Q1. A technician has been given a PC that is not powering up. After brief troubleshooting, the technician comes to the conclusion the power supply needs to be replaced. Which of the following is the NEXT step in the process of performing the repair?
A. The technician should replace the power supply
B. The technician should review disposal regulations
C. The technician should check the environment
D. The technician should remove jewelry
Answer: D
Q2. CORRECT TEXT
A Windows 7 machine appears to have a failure. Every time it is rebooted, the message "BOOTMGR is missing" appears. You have previously inserted a Windows 7 installation DVD into the DVD-ROM. Please repair this failure without overwriting the customers' local user profiles.
Instructions:
. Launch the simulation to repair the failure
. Type Help in command line to show list of available commands
. When you have completed the simulation, please select the done button.
Answer: Review the explanation for all details:
Q3. A technician is working on a home theater PC in a location where the electrical system may not be properly grounded. As the technician is finishing the installation, which of the following should the computer technician do before connecting a cable TV line to a TV tuner card?
A. Perform self-grounding
B. Unplug the computer power cable
C. Use an ESD strap
D. Require the electrical system be brought up to code
Answer: B
Q4. A technician is tasked with installing a legacy application on a Windows 7 computer. When the technician tries to install the legacy application, an error is received that the application cannot be installed because the OS is not supported. Which of the following should the technician do FIRST to try to get the application installed in Windows 7?
A. Install the application in safe mode
B. Install the application with compatibility mode
C. Install the latest Windows service packs and updates
D. Install Windows Security updates on the system
Answer: B
Q5. Which of the following explains why it is important to secure Personally Identifiable Information (PII)?
A. So phishing attacks are not launched against employees of the organization.
B. So sensitive information, such as corporate passwords, is not stolen.
C. So man-in-the-middle attacks are not launched against the organization.
D. So sensitive information, such as social security numbers, is not stolen.
Answer: D
Q6. Which of the following identifies traffic based upon its physical network address?
A. Phishing
B. Hashing
C. MAC filtering
D. Geotracking
Answer: C
Q7. CORRECT TEXT
A user has installed two new drives in one of the computers in the computer lab and has been unable to format Disk1 from the command prompt.
The lab requires that Disk1 be a dynamic disk configured with two partitions. The first partition must be 256,000 MB in size and mapped to drive F. The second partition must be 512,000 MB in size and mapped to drive G.
The new partitions must be formatted to ensure that users' files can be secured from other users and that the disk must be configured to account for future redundancy.
Instructions: Conduct the necessary steps within the Disk Manager to accomplish these tasks. When you have completed the simulation, please select the Done button to submit.
Answer: Review the explanation for all details:
Q8. Ann, an executive, reports that she received a call from someone asking for information about her email account. Which of the following type of potential security threats does this scenario describe?
A. Social engineering
B. Spoofing
C. Zero-day
D. Man-in-the-middle
Answer: A
Q9. A technician has been tasked with loading the operating system on every PC with a blank hard drive on a network. The technician wishes to install the operating system with minimal physical interaction with the PCs. Which of the following is the BEST way to accomplish this?
A. Clone the operating system from an image onto optical media.
B. Use the original software media to load the operation system on every PC.
C. Set up a central image that the PCs can load from a PXE boot.
D. Create an image and copy it from a USB drive using an unattended answer file.
Answer: C
Q10. A technician has just fixed a user’s PC and successfully removed a virus and malware from the machine. Which of the following is the LAST thing the technician should do?
A. Educate the user regarding Internet browsing best practices
B. Update the anti-malware software on the user’s PC
C. Schedule scans and run updates
D. Enable system restore and create restore point
Answer: A