Version 6.0
Version 6.0
Version 6.0
Which type of interface should a customer choose if connecting a single cable from a
Microsoft Windows computer to output both audio and video to a high definition television?
DVI
HDMI
PS/2
DB-15
Which type of input device can identify users based on their voice?
digitizer
KVM switch
biometric identification device
scanner
What type of external storage should be used by a technician to back up over 2 TB of music
and video data files?
CompactFlash card
external flash drive
external hard drive
Secure Digital card
What type of device provides power to a computer and allows it to be safely shut down in
the event of a power loss?
surge suppressor
uninterruptible power supply
standby power supply
power inverter
Which two types of expansion slots would be used by a wireless NIC in a computer today?
(Choose two.)
PCIe
AGP
PCI
DIMM
ISA
Which three features can be configured in the BIOS settings to secure a computer? (Choose
three.)
MAC filtering
drive encryption
TPM
file encryption
TKIP key
passwords
What is the most important reason for a company to ensure that computer preventive
maintenance is done?
Preventive maintenance provides an opportunity for junior technicians to obtain more
experience in a non-threatening or problem environment.
Preventive maintenance helps to protect the computer equipment against future
problems.
Preventive maintenance allows the IT department to regularly monitor the contents of
user hard drives to ensure computer use policies are being followed.
Preventive maintenance enables the IT manager to check on the location and state of
the computer assets.
A technician opens up a PC to work on it, and finds that it is very dusty inside. What should
the technician do?
Ignore the dust, as it does not affect the computer.
Use a lint-free cloth sprayed with a cleaning solution to remove excess dust.
Use a can of compressed air to remove excess dust.
Use a moistened cotton swab to remove excess dust.
After a computer is powered on, Windows 7 fails to start. What initial procedure would a
technician use to deal with this failure?
Create a System Repair Disc and restore the image.
Press the F12 key during the boot process and start the computer in Safe Mode.
Boot from a Windows 7 installation media and access the System Restore utility.
Access the Control Panel and choose Restore Files from Backup from the System and
Security menu.
What are two advantages of the NTFS file system compared with FAT32? (Choose two.)
NTFS allows faster access to external peripherals such as a USB drive.
NTFS supports larger files.
NTFS provides more security features.
NTFS allows faster formatting of drives.
NTFS is easier to configure.
NTFS allows the automatic detection of bad sectors
What type of hard drive contains flash memory for caching frequently used data but stores
the most of the data on a magnetic hard disk drive?
USB flash drive
solid-state drive
embedded multimedia card
solid-state hybrid disk
A technician notices that an application is not responding to commands and that the
computer seems to respond slowly when applications are opened. What is the best
administrative tool to force the release of system resources from the unresponsive
application?
Task Manager
Add or Remove Programs
Event Viewer
System Restore
A technician has installed a new sound card in a PC but it is not operating correctly. Where
should the technician look to investigate driver problems?
Computer Management
Device Manager
My Computer
System Tools
What are two consequences of setting an incorrect boot order in the system BIOS? (Choose
two.)
The computer locks up without any error messages.
The computer displays a "BOOTMGR is missing" error after POST.
The computer displays an "Invalid Boot Disk" error after POST.
The computer continually restarts without displaying the desktop.
The computer displays an 'Inaccessible Boot Device' error after POST.
A network administrator has finished migrating from a peer-to-peer network to a new client-
server network configuration. What are two advantages of the new configuration? (Choose
two.)
The total cost of the new solution is considerably lower.
Data is more secure in the event of hardware failures.
Individual users are in control of their own computers and network resources.
Data resources and access are centrally controlled.
Personnel costs are lower because a dedicated network administrator is no longer
necessary.
Which layer of the OSI model is responsible for physical addressing and the procedures used
to access media?
application
data link
network
transport
The current IP configuration of a medium size company with several subnets is done
manually and is time-consuming. Because of increased network growth, a technician needs a
simpler way for IP configuration of workstations. Which service or protocol would simplify
the workstation IP configuration task?
APIPA
DHCP
DNS
ICMP
Several messages sent to the network administrator are reporting that access to a secure
server using HTTPS is failing. After checking recent updates to the company firewall, the
administrator learns that the firewall is blocking HTTPS. Which port should be opened to
solve the problem?
22
53
80
143
443
Which two commands could be used to check if DNS name resolution is working properly
on a Windows PC? (Choose two.)
nslookup cisco.com
net cisco.com
ping cisco.com
nbtstat cisco.com
ipconfig /flushdns
Which wireless security mode supports government grade security and offers both personal
and enterprise authentication?
WEP
WPA2
WPA
LEAP
Which Cloud computing service would be best for an organization that needs to collaboratively create ap
and deliver them over the web?
PaaS
IaaS
SaaS
ITaaS
A network administrator occasionally asks a technician to make sure that dust does not
accumulate on devices in the network equipment closets. What is the purpose of having the
technician do this job?
Dust can cause network equipment to overheat and cause problems on the network.
Dust increases electromagnetic interference in nearby connected cables.
