click below
click below
Normal Size Small Size show me how
A+ Certification
Essientials Exam
| Question | Answer |
|---|---|
| All of the followig are follow-up activities for active listening EXCEPT: A. Restate key points. B. Listen to the customer. C. Ask pertinent questions. D. Apply what you have learned. | Listen to the customer |
| You want to enable the System Restore feature on a Windows XP-based client computer. However, you are unable to do so due to the lack of hard disk space. How much free hard disk space is required to enable the System Restore feature? | 200 MB |
| Which statement regarding the paging file is FALSE? | To improve performance, decrease the size of the paging file. |
| Which accessibility features of Windows XP slows down the repeat rate of the keys? | FilterKeys |
| What is the most effective statement when dealing with a customer who has a reoccurring problem? | Often this type of problem is caused when a hardware configuation has been changed. |
| You are researching an issue with an application. You discover that a registry entry must be changed. In Windows XP, which tool actually edits the registry? | Regedit |
| If you arrive at a customer's house and find that there are no adults home, but a child was instructed to show you where the computer is to start working, what should you do? | Explain that you must have an adult present. |
| A customer contacts you with a tech issue you must research. After obtaining permission, you place the customer on hold to complete the research. What is the maximum amount of time the customer should remain on hold before receiving an update? | 2 minutes |
| Which file system volume allows you to store encrypted files on a Windows-based computer? | NTFS |
| If you clear a paper jam from the tray in a laser printer, but the printer still indicates a jam, what step should you perform next? | Physically open and close the top assembly. |
| You need to connect two computers for a customer. The cusotmer does not have a network and does not wish to purchase a concentrator, but both computers include functional Ethernet network interface cards with RJ-45 connectors. What component will allow | A crossover cable |
| A customer has contacted you and is angry about your company's service. During the call, you discover that another technician repsonded initially to the customer's issue. What should you do first? | Stay calm |
| What three conditions affect the external vulnerabilityies of wireless networks? | 1. Antenna selection 2. Antenna placement 3. Access point power |
| Which key shoul you use on a laptop in combination with special functionality keys to perorm tasks susch as toggling the display or adjusting the display brightness? | The Fn key |
| You are at a customer site. The customer reports problems staying connected to the Internet, but he does not provide any specific information. What should you do to gatheer more information on the problem? | Ask the customer to demostrate the problem. |
| While servicing a printer in the human resources department, you overhear a conversation about an increase in the health insurance rates. What should you do? | Keep the information confidential. |
| Which action should NOT be performed as part of a preventive maintenance procedure? A. Use paper towel to clean LCD screen B. Use a vacuum to clean the keyboard C. Use a soft brush to clean the CPU fan | A. Use a paper towel to clean the LCD screen. |
| Which key combination should you press in a Windows-based computer to open the Task Manager or the Windows Security window, or to reboot the computer? | Ctrl + Alt + Del |
| Examining a video card, you notice fingerprints and smodges on the card connectors. What should you use to clean the connectors? | Alcohol with an anit-static towel |
| You have recently discovered that users on your network have been victims of impersonation attacks. You need to implement an authentication method that checks the identity of both ends of the connection. What authentication method does this? | Mutual Authentication |
| Which of the following options is a way to increase security in a wireless network? A. SSID broadcast B. war driving C. rogue access points D. MAC filtering | MAC Filtering |
| A user complains that the computer mouse is not working properly. The mouse pointer jerks and jumps around the screen. What is the most likely cause of the problem? | Dirty mouse |
| You want to assign a static Internet Protocol (IP) address to a Windows XP client computer that is configured to use a dynamic IP address. What tool should you use? | Network Connections & netsh.exe |
| When you use battery power, your Windows XP Professional computer is configured to enter standby mode after 15 minutes of inactivtiy. Which components are turned off in this mode? | The monitor & The hard disk |
| What is the operating range for Class 2 Bluetooth devices? | 10 meters or 33 feet |
| What recommended wireless specifiction is used for network authentication in home and small business wireless networks that use Windows XP client computers? | WPA |
| What is the purpose of a privacy filter? | To prevent others from viewing what you have displayed on your monitor |
| A customer calls you to report a video problem with his computer. The customer starts to explain the symptons of the problem. What should you do first? | Allow him to finish his explanation, and record all the details he gives you. |
| The CD-ROM application stops responding. You borrow another CD-ROM and receive an error indicating that the media cannot be read. What are two most cost-effective actions you should take first to resolve the problem? | Clean the CD-ROM disks. Clean the drive optics. |
| Which Windows XP portable computer power scheme ninimizes the us of power to conserve tha battery, but adjusts to the processing needs without sacrificing the system speed? | Portable/Laptop power scheme |
| Which tab on the MSCONFIG utility can allow you to select applictions that should NOT be loaded at boot time? | the Startup tab |
| which malicious program replicates itself to computers on a network through secrutiy loopholes? | Worm |
| You back up all data once per week on Fridays after the close of business. Monday-Thursday you perform a backup that includes only those files that have been added or changed. You perform a deffierential backup on Monday. Which backup type is done on Tue | a differential backup |
| Which network type uses WEP for security? | 802.11b - wireless network security technology |