CompTIA A+ 801 Prep Exam-a

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Jamestiger
J
Jamestiger
Community Contributor
Quizzes Created: 1 | Total Attempts: 123
| Attempts: 123 | Questions: 199
Please wait...
Question 1 / 199
0 %
0/100
Score 0/100
1. During troubleshooting, the technician determines the cause of the problem.Which of the following is the NEXT step in the troubleshooting theory?

Explanation

After determining the cause of the problem, the next step in the troubleshooting theory is to establish a plan of action to resolve the problem and implement the solutions. This involves creating a step-by-step plan to address the issue and deciding on the necessary actions to fix it. Once the plan is established, the technician can proceed with implementing the solutions and resolving the problem effectively.

Submit
Please wait...
About This Quiz
CompTIA A+ 801 Prep Exam-a - Quiz

This CompTIA A+ 801 Prep Exam-A assesses knowledge in computer system components and troubleshooting. It covers topics like AGP slots, power issues in laptops, RAID 1 data redundancy, identifying noisy PC components, and understanding hot-swappable devices and network interfaces.

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. Which of the following should the technician verify FIRST if the customer reports that a laptop battery is not charging?

Explanation

The technician should verify the power light on the AC adapter first because it indicates whether the adapter is receiving power and functioning properly. If the power light is not on, it suggests that there may be an issue with the adapter, which could be the cause of the laptop battery not charging. By checking the power light, the technician can determine if the adapter needs to be replaced or if there is another underlying issue causing the battery charging problem.

Submit
3. Which of the following IP addresses is in a class A range?

Explanation

The IP address 15.26.2.1 is in a class A range because it falls within the range of 1.0.0.0 to 126.0.0.0. In classful addressing, class A IP addresses have the first octet in the range of 1 to 126, which means that the given IP address is in a class A range.

Submit
4. Which of the following is the MAXIMUM data rate of IEEE 1394a?

Explanation

The maximum data rate of IEEE 1394a is 400Mbps. IEEE 1394a, also known as FireWire 400, is a high-speed serial bus standard used for connecting devices such as computers, digital cameras, and external hard drives. It provides a data transfer rate of up to 400Mbps, making it suitable for transferring large files quickly and efficiently.

Submit
5. A user reports that video is not displayed when their laptop is powered on.Which of the following should be performed after verifying the power and chargingindicators are lit?

Explanation

After verifying that the power and charging indicators are lit, the next step should be to attach an external monitor and check for video. This will help determine if the issue lies with the laptop's display or if it is a problem with the laptop itself. By connecting an external monitor, it can be determined if the video is being outputted properly by the laptop. If the video is displayed on the external monitor, then the issue may be with the laptop's display. If there is still no video, further troubleshooting will be required.

Submit
6. Which of the following must be performed when installing a touch screen?

Explanation

When installing a touch screen, calibration must be performed. Calibration is the process of aligning the touch screen with the display to ensure accurate and precise touch input. This is necessary to ensure that the touch screen responds correctly to touch gestures and accurately registers the user's input. Disabling the mouse or keyboard or rebooting to Safe mode are not necessary steps for installing a touch screen and do not directly relate to the calibration process.

Submit
7. Which of the following are locations where a computer virus could exist and then further infect a computer? (Select TWO).

Explanation

A computer virus can exist and infect a computer in the boot sector and optical media. The boot sector is the first sector of a computer's hard drive, and viruses can hide in this area to gain control during the boot process. Optical media such as CDs or DVDs can also carry viruses if they have been infected with malicious software. USB mouse and Ethernet cabling are not locations where a virus can exist and infect a computer.

Submit
8. Which of the following is the BEST way to ensure that a hard drive is secure for disposal?

Explanation

Magnetically erasing the drive is the best way to ensure its security for disposal. This method completely wipes out all the data on the hard drive by using a powerful magnetic field to erase the magnetic particles that store the information. It is a more secure method than FDISK, format, or converting to FAT, as these methods can still leave traces of data that can potentially be recovered. Magnetically erasing the drive ensures that the data is permanently and irretrievably removed, making it the most effective way to protect sensitive information.

Submit
9. Which of the following cable types is required for a BNC connector?

Explanation

A BNC connector is commonly used with coaxial cables. Coaxial cables have a central conductor surrounded by an insulating layer, a metallic shield, and an outer insulating layer. The BNC connector is designed to provide a secure and reliable connection for coaxial cables, making it the required cable type for a BNC connector. STP, UDP, and fiber cables are not compatible with BNC connectors.

Submit
10. A 400GB IDE hard disk drive with a Molex connector uses how many volts?

Explanation

The Molex connector is commonly used for power supply in computer hardware, including hard disk drives. It provides a voltage of 12 volts, which is necessary to power the IDE hard disk drive. Therefore, the correct answer is 12.

Submit
11. Which of the following network types is the LEAST susceptible to EMI and RFI issues?

Explanation

Fiber optic networks are the least susceptible to EMI (Electromagnetic Interference) and RFI (Radio Frequency Interference) issues. This is because fiber optic cables use light to transmit data instead of electrical signals, making them immune to electromagnetic and radio frequency interference. Unlike other network types like Broadband, ADSL, and UTP Ethernet, which use electrical signals for data transmission, fiber optic cables provide a more secure and reliable connection by eliminating the potential for interference from external electromagnetic sources.

Submit
12. Which of the following is the purpose of a monitors degauss feature?

Explanation

The purpose of a monitor's degauss feature is to remove stray magnetic fields. Stray magnetic fields can cause distortion and discoloration on the screen, affecting the display quality. The degauss feature neutralizes these magnetic fields, restoring the monitor's proper functioning and ensuring a clear and accurate display.

Submit
13. Which of the following chipsets is responsible for controlling the data flow between the RAM and the processor?

Explanation

The Northbridge chipset is responsible for controlling the data flow between the RAM and the processor. It acts as a bridge connecting the CPU, memory, and graphics card. The Northbridge handles the faster communication between the CPU and RAM, allowing for efficient data transfer and improving overall system performance. The DMA (Direct Memory Access) is a technique used for data transfer between devices without involving the CPU, CMOS (Complementary Metal-Oxide-Semiconductor) is a type of memory used to store BIOS settings, and the Southbridge chipset is responsible for controlling the data flow between the CPU and other peripheral devices.

Submit
14. Which of the following technologies has the HIGHEST potential throughput?

Explanation

Fiber has the highest potential throughput compared to DSL, ADSL, and Ethernet. Fiber optic cables use light signals to transmit data, allowing for faster and more efficient data transfer. DSL and ADSL use traditional copper telephone lines, which have limitations in terms of speed and bandwidth. Ethernet, although widely used and reliable, also has lower potential throughput compared to fiber. Therefore, fiber technology offers the highest potential throughput among the given options.

Submit
15. Which of the following is the function of a power inverter?

Explanation

A power inverter is a device that converts alternating current (AC) to direct current (DC). It is commonly used in situations where DC power is required, such as in solar power systems or in vehicles to power electronic devices. By converting the AC power from a power source into DC power, the inverter allows for the safe and efficient use of DC-powered devices. Therefore, the function of a power inverter is to convert AC to DC.

Submit
16. Which of the following items is listed in the control panel of a Windows 7 PC?

Explanation

Device Manager is listed in the control panel of a Windows 7 PC. It is a management tool that allows users to view and control the hardware devices and drivers installed on their computer. It provides information about the status, properties, and resources of each device, as well as options to update, disable, or uninstall them. Device Manager is an essential tool for troubleshooting and managing the hardware components of a Windows 7 PC.

Submit
17. Which of the following is an advantage that a USB mouse has over a PS/2 mouse?

Explanation

A USB mouse can be hot swapped, which means it can be plugged in or unplugged from a computer while it is still powered on. This is an advantage because it allows for easy installation and removal of the mouse without having to restart the computer. In contrast, a PS/2 mouse requires the computer to be turned off before it can be plugged in or unplugged.

Submit
18. Which of the following locations will allow a user to change the Windows Vista Start Menu to resemble the Windows XP Start Menu?

Explanation

The correct answer is "Right-click Start Menu/Properties/Start Menu tab". This option allows the user to access the properties of the Start Menu in Windows Vista and make changes to its appearance. By right-clicking on the Start Menu, selecting Properties, and then navigating to the Start Menu tab, the user can customize the Start Menu to resemble the Windows XP Start Menu.

Submit
19. Which of the following memory modules uses a 168-pin connector?

Explanation

DDR memory modules use a 168-pin connector. SDRAM, DDR2, and DDR3 memory modules use different types of connectors.

Submit
20. Which of the following communication devices needs to have a subscription to a service provider for Internet access?

Explanation

Cellular WAN needs to have a subscription to a service provider for Internet access because it relies on cellular networks to connect to the Internet. Unlike Bluetooth, IR, and Microwave LAN, which are short-range communication technologies, Cellular WAN uses mobile networks to access the Internet, requiring a subscription to a service provider to establish and maintain the connection.

Submit
21. Which of the following services processes print requests and sends them to the printer?

Explanation

The correct answer is Print Spooler. The print spooler is a service that manages print requests and sends them to the printer. It acts as an intermediary between the computer and the printer, allowing multiple print jobs to be queued and processed in the background. This helps to improve efficiency by allowing users to continue working while the print jobs are being processed. The print spooler also handles any errors or issues that may occur during the printing process.

Submit
22. Which of the following printer types requires the use of toner?

Explanation

Laser printers require the use of toner. Toner is a powder-like substance that is used in laser printers to create images and text on the paper. The toner is transferred onto the paper using a combination of heat and static electricity. This process allows for high-quality and precise printing. Thermal printers, on the other hand, use heat to create images and do not require toner. Impact printers and dot matrix printers use ink or ribbons to create images on the paper.

Submit
23. A user reports that their machine will not power up. The technician has already tested the wall outlet and the power cord, which are functioning properly.Which of the following should the technician do NEXT?

Explanation

The technician should test the machine with a power supply tester next. Since the wall outlet and power cord have already been tested and found to be functioning properly, the issue is likely with the power supply within the machine itself. By using a power supply tester, the technician can determine if the power supply is faulty and needs to be replaced. This step will help narrow down the cause of the problem and guide the technician in resolving the issue.

Submit
24. A technician is upgrading a desktop with the largest storage medium available. Which of the following drives is installed?

Explanation

The correct answer is Magnetic Storage Drive. This is because magnetic storage drives are known for their large storage capacity compared to other options listed. Tape drives and FDDs (Floppy Disk Drives) are older and less commonly used storage mediums with smaller capacities. SD cards, although portable and widely used, typically have smaller storage capacities compared to magnetic storage drives. Therefore, it is logical to assume that the technician would choose the largest storage medium available, which is a magnetic storage drive.

Submit
25. A user reports that their computer seems to be running slow and frequently reboots on its own. Which of the following is the FIRST thing the technician should check to address this issue?

Explanation

The technician should check for newly installed software on the system as it could be causing the computer to run slow and reboot frequently. New software installations can sometimes conflict with existing software or have high system requirements that the computer may not meet. By checking for newly installed software, the technician can identify any potential issues and troubleshoot accordingly.

Submit
26. Which of the following cable types uses an RJ-45 connector and is MOST commonly used in an Ethernet network?

Explanation

UTP (Unshielded Twisted Pair) cable uses an RJ-45 connector and is the most commonly used cable type in an Ethernet network. UTP cables consist of four pairs of twisted wires, which help to reduce electromagnetic interference and crosstalk. The RJ-45 connector is specifically designed to connect UTP cables to network devices, such as computers, switches, and routers. UTP cables are cost-effective, easy to install, and can support various Ethernet speeds, making them the preferred choice for Ethernet networks.

Submit
27. Which of the following is the native resolution of a WUXGA monitor?

Explanation

The native resolution of a WUXGA monitor is 1920 X 1200. Native resolution refers to the maximum resolution at which a monitor can display images without distortion or stretching. In the case of a WUXGA monitor, it has a resolution of 1920 pixels horizontally and 1200 pixels vertically, resulting in a widescreen display with a 16:10 aspect ratio.

Submit
28. Which of the following is indicated by repetitive flashing lights on a keyboard at POST?