Dust can encourage insects and other pests to live in the equipment closets.
Dust is considered a fire hazard that poses danger to personnel and equipment.
Dust diminishes the range of wireless services.
What are three common input devices found on laptops? (Choose three.)
touchpad
fingerprint reader
web camera
external monitor
PS/2 keyboard
AC power connector
A user calls the help desk to report that a mobile device exhibits very slow performance.
What could cause this problem?
The touchscreen is not calibrated.
An app is not compatible with the device.
The operating system has encountered an error.
A power-intensive app is running at the background.
A computer technician has decided that a problem with a laptop can be solved by repairing a
hardware component. What should be done first before attempting to repair a hardware
component on a laptop?
Consult the service manual for the laptop.
Ask a fellow technician for advice.
Backup the BIOS settings.
Remove the keyboard.
Which closed-ended question would be appropriate for a technician to use to narrow down
the possible problems on a laptop that will not power on?
Can the laptop operate using the AC adapter?
Have you changed your password recently?
What software has been installed recently?
What were you doing when the problem occurred?
A technician is troubleshooting the appearance of flashing lines on a laptop screen. What are
two possible causes of this distortion? (Choose two.)
Power to the pixels has been removed.
The display settings have been changed.
The GPU is not cooling correctly.
The LCD cutoff switch is damaged.
The display is not correctly installed.
What is an indication that the battery in a mobile device could become physically hazardous
and should be immediately replaced?
if the battery only supports the system for a reduced period of time
if there are signs of swelling
if the screen brightness begins to dim
if the device feels warm to the touch
The exhibit shows a view of a mobile device OS. It consists of a series of different rectangular areas of d
sizes and colors. Some contain text, others contain numbers and images.
Refer to the exhibit. What is true of this mobile device screen?
Tapping and holding the arrow at the bottom left will display the Home screen.
Text messages, news, photos and other content can be displayed in the different tiles.
Icons and buttons are used to represent the different apps on the phone.
Unpinning an app from this view will uninstall the app from the phone.
Tile sizes depend on the size of the app
What are two potential risks that could result from rooting or jailbreaking a mobile device?
(Choose two.)
enabling app access to the root directory
not properly creating or maintaining sandboxing features
allowing the user interface to be extensively customized
improving device performance
enabling features that are disabled by a cellular carrier
What two tasks should be done regularly to preserve the security and integrity of data and
applications on mobile devices. (Choose two.)
Execute a factory reset once a month to remove all unidentified malicious software.
Back up user data on a regular basis.
Password protect iTunes or Google Play accounts.
Use airplane mode if you are accessing the Internet at an open Wi-Fi site.
Ensure that the operating system software and applications contain the latest updates.
Unmount all unused disk partitions.
A tire store needs to use carbon copy paper to print customer invoices so that both the store
and the customer have a copy. What is the best printer solution?
piezoelectric printer
inkjet printer
thermal printer
impact printer
A user on a home network wants to share a printer from a Windows 7 computer. What must
the user do in order for other Windows 7 computers in the house to obtain the proper driver?
The user must browse the Internet, then download and install the proper driver.
The person doing the sharing must use the Additional Drivers button in order to
designate how many device drivers are allowed to be downloaded.
Nothing. Windows automatically provides the driver.
The person doing the sharing must use the Additional Drivers button in order to
designate the driver to be used by the other Windows 7 computers.
Which three components are typically found in laser printer maintenance kits? (Choose
three.)
fuser assembly
primary corona
pickup rollers
transfer rollers
secondary corona
paper trays
What are three features provided by the TPM module? (Choose three.)
hashed encryption of the hard drive volume
security for user authentication information
support for Windows backup
application license protection
storage of digital certificates
support for Windows Firewall
What is the next troubleshooting step after a theory of probable cause has been established?
Test the theory to determine cause.
Identify the exact problem.
Establish a plan of action.
Document findings and outcomes.
Users in an office complain that the network printer is printing vertical lines on all pages. What is a likely ca
problem?
The printer does not have enough memory.
The printer has an incorrect IP address.
The printer toner is low.
The printer drum is damaged.
A technician is troubleshooting a Windows 7 computer that displays an "Invalid Boot Disk" error
message. What would be the most likely action the technician should perform to correct the issue?
Use the System Recovery Options to select the correct active partition.
Scan for and remove any virus found.
Run chkdsk /F /R to fix the hard drive file entries.
Replace the hard drive on the computer.
When a user tries to run a program, a missing or corrupt DLL message is displayed. What
are two possible solutions to this problem? (Choose two.)
Reinstall the correct drivers.
Use the msconfig command to adjust the startup settings for the program.
Run Windows Startup Repair.
Run sfc/scannow in Safe Mode.
Reinstall the program that is associated with the corrupt DLL file.
A technician wants to allow users to backup and restore all the files on their computers, but
does not want the users to be able to make changes to the system. How should the technician
give users this functionality?
Grant the users read permissions on all files.
Give the users administrator rights on their computers.
Make the users members of a group called Backup Operators.
Check the Folder is Ready for Archiving box in the properties of each folder.