CompTIA A+ 220-702 Practical Application Topic 3 Vol.C

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Tmede212
T
Tmede212
Community Contributor
Quizzes Created: 7 | Total Attempts: 1,069
| Attempts: 147
SettingsSettings
Please wait...
  • 1/100 Questions

    A user reports that each time the computer is rebooted, the time on the taskbar resets. Which of the following is the MOST likely cause of the problem?

    • The BIOS is not properly configured.
    • The CMOS battery is faulty.
    • The computer has lost connection to the time server.
    • The clock needs to be reset for the appropriate time zone.
Please wait...
About This Quiz

This quiz assesses knowledge crucial for the CompTIA A+ 220-702 Practical Application certification, focusing on networking, hardware troubleshooting, and system management. It tests skills in configuring and managing small office networks, diagnosing power issues, and understanding system logs and hardware configurations.

CompTIA A+ 220-702 Practical Application Topic 3 Vol.C - Quiz

Quiz Preview

  • 2. 

    A user states that there are two lines running down the middle of all printed pages on the laser printer. Which of the following could be the cause of the lines?

    • The drum is dirty

    • The driver is corrupt

    • The printer is out of memory

    • The toner is out

    Correct Answer
    A. The drum is dirty
    Explanation
    The drum is a crucial component in a laser printer that transfers toner onto the paper. If the drum is dirty, it can cause lines to appear on printed pages. This is because the dirt or debris on the drum can interfere with the transfer of toner, resulting in uneven or incomplete printing. Cleaning the drum can help resolve this issue and eliminate the lines on the printed pages.

    Rate this question:

  • 3. 

    A technician replaced a processor, but when the computer is powered on, the POST issues a series of beeps. Which of the following is the MOST likely cause?

    • The hard drive is not plugged in.

    • The CPU is not properly seated.

    • The mouse is not plugged in.

    • The operating system is corrupt.

    Correct Answer
    A. The CPU is not properly seated.
    Explanation
    The most likely cause for the series of beeps during POST after replacing the processor is that the CPU is not properly seated. When the CPU is not correctly installed or seated in its socket, it can cause a variety of issues, including beeping sounds during the POST process. It is crucial to ensure that the CPU is securely and correctly placed in its socket to avoid any connectivity problems and ensure proper functioning of the computer.

    Rate this question:

  • 4. 

    Which of the following will occur if a laptop SATA 1 drive is installed on a SATA 2 controller?

    • The drive will run at the lower SATA 1 speed.

    • The drive will not work due to incompatibility.

    • The drive will run at the higher SATA 2 speed.

    • The drive will have intermittent POST errors.

    Correct Answer
    A. The drive will run at the lower SATA 1 speed.
    Explanation
    When a laptop SATA 1 drive is installed on a SATA 2 controller, the drive will run at the lower SATA 1 speed. This is because the SATA 2 controller is backward compatible with SATA 1 drives, but it will only operate at the speed of the slower device, in this case, SATA 1. Therefore, the drive will not be able to take advantage of the higher speed capabilities of the SATA 2 controller and will operate at the lower speed.

    Rate this question:

  • 5. 

    Which of the following is the built-in security feature of Windows Vista?

    • HCL

    • NTP

    • UAC

    • ECP

    Correct Answer
    A. UAC
    Explanation
    UAC stands for User Account Control, which is a built-in security feature of Windows Vista. It helps to prevent unauthorized changes to the system by prompting the user for permission or administrator credentials when a program attempts to make changes that require administrative access. This feature enhances the overall security of the operating system and protects it from potential threats.

    Rate this question:

  • 6. 

    Which of the following components is MOST often removed in order to access laptop motherboards and internal components?

    • PCMCIA card

    • Keyboard

    • Display

    • Power button

    Correct Answer
    A. Keyboard
    Explanation
    The keyboard is most often removed in order to access laptop motherboards and internal components. This is because the keyboard is typically connected to the motherboard via a ribbon cable, making it necessary to remove the keyboard in order to gain access to the motherboard and other internal components. Removing the keyboard allows technicians to perform repairs or upgrades on the motherboard or other internal components as needed.

    Rate this question:

  • 7. 

    A technician needs to boot a PC from a CD to run diagnostics, but the PC always boots from the hard drive. Which of the following will allow the PC to boot from the CD?

