1.
Which of the following computer components can retain a lethal electrical charge even after the device is unplugged? (Choose Two)
Correct Answer(s)
B. Monitor
E. Power Supply
Explanation
Monitors and power supplies can retain a lethal electrical charge even after the device is unplugged. Monitors contain capacitors that store electrical energy and can discharge a high voltage shock. Power supplies also have capacitors that can hold a charge for a significant amount of time, posing a danger if not handled properly. The other components listed, such as the processor, hard drive, and RAM, do not typically retain an electrical charge after being unplugged.
2.
You are upgrading the SCSI devices in your server. For the upgrade, you must ensure that all SCSI devices are compatible. Which type of SCSI is incompatible with all other types?
Correct Answer
C. SE
Explanation
SE stands for Single Ended, which is a type of SCSI interface. Single Ended SCSI is incompatible with all other types of SCSI interfaces because it uses a different electrical signaling method. Single Ended SCSI devices cannot be connected to devices that use other SCSI interfaces such as LVD (Low Voltage Differential) or HVD (High Voltage Differential). Therefore, the correct answer is SE.
3.
Which utility is used to upgrade Windows 98 to Windows XP?
Correct Answer
D. WINNT.EXE
Explanation
WINNT.EXE is the correct answer because it is the utility used to upgrade Windows 98 to Windows XP. This utility allows users to perform an in-place upgrade, which means that the existing Windows 98 installation is upgraded to Windows XP while preserving user settings, files, and applications.
4.
PCMCIA Type II cards are how thick?
Correct Answer
B. 5 mm
Explanation
PCMCIA Type II cards are 5 mm thick.
5.
Which of the following tells the CPU how to interact with the rest of the PC?
Correct Answer
D. BIOS
Explanation
The BIOS (Basic Input/Output System) is a firmware that is stored on a chip on the motherboard of a PC. It is responsible for initializing and testing hardware components during the boot process. It also provides the CPU with instructions on how to interact with other hardware components, such as the memory, hard drive, and peripherals. The BIOS acts as an intermediary between the CPU and the rest of the PC, enabling communication and coordination between different hardware components.
6.
You have installed a new RAID system into your server. The RAID solution uses two mirrored disks. Which of the following RAID levels are being used?
Correct Answer
B. RAID 1
Explanation
The correct answer is RAID 1. RAID 1, also known as disk mirroring, involves creating an exact copy (mirror) of data on two or more disks. This provides redundancy and improves data availability as if one disk fails, the data can still be accessed from the mirror disk. RAID 0 is not being used as it does not involve mirroring, but instead focuses on striping data across multiple disks for improved performance. RAID 3, RAID 5, and RAID 6 also do not involve disk mirroring and have different methods of data distribution and redundancy.
7.
You have been asked to install a network cable that offers the greatest level of resistance to electromagnetic interference (EMI). Which of the following network media would you select?
Correct Answer
A. Fiber-optic
Explanation
Fiber-optic cables are made of thin strands of glass or plastic that transmit data using light signals. They offer the greatest level of resistance to electromagnetic interference (EMI) because they do not conduct electricity. Unlike coaxial, Ethernet, twisted pair, or token ring cables, fiber-optic cables are not affected by electromagnetic fields or radio frequency interference, making them ideal for environments where EMI is a concern.
8.
In Windows XP, the virtual memory file is called what?
Correct Answer
A. Pagefile.sys
Explanation
In Windows XP, the virtual memory file is called "pagefile.sys". This file is used to supplement the physical memory (RAM) on a computer by temporarily storing data that is not currently being used. When the RAM becomes full, the operating system moves some of the data from RAM to the pagefile.sys file, freeing up space in the RAM for other processes. This helps to prevent the system from running out of memory and allows for smoother multitasking and overall system performance.
9.
What is included in the EP laser printer toner cartridge? (Choose three.)
Correct Answer(s)
A. Print Drum
B. Toner
C. Cleaning Blade
Explanation
The EP laser printer toner cartridge includes three components: the print drum, toner, and cleaning blade. The print drum is responsible for transferring the toner onto the paper, while the toner contains the ink or powder that is used to create the image on the paper. The cleaning blade helps to remove any excess toner from the print drum, ensuring clean and accurate printing.
10.
Which type of backup makes a copy of files that have been changed since the last full or incremental backup?
Correct Answer
B. Incremental
Explanation
Incremental backup makes a copy of files that have been changed since the last full or incremental backup. This type of backup only backs up the data that has changed, reducing the time and storage space required compared to a full backup. It builds upon the previous backup by adding the changes made since then, creating a chain of incremental backups. In case of data loss, restoring from an incremental backup requires the last full backup and all subsequent incremental backups to restore the data to its most recent state.
