Name:     ID: 
 
Email: 

PC Repair Quiz 3

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 1. 

Which of the following indicates the most concise abbreviation of the IPv6 address FEFE:0000:0000:0000:0002:0000:0000:0001?
a.
FEFE::2::1
c.
FEFE::2:0:0:1
b.
FEFE::0002:0000:0000:0001
d.
FEFE:0:0:0:2:0:0:1
 

 2. 

Your mobile device appears to be contacting a remote server to upload your personal data.
 
Which of the following should be performed first to protect your personal data?
a.
Install anti-malware software.
c.
Verify you are on the correct Wi-Fi network.
b.
Switch to airplane mode.
d.
Perform a factory reset.
 

 3. 

A smartphone user entered an incorrect passcode on his phone several times in a row, which locked the device.
 
Which of the following steps should the user take first?
a.
Turn off multifactor authentication.
c.
Disable full device encryption.
b.
Perform a reset on the device.
d.
Wait a few minutes for the phone to automatically unlock.
 

 4. 

Which of the following is best practice to minimize the chance of infecting your mobile device with malware?
a.
Install apps only from untrusted sources.
c.
Keep the device fully charged.
b.
Install apps only from trusted sources.
d.
Perform regular backups.
 

 5. 

A mobile device you are troubleshooting is experiencing a sharp decrease in performance after an hour of operation. The user powers the device off each evening, and when it is powered on, performance returns to normal. After an hour of operation, performance degrades.
 
Which of the following is the best action to take to resolve this issue?
a.
Reset the device to factory defaults.
c.
Close or disable all unused running apps.
b.
Update the mobile device firmware.
d.
Adjust the brightness control.
 

 6. 

A mobile device user has tried to install a new app numerous times without success. She has closed all unused apps, disabled live wallpapers, and restarted the device in an attempt to get the app to install.
 
Which of the following steps should the user take next?
a.
Back up all user data and perform a factory reset.
c.
Disable full device encryption.
b.
Check for sufficient available storage space.
d.
Generate a new public key.
 

 7. 

John just bought a used iPad from a friend who had lost the charging cable. John notices that the cable is like the charging cable for his Android smartphone, though it is not quite the same.
 
What type of cable will John need to purchase to replace the iPad’s charger cable?
a.
Micro USB
c.
USB C
b.
Lightning
d.
Mini HDMI
 

 8. 

Mark has been asked to set up several smartphones to connect to his company’s email server. The company wants Mark to set them up so they can be synchronized between multiple email clients on multiple devices.
 
What protocol should Mark use to set up the company smartphones?
a.
POP3
c.
VPN
b.
IMAP
d.
Bluetooth
 

 9. 

Angela recently purchased a new Android smartphone. While purchasing the phone, Angela was told that she would need to set up a new email account for the phone.
 
Which commercial email provider should Angela use for her new Android phone?
a.
Gmail
c.
Microsoft Exchange Online
b.
Yahoo! Mail
d.
iCloud
 

 10. 

You are troubleshooting a Windows workstation that is having problems communicating with the host at IP address 1.2.3.4.
 
What utility will you use at the command line to determine where the communication is stopping?
a.
ipconfig /all
c.
tracert 1.2.3.4
b.
ping 1.2.3.4
d.
netstat
 

 11. 

You are troubleshooting a mobile device that will not pair with a Bluetooth headset. The device was functioning properly with the headset until a recent corporate-wide OS update. No other mobile devices in the organization are exhibiting this issue with Bluetooth headsets.
 
Which of the following is the first step you will take to resolve this issue?
a.
Reset the network settings in the mobile device Settings app.
c.
Update the radio firmware in the mobile device.
b.
Replace the Bluetooth headset with a new pair.
d.
Forget all Wi-Fi networks on the mobile device
 

 12. 

Which of the following aspects of cloud computing allows a service provider to limit a customer’s use of a particular resource based on a service agreement between the provider and the customer?
a.
Rapid elasticity
c.
Metered service
b.
On-demand
d.
Measured service
 

 13. 

A technician is troubleshooting a printer connected to a computer via USB. The printer will print using the controls at the printer but fails to print from the computer.
 
Which of the following steps should be taken next?
a.
Check for low memory errors on the printer.
c.
Verify the printer is powered on.
b.
Make sure printing paper is installed.
d.
Verify the USB cable is attached.
 

 14. 

Which of the following printer issues is most likely resolved by performing a calibrate function on a laser or inkjet printer?
a.
Misaligned colors on printed page.
c.
Misfeeds (no paper being pulled from the paper tray)
b.
Voids in one or more colors on a printed page.
d.
Multiple sheets pulled from the paper tray at one time.
 

 15. 

Which of the following could be a major concern for implementing cloud computing for business-critical services?
a.
Incompatible software, hardware, or operating systems.
c.
A cloud provider’s inability to scale up or down.
b.
Being charged for computing services that go unused.
d.
An intermittent or unavailable Internet connection.
 

 16. 

A server provides the necessary IP configuration to your network host so the host can communicate on the network. If this service malfunctions, your device will not be able to utilize the network.
 
What server provides this service?
a.
DHCP server
c.
Proxy server
b.
DNS server
d.
Syslog server
 

 17. 

Your company received a call from a historical society inquiring about the possibility of networking a two-century-old building with no existing network. In 1924, someone added electrical outlets to the building, but the layout and design of the building prohibits adding any additional copper or fiber cable. You completed a wireless site survey and concluded that wireless networking is out of the question and will not properly function due to environmental interference.
 
Which of the following could be used to network this building?
a.
PoE
c.
WAP
b.
EoP
d.
NIC
 

 18. 

