1.
A user reports that their system is giving a message stating that their USB 2.0 devices are running at USB 1.1 speed without an external USB hub. The devices run at USB 2.0 when tested on the technicians PC. Which of the following will MOST likely provide USB 2.0 functionality?
Correct Answer
C. Install a USB 2.0 firmware update on the motherboard.
Explanation
Installing a USB 2.0 firmware update on the motherboard is the most likely solution to provide USB 2.0 functionality in this scenario. This update will ensure that the motherboard's firmware is compatible with USB 2.0 devices and will enable them to run at the correct speed. This solution is preferred over the other options because it directly addresses the issue with the system's USB functionality and does not require any additional hardware or cables.
2.
Which of the following is the BEST tool to troubleshoot a DB-9 port?
Correct Answer
D. Loopback plug
Explanation
A loopback plug is the best tool to troubleshoot a DB-9 port because it allows for testing the port's functionality by creating a loop within the port itself. This means that any issues with the port, such as connectivity or signal problems, can be identified and resolved. Unlike the other options listed, a loopback plug specifically targets the DB-9 port and provides a simple and effective method for troubleshooting. An ohm meter measures resistance, an anti-static wrist strap prevents static discharge, and an oscilloscope is used for analyzing waveforms, but none of these tools are specifically designed for troubleshooting a DB-9 port.
3.
A customer reports that a networked printer is not printing documents. The technician successfully pings the printers IP address. Which of the following could be the problem? (Select TWO).
Correct Answer(s)
D. The printer is out of paper.
E. The spooler is not functioning.
Explanation
The printer being out of paper could be a possible problem because if there is no paper, the printer will not be able to print the documents. Additionally, if the spooler is not functioning, it can cause issues with the printing process as the spooler is responsible for managing print jobs.
4.
Which of the following does PING -t do?
Correct Answer
A. Continuous ping of an IP address until cancelled
Explanation
The correct answer is continuous ping of an IP address until cancelled. The "-t" option in the PING command allows the user to continuously ping an IP address until they manually cancel the command. This is useful for monitoring network connectivity and latency over an extended period of time. The other options mentioned, such as reaching a count of 1000 or waiting for a response or return from the target, do not accurately describe the functionality of the "-t" option.
5.
Which of the following is contained in the first sector of the hard disk?
Correct Answer
D. Master boot record
Explanation
The first sector of a hard disk contains the Master Boot Record (MBR). The MBR is a small program that is executed when the computer is powered on and it contains information about the disk's partitions and the location of the operating system. It also contains the partition table, which helps the computer locate and access the different partitions on the disk. The MBR is crucial for the computer to boot up properly and initiate the operating system.
6.
A technician is tasked with setting up a Windows XP computer with a user account that will only be used to access the Internet. Which account type should the user have access to?
Correct Answer
A. Guest
Explanation
The user should have access to the Guest account. The Guest account is designed for temporary or occasional use and has limited privileges, making it suitable for a user who only needs to access the internet. The Administrator account has full control over the computer and should not be used for regular internet access. Domain User accounts are typically used in a networked environment, and Power User accounts have elevated privileges that may not be necessary for internet access.
7.
If a technician suspects that the voltage being delivered to a desktop computers power supply is insufficient or incorrect, which device should be used to determine the correct voltage?
Correct Answer
B. A multimeter
Explanation
A multimeter is the correct device to determine the correct voltage being delivered to a desktop computer's power supply. A multimeter is a versatile tool that can measure various electrical properties, including voltage. By connecting the multimeter to the power supply, the technician can accurately measure the voltage and determine if it is within the required range or not. This allows them to identify any issues with the voltage and take necessary steps to rectify them.
8.
A virus has been removed from the users machine, but the user still cannot access the Internet. Which of the following should the technician check NEXT?
Correct Answer
D. Check the web browsers proxy settings.
Explanation
After removing the virus from the user's machine, the technician should check the web browser's proxy settings next. Proxy settings can sometimes be modified by malware, causing issues with internet access. By checking and potentially adjusting the proxy settings, the technician can ensure that the user can access the internet properly. Disabling port forwarding on the router, rebooting to Safe Mode, and formatting the machine and reinstalling the OS are not necessary steps in this scenario as the issue is likely related to the proxy settings.
9.
