CompTIA A+ 220-702 Practical Application Topic 2 Vol.B

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Tmede212
T
Tmede212
Community Contributor
Quizzes Created: 7 | Total Attempts: 1,069
| Attempts: 103
SettingsSettings
Please wait...
  • 1/100 Questions

    Which of the following can cause a blue screen error?

    • Bad drivers
    • A DVD that contains an incorrect format
    • An incorrect router configuration
    • A rogue DHCP server
Please wait...
About This Quiz

This quiz assesses practical application skills for the CompTIA A+ 220-702 certification, focusing on troubleshooting and understanding hardware functionalities like USB, networked printers, and system boot processes. It's designed to enhance technical proficiency in handling typical IT support issues.

CompTIA A+ 220-702 Practical Application Topic 2 Vol.B - Quiz

Quiz Preview

  • 2. 

    A user reports that when typing on the laptop keyboard, the mouse pointer scrolls across the screen. Which of the following would MOST likely resolve this issue?

    • Reboot the laptop

    • Use an external monitor

    • Disable the touchpad

    • Plug in an external mouse

    Correct Answer
    A. Disable the touchpad
    Explanation
    Disabling the touchpad would most likely resolve the issue of the mouse pointer scrolling across the screen while typing on the laptop keyboard. This is because the touchpad may be overly sensitive and detecting unintended movements, causing the cursor to scroll. By disabling the touchpad, the user can prevent any accidental input from interfering with their typing.

    Rate this question:

  • 3. 

    After performing a preventative maintenance on a laser printer, which of the following is the NEXT step a technician should take?

    • Refill the paper trays

    • Restart the printer

    • Print a test page

    • Restore to factory settings

    Correct Answer
    A. Print a test page
    Explanation
    After performing preventative maintenance on a laser printer, the next step a technician should take is to print a test page. This is important to ensure that the printer is functioning properly after the maintenance. By printing a test page, the technician can check for any issues such as print quality, alignment, or any other potential problems that may have occurred during the maintenance process. This step helps to verify that the printer is in good working condition and ready for regular use.

    Rate this question:

  • 4. 

    A user states that email is not being received. Which of the following protocols should the technician check for incoming mail?

    • SMTP

    • POP3

    • NNTP

    • HTTP

    Correct Answer
    A. POP3
    Explanation
    The technician should check the POP3 protocol for incoming mail. POP3 (Post Office Protocol version 3) is a standard protocol used for receiving emails from a remote server to a local email client. It allows the client to download and store the emails on their device. Therefore, if the user is not receiving emails, it is important to check the POP3 settings and ensure that the email client is properly configured to retrieve emails using the POP3 protocol.

    Rate this question:

  • 5. 

    A user is playing a new first person game on the computer and the screen is pausing during game play. The user has a high-end graphics card and is maxed out in memory. Which of the following should the technician perform?

    • Reinstall the game.

    • Upgrade the drivers.

    • Replace the hard drive.

    • Reinstall the OS.

    Correct Answer
    A. Upgrade the drivers.
    Explanation
    The user is experiencing screen pauses during gameplay, which indicates a potential issue with the graphics card drivers. Upgrading the drivers can help resolve compatibility issues or bugs that may be causing the problem. Reinstalling the game, replacing the hard drive, or reinstalling the operating system are unlikely to address this specific issue.

    Rate this question:

  • 6. 

    A user reports that a laser printer is printing out pages with blurry text that smudges when touched. Which of the following is the MOST likely reason for this?

    • The toner cartridge is running low.

    • The toner cartridge is leaking.

    • The fuser is not getting hot enough.

    • The transfer bar needs to be replaced.

    Correct Answer
    A. The fuser is not getting hot enough.
    Explanation
    The most likely reason for the blurry and smudged text is that the fuser, which is responsible for melting the toner onto the paper, is not reaching the required temperature. This can result in the toner not properly adhering to the paper, causing smudging and blurry text.

    Rate this question:

  • 7. 

    If a technician suspects that the voltage being delivered to a desktop computers power supply is insufficient or incorrect, which device should be used to determine the correct voltage?

