Which of the following memory types needs to be refreshed?
Non-parity
Parity
DRAM
SRAM
A frustrated customer has called about their computer that is not functioning correctly. Which of the following is the BEST question to ask the user?
"Can you avoid using the PC that crashed?"
"What was the last thing that occurred before the PC had problems?"
'What were you doing before the PC went down?"
"What was the last thing you did before the PC crashed?"
Which of the following devices will allow a technician to use a single set of input devices on several computers?
Smart card reader
KVM
SCSI
Barcode reader
A technician has implemented a solution to resolve a customer's issue with frequent unexpected system restarts. Which of the following should be the technician's NEXT troubleshooting step?
Verify full system functionality and, if applicable, implement preventative measures.
Establish a theory of probable cause based on previous tests and determine next steps to resolve.
Document the issue and include details regarding findings, actions taken to resolve and the outcome.
Test the theory to determine if the solution will really correct the issue, list other possible causes.
Several print jobs have recently been sent to the printer but nothing is printing. While looking at the print queue, the technician notices that the first print job has an error. Which of the following actions should be taken to remove the error and allow the other jobs to print?
Restart the print spooler
Cancel the print job with the error
Restart all the jobs on the printer
Cancel all print jobs
A user calls about a problem with receiving email. After troubleshooting the user's computer and finding nothing wrong, the technician contacts the email sender and finds out the user gave out their email address incorrectly. Which of the following is the BEST approach in explaining the issue to the user?
"Sometimes computers are just strange, but it seems to be working now."
"You gave them the wrong address and caused this problem."
"The sender had the e-mail address wrong, but they have it correct now and the problem has been resolved."
"The SMTP server was not getting a proper resolution of the recipient name field when it was parsing the header."
A technician has a security device which displays a number that changes over time. Of which of the following is this an example?
A smart card reader
A token device
A biometric device
An RFID scanner
Which of the following will BEST help a technician remove a virus from an infected computer?
Emergency Repair Disk
Automated System Recovery
System Restore
Safe Mode
Which of the following is used to access the Task Manager in Windows XP Professional? (Select TWO)
Left click on the task bar
Right click on the start button
Control + alt + delete
Control + alt + escape
Right click on the task bar
The IP address on a workstation is 10.10.145.16. A user calls the helpdesk and asks why the Internet IP address being displayed is 204.19.116.22 on the workstation. Which of the following is this an example of?
WINS
DNS
DHCP
NAT
A user wants to access a Bluetooth device from a Bluetooth equipped laptop. Which of the following steps needs to be completed for this to work?
The laptop must have a minimum of 2MB of RAM
The laptop and the Bluetooth device must be paired
The Bluetooth device and the laptop must be synchronized at the same frequency
The Bluetooth device must be compatible with Windows
Which of the following should be the FIRST step in troubleshooting a problem?
Establish a theory of probable cause
Establish a plan of action
Verify full system functionality
Identity the problem
Which of the following chipsets is responsible for controlling the data flow between a PATA optical drive and the processor?
Northbridge
BIOS
Southbridge
DMA controller
Which of the following memory modules is a DDR3 chip?
PC3200
PC4800
PC5300
PC8000
A small shock of electricity transferred from a computer or other electronic component to a person is known as:
EMF
RFI
EMI
ESD
At system startup a technician notices that a newly installed program has an unnecessary service that runs causing the computer system to lock-up after about 20 minutes of use. Which of the following would be acceptable ways to stop the unnecessary service from running at startup? (Select TWO)
Run MSConfig and stop the service from the services tab.
Run mstsc.exe, locate the unnecessary service, and disable the service.
Navigate to the c:\ directory, locate the unnecessary service, and delete the file.
Run services.msc, navigate to the unnecessary service, then disable the service.
Navigate to the c:\windows\system32 directory, locate the unnecessary service, and delete the file.
Which of the following types of security concepts describe securing ports and protocols on a system?
Disk Encryption
Data classification
Social Engineering
Software Firewall
Which of the following wireless standards has the potential for having the MOST bandwidth?
802.11a
802.11b
802.11g
802.11n
Which of the following removable storage devices is MOST likely used to duplicate bootable media?
SD card
Zip drive
Blu-Ray
DVD-RW
Which of the following display ports sends video output over pure digital signal?
VGA and HDMI
S-Video and DVI
HDMI and DVI
VGA and DVI
A networking device that sends packets to all connections is a:
Gateway
Hub
Switch
Router
Which of the following would BEST provide cooling to a processor?
Case fan
Heatsink
Liquid cooling system
CPU fan
Which of the following voltages is MOST commonly associated with DIMMS?
