CompTIA A+ 220-702 Practical Application Topic 3 Vol.C

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Tmede212
T
Tmede212
Community Contributor
Quizzes Created: 7 | Total Attempts: 1,056
Questions: 100 | Attempts: 146

SettingsSettingsSettings
CompTIA A+ 220-702 Practical Application Topic 3 Vol.C - Quiz


Questions and Answers
  • 1. 

    Which of the following should be used to connect a small office of ten computers together and provide the computers access through a common Internet connection?

    • A.

      Wireless access point

    • B.

      Router and Ethernet switch

    • C.

      Gigabit Ethernet switch and an intrusion prevention device

    • D.

      Firewall with an integrated 4 port switch

    Correct Answer
    B. Router and Ethernet switch
    Explanation
    A router and Ethernet switch should be used to connect a small office of ten computers together and provide them access through a common Internet connection. A router is responsible for connecting the office network to the Internet and managing the traffic between the computers and the Internet. An Ethernet switch allows the computers to communicate with each other within the local network. Together, the router and Ethernet switch provide both internal network connectivity and external Internet connectivity for the office computers.

    Rate this question:

  • 2. 

    A technician has just replaced the motherboard in a desktop computer. The user of the computer reports that their system now reboots periodically. Which of the following can the technician do to correct the rebooting problem?

    • A.

      Update the motherboards firmware

    • B.

      Add more RAM

    • C.

      Upgrade the power supply

    • D.

      Change the voltage jumpers on the motherboard

    Correct Answer
    C. Upgrade the power supply
    Explanation
    Upgrading the power supply can help to resolve the rebooting problem in this scenario. When a technician replaces the motherboard, it is possible that the new motherboard requires more power than the previous one. If the power supply is not able to provide enough power to the components, it can result in periodic reboots. Upgrading the power supply to a higher wattage can ensure that the system receives enough power to function properly and prevent unexpected reboots.

    Rate this question:

  • 3. 

    The purpose of a proxy exception rule is to configure the browser to:

    • A.

      Force an anonymous window for traffic to certain URLs.

    • B.

      Bypass the proxy server for certain URLs.

    • C.

      Route certain URLs to the proxy server.

    • D.

      Force a new secure window for traffic to certain URLs.

    Correct Answer
    A. Force an anonymous window for traffic to certain URLs.
    Explanation
    A proxy exception rule is used to bypass the proxy server for certain URLs. This means that when the browser encounters these specified URLs, it will not route the traffic through the proxy server, allowing direct communication between the browser and the target website. This can be useful in situations where direct access to certain websites is required, such as for internal resources or specific trusted websites.

    Rate this question:

  • 4. 

    A technician is troubleshooting a users problem; important Windows services are not starting. In which of the following locations should the technician check to investigate when these services started or stopped?

    • A.

      Com+.log

    • B.

      System Log

    • C.

      Security Log

    • D.

      Application Log

    Correct Answer
    B. System Log
    Explanation
    The technician should check the System Log to investigate when the important Windows services started or stopped. The System Log contains records of events related to the operating system, including service start and stop events. By reviewing the System Log, the technician can identify any errors or issues that may have caused the services to fail to start.

    Rate this question:

  • 5. 

    Which of the following may cause the cursor of an optical mouse to erratically jump around the screen? (Select TWO).

    • A.

      A conflict with the keyboard

    • B.

      An IRQ conflict is present

    • C.

      A non-reflective or uneven surface

    • D.

      An incorrect mouse device driver

    • E.

      The mouse trackball needs to be cleaned

    Correct Answer(s)
    C. A non-reflective or uneven surface
    D. An incorrect mouse device driver
    Explanation
    A non-reflective or uneven surface can cause the cursor of an optical mouse to erratically jump around the screen because the mouse's sensor relies on detecting reflections from the surface it is on. If the surface is non-reflective or uneven, the sensor may not be able to accurately track the movement of the mouse.

    An incorrect mouse device driver can also cause the cursor to jump around the screen because the driver is responsible for translating the mouse's movements into actions on the screen. If the driver is outdated or incompatible, it may not be able to properly interpret the mouse's input, resulting in erratic cursor movement.

    Rate this question:

  • 6. 

    A user reports that each time the computer is rebooted, the time on the taskbar resets. Which of the following is the MOST likely cause of the problem?

    • A.

      The BIOS is not properly configured.

    • B.

      The CMOS battery is faulty.

    • C.

      The computer has lost connection to the time server.

    • D.

      The clock needs to be reset for the appropriate time zone.

    Correct Answer
    B. The CMOS battery is faulty.
    Explanation
    The CMOS battery is responsible for maintaining the computer's internal clock and other system settings when the computer is powered off. If the CMOS battery is faulty, it may not be able to retain the correct time and settings, causing the time on the taskbar to reset each time the computer is rebooted. This is the most likely cause of the problem described by the user.

