A user reports that they walked away from their laptop for 30 minutes and when they came back the screen was very dim. The user tried moving the mouse and increasing the brightness setting, but neither worked. Which of the following should the technician do FIRST?A. Plug in an external monitor to test the video card.B. Run a check disk scan to verify there is no corruption.C. Check if the laptop is now on battery power.D. Have the LCD screen replaced with a known good screen.2.Which of the following BEST describes a situation that would require STP cable?
A. Installation in an area with low EMIB. Installation in an area with high EMIC. Installation in an air handling spaceD. Installation in an area with high humidity3. Which of the following will allow the use of BitLocker if the computer does not have a TPM chip?
A. External hard driveB. SCSI hard driveC. USB keyD. CD-ROM drive4. A customer reports that their computer is displaying ‘operating system not found’ while booting. The technician confirms that the computer booted fine the previous day and that no devices were added. The technician also confirms that no software changes were made to the system from the previous day. Which of the following is the problem?
A. The network cable is unplugged.B. A diskette was placed in the disk drive.C. The keyboard is unplugged.D. The system has been infected with spyware.5. A new video card requires a 600 watt power supply. The power supply should have how many pins on the main cable?
A. 12B. 20C. 24D. 2620. Which of the following utilities will a technician use to find out system information, drivers, running print jobs, and Internet setting all from one location?
A. MSINFO32B. REGEDITC. Device ManagerD. MSCONFIG21. Which of the following interfaces does a sound card use?A. PCIB. SATAC. SCSID. AGP22. Which of the following would MOST likely be used to aid a technician in the removal of spyware?A. ASRB. Safe ModeC. Restore PointD. Recovery Console23. A technician is installing a new small form factor motherboard. Which of the following form factors is the technician MOST likely installing?
A. Micro ATXB. NLXC. ATXD. BTX24. Which of the following maintenance utilities is used to reorganize files on a hard drive?A. SCANDISKB. DEFRAGC. CHKDSKD. Disk Cleanup25. Which of the following is the number of devices that can be daisy-chained to an IEEE 1394 port?A. 7B. 15C. 63D. 127
 
 
 
 
 
Communication & personality Development
Mr. Huge was very proud of his auto superstore. "We have such an extensive selection of cars," he said, "so everyone should find a vehicle that he or she will love!"
The word "extensive" means __________.
costing a lot of money
large amount
having no color
not enough
Friendship is a priceless thing. If Chris put a price or conditions on her friendship, it’s no longer priceless. In fact, it’s not real friendship at all!
If something is priceless, __________.
it has a missing tag
it has no value
it has great value
it is made out of rice
 
The news story was based on a letter that was a fabrication. Now the reporter who wrote the story is in big trouble. Will anyone believe him again?
A fabrication is __________.
made of cloth
full of long words
funny
fake
 
The reporter insisted that the letter he used was authentic. He said that he had shown it to many experts before he used it in his story.
When something is authentic, it’s __________.
genuine, or real
carefully written
full of tasty worms
very old
 
In 1975, Governor James promised to do something about the high taxes in our state. She didn’t present a tax cut bill to lawmakers until 1985. It took her a decade to keep her promise, but better late than never.
How long is a decade?
75 years
85 years
a century
10 years
Paradox
a statement that seems to contradict itself but contain some truth
using spies or observers
the state of something or someone
The act handing or running something, usually a business.
Document

Act of moving, action
A newcomer, a beginner, someone new to something
An official paper
On opportunity: a happening, instance or celebration
Annual
Yearly
Being alone
Qualified, worthy to be chosen
Able to move
Capable
Aware, having knowledge of oneself
Friendly, agreeable
Having the ability to do something: having the traits necessary to perform some action
Native, having been born in a specific. Area or environment.
 
Chronicle
A list of written works
A place where one goes to hear something
A historical account arranged in order of time
A letter to be sent
 
Translucent
Having a large body
Allowing some light to shine through
Dead
Lack of experience, not knowledgeable of the world
Attest
To ruin, to pull down
To break or burst
To train, to provide schooling for
To provide proof, to say something is true
Auction
A sale of goods to the highest bidder
The position of a body
One who believes that any ultimate reality I unknowable
Chronological
Holing or sticking to something
Uttered by she voice, producing sound
Arranged in order of time
Related to the mind

Diagnose
To recognize (disease) by symptoms
To accept, to confess, to allow entry
To come to a conclusion from facts or ideas, to guess
To twist into an abnormal shape
 
Digital electronic
In this ___________system, the digits are 0to 9 and A to F.
Binary
Octal
Hexadecimal
Decimal
What is term called for the product of the binary number after taking its two’s complement twice?
One’s complement
Two’s complement
Double complement
None of these

