Podcast
Questions and Answers
A person has started a new technical job. In which situation would ESD be an issue?
A person has started a new technical job. In which situation would ESD be an issue?
- when installing a processor (correct)
- when using a grounded mat and working on a computer on an ungrounded workbench
- when installing a dual-voltage power supply
- while exchanging one laptop AC adapter with one that is not from the original equipment manufacturer
In which situation would an ESD strike potentially cause harm to the PC?
In which situation would an ESD strike potentially cause harm to the PC?
- when installing an additional display in a workplace cubicle
- when replacing high voltage laser printer parts
- while attaching speakers to a surround sound card
- when installing RAM (correct)
In which situation would an ESD strike potentially cause harm to the PC?
In which situation would an ESD strike potentially cause harm to the PC?
- when replacing a mechanical hard drive with an M.2 SSD (correct)
- when installing an additional display in a workplace cubicle
- when using a grounded mat and working on a computer on an ungrounded workbench
- when installing a dual-voltage power supply
A person has started a new technical job. In which situation would ESD be an issue?
A person has started a new technical job. In which situation would ESD be an issue?
A technician is about to begin preventive maintenance on a company PC. In which situation would ESD be an issue?
A technician is about to begin preventive maintenance on a company PC. In which situation would ESD be an issue?
An instructor has given a student an assignment to assemble a PC. In which situation should the student be aware that ESD is an issue?
An instructor has given a student an assignment to assemble a PC. In which situation should the student be aware that ESD is an issue?
An instructor has given a student an assignment to assemble a PC. In which situation should the student be aware that ESD is an issue?
An instructor has given a student an assignment to assemble a PC. In which situation should the student be aware that ESD is an issue?
An instructor has given a student an assignment to assemble a PC. In which situation should the student be aware that ESD is an issue?
An instructor has given a student an assignment to assemble a PC. In which situation should the student be aware that ESD is an issue?
What two motherboard components control the system boot operations? (Choose two.)
What two motherboard components control the system boot operations? (Choose two.)
A technician is upgrading an ATX motherboard with another ATX motherboard. Which component might be affected by this and need to be upgraded and bought as an additional purchase?
A technician is upgrading an ATX motherboard with another ATX motherboard. Which component might be affected by this and need to be upgraded and bought as an additional purchase?
A customer has requested that a PC be built that will support eSATA. Which component should be checked to be sure that this feature is supported?
A customer has requested that a PC be built that will support eSATA. Which component should be checked to be sure that this feature is supported?
Which memory module used to hold instructions for booting a PC and loading the OS, but is still used on adapters even though the memory contents cannot be changed?
Which memory module used to hold instructions for booting a PC and loading the OS, but is still used on adapters even though the memory contents cannot be changed?
What is a characteristic of DDR SDRAM?
What is a characteristic of DDR SDRAM?
What are two safety hazards when dealing with laser printers? (Choose two.)
What are two safety hazards when dealing with laser printers? (Choose two.)
Which component requires a technician to install screws externally through the PC case?
Which component requires a technician to install screws externally through the PC case?
A technician is installing an internal HDD. To which motherboard connector will the technician connect the data cable?
A technician is installing an internal HDD. To which motherboard connector will the technician connect the data cable?
Refer to the exhibit. A technician has been asked to install a video card. Which section of the motherboard will the technician use to install the card?
Refer to the exhibit. A technician has been asked to install a video card. Which section of the motherboard will the technician use to install the card?
When a PC is being assembled, what component is connected to the motherboard with a SATA cable?
When a PC is being assembled, what component is connected to the motherboard with a SATA cable?
A technician is troubleshooting a computer that is experiencing hardware failure detected by the BIOS. What is one way this failure is indicated?
A technician is troubleshooting a computer that is experiencing hardware failure detected by the BIOS. What is one way this failure is indicated?
. Which three features can be configured in the BIOS settings to secure a computer? (Choose three.)
. Which three features can be configured in the BIOS settings to secure a computer? (Choose three.)
What is the purpose of RAID adapters?
What is the purpose of RAID adapters?
When a new motherboard is being installed, between which two components must thermal compound be applied? (Choose two.)
When a new motherboard is being installed, between which two components must thermal compound be applied? (Choose two.)
What is the purpose of a Safety Data Sheet?
What is the purpose of a Safety Data Sheet?
Which negative environmental factor does cleaning the inside of a computer reduce?
Which negative environmental factor does cleaning the inside of a computer reduce?
What is a recommended procedure to follow when cleaning computer components?
What is a recommended procedure to follow when cleaning computer components?
On the production floor, a furniture plant has laptops for process monitoring and reporting. The production floor environment is around 80 degrees Fahrenheit (27 degrees Celsius). The humidity level is fairly high around 70 percent. Fans are mounted in the ceiling for air circulation. Wood dust is prevalent. Which condition is most likely to adversely affect a laptop that is used in this environment?
On the production floor, a furniture plant has laptops for process monitoring and reporting. The production floor environment is around 80 degrees Fahrenheit (27 degrees Celsius). The humidity level is fairly high around 70 percent. Fans are mounted in the ceiling for air circulation. Wood dust is prevalent. Which condition is most likely to adversely affect a laptop that is used in this environment?
After a technician tests a theory of probable causes, what two actions should the technician take if the testing did not identify an exact cause? (Choose two.)
After a technician tests a theory of probable causes, what two actions should the technician take if the testing did not identify an exact cause? (Choose two.)
What would happen if a PC that contains a power supply that does not automatically adjust for input voltage is set to 230 volts and attaches to an outlet in the United States?
What would happen if a PC that contains a power supply that does not automatically adjust for input voltage is set to 230 volts and attaches to an outlet in the United States?
Which type of network spans a single building or campus and provides services and applications to people within a common organizational structure?
Which type of network spans a single building or campus and provides services and applications to people within a common organizational structure?
What are two types of wired high-speed Internet connections? (Choose two.)
What are two types of wired high-speed Internet connections? (Choose two.)
In what two situations would UDP be better than TCP as the preferred transport protocol? (Choose two.)
In what two situations would UDP be better than TCP as the preferred transport protocol? (Choose two.)
The current IP configuration of a small company is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service would simplify the workstation IP configuration task?
The current IP configuration of a small company is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service would simplify the workstation IP configuration task?
A company is looking for a next-generation firewall that provides VPN functionality, IDS/IPS functionality, and DoS/DDoS protection. Which device would be best suited for this task?
A company is looking for a next-generation firewall that provides VPN functionality, IDS/IPS functionality, and DoS/DDoS protection. Which device would be best suited for this task?
A student is helping a friend with a home computer that can no longer access the Internet. Upon investigation, the student discovers that the computer has been assigned the IP address 169.254.100.88. What could cause a computer to get such an IP address?
A student is helping a friend with a home computer that can no longer access the Internet. Upon investigation, the student discovers that the computer has been assigned the IP address 169.254.100.88. What could cause a computer to get such an IP address?
What three values must be added to the IPv4 properties of a NIC in order for a computer to have basic connectivity with the network? (Choose three.)
What three values must be added to the IPv4 properties of a NIC in order for a computer to have basic connectivity with the network? (Choose three.)
A device has an IPv6 address of 2001:0DB8:75a3:0214:0607:1234:aa10:ba01 /64. What is the host identifier of the device?
A device has an IPv6 address of 2001:0DB8:75a3:0214:0607:1234:aa10:ba01 /64. What is the host identifier of the device?
How can a user prevent specific applications from accessing a Windows computer over a network?
How can a user prevent specific applications from accessing a Windows computer over a network?
Place the six stages of the troubleshooting process in the correct order. 34 klausimas
Place the six stages of the troubleshooting process in the correct order. 34 klausimas
A technician has been asked to configure Wi-Fi calling on a corporate mobile device. In which situation would this feature be most advantageous?
A technician has been asked to configure Wi-Fi calling on a corporate mobile device. In which situation would this feature be most advantageous?
Which statement is true about laptops?
Which statement is true about laptops?
Which standard provides a bridge between laptop hardware and the operating system and a way for technicians to configure power management schemes to get the best performance?
Which standard provides a bridge between laptop hardware and the operating system and a way for technicians to configure power management schemes to get the best performance?
Which two laptop components are considered replaceable by the customer. (Choose two.)
Which two laptop components are considered replaceable by the customer. (Choose two.)
