The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Which wireless security procedure should be used to hide the WLAN ID from wireless clients?
A.
Configure WEP only on the access point.
B.
Disable the broadcast of the SSID on the access point.
C.
Decrease the antenna spectrum on each wireless client.
D.
Configure MAC address filtering on the access point.
E.
Install WAP on the wireless clients.
Correct Answer
B. Disable the broadcast of the SSID on the access point.
Explanation Disabling the broadcast of the SSID on the access point is the correct answer because when the SSID (Service Set Identifier) is not broadcasted, wireless clients will not be able to see the network in their available network list. This makes the network "hidden" and provides an additional layer of security. However, it is important to note that this method alone is not sufficient for securing a WLAN, as other security measures such as encryption and authentication should also be implemented.
Rate this question:
2.
When upgrading a CPU, what must be applied between the new CPU and the heat sink/fan?
A.
Thermal compound
B.
Adhesive gel or paste
C.
Penetrating oil
D.
Lubricating grease
Correct Answer
A. Thermal compound
Explanation When upgrading a CPU, thermal compound must be applied between the new CPU and the heat sink/fan. Thermal compound is a substance with high thermal conductivity that helps to transfer heat from the CPU to the heat sink more efficiently. It fills in microscopic imperfections on the surfaces of the CPU and heat sink, ensuring better contact and heat dissipation. This helps to prevent overheating and ensures optimal performance of the CPU. Adhesive gel or paste, penetrating oil, and lubricating grease are not suitable for this purpose and may cause damage to the CPU or hinder proper heat transfer.
Rate this question:
3.
After a Windows operating system has been installed, which program would a technician use to select the programs that will run at startup?
A.
Task Manager
B.
Msconfig
C.
Ntldr
D.
Regedit
Correct Answer
B. Msconfig
Explanation A technician would use "Msconfig" to select the programs that will run at startup after a Windows operating system has been installed. Msconfig is a system configuration utility that allows users to manage startup programs, services, and other system settings. It provides an interface where users can enable or disable specific programs from starting up when the computer boots, helping to optimize system performance and troubleshoot startup issues.
Rate this question:
4.
What is the default file system used during a fresh installation of Windows 7?
A.
FAT32
B.
FAT16
C.
HPFS
D.
NTFS
Correct Answer
D. NTFS
Explanation During a fresh installation of Windows 7, the default file system used is NTFS. NTFS (New Technology File System) is the preferred file system for Windows operating systems as it provides better security, reliability, and performance compared to other file systems like FAT32 and FAT16. NTFS supports larger file sizes, has built-in file compression and encryption capabilities, and allows for more efficient disk space allocation. Therefore, it is the recommended choice for Windows 7 installations.
Rate this question:
5.
Which type of device would be used on a laptop to verify the identity of a user?
A.
A biometric identification device
B.
A MIDI device
C.
A touch screen
D.
A digitizer
Correct Answer
A. A biometric identification device
Explanation A biometric identification device is used on a laptop to verify the identity of a user. This device utilizes unique physical or behavioral characteristics of an individual, such as fingerprints, facial recognition, or iris scanning, to authenticate their identity. By comparing the captured biometric data with pre-registered data, the device can determine if the user is authorized to access the laptop. This provides an additional layer of security to ensure that only authorized individuals can use the laptop.
Rate this question:
6.
What can a technician do to help protect wireless network equipment from the effects of RFI?
A.
Lower the humidity level.
B.
Keep the equipment plugged into a surge protector.
C.
Keep the equipment on an antistatic mat.
D.
Remove cordless telephones from the area.
Correct Answer
D. Remove cordless telepHones from the area.
Explanation Cordless telephones can cause interference with wireless network equipment due to overlapping frequencies. By removing the cordless telephones from the area, the technician can help protect the wireless network equipment from the effects of RFI (Radio Frequency Interference).
Rate this question:
7.
What are two consequences of setting an incorrect boot order in the system BIOS? (Choose two.)
A.
The computer displays an ‘Inaccessible Boot Device’ error after POST.
B.
The computer displays an ‘Invalid Boot Disk’ error after POST.
C.
The computer continually restarts without displaying the desktop.
D.
The computer displays a ‘Missing NTLDR’ error after POST.
E.
The computer locks up without any error messages.
Correct Answer(s)
B. The computer displays an ‘Invalid Boot Disk’ error after POST. D. The computer displays a ‘Missing NTLDR’ error after POST.
