CompTIA A+ 220-702 Practical Application Topic 3 Vol.C

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Tmede212
T
Tmede212
Community Contributor
Quizzes Created: 7 | Total Attempts: 1,076
| Attempts: 147 | Questions: 100
Please wait...
Question 1 / 100
0 %
0/100
Score 0/100
1. A user reports that each time the computer is rebooted, the time on the taskbar resets. Which of the following is the MOST likely cause of the problem?

Explanation

The CMOS battery is responsible for maintaining the computer's internal clock and other system settings when the computer is powered off. If the CMOS battery is faulty, it may not be able to retain the correct time and settings, causing the time on the taskbar to reset each time the computer is rebooted. This is the most likely cause of the problem described by the user.

Submit
Please wait...
About This Quiz
CompTIA A+ 220-702 Practical Application Topic 3 Vol.C - Quiz

This quiz assesses knowledge crucial for the CompTIA A+ 220-702 Practical Application certification, focusing on networking, hardware troubleshooting, and system management. It tests skills in configuring and managing... see moresmall office networks, diagnosing power issues, and understanding system logs and hardware configurations. see less

2. A user states that there are two lines running down the middle of all printed pages on the laser printer. Which of the following could be the cause of the lines?

Explanation

The drum is a crucial component in a laser printer that transfers toner onto the paper. If the drum is dirty, it can cause lines to appear on printed pages. This is because the dirt or debris on the drum can interfere with the transfer of toner, resulting in uneven or incomplete printing. Cleaning the drum can help resolve this issue and eliminate the lines on the printed pages.

Submit
3. A technician replaced a processor, but when the computer is powered on, the POST issues a series of beeps. Which of the following is the MOST likely cause?

Explanation

The most likely cause for the series of beeps during POST after replacing the processor is that the CPU is not properly seated. When the CPU is not correctly installed or seated in its socket, it can cause a variety of issues, including beeping sounds during the POST process. It is crucial to ensure that the CPU is securely and correctly placed in its socket to avoid any connectivity problems and ensure proper functioning of the computer.

Submit
4. Which of the following will occur if a laptop SATA 1 drive is installed on a SATA 2 controller?

Explanation

When a laptop SATA 1 drive is installed on a SATA 2 controller, the drive will run at the lower SATA 1 speed. This is because the SATA 2 controller is backward compatible with SATA 1 drives, but it will only operate at the speed of the slower device, in this case, SATA 1. Therefore, the drive will not be able to take advantage of the higher speed capabilities of the SATA 2 controller and will operate at the lower speed.

Submit
5. Which of the following is the built-in security feature of Windows Vista?

Explanation

UAC stands for User Account Control, which is a built-in security feature of Windows Vista. It helps to prevent unauthorized changes to the system by prompting the user for permission or administrator credentials when a program attempts to make changes that require administrative access. This feature enhances the overall security of the operating system and protects it from potential threats.

Submit
6. Which of the following components is MOST often removed in order to access laptop motherboards and internal components?

Explanation

The keyboard is most often removed in order to access laptop motherboards and internal components. This is because the keyboard is typically connected to the motherboard via a ribbon cable, making it necessary to remove the keyboard in order to gain access to the motherboard and other internal components. Removing the keyboard allows technicians to perform repairs or upgrades on the motherboard or other internal components as needed.

Submit
7. A technician needs to boot a PC from a CD to run diagnostics, but the PC always boots from the hard drive. Which of the following will allow the PC to boot from the CD?

Explanation

Changing the drive order sequence in the BIOS will allow the PC to boot from the CD. The BIOS (Basic Input/Output System) is responsible for initializing the hardware components of the computer, including the boot order. By accessing the BIOS settings, the technician can rearrange the boot order so that the CD drive is prioritized over the hard drive. This change will ensure that the PC boots from the CD when it is inserted, allowing the technician to run diagnostics.

Submit
8. A disc is stuck in a DVD-ROM drive. Which of the following describes the BEST way to proceed in recovery of the media?

Explanation

Using a paper clip to eject the tray is the best way to proceed in recovering the stuck disc in a DVD-ROM drive. This method is a common solution for this issue and is often recommended by manufacturers. By inserting a straightened paper clip into the small hole on the front of the drive, the tray will be manually released, allowing the disc to be safely removed. This approach is simple, effective, and does not require any disassembly or potential damage to the drive.

Submit
9. An executives laptop screen has been damaged and will not power on. Which of the following is the FASTEST way to get the executive back online?

Explanation

The fastest way to get the executive back online is to pull the hard drive from the damaged laptop and install it in a spare laptop of the same make and model. This allows the executive to continue working without the need for repairs or replacements, as the spare laptop will already have the necessary hardware and software configurations.

Submit
10. Which of the following is a sign that a computer has been infected by a worm?

Explanation

Unauthorized outgoing emails being sent is a sign that a computer has been infected by a worm. Worms are malicious software that can replicate themselves and spread across networks. One common behavior of worms is to use the infected computer to send out spam emails without the user's knowledge or consent. This can result in a high volume of emails being sent from the infected computer, often to random or unauthorized recipients. Therefore, the presence of unauthorized outgoing emails is a clear indication of a worm infection.

Submit
11. A floppy drive is replaced in a computer and now when the computer is turned on the floppy drive light is constantly lit. Which of the following is the MOST likely cause?

Explanation

The most likely cause for the floppy drive light to be constantly lit after replacing the floppy drive is that the drive cable is connected backwards. When the cable is connected incorrectly, it can cause the drive to receive constant power, resulting in the light being constantly lit. This is a common mistake when replacing hardware components, and can easily be fixed by reconnecting the cable correctly.

Submit
12. A user wants to upgrade the memory in the laptop but only can find one memory slot on the bottom of the laptop. Which of the following is the MOST likely location of the second memory slot?

Explanation

The most likely location of the second memory slot is under the keyboard. This is because laptops often have additional memory slots located under the keyboard for easy access and upgrade. The memory slot under the keyboard allows for convenient installation and removal of memory modules without the need to disassemble the entire laptop.

Submit
13. Which of the following will happen if 333MHz memory is inserted into a motherboard that supports 400MHz memory?

Explanation

When a 333MHz memory is inserted into a motherboard that supports 400MHz memory, the motherboard will automatically adjust to the lower speed of 333MHz. This is because the motherboard is designed to be compatible with various memory speeds, and it will always operate at the speed of the slowest component. Therefore, in this case, the motherboard will use the lower 333MHz speed of the inserted memory.

