AGP slot PCI slot ISA slot CMOS Battery EIDE Connectors RAM slot FLOOPY slot SOCKET 7 CPU AGP slot PCI slot ISA slot CMOS Battery EIDE Connectors RAM slot FLOOPY slot SOCKET 7 C... + Read more »
LAPTOP MAINTENENCE LAPTOP MAINTENENCE 1) The size of the PC card is __________? a) 85.6mm X 54.6mm b) 85.6mm X 54.0mm c) 85.0mm X 54.0mm d) 85.0mm X 54.6mm 2) Lightscribe is used for _____________? a) Renaming Discs b) Labeling Discs c) Both d) None of the above 3) Which battery has long life? a) Nickel cadmium Batteries b) Nickel Metal Hydride Batteries c) Lithium Ion Batteries d) All of the above 4) If the video does not work, No need to replace the motherboard a) True b) False 5) WI-FI is based on which standards? a) IEEE 802.6 b) IEEE 802.11 c) IEEE 802.12 d) IEEE 802.15.1 6) IEEE 802.3 is standardized for? a) Cellular WAN b) GPRS c) Bluetooth d) Ethernet e) Infrared 7) Under what frequency range does Bluetooth work? a) 2.4-2.5 GHZ b) 2.3-2.4 GHZ c) 2.5-2.6 GHZ d) None of the above 8) Is it possible to connect multiple Bluetooth hubs? a) Yes b) No 9) What is the total number of masters and slaves in a piconet? a) 1 Master and 7 Slaves b) 2 Masters and 7 Slaves c) 1 Slave and 7 Masters d) 2 Slaves and 7 Masters 10) Video is integrated to the motherboard? a) True b) False 11) Which is a Hot-Swappable device for laptop? a) USB Device b) Touchpad c) Keyboard d) Processor 12) Docking station has external ports a) True b) False 13) Which company originally conceived and developed Bluetooth? a) Ericsson b) Samsung c) Motorola d) LG 14) Do Bluetooth devices need line of sight to connect to one another? a) Yes b) No 15) Which are the main types of connection used by Bluetooth? a) Single Slave b) Master Slave c) Scatternet d) All of the above e) None of the above 16) Which method is used for Data transfer in Bluetooth? a) ASCII Control Language (ACL) b) Asynchronous Connectionless (ACL) c) Access Control List (ACL) d) Analog Configuration Line (ACL) 17) Which of the following defines hot-swapping? a) Installing new devices without the need for a driver b) Removing and adding internal devices without rebooting c) Removing and inserting PCMCIA cards while the system is running d) All of the above 18) SODIMM stands for which of the following? a) Special Operations for Digital Image Multimedia b) Some Other Dual In-line Memory Module c) Small Outline Dual In-line Memory Module d) None of the above 19) After inserting a PC card into a notebook computer, the system does not recognize the card. Which of the following could be the problem? a) No drivers were installed for the card b) The card was inserted in the wrong slot type c) The notebook computer does not support PCMCIA d) Socket or card services have not recognized the card 20) Which of the following resolution standards are used for notebook computer displays? (Choose three.) a) UGA b) SVGA c) XGA d) SXGA 21) What type of power supports the video display on a portable PC? a) AC power only b) DC power only c) AC power when the PC is plugged in or DC power when it is not plugged in d) Either AC or DC at the user’s choice 22) All the laptop components are not upgradeable a) True b) False 23) Which standards do Cellular WAN follow? a) Globe System for Mobile Communication (GSM) b) Code Division Multiple Access (CDMA) c) General Packet Radio Service (GPRS) d) All of the above e) None of the above 24) The kind of data transfer required for Infrared a) Light of sight b) Line of sight c) Line of Projection d) None of the above 25) The first laptop was called as __________? a) Notebook b) Osborne1 c) Subnotebook d) None of the above 26) What features led to the popularity and favorability of Portables over Desktop computers a) Portable weight b) Small size c) Less heat dissipated d) All of the above 27) What are types of batteries available in the market? a) Nickel Cadmium Batteries b) Nickel Metal Hydride Batteries c) Lithium Ion Batteries d) All of the above e) None of the above 28) Which technology is used in Bluetooth for avoiding interference? a) Frequency hopping b) Frequency Multiplexing c) Phase locked looping d) Pulse-code Modulation 29) Expand PCMCIA __________ a) Personal Computer Memory Card International Associate b) Personal Computer Memory Card International Association c) Peripheral Components Memory Card International Association d) Peripheral Components Memory Card International Associate 30) How many types of PC cards available? a) Two b) One c) Three d) Five 31) Hibernate mode uses lesser power than the standby mode. a) True b) False 32) Which is the first commercial Toshiba laptop models introduced in 1987? a) T1000 & T1200 b) T2000 & T2200 c) T1000 & T2200 d) T1000 & T2200 33) When was NEC_Ultralite released? a) 1985 b) 1989 c) 1993 d) 1987 34) The first Apple machine was designed for _______________ Operating System a) Windows b) Linux c) Macintosh d) Unix 35) The total amount of time that a portable system can work on battery is dependent on a) Low-power components b) Power management protocols c) Battery technology d) All of the above 36) Generally laptop will be _____________ the price of the desktop a) Twice b) Equal to c) Less than d) Greater than 37) Which is the first standalone operating system for Tablet-PC? a) Windows XP Tablet-PC Edition b) Windows Vista Ultimate c) Windows Vista Home Premium d) Windows Vista Business 38) Pentium III processors can run at………………..Mhz? a) 300 b) 366 c) 400 d) 600 39) Processor running with AC power will switch to ___________ mode? a) Battery optimized b) Maximum performance c) Sleep d) Hibernate 40) What does PGA stands for? a) Pin Grid Array b) Portable Grid Array c) Pin line Grid Array d) None of the above 41) What does BGA stands for? a) Board Grid Array b) Ball Grid Array c) Back Grid Array d) All of the above 42) The PCMCIA slot in notebooks has male _________ connector? a) 68 pin b) 58 pin c) 60 pin d) 40 pin 43) PCMCIA card runs at ________ volts? a) 1.8 b) 2.9 c) 3.3 d) 1.7 44) The different types of PCMCIA cards available in the market are a) Type 1, Type 2, Type 3 b) Class 1, Class 2, Class 3 c) Class A, Class B, Class C d) All of the above 45) The thickness of Type 2 card is _________mm a) 3.3 b) 5 c) 10.5 d) 8.5 46) Type 3 card is used for __________ a) Rotating Discs b) Hard Disc Drive c) Both A & B d) None 47) TFT stands for __________ a) Thick film transistor b) Thin film transistor c) Both A & B d) None 48) What are the shortcut Function keys to open help and support screen in hp laptops? a) Fn+F1 b) Fn+F2 c) Fn+F3 d) Fn+F4 49) What does WI-FI stands for? a) Wi-Fi Alliance b) Wireless fidelity c) Both A & B d) None of the above 50) The area covered by one or more interconnected access points is called a ………..? a) Warm spot b) Cold spot c) Hot spot d) Community 51) Some of the disadvantages of Wi-Fi compared to other standards are? a) High power Consumption b) Limited excessive Wi-Fi access pollution c) Interference d) All of the above 52) A ___________ covers much more extensive area than wireless lans a) WWAN b) WLAN c) WPAN d) WAN 53) Which is the backbone of Ethernet based computer networking technology? a) Ethernet Hub b) Ethernet Switch c) GPRS Gateway d) GPRS Modem 54) Maximum range for the connection to be established in Class C Bluetooth technology is a) 10 Mts b) 100 Mts c) 50 mts d) 30 mts 55) What is the data transferred speed defined by SIR? a) 115.2Mbps b) 115.2Kbps c) 4Mbps d) 16Mbps 56) The data transfer in infrared technology is _________? a) Limited to line of sight b) Not limited to line of sight c) Resistant to interference d) Not Resistant to interference 57) If you have to connect two computers directly you will have to use _________? a) Straight cable b) Cross over cable c) Roll over cable d) Co-Axial cable 58) Power plan option is used in windows vista to apply __________ settings to the Notebook? a) Power b) Sound c) Display d) Network 59) The over heating problems in the laptops will ______ and ________of the laptops? a) Shorten the life b) Decreases the reliability c) Platform cooling d) Both A&B 60) Overheating is one of the serious problems associated with the laptop. a) True b) False 61) If the OS one your laptop is windows NT/2000/XP it uses _____ file system to protect your data from theft? a) FAT 16 b) FAT 32 c) FAT d) NTFS 62) Biometric identification system allows your finger prints to be your login ID. a) True b) False 63) __________ will turn your new drive into the exact replica of the old one. a) Formatting b) Deletion c) Cloning d) Updating 64) It is always advice to take backups of important data in regular intervals. a) Yes b) No 65) ________ comes with a powerful encryption system that adds an extra security for drives, folders or files. a) Windows 95 b) Windows 98 c) Windows 2000 d) Windows NT 66) Which are the two versions of Bluetooth technology? a) 1.2 & 2.0+ EDR b) 1.5 & 2.0+ EDR c) 1.2 & 2.5+ EDR d) 1.2 & 1.2+ EDR 67) If you want a very good display, then assigns more amount of RAM for display. a) True b) False 68) The most popular Wi-Fi standard which uses Complimentary Code Keying(CCK) is _____ a) 802.11b b) 802.11a c) 802.11g d) 802.11n 69) Which is the Wi-Fi standard which is known as WiMax which combines the benefits of both Broadband and Wireless? a) 802.11b b) 802.11a c) 802.16 d) 802.11g 70) What is the frequency & data transfer rate of 802.11a standards? a) 5 GHZ, 54Mbps b) 2.4GHZ, 11Mbps c) 2.4GHZ, 54Mbps d) 2.4GHZ, 140 Mbps 71) Small size of IDE drives can hold _________ a) 10GB b) 20GB to 30GB c) 30GB to 40GB d) 40GB 72) What are the two different sizes of SO-DIMM modules available? a) 2.375inch b) 2.625inch c) 2.525inch d) 2.750inch 73) Telecommunication industry specification describing how mobile computers can be easily interconnected using a short run wireless connection. a) Bluetooth b) Infrared c) Wi-Fi d) GPRS 74) An amount of memory which stores the data temporarily to compensate for difference in data transmission from one device to another a) Latch b) Flip-Flop c) Buffer d) Cache 75) _________ is the process in which saving of image of your desktop with all open files & documents and power down of your computer happens. a) Hibernation b) Sleep mode c) Shutdown d) Restart 76) The common desktop systems mostly uses _________ monitor for display a) Liquid crystal display b) Cathode ray tube c) Thin film transistor d) None of the above 77) What is the code name for speed step technology? a) Geyser Ville b) Core2duo c) Paxville d) None of the above BY MAKASSY LAPTOP MAINTENENCE LAPTOP MAINTENENCE 1) The size of the PC card is __________? a) 85.6mm X 54.6mm b) 85.6... + Read more »
A+ A+ A user reports that they walked away from their laptop for 30 minutes and when they came back the screen was very dim. The user tried moving the mouse and increasing the brightness setting, but neither worked. Which of the following should the technician do FIRST?A. Plug in an external monitor to test the video card.B. Run a check disk scan to verify there is no corruption.C. Check if the laptop is now on battery power.D. Have the LCD screen replaced with a known good screen.Answer: C2.Which of the following BEST describes a situation that would require STP cable? A. Installation in an area with low EMIB. Installation in an area with high EMIC. Installation in an air handling spaceD. Installation in an area with high humidityAnswer: B3. Which of the following will allow the use of BitLocker if the computer does not have a TPM chip? A. External hard driveB. SCSI hard driveC. USB keyD. CD-ROM driveAnswer: C4. A customer reports that their computer is displaying ‘operating system not found’ while booting. The technician confirms that the computer booted fine the previous day and that no devices were added. The technician also confirms that no software changes were made to the system from the previous day. Which of the following is the problem? A. The network cable is unplugged.B. A diskette was placed in the disk drive.C. The keyboard is unplugged.D. The system has been infected with spyware.Answer: B5. A new video card requires a 600 watt power supply. The power supply should have how many pins on the main cable? A. 12B. 20C. 24D. 26Answer: C6. Corrupt Windows XP system files are keeping a PC from booting. Which of the following is the BEST option to resolve this issue? A. Automated System RecoveryB. Emergency Repair DiskC. Recovery ConsoleD. NT Repair DiskAnswer: C7. A technician installs a new graphics card in a computer and upon booting up nothing happens. The technician puts the old graphics card back into the computer and the computer boots up normally. Which of the following would be the BEST source of information to solve the problem? (Select TWO).A. Chat room discussion onlineB. Installation manualC. Ask another technicianD. Manufacturer's websiteE. OS forum onlineAnswer: B,D8. Which of the following identifies a wireless network's name?A. NetBIOSB. MACC. SSIDD. Node IDAnswer: C9. Which of the following attributes is set when a file is ready to be backed up?A. aB. hC. rD. sAnswer: A10. Which of the following connector types is used for a 100BaseT network?A. RJ-12B. RJ-11C. RJ-14D. RJ-45Answer: D11. A technician is in charge of migrating Windows XP users over to new Windows Vista workstations. Which of the following tools would allow the technician to accomplish this in an automated process?A. User Account Control appletB. User State Migration toolC. Windows Automated Installation kitD. Windows PowershellAnswer: B12. Which of the following utilities can an administrator use to manage hardware, software, and network components?A. Device ManagerB. MSINFO32C. MMCD. MSCONFIGAnswer: C13. Which of the following is used to process BitLocker full drive encryption?A. Multi-Core ProcessorB. SATAC. BIOS PasswordD. TPMAnswer: D14. Which of the following is the MAXIMUM number of devices connected per IEEE1394 controller?A. 4B. 63C. 64D. 128Answer: B15. Which of the following wireless types has the potential to provide the GREATEST bandwidth? A. 802.11aB. 802.11bC. 802.11gD. 802.11nAnswer: D16. Which of the following devices is considered a solid state storage device?A. Flash driveB. Tape driveC. Blu-RayD. S-VideoAnswer: D17. Which of the following is placed FIRST on top of the processor to aid in the cooling process? A. FanB. Mounting bracketC. Thermal compoundD. HeatsinkAnswer: C18. Which of the following is the FIRST step in the troubleshooting theory?A. Establish a plan of action to resolve the problem and implement the solution.B. Establish a theory of probable cause.C. Identify the problem.D. Verify full system functionality and if applicable implement preventative measures.Answer: C19. Which of the following storage types has no movable parts?A. DVD-RWB. FlashC. TapeD. IDE hard driveAnswer: B20. Which of the following utilities will a technician use to find out system information, drivers, running print jobs, and Internet setting all from one location? A. MSINFO32B. REGEDITC. Device ManagerD. MSCONFIGAnswer: A21. Which of the following interfaces does a sound card use?A. PCIB. SATAC. SCSID. AGPAnswer: A22. Which of the following would MOST likely be used to aid a technician in the removal of spyware?A. ASRB. Safe ModeC. Restore PointD. Recovery ConsoleAnswer: B23. A technician is installing a new small form factor motherboard. Which of the following form factors is the technician MOST likely installing? A. Micro ATXB. NLXC. ATXD. BTXAnswer: A24. Which of the following maintenance utilities is used to reorganize files on a hard drive?A. SCANDISKB. DEFRAGC. CHKDSKD. Disk CleanupAnswer: B25. Which of the following is the number of devices that can be daisy-chained to an IEEE 1394 port?A. 7B. 15C. 63D. 127Answer: C26. Which of the following would a technician use to install a manufacturer's image on a notebook? (Select TWO). A. Recovery CDB. System Restore UtilityC. Access a recent data backupD. Utilize the Recovery Agent featureE. Factory recovery partitionAnswer: A,E27. Which of the following ports is the default for HTTP?A. 21B. 25C. 80D. 10Answer: C28. Which of the following printer types usually requires special print media? A. ThermalB. LaserC. InkjetD. ImpactAnswer: A29. A laptop with an integrated 802.11b/g card is unable to connect to any wireless networks. The laptop was previously able to connect to wireless networks. Which of the following is MOST likely the cause of this issue? A. The wireless card is disabled in BIOS.B. The wireless card drivers are not installed.C. The wireless hardware switch is turned off.D. The wireless card firmware requires an update.Answer: C30. A customer has asked a technician to install aversion of Windows 7 that will allow for BitLocker functionality. Which of the following editions