1.
In which of the following is the default location of user files (e.g. My Documents, Favorites, Desktop) in
Windows Vista?
Correct Answer
A. C:\users\
Explanation
The correct answer is c:\users\. In Windows Vista, the default location for user files such as My Documents, Favorites, and Desktop is the c:\users\ directory. This directory contains individual folders for each user on the system, where their personal files are stored.
2.
When installing additional memory in a notebook computer, the MOST important point to remember is:
Correct Answer
C. The chip has to be seated properly and locked down to be detected.
Explanation
The most important point to remember when installing additional memory in a notebook computer is that the chip has to be seated properly and locked down to be detected. This means that the chip needs to be inserted correctly into the memory slot and secured in place to ensure that it is recognized by the computer's system. If the chip is not properly seated and locked down, it may not be detected by the computer, resulting in the memory upgrade not being recognized or functioning properly.
3.
Which of the following BEST describes the general meaning of a warning in one of the Event Viewer logs?
Correct Answer
B. An issue that will not prevent the basic function of the computer.
Explanation
A warning in one of the Event Viewer logs is typically an indication of an issue or problem that has been detected on the computer. However, it is not severe enough to completely disrupt the basic functioning of the computer. While it may require attention or further investigation, it does not pose an immediate threat to the overall operation of the system.
4.
Which of the following Microsoft encryption software provides the HIGHEST level of security for PCs
running Windows Vista Enterprise or Ultimate Vista?
Correct Answer
C. BitLocker drive encryption
Explanation
BitLocker drive encryption provides the highest level of security for PCs running Windows Vista Enterprise or Ultimate Vista. BitLocker encrypts the entire Windows operating system and all the data on the hard drive, protecting it from unauthorized access. It uses advanced encryption algorithms to ensure the confidentiality and integrity of the data. NTFS is a file system, Windows Defender is an antivirus software, and EFS (Encrypting File System) provides file-level encryption, but they do not offer the same level of security as BitLocker drive encryption.
5.
Which of the following commands would be used to move the working directory from C:\ to
C:\Windows?
Correct Answer
A. CD
Explanation
The CD command is used to change the current working directory in a command prompt or terminal. In this case, the command "CD C:\Windows" would be used to move the working directory from C:\ to C:\Windows.
6.
Which of the following commands would be used to verify and troubleshoot DNS settings of a particular
host on a Windows computer?
Correct Answer
B. NSLOOKUP
Explanation
NSLOOKUP command is used to verify and troubleshoot DNS settings of a particular host on a Windows computer. It allows users to query DNS servers to obtain information about various DNS records, such as IP addresses associated with a domain name, mail exchange servers for a domain, and more. By using NSLOOKUP, users can diagnose and troubleshoot DNS-related issues, such as incorrect DNS settings, DNS resolution problems, and network connectivity problems.
7.
A technician has a laptop which has a faint image showing on the screen. Which of the following
components should be tested and MOST likely needs replacement?
Correct Answer
C. Inverter
Explanation
The inverter is responsible for supplying power to the LCD lamp, which provides the backlight for the screen. If the screen is showing a faint image, it suggests that the inverter is not functioning properly and may need to be replaced.
8.
A technician has installed the hardware for a SOHO wired network. Which of the following is the FIRST
step to securing the network?
Correct Answer
B. Change default usernames and passwords
Explanation
The first step to securing a SOHO wired network is to change the default usernames and passwords. This is important because default credentials are widely known and can be easily exploited by attackers. By changing the default usernames and passwords, the network administrator ensures that only authorized individuals can access the network devices and reduces the risk of unauthorized access and potential security breaches.
9.
A bank is upgrading some clerical users' PCs. Which of the following would be the MOST appropriate
method for erasing the data on the old PCs?
Correct Answer
A. Drive degauss
Explanation
Drive degauss is the most appropriate method for erasing the data on the old PCs. Degaussing is the process of using a powerful magnet to erase or scramble the data on a hard drive, rendering it unreadable. This method is highly effective in completely wiping out all data on the drive, ensuring that it cannot be recovered or accessed by unauthorized individuals. Standard format, quick format, or changing the jumpers on the hard drive may not completely erase the data and could potentially leave sensitive information vulnerable.
10.
A laptop user reports that they cannot see the SSID or connect to their company's wireless network. Which
of the following should the technician try FIRST?