+3.3V
+5V
-12V
+12V
Which of the following locations will allow a user to change the Windows Vista Start Menu to resemble the Windows XP Start Menu?
Right-click Start Menu/Properties/Start Menu tab
Control Panel/User Accounts
Start/All programs/Accessories/Ease of Access
Right-click Desktop/Personalize
There are several technicians working on various systems on a new workbench. Which of the following should be reviewed to ensure all proper procedures are followed to help reduce any possible issues?
MSDS
OEM
ESD
EMI
Which of the following devices has the MOST storage capacity?
FDD
CD
HDD
DVD
Which of the following processing types allows two instructions to be received and processed nanoseconds apart?
Quad core
Triple core
Dual core
Hyper-threading
Which of the following network types allows for high speed data communication and is the MOST difficult to splice into?
Cable
DSL
Satellite
Fiber
An unidentified person gains access to an office workplace, posing as a new IT staff member. The unidentified person tries to obtain passwords through conversation with other administrators. Which of the following security breaches is occurring?
Social engineering
Brute force cracking
Biometric attack
Phishing
Which of the following port types can be used to connect a hard drive to a computer? (Select Three)
eSATA
FireWire
PATA
Parallel
Serial
PS/2
Which of the following would be able to process a CPU access request the FASTEST?
L1 Cache
L2 Cache
L3 Cache
RAM
A user states that a new graphically intensive application they are using will not load because it requires Direct3D to be enabled. Which of the following utilities would be used to enable this?
services.msc
appwiz.cpl
dxdiag.exe
msconfig.exe
Which of the following would be the MOST secure on a wireless router for a SOHO?
WEP
SSID disabled
MAC filtering
WPA
Which of the following DSL types has the same upstream and downstream bandwidth?
DSL
FIOS
ADSL
SDSL
A user reports that excessive pop-ups are occurring each time they open a web browser. Which of the following is the MOST likely cause?
Spam
Adware
Virus
Spyware
Which of the following Windows versions contains the UAC security feature?
Windows Vista
Windows 2000 Professional
Windows XP 32-bit
Windows XP 64-bit
Which of the following is needed to boot into the Recovery Console in Windows XP?
Emergency Restore Disk
System Restore point
Original Installation CD
Automated System Recovery
Which of the following occurs by default when a file is copied from a CD-ROM to a folder on an NTFS partition?
The file inherits the permissions of the folder it is copied to
The CD structure is indexed and the index is stored in the folder
The file is copied with the Read Only attribute
A shortcut is created on the drive pointing to the CD file
A user states that a section of keys on a laptop do not operate. Which of the following is MOST likely the cause?
The system board is faulty
The memory needs to be replaced
The keyboard cable is partially seated
The keyboard driver is corrupt
A technician wants to turn off Direct3D acceleration. In which of the following locations is the setting to disable this option?
Event Viewer
msconfig
dxdiag
Services
Which of the following is the MAIN advantage of choosing a 64-bit (x64) operating system over a 32-bit (x86) operating system?
The ability to use software based data execution prevention (DEP)
The ability to run multiple 16-bit programs in separate memory spaces
The ability to use unsigned drivers
The ability to access more than 4GB of RAM
A user reports a problem with a PC located in the same room as cement testing equipment. The room has adequate cooling. The PC will boot up, but locks up after 5 to 10 minutes of use. After a lockup, it will not reboot immediately. Which of the following is the MOST likely problem?
The PC air intakes are clogged with cement dust.
The PC has a virus
The power supply is underrated for the electrical load of the PC.
The CPU heatsink is underrated for the CPU
After attempting a solution suggested by a previous technician, a user calls back because the solution did not work, and is very frustrated. Which of the following would be an appropriate response?
"Let me transfer you to the previous technician so that a solution can be reached."
"That technician does not know what they are doing; let me help you to resolve the issue."
"You should report your issue to my supervisor so that appropriate actions can be taken."
"Please describe the problem and we will try to resolve it."
Which of the following network types uses telephone lines as its ONLY medium for connectivity?
DSL
Cellular
Fiber
Satellite
Which of the following memory modules is a DDR3 chip?
PC3200
PC5300
PC6400
PC10600
How does L1 cache memory improve computer performance?
L1 cache is added to the motherboard and can be increased easily.
L1 cache is inexpensive and can be upgraded easily.
L1 cache is built into the processor and runs at the full speed of the core.
L1 cache uses a separate processor.
Which of the following should be completed NEXT, after testing the theory of probable cause?
Verify full system functionality
Implement preventative measures
Establish a plan of action to resolve the problem
Implement the solution to the problem
A laser printer has an error 'tray two paper jam' but tray two does not have any paper in it. Which of the following should the technician do FIRST?
