final exam Flashcards
(122 cards)
What two motherboard components control the system boot operations? (Choose two.)
BIOS chip
UEFI chip
Northbridge chip
Southbridge chip
CPU
BIOS chip
UEFI chip
What motherboard chip controls high speed CPU communication to RAM and the video card?
Northbridge
Southbridge
BIOS
UEFI
Northbridge
Which two procedures can help protect against ESD when working on a computer system? (Choose two.)
the use of an antistatic wrist strap
the use of magnetized tools
the use of an antistatic mat
the use of safety glasses
the use of polyester clothing
use of antistatic wrist wrap
use of antistatic mat
- Which software tool will protect against viruses and spyware on a Windows PC?
Windows 8 Action Centre
Scandisk
Windows Defender
System File Checker
windows defender
. Which cleaning material should be used to clean component contacts?
isopropyl alcohol
compressed air
cotton swabs and cloths
dishwashing liquid and water
isopropyl alcohol
A technician is troubleshooting a problem where many websites return a “certificate not valid” error. The technician notices that the date and time are not current and resets these to the correct settings. The previously inaccessible websites are now accessible. However, when the computer is restarted the same problem reoccurs. What can the technician do to prevent the date and time from resetting?
Reinstall the OS.
Upgrade the BIOS.
Change the power settings in the BIOS.
Replace the CMOS battery.
replace the CMOS battery
When a new motherboard is being installed, between which two components must thermal compound be applied? (Choose two.)
CPU
RAM
chassis
heat sink
chipset
motherboard
CPU
Heat sink
A specific computer has an issue that could not be resolved by the help desk technician. The on-site technician finds that Windows updates have been disabled. The technician re-enables the update service, configures the computer for automatic updates, downloads and installs all missing updates, ensures the computer boots successfully, and verifies with the customer that the issue has been resolved. Which step, if any, is next?
Document the findings, actions, and outcomes.
No further action is needed.
Establish a plan of action to resolve the problem and implement the solution.
Verify full system functionality and, if applicable, implement preventive measures.
Test the theory to determine the cause.
document the findings actions and outcomes
What should a technician do before beginning any troubleshooting steps on a customer computer?
Perform a data backup.
Document the findings.
Identify the problem.
Establish a plan of action
perform a data backup
Which document can be signed by both a user and a computer repair shop to release the shop from backing up user data?
preventive maintenance plan
work order
liability release form
warranty form
liability release form
A technician is troubleshooting a 4-year-old computer that takes a long time to boot, and identifies that the BIOS rediscovers all the hardware at every boot. What action would fix this problem?
Replace the CMOS battery.
Launch Device Manager to discover new hardware.
Reset the BIOS using the CMOS jumper.
Start the computer with the last known good configuration.
replace the CMOS battery
Which location on a hard disk is used by the BIOS to search for operating system instructions in order to boot a PC?
the logical drive
the active partition
the Windows partition
the extended partition
the active partition
A technician is asked to set up one hard drive that will support two operating systems and will store data files in three separate drive locations. Which partition settings will support these requirements?
1 primary, 3 active, 1 extended, 2 logical
2 logical, 2 active, 3 extended
2 primary, 1 active, 1 extended, 3 logical
3 primary, 1 active, 2 extended
2 primary, 1 active, 1 extended, 3 logical
A user installs a new sound card driver in a computer that is working properly. After the installation of the drivers for the new sound card, the computer fails to boot. Which quick fix can the user implement to return to the previous working state?
Boot to Emergency Recovery State.
Boot to Last Known Good Configuration.
Boot to Recovery Console.
Boot to Start Windows Normally
Boot to Last Known Good Configuration.
. A technician is using the six troubleshooting steps in an attempt to repair a PC. After completing the steps needed to test a theory and determine the cause, the technician still has not solved the problem. Which two steps are likely to be taken next by the technician to establish a plan of action and resolve the problem? (Choose two)
Perform an Internet search.
Ask other users in the area.
Access helpdesk repair logs.
Speak with the supervisor of the user.
Call the helpdesk to log the problem.
perform an internet search
access helpdesk repair logs
On a computer that will not boot, which two actions are recommended in the troubleshooting process after verifying the obvious issues such as power to the computer and display, non-bootable media, and the BIOS boot order options? (Choose two.)
Remove unnecessary peripherals.
Reinstall the operating system.
Reset the BIOS settings to factory default.
Use the Last Known Good Configuration.
Replace computer components one at a time until the problem is solved.
Reinstall the user applications.
Remove unnecessary peripherals
use the last known good configuration
What is the distance limitation of a single data run for UTP cabling without adding networking devices?
33 ft (10 m)
100 ft (31 m)
330 ft (100 m)
500 ft (154 m)
330ft (100m)
What is the default subnet mask for a Class A network?
0.0.0.255
0.0.255.255
0.255.255.255
255.0.0.0
255.255.0.0
255.255.255.0
255.0.0.0
Which network protocol is used to automatically assign an IP address to a computer on a network?
FTP
DHCP
ICMP
SMTP
APIPA
DHCP
Which open standards-based wireless security mode supports the highest level of security?
WEP
WPA2
WPA
LEAP
WPA2
What are two network requirements necessary to establish a VPN connection between a remote computer and a private company LAN? (Choose two.)
low latency network connection
secure web server
Internet access
PSTN access
VPN client
internet access
VPN client
The corporate security policy states that all remote connections use only secure tunnels for data communications. Which encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN?
MD5
VPN
WEP
WPA
VPN
What type of WAN connection would use 3G or 4G?
DSL
satellite
cable
POTS
cellular
cellular
True or False?
An intrusion detection system works inline and has the ability to drop malicious traffic.
true
false
false