CompTIA A+ 220-702 Practical Application Topic 2 Vol.B

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Tmede212
T
Tmede212
Community Contributor
Quizzes Created: 7 | Total Attempts: 1,076
| Attempts: 106 | Questions: 100
Please wait...
Question 1 / 100
0 %
0/100
Score 0/100
1. Which of the following can cause a blue screen error?

Explanation

Bad drivers can cause a blue screen error. When a driver is outdated, incompatible, or corrupted, it can lead to system instability and result in a blue screen error. This error occurs when the operating system encounters a critical error that it cannot recover from, causing the system to crash and display a blue screen. Updating drivers regularly and ensuring they are compatible with the operating system can help prevent such errors.

Submit
Please wait...
About This Quiz
CompTIA A+ 220-702 Practical Application Topic 2 Vol.B - Quiz

This quiz assesses practical application skills for the CompTIA A+ 220-702 certification, focusing on troubleshooting and understanding hardware functionalities like USB, networked printers, and system boot processes. It's designed to enhance technical proficiency in handling typical IT support issues.

Personalize your quiz and earn a certificate with your name on it!
2. A user reports that when typing on the laptop keyboard, the mouse pointer scrolls across the screen. Which of the following would MOST likely resolve this issue?

Explanation

Disabling the touchpad would most likely resolve the issue of the mouse pointer scrolling across the screen while typing on the laptop keyboard. This is because the touchpad may be overly sensitive and detecting unintended movements, causing the cursor to scroll. By disabling the touchpad, the user can prevent any accidental input from interfering with their typing.

Submit
3. After performing a preventative maintenance on a laser printer, which of the following is the NEXT step a technician should take?

Explanation

After performing preventative maintenance on a laser printer, the next step a technician should take is to print a test page. This is important to ensure that the printer is functioning properly after the maintenance. By printing a test page, the technician can check for any issues such as print quality, alignment, or any other potential problems that may have occurred during the maintenance process. This step helps to verify that the printer is in good working condition and ready for regular use.

Submit
4. A user states that email is not being received. Which of the following protocols should the technician check for incoming mail?

Explanation

The technician should check the POP3 protocol for incoming mail. POP3 (Post Office Protocol version 3) is a standard protocol used for receiving emails from a remote server to a local email client. It allows the client to download and store the emails on their device. Therefore, if the user is not receiving emails, it is important to check the POP3 settings and ensure that the email client is properly configured to retrieve emails using the POP3 protocol.

Submit
5. A user is playing a new first person game on the computer and the screen is pausing during game play. The user has a high-end graphics card and is maxed out in memory. Which of the following should the technician perform?

Explanation

The user is experiencing screen pauses during gameplay, which indicates a potential issue with the graphics card drivers. Upgrading the drivers can help resolve compatibility issues or bugs that may be causing the problem. Reinstalling the game, replacing the hard drive, or reinstalling the operating system are unlikely to address this specific issue.

Submit
6. A user reports that a laser printer is printing out pages with blurry text that smudges when touched. Which of the following is the MOST likely reason for this?

Explanation

The most likely reason for the blurry and smudged text is that the fuser, which is responsible for melting the toner onto the paper, is not reaching the required temperature. This can result in the toner not properly adhering to the paper, causing smudging and blurry text.

Submit
7. If a technician suspects that the voltage being delivered to a desktop computers power supply is insufficient or incorrect, which device should be used to determine the correct voltage?

Explanation

A multimeter is the most appropriate device to determine the correct voltage being delivered to a desktop computer's power supply. A multimeter is a versatile tool that can measure various electrical quantities, including voltage. By connecting the multimeter to the power supply, the technician can accurately measure the voltage and determine if it is sufficient or correct. This helps in diagnosing any potential issues with the power supply and ensures that the desktop computer is receiving the required voltage for proper functioning.

Submit
8. A computer just had a memory upgrade installed on the machine. Upon boot, the system does not recognize the new memory even though it is listed as being compatible on the manufacturers website. Which of the following is MOST likely needed to resolve the issue?

Explanation

The most likely solution to the issue of the computer not recognizing the new memory after a memory upgrade is a BIOS update. The BIOS (Basic Input/Output System) is responsible for initializing hardware components during the boot process, and updating it can help the system recognize and properly utilize the new memory.

Submit
9. Which of the following is the default FTP port?

Explanation

The default FTP port is 21. FTP (File Transfer Protocol) is a standard network protocol used for transferring files between a client and a server on a computer network. The default port number for FTP is 21, which is used for establishing the connection between the client and the server.

Submit
10. Which of the following is the BEST source for information about malware detected on a computer?

Explanation

The best source for information about malware detected on a computer would be the anti-spyware software website. This is because the website is specifically dedicated to providing information and updates about malware, and it is likely to have the most up-to-date and accurate information about the specific malware detected on the computer. The README.TXT file included with the anti-spyware software installation may provide some information, but it may not be as comprehensive or current as the information available on the software's website. The user of a previously infected computer may have some insights, but their knowledge may be limited to their specific experience and may not apply to all cases. The operating system documentation may not specifically address malware detection and removal.

Submit
11. A technician is experiencing an issue with the computer randomly rebooting throughout the day. The technician suspects the cause is from over heating. Which of the following should the technician check for the cause?

Explanation

The technician should check if the heat sink is firmly attached to the processor. Overheating can cause a computer to randomly reboot, and the heat sink is responsible for dissipating the heat generated by the processor. If the heat sink is not properly attached, it may not be able to effectively cool the processor, leading to overheating and subsequent reboots.

Submit
12. Which of the following is the MAXIMUM allowable cable length of CAT5?

Explanation

The maximum allowable cable length of CAT5 is 100 meters (328 feet). This is because CAT5 cables are designed to transmit data reliably up to this distance without significant loss or degradation of signal quality. Going beyond this distance can result in signal attenuation and data errors. Therefore, it is important to adhere to the maximum cable length to ensure optimal performance and reliable data transmission.

Submit
13. A user is not able to receive files off the FTP server. Which of the following default ports needs to be opened for FTP to work properly?

Explanation

To receive files off the FTP server, port 21 needs to be opened. Port 21 is the default port for FTP (File Transfer Protocol), which is used for transmitting files between a client and a server on a computer network. By opening port 21, the user will be able to establish a connection with the FTP server and receive files successfully.