After upgrading to Windows Vista, a client states that the run command no longer appears on the Start menu:
Which of the following is the reason the user cannot see the run command?
Correct Answer
D. The run command is not displayed by default on the start menu.
Explanation
The reason the user cannot see the run command after upgrading to Windows Vista is because the run command is not displayed by default on the start menu.
10.
A user states that email is not being received. Which of the following protocols should the technician check for incoming mail?
Correct Answer
B. POP3
Explanation
The technician should check the POP3 protocol for incoming mail. POP3 (Post Office Protocol version 3) is a standard protocol used for receiving emails from a remote server to a local email client. It allows the user to download and access their emails from the server onto their device. By checking the POP3 protocol, the technician can troubleshoot any issues related to the user not receiving emails.
11.
On a laptop, which of the following is the name of the socket that a wireless card would typically be inserted into?
Correct Answer
C. Mini PCI
Explanation
A wireless card on a laptop is typically inserted into a Mini PCI socket. This socket is specifically designed to accommodate Mini PCI cards, which are commonly used for wireless connectivity. PCIe and PCI are different types of expansion slots found on desktop computers, while AGP is an outdated graphics card slot. Therefore, Mini PCI is the correct answer for a laptop's wireless card socket.
12.
A technician has just installed a new hard drive into a Windows Vista desktop computer. The hard drive does not appear in Windows Explorer. Which of the following should the technician perform NEXT to have the drive recognized by the system?
Correct Answer
A. Initialize and format the hard drive through Disk Management
Explanation
To have the newly installed hard drive recognized by the system, the technician should initialize and format the hard drive through Disk Management. This process will prepare the hard drive for use by creating a partition and formatting it with a file system that Windows can recognize. Once the hard drive is initialized and formatted, it will be visible in Windows Explorer and ready for use.
13.
A workstation is not booting correctly. The technician wants to locate bad sectors and recover readable information. Which of the following commands would the technician use?
Correct Answer
D. Chkdsk c: /r
Explanation
The technician would use the "chkdsk c: /r" command to locate bad sectors and recover readable information. The "/r" parameter stands for "repair" and instructs the chkdsk command to locate bad sectors on the hard drive and attempt to recover any readable information from them. This command is commonly used to fix disk errors and recover data on a malfunctioning workstation.
14.
A technician adds a video card to a single monitor system with an existing on-board video controller. After powering on the system, an error message appears on the monitor stating No Input Detected. Which of the following is the problem?
Correct Answer
C. The monitor is still connected to the on board video controller.
Explanation
The error message "No Input Detected" suggests that the monitor is not receiving any signal from the video source. Since a video card has been added to the system, it is likely that the monitor is still connected to the on-board video controller instead of the newly installed add-on video card.
15.
Which of the following is the MAXIMUM allowable cable length of CAT5?
Correct Answer
A. 100 meters (328 feet)
Explanation
The maximum allowable cable length of CAT5 is 100 meters (328 feet). This is because CAT5 cables are designed to transmit data over short distances and exceeding this length can result in signal degradation and loss.
16.
An internal IEEE 1394 expansion card should be installed on which port type?
Correct Answer
D. PCI
Explanation
An internal IEEE 1394 expansion card should be installed on the PCI port type. PCI stands for Peripheral Component Interconnect, which is a standard expansion bus that allows devices to be connected to the computer's motherboard. This type of port is commonly used for various expansion cards, including IEEE 1394 (also known as FireWire) cards, which are used for high-speed data transfer and connecting devices such as cameras and external hard drives.
17.
A technician is troubleshooting problems with a hard drive. After checking the drive in another computer and finding no issues, the technician takes voltage readings on the Molex connector from the power supply. Which of the following represents the readings the technician should find?
Correct Answer
D. +5V and +12V
Explanation
The technician should find voltage readings of +5V and +12V on the Molex connector. This is because the Molex connector is commonly used to provide power to hard drives, and the standard voltage outputs for the Molex connector are +5V and +12V. These voltage readings indicate that the power supply is providing the correct power levels to the hard drive, suggesting that the issue lies elsewhere in the troubleshooting process.
18.
A user powers up their desktop PC, and instead of booting up normally, the user is taken into the BIOS setup. Which of the following is the MOST likely problem?
