1.
ABC Inc. decided to
integrate redundancy by connecting multiple hard disks to duplicate the
information they store. Which type of adapter will need to be installed on the
servers to accomplish the desired redundancy?
Correct Answer
D. RAID adapter
Explanation
To accomplish the desired redundancy of duplicating information stored on multiple hard disks, a RAID (Redundant Array of Independent Disks) adapter needs to be installed on the servers. RAID technology allows for the simultaneous writing of data to multiple disks, ensuring that if one disk fails, the data can still be accessed from the duplicate disk. This provides a level of fault tolerance and data protection. Therefore, a RAID adapter is the appropriate choice in this scenario.
2.
Which power mode should
be used by a laptop so that all the data is saved, all the applications the
user was working on are left open, and there is no power used by the laptop?
Correct Answer
A. Hibernate
Explanation
Hibernate is the correct answer because it allows the laptop to save all the data and keep all the applications open while using no power. In hibernate mode, the laptop saves the current state to the hard drive and shuts down completely, conserving energy. When the laptop is turned on again, it restores the previous state, allowing the user to resume their work without any data loss.
3.
3) When a Windows XP
computer has completed the POST for each adapter card that has a BIOS, what is
the next step during the boot sequence?
Correct Answer
A. BIOS reads the MBR.
Explanation
After completing the Power-On Self Test (POST) for each adapter card, the next step during the boot sequence is for the BIOS to read the Master Boot Record (MBR). The MBR contains the boot loader code, which is responsible for loading the operating system. By reading the MBR, the BIOS can initiate the boot process and transfer control to the boot loader, allowing the operating system to start up.
4.
A user is reporting that
a new external hard drive is defective. The laptop will allow access to the
drive at times, and then will report that the drive cannot be found. Upon an
initial examination of the laptop, it is discovered that the user has ten USB
devices connected to the laptop.
Correct Answer
A. Remove all the peripHerals except the hard drive and observe the results.
Explanation
The correct answer is to remove all the peripherals except the hard drive and observe the results. This is because having multiple USB devices connected to the laptop can cause power and resource conflicts, leading to issues with accessing the external hard drive. By removing the other peripherals, the laptop can allocate sufficient power and resources to the hard drive, potentially resolving the problem.
5.
Refer to the exhibit.
Which type of removable media is depicted?
Correct Answer
D. Flash drive
Explanation
The exhibit is not provided, so it is not possible to determine the type of removable media depicted.
6.
Where can a user change
the idle time after which a laptop will switch to standby mode?
Correct Answer
C. Left-click Start > Control Panel > Power Options, then click the Power Schemes tab.
Explanation
The correct answer is "Left-click Start > Control Panel > Power Options, then click the Power Schemes tab." This is the correct answer because the Power Options in the Control Panel is where a user can change the power settings for their laptop. Within the Power Options, the user can navigate to the Power Schemes tab to adjust the idle time after which the laptop will switch to standby mode.
7.
What is the default
subnet mask for a Class A network?
Correct Answer
D. 255.0.0.0
Explanation
The default subnet mask for a Class A network is 255.0.0.0. This subnet mask allows for a large number of host addresses in the network, with the first octet representing the network portion and the remaining three octets representing the host portion. This allows for up to 16,777,214 host addresses in a Class A network.
8.
When installing the Windows XP operating system, a technician is
given a choice of file systems to use. If security is a requirement, which file
system should be chosen?
Correct Answer
D. NTFS
Explanation
NTFS (New Technology File System) should be chosen if security is a requirement when installing the Windows XP operating system. NTFS provides advanced security features such as file and folder permissions, encryption, and auditing. It allows for better control and protection of sensitive data, making it the preferred choice for security-conscious environments.
9.
A technician is asked
to configure the time the system must be idle before the hard disk spins down
on all the Windows-based laptops in the company. The technician configured the
power options in Windows but it appears to have no effect. Where should the
technician look to enable power management?
Correct Answer
B. BIOS
Explanation
The technician should look in the BIOS to enable power management. The BIOS (Basic Input/Output System) is responsible for controlling the hardware of a computer, including power management settings. By accessing the BIOS, the technician can configure the power options to determine when the hard disk should spin down after the system is idle for a certain period of time.
