CompTIA A+ Practical Application #2

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Gerardo_ceboller
G
Gerardo_ceboller
Community Contributor
Quizzes Created: 4 | Total Attempts: 317
Questions: 50 | Attempts: 75

SettingsSettingsSettings
CompTIA A+ Practical Application #2 - Quiz


Questions and Answers
  • 1. 

    In which of the following is the default location of user files (e.g. My Documents, Favorites, Desktop) in Windows Vista?

    • A.

      C:\users\

    • B.

      C:\user data\

    • C.

      C:\documents and settings\

    • D.

      C:\user folders\

    Correct Answer
    A. C:\users\
    Explanation
    The correct answer is c:\users\. In Windows Vista, the default location for user files such as My Documents, Favorites, and Desktop is the c:\users\ directory. This directory contains individual folders for each user on the system, where their personal files are stored.

    Rate this question:

  • 2. 

    When installing additional memory in a notebook computer, the MOST important point to remember is:

    • A.

      The chip installed in the expansion slot has to have the same capacity as the chip already installed.

    • B.

      Memory chips are not plug and play; special drivers will be required.

    • C.

      The chip has to be seated properly and locked down to be detected.

    • D.

      The chip in the primary slot has to be the same or bigger size than the chip in the expansion slot.

    Correct Answer
    C. The chip has to be seated properly and locked down to be detected.
    Explanation
    The most important point to remember when installing additional memory in a notebook computer is that the chip has to be seated properly and locked down to be detected. This means that the chip needs to be inserted correctly into the memory slot and secured in place to ensure that it is recognized by the computer's system. If the chip is not properly seated and locked down, it may not be detected by the computer, resulting in the memory upgrade not being recognized or functioning properly.

    Rate this question:

  • 3. 

    Which of the following BEST describes the general meaning of a warning in one of the Event Viewer logs?

    • A.

      An Informational message on successful or failed audit actions.

    • B.

      An issue that will not prevent the basic function of the computer.

    • C.

      An informational message from the Windows Firewall.

    • D.

      An urgent issue that warns the user through a screen pop-up.

    Correct Answer
    B. An issue that will not prevent the basic function of the computer.
    Explanation
    A warning in one of the Event Viewer logs is typically an indication of an issue or problem that has been detected on the computer. However, it is not severe enough to completely disrupt the basic functioning of the computer. While it may require attention or further investigation, it does not pose an immediate threat to the overall operation of the system.

    Rate this question:

  • 4. 

    Which of the following Microsoft encryption software provides the HIGHEST level of security for PCs running Windows Vista Enterprise or Ultimate Vista?

    • A.

      NTFS

    • B.

      Windows Defender for Vista

    • C.

      BitLocker drive encryption

    • D.

      EFS

    Correct Answer
    C. BitLocker drive encryption
    Explanation
    BitLocker drive encryption provides the highest level of security for PCs running Windows Vista Enterprise or Ultimate Vista. BitLocker encrypts the entire Windows operating system and all the data on the hard drive, protecting it from unauthorized access. It uses advanced encryption algorithms to ensure the confidentiality and integrity of the data. NTFS is a file system, Windows Defender is an antivirus software, and EFS (Encrypting File System) provides file-level encryption, but they do not offer the same level of security as BitLocker drive encryption.

    Rate this question:

  • 5. 

    Which of the following commands would be used to move the working directory from C:\ to C:\Windows?

    • A.

      CD

    • B.

      RD

    • C.

      MD

    • D.

      SFC

    Correct Answer
    A. CD
    Explanation
    The CD command is used to change the current working directory in a command prompt or terminal. In this case, the command "CD C:\Windows" would be used to move the working directory from C:\ to C:\Windows.

    Rate this question:

  • 6. 

    Which of the following commands would be used to verify and troubleshoot DNS settings of a particular host on a Windows computer?

    • A.

      TRACERT

    • B.

      NSLOOKUP

    • C.

      CHKDSK

    • D.

      XCOPY

    Correct Answer
    B. NSLOOKUP
    Explanation
    NSLOOKUP command is used to verify and troubleshoot DNS settings of a particular host on a Windows computer. It allows users to query DNS servers to obtain information about various DNS records, such as IP addresses associated with a domain name, mail exchange servers for a domain, and more. By using NSLOOKUP, users can diagnose and troubleshoot DNS-related issues, such as incorrect DNS settings, DNS resolution problems, and network connectivity problems.

    Rate this question:

  • 7. 

    A technician has a laptop which has a faint image showing on the screen. Which of the following components should be tested and MOST likely needs replacement?