Explanation

Repetitive flashing lights on a keyboard at POST indicate a hardware error. During the Power-On Self-Test (POST), the computer checks the hardware components to ensure they are functioning correctly. If there is a hardware error, such as a faulty keyboard connection or a malfunctioning key, the keyboard may flash lights repeatedly to alert the user of the issue. This can help in identifying and troubleshooting the hardware problem before the operating system loads.

Submit
29. Which of the following printer types uses a charged corona wire in the printing process?

Explanation

A laser printer uses a charged corona wire in the printing process. The corona wire is responsible for creating an electrostatic charge on the drum, which attracts the toner particles. These charged particles are then transferred onto the paper to create the desired image or text. This process allows for precise and high-quality printing, making laser printers popular in professional settings.

Submit
30. The smallest unit of data that a Windows operating system can access is called a:

Explanation

A file is the smallest unit of data that a Windows operating system can access. It is a collection of related information or data that is stored and organized together. Files can contain text, images, videos, or any other type of data. They are used to store and retrieve information on a computer system.

Submit
31. A technician is installing an old Windows 2000 application on a Windows 7 workstation. Which of the following will allow the application to be installed correctly?

Explanation

Installing the old Windows 2000 application in compatibility mode allows it to be installed correctly on the Windows 7 workstation. Compatibility mode enables the application to run using settings from an earlier version of Windows, in this case, Windows 2000. This ensures that any compatibility issues or incompatibilities between the application and the newer operating system are addressed, allowing the application to function properly on the Windows 7 workstation.

Submit
32. Setting an administrator password in the BIOS will accomplish which of the following?

Explanation

Setting an administrator password in the BIOS will prevent a user from rearranging boot devices. This means that unauthorized users will not be able to change the order in which the computer's operating system and other software are loaded during startup. This can be an important security measure as it ensures that only authorized individuals can control the boot process and potentially prevent unauthorized access or tampering with the system.

Submit
33. Which of the following is a standard that supports speeds of up to 480Mbps?

Explanation

USB ver 2 is the correct answer because it is a standard that supports speeds of up to 480Mbps. This version of USB, also known as USB 2.0, was introduced in April 2000 and is capable of faster data transfer rates compared to the earlier USB 1.1 standard. USB 2.0 is widely used for connecting various devices such as printers, external hard drives, and cameras to computers, offering faster and more efficient data transfer.

Submit
34. Which of the following BEST describes the differences between a switch and a router?

Explanation

A switch is used to connect devices on the same network so that they can communicate with each other. On the other hand, a router is used to connect one or more networks together. Therefore, the correct answer accurately describes the main differences between a switch and a router.

Submit
35. Which of the following allows a user to permanently disable a hardware device?

Explanation

Device Manager allows a user to permanently disable a hardware device. It is a Windows utility that allows users to view and control the hardware devices connected to their computer. By accessing Device Manager, users can disable a specific hardware device, preventing it from functioning or being recognized by the system. This can be useful in situations where a hardware device is malfunctioning or causing conflicts, and the user wants to permanently disable it to avoid further issues.

Submit
36. A user reports their laptop has just been powered on and there is no display, but the power indicator is still on.The technician suspects that the laptop display is bad.Which of the following troubleshooting steps should be performed to confirm the display is bad?

Explanation

To confirm if the laptop display is bad, the technician should plug an external monitor into the video output port and then use the Fn-toggle key several times. This troubleshooting step will help determine if the issue lies with the laptop's display or with other components. By connecting an external monitor, if the display appears on the external monitor but not on the laptop screen, it indicates that the laptop display is faulty.

Submit
37. Which of the following properties of a heat sink has the GREATEST affect on heat dispersion?

Explanation

Surface area has the greatest effect on heat dispersion in a heat sink. A larger surface area allows for more contact between the heat sink and the surrounding air, facilitating better heat transfer. This increased surface area allows for more efficient cooling, as more heat can be dissipated into the environment. Therefore, the greater the surface area of a heat sink, the more effective it will be at dispersing heat.

Submit
38. Which of the following wireless technologies, (802.11); has the FASTEST transfer rate?

Explanation

The correct answer is "n". In wireless technologies, 802.11n has the fastest transfer rate compared to 802.11b and 802.11a. 802.11n operates on both the 2.4GHz and 5GHz frequency bands, providing higher data rates and improved range. It also supports multiple-input multiple-output (MIMO) technology, which allows for the use of multiple antennas to increase data throughput. This makes 802.11n ideal for applications that require high-speed and reliable wireless connections, such as streaming HD videos or online gaming.

Submit
39. Which of the following is commonly used for RS-232 connections?

Explanation

DB-9 is commonly used for RS-232 connections. RS-232 is a standard for serial communication between devices. DB-9 refers to a 9-pin D-subminiature connector, which is the most common type of connector used for RS-232 connections. It provides a simple and reliable connection for transmitting data between devices such as computers, modems, and serial printers. Parallel, USB, and DB-15 are not commonly used for RS-232 connections.

Submit
40. Which of the following can be disabled to help prevent access to a wireless network?

Explanation

Disabling SSID Broadcast can help prevent access to a wireless network. When the SSID (Service Set Identifier) is broadcasted, it allows nearby devices to easily detect and connect to the network. By disabling this broadcast, the network becomes hidden and users need to manually enter the SSID to connect. This adds an extra layer of security as it makes the network less visible to potential attackers.

Submit
41. The portion of a disk or drive that contains the MBR is known as the:

Explanation

The boot sector is the portion of a disk or drive that contains the Master Boot Record (MBR). The MBR is a small program that is executed when a computer starts up, and it is responsible for locating and loading the operating system. Therefore, the correct answer is Boot Sector.

Submit
42. Which of the following slots is used for a graphics card?

Explanation

AGP (Accelerated Graphics Port) is the correct answer because it is specifically designed for connecting a graphics card to a computer's motherboard. AGP provides a faster data transfer rate compared to other slots like AMR, SCSI, and CNR, making it ideal for handling the high bandwidth requirements of graphics cards. AMR (Audio Modem Riser) is used for audio and modem cards, SCSI (Small Computer System Interface) is used for connecting external storage devices, and CNR (Communication and Networking Riser) is used for networking and audio devices.

Submit
43. In order to perform a network installation of Windows, which of the following MUST be supported by the computers network interface?

Explanation

PXE (Preboot Execution Environment) is a protocol that allows a computer to boot from a network. In order to perform a network installation of Windows, the computer's network interface must support PXE. This protocol enables the computer to connect to a network server and download the necessary files for the installation process. Without PXE support, the computer would not be able to boot from the network and perform the installation.

Submit
44. A laptop docking station will enable a user to do which of the following?

Explanation

A laptop docking station is a device that allows a user to connect multiple peripherals, such as a monitor, keyboard, mouse, and external storage devices, to a laptop. By connecting these peripherals to the docking station, the user can easily use them all from one central device, enhancing productivity and convenience. This eliminates the need to constantly plug and unplug individual peripherals directly into the laptop, making it easier to switch between different setups or workspaces.

Submit
45. Which of the following will dissipate heat MOST efficiently?

Explanation

Liquid cooling is the most efficient method for dissipating heat because it involves circulating a liquid coolant, usually water or a specialized coolant, through a system to absorb heat from the components and then dissipate it through a radiator. This method allows for better heat transfer and can handle higher heat loads compared to other options like fans, thermal paste, or air coolers. Liquid cooling is commonly used in high-performance systems, such as gaming PCs or servers, where heat dissipation is crucial to maintain optimal performance and prevent overheating.

Submit
46. The user reports to the help desk that a UPS trips the internal circuit breaker each time the laser printer is powered on. The technician should do which of thefollowing?

Explanation

The correct answer is to move the printer's power cable to a surge only socket. This is because the UPS is tripping the internal circuit breaker when the laser printer is powered on, indicating that there may be a power surge causing the issue. By connecting the printer to a surge only socket, the surge protector can help prevent any power surges from affecting the UPS and tripping the circuit breaker. This solution addresses the specific problem reported by the user and does not require replacing the printer or ordering a different UPS.

Submit
47. Which of the following cable types are rated for Gigabit Ethernet? (Select TWO).

Explanation

Cat 5e and Cat 6 cables are rated for Gigabit Ethernet. These cable types have the necessary specifications to support data transfer speeds of up to 1000 Mbps, which is required for Gigabit Ethernet. Cat 3 and Cat 7 cables, on the other hand, do not meet the required specifications and are not rated for Gigabit Ethernet.

Submit
48. Which of the following components are included in a typical laser printer maintenance kit? (Select THREE).

Explanation

A laser printer maintenance kit typically includes the fuser, paper pickup roller, and transfer roller. The fuser is responsible for melting the toner onto the paper, the paper pickup roller feeds the paper into the printer, and the transfer roller transfers the toner from the drum onto the paper. These components are essential for the proper functioning and maintenance of a laser printer. The duplexer is not typically included in a maintenance kit as it is an optional component used for double-sided printing. The drum kit is also not included in a maintenance kit as it is a separate component that may need to be replaced periodically.

Submit
49. Which of the following are the BEST means of ensuring that data is not lost? (Select TWO).

Explanation

Deploying a RAID system and performing regular backups are the best means of ensuring that data is not lost. A RAID system provides redundancy by distributing data across multiple drives, so if one drive fails, the data can still be accessed from the other drives. Regular backups create copies of the data that can be restored in case of data loss or corruption. By combining these two measures, the risk of data loss is minimized as there are multiple layers of protection in place.

Submit
50. The highest quality video will generally be obtained using which of the following connector types?

Explanation

HDMI (High-Definition Multimedia Interface) is the correct answer because it is a digital connector that supports high-quality video and audio signals. It is capable of transmitting uncompressed video and audio data, resulting in a higher quality video output compared to other connector types like VGA, SVGA, and EGA, which are analog connectors. HDMI also supports higher resolutions and can transmit both audio and video signals through a single cable, making it the preferred choice for high-quality video connections.

Submit
51. Which of the following bus slots would provide the HIGHEST potential performance for a video card?

Explanation

PCIe (Peripheral Component Interconnect Express) would provide the highest potential performance for a video card. PCIe is the latest and fastest bus slot technology, specifically designed for high-speed communication between the motherboard and peripheral devices. It offers significantly higher bandwidth and data transfer rates compared to older bus slots like AGP (Accelerated Graphics Port) and PCI (Peripheral Component Interconnect). SCSI (Small Computer System Interface) is not a bus slot but rather a technology used for connecting storage devices.

Submit
52. A technician wants to setup a network printer on a print server to default to duplex printing for all users. Which of the following will allow default duplex printing?

Explanation

The correct answer is to configure the settings through the printer's web interface. This is because the web interface allows for more advanced configuration options, including setting default printing preferences such as duplex printing. The other options listed do not typically provide the same level of control over printer settings.

Submit
53. Which of the following connectors is used for musical equipment?

Explanation

MIDI (Musical Instrument Digital Interface) is a standard protocol used for connecting and communicating between musical equipment such as keyboards, synthesizers, and computers. It allows for the transmission of musical data, such as notes, control signals, and timing information, between different devices. MIDI connectors are commonly used in the music industry for connecting instruments and equipment together, enabling them to work together and exchange information. USB, PS/2, and DVI connectors are not specifically designed for musical equipment and serve different purposes in computer and audiovisual systems.

Submit
54. A remote user is disconnected from the network for long periods of time and does not have a local printer. The laptop is configured to queue up the print jobs whenthe computer is connected to the network. Once plugged into the network, the user cannot print and the print jobs seem to be stuck in the queue. Which of thefollowing needs to be done so the user can print?

Explanation

The correct answer is to set the printer to work online. This is because the user is disconnected from the network for long periods of time and the laptop is configured to queue up print jobs. When the user plugs into the network, the print jobs should be sent to the printer. However, if the printer is set to offline mode, it will not receive the print jobs. By setting the printer to work online, the user will be able to print the queued jobs.

Submit
55. Which of the following should be used when cleaning toner inside a laser printer?

Explanation

Rubber gloves should be used when cleaning toner inside a laser printer to protect the hands from coming into direct contact with the toner. Toner can be harmful if it gets on the skin or is inhaled. Rubber gloves provide a barrier between the toner and the skin, preventing any potential harm. Using rubber gloves also helps to maintain cleanliness and prevent any smudges or fingerprints on the printer components.