    Rate this question:

  • 7. 

    Which of the following would resolve a problem in which external speakers connected to a sound card are not playing audio?

    • A.

      Enable the integrated COM port in the BIOS.

    • B.

      Move the cable to the headphone jack on the CD-ROM drive and adjust the volume.

    • C.

      Move the cable to another jack on the sound card.

    • D.

      Change the LPT port from ECP mode to bi-direction in the BIOS.

    Correct Answer
    C. Move the cable to another jack on the sound card.
    Explanation
    Moving the cable to another jack on the sound card would resolve the problem of external speakers not playing audio. This suggests that there may be an issue with the current jack being used, such as a loose connection or a malfunction. By moving the cable to another jack, it allows for a different connection point that may be in proper working condition, enabling the audio to play through the external speakers.

    Rate this question:

  • 8. 

    A user states that there are two lines running down the middle of all printed pages on the laser printer. Which of the following could be the cause of the lines?

    • A.

      The drum is dirty

    • B.

      The driver is corrupt

    • C.

      The printer is out of memory

    • D.

      The toner is out

    Correct Answer
    A. The drum is dirty
    Explanation
    The drum is a crucial component in a laser printer that transfers toner onto the paper. If the drum is dirty, it can cause lines to appear on printed pages. This is because the dirt or debris on the drum can interfere with the transfer of toner, resulting in uneven or incomplete printing. Cleaning the drum can help resolve this issue and eliminate the lines on the printed pages.

    Rate this question:

  • 9. 

    Which of the following is the built-in security feature of Windows Vista?

    • A.

      HCL

    • B.

      NTP

    • C.

      UAC

    • D.

      ECP

    Correct Answer
    C. UAC
    Explanation
    UAC stands for User Account Control, which is a built-in security feature of Windows Vista. It helps to prevent unauthorized changes to the system by prompting the user for permission or administrator credentials when a program attempts to make changes that require administrative access. This feature enhances the overall security of the operating system and protects it from potential threats.

    Rate this question:

  • 10. 

    An alternative to plain old telephone service (POTS) would be:

    • A.

      X.25.

    • B.

      Asynchronous transfer mode (ATM).

    • C.

      VoIP.

    • D.

      Public Switched Telephone Network (PSTN).

    Correct Answer
    C. VoIP.
    Explanation
    VoIP stands for Voice over Internet Protocol, which is a technology that allows for the transmission of voice and multimedia over the internet. It is an alternative to traditional telephone services like POTS. VoIP offers advantages such as cost savings, flexibility, and the ability to integrate with other communication services. It uses packet-switched networks instead of dedicated circuit-switched networks, enabling voice data to be transmitted in the form of packets over IP networks. This makes it a more efficient and cost-effective solution for voice communication compared to POTS.

    Rate this question:

  • 11. 

    Windows BitLocker can be used with which of the following? (Select TWO).

    • A.

      USB flash drive

    • B.

      Trusted platform module

    • C.

      Compact Disc

    • D.

      SSID

    • E.

      PCMCIA card

    Correct Answer(s)
    A. USB flash drive
    B. Trusted platform module
    Explanation
    Windows BitLocker can be used with a USB flash drive and a Trusted Platform Module (TPM). BitLocker is a full disk encryption feature in Windows that helps protect data by encrypting the entire drive. A USB flash drive can be used to store the BitLocker recovery key, which is required to unlock the encrypted drive. The Trusted Platform Module (TPM) is a hardware component that provides secure storage of encryption keys and helps ensure the integrity of the system. By using both a USB flash drive and TPM, users can enhance the security of their BitLocker-encrypted drives.

    Rate this question:

  • 12. 

    A technician has just installed a second SATA HDD into a Windows XP desktop. The computer boots up successfully without any errors, but the technician cannot locate the additional HDD when clicking on My Computer. Which of the following is MOST likely the problem? (Select TWO).

    • A.

      The HDD must be partitioned.

    • B.

      The HDD must be assigned a drive letter.

    • C.

      The HDD was formatted as FAT16.

    • D.

      The HDD is incompatible with Windows XP.

    • E.

      The HDD was formatted as FAT32.

    Correct Answer(s)
    A. The HDD must be partitioned.
    B. The HDD must be assigned a drive letter.
    Explanation
    The technician cannot locate the additional HDD when clicking on My Computer because it must be partitioned and assigned a drive letter. Without partitioning the HDD, it cannot be recognized by the operating system. Additionally, without assigning a drive letter, the HDD will not be accessible through My Computer.

    Rate this question:

  • 13. 

