Name:     ID: 
 
Email: 

PC Repair Quiz 3

Multiple Response
Identify one or more choices that best complete the statement or answer the question.
 

 1. 

A Windows computer is shared between several users, each with his own local user account. Each user has his own dedicated, uniquely configured VM stored in a public folder on the computer.
 
Which of the following steps should be taken to secure the VMs so no user can copy or delete another user’s VM files? (Select TWO.)
 a.
Apply encryption to the VM files.
 d.
Install anti-malware software on the host OS.
 b.
Connect each VM to a separate, dedicated virtual NIC.
 e.
Secure the VM files with permissions.
 c.
Configure BIOS/UEFI passwords on the host computer.
 f.
Install anti-malware software on each VM OS.
 

 2. 

The accounting department moved its network-attached printer from one side of the office to a more centralized location, making the printer much more accessible to all accounting users. Since the move, the users have not been able to print to the printer. The printer powers on and shows it is ready to accept print jobs. The printer configuration page shows the following output.
mr002-1.jpg
 You disconnect the patch cable from the keystone jack at the new location and move the printer and cable to reconnect it at the original location. The printer begins printing the jobs that failed to print earlier.
 
Which of the following are the most likely reasons for the printer failing to print at the new location? (Select TWO.)
 a.
The cable run connecting the new keystone jack to the patch panel is bad.
 d.
The DHCP server is down or has a problem with the DHCP service.
 b.
The printer needs to have static IP configuration parameters assigned.
 e.
The patch panel connector for the new location’s cable run is not connected to a switch.
 c.
The printer does not have a valid default gateway assigned.
 f.
The printer’s integrated network interface controller is faulty.
 

 3. 

Molly, a technician, has been tasked with researching an emulator for the software developers to test cross-platform applications on various PCs and a variety of mobile devices.
 
Which of the following will be a required step in selecting an emulator? (Select TWO.)
 a.
Verify the emulator supports a virtual processor.
 d.
Verify the system requirements of the hypervisor.
 b.
Verify the hypervisor software supports the emulator needed for testing.
 e.
Verify the emulator supports NAT and bridged network connections.
 c.
Verify the emulator supports virtual RAM.
 

 4. 

Which of the following are secure protocols, ports, services, or applications? (Select TWO.)
 a.
SMTP
 d.
SLP
 b.
Ports 161/162
 e.
Port 443
 c.
SSH
 

 5. 

What methods are used to assign TCP/IP parameters to network hosts? (Select TWO.)
 a.
Dynamic
 d.
DNS
 b.
Default gateway
 e.
Subnet mask
 c.
Static
 

 6. 

A mobile device user is having problems keeping malware off his device. The user is continuously removing offending apps and regularly running a check for OS updates. After a short period of relief, the malware continues to be a problem.
 
Which of the following are the best actions for the user to take? (Select TWO.)
 a.
Perform a factory reset.
 d.
Remove unused apps.
 b.
Jailbreak or root the device.
 e.
Install an anti-malware app.
 c.
Disable full device encryption.
 

 7. 

Frank is traveling for work and has discovered that he forgot an important file. The good news is the file is in cloud storage. Unfortunately, Frank’s laptop cannot connect to the airport’s Wi-Fi.
 
How can Frank download this important file? (Select all that apply.)
 a.
Use airplane mode
 c.
Use a VPN to connect to cloud storage
 b.
Tether his Laptop to his smartphone
 d.
Create a hotspot
 

 8. 

Which of the following technologies provides a method for personalizing network-connected laptop and desktop computers with only the apps each individual user needs without complicated customization? (Select TWO.)
 a.
Metered service
 d.
Measured Service
 b.
Off-site email applications
 e.
Cloud-based applications
 c.
Application virtualization
 

 9. 

A technician is working at a client’s office after hours and needs two cables to finish the work but does not have immediate access to prebuilt cables. One cable needed is for a dial-up connection from the dial-up modem to the existing analog POTS jack on the wall. The other cable is for an Ethernet connection from the computer to the existing keystone jack on the wall. The technician has the necessary wire and connectors to make the cables.
 
Which of the following tools will the technician use to make the cables and then verify that they both work properly? (Select THREE.)
 a.
Loopback Plug
 d.
Crimper
 b.
Punchdown tool
 e.
Cable tester
 c.
Toner probe
 f.
Cable stripper
 

 10. 

The administrative assistant of the company’s CEO is asking about a printer for her use only. It seems the shared department printer is overused, making the assistant wait to print the CEO’s last minute documents.
 
Which of the following technologies will best meet the administrative assistant’s request? (Select TWO.)
 a.
Network printer
 d.
Wireless infrastructure
 b.
Local printer
 e.
Cloud printing
 c.
Remote printing
 f.
Bluetooth printer
 

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 11. 

John just bought a used iPad from a friend who had lost the charging cable. John notices that the cable is like the charging cable for his Android smartphone, though it is not quite the same.
 
What type of cable will John need to purchase to replace the iPad’s charger cable?
a.
Mini HDMI
c.
USB C
b.
Lightning
d.
Micro USB
 

 12. 

A smartphone user entered an incorrect passcode on his phone several times in a row, which locked the device.
 
Which of the following steps should the user take first?
a.
Disable full device encryption.
c.
Wait a few minutes for the phone to automatically unlock.
b.
Turn off multifactor authentication.
d.
Perform a reset on the device.
 

 13. 

Mark has been asked to set up several smartphones to connect to his company’s email server. The company wants Mark to set them up so they can be synchronized between multiple email clients on multiple devices.
 
What protocol should Mark use to set up the company smartphones?
a.
Bluetooth
c.
VPN
b.
POP3
d.
IMAP
 

 14. 

