1.
One of the customers has a disability that limits his working with both hands. You want to enable the accessibility feature on his Windows XP computer that will allow him to type using a virtual keyboard. What accessibility will you ask the user to enable?
Correct Answer
C. On Screen Keyboard
Explanation
The correct accessibility feature that should be enabled for the customer with a disability that limits his working with both hands is the On Screen Keyboard. This feature provides a virtual keyboard on the computer screen that can be operated using a mouse or other pointing device, allowing the user to type without the need for physical keyboard input.
2.
Which of the following files is used to resolve web site names (FQDN) to IP addresses in a Windows XP based computer when a WINS server is unavailable?
Correct Answer
C. HOSTS
Explanation
The HOSTS file is used to resolve web site names (FQDN) to IP addresses in a Windows XP based computer when a WINS server is unavailable. This file is a local text file that contains mappings of IP addresses to host names. When a user enters a web site name, the computer first checks the HOSTS file to see if there is a corresponding IP address. If there is, it uses that IP address to connect to the website. If not, it will then try to resolve the name using other methods such as DNS.
3.
What performs all cryptographic operations in Windows XP?
Correct Answer
B. CryptoAPI
Explanation
CryptoAPI performs all cryptographic operations in Windows XP. It is a set of programming interfaces that allows developers to add security features such as encryption, decryption, and digital signatures to their applications. CryptoAPI provides a consistent interface for accessing cryptographic services, including symmetric and asymmetric encryption algorithms, hashing algorithms, and key management. It also supports various cryptographic protocols and standards, making it a comprehensive solution for cryptographic operations in Windows XP.
4.
A user reports that he has lost his Windows XP CD however he had earlier taken the backup of the Windows XP Home CD on one of the partitions of his computer. He also informs that the partitions on the hard drive are FAT 32. The customer has windows ME boot disk and wishes to do a parallel install. What will you advise the customer to do?
Correct Answer
C. Boot with the Windows Me CD and run winnt.exe from the XP backup
Explanation
The customer should be advised to boot with the Windows Me CD and run winnt.exe from the XP backup. Since the customer has lost his Windows XP CD, using the backup on one of the partitions is the best option. Additionally, since the partitions on the hard drive are FAT 32, it is compatible with both Windows Me and Windows XP. Running winnt.exe from the XP backup will allow the customer to perform a parallel install of Windows XP.
5.
A customer gets the error "Error Getting Network Address (11002)" or "Error Getting Network Address (11004)" when he tries to check or send mail using Eudora. How will locate the cause of the issue
Correct Answer
A. Incorrect POP3 or SMTP server settings
Explanation
If a customer is getting the error "Error Getting Network Address (11002)" or "Error Getting Network Address (11004)" when trying to check or send mail using Eudora, the most likely cause of the issue is incorrect POP3 or SMTP server settings. This means that the customer has not entered the correct server information for their email account in Eudora. By verifying and correcting the POP3 and SMTP server settings, the issue should be resolved.
6.
While trying to uninstall Norton Antivirus on a Windows XP based computer, you get a message - Error 1719. The Windows Installer service could not be accessed. What would be one of the basic steps we would perform to troubleshoot this issue?
Correct Answer
B. Re-Register the Windows Installer
Explanation
To troubleshoot the "Error 1719" message and resolve the issue, one of the basic steps would be to re-register the Windows Installer. Re-registering the Windows Installer can help fix any issues with its configuration or registration, allowing it to be accessed properly. This can be done by opening the command prompt as an administrator and running the command "msiexec /unregister" followed by "msiexec /regserver". This will unregister and then re-register the Windows Installer, potentially resolving the problem.
7.
You are in charge of managing migration of user state data from existing Windows 2000 Professional computers to recently purchased Windows XP Professional computers. Which of the following is the migration tool?