should the technician install? A. Home PremiumB. EnterpriseC. ProfessionalD. StarterAnswer: B31. A 2.5 inch (6.4cm) external hard drive is MOST likely to use which of the following power supplies? A. USBB. BTXC. FireWireD. ATXAnswer: A32. Which of the following is useful as a FIRST step when troubleshooting issues of a laptop not powering on? A. Verify backlight functionality and pixilationB. Plug in external monitorC. Remove unneeded peripheralsD. Verity AC adapter LED'sAnswer: D33. NTFS is required to install which client OS? A. Windows VistaB. Windows 2000C. Windows 7D. Windows XPAnswer: C34. Which of the following utilities backs up the Windows configuration once a day? A. Dr. Watson B. System Restore C. DirectX Diagnostic Tool D. File Signature Verification Utility Answer: B35. A characteristic of a laptops CPU is the ability to: A. reduce power usage to the laptops video chip set. B. increase the life of the LCD panel. C. throttle power usage when the laptop is using the battery. D. increase signal coverage for WiFi applications. Answer: C36. Which of the following interfaces allows for the fastest video transfer rate? A. SCSI II B. IEEE 802.11g C. Bluetooth D. IEEE 1394/Firewire Answer: D37. In Windows XP, the System Restore feature is used to take a snapshot of: A. ausers document files in case the document files need to be restored later. B. the computers operating system in case the operating system needs to be re-installed. C. the program files in case the program files need to be restored later. D. a computers settings in case the settings need to be restored later. Answer: D38. After testing the power supply on a non-functioning computer with a load, a technician determines that the +5V rail on the power supply is outputting 2.2 Volts. The technician should: A. replace the power supply. B. replace the CMOS battery. C. check the power management settings in the BIOS. D. test the internal components of the power supply. Answer: A39. The recommended memory requirement when installing Windows XP is: A. 128 MB. B. 32 MB. C. 64 MB. D. 256 MB. Answer: A40. Pentium 4 based processors require which of the following types of memory module? A. SIMM B. SoDIMM C. RIMM D. DIMM Answer: D41. A printer that is directly connected to a computer has stopped printing documents. The user observes that there are several documents waiting to print. Which of the following services could be stopped to clear the print queue and return the printer back to a normal status? A. Task Manager B. Event Viewer C. Systray D. Print Spooler Answer: D42. Which of the following power modes for a laptop copies system data to the hard drive, before completely turning off? A. Suspend B. Standby C. Log off D. Hibernate Answer: D43. A previously functional keyboard has now stopped working. Which of the following actions should a technician take FIRST? A. Clean the PS/2 connector on the keyboard. B. Replace the keyboard. C. Clean the keyboard with compressed air. D. Check the PS/2 connection to the motherboard. Answer: D44. A technician is asked to upgrade a computer with a faster network card. The existing network card is built in, and a PCI slot is available for the replacement. The new network card is placed into the PCI slot. Which of the following should be the next step for the technician to take? A. Update the operating system with the latest patch B. Confirm availability of new network card drivers C. Flash the BIOS D. Remove the built-in network card Answer: B45. Which of the following is the way to determine pin one on a ribbon cable? A. Pin one is on the non-colored side of the ribbon cable. B. Pin one is on the corner that is angled on the connector. C. Pin one is labeled with the number 1, on the cable. D. Pin one is on the colored side of the ribbon cable. Answer: D46. Operating the CPU at a speed higher than the manufacturers rating in order to gain increased performance is called: A. throttling. B. overrating. C. overheating. D. overclocking. Answer: D47. A computer reports a SMART error on startup. This is MOST likely caused by a failure of the: A. sound card. B. hard drive. C. network card. D. CD-ROM drive. Answer: B48. High-speed peripherals that are inserted and removed at any time while the machine is powered on are called: A. on the fly. B. hot-swappable. C. hot-removable. D. hot-pluggable. Answer: B49. A user can no longer access some files on the hard drive. Which of the following actions should be taken to resolve this problem? A. Format and completely reload the computer. B. Verify file permissions on the hard drive. C. Delete and re-create the user. D. Reboot the computer and log back on. Answer: B50. Which of the following cable types will allow the longest distance without using a repeater? A. CAT6 UTP B. UTP C. multi mode fiber D. single mode fiber Answer: D51. Which of the following BEST describes Windows XP Standby mode? A. Copies an image of whatever is in memory at the moment to a file on the disk and if the computer loses power, data will be saved. B. Copies an image of whatever is in memory at the moment to a file on the disk and if the computer loses power, data will be lost. C. Keeps the contents of memory intact by providing a tiny amount of power to the system and if the computer loses power, data will be lost. D. Keeps the contents of memory intact by providing a tiny amount of power to the system and if the computer loses power, data will be saved. Answer: C52. Once a technician installs a new hard drive in a computer, which of the following would be the next step to allow the operating system to utilize the new drive? A. Call the computer's manufacturer. B. Copy files to the hard drive. C. Partition and format the hard drive. D. Reboot the computer. Answer: C53. Which of the following types of power supply typically comes with a pass-through power connector intended to power a monitor? A. Mini ATX B. AT C. ATX D. Micro ATX Answer: B54. Which of the following are required to configure a Windows PC to connect to the Internet? (Select TWO). A. Client for Microsoft network B. File and printer sharing C. Appletalk Protocol D. TCP/IP Protocol E. NetBIOS Answer: A,D55. The technology used to monitor hard drives for potential failure is called: A. UDMA. B. PIO. C. SMART. D. ATA1. Answer: C56. A small office/home office (SOHO) is considering upgrading to Windows XP. Which of the following security features are included in Windows XP Professional and not included with Windows XP Home? (Select TWO). A. Domain account support B. Allowing up to 5 users to access shared files C. Windows Firewall D. Windows Defender E. Encrypted File System Answer: A,E57. When installing a second hard drive for storage on the same channel, which of the following are the proper jumper settings? A. First hard drive Slave, Second hard drive Master B. First hard drive Master, Second hard drive Slave C. Second hard drive Master, First hard drive Master D. Second hard drive Slave, First hard drive Slave Answer: B58. What number of pins will you find on a SVGA connection? A. 25 pins B. 9 pins C. 20 pins D. 15 pins Answer: D59Which of the following is the Color-Code used for the keyboard Port on a new PC that uses a mini- DIN 6 Connector? A. Pink B. Blue C. Green D. Purple Answer: D60A female DB-25 connector is commonly used for which of the following applications? A. A parallel cable. B. A SCSI connector. C. A parallel port. D. An EGA/CGA video port. E. A VGA/SVGA video adapter. Answer: C61Why would you recommend wireless IEEE 802.11g and not wireless IEE 802.11b? A. Wireless IEEE 802.11b is not supported by Windows XP Service Pack 2. B. Wireless 802.11g has less interference. C. Wireless 802.11g moves data at a faster rate. D. Wireless 802.11g has a greater distance range over wish it can be applied. Answer: C62What is the maximum number of peripherals that may be connected to a system via a USB port? A. 7 B. 15 C. 127 D. 130 Answer: C63When installing a new CPU, what is applied directly to the CPU? A. Cooling liquid. B. Thermal compound. C. A heat sink. D. A fan. Answer: B64While installing an IDE device, you find that the cable to connect the IDE device is not keyed. Which of the following should you do? (Select all that apply.) A. Locate the red stripe on the cable, and connect to the device with the red stripe lining up to pin #1. B. Attach cable any way that fits. C. If there is also no red stripe, Locate the blue stripe on the cable, and connect to the device with the blue stripe lining up to pin #1. D. Purchase a new cable. Answer: A,C65Which of the following is a task that you have to perform when installing SCSI devices? A. Set the jumpers for master/slave. B. Perform a low-level format the SCSI drive C. Assign each SCSI device a unique ID number. D. Set the drive type in the CMOS setup. Answer: C66Which of the following gives the proper sequence for installing master and slave IDE drives? A. Mount the drive in the carrier, connect the cable to the drive, install the drive in the computer, and configure the drive B. Mount the drives in the carrier, connect the 40-pin cable to the drives, set the drive at the end of the cable to master, set the drive in the middle of the cable to slave, install the drives in the computer, and configure the drives. C. Mount the drive in the carrier, connect the master drive after the twist in the cable, connect the slave drive before the twist in the cable, install the drives in the computer, and configure the drives. D. None of the above. Answer: B67Why should a technician that is working with a computers hardware wear an anti-static wrist strap? A. The wrist strap will protect your hands from burn injury caused tobuilt up static electricity. B. The wrist strap will prevent computer components from being damaged by static electricity. C. The wrist strap will protect you from getting an electrical shock caused by static electricity. D. The wrist strap will prevent degaussing of the hard drive. Answer: B68On which physical part of a hard drive is the data stored? A. Platters. B. Actuator. C. Sector. D. Cylinder. Answer: A69Provide the reasons why a computer may run slowly. (Choose THREE.) A. Not enough random access memory (RAM). B. Too many USB devices attached. C. Spyware and viruses. D. Excessive virtual memory. E. Running obsolete services. F. Improperly configured CD-ROM drive Answer: A,C,E70Your Windows XP operating system became unstable after you installed a device driver and did not stabilize after you rebooted the computer with the Last Known Good Configuration. What is the reason for the computer behaving in this manner? A. The Last Known Good Configuration boot will only work for hardware changes and not software changes that have been made. B. The System Restore application should have been used to save the system's registry prior to the installation of the device driver. C. The Last Known Good Configuration was unable to find a valid Restore Point because the System Restore was not run prior to the installation of the device driver. D. The system's registry is overwritten after every successful login and the settings on the initial install were thus overwritten after the first reboot and login. Answer: D71Which of the following two questions you would ask a customer first when he reports a blank monitor? (Select TWO.) A. Is the monitor switched on? B. Did you check the color settings? C. Have you checked whether the contrast or brightness is turned down? D. What type of computer do you have? Answer: A,C72After booting up your new computer, you observe that the USB mouse is not working. Further investigation reveals that nothing connected to the USB ports is working. Which of the following should you try FIRST? A. Check the computer to verify that the jumper settings for USB are correct. B. Buy new USB wires and test USB functionality. C. Check the BIOS to verify that USB functionality is enabled. D. Connect the USB devices to a different computer to test the devices. Answer: C73Which of the following components on the motherboard usually house the IDE connectors? A. PCI bus. B. North Bridge. C. ISA bus. D. South Bridge. Answer: D74What is the minimum number of hard drives required for RAID level 0? A. 1 B. 2 C. 3 D. 4 Answer: B75What is the maximum data transfer rate that USB 2.0 offers? A. 512 Mbps B. 480 Mbps C. 100 Mbps D. 128 Mbps Answer: B76The maximum number of IDE devices which can be installed in an ATX computer is ______. A. 1 B. 2 C. 3 D. 4 Answer: D77Which of the following is a passive device that protects electrical components from spikes in the power line? A. A power conditioner. B. A surge protector. C. A generator. D. An Uninterruptible Power Supply (UPS). Answer: B78Which type of current is fed from the wall outlet to the computer when you turn a computer on? A. Neutral current B. Direct current C. Alternating current D. Low voltage current Answer: C79What is a PC Card also known as? A. A PC Bus card. B. A smart card. C. PCMCIA. D. A PCI adapter. Answer: C80A customer complains that after the memory on his laptop was upgraded from 512 MB to 1024 MB of RAM, his laptop reports that only 768 MB of RAM is installed. What is the MOST probable cause of this? A. The operating system does not support more than 768 MB of RAM. B. The RAM module is not seated properly. C. The technician installed the wrong RAM module. D. The laptop is equipped with an onboard video adapter that uses shared video memory. Answer: D81A Certkiller .com technician must convert a FAT32 volume to NTFS without loosing any data on the drive. Which of the following commands should the technician use? A. CHKDSK B. CONVERT C. FORMAT D. DEFRAG Answer: B82Which of the following tools can be used to correct corrupt file problems or disk errors? A. REGEDIT B. ATTRIB C. SCANDISK D. FDISK Answer: C83A Certkiller .com user wants to stop certain applications from running automatically when his Windows XP computer a starts. Which of the following utilities can he user? A. MSCONFIG.EXE B. CONFIG.EXE C. REGEDIT.EXE D. SYSEDIT.EXE Answer: A84You need to delete unused files on a Windows XP computer in order to free up extra hard drive space. Which utility should you use? A. Disk Cleanup B. DEL C. SCANDISK D. Disk Defragmenter Answer: A85A Certkiller .com technician needs to configure and manage partitions on hard disk from the Recovery Console. Which of the following commands should the technician use? A. Diskpart B. Fixboot C. Fixmbr D. None of the above Answer: A86Which type of issue does the "A device in SYSTEM.INI cannot be found" error message pertain to? A. System files issue. B. Configuration files issue. C. Swap files issue. D. All of the above. Answer: B87If you receive the "Non-system disk or disk error" error message, what issue should you start troubleshooting for? A. A missing operating system where the computer failed to locate a boot sector with an operating system installed. B. A memory size error. C. A missing or malfunctioning keyboard. D. None of the above Answer: A88Which of the following types of printers use a drum? A. Ink jet printers B. Laser printers C. Dot Matrix printers D. Bubble jet printers Answer: B89A ______ cables is used to connect a printer to the parallel port of a computer. A. IEEE 1284 B. RS-232C C. IEEE 802.11 D. IEEE 1394 Answer: A90Certkiller .com has a printer that is attached to a Windows 2000 computer. The spooler service on the computer has stopped. What command should the Certkiller .com technician issue to restart the spooler service from the command line? A. spooler service restart B. net spooler restart C. restart service D. spooler restart Answer: B91The prints from a Certkiller .com laser printer appear smudged image and rubs off easily. Which of the following is the MOST probable cause of this problem? What problem can be cause by the fusing assembly? A. The pickup assembly is worn. B. The fusing assembly is faulty. C. The wrong paper is being used. D. The erasure lamp is faulty. Answer: B92The Certkiller .com technician has replaced the toner cartridge on a laser printer that was producing faded prints. However, the print quality does not improve. What is the MOST likely the cause of this problem? A. The laser scanner is faulty. B. The EP drum is not fully discharging. C. The transfer corona is faulty. D. The power supply is faulty. Answer: C93Which of the following would not be an advantage of the NTFS file system over the FAT32 file system? A. more file formats. B. larger file sizes. C. file encryption. D. larger volumes. Answer: A94Fault tolerance is provided by the following RAID disk arrays (Select TWO). A. RAID 0 B. RAID 5 C. RAID 1 D. RAID 3 E. RAID 4 Answer: B,C95You are working as a technician at Certkiller .com. You are