Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 41

( : - cisco it1 ) It 1 % 100 * ( ctrl + F ) ** .. (Chapter 1 Exam - IT Essentials: PC Hardware and Software (Version 4.

63 Headphones 3- monitor 2- 1printer EEPROM It can supply power from the computer to devices 1394 biometric authentication -1 device digital camera -2 ATX BTX pin 6-pin-4 -IRQ 1 DMA -2

How many FireWire devices can be supported by a single FireWire port Which three devices are considered output devices? (Choose three

hich type of ROM can be reprogrammed with software while it is still physically nstalled in the computer Which important feature is offered by the USB standard

hich IEEE standard defines the FireWire technology

Which two devices are considered input devices? (Choose two

Which two form factors are commonly used to build a new computer? (Choose two What are the two connector types for the 1394a interface? (Choose two hich three system resources are commonly used for communication between the CPU or memory and other components in the computer? (Choose three

Which technology would be best to use for drive redundancy and data protection echnician receives a complaint of poor image quality after the user changes the tive resolution. While investigating the complaint, the technician discovers there is mismatch between native mode and the native resolution of the peripheral. Which em is configured incorrectly efer to the exhibit. Based on the advertisement that is shown, what is the native esolution of this computer system Which memory module has a front side bus speed of 200 MHz hich type of computer resources are direct lines to the processor and are used by omputer components to request attention from the CPU student has passed the CompTIA A+ certification exam. Based on this passing core, for which job is the student now qualified What is a function of the operating system in a computer

I/O address -3 RAID LCD

x 800 1280 DDR-400 IRQs

What is the function of a fan on top of a heat sink

hat are two factors that must be considered when choosing a computer case? Choose two

echnician creates a simple circuit that has a 9 V light bulb attached to a 9 V ttery. The power output of the light bulb is 100 W. Which equation should be used calculate how much current in amps is required to achieve the full 100 W output om the 9 V bulb

PC hardware and software technician It instructs the computer how to process information to move the heat away from the CPU the number of external or -1 internal drive locations the size of the motherboard -2 and the power supply I = P/V = 100W/9V = 11.11A

What is a function of a KVM switch

provides capability to share a keyboard, a mouse, USB devices, and speakers with multiple computers

(Chapter 2 Exam - IT Essentials: PC Hardware and Software (Version 4.1

Which two tools are recommended for cleaning a PC? (.(Choose two Which tool should be used if a user needs to optimize space ?on a hard drive Which two types of tools can help protect a computer from

compressed air -1 soft cloth -2 Defrag Antivirus software -1

(.malicious attacks? (Choose two Which tool in Windows XP gives a technician access to ?initialize disks and create partitions Refer to the exhibit. Which type of tool is presented in the ?graphic ?How does a technician discharge static buildup Which Windows XP command-line utility scans the critical files of the operating system and replaces any files that have ?been corrupted The performance of a computer is reduced after it has been using the Internet. Which three toolscould be run to try to (.improve the performance of the computer? (Choose three Refer to the exhibit. Which type of tool is shown in the ?graphic Which condition refers to a sudden and dramatic increase in ?voltage, which is usually caused by lightning Which step should be performed first when servicing ?computer equipment (.Which two tools can help protect against ESD? (Choose two Which two devices commonly affect wireless LANs? (Choose (.two (.What are two significant sources of EMI? (Choose two Why should an antistatic wrist strap be worn when working on ?electronic equipment Why is documentation of all services and repairs an important ?organizational tool for a technician

Spyware Remover -2 Disk Management Phillips-head screwdriver touching an unpainted part of the computer case System File Checker Spyware Remover -1 Defrag -2 Disk Cleanup -3 digital multimeter spike Turn off and remove the .power source antistatic wrist strap -1 antistatic mat -2 wireless phones -1 microwaves -2 electrical storms -1 power lines -2 to equalize the electrical charge between a person and the equipment It provides reference material for similar problems when such problems are encountered in the future batteries -1 monitors -2 printer toner cartridges -3 Avoid using magnetized .tools compressed air

Which three computer components contain hazardous materials and require special handling for disposal? (Choose (.three Which precaution should be taken when working around ?electronic devices A technician has a room of computers which are running very hot. The technician discovers that the heat sinks in the computers are very dusty. What should the technician use to ?clean the heat sinks Which computer components must a technician never try to CRT monitor ?work on when wearing an antistatic wrist strap

(Chapter 3 Exam - IT Essentials: PC Hardware and Software (Version 4.1

A technician is installing a new power supply in a computer. Which type of power connector should be used to ?connect to an ATX motherboard When installing a CPU in a ZIF socket, how should the ?technician align the pins to avoid damage

pin connector-20

Pin 1 on the CPU is aligned with Pin 1 on the .ZIF socket When building a computer, which two components are hard drive -1 (.normally installed in 3.5-inch drive bays? (Choose two floppy drive -2 Which two connectors are used to connect external PS/2 -1 (.peripherals? (Choose two USB -2 A field technician has been asked to install a wireless 802.11g PCIe -1 NIC in a computer, but is unsure about the expansion slots PCI -2 available. Which two types of wireless NICs should the (.technician have available? (Choose two After a technician has assembled a new computer, it is during the POST necessary to configure the BIOS. At which point must a key ?be pressed to start the BIOS setup program A technician has just finished assembling a new computer. It issues a number of When the computer is powered up for the first time, the POST .short beeps ?discovers a problem. How does the POST indicate the error Which action is recommended to prevent the motherboard Use standoffs to keep ?from contacting the metal base of the case the motherboard above .the metal base What is a convenient way that a technician can tell whether a The floppy cable has a ?ribbon cable is for an IDE hard drive or a floppy drive .twist in the cable ?Which type of drive is installed in a 5.25-inch bay optical drive What is the most reliable way for users to buy the correct Check the motherboard ?RAM to upgrade a computer manual or .manufacturer's website ?What is a function of the BIOS performs a check on all internal components What should be the next installation step after all the internal Reattach the side panels components of a PC have been installed and connected to .to the case Refer to the exhibit. Which should be the last step when Step 2 ?connecting external cables to a computer ?What is a function of a video adapter card provides an interface between a computer and a display monitor What is a function of the adapter cards that are installed in a to provide functionality ?computer for external components

Which two connections should be provided to a floppy disk (.drive during installation? (Choose two

?Where should internal drives be installed in a computer Refer to the exhibit. What is the order of steps that should be ?followed for a power supply installation in a computer What is the first step that a technician should take before ?physically opening a computer case

to be connected to the computer a floppy data cable to -1 connect the FDD to the motherboard a cable from the -2 power supply to the Berg power connector on the FDD in internal bays Steps 1, 4, 3 Consult the website of the manufacturer

