1.
In Windows XP which following command line function will convert a FAT volume to NTFS ?
Correct Answer
D. CONVERT
Explanation
The correct answer is CONVERT. The CONVERT command line function in Windows XP is used to convert a FAT volume to NTFS. This command allows users to change the file system of a particular volume without losing any data. It is a useful tool for upgrading the file system to take advantage of the features and benefits offered by NTFS.
2.
A user asks you which of the follwing RAID disk arrays provide fault tolerance with parity. what should you tell him?
Correct Answer
D. RAID 5
Explanation
RAID 5 provides fault tolerance with parity. In RAID 5, data is striped across multiple disks along with parity information. This parity information allows for the reconstruction of data in case of a disk failure. When a disk fails, the data can be rebuilt using the parity information stored on the remaining disks. This provides fault tolerance as the system can continue to function even if a disk fails. RAID 0, RAID 1, RAID 32, and RAID 4 do not provide fault tolerance with parity.
3.
Which account within Windows is the most targeted by hackers ?
Correct Answer
B. Administrator
Explanation
The correct answer is "administrator" because the administrator account has the highest level of access and control over a Windows system. This makes it an attractive target for hackers as compromising this account would give them full control over the system and allow them to carry out malicious activities without restrictions.
4.
A user phones you and wants to know what is the max speed of USB 2.0 is, what should you tell him?
Correct Answer
E. 480Mbps
Explanation
USB 2.0 has a maximum speed of 480Mbps. This means that data can be transferred at a rate of up to 480 megabits per second.
5.
A single sided, single layer DVD-R disc has a storage capcity of what ?
Correct Answer
A. 4.7GB
Explanation
A single sided, single layer DVD-R disc has a storage capacity of 4.7GB. This means that it can hold up to 4.7 gigabytes of data.
6.
Which of the following file systems is recommended for Windows XP home
Correct Answer
D. NTFS
Explanation
NTFS (New Technology File System) is recommended for Windows XP Home because it provides better security, stability, and performance compared to FAT (File Allocation Table) and FAT16. NTFS supports file and folder permissions, encryption, and compression, allowing for more advanced security features. It also supports larger file sizes and partitions, which is beneficial for modern systems. Additionally, NTFS has built-in recovery features that help prevent data loss in case of system failures. Therefore, NTFS is the preferred file system for Windows XP Home.
7.
Which of the following utilities can be used to keep a Windows XP computer running efficiently and keep disk drives free of errors?
choose two answers
Correct Answer(s)
B. Disk defragmenter
D. CHKDSK
Explanation
Disk defragmenter and CHKDSK are both utilities that can be used to keep a Windows XP computer running efficiently and keep disk drives free of errors. Disk defragmenter rearranges fragmented data on the hard drive, making it easier and faster for the computer to access files. CHKDSK, on the other hand, checks the file system for errors and repairs any issues it finds. By regularly using these utilities, users can optimize their computer's performance and prevent disk drive errors.
8.
Telnet uses port ??
Correct Answer
B. 23
Explanation
Telnet is a network protocol used to establish a remote connection to a device or server. It allows users to access and manage devices remotely. Telnet uses port 23 as the default port for communication. Therefore, the correct answer is 23.
9.
What tool can be used to track and control the amount of disk space available using an NTFS volume?
Correct Answer
D. Disk quotas
Explanation
Disk quotas can be used to track and control the amount of disk space available on an NTFS volume. By setting disk quotas, administrators can limit the amount of disk space that individual users or groups can consume on the volume. This helps in managing disk space usage and preventing any single user from consuming excessive disk space, ensuring fair allocation of resources. Disk clean up, disk dump, REGEDIT, and CMD are not specifically designed for tracking and controlling disk space availability on an NTFS volume.
10.
Which of the following is not part of the OSI model ?
Correct Answer
D. Transmission layer
Explanation
The OSI model consists of seven layers: physical, data link, network, transport, session, presentation, and application. Each layer has a specific function in the communication process. The transmission layer is not part of the OSI model.
11.
Which of the following is the correct size of a Type II PCMCIA card?
Correct Answer
D. 5mm
Explanation
The correct size of a Type II PCMCIA card is 5mm. Type II PCMCIA cards are 5mm thick and are commonly used for adding additional functionality to laptops and other portable devices.
12.
You attend a service call and complete an installation of a printer, you then begin to explain to the user how to use the printer but the user is deaf. what would you do next?
Correct Answer
A. Call your supervisor
13.
There are two network printers in a large office.A user approaches you and asks why when he prints a document it prints to the wrong printer.
what is the most likely cause ?
Correct Answer
A. The other printer is set as the default printer
Explanation
The most likely cause for the user's document printing to the wrong printer is that the other printer is set as the default printer. This means that when the user sends a print command, it automatically goes to the default printer instead of the intended one.
14.
From the ways listed how can you change the file attributes of a file?
Correct Answer(s)
B. Use the Attrib command in CMD.exe
C. Right-click the file and choose properties form the drop down list
Explanation
You can change the file attributes of a file by using the Attrib command in CMD.exe or by right-clicking the file and choosing properties from the drop-down list.