    • A.

      Antenna wire

    • B.

      LCD lamp

    • C.

      Inverter

    • D.

      LCD cable

    Correct Answer
    C. Inverter
    Explanation
    The inverter is responsible for supplying power to the LCD lamp, which provides the backlight for the screen. If the screen is showing a faint image, it suggests that the inverter is not functioning properly and may need to be replaced.

    Rate this question:

  • 8. 

    A technician has installed the hardware for a SOHO wired network. Which of the following is the FIRST step to securing the network?

    • A.

      Enable MAC filtering

    • B.

      Change default usernames and passwords

    • C.

      Disable unused ports

    • D.

      Assign static IP addresses

    Correct Answer
    B. Change default usernames and passwords
    Explanation
    The first step to securing a SOHO wired network is to change the default usernames and passwords. This is important because default credentials are widely known and can be easily exploited by attackers. By changing the default usernames and passwords, the network administrator ensures that only authorized individuals can access the network devices and reduces the risk of unauthorized access and potential security breaches.

    Rate this question:

  • 9. 

    A bank is upgrading some clerical users' PCs. Which of the following would be the MOST appropriate method for erasing the data on the old PCs?

    • A.

      Drive degauss

    • B.

      Standard format

    • C.

      Change the jumpers on the hard drive

    • D.

      Quick format

    Correct Answer
    A. Drive degauss
    Explanation
    Drive degauss is the most appropriate method for erasing the data on the old PCs. Degaussing is the process of using a powerful magnet to erase or scramble the data on a hard drive, rendering it unreadable. This method is highly effective in completely wiping out all data on the drive, ensuring that it cannot be recovered or accessed by unauthorized individuals. Standard format, quick format, or changing the jumpers on the hard drive may not completely erase the data and could potentially leave sensitive information vulnerable.

    Rate this question:

  • 10. 

    A laptop user reports that they cannot see the SSID or connect to their company's wireless network. Which of the following should the technician try FIRST?

    • A.

      Check the wireless settings in the OS

    • B.

      Replace the internal wireless adapter

    • C.

      Check the wireless on/off switch

    • D.

      Check the signal strength

    Correct Answer
    C. Check the wireless on/off switch
    Explanation
    The technician should try checking the wireless on/off switch first. This is because if the switch is turned off, it would prevent the laptop from detecting the SSID or connecting to the wireless network. By checking the switch and ensuring it is turned on, the technician can eliminate this possibility before moving on to other troubleshooting steps.

    Rate this question:

  • 11. 

    A user reports that the desktop PC shuts down 10 minutes after turning it on in the morning. When the technician moves the PC, it sounds like there are loose parts sliding around in the case. Which of the following is the MOST likely explanation for the PC shutting down?

    • A.

      The CMOS battery is bad.

    • B.

      A memory module has become unseated.

    • C.

      The heat sink retaining clip has broken loose.

    • D.

      The hard drive cable has become unseated.

    Correct Answer
    C. The heat sink retaining clip has broken loose.
    Explanation
    The most likely explanation for the PC shutting down is that the heat sink retaining clip has broken loose. When the technician moves the PC and hears loose parts sliding around in the case, it suggests that there is a problem with the heat sink. The heat sink is responsible for dissipating heat from the CPU, and if it is not properly secured, it can cause the CPU to overheat and trigger an automatic shutdown to prevent damage.

    Rate this question:

  • 12. 

    A user reports that the PC is not working. After questioning the user, the technician believes the problem is a bad memory module. Which of the following is the NEXT step the technician should take?

    • A.

      Document findings, actions, and outcomes

    • B.

      Test the theory by replacing the motherboard

    • C.

      Test the theory by running memory diagnostic software

    • D.

      Verify the system is working correctly

    Correct Answer
    C. Test the theory by running memory diagnostic software
    Explanation
    The technician should test the theory by running memory diagnostic software. This step is necessary to confirm whether the problem is indeed a bad memory module. By running the diagnostic software, the technician can identify any issues with the memory module and determine if it needs to be replaced. This step is crucial in troubleshooting and ensuring that the correct solution is implemented.

    Rate this question:

  • 13. 

    A technician is diagnosing a PC running Windows 7 which has been affected with an "NTLDR is missing" error message. Which of the following command line tools would BEST resolve the problem?

    • A.

      Fixboot

    • B.

      CHKDSK

    • C.

      Scandisk

    • D.