    An executives laptop screen has been damaged and will not power on. Which of the following is the FASTEST way to get the executive back online?

    • A.

      Pull the hard drive and install it in a spare laptop of the same make and model.

    • B.

      Replace the motherboard on the laptop.

    • C.

      Build the executive a temporary laptop and attempt to repair the damaged one.

    • D.

      Replace the backlight on the laptop.

    Correct Answer
    A. Pull the hard drive and install it in a spare laptop of the same make and model.
    Explanation
    The fastest way to get the executive back online is to pull the hard drive from the damaged laptop and install it in a spare laptop of the same make and model. This allows the executive to continue working without the need for repairs or replacements, as the spare laptop will already have the necessary hardware and software configurations.

    Rate this question:

  • 14. 

    Which of the following is a sign that a computer has been infected by a worm?

    • A.

      Screensaver changed on its own

    • B.

      Unauthorized outgoing emails being sent

    • C.

      Desktop background changed on its own

    • D.

      Left and right mouse buttons have been flipped

    Correct Answer
    B. Unauthorized outgoing emails being sent
    Explanation
    Unauthorized outgoing emails being sent is a sign that a computer has been infected by a worm. Worms are malicious software that can replicate themselves and spread across networks. One common behavior of worms is to use the infected computer to send out spam emails without the user's knowledge or consent. This can result in a high volume of emails being sent from the infected computer, often to random or unauthorized recipients. Therefore, the presence of unauthorized outgoing emails is a clear indication of a worm infection.

    Rate this question:

  • 15. 

    The user is running dual monitors on a Windows XP Professional computer. The second monitor failed to display after a system reboot. A technician verifies that the monitor is functioning properly. Which of the following would the technician do NEXT?

    • A.

      Check the BIOS - ensure both video cards are enabled.

    • B.

      Use Display Settings - ensure the screen resolution is set to 1024X768 on the second monitor.

    • C.

      Use Display Settings - ensure both monitors are enabled.

    • D.

      Use Device Manager - make sure both video cards are enabled.

    Correct Answer
    C. Use Display Settings - ensure both monitors are enabled.
    Explanation
    The technician would use Display Settings to ensure that both monitors are enabled. This is because the question states that the second monitor failed to display after a system reboot, and the technician has already verified that the monitor itself is functioning properly. By checking the Display Settings and ensuring that both monitors are enabled, the technician can troubleshoot any potential software or configuration issues that may be causing the second monitor to not display. Checking the BIOS or Device Manager would not be necessary in this case, as the issue is likely related to the Display Settings.

    Rate this question:

  • 16. 

    Which of the following is the BEST way to ensure that only specified computers can access a wireless network?

    • A.

      Enable MAC filtering

    • B.

      Change the default password

    • C.

      Disable SSID broadcast

    • D.

      Change SSID from default

    Correct Answer
    A. Enable MAC filtering
    Explanation
    Enabling MAC filtering is the best way to ensure that only specified computers can access a wireless network. MAC filtering allows the network administrator to create a list of approved MAC addresses, which are unique identifiers for network devices. Only devices with MAC addresses on the approved list will be able to connect to the network, providing an additional layer of security. This method is more effective than simply changing the default password or SSID, as it specifically controls which devices can connect to the network. Disabling SSID broadcast and changing the SSID from default are also security measures, but they are not as effective as MAC filtering in restricting access to specified computers.

    Rate this question:

  • 17. 

    A user reports that a newly issued smartcard does not work in their laptop, but the technicians smartcard works without any issues. Which of the following would MOST likely resolve the issue?

    • A.

      Upgrade the smartcard readers firmware.

    • B.

      Reinstall the operating system.

    • C.

      Perform a flash BIOS upgrade.

    • D.

      Replace the smartcard reader.

    Correct Answer
    A. Upgrade the smartcard readers firmware.
  • 18. 

    Which of the following is an example of Automatic IP addressing in Windows XP?

    • A.

      127.0.0.1

    • B.

      169.254.254.0

    • C.

      192.168.1.3

    • D.

      255.255.0.0

    Correct Answer
    D. 255.255.0.0
    Explanation
    The IP address 255.255.0.0 is an example of a subnet mask, not an example of automatic IP addressing. Automatic IP addressing, also known as Automatic Private IP Addressing (APIPA), is a feature in Windows XP that allows a computer to automatically assign itself an IP address if it is unable to obtain one from a DHCP server. The APIPA range is 169.254.0.1 to 169.254.255.254, so the correct answer should be 169.254.254.0.

    Rate this question:

  • 19. 

    A user states that the LCD display on their laptop has intermittent lines on the screen. The technician notices that when the display panel is moved, the line appears and then disappears. Which of the following is the MOST likely cause?

    • A.

      The hinge on the display panel is damaged.

