1.
A user reports that their system is giving a message stating that their USB 2.0 devices are running
at USB 1.1 speed without an external USB hub. The devices run at USB 2.0 when tested on the
technicians PC. Which of the following will MOST likely provide USB 2.0 functionality?
Correct Answer
C. Install a USB 2.0 firmware update on the motherboard.
Explanation
Installing a USB 2.0 firmware update on the motherboard is the most likely solution to provide USB 2.0 functionality. This update will ensure that the motherboard's USB ports are capable of supporting USB 2.0 speeds. The fact that the devices run at USB 2.0 on the technician's PC suggests that the issue lies with the user's system, specifically the motherboard's firmware. Installing the update will likely resolve the problem and allow the USB 2.0 devices to run at their intended speed.
2.
Which of the following is the BEST tool to troubleshoot a DB-9 port?
Correct Answer
D. Loopback plug
Explanation
A loopback plug is the best tool to troubleshoot a DB-9 port because it allows for testing the port's functionality without the need for an external device. When the loopback plug is connected to the DB-9 port, it creates a loopback circuit that simulates the presence of a connected device. This allows for checking if the port is transmitting and receiving data properly. An ohm meter is used to measure resistance and is not specifically designed for troubleshooting DB-9 ports. An anti-static wrist strap is used to prevent electrostatic discharge and is not relevant to troubleshooting a port. An oscilloscope is a tool used for measuring and analyzing electrical signals, but it is not specifically designed for troubleshooting DB-9 ports.
3.
A customer reports that a networked printer is not printing documents. The technician successfully
pings the printers IP address. Which of the following could be the problem? (Select TWO).
Correct Answer(s)
D. The printer is out of paper.
E. The spooler is not functioning.
Explanation
The customer reporting that the printer is not printing documents suggests that there may be an issue with the physical components of the printer. The fact that the technician successfully pings the printer's IP address indicates that the network connection is functioning properly. Therefore, the problem is likely not related to the network cable being unplugged or the gateway address on the printer being incorrect. The fact that the printer is out of paper suggests that this could be a reason for it not printing. Additionally, if the spooler, which manages the print jobs, is not functioning, it could also prevent the printer from printing.
4.
Which of the following does PING Ct do?
Correct Answer
A. Continuous ping of an IP address until cancelled
Explanation
The correct answer is "Continuous ping of an IP address until cancelled". This means that the PING Ct command will keep sending ICMP echo request packets to an IP address repeatedly until the user manually cancels the process. This can be useful for monitoring network connectivity and latency over an extended period of time.
5.
Which of the following is contained in the first sector of the hard disk?
Correct Answer
D. Master boot record
Explanation
The first sector of the hard disk contains the Master Boot Record (MBR). The MBR is a small program that is responsible for the booting process of the computer. It contains information about the partitions on the hard disk, as well as the location of the operating system. When the computer starts up, the BIOS reads the MBR from the first sector of the hard disk and transfers control to the operating system. Therefore, the MBR is an essential component for the computer to start up properly.
6.
A technician is tasked with setting up a Windows XP computer with a user account that will only be
used to access the Internet. Which account type should the user have access to?
Correct Answer
A. Guest
Explanation
The user should have access to the Guest account. The Guest account is designed for temporary or occasional use and has limited privileges, making it ideal for situations where the user only needs to access the Internet. The Guest account does not have administrative rights, ensuring that the user cannot make any significant changes to the computer's settings or access sensitive information.
7.
If a technician suspects that the voltage being delivered to a desktop computers power supply is
insufficient or incorrect, which device should be used to determine the correct voltage?
Correct Answer
B. A multimeter
Explanation
A multimeter is the most appropriate device to determine the correct voltage being delivered to a desktop computer's power supply. A multimeter is a versatile tool that can measure various electrical quantities, including voltage. By connecting the multimeter to the power supply, the technician can accurately measure the voltage and determine if it is sufficient or correct. This helps in diagnosing any potential issues with the power supply and ensures that the desktop computer is receiving the required voltage for proper functioning.
8.
A virus has been removed from the users machine, but the user still cannot access the Internet.
Which of the following should the technician check NEXT?