A user wants to synchronize some apps, movies, music, and ebooks between mobile devices. What are the two types of connections used to synchronize this type of data? (Choose two.)
A user wants to synchronize some apps, movies, music, and ebooks between mobile devices. What are the two types of connections used to synchronize this type of data? (Choose two.)
A technician is explaining the differences between inkjet printers and laser printers to a customer. Which two comparisons should the technician make? (Choose two.)
A technician is explaining the differences between inkjet printers and laser printers to a customer. Which two comparisons should the technician make? (Choose two.)
A user chooses the collate option and prints two copies of a three-page document. What is the order in which the pages are printed?
A user chooses the collate option and prints two copies of a three-page document. What is the order in which the pages are printed?
A color laser printer is used to print documents with graphics and photographs. Users are complaining that printing takes too long. Which component of the printer should be upgraded in order to improve printing performance?
A color laser printer is used to print documents with graphics and photographs. Users are complaining that printing takes too long. Which component of the printer should be upgraded in order to improve printing performance?
What service is available for Windows to provide software print server services to MAC OS clients?
What service is available for Windows to provide software print server services to MAC OS clients?
Which three components are typically found in laser printer maintenance kits? (Choose three.)
Which three components are typically found in laser printer maintenance kits? (Choose three.)
A technician is installing a new printer in a cool, damp environment. After the printer cabling is done, and the software and print driver are installed, the printer test page jams. What is the most likely cause of the print failure?
A technician is installing a new printer in a cool, damp environment. After the printer cabling is done, and the software and print driver are installed, the printer test page jams. What is the most likely cause of the print failure?
A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual discrete server for each customer. What is the networking trend that is being implemented by the data center in this situation?
A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual discrete server for each customer. What is the networking trend that is being implemented by the data center in this situation?
How does virtualization help with disaster recovery within a data center?
How does virtualization help with disaster recovery within a data center?
Which two hypervisors are suitable to support virtual machines in a data center? (Choose two.)
Which two hypervisors are suitable to support virtual machines in a data center? (Choose two.)
A web designer accesses a company Windows 10 computer remotely. The designer often needs to simultaneously open multiple applications, such as a web page editor and a graphics editor. Rather than opening them in multiple windows, the designer opens them in different virtual desktops. What technology is being used by the designer?
A web designer accesses a company Windows 10 computer remotely. The designer often needs to simultaneously open multiple applications, such as a web page editor and a graphics editor. Rather than opening them in multiple windows, the designer opens them in different virtual desktops. What technology is being used by the designer?
Which Cloud computing service would be best for an organization that needs to collaboratively create applications and deliver them over the web?
Which Cloud computing service would be best for an organization that needs to collaboratively create applications and deliver them over the web?
Which statement describes a feature of SDRAM?
Which statement describes a feature of SDRAM?
A technician is troubleshooting a server that displays the error message “RAID not found” after a power outage over the weekend. What is a possible cause for this?
A technician is troubleshooting a server that displays the error message “RAID not found” after a power outage over the weekend. What is a possible cause for this?
A customer brings in a laptop with a touch screen that is not working correctly. The touch screen either does not respond at all or provides unusual or inaccurate responses. What is a possible cause for such behavior?
A customer brings in a laptop with a touch screen that is not working correctly. The touch screen either does not respond at all or provides unusual or inaccurate responses. What is a possible cause for such behavior?
What are two security risks associated with sharing printers in a corporate environment? (Choose two.)
What are two security risks associated with sharing printers in a corporate environment? (Choose two.)
Which change management process component is concerned with the business processes that are affected by changes?
Which change management process component is concerned with the business processes that are affected by changes?
identification
identification
A computer technician is installing a RAID. If the RAID uses mirroring, which RAID level is the technician using?
A computer technician is installing a RAID. If the RAID uses mirroring, which RAID level is the technician using?
A computer technician is installing a RAID. If the RAID uses striping with parity, which RAID level is the technician using?
A computer technician is installing a RAID. If the RAID uses striping with parity, which RAID level is the technician using?
A computer technician is installing a RAID. If the RAID uses striping, which RAID level is the technician using?
A computer technician is installing a RAID. If the RAID uses striping, which RAID level is the technician using?
A computer technician is installing a RAID. If the RAID uses striping with double parity, which RAID level is the technician using?
A computer technician is installing a RAID. If the RAID uses striping with double parity, which RAID level is the technician using?
A technician is upgrading many PCs used within the company. How should the technician dispose of an old battery?
A technician is upgrading many PCs used within the company. How should the technician dispose of an old battery?
A technician is upgrading many PCs used within the company. How should the technician dispose of a broken monitor?
A technician is upgrading many PCs used within the company. How should the technician dispose of a broken monitor?
A technician is upgrading many PCs used within the company. How should the technician dispose of an old power supply?
A technician is upgrading many PCs used within the company. How should the technician dispose of an old power supply?
A technician is upgrading many PCs used within the company. How should the technician dispose of old RAM?
A technician is upgrading many PCs used within the company. How should the technician dispose of old RAM?
A technician is upgrading many PCs used within the company. How should the technician dispose of an old motherboard?
A technician is upgrading many PCs used within the company. How should the technician dispose of an old motherboard?
A technician is upgrading many PCs used within the company. How should the technician dispose of an old hard drive?
A technician is upgrading many PCs used within the company. How should the technician dispose of an old hard drive?
After continuous morning use, a computer suddenly reboots without the intervention of the user. What are the two most likely hardware parts that could cause this problem? (Choose two.)
After continuous morning use, a computer suddenly reboots without the intervention of the user. What are the two most likely hardware parts that could cause this problem? (Choose two.)
For two days in a row, a user has noticed that the computer reboots several times before it eventually starts. What are two suspect components? (Choose two.)
For two days in a row, a user has noticed that the computer reboots several times before it eventually starts. What are two suspect components? (Choose two.)
While a user is working on a spreadsheet, the computer reboots. What are two components that could cause this issue? (Choose two.)
While a user is working on a spreadsheet, the computer reboots. What are two components that could cause this issue? (Choose two.)
A client packet is received by a server. The packet has a destination port number of 137. What service application is the client requesting?
A client packet is received by a server. The packet has a destination port number of 137. What service application is the client requesting?
A client packet is received by a server. The packet has a destination port number of 22. What service application is the client requesting?
A client packet is received by a server. The packet has a destination port number of 22. What service application is the client requesting?
A client packet is received by a server. The packet has a destination port number of 143. What service application is the client requesting?
A client packet is received by a server. The packet has a destination port number of 143. What service application is the client requesting?
A client packet is received by a server. The packet has a destination port number of 23. What service application is the client requesting?
A client packet is received by a server. The packet has a destination port number of 23. What service application is the client requesting?
A client packet is received by a server. The packet has a destination port number of 161. What service application is the client requesting?
A client packet is received by a server. The packet has a destination port number of 161. What service application is the client requesting?
A client packet is received by a server. The packet has a destination port number of 389. What service application is the client requesting?
A client packet is received by a server. The packet has a destination port number of 389. What service application is the client requesting?
A client packet is received by a server. The packet has a destination port number of 25. What service application is the client requesting?
A client packet is received by a server. The packet has a destination port number of 25. What service application is the client requesting?
A client packet is received by a server. The packet has a destination port number of 427. What service application is the client requesting?
A client packet is received by a server. The packet has a destination port number of 427. What service application is the client requesting?
A client packet is received by a server. The packet has a destination port number of 53. What service application is the client requesting?
A client packet is received by a server. The packet has a destination port number of 53. What service application is the client requesting?
Which is the compressed format of the IPv6 address 2001:0db8:0000:0000:0000:a0b0:0008:0001?
Which is the compressed format of the IPv6 address 2001:0db8:0000:0000:0000:a0b0:0008:0001?
Which is the compressed format of the IPv6 address fe80:09ea:0000:2200:0000:0000:0fe0:0290?
Which is the compressed format of the IPv6 address fe80:09ea:0000:2200:0000:0000:0fe0:0290?
Which is the compressed format of the IPv6 address 2002:0042:0010:c400:0000:0000:0000:0909?
Which is the compressed format of the IPv6 address 2002:0042:0010:c400:0000:0000:0000:0909?
Which is the compressed format of the IPv6 address 2002:0420:00c4:1008:0025:0190:0000:0990?
Which is the compressed format of the IPv6 address 2002:0420:00c4:1008:0025:0190:0000:0990?