Correct Answer
C. Check the wireless on/off switch
Explanation
The technician should try checking the wireless on/off switch first. This is because if the switch is turned off, it would prevent the laptop from detecting the SSID or connecting to the wireless network. By checking the switch and ensuring it is turned on, the technician can eliminate this possibility before moving on to other troubleshooting steps.
11.
A user reports that the desktop PC shuts down 10 minutes after turning it on in the morning. When the
technician moves the PC, it sounds like there are loose parts sliding around in the case. Which of the
following is the MOST likely explanation for the PC shutting down?
Correct Answer
C. The heat sink retaining clip has broken loose.
Explanation
The most likely explanation for the PC shutting down is that the heat sink retaining clip has broken loose. When the technician moves the PC and hears loose parts sliding around in the case, it suggests that there is a problem with the heat sink. The heat sink is responsible for dissipating heat from the CPU, and if it is not properly secured, it can cause the CPU to overheat and trigger an automatic shutdown to prevent damage.
12.
A user reports that the PC is not working. After questioning the user, the technician believes the problem is
a bad memory module. Which of the following is the NEXT step the technician should take?
Correct Answer
C. Test the theory by running memory diagnostic software
Explanation
The technician should test the theory by running memory diagnostic software. This step is necessary to confirm whether the problem is indeed a bad memory module. By running the diagnostic software, the technician can identify any issues with the memory module and determine if it needs to be replaced. This step is crucial in troubleshooting and ensuring that the correct solution is implemented.
13.
A technician is diagnosing a PC running Windows 7 which has been affected with an "NTLDR is missing"
error message. Which of the following command line tools would BEST resolve the problem?
Correct Answer
A. Fixboot
Explanation
Fixboot is the best command line tool to resolve the "NTLDR is missing" error message. This error typically occurs when the NTLDR file, which is responsible for loading the Windows operating system, is not found or corrupted. The Fixboot command is used to repair the boot sector of the system partition, ensuring that the necessary files are properly loaded during the boot process. This command can help restore the functionality of the Windows operating system and resolve the error.
14.
A user reports that people are receiving emails from their account that the user never sent. Which of the
following security measures would BEST resolve the problem?
Correct Answer
B. Change the account password.
Explanation
Changing the account password would be the best security measure to resolve the problem of people receiving emails from the user's account that they never sent. By changing the password, unauthorized access to the account would be prevented, ensuring that only the user has control over their account and can send emails from it. This would help to secure the account and prevent any further unauthorized activity.
15.
A technician is repairing a workstation that exhibits random reboots at odd times of the day. Which of the
following should be performed FIRST when troubleshooting the issue? (Select TWO).
Correct Answer(s)
A. Check the PSU integrity
D. Check the memory integrity
Explanation
The technician should first check the PSU (Power Supply Unit) integrity because random reboots can be caused by insufficient or unstable power supply. If the PSU is faulty, it may not be able to provide enough power to the workstation, leading to unexpected reboots. Additionally, checking the memory integrity is important as faulty or incompatible RAM can also cause random reboots. By ensuring that both the PSU and memory are functioning properly, the technician can eliminate two common causes of the issue and narrow down the troubleshooting process.
16.
While using an application on a Windows XP desktop PC, a BSOD appears. Which of the following should
the technician select upon reboot to troubleshoot this issue?
Correct Answer
A. Boot to safe mode
Explanation
When a BSOD (Blue Screen of Death) appears on a Windows XP desktop PC, the technician should select "Boot to safe mode" upon reboot to troubleshoot the issue. Safe mode starts the computer with only the basic files and drivers necessary to run the operating system, which can help identify and resolve any software or driver conflicts that may have caused the BSOD. By booting into safe mode, the technician can access the system with minimal functionality and work towards resolving the underlying issue.
17.
A user powers on their Windows XP PC. The POST runs and the message "NTLDR is missing" appears.
Which of the following should the technician do to troubleshoot this problem?
Correct Answer
D. Run FIXMBR
Explanation
The message "NTLDR is missing" indicates that the NTLDR (NT Loader) file, which is responsible for loading the Windows operating system, is not found. Running FIXMBR (Fix Master Boot Record) can help troubleshoot this problem by repairing any issues with the Master Boot Record (MBR) on the hard drive. The MBR contains the information necessary for the computer to start up and load the operating system. By running FIXMBR, the technician can fix any corruption or errors in the MBR, allowing the computer to boot up properly.