    • A power supply tester

    • A multimeter

    • A loopback adapter

    • A cable tester

    Correct Answer
    A. A multimeter
    Explanation
    A multimeter is the most appropriate device to determine the correct voltage being delivered to a desktop computer's power supply. A multimeter is a versatile tool that can measure various electrical quantities, including voltage. By connecting the multimeter to the power supply, the technician can accurately measure the voltage and determine if it is sufficient or correct. This helps in diagnosing any potential issues with the power supply and ensures that the desktop computer is receiving the required voltage for proper functioning.

    Rate this question:

  • 8. 

    A computer just had a memory upgrade installed on the machine. Upon boot, the system does not recognize the new memory even though it is listed as being compatible on the manufacturers website. Which of the following is MOST likely needed to resolve the issue?

    • OS update

    • Adjust jumper settings

    • BIOS update

    • New CMOS battery

    Correct Answer
    A. BIOS update
    Explanation
    The most likely solution to the issue of the computer not recognizing the new memory after a memory upgrade is a BIOS update. The BIOS (Basic Input/Output System) is responsible for initializing hardware components during the boot process, and updating it can help the system recognize and properly utilize the new memory.

    Rate this question:

  • 9. 

    Which of the following is the default FTP port?

    • 21

    • 22

    • 23

    • 25

    Correct Answer
    A. 21
    Explanation
    The default FTP port is 21. FTP (File Transfer Protocol) is a standard network protocol used for transferring files between a client and a server on a computer network. The default port number for FTP is 21, which is used for establishing the connection between the client and the server.

    Rate this question:

  • 10. 

    Which of the following is the BEST source for information about malware detected on a computer?

    • README.TXT file included with the anti-spyware software installation

    • User of a previously infected computer

    • Operating system documentation

    • Anti-spyware software website

    Correct Answer
    A. Anti-spyware software website
    Explanation
    The best source for information about malware detected on a computer would be the anti-spyware software website. This is because the website is specifically dedicated to providing information and updates about malware, and it is likely to have the most up-to-date and accurate information about the specific malware detected on the computer. The README.TXT file included with the anti-spyware software installation may provide some information, but it may not be as comprehensive or current as the information available on the software's website. The user of a previously infected computer may have some insights, but their knowledge may be limited to their specific experience and may not apply to all cases. The operating system documentation may not specifically address malware detection and removal.

    Rate this question:

  • 11. 

    A technician is experiencing an issue with the computer randomly rebooting throughout the day. The technician suspects the cause is from over heating. Which of the following should the technician check for the cause?

    • The heat sink is firmly attached to the processor.

    • The RAM chips are firmly in place.

    • The hard drive is attached to the power supply.

    • The graphics card is firmly in place.

    Correct Answer
    A. The heat sink is firmly attached to the processor.
    Explanation
    The technician should check if the heat sink is firmly attached to the processor. Overheating can cause a computer to randomly reboot, and the heat sink is responsible for dissipating the heat generated by the processor. If the heat sink is not properly attached, it may not be able to effectively cool the processor, leading to overheating and subsequent reboots.

    Rate this question:

  • 12. 

    Which of the following is the MAXIMUM allowable cable length of CAT5?

    • 100 meters (328 feet)

    • 250 meters (820 feet)

    • 500 meters (1640 feet)

    • 1000 meters (3280 feet)

    Correct Answer
    A. 100 meters (328 feet)
    Explanation
    The maximum allowable cable length of CAT5 is 100 meters (328 feet). This is because CAT5 cables are designed to transmit data reliably up to this distance without significant loss or degradation of signal quality. Going beyond this distance can result in signal attenuation and data errors. Therefore, it is important to adhere to the maximum cable length to ensure optimal performance and reliable data transmission.

    Rate this question:

  • 13. 

    A user is not able to receive files off the FTP server. Which of the following default ports needs to be opened for FTP to work properly?

    • 21

    • 80

    • 110

    • 443

    Correct Answer
    A. 21
    Explanation
    To receive files off the FTP server, port 21 needs to be opened. Port 21 is the default port for FTP (File Transfer Protocol), which is used for transmitting files between a client and a server on a computer network. By opening port 21, the user will be able to establish a connection with the FTP server and receive files successfully.

    Rate this question:

  • 14. 

    An office laser printer is printing lighter in random areas. Which of the following is the EASIEST solution to implement for this issue?

