Vous êtes sur la page 1sur 36

Computer Systems Support - Final Exam 2018

ID Questions Question Image

1 A user has detected that one of the virtual machines in a


computer is infected with a virus. Which statement about C
the situation is likely to be true?________________
A. The host operating system is not necessarily infected
with a virus.

B. The host machine operating system has a bug.

C. All of the virtual machines running on the host are


infected with a virus.

D. The host machine antivirus program requires an


update.
The host machine antivirus program requires an
update.

2 Which fire protection system would be best for a university


computer/electronics lab?________________ C
A. an overhead sprinkler system

B. an electronic ion spreader

C. a nonwater based fire extinguisher

D. fire suppressing hazmat blankets and supressors

3 Why should a technician avoid opening the casing of a


power supply?
B
________________

A. Power supplies must always be replaced, not


repaired.

B. Hazardous levels of electricity may be present inside


the power supply.*
C. Power supplies are very fragile, expensive, and easy
to damage.

D. Only the power supply manufacturer can open the


casing of a power supply.

4 What is the first step a technician should take when


preparing to work on the inside of a B
computer?________________
A. Remove the power supply.

B. Disconnect the computer from power.

C. Disconnect the computer from the network.

D. Remove external devices such as a mouse.

5 What tool can be used to find and attempt to fix file


structural errors on a hard disk in Windows ________________ D
A. Format

B. Sfc

C. Rd

D. Chkdsk

6 A customer asks for a solution to a printer problem that is


beyond the knowledge level of the technician. What should C
the technician do?________________
A. Try to fix the problem anyway.

B. Tell the customer to call the printer manufacturer to


fix the problem.
C. Gather as much information as possible and escalate
the problem

D. Ask the customer to call again when another


technician can provide a solution to the problem.

7 Which statement that is related to running 64-bit software is


correct?
D
________________

A. 64-bit software requires a 64-bit processor but can


run on a 32-bit operating system.

B. 64-bit software requires a 64-bit processor and a 64-


bit operating system.

C. 64-bit software can run on a 32-bit processor but


requires a 64-bit operating system.

D. 64-bit software can run on a 32-bit processor using a


32-bit operating system but the software
performance will be slower.

8 Which statement is correct about installing a 32-bit


operating system on a x64 architecture?________________ B
A. The OS will always make use of all the RAM available.

B. The OS will run correctly.

C. The OS can address more than 128 GB of memory.

D. This combination will provide better security.

9 What action should a technician take before upgrading


computers from Windows 7 to Windows 10?________________ B
A. Run Vista Upgrade Analyzer.

B. Run Windows 7 Upgrade Advisor.


C. Uninstall all programs.

D. Upgrade the video card.

10 What is a possible situation when it might be necessary to


boot Windows 7 from a USB device, a CD, or a C
DVD?________________
A. to disable background services

B. to delete registry keys

C. to partition the hard drive

D. to repair the system

11 What type of partition has the ability to create volumes


spanning across more than one disk?________________ C
A. primary

B. active

C. dynamic

D. extended

12 What type of file system allows the use of files larger than 5
GB and is mostly used on internal hard drives?
C
________________

A. FAT32

B. FAT64

C. NTFS

D. exFAT
13 Which user account should be used only to perform system
management and not as the account for regular C
use?________________
A. guest

B. standard user

C. administrator

D. power user

14 Which type of user account is created automatically during a


Windows 8.1 installation?________________ D
A. administrator

B. guest

C. remote desktop

D. standard user

15 A technician is attempting to repair a Windows 7 laptop that


has a missing or corrupt OS file that prevents Windows 7 B
from starting up. The technician reboots the laptop and
accesses the WinRE via the F8 key. Which option must the
technician choose in the System Recovery menu to locate
and fix the missing or corrupt system files?________________
A. Startup Repair

B. System Restore

C. System Image Recovery

D. Windows Memory Diagnostic

16 A user is viewing the Windows Disk Management utility and


notices that one of the disks is marked as Foreign. What D
does this mean?________________
A. This is a basic disk that has just been converted to a
dynamic disk.