      DEFRAG

    Correct Answer
    A. Fixboot
    Explanation
    Fixboot is the best command line tool to resolve the "NTLDR is missing" error message. This error typically occurs when the NTLDR file, which is responsible for loading the Windows operating system, is not found or corrupted. The Fixboot command is used to repair the boot sector of the system partition, ensuring that the necessary files are properly loaded during the boot process. This command can help restore the functionality of the Windows operating system and resolve the error.

    Rate this question:

  • 14. 

    A user reports that people are receiving emails from their account that the user never sent. Which of the following security measures would BEST resolve the problem?

    • A.

      Check the startup list on the PC for malicious entries.

    • B.

      Change the account password.

    • C.

      Upgrade the email client to a newer version.

    • D.

      Install a more expensive spam filter.

    Correct Answer
    B. Change the account password.
    Explanation
    Changing the account password would be the best security measure to resolve the problem of people receiving emails from the user's account that they never sent. By changing the password, unauthorized access to the account would be prevented, ensuring that only the user has control over their account and can send emails from it. This would help to secure the account and prevent any further unauthorized activity.

    Rate this question:

  • 15. 

    A technician is repairing a workstation that exhibits random reboots at odd times of the day. Which of the following should be performed FIRST when troubleshooting the issue? (Select TWO).

    • A.

      Check the PSU integrity

    • B.

      Check the CMOS battery

    • C.

      Check the video card integrity

    • D.

      Check the memory integrity

    • E.

      Check the optical drive integrity

    Correct Answer(s)
    A. Check the PSU integrity
    D. Check the memory integrity
    Explanation
    The technician should first check the PSU (Power Supply Unit) integrity because random reboots can be caused by insufficient or unstable power supply. If the PSU is faulty, it may not be able to provide enough power to the workstation, leading to unexpected reboots. Additionally, checking the memory integrity is important as faulty or incompatible RAM can also cause random reboots. By ensuring that both the PSU and memory are functioning properly, the technician can eliminate two common causes of the issue and narrow down the troubleshooting process.

    Rate this question:

  • 16. 

    While using an application on a Windows XP desktop PC, a BSOD appears. Which of the following should the technician select upon reboot to troubleshoot this issue?

    • A.

      Boot to safe mode

    • B.

      Boot to last known good configuration

    • C.

      Boot to another OS on a second partition

    • D.

      Boot normally

    Correct Answer
    A. Boot to safe mode
    Explanation
    When a BSOD (Blue Screen of Death) appears on a Windows XP desktop PC, the technician should select "Boot to safe mode" upon reboot to troubleshoot the issue. Safe mode starts the computer with only the basic files and drivers necessary to run the operating system, which can help identify and resolve any software or driver conflicts that may have caused the BSOD. By booting into safe mode, the technician can access the system with minimal functionality and work towards resolving the underlying issue.

    Rate this question:

  • 17. 

    A user powers on their Windows XP PC. The POST runs and the message "NTLDR is missing" appears. Which of the following should the technician do to troubleshoot this problem?

    • A.

      Run FDISK

    • B.

      Run SCANDISK

    • C.

      Run CHKDSK /F

    • D.

      Run FIXMBR

    Correct Answer
    D. Run FIXMBR
    Explanation
    The message "NTLDR is missing" indicates that the NTLDR (NT Loader) file, which is responsible for loading the Windows operating system, is not found. Running FIXMBR (Fix Master Boot Record) can help troubleshoot this problem by repairing any issues with the Master Boot Record (MBR) on the hard drive. The MBR contains the information necessary for the computer to start up and load the operating system. By running FIXMBR, the technician can fix any corruption or errors in the MBR, allowing the computer to boot up properly.

    Rate this question:

  • 18. 

    A user states that their old Windows XP notebook loses time when they power it off. Which of the following items would address this problem?

    • A.

      Remove any over clocking settings in the BIOS.

    • B.

      Replace the CMOS battery.

    • C.

      Replace the main battery with a larger power battery.

    • D.

      Update the BIOS to new revision.

    Correct Answer
    B. Replace the CMOS battery.
    Explanation
    The CMOS battery is responsible for maintaining the system clock and other BIOS settings when the computer is powered off. If the CMOS battery is old or weak, it may not be able to retain the correct time, causing the notebook to lose time when powered off. By replacing the CMOS battery, the user can ensure that the notebook maintains the correct time even when powered off.

    Rate this question:

  • 19. 

    A technician would like to map a network drive. Which of the following indicates the correct path for mapping a network drive?

    • A.

      \\share\servername

    • B.

      \\username\servername

    • C.

      \\password\share

    • D.

