1.
Step 1 - Talk to the customer
Step 2 - Document your work
Step 3 - Continue to gather information
Step 4 - Eliminate possibilities to find the problem
Step 5 - Test your results
2.
You are installing two hard disk drives which of the following possible combinations can be used? Each correct answer represnts a complete solution. Choose all that apply.
Correct Answer(s)
A. Install the second hard drive on the primary IDE controller. Designate one drive as Master and the other as Slave.
B. Install the second hard disk drice on the secondary IDE controller ensuring that the first hard disk drice is on primary IDE contoller. Designate but drives as Master.
Explanation
The correct answers are:
1) Install the second hard drive on the primary IDE controller. Designate one drive as Master and the other as Slave.
2) Install the second hard disk drive on the secondary IDE controller ensuring that the first hard disk drive is on the primary IDE controller. Designate both drives as Master.
In both of these configurations, each hard drive is connected to a separate IDE controller, ensuring that they don't interfere with each other. In the first configuration, the second hard drive is connected to the primary IDE controller, and the drives are designated as Master and Slave to differentiate between them. In the second configuration, the second hard drive is connected to the secondary IDE controller, and both drives are designated as Master.
3.
Which of the following maximum resolutions does the UXGA video technology supports?
Correct Answer
B. 1600 x 1200
Explanation
The UXGA video technology supports a maximum resolution of 1600 x 1200.
4.
Which of the following sleep modes is the most power hungry mode?
Correct Answer
A. S1
Explanation
S1 sleep mode is the most power hungry mode among the given options. In S1 sleep mode, also known as "Standby" or "Suspend to RAM," the computer enters a low-power state where the CPU and other components are powered down, but the RAM remains active. This allows for a quick wake-up time as the system can resume from where it left off. However, since the RAM still requires power to maintain its data, S1 mode consumes more power compared to other sleep modes like S2, S0, or S3.
5.
Which of the following switches of the XCOPY command copies the ownership and NTFS permissions on the files while copying the files?
Correct Answer
D. /o
Explanation
The correct answer is /o. The /o switch is used with the XCOPY command to copy the ownership and NTFS permissions of the files while copying them. This switch ensures that the copied files retain the same permissions and ownership as the original files.
6.
Which of the following statements about a smart card are true? Each correct Answer represents a complete solution. Choose two.
Correct Answer(s)
A. It is used to securely store public and private keys for a log on, e-mail signing and encryption, and file encryption.
D. It is a device that contains a microprocessor and permanent memory.
Explanation
A smart card is a device that contains a microprocessor and permanent memory, allowing it to store and process data. It is used to securely store public and private keys for various purposes such as log on, e-mail signing and encryption, and file encryption. This ensures that sensitive information is protected and can only be accessed by authorized individuals. Therefore, the given answer correctly states that a smart card is used for secure storage of keys and contains a microprocessor and permanent memory.
7.
Which of the following ports is also known as PS/2
Correct Answer
A. 6 - pin Mini-Din connector
Explanation
The correct answer is 6-pin Mini-Din connector. This connector is commonly used for connecting keyboards and mice to computers. It is also known as the PS/2 port because it was originally introduced by IBM for their Personal System/2 computers. The 6-pin Mini-Din connector has a round shape and is typically color-coded, with purple for keyboards and green for mice. It has been largely replaced by USB connectors in modern computers, but some older systems may still have PS/2 ports for compatibility with legacy devices.
8.
Which of the following statements are true about USB? Choose two
Correct Answer(s)
A. USB supports hot plugging
B. You can connect up to 127 peripHeral devices to a single USB port
Explanation
USB supports hot plugging, which means that you can connect and disconnect USB devices without having to restart the computer. This feature allows for easy and convenient use of USB devices. Additionally, you can connect up to 127 peripheral devices to a single USB port, making it a versatile and efficient way to connect multiple devices to a computer.
9.
Which of the following types of attacks is often performed by looking surreptitusly at the keyboard or monitor of an employees computer?