B. This is a dynamic disk whose partition has been


deleted.

C. This is a dynamic disk from another PC running


Windows.

D. This is a disk that does not contain a valid signature.

17 What are two file attributes in the Windows environment?


(Choose two.)
B AND C
________________

A. details

B. archive

C. read-only

D. security

E. general

18 What are two functions of hypervisors? (Choose two.)


________________ B AND D

A. to partition the hard drive to run virtual machines

B. to protect the host from malware infection from the


virtual machines

C. to manage virtual machines

D. to allocate physical system resources to virtual


machines
19 Which Windows utility can be used to schedule a regular
backup for preventive maintenance?________________ A
A. Windows Task Scheduler

B. Windows Task Manager

C. Disk Cleanup

D. System Restore

20 Which statement is correct about applying firmware


updates?________________ C
A. Firmware updates are sometimes irreversible

B. It is possible to use the Roll Back feature to reverse


the change.

C. The firmware updates can be installed automatically


using the Windows Service Pack utility.

D. Firmware updates should not be included as part of


the preventive maintenance program.

21 What is true about restore points?________________


A. Once System Restore is used to restore a system, the A
change is irreversible.

B. Restore points back up personal data files.

C. Restore points recover corrupted or deleted data


files.

D. Restore points should always be created before


making changes to a system.

22 A user reports that a PC is losing files, not opening some


files, and is performing slowly. The technician suspects D
problems with the hard drive. What should be done to
protect the data that is on the PC and to determine the
source of the problem, without risking total drive
failure?________________
A. Run the format command, then replace the hard
drive.

B. Run chkdsk, then run format.

C. Back up all important files, then replace the hard


drive.

D. Back up all important files, then run chkdsk.

E. Run chkdsk, then back up all important files.

23 A wired network is undergoing several changes that could


leave it vulnerable to connection by unauthorized devices C AND E
while the work is in progress. Which temporary measure
would enable the authorized devices to continue to have
network access but prevent unauthorized devices from
connecting? (Choose two.)________________
A. Disable DNS.

B. Disable SSID broadcast.

C. Disable DHCP.

D. Subnet the network.

E. Assign static IP addresses to the authorized devices.

24 Refer to the exhibit. In what situation would a technician


use this tab?
B
________________

A. When the device will not be using the Internet.

B. When a laptop is used both at work with DHCP and at


home with a static IP address.

C. When a device is behind a firewall and software is


being used that needs access to a remote network.

D. When the computer will be using a VPN connection


and accessing the Internet while connected through
the VPN.

25 A user is reporting that a file has been shared specifically


with another user on the network, but the other user opens C
the file and is unable to save it once edited. What is the
probable cause?________________
A. The user shared the document with Read
permissions.

B. The user forgot to share the parent folder.

C. The file has the Archive attribute enabled.

D. The file has been deleted.

26 A business organization is configuring security on the mobile


devices that are used in the organization. The security policy B
states that business data on mobile devices should only ever
be accessed by employees. Which mobile device security
feature can be used to best ensure that business data is
rendered completely inaccessible if the device is lost or
stolen?________________
A. remote lock

B. remote wipe

C. passcode lock

D. sandbox

27 An administrative assistant tries to link a Bluetooth


keyboard and mouse to a computer. The keyboard does not
work, but the mouse works fine. What are two issues that D AND E
could cause this situation? (Choose two.)
________________

A. Wi-Fi is turned off.

B. The keyboard battery is dead.

C. Bluetooth is turned off.

D. The Num Lock key has been inadvertently pressed.

E. The keyboard is too far from the computer.

28 What is needed from Apple and Google in order for


individual programmers to develop apps for iOS and Android B
devices?________________
A. SLA

B. SDK

C. firmware

D. iOS or Android device

29 Which type of malware is disguised as a legitimate program?


________________ C

A. adware

B. worm

C. Trojan

D. spyware

30 After complaints from users, a technician identifies that the


college web server is running very slowly. A check of the A
server reveals that there are an unusually large number of
TCP requests coming from multiple locations on the
Internet. What is the source of the problem?________________
A. A DDoS attack is in progress.