Correct Answer
C. A faulty CMOS battery
Explanation
A faulty CMOS battery is the most likely problem in this scenario. The CMOS battery is responsible for providing power to the CMOS chip, which stores the BIOS settings. If the battery is faulty, it may not be able to provide sufficient power to the CMOS chip, causing the BIOS to reset and take the user into the BIOS setup instead of booting up normally. This can be resolved by replacing the faulty CMOS battery.
19.
A user reports that when typing on the laptop keyboard, the mouse pointer scrolls across the screen. Which of the following would MOST likely resolve this issue?
Correct Answer
C. Disable the touch pad
Explanation
Disabling the touchpad would most likely resolve the issue because it seems that the touchpad is sensitive and causing the mouse pointer to scroll across the screen when typing. By disabling the touchpad, the user can prevent any accidental movements of the mouse pointer while typing on the laptop keyboard.
20.
A computer is responding slowly and the Task Manager shows that spool.exe is using 95% of system resources. Which of the following is MOST likely the cause of this problem?
Correct Answer
A. Printing subsystem
Explanation
The most likely cause of the computer responding slowly and spool.exe using 95% of system resources is the printing subsystem. The spool.exe process is responsible for managing print jobs in the Windows operating system. If there is a problem with the printing subsystem, such as a large number of print jobs or a printer driver issue, it can cause the spool.exe process to consume excessive system resources and slow down the computer.
21.
Which of the following should MOST likely be replaced if the laptop will not display any video through the laptops screen or an external monitor?
Correct Answer
D. Video card
Explanation
If the laptop is not displaying any video through the laptop screen or an external monitor, the most likely component that needs to be replaced is the video card. The video card is responsible for generating and sending video signals to the display. If the video card is faulty or not functioning properly, it can result in no video output on the screen. Replacing the video card should resolve the issue and restore video display on the laptop.
22.
A technician is replacing a motherboard in a users desktop PC. Which of the following tools should be used before replacing the new motherboard?
Correct Answer
A. Power supply tester
Explanation
Before replacing the new motherboard, a technician should use a power supply tester. This tool is used to check if the power supply unit (PSU) is functioning properly. By testing the PSU, the technician can ensure that the motherboard will receive the correct amount of power and prevent any potential issues that may arise from a faulty power supply.
23.
A computer just had a memory upgrade installed on the machine. Upon boot, the system does not recognize the new memory even though it is listed as being compatible on the manufacturers website. Which of the following is MOST likely needed to resolve the issue?
Correct Answer
C. BIOS update
Explanation
The most likely solution to the issue of the computer not recognizing the new memory after a memory upgrade is a BIOS update. The BIOS (Basic Input/Output System) is responsible for initializing and configuring hardware components, including memory. Updating the BIOS can ensure that the system recognizes and properly utilizes the new memory.
24.
USER1 is part of the Users Group and is attempting to access files via UNC path \\SERVER\FILESHARE. \\ SERVER\FILESHARE has the following share permissions:
AdministratorsFull ControlUsersRead OnlyGuestsNo AccessThe directory on the hard drive where the share is located has the following permissions: AdministratorsFull ControlUsersChangeGuestsNo AccessWhich of the following levels of access will login account USER1 have?
Correct Answer
A. Read Only
Explanation
Based on the given information, the share permissions for \\SERVER\FILESHARE are set to "Read Only" for the Users group. Therefore, the login account USER1, being a part of the Users group, will have "Read Only" access to the files via the UNC path \\SERVER\FILESHARE. The directory permissions on the hard drive are not relevant in this case, as the share permissions take precedence.
25.
A user states that the computer is too slow when capturing video from an HD camera. Upon inspection the technician realizes that the computer is state-of-the-art in hardware, but it is using an external legacy USB 1.1 video capture card. The camera has USB 2.0 and IEE1394b outputs. Which of the following is the BEST recommendation to increase the video capture capabilities in this situation?
Correct Answer
B. Install an IEEE1394b video capture card.
Explanation
The technician should recommend installing an IEEE1394b video capture card. This is because the computer is already state-of-the-art in terms of hardware, so the issue lies with the external legacy USB 1.1 video capture card. By installing an IEEE1394b video capture card, which is a faster and more modern connection, the computer will be able to capture video from the HD camera at a higher speed and improve its video capture capabilities.