troubleshooting a computer, that during the POST (power-on self test) makes several beeps and then stalls. Which of the following components would most probably be the cause of the problem? A. hard drive B. memory C. power supply D. sound card Answer: B96You are working as a technician at Certkiller .com. A user calls and asks for help with his workstation. The computer is running Windows XP Professional and seems to have become unstable lately. Which of the following should be used to check the operating system integrity? A. SFC /SCANNOW B. Dr. Watson C. SFC /SCAN D. SFC / Answer: A97You are working as a senior technician at Certkiller .com. You have been preparing a master computer that you will duplicate to the other computers in the economics department. Which of the following can be used to prepare a disk image for duplication? A. sysprep B. xcopy C. shadow copy D. mmc Answer: A98You are working as a Technician at Certkiller .com. You have just installed an additional 300GB hard drive in a computer. The system hard drive is configured with NTFS and the new data hard drive came configured with FAT32. Which of the following statements are true? (Select TWO). A. The cluster size is smaller and storage is more efficient on the system drive. B. The cluster size is larger and storage is more efficient on the system drive. C. Files on the system drive can be secured. D. Larger logical drives can be made on the data drive. Answer: A,C99You are working as a technician at Certkiller .com. All computers at Certkiller .com uses hard disks formatted with NTFS. You have been asked to investigate if it is possible to track and control the amount disk space used in the computer in the research department. Which of the following tools could you use in order to accomplish this? A. Disk Cleanup B. Disk Dump C. Disk Quotas D. Disk Defragmenter Answer: C100You are a technician at Certkiller .com. You have been called to a user, who works from home, in order to help her with an ADSL connection. What is the FIRST thing you should do when you arrive on-site? A. ask the user if you can install an upgraded firmware to improve performance. B. ask is the user has a clue about what the problem might be. C. ask whether the user is ready to work on the problem. D. swap the faulty ADSL modem with a known-good modem. Answer: C101A customer requires a shock resistant mass storage device in their PC. Which of the following drives should the technician install? A. Hard diskB. Solid stateC. FloppyD. TapeAnswer: B102After powering on a workstation, an intrusion alert is displayed indicating that the case has been opened. How would a technician reset the alert? A. Change the setting in the registryB. Change the setting in the BIOSC. Change the setting in the DOS startup filesD. Change the setting in the Control PanelAnswer: B103A technician plugs a USB device into the computer. The system tray displays a message that reports the device is installed, but may not work properly. Which of the following is the MOST likely cause of the message? A. The device needs a firmware update.B. The device needs an updated driver installed.C. The plugged in device is too slow for the USB port speed.D. The device is incompatible with the installed version of Windows.Answer: B104A technician wants to setup hardware RAID 5 for a Windows 7 computer to prevent data loss. In which of the following locations would the technician MOST likely change the setting? A. Disk ManagerB. Device ManagerC. Windows Boot DVDD. The BIOSAnswer: D105Which of the following will fix a laptop with dark irregular lines that run the width of the display in all video modes? A. Perform a System RestoreB. Replace the video capture cardC. Change the resolution to 800 x 600D. Replace the LCDAnswer: D106A user powers up their desktop PC, and instead of booting up normally, the user is taken into the BIOS setup. Which of the following is the MOST likely problem? A. The MBR is corruptB. NTLDR cannot be found by the systemC. A faulty CMOS batteryD. The BIOS requires a firmware updateAnswer: C107A user is working in a small office home office (SOHO), running Windows XP, and cannot connect to the Internet. The office uses a router that is setup as a DHCP server. The technician types IPCONFIG in the command prompt, the following appears: IP address 0.0.0.0 Gateway 0.0.0.0 Subnet Mask 0.0.0.0 DNS 0.0.0.0 Which of the following should the technician check FIRST? A. Network adapter driversB. Router settingsC. Network cableD. FirewallAnswer: C108A customer wants to have a technician increase the amount of RAM in the laptop. Which of the following should the technician do FIRST before adding more memory? A. Check for available hard drive spaceB. Check the laptop documentationC. Open the case to check for an available slotD. Check the operating system on the computerAnswer: B109A user is cleaning up their temporary Internet files and is concerned about the number of cookies discovered. Which of the following is a correct statement about cookies? A. Cookies are spyware.B. Cookies are not always malicious.C. Cookies cannot be removed.D. Cookies should be disabled at all times.Answer: B110Which of the following commands would be used to move the working directory from C:\ to C:\Windows? A. CDB. RDC. MDD. SFCAnswer: A110Which of the following commands will make exact duplicates of files and directory trees?A. TREEB. COPYC. XCOPYD. DISKCOPYAnswer: C111A user has reported they cannot access the wireless network. The network technician checks the laptop and cannot view the wireless adapter settings. Which of the following should the technician do to connect the user to the wireless network? A. Enable the network cardB. Enable WPA2 encryption on the WAPC. Change the WAP to support 802.11nD. Set the Default Gateway to 169.254.1.1Answer: A112A new web-based application is not working properly because it is unable to connect to certain external sites after it was installed within the internal corporate network. Which of the following will need to be configured to help troubleshoot this issue? A. Firewall port settingsB. Mail protocol settingsC. DNS settingsD. FTP settingsAnswer: A113Windows 7 has notified a user that it has blocked access to the following address in Internet Explorer: ftp://ftp.microsoft.com:21. Which of the following Windows features should the technician check to ensure that there is not an explicit rule disallowing access to this location? A. Windows BitlockerB. Windows BranchCacheC. Windows User Account ControlD. Windows FirewallAnswer: D114A technician is backing up a 10GB hard drive to an external drive. The PC reports the transfer time will be two hours. Which of the following ports is the drive MOST likely connected to? A. USB 1.1B. Firewire 100C. USB 3.0D. eSATAAnswer: A115A system had been infected with a virus. After the virus was removed it returned a few days later even though the system had not been connected to a network or external media. Which of the following should be done to remove the virus more permanently? A. Enable last known good configuration.B. Disable system restore and clean the PC.C. Remove all spyware prior to a virus scan.D. Run the virus scanner with heuristics.Answer: B116A user states that their laptop is slow and they would like to increase the memory. Which of the following memory modules should a technician install? A. 2GB SDRAM RIMMB. 2GB SDRAM SODIMMC. 4GB DDR DIMMD. 4GB RAMBUS DIMMAnswer: B117Whenever a user tries to print a specially formatted document, it prints but strips the text and has incorrect spacing. Which of the following issues is the most likely cause? A. The wrong size paper is being usedB. The printer is not on the networkC. The print spooler service is not runningD. The wrong printer drivers are installedAnswer: D118Upon starting a computer, the CHKDSK utility always runs before the operating system loads. Which of the following components should the technician check in order to more closely diagnose the problem? A. Power supply and cablesB. Processor and BIOS settingsC. Hard drive and connecting cablesD. USB controller and FireWire connectorAnswer: C119A technician is tasked with replacing the processor and cooling fan in a laptop computer. Which of the following procedures will help the technician complete the task efficiently? A. Place all of the screws together in one container so they do not get lost.B. Place the screws for each disassembly step together in an organizer.C. Tag each screw hole with a different color coded tag.D. Throw away the existing screws and replace them with new screws.Answer: B120During startup an error message "One or more services failed to start" appears. Which of the following methods can be used to examine the status of the services running on the computer? (Select TWO). A. Click on Start > Control Panel > SystemB. Right click on My Computer and select Properties from the context menuC. Click on Start > Control Panel > Administrative ToolsD. Right click on the Desktop and select Properties from the context menuE. Right click on My Computer and select Manage from the context menuAnswer: C,E121Which of the following operating systems supports full BitLocker functionality?A. Windows XPB. Windows 7 ProfessionalC. Windows Vista HomeD. Windows 7 EnterpriseAnswer: D122A user has a laptop that they need to get ready for an outdoor presentation. The user is concerned that the laptop will turn off the screen or go into standby before their presentation is complete. Which of the following Control Panel paths should the technician use in order to prevent this from occurring? A. System -> HardwareB. Power Options -> Power SchemesC. System -> Advanced -> PerformanceD. Power Options -> HibernateAnswer: B123A user states their workstation will not reach the login screen. Which of the following commands can be used to write a new partition boot sector to the system partition in the Recovery Console? A. FIXMBRB. BOOTCFGC. FIXBOOTD. DISKPARTAnswer: C124A user has an LCD and a CRT monitor attached to their workstation. The colors are slightly off on the CRT but not the LCD. Which of the following controls should be used in troubleshooting? A. GeometryB. ContrastC. BrightnessD. DegaussAnswer: D125A technician installed a second hard drive in a computer. Upon restart, a message appears statinG. "primary drive 0 not found. Press F1 to continue. Which of the following should the technician check FIRST? A. That NTLDR and boot.ini are not missingB. Proper drive installation (e.g. cables/jumpers)C. If computer can boot into safe modeD. If the BIOS boot settings are correctAnswer: B126Which of the following resources is MOST important for accessing remote virtual environments on a client machine? A. Network speedB. CPU speedC. High speed memoryD. Drive spaceAnswer: A127A user sent an email requesting that a technician check if a computer is on and connected to the Internet so the user can login from home. Which of the following commands in the command prompt would a technician use to verify if the computer is on and connected without having to go to the computer? A. NSLOOKUPB. NETSTATC. PINGD. IPCONFIGAnswer: C128A technician recently removed spyware from a computer and now the user is getting error messages about system files. Which of the following tools would a technician use to verify all system files are intact and in their original versions? A. Repair DiskB. SFCC. FIXMBRD. ASRAnswer: B129The computer starts up and runs for less than a minute before shutting down or locking up. This is a symptom of: A. overheating.B. incompatible RAM.C. a faulty hard drive.D. a bad internal USB hub.Answer: A130A computer’s time settings reset every time it is unplugged. This is a symptom of a faulty:A. memory module.B. power supply.C. motherboard.D. CMOS battery.Answer: D131A technician is configuring a PC that will have confidential information stored on it. To ensure that only authorized users can access this PC, which of the following should the technician do? (Select TWO). A. Disable the guest accountB. Install antivirus applicationsC. Disable DHCPD. Change the SSIDE. Change the default usernameAnswer: A,E132A technician recently installed a new video card in a PC. The PC already has integrated video on the motherboard. When the technician turns on the PC, there is no video. Which of the following is MOST likely the cause? A. The motherboard BIOS version is out of date.B. The incorrect video card drivers are installed.C. The power connector for the video card is unplugged.D. The video card is unsupported by the motherboard.Answer: C133Which of the following BEST describes a method for installing an operating system across the network? A. USB 3.0B. IEEE 1394C. PXED. NTFSAnswer: C134A technician has been dispatched to a customer site to diagnose an issue where the computer turns off intermittently. Upon arriving at the site, the technician detects a smoke smell coming from the computer. Which of the following is the BEST solution? A. Power down the system and replace the CPU.B. Power down the system and replace the power supply.C. Install an additional case fan for proper ventilation.D. Remove the side panel for proper ventilation.Answer: B135A technician has installed several new devices on a computer. The computer no longer boots properly, and the technician needs to determine which device driver may be causing the issue. Which of the following allows the operating system to run in a limited capacity with minimal device drivers loaded? A. Last known good configurationB. Recovery consoleC. Power shellD. Safe modeAnswer: D136Slow system performance may be caused by which of the following?A. Faulty firewallB. VirusesC. Second hard driveD. Outdated BIOSAnswer: B137A technician notices that a computer is making a loud clicking noise but continues to run. System speed is barely affected, but they cannot access certain drives. These are the symptoms of which of the following? A. Failing second hard driveB. Failing system hard driveC. Bad CMOS chipD. Bad CPU fanAnswer: A138Which of the following operating systems has a 64-bit version?A. Windows XP HomeB. Windows XP Media CenterC. Windows 7 StarterD. Windows XP ProfessionalAnswer: D139While using an application on a Windows XP desktop PC, a BSOD appears. Which of the following should the technician select upon reboot to troubleshoot this issue? A. Boot to safe modeB. Boot to last known good configurationC. Boot to another OS on a second partitionD. Boot normallyAnswer: A140A technician would like to map a network drive. Which of the following indicates the correct path for mapping a network drive? A. \\share\servernameB. \\username\servernameC. \\password\shareD. \\servername\shareAnswer: D N+ 1. Keyword and blacklist filtering would be handled at which level in a network?A. Layer 2 managed switchB. DHCP serverC. Hardware firewallD. BridgeAnswer: C2. When installing two 802.11g access points in the same building, which of the following channels will MOST likely be used to minimize interference? A. 5 and 6B. 1 and 6C. 6 and 10D. 2 and 6Answer: B3. Which of the following devices transmits timed broadcasts onto an active network?A. BridgeB. Unmanaged switchC. DHCP clientD. FirewallAnswer: C4. Which of the following describes the location where an administrator would terminate a bundle of CAT5e cables? A. SwitchB. Smart jackC. RouterD. Patch panelAnswer: D5. Which of the following can be an STP cable?A. RG-6B. CAT5eC. FiberD. RG-59Answer: B6. A web server is running correctly but sending a RST packet to any client trying to connect using HTTP on TCP port 80. Which of the following tools should be used to determine the listening port of the web server? A. RouteB. IfconfigC. NetstatD. NslookupAnswer: C7. At which of the following layers does the TFTP protocol operate?A. Layer 1B. Layer 4C. Layer 5D. Layer 7Answer: D8. Which of the following utilities would be used to display a NIC's cache of MAC addresses?A. arpB. nslookupC. digD. netstatAnswer: A9. Which of the following is an intelligent repeater that is aware of the MAC addresses of the nodes on either side of the data link? A. GatewayB. HubC. BridgeD. RouterAnswer: C10. At which of the following layers does the ICMP protocol operate?A. Layer 1B. Layer 3C. Layer 4D. Layer 5Answer: B11. A user reports sporadic connectivity with their wireless connection. A technician determines the wireless speed reported by the laptop to be 1Mbps. Which of the following is the MOST likely cause of this issue? A. The client does not support 802.11n.B. Incorrect frequency on the client is being used.C. Incorrect encryption on the AP.D. The client distance from the AP.Answer: DExplanation:12. Which of the following tools would an administrator