18.
A user states that their old Windows XP notebook loses time when they power it off. Which of the following
items would address this problem?
Correct Answer
B. Replace the CMOS battery.
Explanation
The CMOS battery is responsible for maintaining the system clock and other BIOS settings when the computer is powered off. If the CMOS battery is old or weak, it may not be able to retain the correct time, causing the notebook to lose time when powered off. By replacing the CMOS battery, the user can ensure that the notebook maintains the correct time even when powered off.
19.
A technician would like to map a network drive. Which of the following indicates the correct path for
mapping a network drive?
Correct Answer
D. \\servername\share
Explanation
The correct path for mapping a network drive is "\\servername\share". This path indicates that the network drive is located at the server with the name "servername" and the share is named "share". By mapping this path, the technician will be able to access the network drive and its contents.
20.
Which of the following is the MINIMUM account required to install most programs on Windows XP?
Correct Answer
A. Power user
Explanation
Power user is the correct answer because it is the minimum account required to install most programs on Windows XP. The power user account has elevated privileges that allow the user to install and modify software, but it does not have full administrative control over the system. This account is designed for users who need more control than a standard user but do not require full administrative access.
21.
Which of the following user accounts should be disabled to adhere to security best practices?
Correct Answer
B. Guest
Explanation
The Guest account should be disabled to adhere to security best practices because it is a default account with limited privileges that can be accessed by anyone. Disabling the Guest account helps prevent unauthorized access and potential security breaches.
22.
When configuring user accounts, which of the following should a technician perform?
Correct Answer
B. Assign the minimum required access to the users
Explanation
When configuring user accounts, a technician should assign the minimum required access to the users. This ensures that users only have access to the resources and privileges necessary for their job roles, reducing the risk of unauthorized access or accidental changes to system settings. Assigning the minimum required access also helps to maintain system security and prevent potential misuse or abuse of privileges.
23.
A technician needs to rebuild a computer that had a virus. Which of the following data destruction methods
should be used to ensure the virus has been successfully erased before reinstalling the operating system,
programs, and all user data?
Correct Answer
A. Standard format
Explanation
To ensure the virus has been successfully erased before reinstalling the operating system, programs, and all user data, the technician should use the standard format data destruction method. Standard format involves reformatting the hard drive, which erases all existing data and partitions on the drive. This process removes any traces of the virus and prepares the computer for a clean installation of the operating system, programs, and user data. A low level format, on the other hand, is a more thorough method that also reinitializes the hard drive at a hardware level, but it is not necessary in this case. Shredder and degaussing tools are used for physical destruction of storage media, which is not applicable in this scenario.
24.
Which of the following procedures needs to be done FIRST in order to modify system files and folders in
Windows XP?
Correct Answer
C. Change the default settings in Folder options.
Explanation
To modify system files and folders in Windows XP, the first procedure that needs to be done is to change the default settings in Folder options. This is because by changing the default settings, you can enable the display of hidden files and folders, which are necessary to access and modify system files and folders. Without changing these settings, the system files and folders will remain hidden and inaccessible for modification.
25.
A technician is troubleshooting a computer which is making a loud clicking noise and not booting. Which of
the following parts MOST likely needs to be replaced?
Correct Answer
B. Hard drive
Explanation
The loud clicking noise and failure to boot indicate a mechanical issue with the computer. The most likely part to be causing this problem is the hard drive. Hard drives have moving parts, and a loud clicking noise often indicates a mechanical failure within the drive. This would prevent the computer from booting up properly. Replacing the hard drive would likely resolve the issue and allow the computer to function properly again.
26.
A technician needs to free up hard drive space by emptying the recycle bin, deleting temporary files, and
compressing old files. Which of the following utilities will allow the technician to accomplish this
simultaneously?
Correct Answer
D. Disk Cleanup
Explanation
Disk Cleanup is the correct answer because it is a utility that allows the technician to empty the recycle bin, delete temporary files, and compress old files all at once. It helps to free up hard drive space by removing unnecessary files and optimizing the storage capacity of the system.
27.
A technician needs to uninstall some software from a Windows XP computer. Which of the following
utilities is unique to Windows XP?
