A+
A user reports that they walked away from their laptop for 30 minutes and when they came back the screen was very dim. The user tried moving the mouse and increasing the brightness setting, but neither worked. Which of the following should the technician do FIRST?A. Plug in an external monitor to test the video card.B. Run a check disk scan to verify there is no corruption.C. Check if the laptop is now on battery power.D. Have the LCD screen replaced with a known good screen.Answer: C2.Which of the following BEST describes a situation that would require STP cable?
A. Installation in an area with low EMIB. Installation in an area with high EMIC. Installation in an air handling spaceD. Installation in an area with high humidityAnswer: B3. Which of the following will allow the use of BitLocker if the computer does not have a TPM chip?
A. External hard driveB. SCSI hard driveC. USB keyD. CD-ROM driveAnswer: C4. A customer reports that their computer is displaying ‘operating system not found’ while booting. The technician confirms that the computer booted fine the previous day and that no devices were added. The technician also confirms that no software changes were made to the system from the previous day. Which of the following is the problem?
A. The network cable is unplugged.B. A diskette was placed in the disk drive.C. The keyboard is unplugged.D. The system has been infected with spyware.Answer: B5. A new video card requires a 600 watt power supply. The power supply should have how many pins on the main cable?
A. 12B. 20C. 24D. 26Answer: C6. Corrupt Windows XP system files are keeping a PC from booting. Which of the following is the BEST option to resolve this issue?
A. Automated System RecoveryB. Emergency Repair DiskC. Recovery ConsoleD. NT Repair DiskAnswer: C7. A technician installs a new graphics card in a computer and upon booting up nothing happens. The technician puts the old graphics card back into the computer and the computer boots up normally. Which of the following would be the BEST source of information to solve the problem? (Select TWO).A. Chat room discussion onlineB. Installation manualC. Ask another technicianD. Manufacturer's websiteE. OS forum onlineAnswer: B,D8. Which of the following identifies a wireless network's name?A. NetBIOSB. MACC. SSIDD. Node IDAnswer: C9. Which of the following attributes is set when a file is ready to be backed up?A. aB. hC. rD. sAnswer: A10. Which of the following connector types is used for a 100BaseT network?A. RJ-12B. RJ-11C. RJ-14D. RJ-45Answer: D11. A technician is in charge of migrating Windows XP users over to new Windows Vista workstations. Which of the following tools would allow the technician to accomplish this in an automated process?A. User Account Control appletB. User State Migration toolC. Windows Automated Installation kitD. Windows PowershellAnswer: B12. Which of the following utilities can an administrator use to manage hardware, software, and network components?A. Device ManagerB. MSINFO32C. MMCD. MSCONFIGAnswer: C13. Which of the following is used to process BitLocker full drive encryption?A. Multi-Core ProcessorB. SATAC. BIOS PasswordD. TPMAnswer: D14. Which of the following is the MAXIMUM number of devices connected per IEEE1394 controller?A. 4B. 63C. 64D. 128Answer: B15. Which of the following wireless types has the potential to provide the GREATEST bandwidth?
A. 802.11aB. 802.11bC. 802.11gD. 802.11nAnswer: D16. Which of the following devices is considered a solid state storage device?A. Flash driveB. Tape driveC. Blu-RayD. S-VideoAnswer: D17. Which of the following is placed FIRST on top of the processor to aid in the cooling process?
A. FanB. Mounting bracketC. Thermal compoundD. HeatsinkAnswer: C18. Which of the following is the FIRST step in the troubleshooting theory?A. Establish a plan of action to resolve the problem and implement the solution.B. Establish a theory of probable cause.C. Identify the problem.D. Verify full system functionality and if applicable implement preventative measures.Answer: C19. Which of the following storage types has no movable parts?A. DVD-RWB. FlashC. TapeD. IDE hard driveAnswer: B20. Which of the following utilities will a technician use to find out system information, drivers, running print jobs, and Internet setting all from one location?
A. MSINFO32B. REGEDITC. Device ManagerD. MSCONFIGAnswer: A21. Which of the following interfaces does a sound card use?A. PCIB. SATAC. SCSID. AGPAnswer: A22. Which of the following would MOST likely be used to aid a technician in the removal of spyware?A. ASRB. Safe ModeC. Restore PointD. Recovery ConsoleAnswer: B23. A technician is installing a new small form factor motherboard. Which of the following form factors is the technician MOST likely installing?
A. Micro ATXB. NLXC. ATXD. BTXAnswer: A24. Which of the following maintenance utilities is used to reorganize files on a hard drive?A. SCANDISKB. DEFRAGC. CHKDSKD. Disk CleanupAnswer: B25. Which of the following is the number of devices that can be daisy-chained to an IEEE 1394 port?A. 7B. 15C. 63D. 127Answer: C26. Which of the following would a technician use to install a manufacturer's image on a notebook?
(Select TWO).
A. Recovery CDB. System Restore UtilityC. Access a recent data backupD. Utilize the Recovery Agent featureE. Factory recovery partitionAnswer: A,E27. Which of the following ports is the default for HTTP?A. 21B. 25C. 80D. 10Answer: C28. Which of the following printer types usually requires special print media?
A. ThermalB. LaserC. InkjetD. ImpactAnswer: A29. A laptop with an integrated 802.11b/g card is unable to connect to any wireless networks. The laptop was previously able to connect to wireless networks. Which of the following is MOST likely
the cause of this issue?
A. The wireless card is disabled in BIOS.B. The wireless card drivers are not installed.C. The wireless hardware switch is turned off.D. The wireless card firmware requires an update.Answer: C30. A customer has asked a technician to install aversion of Windows 7 that will allow for BitLocker
functionality. Which of the following editions should the technician install?
A. Home PremiumB. EnterpriseC. ProfessionalD. StarterAnswer: B31. A 2.5 inch (6.4cm) external hard drive is MOST likely to use which of the following power supplies?
A. USBB. BTXC. FireWireD. ATXAnswer: A32. Which of the following is useful as a FIRST step when troubleshooting issues of a laptop not powering on?
A. Verify backlight functionality and pixilationB. Plug in external monitorC. Remove unneeded peripheralsD. Verity AC adapter LED'sAnswer: D33. NTFS is required to install which client OS?
A. Windows VistaB. Windows 2000C. Windows 7D. Windows XPAnswer: C34. Which of the following utilities backs up the Windows configuration once a day? A. Dr. Watson
B. System Restore
C. DirectX Diagnostic Tool
D. File Signature Verification Utility
Answer: B35. A characteristic of a laptops CPU is the ability to: A. reduce power usage to the laptops video chip set.
B. increase the life of the LCD panel.
C. throttle power usage when the laptop is using the battery.
D. increase signal coverage for WiFi applications.
Answer: C36. Which of the following interfaces allows for the fastest video transfer rate?
A. SCSI II
B. IEEE 802.11g
C. Bluetooth
D. IEEE 1394/Firewire
Answer: D37. In Windows XP, the System Restore feature is used to take a snapshot of:
A. ausers document files in case the document files need to be restored later.
B. the computers operating system in case the operating system needs to be re-installed.
C. the program files in case the program files need to be restored later.
D. a computers settings in case the settings need to be restored later.
Answer: D38. After testing the power supply on a non-functioning computer with a load, a technician determines
that the +5V rail on the power supply is outputting 2.2 Volts. The technician should:
A. replace the power supply.
B. replace the CMOS battery.
C. check the power management settings in the BIOS.
D. test the internal components of the power supply.
Answer: A39. The recommended memory requirement when installing Windows XP is:
A. 128 MB.
B. 32 MB.
C. 64 MB.
D. 256 MB.
Answer: A40. Pentium 4 based processors require which of the following types of memory module?
A. SIMM
B. SoDIMM
C. RIMM
D. DIMM
Answer: D41. A printer that is directly connected to a computer has stopped printing documents. The user
observes that there are several documents waiting to print. Which of the following services could
be stopped to clear the print queue and return the printer back to a normal status?
A. Task Manager
B. Event Viewer
C. Systray
D. Print Spooler
Answer: D42. Which of the following power modes for a laptop copies system data to the hard drive, before
completely turning off?
A. Suspend
B. Standby
C. Log off
D. Hibernate
Answer: D43. A previously functional keyboard has now stopped working. Which of the following actions should
a technician take FIRST?
A. Clean the PS/2 connector on the keyboard.
B. Replace the keyboard.
C. Clean the keyboard with compressed air.
D. Check the PS/2 connection to the motherboard.
Answer: D44. A technician is asked to upgrade a computer with a faster network card. The existing network card is built in, and a PCI slot is available for the replacement. The new network card is placed into the
PCI slot. Which of the following should be the next step for the technician to take?
A. Update the operating system with the latest patch
B. Confirm availability of new network card drivers
C. Flash the BIOS
D. Remove the built-in network card
Answer: B45. Which of the following is the way to determine pin one on a ribbon cable? A. Pin one is on the non-colored side of the ribbon cable.
B. Pin one is on the corner that is angled on the connector.
C. Pin one is labeled with the number 1, on the cable.
D. Pin one is on the colored side of the ribbon cable.
Answer: D46. Operating the CPU at a speed higher than the manufacturers rating in order to gain increased
performance is called:
A. throttling.
B. overrating.
C. overheating.
D. overclocking.
Answer: D47. A computer reports a SMART error on startup. This is MOST likely caused by a failure of the:
A. sound card.
B. hard drive.
C. network card.
D. CD-ROM drive.
Answer: B48. High-speed peripherals that are inserted and removed at any time while the machine is powered
on are called:
A. on the fly.
B. hot-swappable.
C. hot-removable.
D. hot-pluggable.
Answer: B49. A user can no longer access some files on the hard drive. Which of the following actions should be
taken to resolve this problem?
A. Format and completely reload the computer.
B. Verify file permissions on the hard drive.
C. Delete and re-create the user.
D. Reboot the computer and log back on.
Answer: B50. Which of the following cable types will allow the longest distance without using a repeater?
A. CAT6 UTP
B. UTP
C. multi mode fiber
D. single mode fiber
Answer: D51. Which of the following BEST describes Windows XP Standby mode?
A. Copies an image of whatever is in memory at the moment to a file on the disk and if the
computer loses power, data will be saved.
B. Copies an image of whatever is in memory at the moment to a file on the disk and if the
computer loses power, data will be lost.
C. Keeps the contents of memory intact by providing a tiny amount of power to the system and if
the computer loses power, data will be lost.
D. Keeps the contents of memory intact by providing a tiny amount of power to the system and if
the computer loses power, data will be saved.
Answer: C52. Once a technician installs a new hard drive in a computer, which of the following would be the next step to allow the operating system to utilize the new drive?
A. Call the computer's manufacturer.
B. Copy files to the hard drive.
C. Partition and format the hard drive.
D. Reboot the computer.
Answer: C53. Which of the following types of power supply typically comes with a pass-through power connector
intended to power a monitor?
A. Mini ATX
B. AT
C. ATX
D. Micro ATX
Answer: B54. Which of the following are required to configure a Windows PC to connect to the Internet? (Select TWO).
A. Client for Microsoft network
B. File and printer sharing
C. Appletalk Protocol
D. TCP/IP Protocol
E. NetBIOS
Answer: A,D55. The technology used to monitor hard drives for potential failure is called: A. UDMA.
B. PIO.
C. SMART.
D. ATA1.
Answer: C56. A small office/home office (SOHO) is considering upgrading to Windows XP. Which of the
following security features are included in Windows XP Professional and not included with
Windows XP Home? (Select TWO).
A. Domain account support
B. Allowing up to 5 users to access shared files
C. Windows Firewall
D. Windows Defender
E. Encrypted File System
Answer: A,E57. When installing a second hard drive for storage on the same channel, which of the following are
the proper jumper settings?
A. First hard drive Slave, Second hard drive Master
B. First hard drive Master, Second hard drive Slave
C. Second hard drive Master, First hard drive Master
D. Second hard drive Slave, First hard drive Slave
Answer: B58. What number of pins will you find on a SVGA connection? A. 25 pins
B. 9 pins
C. 20 pins
D. 15 pins
Answer: D59Which of the following is the Color-Code used for the keyboard Port on a new PC that uses a mini- DIN 6 Connector?
A. Pink
B. Blue
C. Green
D. Purple
Answer: D60A female DB-25 connector is commonly used for which of the following applications? A. A parallel cable.
B. A SCSI connector.
C. A parallel port.
D. An EGA/CGA video port.
E. A VGA/SVGA video adapter.
Answer: C61Why would you recommend wireless IEEE 802.11g and not wireless IEE 802.11b? A. Wireless IEEE 802.11b is not supported by Windows XP Service Pack 2.
B. Wireless 802.11g has less interference.
C. Wireless 802.11g moves data at a faster rate.
D. Wireless 802.11g has a greater distance range over wish it can be applied.
Answer: C62What is the maximum number of peripherals that may be connected to a system via a USB port? A. 7
B. 15
C. 127
D. 130
Answer: C63When installing a new CPU, what is applied directly to the CPU? A. Cooling liquid.
B. Thermal compound.
C. A heat sink.
D. A fan.
Answer: B64While installing an IDE device, you find that the cable to connect the IDE device is not keyed. Which of the following should you do? (Select all that apply.)
A. Locate the red stripe on the cable, and connect to the device with the red stripe lining up to pin
#1.
B. Attach cable any way that fits.
C. If there is also no red stripe, Locate the blue stripe on the cable, and connect to the device with
the blue stripe lining up to pin #1.
D. Purchase a new cable.
Answer: A,C65Which of the following is a task that you have to perform when installing SCSI devices? A. Set the jumpers for master/slave.
B. Perform a low-level format the SCSI drive
C. Assign each SCSI device a unique ID number.
D. Set the drive type in the CMOS setup.
Answer: C66Which of the following gives the proper sequence for installing master and slave IDE drives? A. Mount the drive in the carrier, connect the cable to the drive, install the drive in the computer,
and configure the drive
B. Mount the drives in the carrier, connect the 40-pin cable to the drives, set the drive at the end of
the cable to master, set the drive in the middle of the cable to slave, install the drives in the
computer, and configure the drives.
C. Mount the drive in the carrier, connect the master drive after the twist in the cable, connect the
slave drive before the twist in the cable, install the drives in the computer, and configure the
drives.
D. None of the above.
Answer: B67Why should a technician that is working with a computers hardware wear an anti-static wrist strap? A. The wrist strap will protect your hands from burn injury caused tobuilt up static electricity.
B. The wrist strap will prevent computer components from being damaged by static electricity.
C. The wrist strap will protect you from getting an electrical shock caused by static electricity.
D. The wrist strap will prevent degaussing of the hard drive.
Answer: B68On which physical part of a hard drive is the data stored? A. Platters.
B. Actuator.
C. Sector.
D. Cylinder.
Answer: A69Provide the reasons why a computer may run slowly. (Choose THREE.) A. Not enough random access memory (RAM).
B. Too many USB devices attached.
C. Spyware and viruses.
D. Excessive virtual memory.
E. Running obsolete services.
F. Improperly configured CD-ROM drive
Answer: A,C,E70Your Windows XP operating system became unstable after you installed a device driver and did not stabilize after you rebooted the computer with the Last Known Good Configuration. What is the
reason for the computer behaving in this manner?
A. The Last Known Good Configuration boot will only work for hardware changes and not software
changes that have been made.
B. The System Restore application should have been used to save the system's registry prior to
the installation of the device driver.
C. The Last Known Good Configuration was unable to find a valid Restore Point because the
System Restore was not run prior to the installation of the device driver.
D. The system's registry is overwritten after every successful login and the settings on the initial
install were thus overwritten after the first reboot and login.
Answer: D71Which of the following two questions you would ask a customer first when he reports a blank monitor? (Select TWO.)
A. Is the monitor switched on?
B. Did you check the color settings?
C. Have you checked whether the contrast or brightness is turned down?
D. What type of computer do you have?
Answer: A,C72After booting up your new computer, you observe that the USB mouse is not working. Further investigation reveals that nothing connected to the USB ports is working. Which of the following
should you try FIRST?
A. Check the computer to verify that the jumper settings for USB are correct.
B. Buy new USB wires and test USB functionality.
C. Check the BIOS to verify that USB functionality is enabled.
D. Connect the USB devices to a different computer to test the devices.
Answer: C73Which of the following components on the motherboard usually house the IDE connectors? A. PCI bus.
B. North Bridge.
C. ISA bus.
D. South Bridge.
Answer: D74What is the minimum number of hard drives required for RAID level 0? A. 1
B. 2
C. 3
D. 4
Answer: B75What is the maximum data transfer rate that USB 2.0 offers? A. 512 Mbps
B. 480 Mbps
C. 100 Mbps
D. 128 Mbps
Answer: B76The maximum number of IDE devices which can be installed in an ATX computer is ______. A. 1
B. 2
C. 3
D. 4
Answer: D77Which of the following is a passive device that protects electrical components from spikes in the power line?
A. A power conditioner.
B. A surge protector.
C. A generator.