    • Clean the drum with a computer vacuum.

    • Replace the toner cartridge.

    • Clean the fuser area with a lint free cloth.

    • Use a can of compressed air to clean the pickup assembly.

    Correct Answer
    A. Replace the toner cartridge.
    Explanation
    Replacing the toner cartridge is the easiest solution to implement for this issue because a lighter print in random areas indicates that the toner cartridge is likely running low on toner or the toner is unevenly distributed. By replacing the toner cartridge, the printer will have a fresh supply of toner and should print at the appropriate darkness level consistently.

    Rate this question:

  • 15. 

    Which of the following tools would be BEST to use to pry open the case of a laptop?

    • Metal screwdriver

    • Plastic wedge

    • Needle-nose pliers

    • Extension magnet

    Correct Answer
    A. Plastic wedge
    Explanation
    A plastic wedge would be the best tool to use to pry open the case of a laptop because it is less likely to cause damage to the case or internal components compared to a metal screwdriver or needle-nose pliers. Plastic is softer and less likely to scratch or dent the laptop case, making it a safer option. Additionally, a plastic wedge can provide leverage and help to gently separate the case without applying excessive force. An extension magnet is not suitable for prying open a laptop case as it is designed to attract and retrieve metallic objects, not for opening cases.

    Rate this question:

  • 16. 

    Under which of the following circumstances would a technician use IPCONFIG /RENEW?

    • After an unsuccessful reboot

    • If a users IP address has been spoofed

    • After using IPCONFIG /RELEASE

    • If the computer has an ARP address conflict

    Correct Answer
    A. After using IPCONFIG /RELEASE
    Explanation
    A technician would use IPCONFIG /RENEW after using IPCONFIG /RELEASE. When a user releases their IP address using IPCONFIG /RELEASE, it essentially disconnects the computer from the network. To regain connectivity and obtain a new IP address, the technician would then use IPCONFIG /RENEW. This command allows the computer to request a new IP address from the DHCP server, ensuring that the computer can reconnect to the network successfully.

    Rate this question:

  • 17. 

    A user states that the inkjet printer is printing streaks on documents. Which of the following would resolve the issue?

    • Use the printers clean option.

    • Replace the printer data cable.

    • Print the demo page from the printer.

    • Reinstall the drivers.

    Correct Answer
    A. Use the printers clean option.
    Explanation
    Using the printer's clean option is the most appropriate solution to resolve the issue of streaks on documents. This option helps to clean the print head and remove any clogged ink nozzles, which can often cause streaks or smudges on printed documents. Replacing the printer data cable may be necessary if there is a connectivity issue, but it is unlikely to fix the streaking problem. Printing the demo page can help identify any specific issues with the printer's hardware, but it may not directly resolve the streaking problem. Reinstalling the drivers is more relevant if there are software or compatibility issues, rather than addressing the physical problem of streaks on documents.

    Rate this question:

  • 18. 

    A computer just had a memory upgrade installed on the machine. Upon boot, the system does not recognize the new memory even though it is listed as being compatible on the manufacturers website. Which of the following is MOST likely needed to resolve the issue?

    • OS update

    • Adjust jumper settings

    • BIOS update

    • New CMOS battery

    Correct Answer
    A. BIOS update
    Explanation
    The most likely solution to the issue is a BIOS update. When a computer undergoes a memory upgrade, the BIOS (Basic Input/Output System) may need to be updated to recognize the new memory modules. The BIOS is responsible for initializing hardware components during the boot process, and an outdated BIOS may not have the necessary information to detect and utilize the new memory. By updating the BIOS, the system will be able to properly recognize and utilize the upgraded memory.

    Rate this question:

  • 19. 

    A technician is tasked with setting up a Windows XP computer with a user account that will only be used to access the Internet. Which account type should the user have access to?

    • Guest

    • Administrator

    • Domain User

    • Power User

    Correct Answer
    A. Guest
    Explanation
    The user should have access to the Guest account. The Guest account is designed for temporary or occasional use and has limited privileges, making it ideal for situations where the user only needs to access the Internet. The Guest account does not have administrative rights, ensuring that the user cannot make any significant changes to the computer's settings or access sensitive information.