    • B.

      The display cable is loose or damaged.

    • C.

      The display panel is defective.

    • D.

      The video controller on the system board is defective.

    Correct Answer
    B. The display cable is loose or damaged.
    Explanation
    When the user moves the display panel and the line on the screen appears and disappears, it suggests that there is a problem with the connection between the display panel and the system board. This is most likely caused by a loose or damaged display cable. The movement of the display panel causes the cable to lose or regain proper connection, resulting in the intermittent lines on the screen.

    Rate this question:

  • 20. 

    A technician replaced a processor, but when the computer is powered on, the POST issues a series of beeps. Which of the following is the MOST likely cause?

    • A.

      The hard drive is not plugged in.

    • B.

      The CPU is not properly seated.

    • C.

      The mouse is not plugged in.

    • D.

      The operating system is corrupt.

    Correct Answer
    B. The CPU is not properly seated.
    Explanation
    The most likely cause for the series of beeps during POST after replacing the processor is that the CPU is not properly seated. When the CPU is not correctly installed or seated in its socket, it can cause a variety of issues, including beeping sounds during the POST process. It is crucial to ensure that the CPU is securely and correctly placed in its socket to avoid any connectivity problems and ensure proper functioning of the computer.

    Rate this question:

  • 21. 

    Which of the following components is MOST often removed in order to access laptop motherboards and internal components?

    • A.

      PCMCIA card

    • B.

      Keyboard

    • C.

      Display

    • D.

      Power button

    Correct Answer
    B. Keyboard
    Explanation
    The keyboard is most often removed in order to access laptop motherboards and internal components. This is because the keyboard is typically connected to the motherboard via a ribbon cable, making it necessary to remove the keyboard in order to gain access to the motherboard and other internal components. Removing the keyboard allows technicians to perform repairs or upgrades on the motherboard or other internal components as needed.

    Rate this question:

  • 22. 

    A user is reporting that a PC will suddenly shut down without warning. The PC boots up with no problems, but after using the PC for a short time, the PC turns off. Which of the following components should the technician check? (Select TWO).

    • A.

      CPU fan

    • B.

      RAM

    • C.

      Hard drive

    • D.

      Power supply

    • E.

      Video card

    Correct Answer(s)
    A. CPU fan
    D. Power supply
    Explanation
    The technician should check the CPU fan because if it is not functioning properly, the PC may overheat and shut down as a safety measure. The technician should also check the power supply because if it is faulty or not supplying enough power, it can cause the PC to shut down unexpectedly.

    Rate this question:

  • 23. 

    A technician is moving data from one laptop to another that has EFS installed. Which of the following would the technician need to perform FIRST?

    • A.

      Disable networking

    • B.

      Convert file format to FAT32

    • C.

      Export the users certificate

    • D.

      Give the user administrator privileges

    Correct Answer
    C. Export the users certificate
    Explanation
    To move data from one laptop to another with EFS (Encrypting File System) installed, the technician would need to export the user's certificate first. The EFS uses certificates to encrypt and decrypt files, and by exporting the user's certificate, the technician ensures that the files can be accessed and decrypted on the new laptop. This step is necessary before transferring the encrypted data to the new device.

    Rate this question:

  • 24. 

    A technician turns on a PC and before the computer boots up, the technician is prompted for a password. The technician does not know the password. Which of the following can the technician do to allow access to the PC? (Select TWO).

    • A.

      Set the clear password jumper on the motherboard.

    • B.

      Enter the BIOS setup and select the clear password setting.

    • C.

      Remove the power cord from the power supply and then plug it back in.

    • D.

      Power cycle the PC.

    • E.

      Remove the CMOS battery for 15 minutes.

    Correct Answer(s)
    A. Set the clear password jumper on the motherboard.
    E. Remove the CMOS battery for 15 minutes.
    Explanation
    The technician can set the clear password jumper on the motherboard and remove the CMOS battery for 15 minutes to allow access to the PC. Setting the clear password jumper on the motherboard will reset the BIOS settings, including the password. Removing the CMOS battery for 15 minutes will also reset the BIOS settings. Both of these actions will remove the password prompt when the PC is turned on.

    Rate this question:

  • 25. 

    Which of the following will happen if a PCI express video card is used in a PCI slot?

    • A.

      A PCI express video card used in a PCI slot will function normally.

    • B.

      A PCI express video card used in a PCI slot will run with a firmware upgrade.

    • C.

      A PCI express video card cannot be used in a PCI slot.

    • D.

      A PCI express video card used in a PCI slot will run at a slower than rated speed.