D. An Uninterruptible Power Supply (UPS).
Answer: B78Which type of current is fed from the wall outlet to the computer when you turn a computer on? A. Neutral current
B. Direct current
C. Alternating current
D. Low voltage current
Answer: C79What is a PC Card also known as? A. A PC Bus card.
B. A smart card.
C. PCMCIA.
D. A PCI adapter.
Answer: C80A customer complains that after the memory on his laptop was upgraded from 512 MB to 1024 MB of RAM, his laptop reports that only 768 MB of RAM is installed. What is the MOST probable
cause of this?
A. The operating system does not support more than 768 MB of RAM.
B. The RAM module is not seated properly.
C. The technician installed the wrong RAM module.
D. The laptop is equipped with an onboard video adapter that uses shared video memory.
Answer: D81A Certkiller .com technician must convert a FAT32 volume to NTFS without loosing any data on the drive. Which of the following commands should the technician use?
A. CHKDSK
B. CONVERT
C. FORMAT
D. DEFRAG
Answer: B82Which of the following tools can be used to correct corrupt file problems or disk errors? A. REGEDIT
B. ATTRIB
C. SCANDISK
D. FDISK
Answer: C83A Certkiller .com user wants to stop certain applications from running automatically when his Windows XP computer a starts. Which of the following utilities can he user?
A. MSCONFIG.EXE
B. CONFIG.EXE
C. REGEDIT.EXE
D. SYSEDIT.EXE
Answer: A84You need to delete unused files on a Windows XP computer in order to free up extra hard drive space. Which utility should you use?
A. Disk Cleanup
B. DEL
C. SCANDISK
D. Disk Defragmenter
Answer: A85A Certkiller .com technician needs to configure and manage partitions on hard disk from the Recovery Console. Which of the following commands should the technician use?
A. Diskpart
B. Fixboot
C. Fixmbr
D. None of the above
Answer: A86Which type of issue does the "A device in SYSTEM.INI cannot be found" error message pertain to?
A. System files issue.
B. Configuration files issue.
C. Swap files issue.
D. All of the above.
Answer: B87If you receive the "Non-system disk or disk error" error message, what issue should you start troubleshooting for?
A. A missing operating system where the computer failed to locate a boot sector with an operating
system installed.
B. A memory size error.
C. A missing or malfunctioning keyboard.
D. None of the above
Answer: A88Which of the following types of printers use a drum? A. Ink jet printers
B. Laser printers
C. Dot Matrix printers
D. Bubble jet printers
Answer: B89A ______ cables is used to connect a printer to the parallel port of a computer. A. IEEE 1284
B. RS-232C
C. IEEE 802.11
D. IEEE 1394
Answer: A90Certkiller .com has a printer that is attached to a Windows 2000 computer. The spooler service on the computer has stopped. What command should the Certkiller .com technician issue to restart
the spooler service from the command line?
A. spooler service restart
B. net spooler restart
C. restart service
D. spooler restart
Answer: B91The prints from a Certkiller .com laser printer appear smudged image and rubs off easily. Which of the following is the MOST probable cause of this problem? What problem can be cause by the
fusing assembly?
A. The pickup assembly is worn.
B. The fusing assembly is faulty.
C. The wrong paper is being used.
D. The erasure lamp is faulty.
Answer: B92The Certkiller .com technician has replaced the toner cartridge on a laser printer that was producing faded prints. However, the print quality does not improve. What is the MOST likely the
cause of this problem?
A. The laser scanner is faulty.
B. The EP drum is not fully discharging.
C. The transfer corona is faulty.
D. The power supply is faulty.
Answer: C93Which of the following would not be an advantage of the NTFS file system over the FAT32 file system?
A. more file formats.
B. larger file sizes.
C. file encryption.
D. larger volumes.
Answer: A94Fault tolerance is provided by the following RAID disk arrays (Select TWO). A. RAID 0
B. RAID 5
C. RAID 1
D. RAID 3
E. RAID 4
Answer: B,C95You are working as a technician at Certkiller .com. You are troubleshooting a computer, that during the POST (power-on self test) makes several beeps and then stalls. Which of the following
components would most probably be the cause of the problem?
A. hard drive
B. memory
C. power supply
D. sound card
Answer: B96You are working as a technician at Certkiller .com. A user calls and asks for help with his workstation. The computer is running Windows XP Professional and seems to have become
unstable lately. Which of the following should be used to check the operating system integrity?
A. SFC /SCANNOW
B. Dr. Watson
C. SFC /SCAN
D. SFC /
Answer: A97You are working as a senior technician at Certkiller .com. You have been preparing a master computer that you will duplicate to the other computers in the economics department. Which of the
following can be used to prepare a disk image for duplication?
A. sysprep
B. xcopy
C. shadow copy
D. mmc
Answer: A98You are working as a Technician at Certkiller .com. You have just installed an additional 300GB hard drive in a computer. The system hard drive is configured with NTFS and the new data hard
drive came configured with FAT32. Which of the following statements are true? (Select TWO).
A. The cluster size is smaller and storage is more efficient on the system drive.
B. The cluster size is larger and storage is more efficient on the system drive.
C. Files on the system drive can be secured.
D. Larger logical drives can be made on the data drive.
Answer: A,C99You are working as a technician at Certkiller .com. All computers at Certkiller .com uses hard disks formatted with NTFS. You have been asked to investigate if it is possible to track and control the
amount disk space used in the computer in the research department. Which of the following tools
could you use in order to accomplish this?
A. Disk Cleanup
B. Disk Dump
C. Disk Quotas
D. Disk Defragmenter
Answer: C100You are a technician at Certkiller .com. You have been called to a user, who works from home, in order to help her with an ADSL connection. What is the FIRST thing you should do when you
arrive on-site?
A. ask the user if you can install an upgraded firmware to improve performance.
B. ask is the user has a clue about what the problem might be.
C. ask whether the user is ready to work on the problem.
D. swap the faulty ADSL modem with a known-good modem.
Answer: C101A customer requires a shock resistant mass storage device in their PC. Which of the following drives should the technician install?
A. Hard diskB. Solid stateC. FloppyD. TapeAnswer: B102After powering on a workstation, an intrusion alert is displayed indicating that the case has been opened. How would a technician reset the alert?
A. Change the setting in the registryB. Change the setting in the BIOSC. Change the setting in the DOS startup filesD. Change the setting in the Control PanelAnswer: B103A technician plugs a USB device into the computer. The system tray displays a message that reports the device is installed, but may not work properly. Which of the following is the MOST likely
cause of the message?
A. The device needs a firmware update.B. The device needs an updated driver installed.C. The plugged in device is too slow for the USB port speed.D. The device is incompatible with the installed version of Windows.Answer: B104A technician wants to setup hardware RAID 5 for a Windows 7 computer to prevent data loss. In which of the following locations would the technician MOST likely change the setting?
A. Disk ManagerB. Device ManagerC. Windows Boot DVDD. The BIOSAnswer: D105Which of the following will fix a laptop with dark irregular lines that run the width of the display in all video modes?
A. Perform a System RestoreB. Replace the video capture cardC. Change the resolution to 800 x 600D. Replace the LCDAnswer: D106A user powers up their desktop PC, and instead of booting up normally, the user is taken into the BIOS setup. Which of the following is the MOST likely problem?
A. The MBR is corruptB. NTLDR cannot be found by the systemC. A faulty CMOS batteryD. The BIOS requires a firmware updateAnswer: C107A user is working in a small office home office (SOHO), running Windows XP, and cannot connect to the Internet. The office uses a router that is setup as a DHCP server. The technician types
IPCONFIG in the command prompt, the following appears:
IP address 0.0.0.0
Gateway 0.0.0.0
Subnet Mask 0.0.0.0
DNS 0.0.0.0
Which of the following should the technician check FIRST?
A. Network adapter driversB. Router settingsC. Network cableD. FirewallAnswer: C108A customer wants to have a technician increase the amount of RAM in the laptop. Which of the following should the technician do FIRST before adding more memory?
A. Check for available hard drive spaceB. Check the laptop documentationC. Open the case to check for an available slotD. Check the operating system on the computerAnswer: B109A user is cleaning up their temporary Internet files and is concerned about the number of cookies discovered. Which of the following is a correct statement about cookies?
A. Cookies are spyware.B. Cookies are not always malicious.C. Cookies cannot be removed.D. Cookies should be disabled at all times.Answer: B110Which of the following commands would be used to move the working directory from C:\ to C:\Windows?
A. CDB. RDC. MDD. SFCAnswer: A110Which of the following commands will make exact duplicates of files and directory trees?A. TREEB. COPYC. XCOPYD. DISKCOPYAnswer: C111A user has reported they cannot access the wireless network. The network technician checks the laptop and cannot view the wireless adapter settings. Which of the following should the technician
do to connect the user to the wireless network?
A. Enable the network cardB. Enable WPA2 encryption on the WAPC. Change the WAP to support 802.11nD. Set the Default Gateway to 169.254.1.1Answer: A112A new web-based application is not working properly because it is unable to connect to certain external sites after it was installed within the internal corporate network. Which of the following will
need to be configured to help troubleshoot this issue?
A. Firewall port settingsB. Mail protocol settingsC. DNS settingsD. FTP settingsAnswer: A113Windows 7 has notified a user that it has blocked access to the following address in Internet Explorer: ftp://ftp.microsoft.com:21. Which of the following Windows features should the technician
check to ensure that there is not an explicit rule disallowing access to this location?
A. Windows BitlockerB. Windows BranchCacheC. Windows User Account ControlD. Windows FirewallAnswer: D114A technician is backing up a 10GB hard drive to an external drive. The PC reports the transfer time will be two hours. Which of the following ports is the drive MOST likely connected to?
A. USB 1.1B. Firewire 100C. USB 3.0D. eSATAAnswer: A115A system had been infected with a virus. After the virus was removed it returned a few days later even though the system had not been connected to a network or external media. Which of the
following should be done to remove the virus more permanently?
A. Enable last known good configuration.B. Disable system restore and clean the PC.C. Remove all spyware prior to a virus scan.D. Run the virus scanner with heuristics.Answer: B116A user states that their laptop is slow and they would like to increase the memory. Which of the following memory modules should a technician install?
A. 2GB SDRAM RIMMB. 2GB SDRAM SODIMMC. 4GB DDR DIMMD. 4GB RAMBUS DIMMAnswer: B117Whenever a user tries to print a specially formatted document, it prints but strips the text and has incorrect spacing. Which of the following issues is the most likely cause?
A. The wrong size paper is being usedB. The printer is not on the networkC. The print spooler service is not runningD. The wrong printer drivers are installedAnswer: D118Upon starting a computer, the CHKDSK utility always runs before the operating system loads. Which of the following components should the technician check in order to more closely diagnose
the problem?
A. Power supply and cablesB. Processor and BIOS settingsC. Hard drive and connecting cablesD. USB controller and FireWire connectorAnswer: C119A technician is tasked with replacing the processor and cooling fan in a laptop computer. Which of the following procedures will help the technician complete the task efficiently?
A. Place all of the screws together in one container so they do not get lost.B. Place the screws for each disassembly step together in an organizer.C. Tag each screw hole with a different color coded tag.D. Throw away the existing screws and replace them with new screws.Answer: B120During startup an error message "One or more services failed to start" appears. Which of the following methods can be used to examine the status of the services running on the computer?
(Select TWO).
A. Click on Start > Control Panel > SystemB. Right click on My Computer and select Properties from the context menuC. Click on Start > Control Panel > Administrative ToolsD. Right click on the Desktop and select Properties from the context menuE. Right click on My Computer and select Manage from the context menuAnswer: C,E121Which of the following operating systems supports full BitLocker functionality?A. Windows XPB. Windows 7 ProfessionalC. Windows Vista HomeD. Windows 7 EnterpriseAnswer: D122A user has a laptop that they need to get ready for an outdoor presentation. The user is concerned that the laptop will turn off the screen or go into standby before their presentation is complete.
Which of the following Control Panel paths should the technician use in order to prevent this from
occurring?
A. System -> HardwareB. Power Options -> Power SchemesC. System -> Advanced -> PerformanceD. Power Options -> HibernateAnswer: B123A user states their workstation will not reach the login screen. Which of the following commands can be used to write a new partition boot sector to the system partition in the Recovery Console?
A. FIXMBRB. BOOTCFGC. FIXBOOTD. DISKPARTAnswer: C124A user has an LCD and a CRT monitor attached to their workstation. The colors are slightly off on the CRT but not the LCD. Which of the following controls should be used in troubleshooting?
A. GeometryB. ContrastC. BrightnessD. DegaussAnswer: D125A technician installed a second hard drive in a computer. Upon restart, a message appears statinG. "primary drive 0 not found. Press F1 to continue. Which of the following should the
technician check FIRST?
A. That NTLDR and boot.ini are not missingB. Proper drive installation (e.g. cables/jumpers)C. If computer can boot into safe modeD. If the BIOS boot settings are correctAnswer: B126Which of the following resources is MOST important for accessing remote virtual environments on a client machine?
A. Network speedB. CPU speedC. High speed memoryD. Drive spaceAnswer: A127A user sent an email requesting that a technician check if a computer is on and connected to the Internet so the user can login from home. Which of the following commands in the command
prompt would a technician use to verify if the computer is on and connected without having to go
to the computer?
A. NSLOOKUPB. NETSTATC. PINGD. IPCONFIGAnswer: C128A technician recently removed spyware from a computer and now the user is getting error messages about system files. Which of the following tools would a technician use to verify all
system files are intact and in their original versions?
A. Repair DiskB. SFCC. FIXMBRD. ASRAnswer: B129The computer starts up and runs for less than a minute before shutting down or locking up. This is a symptom of:
A. overheating.B. incompatible RAM.C. a faulty hard drive.D. a bad internal USB hub.Answer: A130A computer’s time settings reset every time it is unplugged. This is a symptom of a faulty:A. memory module.B. power supply.C. motherboard.D. CMOS battery.Answer: D131A technician is configuring a PC that will have confidential information stored on it. To ensure that only authorized users can access this PC, which of the following should the technician do? (Select
TWO).
A. Disable the guest accountB. Install antivirus applicationsC. Disable DHCPD. Change the SSIDE. Change the default usernameAnswer: A,E132A technician recently installed a new video card in a PC. The PC already has integrated video on the motherboard. When the technician turns on the PC, there is no video. Which of the following is
MOST likely the cause?
A. The motherboard BIOS version is out of date.B. The incorrect video card drivers are installed.C. The power connector for the video card is unplugged.D. The video card is unsupported by the motherboard.Answer: C133Which of the following BEST describes a method for installing an operating system across the network?
A. USB 3.0B. IEEE 1394C. PXED. NTFSAnswer: C134A technician has been dispatched to a customer site to diagnose an issue where the computer turns off intermittently. Upon arriving at the site, the technician detects a smoke smell coming from
the computer. Which of the following is the BEST solution?
A. Power down the system and replace the CPU.B. Power down the system and replace the power supply.C. Install an additional case fan for proper ventilation.D. Remove the side panel for proper ventilation.Answer: B135A technician has installed several new devices on a computer. The computer no longer boots properly, and the technician needs to determine which device driver may be causing the issue.
Which of the following allows the operating system to run in a limited capacity with minimal device
drivers loaded?
A. Last known good configurationB. Recovery consoleC. Power shellD. Safe modeAnswer: D136Slow system performance may be caused by which of the following?A. Faulty firewallB. VirusesC. Second hard driveD. Outdated BIOSAnswer: B137A technician notices that a computer is making a loud clicking noise but continues to run. System speed is barely affected, but they cannot access certain drives. These are the symptoms of which
of the following?
A. Failing second hard driveB. Failing system hard driveC. Bad CMOS chipD. Bad CPU fanAnswer: A138Which of the following operating systems has a 64-bit version?A. Windows XP HomeB. Windows XP Media CenterC. Windows 7 StarterD. Windows XP ProfessionalAnswer: D139While using an application on a Windows XP desktop PC, a BSOD appears. Which of the following should the technician select upon reboot to troubleshoot this issue?
A. Boot to safe modeB. Boot to last known good configurationC. Boot to another OS on a second partitionD. Boot normallyAnswer: A140A technician would like to map a network drive. Which of the following indicates the correct path for mapping a network drive?
A. \\share\servernameB. \\username\servernameC. \\password\shareD. \\servername\shareAnswer: D 
 
