1.
A client can no longer print from their computer to the default printer. The client successfully prints
a test page directly from the printer. The printers queue shows the job ready to print. Which of the
following is the BEST recommendation that the technician can make?
Correct Answer
A. Restart the print spooler service.
2.
Which of the following will occur if %temp% is executed from the run command?
Correct Answer
D. The current users temporary folder will be opened.
Explanation
Executing %temp% from the run command will open the current user's temporary folder. The %temp% is an environment variable that represents the path to the temporary folder for the currently logged-in user. By executing it from the run command, the operating system will open the temporary folder specific to the user who executed the command.
3.
A technician needs to upgrade memory on a laptop with one available memory slot. The type and
amount of memory has been confirmed to be correct. Once the new memory is added, the BIOS
reports the original memory size. Which of the following is the NEXT step to perform?
Correct Answer
B. Reseat the laptop memory.
Explanation
Reseating the laptop memory involves removing the memory module from its slot and then reinserting it firmly. This step is necessary because sometimes the memory module may not be properly seated in the slot, causing the BIOS to not recognize the new memory. By reseating the memory, it ensures that the connection between the memory and the slot is secure, allowing the BIOS to properly detect the upgraded memory size.
4.
Which of the following contains the user profile directory for Microsoft Windows 2000 and XP?
Correct Answer
C. Documents and Settings
Explanation
The user profile directory for Microsoft Windows 2000 and XP is "Documents and Settings". This directory contains individual folders for each user account on the computer, where their personal files and settings are stored.
5.
A technician needs to add an expansion card to a computer. The documentation with the card
states it requires a PCI x4 slot. The computer has PCI x1 and PCI x16 slots available. Which if the
following should the technician do?
Correct Answer
C. The technician can install the card in a PCI x16 slot with normal performance.
Explanation
The technician can install the card in a PCI x16 slot with normal performance because the PCI x16 slot is compatible with the expansion card. Although the card requires a PCI x4 slot, it can still be installed in a larger slot without any loss of performance. The larger slot will not provide four times the performance as mentioned in the other option, but it will still provide normal performance. The PCI x1 slot is not suitable for the card as it will only provide half the performance.
6.
Which of the following is used to test all computer hardware before installing an operating system?
Correct Answer
B. POST card
Explanation
A POST card is used to test all computer hardware before installing an operating system. POST stands for Power-On Self-Test, which is a diagnostic testing process performed by the computer's BIOS (Basic Input/Output System) during startup. The POST card is a hardware device that plugs into the computer's motherboard and provides real-time information about the system's hardware status and any errors or issues detected during the POST process. It helps in identifying and troubleshooting hardware problems before the operating system is installed.
7.
Which of the following should be installed to support Gigabit Ethernet within a home network?
Correct Answer
D. 1000BaseT
Explanation
To support Gigabit Ethernet within a home network, 1000BaseT should be installed. 1000BaseT is a type of Ethernet technology that supports data transfer rates of up to 1 gigabit per second (Gbps). It uses twisted pair copper cables for transmission and is commonly used in home networks to provide high-speed internet connections. This technology allows for faster and more efficient data transfer within the network, enabling seamless streaming, online gaming, and other bandwidth-intensive activities.
8.
A laptop LCD screen needs to be replaced. Which of the following tools would be BEST used to
open the case?
Correct Answer
B. Plastic shim
Explanation
A plastic shim would be the best tool to open the case of a laptop LCD screen because it is non-conductive and less likely to cause damage to the delicate components inside the case. It can be used to gently pry open the case without scratching or breaking it. The flathead screwdriver, metal shim, and pliers could potentially cause more harm to the laptop or the screen if used to open the case.
9.
A technician is dispatched to a malware infected system. Upon arrival, the technician notices the
malwares pop-up on the screen. Which of the following boot methods would the technician utilize?
Correct Answer
A. Reboot in Safe Mode
Explanation
The technician would utilize the "Reboot in Safe Mode" boot method because Safe Mode starts the computer with only the essential drivers and services, which can help in isolating and removing malware. By booting in Safe Mode, the technician can access the system with limited functionality, making it easier to troubleshoot and remove the malware without interference from unnecessary processes or pop-ups.
