Thursday, November 29, 2007

Operating Systems: Checking for compatability prior to upgrades

What tool allows you to check your system for compatibility prior to installing Windows XP?
1. Disk Cleanup
2. >>Upgrade Advisor
3. MSCONFIG
4. Windows Update

Explanation : Before you attempt to upgrade a system to Windows XP, you should insert the Windows XP installation CD and run the Upgrade Advisor by clicking Check System Compatibility. The upgrade advisor examines your hardware and reports on what shortcomings it finds, if any.

You cannot use Windows Update to check for compatibility before upgrading to Windows XP. Windows Update allows users to download and install updates and security fixes for Windows.

You cannot use Disk Cleanup to check for compatibility before upgrading to Windows XP. You use Disk Cleanup to remove unnecessary files, empty the Recycle Bin, and restore disk space.

You cannot use MSCONFIG to check for compatibility before upgrading to Windows XP. MSCONFIG allows you to specify which programs and services you want to run at startup.
Objective: Operating Systems

Security: Smart Cards

You are troubleshooting login at a computer that uses a smart card for authentication.
What response should you see from the computer when you insert the smart card in the reader?
1. >>The computer should finish logging in to the network.
2. The computer should prompt for a user name.
3. The computer should prompt you to remove the smart card.
4. The computer should prompt for a password or personal identification number (PIN).

Explanation : The computer should prompt you for a password or PIN. Smart cards use a two-form authentication. The first part of the authentication is the smart card itself. You must also provide either a password or PIN, depending on the specific smart card and software.

The computer should not prompt you to remove the smart card. When using a smart card for authentication, you lock the computer by removing the smart card.

The computer should not finish logging in to the network The computer should not complete the logon process until you provide a password or PIN.

The computer should not prompt for a user name. The smart card is used instead of a user name for authentication.
Objective:
A Windows XP computer on a TCP/IP network can use the ping command to communicate with other computers by IP address, but not by the computer's name. This is the only computer on the network having this problem.
What is most likely wrong?

1. The network's DHCP server is failing.
2. The computer's IP address is configured incorrectly.
3. The computer's default gateway address is configured incorrectly.
4. >>The computer's Primary DNS server address is configured incorrectly.
5. The network's DNS server is failing.

Explanation : The most likely problem is that the computer's Primary Domain Name Service (DNS) server address is configured incorrectly. Because this is the only computer experiencing the problem, you can be relatively sure that the problem is directly related to that computer. Because you can communicate with other computers by IP address, you know that the computer can communicate on the network. Because the DNS server provides host name/IP address resolution, the problem is most likely related to finding or communicating with the DNS server. Configuring the wrong primary DNS server address could cause this problem.

The problem is most likely not that the Dynamic Host Configuration Protocol (DHCP) server is failing. The DHCP server provides IP address and other TCP/IP configuration properties for computers configured to receive an IP address automatically. If the DHCP server were failing, you would see a different symptom. Network computers would not receive IP addresses, which would prevent them from communicating with other computers that have correct address by IP address or name.

The problem is most likely not that the computer's IP address is configured incorrectly. This would prevent the computer from communicating with any other computers on the network by IP address or host name.

The problem is most likely not related to the computer's gateway server address being configured incorrectly. This would prevent the computer from communicating with any computers on other networks by IP address or by name. The default gateway is not used when communicating with local computers on the same network.
Objective: Networks

Operating Systems: Safe Mode vs Debugging Mode vs VGA Mode vs Last Known Good Config

You are troubleshooting a problem with a Windows XP Professional computer. The system will not start normally. The owner said all she did was download and install a program off the Internet. When she rebooted, the system hung at the Windows logo screen.
You have tried to use the Last Known Good Configuration but the system still fails to boot to the desktop.
How should you attempt to start the system to correct the error?

1. Debugging Mode
2. Safe Mode with Command Prompt
3. >>Safe Mode
4. Enable VGA Mode

Explanation : If using the Last Known Good Configuration does not correct a boot up problem, Safe Mode should be used. Safe Mode boots the operating system with a minimum configuration, and can be used to solve problems with a new hardware or software installation, or problems caused by user settings. Safe Mode boots with the mouse, basic video, keyboard, and mass storage drivers loaded. It uses the default system services (not any extra services) and does not provide network access. It does provide a graphical interface. With the graphical interface enabled, you can use the normal Windows tools and utilities to correct the problem.

Safe Mode with Command Prompt is the same as Safe Mode but does not load the graphical interface. Many standard Windows tools and utilities do not run without the graphical interface.

Enable VGA Mode is used when the video setting is such that you cannot see the screen well enough to fix a bad setting. This can happen if a user creates a desktop with black fonts on a black background, or something similar to that. Booting in this mode gives you very plain VGA video display but allows you to change the settings in the Display properties.

Debugging Mode gives you the opportunity to move system boot logs from the failing computer to another computer for evaluation. To use this mode, you first must connect the failing computer to another computer using a serial cable. You then can review the boot logs on a functioning computer.
Objective: Operating Systems

Security: Backups: Normal vs Incremental vs Daily vs Differential - and the Archive Bit

Which backup types back up selected files and clear the archive bit in Windows Backup? (Select TWO.)
1. Copy
2. Incremental
3. >>Normal
4. Daily
5. >>Differential

Explanation : A normal backup backs up the selected files and clears the archive bit. The archive bit identifies whether or not a file has changed since the last time it was backed up. Some backup types filter the files to back up based on the archive bit, backing up only those files with the archive bit set.