Your mobile device appears to be contacting a remote server to upload your personal data.
 
Which of the following should be performed first to protect your personal data?
a.
Switch to airplane mode.
c.
Install anti-malware software.
b.
Perform a factory reset.
d.
Verify you are on the correct Wi-Fi network.
 

 15. 

A technician is troubleshooting a printer connected to a computer via USB. The printer will print using the controls at the printer but fails to print from the computer.
 
Which of the following steps should be taken next?
a.
Make sure printing paper is installed.
c.
Verify the USB cable is attached.
b.
Verify the printer is powered on.
d.
Check for low memory errors on the printer.
 

 16. 

Which of the following could be a major concern for implementing cloud computing for business-critical services?
a.
An intermittent or unavailable Internet connection.
c.
Being charged for computing services that go unused.
b.
A cloud provider’s inability to scale up or down.
d.
Incompatible software, hardware, or operating systems.
 

 17. 

Which of the following printer issues is most likely resolved by performing a calibrate function on a laser or inkjet printer?
a.
Misaligned colors on printed page.
c.
Multiple sheets pulled from the paper tray at one time.
b.
Voids in one or more colors on a printed page.
d.
Misfeeds (no paper being pulled from the paper tray)
 

 18. 

A mobile device you are troubleshooting is experiencing a sharp decrease in performance after an hour of operation. The user powers the device off each evening, and when it is powered on, performance returns to normal. After an hour of operation, performance degrades.
 
Which of the following is the best action to take to resolve this issue?
a.
Close or disable all unused running apps.
c.
Adjust the brightness control.
b.
Update the mobile device firmware.
d.
Reset the device to factory defaults.
 

 19. 

A server provides the necessary IP configuration to your network host so the host can communicate on the network. If this service malfunctions, your device will not be able to utilize the network.
 
What server provides this service?
a.
Syslog server
c.
DNS server
b.
Proxy server
d.
DHCP server
 

 20. 

A user is unable to install virtualization software on a Windows 8.1 computer. The user verified the host has sufficient RAM, plenty of available free disk space, and a multicore processor.
 
Which of the following is the most likely cause for this behavior?
a.
The user does not have a valid product license key.
c.
The motherboard does not support hardware-assisted virtualization.
b.
The system is incompatible with Type 1 hypervisors.
d.
Windows 8.1 does not support Type 2 hypervisors.
 

 21. 

You are troubleshooting a Windows workstation that is having problems communicating with the host at IP address 1.2.3.4.
 
What utility will you use at the command line to determine where the communication is stopping?
a.
ipconfig /all
c.
tracert 1.2.3.4
b.
netstat
d.
ping 1.2.3.4
 

 22. 

A mobile device user has tried to install a new app numerous times without success. She has closed all unused apps, disabled live wallpapers, and restarted the device in an attempt to get the app to install.
 
Which of the following steps should the user take next?
a.
Check for sufficient available storage space.
c.
Back up all user data and perform a factory reset.
b.
Disable full device encryption.
d.
Generate a new public key.
 

 23. 

Angela recently purchased a new Android smartphone. While purchasing the phone, Angela was told that she would need to set up a new email account for the phone.
 
Which commercial email provider should Angela use for her new Android phone?
a.
Microsoft Exchange Online
c.
Gmail
b.
Yahoo! Mail
d.
iCloud
 

 24. 

Which of the following indicates the most concise abbreviation of the IPv6 address FEFE:0000:0000:0000:0002:0000:0000:0001?
a.
FEFE:0:0:0:2:0:0:1
c.
FEFE::2:0:0:1
b.
FEFE::0002:0000:0000:0001
d.
FEFE::2::1
 

 25. 

Which of the following aspects of cloud computing allows a service provider to limit a customer’s use of a particular resource based on a service agreement between the provider and the customer?
a.
On-demand
c.
Metered service
b.
Rapid elasticity
d.
Measured service
 

 26. 

Your company received a call from a historical society inquiring about the possibility of networking a two-century-old building with no existing network. In 1924, someone added electrical outlets to the building, but the layout and design of the building prohibits adding any additional copper or fiber cable. You completed a wireless site survey and concluded that wireless networking is out of the question and will not properly function due to environmental interference.
 
Which of the following could be used to network this building?
a.
EoP
c.
WAP
b.
PoE
d.
NIC
 

 27. 

You are troubleshooting a mobile device that will not pair with a Bluetooth headset. The device was functioning properly with the headset until a recent corporate-wide OS update. No other mobile devices in the organization are exhibiting this issue with Bluetooth headsets.
 
Which of the following is the first step you will take to resolve this issue?
a.
Reset the network settings in the mobile device Settings app.
c.
Forget all Wi-Fi networks on the mobile device
b.
Replace the Bluetooth headset with a new pair.
d.
Update the radio firmware in the mobile device.
 

 28. 

A small bank with several regional branches is searching for a solution to consolidate its business services into a single site with centralized management. The service should provide secure resources for use by the bank, and these resources must be isolated from any other organization using the same service provider.
 
Which of the following will best meet the needs of the bank?
a.
Community cloud
c.
Public cloud
b.
Hybrid cloud
d.
Private cloud
 

 29. 

Which of the following creates an environment that behaves in a hardware-like manner to run software meant for other hardware?
a.
Virtualization
c.
Emulator
b.
Virtual desktop
d.
Zero client
 

 30. 

Which of the following is best practice to minimize the chance of infecting your mobile device with malware?
a.
Install apps only from trusted sources.
c.
Perform regular backups.
b.
Keep the device fully charged.
d.
Install apps only from untrusted sources.
 



 
         Start Over