Explanation Setting an incorrect boot order in the system BIOS can lead to two consequences. Firstly, the computer may display an 'Invalid Boot Disk' error after the Power-On Self Test (POST). This indicates that the system is unable to find a valid boot disk to start the operating system. Secondly, the computer may display a 'Missing NTLDR' error after POST, which suggests that the NTLDR (NT Loader) file, responsible for loading the operating system, is not found. Both of these errors indicate that the computer is unable to boot properly and may require troubleshooting or reconfiguration of the boot order in the BIOS.
Rate this question:
8.
A network technician has been asked to determine the best Internet connection for a branch office located in a new metropolitan office building. Which connection would provide the highest bandwidth and reliability at the lowest cost?
A.
ISDN
B.
DSL
C.
Dial-up
D.
Satellite
Correct Answer
B. DSL
Explanation DSL (Digital Subscriber Line) would provide the highest bandwidth and reliability at the lowest cost compared to the other options listed. DSL uses existing telephone lines to transmit data, allowing for faster speeds and more reliable connections compared to dial-up or satellite. ISDN (Integrated Services Digital Network) is an older technology that offers limited bandwidth and higher costs. Dial-up is even slower and less reliable than ISDN. Satellite internet can provide high speeds, but it is generally more expensive and less reliable compared to DSL.
Rate this question:
9.
Why does a technician wear an antistatic wrist strap?
A.
To prevent damage to electronic components inside the computer
B.
To be grounded while working on the computer
C.
To keep sensitive computer components dust-free before installation
D.
To use the power supply of the computer to store static electricity
Correct Answer
A. To prevent damage to electronic components inside the computer
Explanation A technician wears an antistatic wrist strap to prevent damage to electronic components inside the computer. This is because static electricity can build up on the technician's body and can discharge onto sensitive electronic components, causing damage. The antistatic wrist strap helps to dissipate any static electricity from the technician's body, preventing it from damaging the components.
Rate this question:
10.
When installing a network adapter into a client computer, a technician notices that the contacts on the adapter need to be cleaned. Which solution should the technician use to clean the contact?
A.
Glass cleaner
B.
Slightly abrasive cleanser
C.
Mild detergent
D.
Isopropyl alcohol
Correct Answer
D. Isopropyl alcohol
Explanation Isopropyl alcohol is the correct solution to clean the contacts on a network adapter. Isopropyl alcohol is commonly used in electronics cleaning because it evaporates quickly and leaves no residue. It is effective in removing dirt, dust, and oils from the contacts without causing damage. Glass cleaner, slightly abrasive cleanser, and mild detergent are not suitable for cleaning electronic contacts as they may leave residue or cause damage to the delicate components.
Rate this question:
11.
A technician is troubleshooting a computer that is experiencing hardware failure detected by the BIOS. What is one way this failure is indicated?
A.
The computer returns an error message that indicates the I/O address of the failing device.
B.
The computer automatically boots into Safe Mode and displays a warning on the screen.
C.
The computer emits a pattern of beeps indicating the failing device.
D.
The screen flashes with a red background and displays a warning message.
Correct Answer
C. The computer emits a pattern of beeps indicating the failing device.
Explanation When a computer experiences hardware failure detected by the BIOS, one way this failure is indicated is through a pattern of beeps emitted by the computer. These beeps serve as an audio code that indicates the failing device. The specific pattern of beeps can vary depending on the manufacturer and the type of hardware failure, allowing the technician to identify the issue and take appropriate troubleshooting steps.
Rate this question:
12.
Which location on a hard disk is used by the BIOS to search for operating system instructions in order to boot a PC?
A.
The Windows partition
B.
The logical drive
C.
The active partition
D.
The extended partition
Correct Answer
C. The active partition
Explanation The BIOS searches for operating system instructions in the active partition of a hard disk in order to boot a PC. The active partition is the partition that contains the boot loader, which is responsible for loading the operating system. The BIOS locates and executes the boot loader code in the active partition, allowing the computer to start up and load the operating system.
Rate this question:
13.
Refer to the exhibit. Which two port types are shown in the graphic?
A.
USB
B.
Parallel
C.
Serial
D.
Network (RJ45)
E.
Modem
Correct Answer(s)
A. USB D. Network (RJ45)
14.
What is the purpose of RAID adapters?
A.
To provide enhanced audio and graphic capabilities
B.
To connect multiple storage devices for redundancy or speed
C.
To allow older PCI technology expansion slots to be used
D.