Submit
14. An office laser printer is printing lighter in random areas. Which of the following is the EASIEST solution to implement for this issue?

Explanation

Replacing the toner cartridge is the easiest solution to implement for this issue because a lighter print in random areas indicates that the toner cartridge is likely running low on toner or the toner is unevenly distributed. By replacing the toner cartridge, the printer will have a fresh supply of toner and should print at the appropriate darkness level consistently.

Submit
15. Which of the following tools would be BEST to use to pry open the case of a laptop?

Explanation

A plastic wedge would be the best tool to use to pry open the case of a laptop because it is less likely to cause damage to the case or internal components compared to a metal screwdriver or needle-nose pliers. Plastic is softer and less likely to scratch or dent the laptop case, making it a safer option. Additionally, a plastic wedge can provide leverage and help to gently separate the case without applying excessive force. An extension magnet is not suitable for prying open a laptop case as it is designed to attract and retrieve metallic objects, not for opening cases.

Submit
16. Under which of the following circumstances would a technician use IPCONFIG /RENEW?

Explanation

A technician would use IPCONFIG /RENEW after using IPCONFIG /RELEASE. When a user releases their IP address using IPCONFIG /RELEASE, it essentially disconnects the computer from the network. To regain connectivity and obtain a new IP address, the technician would then use IPCONFIG /RENEW. This command allows the computer to request a new IP address from the DHCP server, ensuring that the computer can reconnect to the network successfully.

Submit
17. A user states that the inkjet printer is printing streaks on documents. Which of the following would resolve the issue?

Explanation

Using the printer's clean option is the most appropriate solution to resolve the issue of streaks on documents. This option helps to clean the print head and remove any clogged ink nozzles, which can often cause streaks or smudges on printed documents. Replacing the printer data cable may be necessary if there is a connectivity issue, but it is unlikely to fix the streaking problem. Printing the demo page can help identify any specific issues with the printer's hardware, but it may not directly resolve the streaking problem. Reinstalling the drivers is more relevant if there are software or compatibility issues, rather than addressing the physical problem of streaks on documents.

Submit
18. A computer just had a memory upgrade installed on the machine. Upon boot, the system does not recognize the new memory even though it is listed as being compatible on the manufacturers website. Which of the following is MOST likely needed to resolve the issue?

Explanation

The most likely solution to the issue is a BIOS update. When a computer undergoes a memory upgrade, the BIOS (Basic Input/Output System) may need to be updated to recognize the new memory modules. The BIOS is responsible for initializing hardware components during the boot process, and an outdated BIOS may not have the necessary information to detect and utilize the new memory. By updating the BIOS, the system will be able to properly recognize and utilize the upgraded memory.

Submit
19. A technician is tasked with setting up a Windows XP computer with a user account that will only be used to access the Internet. Which account type should the user have access to?

Explanation

The user should have access to the Guest account. The Guest account is designed for temporary or occasional use and has limited privileges, making it ideal for situations where the user only needs to access the Internet. The Guest account does not have administrative rights, ensuring that the user cannot make any significant changes to the computer's settings or access sensitive information.

Submit
20. A computer is responding slowly and the Task Manager shows that spool.exe is using 95% of system resources. Which of the following is MOST likely the cause of this problem?

Explanation

The most likely cause of the computer responding slowly and spool.exe using 95% of system resources is the printing subsystem. Spool.exe is responsible for managing print jobs in Windows, and if there is an issue with the printing subsystem, it can cause high CPU usage and slow down the computer's performance.

Submit
21. After replacing the motherboard in a laptop, the system overheats and fails to boot. Which of the following is the MOST likely cause of this error?

Explanation

The most likely cause of the system overheating and failing to boot after replacing the motherboard in a laptop is the absence of thermal paste between the heat sink and CPU. Thermal paste is used to improve the transfer of heat from the CPU to the heat sink, ensuring efficient cooling. Without thermal paste, heat cannot be properly dissipated, leading to overheating and potential system failure.

Submit
22. A home user is setting up a wireless network. Which of the following could be used to prevent a neighbor from accessing the network? (Select TWO).

Explanation

To prevent a neighbor from accessing the wireless network, enabling wireless encryption is necessary. This will encrypt the data transmitted over the network, making it difficult for unauthorized users to decipher. Additionally, disabling SSID broadcasting will hide the network's name from being visible to others, making it harder for them to find and connect to the network.

Submit
23. A technician is replacing a hard drive with a new 30GB drive formatted with FAT32. While transferring a 5GB file an error appears indicating that the new drive has insufficient space for the transfer. Which of the following is the cause of the problem?

Explanation

The cause of the problem is that FAT32 cannot handle single files larger than 4GB. This means that when trying to transfer a 5GB file to the new drive, it exceeds the maximum file size limit of FAT32, resulting in the error indicating insufficient space for the transfer.

Submit
24. Which of the following tools can be used prior to installing Windows Vista to find hardware compatibility issues?

Explanation

Upgrade Advisor is the correct answer because it is a tool specifically designed to check the compatibility of hardware and software with Windows Vista before installation. It scans the system and provides a report of any potential issues or conflicts that may arise during the installation process. This allows users to address these issues beforehand and ensure a smooth installation and functioning of Windows Vista.

Submit
25. A technician needs to modify the BIOS settings of a PC; however, the BIOS setup password is unknown to all current employees. How can the technician accomplish this task?

Explanation

The technician can accomplish the task by setting the motherboard configuration jumper to clear the password. This jumper is used to reset the BIOS settings, including the password. By moving the jumper to the appropriate position and then back, the password will be cleared, allowing the technician to modify the BIOS settings. This method is commonly used when the password is unknown or forgotten.

Submit
26. A user is connected to a stand alone printer. The user is receiving an out of memory error when printing large graphic files. Which of the following should the technician perform?

Explanation

Upgrading the RAM on the printer will increase its memory capacity, allowing it to handle larger graphic files without running out of memory. Upgrading the HDD on the computer or reinstalling printer drivers will not directly address the out of memory error. Upgrading the RAM on the computer may improve overall performance, but it will not specifically solve the out of memory error when printing large graphic files.

Submit
27. A user can receive email but cannot send email with the email client software. Which of the following protocols is incorrectly configured?

Explanation

SMTP (Simple Mail Transfer Protocol) is used for sending emails, not receiving them. If a user can receive emails but cannot send them, it means that the SMTP protocol is incorrectly configured. SMTP is responsible for the outgoing mail server settings, so if it is not properly configured, the user will not be able to send emails.