26.
A technician needs to implement a RAID 1 set on a computer. Which of the following is the MINIMUM number of hard drives that would be required?
Correct Answer
B. 2
Explanation
To implement a RAID 1 set, also known as disk mirroring, the technician needs to have at least two hard drives. In RAID 1, data is written simultaneously to two drives, creating an exact copy or mirror of the data. This redundancy provides data protection in case one of the drives fails. Therefore, the minimum number of hard drives required for RAID 1 is 2.
27.
Which of the following is a method used in the removal of a boot sector virus?
Correct Answer
D. Booting from the floppy disk or CD-ROM prior to scanning
Explanation
Booting from the floppy disk or CD-ROM prior to scanning is a method used in the removal of a boot sector virus. This is because booting from a clean and trusted source, such as a floppy disk or CD-ROM, allows the computer to bypass the infected boot sector on the hard drive. By doing so, the virus is not loaded into memory, which enables the antivirus software to effectively scan and remove the virus from the system.
28.
A user is not able to receive files off the FTP server. Which of the following default ports needs to be opened for FTP to work properly?
Correct Answer
A. 21
Explanation
Port 21 is the default port for FTP (File Transfer Protocol). When a user wants to receive files from an FTP server, they need to have port 21 opened on their network or firewall. This is because FTP uses port 21 for its control connection, which is responsible for sending commands and responses between the client and server. By opening port 21, the user will be able to establish a connection with the FTP server and receive files successfully.
29.
Which of the following is the MOST important reason for ensuring a RJ-11 phone line jack is not connected to a RJ-45 Ethernet network port?
Correct Answer
D. pHone line voltages can damage Ethernet equipment.
Explanation
Phone line voltages can damage Ethernet equipment. RJ-11 jacks are designed for phone lines, which typically carry lower voltages compared to Ethernet networks. Connecting a RJ-11 phone line jack to a RJ-45 Ethernet network port can result in higher voltages being applied to the Ethernet equipment, potentially causing damage. Therefore, it is important to ensure that a RJ-11 phone line jack is not connected to a RJ-45 Ethernet network port to prevent any potential damage to the equipment.
30.
Users are reporting that a Vista feature asks them for confirmation before running most applications or making system changes. Which of the following is the name of this Vista feature and where should the technician direct users to turn the functionality off?
Correct Answer
C. User Account Control; it can be turned off under User Accounts in the Control Panel.
Explanation
The correct answer is User Account Control; it can be turned off under User Accounts in the Control Panel. User Account Control (UAC) is a feature in Windows Vista that prompts users for confirmation before running most applications or making system changes. To turn off this functionality, users should navigate to the User Accounts section in the Control Panel and disable UAC.
31.
After replacing the motherboard in a laptop, the system overheats and fails to boot. Which of the following is the MOST likely cause of this error?
Correct Answer
A. Thermal paste was not applied between the heat sink and CPU.
Explanation
The most likely cause of the system overheating and failing to boot after replacing the motherboard in a laptop is that the thermal paste was not applied between the heat sink and CPU. Thermal paste is a crucial component that helps to transfer heat from the CPU to the heat sink, ensuring proper cooling. Without thermal paste, the heat cannot be effectively dissipated, leading to overheating and potential damage to the system.
32.
Which of the following tools allows the technician to copy a file without prompts?
Correct Answer
B. COPY /Y
Explanation
The correct answer is COPY /Y because the /Y switch in the COPY command allows the technician to copy a file without prompts. When the /Y switch is used, any existing file with the same name as the file being copied will be automatically overwritten without any prompts or confirmation messages. This saves time and allows for a quicker and more efficient file copy process.
33.
Which of the following devices has the options of: master, slave and cable select? (Select THREE).
Correct Answer(s)
A. CD-ROM
D. Hard drive
F. DVD-ROM
Explanation
CD-ROM, Hard drive, and DVD-ROM are the correct answers because these devices have the options of master, slave, and cable select. These options determine the device's role and behavior when connected to the computer's motherboard or controller. The master device typically controls the communication on the data cable, while the slave device follows the commands of the master. Cable select allows the devices to automatically determine their roles based on their position on the cable. This flexibility in configuration is commonly found in optical drives (CD-ROM and DVD-ROM) and hard drives.
