cap 1
1. Which two characteristics are determined by the chip set on a motherboard? (Choose two.)
maximum amount of memory that can be installed
operating system compatibility
type of connectors that will be on the motherboard
keyboard layout
2 Which two activities are normally controlled by the Northbridge part of the chip set? (Choose two.)
communication between the CPU and the I/O ports
access to the RAM
communication between the CPU and the hard drive
access to the video card
communication between the CPU and the sound card
3. Which CPU architecture uses a small set of instructions that are designed to be executed rapidly?
CISC
RAID
RISC
RISK
SCSI
4.Which type of memory is unable to have the contents modified?
DRAM
RAM
ROM
SRAM
5.Which type of memory is primarily used as cache memory?
DRAM
RAM
ROM
SRAM
6.Which three devices are considered output devices? (Choose three.)
fingerprint scanner
headphones
keyboard
monitor
mouse
printer
7.Which type of ROM can be reprogrammed with software while it is still physically installed in the computer?
EEPROM
EPROM
PROM
ROM
8.Refer to the exhibit. Which type of cable is shown in the graphic?
FireWire
Parallel
Serial
USB
9.Which important feature is offered by the USB standard?
A single USB connection to a computer can support up to 255 separate devices.
It offers rates of around 580 Mb/sec in low-speed mode.
It allows up to 920 Mb/sec in the 2.0 version.
It can supply power from the computer to devices.
10.What are the two connector types for the 1394a interface? (Choose two.)
2-pin
4-pin
6-pin
8-pin
9-pin
15-pin
11. computer to a printer?
15 ft (4.5 m)
20 ft (6 m)
27 ft (8 m)
30 ft (9 m)
12.Which type of computer resources are direct lines to the processor used by computer components to request information from the CPU?
DMAs
I/O addresses
IRQs
memory addresses
13.Which two devices are considered input devices? (Choose two.)
biometric authentication device
printer
digital camera
projector
speakers
14. A technician needs to back up 4 GB of data using a single storage medium. Which medium can hold the entire 4 GB on a single disc?
floppy disc
CD-RW
CD-R
DVD+/-R
15.A technician is helping a customer compare two hard drives. Which unit of measurement is used for the hard drive speed?
revolutions per minute
gigabytes
pages per minute
clusters per minute
16.A technician has been asked to install memory that detects multiple bit errors and corrects single bit errors in memory. Which type of memory should be installed if the motherboard supports these features?
parity
ECC
fault tolerant
CRC
17. Which two form factors are commonly used to build a new computer? (Choose two.)
BTX
NLQ
ATX
CLV
ECC
18.Which two characteristics of a motherboard can be determined by the form factor? (Choose two.)
type of processor supported
color
size
maximum memory supported
shape
19.PATA data cables are available in two different types. The types are distinguished by the number of conductors. Which two types are available? (Choose two.)
6
40
68
80
120
20.How many conductors are found in a SATA data cable?
3
4
7
10
12
21.Which three system resources are commonly used for communication between the CPU or memory and other components in the computer? (Choose three.)
IRQ
DMA
UDP
I/O address
USB
PnP
Which two characteristics of a motherboard can be determined by the form factor? (Choose two.)
ATX
BTX
CISC
PnP
RISC
ZIF
CAPter 2
1.Which three computer components contain hazardous materials and require special handling for disposal? (Choose three.)
batteries
floppy drives
monitors
optical drives
parallel cables
printer toner cartridges
2.Which step should be performed first when servicing computer equipment?
Wipe down the exterior with a lint-free, damp soft cloth.
Open the case and check for any loose connections.
Turn off and remove the power source.
Replace any suspected bad components with known good components.
3.A technician wants to limit the chances of ESD affecting his workspace. Which three precautions should be taken? (Choose three.)
Store all computer components in clear plastic bags.
Ensure antistatic mats are on the workbench and floor.
Wear an antistatic wrist strap.
Ensure that all flooring is carpeted.
Keep all components in antistatic bags.
Keep environment cool and dry.
4.Which two tools can help protect against ESD? (Choose two.)
antistatic wrist strap
compressed air
antistatic mat
safety glasses
polyester clothing .
5.A technician accidentally spills a cleaning solution on the floor of the workshop. Where would the technician find instructions on how to properly clean up and dispose of the product?
the material safety data sheet
the insurance policy of the company
the local hazardous materials team
the regulations provided by the Occupational Safety and Health Administration
6. The performance of a computer is reduced after it has been using the Internet. Which three tools could be run to try to improve the performance of the computer? (Choose three.)
Fdisk
Spyware Remover
Defrag
Disk Cleanup
a BIOS updater
Device Manager Utility
7. Which tool in Windows XP gives a technician access to initialize disks and create partitions?
Defrag
Disk Cleanup
Disk Management
Format
Scandisk
8.Which tool should be used if a user needs to optimize space on a hard drive?
Defrag
Disk Management
Fdisk
Format
9.Which two types of tools can help protect a computer from malicious attacks? (Choose two.)
Anti-virus software
Disk Cleanup
Disk Management
Fdisk
Scandisk
Spyware Remover
10.What is the proper way to dispose of outdated CRTs?
All of the components should be disposed of into landfills.
All of the components should be properly incinerated.
All of the components should be disposed of in compliances with local environmental regulations.
All of the components should be sealed in containers and disposed of into landfills.
11.Which condition refers to a reduced voltage level of AC power that lasts for a period of time?
brownout
sag
spike
surge
12. What is recommended to remove dust from inside a computer case?
damp cloth
dust cloth
household vacuum cleaner
can of compressed air
13. Refer to the exhibit. Which type of tool is shown in the graphic?
cable meter
digital multimeter
network traffic monitor
electrostatic discharger
14. Refer to the exhibit. Which type of tool is presented in the graphic?
hex screwdriver
stripped screwdriver
Phillips-head screwdriver
flat-head screwdriver
15.Which Windows XP command-line utility scans the critical files of the operating system and replaces any files that have been corrupted?
Chkdsk
Defrag
Disk Cleanup
Disk Management
Scan System
System File Checker
16.Which precaution should be taken when working around electronic devices?
Avoid using magnetized tools.
Only use hand tools from the same vendor.
Wear ESD protection to repair monitors in humid environments.
Avoid using ESD wrist straps and ESD mats simultaneously.
17.A technician has a room of computers which are running very hot. The technician discovers that the heat sinks in the computers are very dusty. What should the technician use to clean the heat sinks?
mild cleaning solution
lint-free cloth
isopropyl alcohol
compressed air
18.Which condition refers to a sudden increase in voltage, which is usually caused by lightning?
brownout
sag
spike
surge
capter 3
1.A technician is installing a new power supply in a computer. Which type of power connector should be used to connect to a PATA hard drive?
Berg
mini-Molex
Molex
20-pin ATX connector
2.A technician is installing a new power supply in a computer. Which type of power connector should be used to connect to a floppy drive?
Berg
Molex
20-pin ATX connector
SATA connect
3.A technician is assembling a new computer. Which two components are often easier to install before mounting the motherboard in the case? (Choose two.)
CPU
memory
NIC
sound card
video card
4.Which solution should be used to clean a CPU and a heat sink?
soap and water
rubbing alcohol
a diluted ammonia solution
isopropyl alcohol
5.When building a computer, which two components are normally installed in 3.5-inch drive bays? (Choose two.)
hard drive
optical drive
floppy drive
flash drive
video card
6.How many pins are in a SATA data cable connector?
7
34
40
80
184
7.A technician is troubleshooting a computer that has a malfunctioning floppy drive. The technician observes that the floppy drive light remains lit constantly. How should the technician attempt to repair the problem?
Remove the floppy drive using Add/Remove Hardware.
Replace the floppy drive.
Connect the data cable making sure that the colored stripe on the cable is aligned with pin 1 on the drive and the motherboard.
Change the jumper setting to master for the floppy drive.
8.What is a convenient way that a technician can tell whether a ribbon cable is for an IDE hard drive or a floppy drive?
The IDE cable has a colored stripe on one edge.
The floppy cable motherboard connector is normally gray.
The IDE cable is gray.
The floppy cable has a twist in the cable.
9.A field technician has been asked to install a wireless 802.11g NIC in a computer, but is unsure about the expansion slots available. Which two types of wireless NICs should the technician have available? (Choose two.)
PCIe
AGP
SCSI
PCI
SATA
10.Which port is typically used for external wireless NICs?
Parallel
PS/2
SCSI
USB
11.Which additional 4-pin or 6-pin power connector is required by some motherboards?
AUX
Berg
Parallel
SCSI
12.A technician is installing a new CPU in a ZIF socket on a motherboard. What is the primary way of securing the CPU in place?
thermal compound
antistatic fasteners
load lever
screws
13.Which type of drive is installed in a 5.25-inch bay?
hard drive
optical drive
floppy drive
LS120 drive
14.After a technician has assembled a new computer, it is necessary to configure the BIOS. At which point must a key be pressed to start the BIOS setup program?
before the computer is powered on
during the Windows load process
during the POST
after the POST, but before Windows starts to load
15.Refer to the exhibit. Which type of hard drive uses the power connector shown?
ATA
EIDE
SATA
SCSI
USB
16.What is the most reliable way for users to buy the correct RAM to upgrade a computer?
Buy RAM that is the same color as the memory sockets on the motherboard.
Ensure that the RAM chip is the same size as the ROM chip.
Ensure that the RAM is compatible with the peripherals installed on the motherboard.
Check the motherboard manual or manufacturer's website.
17.Refer to the exhibit. Which type of port is shown?
FireWire
graphics
RJ11
RJ45
USB
18.A technician has just finished assembling a new computer. When the computer is powered up for the first time, the POST discovers a problem. How does the POST indicate the error?
It issues a number of short beeps.
The LED on the front of the computer case flashes a number of times.
It places an error message in the BIOS.
It locks the keyboard
19.Which action is recommended to prevent the motherboard from contacting the metal base of the case?
Ensure that the non-conductive side of the case is beneath the motherboard.
Use standoffs to keep the motherboard above the metal base.
Place a non-conductive barrier between the motherboard and the metal base.
Use a self-adhesive non-conductive membrane on the underside of the motherboard.
20.Which internal component of a computer uses a 3-pin power connector?
floppy drive
hard drive
sound card
fan
Cap 5
When booting the Windows XP operating system, which file will be read to find the path to the boot partition?
AUTOEXEC.BAT
BOOT.INI
NTBOOTDD.SYS
NTDETECT.COM
A technician needs to upgrade the file system on a Windows XP computer from FAT32 to NTFS. Which course of action should be taken to upgrade the file system to NTFS?
Format all the existing files with the NTFS File tool.
Create a new NTFS partition and copy the files into the new partition. The existing partition can not be changed.
Run the Microsoft Convert utility.
Overwrite the FAT32 file system with NTFS. Files will automatically be added to the new file system.
A technician is attempting to create multiple partitions on a hard disk. This will allow for storing the operating system and data files on separate partitions. What is the maximum number of primary partitions per hard drive that is supported by Windows XP?
1
2
4
16
32
A technician needs to upgrade the operating system on a computer from Windows 2000 Professional to Windows XP Professional. When the technician inserts the XP disc in the computer, the setup wizard fails to start. Which command can be used to start the upgrade?
install
winxp
winnt32
xp
A technician thinks that the file system on a computer has a problem because Windows XP is reporting data integrity issues. Which Windows XP utility will check the file system for errors?
Attrib
Chkdsk
Fdisk
Format
A user installs a new sound card driver in a computer that is working properly. After installing the driver for the new sound card the computer fails to boot. Which quick fix can the user implement to return to the previous working state?
boot to Emergency Recovery State
boot to Last Known Good Configuration
boot to Recovery Console
boot to Start Windows Normally
Which technology was developed to simplify the installation of new hardware?
AGP
HAL
IRQ-and-DMA
OSR2
PnP
As a user attempts to boot the computer, the message "NTLDR is missing" is observed on the screen. What will result from this situation?
The operating system will fail to load.
The BIOS setup utility will start automatically.
The computer will reboot continuously.
The initial self-test will fail to load.