B. The server is infected with a virus.

C. There is insufficient bandwidth to connect to the


server.

D. There is a replay attack in progress.

31 Which security threat hides the resources that it uses from


antivirus programs?
D
________________

A. worm

B. Trojan

C. rootkit

D. spyware

32 A user receives an email requesting verification of the


password that is used to access bank files. What type of C
security threat is this?________________
A. virus

B. social engineering

C. phishing

D. malware

33 A cleaner attempts to enter a computer lab but is denied


entry by the receptionist because there is no scheduled D
cleaning for that day. What type of attack was just
prevented?________________
A. Trojan

B. shoulder surfing

C. war driving

D. social engineering

E. phishing

34 Which two precautions can help prevent social engineering?


(Choose two.)
A AND E
________________

A. Always ask for the ID of unknown persons.

B. Escort all visitors

C. Keep your password securely under your keyboard.

D. Do not allow any customers into the workplace

E. Always require a user name and password to be


configured.

35 A company has replaced five desktop computers in the


accounting and finance department with new computers. A
The plan is to donate the recovered computers in a fully
functional state to a not-for-profit community organization.
How can the company ensure that sensitive financial data
cannot be accessed once the computers are
donated?________________
A. Data wipe the hard drives by using specialized
software.

B. Perform a high-level format on the hard drives.

C. Drill holes through the hard drive platters.


D. Delete all the files and directories on the hard drives.

36 A user installs a new sound card driver in a computer that


is working properly. After the installation of the drivers for
B
the new sound card, the computer fails to boot. Which
quick fix can the user implement to return to the previous
working state?________________
A. Boot to Start Windows Normally.

B. Boot to Last Known Good Configuration.

C. Boot to Emergency Recovery State.

D. Boot to Recovery Console.

37 A technician is tasked with connecting a printer directly to


the network and making it accessible to all staff in the D
general vicinity. What type of network cable is most likely
used to connect the printer?________________
A. coaxial

B. RJ-11

C. fiber-optic

D. twisted-pair

38 Which two wireless configuration features make it harder


for a hacker to see and attach to a wireless network? A AND B
(Choose two.)________________
A. enabling the proxy firewall

B. configuring MAC address filtering

C. disabling the DHCP configuration

D. disabling SSID broadcasts


E. disabling port forwarding

39 Which factor should be considered when selecting cooling


fans for a PC case?________________ A
A. the type of CPU that is installed

B. the number of installed adapter cards

C. the amount of installed RAM

D. the current BIOS version

40 What are two reasons why static IP addressing would be


configured instead of DHCP when setting up a wireless A AND B
network? (Choose two.)________________
A. The network has relatively few wireless devices.

B. DHCP limits the number of IP addresses that can be


assigned.

C. Specific security policies can be applied to static IP


addresses.

D. Static IP addresses enable large networks to be


managed easily.

E. DHCP is not reliable when used with wireless


networks.

41 Which port is used only for input?________________


A. parallel B

B. PS/2

C. network
D. DVI

E. speaker

42 What determines to which device the computer searches


first to locate boot files?________________ B
A. partition size

B. BIOS boot sequence option

C. type of partition

D. the order in which the operating system or operating


systems were installed

43 What category of technician uses remote access software to


update a computer belonging to a customer?________________ C
A. level one technicians

B. bench technicians

C. level two technicians

D. field technicians

44 A call center technician is on a call with a customer when a


colleague indicates that there is something to discuss. What D
should the technician do?________________
A. Tell the customer that the call will be put on hold for
a few minutes.

B. Signal to the colleague to wait.

C. Mute the line to the customer while discussing the


issue with the colleague.

D. Politely Interrupt the customer and ask whether the


customer would mind going on hold for a few
minutes.

45 Which two actions must be performed before installing RAM


into a laptop? (Choose two.)________________ A AND E
A. Disconnect AC power.

B. Disconnect the display from the bottom of the laptop.

C. Remove the battery.

D. Use thermal compound to attach the memory to the


motherboard.

E. Before installing the RAM, update the saved CMOS


settings to the newly configured amount of RAM.