Correct Answer
A. Fastwiz.exe
Explanation
Fastwiz.exe is the migration tool in this scenario. Fastwiz.exe is a utility that allows for the migration of user state data from one computer to another. It is specifically designed for migrating user state data from Windows 2000 Professional computers to Windows XP Professional computers. Sysprep is a tool used for preparing Windows installations for imaging and deployment, while Setupmgr is a tool used for creating answer files for unattended installations. Therefore, the correct answer is Fastwiz.exe.
8.
Creating Identities in Outlook Express is equivalent to creating what in Eudora?
Correct Answer
A. Personalities
Explanation
Creating Identities in Outlook Express is equivalent to creating Personalities in Eudora. Personalities in Eudora allow users to manage multiple email accounts and send emails from different identities. Similarly, Identities in Outlook Express enable users to manage multiple email accounts, each with its own settings, signatures, and email folders. Both features provide a convenient way to separate and organize emails from different accounts or personalities within the email client.
9.
Which of the following files can be downloaded from the Symantec site in order to remove the Norton antivirus 2003 and earlier versions
Correct Answer
B. Rnav2003.exe
Explanation
Rnav2003.exe is the correct answer because it is a file that can be downloaded from the Symantec site specifically for the purpose of removing Norton antivirus 2003 and earlier versions. The other files listed are not specifically designed for this purpose.
10.
You are trying to maximize your system resources to make your computer start faster. When you open the Windows System Configuration Utility to check which programs are loading at startup, you see a file called ccApp.exe. You want to know what will happen if you uncheck the program to stop it from loading on startup.
Correct Answer
B. CcApp is an important part of the protection that Norton AntiVirus or Norton Internet Security provides and should not be disabled at startup
Explanation
Disabling ccApp.exe from loading at startup will prevent Norton AntiVirus or Norton Internet Security from functioning properly as ccApp.exe is an important component of these security programs. It is not a spyware, virus, or malware, but a legitimate program necessary for the proper functioning of Norton security software.
11.
Which of the following run line command can be used to open Excel in safe mode:
Correct Answer
B. Excel /safe
Explanation
The correct answer is "Excel /safe" because the /safe command line switch is used to start Excel in safe mode. Safe mode allows Excel to start without loading any add-ins or customization files, which can help troubleshoot issues caused by these elements.
12.
Which of the following dictionary file is used to store the words added by users in MS Word:
Correct Answer
B. • Custom.dic
Explanation
The correct answer is "Custom.dic". In MS Word, the "Custom.dic" dictionary file is used to store the words added by users. This file allows users to personalize their spell check by adding new words to the dictionary. It is separate from the default dictionary files and can be customized according to the user's preferences.
13.
Launch command for Outlook Express from run window is:
Correct Answer
A. Msimn
Explanation
The launch command for Outlook Express from the run window is "Msimn".
14.
What is a GPF?
Correct Answer
C. A Windows General Protection Fault
Explanation
The correct answer is "A Windows General Protection Fault." A GPF, or General Protection Fault, is an error that occurs in the Windows operating system when a program tries to access a protected memory location. It is a type of software exception that can cause the program to crash or freeze. This answer is correct because it accurately describes what a GPF is in the context of Windows operating systems.
15.
An external modem connects to a PC via:
Correct Answer
D. Either B or C above
Explanation
An external modem can connect to a PC via either a serial port or a USB port. Both of these ports can be used to establish a connection between the modem and the PC. The choice between the two would depend on the specific hardware and connectivity options available on the PC.
16.
What is the command to install recovery console on a computer? (Assume x: is the CD drive)
Correct Answer
D. X:\i386\winnt32.exe /cmdcons
Explanation
The correct answer is x:\i386\winnt32.exe /cmdcons. This command is used to install the recovery console on a computer. The "/cmdcons" parameter specifies that the command console should be installed. The "x:\i386\winnt32.exe" is the path to the installation file for the recovery console.
17.