A technician has many new computers to set up. The technician completely configures one master computer and makes an image of the hard drive. This image is then installed on the other computers. What is this process called?
disk array
disk copying
disk cloning
disk mirroring
disk multiplexing
Which set of related files store all the settings of a Windows XP installation?
Registry
Control Panel
.ini
HWINFO.EXE
A technician needs to install Windows XP on a new computer. The hard drive needs two partitions. At which point in the Windows XP installation process should the technician partition the hard drive?
The technician will be able to create the partitions when the F7 key is pressed after the product key has been entered.
The technician will be able to create the partitions at the start of the installation process.
The technician will be able to create the partitions as the final step in the installation process.
The technician will have to create the second partition once the installation process has finished.
While performing preventive maintenance, a technician notices that the operating system is missing updates. How can the technician enable automatic updates?
Run the Sysedit utility from the command line.
Run the Autoupdate utility from the command line.
Run the Automatic Updates utility from the Control Panel.
Click the Update icon in the System Tray.
Right-click My Computer and then choose Advanced > Updates.
Which set of guidelines is used to ensure that programmers develop applications that are compatible with an operating system?
ACAPI
API
IRQ
PnP
Refer to the exhibit. Which file is flagged for backup?
File1.txt
File2.txt
File3.txt
File4.txt
A technician has finished installing Windows XP. What should the technician do to verify that all hardware has been installed correctly?
Run HWINFO.EXE to verify that all devices are listed.
Use the Windows XP Msconfig utility to prove that all the devices are operational.
Use the Windows XP Testall utility to confirm that the devices are operational.
Use the Device Manager utility to ensure that all the devices are operational.
A user reports that a Windows XP system is unable to boot properly. How can the technician advise the user to boot into Safe Mode?
In Device Manager, right-click Windows XP, and then choose Properties > Safe Mode.
Click Start > Reboot > Safe Mode.
Reboot the system and press Del or F2 depending on the system.
Reboot the system, press and hold F8 until a menu is displayed, and then select Safe Mode.
Which utility, when run at regular intervals, is the most effective at protecting user data should there be a system failure?
ASD
Automatic Update
Backup
Personal Firewall
Restore Point
Xcopy
In which two situations should a technician create a restore point? (Choose two.)
before an operating system update
before installing a new device driver
once a month
before formatting the hard disk
after moving viruses to the virus vault for quarantine
before adding another partition to the hard drive
A user in a large manufacturing company uses a PC that is connected to the company network. Where should the user look to find a server attached to the network?
My Network Places
Control Panel
Connect To
My Computer
Once minimum hardware requirements are satisfied, where should a technician look to determine if the computer hardware has been tested with Windows XP?
the Microsoft Compatibility Assistant
the Windows XP Hardware Compatibility List
the Microsoft Knowledge Base
the Windows XP manual
A technician has a computer that is unable to boot Windows XP properly. The technician has decided that it is necessary to attempt a repair of XP. Which utility will be run if the technician selects Repair XP from the XP boot disk?
Recovery Console
Windows Disk Manager
msconfig
fix /mbr
Cap 6
What is the difference between a docking station and a port replicator?
A docking station has fewer ports.
A docking station may have PCI slots for expansion cards and speakers.
A docking station may have a built-in display.
A docking station has a universal connector so that it can be used with all laptops.
Which display technology is most commonly found in modern laptop computers?
CRT
LED
plasma
LCD
Which task must be completed first for a technician to be able to configure power management states using Windows XP?
APM power management mode must be configured in the BIOS before ACPI can be used to configure power.
ACPI power management mode must be enabled in the BIOS before Windows XP can be used to configure power management.
APM power management mode must be disabled in the BIOS so that Windows XP can be used to configure power management.
All power management settings must be disabled in the BIOS so Windows can be used to manage ACPI.
Which two laptop ports are used primarily for communication and network connectivity? (Choose two.)
Ethernet
modem
parallel
DVI
Which three components commonly connect to USB or FireWire ports? (Choose three.)
camera
AC adapter
PC Card
printer
scanner
graphics adapter
What is the major difference between desktop and laptop motherboards?
Desktops use the AT form factor while laptops use the mini or baby AT form factor.
Desktop motherboards typically have a standard form factor and are interchangeable while laptop motherboards are proprietary.
Desktops have a variety of expansion and RAM slot designs while laptops have standard expansion and RAM slot designs.
Currently there is no significant difference in the motherboard form factors for the desktop and laptop.
Refer to the exhibit. What is the correct order of steps to remove a laptop battery?
3, 2, 4, 1
2, 3, 4, 1
2, 4, 1, 3
3, 2, 1, 4
What is the benefit of using CPU throttling in laptops?
It reduces the processing time needed by end-user applications.
It reduces CPU power consumption and heat production.
It reduces the amount of CPU resources needed by system applications.
It avoids the need to increase the clock speed of the laptop processor.
Which two characteristics make laptops a better choice than desktop computers? (Choose two.)
mobility
functionality
size
OS installed
compatibility
Which three components are interchangeable between desktop and laptop computers? (Choose three.)
PC ExpressCard
hard disk
PCI sound card
printer
scanner
USB flash drive
Refer to the exhibit. Which two form factors are supported by the devices shown in the graphic? (Choose two.)
30mm wide
34mm wide
43mm wide
45mm wide
54mm wide
Which name is given to the collection of settings that control the power settings of a laptop?
current setups
energy settings
hibernation profiles
power profiles
power schemes
Which two devices are commonly hot-swappable on laptops? (Choose two.)
Integrated LCD screen
CPU chip
PC Card
RAM
USB Drive
Which generation of cell-phone standards was the first to deal with how to send and receive text, photographs, and video?
first
second
third
fourth
Which type of questions would a technician initially ask to gather information to help solve the problem?
categorical
closed
directed
multiple-choice
open
Where can a technician change the power schemes on a laptop running Windows XP?
Select Advanced Settings from within the BIOS.
Select Power Options from within the Control Panel.
Select Power from within Administrative Tools.
Select Configure Power Settings from within Computer Management
Which two devices can be individually configured within Windows XP to power off after the laptop has been idle for a given period of time? (Choose two.)
optical drive
disk drive
fan
monitor
wireless NIC
Which internal laptop component may be designed as a hot-swappable device?
CPU
LCD screen
optical drive
RAM
touch pad
A user has connected a digital projector to the external monitor port on a laptop computer, but the projector indicates that there is no RGB signal. What should the user try first to resolve the problem?
Connect the projector to the s-video port.
Press the function key that will redirect the video output to the external monitor.
Try a different laptop.
Try a different projector.
What is the proper way to clean optical drives?
Spray ionized solution inside the drive.
Use an electrostatic vacuum cleaner.
Blow the dust with compressed air from the inside.
Use a cleaning disc for optical drives.
Which two actions should be performed to clean the surface of CDs and DVDs? (Choose two.)
Use a lint-free cotton cloth.
Use a cotton ball.
Use a household cleaning solution.
Wipe the disc from the center outward.
Wipe the disc in a clockwise direction.
Wipe the disc in a counterclockwise direction.
Cap 7
Which technology is used by laser printers?
digital drop
electrophotographic
electrostatic spray
impact
ink melting
Which two Wi-Fi standards are used to provide a wireless connection between printers and computers? (Choose two.)
802.5b
802.5g
802.11b
802.11g
802.13a
802.13b
Which laser printer component is a metal cylinder that is coated with a light-sensitive insulating material?
drum
fuser
fusing unit
platen
transfer corona wire
Which step of the laser printing process involves scanning the photosensitive drum with a laser?
cleaning
conditioning
developing
fusing
transferring
writing
Which step of the laser printing process is the last step performed by a laser printer when printing a document?
cleaning
conditioning
developing
fusing
transferring
writing
What are two advantages of using impact printers? (Choose two.)
carbon-copy printing ability
print speeds up to 200 ppm
high-resolution printing ability
individual color cartridges
inexpensive consumables
silent printing ability
Which printer technology is used in low-cost, photo-quality printers?
impact
inkjet
laser
thermal
Which printing technology uses the vibration of a crystal to control the flow of ink onto the paper to produce an image?
electrophotographic
electrostatic
impact
piezoelectric
thermal
Which unit is commonly used to measure the print quality of an inkjet printer?
DPI
PPM
dot pitch
NLQ
What is a common disadvantage of inkjet printers?
Toner for inkjet printers is expensive.
It offers poor print quality.
The nozzles can get obstructed.
It takes a lot of time to warm up.
What is an advantage of using a solid-ink printer instead of an inkjet printer?
It produces vivid color prints.
It warms up quickly.
The ink used is considerably cheaper.
The used-ink cartridges can be refilled.
Which type of printer is commonly used in stores to produce cash register receipts?
dye sublimation
inkjet
laser
thermal
Which software, embedded in a printer, controls how the printer operates and can be upgraded?
driver
firmware
operating system
printer utilities
Which software converts scanned pages into text?
Image Text Converter
Optical Character Recognition
Optical Text Recognition
Character Image Recognition
Which three functions are commonly included in the all-in-one devices? (Choose three.)
USB hub
fax
plotter
printer
scanner
wireless access point
A museum possesses several old paintings that the curators wish to reproduce and sell in the museum gift shop. Which type of scanner can be used to produce the highest-quality reproduction?
all-in-one
drum
flatbed
handheld
What is the best source for a Windows-compatible scanner driver?
website for scanner manufacturer
Microsoft Update website
scanner installation disk
Windows Device Manager
Windows hardware profiles
Which standard governs the use of parallel printer ports?
IEEE 973
IEEE 1284
IEEE 1394
IEEE 802.4
Which two modes of operation within the IEEE 1284 standard allow bi-directional communication? (Choose two.)
DCL
ECP
EPP
PnP
TCP
Which two names refer to the IEEE 1394 standard? (Choose two.)
Bluetooth
FireWire
i.Link
USB
WiFi
What is the maximum number of devices that can be connected to a single FireWire interface?
10
24
63
127
256
Which Windows XP command sends a file named example.txt to the default printer?
send example.txt
example.txt default-printer
default-printer example.txt
print example.txt
Cap 8
Which utility can be used to determine end-to-end connectivity between source and destination?
Ipconfig
Nbstat
Netstat
Ping
A network administrator wants to connect a new building to an existing network using cable that can provide a secure connection and is not susceptible to electrical interference. The new building is approximately 800 meters away from the existing network. Which cable type should the administrator choose?
Category 5 STP
Category 6 UTP
coaxial
fiber optic
Which three factors are reasons to choose a client/server model for a network instead of peer-to-peer? (Choose three.)
The network is small with less than eight users.
The company network requires secure access to confidential information.
The users need a central database to store inventory and sales information.
Each user understands how to safely share files across a network.
The data gathered by the employees is critical and should be backed up on a regular basis.
All employees passed a strict background check as part of the corporate hiring practices.
The network administrator for a marketing company is concerned about the performance of the network. A company technician discovers a high volume of network traffic between computers and the departmental media server. Which device could be used to divide the network and improve performance?
hub
repeater
switch
wireless access point
Which protocol is used to automatically configure network devices?
DHCP
IPCONFIG
DNS
FTP
Which two factors are used to determine the different categories of UTP cabling? (Choose two.)
The distance a signal can travel through the cable.
The number of twists in the wires inside the cable.
The number of wires inside the cable.
The type of shielding used inside the cable.
The type of connectors required to terminate the cable.
Which two characteristics describe Ethernet technology? (Choose two.)
supported by IEEE 802.3 standards
supported by IEEE 802.5 standards
typically uses an average of 16 Mb/s for data transfer rates
uses a bus logical topology
uses a ring topology
Which wireless IEEE standard operates in a radio frequency of 2.4 GHz and supports a maximum bandwidth of 54 Mbps?
802.11a
802.11b
802.11g
802.11z
Which layer of the OSI model is primarily concerned with accessing the physical media and physical addressing?
Application
Data Link
Network
Physical
Presentation
A company has a remote branch office that has no access to any high-speed WAN or broadband services. The network administrator is considering Power Line Communication (PLC) to connect the branch office to the main office. What are two advantages of PLC? (Choose two.)
It is less expensive than using an analog PSTN modem.