    Correct Answer
    C. A PCI express video card cannot be used in a PCI slot.
    Explanation
    PCI express and PCI slots are two different types of slots with different physical and electrical characteristics. A PCI express video card cannot be used in a PCI slot because they are not compatible with each other. The physical design and the number of pins in the slots are different, preventing the video card from being properly inserted and connected. Therefore, it is not possible to use a PCI express video card in a PCI slot.

    Rate this question:

  • 26. 

    Which of the following should be implemented on a small office home office (SOHO) server?

    • A.

      Enable MAC filtering

    • B.

      Change SSID from default

    • C.

      Assign static IP address

    • D.

      Enable WEP encryption

    Correct Answer
    C. Assign static IP address
    Explanation
    Assigning a static IP address to a small office home office (SOHO) server is important for several reasons. Firstly, it ensures that the server always has the same IP address, making it easier for other devices on the network to locate and connect to it. Additionally, a static IP address allows for more stable and reliable connections, as it eliminates the need for the server's IP address to change dynamically. This is especially crucial for a server, as it needs to be consistently accessible to clients and other devices on the network.

    Rate this question:

  • 27. 

    For the third time in two weeks a technician must re-image a machine for the same end user. After discussing in depth the actions preceding the problems the technician has determined the root cause to be opening unknown attachments. Which of the following is the MOST likely reason for the issues?

    • A.

      Virus

    • B.

      Social engineering

    • C.

      Corruption

    • D.

      Spam

    Correct Answer
    A. Virus
    Explanation
    The most likely reason for the issues is a virus. Opening unknown attachments can often lead to the installation of malicious software on a machine, causing various problems and requiring re-imaging. Social engineering involves manipulating individuals to gain unauthorized access, but it is not directly related to opening unknown attachments. Corruption refers to data or file corruption, which may cause issues but is less likely to require re-imaging. Spam refers to unsolicited or unwanted emails, which may contain viruses but is not the root cause of the issues in this scenario.

    Rate this question:

  • 28. 

    A user wishes to encrypt a hard drive for storing critical data. The user wants to drag and drop folders onto the partition and have them be encrypted in real time. Which of the following encryption schemes should be recommended?

    • A.

      PKI

    • B.

      TPM

    • C.

      BitLocker

    • D.

      Kerberos

    Correct Answer
    C. BitLocker
    Explanation
    BitLocker is the recommended encryption scheme for encrypting a hard drive and providing real-time encryption for folders. BitLocker is a full-disk encryption feature available in Windows operating systems. It allows the user to encrypt the entire hard drive or specific folders, providing protection for critical data. By using BitLocker, the user can drag and drop folders onto the partition, and they will be encrypted in real time, ensuring the security of the data stored on the hard drive.

    Rate this question:

  • 29. 

    A user reports that there is no access to the network from the computer. The technician notices that all of the lights on the switch are on and not flashing, the network cables are all plugged in and the computers network card is functioning properly. Which of the following should the technician perform to resolve the issue?

    • A.

      Power cycle the switch

    • B.

      Ping 127.0.0.1

    • C.

      Reboot the computer

    • D.

      Replace the switchs uplink cable

    Correct Answer
    A. Power cycle the switch
    Explanation
    Power cycling the switch can help resolve the issue because when all the lights on the switch are on and not flashing, it indicates that the switch may be experiencing a software or hardware issue. Power cycling the switch involves turning it off, waiting for a few seconds, and then turning it back on. This can help reset the switch and resolve any temporary issues that may be causing the lack of network access.

    Rate this question:

  • 30. 

    A technician observes poor network performance on a networked computer when transferring large amounts of data over the network. The technician confirms manually configured settings of 100Mbps and full-duplex on the computer, but the connected Ethernet switch shows an autonegotiated 100Mbps and half-duplex. Which of the following will correct this issue?

    • A.

      Replace the network card on the computer.

    • B.

      Replace the Ethernet switch.

    • C.

      Upgrade the network card device drivers.

    • D.

      Configure auto-negotiation on the computer.

    Correct Answer
    D. Configure auto-negotiation on the computer.
    Explanation
    The correct answer is to configure auto-negotiation on the computer. This will allow the computer and the Ethernet switch to automatically negotiate and agree upon the correct speed and duplex settings for optimal network performance. Manually configuring the settings on the computer may cause a mismatch with the switch, resulting in poor network performance. Upgrading the network card device drivers or replacing the network card or Ethernet switch may not be necessary if the issue can be resolved by enabling auto-negotiation.

    Rate this question:

  • 31. 

    A technician performs a laptop memory upgrade and now the laptop will not boot. The laptop is emitting a series of continuous beeps prior to startup. Which of the following is the MOST likely problem?

    • A.

      Hard drive needs to be reseated

    • B.

      Memory contacts are dirty

    • C.

      The CMOS battery is dead

    • D.