Customer calls and says that whenever he right clicks on a File/Folder and clicks on delete, it does not go into the Recycle Bin, but gets permanently deleted. What will you do to fix this problem for the customer?
Correct Answer
C. Right click on Recycle Bin, select Properties, and uncheck
Explanation
The correct answer is to right click on Recycle Bin, select Properties, and uncheck. By unchecking the option, the files and folders will no longer get permanently deleted when the customer right clicks and selects delete. Instead, they will be sent to the Recycle Bin where they can be restored if needed.
18.
Before you can use any PC for a dial-up connection, what must be installed and configured on the PC?
Correct Answer
D. Modem
Explanation
In order to establish a dial-up connection on a PC, a modem must be installed and configured. A modem is a hardware device that allows the computer to transmit and receive data over telephone lines. It converts the digital signals from the computer into analog signals that can be transmitted over the phone line, and vice versa. Without a modem, the PC would not be able to establish a connection with the dial-up network.
19.
Which uses tunneling?
Correct Answer
C. VPN
Explanation
A VPN (Virtual Private Network) uses tunneling to create a secure and encrypted connection over a public network, such as the internet. Tunneling is the process of encapsulating data packets within other packets to ensure that the original data remains secure and private during transmission. By using tunneling, a VPN can establish a private and secure connection between remote users and a private network, allowing them to access resources and communicate securely over an untrusted network like the internet.
20.
You are a desktop support technician. A user calls & complains that till yesterday he was able to view his CD drive in My Computer. Now today when he turned his computer on he is not able to view the CD drive. What could be done to fix the problem?
Correct Answer
C. Open registry editor & delete the Upper & Lower filter keys.
Explanation
By opening the registry editor and deleting the Upper and Lower filter keys, it is possible to fix the problem with the CD drive not being visible in My Computer. The Upper and Lower filter keys are registry entries that can sometimes cause issues with CD/DVD drives. By removing these keys, it can resolve any conflicts or errors that may be preventing the CD drive from being recognized by the operating system.
21.
You are using Norton 360 and unable to browse a few websites. What could be the reason to this?
Correct Answer
C. Check the firewall settings of Norton
Explanation
The reason for being unable to browse a few websites while using Norton 360 could be that the firewall settings of Norton are blocking access to those specific websites.
22.
Host Not Found (11001) when you try to check or send mail in Eudora. The first step of troubleshooting should be?
Correct Answer
D. Go to Tools: Options: Getting Started. Verify your settings, especially-login name, Mail Server (Incoming), SMTP Server (Outgoing)
Explanation
The correct answer is to go to Tools: Options: Getting Started and verify the settings, especially the login name, Mail Server (Incoming), and SMTP Server (Outgoing). This is because the error message "Host Not Found (11001)" suggests that there may be an issue with the server settings in Eudora. By checking and verifying these settings, it can help identify if there are any incorrect or missing configurations causing the error.
23.
Which Windows Vista application replaces the collaboration and application-sharing features previously available in Microsoft Windows NetMeeting?
Correct Answer
B. Windows Meeting Space
Explanation
Windows Meeting Space is the correct answer because it is the Windows Vista application that replaces the collaboration and application-sharing features previously available in Microsoft Windows NetMeeting. Windows Easy Transfer is used for transferring files and settings from one computer to another. Windows Calendar is a calendar application, and Windows Online Meeting is not a known Windows Vista application.
24.
Which feature of Microsoft Internet Explorer 7 is available only when it is used with Windows Vista?
Correct Answer
A. Running in Protected Mode
Explanation
Running in Protected Mode is a feature of Microsoft Internet Explorer 7 that is available only when it is used with Windows Vista. This feature enhances the security of the browser by isolating it from the rest of the operating system. It prevents malicious software from accessing system files and settings, providing a safer browsing experience for the user.
25.
Which feature in Windows Vista can users enable to visually indicate network activity?