ECL stands for_____________
Emitter Controlled Logic
Emitter Connected Logic
End Coupled Logic
Emitter Coupled Logic
Which of one of this number system is having eight digits in it?
Decimal
Hexa Decimal
Binary
Octal

An Op-amp configuration where the output waveform is the integral of the input wave form is called___________
Summing Amplifier
Inverting Amplifier
Differentiator
Integrator

A + 0 = ______
0
1
A
None of the above

2’s complement of 01101 is __________
10111
001101
01110
10011
What is the Output of a 3-input NAND gate with A = 1, B = 0 and C = 1?
0
1
0.5
None of the above

If the capacitor and resistor in the Op-amp Integrator is replaced, it forms a ____________.
Integrator
Differentiator
Voltage Follower
Summing Op-amp
_____ adds two binary digits and produces two binary outputs called Sum and Carry.
Half Adders
Full Adders
Binary Adders
None of the above
11 In the Exclusive – NOR Gate (XOR), if the input A is low and the input B is high, then the output is __________.
Low
High
Very High
Very Low

 1) The size of the PC card is __________?
85.6mm X 54.6mm
85.6mm X 54.0mm
85.0mm X 54.0mm
85.0mm X 54.6mm
2) Lightscribe is used for _____________?
a) Renaming Discs
b) Labeling Discs
c) Both
d) None of the above
3) Which battery has long life?
a) Nickel cadmium Batteries
b) Nickel Metal Hydride Batteries
c) Lithium Ion Batteries
d) All of the above
4) If the video does not work, No need to replace the motherboard
a) True
b) False
5) WI-FI is based on which standards?
a) IEEE 802.6
b) IEEE 802.11
c) IEEE 802.12
d) IEEE 802.15.1
25) The first laptop was called as __________?
a) Notebook
b) Osborne1
c) Subnotebook
d) None of the above
26) What features led to the popularity and favorability of Portables over Desktop computers
a) Portable weight
b) Small size
c) Less heat dissipated
d) All of the above
 
 
 