An incremental backup also backs up selected files, but is limited to only those files with the archive bit set. It clears the archive bit when it runs, so that only files that have changed since the last full or incremental backup are backed up. One potential disadvantage is that when you recover from multiple incremental backups, you must recover from all incremental backups made since the last base (normal) backup in the order in which they were taken. Recovery will fail if any of the backups are missing.

A daily backup backs up files modified on the day of the backup, but does not clear the archive bit. A daily backup uses the file modification date rather than the archive bit to determine the files to back up.

A copy backup backs up selected files, but does not clear the archive bit. It backs up all selected files and does not check the archive bit.

A differential backup backs up changed files from the selected files, based on the archive bit value, but does not clear the archive bit. Because of this, each subsequent differential backup backs up more data and takes longer to run, until a backup is run that clears the archive bit. Recovery using differential backups is relatively easy because you recover from the last base (normal) backup and then only need to recover from the most recent differential backup.
Objective: Security

Networks : Accessing the internet from computers with private IP addresses (Proxy)

Computers on your network are configured with private IP addresses that are not routable on the Internet. You want to substitute a routable Internet address when the computers need to access the Internet.
What type of server performs this function for your network?
1. DNS
2. >>Proxy
3. Gateway
4. DHCP

Explanation : A proxy server replaces a computer's configured address with its own address for Internet access. Private networks are typically configured with IP addresses that are not routable on the Internet. This will prevent computers on the network from accessing the Internet unless the configured private address is replaced by a routable IP address. This is done to help ensure the security of the network computers. Because only the proxy server address is exposed on the Internet, it is much harder for a hacker to break into the network.

A Dynamic Host Configuration Protocol (DHCP) server does not replace a computer's configured address for Internet access. A DHCP server assigns IP addresses and other TCP/IP configuration settings to network computers.

A Domain Name Service (DNS) server does not replace a computer's configured address for Internet access. DNS servers provide name registration and address resolution services.

A gateway does not replace a computer's configured address for Internet access. The term gateway, in a TCP/IP network, refers to a router. A TCP/IP gateway provides access to other network segments or networks in a routed network.
Objective: Networks

Printers and Scanners: Raster Image Processor

A parallel laser printer fails while printing a document that includes raster images. The print succeeds when you change the printer from printing 600 dots per inch (dpi) to 300 dpi. You need to print the document at 600 dpi.
How can you correct this problem?
1. >>Install more memory in the printer.
2. Connect the printer using USB instead of the parallel interface.
3. Install more memory in the computer.
4. Update the printer device driver.

Explanation : You should install more memory in the printer. A raster image is made of an array of pixels, or dots. The laser printer's raster image processor (RIP) prepares the printable image from the raster image. If the image is too large or too complex for the printer to hold the entire page in memory, the print operation fails. If you are unable to increase printer memory, you can work around the problem by reducing the print resolution or reducing the size of the image.

You should not connect the printer using USB instead of the parallel interface. Changing to a USB connection might enable the computer to load the image faster to the printer, but the only difference this would make is that the print job would probably fail more quickly.

You should not update the printer device driver. Raster image processing is handled internally by the printer's RIP, which is not related to hardware device driver support.

You should not install more memory in the computer. The problem is with a memory overflow in the printer, not the computer.

Security: Backing up Registry and Boot Files

What should you back up to ensure that you have a copy of a Windows XP computer's Registry and boot files?

1. >>Backup the system state.
2. Back up My Network Places.
3. Back up My Documents for each user.
4. Back up the Windows folder on drive C.

Explanation : You should back up the computer's system state to back up the Registry and boot files. System state backup also backs up the COM+ registration database, IIS metadirectory, and Windows File Protection system files.

You should not back up My Documents for each user to back up the Registry and boot files. System state is not stored in the My Documents folder.

You should not back up My Network Places to back up the Registry and boot files. This would not back up system state data for the local computer because it backs up data physically located on shared network folders.

You should not back up the Windows folder to back up the Registry and boot files. Some of the boot files are stored at the system drive root, not the Windows folder.
Objective: Security

Networks: Retrieving the MAC address

What command would you use to retrieve a computer's MAC address?
1. >>ping
2. tracert
3. ipconfig
4. netstat

Explanation : You should use the ipconfig command and run ipconfig /all to retrieve a computer's Media Access Control (MAC) address. The MAC address is the address that is hard-coded on the computer's network interface card (NIC).

You should not use the ping command to retrieve a computer's MAC address. The ping command is used to trace communication between two computers.

You should not use the tracert command to retrieve a computer's MAC address. The tracert command is used to test communication with another computer and return detailed routing information.

You should not use the netstat command to retrieve a computer's MAC address. The netstat command is used to view networking status information. For example, the netstat command can be used to identify which ports are open and are monitored ("listened to") by the computer. Ports are used to direct network traffic to the appropriate service or application. The most commonly used default ports are defined as well-known ports. Ports often found open on a Windows computer include port 80, which is the default for Hypertext Transfer Protocol (HTTP) traffic for Web-related traffic, and port 53, which is used for Domain Name Service (DNS) traffic.
Objective: Networks

Laptops: Power Management - Hibernate vs Suspend vs Standby vs Shutdown

You need to configure power management for your notebook computer. You need to ensure that when the computer sits idle for more than 15 minutes, the computer powers down and turns itself off. You also need to be able to bring the computer back to being fully functional and available with the same applications running as before the computer was turned off. You need to bring the computer back up as quickly as possible when it is turned back on.
Which power state should you have the computer enter after it sits idle for 15 minutes?
1. Hibernate
2. Shutdown
3. >>Standby
4. Suspend

Explanation : You should have the computer enter hibernate state after it sits idle for 15 minutes. When a computer hibernates, all currently running applications and data in RAM are written to the hard disk. The computer power is then turned off. When the computer is turned back on, it is able to come back to full functionality with the same applications running because it reads the applications and data from the hard disk and writes them back into memory.