Submit
56. Fingerprint readers are an example of which of the following security technologies?

Explanation

Fingerprint readers are a type of security technology that falls under the category of biometric systems. Biometrics refers to the use of unique physical or behavioral characteristics, such as fingerprints, iris patterns, or voice recognition, to verify the identity of an individual. Fingerprint readers specifically rely on scanning and matching the unique patterns present on an individual's fingertips to grant access or authenticate their identity. Therefore, the correct answer is Biometric.

Submit
57. Which of the following video adapter supports a potential MAXIMUM throughput of 4Gbps?

Explanation

PCIe (Peripheral Component Interconnect Express) is the correct answer because it is a high-speed serial computer expansion bus standard that supports a potential maximum throughput of 4Gbps. PCIe is commonly used for connecting video cards and other high-bandwidth devices to the motherboard of a computer.

Submit
58. Which of the following MOST accurately describes the relationship between ATX and micro-ATX boards?

Explanation

Both ATX and micro ATX boards will fit in an ATX case. This means that an ATX case can accommodate both ATX and micro ATX boards, providing flexibility in terms of motherboard options for the user.

Submit
59. A new printer driver has just been installed on a desktop computer. Which of the following is the correct location to find the Print Test Page button?

Explanation

The correct location to find the Print Test Page button is on the General tab of the properties page of the printer.

Submit
60. Which of the following drive connections uses a ribbon cable with a 40-pin connector? (Select TWO).

Explanation

IDE and PATA both use a ribbon cable with a 40-pin connector. IDE (Integrated Drive Electronics) is a standard interface for connecting storage devices such as hard drives and CD/DVD drives to a computer. PATA (Parallel ATA) is the older version of IDE, which uses parallel signaling to transfer data between the storage device and the computer. Both IDE and PATA drives require a ribbon cable with a 40-pin connector to connect to the motherboard.

Submit
61. A user is trying to use their laptop with a video projector and cannot get the projector to display the computer screen.Which of the following should the technician try FIRST?

Explanation

The technician should try toggling the function key for the display in the laptop keyboard first. This is because the function key is responsible for switching between different display modes on a laptop, such as extending the display to an external monitor or projector. By toggling the function key, the technician can ensure that the laptop is set to display the screen on the projector. Checking the power cable, replacing the bulb, or replacing the video cable would be secondary troubleshooting steps if toggling the function key does not solve the issue.

Submit
62. Which of the following is characterized by the creation of a secure tunnel into a known server location?

Explanation

A VPN (Virtual Private Network) is characterized by the creation of a secure tunnel into a known server location. It allows users to securely access and transmit data over public networks by encrypting the connection between the user's device and the server. This ensures that the data remains confidential and protected from unauthorized access. VPNs are commonly used to establish secure connections for remote access to corporate networks or to browse the internet privately and securely.

Submit
63. Which of the following speeds is the maximum transmission rate of the USB 2.0 interface?

Explanation

The maximum transmission rate of the USB 2.0 interface is 480Mbps. This speed is the correct answer because USB 2.0 has a maximum data transfer rate of 480 megabits per second, which is equivalent to 60 megabytes per second. It is important to note that USB 2.0 is an older version of the USB interface, and newer versions like USB 3.0 and USB 3.1 offer faster speeds.

Submit
64. Which of the following is the MAXIMUM number of primary partitions that can exist on a physical hard drive?

Explanation

The maximum number of primary partitions that can exist on a physical hard drive is 4. This is because the Master Boot Record (MBR) partitioning scheme, which is commonly used on most PC systems, allows for a maximum of 4 primary partitions. If more partitions are needed, an extended partition can be created within one of the primary partitions, which can then be divided into logical partitions to create additional storage areas. However, when considering only primary partitions, the maximum is 4.

Submit
65. Which type of connector is required for a coaxial network cable?

Explanation

A BNC connector is required for a coaxial network cable. BNC stands for Bayonet Neill-Concelman and is a type of connector commonly used in video and networking applications. It is designed to provide a secure and reliable connection for coaxial cables, ensuring proper transmission of signals. BNC connectors are known for their ease of use, as they can be quickly and securely connected or disconnected with a simple twist-lock mechanism.

Submit
66. Which of the following broadband technologies would typically have a different uplink and downlink speed?

Explanation

ADSL (Asymmetric Digital Subscriber Line) is a broadband technology that typically has a different uplink and downlink speed. It is called "asymmetric" because the download speed is usually faster than the upload speed. This is because ADSL is designed to cater to the needs of typical internet users who primarily consume content rather than upload large amounts of data. The higher download speed allows for faster web browsing, video streaming, and downloading files, while the lower upload speed is sufficient for sending emails and other smaller uploads.

Submit
67. A technician's company prints forms on multi-layer carbonless copy paper.When asked to replace the printer, which of the following printing technologies will allowthe technician to continue to use the company's copy paper?

Explanation

Dot Matrix printing technology will allow the technician to continue using the company's multi-layer carbonless copy paper. Dot Matrix printers use impact printing, where a print head strikes an ink-soaked ribbon against the paper, creating dots that form characters and images. This technology does not require special paper and can work with the multi-layer carbonless copy paper. Inkjet, Laser Jet, and Thermal printing technologies may require specific types of paper or coatings, which may not be compatible with the company's copy paper.

Submit
68. Which of the following occurs during POST?

Explanation

During the Power-On Self-Test (POST), the computer performs a RAM check. This is a diagnostic process that verifies the integrity and functionality of the computer's random access memory (RAM). The RAM check ensures that the computer's memory is working properly and can be accessed by the operating system. It helps identify any issues with the RAM, such as faulty modules or incorrect configurations, before the computer proceeds to load the operating system.

Submit
69. A duplexer unit has been added to an existing laser printer.The printer prints normally but it will not print on both sides of the paper.Which of the following is the FIRST action a technician should take when addressing this issue?

Explanation

The first action a technician should take when addressing the issue of the printer not printing on both sides of the paper is to check the configuration settings of the printer for duplex enabled. By checking the configuration settings, the technician can verify if the duplex printing option is enabled or disabled. If it is disabled, the technician can enable it, allowing the printer to print on both sides of the paper. This step should be taken before exploring other potential causes such as known problems with the duplexer unit, firmware updates, or recreating the printer queue.

Submit
70. Which of the following storage resources gives the ability to hold the LARGEST amount of data?

Explanation

The DLT Tape gives the ability to hold the largest amount of data compared to the other storage resources mentioned. DLT (Digital Linear Tape) is a magnetic tape storage technology that offers high capacity and fast data transfer rates. It is commonly used for backup and archiving purposes in large-scale data storage systems. SD cards, Blu-ray discs, and DVDs have comparatively smaller storage capacities than DLT Tapes.

Submit
71. Which of the following options is the BEST way to fix a CRT monitor that has suffered from magnetic interference?

Explanation

Performing a degauss is the best way to fix a CRT monitor that has suffered from magnetic interference. Degaussing involves using a degaussing coil or a built-in degaussing feature on the monitor to demagnetize the screen. This helps to eliminate any magnetic fields that may have caused distortion or discoloration on the screen. Removing all wiring, replacing the power cord, or replacing the video cable may not address the magnetic interference issue and may not effectively fix the problem.

Submit
72. A new device is installed on a machine and some of its features are not working correctly. Which of the following should be updated?

Explanation

When a new device is installed on a machine and some of its features are not working correctly, the most likely cause is outdated or incompatible device drivers. Device drivers are software programs that allow the operating system to communicate with and control the hardware devices. If the device drivers are not updated to the latest version or are incompatible with the new device, it can result in malfunctioning or non-functional features. Therefore, updating the device drivers is the correct solution to fix the problem.

Submit
73. Which of the following printers needs a fuser installed?

Explanation

A laser printer needs a fuser installed because it uses heat to fuse toner onto the paper. The fuser is a component that applies heat and pressure to melt the toner and bond it to the paper, resulting in a permanent image. Without a fuser, the toner would not adhere properly to the paper, leading to smudging and poor print quality. Inkjet printers, on the other hand, do not require a fuser as they use liquid ink that dries on the paper without the need for heat. Impact and thermal printers also do not require a fuser as they use different printing mechanisms.

Submit
74. The user boots their computer in the morning to discover the message OS not found . Which of the following would recover from that error without data loss?

Explanation

Inserting the system boot disk and repairing the operating system would recover from the "OS not found" error without data loss. This is because the boot disk contains the necessary files and tools to repair any issues with the operating system. By inserting the boot disk and following the repair process, the user can fix any errors that may have caused the operating system to not be found, without losing any data on the computer.

Submit
75. Which of the following defines the protocol associated with the following TCP or UDP port numbers, in order? 21, 23, 25, 69, 443

Explanation

The given TCP or UDP port numbers correspond to the following protocols in order: 21 (FTP), 23 (TELNET), 25 (SMTP), 69 (TFTP), and 443 (HTTPS). Therefore, the correct answer is FTP, TELNET, SMTP, TFTP, HTTPS.

Submit
76. Keyboard errors are MOST often caused by which of the following problems? (Select TWO).

Explanation

Keyboard errors are most often caused by jammed keys and faulty cable connections. Jammed keys can occur due to dirt, debris, or physical damage, which can prevent the key from registering when pressed. Faulty cable connections can cause intermittent or complete loss of keyboard functionality. Software drivers and BIOS settings can also cause keyboard errors, but they are less common compared to jammed keys and faulty cable connections.

Submit
77. Which of the following will allow the use of BitLocker if the computer does not have a TPM chip?

Explanation

A USB Flash Drive can be used to enable BitLocker on a computer that does not have a TPM chip. BitLocker is a security feature in Windows that encrypts the data on the computer's hard drive. Normally, BitLocker requires a TPM chip, which is a hardware component that securely stores encryption keys. However, if a computer does not have a TPM chip, BitLocker can be configured to use a USB Flash Drive as a substitute for the TPM chip. The USB Flash Drive acts as a storage device for the encryption keys, allowing BitLocker to function without a TPM chip.

Submit
78. Which of the following commands can be used to verify the gateway IP address on a local computer?

Explanation

The command "ipconfig" can be used to verify the gateway IP address on a local computer. This command displays the IP configuration settings of all network interfaces on the computer, including the gateway IP address. By running the "ipconfig" command, the user can easily identify the gateway IP address and verify its correctness.

Submit
79. Which of the following memory types has a clock speed of 400MHz?

Explanation

PC3200 has a clock speed of 400MHz. The "PC" in the memory type refers to the type of DDR (Double Data Rate) memory, and the number that follows represents the maximum bandwidth in megabytes per second. PC3200 specifically has a maximum bandwidth of 3200 megabytes per second, which translates to a clock speed of 400MHz.

Submit
80. Which of the following will enable a technician to easily identify a connection for each device?

Explanation

Cable management refers to the organization and arrangement of cables in a neat and efficient manner. By properly managing cables, a technician can easily identify the connection for each device. This involves labeling cables, using color-coded cables, and arranging them in a logical order. This ensures that each cable is easily identifiable, reducing the chances of confusion or mistakes when connecting devices.

Submit
81. Which of the following RAID arrays does only striped volumes?

Explanation

RAID 0 is the correct answer because it is the only RAID array that uses only striped volumes. In RAID 0, data is divided into blocks and distributed across multiple drives, which allows for improved performance by reading and writing data simultaneously from multiple drives. However, RAID 0 does not provide any redundancy or fault tolerance, meaning that if one drive fails, all data is lost. Therefore, RAID 0 is primarily used for applications where performance is prioritized over data protection.

Submit
82. Which of the following connections must be paired FIRST with the device before use?

Explanation

Bluetooth must be paired first with the device before use. Bluetooth is a wireless technology that allows devices to connect and communicate with each other. In order for two Bluetooth-enabled devices to communicate, they must first be paired. Pairing involves establishing a secure connection between the devices by exchanging encryption keys. Once paired, the devices can then communicate and share data wirelessly. Therefore, Bluetooth is the connection that must be paired first with the device before it can be used.

Submit
83. When a PC is turned on, which of the following tests the CPU, memory, chipset, video adapter, disk controllers, disk drives, and keyboard?

