1.
You are helping a customer with an Internet connectivity problem. The customer tells you that the computer cannot connect to a favorite website. After quickly analyzing the computer, you note that it cannot connect to any websites. What should you do next?
Correct Answer
B. Establish a theory of probable cause
Explanation
Establishing a theory of probable cause is the next step because it allows you to make an educated guess about what might be causing the computer's inability to connect to any websites. By formulating a theory, you can then proceed to test it to determine the actual cause of the problem. This step is crucial in troubleshooting as it helps narrow down the potential causes and guides the subsequent actions to be taken.
2.
You need to automatically check for performance issues in Windows 7. Which tool is the best option?
Correct Answer
B. Troubleshooting item in the Control Panel
Explanation
The Troubleshooting item in the Control Panel is the best option for automatically checking for performance issues in Windows 7. This tool is specifically designed to identify and resolve common problems that can affect system performance. It provides a comprehensive set of diagnostic and repair tools that can help identify the root cause of performance issues and suggest appropriate solutions. By using the Troubleshooting item in the Control Panel, users can efficiently troubleshoot and improve the overall performance of their Windows 7 system.
3.
Which of the following is used by BitLocker to provide an encryption key and to protect data?
Correct Answer
A. TPM
Explanation
The correct answer is TPM. TPM stands for Trusted Platform Module, which is a hardware component used by BitLocker to provide an encryption key and protect data. It is a specialized chip that stores cryptographic keys and helps in securing the system's integrity. BitLocker uses the TPM to ensure that the encryption keys are securely stored and that the system has not been tampered with. This helps in preventing unauthorized access to the encrypted data.
4.
You want to verify that the local computer's network card is functioning properly. Which IP address should you use?
Correct Answer
C. 127.0.0.1
Explanation
The IP address 127.0.0.1 is known as the loopback address, which is used to test network connectivity on the local machine. It allows a computer to send network packets to itself, without actually sending them over the network. Therefore, using this IP address will help verify if the local computer's network card is functioning properly.
5.
How would you secure a smartphone and its data? (Select the best two answers)
Correct Answer(s)
A. Passcode lock
E. Remote wipe
Explanation
To secure a smartphone and its data, two effective measures are passcode lock and remote wipe. A passcode lock provides a basic level of security by requiring a password or PIN to access the device, preventing unauthorized access. Remote wipe allows the user to erase all data on the smartphone remotely in case it is lost or stolen, ensuring that sensitive information does not fall into the wrong hands. These two measures combined provide a strong defense against unauthorized access and data theft.
6.
Your customer has a computer (called comp112) that has been infected by a worm. The worm has propagated to at least 30 other computers on the network. What should you do first before attempting to remove the worm from the computer name comp112?
Correct Answer
D. Disconnect the network cable from the computer
Explanation
Before attempting to remove the worm from the computer named comp112, the first step should be to disconnect the network cable from the computer. This is important because the worm has already propagated to at least 30 other computers on the network. By disconnecting the network cable, it prevents the worm from spreading further and potentially infecting more computers. Once the network connection is severed, further steps can be taken to remove the worm effectively.
7.
Which command should you use to find out the integrity of a hard drive?
Correct Answer
A. CHKDSK
Explanation
CHKDSK is the correct answer because it is a command used to check the integrity of a hard drive in Windows operating systems. CHKDSK stands for "Check Disk" and it scans the file system on the hard drive for errors and fixes them if possible. It also identifies and marks bad sectors on the hard drive. FDISK is a command used for disk partitioning, FORMAT is used to format a disk, and IPCONFIG is used to display the IP configuration of a network interface.
8.
Your boss asks you to find a list of routers along a given path through multiple networks. What command can help you?
Correct Answer
C. TRACERT
Explanation
The TRACERT command is used to trace the route taken by packets across an IP network. It provides a list of routers along a given path through multiple networks. This command can help in identifying the network hops and the routers involved in the path taken by the packets, allowing for troubleshooting and network analysis.