    Rate this question:

  • 20. 

    A computer is responding slowly and the Task Manager shows that spool.exe is using 95% of system resources. Which of the following is MOST likely the cause of this problem?

    • Printing subsystem

    • Windows Update is running

    • A virus infection has occurred

    • Hyper threading has been disabled

    Correct Answer
    A. Printing subsystem
    Explanation
    The most likely cause of the computer responding slowly and spool.exe using 95% of system resources is the printing subsystem. Spool.exe is responsible for managing print jobs in Windows, and if there is an issue with the printing subsystem, it can cause high CPU usage and slow down the computer's performance.

    Rate this question:

  • 21. 

    After replacing the motherboard in a laptop, the system overheats and fails to boot. Which of the following is the MOST likely cause of this error?

    • Thermal paste was not applied between the heat sink and CPU.

    • The fan is not compatible with the new motherboard.

    • The GPU is not compatible with the CPU.

    • The replacement motherboard firmware is out of date.

    Correct Answer
    A. Thermal paste was not applied between the heat sink and CPU.
    Explanation
    The most likely cause of the system overheating and failing to boot after replacing the motherboard in a laptop is the absence of thermal paste between the heat sink and CPU. Thermal paste is used to improve the transfer of heat from the CPU to the heat sink, ensuring efficient cooling. Without thermal paste, heat cannot be properly dissipated, leading to overheating and potential system failure.

    Rate this question:

  • 22. 

    A home user is setting up a wireless network. Which of the following could be used to prevent a neighbor from accessing the network? (Select TWO).

    • Ensure all PCs are turned off when not in use

    • Enable wireless encryption

    • Create a DMZ for the main PC

    • Disable SSID broadcasting

    • Enable DHCP on the router

    Correct Answer(s)
    A. Enable wireless encryption
    A. Disable SSID broadcasting
    Explanation
    To prevent a neighbor from accessing the wireless network, enabling wireless encryption is necessary. This will encrypt the data transmitted over the network, making it difficult for unauthorized users to decipher. Additionally, disabling SSID broadcasting will hide the network's name from being visible to others, making it harder for them to find and connect to the network.

    Rate this question:

  • 23. 

    A technician is replacing a hard drive with a new 30GB drive formatted with FAT32. While transferring a 5GB file an error appears indicating that the new drive has insufficient space for the transfer. Which of the following is the cause of the problem?

    • FAT32 cannot handle single files larger than 4GB.

    • FAT32 cannot handle single files larger than 2GB.

    • The old drive uses NTFS and is incompatible with the new drive.

    • The file is formatted with NTFS and is incompatible with the new drive.

    Correct Answer
    A. FAT32 cannot handle single files larger than 4GB.
    Explanation
    The cause of the problem is that FAT32 cannot handle single files larger than 4GB. This means that when trying to transfer a 5GB file to the new drive, it exceeds the maximum file size limit of FAT32, resulting in the error indicating insufficient space for the transfer.

    Rate this question:

  • 24. 

    Which of the following tools can be used prior to installing Windows Vista to find hardware compatibility issues?

    • Upgrade Advisor

    • Window Aero

    • Task Manager

    • Device Manager

    Correct Answer
    A. Upgrade Advisor
    Explanation
    Upgrade Advisor is the correct answer because it is a tool specifically designed to check the compatibility of hardware and software with Windows Vista before installation. It scans the system and provides a report of any potential issues or conflicts that may arise during the installation process. This allows users to address these issues beforehand and ensure a smooth installation and functioning of Windows Vista.

    Rate this question:

  • 25. 

    A technician needs to modify the BIOS settings of a PC; however, the BIOS setup password is unknown to all current employees. How can the technician accomplish this task?

    • Set the motherboard configuration jumper to clear the password.

    • Use a third party utility to reset the password.

    • Disconnect the power supply to the motherboard.

    • Contact the OEM and ask them to clear the password.

    Correct Answer
    A. Set the motherboard configuration jumper to clear the password.
    Explanation
    The technician can accomplish the task by setting the motherboard configuration jumper to clear the password. This jumper is used to reset the BIOS settings, including the password. By moving the jumper to the appropriate position and then back, the password will be cleared, allowing the technician to modify the BIOS settings. This method is commonly used when the password is unknown or forgotten.

