determine if there are any problems with the USB drivers and take appropriate action to resolve them.

Submit
Please wait...
About This Quiz
CompTIA 220-802 Practice Exam - Quiz

This CompTIA 220-802 practice exam assesses skills in troubleshooting network connectivity, securing devices, and understanding system security. It prepares learners for IT support roles by testing practical knowledge... see moreapplicable to CompTIA certification. see less

2. You want to create a spanned volume over two hard drives that are separate from the system volume of a Windows 7 workstation. What tool can help you determine if the har drives can support spanned volumes?

Explanation

Disk Management is the correct answer because it is a Windows utility that allows users to manage and configure disk drives and volumes. It provides information about the available hard drives and their capabilities, including the ability to support spanned volumes. By accessing Disk Management, you can determine if the hard drives in question can be used to create a spanned volume.

Submit
3. Your customer's laptop's LCD is being scratched by the keyboard when the lid is closed. What would prevent this from happening?

Explanation

Replacing the rubber bumpers would prevent the laptop's LCD from being scratched by the keyboard when the lid is closed. The rubber bumpers act as a cushion between the keyboard and the LCD, preventing direct contact and minimizing the risk of scratches. By replacing the rubber bumpers, the laptop's LCD would be protected from any potential damage caused by the keyboard.

Submit
4. A co-worker attempts to run an old program on his Windows 7 computer. The program briefly opens, but then it closes immediately. What can you do to enable the program to run correctly?

Explanation

Running the program in Windows Compatibility mode allows it to run correctly on a newer version of Windows. This mode enables the program to emulate an older version of Windows, resolving any compatibility issues that may be causing it to close immediately. By selecting the appropriate compatibility settings, the program can be executed as if it were running on the desired Windows version, ensuring its proper functionality.

Submit
5. A customer reports to you that he cannot access the company FTP site. He says that he is using the IP address given to him: 86200.43.118. What is most likely the problem?

Explanation

The given IP address, 86200.43.118, is not a valid IP address format. IP addresses consist of four sets of numbers separated by periods, with each set ranging from 0 to 255. In this case, the first set of numbers, 86200, is outside the valid range, indicating that it is an invalid IP address. Therefore, the most likely problem is that the customer is using an incorrect or invalid IP address to access the company FTP site.

Submit
6. Which command would you use to delete an empty directory?

Explanation

The command "RD" is used to delete an empty directory.

Submit
7. What is the best way to ensure that only certain computers can access your wireless network?

Explanation

Enabling MAC filtering is the best way to ensure that only certain computers can access your wireless network. MAC filtering allows you to create a whitelist of specific MAC addresses (unique identifiers for network devices) that are allowed to connect to your network. By enabling this feature, any device that does not have a MAC address on the whitelist will be denied access, providing an additional layer of security for your wireless network.

Submit
8. At one of your customer's locations, two users share the same Windows 7 computer. The first user creates a document intended to be used by both users and then logs off the computer. The second user logs on and types the name of the document in the Start menu but the document cannot be found. What is the problem?

Explanation

The problem is that the document is owned by the first user. This means that only the first user has access to the document, and it cannot be accessed or viewed by the second user.

Submit
9. Which command would you use to display the contents of C:\Windows\System32\?

Explanation

The correct answer is DIR. The DIR command is used to display the contents of a directory. In this case, it would display the contents of the C:\Windows\System32 directory. This command is commonly used in command prompt or terminal to view the files and folders within a specific directory.

Submit
10. You have been asked by a customer to add a second optical drive, to be referenced as M: on a computer running Windows 7. What is the best place to accomplish this?

Explanation

The best place to add a second optical drive, to be referenced as M:, on a computer running Windows 7 is Disk Management. Disk Management is a built-in tool in Windows that allows users to manage their disks and partitions. By accessing Disk Management, the user can initialize, format, and assign drive letters to new disks or partitions, including the second optical drive. This ensures that the drive is recognized by the system and can be accessed properly with the desired drive letter.

Submit
11. Which of the following programs are commonly found on a smartphone? (Select the three best answers)

Explanation

E-mail programs, Contacts programs, and Texting programs are commonly found on a smartphone. These programs allow users to send and receive emails, manage their contacts, and send text messages, respectively. Microsoft Word and Visual Basic are not commonly found on smartphones as they are more commonly used on computers for word processing and programming purposes.

Submit
12. Which of the following could be defined as standing behind a person at a desk attempting to view confidential information?

Explanation

Shoulder Surfing could be defined as standing behind a person at a desk attempting to view confidential information. This term refers to the act of trying to obtain sensitive information by visually observing someone's computer screen or keypad entries without their knowledge or consent. It is considered a form of information theft and invasion of privacy.

Submit
13. A user tells you taht his PC is making a strange noise. What is the most likely the cause?

Explanation

An internal wire being improperly routed and hitting the CPU fan is the most likely cause of the strange noise in the PC. This can result in the wire interfering with the rotation of the fan, causing it to make a noise. Reseating the CPU, a vibrating network cable, or dried out thermal grease would not typically cause a strange noise.

Submit
14. What is another name for a mirrored set?

Explanation

RAID 1 is another name for a mirrored set. In RAID 1, data is duplicated across multiple drives, creating an exact copy or mirror of the data. This provides redundancy and fault tolerance, as if one drive fails, the data can still be accessed from the other drive. RAID 1 is commonly used in situations where data integrity and reliability are crucial, such as in critical database systems or important backup storage.

Submit
15. Which of the following utilities enables a Windows 7 user to edit a file offline, and then automatically update the changes when the user returns back to the office?

Explanation

Sync Center is a utility in Windows 7 that allows users to edit files offline and automatically sync the changes when they return to the office. This feature is particularly useful for users who frequently work on files while traveling or in areas with limited or no internet connectivity. By using Sync Center, users can ensure that their files are always up to date and synced with the latest changes, regardless of their location or internet availability.

Submit
16. One of your customers tries to log in to a bookmarked site but instead of seeing the website expected, the user is prompted for a Social Security number, mother's maiden name, and date of birth. What most likely occurred?

