A+ Exam Questions


Find out how much you know about A+.

  1. Which type of laptop backlight is typically used in smaller mobile devices and consumes the least amount of power?
    1. CCFL
    2. CRT
    3. LED
    4. IPS
    5. TN

  2. What type of touch screen technology works well with almost any stylus-like object?
    1. Capacitive
    2. Human
    3. Resistive
    4. Thermal
    5. Warmth

  3. Which mode turns off all wireless connections on a mobile device?
    1. Airplane mode
    2. Connectionless mode
    3. Quiet mode
    4. Reduced Network mode
    5. Silent mode

  4. "Smart" cameras have which feature?
    1. RJ-45
    2. RS-232
    3. Separate video processor
    4. Wi-Fi
    5. Zoom

  5. Which type of mobile device is known for using electrophoretic ink?
    1. Desktop
    2. E-reader
    3. Laptop
    4. Mobile printer
    5. Video camera

  6. What is the term when using an USB cable to connect a laptop to a cellular telephone in order to use the cellular telephone wireless connection from the laptop?
    1. Cloning
    2. Hotspot
    3. Linking
    4. Phishing
    5. Tethering

  7. Which is the most famous feature of a BlackBerry smartphone?
    1. Dual screens
    2. Hardware keyboard
    3. Solaris Operating System
    4. Trackball
    5. Wi-Fi

  8. Which accessory is needed to protect a laptop from theft?
    1. Bluetooth
    2. Cable lock
    3. Docking station
    4. Secure Socket Layer
    5. Protective cover

  9. On a laptop, which display type illuminates each pixel individually, instead of using LED backlight?
    1. CCFL
    2. CRT
    3. E Ink
    4. IPS
    5. OLED

  10. Which wireless communication type has a maximum distance of about 10 centimeters?
    1. Bluetooth
    2. IR
    3. LTE
    4. NFC
    5. Wi-Fi

  11. Which laptop components are the most useful when making a video conference call?
    1. Digitizer and Inverter
    2. Digitizer and Microphone
    3. Digitizer and Webcam
    4. Inverter and Microphone
    5. Microphone and Webcam

  12. Which mobile connection type allows sharing a cellular Internet connection with a Wi-Fi enabled device?
    1. Bluetooth
    2. Hotspot
    3. IR
    4. LTE
    5. NFC

  13. Which component is responsible for providing light to the display of a laptop computer?
    1. Backlight
    2. Bluetooth
    3. Inverter
    4. LCD
    5. Screen

  14. What type of connector is shown at the right?
    1. Apple lightning
    2. Fitbit
    3. RJ-45
    4. RS-232
    5. USB

  15. Which statement is false?
    1. USB 2.0 theoretically transmit data at a maximum rate of 480 Mbps.
    2. USB 3.0 is often referred to as SuperSpeed USB.
    3. USB 3.0 theoretically transmit data at a maximum rate of 5 Gbps.
    4. USB stand for Universal Service Bus.
    5. USB type B are square with a large notch on top and are usually found on printers and other large devices.

  16. What is needed to allow a laptop to use the auxiliary power outlet found on jet airplanes?
    1. AC adapter
    2. DC adapter
    3. Docking station
    4. Power inverter
    5. USB 3.0 connector

  17. Which smart watch use the Tizen OS?
    1. Apple Watch
    2. Fossil Q
    3. Pebble Time
    4. Samsung Gear
    5. Ticwatch E

  18. When enabling hands-free cellular conversations, which wireless technology is most likely used with a headset?
    1. Bluetooth
    2. IR
    3. LTE
    4. NFC
    5. Wi-Fi

  19. Which are the most important factors when selecting a replacement for an AC adapter for a laptop?
    1. Make and model
    2. Polarity and price
    3. Polarity and size
    4. Polarity and wattage
    5. Price and size

  20. What type of the connector an iPhone uses for charging?
    1. ApplePower
    2. Lightning
    3. RJ-45
    4. USB-B
    5. USB-C

  21. What is the minimum number of GPS satellites a mobile device needs to contact in order to determine location and elevation?
    1. 1
    2. 2
    3. 3
    4. 4
    5. 5

  22. What type of laptop display technology has a wide viewing angle?
    1. CCFL
    2. In-Plane Switching
    3. LED
    4. LTE
    5. Twisted Nematic

  23. Which statement is false?
    1. Android Wear is now called Wear OS.
    2. It is impossible to update the operating system of a smart watch.
    3. Pebble smart watches use color e-paper displays.
    4. Tizen is an operating system for smart watches based on Linux.
    5. WatchOS was is similar to iOS.

  24. What is the maximum throughput of a MacBook Pro with a Thunderbolt 3 port?
    1. 10 Gbps
    2. 20 Gbps
    3. 30 Gbps
    4. 40 Gbps
    5. 50 Gbps

  25. what are the two most common form factors for laptop hard drives?
    1. 1.1 inch and 2.1 inch
    2. 1.3 inch and 2.1 inch
    3. 1.8 inch and 2.1 inch
    4. 1.8 inch and 2.5 inch
    5. 2.1 inch and 3.1 inch

  26. At what speed does a Mini PCIe USB 2.0 expansion card run?
    1. 120 Mbps
    2. 240 Mbps
    3. 360 Mbps
    4. 480 Mbps
    5. 960 Mbps

  27. Which laptop component can take input from a stylus and convert it into an image on a computer?
    1. Digitizer
    2. Inverter
    3. Mouse pad
    4. Point stick
    5. Touch pad

  28. Which type of wearable device is specifically designed to track movement, heart rate and may also include a GPS?
    1. Fitness monitor
    2. Smart glasses
    3. Smart headset
    4. Smart monitor
    5. Smart watch

  29. What is the storage capacity of an NFC tag that can be found in advertising posters?
    1. 8 KBytes
    2. 48 KBytes
    3. 4 MBytes
    4. 8 MBytes
    5. 48 MBytes

  30. Which accessory would make a tablet computer most like a gaming console?
    1. Docking station
    2. Game pad
    3. Ink pad
    4. Point stick
    5. Touch pad

  31. What is the name of the expansion port technology developed by Apple that supports a wide variety of peripheral devices?
    1. iPort
    2. Lightning
    3. PATA
    4. SATA
    5. Thunderbold

  32. Which type of connection technology enables credit card payments from a smart watch?
    1. Bluetooth
    2. IR
    3. LTE
    4. NFC
    5. Wi-Fi

  33. Which laptop component stores and converts energy and has the potential to discharge that energy?
    1. Backlight
    2. Bluetooth
    3. Inverter
    4. LCD
    5. LED

  34. If a laptop uses DDR3 SODIMMs, how many pins will be in the SODIMM?
    1. 144
    2. 200
    3. 204
    4. 240
    5. 248

  35. Which is the fastest type of hard drive?
    1. External
    2. Hybrid
    3. Magnetic
    4. SCSI
    5. SSD

  36. Which type of mobile connections uses a process called pairing, which is a process of discovery and authentication, to logically connect two devices?
    1. Bluetooth
    2. IR
    3. NFC
    4. Thunderbolt
    5. Wi-Fi

  37. What size are tablet computers that feature touch screens?
    1. Between 3 inches and 5 inches.
    2. Between 4 inches and 6 inches.
    3. Between 5 inches and 7 inches.
    4. Between 7 inches and 12 inches.
    5. Between 12 inches and 20 inches.

  38. Which mobile device makes use of an augmented reality display?
    1. Bluetooth
    2. Smart camera
    3. Smart glasses
    4. Smartphone
    5. Smart watch

  39. Which type of laptop backlight does not normally require the use of an inverter?
    1. CCFL
    2. IPS
    3. LCD
    4. LED
    5. TN

  40. What needs to be done to connect to a laptop without a wired network connection to a network that has no wireless connection?
    1. Install a MiniPCIe network card with an RJ-45 port.
    2. Install an USB to Bluetooth dongle.
    3. Install an USB to NFC dongle.
    4. Install an USB to RJ-45 dongle.
    5. Install an USB to Wi-Fi dongle.

  41. What type of mobile device would use the connector shown at the right?
    1. Apple iPhone X
    2. Fitbit
    3. Huawei
    4. Motorola Moto
    5. Samsung Galaxy

  42. What is the dimensions of a full size Mini PCIe card?
    1. 20 mm wide and 27 mm long
    2. 30 mm wide and 27 mm long
    3. 30 mm wide and 51 mm long
    4. 37 mm wide and 51 mm long
    5. 51 mm wide and 60 mm long

  43. On a laptop that has shared video memory, what is the best option for increasing the video display performance for when video games are played on the laptop?
    1. Add a new video controller.
    2. Install additional video memory.
    3. Upgrade the video card.
    4. Use the system BIOS to increase the amount of video memory available.
    5. Use the Windows Control Panel to increase the amount of video memory available.

  44. Which server would be a central repository for company documents and provide shared file storage on an internal network?
    1. Authentication server
    2. File server
    3. FTP server
    4. Proxy server
    5. Web server

  45. How many pins does a Mini PCIe connector have?
    1. 52
    2. 100
    3. 144
    4. 200
    5. 240

  46. What type of connector is shown at the right?
    1. Apple lightning
    2. Mini PCIe
    3. RJ-45
    4. RS-232
    5. USB

  47. Which wireless communication methods are the least susceptible to hacking?
    1. Bluetooth and IR
    2. Bluetooth and NFC
    3. IR and NFC
    4. IR and Wi-Fi
    5. NFC and Wi-Fi

  48. Which magnetic hard drive parameter do manufactures modify to increase hard drive data transfer rates?
    1. Connector size
    2. Connector speed
    3. Platter size
    4. Read/write head size
    5. Spin rate

  49. Which is a short distance, line of sight, point to point communication method, usually used to transfer small amounts of data from one device to another?
    1. Bluetooth
    2. Lightning
    3. IR
    4. NFC
    5. Wi-Fi

  50. Which solution will allow a person to use one device to walk around a factory floor with the device and type notes on it?
    1. Get a laptop with a rotating or removable screen.
    2. Get a tablet computer to synchronize with a laptop.
    3. Get a very small tablet computer to synchronize with a laptop.
    4. Install multiple docking stations for the laptop computer on the factory floor.
    5. Use Bluetooth to communicate with a laptop.

  51. What is the next step after enabling a device for communication using the IEEE 802.15.1 standard?
    1. Enter the IMAP4 server name and port number.
    2. Enter the PIN code.
    3. Enter the POP3 server name and port number.
    4. Finding a device to pair up.
    5. Opening the firewall for 802.15.1 traffic.

  52. Which mail protocol keeps all e-mail messages stored on a single device and can only be accessible from one device?
    1. IMAP4
    2. MUA
    3. POP3
    4. SMTP
    5. S/MIME

  53. Which mail protocol keeps all e-mail messages stored on the server and allowing messages to be synchronized between multiple devices?
    1. IMAP4
    2. MUA
    3. POP3
    4. SMTP
    5. S/MIME

  54. Which protocol is used for sending digitally signed e-mail?
    1. IMAP4
    2. MUA
    3. SMTP
    4. SNMP
    5. S/MIME

  55. Which is the Apple service that permits subscribers to store documents, media, and contact information off their devices?
    1. BackCloud
    2. CloudStore
    3. iCloud
    4. iPhone
    5. iStore

  56. What information is needed to set up e-mail on a device?
    1. Active Directory domain name
    2. Active Directory domain name and IP address
    3. DNS server IP address
    4. Mail server IP address
    5. Port number and SSL settings

  57. What type of update is done to mobile devices over the air?
    1. Dynamic Host Configuration Protocol and International Mobile Equipment Identity
    2. Dynamic Host Configuration Protocol and International Mobile Subscriber Identity
    3. International Mobile Equipment Identity and International mobile Subscriber Identity
    4. Mobile devices are never updated over the air.
    5. Preferred Roaming List and Product Release Instructions

  58. What number is hard coded into a smartphone to identify the smartphone to cellular towers?
    1. IMEI
    2. IMSI
    3. MAC
    4. PRI
    5. PRL

  59. In a country that employs content blocking technology on cellular networks, which is the best option to keep mobile browsing more private?
    1. HTTPS
    2. PKI
    3. PRI
    4. S/MIME
    5. VPN

  60. Which statement is false?
    1. It is possible to synchronize documents, music, pictures, and video, across devices.
    2. Microsoft Active Directory is required for synchronization across Windows platforms.
    3. Synchronization can be done to a local desktop computer, to the cloud, or to an automobile.
    4. Synchronizing calendars between devices and users is an easy way to ensure all parties have the same information.
    5. Synchronization keeps multiple copies of a dataset in coherence with one another.

  61. What should be done before starting to install a new software application on an older system?
    1. Check the MAC address.
    2. Expand storage capacity on the system.
    3. Record the serial number of the CPU.
    4. Record the software license number.
    5. Verify the software requirements for the new application.

  62. Which network devices receive network traffic and decide on whether to send it on based on the destination hardware address?
    1. Access point
    2. Access port
    3. Bridge
    4. Hub
    5. Repeater

  63. Which statement is false?
    1. Bridges are able to move data across multiple networks simultaneously.
    2. Bridges are aware of the hardware (MAC) address.
    3. Bridges are similar to, but more intelligent than, repeaters.
    4. Bridges create a single aggregate network from multiple communication networks or network segments.
    5. Bridges work on the Data Link layer.

  64. When a splitter is installed on a network that has CAT6e cable, what is the maximum speed supported?
    1. 100 Kbps
    2. 1 Mbps
    3. 10 Mbps
    4. 100 Mbps
    5. 512 Mbps

  65. Which tool should be used to troubleshoot a network adapter?
    1. Cable tester
    2. Loopback meter
    3. Loopback plug
    4. Tone generator and probe
    5. Voltage meter

  66. Which statement is true?
    1. MMF has more capacity to gather light than SMF.
    2. MMF is limited to distances of 5 meters or less.
    3. MMF is used for long distance communication.
    4. SMF is limited to distances of 500 meters or less.
    5. SMF is typically a lower cost solution than MMF.

  67. Which TCP/IP protocol was designed to replace telnet?
    1. FTP
    2. ICMP
    3. SFTP
    4. SMB
    5. SSH

  68. Which of the following network connectivity devices operate at Layer 1 of the OSI model?
    1. Bridge and router
    2. Bridge and switch
    3. Extender and hub
    4. Hub and router
    5. Hub and switch

  69. What number is hard coded into a SIM card of a smartphone to identify the owner of the smartphone to cellular towers?
    1. IMEI
    2. IMSI
    3. NAC
    4. PRI
    5. PRL

  70. What is the function of the subnet mask in IPv4?
    1. It determines which subnet the host is on.
    2. It differentiates between the host ID and the network ID.
    3. It masks external networks from the host.
    4. It masks the host from external networks.
    5. It tells hosts where to route packets.

  71. Which protocol allow the user to log onto another computer, and in text mode, allow the user to edit and manage files as if they were locally logged on the computer?
    1. ICMP
    2. IP
    3. TCP
    4. Telnet
    5. UDP

  72. Which protocol is responsible for delivering error messages if communication between two computers fails?
    1. ICMP
    2. IP
    3. PDP
    4. TCP
    5. UDP

  73. A CIDR shorthand notation of /26 corresponds to which subnet mask?
    1. 255.255.0.0
    2. 255.255.255.0
    3. 255.255.255.128
    4. 255.255.255.192
    5. 255.255.255.240

  74. Which Wi-Fi standard specifies a maximum of 54 Mbps transmissions in the 2.4 GHz frequency range?
    1. 802.11a
    2. 802.11b
    3. 802.11g
    4. 802.11n
    5. 802.15.1

  75. Telnet uses which port number?
    1. 21
    2. 22
    3. 23
    4. 25
    5. 443

  76. Which tool is designed to test how far a wireless signal travels?
    1. Packet sniffer
    2. Port mapper
    3. Protocol analyzer
    4. Tone generator and probe
    5. Wi-Fi analyzer

  77. Which TCP/IP protocol is responsible for resolving physical MAC addresses to logical IP addresses?
    1. ARP
    2. ICMP
    3. IP
    4. RARP
    5. UDP

  78. Which type of IPv6 address identifies a single node on the network?
    1. Anycast
    2. Broadcast
    3. Localcast
    4. Multicast
    5. Unicast

  79. What port does the SSH protocol use?
    1. 21
    2. 22
    3. 23
    4. 25
    5. 443

  80. Which network connectivity device does not forward broadcast messages, thereby creating multiple broadcast domains?
    1. Bridge
    2. Hub
    3. Repeater
    4. Router
    5. Switch

  81. Before installing a fiber optic cable through a conduit between buildings, what should be used to ensure the cable is working properly?
    1. Cable tester
    2. Loopback meter
    3. Loopback plug
    4. Tone generator and probe
    5. Voltage meter

  82. What type of cable should be used to extend the network 300 meters?
    1. CAT5
    2. CAT5e
    3. CAT7
    4. MMF
    5. UTP

  83. What port number must be open in order to download external e-mail?
    1. 23
    2. 25
    3. 110
    4. 443
    5. 563

  84. What type of cable is immune to electronic eavesdropping?
    1. Coaxial
    2. Copper wire
    3. Fiber optic
    4. Shielded twisted pair
    5. Unshielded twisted pair

  85. Which networking device is designed to block malicious data from entering the network?
    1. Bridge
    2. Firewall
    3. Hub
    4. Repeater
    5. Switch

  86. What type of connector is shown at the right?
    1. RJ-45
    2. RS-232
    3. SMF
    4. VGA
    5. USB

  87. What port number is for the Remote Desktop Protocol?
    1. 25
    2. 443
    3. 563
    4. 995
    5. 3389

  88. Which networking device is capable of reading IP addresses and forwarding packets based on the destination IP address?
    1. Bridge
    2. Hub
    3. Repeater
    4. Router
    5. Switch

  89. What type of signal are carried by the cables shown at the right?
    1. Bluetooth
    2. RFID signal
    3. Satellite television signal
    4. YPbPr analog component video
    5. YPbPr digital signal

  90. What is the typical method for IoT device configuration to connect to the wireless network?
    1. DHCP
    2. DNS
    3. HTTPS
    4. PPP
    5. SLP

  91. At what frequencies does Bluetooth transmit data via low-power radio waves?
    1. Between 1.102 GHz and 1.280 GHz
    2. Between 2.402 GHz and 2.480 GHz
    3. Between 4.202 GHz and 4.840 GHz
    4. Between 4.840 GHz and 4.960 GHz
    5. Between 6.240 GHz and 6.488 GHz

  92. Which is the equivalent IPv4 of the IPv6 link local address in the range of FE80::/10?
    1. 0.0.0.0
    2. 10.0.0.0/64
    3. 169.254.0.0/16
    4. 255.255.0.0/16
    5. 255.255.255.0/64

  93. What server is between the protected, controlled network and the public Internet, functioning as a gatekeeper of traffic?
    1. DNS server
    2. File server
    3. FTP server
    4. Proxy server
    5. Web server

  94. What is the correct subnet mask for configuring network hosts with static IP addresses, using a class B network address?
    1. 0.0.0.0
    2. 255.0.0.0
    3. 255.255.0.0
    4. 255.255.255.0
    5. 255.255.255.255

  95. Which port is accessed when accessing a server using FTP?
    1. 21
    2. 22
    3. 23
    4. 25
    5. 80

  96. Which is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an IP network?
    1. DHCP
    2. DNS
    3. ICMP
    4. ICMPv6
    5. LDAP

  97. Which tool should be used to attach several network cables to a 110 block in a wiring closet?
    1. Cable splicer
    2. Cable stripper
    3. Cable tester
    4. Crimper
    5. Punchdown tool

  98. Which is the equivalent IPv4 of the IPv6 local address of ::/1?
    1. 10.0.0.1
    2. 127.0.0.1
    3. 169.254.0.1
    4. 192.168.0.1
    5. 255.255.255.255

  99. Which statement is true?
    1. Each IPv6 interface can have only one address.
    2. Each IPv6 interface is required to have a link local address.
    3. IPv6 addresses are fully compatible with IPv4 networks.
    4. IPv6 does not use broadcasts.
    5. IPv6 uses 64 bit addresses.

  100. Which of the following network connectivity devices operate at Layer 2 of the OSI model?
    1. Bridge and hub
    2. Bridge and router
    3. Bridge and switch
    4. Hub and repeater
    5. Hub and router

  101. Which allows traffic to enter a network on a specific port after a computer inside the network makes a request on that specific port?
    1. Network Address Translation
    2. Port forwarding
    3. Port request
    4. Port servicing
    5. Port triggering

  102. Which tool should be used to identify which cable goes to which network when there are many unlabeled UTP cables?
    1. Cable tester
    2. Loopback meter
    3. Loopback plug
    4. Tone generator and probe
    5. Voltage meter

  103. Which protocol is responsible for dynamically assigning IP addresses to client computers?
    1. ARP
    2. DHCP
    3. DNS
    4. ICMP
    5. LDAP

  104. Which port is does SMTP use?
    1. 25
    2. 80
    3. 110
    4. 993
    5. 995

  105. Which IEEE standard should be used when setting up a Wi-Fi network using an omnidirectional antennae for the greatest distance?
    1. 802.11a
    2. 802.11b
    3. 802.11c
    4. 802.11g
    5. 802.11n

  106. Which tool should be used to troubleshoot an intermittently failing CAT7 network connection?
    1. Cable tester
    2. Crimper
    3. Multimeter
    4. Tone generator and probe
    5. Voltage meter

  107. Which statement is false?
    1. In the United States of America, 802.11b and 802.11g use the 2.4 GHz ISM band.
    2. The 802.11 family consists of a series of half-duplex over-the-air modulation techniques that use the same basic protocol.
    3. The 802.11 protocols are not compatible with Ethernet.
    4. The 802.11 standard provides the basis for wireless network products using the Wi-Fi brand.
    5. The segment of the radio frequency spectrum used by 802.11 varies between countries.

  108. Which statement is false?
    1. 802.11g has a maximum throughput of 54 Mbps.
    2. 802.11g hardware is fully backwards compatible with 802.11b hardware.
    3. 802.11g is the third modulation standard for wireless local area networks.
    4. 802.11g operates in the same frequency band as 802.11b.
    5. 802.11n devices typically have a shorter range than 802.11b/g devices.

  109. Which port does IMAP4 over SSL use?
    1. 25
    2. 80
    3. 443
    4. 563
    5. 993

  110. Which is a digital, point to point network, capable of maximum transmission speeds of up to 2 Mbps, although 128 Kbps are more common?
    1. ADSL
    2. DSL
    3. Ethernet
    4. ISDN
    5. NFAS

  111. Which type of network spans multiple buildings, but is confined to a small geographical area?
    1. CAN
    2. LAN
    3. MAN
    4. PAN
    5. WAN

  112. Which shorthand notation corresponds to the CIDR subnet mask 255.255.224.0?
    1. /19
    2. /20
    3. /21
    4. /22
    5. /24

  113. Which protocol is the default file and print sharing protocol on Windows computers?
    1. CIFS
    2. FTP
    3. LDAP
    4. SMB
    5. TFTP

  114. Which statement is true?
    1. All hosts on a network must have a default gateway.
    2. All hosts on a network must have an unique gateway.
    3. All hosts on a network must have an unique IP address.
    4. All hosts on a network must have an unique subnet mask.
    5. All hosts on a network must know their gateway subnet mask.

  115. Which port does traffic travel on when connecting to a Web site that encrypts the connection using TLS?
    1. 22
    2. 25
    3. 80
    4. 443
    5. 563

  116. What type of printer is associated with the process shown at the right?
    1. Dot matrix
    2. Impact
    3. Inkjet
    4. Laser
    5. Thermal

  117. Which is the fastest data throughput of a dial-up modem?
    1. 14 Kbps
    2. 28 Kbps
    3. 56 Kbps
    4. 1.4 Mbps
    5. 14 Mbps

  118. Which is the best option for broadband Internet access in a remote location away from electrical lines?
    1. ADSL
    2. DSL
    3. Ethernet
    4. ISDN
    5. Satellite

  119. Which protocol is connection oriented and attempts to guarantee packet delivery?
    1. ICMP
    2. IP
    3. PDP
    4. TCP
    5. UDP

  120. Which statement is false?
    1. A packet transmitted in a connectionless mode is called a telegram.
    2. IP is the principal communications protocol for relaying datagrams across network boundaries.
    3. SNMP uses UDP as its transport protocol.
    4. UDP is designed to stream data.
    5. VoIP uses UDP.