To connect peripheral devices to a PC to improve performance
Correct Answer
B. To connect multiple storage devices for redundancy or speed
Explanation RAID adapters are used to connect multiple storage devices for redundancy or speed. RAID stands for Redundant Array of Independent Disks, and it is a technology that allows data to be distributed across multiple hard drives. This provides increased data protection through redundancy, as well as improved performance through data striping and parallel access to multiple drives. RAID adapters enable the implementation of different RAID levels, such as RAID 0, RAID 1, RAID 5, etc., which offer various combinations of data redundancy and performance optimization.
Rate this question:
15.
A technician has installed a new sound card in a PC but it is not operating correctly. Where should the technician look to investigate driver problems?
A.
My computer
B.
Computer Management
C.
Device Manager
D.
System Tools
Correct Answer
C. Device Manager
Explanation The technician should look in the Device Manager to investigate driver problems. The Device Manager is a Windows tool that allows users to view and manage hardware devices and their drivers. It provides a detailed list of all installed hardware devices, including sound cards, and allows users to update, uninstall, or disable device drivers. By checking the Device Manager, the technician can identify if the sound card driver is missing, outdated, or experiencing any other issues that may be causing the problem.
Rate this question:
16.
After a computer is powered on, Windows 7 fails to start. What initial procedure would a technician use to deal with this failure?
A.
Boot from a Windows 7 installation media and access the System Restore utility.
B.
Access the Control Panel and choose Restore Files from Backup from the System and Security menu.
C.
Create a System Repair Disc and restore the image.
D.
Press the F2 key during the boot process and start the computer is Safe Mode.
Correct Answer
A. Boot from a Windows 7 installation media and access the System Restore utility.
Explanation In this scenario, the technician would use the initial procedure of booting from a Windows 7 installation media and accessing the System Restore utility. This allows them to restore the computer to a previous working state by using a restore point. This can help resolve any issues that may be preventing Windows 7 from starting properly. It is a common troubleshooting step to try and fix startup failures in Windows 7.
Rate this question:
17.
A technician wants to create a new partition on a new additional hard drive. Which tool should be used?
A.
Disk Management
B.
Scandisk
C.
Disk Defragmenter
D.
Device Manager
E.
Chdsk
Correct Answer
A. Disk Management
Explanation Disk Management is the correct tool to use when creating a new partition on a new additional hard drive. Disk Management is a built-in Windows utility that allows users to manage their disk drives, including creating, deleting, and formatting partitions. It provides a user-friendly interface to easily perform disk-related tasks and is specifically designed for managing disk drives and their partitions. Scandisk, Disk Defragmenter, Device Manager, and Chdsk are not the appropriate tools for creating a new partition on a hard drive.
Rate this question:
18.
A technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to force the release of system resources from the unresponsive application?
A.
System Restore
B.
Event Viewer
C.
Task Manager
D.
Add or Remove Programs
Correct Answer
C. Task Manager
Explanation The best administrative tool to force the release of system resources from an unresponsive application is the Task Manager. Task Manager allows the technician to view and end processes, including the unresponsive application, which can help free up system resources and improve computer performance. System Restore is used to revert the system to a previous state, Event Viewer is used to view system logs, and Add or Remove Programs is used to uninstall software - none of these options directly address the issue of an unresponsive application.
Rate this question:
19.
Which key or key sequence pressed during the boot process will allow a user to start a Windows PC using the last known good configuration?
A.
Windows key
B.
F12
C.
Alt-Z
D.
F1
E.
F8
Correct Answer
E. F8
Explanation During the boot process of a Windows PC, pressing the F8 key allows the user to start the system using the last known good configuration. This key triggers the Advanced Boot Options menu, which provides various startup options. Selecting the "Last Known Good Configuration" option from this menu will initiate the system to boot using the most recent settings that were known to work properly.
Rate this question:
20.
Which Windows hard drive partition is commonly referred to as the C: drive?
A.
The first primary partition
B.
The first extended partition
C.
The first logical partition
D.
The first volume partition
Correct Answer
A. The first primary partition
Explanation The C: drive is commonly referred to as the partition that contains the operating system and is typically the default location for installing programs and storing files. The first primary partition is usually assigned the drive letter C: during the Windows installation process, making it the correct answer.
Rate this question:
21.
A technician needs to purchase a new video adapter for a computer. In addition to performance and price, which factor should be considered when selecting the adapter?
A.
Type of installed hard drive
B.