Correct Answer
D. Check the web browsers proxy settings.
Explanation
After removing the virus from the user's machine, the next step for the technician should be to check the web browser's proxy settings. Proxy settings can sometimes be altered by viruses or malware, causing issues with internet access. By checking and potentially adjusting the proxy settings, the technician can ensure that the user can access the internet properly. Disabling port forwarding on the router, rebooting to Safe Mode, or formatting and reinstalling the OS may not be necessary or effective in resolving the issue of internet access in this particular scenario.
9.
After upgrading to Windows Vista, a client states that the run command no longer appears on the
Start menu:
Which of the following is the reason the user cannot see the run command?
Correct Answer
D. The run command is not displayed by default on the start menu.
Explanation
The reason the user cannot see the run command after upgrading to Windows Vista is that the run command is not displayed by default on the start menu.
10.
A user states that email is not being received. Which of the following protocols should the
technician check for incoming mail?
Correct Answer
B. POP3
Explanation
The technician should check the POP3 protocol for incoming mail. POP3 (Post Office Protocol version 3) is a standard protocol used for receiving emails from a remote server to a local email client. It allows the client to download and store the emails on their device. Therefore, if the user is not receiving emails, it is important to check the POP3 settings and ensure that the email client is properly configured to retrieve emails using the POP3 protocol.
11.
On a laptop, which of the following is the name of the socket that a wireless card would typically
be inserted into?
Correct Answer
C. Mini PCI
Explanation
A wireless card would typically be inserted into a Mini PCI socket on a laptop.
12.
A technician has just installed a new hard drive into a Windows Vista desktop computer. The hard
drive does not appear in Windows Explorer. Which of the following should the technician perform
NEXT to have the drive recognized by the system?
Correct Answer
A. Initialize and format the hard drive through Disk Management
Explanation
The technician should initialize and format the hard drive through Disk Management in order to have the drive recognized by the system. This is because when a new hard drive is installed, it needs to be initialized and formatted before it can be used by the operating system. Initializing the drive prepares it for use by creating a partition table, and formatting the drive sets up the file system. Once this is done, the drive will be recognized by Windows Explorer and can be accessed by the user.
13.
A workstation is not booting correctly. The technician wants to locate bad sectors and recover
readable information. Which of the following commands would the technician use?
Correct Answer
D. Chkdsk c: /r
Explanation
The technician would use the "chkdsk c: /r" command to locate bad sectors and recover readable information. The "/r" parameter in the command stands for "repair" and it instructs the chkdsk (check disk) utility to locate bad sectors on the disk and attempt to recover any readable information from them. This command is commonly used to fix disk errors and recover data from damaged sectors on a hard drive.
14.
A technician adds a video card to a single monitor system with an existing on-board video
controller. After powering on the system, an error message appears on the monitor stating No
Input Detected. Which of the following is the problem?
Correct Answer
C. The monitor is still connected to the onboard video controller.
Explanation
The error message "No Input Detected" indicates that the monitor is not receiving any signal from the video source. In this case, the problem is that the monitor is still connected to the onboard video controller instead of the newly added video card. The monitor needs to be connected to the add-on video card in order to receive the video signal and display the output.
15.
Which of the following is the MAXIMUM allowable cable length of CAT5?
Correct Answer
A. 100 meters (328 feet)
Explanation
The maximum allowable cable length of CAT5 is 100 meters (328 feet). This is because CAT5 cables are designed to transmit data reliably up to this distance without significant loss or degradation of signal quality. Going beyond this distance can result in signal attenuation and data errors. Therefore, it is important to adhere to the maximum cable length to ensure optimal performance and reliable data transmission.
16.
An internal IEEE 1394 expansion card should be installed on which port type?
Correct Answer
D. PCI
Explanation
An internal IEEE 1394 expansion card should be installed on the PCI port type. PCI (Peripheral Component Interconnect) is a standard expansion slot used in computers for connecting various hardware devices. IEEE 1394, also known as FireWire or i.LINK, is a high-speed serial bus interface that allows for fast data transfer between devices. Therefore, installing an IEEE 1394 expansion card on a PCI port would provide the necessary connection and compatibility for the device to function properly.
17.