  121. A CIDR shorthand notation of /24 corresponds to which subnet mask?
    1. 255.255.0.0
    2. 255.255.255.0
    3. 255.255.255.128
    4. 255.255.255.224
    5. 255.255.255.240

  122. Which statement is true?
    1. A native VLAN automatically receives all untagged frames.
    2. In order to allow communication between VLANs to exchange of data, a hub must be used.
    3. Network segmentation decreases both performance and security on a network.
    4. Only Class B and Class C networks can be subnetted.
    5. The first 128 bits of an IPv6 address are known as the routing prefix.

  123. Which server is accessed each time it is necessary to validate an user's credentials in order to access resources on the network?
    1. Authentication server
    2. DNS server
    3. File server
    4. FTP server
    5. Proxy server

  124. Which port enables Internet access using an URL instead of an IP address?
    1. 25
    2. 53
    3. 80
    4. 443
    5. 563

  125. Which IEEE standards will provide wireless transmission rates of 100 Mbps or or better for a local area network?
    1. 802.11ae and 802.11b
    2. 802.11ae and 802.11g
    3. 802.11ae and 802.11n
    4. 802.11b and 802.11g
    5. 802.15.1

  126. Which legacy network protocol allows a NetBIOS dependent computer application to communicate over TCP/IP?
    1. BGP
    2. IPX
    3. NetBT
    4. NetWare
    5. SFX

  127. Which networking protocol allows systems to to discover local systems and other devices?
    1. DHCP
    2. DNS
    3. HTTPS
    4. PPP
    5. SLP

  128. What would be the most cost effective solution to having to configure network devices on a company network spanning several cities?
    1. Employ a cloud based network controller.
    2. Go to a flat network.
    3. Hire interns in each city.
    4. Hire network administrators in each city.
    5. Use Telnet to monitor all systems remotely.

  129. What is the maximum distance allowed between a power over Ethernet injector and the Ethernet device?
    1. 100 meters
    2. 200 meters
    3. 300 meters
    4. 400 meters
    5. 500 meters

  130. What type of network is most commonly associated with Bluetooth devices?
    1. CAN
    2. LAN
    3. MAN
    4. PAN
    5. WAN

  131. Which method is effective in defining how a firewall allows inbound access when the approved devices very rarely changes?
    1. Dynamic DHCP
    2. Dynamic DNS
    3. MAC filtering
    4. Static DNS
    5. Whitelist

  132. Which firewall rule technique allows only a known list of applications or traffic as legitimate?
    1. Dynamic list
    2. List filtering
    3. MAC filtering
    4. Static list
    5. Whitelist

  133. What type of connector is shown at the right?
    1. Coaxial
    2. Fiber optic
    3. RJ-11
    4. RJ-45
    5. RS-232

  134. Which is a connectionless protocol?
    1. FTP
    2. TCP
    3. PPP
    4. SSH
    5. UDP

  135. What type of connector is shown at the right?
    1. DVI-I Dual-Link
    2. HDMI
    3. RJ-45
    4. RS-232
    5. VGA

  136. Which communication technology allows for low power, close proximity, passive reading of a small tag or patch on an object?
    1. Bluetooth
    2. IR
    3. LTE
    4. NFC
    5. RFID

  137. Which server is used to resolve domain names to IP addresses to facilitate Web browsing or becoming a directory resource on the network?
    1. DNS server
    2. File server
    3. FTP server
    4. Proxy server
    5. Web server

  138. What is the term for a network in which there are no dedicated servers?
    1. Connected network
    2. Peer to peer
    3. Star
    4. Switched network
    5. Wide area network

  139. What type of service monitors network traffic or host system behavior to identify suspected activity?
    1. Authentication server
    2. DNS server
    3. IDS
    4. Proxy server
    5. UPS

  140. What type of server records all system generated messages by servers and network devices?
    1. Authentication server
    2. DNS server
    3. Print server
    4. Proxy Server
    5. Syslog server

  141. What is an unified threat management system?
    1. It acts as a proxy server.
    2. It is an integration of multiple security services in a single device.
    3. It lists all threats to the system.
    4. It unifies all threats.
    5. It unifies all authentication logs.

  142. Which type of server will control access to all user devices based on policy and users meeting a certain criteria?
    1. End point management server
    2. Perimeter authentication server
    3. Proxy server
    4. RADIUS server
    5. SFTP server

  143. Which network segmentation technique reduces broadcast domains?
    1. BGP
    2. Bridges
    3. EIGRP
    4. VLAN
    5. VPN

  144. Which will ensure that network traffic is encrypted from endpoint to endpoint?
    1. BGP
    2. EIGRP
    3. Proxy server
    4. VLAN
    5. VPN

  145. Which are the three types of nodes found on wireless mesh networks?
    1. Client, Gateway, Router
    2. Client, Gateway, Server
    3. Client, Router, Server
    4. Gateway, Router, Server
    5. Proxy, Router, Server

  146. Which twisted pair connectors are commonly used for a telephone?
    1. Coaxial
    2. FC
    3. RJ-11
    4. RJ-45
    5. RS-232

  147. Which wireless networking protocol is expected to reach transmission speeds of 1 Gbps?
    1. 1G
    2. 2G
    3. 3G
    4. 4G
    5. 5G

  148. Which server would be where public information about a company's values, purpose, products and services be stored?
    1. DNS server
    2. File server
    3. FTP server
    4. Proxy server
    5. Web server

  149. Which motherboard form factor measures 6.7 inches by 6.7 inches?
    1. Micro-ITX
    2. Mini-ITX
    3. Mobile-ITX
    4. Nano-ITX
    5. Pico-ITX

  150. Over copper wire, FireWire 800 is limited to 4.5 meters, but what distance can it span over fiber optic cable?
    1. 100 meters
    2. 200 meters
    3. 300 meters
    4. 400 meters
    5. 800 meters

  151. Which type of LCD monitor has the fastest response time?
    1. CRT
    2. IPS
    3. LED
    4. Plasma
    5. TN

  152. Which computer peripheral is most likely to use a mini-DIN 6 connector?
    1. Hard drive
    2. Joystick
    3. Keyboard
    4. Monitor
    5. Sound card

  153. What type of storage device is composed of a conventional hard drive and a substantial amount of solid state storage?
    1. HDD
    2. Hybrid
    3. Mesh
    4. SCSI
    5. SSD

  154. What is the risk of loading paper which is thicker than what is recommended into the paper tray?
    1. Ink will smear on the paper.
    2. Paper will jam.
    3. Paper will not feed.
    4. Paper will not print.
    5. Printer will short circuit.

  155. Which service will allow sharing of printers on a network with clients running different operating systems?
    1. AirPrint
    2. Bonjour
    3. TCP printing
    4. UDP printing
    5. Virtual printing

  156. Which connector type is typically found at the end of a CAT6e cable?
    1. BNC
    2. FC
    3. RJ-45
    4. RS-232
    5. SATA

  157. Which statement is false?
    1. Cat 5 cable and Cat 6 cable utilize the same end piece, using a RJ-45 connector.
    2. Cat 5 cable is used in structured cabling for computer networks such as Ethernet over twisted pair.
    3. Cat 6 cable enables 10 Gigabit Ethernet data rates over a single cable run up to 100 meters.
    4. Cat 6 cable is backward compatible with the Cat 5/5e and Cat 3 cable standards.
    5. When used for 10/100/1000BASE-T, the maximum allowed length of a Cat 6 cable is 100 meters.

  158. Which statement is false?
    1. Thermal paper often a roll of paper as opposed to individual sheets of paper.
    2. Thermal printers consume little power, making them ideal for portable and retail applications.
    3. Thermal printers print more quietly and usually faster than impact dot matrix printers.
    4. Thermal printing is an electrostatic digital printing process.
    5. Thermal transfer printing is done by melting wax within the print heads of a specialized printer.

  159. Which statement is true?
    1. Impact printers use impact cartridges.
    2. Inkjet printers use toner cartridges.
    3. Laser printers use ink cartridges.
    4. Laser printers use ink ribbons.
    5. Thermal printers heat up paper to produce images.

  160. Which statement is true regarding the imaging drum of a laser printer?
    1. It can hold a charge only when it is exposed to light.
    2. It can hold a charge only when it is not exposed to light.
    3. It can hold a charge regardless of light exposure.
    4. It does not hold a charge.
    5. Need to be replaced after printing 1000 pages.

  161. Which motherboard form factor measures 9.6 inches by 9.6 inches?
    1. Micro-ATX
    2. Mini-ATX
    3. Mobile-ITX
    4. Nano-ITX
    5. Pico-ITX

  162. Which statement is false?
    1. Aspect ratio the ratio of width to height of the screen.
    2. Frame rate is how many frames per second the original content was filmed.
    3. Interlaced video consumes twice the bandwidth of non-interlaced video.
    4. Refresh rate is how many times per second the screen is redrawn.
    5. Resolution is the number of pixels used to draw a computer screen.

  163. How much storage space is there on a RAID 5 system with three hard disks, each 2 TBytes in size?
    1. 2 TBytes
    2. 3 TBytes
    3. 4 TBytes
    4. 5 TBytes
    5. 6 TBytes

  164. Which most accurately describes the function of the execute disable bit?
    1. It prevents BIOS software from execute.
    2. It prevents the CPU from working if the computer is stolen.
    3. It prevents the CPU from working if there is overclocking of the CPU.
    4. It prevents the computer from booting remotely in a PXE boot environment.
    5. It prevents the computer from executing certain types of viruses and malware.

  165. Which connectors transmit analog signals?
    1. DVI and HDMI
    2. DVI and RJ-45
    3. HDMI and RJ-45
    4. HDMI and TMDS
    5. RJ-11 and VGA

  166. What type of connector is shown at the right?
    1. DVI-I Dual-Link
    2. HDMI
    3. RJ-45
    4. RS-232
    5. VGA

  167. An external projector is plugged into a laptop using the VGA port on the back of the laptop. The Fn key is pressed to toggle the video switch. The projector displays the presentation, but the laptop screen goes dark. What needs to be done to see the presentation on both the projector and the laptop?
    1. Go into the Windows Control Panel and reset the video display.
    2. Install a second video driver and then use the video toggle key to switch the video output to both screens.
    3. Unplug the projector and plug it back in to synchronize it with the laptop.
    4. Press the video toggle key again until the presentation is shown on both screens.
    5. Unplug the projector, press the video toggle key to switch the video output, and then plug it back in to synchronize it with the laptop.

  168. During which step of the laser printer imaging process does a fluorescent lamp discharge the photosensitive drum?
    1. Charging
    2. Cleaning
    3. Developing
    4. Exposing
    5. Instantiation

  169. Which laptop monitor technology uses a current of electricity to stimulate a sealed panel of inert gas?
    1. CRT
    2. LCD
    3. LED
    4. OLED
    5. Plasma

  170. A what rate does a single lane PCIe 4.0 operate?
    1. 1 Gbps
    2. 2 Gbps
    3. 3 Gbps
    4. 4 Gbps
    5. 5 Gbps

  171. When replacing a power supply on a desktop computer, which are the two most important specifications to consider?
    1. Dual rail and dual voltage options.
    2. Dual rain and voltage.
    3. Number of connectors and voltage.
    4. Number of connectors and wattage.
    5. Voltage and wattage.

  172. What is advantage of using double-sided memory over single-sided memory?
    1. Accessing twice as much memory at the same time.
    2. Compatibility with newer motherboards.
    3. Increased battery efficiency.
    4. Memory operates twice as fast.
    5. Twice the memory in the same amount of space.

  173. What are the speeds at which PCI expansion buses can operate on a desktop computer?
    1. 33 MHz and 66 MHz
    2. 33 MHz and 133 MHz
    3. 66 MHz and 133 MHz
    4. 133 MHz and 166 MHz
    5. 133 MHz and 267 MHz

  174. What is the best option to limit the viewing angle of computer monitors?
    1. Install anti-glare filter.
    2. Install privacy filter.
    3. Lower the brightness setting.
    4. Lower the contrast setting.
    5. Turn off the monitor.

  175. What type of connector is shown at the right?
    1. DVI-I Dual-Link
    2. HDMI
    3. RS-232
    4. VGA
    5. USB 3.0

  176. A new OLED monitor is plugged into a new computer and has a 1920 x 1080 resolution. The screen resolution is changed to 1920 x 1200, and the images on the screen look highly distorted. What is the most like cause of this?
    1. The CPU does not support the 1920 x 1200 resolution.
    2. The monitor has a native resolution of 1920 x 1080.
    3. The monitor is plugged into the wrong monitor interface.
    4. The video adapter has a native resolution of 1920 x 1080.
    5. The video driver does not support the 1920 x 1200 resolution.

  177. Which are advantages of liquid cooled CPU over an air cooled system?
    1. Easy to install and easier to maintain
    2. Easy to install and faster
    3. Easy to install and less expensive
    4. Faster and safer
    5. More efficient and quieter

  178. Which components are found on an impact printer, but are not found on an inkjet printer?
    1. Ink cartridge and input tray.
    2. Ink cartridge and output tray.
    3. Ink cartridge and ribbon.
    4. Print head and tractor feed mechanism.
    5. Ribbon and toner cartridge.

  179. Which expansion bus technology uses lanes, which are switched point-to-point signal paths between two components?
    1. Bluetooth
    2. HDMI
    3. Mini PCI
    4. PCI
    5. PCIe

  180. Which would be the best type of computer for a machine shop that does not need to run any local applications or its own hard drive, but need to connect to the machine shop server?
    1. Thick client
    2. Thin client
    3. CAD/CAM workstation
    4. CNC machine
    5. Virtualization workstation.

  181. Which allows the user to reboot the computer from a cold startup point without removing power from the components?
    1. On/off button
    2. Power button
    3. Reboot button
    4. Reset button
    5. Suspend button

  182. Which type of LCD panel is considered to have the best color representation at wider angles of viewing?
    1. IPS
    2. LED
    3. Kodachrome
    4. Monochrome
    5. Plasma

  183. Which two components will allow for sharing videos on a home network while protecting data in the event of a hard disk failure?
    1. ADSL and dual processor CPU
    2. Dual processor CPU and intrusion detection software
    3. Dual processor CPU and Wi-Fi network
    4. Gigabit NIC and RAID array
    5. Intrusion detection software and Wi-Fi network

  184. Which system component enables the use of Secure Boot technology?
    1. BIOS
    2. LILO
    3. SATA
    4. S/MIME
    5. UEFI

  185. Which statement is false?
    1. Dot matrix printers are impact printers.
    2. Dot matrix printers have a ribbon and print head.
    3. Inkjet printers use continuous feed paper.
    4. Laser printers use toner.
    5. Laser printing is an electrostatic digital printing process.

  186. Which statement is true?
    1. DDR has 72 pins
    2. DDR 2 has 72 pins
    3. DDR 3 has 72 pins
    4. DDR 4 SODIMM has 184 pins
    5. DDR 4 SODIMM has 260 pins

  187. Which CPU technology allows for the assignment of two logical cores for every physical core present?
    1. Hyperprocessing
    2. Hyperthreading
    3. Integrated GPU
    4. Multicore
    5. Multimedia

  188. Which type of flash memory is capable of being embedded on the circuit board of mobile devices?
    1. eMMC
    2. MicroSD
    3. MiniSD
    4. SIMM
    5. xD

  189. In an inkjet printer, which are responsible for moving the print head into the proper position?
    1. Belt and carriage motor
    2. Belt and roller
    3. Belt and roller motor
    4. Belt motor and roller motor
    5. Carriage and roller motor

  190. Which two upgrades to a computer would be most useful in creating videos?
    1. CPU and memory
    2. CPU and NIC
    3. Hard drive and video card
    4. Memory and microphone
    5. Memory and NIC

  191. Which motherboard form factor measures 12 inches by 9.6 inches?
    1. ATX
    2. Mini-ATX
    3. Mobile-ITX
    4. Nano-ITX
    5. Pico-ITX

  192. Which is the most likely connector found on an analog monitor?
    1. BNC
    2. HDMI
    3. RCA
    4. USB
    5. VGA

  193. What is the name of he measure that specifies how many times an image can be redrawn on a computer screen in one second?
    1. Aspect ratio
    2. Clock cycle
    3. Frame rate
    4. Native resolution
    5. Refresh rate

  194. What is the data bandwidth of a Thunderbolt connection?
    1. 10 Gbps
    2. 20 Gbps
    3. 30 Gbps
    4. 40 Gbps
    5. 50 Gbps

  195. When heated, what is the approximate temperature of the fuser inside a laser printer?
    1. 150° F
    2. 250° F
    3. 350° F
    4. 450° F
    5. 550° F

  196. Which is the correct order of steps for laser printer?
    1. Charging, processing, exploring, developing, transmitting, fusing, and clearing.
    2. Charging, processing, exposing, developing, transferring, fusing, and cleaning.
    3. Processing, charging, exposing, developing, fusing, transferring, and cleaning.
    4. Processing, charging, exposing, developing, transferring, fusing, and cleaning.
    5. Processing, charging, fusing, exposing, developing, transferring, and cleaning.

  197. What are the power requirements that a PCI expansion bus may have inside a desktop computer?
    1. 1.7 volts and 3.3 volts
    2. 3.3 volts and 5 volts
    3. 5 volts and 9 volts
    4. 6 volts and 9 volts
    5. 9 volts and 12 volts

  198. What is the function of the transfer corona assembly of a laser printer?
    1. It transfers a negative charge to the imaging drum.
    2. It transfers a positive charge to the imaging drum.
    3. It transfers a positive charge to the paper.
    4. It transfers the image from the laser to imaging drum.
    5. It transfers the toner from the imaging drum to the paper.

  199. Which port is used by the Apple Filing Protocol?
    1. 25
    2. 548
    3. 558
    4. 563
    5. 3389

  200. Which RAID configuration is best for write-intensive applications, where hardware costs are not a consideration and performance is not an issue?
    1. RAID 0 concatenation
    2. RAID 0 mirror
    3. RAID 0 stripe
    4. RAID 1 mirror
    5. RAID 5 stripe with parity

  201. Which statement is true?
    1. PCIe is a serial point-to-point connection designed to supersede both PCI and PCI-X.
    2. PCI-X 2.0 added speeds up to 933 MHz, with a reduction in electrical signal levels.
    3. PCI-X 2.0 offers a maximum bandwidth of 9800 Mbps.
    4. PCI-X and standard PCI buses may not run on a PCIe bridge.
    5. PCI-X is totally compatible with PCIe.

  202. Network control and security management of cloud assets is the difference between which two types of shared resources?
    1. Community versus hybrid
    2. Internal versus external
    3. Private versus public
    4. Private versus shared
    5. Synchronized versus unsynchronized

  203. What is the minimum number of hard disks required for a RAID 10 configuration?
    1. 1
    2. 2
    3. 3
    4. 4
    5. 10

  204. Which component of the motherboard chipset is responsible for managing high speed peripheral communication?
    1. Eastbridge
    2. Northbridge
    3. Polarbridge
    4. Southbridge
    5. Westbridge

  205. When a second monitor is added to a desktop computer, which should also be installed?
    1. Video adapter
    2. Video card
    3. Video driver
    4. Video replicator
    5. Video splitter

  206. What is the result of attempting to install DDR 2 memory on a motherboard designed to hold DDR 3 1600 memory?
    1. It will not fit into the memory slot.
    2. The memory will not synchronize.
    3. The system will have more memory.
    4. The system will run at 1600 MHz.
    5. The system will run slower.

  207. What type of expansion card needs to be installed on a computer in order to connect to the Internet using telephone lines?
    1. Cellular
    2. Modem
    3. HDMI
    4. NIC
    5. USB

  208. What happens during the transferring step of the laser printing process?
    1. A strong, uniform negative charge is transferred to the imaging drum.
    2. A strong, uniform positive charge is transferred to the imaging drum.
    3. The image is transferred to the imaging drum.
    4. Toner is transferred to the imaging drum.
    5. Toner is transferred to the paper.

  209. What are the signal pathways on a motherboard between the CPU and memory called?
    1. Back-side bus
    2. Broad-side bus
    3. Front-side bus
    4. North-side bus
    5. West-side bus

  210. What type of connector is shown at the right?
    1. DVI-I Dual-Link
    2. PATA
    3. SATA
    4. VGA
    5. USB 3.0

  211. Which video resolution has a 4:3 aspect ratio?
    1. ATSC 1920 x 1080
    2. ATSC 1920 x 1200
    3. UXGA 1600 x 1200
    4. UXGA 1920 x 1200
    5. WUXGA 1920 x 1080

  212. When the manufacturer recommends updating the BIOS after upgrading the memory on a computer, what is the easiest way to do this?
    1. Flash the BIOS.
    2. Install a new motherboard.
    3. Reboot the BIOS.
    4. Replace the BIOS battery.
    5. Replace the CMOS battery.

  213. Which is the least expensive way to store 500 Mbytes at a time?
    1. 3.5 inch floppy diskette
    2. CD-RW
    3. DVD-RW
    4. DVD-RW DL
    5. Optical jukebox

  214. What type of card is shown at the right?
    1. DDR2 memory card
    2. DDR3 memory card
    3. Modem adapter card
    4. Parallel port
    5. SATA expansion card

  215. What is the storage capacity of a microSD card?
    1. 1 Gbyte
    2. 2 Gbytes
    3. 3 Gbytes
    4. 4 Gbytes
    5. 5 Gbytes

  216. What is the throughput of a workstation using DDR 3 1600 chips?
    1. 1600 Mbps
    2. 3200 Mbps
    3. 6400 Mbps
    4. 12800 Mbps
    5. 25600 Mbps

  217. Which display is best for fast motion graphics such as sporting events?
    1. CRT
    2. Fluorescent
    3. LCD
    4. LED
    5. Plasma

  218. Which RAM modules should be used when the motherboard specification calls for 400 MHz DDR 2 RAM?
    1. PC400
    2. PC1600
    3. PC3200
    4. PC2-400
    5. PC2-3200

  219. Which hierarchical, and Internet-wide, naming service should be used to centralize shared information about hosts and IP addresses?
    1. ADS
    2. DNS
    3. LDAP
    4. NIS
    5. NIS+

  220. Which statement is true?
    1. DDR2 DIMMs are backward compatible with DDR.
    2. DDR2 DIMMs are forward compatible with DDR3.
    3. DDR2 internal clock runs at twice the DDR external clock rate.
    4. Maximum capacity on commercially available DDR2 DIMMs is 1GB
    5. The key difference between DDR2 and DDR SDRAM is the increase in prefetch length.

  221. Which statement is false?
    1. AirPrint is a macOS and iOS feature to print using Wi-Fi.
    2. AirPrint requires printer-specific drivers.
    3. AirPrint uses Bonjour to discover printers.
    4. Bonjour can be installed onto computers running Microsoft Windows.
    5. Bonjour is Apple's implementation of zero-configuration networking.

  222. Which statement is false?
    1. A double-sided, double-layer DVD holds 17 Gbytes of data.
    2. A double-sided, single-layer DVD holds up to 9.4 Gbytes of data.
    3. A single-sided, double-layer DVD holds 8.5 Gbytes of data.
    4. A single-sided, single-layer DVD holds up to 4.7 Gbytes of data.
    5. Blu-ray has a capacity of 55 Gbytes for a single-sided, single-layer disk.