10.
Which of the following devices can assist a technician in troubleshooting computers that will not
start?
Correct Answer
D. POST card
Explanation
A POST card, or Power-On Self-Test card, can assist a technician in troubleshooting computers that will not start. This device is inserted into the computer's expansion slot and provides diagnostic information about the computer's hardware during the boot process. It can help identify any issues or errors that may be preventing the computer from starting up properly, allowing the technician to troubleshoot and resolve the problem effectively.
11.
Which of the following would be the correct address to use with the PING command when testing
the functionality of a NIC?
Correct Answer
B. 127.0.0.1
Explanation
The correct address to use with the PING command when testing the functionality of a NIC is 127.0.0.1. This is the loopback address, also known as the localhost address, which is used to test network connectivity on the local machine. Pinging this address allows you to check if the network interface card is functioning properly and can send and receive data within the local system.
12.
A technician is renaming files on a PC from a command prompt and is currently in the root of drive
C:. Which of the following commands should the technician use to move to a different directory?
Correct Answer
A. CD
Explanation
The technician should use the "CD" command to move to a different directory. The "CD" command stands for "change directory" and is used to navigate through different folders and directories on a PC. By typing "CD" followed by the name of the directory, the technician can switch to that specific directory and continue renaming files or performing other tasks.
13.
A workstation no longer has network connectivity. Upon visual inspection, all connectors and
settings seem to be properly configured. Which of the following tools should the technician use to
troubleshoot this issue?
Correct Answer
C. Cable tester
Explanation
A cable tester is the most appropriate tool to troubleshoot the issue of a workstation no longer having network connectivity. This tool is designed to test the integrity and connectivity of network cables. By using a cable tester, the technician can identify if there are any faults or breaks in the network cable, which could be causing the loss of network connectivity. This will help the technician pinpoint the issue and take appropriate steps to fix it.
14.
A kiosk computer requires a CD-ROM to be in the drive in order for a program to function properly,
but it keeps failing to boot when restarted. Which of the following will correct this?
Correct Answer
D. Properly configuring the BIOS settings
Explanation
Properly configuring the BIOS settings can correct the issue with the kiosk computer failing to boot when restarted. The BIOS settings control the computer's hardware and startup processes, including the boot order. By configuring the BIOS settings correctly, the computer can be set to prioritize the CD-ROM drive during the boot process, ensuring that the program on the CD-ROM can function properly. This will allow the kiosk computer to boot successfully and run the program without any issues.
15.
Which of the following is the MOST important factor when using offline files on a networked
computer?
Correct Answer
B. Size of the computer hard drive
Explanation
The size of the computer hard drive is the most important factor when using offline files on a networked computer because it determines the amount of storage space available to store the offline files. A larger hard drive allows for more files to be stored offline, providing greater flexibility and accessibility when the computer is not connected to the network.
16.
In Windows Vista, a users documents can be stored on a drive other than the default C drive
location by changing the:
Correct Answer
C. Documents folder location in the folders properties.
Explanation
In Windows Vista, users have the option to change the location of their documents folder by modifying the folder's properties. This means that instead of storing their documents in the default C drive location, users can choose to save them on a different drive. This can be useful for organizing files or for situations where the C drive has limited space.
17.
A user has just updated application software on a PC and now finds the video display does not
work with the new application. Which of the following should the technician do FIRST?
Correct Answer
A. Check the application web site for known hardware compatibility issues.
Explanation
The technician should first check the application website for known hardware compatibility issues because the issue occurred after updating the application software. It is possible that the new version of the application may have specific requirements or compatibility issues with the video display. By checking the application website, the technician can determine if there are any known issues or recommendations for resolving compatibility problems. This step can help identify if the problem is related to the software update rather than a hardware issue.
18.
A user is attempting to connect a laptop to a TV using an HDMI connector. The user reports the
video works properly but there is no sound. Which of the following could be the MOST likely
cause?
Correct Answer
B. The HDMI audio service has not been selected.
Explanation
The most likely cause for the user's issue is that the HDMI audio service has not been selected. This means that the laptop is not configured to output audio through the HDMI connection. To resolve this, the user would need to go into the audio settings on their laptop and select the HDMI audio output as the default option.