Submit
14. Which of the following should be used to connect a small office of ten computers together and provide the computers access through a common Internet connection?

Explanation

A router and Ethernet switch should be used to connect a small office of ten computers together and provide them access through a common Internet connection. A router is responsible for connecting the office network to the Internet and managing the traffic between the computers and the Internet. An Ethernet switch allows the computers to communicate with each other within the local network. Together, the router and Ethernet switch provide both internal network connectivity and external Internet connectivity for the office computers.

Submit
15. After removing malware from a users computer, the Internet browser does not access any websites. Which of the following is the BEST method to fix this?

Explanation

Removing proxy settings from the Internet browser is the best method to fix the issue of not being able to access any websites after removing malware from a user's computer. Malware often modifies proxy settings to redirect internet traffic, so removing these settings will allow the browser to connect directly to websites again. Running operating system updates, resetting the internet router, or rebooting the computer may not specifically address the issue with the browser's proxy settings.

Submit
16. A user reports that a newly issued smartcard does not work in their laptop, but the technicians smartcard works without any issues. Which of the following would MOST likely resolve the issue?

Explanation

not-available-via-ai

Submit
17. A user is reporting that a PC will suddenly shut down without warning. The PC boots up with no problems, but after using the PC for a short time, the PC turns off. Which of the following components should the technician check? (Select TWO).

Explanation

The technician should check the CPU fan because if it is not functioning properly, the PC may overheat and shut down as a safety measure. The technician should also check the power supply because if it is faulty or not supplying enough power, it can cause the PC to shut down unexpectedly.

Submit
18. Which of the following is the BEST way to ensure that only specified devices can connect to a wireless network?

Explanation

MAC filtering is the best way to ensure that only specified devices can connect to a wireless network. MAC filtering allows the network administrator to create a whitelist of approved MAC addresses, and only devices with those addresses will be able to connect to the network. This provides an additional layer of security and prevents unauthorized devices from accessing the network, even if they have the correct SSID and encryption settings. VLANs, disabling SSID broadcasting, and enabling WEP encryption can also enhance network security, but MAC filtering specifically targets and controls device access.

Submit
19. A user has just moved a PC from one office to another. The patch cable and the NIC do not appear to be functioning in the new office but were working before the move. The patch cable is plugged in correctly to both the NIC and the wall jack. Which of the following actions should the technician take FIRST?

Explanation

The technician should first verify that the port on the switch is enabled. This is because the patch cable and NIC were working before the move, so it is likely that the issue lies with the port on the switch. By checking if the port is enabled, the technician can ensure that the connection between the PC and the network is properly established. This step should be taken before considering other actions such as checking compatibility, updating drivers, or replacing the network cable.

Submit
20. A technician suspects that a power supply may be failing in a computer. Which of the following are the standard voltages for a SATA connection on an ATX power supply?

Explanation

The standard voltages for a SATA connection on an ATX power supply are 3.3v, 5v, and 12v. These voltages are commonly used to power various components in a computer system, including SATA drives. The -5v and -12v options are not standard voltages for a SATA connection and therefore are not the correct answer.

Submit
21. Which of the following is the BEST way to ensure that only specified computers can access a wireless network?

Explanation

Enabling MAC filtering is the best way to ensure that only specified computers can access a wireless network. MAC filtering allows the network administrator to create a list of approved MAC addresses, which are unique identifiers for network devices. Only devices with MAC addresses on the approved list will be able to connect to the network, providing an additional layer of security. This method is more effective than simply changing the default password or SSID, as it specifically controls which devices can connect to the network. Disabling SSID broadcast and changing the SSID from default are also security measures, but they are not as effective as MAC filtering in restricting access to specified computers.

Submit
22. For the third time in two weeks a technician must re-image a machine for the same end user. After discussing in depth the actions preceding the problems the technician has determined the root cause to be opening unknown attachments. Which of the following is the MOST likely reason for the issues?

Explanation

The most likely reason for the issues is a virus. Opening unknown attachments can often lead to the installation of malicious software on a machine, causing various problems and requiring re-imaging. Social engineering involves manipulating individuals to gain unauthorized access, but it is not directly related to opening unknown attachments. Corruption refers to data or file corruption, which may cause issues but is less likely to require re-imaging. Spam refers to unsolicited or unwanted emails, which may contain viruses but is not the root cause of the issues in this scenario.

Submit
23. After installing a second hard drive, the computer no longer loads the operating system on the previous hard drive at boot. Which of the following will restore the computer s previous working state?

Explanation

Configuring the jumpers on the hard drives will restore the computer's previous working state. The jumpers on a hard drive determine its role as either a master or a slave. If the second hard drive is set as the master, it may be preventing the previous hard drive from being recognized and loading the operating system. By correctly configuring the jumpers, the computer will be able to recognize and boot from the previous hard drive, restoring the computer's previous working state.

Submit
24. Which of the following groups is BEST to assign to a home user to prevent software installation?

Explanation

Assigning the "Users" group to a home user would be the best choice to prevent software installation. The "Users" group typically has limited permissions and restrictions, which would prevent them from installing software on their computer. This group is designed for standard users who do not require administrative privileges and is therefore the most suitable option for preventing unauthorized software installations.

Submit
25. A user wishes to encrypt a hard drive for storing critical data. The user wants to drag and drop folders onto the partition and have them be encrypted in real time. Which of the following encryption schemes should be recommended?

Explanation

BitLocker is the recommended encryption scheme for encrypting a hard drive and providing real-time encryption for folders. BitLocker is a full-disk encryption feature available in Windows operating systems. It allows the user to encrypt the entire hard drive or specific folders, providing protection for critical data. By using BitLocker, the user can drag and drop folders onto the partition, and they will be encrypted in real time, ensuring the security of the data stored on the hard drive.

Submit
26. A technician performs a laptop memory upgrade and now the laptop will not boot. The laptop is emitting a series of continuous beeps prior to startup. Which of the following is the MOST likely problem?

Explanation

The most likely problem in this scenario is that the memory contacts are dirty. When a technician performs a laptop memory upgrade, it involves removing and reseating the memory modules. If the contacts on the memory modules or in the memory slots become dirty or corroded, it can prevent proper communication between the memory and the laptop, resulting in the laptop not booting up. This can cause the laptop to emit a series of continuous beeps as a warning sign.

Submit
27. A technician confirms a memory read error in Windows XP. Which of the following should the technician do to resolve the problem?