  223. What type of expansion card needs to be installed in order to communicate with other computers on a wireless network?
    1. KVM
    2. Modem adapter
    3. NIC
    4. WAP
    5. WPA

  224. What is the aspect ratio of a video screen with a resolution of 1920 x 1200, adhering to the WUXGA standard?
    1. 3:2
    2. 4:3
    3. 8:4
    4. 16:9
    5. 16:10

  225. Which component is responsible for converting the data being printed into the format the printer can understand, and insures the printer is ready to print?
    1. PDF
    2. Printer description language
    3. Printer driver
    4. Printer feeder
    5. Printer spooler

  226. Which storage device has the fastest access time?
    1. BD-R
    2. HD
    3. HDD
    4. SD
    5. SSD

  227. Which manages communication with parallel ATA and serial ATA ports on a motherboard?
    1. Eastbridge
    2. Northbridge
    3. Polarbridge
    4. Southbridge
    5. Westbridge

  228. What is the minimum number of hard disks required for a RAID 5 configuration?
    1. 1
    2. 2
    3. 3
    4. 4
    5. 5

  229. What type of device scans user fingerprints for authentication?
    1. Bar code reader
    2. Biometric
    3. Digitizer
    4. Scanner
    5. Touch pad

  230. What type of connector is shown at the right?
    1. Composite
    2. DisplayPort
    3. SATA
    4. VGA
    5. USB 3.0

  231. What type of printer is a daisy wheel printer?
    1. Impact
    2. Inkjet
    3. Mobile
    4. Laser
    5. Thermal

  232. Which hardware component is responsible for storing prefetched data or code that the CPU will need to use and storing most recently used data or code
    1. Cache
    2. Hard drive
    3. NIC
    4. RAM
    5. SSD

  233. Which is the best storage type for a videographer and media producer who needs to store large files and have immediate access to them?
    1. Blue-ray disc
    2. CD-ROM
    3. HDD
    4. NAS
    5. SD

  234. What type of connectors are usually found on a digital LCD monitor?
    1. Composite and S-video
    2. Composite and HDMI
    3. DVI-D and HDMI
    4. DVI-D and VGA
    5. S-video and VGA

  235. Which statement is false?
    1. A Blu-ray Disc is 120 millimeters in diameter.
    2. Blu-ray Disc can store hours of video in high-definition.
    3. Blu-ray Disc can store hours of video in ultra high-definition.
    4. Blu-ray Disc is a digital optical disc data storage format.
    5. The storage capacity of a single layer Blu-ray Disk is 50 Gbytes.

  236. During which step in the laser printer imaging process is toner attracted to the imaging drum?
    1. Charging
    2. Cleaning
    3. Developing
    4. Exposing
    5. Transferring

  237. Which type of connector can support both analog and digital transmissions?
    1. Composite
    2. DVI-I
    3. HDMI
    4. S-video
    5. VGA

  238. Which magnetic hard drive is most likely to have the highest data throughput rate?
    1. 512 Gbytes, 5400 rpm
    2. 512 Gbytes, 7200 rpm
    3. 512 Gbytes, 9600 rpm
    4. 757 Gbytes, 5400 rpm
    5. 757 Gbytes, 7200 rpm

  239. Which statement is true regarding installing RAM modules into a single channel of a dual channel motherboard?
    1. Both RAM modules need to have the same parameters.
    2. Single channel RAM modules cannot be installed on a dual channel motherboard
    3. The RAM modules can be different sizes, but be the same speed.
    4. The RAM modules can be different speeds, but be the same size.
    5. The RAM modules can have different speeds and sizes as long as they are the same type.

  240. What type of printer can potentially release harmful ozone into the atmosphere, and thus may contain an ozone filter?
    1. Impact
    2. Inkjet
    3. Mobile
    4. Laser
    5. Thermal

  241. Which statement is false?
    1. DisplayPort can be used to transmit audio and video simultaneously.
    2. DisplayPort connectors have 20 pins.
    3. DisplayPort is a digital display interface.
    4. DisplayPort is not hot-pluggable.
    5. DisplayPort was designed to replace VGA, DVI, and FPD-Link.

  242. Which statement is true?
    1. Sockets that support AMD processors start with the letters LGA.
    2. Sockets that support Intel processors start with the letters AM.
    3. Sockets that support Intel processors start with the letters FM.
    4. Sockets that support Intel processors start with the letters FS.
    5. Sockets that support Intel processors start with the letters LGA.

  243. What should be used to maintain and clean dirty pickup rollers of an inkjet printer?
    1. Anti-static cloth
    2. Compressed air
    3. Dry, lint-free cloth
    4. Mild soap and water
    5. Rubbing alcohol

  244. Which is not extend the battery life of a smartphone?
    1. Enable Bluetooth.
    2. Keeping the operating system up-to-date with patches.
    3. Keeping the smartphone out of hot environments.
    4. Letting the screen automatically dim.
    5. Turning off location based services.

  245. Which best describes the image at the right?
    1. Ball grid array at the bottom of a CPU chip.
    2. Land grid array at the bottom of a CPU chip.
    3. Land grid array socket.
    4. Pin grid array at the bottom of a CPU chip.
    5. Socket F of an AMD CPU chip.

  246. Which DVD standard provides the highest storage capacity?
    1. DVD-R DS, SL.
    2. DVD-R SS, DL.
    3. DVD-R SS, SL.
    4. DVD-R TS, DL.
    5. DVD-R TS, SL.

  247. Which factor determines the speed of RAM?
    1. BSB
    2. CPU
    3. ECC
    4. FSB
    5. NIC

  248. Which display component is most likely to cause the screen of a laptop to intermittently flicker?
    1. Backlight
    2. Inverter
    3. LCD
    4. Power supply
    5. Screen

  249. Which motherboard form factors can be mounted in the same style of case?
    1. ATX, MicroATX, and Mini-ITX
    2. ATX and Nano-ITX
    3. ATX and Pico-ITX
    4. MicroATX and Nano-ITX
    5. MicroATX and Pico-ITX

  250. Which RAM feature can detect and possibly fix errors within memory?
    1. ECC
    2. Non-ECC
    3. Non-Parity
    4. Non-SSD
    5. Parity

  251. Which are small, hot-swappable, long term, nonvolatile, and portable storage devices?
    1. Hybrid SSD and SATA
    2. PATA and SATA
    3. PATA and SSD
    4. SATA and SSD
    5. SD and USB flash drive

  252. Where is the setting to change from booting from the CD-ROM drive to the hard disk drive located?
    1. BIOS
    2. CD-ROM drive
    3. Device manager
    4. Hard disk drive
    5. Task manager

  253. Which is not typically found on the front or top panel of a computer?
    1. Audio jack
    2. Hard disk drive
    3. Power button
    4. Power light
    5. USB port

  254. What is the recommended maximum cable length for a USB 3.0 external hard drive?
    1. 1 meter
    2. 2 meters
    3. 3 meters
    4. 4 meters
    5. 5 meters

  255. On a desktop computer with three PCI expansion slots, what will happen when cards of different speeds are added to the motherboard?
    1. None of the cards will function.
    2. Only the card with the slowest speed will function.
    3. The cards will all operate at the fastest speed.
    4. The cards will all operate at the slowest speed.
    5. The cards will all operate at their original speed.

  256. Which accurately describes what happens during the exposing step in the laser printer printing process?
    1. A laser increases areas of the drum from a slight negative charge to a strong negative charge.
    2. A laser increases areas of the drum from a slight negative charge to a strong positive charge.
    3. A laser increases areas of the drum from a strong positive charge to a strong negative charge.
    4. A laser reduces areas of the drum from a strong negative charge to a slight negative charge.
    5. A laser reduces areas of the drum from a strong positive charge to a slight positive charge.

  257. Which is the defining characteristic of a passive cooling system?
    1. It does not require a fan or power.
    2. It uses a fan.
    3. It uses helium.
    4. It uses motor oil.
    5. It user water.

  258. What is the approximate storage capacity of a compact disk?
    1. 500 Mbytes
    2. 680 Mbytes
    3. 850 Mbytes
    4. 900 Mbytes
    5. 1024 Mbytes

  259. Which system settings can be configured in the BIOS?
    1. Date and time, and disk access speed
    2. Date and time, and enabling and disabling devices
    3. Disk access speed, and enabling and disabling services
    4. Disk access speed, and setting cooling fan speeds
    5. Enabling and disabling services, and setting cooling fan speeds

  260. Which level of cache is the smallest and closest to the CPU?
    1. Level 1
    2. Level 2
    3. Level 3
    4. Level 4
    5. Level 5

  261. How does one calculate the FSB speed from the RAM module name?
    1. Divide by 4
    2. Divide by 8
    3. Divide by 100
    4. Multiply by 4
    5. Multiply by 8

  262. What type of technology should be used if a video display must be flexible?
    1. CRT
    2. LCD
    3. LED
    4. OLED
    5. Plasma

  263. What type of device can be added to an inkjet printer so it can print on both sides of the paper?
    1. Dual paper feed assembly
    2. Duplexing assembly
    3. Flipping assembly
    4. Rear paper feed assembly
    5. Revolving paper feed assembly

  264. Which component of a laser printer is responsible for converting alternating current into usable energy for the logic circuitry and motors?
    1. Alternate current power supply
    2. Direct current power supply
    3. High voltage power supply
    4. Laser voltage power supply
    5. Low voltage power supply

  265. Which RAID configuration will allocate extra space very quickly by concatenating two slices?
    1. RAID 0
    2. RAID 1
    3. RAID 3
    4. RAID 5
    5. RAID 7

  266. What is the storage capacity of six slices, each of 3 Gbytes, using two way mirrors and having a RAID 1+0 configuration?
    1. 3 Gbytes
    2. 6 Gbytes
    3. 9 Gbytes
    4. 12 Gbytes
    5. 15 Gbytes

  267. What precaution should be taken regarding the toner cartridge when shipping a laser printer across the country?
    1. Insert a toner blocker into the toner cartridge before shipping.
    2. Lock the toner cartridge firmly in place so it will not jar during shipping.
    3. No preparations are needed.
    4. Remove the toner cartridge from the printer before shipping.
    5. Seal the toner cartridge with tape before shipping.

  268. Which tape backup standard provides the best storage capacity?
    1. DAT
    2. DLT
    3. LFO
    4. LTO
    5. QIC

  269. Which step immediately follows after the fusing step in the laser printer printing process?
    1. Cleaning
    2. Exposing
    3. Initializing
    4. Processing
    5. Transferring

  270. After installing a new print cartridge in an inkjet printer what process must be run before printing to the device?
    1. Calibration
    2. Cleaning
    3. Configuring
    4. Degaussing
    5. Rastering

  271. Which statement is false?
    1. Desktop computers use dual inline memory modules.
    2. KVM is an abbreviation for keyboard, video, and monitor.
    3. Laptop computers most commonly use small outline dual inline memory modules.
    4. Thermal printers use a heating element.
    5. Thermal printers heat up heat sensitive paper to print.

  272. According to troubleshooting theory, which should be the next step after identifying the problem?
    1. Establish a theory of probable cause.
    2. Implement preventative measures.
    3. Question the user to find out what has changed.
    4. Resolving the problem.
    5. Test the theory to determine cause.

  273. Which peripheral is most useful on a gaming PC?
    1. Chip reader
    2. Joystick
    3. Magnetic reader
    4. Three-button mouse
    5. Two-button mouse

  274. What is the correct order for wires for the T568A standard?
    1. Orange, white/orange, green, white/green, blue, white/blue, white/brown, brown.
    2. Orange, white/orange, white/green, blue, white/blue, green, white/brown, brown.
    3. White/blue, blue, white/green, orange, white/orange, green, white/brown, brown.
    4. White/blue, blue, white/green, orange, white/orange, green, brown, white/brown.
    5. White/green, green, white/orange, blue, white/blue, orange, white/brown, brown.

  275. What is the correct order for wires for the T568B standard?
    1. Orange, white/orange, green, white/green, blue, white/blue, white/brown, brown.
    2. Orange, white/orange, white/green, blue, white/blue, green, white/brown, brown.
    3. White/orange, orange, green, white/green, blue, white/blue, white/brown, brown.
    4. White/orange, orange, white/green, blue, white/blue, green, brown, white/brown.
    5. White/orange, orange, white/green, blue, white/blue, green, white/brown, brown.

  276. What would happen if a 65 meter section of RG-6 cable has to be replaced and on RG-59 cable is available?
    1. The replacement cable should work.
    2. The replacement cable will not work because RG-6 and RG-59 have different impedance.
    3. The replacement cable will not work because RG-6 and RG-59 use different connectors.
    4. The replacement cable will not work because RG-6 cable has fewer wire strands than RG-59 cable.
    5. The replacement cable will not work because the distance exceeds the RG-59 specification.

  277. Which cable types can transmit at 10 Gbps?
    1. CAT3 and CAT5
    2. CAT5 and CAT5e
    3. CAT5 and MMF
    4. CAT5e and 10Base-T
    5. CAT7 and MMF

  278. What is the difference between STP and UTP?
    1. STP follows the T568A standard, while UTP follows the T568B standard.
    2. STP follows the T568B standard, while UTP follows the T568A standard.
    3. STP has shielding, while UTP does not.
    4. STP uses a RJ-11 jack, while UTP uses RJ-45.
    5. STP uses a RJ-45s jack, while UTP uses RJ-45.

  279. What type of coaxial connector is threaded and screwed into place?
    1. BNC
    2. F-connector
    3. SC
    4. ST
    5. VGA

  280. Which pins need to be crossed over to make an UTP crossover cable?
    1. 1 and 2, 3 and 4
    2. 1 and 2, 3 and 5
    3. 1 and 3, 2 and 6
    4. 1 and 4, 5 and 6
    5. 2 and 3, 5 and 6

  281. What type of hard drive has a 16 bit connector and has 68 pins?
    1. ATA
    2. NVMe
    3. PATA
    4. SCSI
    5. SATA

  282. What type of video out connector, typically found on tablets, resembles an USB-C, but is tapered on one side?
    1. DB-9
    2. miniHDMI
    3. RS-232
    4. VGA
    5. USB-B

  283. Which statement is false?
    1. Apple announced that their new range of iPad Pros will replace Lightning with USB-C.
    2. Lightning connector can be inserted either face up or face down.
    3. Lightning connector is used to connect Apple mobile devices like iPhones, iPads, and iPods.
    4. Lightning is a 30-pin connector which carries a digital signal.
    5. The lightning cable may be inserted into the female port using either side.

  284. Which serial connection standard was first developed in 1960 and had been the standard for decades?
    1. DB-9
    2. DisplayPort
    3. HDMI
    4. RS-232
    5. USB

  285. Which is a characteristic of the LDAP Naming Service?
    1. Has non-root master servers.
    2. Has root master servers.
    3. Information is stored in maps.
    4. Uses a Directory Information Tree.
    5. Uses multi column tables.

  286. What 9-pin connector was commonly used for keyboards, mice, and game controllers before USB became popular?
    1. DB-9
    2. DisplayPort
    3. HDMI
    4. RS-232
    5. USB

  287. Which statement is false?
    1. Triple channel memory is a feature of the memory controller and system configuration.
    2. Triple channel memory is achieved when three matching memory modules are installed.
    3. Triple channel memory reduces memory latency due to interleaving.
    4. Triple channel memory triples the power distribution to the memory modules.
    5. Triple channel memory triples the speed at which memory is accessed.

  288. Which solid state hard drive measures 32 mm wide and whose length can be 30 mm, 42 mm, 60 mm, and longer?
    1. M.2
    2. mSATA
    3. PCIe
    4. SATA
    5. SCSI

  289. Which is an open collection of standards and information to fully expose the benefits of non-volatile memory in all types of computing environments from mobile to data center?
    1. mSATA
    2. NVMe
    3. IEEE 802.11
    4. RFC 821
    5. SCSI

  290. What solid state hard drive form factor has dimensions that mirror older platter type drives?
    1. 2.5 inch
    2. 5.2 inch
    3. mSATA
    4. PATA
    5. SATA

  291. What is the likely cause of USB ports not recognized by the operating system on a newly built computer?
    1. Device drivers are outdated.
    2. The motherboard internal USB connector is not connected.
    3. The operating system does not support USB connections.
    4. The system clock does not recognize the USB connector.
    5. USB settings are misconfigured.

  292. What is the best way to keep unauthorized people from starting the operating system?
    1. Encrypt the hard drive.
    2. Encrypt the operating system.
    3. Set a password in the BIOS/UEFI for booting to the operating system.
    4. Use an eight character password to log on.
    5. Use a sixteen character password to log on.

  293. What is the most cost effective way to to add USB ports to a computer?
    1. Add a network storage device.
    2. Buy a new computer with additional USB ports.
    3. Install an USB expansion board.
    4. Replace the motherboard with one that has additional USB ports.
    5. Swap peripherals for those requiring different connectors.

  294. On a laptop running Windows 10, where does one go to make the touch pad less sensitive?
    1. Windows Settings | Apps | Touchpad
    2. Windows Settings | Bluetooth & other devices
    3. Windows Settings | Devices | Bluetooth & other devices
    4. Windows Settings | Devices | Mouse
    5. Windows Settings | Devices | Touchpad

  295. Which will allow the user to generate a tangible product from a CAD application?
    1. 3D printer
    2. Augmented reality glasses
    3. Smart card reader
    4. Touch pad
    5. VR headset

  296. How can one synchronize the settings for Internet Explorer across all Windows 10 devices an user uses?
    1. Windows Settings | Accounts | Devices | Sync Your Settings
    2. Windows Settings | Accounts | Sync Your Settings
    3. Windows Settings | Apps | Sync Your Settings
    4. Windows Settings | Devices | Sync Your Settings
    5. Windows Settings | Personalization | Sync Your Settings

  297. What is the difference between the T568A standard and the T568B standard?
    1. Both use eight wires, but the order of the blue and brown wires are switched.
    2. Both use eight wires, but the order of the green and orange wires are switched.
    3. T568A uses eight wires, while T568B uses nine wires.
    4. T568A uses eight wires, while T568B uses six wires.
    5. T568B uses eight wires, while T568A uses six wires.

  298. Which statement is true?
    1. DVI-D cable can only send analog signals.
    2. DVI-I cable can only send analog signals.
    3. DVI-I cable can only send digital signals.
    4. DVI-A cable is capable of sending both analog and digital signals.
    5. DVI-I cable is capable of sending both analog and digital signals.

  299. What is an IDE cable used for?
    1. To connect an expansion card to the motherboard.
    2. To connect an optical drive to a SCSI adapter.
    3. To connect an optical drive to the motherboard.
    4. To terminate a hard drive.
    5. To terminate a SCSI adapter.

  300. Which statement is false?
    1. M.2 drives can use either the SATA bus or the PCIe bus.
    2. M.2 modules can integrate multiple functions, including: Wi-Fi, Bluetooth, satellite navigation, and near field communication.
    3. The M.2 specification provides up to four PCI Express lanes and one logical SATA 3.0 port.
    4. The mSATA standard replaces M.2.
    5. The unique key notches of M.2 modules prevent them from being inserted into incompatible host connectors.

  301. What peripheral type is commonly used by retailers for tracking inventory or for check out at the register?
    1. Barcode reader
    2. Flash drive
    3. Mouse
    4. Screen protector
    5. Trackball

  302. A new power supply is being installed into a computer which needs to operate in both Europe and North America What must be considered before connecting the power supply?
    1. It can operate at both 10 volts and 20 volts.
    2. It can operate at both 12 volts and 110 volts.
    3. It can operate at both 12 volts and 220 volts.
    4. It can operate at both 110 volts and 120 volts.
    5. It can operate at both 110 volts and 220 volts.

  303. Which statement is true?
    1. Integrated circuits use 12 volts.
    2. Motors such as fans and hard drive spindles use 5 volts.
    3. Motors such as fans and hard drive spindles use 12 volts.
    4. Smartphones use 12 volts.
    5. Smartphones use 220 volts.

  304. What would be a configuration requirement for laptops used by the traveling salespeople?
    1. Encrypted password
    2. Inkjet printer
    3. Laser printer
    4. Portable file cabinet
    5. Remote access and VPN

  305. What must be done to fix the touch screen of a device that no longer responds correctly?
    1. Calibrate the screen.
    2. Replace the battery.
    3. Replace the screen.
    4. Reset the internal alarm.
    5. Unlock the screen.

  306. Which would be the most cost effective and practical solution a problem where a laptop has a direct wired connection to an USB printer and occasionally, when other coworkers need to use the printer it requires disconnecting the wired USB printer from one system and connecting it to another system?
    1. Create accounts for everyone on the laptop.
    2. Device sharing.
    3. Purchase a floppy drive.
    4. Purchase a new printer.
    5. Use sneakernet.

  307. Which allows an organization to make applications available across multiple devices and form factors?
    1. Binary application steaming
    2. Desktop streaming
    3. In demand desktop
    4. On demand desktop
    5. Virtual application streaming

  308. What would be the rationale for turning off hard drive write caching?
    1. Consume less power.
    2. Data privacy.
    3. Longer hard drive life span.
    4. Prevent sudden loss of power.
    5. Quieter operation of the hard drive.

  309. When the print of an inject printer is skewed or tilted, what should be done to fix this problem?
    1. Calibrate.
    2. Clean the heating element.
    3. Clear paper jams and replace the paper.
    4. Realign the paper feed.
    5. Replace the printer heads.

  310. When the print of an inject printer is very dim, what should be done to fix this problem?
    1. Clean printer heads and replace the ink cartridge.
    2. Clear paper jams.
    3. Clear paper jams and replace the paper.
    4. Realign the paper feed.
    5. Replace the printer heads.

  311. What is used by a three dimensional printer to create three dimensional objects?
    1. Compressed air
    2. Liquid cement
    3. Liquid paper
    4. Plastic filament
    5. Plastic ink

  312. What is the name of the Microsoft service that offers free access to a cloud-based storage account?
    1. Azure
    2. Microsoft Cloud
    3. OneDrive
    4. Win Cloud
    5. Windows Cloud

  313. What is the process of booting a computer from a network rather than a local drive called?
    1. Auto boot
    2. Netboot
    3. PXE boot
    4. TFTP boot
    5. Unatteneded installation

  314. Which type of cloud service offers the best security?
    1. Cumulonimbus
    2. Cumulus
    3. Hybrid
    4. Private
    5. Public

  315. Given that the company needs extra network capacity including power, storage, network services such as a firewall, but does not have the money to buy all the hardware required, what can it purchase?
    1. Aas
    2. GaaS
    3. IaaS
    4. PaaS
    5. SaaS

  316. Which comprises virtual memory?
    1. BIOS, CPU and RAM
    2. BIOS, CPU and Swap Space
    3. CPU and RAM
    4. Disk Space and Swap Space
    5. RAM and Swap Space

  317. Which Windows 7 management utility ensures that a workstation connected to a cloud storage will synchronize on a daily basis at a given hour?
    1. Event Scheduler
    2. Event Viewer
    3. Task Manager
    4. Task Performer
    5. Task Scheduler

  318. What type of cloud based service allows for the development and testing of software applications on different operating systems?
    1. GaaS
    2. IaaS
    3. Naas
    4. PaaS
    5. SaaS

  319. A Web-based video games work well at home, but do not work well at work, if at all. What would be the reason for this?
    1. Company computer
    2. Company firewall
    3. Company location
    4. Company I/O bandwidth
    5. Company Wi-Fi bandwidth

  320. Which type of cloud service provides network hardware, software applications, and infrastructure?
    1. GaaS
    2. IaaS
    3. Naas
    4. PaaS
    5. SaaS

  321. Which cloud service features allows for instantaneous increase in processing power or storage space?
    1. Measured service
    2. Power cloud
    3. Rapid elasticity
    4. Rapid pooling
    5. Rapid response

  322. When configuring an iPhone to use an outlook.com e-mail address, what configuration information needs to be entered on an iPhone to establish connectivity?
    1. E-mail address and password
    2. E-mail address, IP address and password
    3. E-mail address, IP address, server name and password
    4. E-mail address, mail protocol, port number, server name and password
    5. E-mail address, port number, server name and password

  323. Which type of hypervisor is best suited for installing virtualization on a workstation that needs to support multiple operating systems?
    1. Type 1
    2. Type 2
    3. Type 3
    4. Xbox One system software
    5. Xen

  324. When configuring client side virtualization on an existing 64 bit machine running Windows 8.1 to run OS X Yosemite in the virtual environment, each operating system requires 2 Gbytes of RAM. Windows needs 20 Gbytes of disk space and Yosemite needs 8 Gbytes of disk space. What are the minimum hardware requirements for this system?
    1. 20 Gbytes of disk space and 2 Gbytes of RAM.
    2. 20 Gbytes of disk space and 4 Gbytes of RAM.
    3. 28 Gbytes of disk space and 4 Gbytes of RAM.
    4. 28 Gbytes of disk space and 8 Gbytes of RAM.
    5. 28 Gbytes of disk space and 12 Gbytes of RAM.

