Pinguis Website Design Kerry and Cork COMPTIA Certified, Batchelors in Information Technology
Answer Questions
Upon starting a computer, the CHKDSK utility always runs before the operating system loads. Which of the
following components should the technician check in order to more closely diagnose the problem?
Power supply and cables
Processor and BIOS settings
Hard drive and connecting cables
USB controller and FireWire connector
A technician is tasked with replacing the processor and cooling fan in a laptop computer. Which of the following procedures will help the technician complete the task efficiently?
Place all of the screws together in one container so they do not get lost.
Place the screws for each disassembly step together in an organizer.
Tag each screw hole with a different color coded tag.
Throw away the existing screws and replace them with new screws.
A technician receives a service call about a printer producing wrinkled pages. Which of the following can cause wrinkled paper in a printer? (Select TWO).
Toner may be contaminating the paper path
The PostScript commands are not being processed
The corona transfer wire needs to be cleaned
The new paper was stored in a damp location
The fuser unit is reaching the end of its life
Which of the following represents the default installation folder for a 32-bit program installed under Windows 7 Professional 64-bit?
C:\Documents and Settings
C:\Program Files (x64)
C:\Program Files (x86)
C:\Program Files
During startup an error message "One or more services failed to start" appears. Which of the following
methods can be used to examine the status of the services running on the computer? (Select TWO).
Click on Start > Control Panel > System
Right click on My Computer and select Properties from the context menu
Click on Start > Control Panel > Administrative Tools
Right click on the Desktop and select Properties from the context menu
Right click on My Computer and select Manage from the context menu
A SOHO user has just installed a new wireless router on the network. Which of the following is the FIRST thing the user should do to secure the router from unauthorized use?
Change the default administrator name and password
Update the firmware in all of the client computers
Setup MAC filtering to limit the devices that can connect
Determine the DHCP range and any static exclusions
A shared computer is used on multiple shifts and each user creates a log file in a shared folder. Lately there
has been an issue with log files being deleted by users other than the creators. Which of the following
options will prevent these deletions while allowing users access to their own files?
Uncheck the Allow Modify security attribute on the folder from the Users group.
Uncheck the Allow List Folder Contents security attribute on the folder from the Users group.
Check the Deny Full Control security attribute on the folder from the Users group.
Uncheck the Allow Write security attribute on the folder from the Users group.
Which of the following operating systems supports full BitLocker functionality?
Windows XP
Windows 7 Professional
Windows Vista Home
Windows 7 Enterprise
Which of the following protocols could a technician use to connect a smartphone to an email server?
(Select TWO).
SMTP
POP3
HTTP
SNTP
ICMP
Which of the following should a technician do FIRST to secure a mobile device?
Assign a passcode
Download updates
Disable GPS
Install antivirus
When running Windows XP, which of the following would give a list of switches for the CHKDSK command?
chkdsk ~?
chkdsk :?
chkdsk /?
chkdsk \?
Which of the following security threats would cause a computer to run slow and redirect HTTP sites?
Phishing
Key logger
Social engineering
Malware
Which of the following security threats involve shoulder surfing and phone phishing?
Man-in-the-Middle
Social engineering
Trojan virus
Spyware
A technician is tasked with building three systems that are capable of utilizing the new Windows
Home Group functionality. Which of the following versions of Windows would need to be used?
Windows 7 or Windows Vista
Windows Vista only
Windows XP Professional x64 Edition
Windows 7 only
Which of the following security threats does NOT use software to extract sensitive information or credentials?
Grayware
Shoulder surfing
Malware
Man-in-the-Middle exploits
Social engineering makes use primarily of which of the following techniques, to bypass common corporate security barriers?
Grayware installation
Worm transmission
Human interaction
Malware installation
A user has a laptop that they need to get ready for an outdoor presentation. The user is concerned that the
laptop will turn off the screen or go into standby before their presentation is complete. Which of the
following Control Panel paths should the technician use in order to prevent this from occurring?
System -> Hardware
Power Options -> Power Schemes
System -> Advanced -> Performance
Power Options -> Hibernate
A user states their workstation will not reach the login screen. Which of the following commands can be
used to write a new partition boot sector to the system partition in the Recovery Console?
FIXMBR
BOOTCFG
FIXBOOT
DISKPART
Which of the following features helps to prevent shoulder surfing?
Native resolution
Auto adjust
Degaussing
Privacy screen
A user wants to change the functionality that occurs when the laptop lid is closed. Which of the following Control Panel options is the MOST direct way to adjust this?
Display
Power Options
Personalization
Device Management
Which of the following Control Panel items will allow for easy streaming of pictures, music, and videos to
other Windows 7 PCs?
Ease of Access Center
AutoPlay
Sync Center
HomeGroup
The folder "Documents" is shared. The user can create and delete documents when on the local PC, but
can only read documents when accessing them remotely. Which of the following should be adjusted?
Read Only Attribute
Share Permissions
Firewall Settings
NTFS Permissions
Which of the following security controls would be an example of the least privilege principle on a home PC?
Install antispyware on the PC.
Create a standard user account for kids.
Store all financial data in a separate folder.
Disable the firewall for online gaming.
A user regularly has to walk away from their computer and is worried someone may access their
workstation. Which of the following would BEST prevent this?
Lock the workstation
Shutdown the computer
Logon using the unprivileged guest account
Set the screensaver password
A user has an LCD and a CRT monitor attached to their workstation. The colors are slightly off on the CRT
but not the LCD. Which of the following controls should be used in troubleshooting?