      The BIOS is faulty

    Correct Answer
    B. Memory contacts are dirty
    Explanation
    The most likely problem in this scenario is that the memory contacts are dirty. When a technician performs a laptop memory upgrade, it involves removing and reseating the memory modules. If the contacts on the memory modules or in the memory slots become dirty or corroded, it can prevent proper communication between the memory and the laptop, resulting in the laptop not booting up. This can cause the laptop to emit a series of continuous beeps as a warning sign.

    Rate this question:

  • 32. 

    Which of the following commands displays all local network shares?

    • A.

      NET statistics

    • B.

      NET share

    • C.

      NET view

    • D.

      NET user

    Correct Answer
    C. NET view
    Explanation
    The correct answer is "NET view." This command displays all local network shares.

    Rate this question:

  • 33. 

    All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?

    • A.

      The wireless access point is using MAC address filtering

    • B.

      The user has connected to a nearby wireless access point from another office

    • C.

      The user has configured the wireless settings with the wrong encryption type

    • D.

      The wireless access point has SSID broadcast disabled

    Correct Answer
    B. The user has connected to a nearby wireless access point from another office
    Explanation
    The user having a different IP address range is likely because they have connected to a nearby wireless access point from another office. This can happen if the user's device automatically connects to the strongest available wireless signal, which in this case is from the nearby office. As a result, the user is assigned an IP address from the different range used by the nearby office's network.

    Rate this question:

  • 34. 

    A user has just moved a PC from one office to another. The patch cable and the NIC do not appear to be functioning in the new office but were working before the move. The patch cable is plugged in correctly to both the NIC and the wall jack. Which of the following actions should the technician take FIRST?

    • A.

      Verify that the network card is compatible with the operating system.

    • B.

      Verify that the port on the switch is enabled.

    • C.

      Update the network card driver.

    • D.

      Replace the network cable with a crossover cable.

    Correct Answer
    B. Verify that the port on the switch is enabled.
    Explanation
    The technician should first verify that the port on the switch is enabled. This is because the patch cable and NIC were working before the move, so it is likely that the issue lies with the port on the switch. By checking if the port is enabled, the technician can ensure that the connection between the PC and the network is properly established. This step should be taken before considering other actions such as checking compatibility, updating drivers, or replacing the network cable.

    Rate this question:

  • 35. 

    A technician confirms a memory read error in Windows XP. Which of the following should the technician do to resolve the problem?

    • A.

      Replace the hard drive.

    • B.

      Change the memory settings in the BIOS.

    • C.

      Reseat or replace RAM modules.

    • D.

      Swap the video card with another video card.

    Correct Answer
    C. Reseat or replace RAM modules.
    Explanation
    To resolve a memory read error in Windows XP, the technician should reseat or replace the RAM modules. This is because memory read errors are often caused by faulty or loose RAM modules. By reseating the modules, the technician ensures they are properly connected to the motherboard, which can resolve any connection issues. If reseating does not fix the problem, replacing the RAM modules altogether may be necessary to resolve the error. Swapping the video card or changing memory settings in the BIOS would not directly address a memory read error.

    Rate this question:

  • 36. 

    A technician notices that a computer is randomly rebooting. When the technician accesses the BIOS and the computer reboots. Which of the following should the technician check FIRST?

    • A.

      Check the case fan

    • B.

      Check for CMOS battery failure

    • C.

      Check for blown capacitors

    • D.

      Check for hard drive failure

    Correct Answer
    C. Check for blown capacitors
    Explanation
    The technician should check for blown capacitors first because this is a common issue that can cause random reboots in a computer. Blown capacitors can lead to power fluctuations and instability in the system, resulting in unexpected restarts. By visually inspecting the capacitors on the motherboard, the technician can identify any bulging or leaking capacitors, which would indicate a problem.

    Rate this question:

  • 37. 

    Which of the following is the BEST way to ensure that only specified devices can connect to a wireless network?

    • A.

      Use MAC filtering

    • B.

      Set up a VLAN

    • C.

      Disable SSID broadcasting

    • D.

      Enable WEP encryption

    Correct Answer
    A. Use MAC filtering
    Explanation
    MAC filtering is the best way to ensure that only specified devices can connect to a wireless network. MAC filtering allows the network administrator to create a whitelist of approved MAC addresses, and only devices with those addresses will be able to connect to the network. This provides an additional layer of security and prevents unauthorized devices from accessing the network, even if they have the correct SSID and encryption settings. VLANs, disabling SSID broadcasting, and enabling WEP encryption can also enhance network security, but MAC filtering specifically targets and controls device access.

    Rate this question:

  • 38. 

    The technician suspects a computer has been compromised by malware. Which of the following statements BEST describes the steps a technician should take to eliminate the malware?

    • A.