Submit
28. After installing a replacement floppy disk drive, the LED on the drive stays constantly lit and the drive does not work. Which of the following is the MOST likely cause of the problem?

Explanation

The most likely cause of the problem is that the floppy ribbon is reversed. When the ribbon is connected in the wrong orientation, it can cause the LED on the drive to stay constantly lit and prevent the drive from functioning properly. Reversing the ribbon should resolve the issue.

Submit
29. After upgrading to Windows Vista, a client states that the run command no longer appears on the Start menu: Which of the following is the reason the user cannot see the run command?

Explanation

The reason the user cannot see the run command after upgrading to Windows Vista is that the run command is not displayed by default on the start menu.

Submit
30. A user has just moved to a new office and is unable to access the network. The technician suspects the users network settings need to be changed. Which of the following tools would the technician use on the Windows XP computer to view the network settings?

Explanation

The technician would use IPCONFIG on the Windows XP computer to view the network settings. IPCONFIG is a command-line tool that displays the current configuration of the IP address, subnet mask, default gateway, and other network settings of the computer. By using IPCONFIG, the technician can check if the user's network settings are configured correctly or if they need to be changed in order to access the network.

Submit
31. A user states that the wireless router keeps rebooting while the power to the other equipment stays on. Which of the following should the technician perform to prevent users from rebooting the router?

Explanation

Changing the default administrator password is the correct answer because it helps to secure the wireless router from unauthorized access. By changing the default password, the technician can prevent users from rebooting the router by accessing its settings and making changes. This ensures that only authorized individuals with the new password can access and control the router, reducing the risk of unauthorized reboots.

Submit
32. Given the following TCP/IP information for a computer, which of the following is the cause of a communication failure? IP Address: 192.168.1.5 Subnet Mask: 255.255.255.0 Default Gateway: 255.168.1.254 DNS Server: 172.16.4.1 WINS Server: 10.0.4.1

Explanation

The default gateway is responsible for routing network traffic between different networks. If the default gateway is incorrect or not set up properly, the computer will not be able to communicate with devices on other networks, leading to a communication failure.

Submit
33. Which of the following will occur if an AGP 4x video card is used in an AGP 2x slot?

Explanation

If an AGP 4x video card is used in an AGP 2x slot, the video card will run at the slower AGP 2x speed. AGP slots are backward compatible, meaning that a higher speed video card can be used in a lower speed slot, but it will only operate at the maximum speed supported by the slot. In this case, the AGP 4x video card will be limited to the maximum speed of the AGP 2x slot, resulting in slower performance.

Submit
34. Which of the following is the BEST tool to troubleshoot a DB-9 port?

Explanation

A loopback plug is the best tool to troubleshoot a DB-9 port because it allows for testing the port's functionality without the need for an external device. When the loopback plug is connected to the DB-9 port, it creates a loopback circuit that simulates the presence of a connected device. This allows for checking if the port is transmitting and receiving data properly. An ohm meter is used to measure resistance and is not specifically designed for troubleshooting DB-9 ports. An anti-static wrist strap is used to prevent electrostatic discharge and is not relevant to troubleshooting a port. An oscilloscope is a tool used for measuring and analyzing electrical signals, but it is not specifically designed for troubleshooting DB-9 ports.

Submit
35. Which of the following is contained in the first sector of the hard disk?

Explanation

The first sector of the hard disk contains the Master Boot Record (MBR). The MBR is a small program that is responsible for the booting process of the computer. It contains information about the partitions on the hard disk, as well as the location of the operating system. When the computer starts up, the BIOS reads the MBR from the first sector of the hard disk and transfers control to the operating system. Therefore, the MBR is an essential component for the computer to start up properly.

Submit
36. A workstation is not booting correctly. The technician wants to locate bad sectors and recover readable information. Which of the following commands would the technician use?

Explanation

The technician would use the "chkdsk c: /r" command to locate bad sectors and recover readable information. The "/r" parameter in the command stands for "repair" and it instructs the chkdsk (check disk) utility to locate bad sectors on the disk and attempt to recover any readable information from them. This command is commonly used to fix disk errors and recover data from damaged sectors on a hard drive.

Submit
37. An internal IEEE 1394 expansion card should be installed on which port type?

Explanation

An internal IEEE 1394 expansion card should be installed on the PCI port type. PCI (Peripheral Component Interconnect) is a standard expansion slot used in computers for connecting various hardware devices. IEEE 1394, also known as FireWire or i.LINK, is a high-speed serial bus interface that allows for fast data transfer between devices. Therefore, installing an IEEE 1394 expansion card on a PCI port would provide the necessary connection and compatibility for the device to function properly.

Submit
38. A technician needs to implement a RAID 1 set on a computer. Which of the following is the MINIMUM number of hard drives that would be required?

Explanation

To implement a RAID 1 set, also known as mirroring, at least two hard drives are required. In RAID 1, data is duplicated on two or more drives, providing redundancy and fault tolerance. This means that if one drive fails, the data can still be accessed from the other drive(s). Therefore, the minimum number of hard drives required to implement RAID 1 is 2.

Submit
39. Which of the following is fault tolerant and allows for disk mirroring?

Explanation

RAID 1 is fault tolerant and allows for disk mirroring. In RAID 1, data is written simultaneously to two or more disks, creating an exact copy or mirror of the data. This redundancy provides fault tolerance as if one disk fails, the data can still be accessed from the mirrored disk. RAID 1 offers high availability and data protection, making it suitable for applications that require data reliability and quick data recovery in case of disk failure.

Submit
40. A user reports that after installing a PCIe video card into a system, the onboard video no longer displays. Which of the following is MOST likely the cause?

Explanation

The most likely cause is that the BIOS detected the PCIe video card and disabled the onboard video. This is a common behavior for BIOS when a dedicated video card is installed, as it prioritizes the dedicated card over the onboard one. The drivers for the onboard video card being overwritten or the PCIe video card being defective and conflicting with the onboard video are less likely causes. The processor overheating would not directly affect the display of video.

Submit
41. A technician is replacing a motherboard in a laptop. After completing the install, the laptop shuts down after a few seconds of being on. Which of the following is the causing the laptop to shutdown?