It can provide dedicated connections with speeds that exceed most LAN technologies.
It can provide bandwidth in excess of the bandwidth that is provided by analog PSTN modems.
It provides a more secure network connection through the use of encryption technologies.
It can carry both voice and data signals across power lines.
What is the maximum range a data signal can travel through a 1000BASE-T network segment?
3280 ft (1000 m)
1640 ft (500 m)
984 ft (300 m)
607 ft (185 m)
328 ft (100 m)
Which topology has only one central point of failure, is easy to troubleshoot, and is most commonly implemented in newer networks?
bus
mesh
ring
star
Which term describes the process of adding headers to data as it moves through the layers of the OSI model?
demultiplexing
encapsulation
encoding
encryption
segmentation
Which technique is used to ensure that data from one computer does not collide with data from any other computer in a CSMA/CD network?
Computers receive a token that allows them to send a message. They then pass the token to the next computer.
Computers listen to the network for clearance to send data.
Each computer that is connected to the network transmits data on a different frequency.
Each time slot on the network is allocated to a different computer. A computer can only transmit in the allocated time slots.
Which device enables computers to be attached to a network without segmenting the network?
bridge
hub
router
switch
Refer to the exhibit. Which type of network cable is shown?
10BASE5
10BASE-T
Category 5 UTP
Category 6 STP
fiber-optic
Which type of media is appropriate to use for LAN connectivity in an electrically noisy industrial environment?
coaxial
fiber-optic
RF
UTP
Which network topology will allow all devices to continue to communicate with each other should a network cable fail?
bus
extended star
mesh
ring
star
Which Windows XP command displays the route taken by packets crossing an IP network?
iproute
netview
nslookup
ping
tracert
A company is investigating the use of an ISDN service to act as backup for the ASDL service they use to communicate with branch offices. They discover that the ISDN BRI service uses two 64 kb/s B channels. Which function do the B channels perform?
perform basic addressing
pass control information
carry the data stream
broadcast timing data
Which digital technology provides an upstream speed that is typically less than the downstream speed?
ADSL
HDSL
IDSL
SDSL
CAP 9 dan 10
A customer calls to report a computer problem. Which two actions can the technician use to establish a good rapport with the customer? (Choose two.)
Personalize the call by periodically asking questions unrelated to the computer problem.
Allow the customer to speak without interruption.
Use technical terms to determine the level of knowledge the customer possesses.
Ask only closed-ended questions.
Refer to the customer by name whenever possible.
A technician wants to apply for a job in a call center for a computer repair service. Which two characteristics are desirable for this type of position? (Choose two.)
use jargon, abbreviations, and acronyms relating to computer repair
possess good listening skills
be willing to work long hours
display professional behavior at all times
be willing to talk strongly to difficult customers
A customer calls to complain that another technician was rude to them. In the past, the technician has received many complaints about rudeness regarding this coworker. How should the technician handle this complaint?
Listen to the complaint and explain that the coworker is frequently rude.
Tell the customer that they can call the supervisor if they have a complaint.
Listen to the complaint, apologize for the incident, and then offer to help the customer.
Ask the customer to submit their complaint in writing.
A technician receives a call from a customer who is too talkative. How should the technician handle the call?
Talk over the customer and quickly gather the necessary information to help them.
Allow the customer to speak without interruption and then try to use closed-ended questions to gather data.
Use open-ended questions and repeat all the information back to the customer to politely show that they are giving too much unnecessary information.
Politely step in and gain control of the call by asking the customer social questions.
Which issue is an example of an exception to an SLA that should be escalated to a manager?
A customer wishes to change the details of the contact person on the SLA.
A customer wants two new computers added to the existing SLA without additional cost.
The customer is asking to upgrade the level of service and is willing to pay the price difference.
An unhappy customer calls to get clarification of the costs and penalties of the SLA.
A fingerprint reader is an example of which security technology?
authorization
biometric
keylogging
secureware
smartcard
Which is an effective method to protect against data loss?
biometrics
data backup
encryption
smartcards
Which type of program causes banners and ads to appear on the desktop without any user intervention?
adware
spyware
stealth virus
trojan horse
What are two examples of malware? (Choose two.)
registry cleaner
pop-up blocker
spyware
e-mail
grayware
A website development company wishes to allow developers to have unlimited access to websites, but is concerned about security. What should the company do to reduce security risks from websites running JavaScript?
E-mail a listing of tested and safe websites to all employees and have them use this list prior to visiting any websites.
Adjust browser settings so that the user must authorize any downloading or use of JavaScript.
Increase security on the network by blocking the download of HTTP and SMTP attachments.
Install application firewalls on each computer designed to filter all HTTP and SMTP traffic from the Internet.
Which threat to security uses traffic from zombie computers to overwhelm servers?
DoS
DDoS
phishing
spoofing
SYN flood
Which wireless security technology is a good choice when using Cisco equipment in conjunction with operating systems such as Windows and Linux?
LEAP
WEP
WPA
WTLS
Where is the safest place to store backups?
portable lock box
locked telecommunications room
locked server room
offsite secure facility
What is the best method for a company to secure data being transmitted across the Internet between remote sites?
Use plain text in an e-mail.
Use a shared server with an encrypted password on the file.
Use computers secured with smartcard authentication.
Use a VPN connection.
An employee for a small company inadvertently allows a visitor to see their username and password. At home, the visitor then uses this information to gain access to the company network. This is an example of what type of threat?
man-in-the-middle
phishing
physical
social engineering
spoofing
Which is the best procedure to secure a laptop left at the office while the user is away for an extended period of time?
Secure by a security cable wrapped around the leg of the user's desk.
Put the laptop in a desk drawer in the locked office of the user.
Place the laptop in a locked security cage designed to store computer equipment.
Place the laptop in the office of the supervisor.
Which two statements are true about username and password standards? (Choose two.)
The username naming convention should be kept simple.
Usernames should expire periodically.
The passwords should be kept simple and easy to remember.
Rules about password expiration and lockout should be defined.
BIOS passwords should be given to users to enable them to configure their computer.
Which two characteristics describe a worm? (Choose two.)
Executes when software is run on a computer.
Is self-replicating.
Hides in a dormant state until needed by an attacker.
Infects computers by attaching to software code.
Travels to new computers without any intervention or knowledge of the user.
While servicing a computer, a technician notices that a document labeled "confidential" is open on the computer. What should the technician do?
Call another user to check the file.
Step away from the computer and ask the user to close the document.
Minimize the document and pretend not to notice it.
Report the situation to the manager responsible for the user.
Close the file without saving any changes to the file.
An inexperienced user reports that the computer is broken. After working with the customer for some time, the technician is still unable to get the computer to boot the OS.
How should the technician explain to the user in simple terms that the OS will need to be completely reinstalled on the computer?
Advise that a technician will make a service call to delete the OS, reformat the drive, and perform a fresh install.
Advise that the customer will need to reload some software and data loss may occur.
Advise that the OS on the computer needs to be rebuilt.
Advise that a technician will need to service the machine in order to resolve the problems.
Cap 10
A customer calls to report a problem with a computer. What is the first step the technician should use to resolve the computer problem?
Direct the customer to various vendor Web sites.
Complete a work order documenting the cause of the problem.
Identify the problem.
Gather information from the customer.
A customer calls to report a computer problem. Which two actions can the technician use to establish a good rapport with the customer? (Choose two.)
Personalize the call by periodically asking questions unrelated to the computer problem.
Allow the customer to speak without interruption.
Use technical terms to determine the level of knowledge the customer possesses.
Ask only closed-ended questions.
Refer to the customer by name whenever possible.
A technician wants to apply for a job in a call center for a computer repair service. Which two characteristics are desirable for this type of position? (Choose two.)
use jargon, abbreviations, and acronyms relating to computer repair
possess good listening skills
be willing to work long hours
display professional behavior at all times
be willing to talk strongly to difficult customers
A technician receives a call from a customer who is too talkative. How should the technician handle the call?
Talk over the customer and quickly gather the necessary information to help them.
Allow the customer to speak without interruption and then try to use closed-ended questions to gather data.
Use open-ended questions and repeat all the information back to the customer to politely show that they are giving too much unnecessary information.
Politely step in and gain control of the call by asking the customer social questions.
Which three items are commonly parts of a service level agreement (SLA)? (Choose three.)
supported software
diagnostic procedures
acceptable working conditions
service location
accessibility requirements
car parking arrangements
Which issue is an example of an exception to an SLA that should be escalated to a manager?
A customer wishes to change the details of the contact person on the SLA.
A customer wants two new computers added to the existing SLA without additional cost.
The customer is asking to upgrade the level of service and is willing to pay the price difference.
An unhappy customer calls to get clarification of the costs and penalties of the SLA.
While a technician is listening to a lengthy explanation of a problem, the technician identifies the solution to the problem. How should the technician proceed?
Interrupt the customer immediately to explain the solution.
Interrupt the customer at the earliest opportunity because you know what they are going to say.
Wait until the customer has finished speaking, and then explain the possible solution.
Ask the customer to complete the explanation as quickly as possible because a possible solution is known.
When dealing with an angry customer, which two things can a technician do to resolve the problem? (Choose two.)
Place the customer on hold to allow the customer time to become calmer.
Allow the customer to explain the problem, possibly dispelling some of the anger.
Discuss possible causes of the problem.
Sympathize with the customer's problem.
Try to minimize the significance of the problem.
What are three guidelines for beginning a call with a customer? (Choose three.)
Explain the SLA terms and conditions.
Determine the level of knowledge that the customer possesses about computers.
Place angry customers on hold immediately.
Immediately transfer angry customers to a manager.
Use brief communication to establish a one-to-one connection with the customer.
Call the customer by name.
What is the recommended way to place customers on hold?
Place customers on hold as soon as the issue is identified. The on-hold message will inform customers that they have been placed on hold.
As soon as the issue has been identified, tell customers that you need to put them on hold, then immediately place them on hold.
Ask and wait for permission before placing customers on hold.
Do not place customers on hold. Ask them to call back in an hour when the issue would have been researched and a solution found.
Which two approaches are recommended when dealing with customers on the telephone? (Choose two.)
Be positive.
Explain what you will be unable to accomplish.
Look for alternative ways to help the customer.
Interrupt customers to explain solutions and save time.
Refer customers to the Internet when the solution is obvious.
Which three pieces of information should be given to the next technician when transferring a customer? (Choose three.)
your name
ticket number
impressions of the customer
customer name
department name
part numbers
A technician is talking on the telephone to an angry customer who is unhappy with previous service. How should the technician calm the customer?
Listen carefully and attempt to solve the customer's problem.
Explain to the customer that company policy is not to tolerate verbal abuse and that the call will be terminated unless the customer's language is moderated.
Explain why the previous service was appropriate and under no circumstances admit to there being any deficiencies in the previous service.
Schedule a meeting with the customer, another technician, and the manager.
Which three techniques should be used to successfully deal with a talkative customer? (Choose three.)
Politely interrupt to refocus the customer.
Encourage conversation to gain the customer's trust.
Gather as much information as possible while the customer is talking.
Ask open-ended questions.
Transfer the customer to a manager.
Allow the customer to talk for one minute and then ask closed-ended question to regain control of call.
Which two techniques should be used when dealing with an inexperienced customer? (Choose two.)
Use simple step-by-step instructions.
Explain possible causes of the problem to the customer.
Criticize the customer to prevent the possibility of repeating the problem in the future.
Ask to set up a conference call with a level 2 technician.
Speak in plain terms.
Which two guidelines demonstrate proper netiquette? (Choose two.)
Send chain letters via e-mail to minimize time needed to spread information.
Begin each e-mail with an appropriate greeting.
Use all capital letters to make reading easier.
E-mail information that would be difficult to say in person.
Avoid replying to "flames".
Which three tasks are commonly carried out by a level-one technician? (Choose three.)
document all information on the work order
update the operating system
upgrade the BIOS
prioritize the problem
install remote diagnostic software
gather information from the customer
Which three relaxing techniques can help relieve the stress caused from helping customers in a call center? (Choose three.)
Take calls only from customers that are knowledgeable about computers.
