ESD in Technical Work
283 Questions
36 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

A person has started a new technical job. In which situation would ESD be an issue?

  • when installing a processor (correct)
  • when using a grounded mat and working on a computer on an ungrounded workbench
  • when installing a dual-voltage power supply
  • while exchanging one laptop AC adapter with one that is not from the original equipment manufacturer
  • In which situation would an ESD strike potentially cause harm to the PC?

  • when installing an additional display in a workplace cubicle
  • when replacing high voltage laser printer parts
  • while attaching speakers to a surround sound card
  • when installing RAM (correct)
  • In which situation would an ESD strike potentially cause harm to the PC?

  • when replacing a mechanical hard drive with an M.2 SSD (correct)
  • when installing an additional display in a workplace cubicle
  • when using a grounded mat and working on a computer on an ungrounded workbench
  • when installing a dual-voltage power supply
  • A person has started a new technical job. In which situation would ESD be an issue?

    <p>when installing RAM</p> Signup and view all the answers

    A technician is about to begin preventive maintenance on a company PC. In which situation would ESD be an issue?

    <p>when replacing a motherboard</p> Signup and view all the answers

    An instructor has given a student an assignment to assemble a PC. In which situation should the student be aware that ESD is an issue?

    <p>when installing RAM</p> Signup and view all the answers

    An instructor has given a student an assignment to assemble a PC. In which situation should the student be aware that ESD is an issue?

    <p>when replacing a mechanical hard drive with an M.2 SSD</p> Signup and view all the answers

    An instructor has given a student an assignment to assemble a PC. In which situation should the student be aware that ESD is an issue?

    <p>when installing a processor</p> Signup and view all the answers

    What two motherboard components control the system boot operations? (Choose two.)

    <p>BIOS chip UEFI chip</p> Signup and view all the answers

    A technician is upgrading an ATX motherboard with another ATX motherboard. Which component might be affected by this and need to be upgraded and bought as an additional purchase?

    <p>CPU</p> Signup and view all the answers

    A customer has requested that a PC be built that will support eSATA. Which component should be checked to be sure that this feature is supported?

    <p>chipset</p> Signup and view all the answers

    Which memory module used to hold instructions for booting a PC and loading the OS, but is still used on adapters even though the memory contents cannot be changed?

    <p>ROM</p> Signup and view all the answers

    What is a characteristic of DDR SDRAM?

    <p>It transfers data twice per clock cycle compared to once per clock cycle for SDRAM.</p> Signup and view all the answers

    What are two safety hazards when dealing with laser printers? (Choose two.)

    <p>high voltage hot components</p> Signup and view all the answers

    Which component requires a technician to install screws externally through the PC case?

    <p>power supply</p> Signup and view all the answers

    A technician is installing an internal HDD. To which motherboard connector will the technician connect the data cable?

    <p>SATA</p> Signup and view all the answers

    Refer to the exhibit. A technician has been asked to install a video card. Which section of the motherboard will the technician use to install the card?

    <p>section D</p> Signup and view all the answers

    When a PC is being assembled, what component is connected to the motherboard with a SATA cable?

    <p>the optical drive</p> Signup and view all the answers

    A technician is troubleshooting a computer that is experiencing hardware failure detected by the BIOS. What is one way this failure is indicated?

    <p>The computer emits a pattern of beeps indicating the failing device.</p> Signup and view all the answers

    . Which three features can be configured in the BIOS settings to secure a computer? (Choose three.)

    <p>drive encryption TPM passwords</p> Signup and view all the answers

    What is the purpose of RAID adapters?

    <p>to connect multiple storage devices for redundancy or speed</p> Signup and view all the answers

    When a new motherboard is being installed, between which two components must thermal compound be applied? (Choose two.)

    <p>CPU heat sink</p> Signup and view all the answers

    What is the purpose of a Safety Data Sheet?

    <p>to specify procedures for dealing with potentially hazardous materials</p> Signup and view all the answers

    Which negative environmental factor does cleaning the inside of a computer reduce?

    <p>dust</p> Signup and view all the answers

    What is a recommended procedure to follow when cleaning computer components?

    <p>Hold cans of compressed air upright while spraying.</p> Signup and view all the answers

    On the production floor, a furniture plant has laptops for process monitoring and reporting. The production floor environment is around 80 degrees Fahrenheit (27 degrees Celsius). The humidity level is fairly high around 70 percent. Fans are mounted in the ceiling for air circulation. Wood dust is prevalent. Which condition is most likely to adversely affect a laptop that is used in this environment?

    <p>the dust</p> Signup and view all the answers

    After a technician tests a theory of probable causes, what two actions should the technician take if the testing did not identify an exact cause? (Choose two.)

    <p>Establish a new theory of probable causes. Document each test tried that did not correct the problem.</p> Signup and view all the answers

    What would happen if a PC that contains a power supply that does not automatically adjust for input voltage is set to 230 volts and attaches to an outlet in the United States?

    <p>The PC would not turn on.</p> Signup and view all the answers

    Which type of network spans a single building or campus and provides services and applications to people within a common organizational structure?

    <p>LAN</p> Signup and view all the answers

    What are two types of wired high-speed Internet connections? (Choose two.)

    <p>cable DSL</p> Signup and view all the answers

    In what two situations would UDP be better than TCP as the preferred transport protocol? (Choose two.)

    <p>when a faster delivery mechanism is needed when applications do not need to guarantee delivery of the data</p> Signup and view all the answers

    The current IP configuration of a small company is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service would simplify the workstation IP configuration task?

    <p>DHCP</p> Signup and view all the answers

    A company is looking for a next-generation firewall that provides VPN functionality, IDS/IPS functionality, and DoS/DDoS protection. Which device would be best suited for this task?

    <p>UTM</p> Signup and view all the answers

    A student is helping a friend with a home computer that can no longer access the Internet. Upon investigation, the student discovers that the computer has been assigned the IP address 169.254.100.88. What could cause a computer to get such an IP address?

    <p>unreachable DHCP server</p> Signup and view all the answers

    What three values must be added to the IPv4 properties of a NIC in order for a computer to have basic connectivity with the network? (Choose three.)

    <p>subnet mask default gateway IP address</p> Signup and view all the answers

    A device has an IPv6 address of 2001:0DB8:75a3:0214:0607:1234:aa10:ba01 /64. What is the host identifier of the device?

    <p>0607:1234:aa10:ba01</p> Signup and view all the answers

    How can a user prevent specific applications from accessing a Windows computer over a network?

    <p>Block specific TCP or UDP ports in Windows Firewall.</p> Signup and view all the answers

    Place the six stages of the troubleshooting process in the correct order. 34 klausimas

    <h1>Test the theory to determine the cause = Step 3 Verify full system functionality and if applicable, implement preventive measures = Step 5 Test the theory to determine the cause = Step 3</h1> Signup and view all the answers

    A technician has been asked to configure Wi-Fi calling on a corporate mobile device. In which situation would this feature be most advantageous?

    <p>when in an area with poor cellular coverage</p> Signup and view all the answers

    Which statement is true about laptops?

    <p>Most of the internal components that are designed for laptops cannot be used for desktops.</p> Signup and view all the answers

    Which standard provides a bridge between laptop hardware and the operating system and a way for technicians to configure power management schemes to get the best performance?

    <p>ACPI</p> Signup and view all the answers

    Which two laptop components are considered replaceable by the customer. (Choose two.)

    <p>battery RAM</p> Signup and view all the answers

    A user wants to synchronize some apps, movies, music, and ebooks between mobile devices. What are the two types of connections used to synchronize this type of data? (Choose two.)