 
 
 
 
N+
1. Keyword and blacklist filtering would be handled at which level in a network?A. Layer 2 managed switchB. DHCP serverC. Hardware firewallD. BridgeAnswer: C2. When installing two 802.11g access points in the same building, which of the following channels will MOST likely be used to minimize interference?
A. 5 and 6B. 1 and 6C. 6 and 10D. 2 and 6Answer: B3. Which of the following devices transmits timed broadcasts onto an active network?A. BridgeB. Unmanaged switchC. DHCP clientD. FirewallAnswer: C4. Which of the following describes the location where an administrator would terminate a bundle of CAT5e cables?
A. SwitchB. Smart jackC. RouterD. Patch panelAnswer: D5. Which of the following can be an STP cable?A. RG-6B. CAT5eC. FiberD. RG-59Answer: B6. A web server is running correctly but sending a RST packet to any client trying to connect using HTTP on TCP port 80.
Which of the following tools should be used to determine the listening port of the web server?
A. RouteB. IfconfigC. NetstatD. NslookupAnswer: C7. At which of the following layers does the TFTP protocol operate?A. Layer 1B. Layer 4C. Layer 5D. Layer 7Answer: D8. Which of the following utilities would be used to display a NIC's cache of MAC addresses?A. arpB. nslookupC. digD. netstatAnswer: A9. Which of the following is an intelligent repeater that is aware of the MAC addresses of the nodes on either side of the data link?
A. GatewayB. HubC. BridgeD. RouterAnswer: C10. At which of the following layers does the ICMP protocol operate?A. Layer 1B. Layer 3C. Layer 4D. Layer 5Answer: B11. A user reports sporadic connectivity with their wireless connection. A technician determines the wireless speed reported by the laptop to be 1Mbps. Which of the following is the MOST likely
cause of this issue?
A. The client does not support 802.11n.B. Incorrect frequency on the client is being used.C. Incorrect encryption on the AP.D. The client distance from the AP.Answer: D
Explanation:
12. Which of the following tools would an administrator use to determine if a DNS server is answering authoritatively for a domain?
A. nbtstatB. digC. netstatD. hostnameAnswer: B13. By default, which of the following ports would a network need to have opened to allow for the transmission of incoming and outgoing email? (Select TWO).
A. 21B. 25C. 80D. 110E. 123Answer: B,D14. An administrator is setting up a network and would like to prevent users from having the ability to plug their PC into the network to receive an IP address. Which of the following addressing
schemes should the technician use?
A. NATB. DynamicC. SubnettingD. StaticAnswer: D15. An administrator is setting up a network and would like to prevent users from having the ability to plug their PC into the network to receive an IP address. Which of the following addressing
schemes should the technician use?
A. NATB. DynamicC. SubnettingD. StaticAnswer: D16. Which of the following connector types is used for coax cable?A. BNCB. STC. LCD. SCAnswer: A17. A technician claims to have crimped a patch cable according to the T568A standard on one end and T568B on the other.
Which of the following results is to be expected?
A. Since only half the leads are used, the cable will only work at 100Mbps.B. The cable will only work at a maximum of 100Mbps. since 1Gbps only works on T568B cables.C. There will be no proper data continuity; the standards utilize two different wiring diagrams.D. The cable will only work at a maximum of 10Mbps. since 100/1000Mbps only works on T568B pure cables
Answer: C18. An administrator is setting up a security camera that will send the same feed to twelve of the twenty workstations on the network. Which of the following addressing schemes was designed for
this scenario?
A. MulticastB. UnicastC. BroadcastD. Peer-to-peerAnswer: A19. A technician would like to separate the HR department's workstations from the other workstations at the company. Which of the following network topologies should be used?
A. Peer to peerB. SubnettingC. VLAND. VPNAnswer: C20. A client wants to improve the wireless coverage on the third floor of their house. The wireless router is located in the basement and there is no easy way to run a cable to the third floor. Which
of the following devices should be installed to extend the wireless coverage to cover the entire
third floor without running cables?
A. SwitchB. RouterC. RepeaterD. BridgeAnswer: C21. Which of the following describes what the number two represents in l00Base2 cabling?A. FiberB. Coaxial cableC. UTPD. Twisted pairAnswer: B22. A crossover cable is MOST commonly associated with which of the following layers of the OSI model?
A. SessionB. ApplicationC. NetworkD. PhysicalAnswer: D23. Which of the following devices is used to connect multiple devices to a network and does not stop broadcast traffic?
A. SwitchB. HubC. ModemD. RepeaterAnswer: B24. A network administrator needs to add an additional connection to a room. The administrator adds a new Ethernet switch and must connect it to an existing switch. Which cable type should be used
to connect the two switches?
A. CAT3 cableB. Serial cableC. Crossover cableD. Rollover cableAnswer: C25. Prioritizing traffic between data and voice is defined as which of the following?A. Caching enginesB. Proxy serverC. QoSD. Load balancingAnswer: C26. A demarcation point is usually installed and managed by which of the following providers?A. Web host providerB. VoIP companyC. Telephone companyD. Hardware manufacturerAnswer: C27. Users are unable to access the Internet but the users are able to send/receive email from their desktops. Which of the following ports is MOST likely being blocked?
A. 25B. 80C. 110D. 143Answer: B28. Which of the following would need to be implemented on a wireless router to allow network access based on a passphrase that the administrator would supply?
A. WPA-PSK encryptionB. SSID broadcastC. Port forwardingD. MAC filteringAnswer: A29. Which of the following performs posture assessments for unknown devices that connect to the network?
A. PKIB. EAPC. NACD. AAAAnswer: C30. At which of the following OSI model layers is HTTPS encryption performed?A. Layer 3B. Layer 5C. Layer 6D. Layer 7Answer: C31. An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized
devices from using the company's wireless network?
A. Secure VPNB. MAC filteringC. IP filteringD. Static IP addressesAnswer: B32. Which of the following cables is the MOST susceptible to interference?A. FiberB. CoaxC. UTPD. STPAnswer: C33. On which of the following network devices would an administrator configure an ACL?A. RouterB. HubC. RepeaterD. NICAnswer: A34. An administrator would like to know the name of the workstation that is being repaired. Which of the following commands, without parameters, will provide this information?
A. HostnameB. IpconfigC. NetstatD. PingAnswer: A35. Which of the following routing protocols involves all routers knowing the connections status of other routers within the network?
A. RIPv2B. OSPFC. IGRPD. BGPAnswer: B36. A technician is working on a SOHO wireless network and notices that the wireless adaptor in the laptop shows excellent connection at 11Mbps. The technician has a wireless N adaptor. Which of
the following would BEST describe this connection speed?
A. The laptop is too far away from the WAP.B. The WAP is using 802.11a frequencies.C. The laptop is only set to allow 802.11n connections.D. The technician is on an 802.11b network.Answer: D37. Which of the following network devices would MOST likely be installed on a network to help reduce broadcast traffic and to allow individual virtual networks?
A. SwitchB. RepeaterC. HubD. WAPAnswer: A38. Which of the following connector types is commonly identified by two rows of pins with four in one row and five in the other?
A. DB-9B. RJ-45C. SCD. BNCAnswer: A39. Which of the following commands would allow a computer to acquire an IP address?A. ipconfig/releaseB. ipconfig/renewC. ipconfig/allD. ipconfig/helpAnswer: B40. Several users are sending emails to CompTIA.org. but they are not being received. Which of the following commands could be used to verify that the company is able to connect to the mail
service at CompTIA.org?
A. PingB. ArpC. DigD. telnetAnswer: D41. Which of the following metrics indentifies the number of connections that is between two devices?A. Hop countB. MTUC. LatencyD. BandwidthAnswer: A42. Which of the following has a maximum data rate of 11Mbps?A. 802.11nB. 802.11gC. 802.11bD. 802.11aAnswer: C43. Which of the following networks are reserved for private IP addresses?A. 168.129.00/24B. 172.16.128.0/15C. 192.168.0.0/16D. 162.17.0.0/12Answer: C44. An administrator needs to terminate network cables that have just been installed in the main communications closet. Which of the following tools is required?
A. MultimeterB. SnipsC. Toner probeD. Punch down toolAnswer: D45. A computer is able to ping other devices on the same network but is unable to ping devices on another network. Which of the following needs to be configured?
A. DNS primary serverB. Host routeC. Proxy ARPD. Default gatewayAnswer: D46. Which of the following restricts network access to a router administrator's interface?A. IDSB. SSLC. ACLD. SMNPv2Answer: C47. In which of the following topologies could the failure of one machine cause the entire network to stop functioning?
A. MeshB. Token ringC. StarD. Spanning treeAnswer: B48. A user reports that their laptop does not have network connectivity, but was working fine last week. The technician executes IPCONFIG to see what the IP address is but it comes up with a
169.254.254.1 address. This address is not part of the company's subnet. Which of the following
MOST likely identifies this address type?
A. MulticastB. DHCPC. APIPAD. BroadcastAnswer: C49. Determining when to retransmit frames is an example of which of the following Ethernet properties?
A. Carrier senseB. Collision detectionC. Multiple access pointsD. Collision avoidanceAnswer: B50. Which of the following would Joe, a technician, configure to modify the time a device will hold an IP address provided through DHCP?
A. DNS suffixesB. LeasesC. Static IP addressingD. ReservationsAnswer: B51. Sandy, a technician, wants to limit access to a wireless network to company owned laptops, but does not want to use an encryption method. Which of the following methods would be BEST to
accomplish this?
A. MAC filteringB. SSL VPNC. PPPoED. WPA EnterpriseAnswer: A52. Joe, a network technician, is tasked with installing a router and firewall to get an office working with Internet access. Which of the following features MUST be configured to allow sharing of a
single public IP address?
A. QoSB. POP3C. PATD. SMTPAnswer: C53. Which of the following is a form of encrypting packets for safe, secure data transmission within a network?
A. RASB. PPTPC. IPSecD. ICAAnswer: C54. Two duplicate pieces of equipment can be used in conjunction for which of the following purposes? (Select TWO)
A. High availabilityB. Fault toleranceC. Reduce latencyD. Wi-MAXE. CARPAnswer: A,B55. The T568B wiring standard slates that CAT5 cables should be coded as follows:A. White/Orange, Orange, White/Green, Green, Blue, White/Blue, White/Brown, Brown,B. White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown,C. White/Orange, Orange, \White/Green, Green, White/Blue, Blue, White/Brown, Brown,D. White/Orange, Orange, White/Green, Blue,Answer: B56. Using network monitoring tools would allow an administrator to do which of the following?A. Configure offline devicesB. Examine performance issuesC. Install additional software and updatesD. View syslog eventsAnswer: B57. Which of the following wireless technologies can operate at only 5GHz?A. 802.11b/gB. 802.11gC. 802.11bD. 802.11aAnswer: D58. Which of the following devices allows multiple internal IP addresses to access an external website with minimal impact to the network bandwidth?
A. ProxyB. Load balancerC. RouterD. Bandwidth shaperAnswer: A59. A VPN connection is not working correctly and the technician is unable to ping the VPN server. Which of the following actions should the technician do FIRST?
A. Call their local ISPB. Verify the IP information of the serverC. Check their local Internet connectionD. Verify the hostname of the serverAnswer: C60. A technician wants to use an existing DHCP server for three additional VLANs. Which of the following features needs to be configured to allow for this addition?
A. DHCP serverB. Proxy serverC. RepeaterD. DHCP relayAnswer: D61. A client is having problems connecting remotely after replacing a router. An administrator has just created an action plan. Which of the following is the NEXT step the administrator should perform
to resolve this issue?
A. Implement and test the solution.B. Determine if escalation is necessary.C. Identify the affected areas of the network.D. Identify the results and effects of the solutionAnswer: A62. Which of the following technologies was designed to provide the FASTEST data rates over analog phone lines?
A. RADSLB. SONETC. ADSLD. MPLSAnswer: C63. Which of the following wireless standards can be used to avoid the 2.4GHz range? (Select TWO).A. 802.11gB. 802.1XC. 802.11bD. 802.1 nE. 802.11aAnswer: D,E64. A small office in which all workstations are using an ISP provided IP range has noticed a consistent decrease in network traffic speed. The decrease does not occur when the gateway to
the ISP is disconnected. Which of the following should the administrator implement?
A. Multicast addressingB. Load balancingC. Address translationD. DHCPAnswer: C65. Which of the following should be used to test an internal NIC without having to connect it to the network?
A. Loopback cableB. Crossover cableC. Rollover cableD. Straight cableAnswer: A66. Kerberos is a form of user authentication that:A. Provides users access to network resources.B. Performs router commands after user authentication.C. Provides users with remote access only capabilities.D. Does not require an authentication serverAnswer: A67. Computers on a small network are not able to receive new addresses from the DHCP server. However, the administrator has checked the server and ensured it is connected, responding, and
functional. Which of the following is the MOST likely problem in this scenario?
A. The DHCP server has an incorrect gateway configured.B. The DHCP server was incorrectly configured with a six hour lease time on addresses.C. The DHCP server was incorrectly configured with no-expiring lease time on addresses.D. The DNS server is no longer functional and internal name-address resolution is down.Answer: C68. Which of the following OSI model layers is used for logical addressing?A. PhysicalB. TransportC. NetworkD. Data linkAnswer: C69. Which of the following is the full range of address block 192.16876.0/23?A. 192.168.76.0-192.168.77.255B. 192.168.76.0-192.168.76.255C. 192.168.76.0-192.168.76.23D. 192.168.76.0-192.168.78 0Answer: A70. A network at a small business utilizes a star topology and is experiencing frequent collisions among data packets. Which of the following devices is MOST likely being used?
A. Unmanaged switchB. Hardware firewallC. HubD. Managed switchAnswer: C71. A technician is troubleshooting a network connectivity issue with a user's desktop configured to use a static IP address. The technician notes the following configuration:
IP 172.16.2.0
NETMASK 255.255.254.0
DEFAULT GATEWAY 172.16.1.1
DNS 192.168.1.1
Which of the following changes will allow the desktop to communicate properly with remote
networks?
A. Changing the DNS to 172.16.1.100B. Changing the WINS server to 172.174.136C. Changing the netmask to 255.255.255.0D. Changing the default gateway to 172.16.3.1Answer: D72. An administrator needs to know the workstation name of a user who called in for support in order to remotely manage it. After calling the user and having the user open a command prompt, which
of the following commands would the administrator ask the user to type?
A. NetstatB. IfconfigC. HostnameD. PingAnswer: C73. Which of the following describes 1Gigabit Ethernet?A. 10GBaseERB. 10Base2C. 1000BaseTD. 100Base5Answer: C74. Which of the following remote access methods allows an administrator to take control of a user's machine and block the user from seeing the active session?
A. PPPB. PPPoEC. RDPD. RASAnswer: C75. On a network switch, which of the following is the default native VLAN?A. 0B. 1C. 1024D. 4096Answer: B76. Which of the following protocols is used to encrypt data between web servers and web browsers?A. SMTPB. SIPC. HTTPD. SSLAnswer: D77. Which of the following devices separates a LAN segment into two collision domains, without affecting the broadcast domain?
A. FirewallB. BridgeC. RepeaterD. RouterAnswer: B78. A company wants to secure access to its internal wireless network. The company wants to use the most secure means to access the network. Which of the following is the BEST choice for wireless
security in this situation?
A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryptionAnswer: D79. Which of the following represents the physical address of a network access card?A. FF01:D2:C4:87::11B. 00-30-48-83-9B-C8C. 08-9D-35-22-L2-34-FF-21D. 2D1A:C3:0:1C3B:2AD:FF:FEBE:9D3AAnswer: B80. Which of the following is an invalid IPv4 address?A. 225.0.0.1B. 254.254.0.0C. 256.0.0.4D. 224.2.1.4Answer: C81. 1000BaseT has a MAXIMUM run distance of:A. 25 meters (82 feet)B. 100 meters (328 feet)C. 500 meters (1640 feet)D. 1000 meters (3280 feet)Answer: B82. A technician is reporting wireless transmission speeds of 300Mbps. Which of the following wireless standards is being used?
A. 802.11aB. 802.11bC. 802.11gD. 802.11nAnswer: D83. Which of the following LAN technologies is considered fast Ethernet and uses two pairs of cabling, one pair for sending and the other pair for receiving?
A. 100BaseT4B. 100BaseTXC. 100BaseXD. 100BaseFXAnswer: B84. Which of the following DNS records would be queried to locate a company's mail server?A. AB. MXC. AAAAD. CNAMEAnswer: B85. Which of the following uses a ring topology?A. DSLB. EthernetC. DOCSISD. SONETAnswer: D86. Which of the following connector types would Sandy, a network technician, use to connect a serial cable?
A. RJ-11B. BNCC. LCD. DB-9Answer: D87. Karen, a technician, needs to test if domain name resolution is functioning properly. Which of the following software tools would she use to accomplish this? (Select TWO).
A. arpB. digC. routeD. nslookupE. netstatAnswer: B,D88. Which of the following protocols would Kurt, a technician, use to synchronize local date and time of a client workstation to that of a server?
A. RTPB. NTPC. TFTPD. ARPAnswer: B89. A small office has asked to have six PCs networked together by Joe, a consultant. The office users want file sharing capability with no access to the Internet. Which of the following items will
Joe need? (Select TWO).
A. Network bridgeB. RG-59 patch cablingC. CAT5e patch cablingD. FirewallE. SwitchAnswer: C,E90. Which of the following services would Karen, a technician, use to create or update a client's DNS 'A' and 'PTR' records automatically?
A. KerberosB. BINDC. WINSD. DHCPAnswer: D91. Joe, a network technician, blocks access to ports 25,110, and 143 on the firewall. Which of the following application services will be blocked due to this?