Correct Answer
A. Add / Remove Programs
Explanation
Add / Remove Programs is the correct answer because it is a utility that is unique to Windows XP. This utility allows users to uninstall software from their computer by accessing the Control Panel and selecting the desired program to be removed. Other options listed, such as Programs and Features, Programs, and Uninstall a Program, are not specific to Windows XP and can be found in other versions of Windows as well.
28.
A user states when they press certain letters on their laptop's keyboard, a number is displayed on the
screen. Which of the following can the technician perform to resolve this issue?
Correct Answer
B. Turn off number lock
Explanation
The user is experiencing a problem where pressing certain letters on their laptop's keyboard displays a number on the screen. This suggests that the number lock function is enabled on the keyboard, causing the numbers to be displayed instead of the intended letters. By turning off the number lock, the technician can resolve this issue and allow the letters to be displayed correctly when pressed on the keyboard.
29.
A contractor needs to destroy several drives containing confidential information so that they can never be
used again. Which of the following destruction methods would BEST accomplish this task?
Correct Answer
B. Drill into the hard drives.
Explanation
Drilling into the hard drives would be the best method to ensure that the confidential information cannot be accessed again. By physically damaging the drives through drilling, the internal components and data storage areas would be destroyed, making it extremely difficult if not impossible to recover any information. Overwriting, degaussing, and sanitizing methods may still leave traces of data that could potentially be recovered, whereas drilling ensures complete destruction.
30.
A customer purchases a new 802.11n router for their home. They connect it to their current 801.11g
devices, as well as their new laptop. Even though the laptop has a built-in 802.11n antenna, they are not
noticing any speed increase. Which of the following is the MOST likely cause?
Correct Answer
C. The router is broadcasting in Mixed Mode.
Explanation
The most likely cause for the customer not noticing any speed increase is that the router is broadcasting in Mixed Mode. Mixed Mode allows the router to support both 802.11g and 802.11n devices, but it may limit the speed to the lowest common denominator, which in this case is 802.11g. Therefore, even though the laptop has a built-in 802.11n antenna, it will not be able to achieve the higher speeds if the router is broadcasting in Mixed Mode.
31.
Which of the following home computer synchronization methods are possible with an iOS device? (Select
TWO).
Correct Answer(s)
B. USB
D. Wi-Fi
Explanation
The correct answer is USB and Wi-Fi. USB is a common method for syncing data between a home computer and an iOS device. It allows for a direct connection between the two devices using a USB cable. Wi-Fi is another method that allows for wireless syncing between the iOS device and the home computer. This can be done through an internet connection, allowing for easy and convenient synchronization of data. Infrared, FireWire, and Parallel are not compatible methods for syncing with an iOS device.
32.
A technician has a computer locked in a cabinet in the office that shares a printer and some files. The
computer must remain on. Which of the following Control Panel options would be used to control the users
that are able to shut the computer down?
Correct Answer
C. Local security policy
Explanation
The correct answer is "Local security policy" because this option allows the technician to control the users who have the ability to shut down the computer. By accessing the local security policy settings, the technician can specify which users or user groups have the necessary privileges to shut down the computer. This helps to ensure that only authorized individuals can perform this action, preventing accidental or unauthorized shutdowns.
33.
A customer states that another technician just removed some viruses and now they are not able to connect
to websites such as Windows Update, but are able to connect to others. Which of the following is the
MOST likely cause of the issue?
Correct Answer
D. Host file has been manipulated
Explanation
The most likely cause of the issue is that the host file has been manipulated. The host file is a local file on a computer that maps hostnames to IP addresses. If it has been manipulated, it can redirect the computer's attempts to connect to specific websites, such as Windows Update, to incorrect or blocked IP addresses. This would explain why the customer is unable to connect to certain websites but can connect to others.
34.
A technician has 50 identical computers that need to be upgraded to the Windows 7 OS, and are capable
of booting from the network. They are running a Gigabit network with a Windows deployment server. Which
of the following will be the BEST to use in this scenario?
Correct Answer
C. PXE
Explanation
In this scenario, the best option to use would be PXE (Preboot Execution Environment). PXE allows the technician to boot the computers from the network, which is efficient when upgrading multiple computers. This means that the technician can use the Windows deployment server to remotely install the Windows 7 OS on all 50 computers at once, saving time and effort compared to individually upgrading each computer using other options like UEFI, Windows 7 DVD, or USB flash.