10.
Which three things
should be investigated first when troubleshooting a printer? (Choose three.)
Correct Answer(s)
C. Low-ink warning
D. Out of paper
E. Operating system compatibility
Explanation
When troubleshooting a printer, the three things that should be investigated first are low-ink warning, out of paper, and operating system compatibility. A low-ink warning could indicate that the printer is unable to print due to insufficient ink levels. Checking if the printer has enough paper is important as it may prevent it from printing. Lastly, verifying the operating system compatibility ensures that the printer is compatible with the computer system it is connected to, which can affect its functionality.
11.
A technician is having
trouble with laptops that keep overheating. What preventive maintenance
procedure can be performed on the laptops to reduce this problem?
Correct Answer
E. Clean the air vents.
Explanation
Cleaning the air vents is a preventive maintenance procedure that can help reduce the problem of laptops overheating. Over time, dust and debris can accumulate in the air vents, blocking the airflow and causing the laptop to overheat. By regularly cleaning the air vents, the technician can ensure that the laptop is able to dissipate heat effectively, preventing overheating issues. This can prolong the lifespan of the laptop and improve its overall performance.
12.
The technician has been
asked to upgrade the printer driver for an old printer. What is the best source
for a new driver?
Correct Answer
A. Manufacturer's website
13.
When analyzing a
protocol used on the network, it is discovered that multicast messages are
being sent to network devices. Which class of IP addressing is being used to
send these messages?
Correct Answer
D. Class D
Explanation
Class D is the correct answer because it is the class of IP addressing specifically reserved for multicast messages. Multicast messages are sent to a group of devices rather than a single device, and Class D addresses are used to identify these multicast groups. Class D addresses range from 224.0.0.0 to 239.255.255.255.
14.
A user has been writing
data to a USB flash memory drive. What should the user do before removing the
device?
Correct Answer
B. Click on the Safely Remove Hardware icon in the system tray then on the device.
Explanation
Before removing the USB flash memory drive, the user should click on the Safely Remove Hardware icon in the system tray and then click on the device. This is the correct answer because it ensures that all data has been properly written and any active processes involving the drive have been completed. Simply removing the drive without properly ejecting it can result in data loss or corruption.
15.
Which three rules
increase the level of password strength? (Choose three.)
Correct Answer(s)
B. Passwords should be a combination of letters and numbers.
C. Passwords should be changed by the user after specific periods of time.
D. Password expiration and lockout policies should be clearly defined.
Explanation
Passwords should be a combination of letters and numbers to increase the complexity and make it harder to guess. Passwords should be changed by the user after specific periods of time to ensure that even if the password is compromised, it will not be valid for a long time. Password expiration and lockout policies should be clearly defined to enforce regular password changes and prevent unauthorized access.
16.
Which two interface
types make it possible to attach different external components to laptops and
desktops without powering the computer off? (Choose two.)
Correct Answer(s)
A. ExpressCard
E. USB
Explanation
ExpressCard and USB are the two interface types that allow for the attachment of different external components to laptops and desktops without powering off the computer. ExpressCard is a high-speed interface used for connecting devices such as network adapters, sound cards, and storage devices. USB (Universal Serial Bus) is a widely used interface that supports the connection of various peripherals like keyboards, mice, printers, and external hard drives. Both of these interfaces allow for hot-plugging, which means that devices can be connected or disconnected without the need to restart or power off the computer.
17.
A technician is
troubleshooting a computer that is experiencing hardware failure detected by
the BIOS. What is one way this failure is indicated?
Correct Answer
C. The computer emits a pattern of beeps indicating the failing device.
Explanation
When a computer experiences hardware failure detected by the BIOS, one way this failure is indicated is through a pattern of beeps emitted by the computer. These beeps serve as an audible warning and can help identify the specific failing device. This method of indication is commonly used by BIOS to communicate hardware issues to the user.
18.
Which type of power
connector is used to connect devices such as optical drives and hard drives?