Correct Answer
D. Shoulder surfing attack
Explanation
A shoulder surfing attack is a type of attack where an individual looks surreptitiously at the keyboard or monitor of an employee's computer. This allows the attacker to gather sensitive information such as passwords, login credentials, or confidential data. It is a form of social engineering that relies on the attacker's ability to physically observe the victim's actions. This type of attack can be easily executed in public places like coffee shops or airports, where individuals may be less cautious about protecting their screens or keyboards.
10.
You are responsible for tenchincal support at a company. One of the employees complains that his new laptop cannot connect to the company wireless network. You have verified that he is entering a valid password/ passkey. What is the problem?
Correct Answer
D. MAC filtering is blocking him
Explanation
The problem is that MAC filtering is blocking him. MAC filtering is a security feature that only allows devices with specific MAC addresses to connect to the network. Since the employee's new laptop is not on the approved list of MAC addresses, it is being blocked from connecting to the company wireless network.
11.
Which of the following is a technology that allows you to hear and watch video clips as soon as they start downloading from the web site, instead of waiting for the download to complete?
Correct Answer
B. Streaming Media
Explanation
Streaming media is the correct answer because it is a technology that enables users to hear and watch video clips while they are still being downloaded from a website. This eliminates the need to wait for the entire download to complete before accessing the content. Streaming media works by sending small portions of the video or audio file in a continuous stream, allowing users to start experiencing the content in real-time.
12.
Which of the following refers to the data rate supported by a network conncection or interface?
Correct Answer
A. Bandwidth
Explanation
Bandwidth refers to the data rate supported by a network connection or interface. It represents the maximum amount of data that can be transmitted over a network in a given amount of time. A higher bandwidth allows for faster data transfer and better performance.
13.
Which of the following are serial interfaces? Choos all that apply
Correct Answer(s)
B. USB
C. Firewire
Explanation
USB and Firewire are both examples of serial interfaces. Serial interfaces are communication interfaces that transmit data one bit at a time over a single wire or channel. USB (Universal Serial Bus) is a widely used interface for connecting devices such as keyboards, mice, and external storage devices to computers. Firewire (IEEE 1394) is another high-speed interface commonly used for connecting devices like digital cameras and external hard drives to computers. EPP and IEEE 1284, on the other hand, are parallel interfaces, which transmit multiple bits simultaneously over multiple wires or channels.
14.
Which of the following devics has its own BIOS?
Correct Answer
D. Video adapter
Explanation
A video adapter is a hardware device that is responsible for generating and outputting video signals to a display device. It has its own BIOS (Basic Input/Output System) which contains the necessary firmware to initialize and control the video adapter. The BIOS of a video adapter allows it to communicate with the computer's operating system and ensures proper functioning of the display. This BIOS is separate from the computer's main BIOS, which is responsible for initializing other hardware components.
15.
Which of the following are dual core processors? Choose two.
Correct Answer(s)
A. AMD Athlon(tm) 64 X2
C. Intel(r) Pentium(r) processor Extreme Ediditon
Explanation
The correct answer is AMD Athlon(tm) 64 X2 and Intel(r) Pentium(r) processor Extreme Edition. Both of these processors are dual core processors, meaning they have two separate processing units within a single chip. This allows for improved multitasking and performance compared to single core processors. The other options, Intel Pentium 4 and AMD Athlon(tm), are not dual core processors.
16.
Which of the following switches is used with XCOPY command to copy directories and subdirectoris, including empty directions?
Correct Answer
D. /e
Explanation
The correct answer is /e. This switch is used with the XCOPY command to copy directories and subdirectories, including empty directories. The /e switch ensures that all directories and subdirectories are copied during the process, even if they are empty. This is useful when you want to create an exact copy of a directory structure, including all empty directories within it.
17.
WHich of the following provides authentication, enryption and data integrity for wireless devices?
Correct Answer
D. WTLS
Explanation
WTLS (Wireless Transport Layer Security) provides authentication, encryption, and data integrity for wireless devices. It is a security protocol specifically designed for wireless communication, ensuring secure transmission of data over wireless networks. WTLS is similar to SSL (Secure Sockets Layer) and provides similar security features, such as encryption to protect data from unauthorized access, authentication to verify the identity of the communicating parties, and data integrity to ensure that the data remains unchanged during transmission. Therefore, WTLS is the correct answer for this question.