Explanation

If the CPU is not locked into the socket properly, it can cause the laptop to shut down after a few seconds of being on. This is because a loose or improperly installed CPU can result in poor contact between the CPU and the motherboard, leading to overheating. When the CPU overheats, the laptop's built-in thermal protection mechanism kicks in and shuts down the system to prevent damage.

Submit
42. Which of the following is a method used in the removal of a boot sector virus?

Explanation

Booting from the floppy disk or CD-ROM prior to scanning is a method used in the removal of a boot sector virus. This is because booting from a different source allows the computer to bypass the infected boot sector and load a clean operating system. By doing this, the virus is unable to activate and can be effectively detected and removed by scanning the system.

Submit
43. An inkjet printer prints faded and smeared pages. Which of the following would be the MOST appropriate solution for this issue?

Explanation

Running the printer's cleaning routine would be the most appropriate solution for the issue of faded and smeared pages. This routine is specifically designed to clean the print heads and remove any clogs or debris that may be causing the printing issues. By running the cleaning routine, the printer will be able to clear any blockages and ensure that the ink is properly distributed, resulting in better print quality.

Submit
44. Which of the following is a difference between a worm and spyware?

Explanation

A worm is a type of malware that is capable of replicating itself and spreading to other systems without the need for any user interaction. This means that once a worm infects a system, it can independently create copies of itself and infect other vulnerable systems on a network. On the other hand, spyware is a type of malware that is designed to collect information from a user's computer without their knowledge or consent. While spyware can replicate itself multiple times on one system, it does not have the ability to independently infect other systems like a worm does.

Submit
45. A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the users resulting access level for the remotely shared directory?

Explanation

The user's resulting access level for the remotely shared directory is "Read". This is because even though the file share permissions allow the user to have full control, the NTFS permissions only allow the user to have read access. NTFS permissions take precedence over file share permissions, so the user's access level is limited to read-only.

Submit
46. A technician is upgrading memory in a desktop PC. The user purchased two 2GB DIMMS from the PC manufacturer. The PC powers on and POST shows 2GB of RAM. Which of the following is the FIRST action to perform?

Explanation

The correct answer is to update the PC BIOS and verify all memory is seen in POST. This is because when upgrading memory in a desktop PC, it is important to ensure that the BIOS recognizes and detects the new memory modules. By updating the PC BIOS, any compatibility issues or limitations with the new memory can be addressed, and verifying that all memory is seen in POST confirms that the upgrade was successful. The other options, such as updating chipset drivers or replacing the DIMMs with different ones, are not necessary or relevant in this situation.

Submit
47. A virus has been removed from the users machine, but the user still cannot access the Internet. Which of the following should the technician check NEXT?

Explanation

After removing the virus from the user's machine, the next step for the technician should be to check the web browser's proxy settings. Proxy settings can sometimes be altered by viruses or malware, causing issues with internet access. By checking and potentially adjusting the proxy settings, the technician can ensure that the user can access the internet properly. Disabling port forwarding on the router, rebooting to Safe Mode, or formatting and reinstalling the OS may not be necessary or effective in resolving the issue of internet access in this particular scenario.

Submit
48. USER1 is part of the Users Group and is attempting to access files via UNC path \\SERVER\FILESHARE. \\ SERVER\FILESHARE has the following share permissions: AdministratorsFull ControlUsersRead OnlyGuestsNo AccessThe directory on the hard drive where the share is located has the following permissions: AdministratorsFull ControlUsersChangeGuestsNo AccessWhich of the following levels of access will login account USER1 have?

Explanation

Based on the given information, USER1 is part of the Users Group and is attempting to access files via the UNC path. The share permissions for the FILESHARE on SERVER are set to "Read Only" for the Users group. Additionally, the directory on the hard drive where the share is located has permissions set to "Change" for the Users group. Therefore, when USER1 attempts to access the files, they will have the level of access that is more restrictive between the share permissions and the directory permissions. In this case, the more restrictive permission is "Read Only", so USER1 will have "Read Only" access to the files.

Submit
49. A second optical drive has been added to the computer and needs to be referenced as the R: drive by the Microsoft Windows operating system. Which of the following places in Microsoft Windows will BEST accomplish this task?

Explanation

Disk Management is the best place in Microsoft Windows to accomplish the task of referencing the second optical drive as the R: drive. Disk Management allows users to manage and configure disk drives and their associated partitions on a computer. By accessing Disk Management, the user can assign a drive letter, such as R:, to the newly added optical drive, ensuring that it is recognized and accessible by the operating system.

Submit
50. From a command prompt, a technician is removing some old user profiles from a desktop. Which of the following commands would be used to delete folders after they have been emptied?

Explanation

The command "RD" is used to delete folders after they have been emptied. This command stands for "Remove Directory" and is commonly used in command prompt to delete directories or folders. It is the appropriate command for the technician to use in this situation to remove the old user profiles from the desktop.

Submit
51. Using the NET command which variable would be used to find out the number of files sent by the workstation service?

Explanation

The correct answer is "statistics" because when using the NET command, the "statistics" variable would be used to find out the number of files sent by the workstation service.

Submit
52. Which of the following does PING Ct do?

Explanation

The correct answer is "Continuous ping of an IP address until cancelled". This means that the PING Ct command will keep sending ICMP echo request packets to an IP address repeatedly until the user manually cancels the process. This can be useful for monitoring network connectivity and latency over an extended period of time.

Submit
53. Which of the following is the MOST important reason for ensuring a RJ-11 phone line jack is not connected to a RJ-45 Ethernet network port?

Explanation

Phone line voltages can damage Ethernet equipment. RJ-11 phone lines typically carry a higher voltage than Ethernet cables. Connecting a RJ-11 phone line jack to a RJ-45 Ethernet network port can result in a power surge that can damage the sensitive electronic components in the Ethernet equipment. Therefore, it is important to ensure that a RJ-11 phone line jack is not connected to a RJ-45 Ethernet network port to avoid potential damage.

Submit
54. The technician is moving a users files from a Windows XP PC to a Windows Vista PC. Which of the following directories corresponds to each operating system?

Explanation

In Windows XP, the user's documents are stored in the "c:\documents and settings\user1\my documents" directory. However, in Windows Vista and newer versions, the directory structure changes and the user's documents are stored in the "c:\users\user1\documents" directory. Therefore, when moving the user's files from a Windows XP PC to a Windows Vista PC, the correct corresponding directories would be "c:\documents and settings\user1\my documents" on the Windows XP PC to "c:\users\user1\documents" on the Windows Vista PC.