    <p>Wi-Fi USB</p> Signup and view all the answers

    A technician is explaining the differences between inkjet printers and laser printers to a customer. Which two comparisons should the technician make? (Choose two.)

    <p>Inkjet printers are less expensive as an initial purchase than laser printers. The laser printer output is dry after printing, but an inkjet printer may still have wet ink on the paper after printing.</p> Signup and view all the answers

    A user chooses the collate option and prints two copies of a three-page document. What is the order in which the pages are printed?

    <p>pages 1, 2, 3, 1, 2, 3</p> Signup and view all the answers

    A color laser printer is used to print documents with graphics and photographs. Users are complaining that printing takes too long. Which component of the printer should be upgraded in order to improve printing performance?

    <p>RAM</p> Signup and view all the answers

    What service is available for Windows to provide software print server services to MAC OS clients?

    <p>Bonjour Print Server</p> Signup and view all the answers

    Which three components are typically found in laser printer maintenance kits? (Choose three.)

    <p>pickup rollers transfer rollers fuser assembly</p> Signup and view all the answers

    A technician is installing a new printer in a cool, damp environment. After the printer cabling is done, and the software and print driver are installed, the printer test page jams. What is the most likely cause of the print failure?

    <p>too much humidity</p> Signup and view all the answers

    A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual discrete server for each customer. What is the networking trend that is being implemented by the data center in this situation?

    <p>virtualization</p> Signup and view all the answers

    How does virtualization help with disaster recovery within a data center?

    <p>Hardware does not have to be identical.</p> Signup and view all the answers

    Which two hypervisors are suitable to support virtual machines in a data center? (Choose two.)

    <p>VMware ESX/ESXi Microsoft Hyper-V 2012</p> Signup and view all the answers

    A web designer accesses a company Windows 10 computer remotely. The designer often needs to simultaneously open multiple applications, such as a web page editor and a graphics editor. Rather than opening them in multiple windows, the designer opens them in different virtual desktops. What technology is being used by the designer?

    <p>Windows Virtual Desktop</p> Signup and view all the answers

    Which Cloud computing service would be best for an organization that needs to collaboratively create applications and deliver them over the web?

    <p>PaaS</p> Signup and view all the answers

    Which statement describes a feature of SDRAM?

    <p>It can process overlapping instructions in parallel.</p> Signup and view all the answers

    A technician is troubleshooting a server that displays the error message “RAID not found” after a power outage over the weekend. What is a possible cause for this?

    <p>The external RAID controller is not receiving power.</p> Signup and view all the answers

    A customer brings in a laptop with a touch screen that is not working correctly. The touch screen either does not respond at all or provides unusual or inaccurate responses. What is a possible cause for such behavior?

    <p>Too many apps are open.</p> Signup and view all the answers

    What are two security risks associated with sharing printers in a corporate environment? (Choose two.)

    <p>user authentication cached files</p> Signup and view all the answers

    Which change management process component is concerned with the business processes that are affected by changes?

    <p>assessment</p> Signup and view all the answers

    identification

    <p>10</p> Signup and view all the answers

    A computer technician is installing a RAID. If the RAID uses mirroring, which RAID level is the technician using?

    <p>1</p> Signup and view all the answers

    A computer technician is installing a RAID. If the RAID uses striping with parity, which RAID level is the technician using?

    <p>5</p> Signup and view all the answers

    A computer technician is installing a RAID. If the RAID uses striping, which RAID level is the technician using?

    <p>0</p> Signup and view all the answers

    A computer technician is installing a RAID. If the RAID uses striping with double parity, which RAID level is the technician using?

    <p>6</p> Signup and view all the answers

    A technician is upgrading many PCs used within the company. How should the technician dispose of an old battery?

    <p>Recycle following local regulations.</p> Signup and view all the answers

    A technician is upgrading many PCs used within the company. How should the technician dispose of a broken monitor?

    <p>Recycle following local regulations.</p> Signup and view all the answers

    A technician is upgrading many PCs used within the company. How should the technician dispose of an old power supply?

    <p>Recycle following local regulations.</p> Signup and view all the answers

    A technician is upgrading many PCs used within the company. How should the technician dispose of old RAM?

    <p>Recycle following local regulations.</p> Signup and view all the answers

    A technician is upgrading many PCs used within the company. How should the technician dispose of an old motherboard?

    <p>Recycle following local regulations.</p> Signup and view all the answers

    A technician is upgrading many PCs used within the company. How should the technician dispose of an old hard drive?

    <p>Recycle following local regulations.</p> Signup and view all the answers

    After continuous morning use, a computer suddenly reboots without the intervention of the user. What are the two most likely hardware parts that could cause this problem? (Choose two.)

    <p>CPU power supply</p> Signup and view all the answers

    For two days in a row, a user has noticed that the computer reboots several times before it eventually starts. What are two suspect components? (Choose two.)

    <p>CPU power supply</p> Signup and view all the answers

    While a user is working on a spreadsheet, the computer reboots. What are two components that could cause this issue? (Choose two.)

    <p>power supply CPU</p> Signup and view all the answers

    A client packet is received by a server. The packet has a destination port number of 137. What service application is the client requesting?

    <p>NetBIOS (NetBT)</p> Signup and view all the answers

    A client packet is received by a server. The packet has a destination port number of 22. What service application is the client requesting?

    <p>SSH</p> Signup and view all the answers

    A client packet is received by a server. The packet has a destination port number of 143. What service application is the client requesting?

    <p>IMAP</p> Signup and view all the answers

    A client packet is received by a server. The packet has a destination port number of 23. What service application is the client requesting?

    <p>Telnet</p> Signup and view all the answers

    A client packet is received by a server. The packet has a destination port number of 161. What service application is the client requesting?

    <p>SNMP</p> Signup and view all the answers

    A client packet is received by a server. The packet has a destination port number of 389. What service application is the client requesting?

    <p>LDAP</p> Signup and view all the answers

    A client packet is received by a server. The packet has a destination port number of 25. What service application is the client requesting?

    <p>SMTP</p> Signup and view all the answers

    A client packet is received by a server. The packet has a destination port number of 427. What service application is the client requesting?

    <p>SLP</p> Signup and view all the answers

    A client packet is received by a server. The packet has a destination port number of 53. What service application is the client requesting?

    <p>DNS</p> Signup and view all the answers

    Which is the compressed format of the IPv6 address 2001:0db8:0000:0000:0000:a0b0:0008:0001?

    <p>2001:db8::a0b0:8:1</p> Signup and view all the answers

    Which is the compressed format of the IPv6 address fe80:09ea:0000:2200:0000:0000:0fe0:0290?

    <p>fe80:9ea:0:2200::fe0:290</p> Signup and view all the answers

    Which is the compressed format of the IPv6 address 2002:0042:0010:c400:0000:0000:0000:0909?

    <p>2002:42:10:c400::909</p> Signup and view all the answers

    Which is the compressed format of the IPv6 address 2002:0420:00c4:1008:0025:0190:0000:0990?

    <p>2002:420:c4:1008:25:190::990</p> Signup and view all the answers

    Which is the compressed format of the IPv6 address 2001:0db8:0000:0000:0ab8:0001:0000:1000?

    <p>2001:db8::ab8:1:0:1000</p> Signup and view all the answers

    Which is the compressed format of the IPv6 address fe80:0000:0000:0000:0220:0b3f:f0e0:0029?