19.
A technician installs a new 802.11n network adaptor for a desktop computer. The technician tries
to connect to an access point, but sees no available access points in the Wireless Configuration
Manager. Which of the following is the BEST explanation to why none of the access points are
listed?
Correct Answer
B. The access points are out of range.
Explanation
The best explanation for why none of the access points are listed is that they are out of range. This means that the desktop computer with the new 802.11n network adaptor is not within the range of any available access points, preventing it from detecting any of them in the Wireless Configuration Manager.
20.
Which of the following multimeter modes would be used to MOST accurately test the functionality
of the black and red wires on a Molex connector of an in use power supply?
Correct Answer
A. Voltage
Explanation
Voltage mode would be used to accurately test the functionality of the black and red wires on a Molex connector of an in-use power supply. This mode measures the electrical potential difference between two points, which is essential for determining if the wires are carrying the correct voltage and if the power supply is functioning properly. Continuity mode checks for a complete electrical connection, resistance mode measures the opposition to current flow, and calibrate mode is used to adjust the accuracy of the multimeter itself.
21.
Which of the following will happen when a user plugs a USB 1.1 device into a USB 2.0 port?
Correct Answer
D. The device will operate at the lower USB 1.1 speed.
Explanation
When a user plugs a USB 1.1 device into a USB 2.0 port, the device will operate at the lower USB 1.1 speed. This is because USB 2.0 ports are backward compatible with USB 1.1 devices, but the device itself does not have the capability to operate at the higher USB 2.0 speed. Therefore, it will default to the lower speed that it is designed for.
22.
Which of the following utilities can a technician use to display NetBIOS over TCP/IP information?
Correct Answer
C. NBTSTAT
Explanation
A technician can use NBTSTAT to display NetBIOS over TCP/IP information. NBTSTAT is a command-line utility that shows NetBIOS name tables, NetBIOS name cache, and NetBIOS name resolution statistics. It provides information about NetBIOS names and their associated IP addresses, as well as the status of NetBIOS services on a network. This utility is commonly used to troubleshoot NetBIOS-related issues and to gather information about NetBIOS activity on a network.
23.
Which of the following is the difference between a stop error (e.g. stop C0021xxx) and a Dr.
Watson error?
Correct Answer
C. A stop error is known as a blue screen and causes complete system failure.
Explanation
The given answer correctly states that a stop error is known as a blue screen and causes complete system failure. This means that when a stop error occurs, the system crashes and becomes unresponsive, requiring a restart. This is a common issue in Windows operating systems and is often caused by hardware or software conflicts, driver issues, or faulty hardware. The blue screen of death (BSOD) is a visual indicator of a stop error, indicating that the system has encountered a critical error and cannot continue running.
24.
A technician upgraded a motherboard and CPU. The computer will not POST under the
assembled configuration. Which of the following would be the BEST place to start
troubleshooting?
Correct Answer
D. Ensure RAM is correctly seated.
Explanation
The best place to start troubleshooting in this scenario would be to ensure that the RAM is correctly seated. If the RAM is not properly installed or seated, it can prevent the computer from successfully powering on and completing the POST (Power-On Self-Test) process. By checking and reseating the RAM, the technician can eliminate this as a potential cause of the issue and move on to other troubleshooting steps if necessary.
25.
A laptop is received for repair indicating that the screen is very dim. The technician has confirmed
that it is a hardware issue. Which of the following parts should be replaced FIRST?
Correct Answer
B. The LCD inverter
Explanation
The LCD inverter should be replaced first. The LCD inverter is responsible for providing power to the backlight of the LCD panel, which controls the brightness of the screen. If the screen is very dim, it indicates that the backlight is not receiving enough power. Therefore, replacing the LCD inverter can solve the issue of a dim screen.
26.
A technician is able to connect to the Internet but cannot connect to a remote machine through
Remote Desktop in Windows XP. Each time the technician attempts to connect to a remote
location, the software times out. Which of the following is the MOST likely problem?