11.
The _________ is the measurement of the difference between the darkest color and the lightest color an LCD screen can display.
Correct Answer
C. Contrast Ratio
Explanation
The contrast ratio is the measurement of the difference between the darkest color and the lightest color an LCD screen can display. It determines the range of colors that can be shown on the screen, with higher contrast ratios indicating a greater range. A high contrast ratio is desirable as it allows for more vibrant and detailed images, while a low contrast ratio can result in washed-out or dull colors.
12.
Which assembly permanently presses the toner into the paper?
Correct Answer
A. Fuser
Explanation
The fuser is responsible for permanently pressing the toner into the paper. It uses heat and pressure to melt the toner particles and fuse them onto the paper, ensuring that the print is durable and long-lasting. The transfer corona is responsible for transferring the toner from the print drum to the paper, while the paper transport assembly is responsible for moving the paper through the printer. The print drum is responsible for applying the toner onto the paper.
13.
What is the primary function of the SSID?
Correct Answer
C. A network name that identifies a wireless network.
Explanation
The primary function of the SSID is to act as a network name that identifies a wireless network. This network name is used by devices to connect to the correct wireless network and establish a connection. It allows devices to differentiate between different wireless networks in the vicinity and choose the one they want to connect to.
14.
You have just upgraded a client’s system to support USB 2.0. What is the maximum speed of USB?
Correct Answer
B. 480 Mbps
Explanation
USB 2.0 has a maximum speed of 480 Mbps. Mbps stands for megabits per second, which is a unit used to measure data transfer speed. This means that USB 2.0 is capable of transferring data at a rate of 480 million bits per second.
15.
Which of the following are usually contained on an MSDS? (Choose three.)
Correct Answer(s)
A. Recommended Safety Equipment
B. Manufacturer's Name
D. First Aid Measures
Explanation
The Material Safety Data Sheet (MSDS) is a document that provides information about the potential hazards and safe handling of a particular chemical or product. It typically includes the manufacturer's name, recommended safety equipment, and first aid measures. These three components are essential for ensuring the safe handling and use of the product. Disposal considerations, although important, may not always be included on an MSDS as they can vary depending on local regulations and specific product characteristics.
16.
You have installed a new RAID system into your server. The RAID solution uses three disks and provides fault tolerance. Which of the following RAID levels are being used?
Correct Answer
D. RAID 5
Explanation
The correct answer is RAID 5. RAID 5 is a RAID level that uses three or more disks and provides fault tolerance by distributing parity information across all the disks in the array. This allows for data redundancy and recovery in the event of a disk failure.
17.
Which class of fire extinguisher is recommended for use for a fire involving flammable metals?
Correct Answer
D. D
Explanation
Class D fire extinguishers are specifically designed to extinguish fires involving flammable metals such as magnesium, titanium, and potassium. These metals require a specialized extinguishing agent, usually in the form of a dry powder, to effectively smother the fire and prevent it from spreading. Class D extinguishers are not suitable for use on other types of fires, such as those involving flammable liquids or electrical equipment. Therefore, in a fire involving flammable metals, it is recommended to use a Class D fire extinguisher.
18.
On a default Windows XP installation, how do you start the Disk Defragmenter program?
Correct Answer
B. START > ALL PROGRAMS > ACCESSORIES > SYSTEM TOOLS > DISK DEFRAGMENTER
Explanation
The correct answer is "START > ALL PROGRAMS > ACCESSORIES > SYSTEM TOOLS > DISK DEFRAGMENTER". This is because the Disk Defragmenter program is located in the System Tools folder within the Accessories folder in the All Programs menu. By following this path, the user can easily access and start the Disk Defragmenter program on a default Windows XP installation.
19.
Which of the following devices are commonly seen as PCMCIA Type III cards?
Correct Answer
D. Hard Drives
Explanation
PCMCIA Type III cards are commonly used for adding additional storage to laptops and other portable devices. Hard drives are one of the devices that can be commonly seen as PCMCIA Type III cards, allowing users to expand their storage capacity and easily transfer files between devices. Modems, network adapters, and memory cards can also be used as PCMCIA Type III cards, but they are not specifically mentioned in the question.
20.
You need to install a device driver on a Windows XP computer. The device driver is not digitally signed. Which level of access do you need to be able to install the driver?
Correct Answer
A. Administrator
Explanation
To install a device driver on a Windows XP computer that is not digitally signed, you need to have Administrator level access. This level of access provides the necessary permissions to bypass the security measures in place and install the driver. Guest, User, and Super User do not have the necessary privileges to perform this task.
21.
Which of the following protocols is used for network addressing?