18.
Mark wants to connect a printer and mouse to his laptop. Which of the following is the best wireless technology to use?
Correct Answer
A. Bluetooth
Explanation
Bluetooth is the best wireless technology to use for connecting a printer and mouse to a laptop. Bluetooth is a widely supported wireless technology that allows for easy and seamless connections between devices. It has a decent range and is capable of transmitting data at a high speed, making it suitable for connecting peripherals like printers and mice to a laptop. Additionally, Bluetooth is energy-efficient, which helps to conserve battery life on both the laptop and the connected devices.
19.
What is the mazimum resolution that the WUXGA video technology supports?
Correct Answer
B. 1920 x 1200
Explanation
WUXGA video technology supports a maximum resolution of 1920 x 1200. This means that the technology can display images or videos with a width of 1920 pixels and a height of 1200 pixels.
20.
What does Wireless transport layer security (WTLS) provide for wireless devices? Choose all that apply
Correct Answer(s)
A. Data integnity
B. Encryption
D. Authentication
Explanation
WTLS provides data integrity, encryption, and authentication for wireless devices. Data integrity ensures that the data transmitted over the wireless network remains intact and has not been tampered with. Encryption ensures that the data is secured and cannot be accessed by unauthorized individuals. Authentication verifies the identity of the wireless devices and ensures that only authorized devices can access the network. Bandwidth, on the other hand, is not provided by WTLS.
21.
Which of the following software displays advertisements, whether or not the user has consented?
Correct Answer
D. Adware
Explanation
Adware is a type of software that displays advertisements on a user's device, regardless of whether or not the user has given consent. Unlike other software options listed, such as Trojan horse, Honeypot, and Spyware, Adware specifically focuses on generating revenue through advertising. It is designed to track user behavior and display targeted ads, often disrupting the user's browsing experience. Therefore, Adware is the correct answer to the question.
22.
Which of the following protocols transmits error messages and network statistics?
Correct Answer
A. ICMP
Explanation
ICMP (Internet Control Message Protocol) is the correct answer because it is specifically designed to transmit error messages and network statistics. ICMP is used by network devices to send error messages indicating issues such as unreachable hosts or network congestion. It is also used for network diagnostics and troubleshooting by providing information about network statistics like round-trip time and packet loss. DHCP (Dynamic Host Configuration Protocol) is responsible for assigning IP addresses, TCP (Transmission Control Protocol) is responsible for reliable data transmission, and NNTP (Network News Transfer Protocol) is used for distributing news articles.
23.
Which of the following power sources are used to power a laptop?
Correct Answer(s)
B. AC power
C. Battery
Explanation
Laptops can be powered using AC power and batteries. AC power refers to the electricity supplied through a power outlet, which is commonly used when the laptop is connected to a charger. On the other hand, laptops also have built-in batteries that can store electrical energy and provide power when the laptop is not connected to an outlet. These batteries can be recharged using AC power. Therefore, both AC power and batteries are used to power a laptop.
24.
Matk works as a Network admin. for NetTech inc. The network has 150 Windows 2000 professional client computers and four Windows 2000 servers. All the client computers are able to connect to the internet. Mark is concerned about malware infecting the client computers through the internet. What will Mark do to protect the client computers from malware? Choose two.
Correct Answer(s)
A. Educate users of the client computers about the problems arising due to malware
B. Educate users of the client computers to avoid malware
Explanation
Mark will educate the users about the problems arising due to malware and how to avoid it. This will help the users to be aware of the risks and take necessary precautions while browsing the internet, downloading files, or opening suspicious emails. By educating the users, Mark can reduce the chances of malware infecting the client computers and ensure that the users are actively involved in maintaining a secure network environment.
25.
You have a customer who wants to install Windows XP professional on her computer. What is the minimum amount of RAM she must have for this to work?
Correct Answer
B. 64 Megabytes
Explanation
Windows XP Professional requires a minimum of 64 Megabytes of RAM to function properly. This amount of memory is sufficient for the operating system to run basic tasks and applications. However, it is important to note that this is the minimum requirement, and for optimal performance, it is recommended to have more RAM installed.