Shutdown also turns off the computer, but does not write the running applications or data to the hard disk. Because nothing is written to the hard disk, when the computer is turned on, it must go through full operating system startup. You must then restart any applications and reopen any data files that you need. This means that is takes longer to get the computer back to the same state as before it shut down.

Both suspend and standby are low-power states. Neither suspend nor standby turns the computer off, so neither of these power options meets your requirements.
Suspend is a low-power state with applications and memory maintained in RAM, but not written to the hard disk. Suspend does not turn off the computer, but does turn off many components in the computer, such as the hard disk.

Nothing is saved to memory or the hard disk with standby, and fewer devices are turned off (if any) than with the suspend mode. Some devices, such as the processor, are put in a lower-power mode. Because there are fewer devices that must be turned back on than with other power states, the computer returns to full functionality from this state faster than from any of the others listed.
Objective: Laptops and Portable Devices

Networks: STP vs RG8 vs Fiber Optic

Which of the following cable types would you choose to network seven buildings on a university campus?
1. RG-58
2. >>STP
3. Multimode Fiber Optic
4. RG-8

Explanation : Multimode Fiber Optic cable offers the best solution as it can run 2,000 meters (6,560 feet) and is impervious to electrical grounds. This would be the best choice since seven buildings in a campus are likely separated by a good distance.

RG-8 and RG-58 are coaxial cables and are limited to five segments, so connecting seven buildings would be beyond their capability even if the distance was not a factor. RG-8 has a maximum cable length of 500 meters, while RG-58 is limited to 185 meters.

Shielded Twisted Pair (STP) cabling is limited to 100 meters and would not be able to reach all of the buildings on the campus.
Objective: Networks

Printers and Scanners: TWAIN II

What is the significance of the TWAIN interface standard?
1. Non-Windows applications use the TWAIN interface standard to emulate a Windows interface.
2. >>Scanner hardware device drives must be written to the TWAIN interface standard.
3. The TWAIN interface standard is responsible for optical character recognition (OCR).
4. The TWAIN interface standard enables applications to directly control a scanner.

Explanation : The TWAIN interface standard enables imaging applications to directly control a scanner and scan images into the application. The term comes from the phrase "never the twain shall meet" and is designed to make it easier to use scanners and other imaging devices.

The TWAIN interface standard is not a hardware device driver standard. Most, but not all, scanners support the TWAIN interface standard. Many manufacturers include interface software that supports more advanced features than those supported by the TWAIN interface standard.

The TWAIN interface standard is not related to OCR applications except as a way of importing images directly into an application at supports OCR functionality. OCR software is able to recognize and extract character data from a scanned image.

The TWAIN interface standard is not related to Windows interface emulation. It is related specifically to imaging applications.
Objective: Printers and Scanners

Operating Systems: Upgrading from 95 to XP Pro

How should you upgrade a computer's operating system from Windows 95 to Windows XP Professional?

1. Install Windows XP Professional to the same hard disk partition that contains the Windows 95 operating system files.

2. Install Windows XP Professional to a hard disk partition other than the one that contains the Windows 95 operating system files.

3. >>Install Windows 98 to the hard disk partition that contains the Windows 95 operating system files, and then install Windows XP Professional to the same directory.

4. Run the Windows XP Upgrade Advisor, and then install Windows XP Professional to the hard disk partition that contains the Windows 95 operating system files.

Explanation : There is no direct upgrade path from Windows 95 to Windows XP. Instead you must first upgrade to either Windows 98 or Windows 2000 Professional by installing that operating system to the hard disk partition that contains the Windows 95 operating system files. Then you can perform an upgrade to Windows XP Professional to the same disk partition and Windows directory.

You should not install Windows XP Professional to a hard disk partition that contains the Windows 95 operating system files. This will not run as an upgrade installation. Also, Microsoft strongly discourages installing multiple operating system versions or instances to the same hard disk partition unless it is an upgrade installation.

You should not install Windows XP Professional to a hard disk partition other than the one that contains the Windows 95 operating system files. This will run as a clean installation and create a multiboot computer.

You should not run the Windows XP Upgrade Advisor and then install Windows XP Professional to the hard disk partition that contains the Windows 95 operating system files. Running the Upgrade Wizard will have no effect on the installation.
Objective: Operating Systems

Laptops: Port Replicator vs Docking Station

Your laptop does not provide sufficient I/O ports to meet your needs. You are trying to decide whether a docking station or port replicator is more appropriate to your needs.
What additional hardware support is provided by both a docking station and a port replicator? (Select TWO.)

1. >>Serial interface connector
2. >>USB port
3. PCI slot
4. Hard disk bay
5. Removable media bay
Explanation : The serial interface connector and USB port are provided by both docking stations and port replicators.

Port replicators and docking stations are similar devices, but a port replicator has less additional hardware support than a docking station. You should find a serial interface connection and one or more USB ports on a port replicator. You should also find a parallel port, video connections, and RJ-45 and RJ-11 ports. In short, you should find complete set of I/O ports.

