How do you read into the information configured in BIOS from within Windows?
Device Manager
Control Panel -> BIOS config
MS Config
None of the above
Firmware contains code to fix errors or support new hardware.
It is not necessary to remove the power cord from the PC to install an Expansion Card, as long as the computer has been shut down.
Firmware upgrades include:
Security patches
Performance updates
Known issue updates
All of the above
Hard drives and optical drives can be configured through the system BIOS.
Which of the following are valid form factors?
Tower
Mini tower
Desktop
Replacing the CMOS battery will reset which of the following?
Device drivers
Operating system
System date and time
Heat sinks and thermal pastes are types of cooling systems.
Weighing out the pros and cons of performance and price is a CPU selection factor.
What are some examples of internal components of a computer?
Motherboard
Expansion slots
Riser cards
What are some examples of devices that could be installed with an expansion card?
SATA drive
Video card
Network card
B and C
Bus speeds determine how fast data is transmitted.
Motherboard installation considerations include:
Checking manufacturer’s requirements
Verifying that the board fits your case
Checking any specific system requirements
SDRAM is much faster than DDR
RAM Parity checking is the storing of redundant parity bit representing the parity of a small amount of computer data, to detect whether a data error has occurred.
Single-sided memory has all of its memory accessible at one time.
ECC is used only in upper-end systems such as high-end workstations and servers.
How many pins does a male serial connector have?
9
15
21
28
What is the purpose of a PATA connection?
IDE hard drives
Floppy drives
A and B
SATA drives
Wireless device connections include:
Bluetooth
IR
RF
Analog transmissions carry information as continuous waves of electromagnetic or optical energy.
Which of the following are valid speeds for a magnetic hard drive?
5400
7200
10000
Compact flash is a solid state drive.
A USB adapter connects the Compact Flash reader to the computer.
What is the storage capacity of a Blu-ray?
4.7 GB –17.08 GB
128 GB
5 TB
8.5 GB
Which of the following is a type of optical disk?
CD-ROM
Dual Layer DVD-RW
BD-RE
Which of the following are characteristics of a CPU?
Speed
Core
Cache size
A heat sink is a method of cooling a CPU.
The current USB standard is which of the following?
2.x
3.x
7.x
10.x
Up to 63 devices can be attached using Firewire.
What is the range for near field communication?
100 feet
500 feet
A few centimeters to a few inches
One mile
IR can penetrate walls.
You must have an HDMI physical connection for a Blu-Ray player.
The basic function of a power supply is to convert the electrical power from a wall socket to one that a PC can use.
The power supply in a conventional desktop system is designed to convert either 110 V (nominal) 80 Hz AC (alternating current) or 280 V (nominal) 60 Hz AC power into +3.3 V, +5 V, and +12 V DC (direct current) power.
Power supply safety recommendations include:
Checking for UL certification
Keeping the computer case closed during normal operation
Protecting the power supply
Which of the two hardware configurations are most important to a gaming PC?
CPU
Hard drive space
A and C
The purpose of virtualization is to condense hardware servers down to a single hardware server
What are the two types of standard clients?
Short and Tall
Thin and Thick
Round and Square
Thin client requirements include fast network connection and specialized software for server access.
Thick client requirements include access to local storage locations and robust hardware to meet application needs.
HDMI interface is electronically identical and compatible with the video-only DVI interface
The power wire of a USB interface can supply up to 750 milliamps of power at 5 volts.
If a cable box or PC has DVI out, but the TV or monitor only has HDMI in, a DVI-to-HDMI adapter cable is used to connect the video.
USB Standard supports how many devices?
10
55
127
200
Standard keyboards always include the full number pad to the right.
Where do you go to configure multiple displays?
Control Panel - Appearance and Personalization – Display
Control Panel – Screens
Control Panel – Display config
Multimedia devices are either peripheral or internal components that transfer sound, images, or a combination of both from a personal computer.
An interactive whiteboard would be considered a specialized input device.
Expansion card configuration methods include:
Use plug - and - play installation
Install the manufacturer’s driver
Use the Add Hardware wizard
SOHO networks are self - maintaining and do not need a firewall.