Correct Answer
A. IP
Explanation
The correct answer is IP. IP (Internet Protocol) is a protocol used for network addressing. It is responsible for assigning unique IP addresses to devices on a network, allowing them to communicate and send data packets to each other. IP is a fundamental protocol in the internet protocol suite and is widely used in both local area networks (LANs) and wide area networks (WANs). It provides a standardized method for addressing and routing data across different networks, ensuring that data packets are delivered to the correct destination.
22.
Which of the following types of displays has the best performance characteristics?
Correct Answer
A. Active Matrix
Explanation
Active Matrix displays have the best performance characteristics compared to Passive Matrix, Dual Matrix, and Quad Matrix displays. Active Matrix displays use thin-film transistors (TFTs) to control each individual pixel, allowing for faster response times, higher refresh rates, and better color reproduction. This technology also provides wider viewing angles and better image quality, making it the preferred choice for high-performance displays such as LCD and OLED screens.
23.
To increase security, you decide to block the Telnet protocol. Which port will you need to block to prevent Telnet from being used?
Correct Answer
C. 23
Explanation
To prevent Telnet from being used, you need to block port 23. Telnet is a protocol that allows remote access to a computer or server, and it typically uses port 23 for communication. By blocking this port, you effectively disable Telnet and enhance the security of your system.
24.
The LCD screen on your laptop is flickering intermittently. What is the most likely caused of this problem?
Correct Answer
D. Failing inverter
Explanation
The most likely cause of the flickering of the LCD screen on a laptop is a failing inverter. The inverter is responsible for providing power to the LCD backlight, and if it is faulty, it can result in intermittent flickering. This is a common issue that can be resolved by replacing the failing inverter with a new one.
25.
Which of the following command-line utilities is used to format a hard disk to clean it off and prepare it for an operating system?
Correct Answer
A. FORMAT
Explanation
The command-line utility "FORMAT" is used to format a hard disk to clean it off and prepare it for an operating system. Formatting a hard disk involves erasing all the data on the disk and setting up the file system structure required by the operating system. This process prepares the disk for use by the operating system and ensures that it can be efficiently utilized for storing data. Therefore, the "FORMAT" command is the correct choice for this task.
26.
Bluetooth Class 2 devices have a maximum communication range of how far?
Correct Answer
B. 10 meters
Explanation
Bluetooth Class 2 devices have a maximum communication range of 10 meters. This means that the devices can communicate with each other within a distance of up to 10 meters. Beyond this range, the signal strength may weaken, leading to a loss of connection or reduced performance. Class 2 devices are commonly used in personal electronics such as smartphones, tablets, and laptops, where the range of communication required is typically within close proximity.
27.
You will be installing both Windows 98 and Windows XP on a computer, and you want to be able to dual-boot and read all files on the computer from either operating system. Which of the following file systems should you use on the hard drive?
Correct Answer
A. FAT32
Explanation
To dual-boot and read all files on the computer from either operating system, the best file system to use on the hard drive is FAT32. FAT32 is compatible with both Windows 98 and Windows XP, allowing easy access to files from either operating system. NTFS is not compatible with Windows 98, NFS is a network file system and not suitable for this scenario, and FAT16 has limitations on file size and partition size.
28.
Which of the following utilities can be used to fix cross-linked files on hard drives in Windows XP/2000?
Correct Answer
B. CHKDSK
Explanation
CHKDSK (Check Disk) is a utility that can be used to fix cross-linked files on hard drives in Windows XP/2000. Cross-linked files occur when the file system incorrectly assigns the same cluster to multiple files, causing data corruption. CHKDSK scans the file system, identifies cross-linked files, and repairs them by reassigning the correct clusters. This helps to ensure data integrity and prevent further issues with file access and data corruption. SCANDISK is a similar utility used in older versions of Windows, while FDISK is a utility for managing partitions, and Disk Management is a tool for disk management tasks but not specifically for fixing cross-linked files.
29.
Which of the following files is responsible for pointing to the location of the operating system’s system files during the boot process?
Correct Answer
B. BOOT.INI
Explanation
BOOT.INI is responsible for pointing to the location of the operating system's system files during the boot process. This file is a configuration file used by Windows NT-based operating systems, including Windows XP and Windows Server 2003. It contains information about the operating systems installed on the computer and their corresponding file paths. During the boot process, the system reads the BOOT.INI file to determine which operating system to load and where to find its system files.
30.
Which of the following could be the cause of paper jams on a laser printer?