A. Email sending and receivingB. Domain Name ServiceC. FTP access to external serversD. Remote desktop accessAnswer: A92. CAT6 Ethernet cabling has a rated maximum transmission capability of:A. 10MbpsB. 100MbpsC. 20,000MbpsD. 10,000MbpsAnswer: D93. Which of the following would Karen, a technician, do to monitor remote traffic through an access point?
A. Enable an SNMP agentB. Enable network mappingC. Set monitoring SSIDD. Select WPA2Answer: A94. Which of the following network devices MOST likely functions as a network repeater or a bridge?A. VPN concentratorB. IDSC. Access pointD. FirewallAnswer: C95. Which of the following VPN methods is BEST used for connecting a remote office to the main company office?
A. WEP-to-WPAB. RDP-to-RASC. Client-to-siteD. Site-to-siteAnswer: D96. Users are unable to access the company’s intranet website. Which of the following attacks has the network MOST likely experienced?
A. Man-in-the-middleB. SmurfC. TrojanD. DoSAnswer: D97. Which of the following has a maximum transfer rate of 54Mbps and operates at the 5GHz frequency?
A. 802.11aB. 802.11bC. 802.11gD. 802.11nAnswer: A98. Joe, a network technician, has configured a server with the following IP settings: IP Address: 192.168.1.40/27
Default Gateway: 192.168.1.64
DNS: 192.168.1.33
The server cannot access the Internet. Which of the following settings needs to be changed?
A. Default gatewayB. IP addressC. VLAND. DNSAnswer: A99. After a switch upgrade, several users report no connection to the Internet, while other users report no problems. Which of the following is the MOST likely problem?
A. Wrong gatewayB. Faulty or missing routesC. No DNSD. VLAN port assignmentsAnswer: D100. Which of the following technologies has different upload and download speeds?A. OC12B. SDSLC. OC3D. ADSLAnswer: D101. Which of the following is a Class A private IP address?A. 4.2.2.2B. 10.1.1.45C. 169.254.9.15D. 192.168.0 100Answer: B102. Which of the following defines the purpose of a DHCP scope?A. To allocate a preset range of MAC addresses available for assignment.B. To tell a DHCP server to exclude IP addresses.C. To properly configure a DHCP server's allowed bandwidth level.D. To allocate a preset range of IP addresses available for assignment.Answer: D103. Karen, a technician, is connecting a new desktop computer to a switch. She was only able to locate one cable in the office for the installation. The wires at each end are color coded as follows:
End A: orange-white, orange, green-white, blue, blue-white, green, brown-white, brown
End B: green-white, green, orange-white, blue, blue-white, orange, brow-white, brown
Which of the following should Karen do to complete the installation?
A. Re-end the provided cable, keeping the wiring the same.B. Use the provided cableC. Purchase a crossover cable.D. Purchase a straight-through cableAnswer: D104. Which of the following identifies the WLAN Joe, a user, is connected to?A. SSIDB. FrequencyC. WEPD. ChannelAnswer: A105. Which of the following connectors push and twist-on?A. LCB. SCC. STD. RJ-45Answer: C106. Which of the following security devices is used in providing packet and MAC address filtering services for the network?
A. Host-based proxy serverB. Network-based firewallC. IDSD. IPSAnswer: B107. Which of the following media types will block EMI?A. UTPB. SerialC. STPD. Non-plenumAnswer: C108. Which of the following devices will allow Sandy, a user, to see a cached copy of websites?A. Content switchB. DNS serverC. Proxy serverD. Load balancerAnswer: C109. Which of the following is a purpose of a VLAN?A. Decreases bandwidth on a networkB. Segments broadcast trafficC. Increases port speedD. Allows another connection to the routerAnswer: B110. Blocking a known malicious web address by using the ACL on the firewall is an example of which of the following?
A. IP filteringB. Application filteringC. MAC filteringD. Port filteringAnswer: A111. Which of the following DNS records would allow for a website to have more than one FQDN?A. TXTB. PTRC. MXD. CNAMEAnswer: D112. Which of the following commands can Sandy, a technician, use on a server to display the default router setting?
A. pingB. nslookupC. routeD. arpAnswer: C113. Which of the following OSI layers performs error detection using a Frame Check Sequence?A. SessionB. TransportC. PhysicalD. Data linkAnswer: D114. Which of the following layers of the OSI model is above the Session layer?A. Data linkB. PresentationC. PhysicalD. TransportAnswer: B115. Which of the following is the loopback address for IPv6?A. ::1B. ::255C. 127.0.0.1D. 127:0:0:1Answer: A116. Joe, a network administrator, has been requested to install wireless access throughout the entire building, while utilizing a single SSID. Which of the following options will meet this requirement?
A. Set a separate VLAN on each WAP with the same encryption typeB. Set the SSID on each WAP and set contiguous WAPs to different channelsC. Set the SSID on each WAP and set contiguous WAPs to the same channelD. Set a separate VLAN on each WAP with the same frequencyAnswer: B117. Which of the following allows for multiple operating systems to be run simultaneously on a single server?
A. Dual bootB. Multiple hard drivesC. PXE bootD. Virtual machinesAnswer: D118. Sandy, a network technician, would like to keep the IP address of the Human Resource department" s server in the same group of 100 DHCP IP addresses that are assigned to the
Human Resource department's employee workstations. Which of the following would BEST allow
this and have the ability for the server to keep the same IP address?
A. Implement a set of static IPs for the entire human resource department.B. Use a DHCP reservation for the server IP address.C. Use a small DHCP scope for the human resource department.D. Connect the server to a router in the network closet on the same floor.Answer: B119. Which of the following wireless network standards allows for the HIGHEST speeds?A. 802.11aB. 802.11bC. 802.11gD. 802.11nAnswer: D120. Which of the following would Joe, a technician, MOST likely use to remotely verify port configuration of a switch?
A. traceroute commandB. SNMP monitorC. nbtstat commandD. dig commandAnswer: A121. Which of the following can be used to view the list of ports on which a server is listening?A. digB. net statisticsC. netstatD. nslookupAnswer: C122. Which of the following is an invalid MAC address?A. AA:CE:58:FD:90:08B. 44:98:3E:F8:33:23C. 56:AD:BX89:55:54D. 94:9E:FE:EE:8C:DFAnswer: C123. On which of the following layers does a hub function?A. TransportB. Data linkC. PhysicalD. NetworkAnswer: C124. Which TCP/IP model layer does the OSI model layer named 'session' respond to?A. ApplicationB. PresentationC. InternetD. TransportAnswer: B125. Which of the following defines access for a network?A. ACLB. RDPC. RASD. ARPAnswer: A126. Which of the following uses copper wiring?A. 10GBaseERB. 10GBaseLWC. 100BaseFXD. 1000BaseTAnswer: D127. Which of the following tools allows Kurt, an administrator, to test connectivity between two computers?
A. routeB. pingC. ipconfigD. tfconfigAnswer: B128. Which of the following is the MAIN purpose of a packet sniffer?A. To determine open ports on a serverB. To ensure encryption is being usedC. To analyze network trafficD. To prevent network intrusionAnswer: C129. Karen, a network technician, is troubleshooting a problem and has just established a plan of action to resolve the problem. Which of the following is the NEXT step in the troubleshooting
methodology?
A. Verify full system functionality and if applicable implement preventative measures.B. Implement the solution or escalate as necessary.C. Document findings, actions, and outcomes.D. Establish a theory of probable cause (e.g. question the obvious).Answer: B130. Which of the following wireless technologies can support the GREATEST distance on either 2.4GHz or 5GHz frequencies?
A. 802.11aB. 802.11bC. 802.11gD. 802.11nAnswer: D131. A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?
A. WEPB. Port filteringC. WPAD. Longer SSID broadcast intervalsAnswer: C132. Which of the following ports is the default telnet port?A. 20B. 21C. 22D. 23Answer: D133. Sandy, a network technician, is attempting to map a FQDN to an internal server at the address of 10.0.0.15 without NAT/PAT. Which of the following is the reason this will ultimately not work?
A. This is a private address which cannot be seen by external users.B. The address does not have the appropriate subnet mask assigned.C. This is a public address which can only be seen by internal users.D. This is a private address which can only be seen by external users.Answer: A134. Which of the following is the network topology in which computers connect to form a straight line?A. RingB. StarC. BusD. MeshAnswer: C135. Users have reported slow access times when retrieving information from a server on the company’s network. Which of the following tools would provide access time information on each
segment of the network to reach the server?
A. arpB. routeC. ipconfigD. tracertAnswer: D136. 1000BaseT has a MAXIMUM run distance of:A. 25 meters (82 feet)B. 100 meters (328 feet)C. 500 meters (1640 feet)D. 1000 meters (3280 feet)Answer: B137. Sandy, an administrator, attempts to open a web page and sees the following error 'Error 404: Page not found'. She then uses the ping command and finds that the default gateway cannot be
pinged. At which of the following layers does the problem MOST likely reside?
A. Layer 1B. Layer 4C. Layer 5D. Layer 7Answer: A138. Which of the following wiring standards would Karen, a technician, MOST likely use to interconnect two devices without the use of a hub or switch?
A. 568AB. 568BC. CrossoverD. LoopbackAnswer: C139. Which of the following is the name of the routing update process involved when a change occurs in the routing environment?
A. SupernettingB. DynamicC. SublettingD. ConvergenceAnswer: D140. Which of the following is an intelligent repeater that is aware of the MAC addresses of the nodes on either side of the data link?
A. GatewayB. HubC. BridgeD. RouterAnswer: C
Linux
You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. A printer is configured on the network. You want to remove a file from a print queue. Which of the following commands will you use to accomplish this?
LPR
LPQDEL
LPRM
LPQ
Answer: C
You are a newly appointed Red Hat Technician for company Inc. The company has a Linux-based network. You want to install a package named httpd on your Linux system. Before installing the package, you want to get the list of those packages that httpd depends on. Which of the following commands will you use to accomplish the task?
rpm deplist httpd
yum deplist httpd
yum list httpd
rpm -qR httpd
Answer: B
You work as the Network Administrator for McNeil Inc. The company has a Linux-based network.You are working as a root user on Red Hat operating system. You are currently running a program named My_program. You are getting some error messages while executing the program. You want to redirect these error messages to a file named file2 rather than being displayed on the screen. Which of the following tools should you use to accomplish the task?
My_program >> file2
My_program 2> file2
My_program 2>> file2
My_program > file2
Answer: B
Which of the following key-combinations is used to redo a change undone by a u command in vim?
Ctrl-w, Arrow
Ctrl-w, s
Ctrl-r
Ctrl-w, v
Answer: C
You work as the Network Administrator for Perfect solutions Inc. The company has a Linux-based Network. You are working as a root user. You want to know what the day will be on 20 July 2010.Which of the following commands should you use to accomplish this task?
cal
cal 20 July
cal 7 2010
date
Answer: C
Which of the following commands is used to access Windows resources from Linux workstation?
rsync
mutt
scp
smbclient
Answer: D
You want to temporarily change your primary group to another group of which you are a member. In this process, a new shell will be created, and when you exit the shell, your previous group will be reinstated. Which of the following commands will you use to accomplish this task?
chmod
newgrp
chgrp
chown
Answer: B
Fill in the blank with the required permission to complete the statement below. In order to make a script executable in a Linux computer, you must assign the___________ permission to the script file.
execute
read
read & write
write
Answer: A
You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. David, a Sales Manager, wants to know the name of the shell that he is currently using. Which of the following commands will he use to accomplish the task?
ECHO $shell
RM $shell
MV $shell
LS $shell
Answer: A
Which of the following text editing tools can be used to edit text files without having to open them?
less
sed
vi
more
Answer: B
Which of the following commands will you run to do case-sensitive search for files named
foobar.png?
locate -name foobar.png
find -iname foobar.png
grep-name foobar.png
find -name foobar.png
Answer: D
You work as the Network technician for McNeil Inc. The company has a Linux-based Network. You are working on the Red Hat operating system. You want to remove some write protected files and directories. Which of the following commands should you use to accomplish this task?
rm -rf
rm -f
rmdir
rm
Answer: A
Which of the following options is used with aspell to specify the location of the main word list?
d,--master=string
-p,--personal=file
--jargon=string
--dict-dir=dir
Answer: D
Which ftp client command allows you to upload multiple files simultaneously using the "*" wildcard?
mput
mget
put
get
Answer: A
Which of the following commands copies files between hosts on a network and uses the same authentication as ssh, and will ask for passwords or passphrases if they are needed for
authentication?
scp
rcp
cp
mv
Answer: A
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to break a data.txt file, 200MB in size, into two files in which the size of the first file named data .txt.aa should be150MB and that of the second file named data.txt.ab should be 50MB. To accomplish his task and to further delete the data.txt file, he enters the following command: split --verbose -b 150m data.txt data.txt. ; rm -vf data.txt Which of the following commands can John use to join the splitted files into a new data.txt file?
vi data.txt.*
less data.txt.* > data.txt
cat data.txt.* > data.txt
vi data.txt.* > data.txt
Answer: C
Mark is a newly appointed Network Technician for McNeil Inc. The company has a Linux-based network. He is working on the Red Hat operating system. He wants to sort a file named marketing.txt in the reverse alphabetical order. Which of the following commands should Mark use to accomplish this task?
sort -u marketing.txt
sort marketing.txt
sort -n marketing.txt
sort -r marketing.txt
Answer: D
Which of the following commands is used to securely copy files from one host to another over the network?
ls
cat
mutt
scp
Answer: D
Fill in the blank with the appropriate tool. __________ is a public domain collection of tools to allow Unix systems to manipulate MS-DOS files: read, write, and move around files on an MSDOS file system.
mtools
ntools
xtools
tools
Answer: A
Which of the following commands will you use to list all local and remote printers attached to your computer?
lpq
lpstat -d
lpstat -t
lpr
Answer: C
Which of the following files is the default configuration file of XDM (X Window Display Manager)?
/etc/X11/xdm/xdm-config
$HOME/.Xauthority
/usr/bin/xdm-config
/usr/bin/xterm
Answer: A
Which of the following commands is used to append the list of files in the /tmp directory to an existing file named deletelater.txt?
ls /tmp > deletelater.txt
ls deletelater.txt /tmp
ls /tmp deletelater.txt
ls /tmp >> deletelater.txt
Answer: D
You work as a Technician for Net World Inc. The company has a Linux-based network. You have configured a file server on the company's etwork. You want to summarize disk usage of each file in a particular directory on the file server. Which of the following commands will you use?
du
fsck
df
dfsck
Answer: A
You work as the Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. You want to keep an eye on the system log file /var/adm/messages. Which of the following commands should you use to read the file in real time?
tail -f /var/adm/messages
tail /var/adm/messages
cat /var/adm/messages
tail -n 3 /var/adm/messages
Answer: A
You work as the Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You are working as a root user on the Linux operating system. You have created a file in the vim text editor. You want to save this file and exit it. Which of the following keys should you use to accomplish the task?
:w
:wq
:q!
:
Answer: B
Which of the following commands is used to change file access permissions in Linux?
chown
chmod
chperm
chgrp
Answer: B
You work as a Network Administrator for Rick International. The company has a Linux-based network. A process is running on a server. It is using a lot of processing power. You want the process to use less resource. Which of the following actions will you perform to accomplish the task?
Kill the process and rerun it by using the nice command with the -n 1 switch.
Kill the process and rerun it by using the nice command with the -n 19 switch.
Kill the process and rerun it by using the fg command.
Kill the process and rerun it by using the bg command.
Answer: B
Which of the following commands list the configured printers in a Linux network? Each correct answer represents a complete solution. Choose all that apply.
lpstat -a
lpstat -l
lpstat -o
lpstat -r
Answer: A,B
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system He wants to change the group membership of the file foo to group bar. Which of the following commands will he use to accomplish the task?
chgrp foo bar
chgroup bar foo
chgrp bar foo
chgroup foo bar
Answer: C
Which of the following commands is used to view the PDF files in Linux?
ps2pdf
a2ps
pdf2ps
evince
Answer: D
You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You want to view the status of the current processes running on a Linux computer. You also want to append this information into the StatPro.txt file without deleting its content. Which of the following commands will you use to accomplish the task?
ps StatPro.txt
ps >> StatPro.txt
ps | more StatPro.txt
ps > StatPro.txt
Answer: B
When you remove a user account from your Linux system, the files and directories of this user may still remain on the system. Which of the following commands can you use to remove all items from your Linux system? Each correct answer represents a complete solution. Choose two.
userdel -r
userdel -f
userdel -h
userdel -c
Answer: A,B
You work as the Network Administrator for Perfect solutions Inc. The company has a Linux-based Network. You are a root user on the Red Hat operating system. You want to grant ownership of the file foofile to a user John. Which of the following commands should you use to accomplish this task?
chown John foofile
chmod John foofile
chgrp foofile John
chown foofile John
Answer: A
Which of the following cp command parameters copies only when the source file is newer than the destination file or when the destination file is missing?
-u
-l
-p
-s
Answer: A
35.
Which graphical mail client is the default tool for email and groupware in Red Hat Enterprise Linux?