      \\servername\share

    Correct Answer
    D. \\servername\share
    Explanation
    The correct path for mapping a network drive is "\\servername\share". This path indicates that the network drive is located at the server with the name "servername" and the share is named "share". By mapping this path, the technician will be able to access the network drive and its contents.

    Rate this question:

  • 20. 

    Which of the following is the MINIMUM account required to install most programs on Windows XP?

    • A.

      Power user

    • B.

      Administrator

    • C.

      Standard user

    • D.

      Guest

    Correct Answer
    A. Power user
    Explanation
    Power user is the correct answer because it is the minimum account required to install most programs on Windows XP. The power user account has elevated privileges that allow the user to install and modify software, but it does not have full administrative control over the system. This account is designed for users who need more control than a standard user but do not require full administrative access.

    Rate this question:

  • 21. 

    Which of the following user accounts should be disabled to adhere to security best practices?

    • A.

      Standard user

    • B.

      Guest

    • C.

      Administrator

    • D.

      Power user

    Correct Answer
    B. Guest
    Explanation
    The Guest account should be disabled to adhere to security best practices because it is a default account with limited privileges that can be accessed by anyone. Disabling the Guest account helps prevent unauthorized access and potential security breaches.

    Rate this question:

  • 22. 

    When configuring user accounts, which of the following should a technician perform?

    • A.

      Make all users local administrators

    • B.

      Assign the minimum required access to the users

    • C.

      Make all users standard users

    • D.

      Assign the maximum required access to the users

    Correct Answer
    B. Assign the minimum required access to the users
    Explanation
    When configuring user accounts, a technician should assign the minimum required access to the users. This ensures that users only have access to the resources and privileges necessary for their job roles, reducing the risk of unauthorized access or accidental changes to system settings. Assigning the minimum required access also helps to maintain system security and prevent potential misuse or abuse of privileges.

    Rate this question:

  • 23. 

    A technician needs to rebuild a computer that had a virus. Which of the following data destruction methods should be used to ensure the virus has been successfully erased before reinstalling the operating system, programs, and all user data?

    • A.

      Standard format

    • B.

      Low level format

    • C.

      Shredder

    • D.

      Degaussing tool

    Correct Answer
    A. Standard format
    Explanation
    To ensure the virus has been successfully erased before reinstalling the operating system, programs, and all user data, the technician should use the standard format data destruction method. Standard format involves reformatting the hard drive, which erases all existing data and partitions on the drive. This process removes any traces of the virus and prepares the computer for a clean installation of the operating system, programs, and user data. A low level format, on the other hand, is a more thorough method that also reinitializes the hard drive at a hardware level, but it is not necessary in this case. Shredder and degaussing tools are used for physical destruction of storage media, which is not applicable in this scenario.

    Rate this question:

  • 24. 

    Which of the following procedures needs to be done FIRST in order to modify system files and folders in Windows XP?

    • A.

      Add command line options /s /v to Windows XP setup.exe file prior operating system installation.

    • B.

      The system files and folders must be moved to another partition.

    • C.

      Change the default settings in Folder options.

    • D.

      Clear Read-Only restrictions in system files and folders properties.

    Correct Answer
    C. Change the default settings in Folder options.
    Explanation
    To modify system files and folders in Windows XP, the first procedure that needs to be done is to change the default settings in Folder options. This is because by changing the default settings, you can enable the display of hidden files and folders, which are necessary to access and modify system files and folders. Without changing these settings, the system files and folders will remain hidden and inaccessible for modification.

    Rate this question:

  • 25. 

    A technician is troubleshooting a computer which is making a loud clicking noise and not booting. Which of the following parts MOST likely needs to be replaced?

    • A.

      CD-DVD drive

    • B.

      Hard drive

    • C.

      Memory sticks

    • D.

      Motherboard

    Correct Answer
    B. Hard drive
    Explanation
    The loud clicking noise and failure to boot indicate a mechanical issue with the computer. The most likely part to be causing this problem is the hard drive. Hard drives have moving parts, and a loud clicking noise often indicates a mechanical failure within the drive. This would prevent the computer from booting up properly. Replacing the hard drive would likely resolve the issue and allow the computer to function properly again.

    Rate this question:

  • 26. 

    A technician needs to free up hard drive space by emptying the recycle bin, deleting temporary files, and compressing old files. Which of the following utilities will allow the technician to accomplish this simultaneously?

    • A.

      System Configuration

    • B.

      Performance Management

    • C.

      Disk Defragmenter

    • D.

      Disk Cleanup

    Correct Answer
    D. Disk Cleanup
    Explanation
    Disk Cleanup is the correct answer because it is a utility that allows the technician to empty the recycle bin, delete temporary files, and compress old files all at once. It helps to free up hard drive space by removing unnecessary files and optimizing the storage capacity of the system.

