1.
In Windows 2000/XP, which of the following is the filename created by Virtual Memory?
Correct Answer
D. PAGEFILE.SYS
Explanation
In Windows 2000/XP, the filename created by Virtual Memory is PAGEFILE.SYS. This file is used as a virtual memory extension when the physical memory is not sufficient to run all the active programs. It acts as a temporary storage space for data that cannot fit in the RAM, allowing the system to continue running smoothly.
2.
The amount of power output from a power supply is rated in?
Correct Answer
B. Watts
Explanation
The amount of power output from a power supply is rated in watts. Watts is the unit of power, which measures the rate at which work is done or energy is transferred. It is calculated by multiplying the voltage (measured in volts) by the current (measured in amperes). Therefore, watts is the correct unit for measuring the power output of a power supply.
3.
A technician opens a computer and observes that the computer is full of dust. Which of the following should the technician do to remove the dust from the system? (Select more than 1 option)
Correct Answer(s)
D. Use compressed air to remove the dust
E. Vacuum the dust out of the system
Explanation
The technician should use compressed air to remove the dust because it is an effective method to blow the dust out of the system. Additionally, vacuuming the dust out of the system is also a suitable option as it can help to remove the dust particles efficiently. Using a dust cloth or shaking the dust out may not be as effective in completely removing the dust from the computer.
4.
A technician is updating the video drivers on a Windows XP system and encounters a dialog box warning that the driver is unsigned. An unsigned driver means that the driver is -
Correct Answer
C. Has not been signed by the Windows Hardware Quality Lab
Explanation
An unsigned driver means that it has not been signed by the Windows Hardware Quality Lab. This lab is responsible for testing and certifying drivers to ensure they meet certain quality standards and are compatible with the Windows operating system. Without this certification, there is a risk that the driver may cause compatibility issues or instability on the system.
5.
In Windows 2000/XP, which of the following are valid commands that can be typed into the 'Run' dialog box to access the registry editor? (Select more than one option)
Correct Answer(s)
A. REGEDIT
B. REGEDT32
Explanation
The correct answers are REGEDIT and REGEDT32. These are valid commands that can be typed into the 'Run' dialog box in Windows 2000/XP to access the registry editor. The other options, REGISTY /EDIT, REG /EDIT, REG32 /EDIT, and REGEDIT32, are not valid commands for accessing the registry editor.
6.
After installing a new cable modem and new router, which of the following should be the order used to start up the devices?
Correct Answer
A. Turn on the cable modem, then the router, and then the computer
7.
Windows XP is being installed from a CD onto a computer that has no operating system. Which of the following installation methods would MOST likely be used?
Correct Answer
C. Attended
Explanation
Attended installation method is the most likely to be used when installing Windows XP from a CD onto a computer with no operating system. This method requires user interaction throughout the installation process, allowing the user to make choices and provide input when prompted. It is suitable for situations where customization and user preferences need to be considered during the installation.
8.
NTFS should be used for Windows XP rather than FAT32 because NTFS? (Select more than 1 option)
Correct Answer(s)
C. Gives a user more useable hard drive space
D. Allows Windows XP to use all available security features
Explanation
NTFS should be used for Windows XP rather than FAT32 because it gives a user more usable hard drive space and allows Windows XP to use all available security features. NTFS has a more efficient file allocation system compared to FAT32, allowing for better disk space utilization. Additionally, NTFS supports advanced security features such as file and folder permissions, encryption, and auditing, which are essential for maintaining data integrity and protecting sensitive information on a Windows XP system.
9.
Which of the following connections are found on video cards?
Correct Answer(s)
C. 15-pin D-shell
E. DVI
Explanation
The connections found on video cards are 15-pin D-shell and DVI. RS-232, DB-25, and RJ-45 are not typically found on video cards.
10.
A technician has installed a new video card and the computer will now only boot into VGA mode. Which of the
following may be the cause of the problem?
Correct Answer
B. The incorrect drivers are installed
Explanation
The incorrect drivers being installed can cause the computer to only boot into VGA mode. Drivers are software programs that allow the operating system to communicate with hardware devices, such as video cards. If the incorrect drivers are installed for the new video card, it may not be recognized or utilized properly by the operating system, resulting in the computer booting into VGA mode.
11.
You installed Windows NT Workstation 4.0 on your Windows 98 computer so that you can dual boot. After installation you try looking for data on your Windows 98 partition but cannot see it. What is the problem? The Windows 98 partition _______________ ?