mutt
Evolution
Thunderbird
pidgin
Answer: B
Fill in the blank with the appropriate permission to complete the statement below.
The___________command is used to start xsession using the xinit utility.
startx
start
statx
stretx
Answer: A
Which of the following network diagnostic tools is NOT used in the Linux operating system?
host
dig
ipconfig
ping
Answer: C
Which shell script is the first startup script run when a login shell is started in Linux?
~/.bashrc
/etc/profile.d
/etc/profile
/etc/bashrc
Answer: C
Which of the following commands is used to set down the interface and flush all its addresses?
ifup
ifdown
ifconfig
down
Answer: B
You work as the Network administrator for McNeil Inc. The company has a Linux-based network. You are working as a root user on the Linux operating system. You have created a PostScript file on your system. You want to convert this file to a PDF file. Which of the following commands should you use to accomplish the task?
ps2pdf
evince
pdf2ps
enscript
Answer: A
You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. You want to see all directories and files, including hidden files of your home directory in long listing format. Which of the following command-line utilities would you use to accomplish this task?
ls -al /root
ls
ls -s /root
ls -h /root
Answer: A
You work as the Network Administrator for McNeil Inc. The company has a Linux-based network. You are working a root user on the Red Hat operating system. You want to search for files named snow.html, Snow.html, SNOW.html in the current directory. Which of the following commands should you use to accomplish the task?
find -iname snow.html
find -name snow.html
find name snow.html
find -i snow.html

Answer: A
Which of the following commands is used to make traceroute wait 5 seconds for a response to a packet?
traceroute -w
traceroute -T
traceroute -q
traceroute -r

Answer: A
Which of the following directories cannot be placed out of the root filesystem? Each correct answer represents a complete solution. Choose all that apply.
/sbin
/etc
/lib
/var

Answer: A,B,C
You work as a network administrator for company Inc. The company has a Linux-based network. You want to create a file named foobar.zip and put it into a directory named filesdir. Which of the following commands will you use to accomplish the task?
unzip foobar.zip filesdir
zip -r foobar.zip filesdir
tar -tvf foobar.tar
gunzip foobar.zip

Answer: B
Fill in the blank with the appropriate command to complete the statement below. In order to run the httpd process with the highest priority, you will issue the _______ command to change the priority level of the httpd process.
nice
nise
neace
nic

Answer: A
Which of the following commands can be used to delete all jobs queued in a printer?
Each correct answer represents a complete solution. Choose all that apply.
lprm -a all
lprm -all
lprm - *
lprm -

Answer: A
You work as a Network Administrator for Tech World Inc. The company has a Linux-based network. The permissions on a file named Report are shown below:
rwxr--r-- You want to add a sticky bit to the file. Which of the following commands will you use?
chmod 2744 report
chmod 4744 report
chmod 7744 report
chmod 1744 report

Answer: D
What will be the output of the following command? echo $(date %M) > date.txt
It will print a string "date %M".
The current time (Month) will be written in the date.txt file.
The current time (Minutes) will be written in the date.txt file.
It will create a variable $(date %M).