(Chapter 5 Exam - IT Essentials: PC Hardware and Software (Version 4.1

Once minimum hardware requirements are satisfied, where should a technician look to determine if the computer hardware has been tested with Windows ?XP A technician needs to upgrade the file system on a Windows XP computer from FAT32 to NTFS. Which course of action should be taken to upgrade the file ?system to NTFS Which set of guidelines is used to ensure that programmers develop applications that are ?compatible with an operating system A technician has finished installing Windows XP. What should the technician do to verify that all ?hardware has been installed correctly A technician thinks that the file system on a computer has a problem because Windows XP is reporting data integrity issues. Which Windows XP ?utility will check the file system for errors A technician has a computer that is unable to boot Windows XP properly. The technician has decided that it is necessary to attempt a repair of XP. Which utility will be run if the technician selects Repair

the Windows XP Hardware Compatibility List Run the Microsoft Convert .utility API Use the Device Manager utility to ensure that all the .devices are operational Chkdsk

Recovery Console

?XP from the XP boot disk A user decides to install a new version of Windows Vista but needs to retain the configurations and customizations of the current Windows XP operating system. Which software can be used to achieve ?this Which operating mode is used by Windows XP to ?run a DOS application What are three features of the Microsoft (.Management Console (MMC)? (Choose three

Windows User State Migration Tool

virtual real mode It organizes operating -1 .system snap-ins It can be used to create -2 .customized MMCs It requires administrative -3 .privileges to access Safe Mode with Networking Support

A technician has installed new video drivers on a Windows XP computer and now the monitor shows distorted images. What startup mode can the technician use to access a new driver on the ?network A company with 40 computers needs to reduce repair costs, decrease downtime, and improve reliability. Which task will When troubleshooting a printer problem, a technician finds that the operating system was automatically updated with a corrupt device driver. ?Which solution would resolve this issue What would be the result of having a corrupt Master ?Boot Record Which mode allows applications that are not compatible with the current operating system to run in an environment that simulates an earlier operating ?system Which directory contains Windows XP OS system ?files What is the term for the ability of an operating system to run multiple applications at the same ?time Which two operating systems can function correctly (.on a system with 64 MB of RAM? (Choose two How much RAM can be addressed by a 64-bit ?operating system Which registry file contains information about the ?hardware and software in the computer system When a computer boots from the Windows Vista disc, which three functions are performed if the

Develop a preventive .maintenance plan .Roll back the driver

The operating system will .fail to start compatibility mode

C:\WINDOWS multitasking Windows XP Home -1 Windows XP Professional -2 GB or more 128 HKEY_LOCAL_MACHINE Changes to disk partitions -1 can be made

Custom (advanced) option is selected? (Choose (.three

A clean copy of Windows -2 .Vistais installed The location -3 of the Windows installation can be selected

(Chapter 6 Exam - IT Essentials: PC Hardware and Software (Version 4.1

Which two laptop ports are used primarily for (.communication and network connectivity? (Choose two What is the major difference between desktop and laptop ?motherboards

Ethernet -1 modem -2 Desktop motherboards typically have a standard form factor and are interchangeable while laptop motherboards .are proprietary Which two characteristics make laptops a better choice mobility -1 (.than desktop computers? (Choose two size -2 Which type of interface do current laptops use to achieve PC ExpressCard ?similar expansion capabilities as desktops Which generation of cell-phone standards was the first to third deal with how to send and receive text, photographs, and ?video Where can a technician change the power schemes on a Select Power ?laptop running Windows XP Options from within the .Control Panel ?What is the proper way to clean optical drives Use a cleaning disc for .optical drives Which two actions should be performed to clean the Use a lint-free cotton -1 (.surface of CDs and DVDs? (Choose two .cloth Wipe the disc from -2 .the center outward Which display technology is most commonly found in LCD ?modern laptop computers Which three components commonly connect to USB or camera -1 (.FireWire ports? (Choose three printer -2 scanner -3 Which two devices can be individually configured within disk drive -1

Windows XP to power off after the laptop has been idle (.for a given period of time? (Choose two Refer to the exhibit. Which two form factors are supported by the devices shown in the graphic? (Choose (.two Refer to the exhibit. A laptop has these graphics on specific keys on the keyboard. Which keywould be used in conjunction with the Fn key to connect a laptop ?to an external monitor A technician is replacing a laptop SODIMM. With what ?component is the technician working A technician has been called in to troubleshoot a laptop that fails to power on. The technician repeatedly pushes the power button without any results. What should the ?technician do next A technician is responding to a helpdesk ticket for a laptop that has a distorted image of the Windows ?desktop. What is one possible solution Which component should be removed before cleaning a ?laptop Which two questions that a technician can ask during the troubleshooting process are considered open-ended? (.(Choose two Refer to the exhibit. Which laptop component port is ?circled Refer to the exhibit. Which type of connection is indicated when a laptop LED is illuminatedwith the ?symbol that is shown

monitor -2 34mm wide -1 54mm wide -2 F8

RAM .Attach the AC adapter

Reset the laptop to the .native resolution Battery What software has -1 ?been installed How would you -2 describe the problem ?you are experiencing USB Bluetooth

(Chapter 7 Exam - IT Essentials: PC Hardware and Software (Version 4.1

?Which technology is used by laser printers Which laser printer component is a metal cylinder that is ?coated with a light-sensitive insulating material Which software, embedded in a printer, controls how the ?printer operates and can be upgraded ?Which software converts scanned pages into text firmware

electrophotographic drum

Optical Character

What is the best source for a Windows-compatible ?scanner driver Which Windows XP command sends a file ?named example.txt to the default printer Which printer technology is used in low-cost, photo?quality printers ?What is typical of a network printer installation Instead of the document that was expected, a printer is printing unusual characters. What should be the next ?steps in solving this printer problem

Recognition website for scanner manufacturer print example.txt inkjet the use of Ethernet or wireless Send the print job again. If that fails to work, turn the printer off and back on, then resend the print job. If the problem still exists, reinstall or .upgrade the print driver damage to the UPS Paper Type -1 Print Quality -2 USB -1 FireWire -2 Remove power to the .printer removing impurities collected on internal components rebooting the -1 computer restarting the print -2 spooler .Identify the symptoms moving parts internal leaks -1 reduced life of the -2 printer wiping the glass with -1 cloth removing the glass -2 during cleaning drum

What problem might be encountered if a laser printer is ?plugged into a UPS Refer to the exhibit. Which two printer configuration settings should be modified when changing from (.standard paper to photo paper? (Choose two Which two interface types can supply power to a scanner (.or printer? (Choose two What is the recommended first step in performing printer ?maintenance Which routine maintenance procedure can extend the life ?of a printer Which two methods can restart a stopped print service? (.(Choose two What is the first step in troubleshooting a printing ?problem What is a feature that causes printers to require higher levels of maintenance than other electrical devices ?require What are two possible negative results from refilling ink (.cartridges on a printer? (Choose two What are two recommended procedures for proper (.scanner care and maintenance? (Choose two A museum possesses several old paintings that the

curators wish to reproduce and sell in the museum gift shop. Which type of scanner can be used to produce the ?highest-quality reproduction