Which is the compressed format of the IPv6 address 2001:0db8:0000:0000:0ab8:0001:0000:1000?
Which is the compressed format of the IPv6 address 2001:0db8:0000:0000:0ab8:0001:0000:1000?
Which is the compressed format of the IPv6 address fe80:0000:0000:0000:0220:0b3f:f0e0:0029?
Which is the compressed format of the IPv6 address fe80:0000:0000:0000:0220:0b3f:f0e0:0029?
Which is the compressed format of the IPv6 address fe80:9ea0:0000:2020:0000:00bf:00e0:9290?
Which is the compressed format of the IPv6 address fe80:9ea0:0000:2020:0000:00bf:00e0:9290?
What ACPI power state describes when the CPU and RAM are off and the contents of RAM have been saved to a temporary file on the hard drive?
What ACPI power state describes when the CPU and RAM are off and the contents of RAM have been saved to a temporary file on the hard drive?
A reporter is trying to print several high resolution photographs but the color laser printer is going extremely slowly. What should the technician do to resolve the issue?
A reporter is trying to print several high resolution photographs but the color laser printer is going extremely slowly. What should the technician do to resolve the issue?
A new printer has just been installed deep in a mine. When test pages are printed, the paper constantly jams. What should the technician do to resolve the issue?
A new printer has just been installed deep in a mine. When test pages are printed, the paper constantly jams. What should the technician do to resolve the issue?
A user complains that recently every printed document has vertical lines and streaks on the paper. What should the technician do to resolve the issue?
A user complains that recently every printed document has vertical lines and streaks on the paper. What should the technician do to resolve the issue?
A school is installing a new shared printer but the printer is not showing up on the list of available printers. What should the technician do to resolve the issue?
A school is installing a new shared printer but the printer is not showing up on the list of available printers. What should the technician do to resolve the issue?
Employees are complaining that they send print jobs to a newly installed printer but the print jobs never print. What should the technician do to resolve the issue?
Employees are complaining that they send print jobs to a newly installed printer but the print jobs never print. What should the technician do to resolve the issue?
Users have noticed that the colors on their printed documents are different from the colors that they see on their computer screens. What should the technician do to resolve the issue?
Users have noticed that the colors on their printed documents are different from the colors that they see on their computer screens. What should the technician do to resolve the issue?
A technician has just completed a preventive maintenance on the department printer. Users are now complaining that the printer is no longer available. What should the technician do to resolve the issue?
A technician has just completed a preventive maintenance on the department printer. Users are now complaining that the printer is no longer available. What should the technician do to resolve the issue?
Employees of a small business are complaining that the printer is printing faded images. What should the technician do to resolve the issue?
Employees of a small business are complaining that the printer is printing faded images. What should the technician do to resolve the issue?
A photographer is complaining about the following printer issue: The printer issues a “Document failed to print” message. What are two possible causes of this issue? (Choose two.)
A photographer is complaining about the following printer issue: The printer issues a “Document failed to print” message. What are two possible causes of this issue? (Choose two.)
A reporter is complaining about the following printer issue: The printer is printing unknown characters. What are two possible causes of this issue? (Choose two.)
A reporter is complaining about the following printer issue: The printer is printing unknown characters. What are two possible causes of this issue? (Choose two.)
A manager is complaining about the following printer issue: The printer is printing incorrect colors. What are two possible causes of this issue? (Choose two.)
A manager is complaining about the following printer issue: The printer is printing incorrect colors. What are two possible causes of this issue? (Choose two.)
A technician is complaining about the following printer issue: The print appears faded on the paper. What are two possible causes of this issue? (Choose two.)
A technician is complaining about the following printer issue: The print appears faded on the paper. What are two possible causes of this issue? (Choose two.)
A librarian is complaining about the following printer issue: The printer control panel displays no image. What are two possible causes of this issue? (Choose two.)
A librarian is complaining about the following printer issue: The printer control panel displays no image. What are two possible causes of this issue? (Choose two.)
A teacher is complaining about the following printer issue: The paper is creased after printing. What are two possible causes of this issue? (Choose two.)
A teacher is complaining about the following printer issue: The paper is creased after printing. What are two possible causes of this issue? (Choose two.)
A receptionist is complaining about the following printer issue: My impact printer produces faded or light characters. What are two possible causes of this issue? (Choose two.)
A receptionist is complaining about the following printer issue: My impact printer produces faded or light characters. What are two possible causes of this issue? (Choose two.)
A photographer is complaining about the following printer issue: The paper is not being fed into the printer. What are two possible causes of this issue? (Choose two.)
A photographer is complaining about the following printer issue: The paper is not being fed into the printer. What are two possible causes of this issue? (Choose two.)
A laptop has an NVMe drive (C:) and a mechanical hard drive (D:). When the user tries to save a spreadsheet to the D: drive, the user notices that the D: drive is not there. What should the technician do to see if the drive is recognized by the operating system?
A laptop has an NVMe drive (C:) and a mechanical hard drive (D:). When the user tries to save a spreadsheet to the D: drive, the user notices that the D: drive is not there. What should the technician do to see if the drive is recognized by the operating system?
A computer has two mechanical hard drives. The second drive (D:) is used for data storage. When trying to save an email attachment to the local hard drive, the user notices that the D: drive is not an option. What should the technician do to see if the drive is recognized by the operating system?
A computer has two mechanical hard drives. The second drive (D:) is used for data storage. When trying to save an email attachment to the local hard drive, the user notices that the D: drive is not an option. What should the technician do to see if the drive is recognized by the operating system?
A user reports that a drive is no longer there. The technician asks the user to demonstrate the problem. Within the application, the user demonstrates that the drive, that was present in the save options yesterday, is now no longer an option. What should the technician do to see if the drive is recognized by the operating system?
A user reports that a drive is no longer there. The technician asks the user to demonstrate the problem. Within the application, the user demonstrates that the drive, that was present in the save options yesterday, is now no longer an option. What should the technician do to see if the drive is recognized by the operating system?
A computer has an SSD for the operating system and applications and uses another mechanical hard drive for data storage. The user reports that data can no longer be saved to the mechanical hard drive. What should the technician do to see if the drive is recognized by the operating system?
A computer has an SSD for the operating system and applications and uses another mechanical hard drive for data storage. The user reports that data can no longer be saved to the mechanical hard drive. What should the technician do to see if the drive is recognized by the operating system?
A technician is working on a laptop and the GPS is not functioning. What is a probable cause for this situation?
A technician is working on a laptop and the GPS is not functioning. What is a probable cause for this situation?
A technician is working on a laptop and an app is not loading. What is a probable cause for this situation? A technician is working on a laptop and an app is not loading. What is a probable cause for this situation?
A technician is working on a laptop and an app is not loading. What is a probable cause for this situation? A technician is working on a laptop and an app is not loading. What is a probable cause for this situation?
A technician is working on a laptop and an app is not responding. What is a probable cause for this situation?
A technician is working on a laptop and an app is not responding. What is a probable cause for this situation?
A technician is working on a laptop and an error message about decryption appears when opening an email. What is a probable cause for this situation?
A technician is working on a laptop and an error message about decryption appears when opening an email. What is a probable cause for this situation?
A PC technician has been asked by a supervisor to recommend a security solution for a small company that wants stateful firewall services. Which security technique should the technician recommend
A PC technician has been asked by a supervisor to recommend a security solution for a small company that wants stateful firewall services. Which security technique should the technician recommend
A gamer is booting a desktop that has Windows 10 installed on dynamic drives. The boot process is currently working on the following step: WinLoad reads the registry files, chooses a hardware profile, and loads the device drivers. What is the next step that will happen in the boot process?
A gamer is booting a desktop that has Windows 10 installed on dynamic drives. The boot process is currently working on the following step: WinLoad reads the registry files, chooses a hardware profile, and loads the device drivers. What is the next step that will happen in the boot process?
A technician is working on a laptop and an error message about decryption appears when opening an email. What is a possible solution for this situation?
A technician is working on a laptop and an error message about decryption appears when opening an email. What is a possible solution for this situation?
Users in the sales department want to be able to print from laptops and tablets. Which two wireless technologies should the IT technician look for when researching new printers for the sales department? (Choose two.)
Users in the sales department want to be able to print from laptops and tablets. Which two wireless technologies should the IT technician look for when researching new printers for the sales department? (Choose two.)
What are three factors to consider when purchasing a replacement motherboard? (Choose three.)