    Rate this question:

  • 26. 

    A user is connected to a stand alone printer. The user is receiving an out of memory error when printing large graphic files. Which of the following should the technician perform?

    • Upgrade RAM on the printer

    • Upgrade HDD on the computer

    • Upgrade RAM on the computer

    • Reinstall printer drivers

    Correct Answer
    A. Upgrade RAM on the printer
    Explanation
    Upgrading the RAM on the printer will increase its memory capacity, allowing it to handle larger graphic files without running out of memory. Upgrading the HDD on the computer or reinstalling printer drivers will not directly address the out of memory error. Upgrading the RAM on the computer may improve overall performance, but it will not specifically solve the out of memory error when printing large graphic files.

    Rate this question:

  • 27. 

    A user can receive email but cannot send email with the email client software. Which of the following protocols is incorrectly configured?

    • FTP

    • SMTP

    • POP

    • SNMP

    Correct Answer
    A. SMTP
    Explanation
    SMTP (Simple Mail Transfer Protocol) is used for sending emails, not receiving them. If a user can receive emails but cannot send them, it means that the SMTP protocol is incorrectly configured. SMTP is responsible for the outgoing mail server settings, so if it is not properly configured, the user will not be able to send emails.

    Rate this question:

  • 28. 

    After installing a replacement floppy disk drive, the LED on the drive stays constantly lit and the drive does not work. Which of the following is the MOST likely cause of the problem?

    • Floppy ribbon is reversed

    • Floppy disk is in the drive

    • Floppy ribbon is not connected

    • This is normal after replacement

    Correct Answer
    A. Floppy ribbon is reversed
    Explanation
    The most likely cause of the problem is that the floppy ribbon is reversed. When the ribbon is connected in the wrong orientation, it can cause the LED on the drive to stay constantly lit and prevent the drive from functioning properly. Reversing the ribbon should resolve the issue.

    Rate this question:

  • 29. 

    After upgrading to Windows Vista, a client states that the run command no longer appears on the Start menu: Which of the following is the reason the user cannot see the run command?

    • The user must be an administrator to have access to the run command.

    • The Vista run command is not installed by default during an upgrade.

    • Vista has replaced the run command with the Power Shell.

    • The run command is not displayed by default on the start menu.

    Correct Answer
    A. The run command is not displayed by default on the start menu.
    Explanation
    The reason the user cannot see the run command after upgrading to Windows Vista is that the run command is not displayed by default on the start menu.

    Rate this question:

  • 30. 

    A user has just moved to a new office and is unable to access the network. The technician suspects the users network settings need to be changed. Which of the following tools would the technician use on the Windows XP computer to view the network settings?

    • NETDIAG

    • TRACERT

    • IPCONFIG

    • PATHPING

    Correct Answer
    A. IPCONFIG
    Explanation
    The technician would use IPCONFIG on the Windows XP computer to view the network settings. IPCONFIG is a command-line tool that displays the current configuration of the IP address, subnet mask, default gateway, and other network settings of the computer. By using IPCONFIG, the technician can check if the user's network settings are configured correctly or if they need to be changed in order to access the network.

    Rate this question:

  • 31. 

    A user states that the wireless router keeps rebooting while the power to the other equipment stays on. Which of the following should the technician perform to prevent users from rebooting the router?

    • Change the default administrator password

    • Change the IP range of the wireless network

    • Hide the SSID

    • Disable WEP

    Correct Answer
    A. Change the default administrator password
    Explanation
    Changing the default administrator password is the correct answer because it helps to secure the wireless router from unauthorized access. By changing the default password, the technician can prevent users from rebooting the router by accessing its settings and making changes. This ensures that only authorized individuals with the new password can access and control the router, reducing the risk of unauthorized reboots.

    Rate this question:

  • 32. 

    Given the following TCP/IP information for a computer, which of the following is the cause of a communication failure? IP Address: 192.168.1.5 Subnet Mask: 255.255.255.0 Default Gateway: 255.168.1.254 DNS Server: 172.16.4.1 WINS Server: 10.0.4.1

    • DNS server

    • Network cable is disconnected

    • Default gateway

    • WINS server

    Correct Answer
    A. Default gateway
    Explanation
    The default gateway is responsible for routing network traffic between different networks. If the default gateway is incorrect or not set up properly, the computer will not be able to communicate with devices on other networks, leading to a communication failure.