    Rate this question:

  • 27. 

    A technician needs to uninstall some software from a Windows XP computer. Which of the following utilities is unique to Windows XP?

    • A.

      Add / Remove Programs

    • B.

      Programs and Features

    • C.

      Programs

    • D.

      Uninstall a Program

    Correct Answer
    A. Add / Remove Programs
    Explanation
    Add / Remove Programs is the correct answer because it is a utility that is unique to Windows XP. This utility allows users to uninstall software from their computer by accessing the Control Panel and selecting the desired program to be removed. Other options listed, such as Programs and Features, Programs, and Uninstall a Program, are not specific to Windows XP and can be found in other versions of Windows as well.

    Rate this question:

  • 28. 

    A user states when they press certain letters on their laptop's keyboard, a number is displayed on the screen. Which of the following can the technician perform to resolve this issue?

    • A.

      Change the character mapping

    • B.

      Turn off number lock

    • C.

      Replace the keyboard

    • D.

      Update the keyboard drivers

    Correct Answer
    B. Turn off number lock
    Explanation
    The user is experiencing a problem where pressing certain letters on their laptop's keyboard displays a number on the screen. This suggests that the number lock function is enabled on the keyboard, causing the numbers to be displayed instead of the intended letters. By turning off the number lock, the technician can resolve this issue and allow the letters to be displayed correctly when pressed on the keyboard.

    Rate this question:

  • 29. 

    A contractor needs to destroy several drives containing confidential information so that they can never be used again. Which of the following destruction methods would BEST accomplish this task?

    • A.

      Overwrite the hard drives.

    • B.

      Drill into the hard drives.

    • C.

      Degauss the hard drives.

    • D.

      Sanitize the hard drives.

    Correct Answer
    B. Drill into the hard drives.
    Explanation
    Drilling into the hard drives would be the best method to ensure that the confidential information cannot be accessed again. By physically damaging the drives through drilling, the internal components and data storage areas would be destroyed, making it extremely difficult if not impossible to recover any information. Overwriting, degaussing, and sanitizing methods may still leave traces of data that could potentially be recovered, whereas drilling ensures complete destruction.

    Rate this question:

  • 30. 

    A customer purchases a new 802.11n router for their home. They connect it to their current 801.11g devices, as well as their new laptop. Even though the laptop has a built-in 802.11n antenna, they are not noticing any speed increase. Which of the following is the MOST likely cause?

    • A.

      The laptop is not close enough to the router.

    • B.

      The router should be set to "G-Only".

    • C.

      The router is broadcasting in Mixed Mode.

    • D.

      The laptop needs a dedicated access point.

    Correct Answer
    C. The router is broadcasting in Mixed Mode.
    Explanation
    The most likely cause for the customer not noticing any speed increase is that the router is broadcasting in Mixed Mode. Mixed Mode allows the router to support both 802.11g and 802.11n devices, but it may limit the speed to the lowest common denominator, which in this case is 802.11g. Therefore, even though the laptop has a built-in 802.11n antenna, it will not be able to achieve the higher speeds if the router is broadcasting in Mixed Mode.

    Rate this question:

  • 31. 

    Which of the following home computer synchronization methods are possible with an iOS device? (Select TWO).

    • A.

      Infrared

    • B.

      USB

    • C.

      FireWire

    • D.

      Wi-Fi

    • E.

      Parallel

    Correct Answer(s)
    B. USB
    D. Wi-Fi
    Explanation
    The correct answer is USB and Wi-Fi. USB is a common method for syncing data between a home computer and an iOS device. It allows for a direct connection between the two devices using a USB cable. Wi-Fi is another method that allows for wireless syncing between the iOS device and the home computer. This can be done through an internet connection, allowing for easy and convenient synchronization of data. Infrared, FireWire, and Parallel are not compatible methods for syncing with an iOS device.

    Rate this question:

  • 32. 

    A technician has a computer locked in a cabinet in the office that shares a printer and some files. The computer must remain on. Which of the following Control Panel options would be used to control the users that are able to shut the computer down?

    • A.

      Power options

    • B.

      Security center

    • C.

      Local security policy

    • D.

      System

    Correct Answer
    C. Local security policy
    Explanation
    The correct answer is "Local security policy" because this option allows the technician to control the users who have the ability to shut down the computer. By accessing the local security policy settings, the technician can specify which users or user groups have the necessary privileges to shut down the computer. This helps to ensure that only authorized individuals can perform this action, preventing accidental or unauthorized shutdowns.