  325. When using resource pooling and using a bare-metal hypervisor, what is the minimum amount of physical memory needed on a server running four instances of Windows Server, when each virtual server expects to have 16 Gbytes of RAM?
    1. 16 Gbytes
    2. 32 Gbytes
    3. 48 Gbytes
    4. 64 Gbytes
    5. 80 Gbytes

  326. Which is the most cost effective solution to having to develop and test programs for Linux, Mac OS, and Windows as quickly as possible?
    1. Buy a workstation for each operating system.
    2. Configure an Apple computer to run Windows.
    3. Set up a workstation to dual boot.
    4. Set up a workstation to run virtual machines.
    5. Write one version of the each program that can run on all three operating systems.

  327. Which RAID configuration offers improved write performance?
    1. RAID 0 Concatenation
    2. RAID 0 Parallel
    3. RAID 0 Stripe
    4. RAID 1
    5. RAID 5 Concatenation

  328. Which statement is true when comparing RAID 1 mirror with the performance of RAID 5?
    1. Access to the data on RAID 5 is much slower.
    2. Hardware costs are highest with RAID 5.
    3. RAID 1 is faster than RAID 5 in every case.
    4. With RAID 5 any failure will result in no access to that data while the data is rebuilt from the parity information.
    5. Write operations are slower on RAID 1.

  329. Which operating systems can run or install Microsoft's native hypervisor to run virtual machines?
    1. Windows 7 Professional and Windows Server 2003
    2. Windows 7 Professional and Windows Vista
    3. Windows 8 Education and Windows 10 Professional
    4. Windows Server 2003
    5. Windows Vista

  330. What must be defined in order to maintain confidentiality, integrity and availability of system resources?
    1. Cloud service requirements
    2. Electricity consumption
    3. Network interface
    4. Peripheral devices
    5. Security requirements

  331. What is a primary benefit to the virtual desktop feature in Windows 10?
    1. Control the desktop of a remote Windows computer.
    2. Copy a Windows desktop to install on multiple machines.
    3. Host multiple desktops on a local Windows computer.
    4. Share the desktop of a local Windows computer.
    5. View the desktop of multiple remote Windows computers.

  332. What is the term used to describe printers, copiers, and other assets on the local area network?
    1. LAN Cloud
    2. Measured resources
    3. Microsoft Cloud
    4. Shared resources
    5. Windows Cloud

  333. What is the name of the boot routine that verifies the size and integrity of the system memory?
    1. BIOS
    2. POST
    3. RAMCheck
    4. SystemCheck
    5. UEFI

  334. Which term best describes when a cloud provider monitors and controls resource availability dependent on usage?
    1. Elasticity
    2. Electricity
    3. Measured service
    4. On demand
    5. Pooling

  335. Which is false regard virtual application streaming?
    1. An application is packaged and stored on a streaming server.
    2. It cannot be used for streaming video.
    3. It increases portability and productivity.
    4. It is on demand software distribution.
    5. Necessary code and files are delivered over the network as and when they are required.

  336. What types of apps would ensure that files on laptops of all traveling salespeople stay consistent with files on the company cloud?
    1. Emulator
    2. Network
    3. Streaming
    4. Synchronization
    5. Virtual

  337. Which directly helps to ensure data privacy on a laptop computer?
    1. Employing user authentication on the device.
    2. Keeping backups of critical data.
    3. Storing it in a secure location.
    4. Using a screen protector.
    5. Using a surge protector.

  338. An employee travels to multiple offices, using different desktop at each office. What technology ensures that the employee's desktop icons, files, and applications stay uniform across the different systems?
    1. In demand desktop
    2. On demand desktop
    3. Pooling desktop
    4. Synchronized folders
    5. Virtual desktop

  339. What should be considered before purchasing computer hardware and storage devices?
    1. CAT 7 cabling
    2. Cloud service requirements
    3. Management response
    4. Resale value
    5. Resource requirements

  340. What payment method would allow for paying for cloud computing based on usage, and not a fixed flat rate?
    1. In demand
    2. Metered
    3. On demand
    4. Resource rate
    5. Waterfall

  341. A laptop does not display anything on the screen, although the power light and other indicator lights are on. An external monitor is plugged in and it does not display either. Which component is most likely causing the problem?
    1. Backlight
    2. Inverter
    3. Power supply
    4. Screen
    5. Video card

  342. A computer is being rebooted after faulty RAM has been replaced. After a few seconds the computer beeps once. What does this indicate?
    1. The BIOS has successfully completed the POST.
    2. The BIOS has unsuccessfully completed the POST, and found one error.
    3. The hard disk drive cannot be accessed by the BIOS.
    4. The motherboard needs to be replaced.
    5. The RAM is faulty.

  343. A computer is not booting properly, and upon rebooting it produces one long beep followed by three short beeps. Which tool should be used to troubleshoot the problem?
    1. Loopback plug.
    2. Multimeter.
    3. POST card.
    4. Power supply tester.
    5. Voltage meter.

  344. A loud rhythmic clicking sound is heard when attempting to boot a machine. It does not boot properly. What is the most likely cause?
    1. Conventional hard disk drive failure
    2. DVD drive failure
    3. Failure of the power supply
    4. RAM failure
    5. Solid state disk drive failure

  345. A laser printer produces images with white streaks running down the middle. What is the best way to resolve this problem?
    1. Clean the EP drum.
    2. Clean the fusing assembly.
    3. Clean the toner cartridge.
    4. Clean the transfer corona wires.
    5. Replace the toner cartridge.

  346. Which is the most likely cause a dot matrix printer to start creasing paper and producing paper jams?
    1. Bits of paper in the paper path and using the wrong paper
    2. Paper perforations too big
    3. Paper perforations too small
    4. Paper settings too loose
    5. Paper settings too tight

  347. A computer monitor shuts down after long periods of use. What is the likely case of this problem?
    1. Backlight failure
    2. Improper screen resolution
    3. Inverter failure
    4. Monitor overheating
    5. Video card failure

  348. A computer is turned on, and the fan is spinning, the indicator lights do not turn on nor does the POST generate a beep. What is the likely case of this problem?
    1. CPU chip
    2. Motherboard
    3. Network interface card
    4. Hard disk drive
    5. Power supply

  349. Which would cause an inkjet printer to have problems picking up paper?
    1. Cork roller
    2. Exit roller
    3. Pickup roller
    4. Transmission roller
    5. Transport roller

  350. After replacing the toner cartridge on an HP Laser Jet printer, it displays "Error 14 No EP Cart.". What should be done to resolve this problem?
    1. Fill the paper tray.
    2. Remove the toner cartridge and press the reset button.
    3. Remove the toner cartridge and reinsert it.
    4. Replace the toner cartridge with a new one.
    5. Turn the printer off and then back on.

  351. What is causing a dot matrix printer to produce output that goes from dark print as the print head moves across the page?
    1. Paper feed assembly
    2. Printer head
    3. Ribbon advance mechanism gets slippery
    4. Worn out printer ribbon
    5. Wrong type of paper being used

  352. An office network uses one 802.11n access point for all client computers. Recently the user population tripled from 20 to 60, and users now complain that network transfer speeds are slow. What is the most likely cause of this problem?
    1. New users have 802.11b network cards.
    2. New users have 802.11g network cards.
    3. The distance to the wireless access point is too great.
    4. Too many network collisions.
    5. Too many users for one wireless access point.

  353. A computer reboots itself when the CPU temperature spikes up. What should be done first to resolve this issue?
    1. Overclock the CPU.
    2. Reload the operating system.
    3. Replace the CPU and the heat sink.
    4. Replace the power supply.
    5. Reseat the CPU heat sink.

  354. Which tool should be used to test the problem of spotty wireless service in one section of a building?
    1. Loopback plug.
    2. Multimeter.
    3. Packet sniffer.
    4. Voltage meter.
    5. Wireless locator.

  355. After a hard drive has been replaced and a new partition created, which utility should be used to ready the drive for data storage?
    1. bootrec
    2. chkdsk
    3. diskpart
    4. format
    5. fsck

  356. A RAID 5 array has four disks. One disk fails. What can be done to recover the array?
    1. Rebuild the failed disk and format the array.
    2. Remount the failed disk and rebuild the array.
    3. Remount the failed disk and restore data from backup.
    4. Replace the failed disk and rebuild the array.
    5. Replace the failed disk and restore data from backup.

  357. An old laser printer displays low memory error messages when printing. What should be done to fix the problem?
    1. Impose print quotas.
    2. Replace the print spooler.
    3. Stop and restart the print spooler.
    4. Upgrade the printer hard disk drive.
    5. Upgrade the printer memory.

  358. Which tool should be used to begin to identify the problem causing a computer to continuously reboot?
    1. Loopback plug
    2. Multimeter
    3. POST card
    4. Power supply tester
    5. Voltage meter

  359. Users sent print jobs to the laser printer, but nothing prints. The are several print jobs in the print queue. The printer is online, has plenty of paper, and indicates it is ready to print. What should be done to get the laser printer to print?
    1. Clear the oldest job in the print queue.
    2. Press the reset button.
    3. Replace the print spooler.
    4. Stop and restart the print spooler.
    5. Turn the printer off and then back on.

  360. The battery of a tablet computer will only run for a half hour after battery icon indicates that it is fully charged, when it use to last for hours. What is the most likely cause of this problem?
    1. The battery is failing.
    2. The battery needs to be charged for a longer time.
    3. The motherboard needs to be replaced.
    4. The tablet is overheating.
    5. Too many programs are running at the same time.

  361. The hard drive indicator light is constantly on, yet the system seems unresponsive. After rebooting the computer, the condition happens again. What should be done to solve this problem?
    1. Reformat the hard drive.
    2. Reinstall the operating system.
    3. Replace the CPU chip.
    4. Replace the hard drive.
    5. Replace the motherboard.

  362. Given a spool of CAT5 cable and some RJ-45 connectors, which tool is needed to create a new network cable?
    1. Cable tester
    2. Crimper
    3. POST card
    4. Punchdown tool
    5. Wire stripper

  363. After installing a second hard drive on a computer, upon booting an error message appears stating that the operating system cannot be found. What should be done first to solve this problem?
    1. Check jumper settings on the hard drive.
    2. Reload the operating system.
    3. Replace the new hard drive.
    4. Run bootrec /fixmbr.
    5. Run diskpart.

  364. A laptop computer remains frozen even after pressing the Num Lock key several times. What should be done first to solve this problem?
    1. Press and hold the power button until the laptop turns off, and then reboot.
    2. Press the F1 button.
    3. Press the F2 button.
    4. Press the F8 button.
    5. Remove the battery and disconnect the laptop from the AC power source, and then reboot.

  365. A desktop computer is has been turned on. One beep is heard. The fan is running. Nothing appears on the screen. What should be the first question asked?
    1. Did the computer complete the POST successfully?
    2. How old is the monitor?
    3. Is the monitor plugged into the video card?
    4. Is the monitor turned on?
    5. Is there another monitor attached to the computer?

  366. Which component is most likely causing a desktop computer to not retain the proper time and date?
    1. BIOS
    2. CMOS battery
    3. Hard disk drive
    4. Power supply
    5. RAM

  367. A smartphone is extremely hot and appears to be locked up. What should be done to solve this problem?
    1. Perform a factory reset.
    2. Plug the smartphone into a wall outlet and recharge it.
    3. Switch the smartphone to the low voltage setting.
    4. Turn the smartphone off and let it cool down.
    5. Uninstall and reinstall all the apps.

  368. A laser printer is producing a faint copy of the previous image on every new page. What could be causing this?
    1. Bad erasure lamps and/or broken cleaning blade
    2. Broken fusing assembly and/or drum rotation motor slipping
    3. Dirty charging corona wire
    4. Twisted corona wire
    5. Water in the toner cartridge

  369. A laptop is left charging overnight, but in the morning it will not power up. After removing the battery and reinserting it, the laptop will still not power up. the laptop will power up when the wall adapter is used, and the batter icon indicates that it is fully charged. What is most likely the problem?
    1. The AC adapter is not charging the battery.
    2. The battery icon is not properly measuring the battery life.
    3. The battery is defective.
    4. The DC converter between the battery and motherboard is defective.
    5. The power supply is defective.

  370. An LCD monitor has artifacts, so no matter what is on the screen, the outline of a different image appears. What should be done to resolve this problem?
    1. Clean the screen with a soft cloth.
    2. Degauss the monitor.
    3. Degauss the video card.
    4. Replace the monitor.
    5. Replace the video card.

  371. A burning smell is coming from a desktop computer. After turning the computer off and unplugging it, what should be done next?
    1. Call the fire department.
    2. Inspect the inside of the computer for visible signs of damage.
    3. Replace the motherboard.
    4. Replace power supply.
    5. Test the power supply with a multimeter.

  372. Which statement is false?
    1. Chip creep can occur due to thermal expansion.
    2. Chip creep can occur due to vibration.
    3. Chip creep is most common with older memory modules.
    4. Chip creep occurs when an integrated circuit works its way out of its socket over time.
    5. There is no such thing as chip creep in newer systems.

  373. What is the most likely solution to the problem of seeing incorrect colors on a CRT monitor?
    1. Degauss the monitor, and if that does not work, replace it.
    2. Degauss the monitor, and if that does not work, replace the video card.
    3. Disconnect the computer and plug it back in.
    4. Disconnect the monitor and plug it back in.
    5. Update the video driver.

  374. Which is most likely the cause of an inkjet printer jamming and producing crinkled papers?
    1. Dirty print heads.
    2. Incorrect paper tension setting.
    3. Obstructed paper path.
    4. Paper that is too dry.
    5. Paper that is too thin.

  375. When booting a Windows 7 machine an error message of "Operating System not found". Which utility can be used in Windows 7 in an attempt to correct this problem?
    1. bootrec
    2. checkdsk
    3. chkdsk
    4. diskpart
    5. format

  376. A computer has no Internet access. The network cable is plugged in, but there are no lights on the network card. What is the likely cause of this?
    1. Faulty network cable.
    2. Faulty NIC.
    3. Incorrect TCP/IP configuration.
    4. Incorrect DNS setting.
    5. The Internet is broken.

  377. Which is the proper way to dispose of empty toner cartridges?
    1. Burn them.
    2. Crush them.
    3. Recycle them.
    4. Sell them online.
    5. Throw them in the trash.

  378. Which statement is false?
    1. A dirty print head on an inkjet printer can cause the colors of a color inkjet printer not to be as expected.
    2. An ink cartridge installed in the wrong tray can cause a color inkjet printer to print white lines.
    3. An ink cartridge installed in the wrong tray can cause the colors of a color inkjet printer not to be as expected.
    4. Cleaning the nozzle and aligning the print head of an inkjet printer improves print quality.
    5. Ink bleeding from adjacent areas of an image can cause the colors of a color inkjet printer not to be as expected.

  379. What type of inexpensive connector is shown at right?
    1. ATX
    2. Ethernet
    3. Molex
    4. RJ-45
    5. USB

  380. Which is not an area to focus on when cleaning an inkjet printer?
    1. Ink Reservoir
    2. Power Adapter
    3. Print Heads
    4. Ribbon
    5. Stabilizer Bar

  381. Which is the most likely solution to resolving a constantly flickering LCD monitor?
    1. Degauss the monitor.
    2. Degauss the video card.
    3. Remove all external interference such as fans and motors.
    4. Replace the monitor.
    5. Replace the video card.

  382. While working on a long and critical report, all the keys on the laptop computer have stopped working. Rebooting the laptop has not solved the problem. Which will enable completing the report?
    1. Clean under the keys of the keyboard with compressed air.
    2. Clean under the keys of the keyboard with rubbing alcohol.
    3. Connect an external keyboard using the USB port.
    4. Make sure the internal keyboard is properly connected.
    5. Replace the keyboard.

  383. An Apple computer running MacOs freezes up and displays a rotating pinwheel instead of the mouse cursor. What component is most likely causing this problem?
    1. CPU
    2. Hard disk drive
    3. Memory
    4. Motherboard
    5. Power supply

  384. A CRT monitor will on occasion randomly produce a wavy image. What could cause this problem?
    1. A motor producing a magnetic field.
    2. Faulty motherboard.
    3. Faulty power supply.
    4. Improperly set screen resolution.
    5. Smartphone in use.

  385. Which components are most likely to cause a computer to lock up, requiring a hard reboot?
    1. CPU and memory
    2. Graphics processor and video card
    3. Hard disk drive and power supply
    4. Microphone and video card
    5. Power supply and video card

  386. Which tool should be used when needing to attach cables to a 110 block?
    1. Cable tester
    2. Crimper
    3. POST card
    4. Punchdown tool
    5. Screwdriver

  387. What is the cause of desktop icons on a computer screen being extreme large in size?
    1. External interference from a fan or motor
    2. Failing backlight
    3. Faulty video driver
    4. Improper screen resolution
    5. Incorrect video driver installed

  388. What cause print out from a laser printer to smudge?
    1. Dirty exit rollers
    2. Faulty charging corona
    3. Faulty drying assembly
    4. Overheated fusing assembly
    5. Twisted corona wire

  389. What is the likely cause of losing Wi-Fi connectivity while walking around an office campus carrying a laptop?
    1. Faulty Wi-Fi antenna on the laptop.
    2. Faulty Wi-Fi adapter on the laptop.
    3. Low Wi-Fi signal in certain areas.
    4. Oversaturated wireless access point.
    5. Walking too fast.

  390. Which Linux utility finds the amount of free disk space?
    1. df
    2. diff
    3. diff -k
    4. du -k
    5. find -k

  391. A new printer has been attached to a computer. When printing to the printer the output is completely garbled. What is the most likely cause of this?
    1. Print queue
    2. Printer driver
    3. Printer ink
    4. Printer paper
    5. Printer spooler

  392. Users complain they cannot access the Internet or the corporate server, but they are able to print on the local printer. What is most likely the problem?
    1. Default gateway is down.
    2. Incorrect subnet mask.
    3. IP address conflict.
    4. Network card failure.
    5. Network collisions.

  393. A RAID 0 (disk striping) array has four disks. One disk fails. What can be done to recover the array?
    1. Rebuild the failed disk and format the array.
    2. Remove the failed disk and rebuild the array.
    3. Remove the failed disk and restore data from backup.
    4. Replace the failed disk and rebuild the array.
    5. Replace the failed disk and restore data from backup.

  394. An app on a tablet has stopped working. After rebooting the tablet, the app still does not start up. Other apps are working fine. What should be done to get the problem app to start up again?
    1. Change the screen resolution
    2. Reboot the computer
    3. Recalibrate the screen
    4. Reinstall the app
    5. Reset the table to factory specifications

  395. A system with an internal RAID controller and configured for a RAID 5 array with four disks is working normally, until one day, upon reboot there is an error message "RAID not found". What is the likely cause of this?
    1. BIOS
    2. One of the disks
    3. Power supply
    4. RAID controller
    5. SCSI controller

  396. Which Windows command will display the IP address of the DNS server the host is trying to reach?
    1. ifconfig
    2. ipconfig
    3. ipconfig /all
    4. ipconfig /display
    5. ipconfig /show

  397. Which Windows 7 command should be used to find out if the computer is making any connections on a given port number?
    1. nbstat
    2. net
    3. netdom
    4. netstat
    5. portstat

  398. A smartphone appears to be swollen. What does this indicate?
    1. The battery is swollen and damaged.
    2. The hard drive is corroded.
    3. The smartphone is about to lose its Wi-Fi connection.
    4. The smartphone needs to have its electrolytes drained.
    5. The smartphone is full of water.

  399. A desktop computer is booted, and the POST beep is heard. All the indicator lights appear normal, but the screen is dark. The monitor is connected to to the computer and the power light is on. What should be the next step in troubleshooting the problem?
    1. Replace the video cables.
    2. Replace the video card.
    3. Swap out the power supply.
    4. Try the monitor on another computer or another monitor on this computer.
    5. Use a multimeter to measure the voltage to the monitor.

  400. What is the most likely cause of constant flickering on a smartphone?
    1. Faulty backlight and/or inverter
    2. Faulty converter and/or video card
    3. Faulty display glass and/or video driver
    4. Intermittent Wi-Fi signal
    5. Low battery power

  401. What causes the computer monitor to have places on the screen where there are always black dots?
    1. Artifacts
    2. Backlight failure
    3. Dead pixels
    4. Ghosting
    5. Overheating

  402. Which statement is false?
    1. Heat and excessive humidity can cause pointer drift.
    2. Pointer drift can be caused by the point stick not centering properly after repeated use.
    3. Pointer drift is sometimes called TrackPoint drifting.
    4. Pointer drift occurs when the mouse cursor slowly drifts in one direction when the cursor should not move.
    5. Pointer drift only occurs on laptops.

  403. Which tool is most appropriate to verify that cables in a wiring closet are labeled correctly?
    1. Altimeter
    2. Cable tester
    3. Multimeter
    4. Punchdown tool
    5. Tone generator and probe

  404. A new laser printer has been installed on the network, and it is directly plugged into a CAT 6a network cable. The printer ready light is on. When installing the printer on the client using the printer's IP address, it is not able to connect. What should be done next to troubleshoot the problem?
    1. Check the printer's IP configuration information.
    2. Replace the CAT 6a network cable with CAT 5.
    3. Replace the CAT 6a network cable with CAT 7.
    4. Stop and restart the printer spooler.
    5. Take the printer offline and bring it back online.

  405. How to configure an iPhone to allow an app to use GPS?
    1. Settings > GPS
    2. Settings > GPS > Location Services
    3. Settings > Privacy > GPS
    4. Settings > Privacy > Location Services
    5. Settings > Share My Location > GPS

  406. A laser printer just had the toner cartridge replaced. Now only blank pages are printed. What should be done to solve this problem?
    1. Clean the corona wires.
    2. Reinstall the print spooler.
    3. Reinstall the printer driver.
    4. Remove the toner cartridge, remove the sealing tape, then reinstall the toner cartridge.
    5. Stop and restart the print spooler.

  407. Which is used for testing the ability of a network adapter to send and receive?
    1. Altimeter
    2. Loopback plug
    3. Multimeter
    4. Punchdown tool
    5. Voltage meter

  408. Where on a Windows computer can the setting of which device to boot from is set?
    1. BIOS
    2. Windows Control Panel
    3. Windows Device Manager
    4. Windows Disk Manager
    5. Windows System Settings

  409. Which Windows command will allow connecting to a shared directory on a server and copying the files?
    1. nbstat
    2. net
    3. netdom
    4. netshare
    5. share

  410. A hard disk is suspected of having bad sectors. What should be done first to solve the problem?
    1. Defragment the disk
    2. Format the hard drive
    3. Replace the hard drive
    4. Reinstall the operating system
    5. Run chkdsk

  411. Which Linux command is used to check the computer's IP address and subnet mask?
    1. ifconfig
    2. ipconfig
    3. netstat
    4. ping
    5. ping6

  412. When testing pin 1 of the DC power supply of laser printer with a multimeter, what should the voltage reading be?
    1. -5 V
    2. -24 V
    3. -110 V
    4. +5 V
    5. +24 V

  413. A Windows computer appears to be unresponsive. Corresponding lights for the Caps Lock and the Num Lock keys does come on when pressed. What should be done next to resolve the problem?
    1. Reboot the computer
    2. Replace the keyboard
    3. Replace the motherboard
    4. Replace the power supply
    5. Unplug the keyboard and mouse

  414. Which Windows command will be executed first after replacing a hard drive and preparing it for data storage?
    1. bootrec
    2. chkdsk
    3. diskpart
    4. format
    5. sysdsk

  415. Given the following line from the Linux password file
    jsmith:x:500:600:Jane Smith:/home/jsmith:/bin/bash
    what would be the value of the user's UID?
    1. 500
    2. 600
    3. /home/jsmith
    4. Jane Smith
    5. x

  416. Which component generates Self-Monitoring, Analysis, and Reporting Technology errors?
    1. CPU
    2. Network card
    3. Power supply
    4. RAM
    5. SSD

  417. A computer is plugged into an outlet that works, and so does the power cable. However, when pressing the power button, no lights come on. There is no been, and no sound from the fan. Which component is most likely causing the problem?
    1. CPU
    2. Network card
    3. Power supply
    4. RAM
    5. SSD

  418. In Windows, which option of the ping command does not stop until it is canceled?
    1. -a
    2. -l
    3. -n
    4. -p
    5. -t

  419. An user has spilled a drink on the laptop, and now some of the keys on the keyboard are physically sticking. What should be done first to resolve this problem?
    1. Hold the keyboard upside down and shake it hard.
    2. Reboot the system.
    3. Replace the keyboard.
    4. Remove the keyboard and rinse it with mild soap and water.
    5. Use a slightly dampened cotton swab to clean under the keys.

