A. Installation in an area with low EMIB. Installation in an area with high EMIC. Installation in an air handling spaceD. Installation in an area with high humidity3. Which of the following will allow the use of BitLocker if the computer does not have a TPM chip?
A. External hard driveB. SCSI hard driveC. USB keyD. CD-ROM drive4. A customer reports that their computer is displaying ‘operating system not found’ while booting. The technician confirms that the computer booted fine the previous day and that no devices were added. The technician also confirms that no software changes were made to the system from the previous day. Which of the following is the problem?
A. The network cable is unplugged.B. A diskette was placed in the disk drive.C. The keyboard is unplugged.D. The system has been infected with spyware.5. A new video card requires a 600 watt power supply. The power supply should have how many pins on the main cable?
A. 12B. 20C. 24D. 2620. Which of the following utilities will a technician use to find out system information, drivers, running print jobs, and Internet setting all from one location?
A. MSINFO32B. REGEDITC. Device ManagerD. MSCONFIG21. Which of the following interfaces does a sound card use?A. PCIB. SATAC. SCSID. AGP22. Which of the following would MOST likely be used to aid a technician in the removal of spyware?A. ASRB. Safe ModeC. Restore PointD. Recovery Console23. A technician is installing a new small form factor motherboard. Which of the following form factors is the technician MOST likely installing?
A. Micro ATXB. NLXC. ATXD. BTX24. Which of the following maintenance utilities is used to reorganize files on a hard drive?A. SCANDISKB. DEFRAGC. CHKDSKD. Disk Cleanup25. Which of the following is the number of devices that can be daisy-chained to an IEEE 1394 port?A. 7B. 15C. 63D. 127
Communication & personality Development
The word "extensive" means __________.
costing a lot of money
large amount
having no color
not enough
Friendship is a priceless thing. If Chris put a price or conditions on her friendship, it’s no longer priceless. In fact, it’s not real friendship at all!
If something is priceless, __________.
it has a missing tag
it has no value
it has great value
it is made out of rice
The news story was based on a letter that was a fabrication. Now the reporter who wrote the story is in big trouble. Will anyone believe him again?
A fabrication is __________.
made of cloth
full of long words
funny
fake
The reporter insisted that the letter he used was authentic. He said that he had shown it to many experts before he used it in his story.
When something is authentic, it’s __________.
carefully written
full of tasty worms
very old
In 1975, Governor James promised to do something about the high taxes in our state. She didn’t present a tax cut bill to lawmakers until 1985. It took her a decade to keep her promise, but better late than never.
How long is a decade?
85 years
a century
10 years
Paradox
using spies or observers
the state of something or someone
The act handing or running something, usually a business.
Document
A newcomer, a beginner, someone new to something
An official paper
On opportunity: a happening, instance or celebration
Being alone
Qualified, worthy to be chosen
Able to move
Friendly, agreeable
Having the ability to do something: having the traits necessary to perform some action
Native, having been born in a specific. Area or environment.
A place where one goes to hear something
A historical account arranged in order of time
A letter to be sent
Allowing some light to shine through
Dead
Lack of experience, not knowledgeable of the world
To break or burst
To train, to provide schooling for
To provide proof, to say something is true
The position of a body
One who believes that any ultimate reality I unknowable
Uttered by she voice, producing sound
Arranged in order of time
Related to the mind
To recognize (disease) by symptoms
To accept, to confess, to allow entry
To come to a conclusion from facts or ideas, to guess
To twist into an abnormal shape
Digital electronic
Octal
Hexadecimal
Decimal
Two’s complement
Double complement
None of these
Emitter Controlled Logic
Emitter Connected Logic
End Coupled Logic
Emitter Coupled Logic
Which of one of this number system is having eight digits in it?
Decimal
Hexa Decimal
Binary
Octal
Summing Amplifier
Inverting Amplifier
Differentiator
Integrator
0
1
A
None of the above
2’s complement of 01101 is __________
10111
001101
01110
10011
0
1
0.5
None of the above
Integrator
Differentiator
Voltage Follower
Summing Op-amp
_____ adds two binary digits and produces two binary outputs called Sum and Carry.
Half Adders
Full Adders
Binary Adders
None of the above
High
Very High
Very Low
1) The size of the PC card is __________?