Explanation

POST (Power-On Self Test) is a diagnostic process that tests various hardware components of a computer system when it is turned on. It checks the CPU, memory, chipset, video adapter, disk controllers, disk drives, and keyboard for any errors or malfunctions. This test ensures that all the essential hardware components are functioning properly before the operating system is loaded. It helps in identifying and troubleshooting any hardware issues that may prevent the computer from starting up or functioning correctly.

Submit
84. Which of the following connectors allows both audio and video to pass through them?

Explanation

HDMI (High-Definition Multimedia Interface) is the correct answer because it is a connector that supports both audio and video signals. HDMI cables are commonly used to connect devices such as TVs, computers, and gaming consoles to transmit high-quality audio and video signals. VGA (Video Graphics Array), DVI (Digital Visual Interface), and RGB (Red Green Blue) are connectors that only support video signals and require separate audio connectors.

Submit
85. A user reports that they are suddenly unable to print to a network printer.It was working fine yesterday.The technician can ping the users workstation and theprinter.The technician can also print a test page from another workstation.Which of the following is the MOST likely cause of the problem?

Explanation

The most likely cause of the problem is that the printer is no longer the user's default printer. This could explain why the user is suddenly unable to print to the network printer, even though it was working fine yesterday. The fact that the technician can ping the user's workstation and the printer, as well as print a test page from another workstation, suggests that the network connection and printer functionality are not the issue. Therefore, it is more likely that the user's default printer setting has been changed, causing the problem.

Submit
86. Which of the following should a technician do to protect exposed hardware from ESD?

Explanation

To protect exposed hardware from ESD (electrostatic discharge), a technician should touch a piece of metal to discharge any static electricity. This is because metal is a conductor and can effectively dissipate static charges. By grounding oneself by touching a piece of metal, any built-up static electricity is safely discharged, reducing the risk of damaging the hardware.

Submit
87. How can a user open a .zip file in Windows 7?

Explanation

To open a .zip file in Windows 7, the user can simply double click the folder or file. This action will automatically extract the contents of the .zip file and display them in a new window. No additional software or tools are required to open .zip files in Windows 7, as the operating system has built-in support for this file format.

Submit
88. Which of the following would be used to record off-air TV programs?

Explanation

A capture card would be used to record off-air TV programs. A capture card is a hardware device that allows you to connect your TV or cable box to your computer, enabling you to record and save TV programs directly onto your computer's hard drive. This is a common method used by individuals who want to record their favorite TV shows or movies for later viewing. Capture cards typically have inputs for connecting the TV or cable box, and outputs for connecting to the computer. They also often come with software that allows you to control the recording and playback of the captured content.

Submit
89. The operation of mapping an IP address to a host name is handled by which of the following?

Explanation

The operation of mapping an IP address to a host name is handled by DNS (Domain Name System). DNS is a system that translates domain names (such as www.example.com) into IP addresses (such as 192.0.2.1) so that computers can communicate with each other over the internet. It acts as a directory that allows users to access websites and other resources using easy-to-remember domain names instead of complex IP addresses. DNS ensures that when a user enters a domain name in their web browser, it can locate the corresponding IP address and establish a connection to the correct server.

Submit
90. Utilizing a WSUS or testing new updates on a non-critical PC is an example of which of the following?

Explanation

Utilizing a WSUS (Windows Server Update Services) or testing new updates on a non-critical PC is an example of patch management. Patch management involves the process of managing and applying updates, patches, and fixes to software and systems in order to keep them up to date and secure. By using a WSUS or testing updates on a non-critical PC, an organization can ensure that updates are tested and deployed effectively, minimizing the risk of disruptions or vulnerabilities in critical systems.

Submit
91. A customer with a laptop frequently goes into the office to work.However, the laptop only has two USB ports, and they are unable to connect their keyboard,mouse, monitor and scanner at the same time.Which of the following devices would BEST address this issue?

Explanation

A docking station would best address this issue because it provides additional ports and connections for the laptop. With a docking station, the customer can easily connect their keyboard, mouse, monitor, and scanner simultaneously, without the need for multiple USB ports. This allows for a more efficient and convenient workspace setup.

Submit
92. Multiple users report that the network color printer is not printing in color, but only in monochrome.The technician knows the print server had maintenance done over the weekend that included driver updates.The NEXT action would be to:

Explanation

The correct answer is to check the printer properties on the server. This is because the technician knows that driver updates were done on the print server, which could have caused the issue. By checking the printer properties on the server, the technician can ensure that the correct settings are in place for color printing and make any necessary adjustments.

Submit
93. Secure socket layer communications take place on which of the following ports?

Explanation

Secure socket layer (SSL) communications take place on port 443. SSL is a protocol that provides secure communication over a computer network. It encrypts the data transmitted between a client and a server, ensuring that it remains private and cannot be intercepted or tampered with by unauthorized individuals. Port 443 is the default port for HTTPS (HTTP secure), which is the secure version of the HTTP protocol used for secure communication on the internet.

Submit
94. Which of the following cable types supports a transmission speed no greater than 100 Mbps per the IEEE specification?

Explanation

CAT5 is the correct answer because it supports a transmission speed no greater than 100 Mbps, as per the IEEE specification. CAT2, CAT1, and CAT3 do not meet this requirement as they have lower transmission speeds.

Submit
95. A technician finds the inside of a desktop computer completely covered in almost 1 inch (2.54 centimeters) of dust. Which of the following would be the BESTsolution to clean out the inside of the case?

Explanation

Compressed air would be the best solution to clean out the inside of the case because it can effectively remove dust from hard-to-reach areas without causing any damage to the components. A wet cloth or dry rag may not be able to reach all the nooks and crannies inside the case, and using them could also introduce moisture or static electricity, which can harm the delicate electronic parts. A lint-free cloth may be useful for wiping down the exterior of the case, but it may not be sufficient for removing the thick layer of dust inside.

Submit
96. Which of the following device cards goes into an AGP slot on a computer system board?

Explanation

An AGP slot on a computer system board is specifically designed to accommodate a video card. This slot allows for high-speed communication between the video card and the computer's processor, enabling smooth and efficient video processing and display. Therefore, the correct answer is Video.

Submit
97. Which of the following RAM types is used to resolve certain memory errors?

Explanation

ECC (Error Correcting Code) RAM is used to resolve certain memory errors. It is designed to detect and correct single-bit errors that occur during data storage or transmission. ECC RAM includes additional bits for error detection and correction, allowing it to identify and fix errors automatically. This type of RAM is commonly used in servers and critical systems where data integrity is crucial. Non-ECC RAM, on the other hand, does not have error correction capabilities and is more commonly used in consumer-grade computers where data integrity is not as critical.

Submit
98. Which of the following adapter types would provide the BEST performance for high end graphics?

Explanation

AGP (Accelerated Graphics Port) would provide the best performance for high-end graphics. It is specifically designed to handle the demands of graphics-intensive applications and provides a dedicated pathway between the graphics card and the system's memory, allowing for faster data transfer rates. This dedicated connection and optimized design make AGP more efficient and capable of delivering superior graphics performance compared to other adapter types like PCI, ACPI, and EISA.

Submit
99. A first level help desk support technician receives a call from a customer and works with the customer to resolve the call for several minutes unsuccessfully.Which of the following should the technician do NEXT?

Explanation

The technician should escalate the call to another technician because they have already spent several minutes unsuccessfully trying to resolve the issue. By escalating the call, the technician can ensure that the customer receives the necessary support from someone with more expertise or experience in resolving the problem. This will help to provide a more efficient and effective resolution for the customer.

Submit
100. A technician has determined that there is constant interference from other wireless devices over the wireless network.Which of the following should the technician do FIRST to resolve the problem?

Explanation

To resolve the constant interference from other wireless devices over the wireless network, the technician should first change the channel being used by the wireless router. By changing the channel, the technician can avoid overlapping with other wireless networks and reduce interference. This will help improve the performance and stability of the wireless network.

Submit
101. Which of the following devices will allow a technician to use a single set of input devices on several computers?

Explanation

A KVM (Keyboard, Video, Mouse) switch is a device that allows a technician to use a single set of input devices (keyboard, monitor, and mouse) to control multiple computers. It allows the technician to switch between the computers without physically disconnecting and reconnecting the input devices. This is useful in situations where multiple computers need to be managed or accessed simultaneously, such as in a server room or a data center.

Submit
102. Which of the following provides data redundancy by writing data to two disks simultaneously?

Explanation

RAID 1 provides data redundancy by writing data to two disks simultaneously. In this configuration, the data is mirrored on both disks, ensuring that if one disk fails, the other disk can still provide the necessary data. This redundancy helps to protect against data loss and increases the overall reliability of the storage system.

Submit
103. A technician is trying to install an OS to a remote PC without the use of physical media. Which of the following is used to perform this task?

Explanation

The PXE Boot environment is used to install an operating system to a remote PC without the need for physical media. PXE (Preboot Execution Environment) allows the computer to boot from a network server rather than a local hard drive or CD/DVD. This enables the technician to remotely deploy the OS image to the PC over the network, making it a convenient and efficient method of installation.

Submit
104. A user reports that when trying to input data using a touch screen, items other than the ones being touched are displayed. Which of the following would be theFIRST action to take?

Explanation

The first action to take when a user reports that items other than the ones being touched are displayed on a touch screen is to ensure that the user has calibrated the screen. Calibration is the process of aligning the touch screen with the display, and if it is not properly calibrated, it can cause incorrect inputs and display of items. By ensuring that the user has calibrated the screen, any potential issues with misalignment can be identified and resolved, which may fix the problem of incorrect items being displayed on the touch screen.

Submit
105. Which of the following cable types uses an RJ-45 connector, and would MOST commonly be used in an environment with high EMI or RFI?

Explanation

STP (Shielded Twisted Pair) cable uses an RJ-45 connector and is designed to provide protection against electromagnetic interference (EMI) and radio frequency interference (RFI). It has a shielding layer that helps to minimize the impact of external electrical noise, making it suitable for environments with high EMI or RFI. UTP (Unshielded Twisted Pair) cable, on the other hand, does not have this shielding and is more susceptible to interference. F/O (Fiber Optic) and Co-axial cables are not typically used with an RJ-45 connector and do not provide the same level of protection against EMI or RFI.

Submit
106. Which of the following ports would Windows Firewall need to make an exception for in order to allow FTP access?

Explanation

Windows Firewall would need to make an exception for port 21 in order to allow FTP access. Port 21 is the standard port used for FTP (File Transfer Protocol) connections. By allowing traffic through this port, Windows Firewall would enable the FTP client and server to communicate and transfer files successfully.

Submit
107. Which of the following troubleshooting steps is NEXT after determining the cause?

Explanation

After determining the cause of the problem, the next step is to establish a plan of action to resolve the problem and implement the solution. This involves creating a systematic approach to address the issue and deciding on the necessary steps to fix it. By establishing a plan of action, the troubleshooting process becomes more organized and efficient, allowing for a more effective resolution of the problem. Implementing the solution involves executing the planned steps and making the necessary changes to resolve the issue.

Submit
108. The most effective use of clusters on a hard drive is in which of the following file systems?

Explanation

NTFS (New Technology File System) is the most effective file system for utilizing clusters on a hard drive. NTFS uses a more efficient allocation method for storing and organizing files, allowing for better disk space utilization and reduced fragmentation. It supports larger cluster sizes, which are beneficial for large files, and provides advanced features like file and folder permissions, encryption, and compression. In contrast, FAT32, exFAT, and FAT16 have limitations in terms of maximum file size, cluster size, and lack advanced features, making NTFS the preferred choice for efficient cluster usage.

Submit
109. Which of the following is the chipset used by the CPU to communicate with the system memory?

Explanation

The Northbridge is the correct answer because it is the chipset responsible for facilitating communication between the CPU and the system memory. It acts as a bridge, allowing data to be transferred quickly and efficiently between the two components. The Northbridge also handles other important tasks such as controlling the graphics card and connecting to the Southbridge chipset.

Submit
110. PC2700 memory runs at which of the following clock speeds?

Explanation

PC2700 memory runs at a clock speed of 333MHz. The "PC" in PC2700 stands for Personal Computer, while the number 2700 refers to the memory's bandwidth in megabytes per second. The PC2700 memory module is designed to operate at a clock speed of 333MHz, allowing for faster data transfer and improved system performance.