Explanation

To resolve a memory read error in Windows XP, the technician should reseat or replace the RAM modules. This is because memory read errors are often caused by faulty or loose RAM modules. By reseating the modules, the technician ensures they are properly connected to the motherboard, which can resolve any connection issues. If reseating does not fix the problem, replacing the RAM modules altogether may be necessary to resolve the error. Swapping the video card or changing memory settings in the BIOS would not directly address a memory read error.

Submit
28. Which of the following should a field technician do before attempting to open a laptop for repair or upgrades?

Explanation

Before attempting to open a laptop for repair or upgrades, a field technician should obtain a copy of the manufacturer's disassembly guide. This guide provides detailed instructions and diagrams on how to safely disassemble the laptop without causing any damage. It ensures that the technician follows the correct steps and avoids any potential mistakes or accidents. By having the disassembly guide, the technician can confidently open the laptop, perform the necessary repairs or upgrades, and reassemble it correctly.

Submit
29. An alternative to plain old telephone service (POTS) would be:

Explanation

VoIP stands for Voice over Internet Protocol, which is a technology that allows for the transmission of voice and multimedia over the internet. It is an alternative to traditional telephone services like POTS. VoIP offers advantages such as cost savings, flexibility, and the ability to integrate with other communication services. It uses packet-switched networks instead of dedicated circuit-switched networks, enabling voice data to be transmitted in the form of packets over IP networks. This makes it a more efficient and cost-effective solution for voice communication compared to POTS.

Submit
30. A user states that the LCD display on their laptop has intermittent lines on the screen. The technician notices that when the display panel is moved, the line appears and then disappears. Which of the following is the MOST likely cause?

Explanation

When the user moves the display panel and the line on the screen appears and disappears, it suggests that there is a problem with the connection between the display panel and the system board. This is most likely caused by a loose or damaged display cable. The movement of the display panel causes the cable to lose or regain proper connection, resulting in the intermittent lines on the screen.

Submit
31. The technician suspects a computer has been compromised by malware. Which of the following statements BEST describes the steps a technician should take to eliminate the malware?

Explanation

The best steps a technician should take to eliminate malware is to reboot the computer in Safe Mode with Networking enabled. This allows the computer to start up with only essential services and drivers, making it easier to detect and remove malware. After rebooting, the technician should update the anti-malware scanner to ensure it has the latest virus definitions, and then run a scan to identify and remove any malware present on the system. This approach helps to minimize the chances of the malware interfering with the scanning process and increases the likelihood of successful removal.

Submit
32. A customer reports that their sound is not working. They state that the speakers worked previously. Which of the following should the technician check? (Select THREE).

Explanation

The technician should check if the speakers are on and the mute is off because the customer reports that the sound is not working. If the speakers are off or muted, that could be the reason for the issue. The technician should also check if the audio driver is installed correctly because if it is not, the sound may not work. Additionally, the technician should check if the speakers are plugged into the correct jack because if they are not properly connected, the sound may not be transmitted.

Submit
33. Which of the following protocols would a technician use to run commands on a remote computer?

Explanation

TELNET is the correct answer because it is a protocol that allows a technician to remotely access and control a computer over a network. It provides a command-line interface for running commands on the remote computer, making it a suitable choice for remotely managing and troubleshooting systems. NETBIOS is a networking protocol used for name resolution, FTP is used for file transfer, and SMTP is used for email communication, none of which directly allow for running commands on a remote computer.

Submit
34. A customer wants to listen to music on their computer. When headphones are plugged into the computer, the music can be heard. When headphones are unplugged, music cannot be heard. Which of the following can cause this problem?

Explanation

The reason for this problem is that the computer does not have a built-in speaker. When headphones are plugged in, the sound is directed through the headphones, allowing the music to be heard. However, when the headphones are unplugged, there is no built-in speaker to produce the sound, resulting in the inability to hear the music.

Submit
35. A technician is troubleshooting a users problem; important Windows services are not starting. In which of the following locations should the technician check to investigate when these services started or stopped?

Explanation

The technician should check the System Log to investigate when the important Windows services started or stopped. The System Log contains records of events related to the operating system, including service start and stop events. By reviewing the System Log, the technician can identify any errors or issues that may have caused the services to fail to start.

Submit
36. Which of the following would resolve a problem in which external speakers connected to a sound card are not playing audio?

Explanation

Moving the cable to another jack on the sound card would resolve the problem of external speakers not playing audio. This suggests that there may be an issue with the current jack being used, such as a loose connection or a malfunction. By moving the cable to another jack, it allows for a different connection point that may be in proper working condition, enabling the audio to play through the external speakers.

Submit
37. Which of the following should a technician do before sending a users laptop to a manufacturers repair center?

Explanation

Before sending a user's laptop to a manufacturer's repair center, a technician should remove the hard drive. This is because the hard drive contains sensitive and personal data of the user, and removing it ensures the privacy and security of their information. Additionally, removing the hard drive prevents any potential data breaches or unauthorized access to the user's files and documents during the repair process.

Submit
38. A technician is able to ping a server by the IP address; however, the server will not respond when the PING command uses its FQDN. Which of the following is the MOST likely reason for the server not responding?

Explanation

The most likely reason for the server not responding when the PING command uses its FQDN is that the computer is not getting proper DNS results. The FQDN (Fully Qualified Domain Name) is used to translate the human-readable domain name into an IP address. If the computer is not able to resolve the FQDN to the correct IP address, it will not be able to establish a connection with the server. This could be due to DNS misconfiguration, DNS server issues, or network connectivity problems between the computer and the DNS server.

Submit
39. Which of the following commands displays all local network shares?

Explanation

The correct answer is "NET view." This command displays all local network shares.

Submit
40. A technician receives a ticket about VPN issues on a Windows XP PC. The ticket explained that the Internet was working until the VPN connection was established; now it will not allow the user to remote desktop or browse the Internet. Which of the following would cause these network issues?

Explanation

The correct answer is that the Windows XP firewall is turned on and not configured correctly. This can cause network issues because the firewall may be blocking the necessary ports and protocols for remote desktop and internet browsing. The user will need to configure the firewall settings to allow these connections in order to resolve the problem.

Submit
41. A user installed a Blu-Ray drive in their PC. The user reports that the new drive and their existing DVD-RW drive are not operating. Which of the following needs to be replaced?

Explanation

The user installed a Blu-Ray drive in their PC and now both the new drive and their existing DVD-RW drive are not operating. This suggests that the issue is not with the individual drives themselves, but rather with a common component that is affecting both drives. The power supply is responsible for providing power to all the components in the PC, including the drives. If the power supply is faulty or not providing enough power, it can cause both drives to not operate properly. Therefore, the power supply needs to be replaced in order to resolve the issue.