Correct Answer
C. The logical network map in the Network and Sharing Center
Explanation
The logical network map in the Network and Sharing Center is the feature in Windows Vista that users can enable to visually indicate network activity. This feature provides a graphical representation of the network connections and displays the activity on each connection, allowing users to easily see if there is any network activity happening. It helps users monitor their network connections and identify any issues or disruptions in the network.
26.
You are unable to browse the internet and in the network properties, you find that both IPv6 and IPv4 are enabled. What would you try to fix the internet issue?
Correct Answer
A. Disable IPv6 and let IPv4 be enabled.
Explanation
Enabling both IPv6 and IPv4 can sometimes cause conflicts and connectivity issues. By disabling IPv6 and leaving IPv4 enabled, it allows the device to prioritize IPv4 for internet connectivity. This can help resolve the internet issue and ensure a stable connection.
27.
A program that was compatible with Windows XP is not able to execute properly in vista. It is asking for some compatibility mode. What would you do to fix it?
Correct Answer
C. Use the program compatibility wizard and select the option “use an older program with this version of Windows”
Explanation
If a program that was compatible with Windows XP is not able to execute properly in Vista and is asking for compatibility mode, the best solution would be to use the program compatibility wizard and select the option "use an older program with this version of Windows." This option allows the program to run in a compatibility mode that emulates the environment of an older version of Windows, in this case, Windows XP. This can help resolve any compatibility issues and allow the program to run properly in Vista.
28.
How would you troubleshoot the error "Windows Setup cannot locate a valid hard drive to store temporary installation files." that you might face during installation?
Correct Answer
C. Make sure that all the hard disk drives on your computer either have unallocated disk space or contain partitions that have drive letters assigned to them.
Explanation
This answer is correct because it provides a solution to the error message. It suggests checking the hard disk drives on the computer to ensure that they either have unallocated disk space or contain partitions with drive letters assigned to them. This is important because if the hard drives do not meet these criteria, the Windows Setup will not be able to locate a valid hard drive to store temporary installation files.
29.
How would you troubleshoot the following error “Windows is unable to find a system volume which meets its criteria for installation”?
Correct Answer
D. Remove any USB device attached to the system.
Explanation
The error message "Windows is unable to find a system volume which meets its criteria for installation" indicates that there is an issue with the system volume that Windows needs to install. One possible cause of this error is the presence of a USB device attached to the system. Removing any USB device attached to the system can resolve this issue by ensuring that Windows can properly detect and install on the system volume.
30.
You get the following error at startup of Vista "Windows has blocked some startup programs" how would you troubleshoot this issue?
Correct Answer
D. Both a & b
Explanation
To troubleshoot the issue of "Windows has blocked some startup programs" error at startup of Vista, you can try disabling UAC (User Account Control) and then restart the computer. This can help determine if UAC is causing the problem. Additionally, you can remove any unwanted startup programs permanently, as they might be triggering the error. By doing both a and b, you cover multiple potential causes of the issue and increase the chances of resolving it.
31.
What is Windows Vista complete Pc backup and restore?
Correct Answer
C. It is an image-based backup tool that will help you to recover your entire system.
Explanation
Windows Vista complete PC backup and restore is an image-based backup tool that allows users to create a backup of their entire system. This means that it creates a snapshot of the entire operating system, including all files, settings, and programs. In the event of a system failure or data loss, users can use this backup to restore their entire system to its previous state. It is different from system restore, which only restores system files and settings, and also different from the Files and Settings Transfer Wizard, which only transfers files and settings to a new computer.
32.
You suspect your system is failing to boot because of a corrupt master boot record. Which utility is the best to fix this?
Correct Answer
D. Recovery Console
Explanation
The Recovery Console is the best utility to fix a corrupt master boot record. The Recovery Console is a command-line tool available in Windows operating systems that allows users to perform advanced troubleshooting and repair tasks, including fixing boot-related issues. It provides access to various system recovery options and allows users to manually repair the master boot record, which is responsible for loading the operating system. By using the Recovery Console, users can restore the master boot record to its original state and resolve booting problems caused by corruption.