Submit
111. Which of the following adapter types will use a RJ-45 connector?

Explanation

A NIC (Network Interface Card) is the correct answer because it is the hardware component that allows a computer to connect to a network. It typically uses an RJ-45 connector, which is a standard connector for Ethernet cables. This connector is used to connect the NIC to a network switch or router using an Ethernet cable. On the other hand, HDD (Hard Disk Drive), Dial-up Modem, and Sound adapters do not use RJ-45 connectors for their connections.

Submit
112. Which of the following boot devices would a technician use for RIS?

Explanation

A technician would use the network as the boot device for RIS (Remote Installation Services). RIS allows for the installation of an operating system over a network connection, eliminating the need for physical media such as CDs or DVDs. By booting from the network, the technician can access the necessary installation files and initiate the remote installation process.

Submit
113. Which of the following ports is BEST to use when adding a network printer in Windows XP?

Explanation

The correct answer is TCP/IP because it is the most commonly used protocol for connecting devices to a network. When adding a network printer in Windows XP, using TCP/IP allows the computer to communicate with the printer over the network. This enables the printer to be accessed and shared by multiple users on the same network.

Submit
114. Which of the following IP addresses would a technician see if a computer is connected to a network device but is not receiving an IP address from the DHCPserver?

Explanation

If a computer is connected to a network device but is not receiving an IP address from the DHCP server, the technician would see the IP address 169.254.10.10. This is because when a device is unable to obtain an IP address through DHCP, it will automatically assign itself an IP address in the range of 169.254.0.0 to 169.254.255.255. This range is reserved for link-local addresses, which are used when a device cannot connect to a DHCP server or obtain an IP address through other means.

Submit
115. Which of the following technologies BEST refers to simultaneous data transfer in both directions?

Explanation

Full Duplex refers to a communication technology where data can be transferred simultaneously in both directions. This means that data can be sent and received at the same time, allowing for faster and more efficient communication. In contrast, Half Duplex only allows data to be transferred in one direction at a time. Ethernet Routing and Ethernet Switching are not specifically related to simultaneous data transfer in both directions.

Submit
116. Which of the following commands is BEST to use when testing remote connectivity to a host?

Explanation

Ping is the best command to use when testing remote connectivity to a host. Ping sends a small packet of data to the host and waits for a response. If the host responds, it indicates that there is a network connection and the host is reachable. Ping is a simple and effective tool for troubleshooting network connectivity issues. Tracert is used to trace the route packets take to reach a destination, Nslookup is used to query DNS servers for information about a domain, and nbstat is used to display NetBIOS over TCP/IP (NBT) information.

Submit
117. Which of the following protocols uses port 443, by default?

Explanation

HTTPS (Hypertext Transfer Protocol Secure) is the correct answer. It is a protocol that is used for secure communication over a computer network. It uses port 443 by default to establish a secure connection between a web browser and a web server. This ensures that the data transmitted between them is encrypted and cannot be easily intercepted or tampered with by unauthorized individuals. HTTP, SMTP, and SMB are not associated with port 443 by default.

Submit
118. A user reports an unusual amount of spam in their inbox. The technician should advise the user to do which of the following?

Explanation

Enabling the sender to the junk mail folder is the correct solution because it allows the user to filter out spam emails from the inbox. By adding the sender to the junk mail folder, future emails from that sender will automatically be redirected to the spam or junk folder, reducing the amount of spam in the user's inbox. This solution is more practical and efficient compared to switching ISP or uninstalling the email client, which may not directly address the issue of spam. Replying to all spam emails opting out of future emails is also not recommended as it may confirm the user's email address to spammers, resulting in more spam.

Submit
119. Which operating systems use the c:\WINNT\ directory?

Explanation

The c:\WINNT\ directory is used by Windows 2000 operating system. This directory is the default location for system files and folders in Windows 2000. Windows 7, Windows Vista, and Windows 98 use different directory structures and do not use the c:\WINNT\ directory.

Submit
120. Which of the following cable types is required to be fire-resistant and does not emit toxic fumes when exposed to high temperatures?

Explanation

Plenum cables are required to be fire-resistant and do not emit toxic fumes when exposed to high temperatures. Plenum cables are specifically designed for use in plenum spaces, which are areas in buildings used for air circulation. These spaces require cables that meet strict fire safety standards to prevent the spread of fire and the release of harmful fumes. Therefore, plenum cables are the correct choice for this requirement.

Submit
121. A user is unable to login to their laptop when away from the office. Which of the following is the MOST likely reason?

Explanation

When a user is away from the office and not connected to the network, their laptop needs to have their domain login credentials cached. This means that the laptop stores a copy of the user's login credentials so that they can still log in even when not connected to the network. Without cached credentials, the laptop would not be able to authenticate the user's login and they would be unable to log in to their laptop.

Submit
122. While checking the print queue, a technician determines that a print job at the top of the queue requires a paper size not loaded in the printer. Which of thefollowing is the BEST option to get the other print jobs to print until the issue can be resolved?

Explanation

Lowering the priority of the jammed print job is the best option because it allows the other print jobs to continue printing while the issue with the paper size is being resolved. By lowering the priority, the printer will prioritize the other jobs in the queue and continue printing them. This ensures that the other users do not have to resubmit their print jobs or delete all the print jobs in the queue. It also prevents forcing the job to print on the wrong paper size, which could cause further issues.

Submit
123. Which of the following is considered social engineering?

Explanation

Entering a facility by posing as a telecommunications contractor is considered social engineering because it involves manipulating people's trust and exploiting their vulnerabilities to gain unauthorized access to a secure location. By posing as a trusted contractor, the individual deceives the facility's staff and gains physical access to sensitive areas, potentially allowing them to steal valuable information or carry out malicious activities. This type of social engineering attack relies on psychological manipulation rather than technical means to breach security measures.

Submit
124. A technician needs to upgrade several Windows XP Professional 64-bit computers to Windows 7 Professional 64-bit. The technician wants to retain the usersettings.Which of the following tasks should the technician perform?

Explanation

To retain the user settings while upgrading from Windows XP Professional to Windows 7 Professional, the technician should first upgrade the 64-bit Windows XP Professional to 64-bit Windows VISTA Professional. Then, they should upgrade the 64-bit Windows VISTA Professional to 64-bit Windows 7 Professional. This two-step process ensures that the user settings are preserved during the upgrade process.

Submit
125. Which of the following would BEST optimize a computer that is heavily used?

Explanation

Defrag stands for defragmentation, which is the process of organizing and optimizing the files and data on a computer's hard drive. When a computer is heavily used, files and data can become fragmented and scattered across different sectors of the hard drive, leading to slower performance. By running a defrag, the computer's files are rearranged and consolidated, making them easier and faster to access. This helps to optimize the computer's performance and improve overall efficiency.

Submit
126. Which of the following is the MAXIMUM data rate of IEEE 1394?

Explanation

IEEE 1394, also known as FireWire, is a high-speed serial bus standard used for connecting devices such as computers, digital cameras, and external hard drives. The maximum data rate of IEEE 1394 is 200 Mbps. This means that it can transfer data at a maximum speed of 200 megabits per second.

Submit
127. Which of the following is an example of EMI?

Explanation

not-available-via-ai

Submit
128. Which of the following is the MAXIMUM partition size of a hard drive using the FAT32 file system in Windows XP?

Explanation

The maximum partition size of a hard drive using the FAT32 file system in Windows XP is 32 GB. This is because the FAT32 file system has a maximum file size limit of 4 GB and a maximum partition size limit of 32 GB. Therefore, any hard drive partition using the FAT32 file system in Windows XP cannot exceed 32 GB in size.

Submit
129. Which of the following explains what the wattage rating of a power supply determines?

Explanation

The wattage rating of a power supply determines the number of potential internal drives that can be supported. This is because different components in a computer system require different amounts of power to operate, and the power supply needs to be able to provide enough wattage to meet the demands of all the internal drives. Therefore, a higher wattage rating means that more internal drives can be connected and powered effectively.

Submit
130. Which of the following features is in Windows Vista but not Windows XP?

Explanation

UAC stands for User Account Control, which is a security feature introduced in Windows Vista. It helps to prevent unauthorized changes to the system by notifying the user and requiring their permission before allowing certain actions to be performed. This feature was not present in Windows XP, making it a feature exclusive to Windows Vista.

Submit
131. A technician observes that the lights in a customer's building flicker periodically during the course of the day.Which of the following should the technician recommend to protect the customer's equipment?

Explanation

A UPS (Uninterruptible Power Supply) should be recommended to protect the customer's equipment. A UPS provides backup power in the event of a power outage or fluctuation, ensuring a stable and uninterrupted power supply to the equipment. This will prevent any damage or data loss that may occur due to the flickering lights.

Submit
132. Which of the following is the difference between the clock speed and the bus speed of a CPU?

Explanation

The clock speed refers to the speed at which the CPU executes instructions and performs calculations internally. It determines how quickly the CPU can process data and perform tasks. On the other hand, the bus speed refers to the speed at which data is transferred between the CPU and other components, such as RAM and peripherals. It represents the maximum rate at which data can be transmitted on the bus. Therefore, the difference between the clock speed and the bus speed is that the clock speed is specific to the CPU's internal operations, while the bus speed relates to data transfer between the CPU and other components.

Submit
133. Which of the following is a unique characteristic of a dual-core processor vs. a single-core processor?

Explanation

A dual-core processor is unique because it has two cores, which are essentially two separate processing units, on the same physical chip. Additionally, each core has its own cache, which allows for faster access to frequently used data. This design improves the processor's multitasking capabilities and overall performance compared to a single-core processor, which only has one processing unit.

Submit
134. An AMR slot is generally used with which of the following interface card types?

Explanation

An AMR slot is generally used with a Modem interface card. AMR stands for Audio Modem Riser, and it is a slot on the motherboard specifically designed for modem cards. This slot allows for easy installation and removal of modem cards, providing a convenient way to add modem functionality to a computer system.

Submit
135. Which of the following memory types will fit in a 168-pin DIMM slot?

Explanation

SDRAM (Synchronous Dynamic Random Access Memory) will fit in a 168-pin DIMM slot. DIMM slots are used to connect memory modules to the motherboard of a computer. SDRAM is a type of memory that is synchronized with the system bus, allowing for faster data transfer rates compared to older memory types. The 168-pin DIMM slot is specifically designed to accommodate SDRAM modules, making it the correct choice for this question. DDR, RAMBUS, and DDR3 are different types of memory that require different types of slots and are not compatible with a 168-pin DIMM slot.

Submit
136. A technician takes notes while a customer explains the potential issue. Which of the following parts of the troubleshooting process does this represent?

Explanation

This represents the part of the troubleshooting process called "Documentation." The technician is taking notes while the customer explains the potential issue, which involves recording important details and information about the problem. Documentation is essential for keeping track of the troubleshooting process, analyzing patterns, and providing a reference for future troubleshooting steps.

Submit
137. A user needs to access a secure website behind a firewall.Which of the following would get the user into the website?

Explanation

The correct answer is "https:\\www.ipdomain.com:8080". This is because the website is accessed using the HTTPS protocol, indicating a secure connection. The specific port number "8080" is also specified, suggesting that the website is using a non-standard port for communication.

Submit
138. Which of the following is the MAXIMUM speed limit on RAMBUS in MHz?

Explanation

The maximum speed limit on RAMBUS in MHz is 800. This means that the RAMBUS technology can operate at a maximum speed of 800 million cycles per second.

Submit
139. Which of the following is correct about IPv6?

Explanation

Both IPv6 and IPv4 can exist on the same network. This is because IPv6 was designed to be backward compatible with IPv4. This means that networks can support both IPv6 and IPv4 addresses at the same time. This allows for a smooth transition from IPv4 to IPv6, as devices and networks can gradually adopt IPv6 while still supporting IPv4 for backward compatibility.

Submit
140. A user reports that their workstation is having trouble connecting to the Internet. Which of the following should the technician do FIRST to begin troubleshooting theissue?

