1.
You are installing two hard disk drives on a computer. Which of the following possible combinations can be used? Each correct answer represents a complete solution. Choose of that apply.
Correct Answer(s)
A. Install the second hard disk drive on the primary IQE Controller. Designate one drive as Master and the other as Slave
B. Install the second hard drive disk on the secondary IDE controller ensuring that the first drive is on primary IDE controller. Designate both drives as Master
Explanation
The correct answer is to install the second hard disk drive on the primary IQE Controller and designate one drive as Master and the other as Slave. This is because the primary IQE Controller is designed to handle multiple drives, with one drive being the Master and the other being the Slave. Additionally, installing the second hard drive disk on the secondary IDE controller and designating both drives as Master is also a correct solution. This is because the secondary IDE controller can also handle multiple drives, and designating both drives as Master allows them to be recognized and accessed by the computer.
2.
Which of the following maximum resolution does the UXGA video technology supports?
Correct Answer
B. 1600x1200
Explanation
The correct answer is 1600x1200. UXGA video technology supports a maximum resolution of 1600x1200.
3.
Which of the following sleep mode is the most power hungry mode?
Correct Answer
A. S1
Explanation
S1 sleep mode is the most power hungry mode because it is a fully powered state where the CPU and other components are still running, consuming a significant amount of power. In this mode, the system is idle but ready to respond quickly to any input or task, resulting in higher power consumption compared to the other sleep modes. S2, S0, and S3 sleep modes are all lower power states with varying levels of power consumption and responsiveness.
4.
Which of the following switches of the XCOPY command copies the ownership and HTPS permissions on files while copying the files?
Correct Answer
D. /o
Explanation
The /o switch of the XCOPY command is used to copy the ownership and HTPS (Hidden, System, Archive, and Read-only) permissions on files while copying them. This switch ensures that the copied files retain the same ownership and permissions as the original files.
5.
Fives Steps to troubleshoot Effectively
Talk to the Customer*
Continue to gather information*
Elimate possibilities to find the problem*
Test your results*
Document your work*
Correct Order
Talk to the Customer
Continue to gather information
Elimante possibilites to find the problem
Test your results
Document your work
6.
Which of the folloowing statements about a smart card are true? Each correct Answer represents a complete solution. Choose Two.
Correct Answer(s)
A. It is used to securely store public and private keys for log on, e-email signing and encryption, and file encryption
D. It is a device that contains a microprocessor and permanent memory
Explanation
A smart card is a device that contains a microprocessor and permanent memory, allowing it to store and process data. It is commonly used to securely store public and private keys for various purposes such as log on, e-mail signing and encryption, and file encryption. This makes it a reliable solution for authentication and security purposes.
7.
Which of the following ports is also known as PS/2
Correct Answer
A. 6-Pin Mini-Din Connector
Explanation
The 6-Pin Mini-Din Connector is also known as PS/2. This port is commonly used to connect keyboards and mice to computers. The PS/2 interface was widely used before the introduction of USB, and it uses a 6-pin Mini-Din Connector for connecting peripherals.
8.
Which of the following statements are true about Universal Serial Bus (USB)?
Each correct Answer represents a complete solution. Choose Two.
Correct Answer(s)
A. USB supports hot plugging
B. You can connect up to 127 peripHeral devices to a single USB port
Explanation
USB supports hot plugging, which means that devices can be connected or disconnected from a USB port without the need to restart the computer. This is a convenient feature that allows for easy and quick device connectivity. Additionally, USB allows for the connection of up to 127 peripheral devices to a single USB port. This high number of connections makes USB a versatile and efficient option for connecting multiple devices to a computer.
9.
Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?
Correct Answer
D. Shoulder surfing attack
Explanation
A shoulder surfing attack is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer. This type of attack involves an individual trying to gain unauthorized access to sensitive information by visually observing the target's actions. The attacker may try to steal passwords, login credentials, or other confidential information by simply watching the victim's keystrokes or screen. This method is considered a form of social engineering, as it relies on human vulnerability rather than exploiting technical vulnerabilities in the system.
10.
You are responsible for technical supports at a company. One of the empployees complains that his new laptop cannot connect to the company wireless network. You have verified that he is entering a valid password/passkey. What is the most likely problem?
Correct Answer
D. MAC filtering is blocking him
Explanation
The most likely problem is that MAC filtering is blocking him. MAC filtering is a security measure that allows or blocks devices from connecting to a network based on their MAC address. If the employee's laptop is not added to the allowed list of MAC addresses, it would be blocked from connecting to the company wireless network even if the password/passkey is valid.
11.
Which of the following is a technology that allows you to hear and watch video clips as soon as they start downloading from the web site, instead of waiting for the download to complete?
Correct Answer
B. Streaming Media
Explanation
Streaming media is a technology that allows users to hear and watch video clips as soon as they start downloading from a website, instead of waiting for the download to complete. This technology enables the continuous delivery of audio and video content over the internet, allowing users to access and enjoy multimedia content in real-time without the need for complete downloading. Unlike other options listed, such as Session Initiation Protocol (SIP), HTTP Streaming, and Slipstreaming, streaming media specifically addresses the described functionality of starting playback before the download is finished.
12.
Which of the following refers to the data supported by a network connection or interface?
Correct Answer
A. Bandwidth
Explanation
Bandwidth refers to the data supported by a network connection or interface. It is the maximum amount of data that can be transmitted over a network connection in a given amount of time. Bandwidth is typically measured in bits per second (bps) and determines the speed and capacity of a network connection. It is an important factor in determining the efficiency and performance of a network.
13.
