Q1. An end user receives an unsolicited and unencrypted email containing a co-workers birth date and social security number. The end user should immediately contact the IT department and report a violation of which of the following policies?
A. DRM
B. EULA
C. IRP
D. PII
Answer: D
Q2. A critical server was replaced by the IT staff the previous night. The following morning, some users are reporting that they are unable to browse to the Internet upon booting their workstations. Users who did not shut down their workstations the previous day are able to connect to the Internet. A technician looks at the following report from a workstation with no Internet connectivity:
IP Address: 192.168.1.101
Netmask: 255.255.255.0
DHCP Server:192.168.1.1
DNS Server:192.168.1.2
Default Gateway:192.168.1.1
Given the above report, which of the following is the cause of why some workstations are unable to browse the Internet?
A. The workstation has an APIPA address.
B. The DHCP server is unavailable.
C. The default gateway router is misconfigured.
D. The DHCP server is misconfigured.
Answer: D
Q3. After accidentally removing a hard drive from a server with three drives in a RAID 5 configuration, a technician notices the server locks up and shuts down. Which of the following can the technician do to quickly fix the problem?
A. Replace the RAID controller and boot.
B. Reinsert the drive and boot.
C. Plug the drive back in, the system will resume automatically.
D. Remove all drives and rebuild the array.
Answer: B
Q4. Joe, a technician, would like to map a network drive when he starts up his computer in the morning. Which of the following commands would he use to accomplish this task?
A. NSLOOKUP
B. NETSTAT
C. NBTSTAT
D. NET
Answer: D
Q5. A user reports paper jams at the location of the paper trays. Which of the following components would need to be replaced to resolve this issue?
A. Fuser
B. Duplexer
C. Pickup roller
D. Imaging drum
Answer: C
Q6. A technician suspects that a computer issue is caused by a failed NIC. Following the troubleshooting theory, which of the following is the NEXT step the technician should take?
A. Identify the problem
B. Document findings, actions and outcome
C. Verify full system functionality
D. Establish a theory of probable cause
E. Test the theory to determine cause
Answer: E
Q7. A technician is fixing a very slow computer. Antivirus and Malware programs have been run, and some detections have been removed. After running Disk Cleanup, the system still seems to be slow, especially with multiple programs running. Which of the following should the technician do NEXT?
A. Run CHKDSK
B. Manually erase all cookies
C. Go back to the latest restore point
D. Run defrag
Answer: D
Q8. How would a technician install Windows OS on a MAC OS computer without using third-party software?
A. Terminal
B. Boot Disk
C. Disk Utility
D. Boot Camp
Answer: D
Q9. A technician needs to quickly destroy data on several hard drives that are no longer wanted. Which of the following methods is MOST effective?
A. Physical destruction
B. Quick format
C. Low level format
D. Overwrite
Answer: A
Q10. A computer was recently infected by malware after a flash drive was plugged in. The user, Ann, indicates she never opened any files or folders from the flash drive. A technician needs to prevent this from occurring in the future. Which of the following would accomplish this?
A. BitLocker To Go
B. Set strong passwords
C. Disable usermin
D. Disable AutoRun
Answer: D