9.
Your customer's laptop's LCD is being scratched by the keyboard when the lid is closed. What would prevent this from happening?
Correct Answer
A. Replace the rubber bumpers
Explanation
Replacing the rubber bumpers would prevent the laptop's LCD from being scratched by the keyboard when the lid is closed. The rubber bumpers act as a cushion between the keyboard and the LCD, preventing direct contact and minimizing the risk of scratches. By replacing the rubber bumpers, the laptop's LCD would be protected from any potential damage caused by the keyboard.
10.
You have determined that the USB controller is malfunctioning. What should you do first to troubleshoot this problem?
Correct Answer
D. Use the Windows Device Manager
Explanation
To troubleshoot a malfunctioning USB controller, the best first step is to use the Windows Device Manager. This utility allows you to view and manage the hardware devices connected to your computer. By accessing the Device Manager, you can check if the USB controller is recognized by the system, if it has any driver issues, or if there are any conflicts with other devices. This will help you identify and potentially resolve the problem without the need to replace the USB controller or perform any hardware testing.
11.
You have been asked by a customer to add a second optical drive, to be referenced as M: on a computer running Windows 7. What is the best place to accomplish this?
Correct Answer
A. Disk Management
Explanation
The best place to add a second optical drive, to be referenced as M:, on a computer running Windows 7 is Disk Management. Disk Management is a built-in tool in Windows that allows users to manage their disks and partitions. By accessing Disk Management, the user can initialize, format, and assign drive letters to new disks or partitions, including the second optical drive. This ensures that the drive is recognized by the system and can be accessed properly with the desired drive letter.
12.
A user attempts to print a large image but only half the graphic prints out. What is the most likely reason for this?
Correct Answer
B. The printer needs more memory
Explanation
The most likely reason for only half of the graphic printing out is that the printer needs more memory. When printing a large image, the printer may not have enough memory to process and print the entire image at once. As a result, it may only be able to print a portion of the image before running out of memory. Increasing the printer's memory capacity should resolve this issue and allow the full image to be printed.
13.
Which of the following printer failures is described as a condition in which the internal feed mechanism stopped working temporarily?
Correct Answer
C. Paper jam
Explanation
A paper jam is a printer failure in which the internal feed mechanism temporarily stops working due to a piece of paper becoming stuck or jammed in the printer. This can prevent the printer from properly feeding paper through and can cause printing errors or complete failure until the jam is cleared.
14.
Which command would you use to delete an empty directory?
Correct Answer
B. RD
Explanation
The command "RD" is used to delete an empty directory.
15.
One of tour co-workers is attempting to access a file on a share located on a remote computer. The file's share permissions are set to allow the user full control; however, the NTFS permissions allow the user to have read access. What will be the user's resulting access level for the file?
Correct Answer
A. Read
Explanation
The user's resulting access level for the file will be Read. This is because NTFS permissions take precedence over share permissions. Even though the share permissions allow the user full control, the more restrictive NTFS permissions only allow read access. Therefore, the user will only have read access to the file.
16.
You are upgrading a computer from Windows Vista to Windows 7. What is the best tool to use to move a user's documents and file settings?
Correct Answer
B. Easy Transfer
Explanation
Easy Transfer is the best tool to use when upgrading a computer from Windows Vista to Windows 7 to move a user's documents and file settings. Easy Transfer is a built-in utility in Windows that allows users to transfer files, folders, and settings from one computer to another. It simplifies the process of transferring important data and settings, ensuring a smooth transition to the new operating system without losing any important files or configurations.
17.
You work at a PC bench and receive a laptop that has a dim display. You confirm that it is a hardware issue. Which part should be replaced first?
Correct Answer
D. LCD inverter
Explanation
The LCD inverter should be replaced first because it is responsible for providing power to the backlight of the LCD panel. If the display is dim, it could indicate a problem with the inverter not supplying enough power to the backlight, resulting in a dim display. By replacing the LCD inverter, it can help resolve the hardware issue and potentially fix the dim display problem.