Correct Answer
C. Worn pickup rollers
Explanation
Worn pickup rollers could be the cause of paper jams on a laser printer. Pickup rollers are responsible for feeding the paper into the printer, and if they are worn out, they may not grip the paper properly, causing it to jam. This can happen when the rollers become smooth and lose their traction over time. When the printer tries to pick up the paper, it may slip or fail to catch it, resulting in a paper jam. Therefore, worn pickup rollers can disrupt the smooth paper feeding process and lead to paper jams in a laser printer.
31.
You are administering a system that has been locked down for security reasons. You notice that among all of the other ports, port 21 has been disabled. What service is associated with port 21?
Correct Answer
A. FTP
Explanation
Port 21 is associated with the FTP (File Transfer Protocol) service. FTP is a standard network protocol used for transferring files from one host to another over a TCP-based network, such as the internet. By disabling port 21, the system administrator is preventing any FTP communication or file transfers to or from the system, enhancing security by limiting potential attack vectors.
32.
You have just installed a new hard drive in your Windows XP computer. What is the maximum number of partitions that can be created on this hard drive?
Correct Answer
D. 4
Explanation
The maximum number of partitions that can be created on a hard drive in Windows XP is 4. This is because Windows XP uses the Master Boot Record (MBR) partitioning scheme, which allows for a maximum of 4 primary partitions. If you need to create more partitions, you can create an extended partition and then divide it into logical partitions, but the maximum number of primary partitions will still be limited to 4.
33.
You are working in Microsoft Excel, and it appears that the program is not responding. Which of the following utilities can you use to force the application to shut down?
Correct Answer
C. Task Manager
Explanation
Task Manager is a utility in Microsoft Windows that allows users to view and manage the programs and processes running on their computer. It provides a way to force an unresponsive application to shut down by ending its process. Therefore, in this scenario, Task Manager can be used to force Microsoft Excel to shut down if it is not responding.
34.
At a command prompt, you want to rename a directory from Temp to Files. Which of the following commands can you use to do this?
Correct Answer
C. REN TEMP FILES
Explanation
The command "REN TEMP FILES" can be used to rename a directory from Temp to Files. The "REN" command is short for "rename" and is used to rename files and directories. In this case, the "TEMP" directory will be renamed to "FILES".
35.
Which of the following are valid NTFS permissions? (Choose three.)
Correct Answer(s)
A. Read
B. Write
C. Modify
Explanation
The valid NTFS permissions are Read, Write, and Modify. These permissions allow users to view and access files (Read), make changes to files (Write), and both read and modify files (Modify). These permissions are commonly used to control access and manage the security of files and folders on NTFS file systems. The Create permission is not a valid NTFS permission as it does not exist in the list of standard NTFS permissions.
36.
Which of the following commands is used in a Windows environment and used to follow a packet to its destination?
Correct Answer
A. TRACERT
Explanation
TRACERT is the correct command used in a Windows environment to follow a packet to its destination. It stands for "Trace Route" and is used to track the path that a packet takes from the source to the destination. TRACERT sends a series of ICMP Echo Request messages with varying Time-To-Live (TTL) values to each router along the path, and each router returns an ICMP Time Exceeded message. This allows the user to determine the route taken and identify any network issues or delays.
37.
Which of the following advanced boot options only loads only minimal drivers, such as the mouse, keyboard, and basic video?
Correct Answer
A. Safe Mode
Explanation
Safe Mode is the correct answer because it is an advanced boot option that loads only minimal drivers, such as the mouse, keyboard, and basic video. In Safe Mode, the operating system starts with a limited set of drivers and services, allowing the user to troubleshoot and fix any issues that may be caused by incompatible or problematic drivers or software. Safe Mode does not load unnecessary drivers or services, which can help in diagnosing and resolving various system problems.
38.
While configuring your firewall, you inadvertently block port 443. Which of the following will be unavailable?
Correct Answer
A. HTTPS
Explanation
When you block port 443 on your firewall, HTTPS will be unavailable. Port 443 is the default port used for secure HTTP (HTTPS) connections. Blocking this port will prevent any secure communication over the HTTP protocol, making it impossible to establish secure connections to websites or web applications.
39.
Which of the following commands is used to test connectivity between devices on a network?
Correct Answer
C. PING
Explanation
The PING command is used to test connectivity between devices on a network. It sends a small packet of data to a specific IP address and waits for a response. If a response is received, it indicates that the device is reachable and there is connectivity between the devices. PING is commonly used to troubleshoot network connectivity issues and to determine the response time or latency between devices.
40.
Which layer is responsible for translating logical network addressing and their names to their physical address
Correct Answer
E. Network
Explanation
The Network layer is responsible for translating logical network addressing and their names to their physical address. This layer is responsible for routing and forwarding data packets across different networks. It takes care of logical addressing, network topology, and network protocols. It ensures that data is delivered to the correct destination by using logical addresses and translating them to physical addresses.