Motherboard manufacturer
C.
Expansion slot type
D.
Amount of installed system memory
Correct Answer
C. Expansion slot type
Explanation When selecting a new video adapter for a computer, the factor that should be considered is the expansion slot type. This is because different video adapters require different types of expansion slots to be compatible with the computer's motherboard. Therefore, it is important to choose a video adapter that is compatible with the expansion slot available on the motherboard to ensure proper installation and functionality.
Rate this question:
22.
A computer user complains of a computer that freezes up after about five minutes of use. The technician checks the computer BIOS to see if there might be a configuration problem that is causing the computer to behave consistently in this manner. While the technician is reviewing the information, the computer once again freezes. What is the probable cause of the computer problem?
A.
The CPU fan is not functioning.
B.
The BIOS is corrupt.
C.
The hard drive is failing.
D.
The CMOS battery has failed.
Correct Answer
A. The CPU fan is not functioning.
Explanation The probable cause of the computer problem is that the CPU fan is not functioning. When the technician checks the computer BIOS, the computer freezes again, indicating that the freezing issue is likely related to the hardware rather than the software. The CPU fan is responsible for cooling down the processor, and if it is not functioning properly, the processor can overheat, causing the computer to freeze.
Rate this question:
23.
A technician has replaced the batteries in all the company laptops. Which source will have information on the proper disposal requirements for the old batteries?
A.
OSHA web site
B.
MSDS
C.
The website of the laptop manufacturer
D.
Local environmental regulations
Correct Answer
D. Local environmental regulations
Explanation Local environmental regulations would have information on the proper disposal requirements for old batteries because these regulations are specific to the area in which the company is located. They outline the proper procedures for disposing of hazardous materials, including batteries, in a way that is safe and compliant with local laws. The OSHA website provides information on workplace safety, but may not have specific information on battery disposal. The MSDS (Material Safety Data Sheet) provides information on the hazards and safety precautions related to a specific product, but may not include disposal requirements. The website of the laptop manufacturer may have general information on battery disposal, but it is unlikely to provide specific information for the company's location.
Rate this question:
24.
Where would a technician configure a PC to boot from a CD-ROM?
A.
Control Panel
B.
My Computer
C.
BIOS Settings
D.
Start Menu
E.
Device Manager
Correct Answer
C. BIOS Settings
Explanation A technician would configure a PC to boot from a CD-ROM in the BIOS settings. The BIOS (Basic Input/Output System) is firmware that is built into the computer's motherboard. It controls the computer's hardware and allows the user to make changes to various settings. By accessing the BIOS settings, the technician can change the boot order, which determines the order in which the computer looks for an operating system to load. By setting the CD-ROM as the first boot device, the technician ensures that the computer will boot from a CD-ROM when it is inserted into the CD-ROM drive.
Rate this question:
25.
A technician just terminated some fiber optic cable and needs to properly dispose of the hazardous waste created during the termination. Where should the technician look for the proper disposal method for the waste?
A.
ESD
B.
EPA
C.
MSDS
D.
FEMA
Correct Answer
C. MSDS
Explanation The technician should look for the proper disposal method for the hazardous waste created during the termination in the MSDS (Material Safety Data Sheet). The MSDS provides information on the safe handling, storage, and disposal of hazardous materials, including fiber optic cable waste. It contains details about the potential hazards and the appropriate procedures for disposing of the waste in a safe and environmentally friendly manner.
Rate this question:
26.
A school is adding computers to a classroom that has none. What type of LAN would the school choose to take advantage of commonly implemented wired technologies?
A.
Token Ring
B.
802.11n
C.
Ethernet
D.
WiMAX
Correct Answer
C. Ethernet
Explanation The school would choose Ethernet as the LAN type to take advantage of commonly implemented wired technologies. Ethernet is a widely used LAN technology that allows for fast and reliable wired connections. It is commonly used in schools and other institutions for connecting computers and devices to a network. Ethernet provides high-speed data transfer, low latency, and is compatible with a wide range of devices. It is a cost-effective and efficient solution for the school to add computers to the classroom.
Rate this question:
27.
A customer has a computer for a home business, but wants to have another computer as a web server. What would be the best solution for the customer to share the monitor, mouse, and keyboard between the two computers?
A.
Multipurpose device
B.
Access point
C.
KVM switch
D.
Network switch
E.
