click below
click below
Normal Size Small Size show me how
GENESYS WORKS FINAL
| Question | Answer |
|---|---|
| Which component or components would be interchangeable between a laptop and a desktop PC? | Peripheral Devices |
| Which statement is true about laptops? | Most of the internal components that are designed for laptops cannot be used for desktops |
| Which type of RAM modules are designed for the space limitations of laptops? | SODIMMs |
| What is the purpose of the eject button on a laptop docking station? | to detach the laptop from the docking station |
| A technician troubleshooting a laptop notices that some keyboard keys are not working properly. What should the technician check first? | if the num lock key and scroll lock key are on |
| What is the final task for a technician after troubleshooting a laptop | Document the problem and the solution |
| What is the next step in the troubleshooting process after a solution has been implemented on a laptop? | Verify the solution |
| Which two internal expansion slots in laptops are commonly used to install wireless adapter cards? | PCI Express Micro and Mini-PCIe |
| A user needs to connect a Bluetooth device to a laptop. Which type of cable is needed to accomplish this? | None. Bluetooth connections are wireless |
| Which key sequence may be used to control whether the content of the screen will be presented on a built-in display or on an external display? | FN + <display> |
| An administrator tries to configure Power Options within Windows, but is unable to do so. What is the possible cause? a. Wake-On-LAN has been enabled. | ACPI has not been enabled in the BIOS |
| Which two statements are true of a laptop CPU when compared to a desktop CPU? | The laptops are designed to produce less heat and The Laptop use smaller cooling devices |
| What should a technician do prior to replacing a keyboard on a laptop? | Remove all sources of power from the laptop |
| What can a user do to reconnect a laptop to a functioning wireless network after a laptop has been moved and the connection has been lost? | Change the orientation of the laptop |
| What is the first step in the process of troubleshooting a laptop? | Identify the problem |
| A technician has installed a wireless Ethernet card in a Windows 7 laptop. Where would the technician configure a new wireless connection? | Control panel> Networking and Sharing center> set up a new connection or network |
| What would be the most effective preventive maintenance routine for company laptops that are subject to high use? a. a reactive routine that is performed only as needed | a proactive routine that is performed monthly and as needed |
| A technician has been asked to decide which laptop components should be cleaned on a monthly basis as part of a maintenance routine. What are two examples of components that should be included? (Choose two) | Exterior Case and Keyboard |
| What is a definiton for CPU throttling? | the ability to modify CPU clock speed to save power during less intensive processing |
| Why are SODIMMs well suited for laptops? | They have a small form factor |
| In the power management settings, which two devices can be set to turn off to conserve battery power? | Display and Hard disk drive |
| Which statement describes the S4 ACPI power state? | The CPU and RAM are off. The contents of RAM have been saved to a temporary file on the hard disk |
| A technician notices that a laptop display appears stretched and pixelated. What is a probable cause of this? | The siplay properties are incorrectly set. |
| A technician is trying to remove a SODIMM module from a laptop. What is the correct way to do this? a. Desolder the SODIMM module. | Press outward on the clips that hold the sides of the SODIMM |
| To clean laptops, which two products are recommended? | Cotton Swabs and Mild cleaning solutions |
| Which statement describes the Airplane Mode feature found on most mobile devices? | . It turns off cellular, Wi-Fi, and Bluetooth radios on the device. |
| What would be a reason for a computer user to use the Task Manager Performance tab? | to check the CPU usage of the PC |
| Some of the lab exercises involve studying the characteristics of computer viruses and worms. What is an advantage of conducting the lab exercises inside the virtualized environment as opposed to using actual PCs? | Virus and worm attacks are more easily controlled in a virtualized environment, thus helping to protect the college network and its devices from attack. |
| An application update causes the computer to function improperly. Which Windows function could be used to roll the operating system back to a previous state? | Restore point |
| A technician is attempting to create multiple partitions on a hard disk. What is the maximum number of primary partitions allowed per hard drive? | 4 |
| A computer with the Windows 7 operating system fails to boot when the system is powered on. The technician thinks the operating system has been attacked by a virus that rendered the system What measure could be taken to restore system functionality? | Use a system image that was created prior to the failure to restore the system |
| A user reports to a technician that his computer freezes without any error messages. What are two probable causes? (Choose two.) | The power supply is failing and an update has corrupted the operating syster |
| What command would allow a technician to receive help with the command-line options that are used to view the files in a certain directory? | DIR/? |