26.
You are selecting RAM for a new PC. You are very concerned about making sure errors are handled. Which of the following types of RAM should you select?
Correct Answer
C. ECC RAM
Explanation
ECC RAM, or Error Correcting Code RAM, should be selected for the new PC to ensure that errors are handled properly. ECC RAM is designed to detect and correct errors that occur during data storage and retrieval. It uses additional bits to store error correction codes, allowing it to identify and fix single-bit errors and detect multi-bit errors. This makes ECC RAM more reliable and suitable for systems that require high data integrity, such as servers or workstations used for critical tasks.
27.
What is the maximum data transmission speed of IEE 802. 11b Wireless networks?
Correct Answer
D. 11 Mbps
Explanation
The maximum data transmission speed of IEEE 802.11b wireless networks is 11 Mbps. This standard, also known as Wi-Fi 1, was introduced in 1999 and operates in the 2.4 GHz frequency range. It provides a lower data rate compared to newer Wi-Fi standards such as 802.11g and 802.11n, but it still offers sufficient speed for basic internet browsing and email usage.
28.
Which of the following types of parental controls is used to limit access to the internet contents?
Correct Answer
A. Content filter control
Explanation
Content filter control is used to limit access to internet contents by blocking or filtering certain websites or types of content. It allows parents to restrict their children's access to inappropriate or harmful content, ensuring a safer internet experience. This type of parental control can be set up on devices or through internet service providers, and it helps parents to control and monitor the online activities of their children.
29.
Andrew has a personal computer. One morning, he starts his computer and hinds the following error message: "CMOS checksum failure. "What are the most likely causes of this error? Choose two
Correct Answer(s)
B. The CMOS battery has failed.
C. The CMOS chip has failed
Explanation
The error message "CMOS checksum failure" indicates that there is an issue with the CMOS (Complementary Metal-Oxide-Semiconductor) settings in Andrew's computer. The CMOS battery is responsible for maintaining these settings, so if it has failed, it can cause this error. Additionally, if the CMOS chip itself has failed, it can also result in a checksum failure. Therefore, the most likely causes of this error are a failed CMOS battery and a failed CMOS chip.
30.
What are the benefits of using Universal Serial bus 2.0 over legacy communication ports such as RS-232 and parallel ports? Choose all that apply
Correct Answer(s)
A. Easy configuration of hardware devices
B. Expansion
D. Speed
Explanation
USB 2.0 offers several benefits over legacy communication ports. Firstly, it allows for easy configuration of hardware devices, making it convenient to connect and use different peripherals. Secondly, it provides expansion capabilities, allowing users to connect multiple devices through hubs and extend the functionality of their system. Lastly, USB 2.0 offers faster data transfer speeds compared to RS-232 and parallel ports, ensuring efficient and quick communication between devices.
31.
Which of the following sleep modes is also known as Hibernation in Windows operating systems?
Correct Answer
C. S4
Explanation
S4 is the correct answer because it is the sleep mode that is also known as Hibernation in Windows operating systems. In this mode, the computer saves the current state of the system to the hard drive and then shuts down completely. When the computer is turned on again, it restores the previous state from the hard drive, allowing the user to resume their work from where they left off.
32.
Which of the following can occur if the power cable runs along with the computer network cable?
Correct Answer
A. EMI
Explanation
If the power cable runs along with the computer network cable, it can lead to Electromagnetic Interference (EMI). EMI occurs when the electrical signals from the power cable interfere with the signals from the network cable, causing distortion or disruption in the network communication. This can result in poor network performance, data errors, or even complete network failure. It is important to keep power cables and network cables separated to minimize the risk of EMI.
33.
Which of the following are types social engineering attacks? Choose two
Correct Answer(s)
A. An unauthorized person gains entrance to the building where the companys database server resides and accesses the server by pretending to be an employee
C. An unauthorized person calls a user to be a system adminstrator in order to get the users password
Explanation
The correct answer is "An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee" and "An unauthorized person calls a user to be a system administrator in order to get the user's password". These two scenarios describe social engineering attacks where the attacker manipulates human behavior and exploits trust to gain unauthorized access to systems or sensitive information. In the first scenario, the attacker uses impersonation to deceive the company's employees and gain physical access to the server. In the second scenario, the attacker uses social manipulation by pretending to be a system administrator to trick the user into revealing their password.