USB hub
Correct Answer
C. KVM switch
Explanation The best solution for the customer to share the monitor, mouse, and keyboard between the two computers would be a KVM switch. A KVM switch allows multiple computers to be connected to a single set of peripherals, such as a monitor, mouse, and keyboard. This would enable the customer to easily switch between the two computers without having to disconnect and reconnect the peripherals each time.
Rate this question:
28.
What is the default TCP destination port number or number combination that is used for SSH connections?
A.
20/21
B.
22
C.
23
D.
25
E.
80
Correct Answer
B. 22
Explanation The default TCP destination port number or number combination used for SSH connections is 22. SSH (Secure Shell) is a network protocol that allows secure remote login and file transfer over an unsecured network. Port 22 is specifically assigned for SSH and is the standard port used for establishing SSH connections.
Rate this question:
29.
A technician installed a network adapter in a computer and wants to test network connectivity. The ping command can receive responses from workstations on the same subnet but not from remote workstations. What could be causing the problem?
A.
The NIC driver is out of date.
B.
The default gateway is incorrect.
C.
The operating system is not compatible with the remote sites.
D.
The TCP/IP protocol stack is not loaded.
Correct Answer
B. The default gateway is incorrect.
Explanation The default gateway is the IP address of the router that connects the local network to other networks, such as the internet. If the default gateway is incorrect, it means that the computer is not able to send network traffic to remote networks. In this case, the ping command is able to receive responses from workstations on the same subnet because they are on the same local network. However, it cannot receive responses from remote workstations because the network traffic is not being routed correctly.
Rate this question:
30.
Which command should a computer technician use on a PC to restore protected system files with known good versions?
A.
Defrag
B.
Chkdsk
C.
Sfc/scannow
D.
Msconfig
Correct Answer
C. Sfc/scannow
Explanation The computer technician should use the "sfc/scannow" command on a PC to restore protected system files with known good versions. This command is used to scan the system files for any corruption or issues and automatically replace them with the correct versions from the Windows operating system. It helps in maintaining the integrity of the system files and ensuring the proper functioning of the PC.
Rate this question:
31.
Which product is recommended to remove the dust from inside a computer?
A.
Compressed air
B.
Household vacuum cleaner
C.
Damp cloth
D.
Dry cloth
Correct Answer
A. Compressed air
Explanation Compressed air is recommended to remove dust from inside a computer because it is a safe and effective method. Using a household vacuum cleaner can generate static electricity and potentially damage the delicate components of the computer. Damp cloth or dry cloth can also create static electricity and leave behind moisture or lint, which can be harmful to the computer. Compressed air, on the other hand, can blow away the dust without causing any damage or leaving any residue.
Rate this question:
32.
The current IP configuration of a medium size company with several subnets is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service or protocol would simplify the workstation IP configuration task?
A.
ICMP
B.
DNS
C.
APIPA
D.
DHCP
Correct Answer
D. DHCP
Explanation DHCP (Dynamic Host Configuration Protocol) would simplify the workstation IP configuration task. DHCP allows for automatic and centralized management of IP addresses, subnet masks, default gateways, and other network configuration parameters. With DHCP, workstations can obtain their IP configurations dynamically from a DHCP server, eliminating the need for manual configuration. This saves time and effort for the technician, especially in a medium-sized company with multiple subnets and increasing network growth. ICMP (Internet Control Message Protocol) is used for diagnostic purposes, DNS (Domain Name System) is used for translating domain names to IP addresses, and APIPA (Automatic Private IP Addressing) is a fallback mechanism when DHCP is not available.
Rate this question:
33.
What are the four layers in the TCP/IP reference model?
Correct Answer
C. Application, transport, internet, network access
Explanation The TCP/IP reference model consists of four layers: application, transport, internet, and network access. The application layer is responsible for providing network services to the user, such as email or web browsing. The transport layer ensures reliable delivery of data between hosts and handles issues such as flow control and error correction. The internet layer handles routing and addressing, allowing packets to be transmitted across different networks. The network access layer deals with the physical transmission of data, including protocols for accessing the network medium and addressing hardware devices.
Rate this question:
34.
A PC that running the Windows 7 operating system has slowed down over a period of time and now takes a long time to launch applications and open various documents. What can be done to remedy the problem?
A.
Dr. Watson
B.
System Restore
C.
Disk Defragmenter
D.