Submit
55. A user reports it takes a long time to load all applications and the hard drive LED is showing constant activity. Which of the following is MOST likely the issue?

Explanation

When a user reports that it takes a long time to load all applications and the hard drive LED is constantly active, the most likely issue is that the file system is fragmented. Fragmentation occurs when files are stored in non-contiguous blocks on the hard drive, causing the system to take longer to access and load the necessary data. This can result in slower performance and increased hard drive activity as the system tries to locate and retrieve the fragmented files.

Submit
56. Which of the following commands will be run at a command prompt to determine which Windows OS is running on the computer?

Explanation

The VER command is used to display the version number of the Windows operating system that is currently running on the computer. By running this command at a command prompt, the user can determine which Windows OS is installed on their system.

Submit
57. A technician plugs a USB device into the front panel of a desktop computer and nothing happens. The technician knows that plug-n-play is enabled. Which of the following BEST describes a possible cause to this issue?

Explanation

The most likely cause for the USB device not working when plugged into the front panel of the desktop computer is that the front panel connectors are not properly connected to the motherboard. This could result in a lack of power or data connection, preventing the device from being recognized or functioning properly.

Submit
58. On a laptop, which of the following is the name of the socket that a wireless card would typically be inserted into?

Explanation

A wireless card would typically be inserted into a Mini PCI socket on a laptop.

Submit
59. A user states that a small office home office (SOHO) router constantly reboots and new workstations show up under network neighborhood. Which of the following should be completed to prevent this scenario from happening again?

Explanation

Enabling MAC filtering would prevent unauthorized devices from connecting to the network. By specifying the MAC addresses of the allowed devices, the router will only allow those devices to connect, preventing any new workstations from showing up under network neighborhood. This can help to ensure the security and stability of the network by only allowing trusted devices to access it.

Submit
60. A technician is replacing a motherboard in a users desktop PC. Which of the following tools should be used before replacing the new motherboard?

Explanation

Before replacing the new motherboard, a technician should use a power supply tester. This tool is used to check if the power supply unit is functioning properly. By testing the power supply, the technician can ensure that the motherboard will receive the correct amount of power and prevent any potential issues that may arise from a faulty power supply.

Submit
61. Users in the office report that the speed of the Internet has drastically decreased since the recent network hardware refresh. Which of the following could be attributed to the problem?

Explanation

The correct answer is that the new switches are configured for 10MB. This means that the switches are set to operate at a speed of 10 megabits per second, which is significantly slower than the previous network hardware. This configuration mismatch could explain the drastic decrease in internet speed that the users are experiencing.

Submit
62. How can a technician confirm that a new virus definition file is authentic?

Explanation

A technician can confirm that a new virus definition file is authentic by checking the hash key. The hash key is a unique alphanumeric code generated by a cryptographic algorithm that ensures the integrity and authenticity of the file. By comparing the hash key of the downloaded file with the hash key provided by the official source, the technician can verify that the file has not been tampered with or modified in any way, thus confirming its authenticity.

Submit
63. A technician has just installed a new hard drive into a Windows Vista desktop computer. The hard drive does not appear in Windows Explorer. Which of the following should the technician perform NEXT to have the drive recognized by the system?

Explanation

The technician should initialize and format the hard drive through Disk Management in order to have the drive recognized by the system. This is because when a new hard drive is installed, it needs to be initialized and formatted before it can be used by the operating system. Initializing the drive prepares it for use by creating a partition table, and formatting the drive sets up the file system. Once this is done, the drive will be recognized by Windows Explorer and can be accessed by the user.

Submit
64. A technician has deleted all the files in the directory C:\tempfiles. Which of the following commands should the technician use to delete this directory?

Explanation

The technician should use the RD command to delete the directory C:\tempfiles. RD stands for "remove directory" and is used to delete directories in the Windows command prompt.

Submit
65. A user wants to simplify the opening of Control Panel options in Windows Vista. Which of following is the BEST way to accomplish this task?

Explanation

Customizing the Start menu to display the Control Panel as a menu is the best way to simplify the opening of Control Panel options in Windows Vista. This option allows users to access Control Panel directly from the Start menu without having to navigate through multiple menus or folders. It provides a convenient and efficient way to access and manage various system settings and options.

Submit
66. Which of the following are items that can be configured on a wireless router to make it more difficult for attackers to gain access? (Select TWO).

Explanation

Disabling SSID broadcast and changing the SSID from default are two measures that can be taken to make it more difficult for attackers to gain access to a wireless router. Disabling SSID broadcast prevents the router from broadcasting its network name, making it harder for attackers to identify and target the network. Changing the SSID from its default value adds an additional layer of security, as attackers often target networks with default configurations. These two actions combined can help enhance the security of a wireless router and make it more challenging for attackers to gain unauthorized access.

Submit
67. The Device Manager lists a disk as foreign. Which of the following MUST be done to make the disk usable?

Explanation

When a disk is listed as foreign in the Device Manager, it means that the disk was previously used in a different system or with a different operating system. To make the disk usable, it needs to be imported. Importing the disk allows the current system to recognize and access the disk's data. This process is necessary to ensure that the disk can be used effectively within the current system.

Submit
68. A user reports that after working for a while with their PC, the computer reboots without warning. The technician has ruled out a virus infection, and when examining the motherboard discovers that some of the capacitors look distended and out of shape. Which of the following should the technician do to fix the users PC?

Explanation

The technician should replace the motherboard because the distended and out of shape capacitors indicate a hardware issue. Reconfiguring the BIOS settings, replacing the hard drive, or removing and replacing the affected capacitors would not address the underlying problem with the motherboard.

Submit
69. After the network printer has been rebooted none of the users are able to print. After verifying that the printer was plugged in and that a test page can print locally, the technician realizes that the printer was never properly configured. Which of the following should be done NEXT on the printer?

Explanation

The correct next step in this scenario would be to assign a static IP address to the printer. Since the printer was never properly configured, it is likely that it is not receiving an IP address automatically from a DHCP server. By assigning a static IP, the technician can ensure that the printer has a consistent and valid IP address on the network, allowing users to print successfully.

Submit
70. A technician adds a video card to a single monitor system with an existing on-board video controller. After powering on the system, an error message appears on the monitor stating No Input Detected. Which of the following is the problem?

