1.
Step 1 - Talk to the customer
Step 2 - Document your work
Step 3 - Continue to gather information
Step 4 - Eliminate possibilities to find the problem
Step 5 - Test your results
2.
You are installing two hard disk drives which of the following possible combinations can be used? Each correct answer represnts a complete solution. Choose all that apply.
Correct Answer(s)
A. Install the second hard drive on the primary IDE controller. Designate one drive as Master and the other as Slave.
B. Install the second hard disk drice on the secondary IDE controller ensuring that the first hard disk drice is on primary IDE contoller. Designate but drives as Master.
Explanation
The correct answers are both options mentioned. In the first option, installing the second hard drive on the primary IDE controller and designating one drive as Master and the other as Slave allows for proper configuration and communication between the drives. In the second option, installing the second hard disk drive on the secondary IDE controller and ensuring that the first hard disk drive is on the primary IDE controller, while designating both drives as Master, also allows for proper configuration and communication between the drives.
3.
Which of the following maximum resolutions does the UXGA video technology supports?
Correct Answer
B. 1600 x 1200
Explanation
UXGA video technology supports a maximum resolution of 1600 x 1200.
4.
Which of the following sleep modes is the most power hungry mode?
Correct Answer
A. S1
Explanation
S1 is the most power hungry sleep mode because it is the deepest sleep mode where the processor is completely powered off. In this mode, all the processor's caches and registers are flushed, and the voltage to the processor is turned off, resulting in the lowest power consumption. However, it takes more time and power to wake up from this mode compared to other sleep modes.
5.
Which of the following switches of the XCOPY command copies the ownership and NTFS permissions on the files while copying the files?
Correct Answer
D. /o
Explanation
The /o switch of the XCOPY command copies the ownership and NTFS permissions on the files while copying the files. This means that when using the /o switch, the copied files will retain the same ownership and NTFS permissions as the original files.
6.
Which of the following statements about a smart card are true? Each correct Answer represents a complete solution. Choose two.
Correct Answer(s)
A. It is used to securely store public and private keys for a log on, e-mail signing and encryption, and file encryption.
D. It is a device that contains a microprocessor and permanent memory.
Explanation
A smart card is a device that contains a microprocessor and permanent memory. It is used to securely store public and private keys for a log on, e-mail signing and encryption, and file encryption. This means that it can securely store sensitive information and perform cryptographic operations, making it a secure solution for authentication and data protection.
7.
Which of the following ports is also known as PS/2
Correct Answer
A. 6 - pin Mini-Din connector
Explanation
The 6-pin Mini-Din connector is also known as PS/2.
8.
Which of the following statements are true about USB? Choose two
Correct Answer(s)
A. USB supports hot plugging
B. You can connect up to 127 peripHeral devices to a single USB port
Explanation
USB supports hot plugging, which means that devices can be connected or disconnected from a USB port without having to restart the computer. Additionally, you can connect up to 127 peripheral devices to a single USB port, allowing for a high level of connectivity and versatility.
9.
Which of the following types of attacks is often performed by looking surreptitusly at the keyboard or monitor of an employees computer?
Correct Answer
D. Shoulder surfing attack
Explanation
A shoulder surfing attack is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer. This type of attack involves an unauthorized person trying to gain access to sensitive information by visually observing the victim's actions, such as passwords or confidential data, without their knowledge or consent. It is a form of social engineering that relies on exploiting human vulnerabilities and lack of awareness regarding privacy and security.
10.
You are responsible for tenchincal support at a company. One of the employees complains that his new laptop cannot connect to the company wireless network. You have verified that he is entering a valid password/ passkey. What is the problem?
Correct Answer
D. MAC filtering is blocking him
Explanation
The problem is that MAC filtering is blocking the employee's laptop from connecting to the company wireless network. MAC filtering is a security feature that only allows devices with specific MAC addresses to connect to the network. Since the employee's laptop is not on the approved list, it is being blocked from accessing the network.
11.
Which of the following is a technology that allows you to hear and watch video clips as soon as they start downloading from the web site, instead of waiting for the download to complete?