Which of the following features will you find on a wireless router?
Reset button
LAN Ethernet ports
WAN Ethernet ports
Basic QoS is a set of parameters that controls the quality provided to network traffic
Basic QoS parameters include:
Delay amounts
Signal loss
Noise limits
Which of the following is NOT a common SOHO security method?
Change default user name and password
Enable MAC filtering
Enable ports
Assign static IP addresses
Which of the following are valid types of printer technologies?
MFD
Laser printer
Thermal printer
Which of the following printer technologies use heat transfer to produce an image on paper?
Inkjet
Laserjet
Impact printers
Thermal printers can produce photo-quality output.
Printer toner is made up of which of the following?
Dried pigment
Iron, carbon and resin
Powdered ink
Which of the following are valid Printer Driver types?
PPD
PCL
UDP
Drivers are available on installation discs, or can be downloaded from the manufacturer’s website
Printers can be shared:
Via USB or Ethernet
Using Bluetooth, 802.11x, or IR
Using a printer server to manage the print queue for network shared printers
A client server networking model is where all the computers in the network share responsibilities, management, and file sharing
A Network Interface Card has which of the following features?
Physical network address
Network connection port
Status indicator lights
How many pins are in one twisted pair connector?
2
4
8
Fiber optic cable types include:
Single-mode fiber
Step index multimode fiber
Graded index multimode fiber
Which of the following are part of the TCP/IP Suite of protocols?
TCP
UUP
SMTP
In the subnet mask 255.255.255.0 for the IP Address, what would be the network ID of the following IP Address: 10.1.1.1?
10.0000
10.1.1.1
10.0.10.1
10.0.0.0
Gateways are implemented as hardware, software, or both.
IPv4 uses 128 bit addresses and IPv6 uses 32 bit addresses.
Client-side DNS enables clients to perform basic DNS lookups without connecting to a server.
To send a connectionless datagram the application would have to be written to TCP.
The SMTP Protocol uses port 25.
What type of ports range from 1,024 to 49,151?
Well-known ports
Registered ports
Dynamic or private ports
What port does HTTP use?
22
53
80
443
Which IEEE standard speaks to wireless standards?
802.11
802.12
802.13
802.15
If you wanted a more recent implementation of wireless, that supported an indoor signal range of 225 feet, which technology would you use?
802.11n
802.15n
802.12g
802.11g
There is no difference in max data rate between 802.11a and 802.11ac.
Which of the following ports would you find on a SOHO wireless router?
LAN
WAN
Ethernet
When you create an object to represent a node on the network in the firewall tables, what is it called?
NAT
DMZ
Address Object
Address objects define segments or hosts of your network by IP Address.
If you need to connect remotely with an encrypted connection to your office, which of the following internet connection types would you use?
MAN
VPN
EAN
The connection from your ISP to your office is called a WAN, and the connection from the router to the PC’s in the office network is called a LAN.
Internet connection types and features include:
DSL
ISDN
WiMAX
In order to create your own Ethernet wires, you would use a toner probe to prep the ends of the cable with the clip that plugs into the device or wall.
A ____________ is used to correctly connect the wires in a wiring closet to the patch panel.
Multimeter
Toner probe
Crimper
Punch down tool
If you wished to have printer, monitor, and full sized keyboard always plugged in, and the ability to simply remove the laptop without the connections, which of the following would you use?
Laptop lock
Docking station
Patch panel
Laptop power supply has an auto switch power adapter, and knows to switch to battery if the power source from the wall is disconnected.
Types of laptop displays include:
LCD
OLED
Plasma
Which of the following are types of mobile devices?
Smart watches
Fitness monitors
Glasses
GPS is not considered a mobile device.
Assume the same threats apply to mobile devices as desktop and laptop devices.
What is the first step in the Bluetooth Pairing Process?
Find the device for pairing
Determine if a pin code is needed
Enable Bluetooth
Test the connection
E-mail can be configured to sync with Microsoft Exchange.
NFC connections are used exclusively by Apple products.