Correct Answer
D. Molex
Explanation
The Molex power connector is used to connect devices such as optical drives and hard drives. It is a widely used connector in computer hardware, known for its reliability and durability. The Molex connector provides a secure and stable power connection to these devices, ensuring that they receive the necessary power to function properly.
19.
What characterizes a
DDoS attack?
Correct Answer
A. Many hosts participate in a coordinated attack.
Explanation
A DDoS attack is characterized by the involvement of multiple hosts working together to launch a coordinated attack. This means that the attack is distributed across various computers or devices, making it difficult to mitigate and trace back to a single source. The term "Daemons" refers to software programs or processes running on infected computers, but it does not specifically define a DDoS attack. The statement about easy identification of the attack source is incorrect, as DDoS attacks often employ techniques to mask or spoof their origin. The statement about all hosts being in the same geographic area is also incorrect, as DDoS attacks can be launched from anywhere in the world.
20.
A technician has replaced
a failing floppy drive. While testing the new drive, the technician notices
that the floppy drive light remains lit constantly. What is most likely the
cause of the problem?
Correct Answer
B. The ribbon cable is installed incorrectly.
Explanation
The most likely cause of the problem is that the ribbon cable is installed incorrectly. When the ribbon cable is not connected properly or is misaligned, it can cause the floppy drive light to remain lit constantly. This could be due to the data and power connections not being properly aligned or connected. Checking and ensuring that the ribbon cable is correctly installed should resolve the issue.
21.
Which type of cable
standard uses a 9-pin connector and supports data rates in excess of 800 Mbps?
Correct Answer
E. IEEE 1394b
Explanation
IEEE 1394b is the correct answer because it uses a 9-pin connector and supports data rates in excess of 800 Mbps. DB-9 and DB-25 are types of connectors used for serial communication, but they do not support data rates as high as 800 Mbps. IEEE 1284 is a standard for parallel communication and does not use a 9-pin connector. IEEE 1394a is an older version of the IEEE 1394 standard and does not support data rates as high as 800 Mbps.
22.
A technician wishes to
boot a computer using a CD-ROM that contains a limited operating system and
diagnostic utilities. Where would the technician set the boot order for the PC?
Correct Answer
D. BIOS
Explanation
The technician would set the boot order for the PC in the BIOS. The BIOS (Basic Input/Output System) is a firmware that is responsible for initializing hardware during the boot process. It allows the user to configure various settings, including the boot order, which determines the sequence in which the computer looks for an operating system to load. By setting the CD-ROM as the first boot device in the BIOS, the technician can ensure that the computer boots from the CD-ROM containing the limited operating system and diagnostic utilities.
23.
Which two general
precautions should be taken before replacing any non-hot-swappable laptop
component? (Choose two.)
Correct Answer(s)
A. Disconnect the power cord.
C. Remove any batteries.
Explanation
Before replacing any non-hot-swappable laptop component, two general precautions should be taken: disconnect the power cord to ensure that there is no electrical current running through the laptop, and remove any batteries to prevent any potential power supply to the laptop. These precautions are necessary to avoid any electrical shock or damage to the laptop during the component replacement process.
24.
A computer can access
devices on the same network but can not access devices on other networks. What
is the probable cause of this problem?
Correct Answer
D. The computer has an invalid default gateway address.
Explanation
The probable cause of the problem is that the computer has an invalid default gateway address. The default gateway is the IP address of the router that connects the computer to other networks. If the computer has an invalid default gateway address, it will not be able to send or receive data from devices on other networks.
25.
What is the purpose of
an IRQ?
Correct Answer
C. Request information from the CPU.
Explanation
The purpose of an IRQ is to request information from the CPU. IRQ stands for Interrupt Request and it is a signal sent by a device to the CPU to request its attention. When a device needs to communicate with the CPU, it sends an interrupt request, which interrupts the current process being executed by the CPU and allows the device to transfer data or request information from the CPU. Therefore, the correct answer is "Request information from the CPU."
26.
Which protocol adds
security to remote connections?
Correct Answer
E. SSH
Explanation
SSH (Secure Shell) is a protocol that adds security to remote connections. It provides strong encryption and authentication, ensuring that the data transmitted between the client and server remains secure and protected from unauthorized access. SSH is commonly used for secure remote administration of systems and secure file transfers. It encrypts the communication channel, preventing eavesdropping and tampering, making it a reliable choice for secure remote connections.