What are three factors to consider when purchasing a replacement motherboard? (Choose three.)
What are two features of protocols used within the TCP/IP protocol stack? (Choose two.)
What are two features of protocols used within the TCP/IP protocol stack? (Choose two.)
A technician is working on a laptop and a key on the keyboard is not responding as it should. What is a possible solution for this situation?
A technician is working on a laptop and a key on the keyboard is not responding as it should. What is a possible solution for this situation?
What two effects might suggest that an incorrect printer driver is loaded on the Windows PC? (Choose two.)
What two effects might suggest that an incorrect printer driver is loaded on the Windows PC? (Choose two.)
Why would a network technician change the wireless router IP address to a different private IP address during initial installation?
Why would a network technician change the wireless router IP address to a different private IP address during initial installation?
A technician is working on a laptop and GPS is not functioning. What is a possible solution for this situation?
A technician is working on a laptop and GPS is not functioning. What is a possible solution for this situation?
A technician is working on a laptop and GPS is not functioning. What is a possible solution for this situation?
A technician is working on a laptop and GPS is not functioning. What is a possible solution for this situation?
Which factor can limit the amount of data that the CPU can receive and process at one time?
Which factor can limit the amount of data that the CPU can receive and process at one time?
Which type of optical drive supports the greatest amount of storage and is able to read and write CDs, DVDs, and Blu-Ray media?
Which type of optical drive supports the greatest amount of storage and is able to read and write CDs, DVDs, and Blu-Ray media?
Why would a manager need to use the sfc command?
Why would a manager need to use the sfc command?
Why would a technician need to use the DISM command?
Why would a technician need to use the DISM command?
Which two activities are normally controlled by the Northbridge part of the chipset? (Choose two.)
Which two activities are normally controlled by the Northbridge part of the chipset? (Choose two.)
A manager is booting a tablet that has Windows 8 installed. The boot process is currently working on the following step: WINLOGON.EXE displays the Windows Welcome screen What is the next step that will happen in the boot process?
A manager is booting a tablet that has Windows 8 installed. The boot process is currently working on the following step: WINLOGON.EXE displays the Windows Welcome screen What is the next step that will happen in the boot process?
An analyst is booting a tablet that has Windows 7 installed with media card reader. The boot process is currently working on the following step: WINLOGON.EXE displays the Windows Welcome screen What is the next step that will happen in the boot process?
An analyst is booting a tablet that has Windows 7 installed with media card reader. The boot process is currently working on the following step: WINLOGON.EXE displays the Windows Welcome screen What is the next step that will happen in the boot process?
Match the function performed by an OS to its description.
Match the function performed by an OS to its description.
Before installing the latest version of printer management software, an IT technician creates a restore point on the Windows 10 computer. The installation fails before it is complete, and now the printer shows as unavailable. Which Windows option should the technician use to reverse the software installation and return the system to its prior state without affecting users files and settings?
Before installing the latest version of printer management software, an IT technician creates a restore point on the Windows 10 computer. The installation fails before it is complete, and now the printer shows as unavailable. Which Windows option should the technician use to reverse the software installation and return the system to its prior state without affecting users files and settings?
A new customer asks if all of its older company computers, which are still running Windows XP, can be immediately upgraded to Windows 10. What are two important concerns that the IT technician must discuss with the customer in order to determine if the OS upgrade can be done? (Choose two.)
A new customer asks if all of its older company computers, which are still running Windows XP, can be immediately upgraded to Windows 10. What are two important concerns that the IT technician must discuss with the customer in order to determine if the OS upgrade can be done? (Choose two.)
Which three wireless router settings should be disabled as a security best practice? (Choose three.)
Which three wireless router settings should be disabled as a security best practice? (Choose three.)
What are two symptoms that indicate that a computer system may be a victim of DNS spoofing? (Choose two.)
What are two symptoms that indicate that a computer system may be a victim of DNS spoofing? (Choose two.)
A PC technician has been asked by a supervisor to recommend a security solution for preventing tailgating. Which security technique should the technician recommend?
A PC technician has been asked by a supervisor to recommend a security solution for preventing tailgating. Which security technique should the technician recommend?
A company contracts with a service provider to obtain IaaS and ITaaS services. What are two advantages of these types of cloud service implementation? (Choose two.)
A company contracts with a service provider to obtain IaaS and ITaaS services. What are two advantages of these types of cloud service implementation? (Choose two.)
What are two methods of disabling cellular data when located in an area where it is limited or expensive? (Choose two.)
What are two methods of disabling cellular data when located in an area where it is limited or expensive? (Choose two.)
Refer to the exhibit. A computer technician creates a bootable USB hard drive and loads a Linux operating system on it. When the technician reboots the computer, it does not boot to the Linux OS. Instead, the light on the optical drive flashes and then the computer loads Windows. What needs to be done to ensure that the computer automatically boots from the USB hard drive if it is connected?
Refer to the exhibit. A computer technician creates a bootable USB hard drive and loads a Linux operating system on it. When the technician reboots the computer, it does not boot to the Linux OS. Instead, the light on the optical drive flashes and then the computer loads Windows. What needs to be done to ensure that the computer automatically boots from the USB hard drive if it is connected?
A help desk technician receives a call from a user describing an issue with a computer. The user states that the computer will not power on, that it only makes a beeping sound. Why does the technician ask the user to restart the system and count how many beeps the computer makes?
A help desk technician receives a call from a user describing an issue with a computer. The user states that the computer will not power on, that it only makes a beeping sound. Why does the technician ask the user to restart the system and count how many beeps the computer makes?
A college uses Microsoft 365 Office and email services for its faculty, staff, and students. Data storage, custom applications, and Microsoft Active Directory services are delivered by virtual servers leased from a local data center. Single sign-on is implemented for both environments for authentication and authorization. Access control is managed locally. What type of cloud service implementation is the college using?
A college uses Microsoft 365 Office and email services for its faculty, staff, and students. Data storage, custom applications, and Microsoft Active Directory services are delivered by virtual servers leased from a local data center. Single sign-on is implemented for both environments for authentication and authorization. Access control is managed locally. What type of cloud service implementation is the college using?
The help desk receives a call from a customer who reports a computer issue that occurs after trying to install Windows 10 with a disc that the IT department provided. When the customer reboots the computer, instead of loading Windows, the computer displays the Windows installation program screen again. Which probable cause should the IT technician place at the top of the list of most obvious reasons for the error?
The help desk receives a call from a customer who reports a computer issue that occurs after trying to install Windows 10 with a disc that the IT department provided. When the customer reboots the computer, instead of loading Windows, the computer displays the Windows installation program screen again. Which probable cause should the IT technician place at the top of the list of most obvious reasons for the error?
Office workers in a software company are being temporarily relocated to a different area of the building while their previous office space is being reconfigured. Which type of network device should be installed to make it easy for the users to connect to the company network from all of their devices, including smart phones, tablets, and laptops?
Office workers in a software company are being temporarily relocated to a different area of the building while their previous office space is being reconfigured. Which type of network device should be installed to make it easy for the users to connect to the company network from all of their devices, including smart phones, tablets, and laptops?
What is an example of an active cooling solution for a desktop PC?
What is an example of an active cooling solution for a desktop PC?
What is a consequence of a computer not having enough RAM memory installed?
What is a consequence of a computer not having enough RAM memory installed?
Refer to the exhibit. A payroll department employee has shared a locally attached HP Officejet Pro 8110 printer over the network in Windows 10. What do the other Windows 10 users in the payroll department have to do in order to print to the shared printer?
Refer to the exhibit. A payroll department employee has shared a locally attached HP Officejet Pro 8110 printer over the network in Windows 10. What do the other Windows 10 users in the payroll department have to do in order to print to the shared printer?
Which type of power supply is the most commonly used and provides a separate power connection in order to directly power the CPU?
Which type of power supply is the most commonly used and provides a separate power connection in order to directly power the CPU?
Refer to the exhibit. A user calls the help desk to report a printer issue. The user explains that when selecting the print option from the menu bar, a dialog box pops up requesting a file name. After entering the filename, nothing prints on the attached HP printer. What is the cause of the issue that the user is experiencing?
Refer to the exhibit. A user calls the help desk to report a printer issue. The user explains that when selecting the print option from the menu bar, a dialog box pops up requesting a file name. After entering the filename, nothing prints on the attached HP printer. What is the cause of the issue that the user is experiencing?