Explanation

If the customer is being prompted for personal information that is not typically required for logging in, it suggests that their browser has been hijacked. This means that someone has gained unauthorized access to their browser and is attempting to gather sensitive information.

Submit
17. Which command should you use to find out the integrity of a hard drive?

Explanation

CHKDSK is the correct answer because it is a command used to check the integrity of a hard drive in Windows operating systems. CHKDSK stands for "Check Disk" and it scans the file system on the hard drive for errors and fixes them if possible. It also identifies and marks bad sectors on the hard drive. FDISK is a command used for disk partitioning, FORMAT is used to format a disk, and IPCONFIG is used to display the IP configuration of a network interface.

Submit
18. A program is no longer responding. Where would a technician go to end the program?

Explanation

When a program becomes unresponsive, a technician would typically use the Task Manager to end the program. Task Manager is a system utility in Windows that provides information about the processes and applications running on a computer. It allows users to view and manage running programs, monitor system performance, and end unresponsive tasks or processes. Therefore, Task Manager is the appropriate tool for a technician to terminate a program that is no longer responding.

Submit
19. You receive a message in Windows XP that warns you of a memory-read error. What should you do to fix this?

Explanation

If you receive a message in Windows XP warning you of a memory-read error, the correct action to fix this issue is to reseat or replace the RAM modules. This error indicates a problem with the computer's memory, and reseating the RAM modules can help ensure they are properly connected. If the issue persists, replacing the RAM modules may be necessary to resolve the error. Changing the memory settings in the BIOS, replacing the hard drive, or removing USB flash drives would not directly address a memory-read error.

Submit
20. You have determined that the USB controller is malfunctioning. What should you do first to troubleshoot this problem?

Explanation

To troubleshoot a malfunctioning USB controller, the best first step is to use the Windows Device Manager. This utility allows you to view and manage the hardware devices connected to your computer. By accessing the Device Manager, you can check if the USB controller is recognized by the system, if it has any driver issues, or if there are any conflicts with other devices. This will help you identify and potentially resolve the problem without the need to replace the USB controller or perform any hardware testing.

Submit
21. After replacing a motherboard in a PC, the system overheats and fails to boot. What is the most likely cause?

Explanation

The most likely cause for the system overheating and failing to boot after replacing the motherboard is that thermal paste was not applied between the heat sink and the CPU. Thermal paste is used to improve the transfer of heat between the CPU and the heat sink, ensuring efficient cooling. Without thermal paste, the heat generated by the CPU cannot be effectively dissipated, leading to overheating and system failure.

Submit
22. You are working as a technician for a data mining organization. You just moved files from one folder to another, but now you cannot open them. What should you do to regain access to the files?

Explanation

To regain access to the files that were moved to a different folder, the technician should take ownership of the files. By taking ownership, the technician will have the necessary permissions to access and open the files. This can be done by right-clicking on the files, selecting "Properties," going to the "Security" tab, clicking on "Advanced," and then changing the owner to the technician's user account.

Submit
23. Which versions of Windows offer offline files and folders? (Select the two best answers)

Explanation

Windows 7 Ultimate and Windows XP Professional offer offline files and folders. Offline files and folders allow users to access and work on files even when they are not connected to the network. This feature is useful for users who need to access their files while traveling or in areas with limited or no internet connectivity. Windows XP Home and Windows Vista Home Premium 64-bit do not offer this feature.

Submit
24. A laptop you are troubleshooting will not display any video through the laptop's screen or through external monitors. What should you place?

Explanation

In this scenario, if the laptop is not displaying any video through the laptop's screen or external monitors, the most likely cause is a faulty video card. The video card is responsible for generating and sending the video signal to the display. If it is not functioning properly, it can result in a lack of video output. The other options, such as the inverter (which controls the backlight of the screen), LCD (the screen itself), and drivers (software that allows the operating system to communicate with the video card) may also cause display issues, but they are less likely to be the root cause in this case.

Submit
25. Which type of malware self-replicates?

Explanation

A worm is a type of malware that is capable of self-replicating and spreading across networks without any human intervention. Unlike viruses, worms do not need to attach themselves to a host file or program in order to propagate. They exploit vulnerabilities in computer systems and use network connections to spread from one computer to another. Once a worm infects a computer, it can create copies of itself and distribute them to other vulnerable systems, causing widespread damage and disruption.

Submit
26. You need to find out which Windows OS is running on a computer. Which command should use?

Explanation

The correct answer is VER. The VER command is used to display the version number of the Windows operating system that is currently running on a computer. It provides information about the major version number, minor version number, build number, and service pack number of the operating system. By using the VER command, you can easily determine the Windows OS version installed on a computer.

Submit
27. You turn in a computer, and a blue screen appears with an error code, Where should you go to find out what this error code means?

Explanation

To find out what the error code on the blue screen means, it is best to visit the OS manufacturer's website. The OS manufacturer will have the most up-to-date and accurate information about their operating system and its error codes. They will likely have a support section or knowledge base that can provide detailed explanations and possible solutions for the specific error code encountered. Third-party websites may have information as well, but it is always recommended to go directly to the official source for the most reliable information. The hardware manufacturer's website may be useful for hardware-related errors, but for an error code displayed on the blue screen, the OS manufacturer's website is the most appropriate choice.

Submit
28. A two-year-old inkjet printer just started printing faded and smeared pages. What is the best solution for this?

Explanation

Running the printer's cleaning routine is the best solution for a two-year-old inkjet printer that is printing faded and smeared pages. This routine is specifically designed to clean the print heads and remove any clogs or debris that may be causing the printing issues. Reseating the print cartridges may help ensure they are properly installed, but it may not address the underlying issue. Using a lint-free cloth to clean the print heads can also be helpful, but it may not be sufficient to fully resolve the problem. Using compressed air on the print cartridges can potentially damage the printer if not done correctly, so it is not the best solution in this case.

Submit
29. What can the command ping -t do?