    <p>fe80::220:b3f:f0e0:29</p> Signup and view all the answers

    Which is the compressed format of the IPv6 address fe80:9ea0:0000:2020:0000:00bf:00e0:9290?

    <p>fe80:9ea0::2020:0:bf:e0:9290</p> Signup and view all the answers

    What ACPI power state describes when the CPU and RAM are off and the contents of RAM have been saved to a temporary file on the hard drive?

    <p>S4</p> Signup and view all the answers

    A reporter is trying to print several high resolution photographs but the color laser printer is going extremely slowly. What should the technician do to resolve the issue?

    <p>Add more RAM to the printer</p> Signup and view all the answers

    A new printer has just been installed deep in a mine. When test pages are printed, the paper constantly jams. What should the technician do to resolve the issue?

    <p>Move the printer to a less-humid location.</p> Signup and view all the answers

    A user complains that recently every printed document has vertical lines and streaks on the paper. What should the technician do to resolve the issue?

    <p>Distribute the toner more evenly within the cartridge.</p> Signup and view all the answers

    A school is installing a new shared printer but the printer is not showing up on the list of available printers. What should the technician do to resolve the issue?

    <p>Manually add the printer IP address.</p> Signup and view all the answers

    Employees are complaining that they send print jobs to a newly installed printer but the print jobs never print. What should the technician do to resolve the issue?

    <p>The printer is connected to the wrong port. Modify the port.</p> Signup and view all the answers

    Users have noticed that the colors on their printed documents are different from the colors that they see on their computer screens. What should the technician do to resolve the issue?

    <p>Calibrate the printer.</p> Signup and view all the answers

    A technician has just completed a preventive maintenance on the department printer. Users are now complaining that the printer is no longer available. What should the technician do to resolve the issue?

    <p>Check that the printer is plugged into a power source.</p> Signup and view all the answers

    Employees of a small business are complaining that the printer is printing faded images. What should the technician do to resolve the issue?

    <p>Replace the toner cartridge.</p> Signup and view all the answers

    A photographer is complaining about the following printer issue: The printer issues a “Document failed to print” message. What are two possible causes of this issue? (Choose two.)

    <p>A cable is loose or disconnected. The printer is no longer shared.</p> Signup and view all the answers

    A reporter is complaining about the following printer issue: The printer is printing unknown characters. What are two possible causes of this issue? (Choose two.)

    <p>The wrong or an outdated printer driver is installed. The printer has a loose connection.</p> Signup and view all the answers

    A manager is complaining about the following printer issue: The printer is printing incorrect colors. What are two possible causes of this issue? (Choose two.)

    <p>An incorrect cartridge could be installed. The print heads might need to be cleaned and calibrated.</p> Signup and view all the answers

    A technician is complaining about the following printer issue: The print appears faded on the paper. What are two possible causes of this issue? (Choose two.)

    <p>The paper might be incompatible with the printer. The toner cartridge is low.</p> Signup and view all the answers

    A librarian is complaining about the following printer issue: The printer control panel displays no image. What are two possible causes of this issue? (Choose two.)

    <p>The contrast of the screen may be set too low. The printer is not turned on.</p> Signup and view all the answers

    A teacher is complaining about the following printer issue: The paper is creased after printing. What are two possible causes of this issue? (Choose two.)

    <p>The paper-feed tray might not be firmly adjusted against the edges of the printer. The paper might be loaded incorrectly.</p> Signup and view all the answers

    A receptionist is complaining about the following printer issue: My impact printer produces faded or light characters. What are two possible causes of this issue? (Choose two.)

    <p>The ribbon may be worn out. The ribbon may be damaged.</p> Signup and view all the answers

    A photographer is complaining about the following printer issue: The paper is not being fed into the printer. What are two possible causes of this issue? (Choose two.)

    <p>The paper may be wrinkled. The printer could be set to print to a different paper size than is currently loaded.</p> Signup and view all the answers

    A laptop has an NVMe drive (C:) and a mechanical hard drive (D:). When the user tries to save a spreadsheet to the D: drive, the user notices that the D: drive is not there. What should the technician do to see if the drive is recognized by the operating system?

    <p>Use the Disk Management Control Panel.</p> Signup and view all the answers

    A computer has two mechanical hard drives. The second drive (D:) is used for data storage. When trying to save an email attachment to the local hard drive, the user notices that the D: drive is not an option. What should the technician do to see if the drive is recognized by the operating system?

    <p>Use File Explorer.</p> Signup and view all the answers

    A user reports that a drive is no longer there. The technician asks the user to demonstrate the problem. Within the application, the user demonstrates that the drive, that was present in the save options yesterday, is now no longer an option. What should the technician do to see if the drive is recognized by the operating system?

    <p>Use Device Manager.</p> Signup and view all the answers

    A computer has an SSD for the operating system and applications and uses another mechanical hard drive for data storage. The user reports that data can no longer be saved to the mechanical hard drive. What should the technician do to see if the drive is recognized by the operating system?

    <p>Use File Explorer.</p> Signup and view all the answers

    A technician is working on a laptop and the GPS is not functioning. What is a probable cause for this situation?

    <p>A service is disabled.</p> Signup and view all the answers

    A technician is working on a laptop and an app is not loading. What is a probable cause for this situation? A technician is working on a laptop and an app is not loading. What is a probable cause for this situation?

    <p>An app needs to be restarted.</p> Signup and view all the answers

    A technician is working on a laptop and an app is not responding. What is a probable cause for this situation?

    <p>An app needs to be restarted.</p> Signup and view all the answers

    A technician is working on a laptop and an error message about decryption appears when opening an email. What is a probable cause for this situation?

    <p>A digital certificate is missing.</p> Signup and view all the answers

    A PC technician has been asked by a supervisor to recommend a security solution for a small company that wants stateful firewall services. Which security technique should the technician recommend

    <p>Buy an ASA.</p> Signup and view all the answers

    A gamer is booting a desktop that has Windows 10 installed on dynamic drives. The boot process is currently working on the following step: WinLoad reads the registry files, chooses a hardware profile, and loads the device drivers. What is the next step that will happen in the boot process?

    <p>The Windows kernel takes over the boot process.</p> Signup and view all the answers

    A technician is working on a laptop and an error message about decryption appears when opening an email. What is a possible solution for this situation?

    <p>Install an appropriate certificate.</p> Signup and view all the answers

    Users in the sales department want to be able to print from laptops and tablets. Which two wireless technologies should the IT technician look for when researching new printers for the sales department? (Choose two.)

    <p>Bluetooth 802.11 standard</p> Signup and view all the answers

    What are three factors to consider when purchasing a replacement motherboard? (Choose three.)

    <p>The existing power supply must provide the connections required by the new motherboard. The new motherboard must be the correct size to physically fit into the existing case. The socket and chipset on the new motherboard must match the existing CPU.</p> Signup and view all the answers

    What are two features of protocols used within the TCP/IP protocol stack? (Choose two.)

    <p>TCP mechanisms retransmit data when an acknowledgment is not received from the destination system within a set period of time. UDP is used when an application must be delivered as quickly as possible and some loss of data can be tolerated.</p> Signup and view all the answers

    A technician is working on a laptop and a key on the keyboard is not responding as it should. What is a possible solution for this situation?

    <p>Clean with compressed air.</p> Signup and view all the answers

    What two effects might suggest that an incorrect printer driver is loaded on the Windows PC? (Choose two.)

    <p>The printer is printing unknown characters. The printer does not print a test page.</p> Signup and view all the answers

    Why would a network technician change the wireless router IP address to a different private IP address during initial installation?