use to determine if a DNS server is answering authoritatively for a domain? A. nbtstatB. digC. netstatD. hostnameAnswer: B13. By default, which of the following ports would a network need to have opened to allow for the transmission of incoming and outgoing email? (Select TWO). A. 21B. 25C. 80D. 110E. 123Answer: B,D14. An administrator is setting up a network and would like to prevent users from having the ability to plug their PC into the network to receive an IP address. Which of the following addressing schemes should the technician use? A. NATB. DynamicC. SubnettingD. StaticAnswer: D15. An administrator is setting up a network and would like to prevent users from having the ability to plug their PC into the network to receive an IP address. Which of the following addressing schemes should the technician use? A. NATB. DynamicC. SubnettingD. StaticAnswer: D16. Which of the following connector types is used for coax cable?A. BNCB. STC. LCD. SCAnswer: A17. A technician claims to have crimped a patch cable according to the T568A standard on one end and T568B on the other. Which of the following results is to be expected? A. Since only half the leads are used, the cable will only work at 100Mbps.B. The cable will only work at a maximum of 100Mbps. since 1Gbps only works on T568B cables.C. There will be no proper data continuity; the standards utilize two different wiring diagrams.D. The cable will only work at a maximum of 10Mbps. since 100/1000Mbps only works on T568B pure cables Answer: C18. An administrator is setting up a security camera that will send the same feed to twelve of the twenty workstations on the network. Which of the following addressing schemes was designed for this scenario? A. MulticastB. UnicastC. BroadcastD. Peer-to-peerAnswer: A19. A technician would like to separate the HR department's workstations from the other workstations at the company. Which of the following network topologies should be used? A. Peer to peerB. SubnettingC. VLAND. VPNAnswer: C20. A client wants to improve the wireless coverage on the third floor of their house. The wireless router is located in the basement and there is no easy way to run a cable to the third floor. Which of the following devices should be installed to extend the wireless coverage to cover the entire third floor without running cables? A. SwitchB. RouterC. RepeaterD. BridgeAnswer: C21. Which of the following describes what the number two represents in l00Base2 cabling?A. FiberB. Coaxial cableC. UTPD. Twisted pairAnswer: B22. A crossover cable is MOST commonly associated with which of the following layers of the OSI model? A. SessionB. ApplicationC. NetworkD. PhysicalAnswer: D23. Which of the following devices is used to connect multiple devices to a network and does not stop broadcast traffic? A. SwitchB. HubC. ModemD. RepeaterAnswer: B24. A network administrator needs to add an additional connection to a room. The administrator adds a new Ethernet switch and must connect it to an existing switch. Which cable type should be used to connect the two switches? A. CAT3 cableB. Serial cableC. Crossover cableD. Rollover cableAnswer: C25. Prioritizing traffic between data and voice is defined as which of the following?A. Caching enginesB. Proxy serverC. QoSD. Load balancingAnswer: C26. A demarcation point is usually installed and managed by which of the following providers?A. Web host providerB. VoIP companyC. Telephone companyD. Hardware manufacturerAnswer: C27. Users are unable to access the Internet but the users are able to send/receive email from their desktops. Which of the following ports is MOST likely being blocked? A. 25B. 80C. 110D. 143Answer: B28. Which of the following would need to be implemented on a wireless router to allow network access based on a passphrase that the administrator would supply? A. WPA-PSK encryptionB. SSID broadcastC. Port forwardingD. MAC filteringAnswer: A29. Which of the following performs posture assessments for unknown devices that connect to the network? A. PKIB. EAPC. NACD. AAAAnswer: C30. At which of the following OSI model layers is HTTPS encryption performed?A. Layer 3B. Layer 5C. Layer 6D. Layer 7Answer: C31. An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network? A. Secure VPNB. MAC filteringC. IP filteringD. Static IP addressesAnswer: B32. Which of the following cables is the MOST susceptible to interference?A. FiberB. CoaxC. UTPD. STPAnswer: C33. On which of the following network devices would an administrator configure an ACL?A. RouterB. HubC. RepeaterD. NICAnswer: A34. An administrator would like to know the name of the workstation that is being repaired. Which of the following commands, without parameters, will provide this information? A. HostnameB. IpconfigC. NetstatD. PingAnswer: A35. Which of the following routing protocols involves all routers knowing the connections status of other routers within the network? A. RIPv2B. OSPFC. IGRPD. BGPAnswer: B36. A technician is working on a SOHO wireless network and notices that the wireless adaptor in the laptop shows excellent connection at 11Mbps. The technician has a wireless N adaptor. Which of the following would BEST describe this connection speed? A. The laptop is too far away from the WAP.B. The WAP is using 802.11a frequencies.C. The laptop is only set to allow 802.11n connections.D. The technician is on an 802.11b network.Answer: D37. Which of the following network devices would MOST likely be installed on a network to help reduce broadcast traffic and to allow individual virtual networks? A. SwitchB. RepeaterC. HubD. WAPAnswer: A38. Which of the following connector types is commonly identified by two rows of pins with four in one row and five in the other? A. DB-9B. RJ-45C. SCD. BNCAnswer: A39. Which of the following commands would allow a computer to acquire an IP address?A. ipconfig/releaseB. ipconfig/renewC. ipconfig/allD. ipconfig/helpAnswer: B40. Several users are sending emails to CompTIA.org. but they are not being received. Which of the following commands could be used to verify that the company is able to connect to the mail service at CompTIA.org? A. PingB. ArpC. DigD. telnetAnswer: D41. Which of the following metrics indentifies the number of connections that is between two devices?A. Hop countB. MTUC. LatencyD. BandwidthAnswer: A42. Which of the following has a maximum data rate of 11Mbps?A. 802.11nB. 802.11gC. 802.11bD. 802.11aAnswer: C43. Which of the following networks are reserved for private IP addresses?A. 168.129.00/24B. 172.16.128.0/15C. 192.168.0.0/16D. 162.17.0.0/12Answer: C44. An administrator needs to terminate network cables that have just been installed in the main communications closet. Which of the following tools is required? A. MultimeterB. SnipsC. Toner probeD. Punch down toolAnswer: D45. A computer is able to ping other devices on the same network but is unable to ping devices on another network. Which of the following needs to be configured? A. DNS primary serverB. Host routeC. Proxy ARPD. Default gatewayAnswer: D46. Which of the following restricts network access to a router administrator's interface?A. IDSB. SSLC. ACLD. SMNPv2Answer: C47. In which of the following topologies could the failure of one machine cause the entire network to stop functioning? A. MeshB. Token ringC. StarD. Spanning treeAnswer: B48. A user reports that their laptop does not have network connectivity, but was working fine last week. The technician executes IPCONFIG to see what the IP address is but it comes up with a 169.254.254.1 address. This address is not part of the company's subnet. Which of the following MOST likely identifies this address type? A. MulticastB. DHCPC. APIPAD. BroadcastAnswer: C49. Determining when to retransmit frames is an example of which of the following Ethernet properties? A. Carrier senseB. Collision detectionC. Multiple access pointsD. Collision avoidanceAnswer: B50. Which of the following would Joe, a technician, configure to modify the time a device will hold an IP address provided through DHCP? A. DNS suffixesB. LeasesC. Static IP addressingD. ReservationsAnswer: B51. Sandy, a technician, wants to limit access to a wireless network to company owned laptops, but does not want to use an encryption method. Which of the following methods would be BEST to accomplish this? A. MAC filteringB. SSL VPNC. PPPoED. WPA EnterpriseAnswer: A52. Joe, a network technician, is tasked with installing a router and firewall to get an office working with Internet access. Which of the following features MUST be configured to allow sharing of a single public IP address? A. QoSB. POP3C. PATD. SMTPAnswer: C53. Which of the following is a form of encrypting packets for safe, secure data transmission within a network? A. RASB. PPTPC. IPSecD. ICAAnswer: C54. Two duplicate pieces of equipment can be used in conjunction for which of the following purposes? (Select TWO) A. High availabilityB. Fault toleranceC. Reduce latencyD. Wi-MAXE. CARPAnswer: A,B55. The T568B wiring standard slates that CAT5 cables should be coded as follows:A. White/Orange, Orange, White/Green, Green, Blue, White/Blue, White/Brown, Brown,B. White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown,C. White/Orange, Orange, \White/Green, Green, White/Blue, Blue, White/Brown, Brown,D. White/Orange, Orange, White/Green, Blue,Answer: B56. Using network monitoring tools would allow an administrator to do which of the following?A. Configure offline devicesB. Examine performance issuesC. Install additional software and updatesD. View syslog eventsAnswer: B57. Which of the following wireless technologies can operate at only 5GHz?A. 802.11b/gB. 802.11gC. 802.11bD. 802.11aAnswer: D58. Which of the following devices allows multiple internal IP addresses to access an external website with minimal impact to the network bandwidth? A. ProxyB. Load balancerC. RouterD. Bandwidth shaperAnswer: A59. A VPN connection is not working correctly and the technician is unable to ping the VPN server. Which of the following actions should the technician do FIRST? A. Call their local ISPB. Verify the IP information of the serverC. Check their local Internet connectionD. Verify the hostname of the serverAnswer: C60. A technician wants to use an existing DHCP server for three additional VLANs. Which of the following features needs to be configured to allow for this addition? A. DHCP serverB. Proxy serverC. RepeaterD. DHCP relayAnswer: D61. A client is having problems connecting remotely after replacing a router. An administrator has just created an action plan. Which of the following is the NEXT step the administrator should perform to resolve this issue? A. Implement and test the solution.B. Determine if escalation is necessary.C. Identify the affected areas of the network.D. Identify the results and effects of the solutionAnswer: A62. Which of the following technologies was designed to provide the FASTEST data rates over analog phone lines? A. RADSLB. SONETC. ADSLD. MPLSAnswer: C63. Which of the following wireless standards can be used to avoid the 2.4GHz range? (Select TWO).A. 802.11gB. 802.1XC. 802.11bD. 802.1 nE. 802.11aAnswer: D,E64. A small office in which all workstations are using an ISP provided IP range has noticed a consistent decrease in network traffic speed. The decrease does not occur when the gateway to the ISP is disconnected. Which of the following should the administrator implement? A. Multicast addressingB. Load balancingC. Address translationD. DHCPAnswer: C65. Which of the following should be used to test an internal NIC without having to connect it to the network? A. Loopback cableB. Crossover cableC. Rollover cableD. Straight cableAnswer: A66. Kerberos is a form of user authentication that:A. Provides users access to network resources.B. Performs router commands after user authentication.C. Provides users with remote access only capabilities.D. Does not require an authentication serverAnswer: A67. Computers on a small network are not able to receive new addresses from the DHCP server. However, the administrator has checked the server and ensured it is connected, responding, and functional. Which of the following is the MOST likely problem in this scenario? A. The DHCP server has an incorrect gateway configured.B. The DHCP server was incorrectly configured with a six hour lease time on addresses.C. The DHCP server was incorrectly configured with no-expiring lease time on addresses.D. The DNS server is no longer functional and internal name-address resolution is down.Answer: C68. Which of the following OSI model layers is used for logical addressing?A. PhysicalB. TransportC. NetworkD. Data linkAnswer: C69. Which of the following is the full range of address block 192.16876.0/23?A. 192.168.76.0-192.168.77.255B. 192.168.76.0-192.168.76.255C. 192.168.76.0-192.168.76.23D. 192.168.76.0-192.168.78 0Answer: A70. A network at a small business utilizes a star topology and is experiencing frequent collisions among data packets. Which of the following devices is MOST likely being used? A. Unmanaged switchB. Hardware firewallC. HubD. Managed switchAnswer: C71. A technician is troubleshooting a network connectivity issue with a user's desktop configured to use a static IP address. The technician notes the following configuration: IP 172.16.2.0 NETMASK 255.255.254.0 DEFAULT GATEWAY 172.16.1.1 DNS 192.168.1.1 Which of the following changes will allow the desktop to communicate properly with remote networks? A. Changing the DNS to 172.16.1.100B. Changing the WINS server to 172.174.136C. Changing the netmask to 255.255.255.0D. Changing the default gateway to 172.16.3.1Answer: D72. An administrator needs to know the workstation name of a user who called in for support in order to remotely manage it. After calling the user and having the user open a command prompt, which of the following commands would the administrator ask the user to type? A. NetstatB. IfconfigC. HostnameD. PingAnswer: C73. Which of the following describes 1Gigabit Ethernet?A. 10GBaseERB. 10Base2C. 1000BaseTD. 100Base5Answer: C74. Which of the following remote access methods allows an administrator to take control of a user's machine and block the user from seeing the active session? A. PPPB. PPPoEC. RDPD. RASAnswer: C75. On a network switch, which of the following is the default native VLAN?A. 0B. 1C. 1024D. 4096Answer: B76. Which of the following protocols is used to encrypt data between web servers and web browsers?A. SMTPB. SIPC. HTTPD. SSLAnswer: D77. Which of the following devices separates a LAN segment into two collision domains, without affecting the broadcast domain? A. FirewallB. BridgeC. RepeaterD. RouterAnswer: B78. A company wants to secure access to its internal wireless network. The company wants to use the most secure means to access the network. Which of the following is the BEST choice for wireless security in this situation? A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryptionAnswer: D79. Which of the following represents the physical address of a network access card?A. FF01:D2:C4:87::11B. 00-30-48-83-9B-C8C. 08-9D-35-22-L2-34-FF-21D. 2D1A:C3:0:1C3B:2AD:FF:FEBE:9D3AAnswer: B80. Which of the following is an invalid IPv4 address?A. 225.0.0.1B. 254.254.0.0C. 256.0.0.4D. 224.2.1.4Answer: C81. 1000BaseT has a MAXIMUM run distance of:A. 25 meters (82 feet)B. 100 meters (328 feet)C. 500 meters (1640 feet)D. 1000 meters (3280 feet)Answer: B82. A technician is reporting wireless transmission speeds of 300Mbps. Which of the following wireless standards is being used? A. 802.11aB. 802.11bC. 802.11gD. 802.11nAnswer: D83. Which of the following LAN technologies is considered fast Ethernet and uses two pairs of cabling, one pair for sending and the other pair for receiving? A. 100BaseT4B. 100BaseTXC. 100BaseXD. 100BaseFXAnswer: B84. Which of the following DNS records would be queried to locate a company's mail server?A. AB. MXC. AAAAD. CNAMEAnswer: B85. Which of the following uses a ring topology?A. DSLB. EthernetC. DOCSISD. SONETAnswer: D86. Which of the following connector types would Sandy, a network technician, use to connect a serial cable? A. RJ-11B. BNCC. LCD. DB-9Answer: D87. Karen, a technician, needs to test if domain name resolution is functioning properly. Which of the following software tools would she use to accomplish this? (Select TWO). A. arpB. digC. routeD. nslookupE. netstatAnswer: B,D88. Which of the following protocols would Kurt, a technician, use to synchronize local date and time of a client workstation to that of a server? A. RTPB. NTPC. TFTPD. ARPAnswer: B89. A small office has asked to have six PCs networked together by Joe, a consultant. The office users want file sharing capability with no access to the Internet. Which of the following items will Joe need? (Select TWO). A. Network bridgeB. RG-59 patch cablingC. CAT5e patch cablingD. FirewallE. SwitchAnswer: C,E90. Which of the following services would Karen, a technician, use to create or update a client's DNS 'A' and 'PTR' records automatically? A. KerberosB. BINDC. WINSD. DHCPAnswer: D91. Joe, a network technician, blocks access to ports 25,110, and 143 on the firewall. Which of the following application services will be blocked due to this? A. Email sending and receivingB. Domain Name ServiceC. FTP access to external serversD. Remote desktop accessAnswer: A92. CAT6 Ethernet cabling has a rated maximum transmission capability of:A. 10MbpsB. 