Correct Answer
B. Is formatted with FAT32
Explanation
The problem is that the Windows 98 partition is formatted with FAT32. Windows NT Workstation 4.0 does not natively support the FAT32 file system, so it cannot read or access data from a partition formatted with FAT32.
12.
A client calls and tells you that while he was installing Windows 98 the system files could not be updated and the system hung. What should be disabled in order to install a system upgrade?
Correct Answer
B. Antivirus feature in the BIOS
Explanation
When installing a system upgrade, it is recommended to disable the antivirus feature in the BIOS. This is because the antivirus software may interfere with the installation process and prevent the system files from being updated, causing the system to hang. By disabling the antivirus feature, the installation can proceed without any interruptions from the antivirus software.
13.
A user is using multiple monitors in Windows 98 and states that a mouse can only be used with the primary monitor. The problem is that the user is in an MSDOS based program. How should the MSDOS program be run?
Correct Answer
D. In full screen mode
Explanation
In full screen mode, the MSDOS program takes over the entire screen, allowing the user to utilize the mouse on any monitor. This mode provides a seamless experience by hiding the Windows 98 interface and making the program appear as if it is running on its own dedicated system.
14.
What program is used to edit a text file when a PC starts at the command prompt only?
Correct Answer
D. Edit
Explanation
The program used to edit a text file when a PC starts at the command prompt only is "Edit". This program allows users to make changes to a text file directly from the command prompt without the need for a graphical user interface. It provides basic editing functionalities such as creating, modifying, and saving text files.
15.
Your antivirus software detects a boot sector virus. What is a valid option for removing the virus?
Correct Answer
C. Run fdisk /mbr
Explanation
Running fdisk /mbr is a valid option for removing a boot sector virus. Fdisk is a command-line utility used to manipulate disk partitions, and the /mbr parameter specifically targets the master boot record (MBR) of the hard drive. By running fdisk /mbr, the MBR will be rewritten, effectively removing the boot sector virus. This is a common method used to restore the MBR to its original state and eliminate any malicious code that may be present.
16.
What is a static IP address?
Correct Answer
D. A permanently assigned address
Explanation
A static IP address refers to a permanently assigned address. Unlike dynamic IP addresses that are assigned by a DHCP server and can change over time, a static IP address remains the same and is manually configured on a device. This type of address is often used for servers, network devices, or devices that require a consistent and predictable IP address for remote access or hosting services.
17.
How do most of FTP servers authenticate users?
Correct Answer
D. Individually
Explanation
Most FTP servers authenticate users individually, meaning that each user is required to provide their own unique credentials (such as a username and password) in order to access the server. This allows for better security and accountability, as each user is identified and authenticated separately. Anonymously, securely, and nominally are not common methods of authentication for FTP servers.
18.
What is the first step you should take to connect to a shared printer over your network?
Correct Answer
B. From the Control Panel choose connect to network printer
Explanation
To connect to a shared printer over your network, the first step you should take is to go to the Control Panel and choose the option "connect to network printer". This will allow you to search for and connect to the shared printer on your network.
19.
A customer use a Windows 98 machine with a 20BG hard drive formatted with FAT32 and tries to install an old DOS program but gets an error message that there is not enough space on the hard drive. According to the drive properties more than 12GB free space is remaining on the drive. What is wrong?
Correct Answer
B. The DOS program does not recognize a FAT32 partition
Explanation
The DOS program does not recognize a FAT32 partition. DOS programs typically only recognize and work with partitions that are formatted with the FAT16 file system. Since the customer's machine has a 20GB hard drive formatted with FAT32, the DOS program is unable to recognize the partition and incorrectly reports that there is not enough space on the hard drive.
20.
A Windows 95 user reports receiving a "Missing or Bad command.com" error after she modified the root directory. Where can a duplicate copy of command.com be found?
Correct Answer
B. C:\WINDOWS\COMMAND.COM
Explanation
After modifying the root directory, the user is receiving a "Missing or Bad command.com" error. The duplicate copy of command.com can be found in the C:\WINDOWS directory.
21.
What protocol can be used to transfer email from a UNIX server to another?
Correct Answer
D. SMTP
Explanation
SMTP (Simple Mail Transfer Protocol) is the correct answer because it is the standard protocol used for transferring email messages between servers. It is specifically designed for sending and receiving email over the internet and is widely supported by UNIX servers as well as other operating systems. FTP (File Transfer Protocol) is used for transferring files, POP3 (Post Office Protocol version 3) is used for retrieving email from a remote server, and SNMP (Simple Network Management Protocol) is used for managing and monitoring network devices, so they are not suitable for transferring email between servers.