Take frequent gaming breaks.
Go for a quick walk.
Listen to soothing sounds.
Practice relaxed breathing.
Take a long lunch hour to reduce fatigue.
The technician begins diagnosing a problem by asking an experienced customer to visit a troubleshooting Web site. The customer becomes angry because she feels this could be done without calling the technician. What should the technician do?
Place the customer on hold to give the customer time to calm down.
Transfer the customer to a different technician.
Advise the customer that with her cooperation the problem can be easily solved.
Explain how the Web site can be used by both of them during the call to quickly eliminate problems.
A technician is trying to calm an angry customer. What is the best approach?
Place the customer on hold to allow time to calm down.
Ask the customer for permission to be transferred to a manager.
Maintain a positive tone of voice and offer to help solve the problem.
Talk to the customer in a stern tone of voice to gain control of the conversation.
Practice Final 1-10
What must be done before a technician cleans a very dirty LCD screen on a laptop?
Place the laptop in standby mode.
Remove the screen from the laptop.
Remove the battery.
Enable the autoclean setting in the BIOS.
Which environmental factor helps ensure optimal performance for laptops?
The humidity level should always be below 20 percent.
Temperature should be preferentially between 45 to 90 degrees Fahrenheit (7 to 32 degrees Celsius) to avoid overheating.
In dusty conditions, laptop vents should be partially covered to prevent the internal components from getting dirty.
Laptops should be cleaned every month or the internal components will be damaged.
What is the purpose of using thermal compound when installing a CPU, a heat sink, and a fan assembly on a motherboard?
to insulate the CPU from the heat sink
to attach the heat sink firmly to the CPU
to conduct heat that is generated by the CPU to the heat sink
to ensure an electrical connection between the CPU and heat sink
Which three rules increase the level of password strength? (Choose three.)
Passwords should never expire.
Passwords should be a combination of letters and numbers.
Passwords should combine a user's special dates and initials so they can be alphanumeric.
Passwords should be changed by the user after specific periods of time.
Password expiration and lockout policies should be clearly defined.
Passwords should be short to reduce the chances of users forgetting them.
What characterizes a DDoS attack?
Many hosts participate in a coordinated attack.
Infected computers are called Daemons.
It is easy to identify the source of the attack.
All hosts must be in the same geographic area.
When installing a network adapter into a client computer, a technician notices that the contacts on the adapter need to be cleaned. Which solution should the technician use to clean the contacts?
glass cleaner
isopropyl alcohol
mild detergent
rubbing alcohol
slightly abrasive cleanser
Refer to the exhibit. Which type of removable media is depicted?
hard disk
USB optical drive
PC card
flash drive
Refer to the exhibit. Which type of device uses the connector shown in the graphic?
DVD drive
keyboard
NIC
RAM
sound card
Which type of standard interface allows users to connect and disconnect peripheral devices while the computer is running without having to restart?
IDE
SATA
PATA
USB
Which two items are considered proper cleaning tools? (Choose two.)
compressed air
antistatic mat
soft cloth
antistatic wrist strap
flat-head screwdriver
Which type of scanner generally has high costs but produces top-quality images?
all-in-one
drum
handheld
flatbed
A technician is troubleshooting a computer that is experiencing hardware failure detected by the BIOS. What is one way this failure is indicated?
The computer automatically boots into Safe Mode and displays a warning on the screen.
The screen flashes with a red background and displays a warning message.
The computer emits a pattern of beeps indicating the failing device.
The computer returns an error message indicating the I/O address of the failing device.
Which type of power connector is used to connect devices such as optical drives and hard drives?
20-pin
24-pin
Berg
Molex
P8
P9
What is the default subnet mask for a Class A network?
0.0.0.255
0.0.255.255
0.255.255.255
255.0.0.0
255.255.0.0
255.255.255.0
Refer to the exhibit. Which sequence of steps describes the printing process used by a laser printer?
1,2,3,4,5,6
2,5,3,4,1,6
3,4,1,6,2,5
4,2,6,5,3,1
Which two memory types are installed using Dual Inline Memory Module (DIMM) slots? (Choose two.)
cache memory
DDR SDRAM
FPM DRAM
SDRAM
SRAM
Fans that are used to help cool a system are commonly placed on which two components? (Choose two.)
sound card
CMOS
video card
RAID card
CPU
A network administrator has finished migrating from a peer-to-peer network to a new client-server network configuration. What are two advantages of the new configuration? (Choose two.)
The total cost of the new solution is considerably lower.
Data is more secure in the event of hardware failures.
Individual users are in control of their own computers and network resources.
Data resources and access are centrally controlled.
Personnel costs are lower because a dedicated network administrator is no longer necessary.
The company ABC reports that unauthorized communication from outside the network has caused serious problems in the finance department. Which software tool will help prevent this situation from occurring again in the future?
antivirus program
firewall
network analyzer
spyware program
Which program checks for installed hardware during the Windows XP boot process?
HALL
NTLDR
NTDETECT
NTOSKRNL
Which key or key sequence pressed during the boot process will allow a user to restart a Windows PC using the last known good configuration?
F1
F8
F12
Alt-Z
Windows key
After Windows XP has been installed, which program would a technician use to select the programs that will run at startup?
ntldr
regedit
msconfig
Task Manager
Once a technician understands a customer complaint, it is common to ask close-ended questions. Which question is a close-ended one?
What happened before the error occurred?
Is this the first time the error occurred?
What happened after the error occurred?
What error messages were displayed when the error occurred?
Which power management method offers the most power management features?
ACPI
AMP
APM
UPS
WPM
A customer complains that a scanner has suddenly stopped producing clear images. Which preventive maintenance task has the customer most likely forgotten to do?
update the firmware
visually inspect the scanner glass
remove dust from the fans
inspect the scanner cables
A user reports that a printer is printing unknown characters on documents. What is a possible solution to this issue?
Replace the toner or ink cartridge.
Uninstall and reinstall the printer driver.
Replace the paper with some from a new ream.
Delete the print job from the queue and print again.
A customer is considering an inkjet printer to print batches of colored documents that will be immediately stacked and packaged for shipping. What advice should a technician give the customer?
The resolution of an inkjet printer is too low for this work.
An inkjet printer has limited color capability.
Immediately after printing, the ink is wet.
An inkjet printer is a high cost option.
A technician has installed and configured an external projector on a laptop. What is the final task the technician must perform for the image to be displayed through the projector?
Press the function key sequence to activate the image on the projector.
Disconnect the laptop from AC power.
Reboot the laptop into dual monitor mode.
Turn audio and video off on the laptop and on for the projector.
Which port is used only for input?
PS/2
component
speaker
DVI
parallel
A laptop user has noticed that connecting an external monitor, keyboard, and speaker each day is causing damage to the laptop connectors. What can the user do to prolong the life of the connectors?
Obtain devices which are specially designed for heavily used laptops.
Use only PCI devices.
Attach all of the devices to a USB hub.
Use a docking station.
Refer to the exhibit. What type of device is highlighted in white?
touch pad
mouse
biometric authentication
Bluetooth
A student wishes to buy a computer suitable for game playing. What CPU speed would be appropriate for game playing?
44.1 MHz
100 MB/s
3 GHz
1 TB
The IT department reported that the web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which attack characterizes this type of situation?
adware
DDoS
phishing
social engineering
spyware
Employees in the financial department have reported that an unknown technician has been asking questions about the network. Which type of attack might the employees be observing?
phishing
social engineering
spoofing
spamming
What guideline should be followed when establishing a password security policy?
Passwords should be physically stored in a convenient location.
Passwords should contain mainly numbers for better encryption.
The system administrator should assign passwords to the users.
Lockout policies should be avoided in order to increase user access.
An expiration period should be established so that passwords frequently change.
A customer who owns a business that creates high-quality color graphic images wants a new printer. The customer already has an ink-jet printer. Which type of printer would be a good recommendation?
dot-matrix
solid-ink
daisy-wheel
thermal
A customer is experiencing repeated paper jams on a laser printer. Which quick solution might correct this problem?
Power cycle the printer.
Download and install a new printer driver.
Replace the paper in the input tray with new paper.
Remove and replace the primary corona wire.
A Windows XP laptop user finds that the low battery alarm does not give enough warning. Where can the user adjust the alarm setting to issue an earlier warning?
in Power Options Properties
in the BIOS
in the System Tray on the desktop
on the battery
A network specialist has been hired to install a network in a company that assembles airplane engines. Because of the nature of the business, the area is highly affected by electromagnetic noise. Which type of network media should be recommended?
Category 5e
coaxial
fiber optic
UTP
A technician has been asked to find how a hacker keeps breaking in to a computer. Which security precaution was most likely missed when the operating system was first installed?
A user account was not created.
The hard drive was not formatted with NTFS.
The OS product key was not entered.
A password was not assigned to the default administrator account.
When starting a computer, a customer can no longer select two of the operating systems that are installed. Which file may be corrupted and causing this error?
BOOT.INI
STARTUP.INI
SYSTEM.INI
WIN.INI
Which steps lead to the window where the performance settings can be changed on a Windows XP computer that is using the classic view display?
Choose Start > Control Panel > System > Advanced > Performance area. Choose the Settings button.
Choose Start > Control Panel > System > Hardware > Device Manager > View > Resources by type
Choose Start > Control Panel > Administrative Tools > Performance area > VMem
Choose Start > All Programs > Accessories > System Tools > System Restore
Observable Description Max Value
A technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to use correct this problem?
Task Manager
Add or Remove Programs
Event Viewer
System Restore
The driver for a network interface card has been updated on a Windows XP computer. All network access has been lost. Which steps in the Windows XP Classic View should be followed to roll back the network interface card driver?
Choose Start > Settings > Control Panel. Double-click System. Click the Hardware tab. Choose Device Manager. Double-click the NIC adapter. Click the Driver tab. Click the Roll Back Driver button.
Choose Start > Settings > Control Panel. Double-click Network Connections. Right-click the NIC. Choose Properties > Uninstall.
Choose Start > Settings > Control Panel. Double-click System. Click the Hardware tab. Choose Device Manager. Choose Action > Uninstall.
Choose Start > Settings > Control Panel. Double-click Add or Remove Programs. Click Change.
A technician installed Windows XP on a 20 GB SCSI drive but when the computer is started a NTLDR error message is displayed. Based on this information which file was most likely corrupted during installation?
NTBOOTDD
HAL
NTSCSILDR
NTWINHAL
Why does the cable from the power supply to the motherboard have different colored wires?
A single wire could not carry enough current.
There is one wire for each motherboard component.
Each wire carries a different voltage.
The motherboard slot requires the number of wires that are represented by the different colors.
A home PC user has been using an XP system for about a month when it suddenly refuses to complete the boot processes. The POST completes successfully but the XP boot does not result in a login screen. What could be the cause of this problem?
The network connection failed.
The printer driver is corrupted.
The keyboard or mouse is not plugged in.
The operating system has not been registered.
At which TCP/IP model layer would a MAC address be found?
application
transport
internet
network access
A technician powers on a computer and opens a web page. A message that the web page could not be found appears. After checking the URL, the technician verifies that this is the problem that was reported by the computer owner. What would be the next step in the troubleshooting process for the technician?
Replace the NIC.
Replace the network cable.
Verify user permissions.
Verify the computer IP address information.
What are the four layers in the TCP/IP reference model?
HTTP, TCP, IP, Ethernet
TCP, IP, Ethernet, IEEE
application, transport, internet, network access
application, presentation, session, transport
physical, data link, network, transport
CAP 11
A technician suspects that a hard drive is beginning to fail. Which two conditions would support this suspicion? (Choose two.)
The hard drive is making unusual noises.
The hard drive must be defragmented often.
The hard drive has a gradual increase in the number of bad sectors.
The hard drive light is lit briefly during the boot process.
The hard drive light is lit briefly when programs are loaded.
Why should you use an antistatic mat when working on the internal components of a computer?
protect the technician against electrical shock
reduce the chance of computer components being damaged by ESD
prevent the technician's tools from being damaged by ESD
protect computer components from AC voltage while working on the computer
You are monitoring a new technician installing a device driver on a Windows-based PC. The technician asks why the company requires the use of signed drivers. What would be the best response to give?
