1.
You are installing two hard disk drives on a computer. Which of the following possible combinations can be used? Each correct answer represents a compleye solution. Choose all that apply.
Correct Answer(s)
A. Install the second hard disk drive on the primary IDE controller. Designate one drive as Master and the other as Slave.
B. Install the second hard disk drive on the secondary IDE controller ensuring that the first hard disk drive is on primary IDE controller. Designate both drives as Master.
Explanation
The correct answer suggests that the second hard disk drive should be installed on the primary IDE controller and designated as a Slave, while the first hard disk drive should be installed on the secondary IDE controller and designated as a Master. This configuration allows for optimal performance and compatibility between the two drives. Additionally, designating both drives as Master on the secondary IDE controller would not be a correct solution, as it can cause conflicts and compatibility issues.
2.
Which of the following maxium resolutions does the UXGA video technology supports?
Correct Answer
B. 1600 X 1200
Explanation
The correct answer is 1600 X 1200. UXGA video technology supports a maximum resolution of 1600 X 1200.
3.
Which of the following sleep modes is the most power hungry mode?
Correct Answer
A. S1
Explanation
S1 is the most power hungry sleep mode because it is the deepest sleep state where the processor is completely powered off and all the context is saved to the main memory. In this mode, the system consumes the least amount of power, but it takes longer to wake up and resume normal operation.
4.
Which of the following switches of the XCOPY command copies file ownerships and NTFS permission on files while copying the files?
Correct Answer
D. /o
Explanation
The /o switch of the XCOPY command is used to copy file ownerships and NTFS permissions on files while copying them.
5.
Step 1 - Talk to the Customer
Step 2 - Document Your Work
Step 3 - Continue to gather information
Step 4 - Eliminate possibilities to find the problem
Step 5 - Test your results
6.
Which of the following statements about a smart card are true? Each correct answer represents a complete solution. Choose two.
Correct Answer(s)
A. It is used to securely store public and private keys for long on, email signing and encryption, and file encryption.
D. It is a device that contains a microprocessor and permanent memory
Explanation
A smart card is a device that contains a microprocessor and permanent memory. It is used to securely store public and private keys for long on, email signing and encryption, and file encryption. This means that it can securely store sensitive information such as encryption keys and certificates. Additionally, it can be used for tasks such as email signing and encryption, as well as file encryption.
7.
Which of the following ports is also known as PS/2?
Correct Answer
A. 6-pin Mini-DIN connector
Explanation
The 6-pin Mini-DIN connector is also known as PS/2. This connector is commonly used for connecting keyboards and mice to computers.
8.
Which of the following statements are true about Universal Serial Bus (USB)?
Each correct Answer represents a complete solution. Choose two.
Correct Answer(s)
A. USB supports hot plugging
B. You can connect up to 127 peripHeral devices to a single USB port
Explanation
USB supports hot plugging, which means that devices can be connected or disconnected from a USB port without having to restart the computer. This allows for convenient and seamless connectivity. Additionally, USB allows for the connection of up to 127 peripheral devices to a single USB port, making it a versatile and efficient technology for connecting multiple devices to a computer.
9.
Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?
Correct Answer
D. Shoulder surfing attack
Explanation
A shoulder surfing attack is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer. In this type of attack, the attacker tries to gain unauthorized access to sensitive information such as passwords, PINs, or other confidential data by observing the victim's actions. By physically observing the victim's keystrokes or screen, the attacker can gather valuable information without the victim's knowledge. This type of attack can be easily carried out in public places or shared workspaces where the attacker can easily position themselves to view the victim's screen or keyboard.
10.
You are responsible for technical support at a company. One of the employees complains that his new laptop cannot connect to the company wireless network. You have verified that he is entering a valid password/passkey. What is the most likely problem?
Correct Answer
D. MAC filtering is blocking him
Explanation
The most likely problem is that MAC filtering is blocking the employee's laptop from connecting to the company wireless network. MAC filtering is a security feature that only allows devices with specific MAC addresses to connect to the network. Since the employee's laptop is new, it is possible that its MAC address has not been added to the list of allowed devices. This would result in the laptop being blocked from connecting to the network, even if the correct password/passkey is entered.