    • Change the drive order sequence in the BIOS.

    • Unplug the power cable from the hard drive.

    • Reformat the hard drive.

    • Unplug the data cable from the hard drive.

    Correct Answer
    A. Change the drive order sequence in the BIOS.
    Explanation
    Changing the drive order sequence in the BIOS will allow the PC to boot from the CD. The BIOS (Basic Input/Output System) is responsible for initializing the hardware components of the computer, including the boot order. By accessing the BIOS settings, the technician can rearrange the boot order so that the CD drive is prioritized over the hard drive. This change will ensure that the PC boots from the CD when it is inserted, allowing the technician to run diagnostics.

    Rate this question:

  • 8. 

    A disc is stuck in a DVD-ROM drive. Which of the following describes the BEST way to proceed in recovery of the media?

    • Dispose of the drive completely and replace media.

    • Format the media using CDFS.

    • Use a screwdriver to disassemble the drive.

    • Use a paper clip to eject the tray.

    Correct Answer
    A. Use a paper clip to eject the tray.
    Explanation
    Using a paper clip to eject the tray is the best way to proceed in recovering the stuck disc in a DVD-ROM drive. This method is a common solution for this issue and is often recommended by manufacturers. By inserting a straightened paper clip into the small hole on the front of the drive, the tray will be manually released, allowing the disc to be safely removed. This approach is simple, effective, and does not require any disassembly or potential damage to the drive.

    Rate this question:

  • 9. 

    An executives laptop screen has been damaged and will not power on. Which of the following is the FASTEST way to get the executive back online?

    • Pull the hard drive and install it in a spare laptop of the same make and model.

    • Replace the motherboard on the laptop.

    • Build the executive a temporary laptop and attempt to repair the damaged one.

    • Replace the backlight on the laptop.

    Correct Answer
    A. Pull the hard drive and install it in a spare laptop of the same make and model.
    Explanation
    The fastest way to get the executive back online is to pull the hard drive from the damaged laptop and install it in a spare laptop of the same make and model. This allows the executive to continue working without the need for repairs or replacements, as the spare laptop will already have the necessary hardware and software configurations.

    Rate this question:

  • 10. 

    Which of the following is a sign that a computer has been infected by a worm?

    • Screensaver changed on its own

    • Unauthorized outgoing emails being sent

    • Desktop background changed on its own

    • Left and right mouse buttons have been flipped

    Correct Answer
    A. Unauthorized outgoing emails being sent
    Explanation
    Unauthorized outgoing emails being sent is a sign that a computer has been infected by a worm. Worms are malicious software that can replicate themselves and spread across networks. One common behavior of worms is to use the infected computer to send out spam emails without the user's knowledge or consent. This can result in a high volume of emails being sent from the infected computer, often to random or unauthorized recipients. Therefore, the presence of unauthorized outgoing emails is a clear indication of a worm infection.

    Rate this question:

  • 11. 

    A floppy drive is replaced in a computer and now when the computer is turned on the floppy drive light is constantly lit. Which of the following is the MOST likely cause?

    • The power supply has failed.

    • The drive cable is connected backwards.

    • The floppy drive has failed.

    • The proper drivers have not been loaded.

    Correct Answer
    A. The drive cable is connected backwards.
    Explanation
    The most likely cause for the floppy drive light to be constantly lit after replacing the floppy drive is that the drive cable is connected backwards. When the cable is connected incorrectly, it can cause the drive to receive constant power, resulting in the light being constantly lit. This is a common mistake when replacing hardware components, and can easily be fixed by reconnecting the cable correctly.

    Rate this question:

  • 12. 

    A user wants to upgrade the memory in the laptop but only can find one memory slot on the bottom of the laptop. Which of the following is the MOST likely location of the second memory slot?

    • Behind the removable DVD drive

    • Under the keyboard

    • Behind the removable hard drive

    • Under the battery

    Correct Answer
    A. Under the keyboard
    Explanation
    The most likely location of the second memory slot is under the keyboard. This is because laptops often have additional memory slots located under the keyboard for easy access and upgrade. The memory slot under the keyboard allows for convenient installation and removal of memory modules without the need to disassemble the entire laptop.

    Rate this question:

  • 13. 

    Which of the following will happen if 333MHz memory is inserted into a motherboard that supports 400MHz memory?