(Chapter 8 Exam - IT Essentials: PC Hardware and Software (Version 4.1

The Internet is an example of which type of ?network Which suite of protocols is used to transmit ?data across the Internet Which dotted decimal number is used to distinguish the network portion of an IP ?address from the host portion What is the most commonly used DSL ?technology Which three factors are reasons to choose a client/server model for a network instead of (.peer-to-peer? (Choose three WAN TCP/IP

subnet mask ADSL The company -1 network requires secure access to confidential .information The users need a -2 central database to store inventory and .sales information The data gathered -3 by the employees is critical and should be backed up on a regular basis The number of -1 twists in the wires inside the cable The number of -2 wires inside the .cable

Which two factors are used to determine the different categories of UTP cabling? (Choose (.two

Which Windows XP command displays the route taken by packets crossing an IP ?network What is the maximum range a data signal can travel through a 1000BASE-T network ?segment Which two characteristics describe Ethernet (.technology? (Choose two Which device enables computers to be attached to a network without segmenting the ?network A student is helping a friend with a home computer that can no longer access the Internet. Upon investigation, the student discovers that the computer has been assigned the IP address 169.254.100.88. What could cause a computer to get such an IP ?address A student brings a laptop to a school that has wireless access. The laptop is not connecting to the school network. What is the first thing ?that the student should check Which procedure is normally performed when connecting a computer to an Ethernet network ?for the first time Workers are required to access the company LAN when traveling. Which networking technology can provide secure and encrypted ?access to the LAN Which two statements are true of network computing in contrast to non-network (.computing? (Choose two

tracert (ft (100 m 328 supported by IEEE -1 802.3 standards uses a bus logical -2 topology hub a bad network cable

the available wireless networks within range Attach a cable that has an RJ-45 .connector VPN

?What is true about the TIA/EIA

Fewer peripherals -1 are needed Centralized -2 administration capabilities are .enhanced It developed standards to replace proprietary standards

after U.S. telephone .industry deregulation A technician installs a new NIC in a PC and faulty NIC -1 connects an Ethernet patch cord from the NIC faulty patch cord -2 to a wall jack. The technician then notes that the link lights are not active on the NIC. Which two problems could be indicated by (.this lack of activity? (Choose two Why should network cables always be to save ?labeled troubleshooting time Which method is recommended in order to Purchase equipment avoid problems with counterfeit network only through ?equipment manufacturer.authorized partners Which networking protocol translates a DNS network name such as www.cisco.com to a ?unique IP address

(Chapter 9 Exam - IT Essentials: PC Hardware and Software (Version 4.1

(.What are two examples of malware? (Choose two

spyware -1 grayware -2 Which two actions improve security on a wireless network? .Enable WEP -1 (.(Choose two Enable MAC -2 filtering Which best practice should be included in a password Implement lockout ?protection policy rules upon consecutive unsuccessful attempts at accessing .the system Which three questions should be addressed by What items need -1 organizations developing a security policy? (Choose ?to be protected (.three What is to be -2 done in the case of a ?security breach

What are the -3 possible threats to ?the items What must be done to ensure that the antivirus software on Download the latest a computer is able to detect and eradicate the most recent signature files on a ?viruses regular basis A technician has downloaded the latest Windows XP Create a restore point updates from the Microsoft website. What should the ?technician do before installing the updates A computer that is configured for automatic updates is shut The update will be down during a scheduled update. However, the update is installed as soon as downloaded successfully without any file being corrupted in the computer is the process. What will happen to the update as a result of powered on ?this shutdown Which precaution helps protect against social engineering guiding visitors within ?in the workplace the premises and escorting them personally when they leave A large number of e-mail messages are appearing in the spam inbox of a home computer user. The messages relate to products for which the user has never requested ?information. Which name is given to this type of e-mail A company network was subjected to several security replay attacks after TCP/IP had been installed on the company computers. Analysis has shown that in most of the attacks, attackers used networksniffers to extract user names and passwords of critical accounts on the network. Which type ?of TCP/IP attack did these attackers deploy How can web tools, such as Java or ActiveX, be used for a by installing ?malicious attack unwanted programs on a computer Which security device stores user physical characteristics a biometric sensor ?to provide a user level of facility access What condition can allow unauthorized access to a network poor wireless device ?for users who are not physically connected to the network security Why should everyone in an organization give high priority because everyone ?to computer and network security can be affected by computer and network security problems What are two important outcomes of good computer and keep equipment -1 (.network security? (Choose two functioning provide access -2 only to authorized users

What is a signature as the term is used in antivirus ?and antispyware software development Refer to the exhibit. What is the correct order for the steps ?in the troubleshooting process Which two questions are examples of open-ended questions that could be used in the security troubleshooting (.process? (Choose two For troubleshooting security problems, what should be done immediately after the exact cause of the problem is ?determined At which step of the troubleshooting process will a computer technician ask the customer a series of open?ended and closed-ended questions

a programming code pattern

2.5.4.3.6.1
What problems are -1 ?you experiencing What websites -2 have you visited ?recently Establish a plan of .action for resolution Identify the problem

(Chapter 10 Exam - IT Essentials: PC Hardware and Software (Version 4.1

A customer calls to complain that another technician was rude to them. In the past, the technician has received many complaints about rudeness regarding this coworker. How should the technician handle this ?complaint Which two actions are examples of good netiquette? (.(Choose two

Listen to the complaint, apologize for the incident, and then offer .to help the customer

Check grammar and -1 spelling before sending e-mail Use mixed case in e- -2 mail instead of all upper case or all lower case While servicing a computer, a technician notices that a Step away from the document labeled "confidential" is open on the computer. computer and ask the ?What should the technician do user to close the document Which task would be the responsibility of a level-two resolving computer ?technician problems that require opening up the computer Which two techniques should be used when dealing with Use simple step-by- -1 (.an inexperienced customer? (Choose two .stepinstructions