    Rate this question:

  • 33. 

    A customer states that another technician just removed some viruses and now they are not able to connect to websites such as Windows Update, but are able to connect to others. Which of the following is the MOST likely cause of the issue?

    • A.

      NIC driver is damaged

    • B.

      Not all viruses have been fixed

    • C.

      Internet Explorer cache is full

    • D.

      Host file has been manipulated

    Correct Answer
    D. Host file has been manipulated
    Explanation
    The most likely cause of the issue is that the host file has been manipulated. The host file is a local file on a computer that maps hostnames to IP addresses. If it has been manipulated, it can redirect the computer's attempts to connect to specific websites, such as Windows Update, to incorrect or blocked IP addresses. This would explain why the customer is unable to connect to certain websites but can connect to others.

    Rate this question:

  • 34. 

    A technician has 50 identical computers that need to be upgraded to the Windows 7 OS, and are capable of booting from the network. They are running a Gigabit network with a Windows deployment server. Which of the following will be the BEST to use in this scenario?

    • A.

      UEFI

    • B.

      Windows 7 DVD

    • C.

      PXE

    • D.

      USB flash

    Correct Answer
    C. PXE
    Explanation
    In this scenario, the best option to use would be PXE (Preboot Execution Environment). PXE allows the technician to boot the computers from the network, which is efficient when upgrading multiple computers. This means that the technician can use the Windows deployment server to remotely install the Windows 7 OS on all 50 computers at once, saving time and effort compared to individually upgrading each computer using other options like UEFI, Windows 7 DVD, or USB flash.

    Rate this question:

  • 35. 

    A technician receives an error every time a workstation boots up. The technician needs to find out what process is responsible for the error. Which of the following utilities would be used FIRST?

    • A.

      System Control Panel

    • B.

      Task Manager

    • C.

      Event Viewer

    • D.

      MSCONFIG

    Correct Answer
    C. Event Viewer
    Explanation
    The Event Viewer utility would be used first in this scenario. Event Viewer is a tool in Windows operating systems that allows the technician to view and analyze system events and logs. By checking the event logs, the technician can identify any errors or issues that occurred during the boot-up process and determine which process is responsible for the error. This can help in troubleshooting and resolving the problem with the workstation.

    Rate this question:

  • 36. 

    A technician installs a new SOHO wireless router to replace a failed router and users report connectivity issues and IP errors. Which of the following is the MOST likely cause?

    • A.

      Their server has gone down

    • B.

      There are too many static IP addresses on the network

    • C.

      The new router's firewall is malfunctioning

    • D.

      Users need to refresh their IP configuration

    Correct Answer
    D. Users need to refresh their IP configuration
    Explanation
    The most likely cause for the connectivity issues and IP errors reported by the users after installing a new SOHO wireless router is that the users need to refresh their IP configuration. When a new router is installed, the users' devices may still be using the old IP configuration, causing conflicts and errors. By refreshing their IP configuration, the devices will obtain new IP addresses and establish proper connectivity with the new router. This is a common troubleshooting step in such scenarios.

    Rate this question:

  • 37. 

    A technician installs a new video card for a customer on a desktop PC. The technician powers on the PC and does not get video. Which of the following steps should the technician perform FIRST to troubleshoot this issue?

    • A.

      Flash the BIOS

    • B.

      Research the problem on the Internet

    • C.

      Reseat the video card

    • D.

      Replace the video card

    Correct Answer
    C. Reseat the video card
    Explanation
    The first step the technician should perform to troubleshoot the issue is to reseat the video card. This involves removing the video card from its slot and then firmly inserting it back in to ensure it is properly connected. This is a common troubleshooting step as sometimes the video card may not be seated correctly, leading to no video output. By reseating the video card, the technician can eliminate any potential connection issues before moving on to other troubleshooting steps.

    Rate this question:

  • 38. 

    A technician is tasked with changing the account lockout threshold to 30 minutes in Windows 7. Which of the following should the technician use to accomplish this task?

    • A.

      User Access Control

    • B.

      Windows Security Center

    • C.

      Local Security Policy

    • D.

      Users and Groups

    Correct Answer
    C. Local Security Policy
    Explanation
    To change the account lockout threshold to 30 minutes in Windows 7, the technician should use the Local Security Policy. The Local Security Policy allows the technician to configure various security settings on a local computer, including account lockout policies. By accessing the Local Security Policy, the technician can modify the account lockout threshold to the desired value of 30 minutes.

    Rate this question:

  • 39. 