You should find the same I/O ports on a docking station, but you would also expect additional hardware support. Typically, this will include a hard disk bay, removable media bay, memory slots, and possibly one or more PCI slots for installation of desktop PC expansion cards.
Both a port replicator and docking station support cable lock security.
Objective: Laptops and Portable Devices

Security: FAT32 vs NTFS partitions

When would it be necessary to convert a FAT32 disk partition to NTFS? (Select TWO.)
1. You want to support long file names.
2. >>You want to be able to set local file access permissions.
3. You want to use the Windows Backup utility to back up the partition.
4. >>You want to enable encrypting file system (EFS) support.
5. You want you configure a dual-boot computer with Windows 98 and Windows XP.

Explanation : You would need to convert a FAT32 disk partition to NTFS if you want to enable EFS support or local file access permissions. Both of these features require NTFS. EFS lets you encrypt files stored on the disk partition. Setting local file access permissions lets you set access permissions by user and group. This means that you can control who can access the files and the level of access permitted. For example, you might let some users view and modify files, while other users can view the files only.

You should not convert a FAT32 disk partition to NTFS to configure a dual-boot computer with Windows 98 and Windows XP. Windows 98 does not support NTFS, so FAT32 would be required in this situation.

You should not convert a FAT32 disk partition to NTFS to support long file names (names longer than the DOS 8.3 standard). FAT32 supports long file names for operating systems that support long file names.

You should not convert a FAT32 disk partition to NTFS to use the Windows Backup utility. The Windows Backup utility can be used to back up from and restore to a FAT32 partition.
Objective: Security

Networks : DSL and PPPoE vs DIal-Up vs FTP

When connecting your computer to the Internet through a DSL connection, which protocol would you expect to be used on the DSL connection?
1. DHCP
2. >>PPP
3. PPPoE
4. FTP

Explanation : A computer connects to a DSL-enabled phone line through a DSL modem. The computer's Ethernet network card connects directly to the modem, and the modem connects directly to the phone line. The connection between the network card and the broadband device most likely uses Point-to-Point Protocol over Ethernet (PPPoE), a protocol specifically designed to support broadband connections. PPPoE is included in Windows XP.

Point-to-Point Protocol (PPP) is used when establishing a Dial-Up connection from one computer to another.

File Transfer Protocol (FTP) is used to establish a connection between an FTP server and host. It is used to transfer files over a network.

Dynamic Host Configuration Protocol (DHCP) assigns IP addresses to clients.

Printers and Scanners: Printer Features unavailable out of the box

You install a new laser printer on a computer running Microsoft Windows XP Professional. The printer includes USB, parallel, and Ethernet network interface connectors. You use the USB connector to connect the printer to your computer.
You are unable to use all of the printer's features, such as the alternate paper tray and printing on both sides of the paper. You need access to these additional features.
What should you do?
1. >>Download and install the latest version of the printer device driver from the printer manufacturer.
2. Connect to the printer through the parallel connector.
3. Detach the printer, reinstall Windows XP Professional, and reconnect the printer.
4. Configure the printer as the computer's default printer.

Explanation : You should download and install the latest version of the printer device driver from the printer manufacturer. This will sometimes also include a printer-specific control application. The most likely reason that you are unable to access all of the printer features is that you are not using the printer-specific device driver. Windows XP Professional will choose the best matching device driver, but this is not always the best device driver for the printer.

You should not detach the printer, reinstall Windows XP Professional, and reconnect the printer. Windows XP Professional will most likely choose the same device driver as the one it is currently using, which will result in the same symptoms as you are currently seeing.

You should not configure the printer as the computer's default printer as a way to correct the problem. Making the printer the default printer will cause the computer to print to that printer when no other printer is specified, but it will not change the available printer options or features.

You should not connect to the printer through the parallel connector. This would not hurt the printer, but it would not accomplish anything, either. The printer should support the same features and options whether connected through the USB connector or the parallel connector.
Objective:

Laptops and Expansion Card Slots

A laptop computer has an external 68-pin slot that is 5 mm thick.
What type of expansion slot is this?
1. CardBus
2. PCMCIA Type I
3. PCMCIA Type III
4. >>PCMCIA Type II
Explanation : The expansion slot is a PCMCIA Type II slot. A 68-pin external expansion bus with a 5 mm opening is a Type II slot. Most PC Cards, which are expansion cards based on the PCMCIA standard, are Type II cards and will therefore be physically compatible with the notebook computer. This slot can be used with both Type I and Type II cards.

A Type I slot is a 68-pin slot, but is only 3.3 mm thick. This slot supports Type I cards only.

A Type III slot has 68 pins and is 10.5 mm thick. It supports Type I, II, and III cards. However, Type III cards are rarely seen, and very few notebook computers have Type III slots.

CardBus refers to a bus connection type that uses 32-bit bus mastering, not to the physical card interface, so this would be an inappropriate answer.
Objective: Laptops and Portable Devices

Components: Updating BIOS from Manufacturer (Flashing the BIOS)

You receive a service update from your PC's manufacturer for a PC you recently purchased. You need to update the PC's BIOS.
What is the best method for updating the BIOS?
1. >>Download the BIOS installation file from the manufacturer and flash the BIOS.
2. Order a new BIOS chip from the manufacturer and replace the BIOS chip.
3. Order a new motherboard from the manufacturer and replace the motherboard.
4. Download a BIOS patch from the manufacturer and install the patch on the hard disk.

Explanation : The correct way to update a computer's BIOS is to download the BIOS installation file and flash the BIOS. Depending on the manufacturer, the BIOS flash utility can run from the hard disk or from a floppy diskette.

The original IBM PC used a programmable, socket-mounted BIOS chip that could be reprogrammed and replaced. Current PCs have soldered-in BIOS chips that are not considered to be a field-replaceable unit (FRU) and should not be replaced.