Explanation

The error message "No Input Detected" indicates that the monitor is not receiving any signal from the video source. In this case, the problem is that the monitor is still connected to the onboard video controller instead of the newly added video card. The monitor needs to be connected to the add-on video card in order to receive the video signal and display the output.

Submit
71. A technician is troubleshooting problems with a hard drive. After checking the drive in another computer and finding no issues, the technician takes voltage readings on the Molex connector from the power supply. Which of the following represents the readings the technician should find?

Explanation

The technician should find voltage readings of +5V and +12V on the Molex connector from the power supply. This is because the Molex connector typically provides these two voltages to power various components, including hard drives. The +5V voltage is used to power the logic circuits, while the +12V voltage is used to power the motor and other mechanical components of the hard drive.

Submit
72. Which of the following devices has the options of: master, slave and cable select? (Select THREE).

Explanation

CD-ROM, Hard drive, and DVD-ROM are the correct answers because these devices can be configured as either master, slave, or cable select. The master and slave settings determine the device's priority in accessing the computer's resources, while the cable select setting allows the device to automatically determine its priority based on its position on the IDE cable.

Submit
73. Which of the following BEST explains a system experiencing intermittent memory errors?

Explanation

Memory sticks can develop corroded contacts over time due to exposure to moisture or other environmental factors. Corroded contacts can result in intermittent memory errors because they can cause poor electrical connections between the memory stick and the memory socket. This can lead to data corruption or loss, resulting in memory errors. Therefore, the best explanation for a system experiencing intermittent memory errors is that the memory sticks have corroded contacts.

Submit
74. Malware is removed and a computer is rebooted. Later, the malware is found on the computer again. Which of the following would permanently solve this problem?

Explanation

Going back to a previous restore point would permanently solve the problem of malware reappearing on the computer. When a restore point is created, it captures a snapshot of the computer's system files, settings, and installed applications. By going back to a previous restore point, the computer's state is reverted to a time before the malware was present. This effectively removes the malware and ensures that it does not reappear on the computer.

Submit
75. A customer reports that a networked printer is not printing documents. The technician successfully pings the printers IP address. Which of the following could be the problem? (Select TWO).

Explanation

The customer reporting that the printer is not printing documents suggests that there may be an issue with the physical components of the printer. The fact that the technician successfully pings the printer's IP address indicates that the network connection is functioning properly. Therefore, the problem is likely not related to the network cable being unplugged or the gateway address on the printer being incorrect. The fact that the printer is out of paper suggests that this could be a reason for it not printing. Additionally, if the spooler, which manages the print jobs, is not functioning, it could also prevent the printer from printing.

Submit
76. A user powers up their desktop PC, and instead of booting up normally, the user is taken into the BIOS setup. Which of the following is the MOST likely problem?

Explanation

A faulty CMOS battery is the most likely problem in this scenario. The CMOS battery is responsible for providing power to the BIOS chip, which stores the system's basic settings. If the CMOS battery is faulty or depleted, it may cause the BIOS to lose its settings and default to the setup screen when the computer is powered on. This can result in the computer not booting up normally and instead entering the BIOS setup.

Submit
77. Which of the following files have replaced NTLDR in the Windows Vista startup process?

Explanation

not-available-via-ai

Submit
78. A user is attempting to access a website but is getting a Page cannot be displayed error. The technician checks the IP address of the computer and sees that it has been assigned 169.254.10.70. Which of the following is the MOST likely cause?

Explanation

The IP address 169.254.10.70 is in the range of APIPA (Automatic Private IP Addressing), which is a feature used when a device cannot obtain an IP address from a DHCP server. This indicates that the device is not able to locate a DHCP server, which is the most likely cause for the "Page cannot be displayed" error.

Submit
79. Which of the following is the BEST method of connecting a home computer to the Internet in order to protect and secure the computer from malicious Internet attacks and scans?

Explanation

Putting a firewall or router with NAT between the computer and the Internet is the best method of connecting a home computer to the Internet in order to protect and secure the computer from malicious Internet attacks and scans. A firewall acts as a barrier between the computer and the Internet, monitoring and filtering incoming and outgoing network traffic. NAT (Network Address Translation) provides an additional layer of security by hiding the internal IP addresses of the devices on the network, making it more difficult for attackers to target specific devices. This combination helps to prevent unauthorized access and protect against various types of cyber threats.

Submit
80. A user reports that their system is giving a message stating that their USB 2.0 devices are running at USB 1.1 speed without an external USB hub. The devices run at USB 2.0 when tested on the technicians PC. Which of the following will MOST likely provide USB 2.0 functionality?

Explanation

Installing a USB 2.0 firmware update on the motherboard is the most likely solution to provide USB 2.0 functionality. This update will ensure that the motherboard's USB ports are capable of supporting USB 2.0 speeds. The fact that the devices run at USB 2.0 on the technician's PC suggests that the issue lies with the user's system, specifically the motherboard's firmware. Installing the update will likely resolve the problem and allow the USB 2.0 devices to run at their intended speed.

Submit
81. A customer is trying to copy a DVD with a third-party application. The program reads the source DVD fine, but when the blank is inserted, the program continuously prompts to insert blank media. Which of the following are possible causes? (Select THREE).

Explanation

Possible causes for the program continuously prompting to insert blank media could be a CD being inserted into the drive, a DVD being inserted upside down in the drive, or the wrong DVD type being inserted into the drive.

Submit
82. The system administrator has setup an administrative share on the companys file server called documents$. Which of the following are necessary to be able to access the administrative share from a computer on the companys intranet? (Select TWO).

Explanation

To access the administrative share on the company's file server, the user must know the exact network path to the folder. This means they need to know the specific location of the documents$ share on the network. Additionally, the user must have proper access rights assigned to the folder. This means they need to have the necessary permissions and privileges to access and manipulate the files and folders within the administrative share. Without both of these requirements, the user will not be able to access the administrative share.

Submit
83. Which of the following should MOST likely be replaced if the laptop will not display any video through the laptops screen or an external monitor?

Explanation

If the laptop is not displaying any video through the laptop screen or an external monitor, the most likely component that needs to be replaced is the video card. The video card is responsible for generating and outputting video signals to the display. If the video card is faulty or not functioning properly, it can result in a lack of video output. Replacing the video card should resolve the issue and allow for video to be displayed on the laptop screen or external monitor.