34.
Using the NET command which variable would be used to find out the number of files sent by the workstation service?
Correct Answer
D. Statistics
Explanation
The correct answer is "statistics" because the question is asking about the variable used to find out the number of files sent by the workstation service when using the NET command. The "statistics" variable would provide this information.
35.
A technician plugs a USB device into the front panel of a desktop computer and nothing happens. The technician knows that plug-n-play is enabled. Which of the following BEST describes a possible cause to this issue?
Correct Answer
D. The front panel connectors are not plugged into the motherboard.
Explanation
The front panel connectors not being plugged into the motherboard is the best explanation for the issue because if they are not connected properly, the USB device will not be recognized by the computer. Plugging a USB 2.0 device into a USB 1.1 port or vice versa would still allow the device to be recognized, although it may not function at its optimal speed. Rebooting the computer is not necessary for a USB device to work, as plug-n-play should automatically detect and install the necessary drivers.
36.
An office laser printer is printing lighter in random areas. Which of the following is the EASIEST solution to implement for this issue?
Correct Answer
B. Replace the toner cartridge.
Explanation
The easiest solution to implement for the issue of random lighter printing areas in an office laser printer is to replace the toner cartridge. This is because the toner cartridge is responsible for supplying the toner, which is used to create the image on the drum and transfer it onto the paper. If the toner cartridge is old or faulty, it may not be distributing the toner evenly, resulting in lighter areas on the printed pages. By replacing the toner cartridge, the printer will have a fresh supply of toner and should be able to print evenly again.
37.
Which of the following private IP addresses is commonly used for internal IP addressing?
Correct Answer
C. 192.168.0.1
Explanation
192.168.0.1 is commonly used for internal IP addressing because it belongs to the private IP address range specified by the Internet Assigned Numbers Authority (IANA) for use in private networks. This address range is reserved for use within local area networks (LANs) and is not routable on the internet. 192.168.0.1 is often used as the default gateway IP address for home routers and is commonly used for configuring network devices within a private network.
38.
A technician has deleted all the files in the directory C:\tempfiles. Which of the following commands should the technician use to delete this directory?
Correct Answer
D. RD
Explanation
The technician should use the "RD" command to delete the directory C:\tempfiles. RD stands for "Remove Directory" and is used to delete directories in the Windows command prompt.
39.
A home user is setting up a wireless network. Which of the following could be used to prevent a neighbor from accessing the network? (Select TWO).
Correct Answer(s)
B. Enable wireless encryption
D. Disable SSID broadcasting
Explanation
Enabling wireless encryption adds a layer of security to the wireless network by encrypting the data transmitted between devices. This prevents unauthorized access as the neighbor would need the encryption key to decrypt the data.
Disabling SSID broadcasting hides the network's name from being broadcasted publicly, making it more difficult for the neighbor to discover and connect to the network. They would need to manually enter the network name to connect, which adds an extra layer of security.
40.
A user has just moved to a new office and is unable to access the network. The technician suspects the users network settings need to be changed. Which of the following tools would the technician use on the Windows XP computer to view the network settings?
Correct Answer
C. IPCONFIG
Explanation
The technician would use IPCONFIG on the Windows XP computer to view the network settings. IPCONFIG is a command-line tool that displays the current configuration of all network interfaces on the computer, including IP addresses, subnet masks, and default gateways. By using IPCONFIG, the technician can check if the user's network settings are correctly configured and make any necessary changes to allow access to the network.
41.
The technician is moving a users files from a Windows XP PC to a Windows Vista PC. Which of the following directories corresponds to each operating system?
Correct Answer
B. C:\documents and settings\user1\my documents to c:\users\user1\documents
Explanation
The correct answer is c:\documents and settings\user1\my documents to c:\users\user1\documents. In Windows XP, the default directory for user documents is "c:\documents and settings\user1\my documents", while in Windows Vista, it is "c:\users\user1\documents". Therefore, when moving the user's files from Windows XP to Windows Vista, the files in the "c:\documents and settings\user1\my documents" directory should be moved to the "c:\users\user1\documents" directory.
42.
Which of the following are items that can be configured on a wireless router to make it more difficult for attackers to gain access? (Select TWO).