Replace the tray two paper sensor and run the printer self test.
Remove the tray two paper sensor and clean the printhead.
Check the tray two paper sensors for blockage and run the printer self test.
Check the tray two paper rollers for blockage, clean the printhead, and run the printer self test.
Which of the following can a technician type into the command prompt to open a Remote Desktop Connection?
mstsc
mmc
msconfig
ipconfig
Which of the following tools would a technician use to perform a memory upgrade?
Anti-static pad
Multimeter
Cleaning pads
Thermal grease
Which of the following devices is the MOST appropriate to limit network broadcasts, segment logical address ranges, and interconnect different physical media?
PCI-X cards are replacing AGP video cards
PCI-X cards operate on a higher bandwidth than PCI-e cards for data transfer
PCI-X cards will fit in older PCI slots, but PCI-e will not
PCI-e cards will fit in older PCI slots, but PCI-X will not
A technician has been asked to install Cat5e cabling into air return suspended-ceiling area of an office. Which of the following types of cabling should be used?
PVC
UTP
Plenum
Coax
Which of the following devices is the MOST appropriate to limit network broadcasts, segment logical address ranges, and interconnect different physical media?
Router
Switch
Firewall
Hub
A technician is unable to find a solution for a customer's PC issue. Which of the following would be an appropriate step to take?
Inform the customer that a solution is not available and a new system must be purchased.
Escalate the call to a supervisor to register a complaint.
Consult with co-workers for additional ideas.
Refer the customer to the support section of the PC manufacturer's website.
A client needs a laser printer cleaned. Which of the following tools would be appropriate to clean the inside of a laser printer?
Office vacuum
Toner vacuum
Damp cloth
Air compressor
Which of the following connectors uses the main board ATX connector type?
Centronix
20/24 pin
BNC
Molex
NTFS is required to install which client OS?
Windows Vista
Windows 2000
Windows 7
Windows XP
Which of the following utilities would be used to configure energy saving measures when a laptop switches to battery power?
MSTSC
ACPI
GDI
MSCONFIG
A 2.5 inch (6.4cm) external hard drive is MOST likely to use which of the following power supplies?
USB
BTX
FireWire
ATX
A technician installs an additional hard drive controller. Which of the following processes will MOST likely prevent errors?
1) Apply System Updates 2) Update the BIOS 3) Install the card 4) Install the driver 5) Upgrade the Card Firmware
1) Install the card 2) Update the BIOS 3) Upgrade the Card Firmware 4) Install the driver 5) Apply System Updates
1) Apply System Updates 2) Install the driver 3) Install the card 4) Upgrade the Card Firmware 5) Update the BIOS
1) Update the BIOS 2) Install the driver 3) Install the card 4) Upgrade the Card Firmware 5) Apply System Updates
A customer has asked a technician to install aversion of Windows 7 that will allow for BitLocker functionality. Which of the following editions should the technician install?
Home Premium
Enterprise
Professional
Starter
A laptop is required to have hardware level authentication security. Which of the following would be the BEST solution?
Which of the following connectors uses the main board ATX connector type?
Centronix
20/24 pin
BNC
Molex
A laptop with an integrated 802.11b/g card is unable to connect to any wireless networks. The laptop was previously able to connect to wireless networks. Which of the following is MOST likely the cause of this issue?
The wireless card is disabled in BIOS.
The wireless card drivers are not installed.
The wireless hardware switch is turned off.
The wireless card firmware requires an update.
Where would a technician look to find the version of Windows running on a machine?
System Properties > General Tab
Computer Management > Device Manager
System Properties > Advanced Tab
Computer Management > System Tools
A memory type typically used in high end workstations and not generally found in consumer grade PCs is:
DDR3
ECC
PC2-6400
DDR2-667
Which of the following printer types usually requires special print media?
Thermal
Laser
Inkjet
Impact
Which of the following broadband mediums has the HIGHEST latency?
DSL
Cable
Satellite
4g Cellular
Several users have recently been calling the helpdesk about a recent network outage. These calls have increased in the last hour and are all by different users calling about the same issue. Which of the following types of communication skills should the helpdesk technicians MOST likely exercise while answering each call?
Talk to co-workers while interacting with customers to help diagnose the issues
Be culturally sensitive
Provide each user with a complete, detailed report of the current outage status
Listen and do not interrupt a customer and then provide a brief status update
Of the ports below which of the following is the standard HTTP port?
25
80
110
443
Which of the following ports is the default for HTTP?
21
25
80
10
Which of the following explains why it is important to change the default SSID on a wireless router?