Explanation

The first step in troubleshooting the issue of a workstation having trouble connecting to the Internet is to identify any changes the user may have made. This is important because any recent changes or updates could potentially be causing the connectivity problem. By identifying these changes, the technician can narrow down the possible causes and focus on resolving the issue more effectively. Resetting the user's computer and testing the connection, establishing a theory of probable cause, and establishing a plan of action to resolve the problem can be done after identifying any changes made by the user.

Submit
141. Which of the following wireless technology standards, (802.11); has the SHORTEST indoor range?

Explanation

The correct answer is "a" because the 802.11a standard operates in the 5 GHz frequency band, which has a shorter range compared to the other standards. The higher frequency results in shorter wavelength and higher attenuation, making it less effective at penetrating walls and other obstacles, thereby reducing the indoor range.

Submit
142. A customer reports that their laptop is unable to print a document from a word processing application. A technician confirms that the printer settings are correct.Which of the following is the NEXT step?

Explanation

The next step would be to print a test page from the printer properties. This will help determine if the issue lies with the printer itself or with the word processing application. By printing a test page, the technician can verify if the printer is functioning properly and if it is able to print documents from other applications. This step will help narrow down the possible causes of the issue and guide further troubleshooting.

Submit
143. Which of the following is a limitation of satellite broadband?

Explanation

Satellite broadband has a limitation of Line of Sight, which means that it requires a clear, unobstructed view between the satellite and the user's dish antenna. Any obstruction such as tall buildings, trees, or bad weather conditions can disrupt the signal and affect the quality of the connection. This limitation makes satellite broadband less reliable in areas with dense urban environments or heavy foliage, where maintaining a clear line of sight becomes challenging.

Submit
144. Which of the following should be used when cleaning up printer toner?

Explanation

When cleaning up printer toner, a dry cloth should be used to avoid smearing the toner and causing further damage. Additionally, a paper bag should be used to collect the toner particles and prevent them from spreading. Using a wet cloth or compressed air can potentially cause the toner to smudge and spread, making the cleaning process more difficult. Wearing gloves is not necessary for cleaning up toner, as it can be easily removed with a dry cloth and paper bag.

Submit
145. An external hard drive would normally use which of the following external ports? (Select TWO).

Explanation

An external hard drive would normally use the eSATA and USB ports. eSATA is a high-speed interface specifically designed for external storage devices, providing fast data transfer rates. USB is a widely used port that is compatible with most computers and devices, making it a convenient choice for connecting external hard drives. Parallel and wireless ports are not commonly used for connecting external hard drives.

Submit
146. Which of the following media has the LARGEST potential storage capacity?

Explanation

BD (Blu-ray Disc) has the largest potential storage capacity among the given options. Blu-ray discs can store up to 25GB on a single-layer disc and up to 50GB on a dual-layer disc. This is significantly higher than the storage capacity of CDs, DVDs, and RAM. CDs typically have a storage capacity of 700MB to 1.4GB, DVDs can hold up to 4.7GB to 9GB, and RAM is a type of volatile memory used for temporary storage rather than long-term data storage.

Submit
147. Hyperthreading technology:

Explanation

Hyperthreading technology allows a processor to work with two independent computer instructions at once. This means that the processor can handle multiple tasks simultaneously, improving overall performance and efficiency. It does not require multiple core CPUs, as it is designed to optimize the use of a single processor.

Submit
148. A technician installs Microsoft Windows to a computer with three internal SATA hard drives and an external USB hard drive. Hard drive 1 contains the operatingsystem.Hard drive 2 contains the user profiles.Hard drive 3 and the external USB hard drive are empty.In which of the following locations should the page file belocated to maximize performance?

Explanation

The page file should be located on Internal SATA Hard Drive 3 to maximize performance. This is because the page file is used by the operating system as virtual memory when the physical RAM is full. By placing the page file on a separate hard drive from the operating system and user profiles, it reduces the disk I/O contention and improves performance. Additionally, Internal SATA Hard Drive 3 is empty, making it an ideal choice for the page file location.

Submit
149. Sections of the registry in Windows that contain system, software, device and user information are called:

Explanation

In Windows, the sections of the registry that store system, software, device, and user information are referred to as "hives". The registry is a hierarchical database that stores settings and configurations for the operating system and installed software. These hives are organized in a tree-like structure and contain keys and values that hold the necessary information. The term "hive" is used to describe these sections as they resemble beehives with their hierarchical structure.

Submit
150. A user needs to print to a printer. They have a laptop with Windows 7. The printer has a USB and an Ethernet connector. Which of the following is the EASIESTway to connect the laptop to the printer?

Explanation

The easiest way to connect the laptop to the printer is through a USB connection. This is because the laptop has a USB port and the printer has a USB connector, allowing for a direct and simple connection between the two devices. Wi-Fi, Bluetooth, and Ethernet connections may require additional setup and configuration, making them potentially more complex than a USB connection.

Submit
151. Which of the following is the MOST important consideration when installing Windows 7 64-bit?

Explanation

The processor is the most important consideration when installing Windows 7 64-bit because it determines the overall performance and speed of the operating system. A 64-bit version of Windows requires a compatible processor that can handle the increased workload and processing power. Without a suitable processor, the system may experience lag, slow performance, and compatibility issues. Therefore, it is crucial to ensure that the processor meets the minimum requirements for running a 64-bit operating system like Windows 7.

Submit
152. Which of the following adapter cards is used for connecting external hard drives?

Explanation

eSATA stands for external Serial Advanced Technology Attachment. It is an adapter card that is specifically designed for connecting external hard drives to a computer. Unlike internal SATA connections, eSATA provides a faster and more efficient data transfer rate, making it ideal for connecting high-capacity external storage devices. Therefore, eSATA is the correct adapter card for connecting external hard drives.

Submit
153. Which of the following is a valid motherboard memory slot type?

Explanation

DIMM stands for Dual In-Line Memory Module, which is a type of memory slot commonly found on motherboards. It is used to connect the computer's main memory (RAM) to the motherboard. DIMM slots are typically used for DDR (Double Data Rate) RAM modules, which provide faster data transfer rates compared to older memory technologies. AGP, PCIe, and CMOS are not memory slot types; AGP is a type of graphics card slot, PCIe is a type of expansion slot, and CMOS is a type of battery used to power the motherboard's CMOS memory.

Submit
154. Which of the following wireless security techniques is the MOST secure?

Explanation

Enable Wi-Fi Protected Access (WPA) is the most secure wireless security technique among the given options. WPA provides strong encryption and authentication methods, making it difficult for unauthorized users to access the network. It uses a Pre-Shared Key (PSK) or a centralized authentication server to authenticate users and encrypt the data transmitted over the network. MAC Filters and disabling SSID can provide some level of security, but they can be easily bypassed by experienced hackers. BBSID encryption is not a recognized wireless security technique, making it an invalid option.

Submit
155. Which of the following keys is used to change laptop hardware settings?

Explanation

The Control key is used to change laptop hardware settings. This key is often used in combination with other keys to perform specific functions such as adjusting screen brightness, volume, or keyboard backlight. By pressing the Control key along with another key, users can access various hardware settings and make adjustments according to their preferences.

Submit
156. A customer reports the printer has an error message showing on the display and the printer is not printing any of the jobs in the queue. The technician arrives andfinds the printer is online but there are not any lights on the network card. The NEXT step to evaluate the problem is to:

Explanation

The correct answer is to cycle the power on the printer and observe the boot process. This is the next step to evaluate the problem because it helps in resetting the printer and allows it to go through the boot process, which may resolve any software or configuration issues causing the error message and preventing jobs from printing. Additionally, observing the boot process can provide valuable information about any potential hardware issues that may be causing the problem.

Submit
157. Which of the following services assigns IP addresses automatically when requested by the client?

Explanation

Dynamic Host Configuration Protocol (DHCP) is a network protocol that automatically assigns IP addresses to client devices when requested. It allows clients to obtain IP configurations dynamically, eliminating the need for manual IP address assignment. DHCP servers are responsible for managing and leasing IP addresses, ensuring efficient allocation and preventing conflicts. By using DHCP, network administrators can easily manage and control IP address assignments, making it a convenient and scalable solution for networks of any size.

Submit
158. Which of the following memory modules is a DDR3 chip?

Explanation

PC8000 is the correct answer because it is the only option that follows the naming convention for DDR3 memory modules. The "PC" prefix indicates that it is a personal computer memory module, and the number following it represents the data transfer rate. In this case, "8000" indicates a transfer rate of 8000 megabytes per second, which is consistent with DDR3 specifications. The other options (PC800, PC4000, PC2600) do not follow the DDR3 naming convention and therefore are not DDR3 chips.

Submit
159. Which of the following would be used to increase the efficiency in which programs execute?

Explanation

Defrag is used to increase the efficiency in which programs execute by rearranging fragmented files on a disk, allowing the computer to access data more quickly and improving overall system performance. By organizing files in a contiguous manner, defragmentation reduces the time it takes for the computer to read and write data, resulting in faster program execution.

Submit
160. Which of the following ports is the standard SMTP port?

Explanation

Port 25 is the standard SMTP (Simple Mail Transfer Protocol) port. SMTP is the protocol used for sending emails over the internet. Port 25 is specifically designated for SMTP communication between mail servers. This port allows email clients to connect to the mail server and send outgoing emails. It is widely used by email servers and is considered the default port for SMTP communication.

Submit
161. Which of the following is the MAXIMUM theoretical range of Bluetooth Class 2?

Explanation

Bluetooth Class 2 devices have a maximum theoretical range of 10 meters (33 feet). This means that the Bluetooth signal can reach up to 10 meters in an ideal environment without any obstacles or interference. However, in real-world scenarios, the range can be affected by factors such as walls, other electronic devices, and interference, resulting in a shorter range.

Submit
162. Which of the following command line paths shows the recovery console s installation?

Explanation

The correct answer is D:\i386\winnt32 /cmdcons. This path indicates that the recovery console is installed using the winnt32 command with the /cmdcons option.

Submit
163. A user reports that their last several jobs have not printed, even though other users can print. In which of the following locations should the technician look FIRST?

Explanation

The technician should look first in the computer's print queue. The user's report suggests that their jobs are not printing, so the issue might be related to the print queue on their computer. By checking the print queue, the technician can identify any pending or stuck print jobs that might be causing the problem. This is a logical starting point as it directly relates to the user's complaint and can help diagnose and resolve the issue efficiently.

Submit
164. Which of the following is a broadcast address?

Explanation

The broadcast address is the address used to send a message to all devices on a network. In this case, the IP address 255.255.255.255 is the correct answer because it is the broadcast address for the network. This address is used to send a message to all devices on the local network, regardless of their specific IP addresses.

Submit
165. In regards to computer case form factors, which of the following provides the MOST room for effective cooling?

Explanation

BTX (Balanced Technology Extended) provides the most room for effective cooling compared to the other form factors listed. BTX is designed to improve airflow and reduce heat buildup by positioning the CPU and expansion slots in a way that allows for better cooling. It features a rotated motherboard layout, with the CPU and graphics card positioned closer to the front of the case, allowing for efficient cooling through larger and more effective heat sinks and fans. This design helps to dissipate heat more effectively, resulting in improved overall cooling performance.

Submit
166. Which of the following devices can be used to setup a WAN?

Explanation

A router can be used to setup a Wide Area Network (WAN) because it is a networking device that forwards data packets between computer networks. It connects multiple devices and networks together, allowing them to communicate and share resources over a larger geographical area. Routers are specifically designed to handle the complexities of wide area networking, such as routing traffic between different networks and managing multiple connections. Therefore, a router is the correct device to use for setting up a WAN.

Submit
167. A technician wants to prevent anyone from logging into a computer that is running in a common area unless they are authorized.The technician has locked the case. Which of the following should actions should the technician take NEXT to prevent access?

Explanation

To prevent unauthorized access to the computer, the technician should create user accounts for only the authorized users. By doing this, only those with authorized credentials will be able to log into the computer. This ensures that only trusted individuals have access to the system and protects sensitive information from being accessed by unauthorized individuals.

Submit
168. A Windows directory is also referred to as a:

Explanation

In the context of Windows operating system, a directory is synonymous with a folder. Both terms refer to a location where files and other folders can be stored. Therefore, a Windows directory is commonly referred to as a folder.

Submit
169. While changing a toner cartridge in a printer, a user spilled some toner.A technician noticed and offered to help clean it up.Which of the following tools would be MOST appropriate?