Signed drivers prevent physical damage to devices.
An unsigned driver can cause files to be fragmented as they are processed.
A signed driver has passed Microsoft's quality lab test and prevents a system from being compromised.
All companies making devices for a Windows computer have to have Microsoft sign off on the new driver before it can be added to the operating system.
A signed driver has been approved by the company that created the device driver.
While performing routine maintenance on a computer, a user is cleaning dust and debris from the PC using compressed air. How should the technician hold the can of compressed air to avoid damaging the PC?
upside down to avoid blowing the dust upward
upright to avoid fluid leakage
inside the PC at close distance to the motherboard
outside the PC to avoid blowing dust outside the PC
Which two components are considered input devices? (Choose two.)
printer
camera
projector
MIDI interface
speaker
A technician begins gathering data from a customer by asking open-ended questions. Which question is a proper open-ended question?
Were any recent updates performed?
Has anyone installed new software in the past two days?
Are you the only user to use the PC recently?
What happens when the PC is powered on?
How should a floppy disk drive be cleaned?
Apply a vacuum cleaner to the disk slot.
Use a drive cleaning kit.
Spray an isopropyl alcohol based cleaner into the hole provided in the drive.
Remove heads and clean with a mild detergent.
What is the recommended way to clean an optical drive?
Use compressed air and lint-free cotton swabs.
Use cotton swabs and denatured alcohol.
Use a vacuum cleaner.
Use glass cleaner and a lint-free cloth.
What are three reasons to add an additional hard drive to a computer? (Choose three.)
to store the system swap file
to implement RAID and provide fault tolerance
to speed up the Internet download speed
to install a second operating system
to decrease the time needed for defragmentation
to increase the CPU speed
Which three peripherals would be considered output devices? (Choose three.)
camera
display monitor
keyboard
microphone
projector
speaker
Which two motherboard features must be compatible when selecting a new CPU? (Choose two.)
chip set
number of expansion slots
quantity of memory
socket type
number of USB interfaces
A technician is helping a client select additional RAM for a computer. Which three items should be considered when updating RAM? (Choose three.)
The quantity of memory must exceed the size of the swap file.
The memory must be compatible with the video card.
The memory must be compatible with the motherboard.
The new memory must be the same type as the memory already present.
The memory must be as fast as the cache found in the CPU.
The speed of the new memory must be the same or faster than the existing memory.
Which type of hard drive cable connects drives in a daisy chain series and requires manual termination at each end of the daisy chain to prevent data corruption?
PATA
SATA
SCSI
USB
A technician has installed a new processor for a client in an attempt to improve the performance of an older computer. After installing the processor, the technician is unable to start the system. Which two steps should be taken first to solve the problem? (Choose two.)
Install new memory.
Reseat the processor.
Verify that heat sink fans are connected to the power supply.
Verify CPU compatibility with the motherboard and BIOS version.
Flash the CPU instruction set.
While troubleshooting a computer, a technician notices that the computer will not boot normally but it can boot into Safe Mode. What is the most likely cause of the problem?
hard drive failure
video card failure
a driver
corrupt MBR
While performing routine maintenance, a user notices that the desk area around the computer is cluttered and dusty. After cleaning the desk area, what action should the user take to clean the computer?
Vacuum all dust and debris from the computer.
Remove all dust and debris from the computer using a can of compressed air.
Clean the internal components of the computer using a non-abrasive spray cleaner and an anti-static sponge.
Clean the inside of the computer using a lint-free cloth and a pencil to dislodge stuck or embedded debris.
When examining hard drive cables, what is the best way to determine if a cable is properly plugged in?
Shake the cable to determine if function is intermittent.
Replace the cable with a "known good" cable.
Unplug the cable and plug the cable in to guarantee connection.
Reboot the device and look for link lights.
A technician fails to successfully boot a computer into Safe Mode. The technician then successfully boots the computer using a Windows boot disk. What is the most likely cause of the problem?
driver failure
hard drive failure
memory failure
corrupt BIOS
A technician has determined that a computer is failing to boot because of a power supply that is not supplying power to the hard drives. What is the correct course of action?
The technician should attempt to repair the power supply. If the attempt is unsuccessful, the power supply should be thrown in the trash and replaced.
The technician should attempt to repair the power supply. If the technician is unsuccessful, the power supply should be replaced with a power supply of equal or greater wattage.
No attempt should be made to repair the power supply. The power supply should be replaced with a power supply of equal or greater wattage.
Power supplies should always be replaced with components of equal or less wattage to avoid damage to the system from excess power to internal components.
When a technician is servicing a laser printer, which two dangers need to be avoided? (Choose two.)
mercury poisoning
electrical shock
chromium ingestion
burns
lead poisoning
CAP 12 DAN 13
A technician wishes to optimize the settings for a Windows XP system by modifying the size of the virtual memory. The technician needs to login as a member of which group in order to optimize the system?
Administrator
Everyone
Guest
Super User
Users
A technician updated a video driver and now it is impossible to interpret any information on the screen. How can the technician boot the computer so that the driver can be fixed?
Boot to the BIOS and configure the computer to use VGA mode only.
Press F8 during the boot process and select the boot option Enable VGA Mode.
Press F8 during the boot process and select Boot to Command Line. At the prompt type 'win /b'.
Boot the computer holding down the Windows key so that it will use the default driver.
A technician has been able to boot a Windows XP computer that has an incorrect driver loaded for the video adapter card. How can the technician revert to a previous driver?
Select Create a Restore Point from System Tools.
Use regedit to remove the information about the graphics driver from the registry.
Select the video adapter card in Device Manager, select the Driver tab, and click Roll back driver from Properties.
Right-click the Desktop and then go to Settings > Advanced > Reset video driver.
A technician is having trouble repairing a difficult Windows XP problem. The usual quick-fix solutions did not work and there are no obvious clues found in either Device Manager or Event Viewer. What two actions should the technician try next? (Choose two.)
Reinstall the operating system.
Check any manuals relating to the hardware and software.
Check the Internet for possible solutions.
Ask the customer for any idea as to what may be wrong.
Use the recovery CD to restore the operating system.
A video-file editor defragments the hard drive on his computer every month to ensure continuing optimal performance. How can the editor ensure that the defragmentation occurs every month?
Select the Action menu item in the Defrag utility and then select Schedule.
Add Defrag to Scheduled Tasks in System Tools.
Set the Scheduled flag for Defrag in HKEY_CLASSES_ROOT.
In Ntbackup, select the option to do a Defrag; set the schedule for monthly but do not specify any files to backup.
The accounting department has received a new laser printer. According to the printer technical specification, the printer complies with the Bluetooth Class 2 specification. What is the maximum distance that any device could be expected to successfully send print jobs?
3 ft (1 m)
10 ft (3 m)
33 ft (10 m)
100 ft (30 m)
330 ft (100 m)
Which type of encryption key should be enabled on WPA-compliant devices?
28-bit
32-bit
64-bit
128-bit
255-bit
Which two types of batteries should be completely discharged and then fully recharged to remove the charge memory? (Choose two.)
Li-ion
Ni-Cad
Ni-CH
Ni-Hid
NiMH
NiMO
A laptop will only work on AC power. What should be done to fix the problem?
Replace the AC adapter.
Replace the battery.
Replace the CPU.
Replace the laptop.
The design department recently doubled the RAM capacity in all of the laptops. After the upgrade, the laptop users reported experiencing improved performance. Which operational benefit have the users noticed after the RAM increase?
The CPU reduces the number of operations by cycle.
The BIOS can use more RAM for I/O buffer space.
The CPU is now able to implement throttling.
The hard disk swap file is read less frequently.
The hard disk partitions are automatically extended.
Which three laptop components should be cleaned during routine maintenance? (Choose three.)
CPU fan
exterior case
hard disk
cooling vents
keyboard
RAM
After configuring a new network adapter on a laptop, a user reports that it is unable to connect to the Internet. Which Windows XP utility is used to get relevant information about the issue?
AUTOEXEC.BAT
Device Manager
MSCONFIG.EXE
POST test
Services
Which TCP/IP protocol is used to retrieve e-mail from a remote server?
DHCP
SMTP
POP3
MIME
A user in a large company is unable to login to the corporate network because of a forgotten password. The help-desk technician changes the password but the user is still unable to login. Which quick fix should the technician try next?
Delete the user account and create a new account for the user.
Change the password to something very simple to reduce the chances of the user entering it incorrectly.
Arrange to visit the user to ensure that there is nothing unusual about the working environment.
Ask the user to reboot the computer.
Ask the user to try a different user account.
Which standard does Bluetooth incorporate to reduce the chance of interference when multiple Bluetooth devices are present?
IrDA
GPS
AFH
GSM
Which wireless technology is a low-power, short-range technology that uses LEDs to transmit data and uses photodiodes to receive data?
Bluetooth
infrared
cellular
Wi-Fi
satellite
What wireless technology has a range limited to 3 feet (1 m) and cannot penetrate ceilings and walls?
Bluetooth
infrared
cellular
Wi-Fi
satellite
Which type of infrared network bounces the signal off ceilings and walls?
line of sight
scatter
reflection
optical teleport
Which Wi-fi standard uses the 5.0 GHz frequency band?
802.11a
802.11b
802.11g
802.11x
Which two characteristics describe cellular WAN technologies? (Choose two.)
They are designed only for voice communication.
They are faster than DSL and cable connections.
Supports voice, video and data simultaneously.
They have a range greater than 165 ft (50 m).
They have a minimum data transfer rate of 1000 Kbps.
CAP 12
What are two reasons for creating two partitions? (Choose two.)
increase the number of logical drives
increase the capacity of the disk system
separate data files and operating system
allow the computer to be dual booted
implement disk mirroring
A technician boots a Windows XP computer that has an incorrect driver loaded for the video adapter card. How can the technician revert to a previous driver?
Select Create a Restore Point from System Tools.
Use the Regedit utility to remove the information about the graphics driver from the registry.
Select the video adapter card in Device Manager, select the Driver tab, and click Roll back driver from Properties.
Right-click the Desktop and choose Settings > Advanced > Reset video driver.
A video-file editor defragments the hard drive on his computer every month to ensure continuing optimal performance. How can the editor ensure that the defragmentation occurs every month?
Select the Action menu item in the Defrag utility and then select Schedule.
Add Defrag to Scheduled Tasks in System Tools.
Set the Scheduled flag for Defrag in HKEY_CLASSES_ROOT.
In Ntbackup, select the option to do a Defrag; set the schedule for monthly but do not specify any files to backup.
A technician is having trouble repairing a difficult Windows XP problem. The usual quick-fix solutions did not work and there are no obvious clues found in either Device Manager or Event Viewer. What two actions should the technician try next? (Choose two.)
Reinstall the operating system.
Check any manuals relating to the hardware and software.
Check the Internet for possible solutions.
Ask the customer for any idea as to what may be wrong.
Use the recovery CD to restore the operating system.
Which action should be taken to start the defragment utility when using the Windows XP Category View?
Right-click the Desktop and choose Disk Management > Defragment.
Choose Start > Control Panel > Performance and Maintenance > Scheduled Tasks > Defragment.
Double-click My Computer, right-click the disk to defragment, and choose Properties > Tools > Defragment Now.
Choose Start > Run, enter defragment in the text box, and click OK.
Which virtual memory attribute is the only one a technician should change?
page file structure
location
access rights
archive flag
A user has observed that the performance of the hard disk has degraded over time. What is the first thing a user should do to improve performance?
Defragment the hard disk.
Replace the hard disk.
Update their Internet browser to a newer version.
Change the size of the partitions on the hard disk.
When configuring Windows XP, which setting configures a service to run every time a computer is started?
always
automatic
boot
start
In Windows XP which file determines the prompt that a user sees during the boot process when multiple operating systems are present?
BOOT.INI
AUTOEXEC.BAT
NTLDR
CONFIG.SYS
What is the most common cause of blue screen errors?
device driver errors
user errors
memory errors
monitor errors
While attempting to run an application, a user receives an error message indicating that a required RPC service is unavailable. The user determined that the RPC server is functioning properly. Which action should be tried next by the user?