    <p>to decrease the likelihood that someone could access the router using the default settings</p> Signup and view all the answers

    A technician is working on a laptop and GPS is not functioning. What is a possible solution for this situation?

    <p>Verify that airplane mode is not activated.</p> Signup and view all the answers

    A technician is working on a laptop and GPS is not functioning. What is a possible solution for this situation?

    <p>Verify the status of service.</p> Signup and view all the answers

    Which factor can limit the amount of data that the CPU can receive and process at one time?

    <p>the size of the CPU cache memory</p> Signup and view all the answers

    Which type of optical drive supports the greatest amount of storage and is able to read and write CDs, DVDs, and Blu-Ray media?

    <p>BD-RE</p> Signup and view all the answers

    Why would a manager need to use the sfc command?

    <p>to scan and verify the integrity of all protected system files and replace incorrect versions with correct versions</p> Signup and view all the answers

    Why would a technician need to use the DISM command?

    <p>to repair, prepare, and fix Windows images and the recovery image within an installation of the operating system</p> Signup and view all the answers

    Which two activities are normally controlled by the Northbridge part of the chipset? (Choose two.)

    <p>access to the RAM access to the video card</p> Signup and view all the answers

    A manager is booting a tablet that has Windows 8 installed. The boot process is currently working on the following step: WINLOGON.EXE displays the Windows Welcome screen What is the next step that will happen in the boot process?

    <p>There are no more steps, the boot process is complete.</p> Signup and view all the answers

    An analyst is booting a tablet that has Windows 7 installed with media card reader. The boot process is currently working on the following step: WINLOGON.EXE displays the Windows Welcome screen What is the next step that will happen in the boot process?

    <p>There are no more steps, the boot process is complete.</p> Signup and view all the answers

    Match the function performed by an OS to its description.

    <p>hardware access = loads device drivers and updates file and folder management = organizes storage media into a logical structure application management = locates and loads software programs user interface = displays and manages menus and icons</p> Signup and view all the answers

    Before installing the latest version of printer management software, an IT technician creates a restore point on the Windows 10 computer. The installation fails before it is complete, and now the printer shows as unavailable. Which Windows option should the technician use to reverse the software installation and return the system to its prior state without affecting users files and settings?

    <p>System Restore</p> Signup and view all the answers

    A new customer asks if all of its older company computers, which are still running Windows XP, can be immediately upgraded to Windows 10. What are two important concerns that the IT technician must discuss with the customer in order to determine if the OS upgrade can be done? (Choose two.)

    <p>compatibility of existing applications and custom software with the new OS minimum memory and processor requirements for Windows 10</p> Signup and view all the answers

    Which three wireless router settings should be disabled as a security best practice? (Choose three.)

    <p>UPnP support WPS auto configuration SSID broadcast</p> Signup and view all the answers

    What are two symptoms that indicate that a computer system may be a victim of DNS spoofing? (Choose two.)

    <p>The output of the nslookup command reports an unknown resolver name and IP address. Entering <a href="http://www.cisco.com">www.cisco.com</a> in a browser displays a popular gaming site instead of the Cisco homepage.</p> Signup and view all the answers

    A PC technician has been asked by a supervisor to recommend a security solution for preventing tailgating. Which security technique should the technician recommend?

    <p>Use a mantrap.</p> Signup and view all the answers

    A company contracts with a service provider to obtain IaaS and ITaaS services. What are two advantages of these types of cloud service implementation? (Choose two.)

    <p>less investment in local equipment and training protection from costly upgrades and software licenses</p> Signup and view all the answers

    What are two methods of disabling cellular data when located in an area where it is limited or expensive? (Choose two.)

    <p>placing the device in Airplane mode using Settings to turn off mobile data</p> Signup and view all the answers

    Refer to the exhibit. A computer technician creates a bootable USB hard drive and loads a Linux operating system on it. When the technician reboots the computer, it does not boot to the Linux OS. Instead, the light on the optical drive flashes and then the computer loads Windows. What needs to be done to ensure that the computer automatically boots from the USB hard drive if it is connected?

    <p>Move the USB Hard Disk drive option to the top of the boot order.</p> Signup and view all the answers

    A help desk technician receives a call from a user describing an issue with a computer. The user states that the computer will not power on, that it only makes a beeping sound. Why does the technician ask the user to restart the system and count how many beeps the computer makes?

    <p>Different numbers of beeps can indicate different types of hardware issues discovered during POST.</p> Signup and view all the answers

    A college uses Microsoft 365 Office and email services for its faculty, staff, and students. Data storage, custom applications, and Microsoft Active Directory services are delivered by virtual servers leased from a local data center. Single sign-on is implemented for both environments for authentication and authorization. Access control is managed locally. What type of cloud service implementation is the college using?

    <p>private cloud</p> Signup and view all the answers

    The help desk receives a call from a customer who reports a computer issue that occurs after trying to install Windows 10 with a disc that the IT department provided. When the customer reboots the computer, instead of loading Windows, the computer displays the Windows installation program screen again. Which probable cause should the IT technician place at the top of the list of most obvious reasons for the error?

    <p>The customer forgot to remove the disc from the optical drive.</p> Signup and view all the answers

    Office workers in a software company are being temporarily relocated to a different area of the building while their previous office space is being reconfigured. Which type of network device should be installed to make it easy for the users to connect to the company network from all of their devices, including smart phones, tablets, and laptops?

    <p>access point</p> Signup and view all the answers

    What is an example of an active cooling solution for a desktop PC?

    <p>installing case and CPU cooling fans</p> Signup and view all the answers

    What is a consequence of a computer not having enough RAM memory installed?

    <p>Data may be swapped between the RAM and the slower hard drive more frequently.</p> Signup and view all the answers

    Refer to the exhibit. A payroll department employee has shared a locally attached HP Officejet Pro 8110 printer over the network in Windows 10. What do the other Windows 10 users in the payroll department have to do in order to print to the shared printer?

    <p>Use the Add a printer option and select the HP Officejet Pro 8110 in Payroll printer in the Select a printer screen.</p> Signup and view all the answers

    Which type of power supply is the most commonly used and provides a separate power connection in order to directly power the CPU?

    <p>ATX12V</p> Signup and view all the answers

    Refer to the exhibit. A user calls the help desk to report a printer issue. The user explains that when selecting the print option from the menu bar, a dialog box pops up requesting a file name. After entering the filename, nothing prints on the attached HP printer. What is the cause of the issue that the user is experiencing?

    <p>The default printer is a virtual printer.</p> Signup and view all the answers

    Which function is incorporated into some Intel CPUs that enables a single CPU to perform as though two CPUs are installed?

    <p>Hyper-Threading</p> Signup and view all the answers

    Which cloud computing characteristic enables multiple tenants to share the same storage, processing, and network bandwidth?

    <p>resource pooling</p> Signup and view all the answers

    Which three types of external ports can be used to connect an external storage device to a computer? (Choose three.)

    <p>Thunderbolt USB eSATA</p> Signup and view all the answers

    Which three computer components require separate cabling for power? (Choose three.)

    <p>video graphics cards internal SATA hard drives case and CPU fans</p> Signup and view all the answers

    In which two situations would thin clients be a good choice to meet the end-user computing needs? (Choose two.)

    <p>when it is necessary for employees to use tablets with minimal storage and processing capabilities when installed in an enterprise environment where there is a gigabit LAN and powerful servers</p> Signup and view all the answers

    Refer to the exhibit. Which two hypervisor software products are suitable for the virtualization environment shown in the exhibit? (Choose two.)