    A technician is creating an image that will be used to deploy Windows 7 to 100 PCs. Which of the following tools should be used to accomplish this?

    • A.

      SYSPREP

    • B.

      Windows 7 Advisor

    • C.

      CHKDSK

    • D.

      DISKPART

    Correct Answer
    A. SYSPREP
    Explanation
    SYSPREP should be used to create an image for deploying Windows 7 to multiple PCs. SYSPREP (System Preparation) is a Microsoft tool that prepares a computer's hard disk for imaging or cloning by removing unique identifiers such as the computer name and security identifier (SID). It allows the image to be deployed to multiple computers without conflicts. Windows 7 Advisor is used to check the compatibility of a computer for Windows 7, CHKDSK is used to check and repair file system errors, and DISKPART is used to manage disk partitions.

    Rate this question:

  • 40. 

    A technician is having boot issues with a newly built PC, and notices the following jumper configurations for each PATA devicE. - HARD DRIVE. MASTER - OPTICAL DRIVE. CABLE SELECT Which of the following jumper configurations should be used instead?

    • A.

      HDD. Cable Select; Optical DrivE. Master

    • B.

      HDD. Cable Select; Optical DrivE. Cable Select

    • C.

      HDD. Slave; Optical DrivE. Slave

    • D.

      HDD. Master; Optical DrivE. Master

    Correct Answer
    B. HDD. Cable Select; Optical DrivE. Cable Select
    Explanation
    The correct answer is HDD. Cable Select; Optical DrivE. Cable Select. This configuration should be used instead because it allows both the hard drive and optical drive to be set to Cable Select. Cable Select is a setting that allows the computer to automatically determine the master and slave devices based on their physical connection to the IDE cable. This ensures that the devices are properly recognized and allows for the correct boot order.

    Rate this question:

  • 41. 

    A computer is showing the "No boot device found" message even though a technician has verified that the hard drive is set as Device 1 in the BIOS boot order. Which of the following causes is MOST likely at play?

    • A.

      A 40-pin cable was used instead of an 80-pin cable to connect the HDD.

    • B.

      The hard drive is disconnected.

    • C.

      The hard drive has corrupted sectors and needs a CHKDSK scan.

    • D.

      Both PATA devices are incorrectly set to the master jumper setting.

    Correct Answer
    D. Both PATA devices are incorrectly set to the master jumper setting.
    Explanation
    The most likely cause for the computer showing the "No boot device found" message, despite the hard drive being set as Device 1 in the BIOS boot order, is that both PATA devices are incorrectly set to the master jumper setting. This means that both the hard drive and another PATA device (such as an optical drive) are set to be the master device on the same cable, causing a conflict and preventing the computer from booting properly.

    Rate this question:

  • 42. 

    A technician is troubleshooting a RAID 6 array on a high end CAD/CAM workstation. Two disk drives have their fault lights on. Which of the following is the BEST action for the technician to perform when fixing this problem?

    • A.

      Replace the failed drives and verify the RAID rebuilds completely.

    • B.

      Reseat the drives, backup the data, and then replace them.

    • C.

      Reseat the drives and monitor the RAID status over a few days.

    • D.

      Replace the failed drives and restore the data from a known good

    Correct Answer
    A. Replace the failed drives and verify the RAID rebuilds completely.
    Explanation
    The best action for the technician to perform when fixing this problem is to replace the failed drives and verify that the RAID rebuilds completely. This is because the fault lights indicate that the drives have failed, and replacing them is necessary to restore the functionality of the RAID array. Verifying the RAID rebuilds completely ensures that the data is properly restored and the array is functioning as expected.

    Rate this question:

  • 43. 

    Which of the following options is MOST likely active on a network of three workstations, running Windows 7 Home Edition x64, to enable File and Print sharing?

    • A.

      HomeGroup

    • B.

      Active Directory

    • C.

      WorkGroup

    • D.

      Domain Setup

    Correct Answer
    A. HomeGroup
    Explanation
    The most likely option that would be active on a network of three workstations running Windows 7 Home Edition x64 to enable File and Print sharing is HomeGroup. HomeGroup is a feature in Windows 7 that allows users to easily share files and printers between computers on a home network. It provides a simple and secure way to share resources without the need for complex network configurations.

    Rate this question:

  • 44. 

    A technician wants to setup security permissions for a FAT32 hard drive while ensuring all data is intact. Which of the following commands should be used?

    • A.

      FORMAT /X

    • B.

      FORMAT /C

    • C.

      REPLACE

    • D.