A technician is troubleshooting problems with a hard drive. After checking the drive in another
computer and finding no issues, the technician takes voltage readings on the Molex connector
from the power supply. Which of the following represents the readings the technician should find?
Correct Answer
D. +5V and +12V
Explanation
The technician should find voltage readings of +5V and +12V on the Molex connector from the power supply. This is because the Molex connector typically provides these two voltages to power various components, including hard drives. The +5V voltage is used to power the logic circuits, while the +12V voltage is used to power the motor and other mechanical components of the hard drive.
18.
A user powers up their desktop PC, and instead of booting up normally, the user is taken into the
BIOS setup. Which of the following is the MOST likely problem?
Correct Answer
C. A faulty CMOS battery
Explanation
A faulty CMOS battery is the most likely problem in this scenario. The CMOS battery is responsible for providing power to the BIOS chip, which stores the system's basic settings. If the CMOS battery is faulty or depleted, it may cause the BIOS to lose its settings and default to the setup screen when the computer is powered on. This can result in the computer not booting up normally and instead entering the BIOS setup.
19.
A user reports that when typing on the laptop keyboard, the mouse pointer scrolls across the
screen. Which of the following would MOST likely resolve this issue?
Correct Answer
C. Disable the touchpad
Explanation
Disabling the touchpad would most likely resolve the issue of the mouse pointer scrolling across the screen while typing on the laptop keyboard. This is because the touchpad may be overly sensitive and detecting unintended movements, causing the cursor to scroll. By disabling the touchpad, the user can prevent any accidental input from interfering with their typing.
20.
A computer is responding slowly and the Task Manager shows that spool.exe is using 95% of
system resources. Which of the following is MOST likely the cause of this problem?
Correct Answer
A. Printing subsystem
Explanation
The most likely cause of the computer responding slowly and spool.exe using 95% of system resources is the printing subsystem. Spool.exe is responsible for managing print jobs in Windows, and if there is an issue with the printing subsystem, it can cause high CPU usage and slow down the computer's performance.
21.
Which of the following should MOST likely be replaced if the laptop will not display any video
through the laptops screen or an external monitor?
Correct Answer
D. Video card
Explanation
If the laptop is not displaying any video through the laptop screen or an external monitor, the most likely component that needs to be replaced is the video card. The video card is responsible for generating and outputting video signals to the display. If the video card is faulty or not functioning properly, it can result in a lack of video output. Replacing the video card should resolve the issue and allow for video to be displayed on the laptop screen or external monitor.
22.
A technician is replacing a motherboard in a users desktop PC. Which of the following tools should
be used before replacing the new motherboard?
Correct Answer
A. Power supply tester
Explanation
Before replacing the new motherboard, a technician should use a power supply tester. This tool is used to check if the power supply unit is functioning properly. By testing the power supply, the technician can ensure that the motherboard will receive the correct amount of power and prevent any potential issues that may arise from a faulty power supply.
23.
A computer just had a memory upgrade installed on the machine. Upon boot, the system does not
recognize the new memory even though it is listed as being compatible on the manufacturers
website. Which of the following is MOST likely needed to resolve the issue?
Correct Answer
C. BIOS update
Explanation
The most likely solution to the issue of the computer not recognizing the new memory after a memory upgrade is a BIOS update. The BIOS (Basic Input/Output System) is responsible for initializing hardware components during the boot process, and updating it can help the system recognize and properly utilize the new memory.
24.
USER1 is part of the Users Group and is attempting to access files via UNC path
\\SERVER\FILESHARE. \\ SERVER\FILESHARE has the following share permissions:
AdministratorsFull ControlUsersRead OnlyGuestsNo AccessThe directory on the hard drive where
the share is located has the following permissions: AdministratorsFull
ControlUsersChangeGuestsNo AccessWhich of the following levels of access will login account
USER1 have?
Correct Answer
A. Read Only
Explanation
Based on the given information, USER1 is part of the Users Group and is attempting to access files via the UNC path. The share permissions for the FILESHARE on SERVER are set to "Read Only" for the Users group. Additionally, the directory on the hard drive where the share is located has permissions set to "Change" for the Users group. Therefore, when USER1 attempts to access the files, they will have the level of access that is more restrictive between the share permissions and the directory permissions. In this case, the more restrictive permission is "Read Only", so USER1 will have "Read Only" access to the files.