    Rate this question:

  • 33. 

    Which of the following will occur if an AGP 4x video card is used in an AGP 2x slot?

    • The video card will run at the slower AGP 2x speed.

    • The video card will run at the higher AGP 4x speed.

    • The video card will run in-between the two speeds at the AGP 3x speed.

    • The video card will not operate.

    Correct Answer
    A. The video card will run at the slower AGP 2x speed.
    Explanation
    If an AGP 4x video card is used in an AGP 2x slot, the video card will run at the slower AGP 2x speed. AGP slots are backward compatible, meaning that a higher speed video card can be used in a lower speed slot, but it will only operate at the maximum speed supported by the slot. In this case, the AGP 4x video card will be limited to the maximum speed of the AGP 2x slot, resulting in slower performance.

    Rate this question:

  • 34. 

    A workstation is not booting correctly. The technician wants to locate bad sectors and recover readable information. Which of the following commands would the technician use?

    • Chkdsk c: /f

    • Chkdsk c: /i

    • Chkdsk c: /c

    • Chkdsk c: /r

    Correct Answer
    A. Chkdsk c: /r
    Explanation
    The technician would use the "chkdsk c: /r" command to locate bad sectors and recover readable information. The "/r" parameter in the command stands for "repair" and it instructs the chkdsk (check disk) utility to locate bad sectors on the disk and attempt to recover any readable information from them. This command is commonly used to fix disk errors and recover data from damaged sectors on a hard drive.

    Rate this question:

  • 35. 

    A technician needs to implement a RAID 1 set on a computer. Which of the following is the MINIMUM number of hard drives that would be required?

    • 1

    • 2

    • 3

    • 5

    Correct Answer
    A. 2
    Explanation
    To implement a RAID 1 set, also known as mirroring, at least two hard drives are required. In RAID 1, data is duplicated on two or more drives, providing redundancy and fault tolerance. This means that if one drive fails, the data can still be accessed from the other drive(s). Therefore, the minimum number of hard drives required to implement RAID 1 is 2.

    Rate this question:

  • 36. 

    Which of the following is the BEST tool to troubleshoot a DB-9 port?

    • Ohm meter

    • Anti-static wrist strap

    • Oscilloscope

    • Loopback plug

    Correct Answer
    A. Loopback plug
    Explanation
    A loopback plug is the best tool to troubleshoot a DB-9 port because it allows for testing the port's functionality without the need for an external device. When the loopback plug is connected to the DB-9 port, it creates a loopback circuit that simulates the presence of a connected device. This allows for checking if the port is transmitting and receiving data properly. An ohm meter is used to measure resistance and is not specifically designed for troubleshooting DB-9 ports. An anti-static wrist strap is used to prevent electrostatic discharge and is not relevant to troubleshooting a port. An oscilloscope is a tool used for measuring and analyzing electrical signals, but it is not specifically designed for troubleshooting DB-9 ports.

    Rate this question:

  • 37. 

    Which of the following is contained in the first sector of the hard disk?

    • Operating system

    • Master file table

    • Boot sector

    • Master boot record

    Correct Answer
    A. Master boot record
    Explanation
    The first sector of the hard disk contains the Master Boot Record (MBR). The MBR is a small program that is responsible for the booting process of the computer. It contains information about the partitions on the hard disk, as well as the location of the operating system. When the computer starts up, the BIOS reads the MBR from the first sector of the hard disk and transfers control to the operating system. Therefore, the MBR is an essential component for the computer to start up properly.

    Rate this question:

  • 38. 

    An internal IEEE 1394 expansion card should be installed on which port type?

    • AMR

    • AGP

    • ISA

    • PCI

    Correct Answer
    A. PCI
    Explanation
    An internal IEEE 1394 expansion card should be installed on the PCI port type. PCI (Peripheral Component Interconnect) is a standard expansion slot used in computers for connecting various hardware devices. IEEE 1394, also known as FireWire or i.LINK, is a high-speed serial bus interface that allows for fast data transfer between devices. Therefore, installing an IEEE 1394 expansion card on a PCI port would provide the necessary connection and compatibility for the device to function properly.