11.
Which of the followintg is a technology that allows you to hear and watch video clips as soon as they start downloading from the Web site, instead of waiting for the download to complete?
Correct Answer
B. Streaming Media
Explanation
Streaming media is a technology that allows users to hear and watch video clips as soon as they start downloading from a website, without having to wait for the download to complete. This technology enables the continuous playback of audio or video content while it is being transferred over the internet. It is commonly used for online video platforms, live streaming, and on-demand services, providing users with immediate access to multimedia content without the need to fully download it beforehand.
12.
Which of the following refers to the data rate supported by a network connection or interface?
Correct Answer
A. Bandwidth
Explanation
Bandwidth refers to the data rate supported by a network connection or interface. It represents the maximum amount of data that can be transmitted over a network in a given amount of time. A higher bandwidth allows for faster data transfer, while a lower bandwidth may result in slower or limited data transmission.
13.
Which of the following are serial interfaces?
Choose all that apply.
Correct Answer(s)
B. USB
C. FireWire
Explanation
USB and FireWire are both examples of serial interfaces. USB (Universal Serial Bus) is a standard interface that allows for the connection of various devices to a computer. It is widely used for connecting peripherals such as keyboards, mice, printers, and external storage devices. FireWire (also known as IEEE 1394) is another serial interface that is commonly used for high-speed data transfer between devices, particularly in audio and video applications. EPP (Enhanced Parallel Port) and IEEE 1284, on the other hand, are parallel interfaces and not serial interfaces.
14.
Which of the following devices has its own BIOS?
Correct Answer
D. Video adapter
Explanation
A video adapter, also known as a graphics card, has its own BIOS. The BIOS (Basic Input/Output System) is a firmware that is responsible for initializing the hardware components of a computer system. In the case of a video adapter, the BIOS is responsible for initializing and configuring the graphics card, allowing it to communicate with the computer's operating system and display output on the monitor. This BIOS contains specific settings and instructions for the video adapter, allowing it to function properly and provide the necessary graphics capabilities.
15.
Which of the following are dual core processors?
Each correct Answer represents a complete solution. Choose two.
Correct Answer(s)
A. AMD Athlon(tm) 64 X2
C. Intel(r) Pentium(r) processor Extreme Edition
Explanation
The AMD Athlon(tm) 64 X2 and Intel(r) Pentium(r) processor Extreme Edition are both dual core processors. The AMD Athlon(tm) 64 X2 is a dual-core processor from AMD, while the Intel(r) Pentium(r) processor Extreme Edition is a dual-core processor from Intel.
16.
Which of the following switches is used with the XCOPY command to copy directories and subdirectories, including empty directories?
Correct Answer
D. /e
Explanation
The /e switch is used with the XCOPY command to copy directories and subdirectories, including empty directories. This switch ensures that all directories and subdirectories are copied during the process, even if they are empty.
17.
Which of the following provides authentication, encryption, and data integrity for wireless devices?
Correct Answer
D. WTLS
Explanation
WTLS (Wireless Transport Layer Security) provides authentication, encryption, and data integrity for wireless devices. WTLS is a security protocol specifically designed for wireless communication, ensuring that data transmitted between devices is secure and protected. It offers authentication to verify the identities of the wireless devices, encryption to protect the confidentiality of the data, and data integrity to ensure that the data has not been tampered with during transmission. Therefore, WTLS is the correct answer for this question.
18.
Mark wants to connect a printer and mouse to his laptop. Which of the following is the best wireless technology to use?
Correct Answer
A. Bluetooth
Explanation
Bluetooth is the best wireless technology to use for connecting a printer and mouse to a laptop because it is a widely supported and versatile technology that allows for easy and reliable connections between devices. Bluetooth provides a low-power, short-range wireless connection that is ideal for connecting peripherals like printers and mice to laptops without the need for additional cables or adapters. Additionally, Bluetooth offers a secure and stable connection, making it a popular choice for wireless device connectivity.
19.
What is the maximum resolution that the WUXGA video technology supports?