  420. Which component is mostly like to cause a computer not to open files regardless of which program is running?
    1. CPU
    2. Hard disk drive
    3. Network card
    4. Power supply
    5. RAM

  421. A Windows 7 computer boots only into VGA mode. What should be done first to solve the problem?
    1. Reinstall the video card driver.
    2. Replace the monitor.
    3. Replace the video card.
    4. Reseat the video card.
    5. Reset the video resolution to a lower setting and reboot.

  422. What type of problem might a fan being next to a CRT monitor cause?
    1. Artifacts
    2. Backlight failure
    3. Distorted images
    4. Incorrect color patterns
    5. Overheating

  423. An user has an iPhone running iOS 9.3. The user receives an encrypted e-mail whose contents are highly confidential, but the device is unable to decrypt it. What should be done to resolve this problem?
    1. Change the screen settings on the iPhone.
    2. Properly configure the S/MIME settings.
    3. Resend the e-mail unencrypted.
    4. Upgrade to the latest version of iOS.
    5. Use Hotmail to read the message.

  424. In Linux, which file contains the encrypted password?
    1. /etc/crypt
    2. /etc/passwd
    3. /etc/password
    4. /etc/profile
    5. /etc/shadow

  425. Which component is mostly like to cause a Windows 7 computer to display the error "UNEXPECTED_KERNEL_MODE_TRAP"?
    1. CPU
    2. Hard disk drive
    3. Network card
    4. Power supply
    5. RAM

  426. An user reports that images on the monitor appear distorted or squeezed. What is the most like cause of this problem?
    1. Disconnected video cable
    2. Failing backlight
    3. Failing video card
    4. Incorrect video driver
    5. Incorrect video resolution

  427. Which Linux command will change the group ownership of a file?
    1. chmod
    2. chown
    3. chowner
    4. group
    5. passwd

  428. Given the information below regarding the file sun what can the user student, who is a member of the group class, do to the file?  
    -rw-r-----  2 red     class       6983 Feb 16 01:10 sun
    1. Append to the file.
    2. Delete the file.
    3. Execute the file.
    4. Modify the contents of the file.
    5. View the contents of the file.

  429. The lines of print on an inkjet printer are unevenly spaced. Some are too close together, while others are too far apart. What is the most likely cause of this problem?
    1. Exit rollers
    2. Ink cartridge
    3. Paper feed mechanism
    4. Stepper motor
    5. Toner cartridge

  430. Which Windows command shows NetBIOS over TCP/IP information?
    1. nbstat
    2. net
    3. netdom
    4. ping
    5. tcpdump

  431. An inkjet printer is consistently producing faded images. What should be done to resolve this problem?
    1. Clean the print head.
    2. Move the print head closer to the paper.
    3. Replace the ink cartridge.
    4. Replace the toner cartridge.
    5. Use thicker paper.

  432. What is the image at the right?
    1. High voltage probe
    2. Magnetic screwdriver
    3. Surge protector
    4. Voltage converter
    5. Wi-Fi analyzer

  433. Which Windows command will immediately stop the sharing of a folder shared as docs?
    1. net docs share /delete
    2. net docs share /stop
    3. net share docs /delete
    4. net share docs /stop
    5. net share stop \docs

  434. Which command will share the Z:\Downloads folder with everyone on the network and giving all of them full read/write access?
    1. net share Downloads=Z:\Downloads /GRANT:everyone
    2. net share Downloads=Z:\Downloads /GRANT:everyone,FULL
    3. net share Downloads=Z:\Downloads /GRANT:FULL
    4. net share use Downloads=Z:\Downloads /GRANT:everyone,FULL
    5. net share use Downloads=Z:\Downloads /GRANT:FULL

  435. What is the most likely cause of a wireless network card has its indicator lights off?
    1. Failed network card
    2. Incorrect TCP/IP configuration
    3. No Internet connection
    4. Unable to reach the DNS
    5. Unable to reach the gateway server

  436. Which is a step in battery calibration?
    1. Drain the battery completely and then charge it fully.
    2. Replace the battery.
    3. Reseat the battery.
    4. Run the computer in low energy mode.
    5. Set the computer to hibernate overnight.

  437. Which command will display entries of the name resolution server?
    1. dnslookup
    2. namelookup
    3. netlookup
    4. nrlookup
    5. nslookup

  438. Which Linux command terminates only the process with a process ID of 21345?
    1. kill 21345
    2. killall
    3. pgrep 21345
    4. pkill 21345
    5. ptree 23145

  439. Which component is the likely cause of a constant loud whining sound emanating from a desktop computer?
    1. CPU
    2. Hard disk drive
    3. Network card
    4. Power supply
    5. RAM

  440. Which statement is false?
    1. A capacitor plague is a type computer virus.
    2. Capacitors are passive electronic components with two terminals.
    3. Capacitors may retain a charge long after power is removed from a circuit.
    4. Capacitors store electricity.
    5. Many motherboards have capacitors on them.

  441. A computer, placed next to a wireless access point, with an 802.11g network adapter is trying to connect to an 802.11n network, but it is unable to locate the SSID. Which is the most likely cause of this problem?
    1. 802.11g is incompatible with 802.11n.
    2. SSID broadcasting is disabled at the wireless access point.
    3. The computer is out of range.
    4. The computer is too close to the wireless access point.
    5. The wireless access point may have reached its quota of users.

  442. Which tool can be used to look at network traffic and determine a computer name and MAC address associated with an IP address?
    1. Loopback plug
    2. Multimeter
    3. Packet sniffer
    4. Voltage meter
    5. Wireless locator

  443. Which can test the integrity of a power supply?
    1. Cable tester and capacitor tester
    2. Loopback plug and voltage meter
    3. Multimeter and power supply tester
    4. POST card and voltage meter
    5. Tone generator and probe

  444. Which statement is true?
    1. Running ipconfig /all will resolve all DHCP problems.
    2. Windows will automatically assign an IP address to itself starting with 169.254. if it cannot locate the DHCP server.
    3. Windows will automatically assign an IP address to itself starting with 169.254. if it cannot locate the DNS server.
    4. Windows will automatically assign an IP address to itself starting with 192.168. if it cannot locate the DHCP server.
    5. Windows will automatically assign an IP address to itself starting with 192.168. if it cannot locate the DNS server.

  445. Multiple users in one part of the building report losing their network connection. What is the most likely cause of this problem?
    1. Faulty network cable
    2. Faulty network card
    3. Faulty switch
    4. Incorrect TCP/IP configuration
    5. Software error

  446. Which is a Windows command that verifies the route to a remote host?
    1. netstat
    2. nslookup
    3. ping
    4. traceroute
    5. tracert

  447. Users report the wireless Internet connection shuts down occasionally in the afternoon. The wireless Internet router located by the window has power and the indicator lights look normal. What is the most likely cause of this problem?
    1. DHCP server
    2. DNS server
    3. Network overload
    4. Software glitch
    5. Wireless router overheating

  448. The help desk receives a report of a keyboard not working. This seems like a familiar problem because a colleague at the help desk mentioned the same problem a week ago. Where should the help desk technician look first to find information about this problem?
    1. Change documentation
    2. Health and safety documentation
    3. Incident documentation
    4. Inventory management documentation
    5. Risk management documentation

  449. According to troubleshooting theory, which is the next step after identifying the problem?
    1. Establish a plan of action to resolve the problem.
    2. Establish a theory of probable cause.
    3. Implement the solution.
    4. Test the theory to determine cause.
    5. Verify full system functionality.

  450. Without having administrator access, what can be done from a Windows 7 computer to find out if the computer is communicating properly with a network printer that is not printing?
    1. Print a blank document.
    2. Print a .pdf file.
    3. Print a test page.
    4. Print in RAW format.
    5. Stop and restart the print spooler.

  451. Following troubleshooting theory, what is part of identifying the problem?
    1. Conduct external research based on the symptoms.
    2. Documenting findings, actions, and outcomes.
    3. Implement preventative measures.
    4. Question the user to find out what has changed.
    5. Resolving the problem.

  452. PCI-X expansion slots are compatible with which adapter?
    1. 33 MHz PCI
    2. 66 MHz PCI
    3. 133 MHz PCI
    4. 233 MHz PCI
    5. 533 MHz PCI

  453. Which symptoms may indicate that the hard drive is failing?
    1. Blinking red indicator lights.
    2. Noisy fan and hardware casing too hot to touch.
    3. Read/write errors and unable to locate the operating system.
    4. Unable to keep the correct date and time.
    5. Unable to send print jobs to the printer.

  454. The system indicates that the RAID array is in a degraded state, with no spare disk available, yet a new disk was recently added to the RAID array. Which is the most like cause of this problem?
    1. Disk drive not recognized.
    2. Incompatible RAID type.
    3. Incorrect cabling.
    4. Operating system failure.
    5. Overheating.

  455. Which statement is false?
    1. The BIOS is stored on the first hard drive.
    2. The first step in troubleshooting theory is identify the problem.
    3. When a system experiences intermittent device failure, it could be the power supply delivering intermittent voltage.
    4. When laptops overheat, they shutdown.
    5. When wireless routers overheat, they shutdown.

  456. What should be created to backup a Windows 8.1 system configuration in order to be able to restore it in the event of a system crash?
    1. Restore point
    2. Shadow copy
    3. System copy
    4. System restore
    5. Windows backup

  457. Which Windows 7 administrative tool allows managing multiple print servers and printers from a single interface?
    1. Control Panel
    2. Device Manager
    3. Print Manager
    4. Print Services
    5. Services

  458. Which is the most appropriate back up strategy for a company that is closed on Sundays?
    1. Full back up every morning.
    2. Full back up every Sunday.
    3. Full back up every Sunday and nightly incremental backups on all other days.
    4. Incremental backups every Sunday and on holidays.
    5. Nightly incremental backups Monday through Saturday.

  459. What does 127.0.0.1 represent?
    1. Ethernet address
    2. Hardware address
    3. Loopback Internet address
    4. MAC
    5. Physical address

  460. Which statement is true about a MAC address?
    1. A computer can only have one MAC address.
    2. A MAC address is a 32-bit number.
    3. A MAC address is a 64-bit number.
    4. An IP datagram header is a 64-bit buffer.
    5. When an Ethernet card is replaced, the MAC address of the computer also changes.

  461. Which protocol provides reliable end-to-end communication?
    1. IP
    2. RELIABLE
    3. TCP
    4. TRANSPORT
    5. UDP

  462. Which forwards IP datagram packets from one network to another?
    1. Bridge
    2. Buffer
    3. Hub
    4. Router
    5. Switch

  463. Which program will create and edit documents and comes with all versions of Windows?
    1. Evince
    2. Notepad
    3. Textpad
    4. Write
    5. Word

  464. At which layer does a router operate?
    1. Application layer
    2. Data link layer
    3. Internet layer
    4. Network layer
    5. Transport layer

  465. Which Linux command will check whether a remote host is reachable?
    1. dig
    2. ifconfig
    3. netstat
    4. ping
    5. snoop

  466. Which Windows 7 feature allows all users to encrypt files on an NTFS volume?
    1. BitBlock
    2. EFS
    3. Encoder
    4. OneDrive
    5. Shadow Drive

  467. Which statement is true?
    1. Ports are defined by the Physical Layer.
    2. Sun Microsystems developed NFS.
    3. The Network Layer is the highest of the OSI seven layer model.
    4. The Session Layer is the highest of the OSI seven layer model.
    5. The Transport Layer is the highest of the OSI seven layer model.

  468. Which layer is responsible for establishing end-to-end communications between two machines?
    1. Application layer
    2. Data link layer
    3. Network layer
    4. Presentation layer
    5. Transport layer

  469. Which is the best way to determine the total capacity and specific type of RAM a system can handle?
    1. Control Panel > Device Manager
    2. Control Panel > Power Options
    3. Control Panel > System
    4. Open the case and inspect the RAM.
    5. Read the motherboard book.

  470. Which keystoke combination will open the Task Manager utility?
    1. Ctrl+Alt+Esc
    2. Ctrl+Alt+Tab
    3. Ctrl+Shift+Esc
    4. Ctrl+Shift+Tab
    5. Ctrl+Tab

  471. Which Windows 7 command will show the Group and Local Policy settings for a specific user?
    1. gpedit
    2. gprefresh
    3. gpresult
    4. gpshow
    5. groupedit

  472. In Linux, what is the name of the DNS daemon?
    1. domaind
    2. dnsd
    3. named
    4. nisd
    5. nscd

  473. In Windows 7, which management tool will configure programs to load upon startup?
    1. Active Directory
    2. Application Scheduler
    3. Computer Scheduler
    4. System Configuration
    5. Task Scheduler

  474. Which type of installation will allow for an unattended installation of 30 Windows 7 workstations, each with the same hardware?
    1. Clean
    2. Custom
    3. Image deployment
    4. Network
    5. PXE

  475. Which command will close the command prompt window in Windows Vista?
    1. close
    2. exit
    3. stop
    4. quit
    5. x

  476. Which Windows 8 feature allows is used to write script files based on Microsoft .NET programming framework?
    1. Event Viewer
    2. OneDrive
    3. PowerShell
    4. Script Drive
    5. Task Manager

  477. Which Windows 8 utility displays items in Category view and Classic view?
    1. Control Panel
    2. Event Viewer
    3. Task Manager
    4. Task Scheduler
    5. Windows Viewer

  478. Although no longer available due to security vulnerabilities, which was the name of the Windows Vista feature that allowed for placement of customizable programs on the Windows Desktop, such as a clock or the weather?
    1. Avatars
    2. Charms
    3. Gadgets
    4. Sidebar
    5. Widgets

  479. Which Windows command will delete the d:\files and all of its subdirectories?
    1. cd d:\files /a
    2. del d:\files /a
    3. rd d:\files /a
    4. rd d:\files /q
    5. rd d:\files /s

  480. Which statement is true about Windows To Go?
    1. It is available in Windows 7.
    2. It supports BitLocker.
    3. It supports upgrades to the operating system.
    4. It was discontinued due to security vulnerabilities.
    5. It works with USB 2.0 and USB 3.0.

  481. Which Windows & feature provides anti-spyware protection?
    1. Windows BitLocker
    2. Windows Defender
    3. Windows Firewall
    4. Windows Police
    5. Windows Protector

  482. At the Windows 8.1 command prompt, there is a Windows cabinet file in the current directory. What command is used to get a file out of the cabinet file?
    1. excab
    2. expand
    3. extract
    4. retrieve
    5. unzip

  483. Which is the executable file for disk defragmentation?
    1. DEFRAG.EXE
    2. DEFRAG.MSC
    3. DISK.EXE
    4. MSRA.EXE
    5. SDISK.EXE

  484. What is the name of Microsoft Windows feature that can create backup copies or snapshots of computer files or volumes, even when they are in use?
    1. Block Copy
    2. OneDrive
    3. Shadow Copy
    4. Windows Service Store
    5. Windows Backup

  485. Which Windows command will forcefully delete the file file.doc without asking any questions?
    1. cd file.doc /a /q
    2. del file.doc /a /f
    3. del file.doc /a /q
    4. del file.doc /f /q
    5. rd file.doc /a

  486. Which Windows tool will allows viewing of hidden files?
    1. Computer Management
    2. File Manager
    3. Local Security Policy
    4. Syntax Management
    5. Windows Explorer

  487. What statement is false?
    1. As a security precaution all homegroup computers must have snychronized clocks.
    2. Disk Shadow was renamed Shadow Copy.
    3. Windows HomeGroup allows sharing of files, folders, and printers with other Windows computers connected on a local area network.
    4. Windows Explorer can hide filename extensions.
    5. Windows Store is an online site from which apps, games, and other software can be downloaded.

  488. Which disk partition usage is directlyt affected by how much memory is installed in the system?
    1. The first extended partition
    2. The first logical partition
    3. The partition table
    4. The root partition
    5. The swap partition

  489. Which manages the download and installation of Windows updates and patches?
    1. Computer Management System Configuration
    2. Windows Patch Management
    3. Windows System Management
    4. Windows Update

  490. Which Windows command will indicate which edition of Windows is running?
    1. wined
    2. wininfo
    3. winname
    4. winspec
    5. winver

  491. Which is the best way to configure volumes for mission-critical data when performance is not an issue?
    1. RAID 3
    2. RAID 3 Stripe
    3. RAID 5 Mirror
    4. RAID 5 Stripe
    5. Stripe

  492. Which is the best way to configure volumes when read and write performance is most critical and data loss is not critical?
    1. RAID 1 Mirror
    2. RAID 3 Mirror
    3. RAID 5 Mirror
    4. RAID 6 Mirror
    5. Stripe

  493. Which provides data redundancy by using parity?
    1. Hot spare
    2. Hot swap
    3. RAID 1
    4. RAID 1+0
    5. RAID 5

  494. What is the term for a collection of spare slices that stand ready to replace a failed slice on a RAID 5 volume called?
    1. Backup set
    2. Disk set
    3. Hot spare pool
    4. Redundant slice
    5. Spare slice

  495. A laptop needs to be configured to have the display shut off after five minutes of inactivity when running on battery power, but to shut off after one hour of inactivity when plugged in. Where are these settings configured?
    1. Control Panel > Computer Management
    2. Control Panel > Performance Monitor
    3. Control Panel > Power Management
    4. Control Panel > Power Options
    5. Control Panel > System Configuration

  496. Which is the default read policy for a RAID 1 volume?
    1. First
    2. Geometric
    3. Parallel
    4. Round Robin
    5. Serial

  497. Which volume writes data on components simultaneously?
    1. Concatenation volume
    2. Logical volume
    3. Serial volume
    4. Square volume
    5. Stripe volume

  498. What Windows management utility would require users to periodically reset their passwords?
    1. Advanced Security
    2. Local Security Policy
    3. System Configuration
    4. Update and Security
    5. Users and Groups

  499. Which Windows administrative tool will ensure that files on the hard drive are written to contiguous blocks?
    1. Device Defragmenter
    2. Device Manager
    3. Disk Defragmenter
    4. Disk Management
    5. Disk Optimizer

  500. Which Windows 8.1 management tool the Local Security Policy tool that can lock out an account if there are multiple failed login attempts?
    1. LSP.EXE
    2. LSP.MSC
    3. MSRA.EXE
    4. SECMON.EXE
    5. SECPOL.MSC

  501. In oder to install a Windows 8.1 workstation from an image located on a server, what does the workstation need to support to enable this installation?
    1. Netboot
    2. Network boot
    3. PXE boot
    4. Unatteneded installation
    5. USB boot

  502. What type of installation is performed when a Custom installation is chosed and the hard drive is formatted?
    1. Clean
    2. Incremental
    3. Migration
    4. Network
    5. Upgrade

  503. Which Windows command copies files and directories, copies NTFS permissions, and mirrors a directory tree?
    1. copy
    2. copyall
    3. copydir
    4. robocopy
    5. xcopy

  504. Which statement is false about Windows Preinstallation Environment?
    1. It can be booted via USB flash drive, PXE, CD-ROM, or hard disk.
    2. It is a lightweight version of Windows used for the deployment of PCs, workstations, and servers.
    3. It is intended to replace MS-DOS boot disks.
    4. It is sometimes called WinPE.
    5. It is very expensive.

  505. How can an user make everything on the Windows Desktop appear larger?
    1. Control Panel > Appearances and Personalization
    2. Control Panel > Appearances and Personalization > Display
    3. Control Panel > Appearances and Personalization > Fonts
    4. Control Panel > Appearances and Personalization > Fonts > Font settings
    5. Control Panel > Appearances and Personalization > Personalization

  506. Which will create a directory named files on the D: drive?
    1. cd d:\files
    2. cd files d:\
    3. dir d:\files
    4. mkdir d:\files
    5. md files d:\

  507. Which file system is designed for optical media?
    1. CDFS
    2. ExFAT
    3. FAT
    4. NFS
    5. NTFS

  508. How does one enable Remote Assistance connections on a Windows 7 computer?
    1. Advanced Security > Remote
    2. Computer Management > Remote
    3. Control Panel > Remote
    4. Control Panel > Remote > Connections
    5. System Properties > Remote

  509. Which Windows command will show a list of available system commands?
    1. cmd
    2. dir
    3. dlist
    4. help
    5. list

  510. Which enables storage devices, including SD cards, and USB flash drives, to be used as a cache between a hard drive and random access memory in an effort to increase computing performance?
    1. AutoBoost
    2. OneDrive
    3. ReadyBoost
    4. Virtual Cache
    5. Virtual Memory

  511. A computer has experience a hard disk failure, and the data on the disk cannot be recovered. Which step would most likely prevent loss of data in the future?
    1. Always turn the computer off when not in use.
    2. Regularly back up files.
    3. Regularly clean the computer with a soft cloth.
    4. Regularly perform security updates.
    5. Update the system firmware.

  512. Where to look to insure no one is logged on remotely on to the Windows server?
    1. Control Panel > Remote
    2. Control Panel > Remote > Connections
    3. Performance Monitor
    4. Task Manager
    5. Users and Groups

  513. In Windows, which will show how much CPU time a process has used?
    1. tasklist /c
    2. tasklist /p
    3. tasklist /svc
    4. tasklist /u
    5. tasklist /v

  514. What does the Windows command verify do?
    1. Verify that files are written correctly to a disk.
    2. Verify that the network is up and running.
    3. Verify that the system has no malware installed.
    4. Verify the identity of an user.
    5. Verify the integrity of the CMOS battery.

  515. Which Windows command will navigate from the D:\users\health\safety directory to the D:\ directory?
    1. chdir
    2. cd
    3. cd\
    4. md
    5. md\

  516. Which command will run Windows memory diagnostic tool to check for memory problems?
    1. md
    2. mdsched
    3. memchk
    4. ramchk
    5. wdsutil

  517. Which Windows command puts the local computer into hibernation, if hibernation is enabled?
    1. hibernate
    2. shutdown /h /f
    3. shutdown /p
    4. shutdown /p /f
    5. shutdown /t 600

  518. Which Windows command will force applications to close and restart the local computer after a one-minute delay with the reason "Application: Maintenance (Planned)" and the comment "Reconfiguring app.exe"?
    1. shutdown /m \\servername /t 1 /c "Reconfiguring myapp.exe" /f /d p:4:1
    2. shutdown /r /m \\servername /t 60 /c "Reconfiguring myapp.exe" /f /d p:4:1
    3. shutdown /r /m /t 60 /c "Reconfiguring myapp.exe" /f /d p:4:1
    4. shutdown /r /t 1 /c "Reconfiguring myapp.exe" /f /d p:4:1
    5. shutdown /r /t 60 /c "Reconfiguring myapp.exe" /f /d p:4:1

  519. How many disk partitions can be marked Active at one time?
    1. 1
    2. 2
    3. 3
    4. 4
    5. All can be marked active at one time.