Explanation

The command "ping -t" allows for continuous pinging of an IP address until it is manually canceled. This means that the command will keep sending ping requests to the specified IP address without stopping, providing a continuous stream of data. The user can choose to cancel the command at any time to stop the continuous pinging process.

Submit
30. A co-worker suspects that the AC voltage supplied to a PC power supply is flawed. What tool should be used to confirm this suspicsion?

Explanation

A multimeter is the appropriate tool to confirm the suspicion of a flawed AC voltage supplied to a PC power supply. A multimeter can measure various electrical parameters, including voltage, current, and resistance. By connecting the multimeter to the power supply, the co-worker can measure the AC voltage and determine if it is within the expected range. This will help in confirming whether the AC voltage is indeed flawed or not.

Submit
31. One of tour co-workers is attempting to access a file on a share located on a remote computer. The file's share permissions are set to allow the user full control; however, the NTFS permissions allow the user to have read access. What will be the user's resulting access level for the file?

Explanation

The user's resulting access level for the file will be Read. This is because NTFS permissions take precedence over share permissions. Even though the share permissions allow the user full control, the more restrictive NTFS permissions only allow read access. Therefore, the user will only have read access to the file.

Submit
32. You are installing a 32-bit program in a 64-bit version of Windows 7?

Explanation

The correct answer is "C:\Program Files (x86)". In a 64-bit version of Windows 7, the "Program Files (x86)" directory is used to install 32-bit programs. This directory is specifically designed to separate 32-bit applications from 64-bit applications, allowing them to coexist on the same system. By installing the 32-bit program in the "Program Files (x86)" directory, it ensures compatibility and proper functioning of the program within the 64-bit operating system.

Submit
33. Which of the following paths is the default directory for the user profiles in Windows 7?

Explanation

The default directory for user profiles in Windows 7 is C:\Users. This is where all user profiles and their associated files and settings are stored. The other options, C:\Program Files, C:\Users and Settings\, and C:\Document and Settings\, are not the default directories for user profiles in Windows 7.

Submit
34. You co-worker is having trouble tapping icons on his smartphone. What should you check first?

Explanation

If your co-worker is having trouble tapping icons on his smartphone, the first thing you should check is the screen calibration. Screen calibration ensures that the touch input is accurately registered by the device. If the calibration is off, the touch inputs may not be accurately recognized, causing difficulty in tapping icons or using the touchscreen effectively. Checking the screen calibration settings and recalibrating if necessary can help resolve the issue.

Submit
35. A user tells you that her Windows 7 laptop does not display a picture when it is connected to a projector. However, there is a picture on the laptop's screen. What is the most likely cause?

Explanation

The most likely cause for the user's issue is that the laptop's external display setting has been turned off. This means that the laptop is not sending the display signal to the projector, resulting in no picture being displayed. To resolve this, the user should check the display settings on their laptop and ensure that the external display option is enabled.

Submit
36. A customer complains that they can only view their tablet vertically, and that it won't display horizontally. What is the problem?

Explanation

The problem is with the screen orientation. The customer's tablet is only displaying vertically and not horizontally. This suggests that the screen is locked in a specific orientation and is not rotating when the tablet is turned. To fix this issue, the screen orientation settings need to be adjusted to allow for automatic rotation or to manually select the desired orientation.

Submit
37. A co-worker tells you that his Windows 7 computer is manking noise constantly. You look at the computer and note that the hard drive activity light is frequently on. You also note that there is plenty of free space in the drive's only partition. Of the following, which best explains why the drive light is continuously active?

Explanation

The most likely explanation for the continuously active hard drive light is a fragmented hard drive. Fragmentation occurs when files are stored in non-contiguous blocks on the hard drive, causing the drive to work harder to access and read the files. This can result in increased hard drive activity and slower performance. In this case, despite having plenty of free space, the fragmentation of files on the hard drive is causing the constant activity and noise.

Submit
38. Which of the following answers can be the cause of a blue screen error?

Explanation

A bad driver can be a cause of a blue screen error. When a driver is corrupted, outdated, or incompatible with the operating system or other hardware components, it can result in system instability and crashes, leading to a blue screen error. Drivers act as a bridge between the hardware and the operating system, and any issues with them can disrupt the communication and functionality of the system, causing the blue screen error to occur.

Submit
39. A user attempts to print a large image but only half the graphic prints out. What is the most likely reason for this?

Explanation

The most likely reason for only half of the graphic printing out is that the printer needs more memory. When printing a large image, the printer may not have enough memory to process and print the entire image at once. As a result, it may only be able to print a portion of the image before running out of memory. Increasing the printer's memory capacity should resolve this issue and allow the full image to be printed.

Submit
40. Which of the following is common e-mail service that people use on their smartphone?

Explanation

GMAIL is the correct answer because it is a commonly used email service that people use on their smartphones. It is a free email service provided by Google and is available as an app on both Android and iOS devices. GMAIL offers features such as a user-friendly interface, large storage capacity, efficient spam filtering, and seamless integration with other Google services. Many smartphone users prefer GMAIL for its convenience and reliability in managing their emails on the go.

Submit
41. You just finished removing malware from a customer's computer located in a small office, but the Internet browser cannot access any websites. What should you do first?

Explanation

Removing the browser proxy settings should be done first because malware often modifies these settings to redirect internet traffic through a malicious server. By removing the proxy settings, the browser will be able to access websites directly without any redirection or interference from the malware. This will help restore the internet connectivity and ensure a secure browsing experience for the customer.

Submit
42. Which of the following would extend the wireless network range and allow out-of-the range users to share an Internet connection?

Explanation

Implementing a wireless access point for the out-of-range users would extend the wireless network range and allow them to share an Internet connection. A wireless access point acts as a bridge between the wired network and wireless devices, enabling connectivity for devices that are out of the range of the existing network. By adding a wireless access point, the network coverage is expanded, allowing users outside of the range to connect and share the Internet connection.

Submit
43. Which version of Windows 7 includes BitLocker encryption?

Explanation

The Ultimate version of Windows 7 includes BitLocker encryption. BitLocker is a security feature that allows users to encrypt their drives to protect the data stored on them. This feature is not available in the Starter, Home Premium, or Professional versions of Windows 7.