    • The motherboard will be damaged and not work.

    • The motherboard will use the lower 333MHz speed.

    • The CPU will be damaged.

    • The motherboard will use the faster 400MHz speed.

    Correct Answer
    A. The motherboard will use the lower 333MHz speed.
    Explanation
    When a 333MHz memory is inserted into a motherboard that supports 400MHz memory, the motherboard will automatically adjust to the lower speed of 333MHz. This is because the motherboard is designed to be compatible with various memory speeds, and it will always operate at the speed of the slowest component. Therefore, in this case, the motherboard will use the lower 333MHz speed of the inserted memory.

    Rate this question:

  • 14. 

    Which of the following should be used to connect a small office of ten computers together and provide the computers access through a common Internet connection?

    • Wireless access point

    • Router and Ethernet switch

    • Gigabit Ethernet switch and an intrusion prevention device

    • Firewall with an integrated 4 port switch

    Correct Answer
    A. Router and Ethernet switch
    Explanation
    A router and Ethernet switch should be used to connect a small office of ten computers together and provide them access through a common Internet connection. A router is responsible for connecting the office network to the Internet and managing the traffic between the computers and the Internet. An Ethernet switch allows the computers to communicate with each other within the local network. Together, the router and Ethernet switch provide both internal network connectivity and external Internet connectivity for the office computers.

    Rate this question:

  • 15. 

    After removing malware from a users computer, the Internet browser does not access any websites. Which of the following is the BEST method to fix this?

    • Remove Proxy Settings from the Internet browser

    • Run Operating System Updates

    • Reset the Internet router

    • Reboot the computer

    Correct Answer
    A. Remove Proxy Settings from the Internet browser
    Explanation
    Removing proxy settings from the Internet browser is the best method to fix the issue of not being able to access any websites after removing malware from a user's computer. Malware often modifies proxy settings to redirect internet traffic, so removing these settings will allow the browser to connect directly to websites again. Running operating system updates, resetting the internet router, or rebooting the computer may not specifically address the issue with the browser's proxy settings.

    Rate this question:

  • 16. 

    A user reports that a newly issued smartcard does not work in their laptop, but the technicians smartcard works without any issues. Which of the following would MOST likely resolve the issue?

    • Upgrade the smartcard readers firmware.

    • Reinstall the operating system.

    • Perform a flash BIOS upgrade.

    • Replace the smartcard reader.

    Correct Answer
    A. Upgrade the smartcard readers firmware.
  • 17. 

    A user is reporting that a PC will suddenly shut down without warning. The PC boots up with no problems, but after using the PC for a short time, the PC turns off. Which of the following components should the technician check? (Select TWO).

    • CPU fan

    • RAM

    • Hard drive

    • Power supply

    • Video card

    Correct Answer(s)
    A. CPU fan
    A. Power supply
    Explanation
    The technician should check the CPU fan because if it is not functioning properly, the PC may overheat and shut down as a safety measure. The technician should also check the power supply because if it is faulty or not supplying enough power, it can cause the PC to shut down unexpectedly.

    Rate this question:

  • 18. 

    Which of the following is the BEST way to ensure that only specified devices can connect to a wireless network?

    • Use MAC filtering

    • Set up a VLAN

    • Disable SSID broadcasting

    • Enable WEP encryption

    Correct Answer
    A. Use MAC filtering
    Explanation
    MAC filtering is the best way to ensure that only specified devices can connect to a wireless network. MAC filtering allows the network administrator to create a whitelist of approved MAC addresses, and only devices with those addresses will be able to connect to the network. This provides an additional layer of security and prevents unauthorized devices from accessing the network, even if they have the correct SSID and encryption settings. VLANs, disabling SSID broadcasting, and enabling WEP encryption can also enhance network security, but MAC filtering specifically targets and controls device access.

    Rate this question:

  • 19. 

    A user has just moved a PC from one office to another. The patch cable and the NIC do not appear to be functioning in the new office but were working before the move. The patch cable is plugged in correctly to both the NIC and the wall jack. Which of the following actions should the technician take FIRST?

    • Verify that the network card is compatible with the operating system.

    • Verify that the port on the switch is enabled.

    • Update the network card driver.

    • Replace the network cable with a crossover cable.