Submit
84. Users are reporting that a Vista feature asks them for confirmation before running most applications or making system changes. Which of the following is the name of this Vista feature and where should the technician direct users to turn the functionality off?

Explanation

The correct answer is User Account Control; it can be turned off under User Accounts in the Control Panel. User Account Control is a feature in Windows Vista that prompts users for confirmation before running most applications or making system changes. To turn off this functionality, users should go to the Control Panel, navigate to User Accounts, and disable User Account Control.

Submit
85. Which of the following private IP addresses is commonly used for internal IP addressing?

Explanation

The private IP address commonly used for internal IP addressing is 192.168.0.1. This is because the IP address range 192.168.0.0 to 192.168.255.255 is reserved for private networks and is not routable on the internet. It is frequently used by home and small office networks for local communication and device configuration.

Submit
86. A customer reports that a workstation no longer connects to the network. The technician has the customer connect another workstation with the same cable and network port, which works successfully. Which of the following actions should the technician have the customer take FIRST?

Explanation

The technician should have the customer run the loopback command first. This command tests the network adapter by sending data to itself and receiving it back. If the loopback test fails, it indicates an issue with the network adapter. By performing this test, the technician can determine if the problem lies with the workstation's network adapter or with the network itself. If the loopback test is successful, then the issue may be with the workstation's software or configuration, and further troubleshooting can be done.

Submit
87. A new computer has an odor near the power supply when turned on. Which of the following should be done?

Explanation

Running the computer for 48 hours and disregarding the odor if it goes away is a reasonable course of action. It is possible that the odor is due to the new components "burning in" and will dissipate over time. However, if the odor persists or becomes worse, it would be advisable to unplug the computer and contact the manufacturer's technical support for further assistance.

Submit
88. A technician troubleshooting an issue over the phone determines that a home user has a faulty hard drive. The only information the home user can give is that the PC is ten years old, and the drive capacity is 40GB. Which of the following drive types should the technician bring to the service call?

Explanation

Based on the given information that the PC is ten years old, it is likely that the PC is using an older technology for its hard drive. PATA (Parallel ATA) is an older interface standard that was commonly used in PCs before SATA (Serial ATA) became more prevalent. Therefore, the technician should bring a PATA drive to the service call as a replacement for the faulty hard drive.

Submit
89. A yellow exclamation mark next to a device in Device Manager indicates which of the following?

Explanation

A yellow exclamation mark next to a device in Device Manager indicates that the device driver is missing. This means that the operating system cannot find the necessary software to communicate with the device, resulting in its malfunction or inability to work properly.

Submit
90. Which of the following commands would be used to go from c:\windows to c:\windows\system32?

Explanation

The CD command is used to change the current directory in a command prompt. In this case, the user wants to go from the "c:\windows" directory to the "c:\windows\system32" directory. By using the CD command followed by the desired directory path, the user can navigate to the specified location.

Submit
91. Which of the following will occur if an NTFS-formatted USB drive is inserted into a USB port on a second computer?

Explanation

When an NTFS-formatted USB drive is inserted into a USB port on a second computer, the accessibility of the files and folders on the drive will depend on the set permissions. The second computer may have different permission settings compared to the original computer, which could result in the files and folders being accessible or inaccessible. Therefore, it is not guaranteed that the files and folders will be accessible on the second computer.

Submit
92. A user states that the computer is too slow when capturing video from an HD camera. Upon inspection the technician realizes that the computer is state-of-the-art in hardware, but it is using an external legacy USB 1.1 video capture card. The camera has USB 2.0 and IEE1394b outputs. Which of the following is the BEST recommendation to increase the video capture capabilities in this situation?

Explanation

The computer is currently using an external legacy USB 1.1 video capture card, which is causing the slow video capture from the HD camera. The camera has USB 2.0 and IEE1394b outputs, so the best recommendation would be to install an IEEE1394b video capture card. This would allow the computer to capture video at a faster speed and take advantage of the camera's capabilities.

Submit
93. Which of the following tools allows the technician to copy a file without prompts?

Explanation

The correct answer is COPY /Y. The /Y option in the COPY command allows the technician to copy a file without any prompts for confirmation. This means that the technician can copy a file without being asked for permission or confirmation each time a file is copied. This can be useful when the technician wants to automate the copying process or when they want to copy multiple files without interruptions.

Submit
94. Which of the following ports should be forwarded on the firewall to make SSH management accessible from the Internet?

Explanation

Port 22 should be forwarded on the firewall to make SSH management accessible from the Internet. SSH (Secure Shell) is a network protocol that allows secure remote access and control of devices. By forwarding port 22, incoming SSH traffic can pass through the firewall and reach the device running the SSH server, enabling remote management and administration.

Submit
95. A technician is setting up a SOHO and has configured the wireless NIC on the laptop with WPA2. While configuring the WAP, WPA2 is not listed as an option. Which of the following should the technician do NEXT?

Explanation

The technician should install the latest WAP firmware. If the WPA2 option is not listed while configuring the WAP, it indicates that the current firmware on the WAP may be outdated and does not support WPA2. By installing the latest WAP firmware, the technician can ensure that the WAP supports WPA2 and can configure it accordingly.

Submit
96. Which of the following requires an adapter when connecting to a Molex connector?

Explanation

A SATA drive requires an adapter when connecting to a Molex connector. Molex connectors are commonly used for power supply connections in older computer systems, while SATA drives use a different type of power connector. Therefore, in order to connect a SATA drive to a Molex connector, an adapter is needed to convert the power connection.

Submit
97. A technician needs a list of all the routers along a given path over multiple networks. Which of the following commands will accomplish this task?

Explanation

The correct answer is TRACERT. The TRACERT command is used to trace the route that packets take to reach a destination. It displays a list of all the routers along the path from the source to the destination. This command is commonly used for troubleshooting network connectivity issues and can provide valuable information about the network topology.

Submit
98. Which of the following commands would output the line below? 00:0C:24:09:08:07 10.0.0.1

Explanation

The command "arp -a" would output the line "00:0C:24:09:08:07 10.0.0.1". The "arp -a" command is used to display the ARP (Address Resolution Protocol) cache, which contains the IP addresses and their corresponding MAC addresses of devices on the local network. By running this command, the line mentioned in the question will be displayed, showing the MAC address "00:0C:24:09:08:07" and the corresponding IP address "10.0.0.1".