27.
What is the logical
topology used for the Ethernet architecture?
Correct Answer
A. Bus
Explanation
The logical topology used for the Ethernet architecture is a bus. In a bus topology, all devices are connected to a single cable, forming a linear network. Each device on the network can transmit and receive data, and the data travels along the cable until it reaches the intended recipient. This topology is simple and cost-effective, but it can be prone to collisions and performance issues if there are too many devices or the cable length is too long.
28.
What are the four
levels in the TCP/IP reference model.
Correct Answer
C. Application, transport, internet work, network interface
Explanation
The correct answer is application, transport, internet work, network interface. This is because the TCP/IP reference model consists of four layers: the application layer, which deals with protocols for specific applications such as HTTP and FTP; the transport layer, which handles end-to-end communication between hosts using protocols like TCP and UDP; the internet work layer, which is responsible for routing packets across networks using IP; and the network interface layer, which deals with the physical transmission of data over a network.
29.
Which type of scanner
generally has high costs but produces top-quality images?
Correct Answer
B. Drum
Explanation
A drum scanner generally has high costs but produces top-quality images. Drum scanners use a cylindrical drum to capture the image, which allows for a high level of detail and accuracy. The drum spins at a high speed, capturing the image line by line, resulting in a very high-resolution scan. These scanners are often used by professionals in industries such as graphic design and printing, where the highest quality images are required. However, due to their advanced technology and precision, drum scanners tend to be more expensive compared to other types of scanners.
30.
When calculating the
total cost of ownership of a printer it is necessary to consider the cost of
the consumables. Which two consumables are associated with an inkjet printer?
(Choose two.)
Correct Answer(s)
B. Ink cartridge
D. Paper
Explanation
When calculating the total cost of ownership of an inkjet printer, it is important to consider the cost of consumables. The two consumables associated with an inkjet printer are ink cartridges and paper. Ink cartridges are necessary for the printer to produce the desired printouts, and they need to be replaced periodically. Paper is also a consumable as it is required for printing and needs to be replenished regularly. The cost of both ink cartridges and paper should be taken into account when determining the total cost of ownership of an inkjet printer.
31.
Which network device
uses a MAC address table to segment the network?
Correct Answer
E. Switch
Explanation
A switch uses a MAC address table to segment the network. This means that it can identify the MAC addresses of devices connected to it and direct network traffic accordingly. By using the MAC address table, a switch can send data only to the intended recipient, reducing network congestion and improving overall network performance. Unlike a hub, which simply broadcasts data to all connected devices, a switch intelligently routes data based on MAC addresses, making it a more efficient and secure network device.
32.
Where in Windows XP can
the shutdown, hibernate, and standby modes be configured?
Correct Answer
A. Start > Control Panel > Power Options
Explanation
In Windows XP, the shutdown, hibernate, and standby modes can be configured in the Power Options section of the Control Panel. This allows users to customize the power settings and determine how the computer behaves when it is idle or when the power button is pressed.
33.
Which protocol
dynamically assigns IP addresses to network devices?
Correct Answer
A. DHCP
Explanation
DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that dynamically assigns IP addresses to network devices. DHCP allows devices to automatically obtain an IP address, subnet mask, default gateway, and other network configuration parameters from a DHCP server. This eliminates the need for manual IP address configuration, making it easier to manage and scale networks. DNS (Domain Name System) is responsible for translating domain names into IP addresses, ICMP (Internet Control Message Protocol) is used for network troubleshooting, RARP (Reverse Address Resolution Protocol) is used to obtain an IP address based on a known MAC address, and TCP (Transmission Control Protocol) is a reliable transport protocol.
34.
Which two quick
solutions are commonly recommended when a technician is troubleshooting a
laptop? (Choose two.)
Correct Answer(s)
A. Reboot the laptop.
C. Disconnect the peripHerals.
Explanation
When troubleshooting a laptop, two commonly recommended quick solutions are to reboot the laptop and disconnect the peripherals. Rebooting the laptop can help resolve software or hardware issues that may be causing problems. Disconnecting the peripherals can help identify if any of them are causing conflicts or issues with the laptop's functionality. By disconnecting them, the technician can isolate the problem and determine if any specific peripheral is causing the issue.