.Speak in plain terms -2 .Go for a quick walk -1 Listen to soothing -2 .sounds Practice relaxed -3 .breathing What is the recommended way to place customers on Ask and wait for ?hold permission before placing customers on hold Which issue is an example of an exception to an SLA A customer wants two ?that should be escalated to a manager new computers added to the existing SLA .without additional cost While a technician is listening to a lengthy explanation of Wait until the customer a problem, the technician identifies the solution to the has finished speaking, ?problem. How should the technician proceed and then explain the possible solution Which three pieces of information should be given to the your name -1 next technician when transferring a customer? (Choose ticket number -2 (.three customer name -3 For a computer technician, what is the first step in speaking directly with ?resolving a customer problem the customer Which statement is true about the role of stress when Reducing stress helps ?troubleshooting customer computer problems customers provide more useful information Why is good communication a critical part of successfully It helps technicians ?troubleshooting customer problems learn important details .from the customer What are two examples of technician interactions with a sending chain letters -1 customer that are considered to be eitherunethical or sending anonymous -2 (.illegal? (Choose two e-mails Where would legal details be found that describe proper SLA ?handling of information for a specific customer What is the primary responsibility of a level-one helpdesk to gather pertinent ?technician customer information What are two examples of situations where a helpdesk The computer -1 call should be escalated to a level-two technician? .case must be opened (.(Choose two The problem cannot -2 be resolved in less than .ten minutes A technician works on a customer computer at the customer e-mails -1 customer site after answering a support call. Which two hard copies of files -2 items should the technician regard as being the property on the customer desk (.of the customer? (Choose two Which three relaxing techniques can help relieve the stress caused from helping customers in a call center? (.(Choose three

Which common feature of helpdesk software allows a technician to control a customer computer from a call ?center desk A computer technician wants to make sure that a customer, who had been experiencing a problem with a hard drive, is satisfied that the problem has been resolved. Which of these rules would help accomplish ?this desire

remote diagnostics utility Follow up with the customer to verify that the problem has been .resolved

1)Which two ports are used to connect external media readers to a computer? (Choose two.) #FireWire #USB 2)Why should you use an antistatic mat when working on the internal components of a computer? #Reduce the chance of computer components being damaged by ESD 3)Under which circumstance would the use of an antistatic wrist strap be discouraged? #When working with high voltage circuits

4)What is a critical step when installing a second PATA hard drive in a computer? #Ensure that pin one of the PATA data cable is correctly aligned with the connector 5) A technician needs to retrieve a DVD from an optical drive that is jammed and fails to open. What is the best method the technician could use to retrieve the DVD? #Insert a pin in the small hole next to the eject button. 6)Which method of disk writing does RAID 5 use? #Parity 7) A customer is interested in video editing and has purchased a FireWire hard drive for storage of videos. However, no FireWire ports are available on the motherboard. What type of adapter will the customer be interested in obtaining? #eSATA 8) When a computer boots, the hard disk is not recognized. What are two possible causes of the problem? (Choose two.) #The power cable is not attached properly to the drive. #The data cable is loose or disconnected. 9)What is the recommended procedure for cleaning a computer fan assembly? #Hold the fan blades in place and clean them with compressed air 10)While performing routine maintenance, a user notices that the desk area around the computer is cluttered and dusty. After cleaning the desk area, what action should the user take to clean the computer? #Remove all dust and debris from the computer using a can of compressed air. 11) What manufacturing process makes a multicore processor operate faster than a single-core processor on the same motherboard? #The multicore processors are designed with multiple processors integradet into the same circuit. 12) You are monitoring a new technician installing a device driver on a Windowsbased PC. The technician asks why the company requires the use of signed drivers. What would be the best response to give? #A signed driver has passed Microsoft's quality lab test and prevents a system from being compromised. 13)When a technician is servicing a laser printer, which two dangers need to be avoided? (Choose two) #electrical shock # burns

14)What is the recommended way to clean an optical drive? #Use compressed air and lint-free cotton swabs 15)A technician has determined that a computer is failing to boot because of a power supply that is not supplying power to the hard drives. What is the correct course of action? #No attempt should be made to repair the power supply. The power supply should be replaced with a power supply of equal or greater wattage 16)Which type of hard drive cable connects drives in a daisy chain series and requires manual termination at each end of the daisy chain to prevent data corruption? #SCSI 17) A technician is concerned that a computer is overheating. The computer reboots without warning. What can the technician do to improve the circulation of air through the computer? #Replace the case with one that has front air vents. 18)How should a floppy disk drive be cleaned. #Use a drive cleaning kit 19)Why should a technician avoid using magnetized tools when repairing a computer? #They store ESD and discharge on contact with computer components. 20) A technician begins gathering data from a customer by asking open-ended questions. Which question is a proper open-ended question? #What happens when the PC is powered on?

chapter 12
1) Which two locations are commonly used in Windows for temporary files? (Choose two.) #C:\temp #C:\Windows\temp 2)A new graphics card is installed in a computer. When the computer is powered on, the default drivers are loaded but some of the applications do not work properly. What should the user do to improve the graphics card performance? #Check the website of the manufacturer of the latest drivers

3) A video-file editor defragments the hard drive on his computer every month to ensure continuing optimal performance. How can the editor ensure that the defragmentation occurs every month? #Add Defrag to Scheduled Tasks in System Tools. 4) Which information is backed up when a restore point is created? #System and Registry information only 5) Which two pieces of information are required when configuring Automatic Updates for Windows XP? (Choose two.) #day #time 6) A technician boots a Windows XP computer that has an incorrect driver loaded for the video adapter card. How can the technician revert to a previous driver? #Select the video adapter card in Device Manager, select the Driver tab, and click Roll back driver from Properties. 7) What is a feature that Internet browsers provide to improve performance when accessing recently visited websites? #Caching recently accessed pages 8) A technician is having trouble repairing a difficult Windows XP problem. The usual quick-fix solutions did not work and there are no obvious clues found in either Device Manager or Event Viewer. What two actions should the technician try next? (Choose two.) #Check any manuals relating to the hardware and software. #Check the Internet for possible solutions. 9) In Windows XP which file determines the prompt that a user sees during the boot process when multiple operating systems are present? #BOOT.INI 10)What is the default location for system files in all versions of 32-bit Windows Vista? #The Windows/System 32 subfolder 11)What is the issue if the status of a hard disk drive shows a Not Initialized in the Disk Management utility? #The drive does not contain a valid signature 12)What is the purpose of the chkdsk/ f command? #It checks a hard drive for errors and fixes them if possible 13)Which command-line utility can be used to schedule a backup of Windows XP workstation?