Answer: C
You are a newly appointed technician for company Inc. The company has Linux- based network. You have executed a command find /home - user joe -group joe on the terminal. What will this command do?
It will search for files owned by the user joe -group joe anywhere on the system.
It will backup files owned by the user joe -group joe in /home/.
It will display the content of a file that belongs to group joe.
It will search for files owned by the user joe -group joe in /home/.

Answer: D
You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. There are six files in a directory on your laptop. You want to find out the file types of all the files at a time. Which of the following commands will you use?
fsck
file
mount
init

Answer: B
Which of the following commands does not save changes before exiting from the VI editor?
:q!
:q
zz
:w

Answer: A
Which of the following commands pipes stdout and stderr from cmd1 to cmd2?
cmd2 | cmd1
cmd2 2>&1 | cmd1
cmd1 | cmd2
cmd1 2>&1 | cmd2

Answer: D
You work as the Network Administrator for McNeil Inc. The company has a Linux- based network. You are working as a root user on the Red Hat operating system. Joe is a user in your company. You want to remove Joe's tmp files that are 3 days older. Which of the following command syntaxes should you use to accomplish the task?
find /tmp -cmin +3 -user Joe -ok rm {} \;
find /tmp -ctime +3 user Joe -ok rm {} \;
find /tmp -ctime +3 -user Joe -ok rm {} \;
find /tmp -cmin +3 user Joe -ok rm {} \;

Answer: C
You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. You want to know how many words are present in the file named file1.txt. You type the following command on the terminal: wc file1.txt. The command displays the following output:
40 245 1800 file1.txt How many words are present in the file file1.txt?
40
285
245
1800

Answer: C
Which of the following is NOT true about the inode table in the Linux operating system?
It contains the location information where data is stored in the hard disk.
It contains information about what type of access permission of the file is available to whom.
It contains the last access time, last modification time, however it does not store the last inode change time.
It contains the file type of the specified file.

Answer: C
You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. Rick, a Sales Manager, wants to combine the contents of the Sale1.txt and Sale2.txt files to a new file named FinSale.txt. Which of the following commands will he use to accomplish the task?
ls Sale1.txt Sale2.txt < FinSale.txt
cat Sale1.txt Sale2.txt < FinSale.txt
ls Sale1.txt Sale2.txt > FinSale.txt
cat Sale1.txt Sale2.txt > FinSale.txt

Answer: D
You work as a Network Administrator for company.com Inc. You have created a PostScript file by using a program. You want to convert it to a PDF file. Which of the following commands will you use to accomplish the task?
ps2pdf
enscript
pdf2ps
a2ps

Answer: A
Fill in the blank with the command to complete the statement below. Do not enter the full path of the command. The ________ command is used to compare the contents of two files for differences in the Red Hat operating system.
diff
differ
deff
daff
Answer: A
John is a newly appointed Network technician at McNeil Inc. The company has a Linux-based Network. John is currently working on the /tmp directory. The /tmp directory has a file named file3.txt. John wants to copy this file in a subdirectory named backup of his home directory /home/John. Which of the following commands should John use to accomplish his task? Each correct answer represents a complete solution. Choose three.
cp file3.txt /home/John/backup
cp file3.txt /home/John/backup/
cp file3.txt backup
cp file3.txt ~/backup

Answer: A,B,D
You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You want to modify a configuration file in a Linux server. Which of the following utilities will you use to accomplish the task?
VI
NMAP
MS Word
GZIP

Answer: A
Which of the following is a utility that can function as an independent spell checker?
spell
nice
aspell
inspell

Answer: C
You want to repeat the last command you entered in the bash shell. Which of the following commands will you use?
history !#
history !!
history ##
history !1

Answer: B
Which of the following SHELL commands displays currently logged-in users and their tasks?
w
finger
whoami
who

Answer: A
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to change the modified date and time of the file private.txt to 11 Nov 2009 02:59:58 am. Which of the following commands will John use to accomplish his task? Each correct answer represents a complete solution. Choose all that apply.
touch -t 200911110259.58 private.txt
rm private.txt #11 Nov 2009 02:59:58 am
touch private.txt #11 Nov 2009 02:59:58 am
touch -d "11 Nov 2009 02:59:58 am" private.txt

Answer: A,D
Which of the following are the Graphical Mail clients in Red Hat Enterprise Linux?
Each correct answer represents a complete solution. Choose two.
Pidgin
Mozilla
Evolution
mutt

Answer: B,C
You work as a Network Administrator for Net Perfect Inc. The company has a Linux-based network. By using the VI utility, you have created a document that has 100 lines. You want to replace all the occurrences of "net" with "Net" in the first 50 lines of the document. Which of the following commands will you use?
:1,$ s/net/Net/g
:1,100 s/net/Net/g
:1,50 s/net/Net/g
:s/net/Net/g

Answer: C
Which of the following commands will you execute to fix other writable files in your home directory?
find -perm -002 -exec chmod o-w {} \;
find /home -type d -ls
find ~ -perm -002 -exec chmod o-w {} \;
find ~ -perm -002 -exec chmod -w {} \;

Answer: C
John works as a Network Administrator for Perfect Solutions Inc. The company has a Debian Linuxbased network. He is working on the bash shell in which he creates a variable VAR1. After some calculations, he opens a new ksh shell. Now, he wants to set VAR1 as an environmental variable so that he can retrieve VAR1 into the ksh shell. Which of the following commands will John run to accomplish the task?
touch VAR1
env -u VAR1
export VAR1
echo $VAR1

Answer: C
You run the wc -c file1.txt command. If this command displays any error message, you want to store the error message in the error.txt file. Which of the following commands will you use to accomplish the task?
wc -c file1.txt >>error.txt
wc -c file1.txt 1>error.txt
wc -c file1.txt 2>error.txt
wc -c file1.txt >error.txt

Answer: C
 
 
Windows 7
What is the Minimum hardware Requirements for installing Windows 7 64-bit OS? 1 GHz processor, 1 GB Ram, 20 GB HDD, WDDM
1 GHz processor, 2 GB Ram, 16 GB HDD, WDDM
1 GHz processor, 2 GB Ram, 20 GB HDD, WDDM
2 GHz processor, 1 GB Ram, 20 GB HDD, WDDM
How to enable administrator account in Windows 7?
Net user active administrator
Net user administrator / active/yes
Net user administrator / active: yes
Net user administrator / active
Which command used for enable hibernates?
Powercfg –h on
Power –h on
Powercfg –h/on
Power –h/on
Windows logo key+F used for_______________.
a. Open the Search window
b. Select or move between desktop gadgets
c. Select or move between taskbar buttons
d. Open the Ease Of Access Center window
The aero shake feature will work if which of the following conditions are met? choose Two.
A display adapter compatible with WDDM is installed.
Aero features are downloaded from Microsoft.
The windows experience index is at least 2.
The windows experience index is 3 or greater.
Which of the following can be used to increase the physical memory on your Windows 7 pc and increase the speed?
Physical RAM
Aero Glass
DirectAccess
ReadtyBoost
Which of the following is used to control when the security pop-up notification are used?
Security Control Manager
User Account Control
User Account Control Panel
Notification Control Settings Manager
Which of the following operating system support an offline migration using USMT?
Windows 2000 professional
Windows XP professional
Windows Vista
Windows7
Which of the following is not a volume type usable by Windows 7?
FAT
exFAT
NTFS
All of the above
To establish a DirectAccess connection to the network, what is the first requirement?
Install a certificate
Create a VPN connection
A static IPv4 address
A static IPv6 address
You are using the sysprep tool to prepare a Windows 7 installing to be imaged .Which command-line option removes all unique system information from the installation?
/audit
/oobe
/generalize
/unattend
 
You wish to add file to a VHD. What action should you perform first?
ImageX /mountrw
In windows explorer .right-click the. VHD file and open.
In diskpart, select the disk and attach
Use DISM /online /apply
Which of the following will cause the online compatibility check to fail during a Windows 7 installation?
512MB of RAMA display adapter with WDDM support
A display adapter without WDDM Support but with SVIDEOAn 80 GB HDD
Which of the following must you download from Microsoft’s Web site to obtain USMT 4.0?
Windows any time update
Windows upgrade advisor
WAIKMicrosoft Application Compatibility Toolkit
Which of the following VPN types support the VPN Reconnect feature of Windows 7?
L2TP/IPsec
PPTP
IKEv2SSTP
You are responsible for managing company laptops that have Windows 7 installed at a small library. You want to prevent staff from uploading files using FTP to FTP sites but allow them to send outbound email messages using the Simple Mail Transfer Protocol (SMTP). Which of the following rules would you configure to achieve this?
Inbound rules
Outbound rulesIsolation rules
Authentication exemption rules
Your friend has installed new device drivers on his computer. Unfortunately it was a beta early release and his computer boots to a blank screen now. You help him out by restarting the computer and pressing F8. However, what Advanced Boot Option would NOT help fix the situation?
Enable Boot LoggingSafe Mode
Safe Mode with Networking
Last Known Good Configuration (Advanced)
Your friend has set up a wireless network at his home. He found it easy to set up the third party WAP from the local PC shop. However, his next door neighbour just informed him that she can access his network and do all her online shopping for free. Since your friend does not really like his neighbor he wants to stop this happening. What should he do?
Enable Windows Firewall
Change the security settings of his WAPChange the SSID for the WAP
Implement 802.11i
Which file in Windows 7 is cataloged by windows system image manager to create and answer file?
Boot.wim
Install.wim
Setup.exe
Install.wim
Answer: B
In which format is the answer file of customized Windows 7 image is stored?
Text
Batch
Exe
XML
Answer: D
Which version of TPM is required for configuring bitlocker in Windows 7?
TPM 1.0
TPM 1.2
TPM 2.0
None
Answer: B
 
You have installed Windows 7 in a client machine which had winsowsXp installed. Which operation you will perform to remove windows Xp installation data from the machine?
Simply Delete windows.old folder from the system drive
Do not perform any operation
Use disk cleanup and remove previously installed windows installation(s)
Run bcdedit
Answer: C
Which is the next immediate step you will perform after you have created a native virtual hard disk to access the disk?
Initialize the disk as an MBR
Create a partition
Both of the above.
None of the above.
Answer: C
 
You want to restrict a user to log on to a Windows 7 client during lunch hours. What will you do?
Define parental control for time limits for the user
Go to local security policy and define the restriction
Configure windows firewall and advanced settings.
Disable his account every time during lunch hours.
Answer: A

Windows7 desktop might contain additional desktop icons and toolbars automatically When?
upgraded to Windows 7 from a previous version of Windows
upgraded to Windows 7 from xp SP2 version of Windows
none
Answer: A Which statement is incorrect?
In Windows Vista, gadgets are lined up on the right side of the desktop.
In Windows 7,gardgets sets them free on the screen
Windows 7 supports gadgets such as news headlines and updates
None of them.
Answer: D
 
To restrict users to do not use more than 3GB, What option you will Select
Enable Disk Quota
From Disk Management, shrink partition
Set limit profile size policy
None
Answer: A Using _____________we can add space from one or more additional disks
Stripped volume
RAID
Shrink volume
Extended volume
Answer: D
 
 
 
What command you will use to format partition through command prompt
Format <drive letter>
Format <drive letter> NTFS
Format fs=ntfs
None
Answer: C
 
Systems have sufficient capability to configure itself IP that is called____________.
CMD
IPCONFIG
APIPA
DHCP
Answer: C
__________________ allow to multiple levels of subnetting and address allocation between Internet and Intranet subnet in a company?
IPv4
IPv6
IPv4 & IPv6
None
Answer: C
Which following steps to increase security in your own wireless network? Choose all that?
Turn on WPA encryption
No auto connection to open wireless networks
Network should be turned off when not in use
None
Answer: A, B, C

______________Which simplifies the file sharing and printing process on small networks in Windows 7?
HomeGroup
Simple sharing
Sharing
Network sharing
Answer: A
A copy of data accessed from intranet Web and file servers is cached locally within the branch office when BranchCache is _________
Disabled
Not configure
Enabled
Answer: C
How to access file and folder though network?
\\ computer name
// computer name
\\ computer\Ip
None
Answer: A
 

In following Which is Class B IP?
126.254.255.255
191.255.255.254
192.127.156.134
223.123.124.234
Answer: B
What is the port number of HHTP?
443
68
80
23
Answer: C
Which Security option is not available in windows7?
Action Center
AppLocker
Bitlocker
None
Answer: D

Encrypting File System is not available in Windows7_______.
Ultimate
Professional
Enterprise
Home basic
Answer: D
In Software Restriction Policies, when you configure two conflicting rules for a particular program?
The most specific rule takes precedence.
We can’t configure policy.
Default first will be applied
Default second will be applied.
Answer: A
____________Tool protects your PC against hackers and malicious software?
User Account Control
Local policy
None
Answer: A
Which is a new feature of Internet Explorer 8?
SmartScreen Filter
Advanced tab
Favorites
Safety
Answer: A
 
Before the process of encrypting the drive, it’ll ask to save a recovery file why?
It required for encryption.
Used if the password is forgotten
Used for decryption.
None
Answer: B
Which command used for Local Security Policy?
Secpol.mmc
Secpol.msc
MMC
Services.msc
Answer: B
 
In Windows 7, the computer creates an EFS certificate and private key when?
While Encrypts a file.
The first time a user encrypts a file.
While Planning encryption.
None
Answer: B
 