      Reboot in Safe Mode with Networking enabled, update and then run an anti-malware scanner.

    • B.

      Update the anti-malware signatures, and then run an anti-malware scanner.

    • C.

      Update the anti-malware signatures, reboot the system, and then run the anti-malware scanner.

    • D.

      Reboot the system, log on as administrator, and run the anti-malware scanner.

    Correct Answer
    A. Reboot in Safe Mode with Networking enabled, update and then run an anti-malware scanner.
    Explanation
    The best steps a technician should take to eliminate malware is to reboot the computer in Safe Mode with Networking enabled. This allows the computer to start up with only essential services and drivers, making it easier to detect and remove malware. After rebooting, the technician should update the anti-malware scanner to ensure it has the latest virus definitions, and then run a scan to identify and remove any malware present on the system. This approach helps to minimize the chances of the malware interfering with the scanning process and increases the likelihood of successful removal.

    Rate this question:

  • 39. 

    A technician needs to boot a PC from a CD to run diagnostics, but the PC always boots from the hard drive. Which of the following will allow the PC to boot from the CD?

    • A.

      Change the drive order sequence in the BIOS.

    • B.

      Unplug the power cable from the hard drive.

    • C.

      Reformat the hard drive.

    • D.

      Unplug the data cable from the hard drive.

    Correct Answer
    A. Change the drive order sequence in the BIOS.
    Explanation
    Changing the drive order sequence in the BIOS will allow the PC to boot from the CD. The BIOS (Basic Input/Output System) is responsible for initializing the hardware components of the computer, including the boot order. By accessing the BIOS settings, the technician can rearrange the boot order so that the CD drive is prioritized over the hard drive. This change will ensure that the PC boots from the CD when it is inserted, allowing the technician to run diagnostics.

    Rate this question:

  • 40. 

    Which of the following is the QUICKEST way to view network adapter statistics?

    • A.

      System Information

    • B.

      Task Manager

    • C.

      Performance Monitor

    • D.

      Computer Management

    Correct Answer
    B. Task Manager
    Explanation
    Task Manager is the quickest way to view network adapter statistics. Task Manager provides real-time information about the performance of the computer, including network activity. It displays detailed statistics such as network utilization, data sent and received, and the current network connection speed. This information is readily available and can be accessed with just a few clicks, making Task Manager the fastest option for viewing network adapter statistics.

    Rate this question:

  • 41. 

    A customer reports that their sound is not working. They state that the speakers worked previously. Which of the following should the technician check? (Select THREE).

    • A.

      Speakers are in regulatory compliance.

    • B.

      Speakers are on and the mute is off.

    • C.

      Ensure the speakers are on the Windows HCL.

    • D.

      Verify the system has enough hard drive space.

    • E.

      The audio driver is installed correctly.

    • F.

      Speakers are plugged into the correct jack.

    Correct Answer(s)
    B. Speakers are on and the mute is off.
    E. The audio driver is installed correctly.
    F. Speakers are plugged into the correct jack.
    Explanation
    The technician should check if the speakers are on and the mute is off because the customer reports that the sound is not working. If the speakers are off or muted, that could be the reason for the issue. The technician should also check if the audio driver is installed correctly because if it is not, the sound may not work. Additionally, the technician should check if the speakers are plugged into the correct jack because if they are not properly connected, the sound may not be transmitted.

    Rate this question:

  • 42. 

    A technician receives a ticket about VPN issues on a Windows XP PC. The ticket explained that the Internet was working until the VPN connection was established; now it will not allow the user to remote desktop or browse the Internet. Which of the following would cause these network issues?

    • A.

      Windows XP firewall is corrupt and not working correctly.

    • B.

      Windows XP firewall is turned on and not configured correctly.

    • C.

      The user is not using the correct Ethernet cable.

    • D.

      Windows XP does not support VPN features.

    Correct Answer
    B. Windows XP firewall is turned on and not configured correctly.
    Explanation
    The correct answer is that the Windows XP firewall is turned on and not configured correctly. This can cause network issues because the firewall may be blocking the necessary ports and protocols for remote desktop and internet browsing. The user will need to configure the firewall settings to allow these connections in order to resolve the problem.

    Rate this question:

  • 43. 

    After removing malware from a users computer, the Internet browser does not access any websites. Which of the following is the BEST method to fix this?

    • A.

      Remove Proxy Settings from the Internet browser

    • B.

      Run Operating System Updates

    • C.

      Reset the Internet router

    • D.

      Reboot the computer

    Correct Answer
    A. Remove Proxy Settings from the Internet browser
    Explanation
    Removing proxy settings from the Internet browser is the best method to fix the issue of not being able to access any websites after removing malware from a user's computer. Malware often modifies proxy settings to redirect internet traffic, so removing these settings will allow the browser to connect directly to websites again. Running operating system updates, resetting the internet router, or rebooting the computer may not specifically address the issue with the browser's proxy settings.