#backup 14)What is the minimum amount of RAM that is required to install Mac OS X on an Intel-bassed Apple computer? #256MB 15)Which protocol is used to resolve URLs to IP adresses? #DNS 16)Which protocol automates assignment of IP addresses? #DHCP 17)Which two operating systems can be upgraded to Windows XP Home? (Choose two) #Windows 98 # Windows 98 SE 18)What information is contained in restore points in Windows XP? #System and registry settings 19) A technician notices that a program that is listed in the registry is not found on a PC that is running Windows XP. What is a possible solution to the problem? #Run chkdsk/F/R from the command prompt 20)A technician notices that a PC that is running Windows XP locks up without any error messages. What is a probable cause of the problem? #The computer is overheating

chapter 13
1)A technician is trying to repair a laptop where the images on the display can only be seen when looking at the screen from an angle. What needs to be done to fix the problem? #Replace the LCD backlight 2) Why should care be taken when charging and handling a laptop battery? #Laptop batteries can explode if mishandled or improperly charged. 3) Which three standard procedures must always be included in a preventive maintenance schedule? (Choose three.) #physical cleaning #hard drive maintenance #software updates

4)Which IEEEspecification defines WPAN technology? # 802.15.1 5)Which maintenance task can be performed to speed up file access on a laptop? #Disk defragmentation 6) What are two steps a technician should take before repairing a laptop? (Choose two.) #Backup all data stored on the laptop. #Check the warranty to see if repairs must be done by an authorized service center. 7) Which attribute of a solid state drive would be an advantage when being used in a laptop? #Solid state drives reduce power usage. 8)Which IEEE specification defines the FireWire standard? #1394 9) Refer to the exhibit. Which type of connection is being established between the PDA and the infrared keyboard? #line-of-sight 10)A customer is unable to use a laptop on battery power for more than 30 minutes. What would a technician suggest to this customer? # Replace the laptop battery 11) Which two types of batteries should be completely discharged and then fully recharged to remove the charge memory? (Choose two.) #Ni-Cad #NiMH 12) A laptop that previously worked now fails to boot. The cursor fails to appear on the screen. When a bootable DVD is inserted, the system still fails to boot even though it is set to boot from CD/DVD. The fan turns, so power is applied and the power light is on. The technician installs the hard drive in another laptop and it works there. What is the probable cause of the problem? #The CD/DVD drive has failed. 13) A laptop fails to start after a new hard drive has been installed. What are two possible causes of this problem? (Choose two.) #The hard drive was not connected swappable #The BIOS does not recognize the new hard drive.

14)Which acronym describes a laptop part that can be replaced by a customer? #CRU 15) Which two sources can be used to determine the amount of currently installed RAM on a computer? (Choose two.) #POST screen #System Properties dialog box 16) Some keys on a laptop work intermittently. They sometimes type the letter and sometimes do not. What should a technician do to fix this problem? #Clean the keyboard. 17)Which statement is true about version control of files that are transferred between a Windows laptop and Windows desktop PC? #Windows does not allow files with the same name to exist in the same folder 18)Which laptop component is typically considered a CRU? # RAM 19)Which Windows Vista tool is accurately described? #Disk Defragmenter is meant to be used when a computer has files that are modified,added, or deleted often 20) Which type of encryption key should be enabled on WPA-compliant devices? #128-bit

chapter 14
1)What can a technician do to reduce the time a user must wait when large print jobs are sent to the printer? # Add more RAM to the printer 2)A technician needs to set up multiple printers in an office so that multiple users can access the printers without using the resources of any client computers. What is the best solution to meet these needs? #A dedicated PC print server 3) A technician is trying to allow user access to a printer on a small network. Which solution is the lowest in cost? #Computer-shared printer 4) Which printer component can be upgraded to improve the buffering capabilities of the printer? # Memory

5) What two solutions would fix the problem that occurs when every page that is printed by a laser printer produces lines or streaks? (Choose two.) # Replace the drum. #Use the cleaning utility to clean the cartridge nozzles. 6) For a user or technician performing maintenance on a dot matrix printer, what potential safety hazard does a print head present? #Burns from hot surfaces 7) Which Windows component allows the Windows operating system to output graphics to a computer screen or print device #GDI 8) Which two scanner options are used to improve document or image scans? (Choose two.) # Resolution changes # Output file format 9) A technician has completed the routine maintenance service for all the printers in the accounting department. Which action helps ensure that the next routine maintenance service is performed at the correct time? #Reset the counters. 10) Which path will allow a user to add a printer in Windows XP? #Start > Control Panel > Printers and Faxes > Add a Pointer 11) Which two items can help extend the life of an inkjet printer? (Choose two.) #Type of ink # Paper type 12) A technician is installing a new inkjet printer. The printer has successfully printed test pages. Which task also verifies the functionality of an inkjet printer after installing the printer driver? # Using different types of paper trays for special paper sizes 13) A technician is installing network printer software and drivers on a Windows Vista computer. At the Select a Printer stage the technician wants to install a printer that is not listed. Which two methods are available to identify and select the required printer? (Choose two.) # Printer type # Manufacturer 14) Users from the art department are complaining that the inkjet printer is producing spotty and streaked printouts. What can be recommended to resolve this problem?

#Clean the print head by running the cleaning utility. 15) Which type of printing option should be implemented to allow a user to change settings for each document sent to the printer? # Per-document 16) Which type of port is used for low-speed dot matrix printers? #Seril 17) Which two printer components can retain high voltages even after the printer has been unplugged? # Corona wire # Transfer roller 18) Which two scanning settings can significantly affect the size of the image file? (Choose two.) #Resolution #Output file format 19) Which two methods are often used to connect a lower-cost printer to a Windows XP network? (Choose two.) # Use a separate print server # Connect to a networked computer and share the printer. 20) Users working in humid environments notice that documents printed by a laser printer are of poor quality. It is discovered that the printer is unable to attach toner to the paper. What is the most likely cause of the problem? # The paper absorbed moisture from the air and is damp.

chapter 15
1) A user is receiving e-mail on a regular basis from a particular person. A problem occurs when the e-mail from this same person contains an attachment. What is one solution? #Ask the IT department to permit port 25 through the firewall. 2)A technician is working on a workstation that has an IP address of 169.254.25.35. The technician found that the computer cannot connect to the Internet and the network cable to the computer had been disconnected.Which command can a technician use to get a new IP address once the cable is reconnected? #ipconfig/renew 3) ABC Computer Company is in the process of planning a network for a new

client. A network technician has been asked to perform a physical inspection of the facilities to determine the flow of data and protocols required by the client. What is this inspection called? #site survey 4) The network technician is researching the best way to connect the branch offices to the main office. What are three main considerations that the technician should remember when choosing an Internet connection? (Choose three.) #availability #reliability #speed 5)A technician has been asked to install a second optical drive in a computer. The technician will need to configure the drive as slave.How can the technician accomplish this desired configuration? #Use jumpers on the drive to configure the drive as slave 6) Which action should a user take to ensure that personal information that is entered into a website form is not retained on the computer? #Delete the temporary Internet files. 7) When planning the network in a new building, the technician notes that the company requires cabling that can extend up to 295 ft (90 m) with enhanced bandwidth support at an affordable price. Which cable type will the technician pick if he chooses the most common type of cabling used on networks? #Cat5e 8) Which protocol provides secure transport of data from the company web server to remote users? #HTTPS 9) In Internet Explorer, after choosing Tools and then Internet Options, which tab would a user select to set the browser to prompt before downloading potentially unsafe content? #Security 10)A technician is concerned that a wireless router is missing current features. What action could be taken to address this issue? #Check for an updated firmware version 11) A new employee needs to transfer files to the corporate FTP server. However, the employee is unable to log in to the FTP server. What is the most likely cause of the problem? #The employee is using an incorrect username or password. 12) Students on the college network need to be able to view folder names and data in files stored on the Windows-based file server, but should never be