If you have issues with mobile devices and keypads are not working, you cannot replace just the keyboard.
Proprietary vendor specific ports include:
Mini USB
Lightning
In a mobile phone, when we press a key and it works very slowly we should reload the software to solve the problem.
What is the most common problem with the power supply?
Flames
Noise
Fan
Odor
The reason for the documentation is to write down all of the hardware and software.
What is the first step of the troubleshooting theory?
Identify the problem
Establish a theory
Test the theory
Document
Beep codes are different per manufacturer.
Intermittent device failure could be due to:
Power
Heat
What is the function of POST?
Indexes the type of data expected from the server
Formats the drive upon boot
Confirms the drive is available and functioning upon boot
What is a RAID?
Redundant Array of Independent Disks
Redundant Action for Initialized Disks
Redundant Arrangement of Agile Disks
Checking vendor specifications for the OS and software used is a troubleshooting tip for what?
PATA
SATA
SCSI
What could be identified as the reason there is not a video display?
Physical damage
Color issues are only caused by application problems.
What does PING (Internet Control Message Protocol) do?
Make a sound to test audio
Send an echo request to confirm connection
Shut down an IP address on the network
What is the purpose of the toner probe?
Communicate with the printer
Remotely turns on and off the network connection
Follow or trace a cable, through cable management
The test pattern tool is used to monitor calibration.
Which one of these tools is not best to use as a printer troubleshooting tool?
Compressed air
Your breath
Hair dryer
Toner vacuum
Printer maintenance kits are specific to the make and model of each printer.
You should vacuum toner with an ordinary vacuum.
Cortana is new to Windows 10.
When hardware has been released after the current OS version, then third party drivers are needed.
You do not need to review the documentation from the computer manufacturer before using the factory recovery partition.
The command prompt allows the user to perform the same amount of tasks as through the GUI. (Graphical User Interface)
What is the best command to run if you are looking to check the operating system’s system files?
Chkdsk
SFC
Fdisk
Robocopy
What is the best way to move your settings over to a new machine even when the operating system is different or upgraded?
USMT (User State Migration Tool)
Easy transfer
File and sending transfer
Which of the run line utilities performs remote desktop?
mmc
dxdiag
mstsc
rem
Component services are used to configure and administer:
COM (Component Object Model)
COM + Applications
DTC (Distributed Transaction Coordinator)
Administrative tools include iSCSI Initiator and Task Scheduler.
Share permissions apply only to actions, folders and one file or folder at a time.
Which type of user account gives you limited computer access?
Administrator
Power User
Standard User
Guest
Share permissions can include:
Read
Change
Full control
The proxy server’s purpose is to speed up the connection of multiple machines connecting to the internet at the same time.
The Ethernet cable may also send an electrical current through what type of network connection?
Wake-on-LAN
Speed and duplex settings
PoE
QoS
When configuring a client computer to be used with a proxy the proxy server settings must be set to the correct address.
Which of the following are network connection types?
Dialup
WWAN cellular
Recovery Image is a function in all Windows operating systems.
It is necessary to install all updates automatically instead of manually.
The rm command in Linux is the same as the:
copy in the command prompt
del in the command prompt
list in the command prompt
Similar to Windows, Mac and Linux OS automatically run updates.
To Force Quit on Mac OS X, press Command-Option-Esc, then select unresponsive App in Force Quit Window.
The Grep command in Linux does what?
Change directories
Full text search
Copy a file
Move or change files
On the Mac OS X, Dock Apps are located on the right.
What is a good reason to run a virtual desktop infrastructure on the server?
The need to run multiple OS locally
The inability to run an OS on specific hardware
OS testing
When setting up the client side virtual machine, it is not necessary to have the same configuration of hardware and memory as the host machine.
Virtualization requirements include:
Emulator to run the VMs
Security to protect VMs from unauthorized access
Network components needed to run the VDI
What is sometimes considered “on demand software”?
IaaS
SaaS
PaaS
In IaaS (Infrastructure as Service), users are responsible for applications, data, runtime, middleware, and OS.
Resource pooling is a situation where providers serve multiple clients with provisioned and scalable services.