Submit
44. What is the difference between a domain and a workgroup?

Explanation

A domain is controlled by a server, whereas a workgroup does not have a domain controller or a central server controlling it. In a domain, the server manages user accounts, security policies, and network resources, providing a centralized and organized network environment. On the other hand, a workgroup is a peer-to-peer network where each computer has its own local user accounts and security settings, and there is no central authority or server controlling the network.

Submit
45. Your customer has a computer (called comp112) that has been infected by a worm. The worm has propagated to at least 30 other computers on the network. What should you do first before attempting to remove the worm from the computer name comp112?

Explanation

Before attempting to remove the worm from the computer named comp112, the first step should be to disconnect the network cable from the computer. This is important because the worm has already propagated to at least 30 other computers on the network. By disconnecting the network cable, it prevents the worm from spreading further and potentially infecting more computers. Once the network connection is severed, further steps can be taken to remove the worm effectively.

Submit
46. Which command is the best option for verifying that the protected system files in Windows 7 are correct?

Explanation

The best option for verifying that the protected system files in Windows 7 are correct is the SFC (System File Checker) command. SFC scans the integrity of all protected system files and replaces incorrect versions with the correct Microsoft versions. This helps ensure the stability and functionality of the operating system by ensuring that important system files are not corrupted or modified.

Submit
47. Which of the following is stored in the first sector of the hard drive?

Explanation

The first sector of a hard drive typically contains the Master Boot Record (MBR). The MBR is a small program that is responsible for booting the computer and loading the operating system. It contains information about the partitions on the hard drive and the location of the operating system files. The MBR is crucial for the computer to start up properly and is therefore stored in the first sector of the hard drive.

Submit
48. Which of the following tools can illuminate a network card's LED light when connected?

Explanation

A loopback plug is a device that can be inserted into a network card's port to test its functionality. When connected, the loopback plug simulates a complete network connection and allows for the testing of the network card's LED light. This is because the loopback plug completes the circuit and triggers the LED to illuminate, indicating that the network card is working properly. The other tools listed, such as a POST card, PSU tester, and multimeter, are not specifically designed for testing network card LED lights.

Submit
49. One of your organization's technicians reconfigures the BIOS boot order on a PC and sees that the system time is incorrect. The technician resets the clock to the correct time but sees that a couple days later, the system time is wrong again. What is the most likely cause?

Explanation

The most likely cause for the system time being incorrect again after resetting it is that the CMOS battery has failed. The CMOS battery is responsible for powering the Real Time Clock (RTC) on the motherboard, which keeps track of the system time even when the computer is turned off. If the CMOS battery fails, the RTC will not be able to keep accurate time, leading to the system time being wrong.

Submit
50. A customer reports to you that he can no longer open any .tiff files. What is the most likely cause?

Explanation

The most likely cause for the customer not being able to open any .tiff files is that the file associations have been removed. File associations determine which program should be used to open a specific file type. If the file associations for .tiff files have been removed, the operating system does not know which program to use to open them, resulting in the inability to open the files.

Submit
51. You install a Windows 7 computer for a computer. They already have three Windows XP computers on a network. The new Windows 7 computer can ping the Windows XP computers, but the Windows XP computers cannot ping the Windows 7 computer. What is the reason for this?

Explanation

The reason for the Windows XP computers not being able to ping the Windows 7 computer is that the firewall is enabled on the Windows 7 computer. The firewall is blocking incoming ping requests from the Windows XP computers, preventing them from establishing a connection with the Windows 7 computer.

Submit
52. You are helping a customer with an Internet connectivity problem. The customer tells you that the computer cannot connect to a favorite website. After quickly analyzing the computer, you note that it cannot connect to any websites. What should you do next?

Explanation

Establishing a theory of probable cause is the next step because it allows you to make an educated guess about what might be causing the computer's inability to connect to any websites. By formulating a theory, you can then proceed to test it to determine the actual cause of the problem. This step is crucial in troubleshooting as it helps narrow down the potential causes and guides the subsequent actions to be taken.

Submit
53. A user can no longer print from their computer to the default printer. You can print a test page from the printer, and the printer's queue shows that the job is ready to print. What hsould you do to resolve the situation?

Explanation

Restarting the printer spooler service can resolve the situation where a user is unable to print from their computer to the default printer. The printer's queue shows that the job is ready to print, indicating that there may be an issue with the printer spooler service. Restarting this service can help refresh the printing system and resolve any potential errors or conflicts that may be preventing the printing process.

Submit
54. You are setting up a SOHO wireless network. Which of the following provides that best security?

Explanation

Enabling SSID broadcasting and configuring WPA2 provides the best security for a SOHO wireless network. SSID broadcasting allows the network to be visible to devices, making it easier to connect. However, disabling SSID broadcasting adds an extra layer of security by hiding the network from unauthorized users. WPA2 is a strong encryption protocol that ensures the confidentiality and integrity of data transmitted over the network. By configuring WPA2, the network is protected against unauthorized access and potential security breaches.

Submit
55. Which component is usually removed to access a laptop's motherboard and other internal components?

Explanation

The keyboard is usually removed to access a laptop's motherboard and other internal components. This is because the keyboard is attached to the top case of the laptop, and removing it allows access to the screws and connectors that hold the top case in place. Once the keyboard is removed, the top case can be lifted off, providing access to the motherboard and other internal components for repairs or upgrades.

Submit
56. What state must a Windows 7 partition be in to allow the OS to boot?

Explanation

In order for a Windows 7 partition to boot, it must be in the "Active" state. The Active state indicates that the partition is the primary partition from which the operating system will start. This means that the computer's boot loader will recognize the partition as the one containing the necessary files to initiate the boot process. Without the Active state, the OS will not be able to boot successfully.

Submit
57. You want to verify that the local computer's network card is functioning properly. Which IP address should you use?