Not all computers can connect to a default login name
A default SSID does not broadcast as far as a unique SSID
To differentiate between different wireless networks
Encryption may not work well with the default SSID
A networking device that keeps track of which computer or device is connected to each port is a:
Gateway
Switch
Hub
VLAN
Which of the following would a technician use to install a manufacturer's image on a notebook? (Select TWO)
Recovery CD
System Restore Utility
Access a recent data backup
Utilize the Recovery Agent feature
Factory recovery partition
Which of the following is the number of devices that can be daisy-chained to an IEEE 1394 port?
7
15
63
127
Which of the following maintenance utilities is used to reorganize files on a hard drive?
SCANDISK
DEFRAG
CHKDSK
Disk Cleanup
A technician is installing a new small form factor motherboard. Which of the following form factors is the technician MOST likely installing?
Micro ATX
NLX
ATX
BTX
A computer fails to boot into Windows XP and is displaying an 'invalid boot disk' error message on startup. Which of the following should the technician check FIRST?
Rebuild the master boot record using FIXMBR from within the Windows Recovery Console.
Replace the hard drive
Format the hard drive and reinstall Windows
Verify the hard drive is selected as a boot option in BIOS setup.
Which of the following would MOST likely be used to aid a technician in the removal of spyware?
ASR
Safe Mode
Restore Point
Recovery Console
Which of the following interfaces does a sound card use?
PCI
SATA
SCSI
AGP
Which of the following versions of Windows Vista includes the Windows Media Center? (Select TWO)
Vista Home Basic
Vista Enterprise
Vista Business
Vista Ultimate
Vista Home Premium
Which of the following would BEST provide cooling to a hard drive?
Heatsink
CPU fan
Case fan
Thermal compound
Which of the following utilities will a technician use to find out system information, drivers, running print jobs, and Internet setting all from one location?
MSINFO32
REGEDIT
Device Manager
MSCONFIG
Which of the following connectors would be used in POTS?
RG-58
RJ-45
BNC
RJ-11
Which of the following storage types has no movable parts?
DVD-RW
Flash
Tape
IDE hard drive
Which of the following is the FIRST step in the troubleshooting theory?
Establish a plan of action to resolve the problem and implement the solution.
Establish a theory of probable cause.
Identify the problem.
Verify full system functionality and if applicable implement preventative measures.
A user reports that print jobs sent to a local printer are printing out as blank pieces of paper. Which of the following steps should the technician perform FIRST on the printer to determine the cause?
Stop and restart the print spooler
Reload the printer drivers
Print an internal test page
Replace the printer cable
Which of the following is placed FIRST on top of the processor to aid in the cooling process?
Fan
Mounting bracket
Thermal compound
Heatsink
A user states that they are trying to project their laptop to a screen for a presentation. They have plugged the projector cable into their laptop, and turned the projector on, but no signal is found. Which of the following should the technician perform FIRST?
Ensure the projector is receiving power
Verify the laptop is not running on battery
Toggle the function key for displays
Replace the projector cable with another
Which of the following adapter types uses a 7-pin cable to transmit video signals?
RGB
DVI
HDMI
S-Video
Which of the following should be used to restore a Windows 7 System Image to a new replacement hard drive?
PC Diagnostics Partition
Windows Safe Mode
Windows Emergency Repair Disk
Windows 7 Installation DVD
Which of the following are impact printers? (Select TWO)
Line printer
Dot matrix printer
Thermal transfer printer
Inkjet printer
Xerographic printer
Which of the following devices is considered a solid state storage device?
Flash drive
Tape drive
Blu-Ray
CD-RW
Which of the following is the MAIN purpose of the Recovery Console in Windows XP?
Allow the restoration of a previously made image of a desktop through the command prompt
Provide a way to recover corrupted print jobs through the command prompt.
Delete a virus that has infected the hard drive through the command prompt.
Provide a way to access the hard drive in an emergency through the command prompt.
Which of the following wireless types has the potential to provide the GREATEST bandwidth?
802.11a
802.11b
802.11g
802.11n
Which of the following is the MAXIMUM number of devices connected per IEEE1394 controller?
4
63
64
127
Which of the following is used to process BitLocker full drive encryption?
Multi-Core Processor
SATA
BIOS Password
TPM
Which of the following type of malware tries to strong arm customers into purchasing unwanted, fake security software in order to solve non-existent problems on their machines?
Phishing Emails
Grayware
Ransomware
Spyware
Which of the following would use a POTS line for receiving Internet packets?
DSL
Cable
Cellular
Fiber
Which of the following utilities can an administrator use to manage hardware, software, and network components?