Submit
42. How many physical hard drives can fail in a RAID 5 array consisting of 8 physical hard drives without losing the entire RAID 5 array?

Explanation

In a RAID 5 array, data is distributed across multiple hard drives along with parity information. This allows for fault tolerance, as the array can withstand the failure of one physical hard drive without losing any data. Since the question asks how many physical hard drives can fail without losing the entire RAID 5 array, the correct answer is 1.

Submit
43. A technician installs newly compatible memory into a computer, and the computer does not recognize the memory. Which of the following would the technician need to perform?

Explanation

When a technician installs newly compatible memory into a computer and the computer does not recognize it, the issue is likely due to the BIOS not being updated to support the new memory modules. Flashing the BIOS refers to updating the BIOS firmware to the latest version, which can resolve compatibility issues and allow the computer to recognize the new memory. Therefore, the technician would need to perform a BIOS flash to resolve the problem.

Submit
44. Which of the following will allow a technician to extend a partition?

Explanation

Setting the drive as dynamic will allow a technician to extend a partition. Dynamic disks are a type of disk storage in Windows that allows for more advanced features, such as the ability to create and extend partitions without the need to reformat the entire disk. By setting the drive as dynamic, the technician can easily extend a partition to allocate more space without losing any data.

Submit
45. Which of the following does an out-of-memory error indicate on a printer?

Explanation

An out-of-memory error on a printer indicates that a large print job has been sent to the printer. This means that the printer does not have enough memory to handle the size of the print job, causing the error to occur.

Submit
46. A technician is moving data from one laptop to another that has EFS installed. Which of the following would the technician need to perform FIRST?

Explanation

To move data from one laptop to another with EFS (Encrypting File System) installed, the technician would need to export the user's certificate first. The EFS uses certificates to encrypt and decrypt files, and by exporting the user's certificate, the technician ensures that the files can be accessed and decrypted on the new laptop. This step is necessary before transferring the encrypted data to the new device.

Submit
47. A technician is unfamiliar with terms in a dialog box. Which of the following would quickly provide more information?

Explanation

To quickly obtain more information about unfamiliar terms in a dialog box, the best option is to alternate click and select "What's This?". This action typically triggers a tooltip or a small pop-up window that provides a brief explanation or description of the selected term. This allows the technician to quickly understand the meaning or purpose of the unfamiliar term without having to navigate away from the dialog box.

Submit
48. A user reports that their new optical drive is not working. It opens and closes, but nothing pops up on their screen when the user puts a disk in. The technician checked Device Manager and could not locate the drive. Which of the following is the MOST likely reason for this?

Explanation

The most likely reason for the optical drive not working is that the SATA cable is not connected. This can cause the drive to not be recognized by the computer, resulting in no response when a disk is inserted.

Submit
49. Which of the following may cause the cursor of an optical mouse to erratically jump around the screen? (Select TWO).

Explanation

A non-reflective or uneven surface can cause the cursor of an optical mouse to erratically jump around the screen because the mouse's sensor relies on detecting reflections from the surface it is on. If the surface is non-reflective or uneven, the sensor may not be able to accurately track the movement of the mouse.

An incorrect mouse device driver can also cause the cursor to jump around the screen because the driver is responsible for translating the mouse's movements into actions on the screen. If the driver is outdated or incompatible, it may not be able to properly interpret the mouse's input, resulting in erratic cursor movement.

Submit
50. A technician has just installed a second SATA HDD into a Windows XP desktop. The computer boots up successfully without any errors, but the technician cannot locate the additional HDD when clicking on My Computer. Which of the following is MOST likely the problem? (Select TWO).

Explanation

The technician cannot locate the additional HDD when clicking on My Computer because it must be partitioned and assigned a drive letter. Without partitioning the HDD, it cannot be recognized by the operating system. Additionally, without assigning a drive letter, the HDD will not be accessible through My Computer.

Submit
51. All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?

Explanation

The user having a different IP address range is likely because they have connected to a nearby wireless access point from another office. This can happen if the user's device automatically connects to the strongest available wireless signal, which in this case is from the nearby office. As a result, the user is assigned an IP address from the different range used by the nearby office's network.

Submit
52. Which of the following commands will allow a technician to map a network connection from source to end?

Explanation

TRACERT is the correct answer because it is a command that allows a technician to trace the route taken by packets from the source to the destination. It provides information about each hop along the way, including the IP addresses and response times. This can be useful for troubleshooting network connectivity issues and identifying any bottlenecks or network delays.

Submit
53. A technician notices that a printer is jamming above the printer tray. Which of the following would the technician perform FIRST to resolve this issue?

Explanation

The technician would perform the task of cleaning the pickup rollers first to resolve the issue of printer jamming above the printer tray. This is because the pickup rollers are responsible for pulling the paper from the tray into the printer, and if they are dirty or worn out, they may not be able to grip the paper properly, leading to jams. Cleaning the pickup rollers can remove any dust, debris, or residue that may be causing them to slip or not function effectively, thus resolving the jamming issue.

Submit
54. The user is running dual monitors on a Windows XP Professional computer. The second monitor failed to display after a system reboot. A technician verifies that the monitor is functioning properly. Which of the following would the technician do NEXT?

Explanation

The technician would use Display Settings to ensure that both monitors are enabled. This is because the question states that the second monitor failed to display after a system reboot, and the technician has already verified that the monitor itself is functioning properly. By checking the Display Settings and ensuring that both monitors are enabled, the technician can troubleshoot any potential software or configuration issues that may be causing the second monitor to not display. Checking the BIOS or Device Manager would not be necessary in this case, as the issue is likely related to the Display Settings.

Submit
55. A system powers on, begins POST, displays the BIOS version information and then hangs with the error message Error loading operating system. Which of the following is MOST likely cause of this issue?

Explanation

The most likely cause of the system hanging with the error message "Error loading operating system" is a corrupt MBR (Master Boot Record). The MBR is responsible for loading the operating system, and if it becomes corrupted, the system will not be able to boot properly. This can happen due to various reasons such as a power failure, hardware issues, or a virus attack. In this case, since the system is able to display the BIOS version information, it suggests that the issue is not related to a virus or a corrupted boot sector. The most probable cause is a corrupt MBR.

Submit
56. Which of the following symptoms would indicate a power supply issue?