Correct Answer
D. Port forwarding settings are not correct.
Explanation
The most likely problem is that the port forwarding settings are not correct. Port forwarding is a technique used to allow external devices to connect to a specific device or service within a private network. In this case, the technician is unable to connect to a remote machine through Remote Desktop, indicating that the necessary ports for Remote Desktop may not be properly forwarded. This could be due to incorrect configuration or settings, preventing the connection from being established.
27.
Which of the following commands will connect to and map a shared drive from a remote
computer?
Correct Answer
B. NET USE
Explanation
The correct answer is NET USE. The NET USE command is used to connect to and map a shared drive from a remote computer. It allows the user to specify the network resource (shared drive) and the local drive letter to which the shared drive will be mapped. This command is commonly used in networking environments to access files and folders stored on remote computers.
28.
A laptops LCD is getting scratched by the keyboard when the lid is closed. Which of the following
would MOST likely prevent the LCD screen from being damaged further?
Correct Answer
B. Replacement of the rubber bumpers
Explanation
Replacing the rubber bumpers would most likely prevent the LCD screen from being damaged further. The rubber bumpers act as a cushion between the keyboard and the LCD screen when the lid is closed. By replacing the rubber bumpers, a thicker or more protective material can be used, which would create a barrier between the keyboard and the LCD screen, preventing scratches and damage.
29.
A user installs a PostScript driver for a printer that supports only PCL. Which of the following is the
MOST likely result?
Correct Answer
C. The printer will print garbage or unreadable characters.
Explanation
When a user installs a PostScript driver for a printer that only supports PCL, the printer will not be able to properly interpret the PostScript commands. As a result, the printer will print garbage or unreadable characters instead of the intended output. This is because the printer is not compatible with the PostScript language and cannot correctly process the instructions provided by the driver.
30.
A laser printer has a blank streak along one edge of each page but is otherwise printing normally.
Which of the following is the MOST likely reason for this?
Correct Answer
A. The fuser is damaged.
Explanation
The fuser in a laser printer is responsible for melting the toner onto the paper. If the fuser is damaged, it may not be able to apply heat evenly across the page, resulting in a blank streak along one edge. The other options are less likely to cause this specific issue. Rebooting the printer or using thick paper would not cause a blank streak, and a low toner cartridge would affect the entire page rather than just one edge.
31.
Which of the following is the default directory for User Profiles in Windows XP?
Correct Answer
C. C:\Documents and Settings\
Explanation
The correct answer is C:\Documents and Settings\. This is the default directory for User Profiles in Windows XP.
32.
A Sales Manager is a member of both the Sales group and the Managers group. The Sales
Manager is attempting to update a file but is getting an Access Denied error. The file is secured
through NTFS. The Sales group has the NTFS permissions: Read C Allow List Folder Contents C
Allow Modify C Deny The Managers group has the NTFS permission: Full Control C Allow Why is
the Manager receiving this error?
Correct Answer
C. Deny permissions override Allow permissions.
Explanation
Deny permissions override Allow permissions. In this case, the Sales Manager is a member of both the Sales group and the Managers group. The Sales group has permissions to read, list folder contents, and modify the file, but it also has a deny permission. The Managers group, on the other hand, has full control and allow permissions. However, since deny permissions take precedence over allow permissions, the Sales Manager is receiving an Access Denied error when attempting to update the file.
33.
Which of the following is the speed a 1600MHz FSB processor will operate at if the FSB of the motherboard is 1333MHz?
Correct Answer
A. 1333MHz
Explanation
The speed at which a 1600MHz FSB processor will operate is determined by the FSB of the motherboard, which in this case is 1333MHz. The FSB of the processor cannot exceed the FSB of the motherboard, so the processor will operate at the maximum speed allowed by the motherboard, which is 1333MHz.
34.
A customers system is infected with hundreds of viruses, including spyware and malware. The
customer has critical data on the system that needs to be recovered within 30 minutes. Which of
the following is the BEST course of action the technician should take?
Correct Answer
C. Remove the hard drive and copy the critical data to another system using an external dock.
Explanation
The best course of action in this scenario is to remove the infected hard drive from the system and copy the critical data to another system using an external dock. This ensures that the viruses, spyware, and malware do not spread to the other system. Reformatting the hard drive and recovering the data from a recent backup may not be feasible within the given time constraint of 30 minutes. Adding a drive and copying the system's contents to a second hard drive may also transfer the viruses and malware to the new drive. Updating the antivirus program and running a virus scan may take too long to complete within the given time frame.