Correct Answer
B. Streaming Media
Explanation
Streaming media is a technology that allows users to hear and watch video clips as soon as they start downloading from a website, instead of waiting for the download to complete. This technology enables the continuous playback of audio and video content, delivering it in a real-time streaming format. Unlike downloading, where the entire file needs to be retrieved before playback can begin, streaming media allows for immediate access and playback while the content continues to be downloaded in the background. This enhances the user experience by reducing waiting times and providing seamless playback.
12.
Which of the following refers to the data rate supported by a network conncection or interface?
Correct Answer
A. Bandwidth
Explanation
Bandwidth refers to the data rate supported by a network connection or interface. It represents the amount of data that can be transmitted over a network in a given period of time. A higher bandwidth indicates a faster data transfer rate, allowing for quicker and more efficient communication between devices on the network.
13.
Which of the following are serial interfaces? Choos all that apply
Correct Answer(s)
B. USB
C. Firewire
Explanation
USB and Firewire are both serial interfaces. USB (Universal Serial Bus) is a widely used interface for connecting various devices to a computer. It allows for the transfer of data and power between devices. Firewire (IEEE 1394) is another serial interface commonly used for high-speed data transfer, particularly in audio and video applications. EPP (Enhanced Parallel Port) and IEEE 1284 are parallel interfaces, not serial interfaces.
14.
Which of the following devics has its own BIOS?
Correct Answer
D. Video adapter
Explanation
A video adapter is a device that is responsible for generating and displaying visual output on a computer monitor. It has its own BIOS (Basic Input/Output System) which is a firmware that initializes and controls the hardware settings of the video adapter. The BIOS allows the computer to communicate with the video adapter and ensures that it functions properly. This includes configuring display settings, resolution, color depth, and other parameters. Having its own BIOS allows the video adapter to operate independently and ensures compatibility with the computer system.
15.
Which of the following are dual core processors? Choose two.
Correct Answer(s)
A. AMD Athlon(tm) 64 X2
C. Intel(r) Pentium(r) processor Extreme Ediditon
Explanation
The correct answer is AMD Athlon(tm) 64 X2 and Intel(r) Pentium(r) processor Extreme Edition. These two processors are known for their dual-core architecture, which means they have two separate processing units within a single chip. This allows for better multitasking and improved performance compared to single-core processors. The other options, Intel Pentium 4 and AMD Athlon(tm), do not have dual-core architecture and therefore are not considered dual-core processors.
16.
Which of the following switches is used with XCOPY command to copy directories and subdirectoris, including empty directions?
Correct Answer
D. /e
Explanation
The /e switch is used with the XCOPY command to copy directories and subdirectories, including empty directories. This switch ensures that all directories and subdirectories are copied during the process, even if they are empty.
17.
WHich of the following provides authentication, enryption and data integrity for wireless devices?
Correct Answer
D. WTLS
Explanation
WTLS stands for Wireless Transport Layer Security. It is a security protocol specifically designed for wireless devices. WTLS provides authentication, encryption, and data integrity for wireless communication. It ensures that the data transmitted between wireless devices is secure and protected from unauthorized access or tampering. WTLS is commonly used in wireless applications such as mobile banking, e-commerce, and secure messaging.
18.
Mark wants to connect a printer and mouse to his laptop. Which of the following is the best wireless technology to use?
Correct Answer
A. Bluetooth
Explanation
Bluetooth is the best wireless technology to use for connecting a printer and mouse to a laptop. Bluetooth is a widely supported wireless technology that allows for seamless and reliable connections between devices. It is designed for short-range communication and is commonly used for connecting peripherals such as printers and mice to laptops and other devices. Bluetooth offers low power consumption, easy pairing, and a secure connection, making it the ideal choice for this scenario.
19.
What is the mazimum resolution that the WUXGA video technology supports?
Correct Answer
B. 1920 x 1200
Explanation
WUXGA video technology supports a maximum resolution of 1920 x 1200.
20.