18.
A customer reports to you that he can no longer open any .tiff files. What is the most likely cause?
Correct Answer
B. File associations have been removed
Explanation
The most likely cause for the customer not being able to open any .tiff files is that the file associations have been removed. File associations determine which program should be used to open a specific file type. If the file associations for .tiff files have been removed, the operating system does not know which program to use to open them, resulting in the inability to open the files.
19.
Which of the following answers can be the cause of a blue screen error?
Correct Answer
C. Bad driver
Explanation
A bad driver can be a cause of a blue screen error. When a driver is corrupted, outdated, or incompatible with the operating system or other hardware components, it can result in system instability and crashes, leading to a blue screen error. Drivers act as a bridge between the hardware and the operating system, and any issues with them can disrupt the communication and functionality of the system, causing the blue screen error to occur.
20.
A customer cannot access some Internet websites but can connect to resources inside the LAN. You can use the PING command to test the user's connectivity. What command should you run next to troubleshoot this issue?
Correct Answer
D. IPCONFIG/FLUSHDNS
Explanation
To troubleshoot the issue of a customer being unable to access some Internet websites but can connect to resources inside the LAN, the next command to run would be "IPCONFIG/FLUSHDNS". This command will flush the DNS cache on the customer's computer, which can help resolve any DNS-related issues that may be causing the problem. By flushing the DNS cache, the computer will clear any stored DNS information and retrieve fresh DNS records when trying to access websites, potentially resolving any connectivity issues.
21.
You just finished upgrading a video card in a PC. When you reboot the system, nothing displays on the screen. What is the most likely cause?
Correct Answer
A. The onboard video of the motherboard is still enabled in the BIOS
Explanation
The most likely cause for the screen not displaying anything after upgrading the video card is that the onboard video of the motherboard is still enabled in the BIOS. This means that the system is still trying to use the onboard video instead of the new video card. To resolve this issue, the user would need to enter the BIOS settings and disable the onboard video, allowing the system to recognize and use the new video card.
22.
A program is no longer responding. Where would a technician go to end the program?
Correct Answer
B. Task Manager
Explanation
When a program becomes unresponsive, a technician would typically use the Task Manager to end the program. Task Manager is a system utility in Windows that provides information about the processes and applications running on a computer. It allows users to view and manage running programs, monitor system performance, and end unresponsive tasks or processes. Therefore, Task Manager is the appropriate tool for a technician to terminate a program that is no longer responding.
23.
You are setting up a SOHO wireless network. Which of the following provides that best security?
Correct Answer
D. Enable SSID and configure WPA2
Explanation
Enabling SSID broadcasting and configuring WPA2 provides the best security for a SOHO wireless network. SSID broadcasting allows the network to be visible to devices, making it easier to connect. However, disabling SSID broadcasting adds an extra layer of security by hiding the network from unauthorized users. WPA2 is a strong encryption protocol that ensures the confidentiality and integrity of data transmitted over the network. By configuring WPA2, the network is protected against unauthorized access and potential security breaches.
24.
After replacing a motherboard in a PC, the system overheats and fails to boot. What is the most likely cause?
Correct Answer
C. Thermal paste was not applied between the heat sink and the CPU
Explanation
The most likely cause for the system overheating and failing to boot after replacing the motherboard is that thermal paste was not applied between the heat sink and the CPU. Thermal paste is used to improve the transfer of heat between the CPU and the heat sink, ensuring efficient cooling. Without thermal paste, the heat generated by the CPU cannot be effectively dissipated, leading to overheating and system failure.
25.
Which of the following is common e-mail service that people use on their smartphone?