35.
A technician is unable to associate a wireless laptop to an IEEE 802.11a wireless access point.
The wireless laptop is configured to connect to the SSID, and the wireless client scans all 11
wireless channels, however, the network still cannot be found. Which of the following is the MOST
likely the cause of this problem?
Correct Answer
C. The wireless client is using the wrong wireless adapter.
Explanation
The most likely cause of the problem is that the wireless client is using the wrong wireless adapter. The fact that the wireless laptop is configured to connect to the SSID and scans all 11 wireless channels suggests that it is functioning correctly. If the SSID was not broadcasting on the wireless access point, the laptop would still be able to detect it during the scan. An incorrect WEP or WPA key would result in a failed connection, but it would not prevent the network from being found. The firewall software on the wireless client would only prevent the connection after the network is found. Therefore, the most logical explanation is that the wireless client is using the wrong wireless adapter.
36.
Which of the following will MOST likely happen if a laser printer displays 15% fuser remaining?
Correct Answer
A. The printer will print according to specification.
Explanation
If a laser printer displays 15% fuser remaining, it means that the fuser, which is responsible for bonding the toner onto the paper, still has a significant amount of life left. Therefore, the printer will continue to print without any issues and will operate according to its normal specifications.
37.
For added security, a network administrator has decided to lock down the wireless network. Which
of the following are ways to accomplish this? (Select TWO).
Correct Answer(s)
B. Disable the SSID from broadcasting
E. Change the default admin password
Explanation
Disabling the SSID from broadcasting makes the wireless network invisible to unauthorized users, as they will not be able to see the network when scanning for available networks. Changing the default admin password adds an extra layer of security by preventing unauthorized access to the network's administrative settings.
38.
Company policy does not allow users to use dial-up connections. A new shipment of laptops
contains built-in modems. Which of the following is the BEST way for the technician to setup the
laptop to prevent the use of the modem?
Correct Answer
A. Use Device Manager to disable the modem
Explanation
The best way for the technician to prevent the use of the modem is to use Device Manager to disable it. Disabling the modem through Device Manager will effectively deactivate the modem and prevent any dial-up connections from being made. This ensures compliance with the company policy that does not allow the use of dial-up connections.
39.
Which of the following is accomplished by running the disk defragmenter on a hard drive?
Correct Answer
B. Ensures that file sectors are contiguous
Explanation
Running the disk defragmenter on a hard drive ensures that file sectors are contiguous. When files are created, deleted, or modified on a hard drive, they can become fragmented, meaning that different parts of a file are stored in different locations on the disk. This can result in slower file access times. The disk defragmenter rearranges the fragmented files so that each file's sectors are stored in a contiguous manner, improving the overall performance of the hard drive.
40.
A technician needs to install a new internal flash memory card reader into an available floppy drive
bay. Prior to installation, which of the following connectors needs to be available?
Correct Answer
A. USB header
Explanation
In order to install a new internal flash memory card reader into a floppy drive bay, the technician needs to have a USB header available. The USB header is necessary because the flash memory card reader will be connected to the motherboard via a USB cable, allowing it to communicate with the computer and transfer data.
41.
Which of the following is the default location for temp files in Windows 7?
Correct Answer
A. C:\Windows\Temp
Explanation
The default location for temp files in Windows 7 is C:\Windows\Temp.
42.
A technician is installing an IDE hard drive in a SATA hard drive workstation. When the computer
is booted up the IDE hard drive does not show up in the operating system. Which of the following
is the MOST likely cause?
Correct Answer
C. The primary controller BIOS setting is incorrect.
Explanation
The primary controller BIOS setting is incorrect. This is the most likely cause because the IDE hard drive is not showing up in the operating system. The BIOS controls the basic functions of the computer, including the detection and configuration of hardware devices. If the primary controller BIOS setting is incorrect, it may not be properly detecting the IDE hard drive, causing it to not show up in the operating system.