Restart the service.
Reinstall the application.
Reinstall the service.
Enable server activation in the firewall.
Which information is backed up when a restore point is created?
user data and applications only
system and Registry information only
all the content of a given partition
selected user and system information
Which two pieces of information are required when configuring Automatic Updates for Windows XP? (Choose two.)
day
destination
source
time
update period
A user wishes to dual boot Windows XP and Windows Vista on a computer with a single hard drive. Which advice should the technician provide the user?
It is impossible to dual boot XP and Vista without a second hard drive.
It is necessary to remove XP first, then reinstall Vista and XP in that order.
It is necessary to create a second partition and install Vista into the second partition.
Vista identifies the existence of an XP partition and installs into the same partition.
A technician is setting up an e-mail client for a customer. Which two protocols can the technician select to retrieve e-mails from the e-mail server? (Choose two.)
FTP
HTTP
IMAP
POP
SMTP
SNMP
What is a feature that Internet browsers provide to improve performance when accessing recently visited websites?
caching recently accessed pages
registering favorite websites
managing of updates and cookies
saving passwords commonly used on websites
Which action configures Windows Explorer to display file extensions?
Choose Start > Control Panel > Folder Options > View, uncheck the Hide extensions for known file types check box.
Choose My Documents > Tools > Folder Options > View, check the Show file extensions check box.
Right-click the Desktop, choose File Properties > Extensions > Show Extensions.
Right-click Start, choose Properties > Folder Attributes, check the Show file extensions check box.
Which two locations are commonly used in Windows for temporary files? (Choose two.)
C:\
C:\temp
C:\My Documents\temp
C:\Program Files\temp
C:\Windows\temp
What is a common cause of the Invalid Boot Disk error?
The first logical drive in the extended partition is corrupt.
There is a non-bootable floppy disk in the floppy drive.
The boot loader is incorrectly configured.
BIOS needs to be reconfigured.
Which Windows XP Professional installation uses a Sysprep file?
unattended installation
remote location installation
OS deployment feature pack installation
image-based installation
Which Windows XP utility is used to partition and format hard drives?
Device Manager
Disk Management
Control Panel
File System Manager
CAP 13
The accounting department has received a new laser printer. According to the printer technical specification, the printer complies with the Bluetooth Class 2 specification. What is the maximum distance that any device could be expected to successfully send print jobs?
3 ft (1 m)
10 ft (3 m)
33 ft (10 m)
100 ft (30 m)
330 ft (100 m)
Refer to the exhibit. Which type of connection is being established between the PDA and the infrared keyboard?
visible
line-of-sight
reflective
close proximity
Which type of encryption key should be enabled on WPA-compliant devices?
28-bit
32-bit
64-bit
128-bit
255-bit
A laptop will only work on AC power. What should be done to fix the problem?
Replace the AC adapter.
Replace the battery.
Replace the CPU.
Replace the laptop.
Which two types of batteries should be completely discharged and then fully recharged to remove the charge memory? (Choose two.)
Li-ion
Ni-Cad
Ni-CH
Ni-Hid
NiMH
NiMO
The design department recently doubled the RAM capacity in all of the laptops. After the upgrade, the laptop users reported experiencing improved performance. Which operational benefit have the users noticed after the RAM increase?
The CPU reduces the number of operations by cycle.
The BIOS can use more RAM for I/O buffer space.
The CPU is now able to implement throttling.
The hard disk swap file is read less frequently.
The hard disk partitions are automatically extended.
Which three laptop components should be cleaned during routine maintenance? (Choose three.)
CPU fan
exterior case
hard disk
cooling vents
keyboard
RAM
Which portable connection provides the user with the possibility of high-speed Internet connectivity?
cable
cellular
dial-up
DSL
mobile LAN
Which wireless technology offers a maximum data rate of 540 Mbps?
802.3a
802.3n
802.5
802.11g
802.11n
Which standard uses a 128-bit key to secure Wi-Fi services?
IPsec
MD5
VPN
SHA
WPA
Which two sources can be used to determine the amount of currently installed RAM on a computer? (Choose two.)
Add/Remove Hardware utility
Administrative Tools utility
POST screen
System Properties dialog box
Windows BIOS wizard
What are two steps a technician should take before repairing a laptop? (Choose two.)
Ground to the power supply before opening the laptop cover.
Backup all data stored on the laptop.
Check the warranty to see if repairs must be done by an authorized service center.
Place a piece of tape over the CD laser so it doesn’t damage someone’s eyes when the laptop case is opened.
Disconnect the battery to insure it is not the problem.
Attach the AC adapter in case the problem is a defective battery.
When troubleshooting, which two actions are expected to be carried out immediately after resolving any type of failure? (Choose two.)
Show the client how they alone are responsible for the failure.
Train the client how to fix the problem themselves.
Complete all relevant documentation.
Discuss the results with the customer.
Present the client with an itemized bill.
Which three standard procedures must always be included in a preventive maintenance schedule? (Choose three.)
physical cleaning
memory updates
personnel training
hard drive maintenance
software updates
security policies checking
Manufacturers often offer devices in two versions, one with all the necessary manuals and drivers and one without. Which two names are given to these versions? (Choose two.)
OEM
premium
prime
retail
value
wholesale
Why should care be taken when charging and handling a laptop battery?
It contains toxic material that can leak if mishandled.
A laptop battery is delicate and breaks easily.
Laptop batteries can explode if mishandled or improperly charged.
It is against the law to mishandle a laptop battery.
Which IEEE 802.11 standard uses only 5 GHz technology?
802.11a
802.11b
802.11g
802.11x
Which two types of ports can be used to attach an external hard drive to a laptop computer? (Choose two.)
PC Card Type 1
PATA
USB
Firewire
Ultra DMA
CAP 14
Which two parts, one in a laser printer and one in a dot matrix printer, should be allowed to cool before attempting any repairs? (Choose two.)
tractor feed
toner cartridge
fuser assembly
automatic document feeder
print head
Which two pieces of software are included with most new printers and are installed by the user? (Choose two.)
printer patches
BIOS
configuration software
word processor
operating system
printer driver
Which Windows component allows the Windows operating system to output graphics to a computer screen or print device?
GDI
GUI
MDL
WPL
WPS
A user reports that whenever he needs to print a document, the print job process is automatically sent to the wrong network printer. Which path should the user follow to resolve this problem in Windows XP?
Start > System > Printers and Faxes, right-click the printer, and then select Set as Default Printer
Start > System > Hardware > Printers, right-click the printer, and then select Set as Global Printer
Start > Printers and Faxes > Set Default Printer, and then select the printer
Start > Control Panel > Printers and Faxes, right-click the printer, and then select Set as Default Printer
A technician is installing a new inkjet printer. The printer has successfully printed test pages. Which task also verifies the functionality of an inkjet printer after installing the printer driver?
sending print jobs for at least two minutes to verify the printer speed.
configuring the highest resolution before printing to check the printer memory
using different types of paper trays for special paper sizes
using only new paper sheets to determine any pre-existing problem with the print head
Which two methods are often used to connect a lower-cost printer to a Windows XP network? (Choose two.)
Use a separate print server.
Download a network-compliant driver.
Update to a networking firmware.
Connect to a networked computer and share the printer.
Install a NIC to the printer.
Install a Bluetooth adapter in the printer.
Which path will allow a user to add a printer in Windows XP?
Start > Control Panel > Add/Remove Hardware > Add Printer
Start > Control Panel > Printers and Faxes > Find a Printer
Start > System > Printers and Faxes > Add a Shared Printer
Start > Control Panel > Printers and Faxes > Add a Printer
What can a technician do to reduce the time a user must wait when large print jobs are sent to the printer?
Change to a networking operating system.
Upgrade the operating system.
Add more RAM to the printer.
Change to a newer version of the firmware.
Reinstall the print driver.
Which two issues should be considered when purchasing RAM for a new printer? (Choose two.)
physical type of memory
BIOS version
driver compatibility
number of memory slots available
firmware version
Layer 3 protocol used
A technician has completed the routine maintenance service for all the printers in the accounting department. Which action helps ensure that the next routine maintenance service is performed at the correct time?
Reset the printer.
Print an extended test page.
Upgrade printer firmware.
Print the maintenance page.
Install available patches from the manufacturer.
Reset the counters.
Users working in humid environments notice that documents printed by a laser printer are of poor quality. It is discovered that the printer is unable to attach toner to the paper. What is the most likely cause of the problem?
The environment damaged the drum.
The laser printer cartridge was refilled.
The incorrect type of paper is being used.
The toner is damp from the humidity and is unable to develop.
The paper absorbed moisture from the air and is damp.
Which two printer parts should be cleaned with a damp cloth? (Choose two.)
fuser in laser printers
ribbon in dot matrix printers
corona wire in laser printers
paper-handling machinery in inkjet printers
roller surfaces in dot matrix printers
print head in inkjet printers
As a part of the maintenance process for a laser printer, a technician should remove all the small particles of toner inside the printer. What is the recommended method to perform this task?
Use a damp cloth.
Use a cotton ball with isopropyl alcohol.
Use a vacuum cleaner with HEPA filtration.
Use a cleaning solution with a toner remover.
Use a can of compressed air to blow the particles away.
Which two items can help extend the life of an inkjet printer? (Choose two.)
driver version
type of ink
type of operating system
paper type
type of print server
type of cable to connect to the PC
Which type of printing option should be implemented to allow a user to change settings for each document sent to the printer?
default
general
global
per-document
pre-script
Users in the accounting department are having trouble digitizing documents with a scanner. What should the technician do to resolve the problem?
Add more RAM to the scanner.
Change the paper quality.
Calibrate the scanner.
Upgrade the scanner firmware.
A user reports that all images scanned with the departmental scanner have lines and marks. What should be done first to try to resolve the problem?
Verify the scanner firmware.
Disconnect and reconnect the scanner from any source of energy.
Restore the scanner quality to the original settings.
Clean the scanner glass and check for scratches.
Users from the art department are complaining that the inkjet printer is producing spotty and streaked printouts. What can be recommended to resolve this problem?
Restore the printer quality to normal setting.
Replace the print head.
Check the printer manual for RAM specifications.
Clean the print head by running the cleaning utility.
Which type of port is used for low-speed dot matrix printers?
Ethernet
FireWire
SCSI
Serial
USB
CAP 15 DAN 16
A network technician has received several reports regarding missing and corrupted information on a company file server. Which course of action can the technician use to investigate any unauthorized network access?
Audit all user activity by using telnet to access each computer during the day.
Enable event logging on each user computer to check for unauthorized network access.
Enable event logging on all network devices to audit any suspicious user activity.
Audit the event logs on the server to check for unauthorized network access.
Which two advantages are attributed to a hardware firewall when compared to a software firewall? (Choose two.)
It costs less because it is more efficient.
It does not impact the processing performance of the equipment it protects.
It always protects both the computer it is installed on as well as the rest of the network.
It is designed to protect more than one computer.
It is a free Windows operating system component.
A company wants to configure a firewall to monitor all channels of communication and allow only traffic that is part of a known connection. Which firewall configuration should be deployed?
packet filtering
proxy
stateful packet inspection
stateless packet inspection
A technician has been asked to format the drives of several Windows XP computers with a file system that can use file-level permissions to secure confidential information. Which file system should be used by the technician?
EXT
FAT
FAT32
NTFS
A technician needs to configure wireless networking on several new laptop computers. Which encryption method should the technician choose to achieve the best authentication and payload security?
MD5
PGP
WEP
WPA
Which simple wireless configuration technique can make the network invisible to unauthorized users?
Change the default password on the WAP.
Disable inactive wireless connections.
Filter all network access using MAC addresses.
Disable SSID broadcasting.
Windows XP should be updated on a regular basis. In which situation should automatic updates be disabled?
Computers on a corporate network perform well without automatic updates because they are protected by a firewall.
Home users should avoid automatic updates because they are protected by Windows Internet Connection Firewall.
Users accessing the network using a dial-up connection need to control when the updates are downloaded and installed.
Guest user accounts with limited access are unlikely to ever need updates because they are temporary users.