    Rate this question:

  • 44. 

    A user installed a Blu-Ray drive in their PC. The user reports that the new drive and their existing DVD-RW drive are not operating. Which of the following needs to be replaced?

    • A.

      Power supply

    • B.

      DVD-RW

    • C.

      Blu-Ray drive

    • D.

      Motherboard

    Correct Answer
    A. Power supply
    Explanation
    The user installed a Blu-Ray drive in their PC and now both the new drive and their existing DVD-RW drive are not operating. This suggests that the issue is not with the individual drives themselves, but rather with a common component that is affecting both drives. The power supply is responsible for providing power to all the components in the PC, including the drives. If the power supply is faulty or not providing enough power, it can cause both drives to not operate properly. Therefore, the power supply needs to be replaced in order to resolve the issue.

    Rate this question:

  • 45. 

    A system powers on, begins POST, displays the BIOS version information and then hangs with the error message Error loading operating system. Which of the following is MOST likely cause of this issue?

    • A.

      A virus has infected the system

    • B.

      Corrupted BOOT.INI file

    • C.

      Corrupt MBR

    • D.

      Boot sector corruption

    Correct Answer
    C. Corrupt MBR
    Explanation
    The most likely cause of the system hanging with the error message "Error loading operating system" is a corrupt MBR (Master Boot Record). The MBR is responsible for loading the operating system, and if it becomes corrupted, the system will not be able to boot properly. This can happen due to various reasons such as a power failure, hardware issues, or a virus attack. In this case, since the system is able to display the BIOS version information, it suggests that the issue is not related to a virus or a corrupted boot sector. The most probable cause is a corrupt MBR.

    Rate this question:

  • 46. 

    Which of the following is the reason for pinging the loopback address?

    • A.

      To verify the functionality of the network card

    • B.

      To verify the functionality of the DNS server

    • C.

      To verify the functionality of the TCP/IP stack

    • D.

      To verify the functionality of the host file

    Correct Answer
    C. To verify the functionality of the TCP/IP stack
    Explanation
    Pinging the loopback address (127.0.0.1) is used to verify the functionality of the TCP/IP stack. The loopback address is a virtual network interface that allows a computer to communicate with itself. By sending a ping request to the loopback address, the computer checks if the TCP/IP stack is functioning properly. This test is commonly used to troubleshoot network connectivity issues and ensure that the computer's networking components are working correctly.

    Rate this question:

  • 47. 

    Which of the following symptoms would indicate a power supply issue?

    • A.

      Frequent failure of hard drives

    • B.

      The CD-RW takes longer to write

    • C.

      The CPU is constantly over-clocking

    • D.

      The wireless range is reduced

    Correct Answer
    A. Frequent failure of hard drives
    Explanation
    Frequent failure of hard drives can indicate a power supply issue because insufficient power can cause fluctuations or surges in the electrical current, leading to damage or malfunctioning of the hard drives. Power supply issues can result in inconsistent power delivery, which can affect the performance and reliability of various components, including hard drives.

    Rate this question:

  • 48. 

    When troubleshooting an email problem which of the following is the correct syntax for telnet?

    • A.

      Telnet 25

    • B.

      Telnet :25

    • C.

      Telnet port:25

    • D.

      Telnet 25

    Correct Answer
    A. Telnet 25
    Explanation
    The correct syntax for telnet when troubleshooting an email problem is "telnet 25". This command allows the user to establish a telnet session on port 25, which is the default port for SMTP (Simple Mail Transfer Protocol) used for email communication. By using this syntax, the user can test the connectivity and communication with the email server.

    Rate this question:

  • 49. 

    Which of the following protocols would a technician use to run commands on a remote computer?

    • A.

      NETBIOS

    • B.

      FTP

    • C.

      SMTP

    • D.

      TELNET

    Correct Answer
    D. TELNET
    Explanation
    TELNET is the correct answer because it is a protocol that allows a technician to remotely access and control a computer over a network. It provides a command-line interface for running commands on the remote computer, making it a suitable choice for remotely managing and troubleshooting systems. NETBIOS is a networking protocol used for name resolution, FTP is used for file transfer, and SMTP is used for email communication, none of which directly allow for running commands on a remote computer.

    Rate this question:

  • 50. 

    Which of the following commands would be used to set the time on a workstation?

    • A.

      NET timer

    • B.

      NET time

    • C.

      NET time set

    • D.

      Time

    Correct Answer
    D. Time
    Explanation
    The correct answer is "time." This command is used to set the time on a workstation.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 14, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 02, 2012
    Quiz Created by
    Tmede212
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.