| Which Windows 7 feature allows a user to view the contents of the desktop by moving the mouse to the right edge of the taskbar? | Aero Peek |
| Which two statements are true about restore points? | They contain information about the system and registry settings that are used by the Windows operating system. and They are useful to restore the computer to an earlier time when the system worked properly. |
| A technician has loaded an incorrect video driver on a Windows 7 computer. How can the technician revert to a previous driver? | Select the video adapter card Properties in Device Manager, select the Driver tab, and click Roll Back Driver. |
| What would be the result of having a corrupt Master Boot Record? | The operating system will start to fail |
| What are two features of the active partition of a hard drive? | . The active partition must be a primary partition. and also The operating system uses the active partition to boot the system. |
| Which command can be used from the Windows command prompt to copy all files and directories from one location to another? | XCOPY |
| A user notices that a PC is running slowly and exhibits a delayed response to keyboard commands. What is a probable cause of this symptom? | a process is using most of the CPU resources |
| A technician needs to upgrade the file system on a Windows XP computer from FAT32 to NTFS without losing user data. Which course of action should be taken to upgrade the file system to NTFS? | run the CONVERT.EXE utility to convert the file system to NTFS |
| What are two advantages of the NTFS file system compared with FAT32? | NTFS provides more security features and supports larger files |
| What is the purpose of the Microsoft System Preparation (Sysprep) tool? | What is the purpose of the Microsoft System Preparation (Sysprep) tool? |
| Which Windows administrative tool displays the usage of a number of computer resources simultaneously and can help a technician decide if an upgrade is needed? | performance monitor |
| When a user makes changes to the settings of a Windows system, where are these changes stored? | Registry |
| A technician is troubleshooting a PC. The display shows an "Invalid Boot Disk" error after the POST. What is a probable cause? | The MBR is corrupted |
| what is the term for the ability of a computer to run multiple applications at the same time? | Multitasking |
| A Windows XP system is unable to boot properly. What is the procedure to use to boot this system into Safe Mode? | Reboot the system, press and hold F8 until a menu is displayed, and then choose Safe Mode. |
| A user notices that some of the programs that are installed before upgrading to Windows 7 no longer function properly after the upgrade. What can the user do to fix this problem? | Run the programs in compatibility mode |
| A technician has installed a new video driver on a Windows XP computer and now the monitor shows distorted images. The technician needs to install a different video driver. What startup mode should the technician use to access the driver on the network? | Safe mode with Networking |
| Which two Windows utilities can be used to help maintain hard disks on computers that have had long periods of normal use? | Disk defragmenter and Disk cleanup |
| A computer is suffering from poor performance after an upgrade from Windows XP to Windows Vista. Which action could improve the performance? | Turn of aero |
| Which term best describes the process of breaking a program into smaller parts that can be loaded as needed by the operating system? | Multithreading |
| Which partition is used by the Windows operating system to boot the computer? | Active |
| A Windows computer locks with a stop error during startup then automatically reboots. The rebooting is making it difficult to see any error messages. What can be done so that the error messages can be viewed? | In safe mode use the advanced startup options menu to disable the restart function |
| What are two functions of an operating system? | managing applications and controlling hardware access |
| How much RAM can theoretically be addressed by a 64-bit operating system | 128 GB or more |
| Which of these programs is an example of a Type 2 hypervisor? | Virtual PC |
| A technician is having difficulty resolving what appears to be a Windows 7 problem. Previously known solutions did not work and neither Device Manager nor Event Viewer provided useful information. Which two actions should the technician try next? | Check the internet for possible solutions and check any manuals that relate to the hardware and software |
| What does a malware detection program look for when running a scan? | patterns in the programming code of the software on a computer |
| Some home networking equipment (such as a wireless router) come programmed with a default username. What is a best practice if you were to purchase this type of equipment? | Change both username and passowrd |
| Which action would help a technician to determine if a denial of service attack is being caused by malware on a host? | Disconnect the host from the network |
| All users working with a particular Windows 7 computer are able to install unauthorized software. In addition to educating the users about correct security behavior, which action should also be performed to prevent this from happening? | Enable UAC on the computer |
| What is the name given to the programming-code patterns of viruses? | Signatures |
| You want to dispose of a 2.5 terabyte hard disc drive that contains confidential financial information. What is the recommended procedure to achieve this? | smash the platters with a hammer |