25.
A user states that the computer is too slow when capturing video from an HD camera. Upon
inspection the technician realizes that the computer is state-of-the-art in hardware, but it is using
an external legacy USB 1.1 video capture card. The camera has USB 2.0 and IEE1394b outputs.
Which of the following is the BEST recommendation to increase the video capture capabilities in
this situation?
Correct Answer
B. Install an IEEE1394b video capture card.
Explanation
The computer is currently using an external legacy USB 1.1 video capture card, which is causing the slow video capture from the HD camera. The camera has USB 2.0 and IEE1394b outputs, so the best recommendation would be to install an IEEE1394b video capture card. This would allow the computer to capture video at a faster speed and take advantage of the camera's capabilities.
26.
A technician needs to implement a RAID 1 set on a computer. Which of the following is the
MINIMUM number of hard drives that would be required?
Correct Answer
B. 2
Explanation
To implement a RAID 1 set, also known as mirroring, at least two hard drives are required. In RAID 1, data is duplicated on two or more drives, providing redundancy and fault tolerance. This means that if one drive fails, the data can still be accessed from the other drive(s). Therefore, the minimum number of hard drives required to implement RAID 1 is 2.
27.
Which of the following is a method used in the removal of a boot sector virus?
Correct Answer
D. Booting from the floppy disk or CD-ROM prior to scanning
Explanation
Booting from the floppy disk or CD-ROM prior to scanning is a method used in the removal of a boot sector virus. This is because booting from a different source allows the computer to bypass the infected boot sector and load a clean operating system. By doing this, the virus is unable to activate and can be effectively detected and removed by scanning the system.
28.
A user is not able to receive files off the FTP server. Which of the following default ports needs to
be opened for FTP to work properly?
Correct Answer
A. 21
Explanation
To receive files off the FTP server, port 21 needs to be opened. Port 21 is the default port for FTP (File Transfer Protocol), which is used for transmitting files between a client and a server on a computer network. By opening port 21, the user will be able to establish a connection with the FTP server and receive files successfully.
29.
Which of the following is the MOST important reason for ensuring a RJ-11 phone line jack is not
connected to a RJ-45 Ethernet network port?
Correct Answer
D. pHone line voltages can damage Ethernet equipment.
Explanation
Phone line voltages can damage Ethernet equipment. RJ-11 phone lines typically carry a higher voltage than Ethernet cables. Connecting a RJ-11 phone line jack to a RJ-45 Ethernet network port can result in a power surge that can damage the sensitive electronic components in the Ethernet equipment. Therefore, it is important to ensure that a RJ-11 phone line jack is not connected to a RJ-45 Ethernet network port to avoid potential damage.
30.
Users are reporting that a Vista feature asks them for confirmation before running most
applications or making system changes. Which of the following is the name of this Vista feature
and where should the technician direct users to turn the functionality off?
Correct Answer
C. User Account Control; it can be turned off under User Accounts in the Control Panel.
Explanation
The correct answer is User Account Control; it can be turned off under User Accounts in the Control Panel. User Account Control is a feature in Windows Vista that prompts users for confirmation before running most applications or making system changes. To turn off this functionality, users should go to the Control Panel, navigate to User Accounts, and disable User Account Control.
31.
After replacing the motherboard in a laptop, the system overheats and fails to boot. Which of the
following is the MOST likely cause of this error?
Correct Answer
A. Thermal paste was not applied between the heat sink and CPU.
Explanation
The most likely cause of the system overheating and failing to boot after replacing the motherboard in a laptop is the absence of thermal paste between the heat sink and CPU. Thermal paste is used to improve the transfer of heat from the CPU to the heat sink, ensuring efficient cooling. Without thermal paste, heat cannot be properly dissipated, leading to overheating and potential system failure.
32.
Which of the following is the default FTP port?
Correct Answer
A. 21
Explanation
The default FTP port is 21. FTP (File Transfer Protocol) is a standard network protocol used for transferring files between a client and a server on a computer network. The default port number for FTP is 21, which is used for establishing the connection between the client and the server.
33.