100MbpsC. 20,000MbpsD. 10,000MbpsAnswer: D93. Which of the following would Karen, a technician, do to monitor remote traffic through an access point? A. Enable an SNMP agentB. Enable network mappingC. Set monitoring SSIDD. Select WPA2Answer: A94. Which of the following network devices MOST likely functions as a network repeater or a bridge?A. VPN concentratorB. IDSC. Access pointD. FirewallAnswer: C95. Which of the following VPN methods is BEST used for connecting a remote office to the main company office? A. WEP-to-WPAB. RDP-to-RASC. Client-to-siteD. Site-to-siteAnswer: D96. Users are unable to access the company’s intranet website. Which of the following attacks has the network MOST likely experienced? A. Man-in-the-middleB. SmurfC. TrojanD. DoSAnswer: D97. Which of the following has a maximum transfer rate of 54Mbps and operates at the 5GHz frequency? A. 802.11aB. 802.11bC. 802.11gD. 802.11nAnswer: A98. Joe, a network technician, has configured a server with the following IP settings: IP Address: 192.168.1.40/27 Default Gateway: 192.168.1.64 DNS: 192.168.1.33 The server cannot access the Internet. Which of the following settings needs to be changed? A. Default gatewayB. IP addressC. VLAND. DNSAnswer: A99. After a switch upgrade, several users report no connection to the Internet, while other users report no problems. Which of the following is the MOST likely problem? A. Wrong gatewayB. Faulty or missing routesC. No DNSD. VLAN port assignmentsAnswer: D100. Which of the following technologies has different upload and download speeds?A. OC12B. SDSLC. OC3D. ADSLAnswer: D101. Which of the following is a Class A private IP address?A. 4.2.2.2B. 10.1.1.45C. 169.254.9.15D. 192.168.0 100Answer: B102. Which of the following defines the purpose of a DHCP scope?A. To allocate a preset range of MAC addresses available for assignment.B. To tell a DHCP server to exclude IP addresses.C. To properly configure a DHCP server's allowed bandwidth level.D. To allocate a preset range of IP addresses available for assignment.Answer: D103. Karen, a technician, is connecting a new desktop computer to a switch. She was only able to locate one cable in the office for the installation. The wires at each end are color coded as follows: End A: orange-white, orange, green-white, blue, blue-white, green, brown-white, brown End B: green-white, green, orange-white, blue, blue-white, orange, brow-white, brown Which of the following should Karen do to complete the installation? A. Re-end the provided cable, keeping the wiring the same.B. Use the provided cableC. Purchase a crossover cable.D. Purchase a straight-through cableAnswer: D104. Which of the following identifies the WLAN Joe, a user, is connected to?A. SSIDB. FrequencyC. WEPD. ChannelAnswer: A105. Which of the following connectors push and twist-on?A. LCB. SCC. STD. RJ-45Answer: C106. Which of the following security devices is used in providing packet and MAC address filtering services for the network? A. Host-based proxy serverB. Network-based firewallC. IDSD. IPSAnswer: B107. Which of the following media types will block EMI?A. UTPB. SerialC. STPD. Non-plenumAnswer: C108. Which of the following devices will allow Sandy, a user, to see a cached copy of websites?A. Content switchB. DNS serverC. Proxy serverD. Load balancerAnswer: C109. Which of the following is a purpose of a VLAN?A. Decreases bandwidth on a networkB. Segments broadcast trafficC. Increases port speedD. Allows another connection to the routerAnswer: B110. Blocking a known malicious web address by using the ACL on the firewall is an example of which of the following? A. IP filteringB. Application filteringC. MAC filteringD. Port filteringAnswer: A111. Which of the following DNS records would allow for a website to have more than one FQDN?A. TXTB. PTRC. MXD. CNAMEAnswer: D112. Which of the following commands can Sandy, a technician, use on a server to display the default router setting? A. pingB. nslookupC. routeD. arpAnswer: C113. Which of the following OSI layers performs error detection using a Frame Check Sequence?A. SessionB. TransportC. PhysicalD. Data linkAnswer: D114. Which of the following layers of the OSI model is above the Session layer?A. Data linkB. PresentationC. PhysicalD. TransportAnswer: B115. Which of the following is the loopback address for IPv6?A. ::1B. ::255C. 127.0.0.1D. 127:0:0:1Answer: A116. Joe, a network administrator, has been requested to install wireless access throughout the entire building, while utilizing a single SSID. Which of the following options will meet this requirement? A. Set a separate VLAN on each WAP with the same encryption typeB. Set the SSID on each WAP and set contiguous WAPs to different channelsC. Set the SSID on each WAP and set contiguous WAPs to the same channelD. Set a separate VLAN on each WAP with the same frequencyAnswer: B117. Which of the following allows for multiple operating systems to be run simultaneously on a single server? A. Dual bootB. Multiple hard drivesC. PXE bootD. Virtual machinesAnswer: D118. Sandy, a network technician, would like to keep the IP address of the Human Resource department" s server in the same group of 100 DHCP IP addresses that are assigned to the Human Resource department's employee workstations. Which of the following would BEST allow this and have the ability for the server to keep the same IP address? A. Implement a set of static IPs for the entire human resource department.B. Use a DHCP reservation for the server IP address.C. Use a small DHCP scope for the human resource department.D. Connect the server to a router in the network closet on the same floor.Answer: B119. Which of the following wireless network standards allows for the HIGHEST speeds?A. 802.11aB. 802.11bC. 802.11gD. 802.11nAnswer: D120. Which of the following would Joe, a technician, MOST likely use to remotely verify port configuration of a switch? A. traceroute commandB. SNMP monitorC. nbtstat commandD. dig commandAnswer: A121. Which of the following can be used to view the list of ports on which a server is listening?A. digB. net statisticsC. netstatD. nslookupAnswer: C122. Which of the following is an invalid MAC address?A. AA:CE:58:FD:90:08B. 44:98:3E:F8:33:23C. 56:AD:BX89:55:54D. 94:9E:FE:EE:8C:DFAnswer: C123. On which of the following layers does a hub function?A. TransportB. Data linkC. PhysicalD. NetworkAnswer: C124. Which TCP/IP model layer does the OSI model layer named 'session' respond to?A. ApplicationB. PresentationC. InternetD. TransportAnswer: B125. Which of the following defines access for a network?A. ACLB. RDPC. RASD. ARPAnswer: A126. Which of the following uses copper wiring?A. 10GBaseERB. 10GBaseLWC. 100BaseFXD. 1000BaseTAnswer: D127. Which of the following tools allows Kurt, an administrator, to test connectivity between two computers? A. routeB. pingC. ipconfigD. tfconfigAnswer: B128. Which of the following is the MAIN purpose of a packet sniffer?A. To determine open ports on a serverB. To ensure encryption is being usedC. To analyze network trafficD. To prevent network intrusionAnswer: C129. Karen, a network technician, is troubleshooting a problem and has just established a plan of action to resolve the problem. Which of the following is the NEXT step in the troubleshooting methodology? A. Verify full system functionality and if applicable implement preventative measures.B. Implement the solution or escalate as necessary.C. Document findings, actions, and outcomes.D. Establish a theory of probable cause (e.g. question the obvious).Answer: B130. Which of the following wireless technologies can support the GREATEST distance on either 2.4GHz or 5GHz frequencies? A. 802.11aB. 802.11bC. 802.11gD. 802.11nAnswer: D131. A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use? A. WEPB. Port filteringC. WPAD. Longer SSID broadcast intervalsAnswer: C132. Which of the following ports is the default telnet port?A. 20B. 21C. 22D. 23Answer: D133. Sandy, a network technician, is attempting to map a FQDN to an internal server at the address of 10.0.0.15 without NAT/PAT. Which of the following is the reason this will ultimately not work? A. This is a private address which cannot be seen by external users.B. The address does not have the appropriate subnet mask assigned.C. This is a public address which can only be seen by internal users.D. This is a private address which can only be seen by external users.Answer: A134. Which of the following is the network topology in which computers connect to form a straight line?A. RingB. StarC. BusD. MeshAnswer: C135. Users have reported slow access times when retrieving information from a server on the company’s network. Which of the following tools would provide access time information on each segment of the network to reach the server? A. arpB. routeC. ipconfigD. tracertAnswer: D136. 1000BaseT has a MAXIMUM run distance of:A. 25 meters (82 feet)B. 100 meters (328 feet)C. 500 meters (1640 feet)D. 1000 meters (3280 feet)Answer: B137. Sandy, an administrator, attempts to open a web page and sees the following error 'Error 404: Page not found'. She then uses the ping command and finds that the default gateway cannot be pinged. At which of the following layers does the problem MOST likely reside? A. Layer 1B. Layer 4C. Layer 5D. Layer 7Answer: A138. Which of the following wiring standards would Karen, a technician, MOST likely use to interconnect two devices without the use of a hub or switch? A. 568AB. 568BC. CrossoverD. LoopbackAnswer: C139. Which of the following is the name of the routing update process involved when a change occurs in the routing environment? A. SupernettingB. DynamicC. SublettingD. ConvergenceAnswer: D140. Which of the following is an intelligent repeater that is aware of the MAC addresses of the nodes on either side of the data link? A. GatewayB. HubC. BridgeD. RouterAnswer: C Linux You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. A printer is configured on the network. You want to remove a file from a print queue. Which of the following commands will you use to accomplish this? LPR LPQDEL LPRM LPQ Answer: C You are a newly appointed Red Hat Technician for company Inc. The company has a Linux-based network. You want to install a package named httpd on your Linux system. Before installing the package, you want to get the list of those packages that httpd depends on. Which of the following commands will you use to accomplish the task? rpm deplist httpd yum deplist httpd yum list httpd rpm -qR httpd Answer: B You work as the Network Administrator for McNeil Inc. The company has a Linux-based network.You are working as a root user on Red Hat operating system. You are currently running a program named My_program. You are getting some error messages while executing the program. You want to redirect these error messages to a file named file2 rather than being displayed on the screen. Which of the following tools should you use to accomplish the task? My_program >> file2 My_program 2> file2 My_program 2>> file2 My_program > file2 Answer: B Which of the following key-combinations is used to redo a change undone by a u command in vim? Ctrl-w, Arrow Ctrl-w, s Ctrl-r Ctrl-w, v Answer: C You work as the Network Administrator for Perfect solutions Inc. The company has a Linux-based Network. You are working as a root user. You want to know what the day will be on 20 July 2010.Which of the following commands should you use to accomplish this task? cal cal 20 July cal 7 2010 date Answer: C Which of the following commands is used to access Windows resources from Linux workstation? rsync mutt scp smbclient Answer: D You want to temporarily change your primary group to another group of which you are a member. In this process, a new shell will be created, and when you exit the shell, your previous group will be reinstated. Which of the following commands will you use to accomplish this task? chmod newgrp chgrp chown Answer: B Fill in the blank with the required permission to complete the statement below. In order to make a script executable in a Linux computer, you must assign the___________ permission to the script file. execute read read & write write Answer: A You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. David, a Sales Manager, wants to know the name of the shell that he is currently using. Which of the following commands will he use to accomplish the task? ECHO $shell RM $shell MV $shell LS $shell Answer: A Which of the following text editing tools can be used to edit text files without having to open them? less sed vi more Answer: B Which of the following commands will you run to do case-sensitive search for files named foobar.png? locate -name foobar.png find -iname foobar.png grep-name foobar.png find -name foobar.png Answer: D You work as the Network technician for McNeil Inc. The company has a Linux-based Network. You are working on the Red Hat operating system. You want to remove some write protected files and directories. Which of the following commands should you use to accomplish this task? rm -rf rm -f rmdir rm Answer: A Which of the following options is used with aspell to specify the location of the main word list? d,--master=string -p,--personal=file --jargon=string --dict-dir=dir Answer: D Which ftp client command allows you to upload multiple files simultaneously using the "*" wildcard? mput mget put get Answer: A Which of the following commands copies files between hosts on a network and uses the same authentication as ssh, and will ask for passwords or passphrases if they are needed for authentication? scp rcp cp mv Answer: A John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to break a data.txt file, 200MB in size, into two files in which the size of the first file named data .txt.aa should be150MB and that of the second file named data.txt.ab should be 50MB. To accomplish his task and to further delete the data.txt file, he enters the following command: split --verbose -b 150m data.txt data.txt. ; rm -vf data.txt Which of the following commands can John use to join the splitted files into a new data.txt file? vi data.txt.* less data.txt.* > data.txt cat data.txt.* > data.txt vi data.txt.