You are a parent you want restrict your child by using system from 10:30 to 1. Which option you will be use?
User account and settings
Parent control
Local policy
None
Answer: B
Which statement is wrong? Choose all that?
With AppLocker you can block a specific application from running
EFS uses public key encryption process
BitLocker is a system protection feature
With help of local policy limited user can change admin password.
Answer: D
 
What are tools included in WDI? (choose all that apply)
Memory
Power Saver
Network
Startup
Answer: A,C,D
A user wants to take backup of system drivers, so what option he will use?
Restore backup
System image backup
Copy backup
Differential backup
Answer: B
A user wants check performance of Windows 7, which tool he will use?
Performance tools
Diagnostics tools
Backup tools
All three
Answer: A
A user using a dual-boot win XP & win 7 he want to create event log when the system will start, so what option he will use?
Startup and Recovery
Event track
Network Diagnostics tool
None of the above
Answer: A
 
A user want to create power plan for his laptop in Windows 7 what option he has to be select?
Balanced
Power saver
High performance
None
Answer: A
What type of unicast IPv6 address would you typically use on the subnets of a private network to implement IPv6 connectivity over subnet?
Site-local address
Link-local address
Special address
Anycast address
Answer: A You are examining a DNS forward lookup zone to investigate problems with name resolution. What type of resource record enables DNS to resolve a host name to on an IPv6 address?
PTR
Host
AAAA
LMHost
Answer: C Which of the following VPN types support the VPN reconnect feature of Windows 7?
PPTP
L2TP/IPSec
SSTP
IKEv2
Answer: D
 
Windows logo key+X used for___________?
Windows Mobility center
windows Project manager
Open the Ease Of Access Center window
None
You wish to view detailed license information. What action should you perform?
msconfig.exe
slui.exe
slmgr.vbs
<somethingsomething>.vbs
Which of the following command-line utilities can you use to display a copy of the IPv4 and IPv6 routing tables on a computer running Windows 7
?Tracert
Netstat
Ipconfig
Ping
Which format do the application installation files have to be in to be added to a Windows Image (WIM) file using the Deployment Image Servicing and Management (Dism.exe) tool?
WIM
EXE
virtual hard disk (VHD)
Cabinet (CAB)
98.
Which of the following tools should you use on a computer running Windows 7 to increase the size of the offline file cache?a. System Protection
b. Disk Managementc. Sync Centerd. Advanced System Settings
Moderate
WDDM stands for________________________
Windows Display Device Model
Windows Display Driver ModelWindows Display Driver Manage
Windows Device Drivers management
ISATAP stands for __________________________________?
Internet automatic transport addressing protocol
Intranet automatic transport addressing protocol
Intra-site automatic tunnel addressing protocolNone
Windows Aero option is not available in___________. Windows 7 Starter
Windows 7 Home Premium
Windows 7 Professional
Windows 7 Ultimate
Answer: A
Windows Aero peek used for_______________ open programs and windows?
close
Minimize and restore
Minimize and maximize
None
Answer: B Which is Missing Features of windows7 apart from vista?
Windows Movie Maker
Aero
instant search
none
Answer: A
What option will allow multiple user logging in a single system without log off other user account?
Sleep
Hibernate
Switch Users
Lock
Answer: C
Which command used to shutdown Windows 7?
shutdown /s
Shutdown /f
Shutdown / /s
shutdown -s
Answer: A

Which option help you quickly find and start any program or file on your computer in windows7?
CMD
RUN
Instant Search
Start menu
Answer: C
Windows 7 provides two different user interface experiences that is _______________?

Basic experience for entry level systems and a more visually dynamic experience
Basic experience for entry level systems and a more command experience
Basic experience for entry level systems only.
None
Answer: A
What is the command is used for driver display utility?
Displayswitch.exeDispwitch.exe
Displays.exe
Switch.exe
Answer: A
AER O stands for______________
Authentic Energetic, Reflective and Open,
Authentic, Energetic, Reflective and Optional
Authentic, Energetic, Reliable and Operational
None
Answer: A
By default on a
MBR disk, you can create a maximum of __ Primary partitions and __Extended 1, 3
2,2
3,1
3,3
Answer: C
In Windows 7 how many Logical drives can create____
A.24
B.128
C.22
none of the above
Answer: B
We can make a logical drive or an extended drive partition active?
True
False
Answer: B
 
How many active partitions can we make in basic disk using Windows 7
A.2
B.3
C.1
D.4
Answer: C
Which are the different classes of IPv4?
A , B , C , D & E
A , B , C Only
A & B
None
Answer: A
Windows Security Center is now called_______________ in Windows 7.
Action Center
Security Center
None
Answer: A
By Default firewall is _________________.
ON
OFF
Not Configure
Hidden
Answer: A
WDI stands for _____________?
Windows Display Interface
Windows Diagnostic Infrastructure
Windows Diagnostic interface
Windows Data Interface
Answer: B
DEP stands for ______________?
Data Execution Prevention
Data encryption prevention
Data exchange program
None of the above
Answer: A
Sync center is used for _____________?
For sharing files
For up-to-date between the computer
For networking
None.
Answer: B
WEP Stands for ______________?
Wired Equivalent Privacy
Wireless encapsulation protocol
Wireless encrypted protocol
Wired Equivalent protocol
Answer: A
TKIP stands for_______________?
Transport Kit Integrity Protocol
Temporal Key Integrity Protocol
Transfer Key Integrity Protocol
Transmission Key Integrity Protocol
Answer: B PING stands for_________________________?
Packet Internet gateway Protocol
Packet internet groper
Packet internetwork gateway protocol
Packet intranet groper
Answer: B Difficult
How to migrate roaming user profiles data from Windows XP or Windows Server 2003 (Version 1) to Windows 7 or Windows Server 2008 (Version 2) Choose all that apply?
Use the User State Migration Tool 4.0 to migrate profile data to the new format
Use the Folder Redirection feature to share data between Version 1 and Version 2 user profiles.
Use windows ACT tool.
None
Which of the following is true of Windows7?
Mailcentral is included as the new default mail client with windows7.
Outlook Express is included with windows7
Microsoft Outlook is included with windows7
There is no preinstalled mail client included with windows7
You have that runs Windows 7. You perform regular data backups and system image backups. The computer experiences a HDD failure. You replaced a failed HDD. You need to recover the computer to the previous Windows 7 environment. You start the computer from the Windows 7 installation media. Which recovery option should you select?
Command prompt
Startup Repair
System Image RecoverySystem Restore
In which of the following scenarios must you perform a migration rather than an upgrade? (choose all that apply)
Windows XP Professional (X64) to Windows 7 professional (X64)
Windows vista business (X86) to Windows 7 professional (X64)
Windows vista business (X64) to Windows 7 professional (X64)
Windows vista Home Premium (X64) to Windows 7 Premium (X86)
You can use ___ to create an answer file that partitions and formats a disk before installing Windows, changes the default setting for the Internet Explorer home page, and configures Windows to boot to Audit mode after installation. By modifying settings in the answer file, it can also install third-party applications, device drivers, language packs, and other updates
Fill in the blank.
Windows SIMWIN PE
Sysprep
ImageX
You have windows Xp professional installed in the client computer. Your organization asks you have Windows 7 installed in the same machine. Which of the following step you will perform to do the required?
Insert Windows 7 DVD and select upgrade option
Insert Windows 7 DVD and select Custom install
Either of the above
None of the above
Answer: B
You need to migrate from windows Xp to Windows 7 by using windows easy transfer in the same machine. What will be you favorable procedure?
Upload the user profile data to a file server by using windows easy transfer
Use windows easy transfer cable
Use a UFD media to store the migration data and the fresh install Windows 7 and restore.
Copy paste the user profile data to a secondary storage or drive and paste when Windows 7 is installed.
Answer: C
You have installed an application in Windows 7 which was properly working with windows Xp sp2 but is not responding properly and asks for administrative credentials in Windows 7. Which of the following you will do to solve this issue?
Re-install the program
Modify the UAC
Change drive location during installation
Use Compatibility troubleshooter to fix the problem
Answer: D
You are the system administrator of you company. One of your client computer installed with Windows 7 is deployed as a file server. It is manually backed up by the administration. A new user is assigned the job to do the same. What you should do to have this standard account to perform the given operation without administrative privileges.
Make the user as a member of administrators group.
Make the user as a member of backup operators
Make the user as a member of power user.
A standard user account can default perform the given task.
Answer: B
You’re using computer that runs Windows 7. How you will identify all device drivers installed on the computer are digitally signed
Device managerclick for hardware changes
Choose the devices by connection view from device manager
Sigverif.exe run at command prompt
Answer: C

Which argument is wrong?
The IPv6 node is represented by IPv4 mapped address.
IPv6 tools Netsh Interface can be used to implement IPv6-IPv4 compatibility
(EFS) allows for the encryption of individual files and folders
IPv4 have classified in to 3.
Answer: D
A user has created his own desktop settings in his system , he went out for some work in between that some body has changed his system setting. When that user comes to his place he finds that some one has changed his system setting now he wants to restore that settings what tool he will use.
WDI tools
System restore
Backup tools
All
Answer: B
Sachin’s user account is a member of four separate security groups that are each assigned with different permissions to a folder on a client running Windows 7. Which of the following tools can you use to determine Sachin’s permissions to a hosted file in that folder?
Robocopy
Lcacls
Cipher
The effective permission tool
Answers: D
Which of the following messages on a computer running Windows 7 enterprise’s network status icon indicates that the computer has connected to your organization’s Direct Access server successfully?
Local Internet Access
Limited Connectivity
Internet and Corporate access
Local Access Only
Answer:CWhich of the following products can you use to view potential compatibility issues for intranet Web sites and Web applications?
Microsoft Baseline Security Analyzer (MBSA)
Microsoft Deployment Toolkit
Windows Automated Installation Kit (Windows AIK)
Microsoft Application Compatibility Toolkit (ACT)
100. Which of the following programs or items can you use to configure a specific device so that it is able to wake your computer running Windows 7 from a sleep state?
Performance Information And Tools
Powercfg.exe
Power Options
Device Manager
 *********** 
Communications Skills
 
I. Choose the right synonym for the highlighted words1. Mr. Huge was very proud of his auto superstore. "We have such an extensive selection of cars," he said, "so everyone should find a vehicle that he or she will love!"
The word "extensive" means __________.
costing a lot of money
large amount
having no color
not enough
B, 1
2. Friendship is a priceless thing. If Chris put a price or conditions on her friendship, it’s no longer priceless. In fact, it’s not real friendship at all!
If something is priceless, __________.
it has a missing tag
it has no value
it has great value
it is made out of rice
C, 1
3. The news story was based on a letter that was a fabrication. Now the reporter who wrote the story is in big trouble. Will anyone believe him again?
A fabrication is __________.
made of cloth
full of long words
funny
fake
D, 1
4. The reporter insisted that the letter he used was authentic. He said that he had shown it to many experts before he used it in his story.
When something is authentic, it’s __________.
a. genuine, or real
carefully written
full of tasty worms
very old
A, 1
5. In 1975, Governor James promised to do something about the high taxes in our state. She didn’t present a tax cut bill to lawmakers until 1985. It took her a decade to keep her promise, but better late than never.
How long is a decade?
75 years
85 years
a century
10 years
D, 1
6. Chose the word that means the same as: leader
Match
Fever
Chief
Settle
C, 1
7. Choose the word that means the same as: want
Advance
Produce
Honor
Desire
D, 1

8. Choose the word that means the same as: student
Pupil
Industry
Determine
Advantage
A, 1

9. Choose the word that means the same as: bother
Disturb
Qualify
Influence
Afford
A, 1

10. Choose the word that means the same as: immediate
Angle
Instant
Earn
Recent
B, 1
II. Fill in the blanks11. The train to Rotterdam __________ at 6 pm sharp.
exits
goes
departs
deserts
C, 1.4
12. Have you heard that Mrs. Andrews __________ from the board of directors?
Departed
Abandoned
Deserted
Resigned
D, 1.4
13. This exercise was very difficult and I finally__________.
Left
Resigned
Departed
Gave up
D, 3.4
14. Disloyal sailors often ___________ their ship.
Abandon
Give up loyal
Desert
Depart
C, 3.3
15. You have to ___________ smoking because it's not good for you!
Leave
Quit
Abandon
Resign
B, 2.2
16. It is a complete waste of time ____________ over who was to blame; the main thing we have to do is decide what to do next.
arguing
discussing
repeating
considering
A, 5.2
17. Feel free to visit anything of interest to you in the exhibition and also you can __________ of any of the refreshments available.
retake
undertake
partake
intake
C, 5.2
18. I assure you that you will have no problem with the task because it is as easy __________ can be.
as
than
and
it
A, 8.1
19. My desk is a __________, I should clean it.
messy
slob
mess
sloppy
C, 10.1
20. Valerie spilled water __________ my paperwork.
in
on
at
across
B, 1.7
 
III. In the sentences given below, a phrase is highlighted. Select the option that closely matches with the highlighted phrase. 21. I cannot understand why she did that, it really doesn't add up.
doesn't calculate
isn't mathematics
doesn't make sense
makes the wrong addition
C, 3.1
22. All the students got high marks in the test but Mary stood out.
got a lot of marks
got higher marks than someone
got very good marks
got the most marks of all
D, 3.1
23. He has sold his house and has no job and so now he has next to nothing.
he is unemployed
he has almost no money
he has a few things
he has nothing at all
B, 3.1
24. The manager dismissed the new proposal out of hand and said that it was not at all practical.
quickly
utterly
directly
simply
B, 3.1
25. As she is new to the job I would ask you to keep an eye on her for the time being.
Look at
Consider
Check
Observe
D, 3.1
26. The opposition in parliament accused the government of playing games and refusing to accept the seriousness of the situation.
being light hearted
being heavy hearted
being down hearted
being faint hearted
A, 3.2
27. He accused her of talking through her hat and refused to accept a word of what she said.
talking sense
talking straight
talking nonsense
talking tough
C, 3.1
28. Without my glasses I can't see where I'm going in fact I'm as blind as a bat.
very short sighted
very long sighted
very far sighted
very clear sighted
A, 3.1
29. I get very irritated sometimes because they're always up with the lark and I like to lie in.
up very easily
up very early
up very often
up very noisily
B, 3.1
30. I would advise you to do that as well and in that way you'll kill two birds with one stone.
get things done twice
get something done two times
get two things done at the same time
get two things done twice
C, 3.2
IV. Match the words given below with its most appropriate meaning. 31. Paradox
a statement that seems to contradict itself but contain some truth
using spies or observers
the state of something or someone
The act handing or running something, usually a business.
A, 11.1
32. Document