    Correct Answer
    A. Verify that the port on the switch is enabled.
    Explanation
    The technician should first verify that the port on the switch is enabled. This is because the patch cable and NIC were working before the move, so it is likely that the issue lies with the port on the switch. By checking if the port is enabled, the technician can ensure that the connection between the PC and the network is properly established. This step should be taken before considering other actions such as checking compatibility, updating drivers, or replacing the network cable.

    Rate this question:

  • 20. 

    A technician suspects that a power supply may be failing in a computer. Which of the following are the standard voltages for a SATA connection on an ATX power supply?

    • -3.3v, 5v, 12v

    • 3.3v, -5v, -12v

    • 3.3v, 5v, 12v

    • -5v, 5v, 12v

    Correct Answer
    A. 3.3v, 5v, 12v
    Explanation
    The standard voltages for a SATA connection on an ATX power supply are 3.3v, 5v, and 12v. These voltages are commonly used to power various components in a computer system, including SATA drives. The -5v and -12v options are not standard voltages for a SATA connection and therefore are not the correct answer.

    Rate this question:

  • 21. 

    Which of the following is the BEST way to ensure that only specified computers can access a wireless network?

    • Enable MAC filtering

    • Change the default password

    • Disable SSID broadcast

    • Change SSID from default

    Correct Answer
    A. Enable MAC filtering
    Explanation
    Enabling MAC filtering is the best way to ensure that only specified computers can access a wireless network. MAC filtering allows the network administrator to create a list of approved MAC addresses, which are unique identifiers for network devices. Only devices with MAC addresses on the approved list will be able to connect to the network, providing an additional layer of security. This method is more effective than simply changing the default password or SSID, as it specifically controls which devices can connect to the network. Disabling SSID broadcast and changing the SSID from default are also security measures, but they are not as effective as MAC filtering in restricting access to specified computers.

    Rate this question:

  • 22. 

    For the third time in two weeks a technician must re-image a machine for the same end user. After discussing in depth the actions preceding the problems the technician has determined the root cause to be opening unknown attachments. Which of the following is the MOST likely reason for the issues?

    • Virus

    • Social engineering

    • Corruption

    • Spam

    Correct Answer
    A. Virus
    Explanation
    The most likely reason for the issues is a virus. Opening unknown attachments can often lead to the installation of malicious software on a machine, causing various problems and requiring re-imaging. Social engineering involves manipulating individuals to gain unauthorized access, but it is not directly related to opening unknown attachments. Corruption refers to data or file corruption, which may cause issues but is less likely to require re-imaging. Spam refers to unsolicited or unwanted emails, which may contain viruses but is not the root cause of the issues in this scenario.

    Rate this question:

  • 23. 

    After installing a second hard drive, the computer no longer loads the operating system on the previous hard drive at boot. Which of the following will restore the computer s previous working state?

    • Configure the jumpers on the hard drives

    • Use a boot disk and execute the SYS command

    • Downgrade the BIOS to a previous version

    • Format the new hard drive with NTFS

    Correct Answer
    A. Configure the jumpers on the hard drives
    Explanation
    Configuring the jumpers on the hard drives will restore the computer's previous working state. The jumpers on a hard drive determine its role as either a master or a slave. If the second hard drive is set as the master, it may be preventing the previous hard drive from being recognized and loading the operating system. By correctly configuring the jumpers, the computer will be able to recognize and boot from the previous hard drive, restoring the computer's previous working state.

    Rate this question:

  • 24. 

    Which of the following groups is BEST to assign to a home user to prevent software installation?

    • Users

    • Administrators

    • Power Users

    • Remote Desktop Users

    Correct Answer
    A. Users
    Explanation
    Assigning the "Users" group to a home user would be the best choice to prevent software installation. The "Users" group typically has limited permissions and restrictions, which would prevent them from installing software on their computer. This group is designed for standard users who do not require administrative privileges and is therefore the most suitable option for preventing unauthorized software installations.

    Rate this question:

  • 25. 

    A user wishes to encrypt a hard drive for storing critical data. The user wants to drag and drop folders onto the partition and have them be encrypted in real time. Which of the following encryption schemes should be recommended?