* > data.txt Answer: C Mark is a newly appointed Network Technician for McNeil Inc. The company has a Linux-based network. He is working on the Red Hat operating system. He wants to sort a file named marketing.txt in the reverse alphabetical order. Which of the following commands should Mark use to accomplish this task? sort -u marketing.txt sort marketing.txt sort -n marketing.txt sort -r marketing.txt Answer: D Which of the following commands is used to securely copy files from one host to another over the network? ls cat mutt scp Answer: D Fill in the blank with the appropriate tool. __________ is a public domain collection of tools to allow Unix systems to manipulate MS-DOS files: read, write, and move around files on an MSDOS file system. mtools ntools xtools tools Answer: A Which of the following commands will you use to list all local and remote printers attached to your computer? lpq lpstat -d lpstat -t lpr Answer: C Which of the following files is the default configuration file of XDM (X Window Display Manager)? /etc/X11/xdm/xdm-config $HOME/.Xauthority /usr/bin/xdm-config /usr/bin/xterm Answer: A Which of the following commands is used to append the list of files in the /tmp directory to an existing file named deletelater.txt? ls /tmp > deletelater.txt ls deletelater.txt /tmp ls /tmp deletelater.txt ls /tmp >> deletelater.txt Answer: D You work as a Technician for Net World Inc. The company has a Linux-based network. You have configured a file server on the company's etwork. You want to summarize disk usage of each file in a particular directory on the file server. Which of the following commands will you use? du fsck df dfsck Answer: A You work as the Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. You want to keep an eye on the system log file /var/adm/messages. Which of the following commands should you use to read the file in real time? tail -f /var/adm/messages tail /var/adm/messages cat /var/adm/messages tail -n 3 /var/adm/messages Answer: A You work as the Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You are working as a root user on the Linux operating system. You have created a file in the vim text editor. You want to save this file and exit it. Which of the following keys should you use to accomplish the task? :w :wq :q! : Answer: B Which of the following commands is used to change file access permissions in Linux? chown chmod chperm chgrp Answer: B You work as a Network Administrator for Rick International. The company has a Linux-based network. A process is running on a server. It is using a lot of processing power. You want the process to use less resource. Which of the following actions will you perform to accomplish the task? Kill the process and rerun it by using the nice command with the -n 1 switch. Kill the process and rerun it by using the nice command with the -n 19 switch. Kill the process and rerun it by using the fg command. Kill the process and rerun it by using the bg command. Answer: B Which of the following commands list the configured printers in a Linux network? Each correct answer represents a complete solution. Choose all that apply. lpstat -a lpstat -l lpstat -o lpstat -r Answer: A,B John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system He wants to change the group membership of the file foo to group bar. Which of the following commands will he use to accomplish the task? chgrp foo bar chgroup bar foo chgrp bar foo chgroup foo bar Answer: C Which of the following commands is used to view the PDF files in Linux? ps2pdf a2ps pdf2ps evince Answer: D You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You want to view the status of the current processes running on a Linux computer. You also want to append this information into the StatPro.txt file without deleting its content. Which of the following commands will you use to accomplish the task? ps StatPro.txt ps >> StatPro.txt ps | more StatPro.txt ps > StatPro.txt Answer: B When you remove a user account from your Linux system, the files and directories of this user may still remain on the system. Which of the following commands can you use to remove all items from your Linux system? Each correct answer represents a complete solution. Choose two. userdel -r userdel -f userdel -h userdel -c Answer: A,B You work as the Network Administrator for Perfect solutions Inc. The company has a Linux-based Network. You are a root user on the Red Hat operating system. You want to grant ownership of the file foofile to a user John. Which of the following commands should you use to accomplish this task? chown John foofile chmod John foofile chgrp foofile John chown foofile John Answer: A Which of the following cp command parameters copies only when the source file is newer than the destination file or when the destination file is missing? -u -l -p -s Answer: A 35. Which graphical mail client is the default tool for email and groupware in Red Hat Enterprise Linux? mutt Evolution Thunderbird pidgin Answer: B Fill in the blank with the appropriate permission to complete the statement below. The___________command is used to start xsession using the xinit utility. startx start statx stretx Answer: A Which of the following network diagnostic tools is NOT used in the Linux operating system? host dig ipconfig ping Answer: C Which shell script is the first startup script run when a login shell is started in Linux? ~/.bashrc /etc/profile.d /etc/profile /etc/bashrc Answer: C Which of the following commands is used to set down the interface and flush all its addresses? ifup ifdown ifconfig down Answer: B You work as the Network administrator for McNeil Inc. The company has a Linux-based network. You are working as a root user on the Linux operating system. You have created a PostScript file on your system. You want to convert this file to a PDF file. Which of the following commands should you use to accomplish the task? ps2pdf evince pdf2ps enscript Answer: A You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. You want to see all directories and files, including hidden files of your home directory in long listing format. Which of the following command-line utilities would you use to accomplish this task? ls -al /root ls ls -s /root ls -h /root Answer: A You work as the Network Administrator for McNeil Inc. The company has a Linux-based network. You are working a root user on the Red Hat operating system. You want to search for files named snow.html, Snow.html, SNOW.html in the current directory. Which of the following commands should you use to accomplish the task? find -iname snow.html find -name snow.html find name snow.html find -i snow.html Answer: A Which of the following commands is used to make traceroute wait 5 seconds for a response to a packet? traceroute -w traceroute -T traceroute -q traceroute -r Answer: A Which of the following directories cannot be placed out of the root filesystem? Each correct answer represents a complete solution. Choose all that apply. /sbin /etc /lib /var Answer: A,B,C You work as a network administrator for company Inc. The company has a Linux-based network. You want to create a file named foobar.zip and put it into a directory named filesdir. Which of the following commands will you use to accomplish the task? unzip foobar.zip filesdir zip -r foobar.zip filesdir tar -tvf foobar.tar gunzip foobar.zip Answer: B Fill in the blank with the appropriate command to complete the statement below. In order to run the httpd process with the highest priority, you will issue the _______ command to change the priority level of the httpd process. nice nise neace nic Answer: A Which of the following commands can be used to delete all jobs queued in a printer? Each correct answer represents a complete solution. Choose all that apply. lprm -a all lprm -all lprm - * lprm - Answer: A You work as a Network Administrator for Tech World Inc. The company has a Linux-based network. The permissions on a file named Report are shown below: rwxr--r-- You want to add a sticky bit to the file. Which of the following commands will you use? chmod 2744 report chmod 4744 report chmod 7744 report chmod 1744 report Answer: D What will be the output of the following command? echo $(date %M) > date.txt It will print a string "date %M". The current time (Month) will be written in the date.txt file. The current time (Minutes) will be written in the date.txt file. It will create a variable $(date %M). Answer: C You are a newly appointed technician for company Inc. The company has Linux- based network. You have executed a command find /home - user joe -group joe on the terminal. What will this command do? It will search for files owned by the user joe -group joe anywhere on the system. It will backup files owned by the user joe -group joe in /home/. It will display the content of a file that belongs to group joe. It will search for files owned by the user joe -group joe in /home/. Answer: D You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. There are six files in a directory on your laptop. You want to find out the file types of all the files at a time. Which of the following commands will you use? fsck file mount init Answer: B Which of the following commands does not save changes before exiting from the VI editor? :q! :q zz :w Answer: A Which of the following commands pipes stdout and stderr from cmd1 to cmd2? cmd2 | cmd1 cmd2 2>&1 | cmd1 cmd1 | cmd2 cmd1 2>&1 | cmd2 Answer: D You work as the Network Administrator for McNeil Inc. The company has a Linux- based network. You are working as a root user on the Red Hat operating system. Joe is a user in your company. You want to remove Joe's tmp files that are 3 days older. Which of the following command syntaxes should you use to accomplish the task? find /tmp -cmin +3 -user Joe -ok rm {} \; find /tmp -ctime +3 user Joe -ok rm {} \; find /tmp -ctime +3 -user Joe -ok rm {} \; find /tmp -cmin +3 user Joe -ok rm {} \; Answer: C You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. You want to know how many words are present in the file named file1.txt. You type the following command on the terminal: wc file1.txt. The command displays the following output: 40 245 1800 file1.txt How many words are present in the file file1.txt? 40 285 245 1800 Answer: C Which of the following is NOT true about the inode table in the Linux operating system? It contains the location information where data is stored in the hard disk. It contains information about what type of access permission of the file is available to whom. It contains the last access time, last modification time, however it does not store the last inode change time. It contains the file type of the specified file. Answer: C You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. Rick, a Sales Manager, wants to combine the contents of the Sale1.txt and Sale2.txt files to a new file named FinSale.txt. Which of the following commands will he use to accomplish the task? ls Sale1.txt Sale2.txt < FinSale.txt cat Sale1.txt Sale2.txt < FinSale.txt ls Sale1.txt Sale2.txt > FinSale.txt cat Sale1.txt Sale2.txt > FinSale.txt Answer: D You work as a Network Administrator for company.com Inc. You have created a PostScript file by using a program. You want to convert it to a PDF file. Which of the following commands will you use to accomplish the task? ps2pdf enscript pdf2ps a2ps Answer: A Fill in the blank with the command to complete the statement below. Do not enter the full path of the command. The ________ command is used to compare the contents of two files for differences in the Red Hat operating system. diff differ deff daff Answer: A John is a newly appointed Network technician at McNeil Inc. The company has a Linux-based Network. John is currently working on the /tmp directory. The /tmp directory has a file named file3.txt. John wants to copy this file in a subdirectory named backup of his home directory /home/John. Which of the following commands should John use to accomplish his task? Each correct answer represents a complete solution. Choose three. cp file3.txt /home/John/backup cp file3.txt /home/John/backup/ cp file3.txt backup cp file3.txt ~/backup Answer: A,B,D You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You want to modify a configuration file in a Linux server. Which of the following utilities will you use to accomplish the task? VI NMAP MS Word GZIP Answer: A Which of the following is a utility that can function as an independent spell checker? spell nice aspell inspell Answer: C You want to repeat the last command you entered in the bash shell. Which of the following commands will you use? history !# history !! history ## history !1 Answer: B Which of the following SHELL commands displays currently logged-in users and their tasks? w finger whoami who Answer: A John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to change the modified date and time of the file private.txt to 11 Nov 2009 02:59:58 am. Which of the following commands will John use to accomplish his task? Each correct answer represents a complete solution. Choose all that apply. touch -t 200911110259.58 private.txt rm private.txt #11 Nov 2009 02:59:58 am touch private.txt #11 Nov 2009 02:59:58 am touch -d "11 Nov 2009 02:59:58 am" private.txt Answer: A,D Which of the following are the Graphical Mail clients in Red Hat Enterprise Linux? Each correct answer represents a complete solution. Choose two. Pidgin Mozilla Evolution mutt Answer: B,C You work as a Network Administrator for Net Perfect Inc. The company has a Linux-based network. By using the VI utility, you have created a document that has 100 lines. You want to replace all the occurrences of "net" with "Net" in the first 50 lines of the document. Which of the following commands will you use? :1,$ s/net/Net/g :1,100 s/net/Net/g :1,50 s/net/Net/g :s/net/Net/g Answer: C Which of the following commands will you execute to fix other writable files in your home directory? find -perm -002 -exec chmod o-w {} \; find /home -type d -ls find ~ -perm -002 -exec chmod o-w {} \; find ~ -perm -002 -exec chmod -w {} \; Answer: C John works as a Network Administrator for Perfect Solutions Inc. The company has a Debian Linuxbased network. He is working on the bash shell in which he creates a variable VAR1. After some calculations, he opens a new ksh shell. Now, he wants to set VAR1 as an environmental variable so that he can retrieve VAR1 into the ksh shell. Which of the following commands will John run to accomplish the task? touch VAR1 env -u VAR1 export VAR1 echo $VAR1 Answer: C You run the wc -c file1.txt command. If this command displays any error message, you want to store the error message in the error.txt file. Which of the following commands will you use to accomplish the task? wc -c file1.txt >>error.txt wc -c file1.txt 1>error.txt wc -c file1.txt 2>error.txt wc -c file1.txt >error.txt Answer: C Windows 7 What is the Minimum hardware Requirements for installing Windows 7 64-bit OS? 1 GHz processor, 1 GB Ram, 20 GB HDD, WDDM 1 GHz processor, 2 GB Ram, 16 GB HDD, WDDM1 GHz processor, 2 GB Ram, 20 GB HDD, WDDM2 GHz processor, 1 GB Ram, 20 GB HDD, WDDMHow to enable administrator account in Windows 7? Net user active administratorNet user administrator / active/yesNet user administrator / active: yesNet user administrator / activeWhich command used for enable hibernates? Powercfg –h onPower –h onPowercfg –h/onPower –h/onWindows logo key+F used for_______________. a. Open the Search window b. Select or move between desktop gadgets c. Select or move between taskbar buttonsd. Open the Ease Of Access Center windowThe aero shake feature will work if which of the following conditions are met? choose Two.A display adapter compatible with WDDM is installed.Aero features are downloaded from Microsoft.The windows experience index is at least 2.The windows experience index is 3 or greater.Which of the following can be used to increase the physical memory on your Windows 7 pc and increase the speed?Physical RAMAero GlassDirectAccessReadtyBoostWhich of the following is used to control when the security pop-up notification are used?Security Control ManagerUser Account ControlUser Account Control PanelNotification Control Settings ManagerWhich of the following operating system support an offline migration using USMT?Windows 2000 professionalWindows XP professionalWindows VistaWindows7Which of the following is not a volume type usable by Windows 7?FATexFATNTFSAll of the aboveTo establish a DirectAccess connection to the network, what is the first requirement?Install a certificateCreate a VPN connectionA static IPv4 addressA static IPv6 addressYou are using the sysprep tool to prepare a Windows 7 installing to be imaged .Which command-line option removes all unique system information from the installation?