Explanation

Frequent failure of hard drives can indicate a power supply issue because insufficient power can cause fluctuations or surges in the electrical current, leading to damage or malfunctioning of the hard drives. Power supply issues can result in inconsistent power delivery, which can affect the performance and reliability of various components, including hard drives.

Submit
57. Which of the following is a true statement about power management?

Explanation

ACPI (Advanced Configuration and Power Interface) is a software interface that was developed by Microsoft and Intel. It is designed to facilitate power management and configuration of hardware devices. ACPI is not exclusive to Microsoft and Intel, but rather an open industry standard that is widely used across various devices. It takes full advantage of Plug and Play technology, allowing for seamless integration and management of power resources.

Submit
58. Which of the following is added to the end of a shared directory name that will hide the shared directory?

Explanation

Adding a "$" symbol to the end of a shared directory name will hide the shared directory.

Submit
59. Which of the following commands would be used to set the time on a workstation?

Explanation

The correct answer is "time." This command is used to set the time on a workstation.

Submit
60. A technician has been tasked to test an application on a Windows XP desktop. The technician installs the application and reboots the computer. Upon reboot the technician receives a BSOD. Which of the following is the BEST for the technician to perform?

Explanation

Starting the computer in Safe Mode is the best option for the technician to perform in this situation. Safe Mode is a diagnostic mode in Windows that allows the operating system to start with only the essential drivers and services. By starting the computer in Safe Mode, the technician can troubleshoot and identify any issues with the application or conflicting drivers that may be causing the BSOD. This can help in resolving the problem without the need for reinstalling the operating system or contacting the vendor of the application.

Submit
61. Which of the following does the command FDISK /MBR do?

Explanation

The command FDISK /MBR is used to repair boot blocks. Boot blocks are the sections of a disk that contain the necessary information to boot the operating system. When these boot blocks become corrupted or damaged, the system may not be able to start up properly. By using the FDISK /MBR command, the boot blocks can be repaired, allowing the system to boot up successfully.

Submit
62. Which of the following is a method for making a hard disk unreadable without the proper authentication?

Explanation

BitLocker is a method for making a hard disk unreadable without the proper authentication. BitLocker is a full disk encryption feature included in Windows operating systems, which encrypts the entire hard disk and prevents unauthorized access to the data stored on it. It provides a high level of security by encrypting the entire drive, making it unreadable without the correct authentication credentials or recovery key.

Submit
63. A user is attempting to access files on their local computer that are also shared out to the network. The file share permissions allow the user account to have read access. The NTFS permissions allow the user account to have full control. Which of the following is the user s resulting access level when accessing these files locally?

Explanation

When accessing the files locally, the user's resulting access level would be "Full control". This is because the NTFS permissions, which are more restrictive than file share permissions, allow the user account to have full control over the files. Therefore, the user would have the highest level of access, which includes the ability to read, write, modify, and have full control over the files.

Submit
64. A technician turns on a PC and before the computer boots up, the technician is prompted for a password. The technician does not know the password. Which of the following can the technician do to allow access to the PC? (Select TWO).

Explanation

The technician can set the clear password jumper on the motherboard and remove the CMOS battery for 15 minutes to allow access to the PC. Setting the clear password jumper on the motherboard will reset the BIOS settings, including the password. Removing the CMOS battery for 15 minutes will also reset the BIOS settings. Both of these actions will remove the password prompt when the PC is turned on.

Submit
65. A technician observes poor network performance on a networked computer when transferring large amounts of data over the network. The technician confirms manually configured settings of 100Mbps and full-duplex on the computer, but the connected Ethernet switch shows an autonegotiated 100Mbps and half-duplex. Which of the following will correct this issue?

Explanation

The correct answer is to configure auto-negotiation on the computer. This will allow the computer and the Ethernet switch to automatically negotiate and agree upon the correct speed and duplex settings for optimal network performance. Manually configuring the settings on the computer may cause a mismatch with the switch, resulting in poor network performance. Upgrading the network card device drivers or replacing the network card or Ethernet switch may not be necessary if the issue can be resolved by enabling auto-negotiation.

Submit
66. A technician needs to transfer data to an external hard drive that is 10/100 network capable. Which of the following has the FASTEST transfer rate?

Explanation

IEEE 1394, also known as FireWire, has the fastest transfer rate among the given options. It is a high-speed serial bus that can transfer data at a rate of up to 400 Mbps. USB 2.0, which is another option, has a maximum transfer rate of 480 Mbps, but it is still slower than IEEE 1394. USB 1.1 has a transfer rate of only 12 Mbps, while Broadband is a type of internet connection and not directly related to data transfer rates.

Submit
67. A technician needs to find out if a scheduled task completed without error. Which of the following tools would allow the technician to verify the task status?

Explanation

Event Viewer is the correct tool to verify the status of a scheduled task. Event Viewer is a Microsoft Management Console (MMC) application that allows the technician to view and analyze event logs on a local or remote computer. It provides detailed information about system events, including errors, warnings, and informational messages. By checking the event logs, the technician can determine if the scheduled task completed without any errors or issues. Task Manager is used to monitor and manage running processes, Device Manager is used to manage hardware devices, and Performance Monitor is used to monitor system performance.

Submit
68. A Windows Vista computer has an experience index of 3.8. The technician discovers that the computer has the following: Performance indexRAM1GB4.6Video3D3.8CPU2.4GHz4.2The technician upgrades the memory to 2GB and gets the following results: Performance indexRAM2GB5.0Video3D3.8CPU2.4GHz4.2But the Windows experience index is still at 3.8. Which of the following can the technician do to improve the performance index?

Explanation

By upgrading the video card, the technician can improve the performance index. This is because the performance index is based on the lowest subscore, and in this case, the lowest subscore is the video score of 3.8. Upgrading the video card will increase this subscore, resulting in an overall improvement in the performance index.

Submit
69. Which of the following is a modem diagnostic command which can be used to verify communication between the computer and a connected modem?

Explanation

AT&V is a modem diagnostic command that can be used to verify communication between the computer and a connected modem. This command is commonly used to display the current configuration settings and capabilities of the modem. It provides information such as the baud rate, flow control settings, and error correction protocols being used. By using the AT&V command, users can ensure that the computer and modem are properly communicating and that the modem is functioning correctly.

Submit
70. A user has a water cooled computer that appears to be overheating intermittently. Which of the following is the cause of the problem? (Select TWO).

