A computer is displaying an "Operating system is not found" error whenever it is powered on. The computer is secured in a cabinet, so that only the front panel is accessible. The technician boots from a Windows installation CD and finds that there is a Windows folder on the computer. Before attempting a re- installation of the operating system, which of the following should the technician do NEXT?
A. Change the boot order in the BIOS so that hard drive is the first bootable device.
B. Start Recovery Console from the Windows installation CD and run FDISK.
C. Start Recovery Console from the Windows installation CD and run a CHKDSK /R.
D. Perform a side-by-side installation of Windows on the hard drive from the installation CD.
When transferring a virtual client from one computer to another, which of the following MUST be checked for compatibility on the host?
A. IP addressing methods
B. Hard drive connection types
C. Processors
D. Hard drive rotation speeds
A user has called in a helpdesk ticket about their monitor not powering on but their PC does. Which of the following would be the FIRST thing the technician would check?
A. Power cable
B. Power settings
C. Video cable
D. Video settings
When issuing user permissions for job functions, an administrator should assign:
A. Permissions based on employee's role.
B. Them to the Power User role on the machine.
C. Permissions based on employee's seniority.
D. Them to the Administrator role on the machine.
A computer's time settings reset every time it is unplugged. This is a symptom of a faulty:
A. Memory module.
B. Power supply.
C. Motherboard.
D. CMOS battery.
A modern gaming graphics card is showing pixilation on screen and is occasionally rebooting a PC without prior notice. Which of the following symptoms is MOST likely being experienced?
A. Old drivers
B. Card overheating
C. Improper slot installation
D. Resolution mismatch
Which of the following is the command line entry to start an archive or restore a process on a Windows XP computer?
A. RECOVER
B. REPLACE
C. NTBACKUP
D. COPY
A user gets an error message that the trust relationship to the domain has been broken. Which of the following can be done to resolve this from the client desktop?
A. Re-join the computer to the domain
B. Reboot the PC as the domain will automatically rebuild the relationship
C. Update the BIOS using the latest version
D. Run CHKDSK
A pest exterminator tries to gain access to a company's computer lab, but the receptionist does not see an extermination scheduled on the calendar and denies the exterminator access to the lab. Which of the following security threats almost occurred?
A. War driving
B. Social engineering
C. Shoulder surfing
D. Phishing
A user has a perimeter firewall and up-to-date antivirus software. The user is asking what else they can do to improve their security. Which of the following will have the MOST impact on network security? (Select TWO).
A. Install additional antivirus software
B. Disable screen savers
C. Conduct a daily security audit
D. Assign security rights based on job roles
E. Use strong passwords
A technician is installing a webcam in a nursery for a user to monitor their baby. The user wants to ensure that the webcam is not broadcasting externally. Which of the following would the technician implement on the SOHO router to prevent the broadcast?
A. Enable MAC filtering
B. Enable static IPs
C. Block the outbound port
D. Change the default SSID
Which of the following System Tools would be the BEST one to perform a regular archiving of information on a PC?
A. ROBOCOPY
B. XCOPY
C. Backup
D. System Restore
Revert to snapshot is a feature of:
A. The host OS
B. The hypervisor
C. The underlying storage
D. The guest OS
Which of the following OS features is unique to Windows 7?
A. Action Center
B. Automatic Updates
C. Add/Remove Programs
D. Tablet PC Settings
A SOHO location is being remodeled and the users are concerned about unauthorized traffic on their network during the remodel. The WLAN needs to be able to allow various types of devices to securely connect 24 hours a day while requiring the least amount of overhead to manage. Which of the following security implementations would MOST likely be implemented?
A. Setting encryption
B. Resetting all user-names and passwords
C. Assign static IP addresses
D. Enable MAC filtering