A user is unable to install virtualization software on a Windows 8.1 computer. The user verified the host has sufficient RAM, plenty of available free disk space, and a multicore processor.
 
Which of the following is the most likely cause for this behavior?
a.
Windows 8.1 does not support Type 2 hypervisors.
c.
The user does not have a valid product license key.
b.
The motherboard does not support hardware-assisted virtualization.
d.
The system is incompatible with Type 1 hypervisors.
 

 19. 

Which of the following creates an environment that behaves in a hardware-like manner to run software meant for other hardware?
a.
Virtualization
c.
Virtual desktop
b.
Emulator
d.
Zero client
 

 20. 

A small bank with several regional branches is searching for a solution to consolidate its business services into a single site with centralized management. The service should provide secure resources for use by the bank, and these resources must be isolated from any other organization using the same service provider.
 
Which of the following will best meet the needs of the bank?
a.
Hybrid cloud
c.
Community cloud
b.
Private cloud
d.
Public cloud
 

Multiple Response
Identify one or more choices that best complete the statement or answer the question.
 

 21. 

Frank is traveling for work and has discovered that he forgot an important file. The good news is the file is in cloud storage. Unfortunately, Frank’s laptop cannot connect to the airport’s Wi-Fi.
 
How can Frank download this important file? (Select all that apply.)
 a.
Create a hotspot
 c.
Tether his Laptop to his smartphone
 b.
Use airplane mode
 d.
Use a VPN to connect to cloud storage
 

 22. 

A mobile device user is having problems keeping malware off his device. The user is continuously removing offending apps and regularly running a check for OS updates. After a short period of relief, the malware continues to be a problem.
 
Which of the following are the best actions for the user to take? (Select TWO.)
 a.
Perform a factory reset.
 d.
Remove unused apps.
 b.
Disable full device encryption.
 e.
Jailbreak or root the device.
 c.
Install an anti-malware app.
 

 23. 

A technician is working at a client’s office after hours and needs two cables to finish the work but does not have immediate access to prebuilt cables. One cable needed is for a dial-up connection from the dial-up modem to the existing analog POTS jack on the wall. The other cable is for an Ethernet connection from the computer to the existing keystone jack on the wall. The technician has the necessary wire and connectors to make the cables.
 
Which of the following tools will the technician use to make the cables and then verify that they both work properly? (Select THREE.)
 a.
Crimper
 d.
Cable stripper
 b.
Toner probe
 e.
Punchdown tool
 c.
Cable tester
 f.
Loopback Plug
 

 24. 

Which of the following technologies provides a method for personalizing network-connected laptop and desktop computers with only the apps each individual user needs without complicated customization? (Select TWO.)
 a.
Application virtualization
 d.
Cloud-based applications
 b.
Metered service
 e.
Measured Service
 c.
Off-site email applications
 

 25. 

A Windows computer is shared between several users, each with his own local user account. Each user has his own dedicated, uniquely configured VM stored in a public folder on the computer.
 
Which of the following steps should be taken to secure the VMs so no user can copy or delete another user’s VM files? (Select TWO.)
 a.
Install anti-malware software on each VM OS.
 d.
Connect each VM to a separate, dedicated virtual NIC.
 b.
Secure the VM files with permissions.
 e.
Install anti-malware software on the host OS.
 c.
Configure BIOS/UEFI passwords on the host computer.
 f.
Apply encryption to the VM files.
 

 26. 

The accounting department moved its network-attached printer from one side of the office to a more centralized location, making the printer much more accessible to all accounting users. Since the move, the users have not been able to print to the printer. The printer powers on and shows it is ready to accept print jobs. The printer configuration page shows the following output.
mr026-1.jpg
 You disconnect the patch cable from the keystone jack at the new location and move the printer and cable to reconnect it at the original location. The printer begins printing the jobs that failed to print earlier.
 
Which of the following are the most likely reasons for the printer failing to print at the new location? (Select TWO.)
 a.
The DHCP server is down or has a problem with the DHCP service.
 d.
The printer does not have a valid default gateway assigned.
 b.
The cable run connecting the new keystone jack to the patch panel is bad.
 e.
The patch panel connector for the new location’s cable run is not connected to a switch.
 c.
The printer needs to have static IP configuration parameters assigned.
 f.
The printer’s integrated network interface controller is faulty.
 

 27. 

Molly, a technician, has been tasked with researching an emulator for the software developers to test cross-platform applications on various PCs and a variety of mobile devices.
 
Which of the following will be a required step in selecting an emulator? (Select TWO.)
 a.
Verify the emulator supports a virtual processor.
 d.
Verify the system requirements of the hypervisor.
 b.
Verify the emulator supports virtual RAM.
 e.
Verify the emulator supports NAT and bridged network connections.
 c.
Verify the hypervisor software supports the emulator needed for testing.
 

 28. 

What methods are used to assign TCP/IP parameters to network hosts? (Select TWO.)
 a.
DNS
 d.
Default gateway
 b.
Dynamic
 e.
Subnet mask
 c.
Static
 

 29. 

The administrative assistant of the company’s CEO is asking about a printer for her use only. It seems the shared department printer is overused, making the assistant wait to print the CEO’s last minute documents.
 
Which of the following technologies will best meet the administrative assistant’s request? (Select TWO.)
 a.
Cloud printing
 d.
Wireless infrastructure
 b.
Remote printing
 e.
Network printer
 c.
Bluetooth printer
 f.
Local printer
 

 30. 

Which of the following are secure protocols, ports, services, or applications? (Select TWO.)
 a.
SLP
 d.
SSH
 b.
Port 443
 e.
Ports 161/162
 c.
SMTP
 



 
         Start Over