As part of the new security policy, a company decides to protect company data by performing backups on a regular basis. Which backup type takes the greatest amount of time and is commonly used in conjunction with another backup method?
differential
full
historical
incremental
Which quick solution should be tried first if a user is unable to login?
Verify that the CAPS and NUM lock keys are not on.
Reset the password for the user.
Assign the user a new username and password.
Add the user to a different group on the network.
Which two hazards exist when working with fiber optic cabling? (Choose two.)
chemicals
copper strands
electricity
glass splinters
connectors
Which safety precaution should be used when working with any type of cable?
Wear safety glasses when working any type of cable.
Cordon off the area before crimping the cable heads.
Wear cloth gloves when working with any type of cable.
Use a magnifying glass to divert light rays when working with fiber-optic cable.
ABC Computer Company is in the process of planning a network for a new client. A network technician has been asked to perform a physical inspection of the facilities to determine the flow of data and protocols required by the client. What is this inspection called?
data inspection
logical survey
plant inspection
site survey
When planning a new network, the administrator is interested in a physical topology that is used more often than any other. Which topology is the administrator considering?
bus
mesh
ring
star
Which protocol provides secure transport of data from the company web server to remote users?
HTTP
HTTPS
NetBEUI
DNS
The network technician is researching the best way to connect the branch offices to the main office. What are three main considerations that the technician should remember when choosing an Internet connection? (Choose three.)
availability
distance
operating system
protocols
reliability
speed
The network technician has been asked to share a new printer on the network using the Add Printer wizard for Windows XP. Which path should the technician use to run the Add Printer wizard?
Start > Run > prntwiz.exe
Start > Control Panel > Add Hardware > Printers and Faxes > Add Printer
Start > Administrative Tools > Services > Printers and Faxes > Add Printer
Start > Control Panel > Printers and Faxes > File > Add Printer
The network administrator has physically installed wireless NICs in three new computers. Which two additional steps will complete the installation process? (Choose two.)
Configure the device drivers.
Configure the signal strength of the antenna.
Configure the NICs with addressing information.
Update the BIOS to support the new wireless NICs.
Verify that the computers have a valid MAC address.
After booting a computer running Windows 2000, the following message displays: "The IP address already exists on another computer". Which two steps will quickly obtain a new IP address from the DHCP server? (Choose two.)
run ipconfig /all
run ipconfig /displaydns
run ipconfig /flushdns
run ipconfig /release
run ipconfig /renew
ABC Company requires preventive maintenance for all local network cabling once a month. Which task should be included in the preventive maintenance program?
Disconnect and reconnect all patch cables.
Inspect all patch cables for breaks.
Replace all labeling on the cables.
Replace all cable supports to prevent loose attachment points.
How is the built-in Windows XP firewall accessed?
Start > Control Panel > Performance and Maintenance > Security Center
Start > Control Panel > Internet Options > Security Center
Start > Control Panel > Security Center
Start > Control Panel > Network and Internet Connections > Security Center
CAP 15
Which two hazards exist when working with fiber optic cabling? (Choose two.)
chemicals
copper strands
electricity
glass splinters
connectors
Which safety precaution should be used when working with any type of cable?
Wear safety glasses when working any type of cable.
Cordon off the area before crimping the cable heads.
Wear cloth gloves when working with any type of cable.
Use a magnifying glass to divert light rays when working with fiber-optic cable.
ABC Computer Company is in the process of planning a network for a new client. A network technician has been asked to perform a physical inspection of the facilities to determine the flow of data and protocols required by the client. What is this inspection called?
data inspection
logical survey
plant inspection
site survey
When planning a new network, the administrator is interested in a physical topology that is used more often than any other. Which topology is the administrator considering?
bus
mesh
ring
star
Which protocol provides secure transport of data from the company web server to remote users?
HTTP
HTTPS
NetBEUI
DNS
The network technician is researching the best way to connect the branch offices to the main office. What are three main considerations that the technician should remember when choosing an Internet connection? (Choose three.)
availability
distance
operating system
protocols
reliability
speed
A company adds a few refurbished computers to a network. The company finds, however, that the refurbished computers perform significantly worse than the original networked computers performed with applications that require the transfer of data over the network. What should the company technicians do?
Check if the computers are using the integrated network interface.
Replace the Windows 2000 OS with Windows XP or Vista.
Check if the computers are using a VPN.
Check if the network interface cards in the computers are limited to 10 Mb/s.
The network technician has been asked to share a new printer on the network using the Add Printer wizard for Windows XP. Which path should the technician use to run the Add Printer wizard?
Start > Run > prntwiz.exe
Start > Control Panel > Add Hardware > Printers and Faxes > Add Printer
Start > Administrative Tools > Services > Printers and Faxes > Add Printer
Start > Control Panel > Printers and Faxes > File > Add Printer
The network administrator has physically installed wireless NICs in three new computers. Which two additional steps will complete the installation process? (Choose two.)
Configure the device drivers.
Configure the signal strength of the antenna.
Configure the NICs with addressing information.
Update the BIOS to support the new wireless NICs.
Verify that the computers have a valid MAC address.
Refer to the exhibit. The tracert command was used on the local computer to verify connectivity with a remote site. Which type of address is shown in the highlighted line of the tracert command output displayed in the exhibit?
default gateway for the local computer
default gateway for the ISP
IP address on the local computer
IP address for the desired site
After booting a computer running Windows 2000, the following message displays: "The IP address already exists on another computer". Which two steps will quickly obtain a new IP address from the DHCP server? (Choose two.)
run ipconfig /all
run ipconfig /displaydns
run ipconfig /flushdns
run ipconfig /release
run ipconfig /renew
A technician is troubleshooting a networked computer. The technician has gathered as much information as possible from the user and now needs to verify obvious issues. Which two actions should the technician perform? (Choose two.)
Clear the network log files.
Change the default gateway.
Verify the computer IP information.
Change the router configuration.
Check activity on the routers.
Which two ipconfig parameters are used within Windows XP to remove and assign the IP address previously provided by a DHCP server? (Choose two.)
dhcp
flush
reassign
refresh
release
renew
Which three pieces of information are displayed when accessing the Windows XP Local Area Connection Status? (Choose three.)
default gateway
DNS address
IP address
subnet mask
wildcard mask
WIN address
Which three ports are used by SMTP, POP, and IMAP? (Choose three.)
21
25
69
110
127
143
With which technology does the bandwidth decrease as the customer gets farther away from the ISP facility?
cable
DSL
ISDN
satellite
Students on the college network need to be able to view folder names and data in files stored on the Windows-based file server, but should never be allowed to add or save information on the server. Occasionally, the students also need to run media programs to watch videos stored on the server. Which permission should the network technician assign to the students accessing the file server?
change
execute
read
write
When planning the network in a new building, the technician notes that the company requires cabling that can extend up to 295 ft (90 m) with enhanced bandwidth support at an affordable price. Which cable type will the technician pick if he chooses the most common type of cabling used on networks?
Cat3
Cat5
Cat5e
Cat6A
A user complains that they cannot access any servers on the local network. What is the first thing a technician should do to troubleshoot the problem?
Attempt to ping 127.0.0.1.
Reinstall the NIC drivers.
Replace the NIC.
Attempt to tracert to a local server
PRACTICE FINAL
What is the highest risk associated with improperly charged or mishandled batteries?
The components can overheat.
The laptop will be unable to hold enough charge.
The battery can explode.
The lifetime of the battery will be reduced.
A technician wishes to secure the network authentication for all remote users. Which security technology uses radio communication with a computer before accepting a username and password?
biometrics
key fobs
smart digital cards
security dongles
The corporate security policy states that all remote connections use only secure tunnels for transport of data. Which encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN?
MD5
VPN
WEP
WPA
Which Startup type must be selected for a service that should run each time the computer is booted?
automatic
boot
manual
start
startup
A network technician has been asked to determine the best Internet connection for a branch office located in a new metropolitan office building. Which connection would provide the highest bandwidth and reliability at the lowest cost?
DSL
ISDN
satellite
wireless
Which type of printer configuration method overrides any other type of configuration?
default
global
predefined
per-document
Which scanner process uses an IT8 target to complete its function?
calibration
driver test
firmware upgrade
quality test
Refer to the exhibit. Which utility has the IT department started on each computer?
Chkdsk
Computer Management
Defragment
Scandisk
After the administrator manually configures the correct SSID on a new laptop, the computer is still unable to connect to the wireless LAN. Which additional action should the administrator take to resolve this problem?
Modify the group account of the user to include all file permissions.
Reboot the wireless access point.
Rename the laptop and reset the user password on the network.
Verify that the MAC address for the laptop is in the MAC address filter table.
Which two algorithms are used for hash encoding to guarantee the integrity of data? (Choose two.)
MD5
chap checksum
SHA
VPN
SSL
Which action should be taken first if a card key is lost or stolen?
Disable the card key system until the key can be recovered.
Disable all card keys. Issue new card keys to employees who show picture identification.
Issue the owner a new card key after a picture identification is shown.
Disable the lost card key.
Which two characteristics describe a software firewall? (Choose two.)
It typically protects only the computer it is installed on.
It is free-standing and uses dedicated hardware.
Initial cost for hardware and software updates can be costly.
It uses the CPU in the host computer.
It requires a specialized motherboard.
A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network?
bus
hierarchical
mesh
ring
star
An organization has two buildings, each with a separate network that uses a different IP addressing scheme. Which device can be used to enable the flow of data between the two networks?
bridge
hub
router
switch
Which three ports should be left open to avoid filtering e-mail traffic? (Choose three.)
23
25
107
110
143
212
Which recommendation should be observed when replacing existing memory?
The new memory should operate at the same speed as the hard drive.
The new memory should exceed the capacity of the hard drive.
The new memory should be as fast or faster as the cache found in the processor.
The new memory should be as fast or faster than existing memory.
Which three specifications should be considered when choosing a new motherboard? (Choose three.)
physical size and shape of the motherboard and case
size of monitor to be used
CPU supported
number and type of power supply connectors available
network topology to be used
amount of free hard drive space
The production manager of a small company is experiencing slow performance in a laptop. What should a technician try first in order to correct the problem?
Defragment the hard disk.
Reload the operating system.
Install additional RAM.
Upgrade the existing CPU.
Manufacturers often offer devices in two versions, one with all the necessary manuals and drivers and one without. Which two names are given to these versions? (Choose two.)
OEM
premium
prime
retail
value
wholesale
A network administrator has been informed about a problem with the network printer. What is the most reliable way to prevent print jobs from being added to the queue while the printer is being repaired?
Send an e-mail to all users telling them to stop sending any print jobs to the printer.
Send a network message to all users telling them to stop sending any print jobs to the printer.
Unplug the printer from the print server.
Stop the print spooler.
A technician has installed the driver for a scanner, attached the scanner to the computer, and performed an initial test scan. What should the technician do next to complete the testing phase of the scanner installation?'
Scan the same image again and compare both scanned images to detect scanning deficiencies.
Calibrate the scanner based on the image that has been scanned.
Print the scanned image and contrast it with the scanned image.
Visually compare the original image against the image on the screen.
Which three components are found in laser printer maintenance kits? (Choose three.)
fuser assembly
primary corona
pickup rollers
transfer rollers
secondary corona
paper trays
For a default installation of Windows XP Professional, which two settings are customizable? (Choose two.)
regional settings
shared folders and mapped drives
display settings
network settings
disk management
Which feature is characteristic of the ntbackup command?
It can be executed from a batch file.
It can be used to restore files.
It is used to create a copy of the registry.
It is used create restore points.
When upgrading a CPU what must be applied between the new CPU and the heat sink/fan?
lubricating grease
thermal compound
adhesive gel
penetrating oil
Refer to the exhibit. What type of partition arrangement does this Windows XP computer have on its hard drive?
1 primary, 3 extended, 1 logical, 1 free space
1 logical, 3 primary, 1 free space, 1 extended
3 logical, 1 extended, 1 free space, 1 primary
3 free space, 1 logical, 1 primary, 1 extended
A technician has installed a third party utility that is used to manage a Windows XP computer. However, the utility is unable to startup automatically whenever the computer is started. What can the technician do to resolve this problem?