Correct Answer
D. GMAIL
Explanation
GMAIL is the correct answer because it is a commonly used email service that people use on their smartphones. It is a free email service provided by Google and is available as an app on both Android and iOS devices. GMAIL offers features such as a user-friendly interface, large storage capacity, efficient spam filtering, and seamless integration with other Google services. Many smartphone users prefer GMAIL for its convenience and reliability in managing their emails on the go.
26.
A technician is attemping to backup 5 GB of data to an external hard drive that has been formatted as FAT32; however the backup keeps failing. What is the bset way to solve the problem?
Correct Answer
A. Reformat the drive NTFS
Explanation
Reformatting the drive to NTFS is the best way to solve the problem. FAT32 has a file size limitation of 4GB, so attempting to backup 5GB of data will fail. By reformatting the drive to NTFS, which does not have this limitation, the technician will be able to successfully backup the data.
27.
A laptop you are troubleshooting will not display any video through the laptop's screen or through external monitors. What should you place?
Correct Answer
B. Video card
Explanation
In this scenario, if the laptop is not displaying any video through the laptop's screen or external monitors, the most likely cause is a faulty video card. The video card is responsible for generating and sending the video signal to the display. If it is not functioning properly, it can result in a lack of video output. The other options, such as the inverter (which controls the backlight of the screen), LCD (the screen itself), and drivers (software that allows the operating system to communicate with the video card) may also cause display issues, but they are less likely to be the root cause in this case.
28.
Which of the following utilities enables a Windows 7 user to edit a file offline, and then automatically update the changes when the user returns back to the office?
Correct Answer
A. Sync Center
Explanation
Sync Center is a utility in Windows 7 that allows users to edit files offline and automatically sync the changes when they return to the office. This feature is particularly useful for users who frequently work on files while traveling or in areas with limited or no internet connectivity. By using Sync Center, users can ensure that their files are always up to date and synced with the latest changes, regardless of their location or internet availability.
29.
A customer's laser printer is printing a blank streak along one edge of each page, but is otherwise printing normally. What is the most likely reason?
Correct Answer
C. The fuser is damaged
Explanation
The most likely reason for the blank streak along one edge of each page is that the fuser is damaged. The fuser is responsible for melting the toner onto the paper, and if it is damaged, it may not be able to properly fuse the toner onto the page, resulting in a blank streak. This is supported by the fact that the printer is otherwise printing normally, indicating that the issue is not with the paper or toner cartridge. Rebooting the printer would not fix a physical damage like a damaged fuser.
30.
Which of the following tools can illuminate a network card's LED light when connected?
Correct Answer
B. Loopback plug
Explanation
A loopback plug is a device that can be inserted into a network card's port to test its functionality. When connected, the loopback plug simulates a complete network connection and allows for the testing of the network card's LED light. This is because the loopback plug completes the circuit and triggers the LED to illuminate, indicating that the network card is working properly. The other tools listed, such as a POST card, PSU tester, and multimeter, are not specifically designed for testing network card LED lights.
31.
One of your organization's technicians reconfigures the BIOS boot order on a PC and sees that the system time is incorrect. The technician resets the clock to the correct time but sees that a couple days later, the system time is wrong again. What is the most likely cause?
Correct Answer
C. The CMOS battery has failed
Explanation
The most likely cause for the system time being incorrect again after resetting it is that the CMOS battery has failed. The CMOS battery is responsible for powering the Real Time Clock (RTC) on the motherboard, which keeps track of the system time even when the computer is turned off. If the CMOS battery fails, the RTC will not be able to keep accurate time, leading to the system time being wrong.
32.
Which Windows 7/Vista files replaced NTLDR?
Correct Answer
D. Boot,gr.exe, winload.exe, and winresume.exe
33.
You reboot a customer's computer and see a pop-up message that says one or more services failed to start. Whcih of the following can give you more information?
Correct Answer
A. System event logs
Explanation
The system event logs can provide more information about the services that failed to start. These logs record various events and errors that occur on the computer, including information about service failures. By reviewing the system event logs, you can identify the specific services that failed to start and investigate the cause of the issue further. This can help in troubleshooting and resolving the problem effectively.