Which of the following are serial interfaces?
Each correct answer represents a complete solution. Choose all that apply.
Correct Answer(s)
B. USB
C. Firewire
Explanation
USB and Firewire are both examples of serial interfaces. USB (Universal Serial Bus) is a common interface used for connecting various devices to a computer, such as keyboards, mice, and external storage devices. Firewire (also known as IEEE 1394) is another serial interface that is commonly used for connecting audio/video equipment and external hard drives to a computer. EPP (Enhanced Parallel Port) and IEEE 1284 are examples of parallel interfaces, not serial interfaces.
14.
Which of the following devices has its own BIOS?
Correct Answer
D. Video Adapter
Explanation
A video adapter, also known as a graphics card, has its own BIOS. The BIOS (Basic Input/Output System) is a firmware that initializes the hardware components of a computer system. In the case of a video adapter, the BIOS is responsible for initializing and configuring the graphics card, allowing it to communicate with the computer's operating system and display output on the monitor. The BIOS of a video adapter contains settings and options that can be modified to optimize the graphics card's performance.
15.
Which of the following are dual core processors?
Each correct answer represents a complete solution. Choose Two
Correct Answer(s)
A. AMD Athlon(TM) 64 X2
C. Intel(r)Pentium(r)Processor Extreme Edition
Explanation
The AMD Athlon(TM) 64 X2 and Intel(r) Pentium(r) Processor Extreme Edition are both dual core processors. The AMD Athlon(TM) 64 X2 is a dual core processor from AMD, while the Intel(r) Pentium(r) Processor Extreme Edition is a dual core processor from Intel. Both processors have two cores, allowing them to perform tasks more efficiently and handle multiple tasks simultaneously. The Intel Pentium 4 and AMD Athlon (tm) are not dual core processors, as they only have a single core.
16.
Which of the following switches is used with the XCOPY command to copy directories and subdirectories, including empty directories?
Correct Answer
D. /e
Explanation
The /e switch is used with the XCOPY command to copy directories and subdirectories, including empty directories. This switch ensures that all directories and subdirectories are copied during the process, even if they are empty.
17.
Which of the following provides authentication, encryption and data integrity for wireless devices?
Correct Answer
D. WTLS
Explanation
WTLS (Wireless Transport Layer Security) provides authentication, encryption, and data integrity for wireless devices. WTLS is a security protocol specifically designed for wireless communication, ensuring secure transmission of data over wireless networks. It offers authentication to verify the identities of the communicating parties, encryption to protect the confidentiality of the data being transmitted, and data integrity to ensure that the data has not been tampered with during transmission. WTLS is commonly used in mobile devices and wireless applications to ensure secure communication and protect sensitive information.
18.
Mark wants to connect a printer and mouse to his laptop. Which of the following is the best wireless technology to use?
Correct Answer
A. Bluetooth
Explanation
Bluetooth is the best wireless technology to use for connecting a printer and mouse to a laptop. Bluetooth is a widely supported technology that allows for easy and seamless connections between devices. It has a decent range and offers good data transfer speeds, making it suitable for connecting peripherals like printers and mice to laptops. Additionally, Bluetooth is energy-efficient, which helps conserve battery life on both the laptop and the connected devices.
19.
What is the maximum resolution that the WUXGA video technology supports?
Correct Answer
B. 1920 x 1200
Explanation
WUXGA video technology supports a maximum resolution of 1920 x 1200. This resolution refers to the number of pixels that can be displayed horizontally and vertically on a screen. WUXGA stands for Wide Ultra Extended Graphics Array, and it is commonly used in computer monitors and projectors. This resolution provides a high level of detail and clarity, making it suitable for tasks that require precise visuals, such as graphic design or video editing.
20.
What does Wireless Transport Layer Security (WTLS) provide for wireless devices?
Each correct Answer represents a complete solution. Choose all that apply.
Correct Answer(s)
A. Data integrity
B. Encryption
D. Authentication
Explanation
Wireless Transport Layer Security (WTLS) provides data integrity, encryption, and authentication for wireless devices. Data integrity ensures that the data remains intact and has not been tampered with during transmission. Encryption ensures that the data is encrypted and can only be decrypted by authorized parties, protecting it from unauthorized access. Authentication verifies the identity of the communicating parties, ensuring that only trusted devices can access the network. Bandwidth, on the other hand, is not provided by WTLS and is not relevant to its security features.
21.
Which of the following software displays advertisements, whether or not the user has consented?
Correct Answer
D. Adware
Explanation
Adware is a type of software that displays advertisements, regardless of whether the user has given consent or not. Unlike other types of software mentioned in the question, such as Trojan Horse, Honeypot, and Spyware, which have different purposes, adware specifically focuses on delivering advertisements to users. This can be in the form of pop-up ads, banners, or even redirecting web pages. Adware is often bundled with other software and installed without the user's knowledge or explicit consent, making it an intrusive and unwanted form of software.
22.
Which of the following protocols transmits error messages and network statistics?
Correct Answer
A. ICMP
Explanation
ICMP (Internet Control Message Protocol) is the correct answer because it is specifically designed to transmit error messages and network statistics. ICMP is used by network devices to send error messages, such as "destination unreachable" or "time exceeded," back to the source IP address. It is also used for network diagnostics and troubleshooting, providing information about network connectivity, latency, and other statistics. DHCP (Dynamic Host Configuration Protocol) is responsible for assigning IP addresses to devices on a network. TCP (Transmission Control Protocol) is responsible for establishing reliable connections between devices. NNTP (Network News Transfer Protocol) is used for distributing, querying, and retrieving news articles.