33.
What command should you run to check and fix corrupt system files, DLLs, and other critical files?
Correct Answer
B. SFC /SCANNOW
Explanation
The correct answer is "SFC /SCANNOW." The SFC (System File Checker) command is used to scan and repair corrupt system files, DLLs, and other critical files in Windows. Running this command will check the integrity of these files and replace any corrupt or missing ones with a cached copy stored in a compressed folder at %WinDir%\System32\dllcache. This helps to ensure the stability and proper functioning of the operating system.
34.
You get a tech call from a distraught Windows XP user who can’t get into Windows. He says he has a Recover CD from the manufacturer and plans to run it. What would you suggest?
Correct Answer
C. Try to get the computer to boot into Safe Mode.
Explanation
Trying to get the computer to boot into Safe Mode is suggested because it is a troubleshooting step that can help identify and resolve any issues that may be preventing the user from accessing Windows. Running the Recover CD may restore or return the system to factory settings, but it may also result in data loss. Reinstalling Windows using a Windows XP disc is not necessary at this stage and may be a more drastic solution.
35.
What are the main operating system files required for a successful boot of Windows 2000/XP?
Correct Answer
C. NTLDR, NTDETECT.COM, BOOT.INI
Explanation
The main operating system files required for a successful boot of Windows 2000/XP are NTLDR, NTDETECT.COM, and BOOT.INI. NTLDR (NT Loader) is responsible for loading the operating system kernel and starting the boot process. NTDETECT.COM is used to detect hardware devices during the boot process. BOOT.INI is a configuration file that contains information about the operating systems installed on the computer and their boot options. These three files work together to initiate and configure the boot process for Windows 2000/XP.
36.
Which statement is true about starting the Recovery Console?
Correct Answer
A. It can be installed as an advanced startup option, or started from the installation CD.
Explanation
The Recovery Console can be accessed in two ways: it can be installed as an advanced startup option, or it can be started from the installation CD. This means that users have the flexibility to choose how they want to access the Recovery Console, depending on their specific needs and preferences. They can either install it as an advanced startup option, which allows them to access it directly from the boot menu, or they can start it from the installation CD if they prefer. This flexibility ensures that users can easily access the Recovery Console when needed, regardless of their system setup.
37.
Which of the following is not possible with the Recovery Console?
Correct Answer
D. Retrieve a forgotten administrative password
Explanation
The Recovery Console is a feature in Windows that allows users to repair their computer in the event of a system failure. It provides various tools and commands to troubleshoot and fix issues. However, one thing that is not possible with the Recovery Console is retrieving a forgotten administrative password. The Recovery Console does not have the capability to recover or reset passwords. This task requires separate tools or methods, such as using password reset disks or third-party software.
38.
What are the proper steps for repairing a Windows XP system with an Emergency Repair Disk?
Correct Answer
D. You cannot use an ERD with Windows XP.
39.
Your computer freezes on the Windows startup screen during boot. What is the most likely cause of the problem?
Correct Answer
D. Error in BOOT.INI
Explanation
The most likely cause of the computer freezing on the Windows startup screen is an error in the BOOT.INI file. The BOOT.INI file is responsible for loading the operating system, and if it is corrupt or contains errors, it can prevent the computer from properly starting up. This can result in the computer freezing on the startup screen.
40.
What is the best way to replace a corrupted Registry with an earlier, good version?
Correct Answer
D. Boot from the installation CD and perform an upgrade install.
Explanation
The best way to replace a corrupted Registry with an earlier, good version is to boot from the installation CD and perform an upgrade install. This option allows for a fresh installation of the operating system while preserving user files and settings. It replaces the entire system, including the Registry, with a clean version from the installation CD. This ensures that any corruption or errors in the previous Registry are completely resolved.