35.
Why do mobile devices
such as laptop computers use specially designed CPUs?
Correct Answer
A. They consume less power.
Explanation
Mobile devices such as laptop computers use specially designed CPUs because they consume less power. This is important for mobile devices as it allows for longer battery life and reduces the need for frequent charging. Specially designed CPUs are optimized to perform efficiently while using minimal power, making them ideal for mobile devices where power efficiency is a key consideration.
36.
What characterizes
spoofing?
Correct Answer
A. Making data appear to come from a source other than the actual source.
Explanation
Spoofing is characterized by making data appear to come from a source other than the actual source. This means that the sender manipulates the information in a way that it appears to be coming from a different sender or source than it actually is. Spoofing can be used for malicious purposes, such as impersonating someone else or deceiving recipients into believing that the information is legitimate. It is a common technique used in phishing attacks, email scams, and identity theft.
37.
A company uses a single
computer to receive and test all Windows updates. When the most recent update
was installed, several programs failed. What is the first course of action that
a technician should attempt to remove the update?
Correct Answer
A. Run a System Restore from the last restore point.
Explanation
The first course of action that a technician should attempt to remove the update is to run a System Restore from the last restore point. System Restore allows the computer to be restored to a previous state, including removing any updates that may have caused issues. By selecting the last restore point, the computer can be reverted back to a time before the update was installed, potentially resolving the problems with the failed programs.
38.
Which Windows tool
should be run before upgrading the operating system?
Correct Answer
D. Ntbackup
Explanation
Before upgrading the operating system, it is recommended to run the Windows tool called Ntbackup. This tool allows users to create a backup of their important files and data. By running Ntbackup, users can ensure that their data is safely backed up before proceeding with the operating system upgrade. This backup can be used to restore any lost or corrupted files in case something goes wrong during the upgrade process.
39.
A network administrator
is troubleshooting a server that keeps crashing. While monitoring traffic to
the server, the administrator notices repeated, larger than normal pings to the
server. What is the name of this type of attack?
Correct Answer
D. Ping of death
Explanation
The correct answer is "ping of death." In this type of attack, the attacker sends oversized or malformed ping packets to the target server, causing it to crash or become unresponsive. The repeated larger than normal pings observed by the network administrator indicate that the server is being targeted by this specific type of attack.
40.
When installing a
network adapter into a client computer, a technician notices that the contacts
on the adapter need to be cleaned. Which solution should the technician use to
clean the contacts?
Correct Answer
B. Isopropyl alcohol
Explanation
Isopropyl alcohol is the recommended solution for cleaning the contacts on a network adapter. It is a common cleaning agent that is safe to use on electronic components. Isopropyl alcohol evaporates quickly and does not leave residue, making it ideal for cleaning delicate contacts without causing damage. It effectively removes dirt, dust, and oils from the contacts, ensuring a good connection and optimal performance of the network adapter.
41.
Which three benefits
are gained by networking computers? (Choose three.)
Correct Answer(s)
B. Fewer peripHerals needed
D. Lower cost licensing
F. Increased communication capabilities
Explanation
Networking computers provides several benefits. First, it reduces the need for personal training as users can easily access shared resources and information. Second, it results in fewer peripherals needed as resources such as printers and scanners can be shared among multiple computers. Third, networking allows for lower cost licensing as software licenses can be shared among multiple users. Lastly, networking enables increased communication capabilities, allowing users to easily share files, collaborate, and communicate with each other.
42.
A technician needs to
configure the hard drive on a computer so that there appears to be one drive
for the operating system and four drives for data from different applications.
How can the hard drive be configured to provide this perception?
Correct Answer
F. Create one primary partition and one logical partition with four logical drives within it.
Explanation
The hard drive can be configured to provide the perception of one drive for the operating system and four drives for data from different applications by creating one primary partition and one logical partition with four logical drives within it. This configuration allows for separate storage areas for the operating system and the data from different applications, making it easier to manage and organize the data.