Explanation

A vacuum would be the most appropriate tool to clean up spilled toner because it is able to effectively collect and remove the fine particles of toner from the surface. The suction power of a vacuum can easily capture the toner without spreading it further or causing it to become airborne. Additionally, using a vacuum would be more efficient and quicker compared to using a wet brush, paper towel, or fluffy cloth, which may not effectively collect all the toner particles.

Submit
170. Which of the following has the LEAST amount of storage capacity?

Explanation

The FDD (Floppy Disk Drive) has the least amount of storage capacity compared to the other options listed. Floppy disks typically have a storage capacity ranging from 1.44 MB to 2.88 MB, which is significantly lower than the storage capacities of HDDs, SSDs, and USB drives. HDDs (Hard Disk Drives) can store several terabytes of data, SSDs (Solid State Drives) can also store large amounts of data, and USB drives can have varying storage capacities, ranging from a few gigabytes to several terabytes. Therefore, the FDD has the least amount of storage capacity among the given options.

Submit
171. Which of the following is an example of DDR2 RAM?

Explanation

PC6400 is an example of DDR2 RAM because PC6400 refers to the maximum data transfer rate (in megabytes per second) that the RAM module can achieve. DDR2 RAM has a maximum data transfer rate of 6400 MB/s, so PC6400 is the correct answer. PC3400, PC3200, and PC1600 are not examples of DDR2 RAM as they refer to different data transfer rates.

Submit
172. 802.11g has a MAXIMUM speed of up to:

Explanation

802.11g is a wireless network standard that operates in the 2.4 GHz frequency band. It has a maximum data transfer rate of 54 Mbps, making it faster than the previous 802.11b standard which had a maximum speed of 11 Mbps. The options "5.2 Ghz" and "3.5 Ghz" are incorrect as they refer to frequency bands used by other wireless standards, not the maximum speed of 802.11g.

Submit
173. Which of the following memory modules uses a 240-pin connector?

Explanation

DDR2 memory modules use a 240-pin connector. DDR2 stands for Double Data Rate 2, and it is a type of memory module commonly used in computers. The 240-pin connector refers to the number of pins on the module that connect it to the motherboard. This type of memory module is an improved version of DDR, offering faster and more efficient data transfer rates. DDR3 is another type of memory module, but it uses a different connector with 240 pins. DOSIMM is not a recognized memory module, so it is not the correct answer.

Submit
174. A user reports a loud noise from their desktop PC. Which of the following would be suspected as a source? (Select TWO).

Explanation

The cooling fan and power supply are the most likely sources of a loud noise in a desktop PC. The cooling fan can become noisy if it is dirty, damaged, or experiencing a mechanical issue. The power supply can also produce noise if it is faulty or if the internal components are malfunctioning. The CPU and memory bank are less likely to be the source of a loud noise as they do not typically produce audible sounds.

Submit
175. Which of the following should be replaced when performing laser printer preventative maintenance? (Select THREE).

Explanation

During laser printer preventative maintenance, three components that should be replaced are the transfer bar, pick up rollers, and fuser. The transfer bar is responsible for transferring the toner from the drum to the paper, and over time it can become worn or damaged. Pick up rollers are responsible for feeding the paper into the printer, and they can become dirty or worn out with use. The fuser is responsible for melting the toner onto the paper, and it can degrade over time, leading to poor print quality. Replacing these components ensures that the printer continues to operate smoothly and produces high-quality prints.

Submit
176. Which of the following provides the LOWEST level of wireless security protection?

Explanation

Disabling the SSID (Service Set Identifier) provides the lowest level of wireless security protection. The SSID is a unique identifier for a wireless network, and when it is disabled, the network is not broadcasted, making it more difficult for unauthorized users to detect and access the network. However, it is important to note that disabling the SSID alone is not sufficient for ensuring complete security, as other security measures like encryption should also be implemented.

Submit
177. A technician has a customer with a Windows 7 Home Basic machine who wants to play movies through the Media Center program.Which of the following should the technician do to allow this to happen?

Explanation

The customer wants to play movies through the Media Center program, which is not available in the Windows 7 Home Basic edition. To enable this functionality, the technician should upgrade the system to Windows 7 Home Premium Edition, as it includes the Media Center program.

Submit
178. Which of the following is a protocol that does not depend on acknowledgement of receipt from the sender?

Explanation

UDP (User Datagram Protocol) is a protocol that does not depend on acknowledgement of receipt from the sender. Unlike TCP (Transmission Control Protocol), UDP does not establish a connection or require the receiver to acknowledge the receipt of data packets. This makes UDP a faster and more lightweight protocol, but also less reliable as it does not guarantee the delivery or order of packets.

Submit
179. A users laptop has a PATA controller. The user wishes to add a SATA hard drive for storage. Which of the following would be the BEST method to solve thisissue?

Explanation

The best method to solve the issue of adding a SATA hard drive to a laptop with a PATA controller would be to use an external USB enclosure. This would allow the user to connect the SATA hard drive to their laptop via USB, bypassing the need for a SATA controller. This solution is preferable to changing the BIOS settings or replacing the motherboard, as it is a simpler and more cost-effective option. Exchanging the drive for a PATA hard drive would not solve the issue, as the user specifically wants to add a SATA hard drive for storage.

Submit
180. Which of the following is a gateway for a computer with an IP address of 10.31.64.12 and a subnet mask of 255.255.0.0?

Explanation

The correct answer is 10.31.64.1. In this question, the given IP address is 10.31.64.12 and the subnet mask is 255.255.0.0. The subnet mask determines the network portion of the IP address, and in this case, it is 10.31. Therefore, any IP address that starts with 10.31 is within the same network. The gateway is the IP address that allows the computer to communicate with devices outside of its network. Among the given options, only 10.31.64.1 falls within the same network as the computer's IP address, making it the correct gateway.

Submit
181. Which of the following cable types use shielding to protect against EMI and RFI? (Select TWO).

Explanation

Co-axial and STP (Shielded Twisted Pair) cables use shielding to protect against EMI (Electromagnetic Interference) and RFI (Radio Frequency Interference). Co-axial cables have a central conductor surrounded by a layer of insulation, a metallic shield, and an outer insulating layer. This shielding helps to prevent interference from external electromagnetic sources. STP cables, on the other hand, have twisted pairs of wires surrounded by a metallic foil or braided shield, which provides additional protection against EMI and RFI. UTP (Unshielded Twisted Pair) cables do not have any shielding and are more susceptible to interference. Crossover cables are used for connecting similar devices and do not provide any specific shielding against interference.

Submit
182. Which of the following data connectors does SATA use?

Explanation

SATA (Serial ATA) uses a 7-pin data connector. SATA is a computer bus interface that is used to connect storage devices such as hard drives and solid-state drives to the motherboard of a computer. The 7-pin connector is specifically designed for data transmission and is used to transfer data between the storage device and the motherboard. It is a smaller and more compact connector compared to other options such as the 15-pin, 25-pin, or 12-pin connectors, making it suitable for modern computer systems that require space-saving solutions.

Submit
183. Which of the following wireless protocols requires the use of MIMO antennas?

Explanation

802.11n is the correct answer because it is a wireless protocol that utilizes MIMO (Multiple Input Multiple Output) antennas. MIMO technology allows for multiple data streams to be transmitted and received simultaneously, increasing the overall data throughput and improving the wireless network's performance and reliability. The other wireless protocols listed (802.11g, 802.11b, 802.11a) do not require the use of MIMO antennas.

Submit
184. In which of the following steps of the troubleshooting theory is it important to perform backups?

Explanation

Performing backups is important in the step of identifying the problem because it ensures that any data or settings that may be lost or altered during the troubleshooting process are backed up and can be restored if needed. This step involves gathering information about the issue and analyzing it, so having backups in place helps to minimize the risk of data loss and allows for a more thorough investigation of the problem.

Submit
185. A technician is adding a company video from a video cassette to the company's website. Which of the following devices should be used to complete this task?

Explanation

A video capture card is required to complete the task of adding a company video from a video cassette to the company's website. This device allows the technician to connect the video cassette player to a computer and capture the video footage, converting it into a digital format that can be uploaded to the website. The video capture card acts as an interface between the analog video signals from the cassette and the digital format required for online viewing.

Submit
186. Which of the following are encryption technologies? (Select TWO).

Explanation

AES and DES are both encryption technologies. AES (Advanced Encryption Standard) is a symmetric encryption algorithm widely used for securing sensitive data. It is considered highly secure and is used by governments and organizations worldwide. DES (Data Encryption Standard) is an older symmetric encryption algorithm that was widely used in the past but is now considered less secure due to advances in computing power. Both AES and DES are used to protect data by scrambling it using a secret key, making it unreadable to unauthorized parties.

Submit
187. Which of the following is the MAXIMUM recommended cable length for connecting USB devices?

Explanation

The maximum recommended cable length for connecting USB devices is 16 ft. This is because USB signals can degrade over longer distances, leading to data loss or corruption. To ensure proper signal transmission and avoid any issues, it is recommended to use cables that are no longer than 16 ft when connecting USB devices.

Submit
188. Which of the following commands can be used to establish a connection to a remote computer, and is not secure?

Explanation

Telnet is the correct answer because it is a command that can be used to establish a connection to a remote computer. However, it is not secure as it sends data in plain text, making it vulnerable to eavesdropping and unauthorized access. SSH, on the other hand, is a secure alternative to Telnet as it encrypts the data transmission, ensuring confidentiality and integrity. DSL and ADSL are not relevant to establishing a connection to a remote computer.

Submit
189. Which of the following is a standard connector for an external SCSI device?

Explanation

The correct answer is 68-pin. A 68-pin connector is a standard connector for an external SCSI (Small Computer System Interface) device. SCSI is a set of standards for connecting and transferring data between computers and peripheral devices, such as hard drives, tape drives, and scanners. The 68-pin connector is commonly used for SCSI devices and provides a reliable and fast connection for data transfer.

Submit
190. Which of the following is the correct connector for an internal floppy drive?

Explanation

The correct connector for an internal floppy drive is a 34-pin Ribbon. This type of connector is commonly used to connect floppy drives to the motherboard or controller. It consists of a flat ribbon cable with 34 pins that are aligned with the corresponding pins on the floppy drive. This connector allows for data transfer and power supply between the floppy drive and the computer system.

Submit
191. Which of the following shows the correct progression of video quality from lowest to highest?

Explanation

The correct progression of video quality from lowest to highest is Composite, S-Video, Component. Composite video is the lowest quality option as it combines all video signals into a single signal, resulting in lower resolution and color accuracy. S-Video provides better quality by separating the video signal into two parts (luminance and chrominance), improving resolution and color reproduction. Component video offers the highest quality as it separates the video signal into three parts (red, green, and blue), providing the best resolution and color accuracy.

Submit
192. Which of the following is the BEST way to provide power to a laser printer?

Explanation

The best way to provide power to a laser printer is by directly connecting it to a grounded wall outlet. This ensures a stable and reliable power source for the printer, reducing the risk of power surges or fluctuations that could potentially damage the printer or cause it to malfunction. Using a UPS (Uninterruptible Power Supply) can also be a good option as it provides backup power in case of outages, but a directly connected grounded wall outlet is the most optimal choice. Using a power strip or an ungrounded wall outlet may not provide the necessary stability and protection for the printer.

Submit
193. Which of the following are the voltages supplied to a drive on a standard Molex connector?

Explanation

The voltages supplied to a drive on a standard Molex connector are 5 volts and 12 volts.

Submit
194. Which of the following are unique video card interfaces? (Select TWO).

Explanation

ISA and PCI are unique video card interfaces because they are both different types of expansion slots that can be used to connect video cards to a computer's motherboard. ISA (Industry Standard Architecture) was one of the earliest expansion slots and was commonly used in older computers. PCI (Peripheral Component Interconnect) is a newer and faster interface that replaced ISA. AMR (Audio Modem Riser) is not a video card interface, but rather a slot used for audio and modem cards. AGP (Accelerated Graphics Port) is another type of video card interface, but it is not unique as it has been replaced by PCI Express in modern computers.

Submit
195. Which of the following is the MINIMUM amount of hard disk space required to install Windows 7?