46 A technician wishes to secure the network authentication


for all remote users. Which security technology uses radio A
communication with a computer before accepting a
username and password?________________
A. security dongles

B. smart digital cards

C. biometrics

D. key fobs

47 A business is concerned that computers are susceptible to


malware infection. Which two actions will help solve this C AND D
problem? (Choose two.)________________
A. Configure a hard drive password.

B. Configure antimalware software to run whenever the


computer is experiencing heavy usage.

C. Enable real-time virus and spyware scanning.


D. Enable automatic antivirus and antispyware software
updates.

E. Encrypt the hard drive contents.

48 Which technology allows a user to securely access a company


LAN across a public network?________________ B
A. MD5

B. VPN

C. SHA

D. TCP

49 What are three common input devices found on in


computers? (Choose three.)________________ A, B AND E
A. keyboard

B. mouse

C. printer

D. monitor

E. scanner

50 A technician is troubleshooting a network where it is


suspected that a defective node in the network path is B
causing packets to be dropped. The technician only has the IP
address of the end point device and does not have any details
of the intermediate devices. What command can the
technician use to identify the faulty node?________________
A. ipconfig /displaydns

B. tracert
C. ping

D. ipconfig /flushdns

51 What are three benefits of computer preventive


maintenance? (Choose two.)
C AND D

________________

A. reduction in the number of equipment failures

B. elimination of the need for repairs

C. improvement in data protection

D. extension of the life of components

E. improvement in RAM access time

52 Which wireless security mode supports government grade


security and offers both personal and enterprise
A
authentication? (Choose two)
________________

A. WPA2

B. WEP

C. WPA

D. LEAP

53 Which component uses the greatest amount of power on


most mobile devices?________________ D
A. Media player

B. camera
C. cpu

D. lcd screen

54 What is the purpose of RAID adapters?________________


A. to allow older PCI technology expansion slots to be C
used

B. to provide enhanced audio and graphic capabilities

C. to connect multiple storage devices for redundancy


or speed

D. to connect peripheral devices to a PC to improve


performance

55 Which type of interface should a customer choose if


connecting a single cable from a Microsoft Windows B
computer to output both audio and video to a high
definition television?________________
A. DVI

B. HDMI

C. PS/2

D. DB-15
56 What type of device provides power to a computer and
allows it to be safely shut down in the event of a power B
loss?________________
A. surge suppressor

B. uninterruptible power supply

C. standby power supply

D. power inverter

57 What is the purpose of a Safety Data Sheet?________________


A. to specify procedures for dealing with potentially A
hazardous materials

B. to specify procedures in designing and building


common computer systems

C. to specify procedures for the operation of sensitive


components and prevention of electrostatic
discharge

D. to specify procedures in the use of humidity control


and prevention of moisture damage
58 What can be tested with a digital
multimeter?________________
A. wireless signal strength and access point positioning

B. basic functionality of computer ports

copper cable location


D

C. copper cable location

D. quality of electricity in computer components

59 When should a technician avoid wearing an antistatic wrist


strap?________________ D
A. when installing RAM

B. when replacing a power supply unit

C. when installing a hard drive

D. when opening a computer case

60 Which solution should be used to clean a CPU and a heat


sink?________________ D
A. soap and water
B. rubbing alcohol

C. a diluted ammonia solution

D. isopropyl alcohol

61 Which two types of expansion slot would be used by a


wireless NIC in a computer ? ________________ A AND B
A. PCIe

B. VGA

C. AGP

D. DIMM

E. ISA

62 When a PC is being assembled, what component is


connected to the motherboard with a SATA A
cable?________________
A. the optical drive

B. the network interface card

C. the video card

D. the power supply


63 A technician notices that an application is not responding to
commands and that the computer seems to respond slowly A
when applications are opened. What is the best
administrative tool to force the release of system resources
from the unresponsive application?________________
A. Task Mangager

B. Event viewer

C. System Restore

64 . A technician has installed a new sound card in a PC but it is


not operating correctly. Where should the technician look to B
investigate driver problems?________________
A. Computer Management