Explanation

The water pump becoming faulty can cause the water cooled computer to overheat intermittently as it may not be able to circulate the water effectively, leading to inadequate cooling. Additionally, if air is trapped in the line, it can disrupt the flow of water and prevent proper cooling, resulting in overheating.

Submit
71. Which of the following is a recommended power rating for a desktop PC power supply running office applications?

Explanation

A recommended power rating for a desktop PC power supply running office applications is 400 Watts. This power rating is sufficient to handle the power requirements of a typical desktop PC that is used for office applications. It ensures that the power supply can provide enough power to the components of the PC without being overburdened or causing any issues. Higher power ratings, such as 1800 Watts, are generally unnecessary for standard office applications and may result in wasted energy.

Submit
72. A technician needs to add additional RAM to a computer containing PC2700 RAM. The technician does not have any PC2700 RAM available. Which of the following is the BEST option to complete the task?

Explanation

The technician should install 400MHz RAM because it is the closest match to the PC2700 RAM that is already installed in the computer. While the other options may be compatible with the computer, they have lower frequencies and may not perform optimally. The 400MHz RAM will provide the best compatibility and performance in this case.

Submit
73. When dealing with a power issue, which of the following should be checked FIRST?

Explanation

When dealing with a power issue, the wall outlet should be checked first. This is because the wall outlet is the primary source of power for the device. If the wall outlet is not functioning properly or there is no power supply from it, then the other components such as cabling, input devices, and power supply may not be the cause of the issue. Therefore, it is important to check the wall outlet first to ensure that there is a proper power supply before troubleshooting other components.

Submit
74. A technician is booting up a computer but the computer never moves beyond POST. The floppy disk drive light stays lit continuously during the boot process. Which of the following is the MOST likely cause?

Explanation

The most likely cause for the computer not moving beyond POST and the floppy disk drive light staying lit continuously is that the drive cable is backwards. This means that the cable connecting the floppy disk drive to the motherboard is plugged in incorrectly, causing the computer to not properly detect the drive and preventing it from moving forward in the boot process.

Submit
75. Which of the following is the reason for pinging the loopback address?

Explanation

Pinging the loopback address (127.0.0.1) is used to verify the functionality of the TCP/IP stack. The loopback address is a virtual network interface that allows a computer to communicate with itself. By sending a ping request to the loopback address, the computer checks if the TCP/IP stack is functioning properly. This test is commonly used to troubleshoot network connectivity issues and ensure that the computer's networking components are working correctly.

Submit
76. Which of the following drives are configurable via a jumper? (Select TWO).

Explanation

IDE and PATA drives are configurable via a jumper. IDE stands for Integrated Drive Electronics and PATA stands for Parallel ATA. Both IDE and PATA drives use a jumper to configure the drive as a master, slave, or cable select. This jumper configuration determines the drive's position on the IDE cable and its interaction with other drives connected to the same cable. FDD, SATA, and SSD drives do not use jumpers for configuration.

Submit
77. Which of the following will happen if a PCI express video card is used in a PCI slot?

Explanation

PCI express and PCI slots are two different types of slots with different physical and electrical characteristics. A PCI express video card cannot be used in a PCI slot because they are not compatible with each other. The physical design and the number of pins in the slots are different, preventing the video card from being properly inserted and connected. Therefore, it is not possible to use a PCI express video card in a PCI slot.

Submit
78. Which of the following should be implemented on a small office home office (SOHO) server?

Explanation

Assigning a static IP address to a small office home office (SOHO) server is important for several reasons. Firstly, it ensures that the server always has the same IP address, making it easier for other devices on the network to locate and connect to it. Additionally, a static IP address allows for more stable and reliable connections, as it eliminates the need for the server's IP address to change dynamically. This is especially crucial for a server, as it needs to be consistently accessible to clients and other devices on the network.

Submit
79. The purpose of a proxy exception rule is to configure the browser to:

Explanation

A proxy exception rule is used to bypass the proxy server for certain URLs. This means that when the browser encounters these specified URLs, it will not route the traffic through the proxy server, allowing direct communication between the browser and the target website. This can be useful in situations where direct access to certain websites is required, such as for internal resources or specific trusted websites.

Submit
80. Which of the following will occur if a PCMCIA device is used in a PC card slot?

Explanation

A PCMCIA device will work in a PC card slot because PCMCIA devices are designed to be compatible with PC card slots. PCMCIA (Personal Computer Memory Card International Association) is a standard for small form factor peripheral devices, such as network cards, modems, and storage devices, that can be inserted into PC card slots on laptops and other portable devices. PC card slots are specifically designed to accommodate PCMCIA devices, so they are compatible with each other. No voltage change or firmware upgrade is required for a PCMCIA device to work in a PC card slot.

Submit
81. Which of the following are symptoms of a pending hard drive failure? (Select TWO).

Explanation

File operations failing and system lock-up are both symptoms of a pending hard drive failure. When a hard drive is failing, it may struggle to read or write data, resulting in failed file operations. Additionally, a failing hard drive can cause the system to freeze or become unresponsive, leading to system lock-ups. These symptoms indicate that the hard drive is experiencing issues and may fail in the near future.

Submit
82. Windows BitLocker can be used with which of the following? (Select TWO).

Explanation

Windows BitLocker can be used with a USB flash drive and a Trusted Platform Module (TPM). BitLocker is a full disk encryption feature in Windows that helps protect data by encrypting the entire drive. A USB flash drive can be used to store the BitLocker recovery key, which is required to unlock the encrypted drive. The Trusted Platform Module (TPM) is a hardware component that provides secure storage of encryption keys and helps ensure the integrity of the system. By using both a USB flash drive and TPM, users can enhance the security of their BitLocker-encrypted drives.

Submit
83. When troubleshooting an email problem which of the following is the correct syntax for telnet?

Explanation

The correct syntax for telnet when troubleshooting an email problem is "telnet 25". This command allows the user to establish a telnet session on port 25, which is the default port for SMTP (Simple Mail Transfer Protocol) used for email communication. By using this syntax, the user can test the connectivity and communication with the email server.

Submit
84. A home user is determining whether to install a wired or wireless network. Which of the following considerations should be taken into account? (Select TWO).

Explanation

When determining whether to install a wired or wireless network, the first consideration to take into account is that a wireless network provides more flexibility in user access location. This means that users can connect to the network from anywhere within the network's range, allowing for greater mobility. The second consideration is that a wired network provides a faster and more reliable solution. Wired connections typically offer faster data transfer speeds and are less prone to interference, resulting in a more stable and reliable network connection.