85.6mm X 54.0mm
85.0mm X 54.0mm
85.0mm X 54.6mm
a) Renaming Discs
b) Labeling Discs
c) Both
d) None of the above
3) Which battery has long life?
a) Nickel cadmium Batteries
b) Nickel Metal Hydride Batteries
c) Lithium Ion Batteries
d) All of the above
4) If the video does not work, No need to replace the motherboard
a) True
b) False
5) WI-FI is based on which standards?
a) IEEE 802.6
b) IEEE 802.11
c) IEEE 802.12
d) IEEE 802.15.125) The first laptop was called as __________?
a) Notebook
b) Osborne1
c) Subnotebook
d) None of the above
26) What features led to the popularity and favorability of Portables over Desktop computers
a) Portable weight
b) Small size
c) Less heat dissipated
d) All of the above
27) What are types of batteries available in the market?
a) Nickel Cadmium Batteries
b) Nickel Metal Hydride Batteries
c) Lithium Ion Batteries
d) All of the above
e) None of the above
28) Which technology is used in Bluetooth for avoiding interference?
a) Frequency hopping
b) Frequency Multiplexing
c) Phase locked looping
d) Pulse-code Modulation
29) Expand PCMCIA __________
a) Personal Computer Memory Card International Associate
b) Personal Computer Memory Card International Association
c) Peripheral Components Memory Card International Association
d) Peripheral Components Memory Card International Associate
30) How many types of PC cards available?
a) Two
b) One
c) Three
d) Five
N+
1.
A client wants to improve the wireless coverage on the third floor of their house. The wireless router is located in the basement and there is no easy way to run a cable to the third floor. Which of the following devices should be installed to extend the wireless coverage to cover the entire third floor without running cables?A. SwitchB. RouterC. RepeaterD. Bridge2. Which of the following describes what the number two represents in l00Base2 cabling?A. FiberB. Coaxial cableC. UTPD. Twisted pair3. A crossover cable is MOST commonly associated with which of the following layers of the OSI model?A. SessionB. ApplicationC. NetworkD. Physical4. Which of the following devices is used to connect multiple devices to a network and does not stop broadcast traffic?A. SwitchB. HubC. ModemD. Repeater5. A network administrator needs to add an additional connection to a room. The administrator adds a new Ethernet switch and must connect it to an existing switch. Which cable type should be used to connect the two switches?A. CAT3 cableB. Serial cableC. Crossover cableD. Rollover cable6. Prioritizing traffic between data and voice is defined as which of the following?A. Caching enginesB. Proxy serverC. QoSD. Load balancing7. Sandy, a technician, wants to limit access to a wireless network to company owned laptops, but does not want to use an encryption method. Which of the following methods would be BEST to accomplish this?A. MAC filteringB. SSL VPNC. PPPoED. WPA Enterprise8. Joe, a network technician, is tasked with installing a router and firewall to get an office working with Internet access. Which of the following features MUST be configured to allow sharing of a single public IP address?A. QoSB. POP3C. PATD. SMTP9. Which of the following is a form of encrypting packets for safe, secure data transmission within a network?A. RASB. PPTPC. IPSecD. ICA10. Two duplicate pieces of equipment can be used in conjunction for which of the following purposes? (Select TWO)A. High availabilityB. Fault toleranceC. Reduce latencyD. Wi-MAXE. CARP11. The T568B wiring standard slates that CAT5 cables should be coded as follows:A. White/Orange, Orange, White/Green, Green, Blue, White/Blue, White/Brown, Brown,B. White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown,C. White/Orange, Orange, \White/Green, Green, White/Blue, Blue, White/Brown, Brown,D. White/Orange, Orange, White/Green, Blue,12. Using network monitoring tools would allow an administrator to do which of the following? A. Configure offline devicesB. Examine performance issuesC. Install additional software and updatesD. View syslog events13 . Which of the following wireless technologies can operate at only 5GHz?A. 802.11b/gB. 802.11gC. 802.11bD. 802.11a14. Which of the following devices allows multiple internal IP addresses to access an external website with minimal impact to the network bandwidth?A. ProxyB. Load balancerC. RouterD. Bandwidth shaper15. A VPN connection is not working correctly and the technician is unable to ping the VPN server. Which of the following actions should the technician do FIRST?A. Call their local ISPB. Verify the IP information of the serverC. Check their local Internet connectionD. Verify the hostname of the server16. A technician wants to use an existing DHCP server for three additional VLANs. Which of the following features needs to be configured to allow for this addition?A. DHCP serverB. Proxy serverC. RepeaterD. DHCP relay
Linux
Which of the following key-combinations is used to redo a change undone by a u command in vim?
Ctrl-w, Arrow
Ctrl-w, s
Ctrl-r
Ctrl-w, v
You work as the Network Administrator for Perfect solutions Inc. The company has a Linux-based Network. You are working as a root user. You want to know what the day will be on 20 July 2010.Which of the following commands should you use to accomplish this task?
cal
cal 20 July
cal 7 2010
date
Which of the following commands is used to access Windows resources from Linux workstation?
rsync
mutt
scp
smbclient
You want to temporarily change your primary group to another group of which you are a member. In this process, a new shell will be created, and when you exit the shell, your previous group will be reinstated. Which of the following commands will you use to accomplish this task?
chmod
newgrp
chgrp
chown
Fill in the blank with the required permission to complete the statement below. In order to make a script executable in a Linux computer, you must assign the___________ permission to the script file.
execute
read
read & write
write
You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. David, a Sales Manager, wants to know the name of the shell that he is currently using. Which of the following commands will he use to accomplish the task?