Which of the following tools allows the technician to copy a file without prompts?
Correct Answer
B. COPY /Y
Explanation
The correct answer is COPY /Y. The /Y option in the COPY command allows the technician to copy a file without any prompts for confirmation. This means that the technician can copy a file without being asked for permission or confirmation each time a file is copied. This can be useful when the technician wants to automate the copying process or when they want to copy multiple files without interruptions.
34.
Which of the following devices has the options of: master, slave and cable select?
(Select THREE).
Correct Answer(s)
A. CD-ROM
D. Hard drive
F. DVD-ROM
Explanation
CD-ROM, Hard drive, and DVD-ROM are the correct answers because these devices can be configured as either master, slave, or cable select. The master and slave settings determine the device's priority in accessing the computer's resources, while the cable select setting allows the device to automatically determine its priority based on its position on the IDE cable.
35.
Using the NET command which variable would be used to find out the number of files sent by the
workstation service?
Correct Answer
D. Statistics
Explanation
The correct answer is "statistics" because when using the NET command, the "statistics" variable would be used to find out the number of files sent by the workstation service.
36.
A technician plugs a USB device into the front panel of a desktop computer and nothing happens.
The technician knows that plug-n-play is enabled. Which of the following BEST describes a
possible cause to this issue?
Correct Answer
D. The front panel connectors are not plugged into the motherboard.
Explanation
The most likely cause for the USB device not working when plugged into the front panel of the desktop computer is that the front panel connectors are not properly connected to the motherboard. This could result in a lack of power or data connection, preventing the device from being recognized or functioning properly.
37.
An office laser printer is printing lighter in random areas. Which of the following is the EASIEST
solution to implement for this issue?
Correct Answer
B. Replace the toner cartridge.
Explanation
Replacing the toner cartridge is the easiest solution to implement for this issue because a lighter print in random areas indicates that the toner cartridge is likely running low on toner or the toner is unevenly distributed. By replacing the toner cartridge, the printer will have a fresh supply of toner and should print at the appropriate darkness level consistently.
38.
Which of the following private IP addresses is commonly used for internal IP addressing?
Correct Answer
C. 192.168.0.1
Explanation
The private IP address commonly used for internal IP addressing is 192.168.0.1. This is because the IP address range 192.168.0.0 to 192.168.255.255 is reserved for private networks and is not routable on the internet. It is frequently used by home and small office networks for local communication and device configuration.
39.
A technician has deleted all the files in the directory C:\tempfiles. Which of the following
commands should the technician use to delete this directory?
Correct Answer
D. RD
Explanation
The technician should use the RD command to delete the directory C:\tempfiles. RD stands for "remove directory" and is used to delete directories in the Windows command prompt.
40.
A home user is setting up a wireless network. Which of the following could be used to prevent a
neighbor from accessing the network? (Select TWO).
Correct Answer(s)
B. Enable wireless encryption
D. Disable SSID broadcasting
Explanation
To prevent a neighbor from accessing the wireless network, enabling wireless encryption is necessary. This will encrypt the data transmitted over the network, making it difficult for unauthorized users to decipher. Additionally, disabling SSID broadcasting will hide the network's name from being visible to others, making it harder for them to find and connect to the network.
41.
A user has just moved to a new office and is unable to access the network. The technician
suspects the users network settings need to be changed. Which of the following tools would the
technician use on the Windows XP computer to view the network settings?
Correct Answer
C. IPCONFIG
Explanation
The technician would use IPCONFIG on the Windows XP computer to view the network settings. IPCONFIG is a command-line tool that displays the current configuration of the IP address, subnet mask, default gateway, and other network settings of the computer. By using IPCONFIG, the technician can check if the user's network settings are configured correctly or if they need to be changed in order to access the network.
42.
The technician is moving a users files from a Windows XP PC to a Windows Vista PC. Which of
the following directories corresponds to each operating system?
Correct Answer
B. C:\documents and settings\user1\my documents to c:\users\user1\documents
Explanation
In Windows XP, the user's documents are stored in the "c:\documents and settings\user1\my documents" directory. However, in Windows Vista and newer versions, the directory structure changes and the user's documents are stored in the "c:\users\user1\documents" directory. Therefore, when moving the user's files from a Windows XP PC to a Windows Vista PC, the correct corresponding directories would be "c:\documents and settings\user1\my documents" on the Windows XP PC to "c:\users\user1\documents" on the Windows Vista PC.