    • PKI

    • TPM

    • BitLocker

    • Kerberos

    Correct Answer
    A. BitLocker
    Explanation
    BitLocker is the recommended encryption scheme for encrypting a hard drive and providing real-time encryption for folders. BitLocker is a full-disk encryption feature available in Windows operating systems. It allows the user to encrypt the entire hard drive or specific folders, providing protection for critical data. By using BitLocker, the user can drag and drop folders onto the partition, and they will be encrypted in real time, ensuring the security of the data stored on the hard drive.

    Rate this question:

  • 26. 

    A technician performs a laptop memory upgrade and now the laptop will not boot. The laptop is emitting a series of continuous beeps prior to startup. Which of the following is the MOST likely problem?

    • Hard drive needs to be reseated

    • Memory contacts are dirty

    • The CMOS battery is dead

    • The BIOS is faulty

    Correct Answer
    A. Memory contacts are dirty
    Explanation
    The most likely problem in this scenario is that the memory contacts are dirty. When a technician performs a laptop memory upgrade, it involves removing and reseating the memory modules. If the contacts on the memory modules or in the memory slots become dirty or corroded, it can prevent proper communication between the memory and the laptop, resulting in the laptop not booting up. This can cause the laptop to emit a series of continuous beeps as a warning sign.

    Rate this question:

  • 27. 

    A technician confirms a memory read error in Windows XP. Which of the following should the technician do to resolve the problem?

    • Replace the hard drive.

    • Change the memory settings in the BIOS.

    • Reseat or replace RAM modules.

    • Swap the video card with another video card.

    Correct Answer
    A. Reseat or replace RAM modules.
    Explanation
    To resolve a memory read error in Windows XP, the technician should reseat or replace the RAM modules. This is because memory read errors are often caused by faulty or loose RAM modules. By reseating the modules, the technician ensures they are properly connected to the motherboard, which can resolve any connection issues. If reseating does not fix the problem, replacing the RAM modules altogether may be necessary to resolve the error. Swapping the video card or changing memory settings in the BIOS would not directly address a memory read error.

    Rate this question:

  • 28. 

    Which of the following should a field technician do before attempting to open a laptop for repair or upgrades?

    • Take photographs of all the screws so they can be easily repositioned.

    • Obtain a copy of the manufactures disassembly guide.

    • Clean it with a lint free cloth to prevent any static discharges.

    • Download a copy of the specs from the manufactures website.

    Correct Answer
    A. Obtain a copy of the manufactures disassembly guide.
    Explanation
    Before attempting to open a laptop for repair or upgrades, a field technician should obtain a copy of the manufacturer's disassembly guide. This guide provides detailed instructions and diagrams on how to safely disassemble the laptop without causing any damage. It ensures that the technician follows the correct steps and avoids any potential mistakes or accidents. By having the disassembly guide, the technician can confidently open the laptop, perform the necessary repairs or upgrades, and reassemble it correctly.

    Rate this question:

  • 29. 

    An alternative to plain old telephone service (POTS) would be:

    • X.25.

    • Asynchronous transfer mode (ATM).

    • VoIP.

    • Public Switched Telephone Network (PSTN).

    Correct Answer
    A. VoIP.
    Explanation
    VoIP stands for Voice over Internet Protocol, which is a technology that allows for the transmission of voice and multimedia over the internet. It is an alternative to traditional telephone services like POTS. VoIP offers advantages such as cost savings, flexibility, and the ability to integrate with other communication services. It uses packet-switched networks instead of dedicated circuit-switched networks, enabling voice data to be transmitted in the form of packets over IP networks. This makes it a more efficient and cost-effective solution for voice communication compared to POTS.

    Rate this question:

  • 30. 

    A user states that the LCD display on their laptop has intermittent lines on the screen. The technician notices that when the display panel is moved, the line appears and then disappears. Which of the following is the MOST likely cause?

    • The hinge on the display panel is damaged.

    • The display cable is loose or damaged.

    • The display panel is defective.

    • The video controller on the system board is defective.

    Correct Answer
    A. The display cable is loose or damaged.
    Explanation
    When the user moves the display panel and the line on the screen appears and disappears, it suggests that there is a problem with the connection between the display panel and the system board. This is most likely caused by a loose or damaged display cable. The movement of the display panel causes the cable to lose or regain proper connection, resulting in the intermittent lines on the screen.

    Rate this question:

  • 31. 

    The technician suspects a computer has been compromised by malware. Which of the following statements BEST describes the steps a technician should take to eliminate the malware?