    Rate this question:

  • 39. 

    A user reports that after installing a PCIe video card into a system, the onboard video no longer displays. Which of the following is MOST likely the cause?

    • The drivers for the onboard video card have been overwritten by the PCIe video card drivers.

    • The PCIe video card is defective and is conflicting with the onboard video.

    • The BIOS detected the PCIe video card and disabled the onboard video.

    • The processor has overheated and is causing the video to not display.

    Correct Answer
    A. The BIOS detected the PCIe video card and disabled the onboard video.
    Explanation
    The most likely cause is that the BIOS detected the PCIe video card and disabled the onboard video. This is a common behavior for BIOS when a dedicated video card is installed, as it prioritizes the dedicated card over the onboard one. The drivers for the onboard video card being overwritten or the PCIe video card being defective and conflicting with the onboard video are less likely causes. The processor overheating would not directly affect the display of video.

    Rate this question:

  • 40. 

    A technician is replacing a motherboard in a laptop. After completing the install, the laptop shuts down after a few seconds of being on. Which of the following is the causing the laptop to shutdown?

    • Keyboard is not plugged in.

    • CPU is not locked into the socket.

    • LCD is not plugged in.

    • RAM is faulty.

    Correct Answer
    A. CPU is not locked into the socket.
    Explanation
    If the CPU is not locked into the socket properly, it can cause the laptop to shut down after a few seconds of being on. This is because a loose or improperly installed CPU can result in poor contact between the CPU and the motherboard, leading to overheating. When the CPU overheats, the laptop's built-in thermal protection mechanism kicks in and shuts down the system to prevent damage.

    Rate this question:

  • 41. 

    Which of the following is fault tolerant and allows for disk mirroring?

    • RAID 0

    • RAID 1

    • RAID 3

    • RAID 5

    Correct Answer
    A. RAID 1
    Explanation
    RAID 1 is fault tolerant and allows for disk mirroring. In RAID 1, data is written simultaneously to two or more disks, creating an exact copy or mirror of the data. This redundancy provides fault tolerance as if one disk fails, the data can still be accessed from the mirrored disk. RAID 1 offers high availability and data protection, making it suitable for applications that require data reliability and quick data recovery in case of disk failure.

    Rate this question:

  • 42. 

    Which of the following is a method used in the removal of a boot sector virus?

    • Performing a standard format of the hard drive partitions

    • Booting the computer with peripheral devices disconnected

    • Scanning all CD-R and CD-RW media prior to initial use

    • Booting from the floppy disk or CD-ROM prior to scanning

    Correct Answer
    A. Booting from the floppy disk or CD-ROM prior to scanning
    Explanation
    Booting from the floppy disk or CD-ROM prior to scanning is a method used in the removal of a boot sector virus. This is because booting from a different source allows the computer to bypass the infected boot sector and load a clean operating system. By doing this, the virus is unable to activate and can be effectively detected and removed by scanning the system.

    Rate this question:

  • 43. 

    An inkjet printer prints faded and smeared pages. Which of the following would be the MOST appropriate solution for this issue?

    • Blow compressed air on the print cartridges.

    • Run the printers cleaning routine.

    • Reseat the print cartridges.

    • Use a lint-free cloth to clean the print heads.

    Correct Answer
    A. Run the printers cleaning routine.
    Explanation
    Running the printer's cleaning routine would be the most appropriate solution for the issue of faded and smeared pages. This routine is specifically designed to clean the print heads and remove any clogs or debris that may be causing the printing issues. By running the cleaning routine, the printer will be able to clear any blockages and ensure that the ink is properly distributed, resulting in better print quality.

    Rate this question:

  • 44. 

    Which of the following is a difference between a worm and spyware?

    • A worm replicates itself before infecting other systems.

    • Spyware replicates multiple times on one system before infecting another system.

    • A worm attacks one platform, where spyware attacks across platforms.

    • Spyware resides primarily in the boot sector, where a worm resides primarily in the registry.