Chkdsk
Correct Answer
C. Disk Defragmenter
Explanation Disk Defragmenter is the correct answer because over time, files on a computer's hard drive can become fragmented, meaning that parts of the files are scattered across different locations on the drive. This can slow down the computer's performance as it takes longer to access and open files. Disk Defragmenter is a tool in Windows 7 that reorganizes the files on the hard drive, putting all the parts of each file together in one location. This helps to improve the computer's speed and efficiency, making it faster to launch applications and open documents.
Rate this question:
35.
A computer is assigned an IP address of 169.254.33.16. What can be said about the computer, based on the assigned address?
A.
It cannot communicate outside its own network.
B.
It has a public IP address that has been translated to a private IP address.
C.
It can communicate on the local network as well as on the Internet.
D.
It can communicate with networks inside a particular company with subnets.
Correct Answer
A. It cannot communicate outside its own network.
Explanation Based on the given IP address of 169.254.33.16, it can be concluded that the computer is assigned an Automatic Private IP Address (APIPA). APIPA addresses are used when a computer is unable to obtain an IP address from a DHCP server. These addresses are only valid within the local network and cannot be used to communicate outside of it. Therefore, the computer cannot communicate outside its own network.
Rate this question:
36.
A user complains about being unable to connect to the wireless network. Which two actions should be part of troubleshooting the wireless connection? (Choose two.)
A.
Verify in the laptop software whether any wireless networks are detected.
B.
Verify that the laptop is plugged into an electrical outlet.
C.
Reconfigure TCP/IP settings on the laptop.
D.
Try moving the laptop to different places to see if a signal can be detected.
E.
Reinsert the laptop battery.
Correct Answer(s)
A. Verify in the laptop software whether any wireless networks are detected. D. Try moving the laptop to different places to see if a signal can be detected.
Explanation To troubleshoot the wireless connection, two actions should be taken. First, the user should verify in the laptop software whether any wireless networks are detected. This will help determine if the issue lies with the laptop's ability to detect networks. Second, the user should try moving the laptop to different places to see if a signal can be detected. This will help identify if the problem is related to the laptop's location or interference from other devices.
Rate this question:
37.
Which recommendation should be observed when replacing existing memory?
A.
The new memory should exceed the capacity of the hard drive.
B.
The new memory should operate at the same speed as the hard drive.
C.
The new memory should be as fast or faster than existing memory.
D.
The new memory should be as fast or faster as the cache found in the processor.
Correct Answer
C. The new memory should be as fast or faster than existing memory.
Explanation When replacing existing memory, it is recommended to use new memory that is as fast or faster than the existing memory. This ensures that the performance of the system is not compromised and that the new memory can keep up with the demands of the processor and other components. Using slower memory may result in slower data transfer rates and overall system performance.
Rate this question:
38.
A network specialist has been hired to install a network in a company that assembles airplane engines. Because of the nature of the business, the area is highly affected by electromagnetic interference. Which type of network media should be recommended so that the data communication will not be affected by EMI?
A.
Coaxial
B.
STP
C.
Fiber optic
D.
UTP
Correct Answer
C. Fiber optic
Explanation Fiber optic cable is the recommended network media in this scenario because it is not affected by electromagnetic interference (EMI). Unlike coaxial, STP, and UTP cables, which are all susceptible to EMI, fiber optic cables use light to transmit data instead of electrical signals. This makes them immune to EMI, making them ideal for environments with high levels of electromagnetic interference, such as the area where airplane engines are assembled.
Rate this question:
39.
A company is expanding its business to other countries. All branch offices must remain connected to corporate headquarters at all times. Which network technology is required to support this scenario?
A.
LAN
B.
WLAN
C.
MAN
D.
WAN
Correct Answer
D. WAN
Explanation A Wide Area Network (WAN) is required to support this scenario. WAN is a network technology that connects multiple branch offices located in different geographical locations to a central corporate headquarters. It allows for the transmission of data and communication between the branch offices and the headquarters, ensuring that they remain connected at all times. LAN (Local Area Network) is a network technology that connects devices within a limited area, WLAN (Wireless Local Area Network) is a wireless version of LAN, and MAN (Metropolitan Area Network) connects devices within a city or metropolitan area, but neither of these would be suitable for connecting branch offices in different countries.
Rate this question:
40.
Which step in the troubleshooting process is important to help avoid repeating repair processes that were performed previously?
A.
Implementation of the solution
B.
Documentation of the problem and its solution
C.
Preparation of a plan of action
D.