It would be possible, in many cases, to replace a PC's motherboard. This is not considered the best method for updating the BIOS. That is because replacing the motherboard is neither time- nor cost-effective and is more effort than necessary to update the BIOS.

The BIOS is not patched using a software patch installed on the hard disk. The initial programs in the BIOS run before anything is retrieved from the hard disk. Software patches are used to update operating system and application software.
Objective:

Security: Features supported by XP and 2kpro out of the box

Which of the following security features are supported by both Windows XP Professional and Windows 2000 Professional without installing additional software? (Select TWO.)
1. Encrypting File System (EFS)
2. Kerberos
3. Voice print recognition
4. Smart card support
5. >>Windows Firewall
6. >>Windows Security Center

Explanation : Kerberos authentication support and encrypting file system (EFS) are supported by both Windows 2000 Professional and Windows XP Professional. Kerberos is the default authentication method for Windows 2000 Professional and Windows XP Professional. EFS lets you configure your file system so that files are encrypted automatically. You can enable encryption for a file folder.

Windows Firewall, Windows Security Center, and smart cards are supported by Windows XP, but not Windows 2000. However, additional updates are required for Windows XP support. Windows Firewall and Windows Security Center are installed as part of Windows XP Service Pack 2. Windows 2000 can support smart cards but requires installation of add-on software to enable the support. Unmodified copies of Windows XP and Windows 2000 that have not be updated to current service pack versions do not support these security features.

Voice print recognition is not supported by either Windows XP or Windows 2000 unless you install additional software support. There are applications that can run on either that add voice print recognition as a biometric security method, but the functionality is not built into the operating system.
Objective: Security

Networks: Automatic IP address assignment (DHCP)

You want Windows XP Professional computers on your network to receive an IP address automatically.
What kind of server is needed to support this?
1. >>DHCP
2. FTP
3. WINS
4. DNS
Explanation : A Dynamic Host Configuration Protocol (DHCP) server is needed to support automatic IP address assignment. Network computers lease IP addresses from the DHCP server. You can also have the DHCP server configure other IP configuration properties. These include primary and secondary Domain Name Service (DNS) server, default gateway, and NetBIOS name resolution method and, if appropriate, Windows Internet Name Service (WINS) server.

A WINS server provides NetBIOS name/IP address resolution. A WINS server is not a required part of automatic IP address assignment.

A DNS server maps TCP/IP host (network computer) names to IP addresses and provides DNS name/IP address resolution services.

A File Transfer Protocol (FTP) server supports file uploads and downloads between the server and network computers.
Objective: Networks

Laptops: Bluetooth vs Infrared vs USB vs 802.11b

You are looking for a wireless printer that will work with a recently purchased laptop computer. You want to connect the printer as a local device. The printer should be operational within 30 feet of the laptop and should be self-configuring.
What type of device interface should you use?
1. USB
2. IrDA
3. 802.11b
4. >>Bluetooth
Explanation : You should use a Bluetooth interface printer. Bluetooth is a radio communications technology with an effective range of 10 meters, or just over 30 feet. Bluetooth devices are self-configuring. Printers often have multiple interfaces, so a Bluetooth printer might also support other interface options, but you would configure the printer to use the Bluetooth interface.

You should not use Infrared Data Association (IrDA) printer. IrDA is an infrared, line-of-site communication technology that is functionally similar to a serial connection. Range is no more than 10 to 20 feet, and can be less, depending on environmental conditions such as dust and ambient light.

You should not use 802.11b. This is a wireless networking communication technology rather than an interface for connecting peripherals. A printer with an 802.11b interface would be designed for connecting directly to the network as a network printer, not for connecting locally to a computer. The printer would likely also have a local connection option, either parallel or Universal Serial Bus (USB), but these are wired interfaces. Communication range is over 300 feet, typically 500 feet or more.

You should not use a USB interface printer. USB is a wired, not wireless, interface.
Objective: Laptops and Portable Devices

Components: HDD impact on system performance

When you are choosing a new hard drive, which performance measurement should you evaluate as having the most impact on system performance?
1. >>Average Access Time
2. Latency
3. Average Seek Time
4. Transfer Rate

Explanation : There are a number of things to consider when you are purchasing a hard drive, including size, cost, and performance. There are a number of ways to measure hard drive performance, including Average Seek Time, Average Access Time, Latency, and Transfer Rate.

Average Seek Time (measured in milliseconds) is the amount of time it takes to move the heads from one cylinder to another.

Latency is also measured in milliseconds and is a measurement of the amount of time it takes for the data to be available after the heads reach their destination.

Average Access Time is the sum of the Average Seek Time and Latency.

The most significant performance factor is Transfer Rate. It is a measurement of the rate at which data is sent to the system. This rate depends on the controller as well as the hard drive.
Objective: Personal Computer Components

Networks: TCP/IP vs NETBEUI

You have been contracted to advise the owners of a new office building on setting up a computer network. The owners require a network that will be inexpensive but allow a Linux Server, five Macintosh workstations, and 40 Windows XP Professional computers to share data and printers.
What would be your advice to the client?

1. Install a network bridge between the Macs and the PCs.
2. Recommend replacing the Mac computers with Windows PCs.
3. Recommend using NetBEUI as the common protocol for the network.
4. >>Setup TCP/IP as the default protocol for the LAN.

Explanation : The best choice here is to use TCP/IP as the network protocol. TCP/IP (Transmission Control Protocol/Internet Protocol) is the protocol used on the Internet and is supported by Novell NetWare, Linux, Unix, Windows, and the Mac OS.