      CONVERT

    Correct Answer
    D. CONVERT
    Explanation
    The correct answer is CONVERT. This command is used to convert a FAT32 file system to NTFS without losing any data. By using CONVERT, the technician can set up security permissions for the hard drive while ensuring that all the existing data remains intact.

    Rate this question:

  • 45. 

    A Windows Vista computer has an experience index of 3.8. The technician discovers that the computer has the following: Performance index RAM1GB4.6 Video3D 3.8 CPU2.4GHz4.2 The technician upgrades the memory to 2GB and gets the following results: Performance index RAM2GB5.0 Video3D 3.8 CPU2.4GHz4.2 But the Windows experience index is still at 3.8. Which of the following can the technician do to improve the performance index?

    • A.

      Upgrade the video card

    • B.

      Increase the RAM to 4GB

    • C.

      Upgrade the CPU to 3GHz

    • D.

      Increase the resolution on the screen

    Correct Answer
    A. Upgrade the video card
  • 46. 

    Which of the following is the BEST way to ensure that only specified devices can connect to a wireless network?

    • A.

      Use MAC filtering

    • B.

      Set up a VLAN

    • C.

      Disable SSID broadcasting

    • D.

      Enable WEP encryption

    Correct Answer
    A. Use MAC filtering
    Explanation
    MAC filtering is the best way to ensure that only specified devices can connect to a wireless network. MAC filtering allows the network administrator to create a list of approved MAC addresses, which are unique identifiers assigned to each network device. By enabling MAC filtering, only devices with MAC addresses on the approved list will be able to connect to the network, providing an additional layer of security.

    Rate this question:

  • 47. 

    A laser printer has a blank streak along one edge of each page but is otherwise printing normally. Which of the following is the MOST likely reason for this?

    • A.

      The fuser is damaged.

    • B.

      The printer needs to be rebooted.

    • C.

      The paper is too thick.

    • D.

      The toner cartridge is low.

    Correct Answer
    A. The fuser is damaged.
    Explanation
    The fuser is responsible for bonding the toner to the paper. If the fuser is damaged, it may not be able to apply heat and pressure evenly along the edge of the paper, resulting in a blank streak. Rebooting the printer or using thick paper would not cause a specific streak along one edge, and a low toner cartridge would not affect the printing in this way.

    Rate this question:

  • 48. 

    A technician is replacing a Windows 2000 Professional computer with a Windows 7 computer for someone with login account USER1. Which of the following directories should be copied or moved from the old computer and where should they be placed on the new computer?

    • A.

      \Documents and Settings\USER1 to \Documents and Settings\USER1

    • B.

      \Documents and Settings\USER1 to \Users\USER1

    • C.

      \Users\USER1 to \Users\USER1

    • D.

      \Users\USER1 to \Documents and Settings\USER1

    Correct Answer
    B. \Documents and Settings\USER1 to \Users\USER1
    Explanation
    The correct answer is \Documents and Settings\USER1 should be copied or moved to \Users\USER1 on the new computer. This is because in Windows 7, the directory structure has changed and the user profiles are now stored in the \Users directory instead of the \Documents and Settings directory. Therefore, to ensure that the user's profile is properly transferred to the new computer, the contents of the old \Documents and Settings\USER1 directory should be moved or copied to the new \Users\USER1 directory.

    Rate this question:

  • 49. 

    A client used file properties to hide files in their user folder and now needs to get the files back. Using the command line tool, which of the following combination of command line parameters will make the files viewable once again?

    • A.

      Attrib +A *.*

    • B.

      Attrib -A +H *.*

    • C.

      Attrib -R *.*

    • D.

      Attrib -H *.*

    Correct Answer
    D. Attrib -H *.*
    Explanation
    The correct answer is "attrib -H *.*". The "-H" parameter in the "attrib" command is used to remove the hidden attribute from files. By running this command with the wildcard "*.*", it will remove the hidden attribute from all files in the current directory, making them viewable again.

    Rate this question:

  • 50. 

    A yellow exclamation mark next to a device in Device Manager indicates which of the following?

    • A.

      The device driver is outdated.

    • B.

      The device driver is missing.

    • C.

      The device driver is corrupt.

    • D.

      The device is disabled.

    Correct Answer
    B. The device driver is missing.
    Explanation
    A yellow exclamation mark next to a device in Device Manager indicates that the device driver is missing. This means that the computer is unable to recognize and communicate with the device properly because the necessary driver software is not installed. Without the driver, the device will not function correctly or may not be detected at all.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 18, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 22, 2013
    Quiz Created by
    Gerardo_ceboller
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.