Identification of the problem
Correct Answer
B. Documentation of the problem and its solution
Explanation The step in the troubleshooting process that is important to help avoid repeating repair processes that were performed previously is the documentation of the problem and its solution. By documenting the problem and its solution, technicians can refer back to it in the future if the same issue arises again. This helps save time and effort as they can quickly identify the problem and apply the previously successful solution. Additionally, documentation allows for better communication and collaboration among team members, ensuring that everyone is aware of the problem and its resolution.
Rate this question:
41.
Which two connectors are DVI connectors? (Choose two.)
A.
B.
C.
D.
E.
F.
Correct Answer(s)
C. D.
Explanation The two connectors that are DVI connectors are DVI-D and DVI-I. DVI-D is a digital-only connector that supports digital video signals, while DVI-I is a dual-link connector that supports both digital and analog video signals. These connectors are commonly used to connect a computer or other video source to a display device, such as a monitor or projector.
Rate this question:
42.
What are three main characteristics of a Windows 64-bit operating system? (Choose three)
A.
The 64-bit operating system memory management system enhances program performance.
B.
The 64-bit operating system can recognize more than 128 GB of RAM.
C.
The 64-bit operating system has fewer registers to manage applications.
D.
The 64-bit operating system has additional security features.
E.
The 64-bit operating system has a built-in virtualization mode.
F.
The 64-bit operating system runs on a RISC chip architecture.
Correct Answer(s)
A. The 64-bit operating system memory management system enhances program performance. B. The 64-bit operating system can recognize more than 128 GB of RAM. D. The 64-bit operating system has additional security features.
Explanation A Windows 64-bit operating system has three main characteristics. Firstly, its memory management system enhances program performance, allowing for more efficient use of system resources. Secondly, it can recognize more than 128 GB of RAM, providing support for high memory capacity systems. Lastly, it has additional security features, which help protect against various threats and vulnerabilities. These characteristics make a Windows 64-bit operating system more powerful, capable, and secure compared to a 32-bit operating system.
Rate this question:
43.
What is an example of PC virtualization?
A.
Sharing video and music files in a homegroup network
B.
Running an instance of Windows Vista from inside a Windows 7 OS
C.
Configuring a small network to allow an application to be accessed by other PCs in the office
D.
Setting up a peer-to-peer network so that a laser printer can be accessed by all workstations
Correct Answer
B. Running an instance of Windows Vista from inside a Windows 7 OS
Explanation Running an instance of Windows Vista from inside a Windows 7 OS is an example of PC virtualization. This is because virtualization allows for the creation of virtual machines, which are separate instances of an operating system running on the same physical computer. In this case, Windows 7 is the host operating system and Windows Vista is the guest operating system, running within a virtual machine. This allows for the simultaneous use of multiple operating systems on a single computer, providing flexibility and efficiency.
Rate this question:
44.
A specific computer has an issue that could not be resolved by the help desk technician. The on-site technician finds that Windows updates have been disabled. The technician re-enables the update service, configures the computer for automatic updates, downloads and installs all missing updates, ensures the computer boots successfully, and verifies with the customer that the issue has been resolved. Which step, if any, is next?
A.
Document the findings, actions, and outcomes.
B.
Establish a plan of action to resolve the problem and implement the solution.
C.
Verify full system functionality and, if applicable, implement preventive measures.
D.
Test the theory to determine the cause.
E.
No further action needed.
Correct Answer
A. Document the findings, actions, and outcomes.
Explanation After resolving the issue by re-enabling the update service, configuring the computer for automatic updates, downloading and installing missing updates, and verifying with the customer that the issue has been resolved, the next step is to document the findings, actions, and outcomes. This is important for record-keeping and future reference, as it provides a clear account of the problem, the steps taken to resolve it, and the final outcome. It also helps in tracking any patterns or recurring issues that may arise in the future.
Rate this question:
45.
A technician is designing a hardware preventive maintenance plan for a company. Which strategy should be included in the plan?
A.
Omit performing maintenance operations on components until the equipment malfunction.
B.
Schedule and document routine maintenance tasks.
C.
Avoid performing maintenance operations on plug and play devices that are controlled by the operating system.
D.
Only clean equipment that is requested by the customer.
Correct Answer
B. Schedule and document routine maintenance tasks.
Explanation The correct answer is "Schedule and document routine maintenance tasks." This strategy should be included in the hardware preventive maintenance plan because it helps ensure that regular maintenance is performed on the components and equipment. By scheduling routine maintenance tasks, the technician can proactively identify and address any potential issues before they lead to equipment malfunction or failure. Additionally, documenting the maintenance tasks helps in tracking the maintenance history, identifying patterns or recurring issues, and planning future maintenance activities effectively.