34.
Your customers Windows XP machine has become ususable due to some uknown cause. You want to put the computer into a working state again. What is the best way to do this?
Correct Answer
C. Use the Windows recovery console witht eh windows recovery CD to put the system back in a working state
Explanation
The best way to put the customer's Windows XP machine into a working state again is to use the Windows recovery console with the Windows recovery CD. This will allow the user to access advanced troubleshooting options and repair any system files or settings that may be causing the issue. Reinstalling Windows or uninstalling new software may not address the underlying problem, while using the recovery console provides a more targeted and effective solution.
35.
Which of the following terms refers to properitary software that is provided to users without payment on a trial basis and is often limited by any combination of functionality, vailability or convenice?
Correct Answer
B. Shareware
Explanation
Shareware refers to proprietary software that is provided to users without payment on a trial basis and is often limited by any combination of functionality, availability, or convenience.
36.
Which of the following buses has a maximum data transfer rate of 2400 Mbps?
Correct Answer
B. ESATA
Explanation
eSATA (External Serial Advanced Technology Attachment) has a maximum data transfer rate of 2400 Mbps. FireWire 800 has a maximum data transfer rate of 800 Mbps. USB 1.1 has a maximum data transfer rate of 12 Mbps. USB 2.0 has a maximum data transfer rate of 480 Mbps. Therefore, eSATA is the correct answer as it has the highest data transfer rate among the given options.
37.
Which of the following IPv6 address types is a single address that can be assigned to multiple interfaces?
Correct Answer
D. Anycast
Explanation
Anycast is a type of IPv6 address that can be assigned to multiple interfaces. When a packet is sent to an anycast address, it is delivered to the nearest interface that has been assigned that address. This allows for efficient routing and load balancing, as the packet is automatically directed to the closest available interface. Anycast addresses are commonly used for services that need to be highly available and distributed across multiple locations.
38.
Which of the following can be installed in an AGP slot?
Correct Answer
A. Video card
Explanation
An AGP slot is specifically designed to accommodate a video card. It provides a high-speed connection between the video card and the computer's motherboard, allowing for efficient data transfer and enhanced graphics performance. Therefore, a video card is the only option that can be installed in an AGP slot, making it the correct answer.
39.
At what voltage does a USB host supply power to the USB bus?
Correct Answer
B. 5 vots
Explanation
A USB host supplies power to the USB bus at a voltage of 5 volts. This is the standard voltage for USB power supply. It is important to maintain this voltage as it ensures compatibility and safe operation of USB devices. Higher voltages can cause damage to the devices, while lower voltages may not provide sufficient power for proper functioning. Therefore, 5 volts is the correct answer for the given question.
40.
Which of the following enables third pary developers to create capabilites to extend an application?
Correct Answer
A. Plug in
Explanation
A plug-in is a software component that allows third-party developers to extend the functionality of an application. It provides an interface for developers to add new features or modify existing ones without altering the core code of the application. By creating plug-ins, developers can enhance the application's capabilities and tailor it to meet specific user needs. This enables a more customizable and flexible experience for users, as they can choose the plug-ins that best suit their requirements.
41.
Which of the following statements about multi or authentication is true?
Correct Answer
C. It involves two or more methods as part of the authentication process
Explanation
Multi-factor authentication (MFA) is a security measure that involves using two or more methods for verifying a user's identity during the authentication process. This adds an extra layer of security as it requires the user to provide multiple pieces of evidence to prove their identity. By combining different authentication methods such as passwords, biometrics, tokens, or smart cards, MFA helps protect against unauthorized access and enhances the overall security of a system or application.
42.
What is the difference between the USB 2.0 and IEEE 1394 bus standards?
Correct Answer
C. IEEE 1394 is slower than USB 2.0
Explanation
The given correct answer states that IEEE 1394 is slower than USB 2.0. This means that in terms of data transfer speed, USB 2.0 is faster compared to IEEE 1394.