15.
Your boss Chuck Norris wants a more secure PC, from the list below which of these is part of securing chucks PC
Correct Answer(s)
A. Limit the use of administrator accounts
E. Make use of event logging and incident reporting
Explanation
Limiting the use of administrator accounts is part of securing Chuck's PC because it reduces the risk of unauthorized access and potential damage caused by malware or malicious software. By using standard user accounts instead of administrator accounts, Chuck can prevent unauthorized changes to system settings and limit the scope of potential security breaches. Additionally, making use of event logging and incident reporting helps to monitor and identify any suspicious activities or security incidents on Chuck's PC, allowing for timely response and mitigation of potential threats.
16.
Which of the following can be used to eliminate electromagnetic interference on a network cable ?
Correct Answer
D. Ferrite clamp
Explanation
A ferrite clamp can be used to eliminate electromagnetic interference on a network cable. Ferrite clamps are made of a magnetic material that can absorb and suppress high-frequency electromagnetic noise. By attaching a ferrite clamp to a network cable, it can help to reduce the interference caused by external sources such as power lines or other electronic devices. This helps to improve the signal quality and overall performance of the network connection.
17.
ARP is responsible for the following ?
Correct Answer
D. Locating a host on a local network
Explanation
ARP (Address Resolution Protocol) is responsible for locating a host on a local network. It is a protocol used to map an IP address to a physical (MAC) address. When a device wants to communicate with another device on the same network, it needs to know the MAC address of that device. ARP is used to resolve this by sending out a broadcast message to all devices on the network, asking which device has the specific IP address. The device with the matching IP address responds with its MAC address, allowing communication to take place.
18.
Bill, a user is having problems with his email, which of the following protocols could be a cause ?
Correct Answer
C. SMTP
Explanation
SMTP (Simple Mail Transfer Protocol) is the correct answer because it is the protocol used for sending and receiving emails. If Bill is experiencing problems with his email, it could be due to issues with the SMTP protocol, such as server configuration problems, authentication issues, or network connectivity problems. HTTP, FTP, SSH, and SNTP are not directly related to email communication, so they are less likely to be the cause of Bill's email problems.
19.
Where have i taken the following from ?
[boot loader]
timeout=30
default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS
[operating systems]
multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Professional" /fastdetect
Correct Answer
B. BOOT.INI
Explanation
The given correct answer "BOOT.INI" is the name of a file that is commonly found in the root directory of a Windows XP operating system. This file contains the configuration settings for the Windows boot loader, including the timeout value, default operating system, and the location of the Windows installation. The contents of the file specify that the default operating system is located on the second partition of the first disk, and it is the Microsoft Windows XP Professional. Therefore, the information provided in the given text indicates that the answer is "BOOT.INI".
20.
Your looking for the software registry key inthe registry, where is the best place to look for it ?
Correct Answer
A. H_KEY_CLASSES_ROOT
Explanation
The best place to look for the software registry key in the registry is H_KEY_CLASSES_ROOT. This registry key contains information about file associations and COM objects, making it a likely location for software-related registry entries.
21.
A user phones you and complains that there printouts from there laser printer are very slow.What could be the possible problem ?
Correct Answer
D. Spooling is not enabled
Explanation
If spooling is not enabled, it means that the printer is not able to queue print jobs and process them in the background. This can result in slow printouts as the printer has to wait for each print job to be fully processed before starting the next one. Enabling spooling allows the printer to receive print jobs and store them in a queue, allowing for faster and more efficient printing.
22.
A user phones you and says his laser printer is printing pages with white streaks though them. what is the possible problem
Correct Answer
B. Transfer corona
Explanation
The possible problem could be with the transfer corona. The transfer corona is responsible for transferring the toner from the drum onto the paper. If it is not functioning properly, it may result in white streaks on the printed pages.
23.
A angry user comes into your office shouting that you have not fixed his PC like you said you did
what should you do first ?
Correct Answer
C. Stay clam
Explanation
In this situation, it is important to stay calm and composed. Reacting with anger or aggression will only escalate the situation further. By remaining calm, you can listen to the user's concerns and address them in a professional and respectful manner. This will help in diffusing the tension and finding a solution to the problem.
24.
Joe a new computer user phones you to say his CPU disk is jammed in the harddrive, when you arrive at the customers home,you see he has tried to push a floppydisk into the CD drive
What would you do next ?
Correct Answer
C. Give the user a list of available computer training courses
Explanation
The appropriate next step would be to give the user a list of available computer training courses. This would help the user improve their computer skills and prevent them from making similar mistakes in the future. Laughing at the user or mocking them would not be professional or helpful. Contacting a colleague or supervisor may be unnecessary in this situation.
25.
A user wants to make a file read-only and hidden, using command prompt which of the following would allow the user to do this ?
Correct Answer
C. ATTRIB +R +H
Explanation
The correct answer is "ATTRIB +R +H". The "ATTRIB" command is used to change the attributes of a file, and the "+R" flag makes the file read-only while the "+H" flag hides the file. Therefore, using "ATTRIB +R +H" will make the file both read-only and hidden.