Explanation

The IP address 127.0.0.1 is known as the loopback address, which is used to test network connectivity on the local machine. It allows a computer to send network packets to itself, without actually sending them over the network. Therefore, using this IP address will help verify if the local computer's network card is functioning properly.

Submit
58. A technician is attemping to backup 5 GB of data to an external hard drive that has been formatted as FAT32; however the backup keeps failing. What is the bset way to solve the problem?

Explanation

Reformatting the drive to NTFS is the best way to solve the problem. FAT32 has a file size limitation of 4GB, so attempting to backup 5GB of data will fail. By reformatting the drive to NTFS, which does not have this limitation, the technician will be able to successfully backup the data.

Submit
59. You want to utilize the NET command to tell you how many Server Message Blocks (SMB) were received by the workstation service. Which NET command should you use?

Explanation

To determine the number of Server Message Blocks (SMB) received by the workstation service using the NET command, the correct command to use is "Statistics". This command will provide the necessary information and statistics related to the SMBs received by the workstation service.

Submit
60. You are installing a wireless access point. What should you do first?

Explanation

The first step in installing a wireless access point is to change the default password. This is important for security reasons as default passwords are often well-known and can be easily exploited by hackers. By changing the default password, you ensure that only authorized individuals have access to the access point and prevent unauthorized access to your network. This step should be taken before any other configuration changes or installations are made.

Submit
61. How can you ensure that all external traffic to your website is directed through a firewall to the right computer?

Explanation

Configuring port forwarding allows you to direct all external traffic to your website through a firewall to the right computer. By setting up port forwarding rules on your firewall, you can specify which ports should be forwarded to the correct computer hosting the website. This ensures that any incoming traffic from external sources is properly routed and filtered through the firewall before reaching the designated computer. This helps to enhance security and control over the incoming traffic to your website.

Submit
62. One of your customers tells you that her laptop LCD keeps getting darker the more she uses it even though she maximized the brightness using the function keys. What is the best solution?

Explanation

The customer's laptop LCD getting darker the more she uses it, despite maximizing the brightness using the function keys, suggests that the backlight might be the issue. The backlight is responsible for illuminating the LCD screen, and if it is malfunctioning or deteriorating, it can cause the screen to appear darker. Therefore, checking and replacing the backlight would be the best solution to resolve this problem.

Submit
63. You configured a customer's router to automatically assign only 5 IP addresses in an attempt to make the network more secure. Now you notice that the wireless printer is intermittebtly losing connections when there are multiple users on the wireless network. What is the best solution?

Explanation

By configuring the printer to use a static IP address, it will always have the same IP address and will not be affected by the limited number of IP addresses being assigned by the router. This will ensure a stable connection for the printer even when there are multiple users on the wireless network.

Submit
64. Which of the following printer failures is described as a condition in which the internal feed mechanism stopped working temporarily?

Explanation

A paper jam is a printer failure in which the internal feed mechanism temporarily stops working due to a piece of paper becoming stuck or jammed in the printer. This can prevent the printer from properly feeding paper through and can cause printing errors or complete failure until the jam is cleared.

Submit
65. One of the tape drives in the server room is reporting errors. What should you do first to mainenance the tape drive?

Explanation

The first step to maintenance a tape drive that is reporting errors is to use the included cleaning tape for the drive. Over time, tape drives can accumulate dust and debris, which can cause errors and affect performance. Using a cleaning tape helps remove this buildup and ensures that the tape drive functions properly. It is a simple and effective solution that should be tried before considering other troubleshooting steps.

Submit
66. A user tells you that her computer worked fine until today when she heard a popping noise. Then, the computer shut down and couldn't be restarted. What should you check first?

Explanation

The user's computer was working fine until a popping noise was heard, after which it shut down and couldn't be restarted. In this scenario, the most likely cause of the issue is a faulty power supply. The popping noise could indicate a power surge or a blown capacitor within the power supply, which would result in a loss of power to the computer. Therefore, checking the power supply would be the first step in diagnosing and resolving the problem.

Submit
67. Your boss wants to transfer data to an external hard drive capable of data transfer rates as high as 600 Mbps. Which of the following has the fastest transfer rate?

Explanation

IEEE 1394b has the fastest transfer rate among the given options. It is capable of data transfer rates as high as 800 Mbps, which is higher than the data transfer rates of USB 1.1 (12 Mbps), USB 2.0 (480 Mbps), and Cable Internet (varies depending on the provider but typically lower than 600 Mbps).

Submit
68. Which of the following is used by BitLocker to provide an encryption key and to protect data?

Explanation

The correct answer is TPM. TPM stands for Trusted Platform Module, which is a hardware component used by BitLocker to provide an encryption key and protect data. It is a specialized chip that stores cryptographic keys and helps in securing the system's integrity. BitLocker uses the TPM to ensure that the encryption keys are securely stored and that the system has not been tampered with. This helps in preventing unauthorized access to the encrypted data.

Submit
69. What color do EFS files display in by default?

Explanation

EFS files display in green color by default. This color is used to indicate that the file is encrypted using the Encrypting File System (EFS) feature in Windows. Green color helps users easily identify which files are encrypted and provides a visual cue for their security status.

Submit
70. What would you replace in a laser printer if you see ghosted images?

Explanation

If you see ghosted images in a laser printer, the most likely component that needs to be replaced is the drum. The drum is responsible for transferring toner onto the paper during the printing process. If the drum becomes worn or damaged, it can result in ghosted images, where faint copies of previous images appear on subsequent prints. Replacing the drum should resolve this issue and ensure that the printer produces clean and clear prints.

Submit
71. Which tool would you use if you want to do a Startup Repair in Windows 7?

Explanation

WinRE stands for Windows Recovery Environment, which is a tool that is used to troubleshoot and repair issues in the Windows operating system. It provides various options for repairing the system, including Startup Repair. Therefore, if you want to perform a Startup Repair in Windows 7, you would use the WinRE tool.

Submit
72. Which of the following utilities is the fastest way to view the network adapter statistics?