    • Reboot in Safe Mode with Networking enabled, update and then run an anti-malware scanner.

    • Update the anti-malware signatures, and then run an anti-malware scanner.

    • Update the anti-malware signatures, reboot the system, and then run the anti-malware scanner.

    • Reboot the system, log on as administrator, and run the anti-malware scanner.

    Correct Answer
    A. Reboot in Safe Mode with Networking enabled, update and then run an anti-malware scanner.
    Explanation
    The best steps a technician should take to eliminate malware is to reboot the computer in Safe Mode with Networking enabled. This allows the computer to start up with only essential services and drivers, making it easier to detect and remove malware. After rebooting, the technician should update the anti-malware scanner to ensure it has the latest virus definitions, and then run a scan to identify and remove any malware present on the system. This approach helps to minimize the chances of the malware interfering with the scanning process and increases the likelihood of successful removal.

    Rate this question:

  • 32. 

    A customer reports that their sound is not working. They state that the speakers worked previously. Which of the following should the technician check? (Select THREE).

    • Speakers are in regulatory compliance.

    • Speakers are on and the mute is off.

    • Ensure the speakers are on the Windows HCL.

    • Verify the system has enough hard drive space.

    • The audio driver is installed correctly.

    • Speakers are plugged into the correct jack.

    Correct Answer(s)
    A. Speakers are on and the mute is off.
    A. The audio driver is installed correctly.
    A. Speakers are plugged into the correct jack.
    Explanation
    The technician should check if the speakers are on and the mute is off because the customer reports that the sound is not working. If the speakers are off or muted, that could be the reason for the issue. The technician should also check if the audio driver is installed correctly because if it is not, the sound may not work. Additionally, the technician should check if the speakers are plugged into the correct jack because if they are not properly connected, the sound may not be transmitted.

    Rate this question:

  • 33. 

    Which of the following protocols would a technician use to run commands on a remote computer?

    • NETBIOS

    • FTP

    • SMTP

    • TELNET

    Correct Answer
    A. TELNET
    Explanation
    TELNET is the correct answer because it is a protocol that allows a technician to remotely access and control a computer over a network. It provides a command-line interface for running commands on the remote computer, making it a suitable choice for remotely managing and troubleshooting systems. NETBIOS is a networking protocol used for name resolution, FTP is used for file transfer, and SMTP is used for email communication, none of which directly allow for running commands on a remote computer.

    Rate this question:

  • 34. 

    A customer wants to listen to music on their computer. When headphones are plugged into the computer, the music can be heard. When headphones are unplugged, music cannot be heard. Which of the following can cause this problem?

    • The sound from a website will only play through a headphone jack.

    • The sound card is configured to operate only through the headphone jack.

    • The computer s volume control is set to mute.

    • The computer does not have a built-in speaker.

    Correct Answer
    A. The computer does not have a built-in speaker.
    Explanation
    The reason for this problem is that the computer does not have a built-in speaker. When headphones are plugged in, the sound is directed through the headphones, allowing the music to be heard. However, when the headphones are unplugged, there is no built-in speaker to produce the sound, resulting in the inability to hear the music.

    Rate this question:

  • 35. 

    A technician is troubleshooting a users problem; important Windows services are not starting. In which of the following locations should the technician check to investigate when these services started or stopped?

    • Com+.log

    • System Log

    • Security Log

    • Application Log

    Correct Answer
    A. System Log
    Explanation
    The technician should check the System Log to investigate when the important Windows services started or stopped. The System Log contains records of events related to the operating system, including service start and stop events. By reviewing the System Log, the technician can identify any errors or issues that may have caused the services to fail to start.

    Rate this question:

  • 36. 

    Which of the following would resolve a problem in which external speakers connected to a sound card are not playing audio?

    • Enable the integrated COM port in the BIOS.

    • Move the cable to the headphone jack on the CD-ROM drive and adjust the volume.

    • Move the cable to another jack on the sound card.

    • Change the LPT port from ECP mode to bi-direction in the BIOS.

    Correct Answer
    A. Move the cable to another jack on the sound card.
    Explanation
    Moving the cable to another jack on the sound card would resolve the problem of external speakers not playing audio. This suggests that there may be an issue with the current jack being used, such as a loose connection or a malfunction. By moving the cable to another jack, it allows for a different connection point that may be in proper working condition, enabling the audio to play through the external speakers.