What does Wireless transport layer security (WTLS) provide for wireless devices? Choose all that apply
Correct Answer(s)
A. Data integnity
B. Encryption
D. Authentication
Explanation
Wireless Transport Layer Security (WTLS) provides data integrity, encryption, and authentication for wireless devices. Data integrity ensures that the data remains unchanged during transmission, encryption protects the data from unauthorized access by encrypting it, and authentication verifies the identity of the communicating parties to ensure secure communication. Bandwidth, on the other hand, is not directly provided by WTLS.
21.
Which of the following software displays advertisements, whether or not the user has consented?
Correct Answer
D. Adware
Explanation
Adware is a type of software that displays advertisements without the user's consent. It is often bundled with other software and installed without the user's knowledge. Adware generates revenue for its developers by displaying ads and collecting user data. Unlike other options listed, such as Trojan horse, Honeypot, and Spyware, which have different functionalities, Adware specifically focuses on displaying advertisements.
22.
Which of the following protocols transmits error messages and network statistics?
Correct Answer
A. ICMP
Explanation
ICMP (Internet Control Message Protocol) is the correct answer because it is specifically designed to transmit error messages and network statistics between network devices. It is used by network devices to report errors, such as unreachable hosts or network congestion, and to provide network statistics, such as round-trip time and packet loss. ICMP is an integral part of the Internet Protocol Suite and is commonly used by network administrators for troubleshooting network connectivity issues. DHCP (Dynamic Host Configuration Protocol) is responsible for assigning IP addresses, TCP (Transmission Control Protocol) is responsible for reliable data transmission, and NNTP (Network News Transfer Protocol) is used for distributing news articles.
23.
Which of the following power sources are used to power a laptop?
Correct Answer(s)
B. AC power
C. Battery
Explanation
AC power and battery are both used to power a laptop. AC power refers to the electricity provided by an outlet, which is used to charge the laptop's battery and power it directly. The battery, on the other hand, stores electrical energy and allows the laptop to be used without being connected to a power source. Both power sources are essential for the functioning of a laptop, as the AC power charges the battery and the battery provides power when the laptop is not plugged in.
24.
Matk works as a Network admin. for NetTech inc. The network has 150 Windows 2000 professional client computers and four Windows 2000 servers. All the client computers are able to connect to the internet. Mark is concerned about malware infecting the client computers through the internet. What will Mark do to protect the client computers from malware? Choose two.
Correct Answer(s)
A. Educate users of the client computers about the problems arising due to malware
B. Educate users of the client computers to avoid malware
Explanation
Mark will educate the users of the client computers about the problems arising due to malware and also educate them on how to avoid malware. By educating the users, they will become aware of the risks associated with malware and the precautions they need to take to prevent infection. This will help in creating a security-conscious environment where users will be more cautious while browsing the internet and downloading files, reducing the chances of malware infecting the client computers.
25.
You have a customer who wants to install Windows XP professional on her computer. What is the minimum amount of RAM she must have for this to work?
Correct Answer
B. 64 Megabytes
Explanation
Windows XP Professional requires a minimum of 64 Megabytes of RAM to function properly.
26.
You are selecting RAM for a new PC. You are very concerned about making sure errors are handled. Which of the following types of RAM should you select?
Correct Answer
C. ECC RAM
Explanation
ECC RAM (Error Correcting Code RAM) should be selected because it is specifically designed to detect and correct errors in data that is being read from or written to the RAM. This type of RAM uses additional bits to store error correction codes, allowing it to identify and fix single-bit errors, and detect multiple-bit errors. By using ECC RAM, the chances of data corruption or system crashes due to memory errors are significantly reduced, making it a reliable choice for those concerned about error handling.
27.
What is the maximum data transmission speed of IEE 802. 11b Wireless networks?
Correct Answer
D. 11 Mbps
Explanation
The maximum data transmission speed of IEEE 802.11b wireless networks is 11 Mbps. This standard was introduced in 1999 and operates in the 2.4 GHz frequency range. While it may seem slow compared to modern standards, such as 802.11n or 802.11ac, 802.11b was a significant improvement over its predecessor, 802.11a, which had a maximum speed of 2 Mbps. It provided a more reliable and faster wireless connection for devices at that time.