Geometry
Contrast
Brightness
Degauss
A user has not received any new emails on their smartphone in the last two days. The user is able to
access the Internet without any problems. Which of the following should the user do FIRST?
Restart the smartphone
Reconfigure the smartphone email account
Resynchronize the smart phone
Update the operating system
A technician needs to format a file system to be compatible with the WIDEST range of operating systems. Which of the following file systems should be used?
NTFS
FAT16
CDFS
FAT32
A company is experiencing issues with third parties tailgating authorized users during entry to secure server rooms. Which of the following would BEST alleviate this problem?
Retinal scanners
Mantraps
Door locks
Smart card badges
A company has experienced loss of confidential information from disposed paper records. Which of the following security procedures should be implemented?
Biometrics
Shredding
Key fobs
Mantraps
Which of the following security concepts establishes the notion that a user should only be given sufficient access to the resources they need to perform their job function?
Deny all
Allow all
Most privilege
Least privilege
A user reports that settings on the SOHO Wi-Fi router are being changed. Which of the following is the BEST course of action to prevent unwanted changes in the future?
Change the default password of the administrator router login account.
Enable a stronger password for the SNMP reporting functionality of the router.
Change the internal IP of the router.
Set the DHCP lease expiration time to half of its current value.
A technician is trying to diagnose a laptop that is experiencing heavy artifact corruption and random loss of
video during operation. Which of the following are MOST likely causes of this problem? (Select TWO).
Integrated system video chip is failing and/or near death.
Video drivers were not installed directly from Microsoft update
Incompatible or untested video drivers have been installed.
The BIOS is not set for the proper operation temperature of the video chipset.
The BIOS is underclocking the video card's operating speed.
A user reports that every time they use a search engine and click on a link to go to a website, they instead
are taken to a site blocked by their company's content filter. The user is not trying to go to the blocked site
and needs to be able to successfully use the search engine to complete their assignment. Which of the following tools would a technician use to BEST resolve this issue?
Anti-malware software
Factory pre-installation
System restore
Recovery console
After being infected with a virus, a user's computer does not recognize the user as having local
administrator rights to the computer. After troubleshooting the issue, a technician determines the computer
needs to be rebuilt and data needs to be restored from the user's backup. Which of the following tools would BEST reset the computer to how it worked when first purchased?
Recovery Console
Factory restore CD
Anti-malware software
System Restore
After installing an updated video card driver in a Windows XP machine, a technician sees a bluescreen of
death (BSOD). Which of the following would BEST help the technician repair the CompTIA 220-702 Exam computer?
Update antivirus definitions
Run System Restore
Last Known Good Configuration
Factory pre-installation CD
A technician installed a second hard drive in a computer. Upon restart, a message appears statinG.
"primary drive 0 not found. Press F1 to continue”. Which of the following should the technician check FIRST?
That NTLDR and boot.ini are not missing
Proper drive installation (e.g. cables/jumpers)
If computer can boot into safe mode
If the BIOS boot settings are correct
Which of the following is BEST used to prevent other people from viewing a user's computer screen?
Anti-virus software
Key fob
Biometric device
Privacy filter
A pest exterminator tries to gain access to a company's computer lab, but the receptionist does not see an
extermination scheduled on the calendar and denies the exterminator access to the lab. Which of the following security threats almost occurred?
War driving
Social engineering
Shoulder surfing
Phishing
Which of the following can be used as an appropriate boot device?
USB drive
HDMI
OEM recovery media
FDISK
Which of the following is the BEST tool to verify the cable is plugged into the correct port on the patch panel?
Cable certifier
Punch down
Toner probe
Cable tester
Which of the following is the BEST tool for a technician to use to make sure the network wires are securely fastened in a wall jack?
Crimper
Small flat screwdriver
Wire strippers
Punch down
A client wants a wireless SOHO installed in the building that already has other wireless networks in it. The
client wants the network to not be easily seen. Which of the following can the technician disable to help the network from being seen?
SSID broadcast
DHCP
MAC filtering
Wireless encryption
QUESTION 93
A user gets an error message that the trust relationship to the domain has been broken. Which of the following can be done to resolve this from the client desktop?
Re-join the computer to the domain
Reboot the PC as the domain will automatically rebuild the relationship
Update the BIOS using the latest version
Run CHKDSK
The technician needs to view files in the C:\users\; some files are not visible. Which of the following Control Panel utilities should be used FIRST to resolve this problem?
Folder Options
Security Center
System
User accounts
Which of the following resources is MOST important for accessing remote virtual environments on a client machine?
Network speed
CPU speed
High speed memory
Drive space
A computer program that functions normally while quietly installing malicious software on a machine is known as a:
DDoS attack.
Worm
Phishing attack.
Trojan
A user sent an email requesting that a technician check if a computer is on and connected to the Internet so
the user can login from home. Which of the following commands in the command prompt would a
technician use to verify if the computer is on and connected without having to go to the computer?
NSLOOKUP
NETSTAT
PING
IPCONFIG
A technician recently removed spyware from a computer and now the user is getting error messages about
system files. Which of the following tools would a technician use to verify all system files are intact and in their original versions?
Repair Disk
SFC
FIXMBR
ASR
A technician has recently installed a printer on a customer's computer and verified it is working correctly.
The customer calls and states that nothing has changed but now they are unable to print to any printer. In
which of the following places would the technician look FIRST to determine the problem?
Users and Groups
Windows Firewall
Services
Local Security Policy
A customer with an iOS based tablet does not have serviceable parts and needs additional storage for their
device. Which of the following would BEST address their increased storage needs?