Explanation

Task Manager is the fastest way to view network adapter statistics because it provides real-time information about the network utilization, including the amount of data being sent and received, the network speed, and the network latency. It also allows users to monitor specific network processes and their resource usage, making it a convenient tool for troubleshooting network issues and optimizing network performance.

Submit
73. You just installed a new computer for a customer who complains that there is an odor near the power supply when it is turned on. What should you do?

Explanation

Running the computer for 48 hours and disregarding if the odor goes away is the correct answer because it is possible that the odor is just a result of the new components settling in and will dissipate over time. By allowing the computer to run for a period of time, any initial manufacturing residue or other sources of odor can potentially be eliminated. If the odor persists after 48 hours, further investigation or contacting the manufacturer may be necessary.

Submit
74. A customer wants to store their Windows 7 documents on a different drive than then the default C drive location. How can this be accomplished?

Explanation

To store Windows 7 documents on a different drive, the customer can accomplish this by adding a documents folder location in the folder's properties. This can be done by right-clicking on the folder, selecting properties, and then specifying the desired location on the different drive. This will redirect the default storage location for documents to the specified drive, allowing the customer to store their Windows 7 documents on a different drive.

Submit
75. You are troubleshooting a Windows 7 computer that has you perplexed. Apparently, the computer has been showing strange behavior since the user of the system was given administrative privileges a month ago. What is the easiest way for you to return the computer to its last known good state of functionality.

Explanation

Performing a System Restore to the day before the user was given administrative rights is the easiest way to return the computer to its last known good state of functionality. This will undo any changes made to the system since that day, including granting administrative privileges to the user. System Restore allows the computer to revert back to a previous state, restoring system files, settings, and registry keys to the state they were in at the chosen restore point.

Submit
76. A customer's laser printer is printing a blank streak along one edge of each page, but is otherwise printing normally. What is the most likely reason?

Explanation

The most likely reason for the blank streak along one edge of each page is that the fuser is damaged. The fuser is responsible for melting the toner onto the paper, and if it is damaged, it may not be able to properly fuse the toner onto the page, resulting in a blank streak. This is supported by the fact that the printer is otherwise printing normally, indicating that the issue is not with the paper or toner cartridge. Rebooting the printer would not fix a physical damage like a damaged fuser.

Submit
77. You work at a PC bench and receive a laptop that has a dim display. You confirm that it is a hardware issue. Which part should be replaced first?

Explanation

The LCD inverter should be replaced first because it is responsible for providing power to the backlight of the LCD panel. If the display is dim, it could indicate a problem with the inverter not supplying enough power to the backlight, resulting in a dim display. By replacing the LCD inverter, it can help resolve the hardware issue and potentially fix the dim display problem.

Submit
78. Your boss asks you to find a list of routers along a given path through multiple networks. What command can help you?

Explanation

The TRACERT command is used to trace the route taken by packets across an IP network. It provides a list of routers along a given path through multiple networks. This command can help in identifying the network hops and the routers involved in the path taken by the packets, allowing for troubleshooting and network analysis.

Submit
79. You are working on a computer that is giving a non-system disk error. Which of the following is most likely the cause?

Explanation

The most likely cause for the non-system disk error is that there is a disk in the floppy drive. This error message typically occurs when the computer is trying to boot from a disk that is not recognized as a valid system disk. If there is a disk in the floppy drive, the computer may be attempting to boot from it instead of the hard drive where the operating system is located. Removing the disk from the floppy drive should resolve the issue.

Submit
80. You are working on a PC that runs fine for close to an hour but then shuts down automatically. Which should you check first?

Explanation

If the PC runs fine for close to an hour and then shuts down automatically, the first thing to check should be the CPU fan. The CPU fan is responsible for cooling the processor and preventing it from overheating. If the fan is not functioning properly or if it is clogged with dust, the CPU can overheat and cause the system to shut down as a safety measure. Therefore, checking the CPU fan is crucial in this situation.

Submit
81. Instead of incurring the expense of new computers, a customer of yours is trying to keep its Windows XP systems. The customer ask you to install 250 GB drives to wach system, You do so, but a few of the systems recognize only 137 GB during usage. What is the problem?

Explanation

Windows XP does not support hard drives larger than 137 GB. However, by installing Service Pack 1, the customer would be able to overcome this limitation and use the full capacity of the 250 GB drives.

Submit
82. A customer's computer states that USB 3.0 devices are running at USB 2.0 speed. There is no kind of external USB hub. You test the devices on your computer, and they run at USB 3.0 speed. What should you do to provide USB 3.0 functionality for the customer?

Explanation

The customer's computer is experiencing a compatibility issue with USB 3.0 devices, causing them to run at USB 2.0 speed. To resolve this issue and provide USB 3.0 functionality, installing a USB 3.0 firmware update to the motherboard is the appropriate solution. This update will ensure that the motherboard is compatible with USB 3.0 devices and can support their full speed.

Submit
83. Which of the following is part of the second step of the CompTIA A+ troubleshooting process: Establish a theory of probable cause?

Explanation

In the second step of the CompTIA A+ troubleshooting process, questioning the obvious is part of establishing a theory of probable cause. This involves asking the user about any obvious issues or changes that may have occurred before the problem started. By questioning the obvious, technicians can gather important information that may help in identifying the cause of the problem and formulating a theory. This step helps to narrow down the possible causes and guide further troubleshooting actions.

Submit
84. You reboot a customer's computer and see a pop-up message that says one or more services failed to start. Whcih of the following can give you more information?

Explanation

The system event logs can provide more information about the services that failed to start. These logs record various events and errors that occur on the computer, including information about service failures. By reviewing the system event logs, you can identify the specific services that failed to start and investigate the cause of the issue further. This can help in troubleshooting and resolving the problem effectively.

Submit
85. A customer cannot access some Internet websites but can connect to resources inside the LAN. You can use the PING command to test the user's connectivity. What command should you run next to troubleshoot this issue?

Explanation

To troubleshoot the issue of a customer being unable to access some Internet websites but can connect to resources inside the LAN, the next command to run would be "IPCONFIG/FLUSHDNS". This command will flush the DNS cache on the customer's computer, which can help resolve any DNS-related issues that may be causing the problem. By flushing the DNS cache, the computer will clear any stored DNS information and retrieve fresh DNS records when trying to access websites, potentially resolving any connectivity issues.