43.
Which of the following are items that can be configured on a wireless router to make it more
difficult for attackers to gain access? (Select TWO).
Correct Answer(s)
B. Disable SSID broadcast
C. Change SSID from default
Explanation
Disabling SSID broadcast and changing the SSID from default are two measures that can be taken to make it more difficult for attackers to gain access to a wireless router. Disabling SSID broadcast prevents the router from broadcasting its network name, making it harder for attackers to identify and target the network. Changing the SSID from its default value adds an additional layer of security, as attackers often target networks with default configurations. These two actions combined can help enhance the security of a wireless router and make it more challenging for attackers to gain unauthorized access.
44.
Users in the office report that the speed of the Internet has drastically decreased since the recent
network hardware refresh. Which of the following could be attributed to the problem?
Correct Answer
D. The new switches are configured for 10MB.
Explanation
The correct answer is that the new switches are configured for 10MB. This means that the switches are set to operate at a speed of 10 megabits per second, which is significantly slower than the previous network hardware. This configuration mismatch could explain the drastic decrease in internet speed that the users are experiencing.
45.
A user can receive email but cannot send email with the email client software. Which of the
following protocols is incorrectly configured?
Correct Answer
B. SMTP
Explanation
SMTP (Simple Mail Transfer Protocol) is used for sending emails, not receiving them. If a user can receive emails but cannot send them, it means that the SMTP protocol is incorrectly configured. SMTP is responsible for the outgoing mail server settings, so if it is not properly configured, the user will not be able to send emails.
46.
A technician is setting up a SOHO and has configured the wireless NIC on the laptop with WPA2.
While configuring the WAP, WPA2 is not listed as an option. Which of the following should the
technician do NEXT?
Correct Answer
C. Install the latest WAP firmware
Explanation
The technician should install the latest WAP firmware. If the WPA2 option is not listed while configuring the WAP, it indicates that the current firmware on the WAP may be outdated and does not support WPA2. By installing the latest WAP firmware, the technician can ensure that the WAP supports WPA2 and can configure it accordingly.
47.
Which of the following BEST explains a system experiencing intermittent memory errors?
Correct Answer
B. Memory sticks have corroded contacts
Explanation
Memory sticks can develop corroded contacts over time due to exposure to moisture or other environmental factors. Corroded contacts can result in intermittent memory errors because they can cause poor electrical connections between the memory stick and the memory socket. This can lead to data corruption or loss, resulting in memory errors. Therefore, the best explanation for a system experiencing intermittent memory errors is that the memory sticks have corroded contacts.
48.
A second optical drive has been added to the computer and needs to be referenced as the R:
drive by the Microsoft Windows operating system. Which of the following places in Microsoft
Windows will BEST accomplish this task?
Correct Answer
B. Disk Management
Explanation
Disk Management is the best place in Microsoft Windows to accomplish the task of referencing the second optical drive as the R: drive. Disk Management allows users to manage and configure disk drives and their associated partitions on a computer. By accessing Disk Management, the user can assign a drive letter, such as R:, to the newly added optical drive, ensuring that it is recognized and accessible by the operating system.
49.
A yellow exclamation mark next to a device in Device Manager indicates which of the following?
Correct Answer
B. The device driver is missing.
Explanation
A yellow exclamation mark next to a device in Device Manager indicates that the device driver is missing. This means that the operating system cannot find the necessary software to communicate with the device, resulting in its malfunction or inability to work properly.
50.
A technician is replacing a hard drive with a new 30GB drive formatted with FAT32. While
transferring a 5GB file an error appears indicating that the new drive has insufficient space for the
transfer. Which of the following is the cause of the problem?
Correct Answer
A. FAT32 cannot handle single files larger than 4GB.
Explanation
The cause of the problem is that FAT32 cannot handle single files larger than 4GB. This means that when trying to transfer a 5GB file to the new drive, it exceeds the maximum file size limit of FAT32, resulting in the error indicating insufficient space for the transfer.