  520. Which command will scans and verifies the integrity of all protected system files and replaces incorrect versions with correct versions?
    1. scanfile /sfc
    2. sfc /scanfile
    3. sfc /scannow
    4. sfc /verify
    5. sfc /verifyfile

  521. Which Windows command switch or option can be used, besides /help, to provide help with command syntax and options?
    1. /!
    2. /@
    3. /#
    4. /$
    5. /?

  522. Which command does not require elevated or administrator privileges to run?
    1. bcdedit
    2. clearmgr
    3. partprobe
    4. sfc
    5. wbadmin

  523. Which Windows command will refresh Group Policy settings and force their change to take effect?
    1. gpedit
    2. gprefresh
    3. gpshow
    4. gpupdate
    5. grouprefresh

  524. In Windows, how are administrative shares identified?
    1. They all end with a dollar sign ($).
    2. They all end with a percent sign (%).
    3. They all start with a dollar sign $).
    4. They all start with a percent sign (%).
    5. They all start with the word admin.

  525. A test workstation needs to be configured to boot Windows Vista, Windows 7, and Windows 8.1. Which statement is true regarding the installation of these operating systems?
    1. Install the newest operating system first and the oldest operating system last.
    2. Install the oldest operating system first and the newest operating system last.
    3. It is not possible to install three different operating systems on a system.
    4. It is not possible to install three different Windows operating systems on a system.
    5. The order of installation does not matter.

  526. Which statement is false?
    1. Basic storage can only have primary and extended partitions.
    2. Disk management does not allow creating something called a logical partition.
    3. Dynamic partitions can be simple, spanned, or striped volumes.
    4. Extended partitions can be divided into one or more logical drives.
    5. Physical partitions can be divided into one or more logical drives.

  527. What is the name of the is an industry standard protocol for waking computers up from a very low power mode remotely that requires an Ethernet connection?
    1. NetBIOS
    2. Network Boot
    3. UDF
    4. Wake-a-go-go
    5. Wake-on-Lan

  528. Which Windows command will kill a process named amok.exe?
    1. taskkill /f amok.exe
    2. taskkill /fi amok.exe
    3. taskkill /im amok.exe
    4. taskkill /pid amok.exe
    5. taskkill /s amok.exe

  529. Which tool should be used to easily edit an image for unattended installation?
    1. ADK
    2. MDK
    3. RDK
    4. Sysprep
    5. WIM

  530. What is the best network setup for a workstation on a small network where each user manages their own security?
    1. Domain
    2. HomeGroup
    3. LocalGroup
    4. Netgroup
    5. Workgroup

  531. Which filesystem should be used on a Windows 8.1 computer that will need to set file and share permissions?
    1. DOS
    2. FAT32
    3. NFS
    4. NTFS
    5. ReFS

  532. A second hard disk is being installed and needs to be partitioned into six different logical partitions. What type of partition should be created to enable this?
    1. Active
    2. Extended
    3. Multiple
    4. Spanned
    5. Striped

  533. Windows 10 has just been installed on a system that was running a previous version of Windows. Device Manager has detected the sound card. However, the sound card is not working, although it previously worked fine. What should be the next step to get the sound card working again?
    1. Ensure the MIDI port is enabled in Device Manager.
    2. Install a new driver for the sound card.
    3. Reboot the computer.
    4. Reseat the sound card.
    5. Uninstall Windows 10 and reinstall the previous operating system.

  534. Which is a defining characteristic of a logical partition created on a secondary disk of a Windows computer?
    1. It has a drive letter.
    2. It is active.
    3. It is created within the extended partition.
    4. It is created within the physical partition.
    5. It spans multiple hard drives.

  535. Where in the Control Panel of a Windows 7 workstation can one repair and reinstall a corrupted application?
    1. Computer Management
    2. Programs and Features
    3. Software
    4. System
    5. System Configuration

  536. Which administration tool will allow to configure a Windows 7 computer to automatically install all new operating system patches when they become available?
    1. Advanced Security
    2. Performance Monitor
    3. System Configuration
    4. System Monitor
    5. Windows Update

  537. Which Windows command will display all files that have the archive bit set?
    1. dir /a:a
    2. dir /a:g
    3. dir /a:h
    4. dir /a:r
    5. dir /a:s

  538. Which Windows Vista administration tool can change the location of the user's temporary files folder?
    1. Advanced Security
    2. Computer Management
    3. System Configuration
    4. Users and Groups
    5. Windows Update

  539. Which Windows Vista administration tool provides a single interface for configuring the firewall, getting automatic updates and setting up malware protection?
    1. Advanced Security
    2. Computer Management
    3. Security Center
    4. System Configuration
    5. Windows Update

  540. Which command will format the D drive with the NTFS filesystem on a Windows computer?
    1. format d: /fs:ntfs
    2. format d: /ntfs
    3. format d: /q:ntfs
    4. format d: /v:ntfs
    5. ntfs d: /format

  541. On a MacBook Pro what is the name of the bar of icons of applicatons that runs along the bottom of the screen?
    1. App Finder
    2. Dock
    3. Finder
    4. Launcher
    5. Thunderbolt

  542. Which administrative tool will monitor memory and CPU performance over a period of time?
    1. Computer Management
    2. Event Viewer
    3. Performance Monitor
    4. Resource Monitor
    5. Windows Update

  543. Which Windows 7 utility displays error messages generated by applications or login failures?
    1. Event Viewer
    2. Message Center
    3. Performance Monitor
    4. Resource Monitor
    5. Task Manager

  544. Which Microsoft operating system is best for flash drives and SD cards?
    1. CDFS
    2. ExFAT
    3. FAT32
    4. NFS
    5. NTFS

  545. On a Window 8.1 workstation, what needs to be done to connect to a printer located on a Windows 7 workstation?
    1. Open the Add a Printer Wizard and map the network printer.
    2. Open the Add a Printer Wizard and share the printer.
    3. Right click the printer, choose Networks, and share the printer.
    4. Right click the printer, choose Printer Properties, and map the network printer.
    5. Right click the printer, choose Printer Properties, and share the printer.

  546. Which statement is true?
    1. Hibernate uses more power than sleep.
    2. Hibernate boots up faster than sleep.
    3. Sleep mode will close all open applications.
    4. While in resting mode, the computer uses very little power.
    5. While in sleep mode, the computer uses very little power.

  547. Which statement is false?
    1. Cross-linked files are created when the computer is improperly shut down or an application abnormally aborts.
    2. Cross-linked files are FAT entries that point to the same cluster.
    3. Cross-linked files are files that have become corrupt.
    4. Cross-linked files can be corrected using disk correction utilities, such as chkdsk.
    5. Cross-linked files only occur on systems running MacOS.

  548. What does the xcopy command do?
    1. Copies files and directories, including subdirectories.
    2. Copies files with hidden and system file attributes, but not subdirectories.
    3. Extracts copies of directories.
    4. Extracts copies of files.
    5. Undoes the copying of files and directories.

  549. Which tab of Internet Options within Internet Explorer is the home page set?
    1. Advanced
    2. Content
    3. General
    4. Privacy
    5. Security

  550. What is the smallest addressable storage unit on a disk platter?
    1. Block
    2. Cylinder
    3. Sector
    4. Slice
    5. Track

  551. Which tab of Internet Options within Internet Explorer can one turn on Pop-up Blocker?
    1. Advanced
    2. Content
    3. General
    4. Privacy
    5. Security

  552. What is the name of the Windows Phone and Windows 10 virtual assistant?
    1. Alexa
    2. Bill
    3. Cortana
    4. Dennis
    5. Elsa

  553. Which statement is false regarding DHCP?
    1. DHCP employs a connection oriented service model.
    2. DHCP operations fall into four phases: server discovery, IP lease offer, IP lease request, and IP lease acknowledgement.
    3. DHCP server assigns a local IP address to each device connected to the network.
    4. UDP port number 67 is the destination port of a server.
    5. UDP port number 68 is used by the client.

  554. Which command will copy and convert from one format to another?
    1. acopy
    2. bcopy
    3. cc
    4. dd
    5. xcopy

  555. Which unique 15-digit number identifies an user and the network on mobile telephone networks?
    1. IMEI
    2. IMSI
    3. MAC
    4. PRI
    5. PRL

  556. Which type of server maintains a database called a zone file, which it uses to provide clients with requested information?
    1. Authentication server
    2. DNS server
    3. Gateway server
    4. Initialization server
    5. Proxy server

  557. Which command is the fastest way to shut down a Linux system?
    1. halt
    2. init 0
    3. init 6
    4. reboot
    5. shutdown

  558. Which command checks network connectivity by simply relaying an ICMP message to the IP address provided?
    1. ifconfig
    2. ipconfig
    3. netstat
    4. nslookup
    5. ping

  559. Which command displays statistics related to the network interfaces?
    1. ifconfig
    2. ipconfig
    3. netstat
    4. nslookup
    5. traceroute

  560. Which option of grep searches for the expression as a word?
    1. -b
    2. -i
    3. -n
    4. -v
    5. -w

  561. Which utility is used to browse through files and folders on a MacBook Pro?
    1. Explorer
    2. File Explorer
    3. Finder
    4. iCloud
    5. Search

  562. What is the name of the log file that shows successful and unsuccessful log in attempts in Windows 7?
    1. Application
    2. Forwarded Events
    3. Security
    4. Setup
    5. System

  563. What type of server listens for inbound requests on ports 80 and 443?
    1. Authentication server
    2. DHCP server
    3. DNS server
    4. Mail server
    5. Web server

  564. Which statement is false?
    1. Storage Spaces is a technology that can help protect data from drive failures.
    2. Storage Spaces is compatible with all RAID adapters.
    3. Storage Spaces is conceptually similar to RAID, implemented in software.
    4. Storage Spaces records information about pools and storage spaces on the physical disks that compose the storage pool.
    5. Storage Spaces support ATA, SATA, SAS and USB drives.

  565. How does one update MacOS?
    1. Open App Store, then click Updates tab in the top menu.
    2. Open iTunes, then click Updates tab in the top menu.
    3. Open Preferences, then click Updates tab in the top menu.
    4. Open Safari, then click Updates tab in the top menu.
    5. Open System, then click Updates tab in the top menu.

  566. On Linux operating systems, which command configures a wireless network interface?
    1. ipconfig
    2. iwconfig
    3. mobiecf
    4. netstat.
    5. wireless

  567. Which is a text editor available on all Linux systems?
    1. cat
    2. nano
    3. Notepad
    4. pico
    5. vi

  568. Which Linux command would display the last 10 lines of the file fit?
    1. echo fit
    2. head fit
    3. list -10 fit
    4. print -10 fit
    5. tail fit

  569. Given the following sequence of Linux commands
      cd
      cd ../sister
      cd /home
      pwd
    what would be the output of the last command?
    1. /
    2. /home
    3. /home/sister
    4. /sister
    5. /sister/home

  570. Which network optimization feature, first introduced in Windows 8, can run in distributed or hosted mode?
    1. BranchCache
    2. CacheBypass
    3. CacheNetwork
    4. CacheServe
    5. HostedCache

  571. Which Linux command sets the default protection mode, which applies to all subsequently created files?
    1. chgrp
    2. chown
    3. file
    4. umask
    5. wc

  572. Which Linux command appends the contents of the file whiskers to the end of the file grow?
    1. append whiskers > grow
    2. append whiskers >> grow
    3. cat grow > whiskers
    4. cat whiskers > grow
    5. cat whiskers >> grow

  573. Which Linux command displays the contents of one or more files?
    1. cat
    2. display
    3. dog
    4. list
    5. print

  574. Which Linux file contains the IP address of the DNS server?
    1. /etc/init
    2. /etc/init.d
    3. /etc/issue
    4. /etc/resolv.conf
    5. /sbin/ifconfig

  575. What is the name of the MacOS tool that is used for sharing the screen, files, peripherals, Bluetooth, and Internet access?
    1. Family
    2. Finder
    3. MacShare
    4. Sharing
    5. Slice

  576. Which Linux command will display all running processes in real time?
    1. fstype
    2. ls
    3. process
    4. status
    5. top

  577. Which device can perform packet filtering, shut down network attacks, block spam and malware, and prohibit access to inappropriate Web sites?
    1. File Server
    2. Firewall
    3. Intrusion Detection Server
    4. Proxy Server
    5. Unified Threat Management

  578. An application on a MacBook Pro is hung. How can this application be closed?
    1. Ctrl+Alt+Delete
    2. Ctrl+Alt+Esc
    3. Ctrl+Delete
    4. Force Quit
    5. Task Manager

  579. In Windows 10, where can one manage their Web credentials and Windows credentials?
    1. Control Panel > Administrative Tools > Credential Manager
    2. Control Panel > Administrative Tools > System and Security
    3. Control Panel > Security and Maintenance > Credential Manager
    4. Control Panel > User Accounts > Credential Manager
    5. Control Panel > User Accounts & User Accounts

  580. Which Ubuntu Linux command will update the package database?
    1. apt-get
    2. apt-get update
    3. get-apt update
    4. rpm -hiv
    5. rpm -irv

  581. Which best describes the image at the right?
    1. BIOS Partition Table Scheme
    2. Disk Partition Table Scheme
    3. Extended Partition Table Scheme
    4. GUID Partition Table Scheme
    5. MBR Partition Table Scheme

  582. Which statement is true?
    1. IMAP4 uses port 53.
    2. IMAP4 uses port 143.
    3. POP3 uses port 25.
    4. POP3 uses port 53.
    5. SMTP uses port 563.

  583. Which command will allow an administrator to prepare and mount a Windows Desktop image?
    1. chkdisk
    2. chkdsk
    3. diskpart
    4. dism
    5. mount

  584. Which Windows 10 networking option is available to permit connecting to the Internet using a celluar connection?
    1. LPAN
    2. VPN
    3. SSID
    4. WWAN
    5. ZEN

  585. What is Keychain?
    1. A certificate management tool.
    2. A key encryption management system.
    3. A local files sharing system in MacOS, developed by Apple.
    4. A password management system in MacOS, developed by Apple.
    5. A password management system in Windows.

  586. Which statement is true?
    1. Linux is more expensive than Windows.
    2. Linux is open source.
    3. One cannot modify the underlying code behind Linux.
    4. There is only one Linux workstation operating system.
    5. Windows experiences fewer threats and exploits than Linux.

  587. What is the name of the Windows tool called that fixes compatibility problems with older versions of software, some that go as far back as Windows 95?
    1. Old Windows Version
    2. Program Compatibility Troubleshooter
    3. Windows Synchronization
    4. Windows Troubleshooter
    5. Windows Update

  588. Which case involves User Account Management in Windows 10?
    1. Users ask for Internet access.
    2. Users ask to have an extended disk partition added.
    3. Users request a DVD reader.
    4. Users request their network printer be moved.
    5. Users request their theme settings be synchronized together.

  589. An administrator copied critical and confidential data files to the company's Web server. What did the administrator fail to consider?
    1. Local access
    2. Network access
    3. Performance
    4. Privacy
    5. Redundancy

  590. Which step would most likely prevent a system from becoming subject to ransomware?
    1. Always use a screen lock.
    2. Regularly back up files.
    3. Regularly clean the computer screen.
    4. Regularly perform security updates.
    5. Update the system firmware.

  591. What is the name of the space on the disk set aside to hold an extra copy of key operating system files?
    1. Recovery partition
    2. Reinstallation partition
    3. Restore partition
    4. System image
    5. System partition

  592. What is the name of the Apple software that creates incremental backups of files that can be restored at a later date?
    1. Backup Capsule
    2. Backup Machine
    3. Time Capsule
    4. Time Machine
    5. Timer

  593. Which statement is false regarding Linux Mint?
    1. Linux Mint comes with Firefox installed.
    2. Linux Mint comes with LibreOffice installed.
    3. Linux Mint comes with Thunderbird installed.
    4. Linux Mint uses Redhat Package Manager as its package manager.
    5. Timeshift is comes pre-installed on Linux Mint.

  594. What is the name of the original backup and restore tool that comes with Linux Mint?
    1. Timecapsule
    2. Timemachine
    3. Timer
    4. Timeshift
    5. Timeslice

  595. Which ports are used for SMTP with SSL and IMAP4 with SSL?
    1. 25 and 143
    2. 25 and 993
    3. 465 and 993
    4. 587 and 993
    5. 587 and 995

  596. What is the name of the system-wide desktop search feature of Apple's MacOS and iOS operating systems that allows an user to search for files by description, and not just by name?
    1. Search
    2. Searchlight
    3. Seeker
    4. Sniffer
    5. Spotlight

  597. Which statement is false?
    1. Regular expressions can be used with the killall command when specifying which process to terminate.
    2. The Linux kill command terminates processes specified by their process ID.
    3. The Linux kill command terminates processes specified by their process name.
    4. The Linux killall command terminates processes specified by their process ID.
    5. Wildcards can be used with the killall command when specifying which process to terminate.

  598. When is the most appropriate time to apply operating system patches and updates?
    1. After it has received good reviews in trade journals.
    2. As soon as they become available.
    3. On the weekend.
    4. Once a month.
    5. Only when they fix a critical security flaw.

  599. What should be done to prevent a hacker from booting a computer?
    1. Disable autorun.
    2. Require passwords to be 16 characters long.
    3. Require passwords to have both lowercase and uppercase letters.
    4. Restrict access to the keyboard.
    5. Set a BIOS/UEFI password.

  600. Which is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules?
    1. Border Gateway Policy
    2. Firewall
    3. Intrusion Detection System
    4. Intranet
    5. Virtual Private Network

  601. Which is not a type of social engineering attack?
    1. Denial of service attack
    2. Phishing
    3. Pretexting
    4. Spear phishing
    5. Tailgating

  602. What is it when the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other?
    1. ARP spoofing
    2. Denial of service attack
    3. Evil maid attack
    4. Man-in-the-middle attack
    5. Phishing

  603. Which is an example of biometric authorization for a mobile device such as a tablet or smartphone?
    1. Fingerprint lock
    2. Padlock
    3. Password
    4. Key lock
    5. Swipe lock

  604. A company policy that requires both a password and a fingerprint scan to unlock a mobile device for use is an example of what type?
    1. Biometric authentication
    2. Key lock encryption
    3. Multifactor authentication
    4. Password management
    5. Physical security

  605. Which Windows group has more privileges than normal users but not as much as administrators?
    1. Advanced Users
    2. Biometric Users
    3. Enhanced Users
    4. Power Users
    5. Superuser

  606. Which is considered to be the best practice for managing user account security?
    1. Allow all user accounts Read and Write permission on all systems.
    2. Follow the principle of least privilege.
    3. Lock all doors.
    4. Place all user accounts in the Power Users group.
    5. Require all users to log on as a Guest user.

  607. A worker takes their company iPad with them when having lunch at the park down the street, and complains of intermittent wireless connectivity. What is the most likely cause of this?
    1. The iPad may be experiencing interference.
    2. The iPad may be in airplane mode.
    3. The iPad may be out of range of the corporate Wi-Fi network.
    4. The sound card of the iPad may be failing.
    5. Too many iPads in the park at lunch time.

  608. Which makes use of encapsulation to transfer data across networks?
    1. E-mail filtering
    2. Firewall
    3. Packet filtering
    4. PKI
    5. VPN

  609. Which statement is false?
    1. NTFS permissions affect users at the local computer.
    2. NTFS permissions affect users regardless if they are at the local computer or accessing the resource across the network.
    3. NTFS permissions can be set at the file level.
    4. Share permissions can be applied only to folders.
    5. Share permissions can be set at the file level.

  610. Which will help find mobile telephones that are missing or lost, and uses GPS to find them?
    1. Family locator app
    2. GPS app
    3. Remote control app
    4. Trusted source app
    5. Virtual locator app

  611. Which security mechanism specifies permissions for users and groups as well as the type of activities the users or groups can perform?
    1. ACL
    2. BGP
    3. DLP
    4. Firewall
    5. VPN

  612. Systems on the network have not been updated in years, and the same is true with the antivirus software. What type of security threat does this represent?
    1. Brute force attack
    2. Noncompliant systems
    3. Obsolete attack
    4. Zero-day attack
    5. Zombie attack

  613. What is a document describing the proper usage of company hardware and software called?
    1. Acceptable Use Policy
    2. Access Control List
    3. All Access Document
    4. Inventory List
    5. Least Privilege

  614. Which will encrypt the entire hard drive including startup files of a Windows 7 Enterprise workstation?
    1. BitLocker
    2. Private Key Encryption
    3. Public Key Encryption
    4. Secure Shell
    5. Transport Layer Security

  615. Which is the first layer of security that should be implemented on an iPhone to prevent others from accessing data on it?
    1. Combination lock
    2. Full device encryption
    3. Multifactor authentication
    4. Screen lock
    5. Zombie lock

  616. Which type of malware is designed to look like a different program and, when installed, will create a back door for an attacker to access the target computer?
    1. Spyware
    2. Trojan horse
    3. Virus
    4. Worm
    5. Zombie

  617. By instructing users not to use common words for their passwords, what type of security risk is being prevented?
    1. Dictionary attack
    2. Dumpster diving
    3. Phishing
    4. Shoulder surfing
    5. Social engineering

  618. What is the name of the process of using a large magnet to clear the data off a hard drive?
    1. Corroding
    2. Degaussing
    3. Incineration
    4. Overwriting
    5. Zero writing

  619. An user complains that their Web browser is now subject to dozens of pop-up windows offering to sell items they are not interested in. What type of problem does this computer have?
    1. Spyware
    2. Trojan horse
    3. Virus
    4. Worm
    5. Zombie

  620. A Windows computer has a volume formatted with NTFS. The Developers group has Modify access to the C:\dev folder. A member of the Developers group copies that folder into the C:\ops folder. The Developers group has Read access to that folder. What permissions will the Developers group have to the new C:\ops\dev folder?
    1. Full Control
    2. Modify
    3. No Access
    4. Read
    5. Read and Execute

  621. Which security mechanism is designed to protect laptops from theft?
    1. GPG
    2. Screen lock
    3. Security token
    4. USB lock
    5. Zombie lock

  622. Which requires constant updates to best protect a computer from security threats?
    1. Access control list
    2. Antivirus
    3. Directory permissions
    4. Firewall
    5. Zombie lock

  623. An user who is a member of the Developers group is trying to access a folder named reports located on a different computer. The NTFS permissions for the reports shared folder on that computer for the Developers group are Read and Write. The folder's shared permissions for the Developers group is Read permission. What are the user's effective permissions on the reports folder?
    1. Full Control
    2. Modify
    3. No Access
    4. Read
    5. Read and Execute

  624. In Windows, how can one prevent the installation of malware from CD/DVD drives?
    1. Disable autorun.
    2. Enable data encryption.
    3. Restrict access to the keyboard.
    4. Set a BIOS/UEFI password.
    5. Set a privacy filter.

  625. Which type of malware will attempt to hide itself by encrypting parts of itself, and changing its signature to avoid detection?
    1. Phage virus
    2. Polymorphic virus
    3. Retro virus
    4. Stealth virus
    5. Worm

  626. Which statement is false?
    1. All users can use BitLocker.
    2. All users can use Encrypting File System.
    3. BitLocker encrypts a whole volume and whatever is stored on it.
    4. Encrypting File System can encrypt and decrypt files stored on NTFS volumes.
    5. Encrypting File System can encrypt one or more files.

  627. An user who is a member of the Developers group is trying to access a folder named reports located their computer. The NTFS permissions for the Developers group are Allow Read and Execute. The folder's shared permissions for the Developers group are Deny Full Control. What are the user's effective permissions on the reports folder?
    1. Full Control
    2. Modify
    3. No Access
    4. Read
    5. Read and Execute

  628. Which is a physical device that users carry that provides access to network resources?
    1. Bluetooth device
    2. ID badge
    3. Privacy filter
    4. Screen filter
    5. Security token

  629. Which is generally the best location for installing a wireless access point?
    1. At the center of the network.
    2. At the edge of the network area and point it in the direction of the network.
    3. In a closet so it can be protected.
    4. In a crawl space so it can be protected.
    5. Near metal objects so the signal will reflect better.