    <p>VMware vSphere Oracle VM Server</p> Signup and view all the answers

    Refer to the exhibit. The help desk is receiving numerous calls from employees in the payroll department. It appears that their computers can print to the local network printer, but cannot access the cloud-based payroll service. One employee sends a screen print showing the result of issuing an ipconfig /all command. What is the cause of the issue being experienced by the users?

    <p>The DHCP server is configured with the wrong default gateway address.</p> Signup and view all the answers

    An employee recently purchased a smartwatch. Following the instructions from the watch manufacturer, the employee downloads the wearable app and installs it on an Android phone. The smartwatch shows that it is in discoverable mode, but the app cannot connect to the watch. What is one issue that might cause this problem?

    <p>Bluetooth is disabled on the Android phone.</p> Signup and view all the answers

    Which member of the DDR SDRAM family has the fastest clock rate and consumes the least amount of power?

    <p>DDR4 SDRAM</p> Signup and view all the answers

    Refer to the exhibit. What is one function that a technician can accomplish using this graphical interface?

    <p>set passwords to allow for access to the BIOS</p> Signup and view all the answers

    A network technician suspects that there may be a short or a termination error in the wiring that connects an Ethernet switch to the network. Which tool would be the best choice for the technician to use to identify the issue?

    <p>cable tester</p> Signup and view all the answers

    A client packet is received by a server. The packet has a destination port number of 110. What service application is the client requesting?

    <p>POP3</p> Signup and view all the answers

    Why would a university student need to use the taskkill command?

    <p>to end one or more processes on a PC based on process ID or image name</p> Signup and view all the answers

    Which term describes a partition scheme that supports storing a backup of a partition table?

    <p>GPT</p> Signup and view all the answers

    How can a hard drive that is using an MBR be partitioned in order to support additional logical drives?

    <p>Make one primary partition an extended partition to contain the logical drives.</p> Signup and view all the answers

    A computer technician uses Windows tools to gather information such as system components, operating system, users, and disk drives on multiple systems within the company. Another technician suggests that the tasks would take less time if they were automated. Which two built-in scripting capabilities in Windows enable a technician to run a simple text file, created in Notepad, which contains the necessary commands and variables? (Choose two.)

    <p>PowerShell ISE script interpreter command line batch script interpreter</p> Signup and view all the answers

    <p>acceptable use policies = outlines how technology and applications can be used within the organization security policies = includes password complexity requirements and incident response methods regulatory compliance policies = describes all government and industry statutes that apply to the company disaster recovery policies = provides detailed plans of what must be done to restore IT services quickly</p> Signup and view all the answers

    Refer to the exhibit. Examine both the output and the source code of the Linux shell script sample.sh. Which two statements describe the variables contained in the sample.sh script? (Choose two.)

    <p>The $HOSTNAME variable is defined within the script.</p> Signup and view all the answers

    Why would a lawyer need to use the tracert command?

    <p>to display a list of the near-side router interfaces between the source device and the destination device</p> Signup and view all the answers

    . A network analyst is booting a laptop that has Windows 7 installed with cellular SIM slot. The boot process is currently working on the following step: The Windows kernel takes over the boot process. What is thenext step that will happen in the boot process?

    <p>NTOSKRNL.EXE starts the login file called WINLOGON.EXE.</p> Signup and view all the answers

    A company purchases 15 USB flash drives to use for data analysis training for company accountants. The data analysis training requires that actual company data be stored on the drives, so a secure method of erasing the data is needed before the flash drives can be reused for other training classes. What method should the IT technicians use to ensure that the data on the USB flash drives cannot be recovered?

    <p>a quick formatting utility to overwrite the data</p> Signup and view all the answers

    Refer to the exhibit. What can be determined about the contents of the ite_user home directory?

    <p>There are two data files and three directories contained in this user directory.</p> Signup and view all the answers

    Refer to the exhibit. What is true of this mobile device screen?

    <p>Text messages, news, photos and other content can be displayed in the different tiles.</p> Signup and view all the answers

    An on-site IT technician needs to work on systems installed in a small health clinic located in New York state. When the technician arrives, the office manager asks if the technician is aware of HIPAA regulations. Which two situations are breaches of PHI and could possibly lead to severe penalties under HIPAA? (Choose two.)

    <p>sending screenshots of multiple patient health records that contain error messages to a second level technician making a backup of the clinic patient data in order to recreate the issues on a server in the IT support office</p> Signup and view all the answers

    Why would a manager need to use the del command?

    <p>to erase one or more files from a Windows directory</p> Signup and view all the answers

    technician is working on a laptop and an app is not responding. What is a possible solution for this situation?

    <p>Perform a reset.</p> Signup and view all the answers

    An end user wants to be able to recover an older version of a document that was created earlier in the day. Assuming that Windows Backup is enabled, which Windows 10 function can provide a user access to recover specific versions of a file?

    <p>File History</p> Signup and view all the answers

    An IT technician attempts to copy a large file to a USB flash drive that contains other data but the copy fails. The technician checks the properties of the flash drive and finds that it was formatted using FAT32. Which method can the technician use to easily change the file system to NTFS without losing the data files currently stored on the disk?

    <p>Open the Command Prompt (Admin) window and use the convert command.</p> Signup and view all the answers

    An employee wants to keep a local backup of iPhone data on a Windows laptop. What type of software does the employee need on the laptop to create this backup?

    <p>iTunes</p> Signup and view all the answers

    What can an IT technician accomplish using the Manage Storage Spaces feature in Windows 8 and 10?

    <p>create storage pools and configure disk arrays</p> Signup and view all the answers

    While troubleshooting an issue on a customer computer, an on-site technician believes that the problem can be resolved by using Windows Restore. What type of information is not restored when using Windows Restore with a recent restore point snapshot?

    <p>user data files</p> Signup and view all the answers

    A technician is booting a PC that has Windows 10 installed on dynamic drives. The boot process is currently working on the following step: POST. What is the next step that will happen in the boot process?

    <p>BIOS locates and reads the configuration settings that are stored in the CMOS memory.</p> Signup and view all the answers

    What are two features of multicore processors? (Choose two.)

    <p>Multicore processors can execute instructions more quickly than single-core processors can. L2 and L3 cache is shared in all types of multicore processors in order to improve performance.</p> Signup and view all the answers

    Which two statements describe characteristics of network addresses? (Choose two.)

    <p>A MAC address is also referred to as a physical address because it is permanently embedded on the NIC. A valid public IPv4 or IPv6 address is needed in order for devices to communicate over the internet.</p> Signup and view all the answers

    An on-site technician is asked to check a laptop used by an executive who occasionally works from home. The technician observes that the image on the laptop screen flickers and appears dull, even though the same image displayed on another monitor attached to the laptop docking station is normal. What are two issues that could cause the symptoms the technician observed? (Choose two.)

    <p>The inverter may be failing. The backlight needs adjustment or is failing.</p> Signup and view all the answers

    A technician must replace a power supply. Which two features should the technician consider when selecting the replacement? (Choose two.)

    <p>physical size wattage</p> Signup and view all the answers

    Why is unbuffered memory a better choice than buffered memory for gaming or general use computers?

    <p>The computer can read data directly from the unbuffered memory banks, making unbuffered memory faster than buffered memory.</p> Signup and view all the answers

    A manager is booting a tablet that has Windows 10 installed. The boot process is currently working on the following step: WINLOGON.EXE displays the Windows Welcome screen What is the next step that will happen in the boot process?