/audit/oobe/generalize/unattend You wish to add file to a VHD. What action should you perform first?ImageX /mountrwIn windows explorer .right-click the. VHD file and open.In diskpart, select the disk and attachUse DISM /online /applyWhich of the following will cause the online compatibility check to fail during a Windows 7 installation?512MB of RAMA display adapter with WDDM supportA display adapter without WDDM Support but with SVIDEOAn 80 GB HDDWhich of the following must you download from Microsoft’s Web site to obtain USMT 4.0?Windows any time updateWindows upgrade advisorWAIKMicrosoft Application Compatibility ToolkitWhich of the following VPN types support the VPN Reconnect feature of Windows 7?L2TP/IPsec PPTPIKEv2SSTPYou are responsible for managing company laptops that have Windows 7 installed at a small library. You want to prevent staff from uploading files using FTP to FTP sites but allow them to send outbound email messages using the Simple Mail Transfer Protocol (SMTP). Which of the following rules would you configure to achieve this?Inbound rulesOutbound rulesIsolation rulesAuthentication exemption rulesYour friend has installed new device drivers on his computer. Unfortunately it was a beta early release and his computer boots to a blank screen now. You help him out by restarting the computer and pressing F8. However, what Advanced Boot Option would NOT help fix the situation?Enable Boot LoggingSafe ModeSafe Mode with NetworkingLast Known Good Configuration (Advanced)Your friend has set up a wireless network at his home. He found it easy to set up the third party WAP from the local PC shop. However, his next door neighbour just informed him that she can access his network and do all her online shopping for free. Since your friend does not really like his neighbor he wants to stop this happening. What should he do?Enable Windows FirewallChange the security settings of his WAPChange the SSID for the WAPImplement 802.11iWhich file in Windows 7 is cataloged by windows system image manager to create and answer file?Boot.wimInstall.wimSetup.exeInstall.wimAnswer: B In which format is the answer file of customized Windows 7 image is stored? TextBatchExeXMLAnswer: D Which version of TPM is required for configuring bitlocker in Windows 7? TPM 1.0TPM 1.2TPM 2.0NoneAnswer: B You have installed Windows 7 in a client machine which had winsowsXp installed. Which operation you will perform to remove windows Xp installation data from the machine? Simply Delete windows.old folder from the system driveDo not perform any operationUse disk cleanup and remove previously installed windows installation(s)Run bcdeditAnswer: C Which is the next immediate step you will perform after you have created a native virtual hard disk to access the disk? Initialize the disk as an MBRCreate a partitionBoth of the above.None of the above.Answer: C You want to restrict a user to log on to a Windows 7 client during lunch hours. What will you do?Define parental control for time limits for the userGo to local security policy and define the restrictionConfigure windows firewall and advanced settings.Disable his account every time during lunch hours.Answer: A Windows7 desktop might contain additional desktop icons and toolbars automatically When? upgraded to Windows 7 from a previous version of Windows upgraded to Windows 7 from xp SP2 version of Windows none Answer: A Which statement is incorrect?In Windows Vista, gadgets are lined up on the right side of the desktop.In Windows 7,gardgets sets them free on the screenWindows 7 supports gadgets such as news headlines and updatesNone of them.Answer: D To restrict users to do not use more than 3GB, What option you will Select Enable Disk QuotaFrom Disk Management, shrink partitionSet limit profile size policyNoneAnswer: A Using _____________we can add space from one or more additional disksStripped volumeRAIDShrink volumeExtended volumeAnswer: D What command you will use to format partition through command promptFormat <drive letter>Format <drive letter> NTFSFormat fs=ntfsNoneAnswer: C Systems have sufficient capability to configure itself IP that is called____________.CMDIPCONFIGAPIPADHCPAnswer: C __________________ allow to multiple levels of subnetting and address allocation between Internet and Intranet subnet in a company? IPv4IPv6IPv4 & IPv6NoneAnswer: C Which following steps to increase security in your own wireless network? Choose all that? Turn on WPA encryption No auto connection to open wireless networks Network should be turned off when not in use None Answer: A, B, C ______________Which simplifies the file sharing and printing process on small networks in Windows 7? HomeGroup Simple sharing Sharing Network sharing Answer: A A copy of data accessed from intranet Web and file servers is cached locally within the branch office when BranchCache is _________ Disabled Not configure Enabled Answer: C How to access file and folder though network? \\ computer name // computer name \\ computer\Ip None Answer: A In following Which is Class B IP? 126.254.255.255 191.255.255.254 192.127.156.134 223.123.124.234 Answer: B What is the port number of HHTP? 443 68 80 23 Answer: C Which Security option is not available in windows7?Action CenterAppLockerBitlockerNoneAnswer: D Encrypting File System is not available in Windows7_______. Ultimate ProfessionalEnterpriseHome basicAnswer: D In Software Restriction Policies, when you configure two conflicting rules for a particular program?The most specific rule takes precedence.We can’t configure policy.Default first will be appliedDefault second will be applied.Answer: A ____________Tool protects your PC against hackers and malicious software?User Account ControlLocal policyNoneAnswer: A Which is a new feature of Internet Explorer 8?SmartScreen FilterAdvanced tabFavoritesSafetyAnswer: A Before the process of encrypting the drive, it’ll ask to save a recovery file why?It required for encryption.Used if the password is forgottenUsed for decryption.NoneAnswer: B Which command used for Local Security Policy?Secpol.mmcSecpol.mscMMCServices.mscAnswer: B In Windows 7, the computer creates an EFS certificate and private key when?While Encrypts a file.The first time a user encrypts a file.While Planning encryption.NoneAnswer: B You are a parent you want restrict your child by using system from 10:30 to 1. Which option you will be use?User account and settingsParent controlLocal policyNoneAnswer: B Which statement is wrong? Choose all that?With AppLocker you can block a specific application from runningEFS uses public key encryption processBitLocker is a system protection featureWith help of local policy limited user can change admin password.Answer: D What are tools included in WDI? (choose all that apply) MemoryPower SaverNetworkStartupAnswer: A,C,D A user wants to take backup of system drivers, so what option he will use? Restore backup System image backupCopy backupDifferential backupAnswer: B A user wants check performance of Windows 7, which tool he will use?Performance toolsDiagnostics toolsBackup toolsAll threeAnswer: A A user using a dual-boot win XP & win 7 he want to create event log when the system will start, so what option he will use?Startup and RecoveryEvent trackNetwork Diagnostics toolNone of the above Answer: A A user want to create power plan for his laptop in Windows 7 what option he has to be select? Balanced Power saverHigh performance NoneAnswer: AWhat type of unicast IPv6 address would you typically use on the subnets of a private network to implement IPv6 connectivity over subnet? Site-local address Link-local address Special address Anycast address Answer: A You are examining a DNS forward lookup zone to investigate problems with name resolution. What type of resource record enables DNS to resolve a host name to on an IPv6 address?PTRHostAAAALMHostAnswer: C Which of the following VPN types support the VPN reconnect feature of Windows 7?PPTPL2TP/IPSecSSTPIKEv2Answer: D Windows logo key+X used for___________?Windows Mobility center windows Project managerOpen the Ease Of Access Center windowNoneYou wish to view detailed license information. What action should you perform? msconfig.exeslui.exeslmgr.vbs<somethingsomething>.vbsWhich of the following command-line utilities can you use to display a copy of the IPv4 and IPv6 routing tables on a computer running Windows 7 ?Tracert Netstat Ipconfig Ping Which format do the application installation files have to be in to be added to a Windows Image (WIM) file using the Deployment Image Servicing and Management (Dism.exe) tool?WIMEXEvirtual hard disk (VHD)Cabinet (CAB)98. Which of the following tools should you use on a computer running Windows 7 to increase the size of the offline file cache?a. System Protection b. Disk Managementc. Sync Centerd. Advanced System Settings ModerateWDDM stands for________________________Windows Display Device ModelWindows Display Driver ModelWindows Display Driver ManageWindows Device Drivers managementISATAP stands for __________________________________?Internet automatic transport addressing protocolIntranet automatic transport addressing protocolIntra-site automatic tunnel addressing protocolNoneWindows Aero option is not available in___________. Windows 7 Starter Windows 7 Home Premium Windows 7 ProfessionalWindows 7 Ultimate Answer: A Windows Aero peek used for_______________ open programs and windows? close Minimize and restoreMinimize and maximizeNoneAnswer: B Which is Missing Features of windows7 apart from vista?Windows Movie MakerAeroinstant searchnoneAnswer: AWhat option will allow multiple user logging in a single system without log off other user account? SleepHibernateSwitch Users LockAnswer: C Which command used to shutdown Windows 7?shutdown /sShutdown /fShutdown / /sshutdown -s Answer: A Which option help you quickly find and start any program or file on your computer in windows7? CMD RUN Instant Search Start menu Answer: C Windows 7 provides two different user interface experiences that is _______________? Basic experience for entry level systems and a more visually dynamic experience Basic experience for entry level systems and a more command experience Basic experience for entry level systems only.NoneAnswer: A What is the command is used for driver display utility?Displayswitch.exeDispwitch.exeDisplays.exeSwitch.exeAnswer: A AER O stands for______________Authentic Energetic, Reflective and Open, Authentic, Energetic, Reflective and OptionalAuthentic, Energetic, Reliable and OperationalNoneAnswer: A By default on a MBR disk, you can create a maximum of __ Primary partitions and __Extended 1, 32,23,13,3Answer: C In Windows 7 how many Logical drives can create____A.24B.128C.22none of the aboveAnswer: B We can make a logical drive or an extended drive partition active?TrueFalseAnswer: B How many active partitions can we make in basic disk using Windows 7A.2B.3C.1D.4Answer: C Which are the different classes of IPv4? A , B , C , D & EA , B , C OnlyA & BNoneAnswer: A Windows Security Center is now called_______________ in Windows 7. Action CenterSecurity CenterNoneAnswer: A By Default firewall is _________________. ONOFFNot ConfigureHiddenAnswer: A WDI stands for _____________? Windows Display InterfaceWindows Diagnostic Infrastructure Windows Diagnostic interfaceWindows Data Interface Answer: B DEP stands for ______________? Data Execution PreventionData encryption preventionData exchange program None of the aboveAnswer: A Sync center is used for _____________?For sharing filesFor up-to-date between the computerFor networking None.Answer: B WEP Stands for ______________? Wired Equivalent Privacy Wireless encapsulation protocol Wireless encrypted protocol Wired Equivalent protocol Answer: ATKIP stands for_______________? Transport Kit Integrity Protocol Temporal Key Integrity Protocol Transfer Key Integrity Protocol Transmission Key Integrity Protocol Answer: B PING stands for_________________________?Packet Internet gateway ProtocolPacket internet groperPacket internetwork gateway protocolPacket intranet groperAnswer: B DifficultHow to migrate roaming user profiles data from Windows XP or Windows Server 2003 (Version 1) to Windows 7 or Windows Server 2008 (Version 2) Choose all that apply?Use the User State Migration Tool 4.0 to migrate profile data to the new formatUse the Folder Redirection feature to share data between Version 1 and Version 2 user profiles.Use windows ACT tool.NoneWhich of the following is true of Windows7?Mailcentral is included as the new default mail client with windows7.Outlook Express is included with windows7Microsoft Outlook is included with windows7There is no preinstalled mail client included with windows7You have that runs Windows 7. You perform regular data backups and system image backups. The computer experiences a HDD failure. You replaced a failed HDD. You need to recover the computer to the previous Windows 7 environment. You start the computer from the Windows 7 installation media. Which recovery option should you select?Command promptStartup RepairSystem Image RecoverySystem RestoreIn which of the following scenarios must you perform a migration rather than an upgrade? (choose all that apply)Windows XP Professional (X64) to Windows 7 professional (X64)Windows vista business (X86) to Windows 7 professional (X64)Windows vista business (X64) to Windows 7 professional (X64)Windows vista Home Premium (X64) to Windows 7 Premium (X86)You can use ___ to create an answer file that partitions and formats a disk before installing Windows, changes the default setting for the Internet Explorer home page, and configures Windows to boot to Audit mode after installation. By modifying settings in the answer file, it can also install third-party applications, device drivers, language packs, and other updates Fill in the blank. Windows SIMWIN PESysprepImageXYou have windows Xp professional installed in the client computer. Your organization asks you have Windows 7 installed in the same machine. Which of the following step you will perform to do the required?Insert Windows 7 DVD and select upgrade optionInsert Windows 7 DVD and select Custom installEither of the aboveNone of the aboveAnswer: B You need to migrate from windows Xp to Windows 7 by using windows easy transfer in the same machine. What will be you favorable procedure? Upload the user profile data to a file server by using windows easy transferUse windows easy transfer cableUse a UFD media to store the migration data and the fresh install Windows 7 and restore.Copy paste the user profile data to a secondary storage or drive and paste when Windows 7 is installed.Answer: C You have installed an application in Windows 7 which was properly working with windows Xp sp2 but is not responding properly and asks for administrative credentials in Windows 7. Which of the following you will do to solve this issue? Re-install the programModify the UACChange drive location during installationUse Compatibility troubleshooter to fix the problemAnswer: D You are the system administrator of you company. One of your client computer installed with Windows 7 is deployed as a file server. It is manually backed up by the administration. A new user is assigned the job to do the same. What you should do to have this standard account to perform the given operation without administrative privileges.Make the user as a member of administrators group.Make the user as a member of backup operatorsMake the user as a member of power user.A standard user account can default perform the given task.Answer: B You’re using computer that runs Windows 7. How you will identify all device drivers installed on the computer are digitally signed Device managerclick for hardware changesChoose the devices by connection view from device managerSigverif.exe run at command promptAnswer: C Which argument is wrong? The IPv6 node is represented by IPv4 mapped address. IPv6 tools Netsh Interface can be used to implement IPv6-IPv4 compatibility (EFS) allows for the encryption of individual files and folders IPv4 have classified in to 3. Answer: DA user has created his own desktop settings in his system , he went out for some work in between that some body has changed his system setting. When that user comes to his place he finds that some one has changed his system setting now he wants to restore that settings what tool he will use. WDI toolsSystem restore Backup toolsAllAnswer: B Sachin’s user account is a member of four separate security groups that are each assigned with different permissions to a folder on a client running Windows 7. Which of the following tools can you use to determine Sachin’s permissions to a hosted file in that folder? RobocopyLcaclsCipherThe effective permission toolAnswers: DWhich of the following messages on a computer running Windows 7 enterprise’s network status icon indicates that the computer has connected to your organization’s Direct Access server successfully? Local Internet AccessLimited ConnectivityInternet and Corporate accessLocal Access OnlyAnswer:CWhich of the following products can you use to view potential compatibility issues for intranet Web sites and Web applications?Microsoft Baseline Security Analyzer (MBSA)Microsoft Deployment ToolkitWindows Automated Installation Kit (Windows AIK)Microsoft Application Compatibility Toolkit (ACT)100. Which of the following programs or items can you use to configure a specific device so that it is able to wake your computer running Windows 7 from a sleep state?Performance Information And ToolsPowercfg.exePower OptionsDevice Manager *********** Communications Skills I. Choose the right synonym for the highlighted words1. Mr. Huge was very proud of his auto superstore. "We have such an extensive selection of cars," he said, "so everyone should find a vehicle that he or she will love!"The word "extensive" means __________.costing a lot of moneylarge amounthaving no colornot enoughB, 12. Friendship is a priceless thing. If Chris put a price or conditions on her friendship, it’s no longer priceless. In fact, it’s not real friendship at all!If something is priceless, __________.it has a missing tagit has no valueit has great valueit is made out of riceC, 13. The news story was based on a letter that was a fabrication. Now the reporter who wrote the story is in big trouble. Will anyone believe him again?A fabrication is __________.made of clothfull of long wordsfunnyfakeD, 14. The reporter insisted that the letter he used was authentic. He said that he had shown it to many experts before he used it in his story.When something is authentic, it’s __________.a. genuine, or realcarefully writtenfull of tasty wormsvery oldA, 15. In 1975, Governor James promised to do something about the high taxes in our state. She didn’t present a tax cut bill to lawmakers until 1985. It took her a decade to keep her promise, but better late than never.How long is a decade?75 years85 yearsa century10 yearsD, 16. Chose the word that means the same as: leaderMatch Fever Chief Settle C, 1 7. Choose the word that means the same as: want Advance Produce Honor Desire D, 1 8. Choose the word that means the same as: student Pupil Industry Determine Advantage A, 1 9. Choose the word that means the same as: bother Disturb Qualify Influence Afford A, 1 10. Choose the word that means the same as: immediate Angle Instant Earn Recent B, 1 II. Fill in the blanks11. The train to Rotterdam __________ at 6 pm sharp. exits goes departs deserts C, 1.4 12. Have you heard that Mrs. Andrews __________ from the board of directors? Departed Abandoned Deserted Resigned D, 1.4 13. This exercise was very difficult and I finally__________. Left Resigned Departed Gave up D, 3.4 14. Disloyal sailors often ___________ their ship. Abandon Give up loyal Desert Depart C, 3.3 15. You have to ___________ smoking because it's not good for you! Leave Quit Abandon Resign B, 2.2 16. It is a complete waste of time ____________ over who was to blame; the main thing we have to do is decide what to do next. arguing discussing repeating considering A, 5.2 17. Feel free to visit anything of interest to you in the exhibition and also you can __________ of any of the refreshments available. retake undertake partake intake C, 5.2 18. I assure you that you will have no problem with the task because it is as easy __________ can be. as than and it A, 8.1 19. My desk is a __________, I should clean it. messyslobmesssloppyC, 10.1 20. Valerie spilled water __________ my paperwork. in on at across B, 1.7 III. In the sentences given below, a phrase is highlighted. Select the option that closely matches with the highlighted phrase. 