27) What are types of batteries available in the market?
a) Nickel Cadmium Batteries
b) Nickel Metal Hydride Batteries
c) Lithium Ion Batteries
d) All of the above
e) None of the above
28) Which technology is used in Bluetooth for avoiding interference?
a) Frequency hopping
b) Frequency Multiplexing
c) Phase locked looping
d) Pulse-code Modulation
29) Expand PCMCIA __________
a) Personal Computer Memory Card International Associate
b) Personal Computer Memory Card International Association
c) Peripheral Components Memory Card International Association
d) Peripheral Components Memory Card International Associate
30) How many types of PC cards available?
a) Two
b) One
c) Three
d) Five
N+
1.
A client wants to improve the wireless coverage on the third floor of their house. The wireless router is located in the basement and there is no easy way to run a cable to the third floor. Which of the following devices should be installed to extend the wireless coverage to cover the entire third floor without running cables?A. SwitchB. RouterC. RepeaterD. Bridge2. Which of the following describes what the number two represents in l00Base2 cabling?A. FiberB. Coaxial cableC. UTPD. Twisted pair3. A crossover cable is MOST commonly associated with which of the following layers of the OSI model?A. SessionB. ApplicationC. NetworkD. Physical4. Which of the following devices is used to connect multiple devices to a network and does not stop broadcast traffic?A. SwitchB. HubC. ModemD. Repeater5. A network administrator needs to add an additional connection to a room. The administrator adds a new Ethernet switch and must connect it to an existing switch. Which cable type should be used to connect the two switches?A. CAT3 cableB. Serial cableC. Crossover cableD. Rollover cable6. Prioritizing traffic between data and voice is defined as which of the following?A. Caching enginesB. Proxy serverC. QoSD. Load balancing7. Sandy, a technician, wants to limit access to a wireless network to company owned laptops, but does not want to use an encryption method. Which of the following methods would be BEST to accomplish this?A. MAC filteringB. SSL VPNC. PPPoED. WPA Enterprise8. Joe, a network technician, is tasked with installing a router and firewall to get an office working with Internet access. Which of the following features MUST be configured to allow sharing of a single public IP address?A. QoSB. POP3C. PATD. SMTP9. Which of the following is a form of encrypting packets for safe, secure data transmission within a network?A. RASB. PPTPC. IPSecD. ICA10. Two duplicate pieces of equipment can be used in conjunction for which of the following purposes? (Select TWO)A. High availabilityB. Fault toleranceC. Reduce latencyD. Wi-MAXE. CARP11. The T568B wiring standard slates that CAT5 cables should be coded as follows:A. White/Orange, Orange, White/Green, Green, Blue, White/Blue, White/Brown, Brown,B. White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown,C. White/Orange, Orange, \White/Green, Green, White/Blue, Blue, White/Brown, Brown,D. White/Orange, Orange, White/Green, Blue,12. Using network monitoring tools would allow an administrator to do which of the following?  
A.
Configure offline devicesB. Examine performance issuesC. Install additional software and updatesD. View syslog events13 . Which of the following wireless technologies can operate at only 5GHz?A. 802.11b/gB. 802.11gC. 802.11bD. 802.11a14. Which of the following devices allows multiple internal IP addresses to access an external website with minimal impact to the network bandwidth?A. ProxyB. Load balancerC. RouterD. Bandwidth shaper15. A VPN connection is not working correctly and the technician is unable to ping the VPN server. Which of the following actions should the technician do FIRST?A. Call their local ISPB. Verify the IP information of the serverC. Check their local Internet connectionD. Verify the hostname of the server16. A technician wants to use an existing DHCP server for three additional VLANs. Which of the following features needs to be configured to allow for this addition?A. DHCP serverB. Proxy serverC. RepeaterD. DHCP relay
Linux
Which of the following key-combinations is used to redo a change undone by a u command in vim?
Ctrl-w, Arrow
Ctrl-w, s
Ctrl-r
Ctrl-w, v
You work as the Network Administrator for Perfect solutions Inc. The company has a Linux-based Network. You are working as a root user. You want to know what the day will be on 20 July 2010.Which of the following commands should you use to accomplish this task?
cal
cal 20 July
cal 7 2010
date
Which of the following commands is used to access Windows resources from Linux workstation?
rsync
mutt
scp
smbclient
You want to temporarily change your primary group to another group of which you are a member. In this process, a new shell will be created, and when you exit the shell, your previous group will be reinstated. Which of the following commands will you use to accomplish this task?
chmod
newgrp
chgrp
chown
Fill in the blank with the required permission to complete the statement below. In order to make a script executable in a Linux computer, you must assign the___________ permission to the script file.
execute
read
read & write
write
You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. David, a Sales Manager, wants to know the name of the shell that he is currently using. Which of the following commands will he use to accomplish the task?
ECHO $shell
RM $shell
MV $shell
LS $shell
Which of the following text editing tools can be used to edit text files without having to open them?
less
sed
vi
more
Which of the following commands is used to securely copy files from one host to another over the network?
ls
cat
mutt
scp
Fill in the blank with the appropriate tool. __________ is a public domain collection of tools to allow Unix systems to manipulate MS-DOS files: read, write, and move around files on an MSDOS file system.
mtools
ntools
xtools
tools
Which of the following commands will you use to list all local and remote printers attached to your computer?
lpq
lpstat -d
lpstat -t
lpr
Which of the following files is the default configuration file of XDM (X Window Display Manager)?
/etc/X11/xdm/xdm-config
$HOME/.Xauthority
/usr/bin/xdm-config
/usr/bin/xterm
Which of the following commands is used to append the list of files in the /tmp directory to an existing file named deletelater.txt?
ls /tmp > deletelater.txt
ls deletelater.txt /tmp
ls /tmp deletelater.txt
ls /tmp >> deletelater.txt
You work as a Technician for Net World Inc. The company has a Linux-based network. You have configured a file server on the company's etwork. You want to summarize disk usage of each file in a particular directory on the file server. Which of the following commands will you use?
du
fsck
df
dfsck
You work as the Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. You want to keep an eye on the system log file /var/adm/messages. Which of the following commands should you use to read the file in real time?
tail -f /var/adm/messages
tail /var/adm/messages
cat /var/adm/messages
tail -n 3 /var/adm/messages
You work as the Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You are working as a root user on the Linux operating system. You have created a file in the vim text editor. You want to save this file and exit it. Which of the following keys should you use to accomplish the task?
:w
:wq
:q!
:
Which of the following commands is used to change file access permissions in Linux?
chown
chmod
chperm
chgrp
Which of the following commands is used to view the PDF files in Linux?
ps2pdf
a2ps
pdf2ps
evince
You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You want to view the status of the current processes running on a Linux computer. You also want to append this information into the StatPro.txt file without deleting its content. Which of the following commands will you use to accomplish the task?
ps StatPro.txt
ps >> StatPro.txt
ps | more StatPro.txt
ps > StatPro.txt
When you remove a user account from your Linux system, the files and directories of this user may still remain on the system. Which of the following commands can you use to remove all items from your Linux system? Each correct answer represents a complete solution. Choose two.
userdel -r
userdel -f
userdel -h
userdel -c
You work as the Network Administrator for Perfect solutions Inc. The company has a Linux-based Network. You are a root user on the Red Hat operating system. You want to grant ownership of the file foofile to a user John. Which of the following commands should you use to accomplish this task?
chown John foofile
chmod John foofile
chgrp foofile John
chown foofile John
Which of the following cp command parameters copies only when the source file is newer than the destination file or when the destination file is missing?
-u
-l
-p
-s
35.
Which graphical mail client is the default tool for email and groupware in Red Hat Enterprise Linux?
mutt
Evolution
Thunderbird
pidgin
Windows 7
Windows logo key+F used for_______________.
Open the Search window
Select or move between desktop gadgets
Select or move between taskbar buttons
Open the Ease Of Access Center window
The aero shake feature will work if which of the following conditions are met? choose Two.
A display adapter compatible with WDDM is installed.
Aero features are downloaded from Microsoft.
The windows experience index is at least 2.
The windows experience index is 3 or greater.
Which of the following can be used to increase the physical memory on your Windows 7 pc and increase the speed?
Physical RAM
Aero Glass
DirectAccess
ReadtyBoost
Which of the following is used to control when the security pop-up notification are used?
Security Control Manager
User Account Control
User Account Control Panel
Notification Control Settings Manager
Which of the following operating system support an offline migration using USMT?
Windows 2000 professional
Windows XP professional
Windows Vista
Windows7
Which of the following is not a volume type usable by Windows 7?
FAT
exFAT
NTFS
All of the above
To establish a DirectAccess connection to the network, what is the first requirement?
Install a certificate
Create a VPN connection
A static IPv4 address
A static IPv6 address
You are using the sysprep tool to prepare a Windows 7 installing to be imaged .Which command-line option removes all unique system information from the installation?
/audit
/oobe
/generalize
/unattend
 