Which function is incorporated into some Intel CPUs that enables a single CPU to perform as though two CPUs are installed?
Which function is incorporated into some Intel CPUs that enables a single CPU to perform as though two CPUs are installed?
Which cloud computing characteristic enables multiple tenants to share the same storage, processing, and network bandwidth?
Which cloud computing characteristic enables multiple tenants to share the same storage, processing, and network bandwidth?
Which three types of external ports can be used to connect an external storage device to a computer? (Choose three.)
Which three types of external ports can be used to connect an external storage device to a computer? (Choose three.)
Which three computer components require separate cabling for power? (Choose three.)
Which three computer components require separate cabling for power? (Choose three.)
In which two situations would thin clients be a good choice to meet the end-user computing needs? (Choose two.)
In which two situations would thin clients be a good choice to meet the end-user computing needs? (Choose two.)
Refer to the exhibit. Which two hypervisor software products are suitable for the virtualization environment shown in the exhibit? (Choose two.)
Refer to the exhibit. Which two hypervisor software products are suitable for the virtualization environment shown in the exhibit? (Choose two.)
Refer to the exhibit. The help desk is receiving numerous calls from employees in the payroll department. It appears that their computers can print to the local network printer, but cannot access the cloud-based payroll service. One employee sends a screen print showing the result of issuing an ipconfig /all command. What is the cause of the issue being experienced by the users?
Refer to the exhibit. The help desk is receiving numerous calls from employees in the payroll department. It appears that their computers can print to the local network printer, but cannot access the cloud-based payroll service. One employee sends a screen print showing the result of issuing an ipconfig /all command. What is the cause of the issue being experienced by the users?
An employee recently purchased a smartwatch. Following the instructions from the watch manufacturer, the employee downloads the wearable app and installs it on an Android phone. The smartwatch shows that it is in discoverable mode, but the app cannot connect to the watch. What is one issue that might cause this problem?
An employee recently purchased a smartwatch. Following the instructions from the watch manufacturer, the employee downloads the wearable app and installs it on an Android phone. The smartwatch shows that it is in discoverable mode, but the app cannot connect to the watch. What is one issue that might cause this problem?
Which member of the DDR SDRAM family has the fastest clock rate and consumes the least amount of power?
Which member of the DDR SDRAM family has the fastest clock rate and consumes the least amount of power?
Refer to the exhibit. What is one function that a technician can accomplish using this graphical interface?
Refer to the exhibit. What is one function that a technician can accomplish using this graphical interface?
A network technician suspects that there may be a short or a termination error in the wiring that connects an Ethernet switch to the network. Which tool would be the best choice for the technician to use to identify the issue?
A network technician suspects that there may be a short or a termination error in the wiring that connects an Ethernet switch to the network. Which tool would be the best choice for the technician to use to identify the issue?
A client packet is received by a server. The packet has a destination port number of 110. What service application is the client requesting?
A client packet is received by a server. The packet has a destination port number of 110. What service application is the client requesting?
Why would a university student need to use the taskkill command?
Why would a university student need to use the taskkill command?
Which term describes a partition scheme that supports storing a backup of a partition table?
Which term describes a partition scheme that supports storing a backup of a partition table?
How can a hard drive that is using an MBR be partitioned in order to support additional logical drives?
How can a hard drive that is using an MBR be partitioned in order to support additional logical drives?
A computer technician uses Windows tools to gather information such as system components, operating system, users, and disk drives on multiple systems within the company. Another technician suggests that the tasks would take less time if they were automated. Which two built-in scripting capabilities in Windows enable a technician to run a simple text file, created in Notepad, which contains the necessary commands and variables? (Choose two.)
A computer technician uses Windows tools to gather information such as system components, operating system, users, and disk drives on multiple systems within the company. Another technician suggests that the tasks would take less time if they were automated. Which two built-in scripting capabilities in Windows enable a technician to run a simple text file, created in Notepad, which contains the necessary commands and variables? (Choose two.)
Refer to the exhibit. Examine both the output and the source code of the Linux shell script sample.sh. Which two statements describe the variables contained in the sample.sh script? (Choose two.)
Refer to the exhibit. Examine both the output and the source code of the Linux shell script sample.sh. Which two statements describe the variables contained in the sample.sh script? (Choose two.)
Why would a lawyer need to use the tracert command?
Why would a lawyer need to use the tracert command?
. A network analyst is booting a laptop that has Windows 7 installed with cellular SIM slot. The boot process is currently working on the following step: The Windows kernel takes over the boot process. What is thenext step that will happen in the boot process?
. A network analyst is booting a laptop that has Windows 7 installed with cellular SIM slot. The boot process is currently working on the following step: The Windows kernel takes over the boot process. What is thenext step that will happen in the boot process?
A company purchases 15 USB flash drives to use for data analysis training for company accountants. The data analysis training requires that actual company data be stored on the drives, so a secure method of erasing the data is needed before the flash drives can be reused for other training classes. What method should the IT technicians use to ensure that the data on the USB flash drives cannot be recovered?
A company purchases 15 USB flash drives to use for data analysis training for company accountants. The data analysis training requires that actual company data be stored on the drives, so a secure method of erasing the data is needed before the flash drives can be reused for other training classes. What method should the IT technicians use to ensure that the data on the USB flash drives cannot be recovered?
Refer to the exhibit. What can be determined about the contents of the ite_user home directory?
Refer to the exhibit. What can be determined about the contents of the ite_user home directory?
Refer to the exhibit. What is true of this mobile device screen?
Refer to the exhibit. What is true of this mobile device screen?
An on-site IT technician needs to work on systems installed in a small health clinic located in New York state. When the technician arrives, the office manager asks if the technician is aware of HIPAA regulations. Which two situations are breaches of PHI and could possibly lead to severe penalties under HIPAA? (Choose two.)
An on-site IT technician needs to work on systems installed in a small health clinic located in New York state. When the technician arrives, the office manager asks if the technician is aware of HIPAA regulations. Which two situations are breaches of PHI and could possibly lead to severe penalties under HIPAA? (Choose two.)
Why would a manager need to use the del command?
Why would a manager need to use the del command?
technician is working on a laptop and an app is not responding. What is a possible solution for this situation?
technician is working on a laptop and an app is not responding. What is a possible solution for this situation?
An end user wants to be able to recover an older version of a document that was created earlier in the day. Assuming that Windows Backup is enabled, which Windows 10 function can provide a user access to recover specific versions of a file?
An end user wants to be able to recover an older version of a document that was created earlier in the day. Assuming that Windows Backup is enabled, which Windows 10 function can provide a user access to recover specific versions of a file?
An IT technician attempts to copy a large file to a USB flash drive that contains other data but the copy fails. The technician checks the properties of the flash drive and finds that it was formatted using FAT32. Which method can the technician use to easily change the file system to NTFS without losing the data files currently stored on the disk?
An IT technician attempts to copy a large file to a USB flash drive that contains other data but the copy fails. The technician checks the properties of the flash drive and finds that it was formatted using FAT32. Which method can the technician use to easily change the file system to NTFS without losing the data files currently stored on the disk?
An employee wants to keep a local backup of iPhone data on a Windows laptop. What type of software does the employee need on the laptop to create this backup?
An employee wants to keep a local backup of iPhone data on a Windows laptop. What type of software does the employee need on the laptop to create this backup?
What can an IT technician accomplish using the Manage Storage Spaces feature in Windows 8 and 10?
What can an IT technician accomplish using the Manage Storage Spaces feature in Windows 8 and 10?
While troubleshooting an issue on a customer computer, an on-site technician believes that the problem can be resolved by using Windows Restore. What type of information is not restored when using Windows Restore with a recent restore point snapshot?
While troubleshooting an issue on a customer computer, an on-site technician believes that the problem can be resolved by using Windows Restore. What type of information is not restored when using Windows Restore with a recent restore point snapshot?
A technician is booting a PC that has Windows 10 installed on dynamic drives. The boot process is currently working on the following step: POST. What is the next step that will happen in the boot process?
A technician is booting a PC that has Windows 10 installed on dynamic drives. The boot process is currently working on the following step: POST. What is the next step that will happen in the boot process?
What are two features of multicore processors? (Choose two.)
What are two features of multicore processors? (Choose two.)
Which two statements describe characteristics of network addresses? (Choose two.)
Which two statements describe characteristics of network addresses? (Choose two.)