28.
Which of the following types of parental controls is used to limit access to the internet contents?
Correct Answer
A. Content filter control
Explanation
Content filter control is a type of parental control that is used to limit access to internet contents. It allows parents to block or filter specific websites, keywords, or types of content that they deem inappropriate or unsafe for their children. By using content filter control, parents can ensure that their children are only accessing age-appropriate and safe online content, protecting them from potentially harmful or inappropriate material.
29.
Andrew has a personal computer. One morning, he starts his computer and hinds the following error message: "CMOS checksum failure. "What are the most likely causes of this error? Choose two
Correct Answer(s)
B. The CMOS battery has failed.
C. The CMOS chip has failed
Explanation
The error message "CMOS checksum failure" indicates that there is an issue with the CMOS (Complementary Metal-Oxide-Semiconductor) settings. The CMOS battery is responsible for powering the CMOS chip, which stores the computer's BIOS settings. If the CMOS battery fails, it can cause the CMOS chip to fail as well, leading to the checksum failure error message. Therefore, the most likely causes of this error are the failure of both the CMOS battery and the CMOS chip.
30.
What are the benefits of using Universal Serial bus 2.0 over legacy communication ports such as RS-232 and parallel ports? Choose all that apply
Correct Answer(s)
A. Easy configuration of hardware devices
B. Expansion
D. Speed
Explanation
The benefits of using Universal Serial Bus 2.0 (USB 2.0) over legacy communication ports such as RS-232 and parallel ports are easy configuration of hardware devices, expansion, and speed. USB 2.0 allows for plug-and-play functionality, making it easier to connect and configure hardware devices without the need for manual settings. It also supports daisy-chaining and the connection of multiple devices through hubs, providing expansion capabilities. Furthermore, USB 2.0 offers faster data transfer speeds compared to RS-232 and parallel ports, enabling quicker and more efficient communication between devices.
31.
Which of the following sleep modes is also known as Hibernation in Windows operating systems?
Correct Answer
C. S4
Explanation
S4 is the correct answer because it refers to the sleep mode known as Hibernation in Windows operating systems. In this mode, the computer saves all open documents and running applications to the hard drive and then shuts down completely. When the computer is turned back on, it restores the previously saved state, allowing the user to resume their work from where they left off. This sleep mode is particularly useful for laptops and other portable devices as it helps conserve battery life while still allowing quick access to the system.
32.
Which of the following can occur if the power cable runs along with the computer network cable?
Correct Answer
A. EMI
Explanation
If the power cable runs along with the computer network cable, electromagnetic interference (EMI) can occur. EMI is the disturbance caused by electromagnetic radiation from external sources that can interfere with the signals transmitted through the network cable. This interference can lead to data corruption, signal degradation, and communication errors. It is important to keep power cables and network cables separated to minimize the risk of EMI.
33.
Which of the following are types social engineering attacks? Choose two
Correct Answer(s)
A. An unauthorized person gains entrance to the building where the companys database server resides and accesses the server by pretending to be an employee
C. An unauthorized person calls a user to be a system adminstrator in order to get the users password
Explanation
The correct answer is "An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee" and "An unauthorized person calls a user to be a system administrator in order to get the user's password". These two scenarios describe social engineering attacks. In the first scenario, the attacker manipulates their way into the building by impersonating an employee, gaining physical access to the server. In the second scenario, the attacker tricks a user into believing they are a system administrator and convinces them to disclose their password. Both of these attacks exploit human vulnerabilities to gain unauthorized access to systems or information.
34.
Your customers Windows XP machine has become ususable due to some uknown cause. You want to put the computer into a working state again. What is the best way to do this?
Correct Answer
C. Use the Windows recovery console witht eh windows recovery CD to put the system back in a working state
Explanation
The best way to put the customer's Windows XP machine back into a working state is to use the Windows recovery console with the Windows recovery CD. This will allow the user to access advanced troubleshooting options and repair any system errors or issues that are causing the computer to be unusable. Reinstalling Windows or uninstalling new software may not address the underlying cause of the problem, while using the recovery console provides a more comprehensive solution.