41.
Which of these is the loop back address?
Correct Answer
A. 127.0.0.1
Explanation
The loop back address is used to test network connectivity on a local machine. In this case, the correct loop back address is 127.0.0.1. This address is reserved for the loop back interface, which allows a computer to send and receive data to itself. It is commonly used for troubleshooting network issues or testing network applications.
42.
What is SSL?
Correct Answer
C. Secured Socket Layer
Explanation
SSL stands for Secured Socket Layer. It is a protocol that provides secure communication over the internet. SSL ensures that the data transmitted between a web server and a browser remains encrypted and cannot be intercepted by unauthorized parties. It establishes a secure connection, authenticates the server, and encrypts the data being transmitted. SSL is commonly used to secure online transactions, such as credit card payments, online banking, and sensitive data transfers.
43.
To which of the OSI layers does Router belong?
Correct Answer
A. Network Layer
Explanation
Routers belong to the Network Layer of the OSI model. The Network Layer is responsible for routing and forwarding data packets between different networks. Routers use network layer protocols, such as IP (Internet Protocol), to determine the best path for data packets to reach their destination. They examine the destination IP address in the packet's header and make decisions based on routing tables to forward the packet to the next hop on the network. Routers also perform functions like network address translation (NAT) and firewalling to enhance network security.
44.
What is the Port number of HTTPS?
Correct Answer
B. 443
Explanation
HTTPS (Hypertext Transfer Protocol Secure) is a secure version of HTTP that uses encryption to protect the communication between a web browser and a web server. The port number 443 is the designated port for HTTPS. When a user accesses a website using HTTPS, the web browser establishes a secure connection with the server on port 443, ensuring that the data transmitted between them is encrypted and secure from unauthorized access.
45.
How can the operating system version that is currently running be found?
Correct Answer
A. Right click the My Computer icon and select Properties
Explanation
To find the operating system version that is currently running, you can right click the My Computer icon and select Properties. This will open a window displaying information about the computer, including the operating system version.
46.
Which of these is an Email client?
Correct Answer
C. All the above
Explanation
All the options given are examples of Email clients. Lotus Notes and Outlook Express are both popular email clients used for managing and sending emails. Therefore, "All the above" is the correct answer as it includes both Lotus Notes and Outlook Express.
47.
A router:
Correct Answer
A. Determines on which outgoing link a packet is to be forwarded.
Explanation
A router determines on which outgoing link a packet is to be forwarded. This is because routers are responsible for directing network traffic to its intended destination. When a packet arrives at a router, it examines the packet's destination address and uses its routing table to determine the appropriate outgoing link for the packet. The router then forwards the packet to that outgoing link, ensuring that it reaches its intended destination efficiently.
48.
The Internet is an example of a:
Correct Answer
B. Packet switched network.
Explanation
The Internet is an example of a packet switched network because it breaks data into small packets and sends them individually across the network. These packets can take different routes to reach their destination, and they are reassembled at the receiving end. This method allows for efficient use of network resources and enables data to be transmitted in a more flexible and reliable manner compared to circuit switched or cell switched networks.
49.
The TCP in TCP/IP stands for:
Correct Answer
D. Transmission Control Protocol
Explanation
The correct answer is Transmission Control Protocol. TCP is a core protocol of the Internet protocol suite and it provides reliable, ordered, and error-checked delivery of data between applications running on different hosts. It ensures that the data packets are transmitted in the correct order and without any errors. TCP is responsible for establishing and terminating connections between devices and it also handles flow control to prevent overwhelming the receiving device with too much data at once.
50.
Clock speed is measured in
Correct Answer
D. Hertz
Explanation
Clock speed is a measure of how fast a computer's processor can execute instructions. It represents the number of cycles per second that the processor can complete. The unit of measurement for clock speed is Hertz, which is named after the German physicist Heinrich Hertz. Therefore, the correct answer is Hertz.