Submit
99. Which of the following tools would gather the MOST detailed statistics about disk I/O?

Explanation

Performance Monitor is the correct answer because it is a tool in Windows that provides detailed statistics and performance information about various system resources, including disk I/O. It allows users to monitor and analyze the performance of their system in real-time, providing detailed insights into disk activity, such as read and write operations, queue length, and response time. Task Manager, Computer Management, and Device Manager also provide some information about disk usage, but Performance Monitor offers the most comprehensive and detailed statistics specifically related to disk I/O.

Submit
100. Which of the following is a DHCP server capable of providing to a DHCP client? (Select THREE).

Explanation

A DHCP server is capable of providing three things to a DHCP client: WINS server, DNS server, and default gateway. A WINS server is used to resolve NetBIOS names to IP addresses, a DNS server is used to resolve domain names to IP addresses, and a default gateway is the IP address of the router that connects the client to other networks. These three components are essential for proper network connectivity and communication for the DHCP client.

Submit
View My Results

Quiz Review Timeline (Updated): Feb 28, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Feb 28, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 29, 2012
    Quiz Created by
    Tmede212
Cancel
  • All
    All (100)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following can cause a blue screen error?
A user reports that when typing on the laptop keyboard, the mouse...
After performing a preventative maintenance on a laser printer, which...
A user states that email is not being received. Which of the following...
A user is playing a new first person game on the computer and the...
A user reports that a laser printer is printing out pages with blurry...
If a technician suspects that the voltage being delivered to a desktop...
A computer just had a memory upgrade installed on the machine. Upon...
Which of the following is the default FTP port?
Which of the following is the BEST source for information about...
A technician is experiencing an issue with the computer randomly...
Which of the following is the MAXIMUM allowable cable length of CAT5?
A user is not able to receive files off the FTP server. Which of the...
An office laser printer is printing lighter in random areas. Which of...
Which of the following tools would be BEST to use to pry open the case...
Under which of the following circumstances would a technician use...
A user states that the inkjet printer is printing streaks on...
A computer just had a memory upgrade installed on the machine. Upon...
A technician is tasked with setting up a Windows XP computer with a...
A computer is responding slowly and the Task Manager shows that...
After replacing the motherboard in a laptop, the system overheats and...
A home user is setting up a wireless network. Which of the following...
A technician is replacing a hard drive with a new 30GB drive formatted...
Which of the following tools can be used prior to installing Windows...
A technician needs to modify the BIOS settings of a PC; however, the...
A user is connected to a stand alone printer. The user is receiving an...
A user can receive email but cannot send email with the email client...
After installing a replacement floppy disk drive, the LED on the drive...
After upgrading to Windows Vista, a client states that the run command...
A user has just moved to a new office and is unable to access the...
A user states that the wireless router keeps rebooting while the power...
Given the following TCP/IP information for a computer, which of the...
Which of the following will occur if an AGP 4x video card is used in...
Which of the following is the BEST tool to troubleshoot a DB-9 port?
Which of the following is contained in the first sector of the hard...
A workstation is not booting correctly. The technician wants to locate...
An internal IEEE 1394 expansion card should be installed on which port...
A technician needs to implement a RAID 1 set on a computer. Which of...
Which of the following is fault tolerant and allows for disk...
A user reports that after installing a PCIe video card into a system,...
A technician is replacing a motherboard in a laptop. After completing...
Which of the following is a method used in the removal of a boot...
An inkjet printer prints faded and smeared pages. Which of the...
Which of the following is a difference between a worm and spyware?
A user is attempting to access files shared on a remote computer. The...
A technician is upgrading memory in a desktop PC. The user purchased...
A virus has been removed from the users machine, but the user still...
USER1 is part of the Users Group and is attempting to access files via...
A second optical drive has been added to the computer and needs to be...
From a command prompt, a technician is removing some old user profiles...
Using the NET command which variable would be used to find out the...
Which of the following does PING Ct do?
Which of the following is the MOST important reason for ensuring a...
The technician is moving a users files from a Windows XP PC to a...
A user reports it takes a long time to load all applications and the...
Which of the following commands will be run at a command prompt to...
A technician plugs a USB device into the front panel of a desktop...
On a laptop, which of the following is the name of the socket that a...
A user states that a small office home office (SOHO) router constantly...
A technician is replacing a motherboard in a users desktop PC. Which...
Users in the office report that the speed of the Internet has...
How can a technician confirm that a new virus definition file is...
A technician has just installed a new hard drive into a Windows Vista...
A technician has deleted all the files in the directory...
A user wants to simplify the opening of Control Panel options in...
Which of the following are items that can be configured on a wireless...
The Device Manager lists a disk as foreign. Which of the following...
A user reports that after working for a while with their PC, the...
After the network printer has been rebooted none of the users are able...
A technician adds a video card to a single monitor system with an...
A technician is troubleshooting problems with a hard drive. After...
Which of the following devices has the options of: master, slave and...
Which of the following BEST explains a system experiencing...
Malware is removed and a computer is rebooted. Later, the malware is...
A customer reports that a networked printer is not printing documents....
A user powers up their desktop PC, and instead of booting up normally,...
Which of the following files have replaced NTLDR in the Windows Vista...
A user is attempting to access a website but is getting a Page cannot...
Which of the following is the BEST method of connecting a home...
A user reports that their system is giving a message stating that...
A customer is trying to copy a DVD with a third-party application. The...
The system administrator has setup an administrative share on the...
Which of the following should MOST likely be replaced if the laptop...
Users are reporting that a Vista feature asks them for confirmation...
Which of the following private IP addresses is commonly used for...
A customer reports that a workstation no longer connects to the...
A new computer has an odor near the power supply when turned on. Which...
A technician troubleshooting an issue over the phone determines that a...
A yellow exclamation mark next to a device in Device Manager indicates...
Which of the following commands would be used to go from...
Which of the following will occur if an NTFS-formatted USB drive is...
A user states that the computer is too slow when capturing video from...
Which of the following tools allows the technician to copy a file...
Which of the following ports should be forwarded on the firewall to...
A technician is setting up a SOHO and has configured the wireless NIC...
Which of the following requires an adapter when connecting to a Molex...
A technician needs a list of all the routers along a given path over...
Which of the following commands would output the line below?...
Which of the following tools would gather the MOST detailed statistics...
Which of the following is a DHCP server capable of providing to a DHCP...
Alert!

Advertisement