Rate this question:
46.
A helpdesk technician takes a call, “Good morning, this is the helpdesk. My name is Greg. How may I help you today?” The frantic caller states, “My computer will not turn on and I have a presentation in 15 minutes.” The technician responds, “Now calm down and let us see what we can do.” The technician then proceeds to lead the caller through the process of checking power cables and power lights. Which troubleshooting step is being used at this point?
A.
Identify the problem.
B.
Establish a plan of action to resolve the problem.
C.
Implement a solution.
D.
Verify full system functionality and, if applicable, implement preventive measures.
E.
Establish a theory of probable cause.
Correct Answer
A. Identify the problem.
Explanation The troubleshooting step being used at this point is to identify the problem. The technician is listening to the caller's issue and gathering information about the computer not turning on. By asking the caller to check power cables and power lights, the technician is trying to determine the cause of the problem. Once the problem is identified, the technician can move on to establishing a plan of action to resolve it.
Rate this question:
47.
On a computer that will not boot, which two actions are recommended in the troubleshooting process after verifying the obvious issues such as power to the computer and display, non-bootable media, and the BIOS boot order options? (Choose two.)
A.
Reinstall the operating system.
B.
Remove unnecessary peripherals.
C.
Replace computer components one at a time until the problem is solved.
D.
Reset the BIOS settings to factory default.
E.
Use the Last Known Good Configuration.
F.
Reinstall the user applications.
Correct Answer(s)
B. Remove unnecessary peripHerals. E. Use the Last Known Good Configuration.
Explanation After verifying the obvious issues, the first recommended action is to remove unnecessary peripherals. This is because sometimes incompatible or faulty peripherals can prevent the computer from booting properly. By removing them, it helps to isolate the issue and potentially resolve the problem. The second recommended action is to use the Last Known Good Configuration. This is a feature in Windows that allows the computer to start with the most recent settings that worked successfully. It can help to undo any recent changes or configurations that might be causing the booting problem.
Rate this question:
48.
Which type of standard interface allows users to connect and disconnect peripheral devices while the computer is running without having to restart?
A.
PATA
B.
SATA
C.
USB
D.
IDE
Correct Answer
C. USB
Explanation USB (Universal Serial Bus) is the correct answer because it is a standard interface that allows users to connect and disconnect peripheral devices while the computer is running without having to restart. USB ports are commonly found on computers, laptops, and other devices, and they provide a convenient and versatile way to connect various devices such as printers, keyboards, mice, external hard drives, and more. The ability to hot-plug and hot-unplug devices without restarting the computer makes USB a widely used and user-friendly interface.
Rate this question:
49.
What is the most important reason for the company that the preventive maintenance be done?
A.
Preventive maintenance helps to protect the computer equipment against future problems
B.
Preventive maintenance enables the IT manager to check on the location and state of the computer assets.
C.
Preventive maintenance provides an opportunity for junior technicians to obtain more experience in a non-threatening or problem.
D.
Preventive maintenance allows the IT department to regularly monitor the contents of user hard drives to ensure computer use policies are being followed.
Correct Answer
A. Preventive maintenance helps to protect the computer equipment against future problems
Explanation Preventive maintenance helps to protect the computer equipment against future problems by identifying and addressing potential issues before they become major problems. This proactive approach ensures that the equipment is functioning optimally and reduces the risk of unexpected breakdowns or malfunctions. By regularly maintaining and servicing the equipment, the company can prolong its lifespan, minimize downtime, and save on costly repairs or replacements. Additionally, preventive maintenance can also improve the overall performance and efficiency of the computer equipment, leading to increased productivity and user satisfaction.
Rate this question:
50.
What is the distance limitation of a single data run for UTP cabling without adding networking devices?
A.
33 ft (10 m)
B.
100 ft (31 m)
C.
330 ft (100 m)
D.
500 ft (154 m)
Correct Answer
C. 330 ft (100 m)
Explanation The correct answer is 330 ft (100 m). This is the maximum distance limitation for a single data run for UTP cabling without adding any networking devices. UTP (Unshielded Twisted Pair) cabling is commonly used for Ethernet networks, and it has a maximum distance limitation due to signal degradation over longer distances. Beyond 330 ft, the signal may weaken and result in data loss or errors. Adding networking devices such as switches or repeaters can help extend the distance of the data run.
Rate this question:
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.