    <p>There are no more steps, the boot process is complete.</p> Signup and view all the answers

    A person has started a new technical job. In which situation would ESD be an issue?

    <p>when replacing a motherboard</p> Signup and view all the answers

    A corporation would like to use three or more factors for the password authentication policy. How can this be achieved?

    <p>MFA</p> Signup and view all the answers

    Which statement is true regarding libraries in Windows 10?

    <p>Libraries allow Windows 10 to link multiple different directories.</p> Signup and view all the answers

    A user notes that the username and password are automatically populated in the Microsoft Edge browser when logging into a secure site. When the user tries to log into the same site using Google Chrome, the username and password do not save automatically. Why is this occurring?

    <p>Google Chrome does not automatically save web credentials.</p> Signup and view all the answers

    An analyst is booting a desktop that has Windows 10 installed with 4 GB RAM. The boot process is currently working on the following step: Winload uses the path specified in BOOTMGR to find the boot partition. What is the next step that will happen in the boot process?

    <p>WinLoad loads two files that make up the core of Windows: NTOSKRNL.EXE and HAL.DLL.</p> Signup and view all the answers

    A manager is booting a tablet that has Windows 10 installed. The boot process is currently working on the following step: The Windows kernel takes over the boot process. What is the next step that will happen in the boot process?

    <p>NTOSKRNL.EXE starts the login file called WINLOGON.EXE.</p> Signup and view all the answers

    An accountant is booting a PC that has Windows 10 installed. The boot process is currently working on the following step: BIOS locates and reads the configuration settings that are stored in the CMOS memory. What is the next step that will happen in the boot process?

    <p>The BIOS boots the computer using the first drive that contains a valid boot sector.</p> Signup and view all the answers

    What is a possible situation when it might be necessary to boot Windows 10 from a bootable recovery USB device?

    <p>to repair the operating system</p> Signup and view all the answers

    A user is trying to execute a file using elevated permission. The user right-clicks the file, chooses Run as Administrator, and chooses Yes in the User Account Control (UAC) window. The operation fails. What is the reason?

    <p>The user is not a member of the administrator group.</p> Signup and view all the answers

    A technician wishes to use the reset option to repair a Windows 10 installation and chooses the option that will retain the user’s personal files. Which statement is true based on using this option?

    <p>Only user files will be restored together with the complete reinstallation of Windows 10.</p> Signup and view all the answers

    Which two statements are true regarding GPT partitions? (Choose two.)

    <p>They are commonly used in computers with UEFI firmware. They store a backup of the partition table.</p> Signup and view all the answers

    Which laptop LCD technology uses tilting crystals to provide a much higher contrast ratio than other types?

    <p>Vertical alignment (VA)</p> Signup and view all the answers

    Which protocol is used by Windows for file and printer sharing?

    <p>SMB</p> Signup and view all the answers

    Why would a user need to use the gpupdate command?

    <p>to make the PC synchronize with new group policy settings</p> Signup and view all the answers

    A technician is about to begin preventive maintenance on a company PC. In which situation would ESD be an issue?

    <p>when installing a processor</p> Signup and view all the answers

    A technician is upgrading many PCs used within the company. How should the technician dispose of an old inkjet printer cartridge?

    <p>Recycle following local regulations.</p> Signup and view all the answers

    The IT department has just purchased 15 wireless access points in order to provide full wireless coverage for all 100 employees within the company and is looking to deploy the most secure and scalable wireless implementation. Which open source authentication method would perform authentication on behalf of all 15 wireless network devices?

    <p>RADIUS</p> Signup and view all the answers

    What are two probable causes of a user unable to access local resources such as file shares or printers on a wired network? (Choose two.)

    <p>bad cabling DNS name resolution not working</p> Signup and view all the answers

    Why would a manager need to use the ping command?

    <p>to quickly verify connectivity by sending echo-request messages to the destination and receiving a series of echo-reply messages from that destination</p> Signup and view all the answers

    Why would a user need to use the nslookup command?

    <p>to query the Domain Name Sysytem (DNS) to get domain names and mapping information</p> Signup and view all the answers

    Why would a user need to use the netstat command?

    <p>to verify activity on the PC by displaying all active TCP connections on the device</p> Signup and view all the answers

    Why would a technical support representative need to use the ipconfig command?

    <p>to display the IPv6 address of the PC</p> Signup and view all the answers

    Why would a technical support representative need to use the bootrec command?

    <p>to help to repair the MBR that is suspected of having issues</p> Signup and view all the answers

    Why would a technical support representative need to use the format command?

    <p>to prepare a hard drive to accept Windows files</p> Signup and view all the answers

    Why would a university student need to use the xcopy command?

    <p>to copy files, directories, and subdirectories from one location to another</p> Signup and view all the answers

    Why would a university student need to use the robocopy command?

    <p>to copy a group of files from one Windows directory to another</p> Signup and view all the answers

    Why would a gamer need to use the copy command?

    <p>to copy files, directories, and subdirectories from one location to another</p> Signup and view all the answers

    Why would a gamer need to use the move command?

    <p>to relocate a file from one Windows directory to another one</p> Signup and view all the answers

    Which situation can be prevented by creating a UEFI password?

    <p>an unauthorized person changing the boot order on the computer to boot to another OS</p> Signup and view all the answers

    What is required as an additional verification mechanism on iOS mobile devices when setting up biometric screen locks, such as Touch ID or Face ID?

    <p>a passcode</p> Signup and view all the answers

    Users in a company have complained about network performance. After investigation, the IT staff has determined that the attacker injected false records on the server that translates IP addresses to domain names. What is the type of network attack?

    <p>DNS poisoning</p> Signup and view all the answers

    Which built-in tool is available on a Mac OS X machine to perform disk backups?

    <p>Time Machine</p> Signup and view all the answers

    What is the purpose of running mobile device apps in a sandbox?

    <p>to enable separate app icons to be displayed on the home screen</p> Signup and view all the answers

    A user downloads a widget onto his Android phone but is puzzled to see that when the widget is touched an app is launched. What is a possible cause?

    <p>The widget is associated with the app and this is the normal behavior.</p> Signup and view all the answers

    When attempting to improve system performance for Linux computers with a limited amount of memory, why is increasing the size of the swap file system not considered the best solution?

    <p>A swap file system uses hard disk space to store inactive RAM content.</p> Signup and view all the answers

    A customer brings in a computer that is asking for a password as soon as it powers on, even before the operating system boots. Which type of password is enabled?

    <p>BIOS</p> Signup and view all the answers

    What Windows utility should be used to configure password rules and account lockout policies on a system that is not part of a domain?

    <p>Local Security Policy tool</p> Signup and view all the answers

    An employee that has worked at the company for many years has started a home-based business selling crafts. While leaving an office meeting, a company supervisor notices the employee buying supplies for the personal crafting business of the employee. What section of the security policy should the supervisor review when determining how to handle this situation?

    <p>acceptable use policies</p> Signup and view all the answers

    A manager reports that unusual things are happening on a Windows computer. The technician determines that malware is the culprit. What can the technician do to remove stubborn malware?

    <p>Install adware protection.</p> Signup and view all the answers

    Which type of security threat can be transferred through email and is used to gain sensitive information by recording the keystrokes of the email recipient?

    <p>virus</p> Signup and view all the answers

    What is an accurate description of asymmetric encryption technology?