35.
Which of the following terms refers to properitary software that is provided to users without payment on a trial basis and is often limited by any combination of functionality, vailability or convenice?
Correct Answer
B. Shareware
Explanation
Shareware refers to proprietary software that is provided to users without payment on a trial basis and is often limited by any combination of functionality, availability, or convenience.
36.
Which of the following buses has a maximum data transfer rate of 2400 Mbps?
Correct Answer
B. ESATA
Explanation
eSATA (External Serial ATA) is the correct answer because it has a maximum data transfer rate of 2400 Mbps. FireWire 800 has a maximum data transfer rate of 800 Mbps, USB 1.1 has a maximum data transfer rate of 12 Mbps, and USB 2.0 has a maximum data transfer rate of 480 Mbps. Therefore, eSATA is the only option that matches the given data transfer rate.
37.
Which of the following IPv6 address types is a single address that can be assigned to multiple interfaces?
Correct Answer
D. Anycast
Explanation
Anycast is the correct answer because it refers to a single IPv6 address that can be assigned to multiple interfaces. When a packet is sent to an anycast address, it is delivered to the nearest interface that is assigned that address. This allows for efficient routing and load balancing, as the network automatically directs traffic to the closest available interface. Anycast is commonly used for services such as DNS or content delivery networks, where multiple servers can provide the same service.
38.
Which of the following can be installed in an AGP slot?
Correct Answer
A. Video card
Explanation
An AGP slot is specifically designed to accommodate a video card. It provides a high-speed connection between the video card and the motherboard, allowing for efficient data transfer and improved graphics performance. Therefore, a video card is the correct answer as it is the only component listed that is compatible with an AGP slot. RAM, microprocessors, and modem cards are typically installed in different types of slots on a motherboard.
39.
At what voltage does a USB host supply power to the USB bus?
Correct Answer
B. 5 vots
Explanation
A USB host supplies power to the USB bus at a voltage of 5 volts. This is the standard voltage for USB power delivery and is used to power and charge various USB devices such as smartphones, tablets, and other peripherals. It is important to note that different USB versions may have different power delivery capabilities, but the most common and widely used voltage is 5 volts.
40.
Which of the following enables third pary developers to create capabilites to extend an application?
Correct Answer
A. Plug in
Explanation
A plug-in is a software component that adds specific features or functionality to an existing application. It allows third-party developers to create additional capabilities and extend the functionality of the application. By integrating a plug-in, developers can customize the application to meet their specific needs, enhancing its functionality and providing additional features that were not originally included. This enables the application to be more versatile and adaptable to different user requirements.
41.
Which of the following statements about multi or authentication is true?
Correct Answer
C. It involves two or more methods as part of the authentication process
Explanation
The correct answer is "it involves two or more methods as part of the authentication process". This means that multi-factor authentication requires the use of multiple methods or factors to verify the identity of a user. These factors can include something the user knows (such as a password), something the user has (such as a smart card), or something the user is (such as a fingerprint). By combining multiple factors, multi-factor authentication provides an extra layer of security compared to single-factor authentication methods.
42.
What is the difference between the USB 2.0 and IEEE 1394 bus standards?
Correct Answer
C. IEEE 1394 is slower than USB 2.0
Explanation
IEEE 1394 is slower than USB 2.0 because USB 2.0 has a higher data transfer rate compared to IEEE 1394. USB 2.0 has a maximum data transfer rate of 480 Mbps, while IEEE 1394 has a maximum data transfer rate of 400 Mbps. Therefore, USB 2.0 is faster in terms of data transfer speed.
43.
Which of the following devices provides input by analyzing printed text, handwriting, or an abject?
Correct Answer
B. Image Scanner
Explanation
An image scanner is a device that provides input by analyzing printed text, handwriting, or an object. It uses optical character recognition (OCR) technology to convert physical documents into digital images, allowing the text or images to be edited, stored, or transmitted electronically. This makes it a useful tool for tasks such as document scanning, data entry, and image editing. Unlike a webcam, which captures live video, or other devices listed, an image scanner specifically focuses on analyzing printed text, handwriting, or objects.