34.
Which of the following would extend the wireless network range and allow out-of-the range users to share an Internet connection?
Correct Answer
A. Implement a wireless access point for the out of range users
Explanation
Implementing a wireless access point for the out-of-range users would extend the wireless network range and allow them to share an Internet connection. A wireless access point acts as a bridge between the wired network and wireless devices, enabling connectivity for devices that are out of the range of the existing network. By adding a wireless access point, the network coverage is expanded, allowing users outside of the range to connect and share the Internet connection.
35.
What can the command ping -t do?
Correct Answer
B. Continuous ping of an IP address until it's canceled
Explanation
The command "ping -t" allows for continuous pinging of an IP address until it is manually canceled. This means that the command will keep sending ping requests to the specified IP address without stopping, providing a continuous stream of data. The user can choose to cancel the command at any time to stop the continuous pinging process.
36.
You are installing a 32-bit program in a 64-bit version of Windows 7?
Correct Answer
D. C:\Program Files (x86)
Explanation
The correct answer is "C:\Program Files (x86)". In a 64-bit version of Windows 7, the "Program Files (x86)" directory is used to install 32-bit programs. This directory is specifically designed to separate 32-bit applications from 64-bit applications, allowing them to coexist on the same system. By installing the 32-bit program in the "Program Files (x86)" directory, it ensures compatibility and proper functioning of the program within the 64-bit operating system.
37.
Which of the following paths is the default directory for the user profiles in Windows 7?
Correct Answer
B. C:\Users
Explanation
The default directory for user profiles in Windows 7 is C:\Users. This is where all user profiles and their associated files and settings are stored. The other options, C:\Program Files, C:\Users and Settings\, and C:\Document and Settings\, are not the default directories for user profiles in Windows 7.
38.
You are working on a computer that is giving a non-system disk error. Which of the following is most likely the cause?
Correct Answer
A. There is a disk in the floppy drive
Explanation
The most likely cause for the non-system disk error is that there is a disk in the floppy drive. This error message typically occurs when the computer is trying to boot from a disk that is not recognized as a valid system disk. If there is a disk in the floppy drive, the computer may be attempting to boot from it instead of the hard drive where the operating system is located. Removing the disk from the floppy drive should resolve the issue.
39.
One of the tape drives in the server room is reporting errors. What should you do first to mainenance the tape drive?
Correct Answer
A. Use the included cleaning tape for the drive
Explanation
The first step to maintenance a tape drive that is reporting errors is to use the included cleaning tape for the drive. Over time, tape drives can accumulate dust and debris, which can cause errors and affect performance. Using a cleaning tape helps remove this buildup and ensures that the tape drive functions properly. It is a simple and effective solution that should be tried before considering other troubleshooting steps.
40.
You co-worker is having trouble tapping icons on his smartphone. What should you check first?
Correct Answer
D. Screen calibration
Explanation
If your co-worker is having trouble tapping icons on his smartphone, the first thing you should check is the screen calibration. Screen calibration ensures that the touch input is accurately registered by the device. If the calibration is off, the touch inputs may not be accurately recognized, causing difficulty in tapping icons or using the touchscreen effectively. Checking the screen calibration settings and recalibrating if necessary can help resolve the issue.
41.
At one of your customer's locations, two users share the same Windows 7 computer. The first user creates a document intended to be used by both users and then logs off the computer. The second user logs on and types the name of the document in the Start menu but the document cannot be found. What is the problem?
Correct Answer
C. The document is owned by the first user
Explanation
The problem is that the document is owned by the first user. This means that only the first user has access to the document, and it cannot be accessed or viewed by the second user.
42.
You receive a message in Windows XP that warns you of a memory-read error. What should you do to fix this?