Submit
86. Of the following ways to manipulate a file, which can retain the file's NTFS permissions?

Explanation

Moving the file to a new location on the same volume can retain the file's NTFS permissions. When a file is moved within the same volume, the file's permissions remain intact because the file system keeps track of the file's security descriptors. The NTFS file system stores permissions and other security information in the file's metadata, which is not changed when the file is moved to a new location on the same volume. Therefore, the file will retain its original NTFS permissions after being moved within the same volume.

Submit
87. A user tells you that the monitor resolution was changed and now the user does not see a display. What should you do first?

Explanation

When a user reports that the monitor resolution was changed and they are unable to see a display, the first step should be to boot the computer into Safe Mode. This is because Safe Mode starts the computer with a basic set of drivers and settings, which can help troubleshoot and resolve display issues. By booting into Safe Mode, it allows the user to potentially fix any incorrect display settings that may be causing the problem. Once in Safe Mode, the user can then access the Display Properties and adjust the monitor resolution accordingly.

Submit
88. You are upgrading a computer from Windows Vista to Windows 7. What is the best tool to use to move a user's documents and file settings?

Explanation

Easy Transfer is the best tool to use when upgrading a computer from Windows Vista to Windows 7 to move a user's documents and file settings. Easy Transfer is a built-in utility in Windows that allows users to transfer files, folders, and settings from one computer to another. It simplifies the process of transferring important data and settings, ensuring a smooth transition to the new operating system without losing any important files or configurations.

Submit
89. A user tells you that after he upgraded a computer from Windows XP to Windows Vista, the Run option is no longer in the Start menu. What is the most likely reason for this?

Explanation

The most likely reason for the Run option not being displayed in the Start menu after upgrading from Windows XP to Windows Vista is that the run command is not displayed by default in the Start menu.

Submit
90. How would you secure a smartphone and its data? (Select the best two answers)

Explanation

To secure a smartphone and its data, two effective measures are passcode lock and remote wipe. A passcode lock provides a basic level of security by requiring a password or PIN to access the device, preventing unauthorized access. Remote wipe allows the user to erase all data on the smartphone remotely in case it is lost or stolen, ensuring that sensitive information does not fall into the wrong hands. These two measures combined provide a strong defense against unauthorized access and data theft.

Submit
91. Which Windows 7/Vista files replaced NTLDR?

Explanation

not-available-via-ai

Submit
92. All the printouts from a printer are displaying a random mix of letters, numbers, symbols, and in general, gibberish. What is the most likely cause of the problem?

Explanation

The most likely cause of the problem is that there is an incorrect print driver. The print driver is responsible for translating the computer's commands into a format that the printer can understand. If the incorrect print driver is installed, it may not be able to properly interpret the commands, resulting in the random mix of letters, numbers, and symbols on the printouts. Replacing the toner cartridge, restarting the print spooler, or replacing the print drum would not typically cause this type of issue.

Submit
93. You need to automatically check for performance issues in Windows 7. Which tool is the best option?

Explanation

The Troubleshooting item in the Control Panel is the best option for automatically checking for performance issues in Windows 7. This tool is specifically designed to identify and resolve common problems that can affect system performance. It provides a comprehensive set of diagnostic and repair tools that can help identify the root cause of performance issues and suggest appropriate solutions. By using the Troubleshooting item in the Control Panel, users can efficiently troubleshoot and improve the overall performance of their Windows 7 system.

Submit
94. Which of the following allows you to make phone calls and transfer data from your smartphone without the need for additional programs?

Explanation

GSM (Global System for Mobile Communications) allows you to make phone calls and transfer data from your smartphone without the need for additional programs. GSM is a standard for mobile communication that uses a cellular network to connect devices. It provides voice and data services, allowing users to make calls, send messages, and access the internet without the need for Wi-Fi, Bluetooth, or cable internet.

Submit
95. You attempt to play audio from your Bluetooth-enabled Windows 7 computer, but you find that the phone cannot detect the computer. What will you do to solve this problem?

Explanation

To solve the problem of the phone not being able to detect the computer when attempting to play audio, you should place the computer in Bluetooth discovery mode. This mode allows the computer to be visible and discoverable to other Bluetooth devices, including the phone. By enabling Bluetooth discovery mode on the computer, it increases the chances of the phone being able to detect and connect to the computer for audio playback.

Submit
96. You just installed a second SATA hard drive into a Windows 7 computer. The computer boots normally, but you cannot locate the second drive in Windows Explorer. What is the problem? (Select the two best answers)

Explanation

The first best answer is "The hard drive was formatted as NTFS" because Windows 7 typically uses the NTFS file system and may not recognize drives formatted with other file systems such as FAT32.

The second best answer is "The hard drive is not compatible with Windows 7" because if the hard drive is not compatible with the operating system, it may not be recognized or accessible in Windows Explorer.

Submit
97. You boot Windows 7 and see the error message One of More Services Failed to Start. What methods can you use to view the status of services on the computer? (Select the two best answers)

Explanation

You can view the status of services on the computer by right-clicking Computer and selecting Manage from the menu. Additionally, you can also view the status of services by clicking Start, then Control Panel, and then Administrative Tools. These two methods provide access to the necessary tools and settings to view the status of services on a Windows 7 computer.

Submit
98. What command repairs the bootmgr.exe file in Windows 7?

Explanation

The command "bootrec /fixboot" repairs the bootmgr.exe file in Windows 7. This command is used to fix issues related to the boot sector of the Windows operating system. It specifically repairs the boot configuration data (BCD) store and writes a new boot sector to the system partition, which helps in resolving boot-related problems.

Submit
99. What kinds of data would people commonly synchronize from their mobile device to their PC? (Select the three best answers)

Explanation

People commonly synchronize contracts, music, and GPS tracking data from their mobile device to their PC. Contracts are often important documents that people need to access and manage on both their mobile device and PC. Music is a popular form of media that people like to have access to on multiple devices. GPS tracking data is useful for tracking locations and routes, and syncing it with a PC allows for easier analysis and management of the data.