22.
A small business customer has a 200-computer network connected with hubs and is reporting that the network is slow. An upgrade using which of the following could be suggested?
Correct Answer
B. Switches
Explanation
Switches could be suggested as an upgrade for the small business customer's slow network. Switches are more efficient than hubs as they create dedicated connections between devices, allowing for faster data transfer. By replacing the hubs with switches, the network's performance can be improved, resulting in a faster and more reliable connection for the customer's 200-computer network.
23.
Some protocols are considered to be technically non-routable. Which of the following statements best describes the most common reason why a protocol would be considered non-routable?
Correct Answer
D. It does not specify the Network layer addresses required by routers
Explanation
The most common reason why a protocol would be considered non-routable is that it does not specify the Network layer addresses required by routers. Routers rely on Network layer addresses to determine the appropriate path for forwarding packets. If a protocol does not provide this information, routers will not be able to route the packets correctly.
24.
What is the binary network ID of the loopback IP address?
Correct Answer
D. 1111111
Explanation
The loopback IP address is a special IP address used to test network connections on a local device. In binary, the loopback IP address is represented as 1111111. This address is reserved for the device itself and is often used to troubleshoot network issues or test network applications locally.
25.
You are the LAN administrator for your company and you have a couple of Windows 2000 Professional clients that dial in via PPP to the company network’s RAS server. You want the remote clients to be assigned dynamic IP addresses. You reserve a pool of class B addresses for these clients. Upon connecting, you find that the Windows 2000 computers are using a subnet mask of all 255s. What should you do?
Correct Answer
D. Dont do anything
26.
You are configuring a router. According to the manual, you will need a transceiver to connect to the LAN ports of the router. What kind of physical interface does the router have?
Correct Answer
C. AUI
Explanation
The correct answer is AUI. AUI stands for Attachment Unit Interface, which is a physical interface used to connect Ethernet devices, such as routers, to a network. It is commonly used for connecting devices to LAN ports and requires a transceiver for proper connection. MSAU, RJ-11, and BNC are not relevant physical interfaces for connecting to LAN ports of a router.
27.
How can a client on an NT TCP/IP network see which remote hosts are currently connected using NBT?
Correct Answer
A. Use NBTSTAT
Explanation
NBTSTAT is a command-line tool that is used to troubleshoot NetBIOS name resolution problems. It can display the current NetBIOS over TCP/IP (NBT) connections, which allows a client on an NT TCP/IP network to see which remote hosts are currently connected. Therefore, using NBTSTAT is the correct way to view the connected remote hosts on an NT TCP/IP network.
28.
You are setting up a new Windows98 workstation on your network, and your DHCP server provides all of the normal TCP/IP configuration information. What must you do to configure the IP address on the workstation after you add the TCP/IP protocol?
Correct Answer
A. The DHCP option is enabled automatically, and the server will auto-configure everything
Explanation
When setting up a new Windows98 workstation on a network, after adding the TCP/IP protocol, the DHCP option is enabled automatically. This means that the DHCP server will provide all the necessary TCP/IP configuration information, including the IP address. Therefore, there is no need to manually configure the IP address on the workstation as the server will handle the auto-configuration process.
29.
Which of the following is considered a Network Attached Storage device?
Correct Answer
B. A file server with special software that is at a separate location from the departmental file server
Explanation
A file server with special software that is at a separate location from the departmental file server is considered a Network Attached Storage (NAS) device. NAS is a type of storage device that is dedicated to providing file-level data storage services to other devices on the network. It is typically a separate server that is connected to the network and provides centralized storage for multiple clients. The fact that it is located at a separate location from the departmental file server suggests that it is a NAS device that is used for remote or distributed storage purposes.
30.
Which of the following is NOT a connectionless protocol
Correct Answer
B. SPX
Explanation
SPX (Sequenced Packet Exchange) is a connection-oriented protocol used in Novell NetWare networks. It provides reliable and sequenced delivery of data packets, ensuring that they arrive in the correct order. On the other hand, IP (Internet Protocol), IPX (Internetwork Packet Exchange), and UDP (User Datagram Protocol) are all connectionless protocols. They do not establish a dedicated connection before transmitting data and do not guarantee the delivery or order of packets. Therefore, the correct answer is SPX, as it is the only option that is not a connectionless protocol.