Correct Answer
B. 1920 X 1200
Explanation
WUXGA (Wide Ultra Extended Graphics Array) video technology supports a maximum resolution of 1920 X 1200. This resolution refers to the number of pixels displayed horizontally and vertically on a screen. WUXGA provides a high-quality display with a widescreen aspect ratio, making it suitable for various applications such as multimedia, gaming, and professional use. The other resolution options mentioned in the question (2048 X 1536, 3840 X 2400, and 1600 X 1200) are not the maximum resolutions supported by WUXGA.
20.
What does Wireless Transport Layer Security (WTLS) provide for wireless devices?
Each correct Answer represents a complete solution. Choose all that apply.
Correct Answer(s)
A. Data integrity
B. Encryption
D. Authentication
Explanation
Wireless Transport Layer Security (WTLS) provides data integrity, encryption, and authentication for wireless devices. Data integrity ensures that the data transmitted between devices remains intact and has not been tampered with. Encryption secures the data by encoding it, making it unreadable to unauthorized users. Authentication verifies the identity of the devices involved in the communication, ensuring that only trusted devices can access the network. Bandwidth, on the other hand, refers to the amount of data that can be transmitted in a given time and is not directly provided by WTLS.
21.
Which of the following software displays advertisements, whether or not the user has consented?
Correct Answer
D. Adware
Explanation
Adware is a type of software that displays advertisements without the user's consent. It is often bundled with other free software and installed without the user's knowledge. Adware generates revenue for its developers by displaying ads, which can be intrusive and disruptive to the user's browsing experience. Unlike other options listed, such as Trojan Horse, Honeypot, and Spyware, Adware specifically focuses on displaying advertisements.
22.
Which of the following protocols transmits error messages and network statistics?
Correct Answer
A. ICMP
Explanation
ICMP (Internet Control Message Protocol) is the correct answer because it is specifically designed to transmit error messages and network statistics. It is used by network devices to send diagnostic information, such as error messages, to indicate problems with the network or to provide information about the network status. ICMP is commonly used by tools like ping and traceroute to test network connectivity and troubleshoot network issues. DHCP (Dynamic Host Configuration Protocol) is used for assigning IP addresses to devices, TCP (Transmission Control Protocol) is responsible for establishing and maintaining a connection between devices, and NNTP (Network News Transfer Protocol) is used for distributing news articles in a network.
23.
Which of the following power sources are used to power a laptop?
Correct Answer(s)
B. AC power
C. Battery
Explanation
Laptops can be powered by AC power and batteries. AC power refers to the electricity that is supplied through a power outlet, allowing the laptop to be plugged in and charged. On the other hand, laptops also have built-in batteries that store electrical energy and provide power when the laptop is not connected to an outlet. This allows users to use their laptops without being tethered to a power source. Therefore, both AC power and batteries are used to power laptops.
24.
Mark works as a Network Administrator for NetTech Inc. The network has 150 Windoes 2000 Professional client computers and four Windows 2000 servers. All the client computers are able to connect to the Internet. Mark is concerned about malware infecting the client computers through the Internet. What will Mark do to protect the client computers from malware? Each correct Answer represents a complete solution. Choose two.
Correct Answer(s)
A. Educate users of the client computers about the problems arising due to malware
B. Educate users of the client computers to avoid malware
Explanation
To protect the client computers from malware, Mark will educate the users about the problems arising due to malware and how to avoid it. By providing information and awareness about the risks and consequences of malware infections, users will be more cautious and take necessary precautions while using the internet. This will help in reducing the chances of malware infecting the client computers and ensure a safer network environment.
25.
You have a customer who wants to install WinXP professional on her computer. What is the minimum amount of RAM she must have for this to work?
Correct Answer
B. 64 MB
Explanation
To install Windows XP Professional, the minimum amount of RAM required is 64 MB. This is the smallest amount of memory needed for the operating system to function properly. However, it is important to note that this is the bare minimum requirement and having more RAM would lead to better performance and smoother operation of the computer.
26.
You are selecting RAM for a new PC. You are very concerned about making sure errors are handled. Which of the following types of RAM should you select?