Measured service monitors the provisions of services for:
Billing
Effective use of resources
Predictive planning
A web server and a file server have no features in common.
Which of the following is responsible for name resolution?
Web server
File server
DHCP server
DNS server
Open Source software is the same as Closed Source software, the only difference is where it is sold.
What do Office 365, iCloud, Google Apps and eBooks have in common?
They have mobile data synchronization
They are open source
They are only mobile based
A gyroscope determines the orientation of the device with respect to Earth’s magnetic fields.
Bluetooth is most secure when it is paired.
Having your contacts from your e-mail server copied to your mobile device is a process known as:
Updating
Patching
Synchronizing
Confirming
Tethering is when you turn your smartphone into a mobile Wi-Fi hotspot.
IMSI stands for International Mobile Satellite Identity.
An attacker may obtain credentials only via their network connection.
Malware is software that attacks the hardware and shuts down or makes using the computer difficult.
Types of malware include:
Worms
Trojan horses
Logic bombs
When an attacker obtains credentials from another user and then uses those credentials to mount an attack it is known as what?
Virus
Social engineering
Spam
What is the purpose of a firewall?
To stop traffic coming in and going out
To alert the user of all traffic coming in and out
To prevent malware
What is the best way to clear a hard drive and get rid of the information?
Low level formatting
Drilling a hole in the center of the hard drive
Standard formatting
Shredding the hard drive
Which of the following are physical security measures?
Video surveillance
Security guards
Physical barriers
Fire and facility intrusions are events that can threaten physical security.
Host firewalls and personal firewalls are two common types of firewalls.
Which of the following user accounts have the permissions to install software?
Power user
Which of the following represents an administrative share?
\\PC\C$
X:C$
\\PC\Admin$
If you have a complex password, there is no reason to change it in regular intervals.
Which of the following are examples of user account restrictions?
Lockout
Login time restrictions
AutoRun
Which of the following are methods for locking a mobile device to secure it?
Screen locks
Face locks
Swipe locks
A shredder can be used to physically destroy a device.
When troubleshooting a BSOD, which would be methods to use?
Safe mode / safe boot
Disabling a driver
Removing hardware
Where can you go to see logfiles with error codes for troubleshooting?
Errorlog.txt
BSOD
Event viewer
Slow transfer speed is a common network issue.
Common network troubleshooting utilities include all the following except:
IPCONFIG
TRACERT
TRACKSTAT
NETSTAT
Always using trusted installation sources and websites is a malware removal best practice.
Which of the following are indicators of a virus?
Pop ups
Slow network connections
Slow PC
What are some of the consequences of getting a virus?
Renamed files
Hijacked e-mail
Automated replies from unknown sent e-mail
Which of the following are symptoms of mobile operating system issues?
Dim display
Apps not loading
Slow performance
Which tools are available to use for mobile operating system troubleshooting?
Hard reset
Soft reset
Uninstall / reinstall apps
If applications are not loading you can:
Check for updates to application
Force close the app and restart
Restart the phone
To help counter extremely short battery life you can adjust your brightness settings.
Mobile devices slow down as internal storage fills up.
Electrical currents give off ozone gas.
Workplace security practices should include equipment storage and cable management.
You should always read the labels and follow instructions carefully when disposing of materials.
AUP stands for Audible Use Protocol.
Chemical hazards include:
Laser printer toner
Batteries
Capacitors
Your basic PC toolkit should have which of the following?
Screwdrivers
Tweezers
Three prong pickup tool
Which of the following are software diagnostic tools you can use for maintenance and troubleshooting?
Computer management
ERRORlog.txt
Software diagnostic tests can:
Detect problems
Repair problems
Prevent problems
A hard drive self-test is a tool that enables a hard disk drive to test itself when the computer starts.
A compressed air canister is considered a cleaning compound or material.
Which of the following are valid licensing types?
Personal license
Open source license
Shared license
You only need backups when you are making large changes.
You should avoid talking to co-workers while with customers.
When dealing with difficult situations and customers you should rant on social media outlets.
Confidential materials can be located on a printer.