    Correct Answer
    A. A worm replicates itself before infecting other systems.
    Explanation
    A worm is a type of malware that is capable of replicating itself and spreading to other systems without the need for any user interaction. This means that once a worm infects a system, it can independently create copies of itself and infect other vulnerable systems on a network. On the other hand, spyware is a type of malware that is designed to collect information from a user's computer without their knowledge or consent. While spyware can replicate itself multiple times on one system, it does not have the ability to independently infect other systems like a worm does.

    Rate this question:

  • 45. 

    A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the users resulting access level for the remotely shared directory?

    • Modify

    • Full control

    • Write

    • Read

    Correct Answer
    A. Read
    Explanation
    The user's resulting access level for the remotely shared directory is "Read". This is because even though the file share permissions allow the user to have full control, the NTFS permissions only allow the user to have read access. NTFS permissions take precedence over file share permissions, so the user's access level is limited to read-only.

    Rate this question:

  • 46. 

    A technician is upgrading memory in a desktop PC. The user purchased two 2GB DIMMS from the PC manufacturer. The PC powers on and POST shows 2GB of RAM. Which of the following is the FIRST action to perform?

    • Update the manufacturers chipset drivers.

    • Replace the two 2GB DIMMs with four 1GB DIMMs.

    • Update the PC BIOS and verify all memory is seen in POST.

    • Replace both of the 2GB DIMMs memory with new memory.

    Correct Answer
    A. Update the PC BIOS and verify all memory is seen in POST.
    Explanation
    The correct answer is to update the PC BIOS and verify all memory is seen in POST. This is because when upgrading memory in a desktop PC, it is important to ensure that the BIOS recognizes and detects the new memory modules. By updating the PC BIOS, any compatibility issues or limitations with the new memory can be addressed, and verifying that all memory is seen in POST confirms that the upgrade was successful. The other options, such as updating chipset drivers or replacing the DIMMs with different ones, are not necessary or relevant in this situation.

    Rate this question:

  • 47. 

    USER1 is part of the Users Group and is attempting to access files via UNC path \\SERVER\FILESHARE. \\ SERVER\FILESHARE has the following share permissions: AdministratorsFull ControlUsersRead OnlyGuestsNo AccessThe directory on the hard drive where the share is located has the following permissions: AdministratorsFull ControlUsersChangeGuestsNo AccessWhich of the following levels of access will login account USER1 have?

    • Read Only

    • Full Control

    • Change

    • No Access

    Correct Answer
    A. Read Only
    Explanation
    Based on the given information, USER1 is part of the Users Group and is attempting to access files via the UNC path. The share permissions for the FILESHARE on SERVER are set to "Read Only" for the Users group. Additionally, the directory on the hard drive where the share is located has permissions set to "Change" for the Users group. Therefore, when USER1 attempts to access the files, they will have the level of access that is more restrictive between the share permissions and the directory permissions. In this case, the more restrictive permission is "Read Only", so USER1 will have "Read Only" access to the files.

    Rate this question:

  • 48. 

    A virus has been removed from the users machine, but the user still cannot access the Internet. Which of the following should the technician check NEXT?

    • Disable port forwarding on the router.

    • Reboot to Safe Mode and see if the Internet is accessible.

    • Format the machine and reinstall the OS.

    • Check the web browsers proxy settings.

    Correct Answer
    A. Check the web browsers proxy settings.
    Explanation
    After removing the virus from the user's machine, the next step for the technician should be to check the web browser's proxy settings. Proxy settings can sometimes be altered by viruses or malware, causing issues with internet access. By checking and potentially adjusting the proxy settings, the technician can ensure that the user can access the internet properly. Disabling port forwarding on the router, rebooting to Safe Mode, or formatting and reinstalling the OS may not be necessary or effective in resolving the issue of internet access in this particular scenario.

    Rate this question:

  • 49. 

    Using the NET command which variable would be used to find out the number of files sent by the workstation service?

    • Group

    • View

    • File

    • Statistics

    Correct Answer
    A. Statistics
    Explanation
    The correct answer is "statistics" because when using the NET command, the "statistics" variable would be used to find out the number of files sent by the workstation service.

    Rate this question:

Quiz Review Timeline (Updated): Feb 28, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Feb 28, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 29, 2012
    Quiz Created by
    Tmede212
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.