allowed to add or save information on the server. Occasionally, the students also need to run media programs to watch videos stored on the server. Which permission should the network technician assign to the students accessing the file server? #read 13)A technician is troubleshooting a networked computer. The technician has gathered as much information as possible from the user and now needs to verify obvious issues. Which two actions should the technician perform?(Choose two) #Verify the computer IP information #Check activity on the routers 14)Which statement is true about network maintenance? #Educating users on IT policies and procedures in an example of proactive network maintenance 15) Which three ports are used by SMTP, POP, and IMAP? (Choose three.) #25 #110 #143 16) What are two ways to assign an IP address to a wireless NIC? (Choose two.) #Assign a static address #Use DHCP. 17) Which two hazards exist when working with fiber optic cabling? (Choose two.) #chemicals #glass splinters 18)A company purchases several wireless NICs at a great price. After installing the NICs, they find that user cannot connect to the 2.4 GHz wireless network. What is a likely cause of the problem? #The NICs are designed for the 802.11a standard 19)A user is reporting intermittent loss of connectivity to the network. No other users have reported similar issues.What preventive maintenance task would likely identify the problem? #Check for a damaged network cable at the user workstation 20)Which two protocols are used to receive e-mail?(Choose two) #IMAP #POP3

chapter 16
1) Which data security technology takes the form of an object which must be close to a computer before the user can successfully submit a username and password? #Security key fob 2)Why would security application software be implemented on a network? #To protect operating system 3)Thich two factors should management consider when developing a security policy?(Choose two) # Expense of the security protection # The costs that are associated with data loss 4)After logging into a computer a user is unable to access the CIW folder. Access to this folder is necessary to complete an assignment. Which two actions can the administrators take to provide the user access to the folder?(Choose two) #Give the person rights to the CIW folder #Add the user to a group that has the rights to the CIW folder 5) After a technician collects information from the computer, which two sources can provide the technician with possible solutions for various types of networkrelated problems? (Choose two. )#the manufacturer FAQ for network devices #technical websites 6) A network administrator is trying to change the account name of a user but cannot make the changes. What could be a possible cause? #The administrator does not have the correct permissions to make the change. 7)Which important feature is offered by the USB standard? #It can supply power from the computer to devices 8) A user reports that the antivirus software on a computer is always turned off when the computer is restarted, despite being reactivated each time the computer starts up. Further investigation by the technician shows that the Internet browser also displays an incorrect homepage. What is the probable cause of these problems? #The computer has been infected with spyware. 9)What are two interrelated aspects that would be involved in the physical security of an organizacion? (Choose two) #Infrastructure # Type of Layer 2 devices that are used within the network

10)Which two hasting algorithms are used to ensure that messages are unaltered during transmission?(Choose two) # MD5 # SHA 11) Which Windows XP command initiates a backup from the command line? #ntbackup 12)Which issue should be addressed in the detailed information thet is provieded by a local security policy? #The types of intrusions that are covered by the policy 13) What are two features of Windows Vista Backup? (Choose two.) #The backup files have the expension .zip. #The backup files can be saved to another connected computer or server 14)What is a feature of the firewall capability when Windows Vista is the operating system? #The firewall can be managed manually by permitting or allowing specific ports 15)Which physical security technology uses an embedded integrated circuit chip to store data safety and is commonly used in secure ID badges? #Smart card 16)A customer has a web server for a small business. The bussiness uses both wired and wirelless networking. A linksys WRT300N wireless router provides wireless and wired connectivity. What firewall option may be enabled in order for customers to gain access to the web server from their remote locations? #Port forwarding 17)What can a homeowner who has a wireless router do to hide the wireless router signal from the surrounding neighbors? # Disable SSID broadcast 18)Why should the default username and password be changed as soon as an access point is powered on and accessed? #The change provides a minimum level of security to the access point 19) Which two advantages are attributed to a hardware firewall when compared to a software firewall? (Choose two.) #It does not impact the processing performance of the equipment it protects. #It is designed to protect more than one computer. 20) Windows XP should be updated on a regular basis. In which situation should automatic updates be disabled?

#Users accessing the network using a dial-up connection need to control when the updates are downloaded and installed.

chapter 11-16
1. What is one thing a technician can determine about a system when using the command ipconfig? system network configuration 2. A technician has been asked to install a second optical drive in a computer. The technician will need to configure the drive as slave. How can the technician accomplish this desired configuration? Use jumpers on the drive to configure the drive as slave. 3. A user on the network needs to be able to add and remove files in a shared folder on an NTFS-formatted server. Users should never be allowed to assume ownership of the shared folder. Which permission should the administrator assign to the user? modify 4. A technician is trying to allow user access to a printer on a small network. Which solution is the lowest in cost? computer-shared printer 5. Which technology allows a user to securely access a company LAN across a public network? VPN 6. Refer to the exhibit. Which type of technology is most suitable to bring Internet services to the facilities that are shown in the graphic? Satellite 7. After information has been gathered from a user about the failure of a printer, which two actions should be performed? (Choose two.) Ensure all cables are connected correctly. Clear any type of paper jams. 8. What two dangers exist when working on laser printers? electrical shock burns 9. What is the general term that is used to describe components of a laptop that should be replaced by a service center?

FRUs 10. A technician is helping a customer select additional RAM for a computer. Which two items should be considered when updating RAM? (Choose two.) The new memory must run at least as fast as the existing memory. The new memory must be compatible with the motherboard. 11. Using RIS, a technician is having difficulties performing a remote installation. Which two problems would cause the remote installations to fail? (Choose two.) The computer does not have a PXE-capable NIC installed. The network shared folder that holds the OS files is not accessible. 12. A computer had updates installed and was rebooted. Nothing is displaying on the monitor that is connected to the computer. What could the technician do to reset the monitor settings? Use the F8 key. 13. A Windows XP computer that once had three operating systems installed now has only one operating system. However, when the computer boots up, the user is still presented with a choice between the old systems and XP. Which path allows the user to make changes to the BOOT.INI file? Click Start. Right click My Computer. Choose Properties. Choose the Advanced tab. Click Settings in the Startup and Recovery area. Click Edit. 14. A technician needs to stop the print spooler on a Windows XP computer because the printer has failed. Which set of commands should the technician follow? Choose Start > Control Panel > Administrative Tools >Computer Management. Choose Services. 15. What precaution should a technician take when checking a dot matrix printer that suddenly stops functioning? Avoid the print head, which can become hot. 16. Refer to the exhibit. A customer has upgraded to a new laptop with the specifications as shown in the exhibit. The customer reports that an older cellular WAN card fails to fit in the new laptop. What is the problem? The new laptop has an ExpressCard slot, which is incompatible with the older card. 17. A technician is helping a customer that constantly has to reset the time on a laptop. What is the probable cause of this problem? The battery on the motherboard needs to be replaced. 18. A technician has installed new RAM in a laptop. When the laptop is rebooted, it makes a long beeping noise and fails to start. What are three probable causes?