35.
A technician receives an error every time a workstation boots up. The technician needs to find out what
process is responsible for the error. Which of the following utilities would be used FIRST?
Correct Answer
C. Event Viewer
Explanation
The Event Viewer utility would be used first in this scenario. Event Viewer is a tool in Windows operating systems that allows the technician to view and analyze system events and logs. By checking the event logs, the technician can identify any errors or issues that occurred during the boot-up process and determine which process is responsible for the error. This can help in troubleshooting and resolving the problem with the workstation.
36.
A technician installs a new SOHO wireless router to replace a failed router and users report connectivity
issues and IP errors. Which of the following is the MOST likely cause?
Correct Answer
D. Users need to refresh their IP configuration
Explanation
The most likely cause for the connectivity issues and IP errors reported by the users after installing a new SOHO wireless router is that the users need to refresh their IP configuration. When a new router is installed, the users' devices may still be using the old IP configuration, causing conflicts and errors. By refreshing their IP configuration, the devices will obtain new IP addresses and establish proper connectivity with the new router. This is a common troubleshooting step in such scenarios.
37.
A technician installs a new video card for a customer on a desktop PC. The technician powers on the PC
and does not get video. Which of the following steps should the technician perform FIRST to troubleshoot
this issue?
Correct Answer
C. Reseat the video card
Explanation
The first step the technician should perform to troubleshoot the issue is to reseat the video card. This involves removing the video card from its slot and then firmly inserting it back in to ensure it is properly connected. This is a common troubleshooting step as sometimes the video card may not be seated correctly, leading to no video output. By reseating the video card, the technician can eliminate any potential connection issues before moving on to other troubleshooting steps.
38.
A technician is tasked with changing the account lockout threshold to 30 minutes in Windows 7. Which of
the following should the technician use to accomplish this task?
Correct Answer
C. Local Security Policy
Explanation
To change the account lockout threshold to 30 minutes in Windows 7, the technician should use the Local Security Policy. The Local Security Policy allows the technician to configure various security settings on a local computer, including account lockout policies. By accessing the Local Security Policy, the technician can modify the account lockout threshold to the desired value of 30 minutes.
39.
A technician is creating an image that will be used to deploy Windows 7 to 100 PCs. Which of the following
tools should be used to accomplish this?
Correct Answer
A. SYSPREP
Explanation
SYSPREP should be used to create an image for deploying Windows 7 to multiple PCs. SYSPREP (System Preparation) is a Microsoft tool that prepares a computer's hard disk for imaging or cloning by removing unique identifiers such as the computer name and security identifier (SID). It allows the image to be deployed to multiple computers without conflicts. Windows 7 Advisor is used to check the compatibility of a computer for Windows 7, CHKDSK is used to check and repair file system errors, and DISKPART is used to manage disk partitions.
40.
A technician is having boot issues with a newly built PC, and notices the following jumper configurations for
each PATA devicE.
- HARD DRIVE. MASTER
- OPTICAL DRIVE. CABLE SELECT
Which of the following jumper configurations should be used instead?
Correct Answer
B. HDD. Cable Select; Optical DrivE. Cable Select
Explanation
The correct answer is HDD. Cable Select; Optical DrivE. Cable Select. This configuration should be used instead because it allows both the hard drive and optical drive to be set to Cable Select. Cable Select is a setting that allows the computer to automatically determine the master and slave devices based on their physical connection to the IDE cable. This ensures that the devices are properly recognized and allows for the correct boot order.
41.
A computer is showing the "No boot device found" message even though a technician has verified that the
hard drive is set as Device 1 in the BIOS boot order. Which of the following causes is MOST likely at play?
Correct Answer
D. Both PATA devices are incorrectly set to the master jumper setting.
Explanation
The most likely cause for the computer showing the "No boot device found" message, despite the hard drive being set as Device 1 in the BIOS boot order, is that both PATA devices are incorrectly set to the master jumper setting. This means that both the hard drive and another PATA device (such as an optical drive) are set to be the master device on the same cable, causing a conflict and preventing the computer from booting properly.
42.