Uninstall the program and then use Add New Programs in the Add or Remove Programs utility to install the application.
Use the Add or Remove Programs utility to set program access and defaults.
Change the startup type for the utility to Automatic in Services.
Set the application registry key value to one.
A call center technician receives a call from a customer who wishes to add more memory to a laptop to increase graphics performance. Which type of memory should be installed?
cache
CMOS
NVRAM
RAM
A technician is servicing a laser printer. Which two printer parts should the technician avoid touching because they retain large amounts of voltage even when disconnected from a power source?
fuser assembly
toner cartridge
corona wire
printer head
paper tray
Which safety precaution should an installer take when installing cable in the ceiling of a building?
Wear thick gloves to minimize damage to the cable.
Wear a shirt with short sleeves to avoid getting stuck in the cable supports when installing.
Wear lightweight shoes when installing cable runs inside the ceiling.
Wear safety glasses in case of encountering toxic materials during the installation.
Which two hazards are related to fiber optic installations? (Choose two.)
light that can burn the eyes
danger of electrocution if improperly installed
glass splinters that can penetrate the skin
risk of explosion when installed close to combustible substances
electromagnetic interference when installed close to electric cable runs
Which would be a reason to update the BIOS of a computer?
The computer unexpectedly boots into Safe Mode.
The ROM chip is no longer able to store the BIOS instructions.
When it starts, the operating system no longer recognizes the existing installed devices.
A computer being prepared for an upgrade is found to lack support for newer hardware devices.
After resolving an intermittent CD-ROM drive fault by firmly reconnecting a loose cable, the technician then decides to inspect all other cable connections to prevent other faults from occurring. Which two conditions will help to prevent future cable and connector faults? (Choose two.)
There are no missing or bent connector pins.
Cables are stretched tight between connectors.
Cables are not bent sharply around adapter cards.
Device data cables exceed manufacturer specifications.
The connector retaining screws have been over tightened with a screwdriver.
A computer has been relocated and all the cables reconnected. When the computer is powered on, the correct POST audio signals are heard and the hard drive LED shows disk activity. However, the monitor fails to display anything. What are two possible causes of this problem? (Choose two.)
The monitor Power Scheme settings are incorrect.
Relocation requires that the monitor resolution be re-adjusted.
The monitor cable connector is loose or disconnected because the retaining screws are missing.
The monitor is too far from the computer and the stretched monitor cable has unseated the serial interface card.
The monitor is connected to the integrated video adapter on the motherboard instead of the expansion slot adapter.
Refer to the exhibit. A customer purchased a computer three years ago and needs to add a second hard drive. The computer has the internal and external ports listed in the exhibit. Which solution would be the best if optimal performance is the deciding factor?
Attach a hard drive to the external serial port.
Attach a hard drive to an internal SATA port.
Attach a hard drive to the external parallel port.
Attach a hard drive to any of the external USB ports or the USB hub.
Attach a hard drive to the second PATA connector that attaches to the PATA port.
FINAL
The ABC Company sales force has been provided with smartphones and portable printers as shown in the graphic. Which two short-range technologies can support these types of devices? (Choose two.)
Bluetooth
Cellular
Infrared
WiFi
Satellite
Refer to the exhibit. Which type of technology is most suitable to bring Internet services to the facilities that are shown in the graphic?
ADSL
Infrared
WiFi
Satellite
Refer to the exhibit. The IT department requested a new set of memory chips to upgrade the old laptops. A picture of the memory chip required is attached to the purchase order so the correct item can be bought.
Which type of memory module is the IT department expecting to receive?
DIMM
DDR2
DRAM
LT-RAM
SODIMM
SORAM
What is one thing a technician can determine about a system when using the command ipconfig?
user e-mail address
operating system configuration
system network configuration
system password
A junior technician finds preventive maintenance very boring and would prefer to fix real problems. However, what is the most important reason for the company that the preventive maintenance be done?
It is important to train the junior technicians to become good technicians by giving them the preventive maintenance duties.
Preventive maintenance helps to protect the computer equipment against future problems.
Preventive maintenance allows the IT department to regularly monitor the contents of user hard drives to ensure computer use policies are being followed.
Preventive maintenance enables the IT manager to check on the location and state of the computer assets.
Which Windows hard drive partition is referred to as the C: drive?
the first volume partition
the first primary partition
the first extended partition
the first logical partition
A company has a preventive maintenance policy that requires every computer have a new restore point created every six months. How can a technician create the restore point?
From the CLI enter the command restore /cn.
Go to Start > Control Panel > Accessories > System Tools > System Restore > Create a restore point.
Go to Start > All Programs > Accessories > System Tools > System Restore > Create a restore point.
Right-click My Computer and then go to Properties > Restore > Create Restore Point.
A technician is trying to explain USB 1.1 and USB 2.0 to a user in terms of speed. The user is having problems comparing the two standards based on the values expressed in Mbps. Which explanation can the technician use that will best describe the relationship?
USB 2.0 is twice as fast as USB 1.1.
USB 2.0 is twenty times as fast as USB 1.1.
USB 2.0 is forty times as fast as USB 1.1.
USB 2.0 is one hundred times as fast as USB 1.1.
A technician has been asked to install a second optical drive in a computer. The technician will need to configure the drive as slave. How can the technician accomplish this desired configuration?
Use jumpers on the motherboard to configure the drive as slave.
List the drive as slave in the CMOS.
Connect the drive after the twist in the PATA cable.
Use jumpers on the drive to configure the drive as slave.
Several messages sent to the network administrator are reporting that access to a secure server using HTTPS is failing. After checking recent updates to the company firewall, the administrator learns that the firewall is blocking HTTPS. Which port should be opened to solve the problem?
22
53
80
143
443
A user on the network needs to be able to add and remove files in a shared folder on an NTFS-formatted server. Users should never be allowed to assume ownership of the shared folder. Which permission should the administrator assign to the user?
modify
execute
read
write
A new technician has joined the IT team and is about to service a heavy printer. Which two precautions should be taken to avoid any injury when transporting the heavy printer to the service area? (Choose two.)
Avoid lifting the equipment using the strength in your back.
Lift the equipment using the strength in your legs and knees.
Avoid bending your knees when lifting the printer.
Bend your back to pick the printer up.
Avoid lifting the printer close to your body.
A technician is trying to allow user access to a printer on a small network. Which solution is the lowest in cost?
wired print server
dedicated PC print server
computer-shared printer
wireless print server
on-demand PC print server
Which technology allows a user to securely access a company LAN across a public network?
MD5
SHA
TCP
VPN
A network administrator needs to restrict access to the network. Which type of firewall allows only those packets that are part of a known connection?
stateful firewall
proxy firewall
packet filter
content engine
A network technician is installing network service in a new office. What is the distance limitation of a single data run for UTP cabling without adding networking devices?
33 ft (10 m)
100 ft (31 m)
330 ft (100 m)
500 ft (154 m)
A technician has been asked to connect a new scanner to a computer. Which interface provides the fastest transfer of data?
USB 2.0
SCSI (Ultra-320)
Parallel (IEEE 1284)
Serial (RS-232)
A technician has been performing routine preventive maintenance on a PC. After maintenance is performed and the PC and monitor are turned on, the monitor displays a black screen. The technician does a visual inspection and determines that there are two video ports at the back of the PC. What possible problem should the technician investigate first?
The monitor was damaged during cleaning.
The video connector has been disabled.
The computer requires two monitors for video.
The video drivers need to be updated.
Which security technology will control access to a data storage facility?
enforcing network logins
fitting equipment with security screws
using cable locks
using card keys
What are two characteristics of the IEEE 1284 parallel interface standard? (Choose two.)
These cables usually have 9 pins or 25 pins on both ends.
The maximum cable length is 50 ft (15 m).
All ports that are used by this standard are also known as D-shell ports.
The two available operative modes are EPP and ECP.
Bi-directional communication is allowed.
After information has been gathered from a user about the failure of a printer, which two actions should be performed? (Choose two.)
Change the communication cable.
Ensure all cables are connected correctly.
Reinstall the print driver.
Clear any type of paper jams.
Clear the printer queue.
Look for any type of upgrade on the web.
What two dangers exist when working on laser printers?
mercury poisoning
electrical shock
hexavalent chromium ingestion
burns
lead poisoning
Which interface can transfer data at a maximum speed of 480 Mbps?
parallel
serial
SCSI
USB 2.0
IEEE 1394
A technician is helping a customer select additional RAM for a computer. Which two items should be considered when updating RAM? (Choose two.)
The new memory must run at least as fast as the existing memory.
The total amount of memory must not exceed the size of the swap file.
The new memory must be compatible with the motherboard.
The new memory must run at speeds as fast as the cache of the CPU.
The new memory must be compatible with the video card.
Using RIS, a technician is having difficulties performing a remote installation. Which two problems would cause the remote installations to fail? (Choose two.)
The unattend.txt file is corrupted.
The computer does not have a PXE-capable NIC installed.
The third party drive imaging utility is faulty.
The setupmgr.exe was not used to connect to the remote computer.
The network shared folder that holds the OS files is not accessible.
A computer had updates installed and was rebooted. Nothing is displaying on the monitor that is connected to the computer. What could the technician do to reset the monitor settings?
Use the BIOS.
Use the Windows installation CD.
Use internal DOS commands.
Use the F8 key.
A Windows XP computer that once had three operating systems installed now has only one operating system. However, when the computer boots up, the user is still presented with a choice between the old systems and XP. Which path allows the user to make changes to the BOOT.INI file?
Click Start > Control Panel > System. Click the Advanced tab. Click Performance Options
Right click My Computer. Choose Manage. Click System Tools. Double-click Disk Management.
Right click Start > Control Panel > Administrative Tools > Computer Management. Double-click Storage. Double-click Disk Management.
Click Start. Right click My Computer. Choose Properties. Choose the Advanced tab. Click Settings in the Startup and Recovery area. Click Edit.
A technician needs to stop the print spooler on a Windows XP computer because the printer has failed. Which set of commands should the technician follow?
Choose Start > Control Panel > System. Choose Hardware tab. Choose Services.
Choose Start > All Programs > Accessories > System Tools. Choose Services.
Choose Start > Control Panel > Administrative Tools >Computer Management. Choose Services.
Choose Start > Control Panel > Printers and Faxes. Right click the icon for the printer. Choose Properties. Choose the Advanced tab. Choose Services.
Engineers are designing a security scheme to allow only authorized persons to access the facilities of a national bank. Which security control measure provides the most secure solution for employee identification?
card keys
security guards
security key fobs
biometric devices
The network manager decides to implement a simple security solution to the company WLANs. Which wireless security technique should the manager take to hide the WLAN id from any access point?
Configure WEP only on the access point.
Install WAP on the wireless clients.
Configure MAC address filtering on the access point.
Disable the broadcast of the SSID on the access point.
Decrease the antenna spectrum on each wireless client.
A technician has received several reports from employees about receiving e-mail from websites that request private bank information. Which type of security should be implemented to block employees from accessing these suspicious websites?
virus protection
spyware protection
adware protection
phishing protection
A user wants to upgrade the video adapter in a computer. What is the first issue the user should consider when selecting a newer video adapter?
Is there an available compatible expansion slot on the motherboard?
Does the price of the video adapter include a comprehensive warranty?
Are video adapter drivers available for the operating system that is in use?
Does the video manufacturer have a reputation for reliable and high quality products?
Which external connection technology would a technician choose for a customer who wants to connect a device capable of a data transfer rate of 700 Mb/s to a computer?
USB 2.0
802.11 (Wi-Fi)
Serial (RS-232)
IEEE 1394b (Firewire)
Posting Komentar
Perhatian Para Pembaca!
Dilarang Keras:
1. Menggunakan kata-kata kotor dalam menulis komentar, terima kasih atas partisipasi saudara/i.
2. Menulis link hidup, link yang tidak berkaitan.
3. Silahkan sertakan sumber jika meng-copy tulisan di atas.
4. Sangat disarankan untuk memfollow blog ini.
5. Jangan lupa untuk berlangganan artikel terbaru.