43.
Which of the following devices provides input by analyzing printed text, handwriting, or an abject?
Correct Answer
B. Image Scanner
Explanation
An image scanner is a device that provides input by analyzing printed text, handwriting, or an object. It uses optical character recognition (OCR) technology to convert physical documents or images into digital format. This allows the user to edit, store, or share the scanned information electronically. Unlike a webcam, which captures live video or images, an image scanner specifically focuses on converting physical documents into digital files. A packet analyzer is used for network analysis, and a BD-ROM drive is used for reading Blu-ray discs.
44.
Which fo the following substances are restricted under restriction of hazardous Substances (RoHS)?
Correct Answer(s)
A. Mercury(Hg)
B. Lead(Pb)
D. Cadmium(Cd)
Explanation
Mercury (Hg), lead (Pb), and cadmium (Cd) are restricted under the Restriction of Hazardous Substances (RoHS). These substances are known to be harmful and toxic to human health and the environment. RoHS is a directive that restricts the use of certain hazardous substances in electrical and electronic equipment to minimize their negative impact. By restricting the use of these substances, RoHS aims to promote the production of safer and more environmentally friendly products.
45.
Which of the following statements about a riser card is true?
Correct Answer
D. It is used to extend slots for expansion cards.
Explanation
A riser card is a hardware component used to extend the slots for expansion cards in a computer. It allows additional expansion cards to be connected vertically, providing more flexibility for adding peripherals or upgrading the system. This is different from the other options provided, as a riser card does not connect the computer to a network, add extra microprocessors, or provide extra memory for expansion cards.
46.
Which of the following devices is used for accessing the data on Secure Digital SD card, MMC and CompactFlash(CF)?
Correct Answer
B. Memory card reader
Explanation
A memory card reader is used for accessing the data on Secure Digital SD card, MMC, and CompactFlash (CF). This device allows users to transfer data from these types of memory cards to a computer or other devices, making it easier to access and manage the stored information.
47.
Which of the following can be used to accomplish authentication? Choose all that apply
Correct Answer(s)
A. Biometrics
C. Passwaord
D. Token
Explanation
Biometrics, password, and token can all be used to accomplish authentication. Biometrics refers to the use of unique physical or behavioral characteristics, such as fingerprints or facial recognition, to verify a person's identity. Passwords are commonly used to authenticate users by requiring them to enter a secret code or phrase. Tokens, such as smart cards or USB devices, can also be used to authenticate users by generating a unique code or providing a physical object that verifies their identity.
48.
Which of the following devices can cause great harm to ones life with lethal electric shocks? Choose two
Correct Answer(s)
A. SMPS
C. Monitor
Explanation
SMPS (Switched Mode Power Supply) and Monitor can cause great harm to one's life with lethal electric shocks. SMPS is responsible for converting and regulating the electrical power supply, and if not handled properly, it can deliver high voltage electric shocks. Similarly, a faulty or damaged monitor can also pose a risk of electric shock due to exposed wires or faulty insulation. Floppy drives and keyboards are not typically associated with delivering lethal electric shocks.
49.
Which of the following ports on a computer are used to connect a keyboard? Choose two
Correct Answer(s)
A. USB
C. PS/2
Explanation
USB and PS/2 are the correct answers because these ports are commonly used to connect keyboards to a computer. USB (Universal Serial Bus) ports are the most common and widely used ports for connecting peripherals, including keyboards. PS/2 ports, on the other hand, are older and less common but still found on some computers. PS/2 ports are specifically designed for connecting keyboards and mice. DB-25 and DB-9 are not used for connecting keyboards, but rather for other purposes such as serial communication or printer connections.
50.
Which of the following features are related to power management? Choose two
Correct Answer(s)
B. Hibernate mode
C. Standy mode
Explanation
Hibernate mode and Standby mode are both related to power management. Hibernate mode allows the computer to save the current state and power off completely, while Standby mode allows the computer to enter a low-power state where it can quickly resume operations. Both features help conserve power and extend battery life in laptops and other devices.