Submit
100. You just finished upgrading a video card in a PC. When you reboot the system, nothing displays on the screen. What is the most likely cause?

Explanation

The most likely cause for the screen not displaying anything after upgrading the video card is that the onboard video of the motherboard is still enabled in the BIOS. This means that the system is still trying to use the onboard video instead of the new video card. To resolve this issue, the user would need to enter the BIOS settings and disable the onboard video, allowing the system to recognize and use the new video card.

Submit
View My Results

Quiz Review Timeline (Updated): May 30, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • May 30, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 05, 2013
    Quiz Created by
    Shellbreiner
Cancel
  • All
    All (100)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
You just installed front panel USB ports that are not functioning...
You want to create a spanned volume over two hard drives that are...
Your customer's laptop's LCD is being scratched by the...
A co-worker attempts to run an old program on his Windows 7 computer....
A customer reports to you that he cannot access the company FTP site....
Which command would you use to delete an empty directory?
What is the best way to ensure that only certain computers can access...
At one of your customer's locations, two users share the same...
Which command would you use to display the contents of...
You have been asked by a customer to add a second optical drive, to be...
Which of the following programs are commonly found on a smartphone?...
Which of the following could be defined as standing behind a person at...
A user tells you taht his PC is making a strange noise. What is the...
What is another name for a mirrored set?
Which of the following utilities enables a Windows 7 user to edit a...
One of your customers tries to log in to a bookmarked site but instead...
Which command should you use to find out the integrity of a hard...
A program is no longer responding. Where would a technician go to end...
You receive a message in Windows XP that warns you of a memory-read...
You have determined that the USB controller is malfunctioning. What...
After replacing a motherboard in a PC, the system overheats and fails...
You are working as a technician for a data mining organization. You...
Which versions of Windows offer offline files and folders? (Select the...
A laptop you are troubleshooting will not display any video through...
Which type of malware self-replicates?
You need to find out which Windows OS is running on a computer. Which...
You turn in a computer, and a blue screen appears with an error code,...
A two-year-old inkjet printer just started printing faded and smeared...
What can the command ping -t do?
A co-worker suspects that the AC voltage supplied to a PC power supply...
One of tour co-workers is attempting to access a file on a share...
You are installing a 32-bit program in a 64-bit version of Windows 7?
Which of the following paths is the default directory for the user...
You co-worker is having trouble tapping icons on his smartphone. What...
A user tells you that her Windows 7 laptop does not display a picture...
A customer complains that they can only view their tablet vertically,...
A co-worker tells you that his Windows 7 computer is manking noise...
Which of the following answers can be the cause of a blue screen...
A user attempts to print a large image but only half the graphic...
Which of the following is common e-mail service that people use on...
You just finished removing malware from a customer's computer...
Which of the following would extend the wireless network range and...
Which version of Windows 7 includes BitLocker encryption?
What is the difference between a domain and a workgroup?
Your customer has a computer (called comp112) that has been infected...
Which command is the best option for verifying that the protected...
Which of the following is stored in the first sector of the hard...
Which of the following tools can illuminate a network card's LED...
One of your organization's technicians reconfigures the BIOS boot...
A customer reports to you that he can no longer open any .tiff files....
You install a Windows 7 computer for a computer. They already have...
You are helping a customer with an Internet connectivity problem. The...
A user can no longer print from their computer to the default printer....
You are setting up a SOHO wireless network. Which of the following...
Which component is usually removed to access a laptop's...
What state must a Windows 7 partition be in to allow the OS to boot?
You want to verify that the local computer's network card is...
A technician is attemping to backup 5 GB of data to an external hard...
You want to utilize the NET command to tell you how many Server...
You are installing a wireless access point. What should you do first?
How can you ensure that all external traffic to your website is...
One of your customers tells you that her laptop LCD keeps getting...
You configured a customer's router to automatically assign only 5...
Which of the following printer failures is described as a condition in...
One of the tape drives in the server room is reporting errors. What...
A user tells you that her computer worked fine until today when she...
Your boss wants to transfer data to an external hard drive capable of...
Which of the following is used by BitLocker to provide an encryption...
What color do EFS files display in by default?
What would you replace in a laser printer if you see ghosted images?
Which tool would you use if you want to do a Startup Repair in Windows...
Which of the following utilities is the fastest way to view the...
You just installed a new computer for a customer who complains that...
A customer wants to store their Windows 7 documents on a different...
You are troubleshooting a Windows 7 computer that has you perplexed....
A customer's laser printer is printing a blank streak along one...
You work at a PC bench and receive a laptop that has a dim display....
Your boss asks you to find a list of routers along a given path...
You are working on a computer that is giving a non-system disk error....
You are working on a PC that runs fine for close to an hour but then...
Instead of incurring the expense of new computers, a customer of yours...
A customer's computer states that USB 3.0 devices are running at...
Which of the following is part of the second step of the CompTIA A+...
You reboot a customer's computer and see a pop-up message that...
A customer cannot access some Internet websites but can connect to...
Of the following ways to manipulate a file, which can retain the...
A user tells you that the monitor resolution was changed and now the...
You are upgrading a computer from Windows Vista to Windows 7. What is...
A user tells you that after he upgraded a computer from Windows XP to...
How would you secure a smartphone and its data? (Select the best two...
Which Windows 7/Vista files replaced NTLDR?
All the printouts from a printer are displaying a random mix of...
You need to automatically check for performance issues in Windows 7....
Which of the following allows you to make phone calls and transfer...
You attempt to play audio from your Bluetooth-enabled Windows 7...
You just installed a second SATA hard drive into a Windows 7 computer....
You boot Windows 7 and see the error message One of More Services...
What command repairs the bootmgr.exe file in Windows 7?
What kinds of data would people commonly synchronize from their mobile...
You just finished upgrading a video card in a PC. When you reboot the...
Alert!

Advertisement