Act of moving, action
A newcomer, a beginner, someone new to something
An official paper
On opportunity: a happening, instance or celebration
C, 11.1
33. Annual
Yearly
Being alone
Qualified, worthy to be chosen
Able to move
A, 11.1
34. Capable
Aware, having knowledge of oneself
Friendly, agreeable
Having the ability to do something: having the traits necessary to perform some action
Native, having been born in a specific. Area or environment.
C, 11.1
35. Chronicle
A list of written works
A place where one goes to hear something
A historical account arranged in order of time
A letter to be sent
C, 11.1
36. Translucent
Having a large body
Allowing some light to shine through
Dead
Lack of experience, not knowledgeable of the world
B, 11.1
37. Attest
To ruin, to pull down
To break or burst
To train, to provide schooling for
To provide proof, to say something is true
D, 11.1
38. Auction
A sale of goods to the highest bidder
The position of a body
One who believes that any ultimate reality I unknowable
A living creature
A, 11.1
39. Chronological
Holing or sticking to something
Uttered by she voice, producing sound
Arranged in order of time
Related to the mind
C, 11.1
40. Diagnose
To recognize (disease) by symptoms
To accept, to confess, to allow entry
To come to a conclusion from facts or ideas, to guess
To twist into an abnormal shape
A, 11.1
 
 
 
Digital Electronics
PART – A

 
 
In this ___________system, the digits are 0to 9 and A to F.
Binary
Octal
Hexadecimal
Decimal
Ans : C
What is term called for the product of the binary number after taking its two’s complement twice?
One’s complement
Two’s complement
Double complement
None of these
Ans : C
ECL stands for_____________
Emitter Controlled Logic
Emitter Connected Logic
End Coupled Logic
Emitter Coupled Logic
Ans : D
Which of one of this number system is having eight digits in it?
Decimal
Hexa Decimal
Binary
Octal
Ans : D
An Op-amp configuration where the output waveform is the integral of the input wave form is called___________
Summing Amplifier
Inverting Amplifier
Differentiator
Integrator
Ans : D
A + 0 = ______
0
1
A
None of the above
Ans : C
2’s complement of 01101 is __________
10111
001101
01110
10011

Ans : D
What is the Output of a 3-input NAND gate with A = 1, B = 0 and C = 1?
0
1
0.5
None of the above
Ans : B
 

If the capacitor and resistor in the Op-amp Integrator is replaced, it forms a ____________.
Integrator
Differentiator
Voltage Follower
Summing Op-amp
Ans : B
_____ adds two binary digits and produces two binary outputs called Sum and Carry.
Half Adders
Full Adders
Binary Adders
None of the above
Ans : B
 
In the Exclusive – NOR Gate (XOR), if the input A is low and the input B is high, then the output is __________.
Low
High
Very High
Very Low
Ans : A
 
 
Laptop Maintenance
1) The size of the PC card is __________?
85.6mm X 54.6mm
85.6mm X 54.0mm85.0mm X 54.0mm
85.0mm X 54.6mm
2) Lightscribe is used for _____________?
a) Renaming Discs
b) Labeling Discsc) Both
d) None of the above
3) Which battery has long life?
a) Nickel cadmium Batteries
b) Nickel Metal Hydride Batteries
c) Lithium Ion Batteriesd) All of the above
4) If the video does not work, No need to replace the motherboard
a) True
b) False5) WI-FI is based on which standards?
a) IEEE 802.6
b) IEEE 802.11c) IEEE 802.12
d) IEEE 802.15.1
6) IEEE 802.3 is standardized for?
a) Cellular WAN
b) GPRS
c) Bluetooth
d) Ethernete) Infrared
7) Under what frequency range does Bluetooth work?
2.4-2.5 GHZ2.3-2.4 GHZ
2.5-2.6 GHZ
None of the above
8) Is it possible to connect multiple Bluetooth hubs?
a) Yes
b) No9) What is the total number of masters and slaves in a piconet?a) 1 Master and 7 Slavesb) 2 Masters and 7 Slaves
c) 1 Slave and 7 Masters
d) 2 Slaves and 7 Masters
 
 
10) Video is integrated to the motherboard?
a) Trueb) False
11) Which is a Hot-Swappable device for laptop?
a) USB Deviceb) Touchpad
c) Keyboard
d) Processor
12) Docking station has external ports
a) Trueb) False
13) Which company originally conceived and developed Bluetooth?
a) Ericssonb) Samsung
c) Motorola
d) LG
14)
Do Bluetooth devices need line of sight to connect to one another?a) Yes
b) No15) Which are the main types of connection used by Bluetooth?
a) Single Slave
b) Master Slave
c) Scatternet
d) All of the abovee) None of the above
16) Which method is used for Data transfer in Bluetooth?
a) ASCII Control Language (ACL)
b) Asynchronous Connectionless (ACL)c) Access Control List (ACL)
d) Analog Configuration Line (ACL)
17) Which of the following defines hot-swapping?
a) Installing new devices without the need for a driver
b) Removing and adding internal devices without rebooting
c) Removing and inserting PCMCIA cards while the system is runningd) All of the above
18) SODIMM stands for which of the following?
a) Special Operations for Digital Image Multimedia
b) Some Other Dual In-line Memory Module
c) Small Outline Dual In-line Memory Moduled) None of the above
 
 
 
 
19) After inserting a PC card into a notebook computer, the system does not recognize the card. Which of the following could be the problem?
a) No drivers were installed for the card
b) The card was inserted in the wrong slot type
c) The notebook computer does not support PCMCIA
d) Socket or card services have not recognized the card20) Which of the following resolution standards are used for notebook computer displays? (Choose three.)
a) UGA
b) SVGA
c) XGA
d) SXGA
21) What type of power supports the video display on a portable PC?
a) AC power only
b) DC power onlyc) AC power when the PC is plugged in or DC power when it is not plugged in
d) Either AC or DC at the user’s choice
22) All the laptop components are not upgradeable
a) Trueb) False
23) Which standards do Cellular WAN follow?
a) Globe System for Mobile Communication (GSM)
b) Code Division Multiple Access (CDMA)
c) General Packet Radio Service (GPRS)
d) All of the above
e) None of the above
24) The kind of data transfer required for Infrared
a) Light of sight
b) Line of sightc) Line of Projection
d) None of the above
25) The first laptop was called as __________?
a) Notebook
b) Osborne1c) Subnotebook
d) None of the above
26) What features led to the popularity and favorability of Portables over Desktop computers
a) Portable weight
b) Small size
c) Less heat dissipated
d) All of the above
 
 
 
27) What are types of batteries available in the market?
a) Nickel Cadmium Batteries
b) Nickel Metal Hydride Batteries
c) Lithium Ion Batteries
d) All of the abovee) None of the above
28) Which technology is used in Bluetooth for avoiding interference?
a) Frequency hoppingb) Frequency Multiplexing
c) Phase locked looping
d) Pulse-code Modulation
29) Expand PCMCIA __________
a) Personal Computer Memory Card International Associate
b) Personal Computer Memory Card International Associationc) Peripheral Components Memory Card International Association
d) Peripheral Components Memory Card International Associate
30) How many types of PC cards available?
a) Two
b) One
c) Threed) Five
31) Hibernate mode uses lesser power than the standby mode.
a) Trueb) False
32) Which is the first commercial Toshiba laptop models introduced in 1987?
a) T1000 & T1200b) T2000 & T2200
c) T1000 & T2200
d) T1000 & T2200
33) When was NEC_Ultralite released?
a) 1985
b) 1989c) 1993
d) 1987
34) The first Apple machine was designed for _______________ Operating System
a) Windows
b) Linux
c) Macintoshd) Unix
35) The total amount of time that a portable system can work on battery is dependent on
a) Low-power components
b) Power management protocols
c) Battery technology
d) All of the above36) Generally laptop will be _____________ the price of the desktopa) Twiceb) Equal to
c) Less than
d) Greater than
37) Which is the first standalone operating system for Tablet-PC?
a) Windows XP Tablet-PC Editionb) Windows Vista Ultimate
c) Windows Vista Home Premium
d) Windows Vista Business
38) Pentium III processors can run at………………..Mhz?
a) 300
b) 366
c) 400
d) 60039) Processor running with AC power will switch to ___________ mode?
a) Battery optimized
b) Maximum performancec) Sleep
d) Hibernate
40) What does PGA stands for?
a) Pin Grid Arrayb) Portable Grid Array
c) Pin line Grid Array
d) None of the above
41) What does BGA stands for?
a) Board Grid Array
b) Ball Grid Arrayc) Back Grid Array
d) All of the above
42) The PCMCIA slot in notebooks has male _________ connector?
a) 68 pinb) 58 pin
c) 60 pin
d) 40 pin
43) PCMCIA card runs at ________ volts?
a) 1.8
b) 2.9
c) 3.3d) 1.7
44) The different types of PCMCIA cards available in the market are
a) Type 1, Type 2, Type 3b) Class 1, Class 2, Class 3
c) Class A, Class B, Class C
d) All of the above
45) The thickness of Type 2 card is _________mm
a) 3.3
b) 5c) 10.5
d) 8.5
46) Type 3 card is used for __________
a) Rotating Discs
b) Hard Disc Drive
c) Both A & Bd) None
47) TFT stands for __________
a) Thick film transistor
b) Thin film transistorc) Both A & B
d) None
48) What are the shortcut Function keys to open help and support screen in hp laptops?
a)
Fn+F1b) Fn+F2
c) Fn+F3
d) Fn+F4
49) What does WI-FI stands for?
a) Wi-Fi Alliance
b) Wireless fidelityc) Both A & B
d) None of the above
50) The area covered by one or more interconnected access points is called a ………..?
a) Warm spot
b) Cold spot
c) Hot spot d) Community
51) Some of the disadvantages of Wi-Fi compared to other standards are?
High power Consumption
Limited excessive Wi-Fi access pollution
Interference
All of the above52) A ___________ covers much more extensive area than wireless lansa) WWANb) WLAN
c) WPAN
d) WAN
 
 
 
 
53) Which is the backbone of Ethernet based computer networking technology?
a) Ethernet Hub
b) Ethernet Switchc) GPRS Gateway
d) GPRS Modem
54) Maximum range for the connection to be established in Class C Bluetooth technology is
a) 10 Mtsb) 100 Mts
c) 50 mts
d) 30 mts
55) What is the data transferred speed defined by SIR?
a) 115.2Mbps
b) 115.2Kbpsc) 4Mbps
d) 16Mbps
56) The data transfer in infrared technology is _________?
a) Limited to line of sightb) Not limited to line of sightc) Resistant to interferenced) Not Resistant to interference
57) If you have to connect two computers directly you will have to use _________?
a) Straight cable
b) Cross over cablec) Roll over cable
d) Co-Axial cable
58) Power plan option is used in windows vista to apply __________ settings to the Notebook?
a) Powerb) Sound
c) Display
d) Network
59) The over heating problems in the laptops will ______ and ________of the laptops?
a) Shorten the life
b) Decreases the reliability
c) Platform cooling
d) Both A&B 60) Overheating is one of the serious problems associated with the laptop.a) Trueb) False
 
 
 
61) If the OS one your laptop is windows NT/2000/XP it uses _____ file system to protect your data from theft?
a) FAT 16
b) FAT 32
c) FAT
d) NTFS62) Biometric identification system allows your finger prints to be your login ID.
a) True
b) False63) __________ will turn your new drive into the exact replica of the old one.
a) Formatting
b) Deletion
c) Cloningd) Updating
64) It is always advice to take backups of important data in regular intervals.
a) Yesb) No
65) ________ comes with a powerful encryption system that adds an extra security for drives, folders or files.
a) Windows 95
b) Windows 98
c) Windows 2000d) Windows NT
66) Which are the two versions of Bluetooth technology?
a) 1.2 & 2.0+ EDR
b) 1.5 & 2.0+ EDR
c) 1.2 & 2.5+ EDR
d) 1.2 & 1.2+ EDR
67) If you want a very good display, then assigns more amount of RAM for display.
a) Trueb) False
68) The most popular Wi-Fi standard which uses Complimentary Code Keying(CCK) is _____
a) 802.11bb) 802.11a
c) 802.11g
d) 802.11n
69) Which is the Wi-Fi standard which is known as WiMax which combines the benefits of both Broadband and Wireless?
a) 802.11b
b) 802.11a
c) 802.16d) 802.11g
 
70) What is the frequency & data transfer rate of 802.11a standards?
a) 5 GHZ, 54Mbpsb) 2.4GHZ, 11Mbps
c) 2.4GHZ, 54Mbps
d) 2.4GHZ, 140 Mbps
71) Small size of IDE drives can hold _________
a) 10GB
b) 20GB to 30GBc) 30GB to 40GB
d) 40GB
72) What are the two different sizes of SO-DIMM modules available?
a) 2.375inch
b) 2.625inch
c) 2.525inch
d) 2.750inch
73) Telecommunication industry specification describing how mobile computers can be easily interconnected using a short run wireless connection.
a) Bluetoothb) Infrared
c) Wi-Fi
d) GPRS
74) An amount of memory which stores the data temporarily to compensate for difference in data transmission from one device to another
a) Latch
b) Flip-Flop
c) Bufferd) Cache
75) _________ is the process in which saving of image of your desktop with all open files & documents and power down of your computer happens.
a) Hibernationb) Sleep mode
c) Shutdown
d) Restart
76) The common desktop systems mostly uses _________ monitor for display
a) Liquid crystal display
b) Cathode ray tubec) Thin film transistor
d) None of the above
77) What is the code name for speed step technology?
a) Geyser Villeb) Core2duo
c) Paxville
d) None of the above
 
 
 
 

0 comments:

Post a Comment

 
Top