    <p>It is an encryption process that uses a public and private key pair to encrypt/decrypt data.</p> Signup and view all the answers

    The CIO wants to secure data on company laptops by implementing file encryption. The technician determines the best method is to encrypt each hard drive using Windows BitLocker. Which two things are needed to implement this solution? (Choose two.)

    <p>at least two volumes TPM</p> Signup and view all the answers

    A technician suspects that a security issue is causing problems with a computer. What two actions could be performed to test theories of probable cause when troubleshooting the PC? (Choose two.)

    <p>Log in as a different user. Disconnect the computer from the network.</p> Signup and view all the answers

    When responding to a call from a customer who is experiencing problems with a computer, the technician notices that a number of system files on the computer have been renamed. Which two possible solutions could the technician implement to resolve the problem? (Choose two.)

    <p>Use antivirus software to remove a virus. Restore the computer from a backup.</p> Signup and view all the answers

    Which methods can be used to implement multifactor authentication?

    <p>passwords and fingerprints</p> Signup and view all the answers

    What is the difference between a scripting language and a compiled language?

    <p>Scripting languages are interpreted and executed line by line when a script is run, while compiled languages need to be converted into executable code.</p> Signup and view all the answers

    A bench technician enters the server room and finds the backup server computer case open. The hard drives containing patient medical data are all physically disconnected from the motherboard and the SATA data cables are hanging outside the case. Which step should the technician immediately take?

    <p>Locate an employee qualified to collect evidence.</p> Signup and view all the answers

    What determines the level of support that a call center technician will provide to an individual customer?

    <p>Support is based on the SLA for that customer.</p> Signup and view all the answers

    What is used to control illegal use of software and content?

    <p>digital rights management</p> Signup and view all the answers

    What skill is essential for a level one technician to have?

    <p>the ability to ask the customer relevant questions, and as soon as this information is included in the work order, escalate it to the level two technician</p> Signup and view all the answers

    Refer to the exhibit. During the troubleshooting of software that is installed on a computer system, a level one technician requires help from a level two technician. The file shown in the exhibit must be sent to the level two technician. How should the level one technician deliver this file?

    <p>This file should not be shared with the level two technician.</p> Signup and view all the answers

    In a computer forensics investigation, which type of data is considered volatile data and can be lost if power is removed from the computer?

    <p>data in transit between RAM and the CPU</p> Signup and view all the answers

    Which subject area describes collecting and analyzing data from computer systems, networks, and storage devices, as part of an investigation of alleged illegal activity?

    <p>computer forensics</p> Signup and view all the answers

    A third-party security firm is performing a security audit of a company and recommends the company utilize the Remote Desktop Protocol. What are two characteristics of the Microsoft Remote Desktop Protocol (RDP)? (Choose two.)

    <p>RDP uses an encrypted session. RDP connects on TCP port 3389.</p> Signup and view all the answers

    A UTM appliance, such as a Cisco ASA 5506-X, includes the functionality of which two standalone devices? (Choose two.)

    <p>stateful firewall IPS/IDS</p> Signup and view all the answers

    An on-site IT technician is attempting to resolve an issue with application performance on a customer laptop. The technician backs up the customer data and then replaces the memory in the laptop with known good memory. It does not resolve the performance issue. What are the next two actions the technician should take? (Choose two.)

    <p>Continue to test the next likely probable cause. Document that the possible solution did not work.</p> Signup and view all the answers

    A user wants VirtualBox to run automatically when Windows 10 starts up. Which action will enable VirtualBox to load and run on system startup?

    <p>Copy the shortcut for VirtualBox from its location to the startup folder.</p> Signup and view all the answers

    An on-site IT technician finished the removal of malware from a customer computer and installed new virus protection software. An hour after the technician left the site, the customer called the help desk to report that a critical web-based application was no longer functioning properly. Which step in the troubleshooting process did the IT technician fail to properly complete?

    <p>Verify full system functionality.</p> Signup and view all the answers

    What are two characteristics of the hotend nozzle on a 3D printer? (Choose two.)

    <p>The hotend nozzle heats to different temperatures depending on the type of filament used. Hotend nozzles are considered consumables and should be replaced during normal maintenance.</p> Signup and view all the answers

    Refer to the exhibit. What can be determined from the output of this command?

    <p>The owner, group, and others have read permissions to January.</p> Signup and view all the answers

    Which type of disk drive can provide a very fast boot experience and also provide high capacity storage?

    <p>SSD</p> Signup and view all the answers

    Refer to the exhibit. Which type of adapter card may require the width of two slots in order to accommodate additional cooling, even though it only has one PCIe x16 connector?

    <p>USB-C controller</p> Signup and view all the answers

    A technician follows the instruction manual that came with a new Bluetooth speaker to place the speaker in discoverable mode. In this mode, what type of information will the speaker transmit to the laptop in order to start the pairing process?

    <p>device name and Bluetooth capabilities</p> Signup and view all the answers

    A technician is booting a PC that has Windows 10 installed on dynamic drives. The boot process is currently working on the following step: BIOS locates and reads the configuration settings that are stored in the CMOS memory. What is the next step that will happen in the boot process?

    <p>The BIOS boots the computer using the first drive that contains a valid boot sector.</p> Signup and view all the answers

    A network analyst is booting a laptop that has Windows 7 installed with cellular SIM slot. The boot process is currently working on the following step: The Windows kernel takes over the boot process. What is the next step that will happen in the boot process?

    <p>NTOSKRNL.EXE starts the login file called WINLOGON.EXE.</p> Signup and view all the answers

    Why would a bank manager need to use the bootrec command?

    <p>to help to repair the MBR that is suspected of having issues</p> Signup and view all the answers

    Why would a user need to use the gpresult command?

    <p>to verify the settings that are suspected to be incorrect</p> Signup and view all the answers

    A gamer is booting a tablet that has Windows 7 installed with 4 GB RAM. The boot process is currently working on the following step: The Windows kernel takes over the boot process. What is the next step that will happen in the boot process?

    <p>WINLOGON.EXE displays the Windows Welcome screen</p> Signup and view all the answers

    An accountant is booting a desktop that has Windows 8 installed. The boot process is currently working on the following step: WinLoad loads two files that make up the core of Windows: NTOSKRNL.EXE and HAL.DLL. What is the next step that will happen in the boot process?

    <p>Winload uses the path specified in BOOTMGR to find the boot partition.</p> Signup and view all the answers

    A user is booting a desktop that has Windows 10 installed that also uses an extended partition. The boot process is currently working on the following step: The code in the boot sector is executed and the control of the boot process is given to Windows Boot Manager. What is the next step that will happen in the boot process?

    <p>Winload uses the path specified in BOOTMGR to find the boot partition.</p> Signup and view all the answers

    A technician is working on a laptop and an app is not loading. What is a possible solution for this situation?

    <p>Perform a reset.</p> Signup and view all the answers

    Which term describes a file system that supports a partition size up to 2 TB?

    <p>FAT32</p> Signup and view all the answers

    to copy files, directories, and subdirectories from one location to another

    <p>to copy files, directories, and subdirectories from one location to another</p> Signup and view all the answers

    Which two tools are available to transfer user data and settings from an old Windows computer to a Windows operating system on a new computer? (Choose two.)

    <p>Windows Easy Transfer User State Migration tool</p> Signup and view all the answers

    A user wants to extend a primary partition formatted with the NTFS file system with the unallocated space on the hard disk. What must the user do after the primary partition is extended to make it usable?

    <p>Convert the disk type to dynamic.</p> Signup and view all the answers

    Why is a full format more beneficial than a quick format when preparing for a clean OS installation?