Correct Answer
C. ECC RAM
Explanation
ECC RAM, or Error Correcting Code RAM, is the type of RAM that should be selected to ensure errors are handled effectively. ECC RAM has the ability to detect and correct errors that may occur during data storage and retrieval processes. It uses additional bits to store error correction codes, allowing it to identify and fix errors in real-time. This makes ECC RAM more reliable and stable compared to other types of RAM, making it the ideal choice for someone who is concerned about error handling in their new PC.
27.
What is the4 maximum data transmission speed of IEEE 802.11b wireless networks?
Correct Answer
D. 11 Mbps
Explanation
The maximum data transmission speed of IEEE 802.11b wireless networks is 11 Mbps. This is the correct answer because IEEE 802.11b is a standard for wireless local area networks (WLANs) that operates in the 2.4 GHz frequency band and has a maximum data rate of 11 Mbps.
28.
Which of the following types of parental controls is used to limit access to the Internet contents?
Correct Answer
A. Conent filter control
Explanation
Content filter control is used to limit access to Internet contents by blocking or filtering certain websites or types of content. It allows parents or guardians to restrict access to inappropriate or potentially harmful material, ensuring a safer online experience for children. This type of parental control can be customized to block specific websites, keywords, or categories of content, providing a more tailored and effective approach to internet filtering.
29.
Andrew has a personal computer. One morning, he starts his computer and finds the following error message: "CMOS checksum failure. "What are the most likely causes of this error? Choose Two
Correct Answer(s)
B. The CMOS battery has failed
C. The CMOS chip has failed
Explanation
The error message "CMOS checksum failure" indicates that there is an issue with the CMOS (Complementary Metal-Oxide-Semiconductor) settings. The CMOS battery is responsible for providing power to the CMOS chip, which stores the computer's BIOS settings. If the battery fails, it can cause the CMOS chip to fail as well, resulting in the error message. Therefore, the most likely causes of this error are a failed CMOS battery and a failed CMOS chip.
30.
What are the benefits of using USB 2.0 over legacy communication ports such as RS-232 and parallel ports? Choose all that apply.
Correct Answer(s)
A. Easy configuration of hardware devices
B. Expansion
D. Speed
Explanation
USB 2.0 offers several benefits over legacy communication ports such as RS-232 and parallel ports. Firstly, it provides easy configuration of hardware devices, allowing for a more user-friendly setup process. Secondly, USB 2.0 supports expansion, allowing for the connection of multiple devices simultaneously. Lastly, USB 2.0 offers faster data transfer speeds compared to RS-232 and parallel ports, enabling quicker and more efficient communication between devices.
31.
Which of the following sleep modes is also known as Hibernation in Windows operating systems?
Correct Answer
C. S4
Explanation
S4 is the correct answer because it is the sleep mode that is commonly referred to as Hibernation in Windows operating systems. In this mode, the computer saves all open documents and running programs to the hard drive and then shuts down. When the computer is turned back on, it resumes from where it left off, allowing for a quick startup and the restoration of all previously open files and applications.
32.
Which of the following can occur if the power cable runs along with the computer network cable?
Correct Answer
A. EMI
Explanation
If the power cable runs along with the computer network cable, it can cause electromagnetic interference (EMI). EMI occurs when the electrical signals from the power cable interfere with the signals in the network cable, resulting in data corruption or loss. This interference can disrupt the functioning of the network and lead to communication errors and performance issues. It is important to separate power cables from network cables to minimize the risk of EMI.
33.
Which of the following are types of social engineering attacks? Choose two.
Correct Answer(s)
A. An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee
C. An unauthorized person calls a user and pretends to be a system administrator in orber to get the user's password
Explanation
The correct answer is "An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee" and "An unauthorized person calls a user and pretends to be a system administrator in order to get the user's password". These two scenarios describe social engineering attacks where individuals manipulate human behavior to gain unauthorized access to systems or information. In the first scenario, the attacker uses impersonation to deceive employees and gain physical access to the server. In the second scenario, the attacker uses deception and impersonation to trick a user into revealing their password. Both examples highlight the social engineering aspect of exploiting human vulnerabilities rather than technical vulnerabilities.
34.