NetBEUI (NetBIOS Extended User Interface) is a proprietary Windows protocol used only by Windows computers. It is not used on the Internet because it is a non-routable protocol.

It is not necessary to replace the Macs because they are compatible with the common TCP/IP protocol.

Bridges are Data Link layer devices that join together different network segments. They pass on only traffic that needs to reach the segment on the other side of the bridge and, therefore, can help decrease overall network traffic. Segmenting the network would not accomplish the goal.
Objective: Networks

Laptops and Cleaning II

You need to clean debris from between the keys on a laptop keyboard. You turn off the computer.
What should you use to remove the debris? (Select TWO.)

1. Rinse with running tap water.
2. Use a stiff-bristled brush dampened with water or an ammonia solution.
3. >>Use a dry, soft-bristled brush, such as a paint brush.
4. >>Use compressed air.
5. Use a soft cloth dampened with distilled water.

Explanation : You should use a dry, soft-bristled brush or compressed air to clean a laptop keyboard. Either one can be used to remove debris without damaging the keyboard.
You should not use water, at any time or in any form, to clean between the keys on a laptop computer. Any water can damage a laptop computer.
Objective: Laptops and Portable Devices

Components: CRT Flicker

A user complains about the amount of flicker noticeable on a CRT monitor.
Which configuration setting directly affects flicker?
1. >>Refresh rate
2. Aspect ratio
3. Dot pitch
4. Resolution

Explanation : The refresh rate directly affect screen flicker. Refresh rate is measured in Hertz (Hz), which is the number of times per second that the screen is refreshed. The higher the refresh rate, the less likely that the screen will have noticeable flicker. Flicker is usually not noticed when the refresh rate is configured at a rate of 72 Hz or higher.

The screen resolution does not affect flicker. Resolution refers to the number of pixels on the screen. VGA resolution starts at 800 X 600 pixels and ranges up from there. For example, 21-inch monitors are typically designed to provide optimal display at a resolution of 1280 X 1024.

The dot pitch refers to the distance between colors dots of the same color on the screen. This value is measured in millimeters. The lower the number, the clearer the picture. Dot pitch ranges from 0.15 mm and 0.30 mm, with typical ranges between 0.22 mm and 0.26 mm.

The aspect ratio refers to the ratio between the horizontal and vertical screen sizes. A standard CRT monitor as a 4:3 aspect ratio.
Objective: Personal Computer Components

Sunday, November 25, 2007

Operating Systems: File management cmds

You want to copy the contents of a fixed hard disk to a removable hard disk for backup.
Which command can copy all files, directories, and subdirectories to another disk all at once?

1. FDISK
2. SETUP
3. SCANDISK
4. >>XCOPY
5. COPY

Explanation : The COPY command copies all files in the current or specified directory to a target drive and/or directory. The XCOPY command copies all files in the current or specified directory, and all files and subdirectories below it, to a target drive and/or directory. The XCOPY command can be used to copy the entire contents of one drive onto another drive.
If you want to copy all files from C: drive to D: drive the command would be:
XCOPY C:\*.* D:\*.* /S

The FDISK utility can create or remove partitions and set the active partition on a hard disk.

The SETUP utility in DOS or Windows is used to install the operating system onto the active partition.

The SCANDISK.EXE utility is used to find and correct problems such as lost clusters (pieces of files that have been disassociated from the parent file) on a hard disk. It can also detect bad sectors on a disk, try to recover any data contained in bad sectors, and "lock out" the bad areas from future use.
Objective: Operating Systems

Components: Adding a second IDE drive

You have just installed a second hard disk drive into a system by adding it as the second drive on the existing IDE cable. When you restart and enter the BIOS configuration program, it can detect neither drive, even though you can hear that both drives are spinning.
What is the most likely cause of the problem?

1. You did not connect the power cable to the new drive
2. The new drive is defective.
3. >>You need to set one drive as the slave and the other as the master.
4. The IDE cable is defective

Explanation : If you add a second hard disk drive to an IDE cable and do not adjust the jumpers, the BIOS may be unable to detect either drive. If both drives are set as Master or both set as slave, neither will be detected. Since the original drive worked until you added the second drive, both being set as Master is the most likely cause of the problem. If you are using an 80-conductor cable for a UDMA/66 or faster interface, both drives can be set for Cable Select.

If the IDE cable were defective, the original drive would not have worked before the addition of the new drive unless you damaged the cable during the installation.

Not connecting the power cable to the new drive would not affect the old drive. Neither would adding a defective second drive.
Objective: Personal Computer Components

Security: Warning of "Brute Force Attacks"

How can you configure a system to provide a warning of an attempted brute force attack?

1. Enable Windows Firewall on each user's computer.
2. Install a firewall between the company network and the Internet.
3. >>Enable logging of failed login attempts.
4. Require strong passwords.

Explanation : A brute force attack (also called a dictionary attack) is one in which an attacker uses software that tries password combinations until the correct password is found. You can enable logging of failed login attempts to provide yourself with a warning that an attacker is attempting a brute force attack. A large number of failed login attempts indicate that such an attack is underway.

Requiring strong passwords can help prevent a brute force attack from succeeding, but it does not inform you that one is being attempted.

Installing a firewall between the company network and the Internet can help limit access to the company network from the outside, but it cannot give warning of an attempted brute force attack.

Enabling Windows Firewall on each user's computer can help prevent certain types of packets from being accepted by a user's computer and can help prevent various types of attacks. However, it cannot provide you with warning of an attempted brute force attack.
Objective: Security

Operating Systems: Hidden folders, Application Data folders

You need to install a Microsoft Word template for a Sally. However, when you open C:\Documents and Settings\Sally, the Application Data folder is not there.
What should you do?