A technician is troubleshooting a RAID 6 array on a high end CAD/CAM workstation. Two disk drives have
their fault lights on. Which of the following is the BEST action for the technician to perform when fixing this
problem?
Correct Answer
A. Replace the failed drives and verify the RAID rebuilds completely.
Explanation
The best action for the technician to perform when fixing this problem is to replace the failed drives and verify that the RAID rebuilds completely. This is because the fault lights indicate that the drives have failed, and replacing them is necessary to restore the functionality of the RAID array. Verifying the RAID rebuilds completely ensures that the data is properly restored and the array is functioning as expected.
43.
Which of the following options is MOST likely active on a network of three workstations, running Windows 7
Home Edition x64, to enable File and Print sharing?
Correct Answer
A. HomeGroup
Explanation
The most likely option that would be active on a network of three workstations running Windows 7 Home Edition x64 to enable File and Print sharing is HomeGroup. HomeGroup is a feature in Windows 7 that allows users to easily share files and printers between computers on a home network. It provides a simple and secure way to share resources without the need for complex network configurations.
44.
A technician wants to setup security permissions for a FAT32 hard drive while ensuring all data is intact.
Which of the following commands should be used?
Correct Answer
D. CONVERT
Explanation
The correct answer is CONVERT. This command is used to convert a FAT32 file system to NTFS without losing any data. By using CONVERT, the technician can set up security permissions for the hard drive while ensuring that all the existing data remains intact.
45.
A Windows Vista computer has an experience index of 3.8. The technician discovers that the computer
has the following:
Performance index
RAM1GB4.6
Video3D 3.8
CPU2.4GHz4.2
The technician upgrades the memory to 2GB and gets the following results:
Performance index
RAM2GB5.0
Video3D 3.8
CPU2.4GHz4.2
But the Windows experience index is still at 3.8. Which of the following can the technician do to improve
the performance index?
Correct Answer
A. Upgrade the video card
46.
Which of the following is the BEST way to ensure that only specified devices can connect to a wireless
network?
Correct Answer
A. Use MAC filtering
Explanation
MAC filtering is the best way to ensure that only specified devices can connect to a wireless network. MAC filtering allows the network administrator to create a list of approved MAC addresses, which are unique identifiers assigned to each network device. By enabling MAC filtering, only devices with MAC addresses on the approved list will be able to connect to the network, providing an additional layer of security.
47.
A laser printer has a blank streak along one edge of each page but is otherwise printing normally. Which of
the following is the MOST likely reason for this?
Correct Answer
A. The fuser is damaged.
Explanation
The fuser is responsible for bonding the toner to the paper. If the fuser is damaged, it may not be able to apply heat and pressure evenly along the edge of the paper, resulting in a blank streak. Rebooting the printer or using thick paper would not cause a specific streak along one edge, and a low toner cartridge would not affect the printing in this way.
48.
A technician is replacing a Windows 2000 Professional computer with a Windows 7 computer for someone
with login account USER1. Which of the following directories should be copied or moved from the old
computer and where should they be placed on the new computer?
Correct Answer
B. \Documents and Settings\USER1 to \Users\USER1
Explanation
The correct answer is \Documents and Settings\USER1 should be copied or moved to \Users\USER1 on the new computer. This is because in Windows 7, the directory structure has changed and the user profiles are now stored in the \Users directory instead of the \Documents and Settings directory. Therefore, to ensure that the user's profile is properly transferred to the new computer, the contents of the old \Documents and Settings\USER1 directory should be moved or copied to the new \Users\USER1 directory.
49.
A client used file properties to hide files in their user folder and now needs to get the files back. Using the
command line tool, which of the following combination of command line parameters will
make the files viewable once again?
Correct Answer
D. Attrib -H *.*
Explanation
The correct answer is "attrib -H *.*". The "-H" parameter in the "attrib" command is used to remove the hidden attribute from files. By running this command with the wildcard "*.*", it will remove the hidden attribute from all files in the current directory, making them viewable again.
50.
A yellow exclamation mark next to a device in Device Manager indicates which of the following?
Correct Answer
B. The device driver is missing.
Explanation
A yellow exclamation mark next to a device in Device Manager indicates that the device driver is missing. This means that the computer is unable to recognize and communicate with the device properly because the necessary driver software is not installed. Without the driver, the device will not function correctly or may not be detected at all.