Your customers WinXP machine has become unusable due to some unknown cause. You want to put the computer into a working state again. What is the best way to do this?
Correct Answer
C. Use the Windows Recovery Console witht he Windoes Recovery CD to put the system back in a working state
Explanation
The best way to put the customer's WinXP machine back into a working state is to use the Windows Recovery Console with the Windows Recovery CD. This option allows the user to access advanced troubleshooting tools and repair the system. Simply putting the Windows Recovery CD in will not initiate the recovery process, and reinstalling Windows may not be necessary if the issue can be resolved using the recovery console. Uninstalling any new software may not address the underlying cause of the problem.
35.
Which of the following terms refers to proprietary software that is provided to users without payment on a trail basis and is often limited by any combination of functionality, vailability or convenience?
Correct Answer
B. Shareware
Explanation
Shareware refers to proprietary software that is provided to users without payment on a trial basis and is often limited by any combination of functionality, availability, or convenience. Unlike freeware, which is completely free, shareware typically includes some restrictions or limitations that encourage users to purchase the full version of the software. Shareware allows users to try out the software before deciding whether to buy it, making it a popular distribution model for software developers.
36.
Which of the following buses has a maximum data transfer rate of 2400 Mbsp?
Correct Answer
B. ESATA
Explanation
eSATA (External Serial Advanced Technology Attachment) is the correct answer because it has a maximum data transfer rate of 2400 Mbps. FireWire 800 has a maximum data transfer rate of 800 Mbps, USB 1.1 has a maximum data transfer rate of 12 Mbps, and USB 2.0 has a maximum data transfer rate of 480 Mbps. Therefore, eSATA is the only option that matches the given data transfer rate of 2400 Mbps.
37.
Which of the following IPv6 address types is a single address that can be assigned to multiple interfaces?
Correct Answer
D. Anycast
Explanation
Anycast is the correct answer because it is an IPv6 address type that can be assigned to multiple interfaces. When a packet is sent to an anycast address, it is delivered to the nearest interface that is assigned that address. This allows for efficient routing and load balancing, as multiple interfaces can share the same anycast address.
38.
Which of the following can be installed in an AGP slot?
Correct Answer
A. Video card
Explanation
An AGP slot is specifically designed to accommodate a video card. AGP stands for Accelerated Graphics Port, which is a high-speed interface primarily used for connecting a graphics card to a computer's motherboard. Therefore, a video card is the only option that can be installed in an AGP slot. RAM, microprocessors, and modem cards require different types of slots or connectors to be installed in a computer.
39.
At what voltage does a USB host supply power to the USB bus?
Correct Answer
B. 5 volts
Explanation
USB hosts typically supply power to the USB bus at a voltage of 5 volts. This voltage is standard for USB devices and is used to power and charge various devices such as smartphones, tablets, and other peripherals. The 5-volt power supply ensures compatibility and safe operation of USB devices across different platforms and manufacturers.
40.
Which of the following enables third-party developers to create capabilities to extend an application?
Correct Answer
A. Plug-in
Explanation
A plug-in is a software component that allows third-party developers to add new features or functionalities to an existing application. It provides an interface for developers to extend the capabilities of the application without modifying its core code. By creating a plug-in, developers can integrate their own code into the application and enhance its functionality according to their specific needs. This enables the application to be more flexible and customizable, as users can choose which plug-ins to install based on their requirements.
41.
Which of the following statements about multi-or authentication is true?
Correct Answer
C. It involves two or more methods as part of the authentication process
Explanation
The correct answer is "It involves two or more methods as part of the authentication process." Multi-factor authentication is a security measure that requires users to provide two or more different types of evidence to verify their identity. This can include something the user knows (password), something the user has (smart card), or something the user is (biometric data). By combining multiple methods, it adds an extra layer of security and makes it more difficult for unauthorized individuals to gain access to sensitive information or systems.
42.
What is the difference between the USB 2.0 and IEEE 1294 bus standards?
Correct Answer
C. IEEE 1394 is slower than USB 2.0
43.
Which of the following devices provides input by analyzing printed text, handwriting, or an object?