ECHO $shell
RM $shell
MV $shell
LS $shell
Which of the following text editing tools can be used to edit text files without having to open them?
less
sed
vi
more
Which of the following commands is used to securely copy files from one host to another over the network?
ls
cat
mutt
scp
Fill in the blank with the appropriate tool. __________ is a public domain collection of tools to allow Unix systems to manipulate MS-DOS files: read, write, and move around files on an MSDOS file system.
mtools
ntools
xtools
tools
Which of the following commands will you use to list all local and remote printers attached to your computer?
lpq
lpstat -d
lpstat -t
lpr
Which of the following files is the default configuration file of XDM (X Window Display Manager)?
/etc/X11/xdm/xdm-config
$HOME/.Xauthority
/usr/bin/xdm-config
/usr/bin/xterm
Which of the following commands is used to append the list of files in the /tmp directory to an existing file named deletelater.txt?
ls /tmp > deletelater.txt
ls deletelater.txt /tmp
ls /tmp deletelater.txt
ls /tmp >> deletelater.txt
You work as a Technician for Net World Inc. The company has a Linux-based network. You have configured a file server on the company's etwork. You want to summarize disk usage of each file in a particular directory on the file server. Which of the following commands will you use?
du
fsck
df
dfsck
You work as the Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. You want to keep an eye on the system log file /var/adm/messages. Which of the following commands should you use to read the file in real time?
tail -f /var/adm/messages
tail /var/adm/messages
cat /var/adm/messages
tail -n 3 /var/adm/messages
You work as the Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You are working as a root user on the Linux operating system. You have created a file in the vim text editor. You want to save this file and exit it. Which of the following keys should you use to accomplish the task?
:w
:wq
:q!
:
Which of the following commands is used to change file access permissions in Linux?
chown
chmod
chperm
chgrp
Which of the following commands is used to view the PDF files in Linux?
ps2pdf
a2ps
pdf2ps
evince
You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You want to view the status of the current processes running on a Linux computer. You also want to append this information into the StatPro.txt file without deleting its content. Which of the following commands will you use to accomplish the task?
ps StatPro.txt
ps >> StatPro.txt
ps | more StatPro.txt
ps > StatPro.txt
When you remove a user account from your Linux system, the files and directories of this user may still remain on the system. Which of the following commands can you use to remove all items from your Linux system? Each correct answer represents a complete solution. Choose two.
userdel -r
userdel -f
userdel -h
userdel -c
You work as the Network Administrator for Perfect solutions Inc. The company has a Linux-based Network. You are a root user on the Red Hat operating system. You want to grant ownership of the file foofile to a user John. Which of the following commands should you use to accomplish this task?
chown John foofile
chmod John foofile
chgrp foofile John
chown foofile John
Which of the following cp command parameters copies only when the source file is newer than the destination file or when the destination file is missing?
-u
-l
-p
-s
35.
Which graphical mail client is the default tool for email and groupware in Red Hat Enterprise Linux?
mutt
Evolution
Thunderbird
pidgin
Windows 7
Select or move between desktop gadgets
Select or move between taskbar buttons
Open the Ease Of Access Center window
Aero features are downloaded from Microsoft.
The windows experience index is at least 2.
The windows experience index is 3 or greater.
Aero Glass
DirectAccess
ReadtyBoost
User Account Control
User Account Control Panel
Notification Control Settings Manager
Windows XP professional
Windows Vista
Windows7
exFAT
NTFS
All of the above
Create a VPN connection
A static IPv4 address
A static IPv6 address
/oobe
/generalize
/unattend
In windows explorer .right-click the. VHD file and open.
In diskpart, select the disk and attach
Use DISM /online /apply
A display adapter with WDDM support
A display adapter without WDDM Support but with SVIDEO
An 80 GB HDD
Windows upgrade advisor
WAIK
Microsoft Application Compatibility Toolkit
PPTP
IKEv2
SSTP
Outbound rules
Isolation rules
Authentication exemption rules
Safe Mode
Safe Mode with Networking
Last Known Good Configuration (Advanced)
How to access file and folder though network?
\\ computer name
// computer name
\\ computer\Ip
None
In following Which is Class B IP?
126.254.255.255
191.255.255.254
192.127.156.134
223.123.124.234
What is the port number of HHTP?
443
68
80
23
AppLocker
Bitlocker
None
Professional
Enterprise
Home basic
We can’t configure policy.
Default first will be applied
Default second will be applied.
Local policy
None
Advanced tab
Favorites
SafetyBefore the process of encrypting the drive, it’ll ask to save a recovery file why?
Used if the password is forgotten
Used for decryption.
None
Secpol.msc
MMC
Services.msc
The first time a user encrypts a file.
While Planning encryption.
None
0 comments:
Post a Comment