  630. What is the term for an unknown security vulnerability in a computer software or application for which either the patch has not been released or the application developers were unaware of or did not have sufficient time to address?
    1. Botnet attack
    2. Brute force attack
    3. Noncompliant attack
    4. Zero-day attack
    5. Zombie attack

  631. Which is a computer virus that infects and spreads in multiple ways, and are often tricky and hard to eliminate?
    1. Multipartite virus
    2. Phage virus
    3. Polymorphic virus
    4. Retro virus
    5. Trojan horse

  632. An user who is a member of the Developers group is trying to access a folder named reports located their computer. The NTFS permissions for the user are Full Control for that folder. The NTFS permissions for the Developers group are Allow Read and Execute for that folder. The folder's shared permissions for the Developers group are Read. What are the user's effective permissions on the reports folder?
    1. Full Control
    2. Modify
    3. No Access
    4. Read
    5. Read and Execute

  633. Where can a network administrator block all incoming network traffic on a port?
    1. Extranet
    2. Firewall
    3. On the MIDI port
    4. Sound card
    5. Virtual Private Network

  634. Which is a standalone malware computer program that replicates itself and uses a computer network to spread itself in order to spread to other computers?
    1. Polymorphic virus
    2. Spyware
    3. Stealth virus
    4. Trojan horse
    5. Worm

  635. Which should be implemented to reduce incoming spam on a network?
    1. Access Control List
    2. Close port 25 on the firewall.
    3. E-mail filtering
    4. MAC address filtering
    5. Port mapping

  636. Which gives the user the ability to change permissions for others, and can take ownership of a directory and its contents?
    1. Change Permissions
    2. Full Control
    3. Modify
    4. Read and Execute
    5. Read and Write

  637. What is needed from a vendor who specializes in the destruction and disposal of old hard drives as required for audit purposes?
    1. A certificate of destruction.
    2. A notarized letter from the disposal company.
    3. Ashes of the hard disk.
    4. Fragments of the hard disk.
    5. Photographs of the destruction.

  638. An user who is a member of the Developers group and of the Operations group is trying to access a folder named reports located their computer. The NTFS permissions for the Developers group are Read only. for that folder. The permissions for the Operations group are Write. What are the user's effective permissions on the reports folder?
    1. Full Control
    2. Modify
    3. Read
    4. Read and Write
    5. Write

  639. Which is the creation of Internet Protocol (IP) packets with a false source IP address, for the purpose of impersonating another computing system?
    1. Denial of Service attack
    2. IP filtering
    3. IP Spoofing
    4. Man-in-the-middle attack
    5. System Configuration

  640. Which type of security device often incorporated RFID technology to grant access to secure areas or resources?
    1. Key fob
    2. Security chip
    3. Security token
    4. Smart card
    5. Token chip

  641. Which statement is true?
    1. Temporal Key Integrity Protocol is the most secure wireless protocol.
    2. WEP is a notoriously strong security standard.
    3. WEP offers improved security over WPA.
    4. WPA2 is more secure than WEP.
    5. WPA2 uses an encryption device that encrypts the network with a 32-bit key.

  642. After installing a wireless router in an office, a technician discovers that it is possible to get a network signal across the street. This is considered a security vulnerability. How can it be mitigated?
    1. Assign a static IP address to the router.
    2. Enable WEP.
    3. Enable WPA2.
    4. Reduce the radio power level.
    5. Turn on packet sniffing.

  643. Which user account in Windows 7 has the least restrictive permissions by default?
    1. Administrator
    2. Guest
    3. Power User
    4. Root
    5. User

  644. What type of attack occurs when the attacker uses personal information about their target to increase their probability of success or that a target would be less likely to question because it appears to come from a trusted source?
    1. Bait and switch
    2. Covert redirect
    3. Man-in-the-middle
    4. Spear phishing
    5. Spoofing

  645. Which account management policy will help prevent a brute force attack?
    1. Forcing users to frequently change their passwords.
    2. Implement a Kerberos policy.
    3. Setting an Account lockout threshold.
    4. Setting strong passwords.
    5. Using an USB lock.

  646. Which should be implemented to prevent users from accessing Web sites with objectionable material?
    1. Content filtering
    2. Disabling port 80
    3. Disabling port 443
    4. E-mail filtering
    5. Packet filtering

  647. What can be done to prevent outside users from knowing the network name of the office wireless network?
    1. Disable ICMP broadcasts.
    2. Disable SSID broadcasts.
    3. Disable WEP.
    4. Enable MAC address filtering.
    5. Reduce the radio power level.

  648. In Windows, which will enforce password complexity, password length, and how often a password must be changed?
    1. Authentication Policy
    2. Credential Manager
    3. Group Policy
    4. Personalization
    5. Workgroup Manager

  649. On a Windows 8.1 workstation, which file attributes are turned on by default on system files?
    1. Archive and Read
    2. Hidden and System
    3. Read and System
    4. Read, System and Write
    5. System and Write

  650. What does NTFS use to track users and groups and their level of access?
    1. Access Control Lists
    2. Block Identifiers
    3. Registry
    4. Tokens
    5. Tracking

  651. Which monitors the contents of systems to insure key content is not deleted or removed, and also monitor who is using the data?
    1. Access Control List
    2. Content Filtering
    3. Data Loss Prevention
    4. Firewall
    5. Virtual Private Network

  652. On a network with multiple users who have to log on to multiple machines, it is difficult for users to have to remember the many different passwords. Which technology should be used so users do not have to remember all these passwords?
    1. BTG
    2. DLP
    3. EFS
    4. PKI
    5. SSO

  653. An user discovers a file at the root of their default directory. It contains everything that has been typed over the past few dasy including passwords. What is has caused this file to exist?
    1. Backup file.
    2. E-mail recovery enabled.
    3. Keylogger installed.
    4. Packet sniffer installed.
    5. System auditing installed.

  654. What can an user install on their laptop to protect their privacy while sitting in the middle seat of an airplane?
    1. Multifactor authentication
    2. Privacy Screen
    3. Secure Socket Layer
    4. Transport Layer Security
    5. Virtual Private Network

  655. Which is a mathematical scheme for verifying the authenticity of digital messages or documents?
    1. Digital scheme
    2. Digital signature
    3. Key generation algorithm
    4. Multifactor authentication
    5. Signature key

  656. What 128-bit block size encryption algorithm, originally named Rijndael, was designed to replace DES?
    1. AES
    2. DES2
    3. DES3
    4. PKI
    5. VPN

  657. Which protocol was designed to authenticate remote users to a dial-in access server?
    1. RADIUS
    2. SMTP
    3. TKIP
    4. VPN
    5. WEP

  658. Which security mechanism prevent servers from being stolen from a rack in a data center?
    1. Key fob
    2. Firewall
    3. Network authentication
    4. Security token
    5. Server lock

  659. Which basic Active Directory function will resolve the problem of an user not being able to log in because of too many failed attempts?
    1. Account creation
    2. Account deletion
    3. Disable account
    4. Enable account
    5. Password reset and unblock account

  660. Which Active Directory concept creates a directory subdivision within which users, groups, and other objects may be placed?
    1. Directory assistant
    2. Domain
    3. Home folder
    4. Organizational unit
    5. User

  661. Which Windows 10 tool allows the administrator to make changes to the operating system without having to boot up Windows?
    1. Control Panel
    2. Emergency repair disk
    3. File Explorer
    4. PowerShell
    5. Windows Recover Environment

  662. What are Rainbow tables used for?
    1. To compare crytographic hashes for checking passwords.
    2. To enhance polarity of the DVI video connector.
    3. To offer more color options for the desktop.
    4. To provide seven times the network bandwidth of a network interface card.
    5. To reverse polarity of the DVI video connector.

  663. Which protocol is used by printer manufacturers to provide a raw TCP port for data?
    1. 23
    2. 25
    3. 443
    4. 563
    5. 9100

  664. An iPhone user complains of no wireless connectivity, yet the iPhone is on. In attempting to resolve this problem, what is the first thing to do?
    1. Adjust the Wi-Fi signal.
    2. Check whether airplane mode is on.
    3. Increase the volume.
    4. Reset the iPhone back to factory defaults.
    5. Turn the iPhone off and then back on.

  665. A custom database software application has been purchased from an outside vendor. When it is installed on a Windows 10 wokstation following the installation instructions, it crashes when the application is opened. It still crashes the system even after the software was removed and reinstalled. What should be done next?
    1. Contact the vendor to find out if a patch or update is needed.
    2. Delete and reinstall Windows 10.
    3. Enable Software Compatibility through Control Panel.
    4. Reboot the system.
    5. Run a virus check on the system.

  666. When browsing the Web, no matter what URL is entered in the address bar, a Web site different from the intended oe appears. What has happened?
    1. The computer is infected with spam.
    2. The computer is infected with a Web Browser Redirect Virus.
    3. The firewall has port 80 blocked.
    4. The Internet is broken.
    5. The network is infected with a Web Browser Redirect Virus.

  667. An user has forgotten the password to a seldomly used iPhone. After turning on the iPhone off and back on, repeated attempts to enter the correct password have failed. What can be done to unlock the iPhone?
    1. Change the battery.
    2. Perform a hard reset.
    3. Reset the iPhone back to factory defaults.
    4. Sync it up with iCloud.
    5. Sync it up with iTunes.

  668. What should be done to display the contents of an iPad on to a large computer monitor that has a DVI connector?
    1. Plug the monitor into the DVI port on the iPad.
    2. Plug the monitor into the USB port on the iPad.
    3. Purchase a DVI to USB adapter.
    4. Purchase a Lightning to DVI adapter.
    5. Turn on video broadcast mode.

  669. A Windows 10 workstation is suspected of being infected with malware. In practicing best practices for malware removal, what should be done first?
    1. Apply all software patches.
    2. Create a restore point.
    3. Enable system restore.
    4. Identify malware symptoms.
    5. Quarantine the workstation.

  670. Several users with mobile devices report the network is slow in certain areas of the office. What can be used to test wireless access?
    1. Cell tower analyzer
    2. Data transmission analyzer
    3. Event viewer
    4. Hot spot analyzer
    5. Wi-Fi analyzer

  671. A new sound card is installed on a Windows computer. Now the computer has crashed and displays the blue screen of death. The computer is turned off. What should be the next thing to do to resolve the problem?
    1. Boot to Safe Mode and uninstall the sound card driver.
    2. Boot to Windows and start the Recovery Console.
    3. Reinstall Windows.
    4. Remove the hard drive from the computer and reboot.
    5. Remove the sound card from the computer and reboot.

  672. Which file is the MBR responsible for the system loader used to continue the Windows 8 boot process?
    1. BOOTMGR
    2. NTLDR
    3. WINEXE
    4. WINLOAD
    5. WINRUN

  673. Which is a lightweight version of Windows used for the deployment of PCs, workstations, and servers, or troubleshooting an operating system while it is offline?
    1. MS-DOS
    2. Windows Automated Installation Kit
    3. Windows Lite
    4. Windows Personal Computer
    5. Windows Preinstallation Environment

  674. Which Windows utility can be used to see the contents of log files?
    1. Event Viewer
    2. Log Viewer
    3. Security Console
    4. System Console
    5. System Monitor

  675. In Windows 7, how does one boot into Safe Mode?
    1. During the boot process, press Ctrl+Alt+Del.
    2. During the boot process, press Ctrl+Alt+Esc.
    3. During the boot process, press Ctrl+Alt+F1.
    4. During the boot process, press F8.
    5. During the boot process, press F10.

  676. Which file checks for installed devices and initializes them during the boot process?
    1. BOOTMGR
    2. NTDETECT
    3. WINEXE
    4. WINRESUME
    5. WINRUN

  677. A Windows 7 computer will not boot properly. It shows the Windows logo upon boot and the appears to lock up. What is most likely causing the problem?
    1. A missing or corrupt BOOTMGR file.
    2. A missing or corrupt DLL file.
    3. A missing or corrupt NTLDR file.
    4. A missing or corrupt SCSI driver.
    5. A missing or corrupt sound card driver.

  678. A Windows 8.1 computer has a hard drive with almost no space available on the device. Which tool or command should be used to free up disk space?
    1. defrag
    2. Disk Cleanup
    3. Disk Manager
    4. sfc
    5. Task Manager

  679. An iPhone has been charging for hours. When it is unplugged from the charger, it feels very hot. What should be done next?
    1. Get a new iPhone.
    2. Replace the charger.
    3. Swipe right.
    4. Turn it off.
    5. Turn on airplane mode.

  680. What will be the effect of pressing and holding the Sleep/Wake and Home buttons on an iPhone until the Apple logo appears?
    1. Factory Reset
    2. Force Restart
    3. iCloud Backup
    4. iTunes Backup
    5. Removes all data from the iPhone.

  681. An app on an iPhone that uses GPS has stopped responding. What should be done to resolve this problem?
    1. Factory Reset
    2. Force Stop
    3. iCloud Backup
    4. iTunes Backup
    5. Uninstall and reinstall the app.

  682. Which statement is false?
    1. A DNS server resolves hostnames to IP addresses.
    2. A VPN is a secured network connection made over an unsecure network.
    3. The International Mobile Subscriber Identity identifies a specific mobile telephone.
    4. The International Mobile Subscriber Identity is an unique 15-digit number.
    5. Windows configuration information is stored in a special configuration database known as the Registry.

  683. Which is the last step in the best practices of malware removal and recovery?
    1. Educate the end user.
    2. Identify and research malware symptoms.
    3. Quarantine the infected systems.
    4. Remediate the infected systems.
    5. Schedule scans and run updates.

  684. Which Windows utility helps troubleshoot startup problems by selectively diabling individual items that are normally executed at startup?
    1. CONFIG
    2. MSCONFIG
    3. REGEDIT
    4. REGSERV
    5. ZEN

  685. Scan for and remove the virus, and update antivirus software, are two steps of which part of the best practices of malware removal and recovery?
    1. Enable System Restore.
    2. Identify and research malware symptoms.
    3. Quarantine the infected systems.
    4. Remediate the infected systems.
    5. Schedule scans and run updates.

  686. Which statement is true?
    1. Kernel panic is serious error message in Linux.
    2. Kernel panic is serious error message in OpenVMS.
    3. Kernel panic is serious error message in Windows 10.
    4. Blue screen of death is serious error message in Linux.
    5. Blue screen of death no longer exists in Windows 10.

  687. When booting a Window 8.1 computer, an error message about a missing DLL file appears. However, Windows 8.1 works fine, and it appears normal. Which utility should be used to attempt fix the issue?
    1. CONFIG
    2. MSCONFIG
    3. REGEDIT
    4. REGSVR32
    5. sfc

  688. Which tool is designed to help improve hard disk performance?
    1. defrag
    2. Disk Cleanup
    3. Disk Manager
    4. sfc
    5. Task Manager

  689. What causes a smartphone in a remote location to quickly drain its battery while on?
    1. Playing games.
    2. Rebooting.
    3. Running apps.
    4. Searching for signal.
    5. Using the flashlight feature.

  690. During which step in the laser printer printing process does a strong, uniform negative charge get applied to the surface of the imaging drum?
    1. Charging
    2. Cleaning
    3. Exposing
    4. Initializing
    5. Transferring

  691. In Windows 7, where can one find tools to troubleshoot a system that is exhibiting slow system performance?
    1. Control Panel > Advanced Tools
    2. Control Panel > Administrative Tools > Performance Manager
    3. Control Panel > Administrative Tools > System and Security
    4. Control Panel > Performance Information And Tools > Advanced Tools
    5. Control Panel > User Accounts & Advanced Tools

  692. The screen of a smartphone is too dim. What should be done to resolve this problem?
    1. Add an external batty pack.
    2. Adjust the screen brightness setting.
    3. Change the battery.
    4. Remove the screen protector.
    5. Turn the device off and back on again.

  693. What will a restore point do?
    1. Create a bootable disk with copies of key system files.
    2. Create a copy of the entire hard drive.
    3. Create a copy of the master boot record.
    4. Create a copy of the system configuration data.
    5. Create a copy of the system configuration data and the users' folders.

  694. What should be done to an iPhone that was used by a previous employee before assigning it to a new employee?
    1. Adjust configuration settings.
    2. Install a new battery.
    3. Perform a hard reset.
    4. Perform a soft reset.
    5. Reset it to the factory defaults.

  695. Which tool is used to edit boot options in Windows?
    1. bcdedit
    2. boot.ini
    3. regedit
    4. sfc
    5. partprobe

  696. In which step of the laser printing process does a mirror move the laser beam across the surface of the drum?
    1. Charging
    2. Cleaning
    3. Developing
    4. Exposing
    5. Transferring

  697. A smartphone is running out of memory. What should be done to resolve this problem?
    1. Install a new battery.
    2. Perform a force stop.
    3. Perform a hard reset.
    4. Perform a soft reset.
    5. Uninstall unnecessary apps.

  698. What is a possible consequence of connecting, while at home, to an unrecognized or unknown Wi-Fi network?
    1. Battery drain.
    2. Faster download speeds.
    3. More susceptible to hacking.
    4. Network interference.
    5. Power outages.

  699. A MacBook Pro appears unresponsive and the cursor has changed to a rotating pinwheel What should be done to resolve this problem?
    1. Open Apple Diagnostics to diagnose the problem.
    2. Reboot the system.
    3. Reload the operating system.
    4. Remove the hard drive and reinstall it.
    5. Wait five minutes for the problem to clear and then resume working.

  700. Which computer company is associated with the image at right?
    1. Apple
    2. Dell
    3. Lenovo
    4. Microsoft
    5. Samsung

  701. Which statement is false?
    1. Slow data speeds on Wi-Fi networks may be caused by a weak signal.
    2. Slow data speeds on Wi-Fi networks may be caused by being out of range.
    3. Slow data speeds on Wi-Fi networks may be caused by too much interference.
    4. Unintended Bluetooth pairing can be a security threat.
    5. Use the command ping to locate Wi-Fi networks.

  702. Which is the next step after an infected Windows computer has been quarantined in the best practices of malware removal and recovery?
    1. Disable system restore.
    2. Enable system restore.
    3. Identify and research malware symptoms.
    4. Remediate the infected systems.
    5. Schedule scans and run updates.

  703. The GUI fails to load on a Windows 8.1 system. The Windows logo appears during boot and then disappears, and the system appears to hang. What should be done to resolve the problem?
    1. Boot to Safe Mode, open System Recovery Options, choose Startup Repair.
    2. Boot to Safe Mode, choose Startup Repair.
    3. Boot to the installation DVD, choose Startup Repair.
    4. Boot to the installation DVD, open SFC, choose Startup Repair.
    5. Boot to the installation DVD, open System Recovery Options, choose Startup Repair.

  704. Where can obtain the model and software version of an iPhone?
    1. On iCloud
    2. On iTunes
    3. Settings > General > About
    4. Settings > General > Physical
    5. Settings > Personalization

  705. An user complains their iPhone no longer makes sounds, even when playing videos. What is the first thing to check?
    1. If airplane mode is on.
    2. If it has been set to silent mode.
    3. If the connection to the speaks is still working.
    4. If the screen is cracked.
    5. If too many apps are running.

  706. Which should be used to register and unregister modules and DLL files in the Windows 8.1 Registry?
    1. MSCONFIG
    2. REGDLL
    3. REGEDIT
    4. REGSERV
    5. REGSVR32

  707. By shredding or burning all classified documents before disposing of them, what type of security risk is being protected?
    1. Brute force attack
    2. Dumpster diving
    3. Man-in-the-middle attack
    4. Shoulder surfing
    5. Social engineering

  708. A Windows 7 workstation is infected with malware. It has been removed. However, now the workstation is unable to connect to the Internet, and yet it can send print jobs to the local printer. What is the likely cause of this problem?
    1. The DNS server has been corrupted.
    2. The malware changed the TCP/IP settings on the computer for the DNS server.
    3. The malware has infected the network.
    4. The malware has infected the printer.
    5. The malware is still on the computer.

  709. A computer has been infected with ransomware as evidenced by a ransomware message on the screen. What should be done to remove the ransomware?
    1. Boot into Safe Mode and use System Restore to roll the system back to a restore point before the ransomware message appeared.
    2. Pay the ransom.
    3. Reboot the computer.
    4. Reset NTFS permissions on system files.
    5. Turn off the computer, swap out the disk drive, and turn the computer back on.

  710. Which is a form of malicious software and Internet fraud that misleads users into believing there is a virus on their computer, and to pay money for a fake malware removal tool that actually introduces malware to the computer?
    1. E-mail virus
    2. Rogue security software
    3. Spam
    4. Trojan horse
    5. Worm

  711. Which command in the Windows Rescue Environment will create a new boot sector?
    1. BOOTREC /FIXBOOT
    2. BOOTREC /FIXMBR
    3. BOOTREC /REBUILD
    4. BOOTREC /REBUILDMBR
    5. BOOTREC /REBUILDROOT

  712. Hundreds of iPads need to have identical configurations. Which service will configure these devices?
    1. Apple AllPad
    2. Apple Configurator
    3. Apple Installer
    4. iCloud
    5. iConfigure

  713. When applying Windows Updates to a Windows 8.1 computer, the update fails and the message "Failure configuring Windows updates. Reverting changes." appears. What should be done next?
    1. Ignore the error message.
    2. Immediately reboot the computer and try updating again.
    3. Reinstall Windows 8.1.
    4. Scan the system for viruses.
    5. Wait until the changes are reverted, then reboot the computer and try updating again.

  714. An user reports their system crashed when they try to start a new application. They are unable to read the pop up window that appears and quickly disappears. Where can the information about the error message be found?
    1. Activity log
    2. Application log
    3. Cookie folder
    4. Setup log
    5. Security log

  715. An user says the printer was working fine yesterday, but it is not working today. When asked what changed, the user said they installed the new printer driver because they wanted to always be up-to-date. What needs to be done to get the printer working again?
    1. Authenticate the printer.
    2. Enable the print spooler.
    3. Roll back the printer driver.
    4. Update network settings to include the printer.
    5. Update the boot order.

  716. Which statement is false?
    1. Audio files can be stored on OneDrive.
    2. Once the local OneDrive folder has been moved it need to be reconnected with OneDrive.
    3. OneDrive does not have a Recycle Bin.
    4. The OneDrive Recycle Bin permanently deletes files that have been in there after 30 days.
    5. With File Explorer, one can move the location of the local OneDrive folder.

  717. There is a need to uninstall recent updates. How does one go about this?
    1. Settings > General > Windows Update > Advanced options > View your update history > Uninstall updates
    2. Settings > Update & security > Advanced options > View your update history > Uninstall updates
    3. Settings > Update & security > Windows Update > Advanced options > View your update history > Uninstall updates
    4. Settings > Windows Update > Advanced options > View your update history > Uninstall updates
    5. Settings > Windows Update > View your update history > Uninstall updates

  718. What is the least expensive solution to plugging in three workstations and monitors into a wall outlet that has only two sockets?
    1. AC adapter
    2. Power strip
    3. Surge protector
    4. UPS
    5. Voltage converter

  719. What is the most common danger to watch out for when opening up the case of a desktop computer to upgrade a video card?
    1. Electrical shock
    2. Flying debris
    3. Hot objects
    4. Sharp edges
    5. Toxic fumes

  720. When opening up the case of a desktop computer a layer of dust is found around the fan. Which should be used to remove this dust around the fan?
    1. Boiling water
    2. Compressed air
    3. Computer vacuum
    4. Mild soap and water
    5. Rubbing alcohol

  721. Cables must be string across a walking path because it is not possible to hide them anywhere else. Which solution will mitigate the tripping hazard?
    1. Cable floor guard
    2. Cable ties
    3. Duct tape
    4. Electrical tape
    5. Scotch tape

  722. Which statement is false?
    1. Microsoft currently refers to their official Remote Desktop Protocol client software as Remote Desktop Connection.
    2. Remote Desktop Connection client can run on Windows 8.
    3. Remote Desktop Connection is not available on smartphones.
    4. Remote Desktop Protocol is a proprietary protocol developed by Microsoft.
    5. Remote Desktop Protocol provides a graphical interface to connect to another computer over a network connection.