B. Device Manager

C. My Computer

D. System Tools

65 A tire store needs to use carbon copy paper to print


customer invoices so that both the store and the customer D
have a copy. What is the best printer
solution?________________
A. piezoelectric printer

B. inkjet printer
C. thermal printer

D. impact printer

66 Which three components are typically found in laser printer


maintenance kits? (Choose three.)
A, B AND E
________________

A. fuser assembly

B. primary corona

C. pickup rollers

D. transfer rollers

E. secondary corona

F. paper trays

67 What characterizes a DDoS attack?________________


A. Many hosts participate in a coordinated attack A

B. Infected computers are called daemons.

C. It is easy to identify the source of the attack.

D. All hosts must be in the same geographic area.

68 What guideline should be followed when establishing a


password security policy?
D
________________

A. Passwords should contain mainly numbers for better


encryption.

B. The system administrator should assign passwords to


the users.

C. Lockout policies should be avoided in order to


increase user access.

D. An expiration period should be established so that


passwords frequently change.

E. Passwords should be physically stored in a convenient


location.

69 What is the next troubleshooting step after a theory of


probable cause has been established?________________ A
A. Test the theory to determine cause.

B. Identify the exact problem.

C. Establish a plan of action.

D. Document findings and outcomes.

70 What is a characteristic of the open source license of an


application software?
C
It requires registration instead of purchasing.
________________

A. It requires acknowledged completion of a


professional training course prior to use.

B. It does not require purchase in order to use the


software.

C. It allows users to modify and share the source code.

D. It cannot be used for campus-wide deployment.

71 Users in an office complain that the network printer is


printing vertical lines on all pages. What is a likely cause of
A
this problem?
________________

A. The printer drum is damaged.

B. The printer toner is low.

C. The printer has an incorrect IP address.

D. The printer does not have enough memory.

72 Why do laptop computers use CPU throttling


techniques?________________ C
A. to conserve the battery life by reducing the bus speed
between the CPU and RAM

B. to ensure the CPU is running at its peak speed

C. to reduce the heat that the CPU may generate

D. to enhance the performance of the CPU


73 A new technician has joined the IT team and is about to
service a heavy printer. Which two precautions should be A AND B
taken to avoid any injury when transporting the heavy
printer to the service area? (Choose two.)________________
A. Avoid lifting the equipment using the strength in your
back.

B. Lift the equipment using the strength in your legs and


knees

C. Avoid bending your knees when lifting the printer.

D. Bend your back to pick the printer up.

E. Avoid lifting the printer close to your body.

74 A customer who travels frequently wants to know which


technology is the most suitable for being connected to the
B
corporate network at all times at low cost. Which network
technology would a network administrator recommend?
________________

A. microwave

B. cellular

C. ISDN

D. satellite

75 What is the difference between cloud computing and a data


center?
C
________________

A. Data centers require cloud computing but cloud


computing does not require data centers.

B. The data center makes use of more devices to


process data.

C. Cloud computing solutions are network resources and


services provided to the clients through the use of
services from data centers.

D. A data center provides access to shared computing


resources, wheras a cloud is a private on-premise
facility that stores and processes local data.

76 A technician installed a network adapter in a computer and


wants to test network connectivity. The ping command can D
only receive a response from local workstations. What could
be causing the problem?________________
A. The NIC driver is out of date.

B. The operating system is not compatible with the


remote sites.

C. The TCP/IP protocol stack is not loaded.

D. The default gateway is not set

77 A technician needs to configure a Bluetooth headset for a


laptop user. Which step should the technician take before D
installing the headset? ________________
A. Remove the battery.

B. Disconnect AC power.

C. Ensure that the antistatic wrist strap is attached to a


nonpainted portion of the laptop.

D. Ensure that the laptop Bluetooth switch is enabled

78 What is an indication that the battery in a mobile device


could become physically hazardous and should be B
immediately replaced?________________
A. if the battery only supports the system for a reduced
period of time

B. if there are signs of swelling

C. if the screen brightness begins to dim

D. if the device feels warm to the touch

79 A technician is explaining the differences between inkjet


printers and laser printers to a customer. Which two D
comparisons should the technician make? (Choose
two.)________________
A. Inkjet printers are less expensive as an initial
purchase than laser printers.