21. I cannot understand why she did that, it really doesn't add up. doesn't calculate isn't mathematics doesn't make sense makes the wrong addition C, 3.1 22. All the students got high marks in the test but Mary stood out. got a lot of marks got higher marks than someone got very good marks got the most marks of all D, 3.1 23. He has sold his house and has no job and so now he has next to nothing. he is unemployed he has almost no money he has a few things he has nothing at all B, 3.1 24. The manager dismissed the new proposal out of hand and said that it was not at all practical. quickly utterly directly simply B, 3.1 25. As she is new to the job I would ask you to keep an eye on her for the time being. Look at Consider Check Observe D, 3.1 26. The opposition in parliament accused the government of playing games and refusing to accept the seriousness of the situation. being light hearted being heavy hearted being down hearted being faint hearted A, 3.2 27. He accused her of talking through her hat and refused to accept a word of what she said. talking sense talking straight talking nonsense talking tough C, 3.1 28. Without my glasses I can't see where I'm going in fact I'm as blind as a bat. very short sighted very long sighted very far sighted very clear sighted A, 3.1 29. I get very irritated sometimes because they're always up with the lark and I like to lie in. up very easily up very early up very often up very noisily B, 3.1 30. I would advise you to do that as well and in that way you'll kill two birds with one stone. get things done twice get something done two times get two things done at the same time get two things done twice C, 3.2 IV. Match the words given below with its most appropriate meaning. 31. Paradox a statement that seems to contradict itself but contain some truth using spies or observers the state of something or someone The act handing or running something, usually a business. A, 11.1 32. Document Act of moving, action A newcomer, a beginner, someone new to something An official paper On opportunity: a happening, instance or celebration C, 11.1 33. Annual Yearly Being alone Qualified, worthy to be chosen Able to move A, 11.1 34. Capable Aware, having knowledge of oneself Friendly, agreeable Having the ability to do something: having the traits necessary to perform some action Native, having been born in a specific. Area or environment. C, 11.1 35. Chronicle A list of written works A place where one goes to hear something A historical account arranged in order of time A letter to be sent C, 11.1 36. Translucent Having a large body Allowing some light to shine through Dead Lack of experience, not knowledgeable of the world B, 11.1 37. Attest To ruin, to pull down To break or burst To train, to provide schooling for To provide proof, to say something is true D, 11.1 38. Auction A sale of goods to the highest bidder The position of a body One who believes that any ultimate reality I unknowable A living creature A, 11.1 39. Chronological Holing or sticking to something Uttered by she voice, producing sound Arranged in order of time Related to the mind C, 11.1 40. Diagnose To recognize (disease) by symptoms To accept, to confess, to allow entry To come to a conclusion from facts or ideas, to guess To twist into an abnormal shape A, 11.1 Digital Electronics PART – A In this ___________system, the digits are 0to 9 and A to F. BinaryOctalHexadecimalDecimal Ans : C What is term called for the product of the binary number after taking its two’s complement twice? One’s complementTwo’s complementDouble complementNone of these Ans : C ECL stands for_____________ Emitter Controlled LogicEmitter Connected LogicEnd Coupled LogicEmitter Coupled Logic Ans : D Which of one of this number system is having eight digits in it? DecimalHexa DecimalBinaryOctal Ans : D An Op-amp configuration where the output waveform is the integral of the input wave form is called___________ Summing AmplifierInverting AmplifierDifferentiator Integrator Ans : D A + 0 = ______ 01ANone of the above Ans : C 2’s complement of 01101 is __________ 10111 001101 01110 10011 Ans : D What is the Output of a 3-input NAND gate with A = 1, B = 0 and C = 1? 010.5None of the above Ans : B If the capacitor and resistor in the Op-amp Integrator is replaced, it forms a ____________. IntegratorDifferentiatorVoltage FollowerSumming Op-amp Ans : B _____ adds two binary digits and produces two binary outputs called Sum and Carry. Half AddersFull AddersBinary AddersNone of the above Ans : B In the Exclusive – NOR Gate (XOR), if the input A is low and the input B is high, then the output is __________.LowHigh Very HighVery Low Ans : A Laptop Maintenance 1) The size of the PC card is __________?85.6mm X 54.6mm85.6mm X 54.0mm85.0mm X 54.0mm85.0mm X 54.6mm2) Lightscribe is used for _____________? a) Renaming Discs b) Labeling Discsc) Bothd) None of the above3) Which battery has long life?a) Nickel cadmium Batteriesb) Nickel Metal Hydride Batteriesc) Lithium Ion Batteriesd) All of the above4) If the video does not work, No need to replace the motherboarda) Trueb) False5) WI-FI is based on which standards?a) IEEE 802.6b) IEEE 802.11c) IEEE 802.12d) IEEE 802.15.16) IEEE 802.3 is standardized for?a) Cellular WANb) GPRSc) Bluetoothd) Ethernete) Infrared7) Under what frequency range does Bluetooth work?2.4-2.5 GHZ2.3-2.4 GHZ2.5-2.6 GHZNone of the above8) Is it possible to connect multiple Bluetooth hubs? a) Yes b) No9) What is the total number of masters and slaves in a piconet?a) 1 Master and 7 Slavesb) 2 Masters and 7 Slavesc) 1 Slave and 7 Mastersd) 2 Slaves and 7 Masters 10) Video is integrated to the motherboard?a) Trueb) False11) Which is a Hot-Swappable device for laptop?a) USB Deviceb) Touchpadc) Keyboardd) Processor12) Docking station has external portsa) Trueb) False13) Which company originally conceived and developed Bluetooth?a) Ericssonb) Samsungc) Motorolad) LG14) Do Bluetooth devices need line of sight to connect to one another?a) Yes b) No15) Which are the main types of connection used by Bluetooth?a) Single Slaveb) Master Slavec) Scatternetd) All of the abovee) None of the above16) Which method is used for Data transfer in Bluetooth?a) ASCII Control Language (ACL)b) Asynchronous Connectionless (ACL)c) Access Control List (ACL)d) Analog Configuration Line (ACL)17) Which of the following defines hot-swapping?a) Installing new devices without the need for a driverb) Removing and adding internal devices without rebootingc) Removing and inserting PCMCIA cards while the system is runningd) All of the above18) SODIMM stands for which of the following?a) Special Operations for Digital Image Multimediab) Some Other Dual In-line Memory Modulec) Small Outline Dual In-line Memory Moduled) None of the above 19) After inserting a PC card into a notebook computer, the system does not recognize the card. Which of the following could be the problem?a) No drivers were installed for the cardb) The card was inserted in the wrong slot typec) The notebook computer does not support PCMCIAd) Socket or card services have not recognized the card20) Which of the following resolution standards are used for notebook computer displays? (Choose three.)a) UGAb) SVGAc) XGAd) SXGA21) What type of power supports the video display on a portable PC?a) AC power onlyb) DC power onlyc) AC power when the PC is plugged in or DC power when it is not plugged ind) Either AC or DC at the user’s choice22) All the laptop components are not upgradeablea) Trueb) False23) Which standards do Cellular WAN follow?a) Globe System for Mobile Communication (GSM)b) Code Division Multiple Access (CDMA)c) General Packet Radio Service (GPRS)d) All of the abovee) None of the above24) The kind of data transfer required for Infrareda) Light of sightb) Line of sightc) Line of Projectiond) None of the above25) The first laptop was called as __________?a) Notebookb) Osborne1c) Subnotebookd) None of the above26) What features led to the popularity and favorability of Portables over Desktop computersa) Portable weightb) Small sizec) Less heat dissipatedd) All of the above 27) What are types of batteries available in the market?a) Nickel Cadmium Batteriesb) Nickel Metal Hydride Batteriesc) Lithium Ion Batteriesd) All of the abovee) None of the above28) Which technology is used in Bluetooth for avoiding interference?a) Frequency hoppingb) Frequency Multiplexing c) Phase locked loopingd) Pulse-code Modulation29) Expand PCMCIA __________a) Personal Computer Memory Card International Associateb) Personal Computer Memory Card International Associationc) Peripheral Components Memory Card International Associationd) Peripheral Components Memory Card International Associate30) How many types of PC cards available?a) Twob) Onec) Threed) Five31) Hibernate mode uses lesser power than the standby mode.a) Trueb) False32) Which is the first commercial Toshiba laptop models introduced in 1987?a) T1000 & T1200b) T2000 & T2200c) T1000 & T2200d) T1000 & T220033) When was NEC_Ultralite released?a) 1985b) 1989c) 1993d) 198734) The first Apple machine was designed for _______________ Operating Systema) Windowsb) Linuxc) Macintoshd) Unix35) The total amount of time that a portable system can work on battery is dependent ona) Low-power componentsb) Power management protocolsc) Battery technologyd) All of the above36) Generally laptop will be _____________ the price of the desktopa) Twiceb) Equal toc) Less thand) Greater than37) Which is the first standalone operating system for Tablet-PC?a) Windows XP Tablet-PC Editionb) Windows Vista Ultimatec) Windows Vista Home Premiumd) Windows Vista Business38) Pentium III processors can run at………………..Mhz?a) 300b) 366c) 400d) 60039) Processor running with AC power will switch to ___________ mode?a) Battery optimizedb) Maximum performancec) Sleepd) Hibernate40) What does PGA stands for?a) Pin Grid Arrayb) Portable Grid Arrayc) Pin line Grid Arrayd) None of the above41) What does BGA stands for?a) Board Grid Arrayb) Ball Grid Arrayc) Back Grid Arrayd) All of the above42) The PCMCIA slot in notebooks has male _________ connector?a) 68 pinb) 58 pinc) 60 pind) 40 pin43) PCMCIA card runs at ________ volts?a) 1.8b) 2.9c) 3.3d) 1.7 44) The different types of PCMCIA cards available in the market area) Type 1, Type 2, Type 3b) Class 1, Class 2, Class 3c) Class A, Class B, Class Cd) All of the above 45) The thickness of Type 2 card is _________mma) 3.3b) 5c) 10.5d) 8.546) Type 3 card is used for __________a) Rotating Discsb) Hard Disc Drivec) Both A & Bd) None47) TFT stands for __________a) Thick film transistorb) Thin film transistorc) Both A & Bd) None48) What are the shortcut Function keys to open help and support screen in hp laptops?a) Fn+F1b) Fn+F2c) Fn+F3d) Fn+F449) What does WI-FI stands for?a) Wi-Fi Allianceb) Wireless fidelityc) Both A & Bd) None of the above50) The area covered by one or more interconnected access points is called a ………..?a) Warm spotb) Cold spotc) Hot spot d) Community51) Some of the disadvantages of Wi-Fi compared to other standards are?High power ConsumptionLimited excessive Wi-Fi access pollutionInterferenceAll of the above52) A ___________ covers much more extensive area than wireless lansa) WWANb) WLANc) WPANd) WAN 53) Which is the backbone of Ethernet based computer networking technology?a) Ethernet Hubb) Ethernet Switchc) GPRS Gatewayd) GPRS Modem54) Maximum range for the connection to be established in Class C Bluetooth technology is a) 10 Mtsb) 100 Mtsc) 50 mtsd) 30 mts55) What is the data transferred speed defined by SIR?a) 115.2Mbpsb) 115.2Kbpsc) 4Mbpsd) 16Mbps56) The data transfer in infrared technology is _________?a) Limited to line of sightb) Not limited to line of sightc) Resistant to interferenced) Not Resistant to interference57) If you have to connect two computers directly you will have to use _________?a) Straight cableb) Cross over cablec) Roll over cabled) Co-Axial cable58) Power plan option is used in windows vista to apply __________ settings to the Notebook?a) Powerb) Soundc) Displayd) Network59) The over heating problems in the laptops will ______ and ________of the laptops?a) Shorten the life b) Decreases the reliability c) Platform coolingd) Both A&B 60) Overheating is one of the serious problems associated with the laptop.a) Trueb) False 61) If the OS one your laptop is windows NT/2000/XP it uses _____ file system to protect your data from theft?a) FAT 16b) FAT 32c) FATd) NTFS62) Biometric identification system allows your finger prints to be your login ID.a) Trueb) False63) __________ will turn your new drive into the exact replica of the old one.a) Formattingb) Deletionc) Cloningd) Updating64) It is always advice to take backups of important data in regular intervals.a) Yesb) No65) ________ comes with a powerful encryption system that adds an extra security for drives, folders or files.a) Windows 95b) Windows 98c) Windows 2000d) Windows NT66) Which are the two versions of Bluetooth technology?a) 1.2 & 2.0+ EDRb) 1.5 & 2.0+ EDRc) 1.2 & 2.5+ EDRd) 1.2 & 1.2+ EDR67) If you want a very good display, then assigns more amount of RAM for display.a) Trueb) False68) The most popular Wi-Fi standard which uses Complimentary Code Keying(CCK) is _____a) 802.11bb) 802.11ac) 802.11gd) 802.11n69) Which is the Wi-Fi standard which is known as WiMax which combines the benefits of both Broadband and Wireless?a) 802.11bb) 802.11ac) 802.16d) 802.11g 70) What is the frequency & data transfer rate of 802.11a standards?a) 5 GHZ, 54Mbpsb) 2.4GHZ, 11Mbpsc) 2.4GHZ, 54Mbpsd) 2.4GHZ, 140 Mbps71) Small size of IDE drives can hold _________a) 10GBb) 20GB to 30GBc) 30GB to 40GBd) 40GB72) What are the two different sizes of SO-DIMM modules available?a) 2.375inch b) 2.625inchc) 2.525inchd) 2.750inch73) Telecommunication industry specification describing how mobile computers can be easily interconnected using a short run wireless connection.a) Bluetoothb) Infraredc) Wi-Fid) GPRS74) An amount of memory which stores the data temporarily to compensate for difference in data transmission from one device to anothera) Latchb) Flip-Flopc) Bufferd) Cache75) _________ is the process in which saving of image of your desktop with all open files & documents and power down of your computer happens.a) Hibernationb) Sleep modec) Shutdownd) Restart76) The common desktop systems mostly uses _________ monitor for displaya) Liquid crystal displayb) Cathode ray tubec) Thin film transistord) None of the above77) What is the code name for speed step technology?a) Geyser Villeb) Core2duoc) Paxvilled) None of the above A+ A+ A user reports that they walked away from their laptop for 30 minutes and when they came back the screen was very dim. The user tried... + Read more »