  723. When working at a client site, which is the most appropriate behavior?
    1. Facetime on Snapchat.
    2. Playing loud music.
    3. Taking notes and asking questions.
    4. Taking personal telephone calls.
    5. Visiting social media Web sites.

  724. In the absence of an electrostatic discharge (ESD) strap, what is the best way to practice self-grounding when working on a desktop computer?
    1. Staying in constant contact with anything made of plastic.
    2. Staying in constant contact with anything made of wood.
    3. Staying in constant contact with the metal part of the case.
    4. Touching the ground with both hands before starting to work on the computer.
    5. Wear shoes with rubber soles.

  725. Which is the proper way to dispose of old batteries?
    1. Burn them.
    2. Crush them.
    3. Recycle them.
    4. Sell them online.
    5. Throw them in the trash.

  726. Which type of file has a .py extension?
    1. Batch File
    2. Perl Script
    3. PowerShell
    4. Python
    5. Visual Basic

  727. Which component inside an LCD monitor poses the greatest risk of delivering an electrical shock?
    1. Backlight
    2. Capacitors
    3. Inverter
    4. Reflector
    5. Screen

  728. Toner was spilled around the laser printer. What should be used to clean up the spill?
    1. Compressed air
    2. Damp cloth
    3. Mild soap and water
    4. Rubbing alcohol
    5. Toner vacuum

  729. What is the difference between a blackout and a brownout?
    1. A blackout is a complete loss of power, and a brownout is a drop in power without loss of power. Both can damage electrical components.
    2. A blackout is a complete loss of power, and a brownout is a drop in power without loss of power. Neither can damage electrical components.
    3. A brownout is a complete loss of power, and a blackout is a drop in power without loss of power. Both can damage electrical components.
    4. A brownout is a complete loss of power, and a blackout is a drop in power without loss of power. Neither can damage electrical components.
    5. A power strip can prevent a brownout, but not a blackout.

  730. How should one speak to a customer?
    1. Use acronyms.
    2. Use basic terminology.
    3. Use complex technical terms.
    4. Use jargon.
    5. Use slang.

  731. Which statement is true regarding open source software?
    1. All changes made to the software require approval from the original author.
    2. It is free.
    3. It is software paid for in monthly installments.
    4. It is software that cannot be modified.
    5. It is software that opens firewall ports based on source IP addresses.

  732. What type of device, has no battery, can have multiple devices plugged into it, and has a fuse so that if there is a power surge, the fuse will blow and not the electronics plugged into it?
    1. AC adapter
    2. Power strip
    3. Surge protector
    4. UPS
    5. Voltage converter

  733. Which is the proper way to dispose of old CRT monitors?
    1. Burn them.
    2. Bury them.
    3. Recycle them.
    4. Smash them into little pieces and then throw them in the trash.
    5. Throw them in the trash.

  734. A desktop computer has been opened up and there is a layer of grime and dust on all the internal components. The memory and expansion cards are removed. What should be used to clean the metal contacts of these cards?
    1. Compressed air
    2. Damp cloth
    3. Denatured isopropyl alcohol
    4. Distilled water
    5. Mild soap and water

  735. What type of device has a battery, and has a fuse so that if there is a power surge, the fuse will blow and not the electronics plugged into it, and insure that a server can be shut down properly in case of a blackout?
    1. AC adapter
    2. DC adapter
    3. Surge protector
    4. UPS
    5. Voltage converter

  736. What should be done before opening a desktop computer to install additional memory?
    1. Disconnect the keyboard and mouse from the computer.
    2. Put the desktop in hibernate mode.
    3. Put the desktop in standby mode.
    4. Turn the monitor off.
    5. Turn the power off and unplug the computer.

  737. To prevent an electrostatic discharge, where should the other end of the ESD strap be connected?
    1. To the floor.
    2. To the keyboard.
    3. To the metal case.
    4. To the motherboard.
    5. To the surge protector.

  738. Which types of licenses are designed for large groups of users?
    1. Concurrent and Corporate
    2. Countywide
    3. Free and Open
    4. Full Control
    5. Multiple and Multiplex

  739. Which dictates privacy for all European Union residents?
    1. General Data Personal Regulation
    2. General Data Privacy Regulation
    3. General Data Protection Regulation
    4. General Data Protection Requirements
    5. General Data Protection Rule

  740. What does the symbol at the right represent?
    1. Caution, lightning ahead
    2. Caution, risk of electric shock
    3. Caution, slippery when wet
    4. Caution, thunder ahead
    5. Use only Apple Lightning connector

  741. After establishing a plan of action and implementing a solution, which should be the next step to take according to troubleshooting theory?
    1. Call the help desk.
    2. Document the findings.
    3. Implement the solution.
    4. Test the theory to determine cause.
    5. Verify full system functionality.

  742. Which statement is true?
    1. An electrostatic discharge of less than 3000 volts will not damage computer components.
    2. It takes an electrostatic discharge of only 300 volts to damage computer components.
    3. Most people cannot feel an electrostatic discharge unless the static voltage is greater than 300 volts.
    4. Most people cannot feel an electrostatic discharge unless the static voltage is greater than 400 volts.
    5. Most people cannot feel an electrostatic discharge unless the static voltage is greater than 500 volts.

  743. Which will help avoid electrically damaging memory sticks and video cards when being carried from one office to another?
    1. ESD boots
    2. ESD mat
    3. ESD strap
    4. Rubber gloves
    5. Static shielding bags

  744. Which environmental condition increases the risk of an electrostatic discharge?
    1. High barometric pressure
    2. High humidity
    3. Low barometric pressure
    4. Low humidity
    5. Low temperature

  745. Which should be worn when cleaning the insides of a computer using compressed air?
    1. Air mask and safety glasses.
    2. Ear plugs and ESD strap.
    3. Ear plugs and hair net.
    4. Ear plugs and rubber gloves.
    5. Ear plugs and safety glasses.

  746. Which type of information should be protected, as required by HIPPA?
    1. GDPR
    2. IBM
    3. PC
    4. PCI
    5. PHI

  747. Where is information on how to dispose of a chemical solvent and any potential dangers the solvent possesses?
    1. Back of the container
    2. OSHA Web site
    3. Retailer's Web site
    4. Safety Data Sheet
    5. Warning label

  748. Which is the best environment for placing servers?
    1. In a cool room, with average humidity and good ventilation, away from human traffic.
    2. In a cool room, with low humidity and no ventilation, away from human traffic.
    3. In a hot room, with low humidity and good ventilation, close to human traffic.
    4. In a warm room, with average humidity and good ventilation, away from human traffic.
    5. In a warm room, with low humidity and good ventilation, close to human traffic.

  749. Which type of fire extinguisher is designed to put out electrical fires?
    1. A
    2. B
    3. C
    4. D
    5. E

  750. An user complains that sometimes the keys on their keyboard stick and make a crunching sound. Upon inspection of the keyboard, it is littered with crumbs. With what should be keyboard be cleaned?
    1. Compressed air
    2. Damp cloth
    3. Distilled water
    4. Mild soap and water
    5. Wet paper towel

  751. Which is the best way to run a network of cables to support dozens of new workstations in an office?
    1. Run cables along the floor and secure them with duct tape.
    2. Run cables along the floor and secure them with electrical tape.
    3. Run cables along the floor next to cubicle walls.
    4. Run cables through a drop ceiling or raised floor.
    5. Use a cable guard to run cables across the floor.

  752. What is the main reason why equipment grounding is an important safety precaution?
    1. To prevent coffee from spilling and damaging components.
    2. To prevent electrical shock from damaging components.
    3. To prevent electrical shock to the technician.
    4. To prevent equipment from moving.
    5. To prevent fire from starting.

  753. Which type of file has a .js extension?
    1. Java
    2. JavaScript
    3. Joomla
    4. PowerShell
    5. Visual Basic

  754. Which editor is most likely used to edit files with a .vbs extension?
    1. Gedit
    2. nano
    3. Notepad
    4. pico
    5. vi

  755. Which data type is restricted to being a series of digits?
    1. Array
    2. Boolean
    3. Integer
    4. String
    5. Variable

  756. Which best practice assists administrators in tracking the boundaries and perimeters of data flow through the environment?
    1. Asset tagging
    2. Change management
    3. Network topology diagrams
    4. Password policy
    5. Project management

  757. Which best practice assists administrators in tracking hardware found throughout the enterprise?
    1. Asset tagging
    2. Change management
    3. Inventory management
    4. Knowledgebase
    5. Password policy

  758. Which policy would lock an user out of their computer if the wrong credentials were used too often?
    1. Acceptable use policy
    2. Change management policy
    3. Disaster recovery policy
    4. Inventory management policy
    5. Password policy

  759. Which will show how changes will be received by a sample of the employees?
    1. Backup plan
    2. End-use acceptance
    3. Field level acceptance
    4. Forensics
    5. Risk analysis

  760. Which option for storing backups is most sensible in an area prone to tornadoes?
    1. Store backup tapes against an inside wall.
    2. Store backup tapes in a safe in the basement.
    3. Store backup tapes in the basement.
    4. Store backup tapes in the computer room.
    5. Store files in the cloud, off site.

  761. Which should be removed when working with electrical components?
    1. Hat
    2. Jewelry
    3. Pants
    4. Shirt
    5. Shoes

  762. If the specifications of a new desktop computer include 256 Kbytes of Level 2 cache, how much Level 1 cache would be reasonable to expect the computer to have?
    1. 0
    2. 64 Kbytes
    3. 256 Kbytes
    4. 512 Kbytes
    5. 512 Mbytes

  763. Which is not a type of Windows user profile?
    1. Advanced User
    2. Local User
    3. Mandatory User
    4. Roaming User
    5. Temporary User

  764. Which component is most likely to cause a system to randomly lock up, or to unexpected shutdown or reboot?
    1. BIOS
    2. Hard drive
    3. Memory
    4. Network adapter
    5. Sound card

  765. Which wireless communication type has a maximum distance of about 10 meters?
    1. Bluetooth
    2. IR
    3. LTE
    4. NFC
    5. RFID

  766. Which statement is true regarding the design of the micro-ATX motherboard?
    1. It requires a mounting adapter kit to fit in a standard ATX case.
    2. It will fit in a standard ATX case.
    3. It will fit in a standard ATX case, but cannot support expansion cards.
    4. It will fit in a standard ATX case, but cannot support network cards.
    5. It will not fit in a standard ATX case.

  767. Which components should be optimized for a specialized computer that will run multiple operating systems at the same time?
    1. CPU and graphics card
    2. CPU and hard disk drive
    3. CPU and memory
    4. Graphics card and hard disk drive
    5. Hard disk drive and power supply.

  768. Which should be used to clean the print head of an inkjet printer?
    1. Cotton swab
    2. Damp cloth
    3. Mild soap and water
    4. Printer oil
    5. Wet paper towel

  769. An employee has turned in a tablet computer that has a swollen battery. What should be done to resolve this problem?
    1. Open the tablet, clean around the battery, and then return it to the employee.
    2. Order a new tablet for the employee and take the defective tablet to a recycling center.
    3. Order a new tablet for the employee and throw the defective tablet in the garbage.
    4. Turn the tablet. Let it cool down, and then return it to the employee.
    5. Replace the swollen battery with a new one.

  770. Which type of computer will most benefit from high-end video cards and cooling systems?
    1. Augmented reality
    2. File server
    3. Thick client
    4. Thin client
    5. Video gaming

  771. Which computer component is most likely to use a DB15 connector?
    1. Hard drive
    2. Keyboard
    3. Modem
    4. Monitor
    5. Mouse

  772. Which has a capacity of up to 32 Gbytes?
    1. SD
    2. SDHC
    3. SDIO
    4. SDUC
    5. SDXC

  773. A computer has an FSB speed of 667 MHz, and requires DDR2 memory. Which RAM modules should be purchased for this computer?
    1. PC2-667
    2. PC2-2500
    3. PC2-3200
    4. PC2-5300
    5. PC2-6400

  774. in which component are Self-Monitoring, Analysis and Reporting Technology systems included?
    1. BIOS
    2. CPU
    3. Hard disk drive
    4. Memory
    5. Video cards

  775. A wireless router is being configured for a small office network. Private IP addresses should be assigned to client computers, but these client computers need Internet access from the ISP. What needs to be configured to achieve this?
    1. DHCP
    2. DMZ
    3. DNS
    4. NAT
    5. TCP/IP

  776. A RAID system is a mirrored striped set with four disks. One of the disk fails. What can be done to recover the array?
    1. Rebuild the failed disk and rebuild the array.
    2. Remove the failed disk and rebuild the array.
    3. Remove the failed disk and restore from backup.
    4. Replace the failed disk and rebuild the array.
    5. Replace the failed disk and restore from backup.

  777. What charge is applied to the imaging drum of a laser printer during the charging step of the printing process?
    1. -1000 VDC
    2. -600 VDC
    3. -100 VDC
    4. +100 VDC
    5. +1000 VDC

  778. What is the maximum data throughput rate of a SATA 3 hard drive?
    1. 1 Gbps
    2. 2 Gbps
    3. 4 Gbps
    4. 6 Gbps
    5. 8 Gbps

  779. What type of touch screen technology does a mobile device use to allow a human to use their finger to input information?
    1. Capacitive
    2. Human
    3. Resistive
    4. Thermal
    5. Warmth

  780. Which is not a task of the POST?
    1. Verify the integrity of RAM.
    2. Verify the integrity of sectors on the hard drive.
    3. Verify the integrity of system buses.
    4. Verify the integrity of the BIOS.
    5. Verify the integrity of the boot device.

  781. What is the size of a microSD card?
    1. 8 mm by 11 mm
    2. 11 mm by 15 mm
    3. 20 mm by 24 mm
    4. 20 mm by 25 mm
    5. 21 mm by 25 mm

  782. Which statement is false?
    1. A DHCP client, upon accepting a lease offer, receives a valid IP address for the subnet to which it is connecting.
    2. A DHCP server leases an address to any DHCP-enabled client when it starts up on the network
    3. DHCP leases expire every night at midnight.
    4. Every device on a TCP/IP-based network must have a unique unicast IP address to access the network and its resources.
    5. In a DHCP network IP addresses no longer in use are automatically returned to the pool for reallocation.

  783. What type of address class can send a single message to a group of computers at the same time on an IPv6 network?
    1. Anycast
    2. Broadcast
    3. Localcast
    4. Multicast
    5. Unicast

  784. In IPv6, which address range is the multicast range?
    1. FA00::/2
    2. FB00::/4
    3. FC80::/6
    4. FE80::/10
    5. FF00::/8

  785. Which is a short distance, line-of-sight wireless communication method?
    1. Bluetooth
    2. Gen-5
    3. IR
    4. RFID
    5. Wi-Fi

  786. Which configuration change is recommended when configuring a wireless 802.11ac router for first use?
    1. Change the DMZ.
    2. Change the DNS.
    3. Change the router's location.
    4. Change the router's SSID.
    5. Set WPA as the encryption method.

  787. Which statement is true?
    1. A MIDI file is an audio recording.
    2. MIDI files are binary files.
    3. MIDI files are much smaller than WAV files.
    4. MIDI files have a .mdi extension.
    5. MIDI files have a .mp3 extension.

  788. How much data throughput does a PCIe 1.1 x16 slot provide when operating by directionally?
    1. 2 Gbps
    2. 4 Gbps
    3. 8 Gbps
    4. 16 Gbps
    5. 32 Gbps

  789. What is the maximum capacity of a dual layered Blu-ray Disc?
    1. 10 Gbytes
    2. 20 Gbytes
    3. 30 Gbytes
    4. 40 Gbytes
    5. 50 Gbytes

  790. Which tool will allow a Windows 10 system to give an application priority over al non system critical programs?
    1. Application Manager
    2. Event Viewer
    3. Performance Monitor
    4. System Configuration
    5. Task Manager

  791. Which tool displays a comprehensive list of settings on a Windows 10 computer?
    1. bcdedit
    2. boot.ini
    3. compmgmt
    4. msinfo32
    5. sfc

  792. A computer running Windows 8.1 needs to have Windows 10 installed, but user accounts, data, and applications that are currently on the system must be retained. What type of Windows 10 installation should be performed?
    1. Clean
    2. Custom
    3. Migration
    4. Newer
    5. Upgrade

  793. An user has added a second and third disk to their system. Each disk has a capacity of 500 Gbytes. The user want to combine the disks into a 1 Tbyte volume and at the same time increase read and write performance. What type of volume should be created?
    1. Concatenated
    2. Mirrored
    3. Simple
    4. Spanned
    5. Striped

  794. Which technology allows a smartphone to be able to pay for items at stores by simply moving it close to the merchant's receiver?
    1. MMS
    2. NFC
    3. PayPal
    4. SMS
    5. SSL

  795. What is the purpose of a privacy filter?
    1. To keep people from looking into the computer server room.
    2. To protect accidental release of personal information.
    3. To protect computer screens from prying eyes and shoulder surfers.
    4. To protect data from being accidentally deleted.
    5. To protect data on a hard disk drive from hacking.

  796. Which mechanism do the TCP and UDP transport protocols use to identify which application a network service request is destined for?
    1. IP address
    2. Port number
    3. Program number
    4. Protocol number
    5. Version number

  797. Which acts as an intermediary for requests from clients seeking resources from other servers?
    1. DNS server
    2. File server
    3. FTP server
    4. Proxy server
    5. TFTP server

  798. Which Windows utility can be used to verify the version of the drivers installed on the computer?
    1. Account Manager
    2. Computer Management
    3. Device Manager
    4. Display Settings
    5. Power Settings

  799. A report of network performance on a Windows computer has become very slow. Upon inspection, the network card on the computer is set to half-duplex. What does this mean?
    1. The network card needs to be set to full-duplex to run faster.
    2. The network card needs to be set to full-simplex to run faster.
    3. The network card needs to be set to simplex to run faster.
    4. The operating system does not support half-duplex.
    5. This is the normal setting for the network card; look else for the problem.

  800. What is the most cost-effective way for a Windows 10 workstation running client-side virtualization can support three operating systems, and that each operating system can have proper network access to the rest of the physical network?
    1. Each operating system will have a virtual NIC, connected to a physical NIC.
    2. Each operating system will have a virtual NIC, connected to a virtual switch.
    3. Each operating system will have a virtual NIC, connected to a virtual switch, which is connected to the physical NIC.
    4. Each operating system will have a virtual switch, which is connected to the physical NIC.
    5. Each operating system will have its own physical NIC.

  801. A test workstation needs to boot into Windows 7, Windows 8.1, and Windows 10. Which statement is true regarding the installation of these operating systems?
    1. Install each operating system on its own partition.
    2. Install each operating system on the first partition.
    3. Install each operating system on the same partition.
    4. It is not possible to install all three operating systems on one workstation.
    5. The location of the operating system installation does not matter.

  802. Which can be used to force a Windows system to boot into Safe Mode when it reboots?
    1. Application Manager
    2. Event Viewer
    3. Performance Monitor
    4. System Configuration
    5. Task Manager

  803. Which could make users more susceptible to a man-in-the-middle attack?
    1. Unauthorized account access
    2. Unauthorized camera activation
    3. Unauthorized location tracking
    4. Unintended camera activation
    5. Unintended Wi-Fi connection

  804. An user needs to the laptop off to save battery power. However, files and applications need to be running so when the laptop is turned back on, the applications are already open. In which mode should the laptop be?
    1. Hibernate
    2. Shutdown
    3. Sleep
    4. Zen
    5. Zombie

  805. An administrator wants to grant an user the ability to change files and run programs located in the NTFS folder. However, the user must not be able to delete files in the NTFS folder. Which level of access should be granted to the user?
    1. Full control
    2. Modify
    3. Execute
    4. Read & execute
    5. Read & execute, and Write

  806. A Windows 7 Professional workstation is installed in a workgroup. There is no centralized security. Which tool should be used to protect the workstation against malicious network attacks?
    1. Advance Security
    2. Computer Management
    3. Local Security Policy
    4. Windows Defender
    5. Windows Firewall

  807. Prior to recycling an old computer, an user decided to format the hard drive and chose quick format. Which statement is true regarding the information on the hard drive?
    1. It is not safe because quick format only formats the master boot record.
    2. It is not safe because quick format only removes operating system files.
    3. It is not safe because quick format only writes a new file allocation table.
    4. It is safe because quick format removes all the data on the hard drive.
    5. It is safe because quick format writes over the entire hard drive.

  808. By default, in which folder are 32-bit programs installed in a 64-bit edition of Windows?
    1. C:\Program Files
    2. C:\Program Files (x32)
    3. C:\Program Files (x64)
    4. C:\Program Files (x86)
    5. C:\Program Files\x86\Windows

  809. In MacOS, under which tab is Mission Control?
    1. Advanced Settings
    2. Computer Management
    3. Solutions
    4. System Preferences
    5. System Settings

  810. What is the MacOs equivalent of the command line interface in Windows?
    1. Dock
    2. Screen
    3. Spaces
    4. Terminal
    5. Utility

  811. What do registers provide for the CPU?
    1. Registers enable the CPU to address RAM.
    2. Registers enable the CPU to control the address bus.
    3. Registers register data from the CPU on to the hard disk.
    4. Registers set the CPU clock speed.
    5. The CPU uses registers for temporary storage of internal commands and data.

  812. Which, inside Control Panel, will show the amount of RAM in the system?
    1. Action Center
    2. Device Manager
    3. Power Options
    4. Sync Center
    5. System

  813. A computer running Windows 8.1 has been rebooted, and is in the Windows Recovery Environment. Which will roll back recent system changes to the operating system?
    1. Recover
    2. Refresh
    3. Reload
    4. Remove
    5. Restore

  814. What voltages should the two hot wires on a Molex connector read?
    1. Red 3.3 volts; Yellow 3.3 volts
    2. Red 3.3 volts; Yellow 5 volts
    3. Red 5 volts; Yellow 5 volts
    4. Red 5 volts; Yellow 12 volts
    5. Red 12 volts; Yellow 12 volts

  815. What is the image shown at right?
    1. Linux kernel panic
    2. MacOS sad face
    3. Windows 8 blue screen of death
    4. Windows 8 insufficient memory warning
    5. Windows 8 restart message

  816. Where does Windows store device drivers?
    1. Device Manager
    2. Devices and Printers
    3. Drivers
    4. Programs and Features
    5. Registry

  817. Which network device is active when powered and passive when it is not?
    1. Bridge
    2. Hub
    3. Router
    4. Switch
    5. Transponder

  818. Which term describes a combination of many updates and fixes in Windows?
    1. Hot fix
    2. Hot pack
    3. Hot release
    4. Service pack
    5. Service release

  819. What type of cloud exists when two or more sister organizations enter into a cloud partnership?
    1. Community
    2. Hybrid
    3. Partnership
    4. Private
    5. Public

  820. How many pins does a SATA power connector have?
    1. 3
    2. 6
    3. 9
    4. 12
    5. 15

  821. Which protocol is used for time synchronization?
    1. FTP
    2. IRC
    3. NNTP
    4. NTP
    5. TFTP

  822. Which is not a characteristic of cloud computing?
    1. Broad network access
    2. Measured service
    3. Private mainframe server
    4. Rapid elasticity
    5. Resource pooling

  823. What is the maximum capacity of a FAT16 volume?
    1. 4 Gbytes
    2. 8 Gbytes
    3. 16 Gbytes
    4. 32 Gbytes
    5. 64 Gbytes

  824. Which file attribute cannot be changed in a file's Properties dialog box?
    1. Archive
    2. Hidden
    3. Modify
    4. Read-only
    5. System

  825. Which will release the keyboard and mouse from control of a virtual machine?
    1. Guest key
    2. Host key
    3. Pause key
    4. Product key
    5. Windows key

© 2019 John Michael Pierobon

Notes