    Rate this question:

  • 37. 

    Which of the following should a technician do before sending a users laptop to a manufacturers repair center?

    • Remove the hard drive

    • Remove the LCD

    • Remove the Wi-Fi card

    • Clean it thoroughly

    Correct Answer
    A. Remove the hard drive
    Explanation
    Before sending a user's laptop to a manufacturer's repair center, a technician should remove the hard drive. This is because the hard drive contains sensitive and personal data of the user, and removing it ensures the privacy and security of their information. Additionally, removing the hard drive prevents any potential data breaches or unauthorized access to the user's files and documents during the repair process.

    Rate this question:

  • 38. 

    A technician is able to ping a server by the IP address; however, the server will not respond when the PING command uses its FQDN. Which of the following is the MOST likely reason for the server not responding?

    • The network cabling is damaged.

    • The computer is not getting proper DNS results.

    • The network card in the computer is damaged.

    • The LMHOST file is corrupt.

    Correct Answer
    A. The computer is not getting proper DNS results.
    Explanation
    The most likely reason for the server not responding when the PING command uses its FQDN is that the computer is not getting proper DNS results. The FQDN (Fully Qualified Domain Name) is used to translate the human-readable domain name into an IP address. If the computer is not able to resolve the FQDN to the correct IP address, it will not be able to establish a connection with the server. This could be due to DNS misconfiguration, DNS server issues, or network connectivity problems between the computer and the DNS server.

    Rate this question:

  • 39. 

    Which of the following commands displays all local network shares?

    • NET statistics

    • NET share

    • NET view

    • NET user

    Correct Answer
    A. NET view
    Explanation
    The correct answer is "NET view." This command displays all local network shares.

    Rate this question:

  • 40. 

    A technician receives a ticket about VPN issues on a Windows XP PC. The ticket explained that the Internet was working until the VPN connection was established; now it will not allow the user to remote desktop or browse the Internet. Which of the following would cause these network issues?

    • Windows XP firewall is corrupt and not working correctly.

    • Windows XP firewall is turned on and not configured correctly.

    • The user is not using the correct Ethernet cable.

    • Windows XP does not support VPN features.

    Correct Answer
    A. Windows XP firewall is turned on and not configured correctly.
    Explanation
    The correct answer is that the Windows XP firewall is turned on and not configured correctly. This can cause network issues because the firewall may be blocking the necessary ports and protocols for remote desktop and internet browsing. The user will need to configure the firewall settings to allow these connections in order to resolve the problem.

    Rate this question:

  • 41. 

    A user installed a Blu-Ray drive in their PC. The user reports that the new drive and their existing DVD-RW drive are not operating. Which of the following needs to be replaced?

    • Power supply

    • DVD-RW

    • Blu-Ray drive

    • Motherboard

    Correct Answer
    A. Power supply
    Explanation
    The user installed a Blu-Ray drive in their PC and now both the new drive and their existing DVD-RW drive are not operating. This suggests that the issue is not with the individual drives themselves, but rather with a common component that is affecting both drives. The power supply is responsible for providing power to all the components in the PC, including the drives. If the power supply is faulty or not providing enough power, it can cause both drives to not operate properly. Therefore, the power supply needs to be replaced in order to resolve the issue.

    Rate this question:

  • 42. 

    How many physical hard drives can fail in a RAID 5 array consisting of 8 physical hard drives without losing the entire RAID 5 array?

    • 0

    • 1

    • 5

    • 8

    Correct Answer
    A. 1
    Explanation
    In a RAID 5 array, data is distributed across multiple hard drives along with parity information. This allows for fault tolerance, as the array can withstand the failure of one physical hard drive without losing any data. Since the question asks how many physical hard drives can fail without losing the entire RAID 5 array, the correct answer is 1.

    Rate this question:

  • 43. 

    A technician installs newly compatible memory into a computer, and the computer does not recognize the memory. Which of the following would the technician need to perform?

    • Replace the memory chips.

    • Replace the hard drive.

    • Upgrade the power supply.

    • Flash the BIOS.