An on-site technician is asked to check a laptop used by an executive who occasionally works from home. The technician observes that the image on the laptop screen flickers and appears dull, even though the same image displayed on another monitor attached to the laptop docking station is normal. What are two issues that could cause the symptoms the technician observed? (Choose two.)
An on-site technician is asked to check a laptop used by an executive who occasionally works from home. The technician observes that the image on the laptop screen flickers and appears dull, even though the same image displayed on another monitor attached to the laptop docking station is normal. What are two issues that could cause the symptoms the technician observed? (Choose two.)
A technician must replace a power supply. Which two features should the technician consider when selecting the replacement? (Choose two.)
A technician must replace a power supply. Which two features should the technician consider when selecting the replacement? (Choose two.)
Why is unbuffered memory a better choice than buffered memory for gaming or general use computers?
Why is unbuffered memory a better choice than buffered memory for gaming or general use computers?
A manager is booting a tablet that has Windows 10 installed. The boot process is currently working on the following step: WINLOGON.EXE displays the Windows Welcome screen What is the next step that will happen in the boot process?
A manager is booting a tablet that has Windows 10 installed. The boot process is currently working on the following step: WINLOGON.EXE displays the Windows Welcome screen What is the next step that will happen in the boot process?
A person has started a new technical job. In which situation would ESD be an issue?
A person has started a new technical job. In which situation would ESD be an issue?
A corporation would like to use three or more factors for the password authentication policy. How can this be achieved?
A corporation would like to use three or more factors for the password authentication policy. How can this be achieved?
Which statement is true regarding libraries in Windows 10?
Which statement is true regarding libraries in Windows 10?
A user notes that the username and password are automatically populated in the Microsoft Edge browser when logging into a secure site. When the user tries to log into the same site using Google Chrome, the username and password do not save automatically. Why is this occurring?
A user notes that the username and password are automatically populated in the Microsoft Edge browser when logging into a secure site. When the user tries to log into the same site using Google Chrome, the username and password do not save automatically. Why is this occurring?
An analyst is booting a desktop that has Windows 10 installed with 4 GB RAM. The boot process is currently working on the following step: Winload uses the path specified in BOOTMGR to find the boot partition. What is the next step that will happen in the boot process?
An analyst is booting a desktop that has Windows 10 installed with 4 GB RAM. The boot process is currently working on the following step: Winload uses the path specified in BOOTMGR to find the boot partition. What is the next step that will happen in the boot process?
A manager is booting a tablet that has Windows 10 installed. The boot process is currently working on the following step: The Windows kernel takes over the boot process. What is the next step that will happen in the boot process?
A manager is booting a tablet that has Windows 10 installed. The boot process is currently working on the following step: The Windows kernel takes over the boot process. What is the next step that will happen in the boot process?
An accountant is booting a PC that has Windows 10 installed. The boot process is currently working on the following step: BIOS locates and reads the configuration settings that are stored in the CMOS memory. What is the next step that will happen in the boot process?
An accountant is booting a PC that has Windows 10 installed. The boot process is currently working on the following step: BIOS locates and reads the configuration settings that are stored in the CMOS memory. What is the next step that will happen in the boot process?
What is a possible situation when it might be necessary to boot Windows 10 from a bootable recovery USB device?
What is a possible situation when it might be necessary to boot Windows 10 from a bootable recovery USB device?
A user is trying to execute a file using elevated permission. The user right-clicks the file, chooses Run as Administrator, and chooses Yes in the User Account Control (UAC) window. The operation fails. What is the reason?
A user is trying to execute a file using elevated permission. The user right-clicks the file, chooses Run as Administrator, and chooses Yes in the User Account Control (UAC) window. The operation fails. What is the reason?
A technician wishes to use the reset option to repair a Windows 10 installation and chooses the option that will retain the user’s personal files. Which statement is true based on using this option?
A technician wishes to use the reset option to repair a Windows 10 installation and chooses the option that will retain the user’s personal files. Which statement is true based on using this option?
Which two statements are true regarding GPT partitions? (Choose two.)
Which two statements are true regarding GPT partitions? (Choose two.)
Which laptop LCD technology uses tilting crystals to provide a much higher contrast ratio than other types?
Which laptop LCD technology uses tilting crystals to provide a much higher contrast ratio than other types?
Which protocol is used by Windows for file and printer sharing?
Which protocol is used by Windows for file and printer sharing?
Why would a user need to use the gpupdate command?
Why would a user need to use the gpupdate command?
A technician is about to begin preventive maintenance on a company PC. In which situation would ESD be an issue?
A technician is about to begin preventive maintenance on a company PC. In which situation would ESD be an issue?
A technician is upgrading many PCs used within the company. How should the technician dispose of an old inkjet printer cartridge?
A technician is upgrading many PCs used within the company. How should the technician dispose of an old inkjet printer cartridge?
The IT department has just purchased 15 wireless access points in order to provide full wireless coverage for all 100 employees within the company and is looking to deploy the most secure and scalable wireless implementation. Which open source authentication method would perform authentication on behalf of all 15 wireless network devices?
The IT department has just purchased 15 wireless access points in order to provide full wireless coverage for all 100 employees within the company and is looking to deploy the most secure and scalable wireless implementation. Which open source authentication method would perform authentication on behalf of all 15 wireless network devices?
What are two probable causes of a user unable to access local resources such as file shares or printers on a wired network? (Choose two.)
What are two probable causes of a user unable to access local resources such as file shares or printers on a wired network? (Choose two.)
Why would a manager need to use the ping command?
Why would a manager need to use the ping command?
Why would a user need to use the nslookup command?
Why would a user need to use the nslookup command?
Why would a user need to use the netstat command?
Why would a user need to use the netstat command?
Why would a technical support representative need to use the ipconfig command?
Why would a technical support representative need to use the ipconfig command?
Why would a technical support representative need to use the bootrec command?
Why would a technical support representative need to use the bootrec command?
Why would a technical support representative need to use the format command?
Why would a technical support representative need to use the format command?
Why would a university student need to use the xcopy command?
Why would a university student need to use the xcopy command?
Why would a university student need to use the robocopy command?
Why would a university student need to use the robocopy command?
Why would a gamer need to use the copy command?
Why would a gamer need to use the copy command?
Why would a gamer need to use the move command?
Why would a gamer need to use the move command?
Which situation can be prevented by creating a UEFI password?
Which situation can be prevented by creating a UEFI password?
What is required as an additional verification mechanism on iOS mobile devices when setting up biometric screen locks, such as Touch ID or Face ID?
What is required as an additional verification mechanism on iOS mobile devices when setting up biometric screen locks, such as Touch ID or Face ID?
Users in a company have complained about network performance. After investigation, the IT staff has determined that the attacker injected false records on the server that translates IP addresses to domain names. What is the type of network attack?
Users in a company have complained about network performance. After investigation, the IT staff has determined that the attacker injected false records on the server that translates IP addresses to domain names. What is the type of network attack?
Which built-in tool is available on a Mac OS X machine to perform disk backups?
Which built-in tool is available on a Mac OS X machine to perform disk backups?
What is the purpose of running mobile device apps in a sandbox?
What is the purpose of running mobile device apps in a sandbox?
A user downloads a widget onto his Android phone but is puzzled to see that when the widget is touched an app is launched. What is a possible cause?
A user downloads a widget onto his Android phone but is puzzled to see that when the widget is touched an app is launched. What is a possible cause?
When attempting to improve system performance for Linux computers with a limited amount of memory, why is increasing the size of the swap file system not considered the best solution?
When attempting to improve system performance for Linux computers with a limited amount of memory, why is increasing the size of the swap file system not considered the best solution?
A customer brings in a computer that is asking for a password as soon as it powers on, even before the operating system boots. Which type of password is enabled?
A customer brings in a computer that is asking for a password as soon as it powers on, even before the operating system boots. Which type of password is enabled?
What Windows utility should be used to configure password rules and account lockout policies on a system that is not part of a domain?
What Windows utility should be used to configure password rules and account lockout policies on a system that is not part of a domain?
An employee that has worked at the company for many years has started a home-based business selling crafts. While leaving an office meeting, a company supervisor notices the employee buying supplies for the personal crafting business of the employee. What section of the security policy should the supervisor review when determining how to handle this situation?