Explanation

Windows 7 requires a minimum of 16 GB of hard disk space to be installed. This is the amount of storage needed to accommodate the operating system files, system updates, and any additional software that may be installed. Having at least 16 GB of free space ensures that the installation process can complete successfully and allows for future updates and software installations without running out of storage space.

Submit
196. An internal SCSI cable is generally used with which of the following devices? (Select TWO).

Explanation

An internal SCSI cable is generally used with Tape Drives and HDDs. SCSI (Small Computer System Interface) is a standard interface used for connecting various devices to a computer system. Tape drives and HDDs often require high-speed data transfer and SCSI cables provide the necessary bandwidth for this purpose. Floppy drives and flash drives typically use different interfaces such as IDE or USB for connectivity. Therefore, Tape Drives and HDDs are the correct options for devices that generally use an internal SCSI cable.

Submit
197. Which of the following can be hot-swappable?

Explanation

USB devices can be hot-swappable, meaning they can be connected or disconnected from a computer while it is still running. This is because USB devices are designed to be plug-and-play, allowing for easy and convenient connection and disconnection without the need to restart the computer. On the other hand, HDD, tape, and DVD-RW are not typically hot-swappable, as they require the computer to be powered off before connecting or disconnecting them to avoid potential data loss or damage.

Submit
198. Which of the following is a reason for maintaining a system with a floppy drive?

Explanation

Maintaining a system with a floppy drive is important for the purpose of recovering archived data. Floppy drives were commonly used in the past to store and retrieve data, and there may still be valuable information archived on floppy disks. By having a system with a floppy drive, users can access and recover this archived data when needed.

Submit
199. Which of the following are speeds supported by PC3200 memory in MHz? (Select 3)

Explanation

PC3200 memory supports speeds of 400 MHz, 333 MHz, and 266 MHz. These speeds refer to the maximum data transfer rate of the memory module. PC3200 is a type of DDR (Double Data Rate) memory, which means it can transfer data on both the rising and falling edges of the clock signal, effectively doubling the data transfer rate. The numbers 400, 333, and 266 represent the clock speeds at which the memory can operate, with higher numbers indicating faster speeds. Therefore, these are the correct speeds supported by PC3200 memory.

Submit
View My Results

Quiz Review Timeline (Updated): Jan 18, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 18, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 18, 2016
    Quiz Created by
    Jamestiger
Cancel
  • All
    All (199)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
During troubleshooting, the technician determines the cause of the...
Which of the following should the technician verify FIRST if the...
Which of the following IP addresses is in a class A range?
Which of the following is the MAXIMUM data rate of IEEE 1394a?
A user reports that video is not displayed when their laptop is...
Which of the following must be performed when installing a touch...
Which of the following are locations where a computer virus could...
Which of the following is the BEST way to ensure that a hard drive is...
Which of the following cable types is required for a BNC connector?
A 400GB IDE hard disk drive with a Molex connector uses how many...
Which of the following network types is the LEAST susceptible to EMI...
Which of the following is the purpose of a monitors degauss feature?
Which of the following chipsets is responsible for controlling the...
Which of the following technologies has the HIGHEST potential...
Which of the following is the function of a power inverter?
Which of the following items is listed in the control panel of a...
Which of the following is an advantage that a USB mouse has over a...
Which of the following locations will allow a user to change the...
Which of the following memory modules uses a 168-pin connector?
Which of the following communication devices needs to have a...
Which of the following services processes print requests and sends...
Which of the following printer types requires the use of toner?
A user reports that their machine will not power up. The technician...
A technician is upgrading a desktop with the largest storage medium...
A user reports that their computer seems to be running slow and...
Which of the following cable types uses an RJ-45 connector and is MOST...
Which of the following is the native resolution of a WUXGA monitor?
Which of the following is indicated by repetitive flashing lights on a...
Which of the following printer types uses a charged corona wire in the...
The smallest unit of data that a Windows operating system can access...
A technician is installing an old Windows 2000 application on a...
Setting an administrator password in the BIOS will accomplish which of...
Which of the following is a standard that supports speeds of up to...
Which of the following BEST describes the differences between a switch...
Which of the following allows a user to permanently disable a hardware...
A user reports their laptop has just been powered on and there is no...
Which of the following properties of a heat sink has the GREATEST...
Which of the following wireless technologies, (802.11); has the...
Which of the following is commonly used for RS-232 connections?
Which of the following can be disabled to help prevent access to a...
The portion of a disk or drive that contains the MBR is known as the:
Which of the following slots is used for a graphics card?
In order to perform a network installation of Windows, which of the...
A laptop docking station will enable a user to do which of the...
Which of the following will dissipate heat MOST efficiently?
The user reports to the help desk that a UPS trips the internal...
Which of the following cable types are rated for Gigabit Ethernet?...
Which of the following components are included in a typical laser...
Which of the following are the BEST means of ensuring that data is not...
The highest quality video will generally be obtained using which of...
Which of the following bus slots would provide the HIGHEST potential...
A technician wants to setup a network printer on a print server to...
Which of the following connectors is used for musical equipment?
A remote user is disconnected from the network for long periods of...
Which of the following should be used when cleaning toner inside a...
Fingerprint readers are an example of which of the following security...
Which of the following video adapter supports a potential MAXIMUM...
Which of the following MOST accurately describes the relationship...
A new printer driver has just been installed on a desktop computer....
Which of the following drive connections uses a ribbon cable with a...
A user is trying to use their laptop with a video projector and cannot...
Which of the following is characterized by the creation of a secure...
Which of the following speeds is the maximum transmission rate of the...
Which of the following is the MAXIMUM number of primary partitions...
Which type of connector is required for a coaxial network cable?
Which of the following broadband technologies would typically have a...
A technician's company prints forms on multi-layer carbonless copy...
Which of the following occurs during POST?
A duplexer unit has been added to an existing laser printer.The...
Which of the following storage resources gives the ability to hold the...
Which of the following options is the BEST way to fix a CRT monitor...
A new device is installed on a machine and some of its features are...
Which of the following printers needs a fuser installed?
The user boots their computer in the morning to discover the message...
Which of the following defines the protocol associated with the...
Keyboard errors are MOST often caused by which of the following...
Which of the following will allow the use of BitLocker if the computer...
Which of the following commands can be used to verify the gateway IP...
Which of the following memory types has a clock speed of 400MHz?
Which of the following will enable a technician to easily identify a...
Which of the following RAID arrays does only striped volumes?
Which of the following connections must be paired FIRST with the...
When a PC is turned on, which of the following tests the CPU, memory,...
Which of the following connectors allows both audio and video to pass...
A user reports that they are suddenly unable to print to a network...
Which of the following should a technician do to protect exposed...
How can a user open a .zip file in Windows 7?
Which of the following would be used to record off-air TV programs?
The operation of mapping an IP address to a host name is handled by...
Utilizing a WSUS or testing new updates on a non-critical PC is an...
A customer with a laptop frequently goes into the office to...
Multiple users report that the network color printer is not printing...
Secure socket layer communications take place on which of the...
Which of the following cable types supports a transmission speed no...
A technician finds the inside of a desktop computer completely covered...
Which of the following device cards goes into an AGP slot on a...
Which of the following RAM types is used to resolve certain memory...
Which of the following adapter types would provide the BEST...
A first level help desk support technician receives a call from a...
A technician has determined that there is constant interference from...
Which of the following devices will allow a technician to use a single...
Which of the following provides data redundancy by writing data to two...
A technician is trying to install an OS to a remote PC without the use...
A user reports that when trying to input data using a touch screen,...
Which of the following cable types uses an RJ-45 connector, and would...
Which of the following ports would Windows Firewall need to make an...
Which of the following troubleshooting steps is NEXT after determining...
The most effective use of clusters on a hard drive is in which of the...
Which of the following is the chipset used by the CPU to communicate...
PC2700 memory runs at which of the following clock speeds?
Which of the following adapter types will use a RJ-45 connector?
Which of the following boot devices would a technician use for RIS?
Which of the following ports is BEST to use when adding a network...
Which of the following IP addresses would a technician see if a...
Which of the following technologies BEST refers to simultaneous data...
Which of the following commands is BEST to use when testing remote...
Which of the following protocols uses port 443, by default?
A user reports an unusual amount of spam in their inbox. The...
Which operating systems use the c:\WINNT\ directory?
Which of the following cable types is required to be fire-resistant...
A user is unable to login to their laptop when away from the office....
While checking the print queue, a technician determines that a print...
Which of the following is considered social engineering?
A technician needs to upgrade several Windows XP Professional 64-bit...
Which of the following would BEST optimize a computer that is heavily...
Which of the following is the MAXIMUM data rate of IEEE 1394?
Which of the following is an example of EMI?
Which of the following is the MAXIMUM partition size of a hard drive...
Which of the following explains what the wattage rating of a power...
Which of the following features is in Windows Vista but not Windows...
A technician observes that the lights in a customer's building...
Which of the following is the difference between the clock speed and...
Which of the following is a unique characteristic of a dual-core...
An AMR slot is generally used with which of the following interface...
Which of the following memory types will fit in a 168-pin DIMM slot?
A technician takes notes while a customer explains the potential...
A user needs to access a secure website behind a firewall.Which of the...
Which of the following is the MAXIMUM speed limit on RAMBUS in MHz?
Which of the following is correct about IPv6?
A user reports that their workstation is having trouble connecting to...
Which of the following wireless technology standards, (802.11); has...
A customer reports that their laptop is unable to print a document...
Which of the following is a limitation of satellite broadband?
Which of the following should be used when cleaning up printer toner?
An external hard drive would normally use which of the following...
Which of the following media has the LARGEST potential storage...
Hyperthreading technology:
A technician installs Microsoft Windows to a computer with three...
Sections of the registry in Windows that contain system, software,...
A user needs to print to a printer. They have a laptop with Windows 7....
Which of the following is the MOST important consideration when...
Which of the following adapter cards is used for connecting external...
Which of the following is a valid motherboard memory slot type?
Which of the following wireless security techniques is the MOST...
Which of the following keys is used to change laptop hardware...
A customer reports the printer has an error message showing on the...
Which of the following services assigns IP addresses automatically...
Which of the following memory modules is a DDR3 chip?
Which of the following would be used to increase the efficiency in...
Which of the following ports is the standard SMTP port?
Which of the following is the MAXIMUM theoretical range of Bluetooth...
Which of the following command line paths shows the recovery console s...
A user reports that their last several jobs have not printed, even...
Which of the following is a broadcast address?
In regards to computer case form factors, which of the following...
Which of the following devices can be used to setup a WAN?
A technician wants to prevent anyone from logging into a computer that...
A Windows directory is also referred to as a:
While changing a toner cartridge in a printer, a user spilled some...
Which of the following has the LEAST amount of storage capacity?
Which of the following is an example of DDR2 RAM?
802.11g has a MAXIMUM speed of up to:
Which of the following memory modules uses a 240-pin connector?
A user reports a loud noise from their desktop PC. Which of the...
Which of the following should be replaced when performing laser...
Which of the following provides the LOWEST level of wireless security...
A technician has a customer with a Windows 7 Home Basic machine who...
Which of the following is a protocol that does not depend on...
A users laptop has a PATA controller. The user wishes to add a SATA...
Which of the following is a gateway for a computer with an IP address...
Which of the following cable types use shielding to protect against...
Which of the following data connectors does SATA use?
Which of the following wireless protocols requires the use of MIMO...
In which of the following steps of the troubleshooting theory is it...
A technician is adding a company video from a video cassette to the...
Which of the following are encryption technologies? (Select TWO).
Which of the following is the MAXIMUM recommended cable length for...
Which of the following commands can be used to establish a connection...
Which of the following is a standard connector for an external SCSI...
Which of the following is the correct connector for an internal floppy...
Which of the following shows the correct progression of video quality...
Which of the following is the BEST way to provide power to a laser...
Which of the following are the voltages supplied to a drive on a...
Which of the following are unique video card interfaces? (Select TWO).
Which of the following is the MINIMUM amount of hard disk space...
An internal SCSI cable is generally used with which of the following...
Which of the following can be hot-swappable?
Which of the following is a reason for maintaining a system with a...
Which of the following are speeds supported by PC3200 memory in MHz?...
Alert!

Advertisement