| A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent? | social engineering |
| Which two security precautions will help protect a workplace against social engineering? | ensuring that each use of an access card allows access to only one user at the time and registering and escorting all visitors to the premises |
| A technician is troubleshooting a computer security issue. The computer was compromised by an attacker as a result of the user having a weak password. Which action should the technician take to prevent this type of attack happening in the future? | ensure the security policy is being enforced |
| A user has reported that a computer web browser will not display the correct home page even if the default page is reset. What is the likely cause of this problem? | The computer has been infected with spyware |
| This Windows 7 tool can encrypt the entire hard drive volume. | BitLocker |
| It has been noted that the computers of employees who use removable flash drives are being infected with viruses and other malware. Which two actions can help prevent this problem in the future? | Disable the autorun feature in the operating system. |
| Which two items are used in asymmetric encryption? | a public key and a private key |
| What is the primary goal of a DoS attack? | to prevent the target server from being able to handle additional requests |
| What is the most effective way of securing wireless traffic? | WPA2 |
| What are two typical physical security precautions that a business can take to protect its computers and systems? | Implement biometric authentication.This answer is correct. Selected: Disable the autorun feature in the operating system. |
| Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? | protocols and physical addresses |
| Which physical security technology can hold user authentication information, include software license protection, provide encryption, and provide hardware and software authentication that is specific to the host system? | Trusted Platform Module (TPM) |
| Which type of security threat uses email that appears to be from a legitimate sender and asks the email recipient to visit a website to enter confidential information? | phishing |
| Which two characteristics describe a worm? | travels to new computers without any intervention or knowledge of the user and self replicating |
| Which three questions should be addressed by organizations developing a security policy? | What assets require protection? What are the possible threats to the assets of the organization? What is to be done in the case of a security breach? |
| While troubleshooting a network problem, Rodrigue noticed that after running the ipconfig command on Jerome's computer, the PC indicated its IP address was 169.254.10.5. What does this special type of IP address indicate about the issue? | . Rodrigue needs to find out why the PC cannot communicate with the DHCP server. |
| This network spans a large geographic area. | WAN |
| This technology provides a secure, encrypted end-to-end connection through a public network such as the Internet. | VPN |
| The 802.11 networking standard is used to describe | Wireless Networks |
| IPv6 | 2001:0DB8:75a3:0214:0607:1234:aa10:ba01 |
| IPv4 | 192.168.25.1 |
| Subnet Mask | 255.255.255.0 |
| MAC address | A0-88-B4-E7-08-B8 |
| Blenda lives in Chicago and works for a large corporation in the Twin Cities. the rest of the time she works from home and connects to the corporate network using VPN and the Internet. What type of a network would best describe what Blenda uses at home? | SOHO network |
| The Ethernet architecture is defined by the IEEE ______________________________standard. | 802.3 |
| What type of a cable would an IT technician use to connect two PCs together? | cross-over cable |
| This protocol is used to match an Internet domain name to its corresponding IP address. | DNS |
| Ipv6 address | 128 bit address |
| IPv4 address | 32 bit address |
| MAC address | 48 bit address |
| Which of the following is the most secure WiFi standard? | WPA2 |
| On a PC, the MAC address is a physical address and is typically "burned-in" to which component? Selected: a. NIC card | NIC card |
| This broadband technology has a fast download rate which is beneficial to users who are downloading large amounts of data from the Internet. The upload rate, however, is slower than the download rate | ADSL |
| Any device on the network that can send and receive information. | host |
| A device on the network that uses MAC addresses for forwarding information to other devices on the LAN | switch |
| A device on the network that uses IP Addresses to determine the best path to reach remote networks. | router |
| This device provides network access to wireless devices on a WLAN | WPA |
| hich of the following is a benefit provided by a client server network? | shared resources |
| Jonelle has a PC that needs to connect to the Internet with a network cable. All of her other devices can use WiFi to connect to the Internet. Jonelle purchased a multipurpose device that functions as three devices in one. Choose these three devices | switch, WAP, and router |
| Amanda is the owner of a medium-size business. All of her employees work in one office building. All computers in that building are connected to this type of network. | LAN |
| A team of IT technicians will use this protocol to dynamically assign IP addresses to 150 computers on their organization's network. | DHCP |
| A PAN (Personal Area Network) often uses this type of technology for information sharing. | bluetooth |