Correct Answer
A. Reseat or replace RAM modules
Explanation
If you receive a message in Windows XP warning you of a memory-read error, the correct action to fix this issue is to reseat or replace the RAM modules. This error indicates a problem with the computer's memory, and reseating the RAM modules can help ensure they are properly connected. If the issue persists, replacing the RAM modules may be necessary to resolve the error. Changing the memory settings in the BIOS, replacing the hard drive, or removing USB flash drives would not directly address a memory-read error.
43.
Which component is usually removed to access a laptop's motherboard and other internal components?
Correct Answer
C. Keyboard
Explanation
The keyboard is usually removed to access a laptop's motherboard and other internal components. This is because the keyboard is attached to the top case of the laptop, and removing it allows access to the screws and connectors that hold the top case in place. Once the keyboard is removed, the top case can be lifted off, providing access to the motherboard and other internal components for repairs or upgrades.
44.
A user tells you that her Windows 7 laptop does not display a picture when it is connected to a projector. However, there is a picture on the laptop's screen. What is the most likely cause?
Correct Answer
D. The laptop external display setting has been turned off
Explanation
The most likely cause for the user's issue is that the laptop's external display setting has been turned off. This means that the laptop is not sending the display signal to the projector, resulting in no picture being displayed. To resolve this, the user should check the display settings on their laptop and ensure that the external display option is enabled.
45.
A co-worker attempts to run an old program on his Windows 7 computer. The program briefly opens, but then it closes immediately. What can you do to enable the program to run correctly?
Correct Answer
A. Run the program in Windows Compatibility mode
Explanation
Running the program in Windows Compatibility mode allows it to run correctly on a newer version of Windows. This mode enables the program to emulate an older version of Windows, resolving any compatibility issues that may be causing it to close immediately. By selecting the appropriate compatibility settings, the program can be executed as if it were running on the desired Windows version, ensuring its proper functionality.
46.
What color do EFS files display in by default?
Correct Answer
C. Green
Explanation
EFS files display in green color by default. This color is used to indicate that the file is encrypted using the Encrypting File System (EFS) feature in Windows. Green color helps users easily identify which files are encrypted and provides a visual cue for their security status.
47.
You want to create a spanned volume over two hard drives that are separate from the system volume of a Windows 7 workstation. What tool can help you determine if the har drives can support spanned volumes?
Correct Answer
A. Disk Management
Explanation
Disk Management is the correct answer because it is a Windows utility that allows users to manage and configure disk drives and volumes. It provides information about the available hard drives and their capabilities, including the ability to support spanned volumes. By accessing Disk Management, you can determine if the hard drives in question can be used to create a spanned volume.
48.
What is another name for a mirrored set?
Correct Answer
B. RAID 1
Explanation
RAID 1 is another name for a mirrored set. In RAID 1, data is duplicated across multiple drives, creating an exact copy or mirror of the data. This provides redundancy and fault tolerance, as if one drive fails, the data can still be accessed from the other drive. RAID 1 is commonly used in situations where data integrity and reliability are crucial, such as in critical database systems or important backup storage.
49.
What would you replace in a laser printer if you see ghosted images?
Correct Answer
C. Drum
Explanation
If you see ghosted images in a laser printer, the most likely component that needs to be replaced is the drum. The drum is responsible for transferring toner onto the paper during the printing process. If the drum becomes worn or damaged, it can result in ghosted images, where faint copies of previous images appear on subsequent prints. Replacing the drum should resolve this issue and ensure that the printer produces clean and clear prints.
50.
Of the following ways to manipulate a file, which can retain the file's NTFS permissions?
Correct Answer
C. Moving the file to a new location on the same volume
Explanation
Moving the file to a new location on the same volume can retain the file's NTFS permissions. When a file is moved within the same volume, the file's permissions remain intact because the file system keeps track of the file's security descriptors. The NTFS file system stores permissions and other security information in the file's metadata, which is not changed when the file is moved to a new location on the same volume. Therefore, the file will retain its original NTFS permissions after being moved within the same volume.