Pay Attention
Don't Fail
I Forgot
I Was Sleeping
Recycle Me
100
What laptop component converts DC power to AC so that the display can illuminate?
Inverter
100
What are two operating systems that are found on mobile devices?
Android and IOS
100
A user reports that some printing jobs are not being printed. The technician checks and notices that the jobs are stuck in the printing queue. What action should the technician take to solve the problem?
Cancel the job that displays the error that is preventing the other jobs from printing
100
Which open standards-based wireless security mode supports the highest level of security?
WPA2
100
Which motherboard feature controls the amount of data that a CPU transfers at one time?
Front side bus
200
How is DSL able to carry telephone and data signals at the same time?
Each signal uses a different frequency
200
Which feature of a mobile device touchscreen will allow a user to zoom in displayed items such as maps and photographs?
Double Touch
200
A technician is troubleshooting a printer that fails to print because of constant paper jams. What should the technician try first?
Clean the printer
200
A technician is to document the current configurations of all network devices in a college, including those in off-site buildings. Which protocol would be best to use to securely access the network devices?
SSH
200
Which two interface types make it possible to attach different external components to laptops and desktops without powering the computer off?
Firewire and USB
300
A computer technician performed a number of actions to correct a problem. Some actions did not solve the problem, but eventually a solution was found. What should be documented?
Everything
300
A technician uses the shrink volume feature of the disk management utility and splits the partition. What must the technician do next in order to make use of the new space?
Partition the unallocated space
300
A user believes that a data file on a Windows XP computer has been corrupted. Which utility can provide the best information about the data file?
CHKDSK
300
A computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem?
The computer has an invalid default gateway address
300
Why do laptop computers use CPU throttling techniques?
to reduce heat
400
A user wants to upgrade components in a laptop to improve performance. Which two components can be replaced by the user?
RAM and Battery
400
A technician is troubleshooting a 4-year-old computer that takes a long time to boot, and identifies that the BIOS rediscovers all the hardware at every boot. What action would fix this problem?
Replace to CMOS Battery
400
The corporate security policy states that all remote connections use only secure tunnels for data communications. Which encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN?
VPN
400
After confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of the system?
Check for the latest OS patches and updates
400
The current IP configuration of a small company is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service would simplify the workstation IP configuration task?
DHCP
500
A user updates a device driver and reboots the system. When the user successfully logs in after the reboot, the OS displays a blue screen and crashes. The user presses the F8 key on reboot and tries to log in using the Last Known Good Configuration but gets the same result. Why will the Last Known Good Configuration not work?
The Last Known Good Configuration is overwritten with the current one on successful login
500
A technician is troubleshooting a computer that fails to print. The technician suspects that the printer driver may be outdated, proceeds to download the latest driver, and installs it. The technician attempts to print, but the problem persists. What is the next action that the technician should take?
Develop a new theory
500
What type of security attack is being launched when a hacker calls a company to obtain computer login information and pretends to be an employee
Social Engineering
500
An audit reveals company files that are stored in the personal server space of a former employee have been modified after the employee left the company. What should be done to prevent further unauthorized access to these files, while still allowing the company to use them?
Disable the account of the former employee
500
What are the four layers in the TCP/IP reference model?
application, transport, internet, network access
M
e
n
u