B. A laser printer is significantly slower than an inkjet


printer.

C. Both laser and inkjet printers produce poor quality


images.

D. The laser printer output is dry after printing, but an


inkjet printer may still have wet ink on the paper
after printing.

E. Inkjet printers use plain paper to make economical


prints, but laser printers require more expensive
thermal paper.

80 Which two password control policies should an organization


implement to ensure strong passwords? (Choose B AND C
two.)________________
A. Passwords should contain only capital letters.

B. Passwords should contain letters and numbers.

C. Passwords must contain encrypted characters.

D. Passwords should contain no more than eight


characters.

E. Passwords should be set to expire every 60 days.

81 Which of the following is an advantage of twisted pair cables over fiber


optic cables (Choose 2)
________________ C AND D

A. UTP cables offer more secure communications because they are


highly resistant to tapping, radio frequency interference and
jamming

B. UTP cables can go for longer distances without need to boost


signals

C. UTP cables can easily bend around walls and ceilings

D. UTP cables are less expensive and easier to setup


E. UTP cables provide higher bandwidth

82 In this topology, the failure of a single node of the network can cause the
entire network to fail.________________
B
A. bus

B. ring

C. star

D. mesh

83 In this topology, the failure of the central hub leads to the failure of the
entire network.________________
A
A. star

B. bus

C. ring

D. mesh

84 Which of the following connectors is used to termite UTP A


cables________________

A. RJ45

B. BNC

C. RJ11

D. SC

85 Which of the following connectors is used to termite Coaxial


cables________________
D
A. BNC

B. RJ45
C. SC

D. Non of the above

86 Which of the following internet technologies is based on the existing


telephone infrastructure? Choose 3________________
B
A. isdn

B. dial up

C. powerline communication

D. vsat

E. dsl

87 Which of the following is not a broadband technology________________

A. dial up D

B. dsl

C. vsat

D. isdn

88 ___________________ is the transmission of voice traffic over IP based


networks.________________
B
A. uhf

B. voip

C. vsat

D. wimax

89 which of the following wireless technologies can be used for a


LAN?________________
B
A. bluetooth
B. wifi

C. wimax

D. infrared

90 A customer is considering a multipurpose device to create a home


network. Which three devices are usually integrated into a multipurpose
network device? (Choose three.)________________ A, B AND C

A. switch

B. router

C. wireless access point

D. web server

E. print server

F. email server

91 Which network device is shown in the figure below________________

A. router

B. switch

C. hub
B

D. repeater

E. wireless access point

92 identify the port circled in red.________________

A. wifi

B. parrallel
C

C. usb
D. hdmi

E. serial

93 What is the maximum segment length of a utp cable?________________

A. 100m C

B. 250m

C. 45m

D. 10km

94 Which type of topology is shown on the image above?________________

A. ring

B. bus

C. star C

D. mesh

95 A _____________is a communication device that is used to connect two


logically and physically different networks, two LANs, two WANs and a
LAN with WAN. ________________ D

A. wireless access point

B. hub

C. switch

D. router

96 A __________________ is a geographically-dispersed collection of


LANs.________________
A
A. wan

B. peer to peer
C. intranet

D. extranet

97 Which of the following are impact printers?________________

A. Solid ink D AND E

B. laserjet

C. inkjet

D. dotmatrix

E. Daisy wheel

98 When selecting a printer, you need to consider the following


criteria........________________
E
A. capacity

B. speed

C. color

D. quality

E. all the above

99 A technician has just finished assembling a new computer. When the


computer is powered up for the first time, the POST discovers a problem.
How does the POST indicate the error?________________ A

A. It issues a number of short beeps.

B. The LED on the front of the computer case flashes a number of


times

C. It places an error message in the BIOS.

D. It locks the keyboard.


100 Which two motherboard components connect to the
Northbridge chipset? (Choose two.)________________ A AND B
A. video card

B. RAM

C. FireWire devices

D. USB 3.0 devices

E. USB 2.0 devices

F. NIC

Vous aimerez peut-être aussi