    Correct Answer
    A. Flash the BIOS.
    Explanation
    When a technician installs newly compatible memory into a computer and the computer does not recognize it, the issue is likely due to the BIOS not being updated to support the new memory modules. Flashing the BIOS refers to updating the BIOS firmware to the latest version, which can resolve compatibility issues and allow the computer to recognize the new memory. Therefore, the technician would need to perform a BIOS flash to resolve the problem.

    Rate this question:

  • 44. 

    Which of the following will allow a technician to extend a partition?

    • Set the drive up as basic

    • Format the drive to FAT32

    • Install a second hard drive

    • Set the drive as dynamic

    Correct Answer
    A. Set the drive as dynamic
    Explanation
    Setting the drive as dynamic will allow a technician to extend a partition. Dynamic disks are a type of disk storage in Windows that allows for more advanced features, such as the ability to create and extend partitions without the need to reformat the entire disk. By setting the drive as dynamic, the technician can easily extend a partition to allocate more space without losing any data.

    Rate this question:

  • 45. 

    Which of the following does an out-of-memory error indicate on a printer?

    • A faulty memory module in the printer.

    • A postscript print job has been sent to the printer.

    • A large print job has been sent to the printer.

    • The printer firmware needs to be updated.

    Correct Answer
    A. A large print job has been sent to the printer.
    Explanation
    An out-of-memory error on a printer indicates that a large print job has been sent to the printer. This means that the printer does not have enough memory to handle the size of the print job, causing the error to occur.

    Rate this question:

  • 46. 

    A technician is moving data from one laptop to another that has EFS installed. Which of the following would the technician need to perform FIRST?

    • Disable networking

    • Convert file format to FAT32

    • Export the users certificate

    • Give the user administrator privileges

    Correct Answer
    A. Export the users certificate
    Explanation
    To move data from one laptop to another with EFS (Encrypting File System) installed, the technician would need to export the user's certificate first. The EFS uses certificates to encrypt and decrypt files, and by exporting the user's certificate, the technician ensures that the files can be accessed and decrypted on the new laptop. This step is necessary before transferring the encrypted data to the new device.

    Rate this question:

  • 47. 

    A technician is unfamiliar with terms in a dialog box. Which of the following would quickly provide more information?

    • Alternate click and select Whats This?

    • Use Microsoft knowledge base to search for the term

    • Alternate click and select more information

    • Press F1 and search for the term

    Correct Answer
    A. Alternate click and select Whats This?
    Explanation
    To quickly obtain more information about unfamiliar terms in a dialog box, the best option is to alternate click and select "What's This?". This action typically triggers a tooltip or a small pop-up window that provides a brief explanation or description of the selected term. This allows the technician to quickly understand the meaning or purpose of the unfamiliar term without having to navigate away from the dialog box.

    Rate this question:

  • 48. 

    A user reports that their new optical drive is not working. It opens and closes, but nothing pops up on their screen when the user puts a disk in. The technician checked Device Manager and could not locate the drive. Which of the following is the MOST likely reason for this?

    • The drives SATA cable is not connected

    • The disk is blank or scratched

    • The user does not have administrator privileges

    • The PSU is not providing enough power

    Correct Answer
    A. The drives SATA cable is not connected
    Explanation
    The most likely reason for the optical drive not working is that the SATA cable is not connected. This can cause the drive to not be recognized by the computer, resulting in no response when a disk is inserted.

    Rate this question:

  • 49. 

    Which of the following may cause the cursor of an optical mouse to erratically jump around the screen? (Select TWO).

    • A conflict with the keyboard

    • An IRQ conflict is present

    • A non-reflective or uneven surface

    • An incorrect mouse device driver

    • The mouse trackball needs to be cleaned

    Correct Answer(s)
    A. A non-reflective or uneven surface
    A. An incorrect mouse device driver
    Explanation
    A non-reflective or uneven surface can cause the cursor of an optical mouse to erratically jump around the screen because the mouse's sensor relies on detecting reflections from the surface it is on. If the surface is non-reflective or uneven, the sensor may not be able to accurately track the movement of the mouse.

    An incorrect mouse device driver can also cause the cursor to jump around the screen because the driver is responsible for translating the mouse's movements into actions on the screen. If the driver is outdated or incompatible, it may not be able to properly interpret the mouse's input, resulting in erratic cursor movement.

    Rate this question:

Quiz Review Timeline (Updated): Aug 14, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 14, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 02, 2012
    Quiz Created by
    Tmede212
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.