Correct Answer(s)
B. Disable SSID broadcast
C. Change SSID from default
Explanation
Disabling SSID broadcast and changing the SSID from default are two items that can be configured on a wireless router to make it more difficult for attackers to gain access. Disabling SSID broadcast prevents the router from broadcasting its network name, making it less visible to potential attackers. Changing the SSID from default adds an extra layer of security as attackers often target routers with default settings. By changing the SSID, the attacker would need to spend more time figuring out the network name, making it harder for them to gain access.
43.
Users in the office report that the speed of the Internet has drastically decreased since the recent network hardware refresh. Which of the following could be attributed to the problem?
Correct Answer
D. The new switches are configured for 10MB.
Explanation
The correct answer is that the new switches are configured for 10MB. This means that the switches are set to operate at a maximum speed of 10 megabits per second, which is significantly slower than what the office network requires. As a result, the speed of the Internet has drastically decreased since the network hardware refresh.
44.
A user can receive email but cannot send email with the email client software. Which of the following protocols is incorrectly configured?
Correct Answer
B. SMTP
Explanation
SMTP stands for Simple Mail Transfer Protocol, which is responsible for sending email messages from a client to a server. In this scenario, if a user can receive emails but cannot send them, it indicates that the SMTP protocol is incorrectly configured. This means that there may be an issue with the SMTP settings or the server may not be properly configured to allow outgoing email messages.
45.
A technician is setting up a SOHO and has configured the wireless NIC on the laptop with WPA2. While configuring the WAP, WPA2 is not listed as an option. Which of the following should the technician do NEXT?
Correct Answer
C. Install the latest WAP firmware
Explanation
The technician should install the latest WAP firmware. This is because the WAP (Wireless Access Point) is not listing WPA2 as an option, indicating that it may not be compatible with the current firmware. By installing the latest firmware, the technician can ensure that the WAP supports WPA2 and can properly configure it for the SOHO setup.
46.
Which of the following BEST explains a system experiencing intermittent memory errors?
Correct Answer
B. Memory sticks have corroded contacts
Explanation
The best explanation for a system experiencing intermittent memory errors is that the memory sticks have corroded contacts. Corroded contacts can cause poor electrical connections between the memory sticks and the motherboard, leading to intermittent errors. This can result in data corruption, system crashes, and other memory-related issues.
47.
A second optical drive has been added to the computer and needs to be referenced as the R:
drive by the Microsoft Windows operating system. Which of the following places in Microsoft Windows will BEST accomplish this task?
Correct Answer
B. Disk Management
Explanation
Disk Management is the best place in Microsoft Windows to accomplish the task of referencing a second optical drive as the R: drive. Disk Management allows users to manage and configure disk drives, including assigning drive letters to new drives. By accessing Disk Management, the user can assign the letter R: to the newly added optical drive, ensuring that it is recognized and accessible by the operating system.
48.
A yellow exclamation mark next to a device in Device Manager indicates which of the following?
Correct Answer
B. The device driver is missing.
Explanation
A yellow exclamation mark next to a device in Device Manager indicates that the device driver is missing. This means that the operating system is unable to locate the necessary software to communicate with the device. Without the driver, the device will not function properly, if at all.
49.
A technician is replacing a hard drive with a new 30GB drive formatted with FAT32. While transferring a 5GB file an error appears indicating that the new drive has insufficient space for the transfer. Which of the following is the cause of the problem?
Correct Answer
A. FAT32 cannot handle single files larger than 4GB.
Explanation
The cause of the problem is that FAT32 cannot handle single files larger than 4GB. This means that when trying to transfer a 5GB file to the new drive, the file size exceeds the maximum limit supported by the FAT32 file system.
50.
A customer is trying to copy a DVD with a third-party application. The program reads the source DVD fine, but when the blank is inserted, the program continuously prompts to insert blank media. Which of the following are possible causes? (Select THREE).
Correct Answer(s)
A. A CD is inserted into the drive.
B. A DVD is inserted upside down in the drive.
C. The wrong DVD type is inserted into the drive.
Explanation
The possible causes for the program continuously prompting to insert blank media are:
1) A CD is inserted into the drive, which is not compatible for copying a DVD.
2) A DVD is inserted upside down in the drive, preventing the program from recognizing it as blank media.
3) The wrong DVD type is inserted into the drive, meaning it is not compatible for copying.