You wish to add file to a VHD. What action should you perform first?
ImageX /mountrw
In windows explorer .right-click the. VHD file and open.
In diskpart, select the disk and attach
Use DISM /online /apply
Which of the following will cause the online compatibility check to fail during a Windows 7 installation?
512MB of RAM
A display adapter with WDDM support
A display adapter without WDDM Support but with SVIDEO
An 80 GB HDD
Which of the following must you download from Microsoft’s Web site to obtain USMT 4.0?
Windows any time update
Windows upgrade advisor
WAIK
Microsoft Application Compatibility Toolkit
Which of the following VPN types support the VPN Reconnect feature of Windows 7?
L2TP/IPsec
PPTP
IKEv2
SSTP
You are responsible for managing company laptops that have Windows 7 installed at a small library. You want to prevent staff from uploading files using FTP to FTP sites but allow them to send outbound email messages using the Simple Mail Transfer Protocol (SMTP). Which of the following rules would you configure to achieve this?
Inbound rules
Outbound rules
Isolation rules
Authentication exemption rules
Your friend has installed new device drivers on his computer. Unfortunately it was a beta early release and his computer boots to a blank screen now. You help him out by restarting the computer and pressing F8. However, what Advanced Boot Option would NOT help fix the situation?
Enable Boot Logging
Safe Mode
Safe Mode with Networking
Last Known Good Configuration (Advanced)
How to access file and folder though network?
\\ computer name
// computer name
\\ computer\Ip
None
 
In following Which is Class B IP?
126.254.255.255
191.255.255.254
192.127.156.134
223.123.124.234
What is the port number of HHTP?
443
68
80
23
Which Security option is not available in windows7?
Action Center
AppLocker
Bitlocker
None
 
Encrypting File System is not available in Windows7_______.
Ultimate
Professional
Enterprise
Home basic
 
In Software Restriction Policies, when you configure two conflicting rules for a particular program?
The most specific rule takes precedence.
We can’t configure policy.
Default first will be applied
Default second will be applied.
 
____________Tool protects your PC against hackers and malicious software?
 
User Account Control
Local policy
None

Which is a new feature of Internet Explorer 8?
SmartScreen Filter
Advanced tab
Favorites
Safety
Before the process of encrypting the drive, it’ll ask to save a recovery file why?
It required for encryption.
Used if the password is forgotten
Used for decryption.
None

Which command used for Local Security Policy?
Secpol.mmc
Secpol.msc
MMC
Services.msc

In Windows 7, the computer creates an EFS certificate and private key when?
While Encrypts a file.
The first time a user encrypts a file.
While Planning encryption.
None

0 comments:

Post a Comment

 
Top