1. In Folder Options, remove the check from the Hide protected operating system files option.
2. Install the template in C:\Documents and Settings\All Users\Application Data.
3. >>Install the template in C:\Documents and Settings\Default User\Application Data.
4. In Folder Options, select Show hidden files and folders.

Explanation : You should select Show hidden files and folders in Folder Options. By default, the Application Data folder is hidden, as are the Local Settings, PrintHood, NetHood, SendTo, and Templates folders.

You should not use Folder Options to remove the check from the Hide protected operating system files option. The Application Data folder is not an operating system file. You would remove the check from the Hide protected operating system files option if you needed to modify an operating system file, such as boot.ini, or view system files.

You should not install the template in C:\Documents and Settings\All Users\Application Data. The Application Data folder in All Users will not be visible if the Show hidden files and folders option is not selected.

You should not install the template in C:\Documents and Settings\Default User\Application Data. The Default User profile is used only when a user logs on for the first time. It is used as a basis for the user's custom profile. Also, the Application Data folder in Default User will not be visible if the Show hidden files and folders option is not selected.
Objective: Operating Systems

Laptops: Video Resolution

You provide the user with a laptop computer to enable the user to telecommute. The user reports that one application will not install because of the video resolution. The user attempts to increase the video resolution, but cannot. The user has the most up-to-date drivers installed.
What should you do?

1. Replace the inverter in the display.
2. >>Change the maximum resolution in CMOS setup.
3. Instruct the user to attach an external display to the laptop.
4. Configure the laptop to support shared video memory.

Explanation : You should instruct the user to attach an external display to the laptop. Some laptop computers have built-in displays that cannot operate at high resolution. However, you can attach an external monitor and use it for applications that require high resolution graphics.

There is no need to replace the inverter in the display. If the inverter was not working, the display would be black.

You cannot change the maximum resolution in Complimentary Metal-Oxide Semiconductor (CMOS) setup.

You should not configure the laptop to support shared video memory. Shared video memory uses a portion of RAM for video operations instead of dedicated video memory. Shared video memory can decrease performance, not increase the supported resolution.
Objective: Laptops and Portable Devices

Components: Slave hard drives

How can you designate a hard drive as a slave? (Select TWO.)
1. >>Connect the hard drive to the motherboard using the Slave connector portion of a Cable Select cable.
2. Designate it as Slave in the BIOS Setup.
3. Set the Master jumper to Off.
4. >>Set the dip switch on the hard drive to Slave instead of Master.

Explanation : When running a dual-drive configuration, you must designate one hard drive as master, and the other as slave. There are two ways to do this: set the Master jumper to Off, or connect the hard drive using the Slave connector portion of a Cable Select cable. Older drives use jumpers to set a hard drive as master or slave. The jumper will be On if the hard drive is the master, or Off if the hard drive is a slave.

Cable Select is a newer way to designate a hard drive as master or slave. A special IDE cable is used to connect the hard drives to the motherboard. There are two connectors on the cable: one for Master, and another for Slave. The Slave connection will not transmit data through pin 28, so only the master hard drive receives the signals sent across pin 28.

Dip switches are NOT used to designate hard drives as master or slave.

The BIOS Setup will determine which one is the master by how the jumpers or Cable Select is set. You cannot designate a hard drive as master or slave through the BIOS Setup.
Objective: Personal Computer Components

Networks and Laptops: Automatic Configuration vs profiles for telecommuters

A user telecommutes three days a week using a laptop computer. The user's Internet Service Provider at home requires a static IP address, subnet mask, and DNS server setting. The company network assigns addresses using DHCP.
You need to configure the user's computer so that the user can access the Internet when at home and the corporate network when at the office.
What should you do?

1. Create separate hardware profiles for the user at home and at work.
2. Create separate user profiles for the user at home and at work.
3. Enable automatic configuration. Add the ISP-defined settings to the Alternate Configuration tab.
4. >>Configure both IP configurations manually in Advanced TCP/IP settings.

Explanation : You should enable automatic configuration and add the ISP-defined settings to the Alternate Configuration tab. With this configuration, the computer first tries to find a DHCP server. If one cannot be found, the IP configuration on the Alternate Configuration tab is used.

You should not create separate user profiles for the user at home and at work. IP configuration settings are not defined in the user profile.

You should not create separate hardware profiles for the user at home and at work. The hardware profile limits the drivers that are loaded. It cannot be used to establish different IP configuration settings.

You should not configure both IP configurations manually in Advanced TCP/IP settings. Doing so would create a multi-homed network adapter, but the settings would not work correctly given the situation. Also, you want to be able to dynamically assign addresses when the user is connected to the company network, not manually assign the address.
Objective: Networks

Operating Systems: Windows Services

You are configuring a computer for an application developer. When the user is developing Web applications, he needs Internet Information Services (IIS). Otherwise, you want to ensure that IIS does not run. The user's computer is running Windows XP Professional and has a single hard disk, formatted as a single volume.
What should you do?

1. Create two user accounts. Log on as one of the users and install IIS.
2. >>Install Windows XP Professional in two different directories. Boot to one installation and install IIS.
3. Create two user accounts. Log on as one of the users and add a shortcut to IIS in Startup folder of the user's profile.
4. Create two hardware profiles. Enable the World Wide Web Publishing service in only one hardware profile.