(Choose three.) The RAM module edge contacts were damaged. The RAM module was incompatible with the laptop motherboard. The clips that hold the SODIMM in the slot were not locked. 19. A student is trying to upload class files to an FTP server on the school network. The connection fails from school but works fine from the home computer of the student. What is the likely problem? The school has port 21 blocked on the firewall. 20. Which situation is affected by an invalid SSL certificate? a connection to a web site that uses HTTPS 21. A student laptop is running slowly, and the student suspects rogue computers are accessing the laptop. Which control panel feature is used in Windows Vista to verify the firewall setting? Security Center 22. A business is concerned that computers are susceptible to malware infection. Which two actions will help solve this problem? (Choose two.) Enable real-time virus and spyware scanning. Enable automatic antivirus and antispyware software updates. 23. After logging into a computer, a user can view files but is unable to download the files. What action can the administrator take to allow the user to download the files while preventing deletion of the files? Set the file permissions to Read and Execute. 24. A network administrator has a user that is changing the rights to files in a folder for other users. What rights does the administrator need to remove from the user? Full Control 25. Why does a technician wear an antistatic wrist strap? to prevent damage to electronic components inside the computer 26. A computer that worked fine yesterday now locks after two hours of use. What is the problem? CPU overheating 27. What is different about the default location for user files in Windows Vista compared to Windows XP? The default location for user files in Windows Vista is within a user-specific subfolder in the Users folder. 28. What is the purpose of the setupmgr.exe file?

It helps prepare an answer file to automate the installation of Windows XP. 29. A technician is compiling a company computer support training manual. One of the utilities that is described in the manual is Sysprep. What is the purpose of this utility? It prepares a computer for imaging. 30. What is the issue if the status of a hard disk drive shows as "Unreadable" in the Disk Management utility? The drive has input/output errors, has a hardware failure, or is corrupt. 31. A computer shows the optical drive under My Computer but fails to read a DVD disc. Which three problems could exist? (Choose three.) The optical drive is faulty. The DVD disc is inserted upside down. The DVD disc is formatted incorrectly. 32. What could be the possible solution to the Windows Vista search feature taking longer than expected to find results? Change the settings of the Index service in the Advanced Options panel. 33. Which Windows protocol enables a technician at company headquarters to view the screen and control the mouse and keyboard of a computer in a branch office? Remote Desktop Protocol 34. Which scanner process uses an IT8 target to complete its function? Calibration 35. What are two reasons why static IP addressing would be configured instead of DHCP when setting up a wireless network? (Choose two.) The network has relatively few wireless devices. Specific security polices can be applied to static IP addresses.

Praktick 11-16 verze 4.1


1 A network administrator has been informed about a problem with the network printer. What is the most reliable way to prevent print jobs from being added to the queue while the printer is being repaired?

Stop the print spooler. 2 For a default installation of Windows XP Professional, which two settings are customizable? (Choose two.) regional settings network settings 3 Several messages sent to the network administrator are reporting that access to a secure server using HTTPS is failing. After checking recent updates to the company firewall, the administrator learns that the firewall is blocking HTTPS. Which port should be opened to solve the problem? 443 4 A computer has been relocated and all the cables reconnected. When the computer is powered on, the correct POST audio signals are heard and the hard drive LED shows disk activity. However, the monitor fails to display anything. What are two possible causes of this problem? (Choose two.) The monitor cable connector is loose or disconnected because the retaining screws are missing. The monitor is connected to the integrated video adapter on the motherboard instead of the expansion slot adapter. 5 Which Windows hard drive partition is referred to as the C: drive? the first primary partition 6 A technician is trying to explain USB 1.1 and USB 2.0 to a user in terms of speed. The user is having problems comparing the two standards based on the values expressed in Mbps. Which explanation can the technician use that will best describe the relationship? USB 2.0 is one hundred times as fast as USB 1.1. 7 Which feature is characteristic of the ntbackup command? It is used create restore points. 8 Which safety precaution should an installer take when installing cable in the ceiling of a building? Wear safety glasses in case of encountering toxic materials during the installation.

9 Engineers are designing a security scheme to allow only authorized persons to access the facilities of a national bank. Which security control measure provides the most secure solution for employee identification? biometric devices 10 Which Startup type must be selected for a service that should run each time the computer is booted? automatic 11 What are two problems that are caused by setting an incorrect boot order in the system BIOS? (Choose two.) The computer displays an Invalid Boot Disk error after POST. The computer displays an Inaccessible Boot Device error after POST 12 Refer to the exhibit. The IT department requested a new set of memory chips to upgrade the old laptops. A picture of the memory chip required is attached to the purchase order so the correct item can be bought. Which type of memory module is the IT department expecting to receive? SODIMM 13 Which recommendation should be observed when replacing existing memory? The new memory should be as fast or faster than existing memory. 14 Refer to the exhibit. Which utility has the IT department started on each computer? Defragment 15 A Windows Vista computer does not display the thumbnail views of two windows that are currently minimized in the taskbar when the mouse pointer is placed over the appropriate tile on the taskbar. What is a possible solution to this problem? Start the Vista Aero enhanced display features by launching services.msc. 16 The corporate security policy states that all remote connections use only secure tunnels for transport of data. Which encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN? VPN 17

When upgrading a CPU what must be applied between the new CPU and the heat sink/fan? thermal compound 18 Which three ports should be left open to avoid filtering e-mail traffic? (Choose three.) 25 110 143 19 A company has a preventive maintenance policy that requires every computer have a new restore point created every six months. How can a technician create the restore point? Go to Start > All Programs > Accessories > System Tools > System Restore > Create a restore point. 20 Which two hazards are related to fiber optic installations? (Choose two.) light that can burn the eyes glass splinters that can penetrate the skin 21 A technician has been asked to connect a new scanner to a computer. Which interface provides the fastest transfer of data? SCSI (Ultra-320) 22 A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network? mesh 23 What is the highest risk associated with improperly charged or mishandled batteries? The battery can explode. 24 Refer to the exhibit. What type of partition arrangement does this Windows XP computer have on its hard drive? 3 logical, 1 extended, 1 free space, 1 primary 25 Which two characteristics describe a software firewall? (Choose two.) It typically protects only the computer it is installed on.