Submit
85. Which of the following will fix a laptop with dark irregular lines that run the width of the display in all video modes?

Explanation

Replacing the LCD is the correct answer because dark irregular lines running across the width of the display in all video modes indicate a hardware issue with the LCD screen. The lines suggest a problem with the screen's pixels or the display itself, which can only be resolved by replacing the LCD. Performing a system restore, replacing the video capture card, or changing the resolution will not address the specific issue with the LCD screen.

Submit
86. Which of the following commands would be used to check system files for corruption?

Explanation

The SFC command is used to check system files for corruption. SFC stands for System File Checker, and it is a utility in Windows that scans for and restores corrupted system files. This command is commonly used to fix issues related to missing or corrupted system files, which can cause various problems on a computer. By running the SFC command, users can identify and repair any corrupt files, ensuring the stability and functionality of the operating system.

Submit
87. A user states that there are multiple folders within Windows Vista with names that are green in color. Which of the following is the MOST likely cause?

Explanation

The most likely cause for the folders in Windows Vista having green names is that EFS (Encrypting File System) is enabled. EFS is a feature in Windows that allows users to encrypt individual files and folders for added security. When EFS is enabled, encrypted files and folders are displayed in green color to indicate their encrypted status. Therefore, it is highly probable that the user's folders are encrypted using EFS, resulting in their green color.

Submit
88. A technician has just replaced the motherboard in a desktop computer. The user of the computer reports that their system now reboots periodically. Which of the following can the technician do to correct the rebooting problem?

Explanation

Upgrading the power supply can help to resolve the rebooting problem in this scenario. When a technician replaces the motherboard, it is possible that the new motherboard requires more power than the previous one. If the power supply is not able to provide enough power to the components, it can result in periodic reboots. Upgrading the power supply to a higher wattage can ensure that the system receives enough power to function properly and prevent unexpected reboots.

Submit
89. A user reports that there is no access to the network from the computer. The technician notices that all of the lights on the switch are on and not flashing, the network cables are all plugged in and the computers network card is functioning properly. Which of the following should the technician perform to resolve the issue?

Explanation

Power cycling the switch can help resolve the issue because when all the lights on the switch are on and not flashing, it indicates that the switch may be experiencing a software or hardware issue. Power cycling the switch involves turning it off, waiting for a few seconds, and then turning it back on. This can help reset the switch and resolve any temporary issues that may be causing the lack of network access.

Submit
90. A user wants to have maximum speed within their SOHO, while maintaining ease of accessibility for walk-in clients. They use a laptop and two desktops and broadband Internet access. Which of the following should the technician recommend?

Explanation

A wired router with Gigabit access and an access point would be the best recommendation in this scenario. This setup would provide maximum speed through the wired connection, which is ideal for a SOHO environment. Additionally, the access point would allow for easy accessibility for walk-in clients who may need to connect to the network wirelessly. This combination of wired and wireless connectivity options would meet the user's requirements for both speed and accessibility.

Submit
91. Wake-On Lan is an option that is enabled in:

Explanation

Wake-On Lan is a feature that allows a computer to be turned on remotely by sending a special network packet. This feature needs to be enabled in the BIOS (Basic Input/Output System) of the computer. The BIOS is a firmware that is responsible for initializing hardware components and starting the operating system. Therefore, to enable Wake-On Lan, one would need to access the BIOS settings of the computer.

Submit
92. A user states that an unwanted instant messenger program starts every time Windows Vista logs in, but the program is not listed in the Startup folder to remove. Which of the following programs will allow a user to disable the program from starting during the login process?

Explanation

Windows Defender is the correct answer because it is an antivirus program that also has the ability to manage startup programs. Within Windows Defender, there is a feature called "Startup Programs" that allows users to disable or enable programs that start automatically during login. By accessing this feature, the user can find and disable the unwanted instant messenger program from starting during the login process.

Submit
93. A user reports that their desktop computer is running slower than normal. After running benchmark testing on the CPU, the technician discovers that it is performing significantly below the CPU rating. Which of the following is the MOST likely reason for the slow performance?

Explanation

A loose heat sink can cause the CPU to overheat, leading to reduced performance. The heat sink is responsible for dissipating heat generated by the CPU, and if it is not properly attached, it may not be able to effectively cool the CPU. This can result in the CPU throttling its performance to prevent damage from excessive heat. Therefore, a loose heat sink is the most likely reason for the slow performance in this case.

Submit
94. A technician connects an external hard drive and a mouse into a USB hub. The mouse is recognized by the operating system, but the external hard drive is not. Which of the following will allow the external USB hard drive to be recognized?

Explanation

The external hard drive is not being recognized because the USB hub being used may not be compatible with the hard drive. By replacing the USB hub with a USB 2.0 hub, which is a more advanced and compatible version, the hard drive can be recognized by the operating system.

Submit
95. A technician notices that a computer is randomly rebooting. When the technician accesses the BIOS and the computer reboots. Which of the following should the technician check FIRST?

Explanation

The technician should check for blown capacitors first because this is a common issue that can cause random reboots in a computer. Blown capacitors can lead to power fluctuations and instability in the system, resulting in unexpected restarts. By visually inspecting the capacitors on the motherboard, the technician can identify any bulging or leaking capacitors, which would indicate a problem.

Submit
96. A user states that when trying to sync a PDA via Bluetooth to the operating system, a no Bluetooth device error message appears on the PDA. The computer has a Bluetooth card installed. Which of the following is the MOST likely cause?

Explanation

A BIOS setting being incorrect is the most likely cause of the no Bluetooth device error message appearing on the PDA when trying to sync it via Bluetooth to the operating system. This is because the BIOS controls the basic hardware settings of the computer, including the Bluetooth card. If the BIOS setting for the Bluetooth card is incorrect, it can cause the device to not be recognized or function properly, resulting in the error message.

Submit
97. Which of the following is an example of Automatic IP addressing in Windows XP?

Explanation

The IP address 255.255.0.0 is an example of a subnet mask, not an example of automatic IP addressing. Automatic IP addressing, also known as Automatic Private IP Addressing (APIPA), is a feature in Windows XP that allows a computer to automatically assign itself an IP address if it is unable to obtain one from a DHCP server. The APIPA range is 169.254.0.1 to 169.254.255.254, so the correct answer should be 169.254.254.0.

Submit
98. Which of the following ports should be forwarded on the firewall to make the internal FTP server accessible from the Internet?