Correct Answer
B. Image scanner
Explanation
An image scanner is a device that provides input by analyzing printed text, handwriting, or an object. It uses optical character recognition (OCR) technology to convert the physical content into digital data that can be processed by a computer. This allows users to easily digitize documents, images, or physical objects and store or manipulate them electronically. Unlike a webcam, which captures live video footage, an image scanner focuses on capturing and converting static visual information into a digital format. Packet analyzers and BD-ROM drives are not designed for analyzing printed text, handwriting, or objects.
44.
Which of the following substances are restricted under Restriction of Hazardous Substances (RoHS)? Choose all that apply
Correct Answer(s)
A. Mercury (Hg)
B. Lead (Pb)
D. Cadmium (Cd)
Explanation
Mercury (Hg), Lead (Pb), and Cadmium (Cd) are all substances that are restricted under Restriction of Hazardous Substances (RoHS). This regulation restricts the use of certain hazardous substances in electrical and electronic equipment to protect human health and the environment. Iron (Fe) is not restricted under RoHS, so it is not included in the answer.
45.
Which of the following statements about a riser card is true?
Correct Answer
D. It is used to extend to slots for expansion cards
Explanation
A riser card is a hardware component used to extend the slots for expansion cards in a computer. It allows additional expansion cards to be connected to the motherboard by raising them vertically, providing more space for installation. This is useful when there are limited slots available on the motherboard or when specific configurations require additional expansion capabilities.
46.
Which of the following devices is used for accessing the data on Secure Digital (SD) card, MMC card, and CompactFlash (CF)?
Correct Answer
B. Memory card reader
Explanation
A memory card reader is used for accessing the data on Secure Digital (SD) cards, MMC cards, and CompactFlash (CF) cards. It is a device that allows you to transfer data between your memory card and a computer or other devices. By connecting the memory card reader to a computer, you can easily access and transfer files, photos, videos, and other data from your memory card without the need for the original device the card was used in.
47.
Which of the following can be used to accomplish authentication? Choose all that apply.
Correct Answer(s)
A. Biometrics
C. Password
D. Token
Explanation
Biometrics, password, and token can all be used to accomplish authentication. Biometrics refers to the use of unique physical characteristics, such as fingerprints or facial recognition, to verify a person's identity. Passwords are a common method of authentication, where users must enter a secret code to access a system. Tokens are physical devices, such as smart cards or USB tokens, that generate one-time passwords or provide a secure means of authentication. All three methods provide different levels of security and can be used individually or in combination to authenticate users.
48.
Which of the following devices can cause great harm to one's life with lethal electric shocks?
Correct Answer(s)
A. SMPS
C. Monitor
Explanation
SMPS (Switched Mode Power Supply) and Monitor can both cause great harm to one's life with lethal electric shocks. SMPS is responsible for converting and regulating the electrical power from the main supply to the required voltage for the computer components. If not handled properly, it can deliver high voltage electric shocks. Similarly, a faulty or damaged monitor can also pose a risk of electric shock due to exposed wires or internal malfunctions. Floppy drives and keyboards, on the other hand, do not have the capability to cause lethal electric shocks.
49.
Which of the following ports on ac omputer are used to connect a keyboard? Choose two
Correct Answer(s)
A. USB
C. PS/2
Explanation
USB and PS/2 ports are used to connect a keyboard to a computer. USB (Universal Serial Bus) is a common port found on most modern computers and is widely used for connecting various peripherals, including keyboards. PS/2 ports, on the other hand, are older ports specifically designed for connecting keyboards and mice. Although less common nowadays, some computers still have PS/2 ports for backward compatibility with older devices. DB-25 and DB-9 ports are not typically used for connecting keyboards.
50.
Which of the following features are related to power management? Choose two.
Correct Answer(s)
B. Hibernate mode
C. Standby mode
Explanation
Hibernate mode and standby mode are both related to power management. Hibernate mode is a power-saving state that saves the current state of your computer to the hard drive and shuts down, allowing you to resume where you left off when you power it back on. Standby mode, on the other hand, puts your computer into a low-power state while still keeping your session and open documents in memory, allowing for quick resumption of work. Both of these features help conserve power by allowing the computer to enter a low-power state when not in use.