It uses the CPU in the host computer. 26 What are two characteristics of the IEEE 1284 parallel interface standard? (Choose two.) These cables usually have 9 pins or 25 pins on both ends. The two available operative modes are EPP and ECP. 27 Which action should be taken first if a card key is lost or stolen? Disable the lost card key. 28 A technician has installed a third party utility that is used to manage a Windows XP computer. However, the utility is unable to startup automatically whenever the computer is started. What can the technician do to resolve this problem? Change the startup type for the utility to Automatic in Services. 29 The network manager decides to implement a simple security solution to the company WLANs. Which wireless security technique should the manager take to hide the WLAN id from any access point? Disable the broadcast of the SSID on the access point. 30 The production manager of a small company is experiencing slow performance in a laptop. What should a technician try first in order to correct the problem? Defragment the hard disk. 31 A technician is working on a laptop with a touchpad that fails to work. Which two actions can the technician take to try to repair the problem? (Choose two.) Clean the surface of the touchpad. Ensure that the operating system has the correct driver for the touchpad. 32 Refer to the exhibit. Based on the information shown, which statement is true? The only PC allowed on the wireless network is the one with the MAC address 00:05:4E:49:64:87. 33 Refer to the exhibit and consider the advertisement that is shown. Based on the advertisement, which statement is accurate regarding this motherboard? The Intel Core i7 processor supports a maximum bus speed of 1600MHz. 34

Which interface can transfer data at a maximum speed of 480 Mbps? USB 2.0 35 A call center technician receives a call from a customer who wishes to add more memory to a laptop to increase graphics performance. Which type of memory should be installed? RAM

Praktick 11-16 verze 4.1


1 A network administrator has been informed about a problem with the network printer. What is the most reliable way to prevent print jobs from being added to the queue while the printer is being repaired? Stop the print spooler. 2 For a default installation of Windows XP Professional, which two settings are customizable? (Choose two.) regional settings network settings 3 Several messages sent to the network administrator are reporting that access to a secure server using HTTPS is failing. After checking recent updates to the company firewall, the administrator learns that the firewall is blocking HTTPS. Which port should be opened to solve the problem? 443 4 A computer has been relocated and all the cables reconnected. When the computer is powered on, the correct POST audio signals are heard and the hard drive LED shows disk activity. However, the monitor fails to display anything. What are two possible causes of this problem? (Choose two.) The monitor cable connector is loose or disconnected because the retaining screws are missing. The monitor is connected to the integrated video adapter on the motherboard instead of the expansion slot adapter.

5 Which Windows hard drive partition is referred to as the C: drive? the first primary partition 6 A technician is trying to explain USB 1.1 and USB 2.0 to a user in terms of speed. The user is having problems comparing the two standards based on the values expressed in Mbps. Which explanation can the technician use that will best describe the relationship? USB 2.0 is one hundred times as fast as USB 1.1. 7 Which feature is characteristic of the ntbackup command? It is used create restore points. 8 Which safety precaution should an installer take when installing cable in the ceiling of a building? Wear safety glasses in case of encountering toxic materials during the installation. 9 Engineers are designing a security scheme to allow only authorized persons to access the facilities of a national bank. Which security control measure provides the most secure solution for employee identification? biometric devices 10 Which Startup type must be selected for a service that should run each time the computer is booted? automatic 11 What are two problems that are caused by setting an incorrect boot order in the system BIOS? (Choose two.) The computer displays an Invalid Boot Disk error after POST. The computer displays an Inaccessible Boot Device error after POST 12 Refer to the exhibit. The IT department requested a new set of memory chips to upgrade the old laptops. A picture of the memory chip required is attached to the purchase order so the correct item can be bought. Which type of memory module is the IT department expecting to receive? SODIMM 13

Which recommendation should be observed when replacing existing memory? The new memory should be as fast or faster than existing memory. 14 Refer to the exhibit. Which utility has the IT department started on each computer? Defragment 15 A Windows Vista computer does not display the thumbnail views of two windows that are currently minimized in the taskbar when the mouse pointer is placed over the appropriate tile on the taskbar. What is a possible solution to this problem? Start the Vista Aero enhanced display features by launching services.msc. 16 The corporate security policy states that all remote connections use only secure tunnels for transport of data. Which encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN? VPN 17 When upgrading a CPU what must be applied between the new CPU and the heat sink/fan? thermal compound 18 Which three ports should be left open to avoid filtering e-mail traffic? (Choose three.) 25 110 143 19 A company has a preventive maintenance policy that requires every computer have a new restore point created every six months. How can a technician create the restore point? Go to Start > All Programs > Accessories > System Tools > System Restore > Create a restore point. 20 Which two hazards are related to fiber optic installations? (Choose two.) light that can burn the eyes glass splinters that can penetrate the skin 21 A technician has been asked to connect a new scanner to a computer. Which interface provides the fastest transfer of data?

SCSI (Ultra-320) 22 A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network? mesh 23 What is the highest risk associated with improperly charged or mishandled batteries? The battery can explode. 24 Refer to the exhibit. What type of partition arrangement does this Windows XP computer have on its hard drive? 3 logical, 1 extended, 1 free space, 1 primary 25 Which two characteristics describe a software firewall? (Choose two.) It typically protects only the computer it is installed on. It uses the CPU in the host computer. 26 What are two characteristics of the IEEE 1284 parallel interface standard? (Choose two.) These cables usually have 9 pins or 25 pins on both ends. The two available operative modes are EPP and ECP. 27 Which action should be taken first if a card key is lost or stolen? Disable the lost card key. 28 A technician has installed a third party utility that is used to manage a Windows XP computer. However, the utility is unable to startup automatically whenever the computer is started. What can the technician do to resolve this problem? Change the startup type for the utility to Automatic in Services. 29 The network manager decides to implement a simple security solution to the company WLANs. Which wireless security technique should the manager take to hide the WLAN id from any access point? Disable the broadcast of the SSID on the access point. 30

The production manager of a small company is experiencing slow performance in a laptop. What should a technician try first in order to correct the problem? Defragment the hard disk. 31 A technician is working on a laptop with a touchpad that fails to work. Which two actions can the technician take to try to repair the problem? (Choose two.) Clean the surface of the touchpad. Ensure that the operating system has the correct driver for the touchpad. 32 Refer to the exhibit. Based on the information shown, which statement is true? The only PC allowed on the wireless network is the one with the MAC address 00:05:4E:49:64:87. 33 Refer to the exhibit and consider the advertisement that is shown. Based on the advertisement, which statement is accurate regarding this motherboard? The Intel Core i7 processor supports a maximum bus speed of 1600MHz. 34 Which interface can transfer data at a maximum speed of 480 Mbps? USB 2.0 35 A call center technician receives a call from a customer who wishes to add more memory to a laptop to increase graphics performance. Which type of memory should be installed? RAM

You might also like