Explanation

Port 23 should be forwarded on the firewall to make the internal FTP server accessible from the Internet. Port 23 is the default port for Telnet, a protocol used for remote login and command execution on a remote computer. However, it is important to note that Telnet is an insecure protocol and is typically replaced by SSH (port 22) for secure remote access. Therefore, it is more common to forward port 22 for SSH access to an FTP server.

Submit
99. Which of the following will pull up the fonts folder in Windows 7? (Select TWO).

Explanation

The correct answer is to click the windows button, type font, and choose the font folder, and to click the windows button, choose control panel, and then select the font folder. These two options are the correct ones because they provide the direct path to access the fonts folder in Windows 7. The other options either lead to different folders or do not provide the correct steps to reach the fonts folder.

Submit
100. Which of the following is the QUICKEST way to view network adapter statistics?

Explanation

Task Manager is the quickest way to view network adapter statistics. Task Manager provides real-time information about the performance of the computer, including network activity. It displays detailed statistics such as network utilization, data sent and received, and the current network connection speed. This information is readily available and can be accessed with just a few clicks, making Task Manager the fastest option for viewing network adapter statistics.

Submit
View My Results

Quiz Review Timeline (Updated): Aug 14, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 14, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 02, 2012
    Quiz Created by
    Tmede212
Cancel
  • All
    All (100)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
A user reports that each time the computer is rebooted, the time on...
A user states that there are two lines running down the middle of all...
A technician replaced a processor, but when the computer is powered...
Which of the following will occur if a laptop SATA 1 drive is...
Which of the following is the built-in security feature of Windows...
Which of the following components is MOST often removed in order to...
A technician needs to boot a PC from a CD to run diagnostics, but the...
A disc is stuck in a DVD-ROM drive. Which of the following describes...
An executives laptop screen has been damaged and will not power on....
Which of the following is a sign that a computer has been infected by...
A floppy drive is replaced in a computer and now when the computer is...
A user wants to upgrade the memory in the laptop but only can find one...
Which of the following will happen if 333MHz memory is inserted into a...
Which of the following should be used to connect a small office of ten...
After removing malware from a users computer, the Internet browser...
A user reports that a newly issued smartcard does not work in their...
A user is reporting that a PC will suddenly shut down without warning....
Which of the following is the BEST way to ensure that only specified...
A user has just moved a PC from one office to another. The patch cable...
A technician suspects that a power supply may be failing in a...
Which of the following is the BEST way to ensure that only specified...
For the third time in two weeks a technician must re-image a machine...
After installing a second hard drive, the computer no longer loads the...
Which of the following groups is BEST to assign to a home user to...
A user wishes to encrypt a hard drive for storing critical data. The...
A technician performs a laptop memory upgrade and now the laptop will...
A technician confirms a memory read error in Windows XP. Which of the...
Which of the following should a field technician do before attempting...
An alternative to plain old telephone service (POTS) would be:
A user states that the LCD display on their laptop has intermittent...
The technician suspects a computer has been compromised by malware....
A customer reports that their sound is not working. They state that...
Which of the following protocols would a technician use to run...
A customer wants to listen to music on their computer. When headphones...
A technician is troubleshooting a users problem; important Windows...
Which of the following would resolve a problem in which external...
Which of the following should a technician do before sending a users...
A technician is able to ping a server by the IP address; however, the...
Which of the following commands displays all local network shares?
A technician receives a ticket about VPN issues on a Windows XP PC....
A user installed a Blu-Ray drive in their PC. The user reports that...
How many physical hard drives can fail in a RAID 5 array consisting of...
A technician installs newly compatible memory into a computer, and the...
Which of the following will allow a technician to extend a partition?
Which of the following does an out-of-memory error indicate on a...
A technician is moving data from one laptop to another that has EFS...
A technician is unfamiliar with terms in a dialog box. Which of the...
A user reports that their new optical drive is not working. It opens...
Which of the following may cause the cursor of an optical mouse to...
A technician has just installed a second SATA HDD into a Windows XP...
All users within an office are wirelessly connected to a network,...
Which of the following commands will allow a technician to map a...
A technician notices that a printer is jamming above the printer tray....
The user is running dual monitors on a Windows XP Professional...
A system powers on, begins POST, displays the BIOS version information...
Which of the following symptoms would indicate a power supply issue?
Which of the following is a true statement about power management?
Which of the following is added to the end of a shared directory name...
Which of the following commands would be used to set the time on a...
A technician has been tasked to test an application on a Windows XP...
Which of the following does the command FDISK /MBR do?
Which of the following is a method for making a hard disk unreadable...
A user is attempting to access files on their local computer that are...
A technician turns on a PC and before the computer boots up, the...
A technician observes poor network performance on a networked computer...
A technician needs to transfer data to an external hard drive that is...
A technician needs to find out if a scheduled task completed without...
A Windows Vista computer has an experience index of 3.8. The...
Which of the following is a modem diagnostic command which can be used...
A user has a water cooled computer that appears to be overheating...
Which of the following is a recommended power rating for a desktop PC...
A technician needs to add additional RAM to a computer containing...
When dealing with a power issue, which of the following should be...
A technician is booting up a computer but the computer never moves...
Which of the following is the reason for pinging the loopback address?
Which of the following drives are configurable via a jumper? (Select...
Which of the following will happen if a PCI express video card is used...
Which of the following should be implemented on a small office home...
The purpose of a proxy exception rule is to configure the browser to:
Which of the following will occur if a PCMCIA device is used in a PC...
Which of the following are symptoms of a pending hard drive failure?...
Windows BitLocker can be used with which of the following? (Select...
When troubleshooting an email problem which of the following is the...
A home user is determining whether to install a wired or wireless...
Which of the following will fix a laptop with dark irregular lines...
Which of the following commands would be used to check system files...
A user states that there are multiple folders within Windows Vista...
A technician has just replaced the motherboard in a desktop computer....
A user reports that there is no access to the network from the...
A user wants to have maximum speed within their SOHO, while...
Wake-On Lan is an option that is enabled in:
A user states that an unwanted instant messenger program starts every...
A user reports that their desktop computer is running slower than...
A technician connects an external hard drive and a mouse into a USB...
A technician notices that a computer is randomly rebooting. When the...
A user states that when trying to sync a PDA via Bluetooth to the...
Which of the following is an example of Automatic IP addressing in...
Which of the following ports should be forwarded on the firewall to...
Which of the following will pull up the fonts folder in Windows 7?...
Which of the following is the QUICKEST way to view network adapter...
Alert!

Advertisement