    <p>A full format will delete files from the disk while analyzing the disk drive for errors.</p> Signup and view all the answers

    Which condition is required when planning to install Windows on a GPT disk?

    <p>The computer must be UEFI-based.</p> Signup and view all the answers

    An organization has purchased a custom application for the sales staff that can only be installed on a 64-bit Windows operating system. Each member of the sales staff has a Windows 8.1 32-bit PC. What must the IT department do in order to install and run the application on the sales staff computers?

    <p>Perform a clean installation of 64-bit Windows 10.</p> Signup and view all the answers

    What are two possible solutions to any Windows computer restarting continuously and never displaying the desktop? (Choose two.)

    <p>Press F8 to open the Advanced Options menu and choose Disable Automatic Restart on System Failure. Run chkdsk /F /R from the recovery console.</p> Signup and view all the answers

    A technician uses Microsoft Deployment Image Servicing and Management (DISM) tool to create a Windows image file on one of the workstations running Windows 10. When the technician tries to clone another workstation with the image file, the workstation exhibits network connectivity issues on completion. What could cause this?

    <p>The SID of the original PC is not cleared when creating the image with DISM.</p> Signup and view all the answers

    A user complains that user files cannot be synced with the network file server while the user is traveling out of the office. The user had access to the internet but no access to the company network server. How can this be addressed?

    <p>Setup a Sync partnership between the network server, Microsoft OneDrive, and the user.</p> Signup and view all the answers

    A technician has connected a new internal hard drive to a Windows 10 PC. What must be done in order for Windows 10 to use the new hard drive?

    <p>Initialize the new hard drive.</p> Signup and view all the answers

    What service does PRINT$ provide?

    <p>It provides printer drivers for printer administrators.</p> Signup and view all the answers

    A technician is troubleshooting a Windows 10 laptop infected with a virus that has damaged the master boot record. The technician has booted the laptop using the installation media and is attempting to repair the laptop from the command line interface. Which command can the technician use to repair the corrupt master boot record?

    <p>bootrec /fixmbr</p> Signup and view all the answers

    A user reports that a Windows 10 PC displays the error message “Invalid Boot Disk” during the boot process. The IT technician attempts to boot the computer and finds that the error message occurs immediately after the POST. What could be the possible cause?

    <p>The MBR/GPT is corrupted.</p> Signup and view all the answers

    Which port number is used by Virtual Network Computing (VNC) to provide remote screen sharing between devices?

    <p>5900</p> Signup and view all the answers

    Which feature is included with macOS and provides the ability for a remote user to view and change files, folders, and applications on the local computer?

    <p>Screen Sharing</p> Signup and view all the answers

    Which area of concern falls under the operations and planning category in IT documentation?

    <p>inventory management</p> Signup and view all the answers

    Which two actions should a technician take if illegal content, such as child pornography, is discovered on the hard drive of a customer computer? (Choose two.)

    <p>Contact a first responder. Document as much information as possible.</p> Signup and view all the answers

    What are three pieces of information a level one technician should gather from a customer? (Choose three.)

    <p>contact information description of the problem details of any recent changes to the computer</p> Signup and view all the answers

    What two actions are appropriate for a support desk technician to take when assisting customers? (Choose two.)

    <p>Let a customer finish talking before asking additional questions. If you have to put the customer on hold, ask the customer for permission.</p> Signup and view all the answers

    A support desk technician is dealing with an angry customer. Which two approaches should the technician take in dealing with the customer? (Choose two.)

    <p>Work to redirect the conversation to solving the problem. Let the customer explain the problem without interrupting.</p> Signup and view all the answers

    What two kinds of problems should be escalated from a level one technician to a level two technician? (Choose two.)

    <p>problems that are beyond the scope of the knowledge of the level one technician problems that are complicated and will take a long time to resolve</p> Signup and view all the answers

    An IT technician in a service company has provided extensive remote IT support with product deployment for a customer. After the completion of the contract, a complaint is filed against the IT technician for not following company policy by sending unsolicited emails about services and products that are not related to the contract. What two things should the IT support technician have done differently? (Choose two.)

    <p>The IT technician should have researched the company policy about personal communication with customers on company time. The IT technician should have asked the customer if the customer was interested in receiving information regarding other new services and products.</p> Signup and view all the answers

    A third-party security firm is performing a security audit of a company and recommends the company utilize the Remote Desktop Protocol. What are two characteristics of the Microsoft Remote Desktop Protocol (RDP)? (Choose two.)

    <p>RDP uses an encrypted session. RDP connects on TCP port 3389.</p> Signup and view all the answers

    Study Notes

    ESD (Electrostatic Discharge)

    • ESD can occur when handling sensitive components, such as motherboards and hard drives
    • It can cause harm to these components, leading to failure or malfunction
    • Situations where ESD can be an issue:
      • When assembling a PC
      • During preventive maintenance on a PC
      • When upgrading an ATX motherboard

    Motherboard Components

    • Boot operations are controlled by the BIOS (Basic Input/Output System) and the chipset
    • The chipset provides communication between components, while the BIOS initializes hardware components during boot-up

    Memory and Storage

    • DDR SDRAM (Double Data Rate Synchronous Dynamic Random Access Memory) is a type of RAM that allows data transfer on both the rising and falling edges of the clock signal
    • SATA (Serial Advanced Technology Attachment) is a type of storage interface that connects devices, such as hard drives and solid-state drives, to the motherboard

    Safety and Environmental Factors

    • Laser printers can be hazardous due to the risk of electrical shock and fire
    • Dusty environments can affect laptop performance and longevity
    • Cleaning computer components requires care to avoid damage or electrical shock
    • Safety Data Sheets (SDS) provide information on handling hazardous materials

    Network Concepts

    • UDP (User Datagram Protocol) is a transport-layer protocol that provides connectionless communication
    • TCP (Transmission Control Protocol) is a transport-layer protocol that provides connection-oriented communication
    • DHCP (Dynamic Host Configuration Protocol) is a network protocol that assigns IP addresses and other network settings to devices
    • DNS (Domain Name System) is a network protocol that translates human-readable domain names to IP addresses

    Printing and Peripherals

    • Inkjet printers and laser printers have different printing technologies and uses
    • Collating and printing documents can be configured in print settings
    • Laser printers require regular maintenance, including replacing toner cartridges and cleaning the printer

    Virtualization and Cloud Computing

    • Virtualization allows multiple operating systems to run on a single physical server
    • Cloud computing provides on-demand access to computing resources and storage over the internet
    • Hypervisors, such as VMware and VirtualBox, allow multiple virtual machines to run on a single physical server

    Troubleshooting and Security

    • Troubleshooting involves identifying and resolving issues with computer systems and networks
    • Security risks include unauthorized access, data breaches, and malware infections
    • Change management processes involve assessing and implementing changes to computer systems and networks

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    When starting a new technical job, it's essential to be aware of potential hazards. Electrostatic discharge (ESD) can cause significant damage to equipment and components. In what situations would ESD be a concern? Take this quiz to find out.

    More Like This

    CHAPTER 2 COMPUTER HARDWARE
    66 questions

    CHAPTER 2 COMPUTER HARDWARE

    LionheartedPhosphorus avatar
    LionheartedPhosphorus
    Computer Hardware and RAID Configurations
    91 questions
    Computer Hardware Basics
    16 questions

    Computer Hardware Basics

    AmicableNeodymium avatar
    AmicableNeodymium
    Computer Hardware Safety and ESD
    7 questions
    Use Quizgecko on...
    Browser
    Browser