43.
A customer states that their Internet connection is extremely slow. The technician suspects a
failing NIC. Which of the following command line tools would verify this?
Correct Answer
B. Ping -t
Explanation
The correct answer is "ping -t". By using the "ping -t" command, the technician can continuously send packets to a specific IP address and receive a response. If the NIC is failing, the response time will be significantly slower or there may be no response at all. This helps to verify if the slow internet connection is due to a failing NIC.
44.
A user states that when a USB drive is plugged into their computer, the drive is not recognized.
The drive has been used on other computers without any issues. Which of the following is the
MOST likely cause?
Correct Answer
B. A USB BIOS setting is not configured correctly.
Explanation
When a USB drive is not recognized on a computer, it is likely that the USB BIOS setting is not configured correctly. The BIOS (Basic Input/Output System) is responsible for managing hardware settings, including USB ports. If the USB BIOS setting is not configured correctly, it can prevent the computer from recognizing the USB drive. This is the most likely cause because the drive has been used on other computers without any issues, indicating that the drive itself is not the problem. Reinstalling the operating system, a dead CMOS battery, or incorrect formatting of the USB drive are less likely causes in this scenario.
45.
A technician discovers that RAM modules are overheating. Which of following is best practice in
this situation?
Correct Answer
A. Install heatsinks on the RAM modules.
Explanation
In this situation, the best practice would be to install heatsinks on the RAM modules. Heatsinks are designed to dissipate heat and can help to cool down the RAM modules, preventing them from overheating. Installing additional CPU fans may help with overall system cooling, but it may not specifically address the issue of overheating RAM modules. Replacing the RAM slots may not be necessary if the issue is with the modules themselves. Installing a heatsink on the chipset driver is not relevant to the problem of overheating RAM modules.
46.
Which of the following could cause an NTLDR error on reboot?
Correct Answer
D. Boot.ini file is corrupt
Explanation
The NTLDR error on reboot can be caused by a corrupt Boot.ini file. The Boot.ini file is responsible for loading the operating system, and if it becomes corrupted, the computer may not be able to boot properly. This error can occur if the Boot.ini file is deleted, modified incorrectly, or if there are errors in the file itself. It is important to fix the corrupt Boot.ini file in order to resolve the NTLDR error and allow the computer to boot normally.
47.
A technician replaced a suspected failed SATA drive with a new drive and data cable, then
discovers that the new drive is not recognized in the system BIOS. Which of the following is the
MOST likely problem?
Correct Answer
A. The SATA port is faulty.
Explanation
The most likely problem is that the SATA port is faulty. This means that the port itself is not functioning properly, preventing the new drive from being recognized in the system BIOS.
48.
A laser printer keeps displaying, Paper Jam C Front Door. It does not matter which tray or paper
type the printer is using. Which of the following is the MOST likely reason why the printer is having
this issue?
Correct Answer
C. Something is stuck inside of the pickup assembly.
Explanation
The most likely reason why the printer is displaying "Paper Jam C Front Door" is that something is stuck inside the pickup assembly. This could be causing a blockage or obstruction in the paper path, preventing the paper from being picked up and causing the paper jam error. Replacing the fuser assembly, pickup rollers, or toner cartridge would not typically be the cause of this specific issue.
49.
A technician needs to change the process priority of a background program. Which of the following tools is BEST for performing this function?
Correct Answer
D. Task Manager
Explanation
Task Manager is the best tool for changing the process priority of a background program. Task Manager allows the technician to view and manage running processes, including changing their priority levels. By accessing the "Processes" tab in Task Manager, the technician can right-click on the desired program and select "Set Priority" to adjust its priority level. This can be useful when wanting to allocate more system resources to a specific program or limit its impact on overall system performance.
50.
Which of the following is the MOST effective method of retrieving a screw which has fallen into a
computer case?
Correct Answer
B. Use an extension magnet to access the screw.
Explanation
Using an extension magnet to access the screw is the most effective method of retrieving a screw that has fallen into a computer case. This method allows for precise and targeted retrieval of the screw without causing any damage to the computer components. The magnet can easily attract and hold onto the screw, making it easier to remove from the case.