44.
Which fo the following substances are restricted under restriction of hazardous Substances (RoHS)?
Correct Answer(s)
A. Mercury(Hg)
B. Lead(Pb)
D. Cadmium(Cd)
Explanation
The substances that are restricted under the Restriction of Hazardous Substances (RoHS) are Mercury (Hg), Lead (Pb), and Cadmium (Cd). These substances are considered hazardous to the environment and human health. The RoHS directive aims to limit the use of these substances in electrical and electronic equipment to reduce their negative impact on the environment and human well-being. Iron (Fe) is not restricted under RoHS as it is not considered hazardous in the same way as the other substances mentioned.
45.
Which of the following statements about a riser card is true?
Correct Answer
D. It is used to extend slots for expansion cards.
Explanation
A riser card is a hardware component used to extend the slots for expansion cards in a computer. It allows additional expansion cards to be connected to the motherboard by raising them up vertically, providing more space for installation. This is particularly useful in compact computer cases where there is limited horizontal space for expansion cards. By using a riser card, users can add more functionality to their computer by connecting additional expansion cards such as graphics cards, sound cards, or network cards.
46.
Which of the following devices is used for accessing the data on Secure Digital SD card, MMC and CompactFlash(CF)?
Correct Answer
B. Memory card reader
Explanation
A memory card reader is used for accessing the data on Secure Digital SD card, MMC, and CompactFlash (CF). This device allows users to connect their memory cards to a computer or other device and transfer data between them. It provides a convenient way to access and transfer files, photos, videos, and other data stored on these types of memory cards.
47.
Which of the following can be used to accomplish authentication? Choose all that apply
Correct Answer(s)
A. Biometrics
C. Passwaord
D. Token
Explanation
Biometrics, password, and token can all be used to accomplish authentication. Biometrics refers to using unique physical or behavioral characteristics of an individual, such as fingerprints or facial recognition, to verify their identity. Passwords are a common method of authentication where users must enter a secret code or phrase known only to them. Tokens, such as smart cards or key fobs, provide an additional layer of authentication by generating one-time passwords or digital signatures. By choosing any combination of these methods, organizations can ensure secure access to their systems and data.
48.
Which of the following devices can cause great harm to ones life with lethal electric shocks? Choose two
Correct Answer(s)
A. SMPS
C. Monitor
Explanation
SMPS (Switched Mode Power Supply) and Monitor can cause great harm to one's life with lethal electric shocks. SMPS is responsible for converting the AC power from the wall outlet to the DC power required by the computer components. If not handled properly, it can deliver high voltage electric shocks. Similarly, monitors can store high levels of electrical charge which can be dangerous if mishandled. Floppy drives and keyboards, on the other hand, do not possess the same level of electrical risk.
49.
Which of the following ports on a computer are used to connect a keyboard? Choose two
Correct Answer(s)
A. USB
C. PS/2
Explanation
USB and PS/2 ports are used to connect a keyboard to a computer. USB (Universal Serial Bus) is a widely used port that allows for easy plug-and-play connectivity. It is the most common port for connecting peripherals, including keyboards. PS/2 (Personal System/2) is an older port specifically designed for connecting keyboards and mice. While it is less commonly used nowadays, some keyboards still utilize PS/2 connections. DB-25 and DB-9 ports are not typically used for connecting keyboards, but rather for other purposes such as serial or parallel communication.
50.
Which of the following features are related to power management? Choose two
Correct Answer(s)
B. Hibernate mode
C. Standy mode
Explanation
Hibernate mode and Standby mode are both related to power management. Hibernate mode allows the computer to save the current state and power off completely, while Standby mode allows the computer to enter a low-power state but still be quickly resumed. Both modes help to conserve power and extend battery life in laptops or reduce electricity usage in desktop computers. Hot plugging and Safe mode, on the other hand, are not directly related to power management. Hot plugging refers to the ability to connect or disconnect devices without rebooting, while Safe mode is a troubleshooting mode used to diagnose and fix software or driver issues.