An employee that has worked at the company for many years has started a home-based business selling crafts. While leaving an office meeting, a company supervisor notices the employee buying supplies for the personal crafting business of the employee. What section of the security policy should the supervisor review when determining how to handle this situation?
A manager reports that unusual things are happening on a Windows computer. The technician determines that malware is the culprit. What can the technician do to remove stubborn malware?
A manager reports that unusual things are happening on a Windows computer. The technician determines that malware is the culprit. What can the technician do to remove stubborn malware?
Which type of security threat can be transferred through email and is used to gain sensitive information by recording the keystrokes of the email recipient?
Which type of security threat can be transferred through email and is used to gain sensitive information by recording the keystrokes of the email recipient?
What is an accurate description of asymmetric encryption technology?
What is an accurate description of asymmetric encryption technology?
The CIO wants to secure data on company laptops by implementing file encryption. The technician determines the best method is to encrypt each hard drive using Windows BitLocker. Which two things are needed to implement this solution? (Choose two.)
The CIO wants to secure data on company laptops by implementing file encryption. The technician determines the best method is to encrypt each hard drive using Windows BitLocker. Which two things are needed to implement this solution? (Choose two.)
A technician suspects that a security issue is causing problems with a computer. What two actions could be performed to test theories of probable cause when troubleshooting the PC? (Choose two.)
A technician suspects that a security issue is causing problems with a computer. What two actions could be performed to test theories of probable cause when troubleshooting the PC? (Choose two.)
When responding to a call from a customer who is experiencing problems with a computer, the technician notices that a number of system files on the computer have been renamed. Which two possible solutions could the technician implement to resolve the problem? (Choose two.)
When responding to a call from a customer who is experiencing problems with a computer, the technician notices that a number of system files on the computer have been renamed. Which two possible solutions could the technician implement to resolve the problem? (Choose two.)
Which methods can be used to implement multifactor authentication?
Which methods can be used to implement multifactor authentication?
What is the difference between a scripting language and a compiled language?
What is the difference between a scripting language and a compiled language?
A bench technician enters the server room and finds the backup server computer case open. The hard drives containing patient medical data are all physically disconnected from the motherboard and the SATA data cables are hanging outside the case. Which step should the technician immediately take?
A bench technician enters the server room and finds the backup server computer case open. The hard drives containing patient medical data are all physically disconnected from the motherboard and the SATA data cables are hanging outside the case. Which step should the technician immediately take?
What determines the level of support that a call center technician will provide to an individual customer?
What determines the level of support that a call center technician will provide to an individual customer?
What is used to control illegal use of software and content?
What is used to control illegal use of software and content?
What skill is essential for a level one technician to have?
What skill is essential for a level one technician to have?
Refer to the exhibit. During the troubleshooting of software that is installed on a computer system, a level one technician requires help from a level two technician. The file shown in the exhibit must be sent to the level two technician. How should the level one technician deliver this file?
Refer to the exhibit. During the troubleshooting of software that is installed on a computer system, a level one technician requires help from a level two technician. The file shown in the exhibit must be sent to the level two technician. How should the level one technician deliver this file?
In a computer forensics investigation, which type of data is considered volatile data and can be lost if power is removed from the computer?
In a computer forensics investigation, which type of data is considered volatile data and can be lost if power is removed from the computer?
Which subject area describes collecting and analyzing data from computer systems, networks, and storage devices, as part of an investigation of alleged illegal activity?
Which subject area describes collecting and analyzing data from computer systems, networks, and storage devices, as part of an investigation of alleged illegal activity?
A third-party security firm is performing a security audit of a company and recommends the company utilize the Remote Desktop Protocol. What are two characteristics of the Microsoft Remote Desktop Protocol (RDP)? (Choose two.)
A third-party security firm is performing a security audit of a company and recommends the company utilize the Remote Desktop Protocol. What are two characteristics of the Microsoft Remote Desktop Protocol (RDP)? (Choose two.)
A UTM appliance, such as a Cisco ASA 5506-X, includes the functionality of which two standalone devices? (Choose two.)
A UTM appliance, such as a Cisco ASA 5506-X, includes the functionality of which two standalone devices? (Choose two.)
An on-site IT technician is attempting to resolve an issue with application performance on a customer laptop. The technician backs up the customer data and then replaces the memory in the laptop with known good memory. It does not resolve the performance issue. What are the next two actions the technician should take? (Choose two.)
An on-site IT technician is attempting to resolve an issue with application performance on a customer laptop. The technician backs up the customer data and then replaces the memory in the laptop with known good memory. It does not resolve the performance issue. What are the next two actions the technician should take? (Choose two.)
A user wants VirtualBox to run automatically when Windows 10 starts up. Which action will enable VirtualBox to load and run on system startup?
A user wants VirtualBox to run automatically when Windows 10 starts up. Which action will enable VirtualBox to load and run on system startup?
An on-site IT technician finished the removal of malware from a customer computer and installed new virus protection software. An hour after the technician left the site, the customer called the help desk to report that a critical web-based application was no longer functioning properly. Which step in the troubleshooting process did the IT technician fail to properly complete?
An on-site IT technician finished the removal of malware from a customer computer and installed new virus protection software. An hour after the technician left the site, the customer called the help desk to report that a critical web-based application was no longer functioning properly. Which step in the troubleshooting process did the IT technician fail to properly complete?
What are two characteristics of the hotend nozzle on a 3D printer? (Choose two.)
What are two characteristics of the hotend nozzle on a 3D printer? (Choose two.)
Refer to the exhibit. What can be determined from the output of this command?
Refer to the exhibit. What can be determined from the output of this command?
Which type of disk drive can provide a very fast boot experience and also provide high capacity storage?
Which type of disk drive can provide a very fast boot experience and also provide high capacity storage?
Refer to the exhibit. Which type of adapter card may require the width of two slots in order to accommodate additional cooling, even though it only has one PCIe x16 connector?
Refer to the exhibit. Which type of adapter card may require the width of two slots in order to accommodate additional cooling, even though it only has one PCIe x16 connector?
A technician follows the instruction manual that came with a new Bluetooth speaker to place the speaker in discoverable mode. In this mode, what type of information will the speaker transmit to the laptop in order to start the pairing process?
A technician follows the instruction manual that came with a new Bluetooth speaker to place the speaker in discoverable mode. In this mode, what type of information will the speaker transmit to the laptop in order to start the pairing process?
A technician is booting a PC that has Windows 10 installed on dynamic drives. The boot process is currently working on the following step: BIOS locates and reads the configuration settings that are stored in the CMOS memory. What is the next step that will happen in the boot process?
A technician is booting a PC that has Windows 10 installed on dynamic drives. The boot process is currently working on the following step: BIOS locates and reads the configuration settings that are stored in the CMOS memory. What is the next step that will happen in the boot process?
A network analyst is booting a laptop that has Windows 7 installed with cellular SIM slot. The boot process is currently working on the following step: The Windows kernel takes over the boot process. What is the next step that will happen in the boot process?
A network analyst is booting a laptop that has Windows 7 installed with cellular SIM slot. The boot process is currently working on the following step: The Windows kernel takes over the boot process. What is the next step that will happen in the boot process?
Why would a bank manager need to use the bootrec command?
Why would a bank manager need to use the bootrec command?
Why would a user need to use the gpresult command?
Why would a user need to use the gpresult command?
A gamer is booting a tablet that has Windows 7 installed with 4 GB RAM. The boot process is currently working on the following step: The Windows kernel takes over the boot process. What is the next step that will happen in the boot process?
A gamer is booting a tablet that has Windows 7 installed with 4 GB RAM. The boot process is currently working on the following step: The Windows kernel takes over the boot process. What is the next step that will happen in the boot process?
An accountant is booting a desktop that has Windows 8 installed. The boot process is currently working on the following step: WinLoad loads two files that make up the core of Windows: NTOSKRNL.EXE and HAL.DLL. What is the next step that will happen in the boot process?
An accountant is booting a desktop that has Windows 8 installed. The boot process is currently working on the following step: WinLoad loads two files that make up the core of Windows: NTOSKRNL.EXE and HAL.DLL. What is the next step that will happen in the boot process?
A user is booting a desktop that has Windows 10 installed that also uses an extended partition. The boot process is currently working on the following step: The code in the boot sector is executed and the control of the boot process is given to Windows Boot Manager. What is the next step that will happen in the boot process?
A user is booting a desktop that has Windows 10 installed that also uses an extended partition. The boot process is currently working on the following step: The code in the boot sector is executed and the control of the boot process is given to Windows Boot Manager. What is the next step that will happen in the boot process?
A technician is working on a laptop and an app is not loading. What is a possible solution for this situation?
A technician is working on a laptop and an app is not loading. What is a possible solution for this situation?
Which term describes a file system that supports a partition size up to 2 TB?
Which term describes a file system that supports a partition size up to 2 TB?
to copy files, directories, and subdirectories from one location to another
to copy files, directories, and subdirectories from one location to another
Which two tools are available to transfer user data and settings from an old Windows computer to a Windows operating system on a new computer? (Choose two.)
Which two tools are available to transfer user data and settings from an old Windows computer to a Windows operating system on a new computer? (Choose two.)
A user wants to extend a primary partition formatted with the NTFS file system with the unallocated space on the hard disk. What must the user do after the primary partition is extended to make it usable?
A user wants to extend a primary partition formatted with the NTFS file system with the unallocated space on the hard disk. What must the user do after the primary partition is extended to make it usable?
Why is a full format more beneficial than a quick format when preparing for a clean OS installation?
Why is a full format more beneficial than a quick format when preparing for a clean OS installation?
Which condition is required when planning to install Windows on a GPT disk?
Which condition is required when planning to install Windows on a GPT disk?
An organization has purchased a custom application for the sales staff that can only be installed on a 64-bit Windows operating system. Each member of the sales staff has a Windows 8.1 32-bit PC. What must the IT department do in order to install and run the application on the sales staff computers?
An organization has purchased a custom application for the sales staff that can only be installed on a 64-bit Windows operating system. Each member of the sales staff has a Windows 8.1 32-bit PC. What must the IT department do in order to install and run the application on the sales staff computers?
What are two possible solutions to any Windows computer restarting continuously and never displaying the desktop? (Choose two.)
What are two possible solutions to any Windows computer restarting continuously and never displaying the desktop? (Choose two.)
A technician uses Microsoft Deployment Image Servicing and Management (DISM) tool to create a Windows image file on one of the workstations running Windows 10. When the technician tries to clone another workstation with the image file, the workstation exhibits network connectivity issues on completion. What could cause this?
A technician uses Microsoft Deployment Image Servicing and Management (DISM) tool to create a Windows image file on one of the workstations running Windows 10. When the technician tries to clone another workstation with the image file, the workstation exhibits network connectivity issues on completion. What could cause this?
A user complains that user files cannot be synced with the network file server while the user is traveling out of the office. The user had access to the internet but no access to the company network server. How can this be addressed?
A user complains that user files cannot be synced with the network file server while the user is traveling out of the office. The user had access to the internet but no access to the company network server. How can this be addressed?
A technician has connected a new internal hard drive to a Windows 10 PC. What must be done in order for Windows 10 to use the new hard drive?
A technician has connected a new internal hard drive to a Windows 10 PC. What must be done in order for Windows 10 to use the new hard drive?
What service does PRINT$ provide?
What service does PRINT$ provide?
A technician is troubleshooting a Windows 10 laptop infected with a virus that has damaged the master boot record. The technician has booted the laptop using the installation media and is attempting to repair the laptop from the command line interface. Which command can the technician use to repair the corrupt master boot record?
A technician is troubleshooting a Windows 10 laptop infected with a virus that has damaged the master boot record. The technician has booted the laptop using the installation media and is attempting to repair the laptop from the command line interface. Which command can the technician use to repair the corrupt master boot record?
A user reports that a Windows 10 PC displays the error message “Invalid Boot Disk” during the boot process. The IT technician attempts to boot the computer and finds that the error message occurs immediately after the POST. What could be the possible cause?
A user reports that a Windows 10 PC displays the error message “Invalid Boot Disk” during the boot process. The IT technician attempts to boot the computer and finds that the error message occurs immediately after the POST. What could be the possible cause?
Which port number is used by Virtual Network Computing (VNC) to provide remote screen sharing between devices?
Which port number is used by Virtual Network Computing (VNC) to provide remote screen sharing between devices?
Which feature is included with macOS and provides the ability for a remote user to view and change files, folders, and applications on the local computer?
Which feature is included with macOS and provides the ability for a remote user to view and change files, folders, and applications on the local computer?
Which area of concern falls under the operations and planning category in IT documentation?
Which area of concern falls under the operations and planning category in IT documentation?
Which two actions should a technician take if illegal content, such as child pornography, is discovered on the hard drive of a customer computer? (Choose two.)
Which two actions should a technician take if illegal content, such as child pornography, is discovered on the hard drive of a customer computer? (Choose two.)
What are three pieces of information a level one technician should gather from a customer? (Choose three.)
What are three pieces of information a level one technician should gather from a customer? (Choose three.)
What two actions are appropriate for a support desk technician to take when assisting customers? (Choose two.)
What two actions are appropriate for a support desk technician to take when assisting customers? (Choose two.)
A support desk technician is dealing with an angry customer. Which two approaches should the technician take in dealing with the customer? (Choose two.)
A support desk technician is dealing with an angry customer. Which two approaches should the technician take in dealing with the customer? (Choose two.)
What two kinds of problems should be escalated from a level one technician to a level two technician? (Choose two.)
What two kinds of problems should be escalated from a level one technician to a level two technician? (Choose two.)
An IT technician in a service company has provided extensive remote IT support with product deployment for a customer. After the completion of the contract, a complaint is filed against the IT technician for not following company policy by sending unsolicited emails about services and products that are not related to the contract. What two things should the IT support technician have done differently? (Choose two.)
An IT technician in a service company has provided extensive remote IT support with product deployment for a customer. After the completion of the contract, a complaint is filed against the IT technician for not following company policy by sending unsolicited emails about services and products that are not related to the contract. What two things should the IT support technician have done differently? (Choose two.)
A third-party security firm is performing a security audit of a company and recommends the company utilize the Remote Desktop Protocol. What are two characteristics of the Microsoft Remote Desktop Protocol (RDP)? (Choose two.)
A third-party security firm is performing a security audit of a company and recommends the company utilize the Remote Desktop Protocol. What are two characteristics of the Microsoft Remote Desktop Protocol (RDP)? (Choose two.)
Flashcards are hidden until you start studying
Study Notes
ESD (Electrostatic Discharge)
- ESD can occur when handling sensitive components, such as motherboards and hard drives
- It can cause harm to these components, leading to failure or malfunction
- Situations where ESD can be an issue:
- When assembling a PC
- During preventive maintenance on a PC
- When upgrading an ATX motherboard
Motherboard Components
- Boot operations are controlled by the BIOS (Basic Input/Output System) and the chipset
- The chipset provides communication between components, while the BIOS initializes hardware components during boot-up
Memory and Storage
- DDR SDRAM (Double Data Rate Synchronous Dynamic Random Access Memory) is a type of RAM that allows data transfer on both the rising and falling edges of the clock signal
- SATA (Serial Advanced Technology Attachment) is a type of storage interface that connects devices, such as hard drives and solid-state drives, to the motherboard
Safety and Environmental Factors
- Laser printers can be hazardous due to the risk of electrical shock and fire
- Dusty environments can affect laptop performance and longevity
- Cleaning computer components requires care to avoid damage or electrical shock
- Safety Data Sheets (SDS) provide information on handling hazardous materials
Network Concepts
- UDP (User Datagram Protocol) is a transport-layer protocol that provides connectionless communication
- TCP (Transmission Control Protocol) is a transport-layer protocol that provides connection-oriented communication
- DHCP (Dynamic Host Configuration Protocol) is a network protocol that assigns IP addresses and other network settings to devices
- DNS (Domain Name System) is a network protocol that translates human-readable domain names to IP addresses
Printing and Peripherals
- Inkjet printers and laser printers have different printing technologies and uses
- Collating and printing documents can be configured in print settings
- Laser printers require regular maintenance, including replacing toner cartridges and cleaning the printer
Virtualization and Cloud Computing
- Virtualization allows multiple operating systems to run on a single physical server
- Cloud computing provides on-demand access to computing resources and storage over the internet
- Hypervisors, such as VMware and VirtualBox, allow multiple virtual machines to run on a single physical server
Troubleshooting and Security
- Troubleshooting involves identifying and resolving issues with computer systems and networks
- Security risks include unauthorized access, data breaches, and malware infections
- Change management processes involve assessing and implementing changes to computer systems and networks
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.