Explanation : You should create two hardware profiles and enable the World Wide Web Publishing service in only one hardware profile. IIS installs the World Wide Web Publishing service, which is a Windows service. You can enable and disable a Windows service for specific hardware profiles through the service's Properties page in the Services utility. The user will need to restart the computer and select the hardware profile that has the World Wide Web Publishing service enabled when necessary.

You should not install Windows XP Professional in two different directories and boot to one installation to install IIS. You should only install one instance of Windows XP on a specific volume. Even if you had two volumes, creating two different installations is unnecessary and would result in having to install redundant copies of all applications.

You should not create two user accounts, log on as one, and install IIS. The World Wide Web Publishing service is a Windows service, so its status is not affected by the user who is logged on. If it is configured to start automatically, it will start when the operating system boots.

You should not create two user accounts and add a shortcut to IIS in the Startup folder in one of the user profiles. IIS is a Windows Service, not an application.
Objective: Operating Systems

Laptops and Shared Video Memory

You add 512 MB of RAM to a laptop computer that already has 512 MB of RAM. The laptop computer is configured for 64 MB of shared video memory. The user runs graphic intensive applications.
How much memory is available for the operating system and applications?

1. 1088 MB
2. >>960 MB
3. 896 MB
4. 1024 MB

Explanation : When a laptop is configured to use shared video memory, a portion of main memory is used by the video adapter. If graphic-intensive applications are used, you should subtract the amount of shared video memory from the amount of main memory to determine how much Random Access Memory (RAM) is available for applications and the operating system to use. In this case, that is 1024-64 = 960 MB.

You will not have 1024 MB of RAM available because 64 MB of memory will be used by the video adapter. You would have 1024 MB of RAM available if the laptop had dedicated video memory.

You do not need to subtract the video memory from each memory chip. You add the total amount of RAM and subtract the amount of shared video memory to obtain the total available memory.

You do not add the amount of shared memory to the total available.
Objective: Laptops and Portable Devices

Security: Folder Permissions

You need to configure file system permissions on a folder located on a computer running Windows XP Professional. When you display the Properties dialog box for the folder, the Security tab is not available.

What should you do? (Select TWO.)
1. >>Verify that your user account has Full Control of the folder.
2. Verify that the folder is shared.
3. Verify that the computer is a member of the domain.
4. >>Verify that the partition is formatted as NTFS.
5. Verify that Simple File Sharing is not enabled.

Explanation : You should verify that the partition is formatted as NTFS. You can only set file system permissions on a folder that is located on an NTFS partition.

You should also verify that Simple File Sharing is not enabled. When Windows XP is first installed, Simple File Sharing is enabled by default. When Simple File Sharing is enabled, the Security tab is not visible.

You do not need to verify that the computer is a member of the domain. You can set file system permissions on standalone computers (workgroup members).

You should not verify that the folder is shared. File system permissions control local access to the folder and do not require the folder to be shared.

You should not verify that your user account has Full Control to the folder. Although you will need Full Control to the folder, not having the Full Control permission will not prevent the Security tab from being displayed.
Objective: Security

Printers and Scanners: TWAIN

What is TWAIN?
1. A specification for allowing a computer to support two or more active input devices.
2. A specification that allows a computer to support two display devices.
3. A specification for allowing bidirectional communication between a computer and a printer.
4. >>A specification for an interface supported by scanners to allow them to be controlled by third-party applications, such as Adobe Photoshop.

Explanation : TWAIN is a specification for an interface that allows a scanner to be controlled by any TWAIN-compliant application, instead of just by the software included with the scanner.

TWAIN is not a standard for allowing a computer to support two or more active input devices. Windows XP can support multiple active input devices by default.

TWAIN is not a standard for bidirectional communication between a computer and a printer. One standard that defines bidirectional communication between a computer and a printer is IEEE 1284 ECP/EPP.

TWAIN is not a specification that allows a computer to support two display devices. When the computer is a laptop computer, multiple display devices are supported by DualView. When the computer is a desktop computer, additional support is built into Windows XP that allows you to change the primary monitor.
Objective: Printers and Scanners

Operating Systems: Searching for temp files

You want to search for all temporary files that were left behind by Microsoft Word.
What filename should you specify in the Search dialog?
1. ~* ----correct----
2. >>*.doc
3. ~.*
4. ~.doc

Explanation : You should use ~* as the filename to locate any temporary files left behind by Microsoft Word or other applications that use a ~ as the first character of a temporary file. The * is a wildcard character that means zero or more characters. So ~* would locate all files that begin with ~.

You should not search on ~.*. Doing so would return only the files named ~ with any file extension. For example, it would find ~.doc and ~.exe, but not ~myfile.doc.

You should not search on *.doc. Doing so would return all files ending in .doc, the extension commonly associated with Microsoft Word documents. Therefore, it would return all Microsoft Word documents, not just the temporary files.

You should not search on ~.doc. Doing so would return only a file specifically named ~.doc if there was one within the search path.
Objective: Operating Systems

Laptops and Trackpads

You have just completed installing more memory in a laptop computer. You boot the computer and log on. When you try to use the trackpad to open the Start menu, the mouse pointer does not move.
What should you do?
1. Remove your ESD wrist strap.
2. >>Reboot the computer and enter CMOS to change the input device.
3. Verify that a mouse is not connected to the PS/2 port.
4. Verify that the Fn key is not pressed.

Explanation : You should remove your ESD wrist strap. The trackpad works using static electricity. Therefore, if you are wearing an ESD wrist strap, it will not be able to sense electricity in your fingertips. A similar problem can occur if a user has long fingernails.

The Fn key does not affect the trackpad. It is used to toggle the functionality of certain keys.

You cannot change the input device in CMOS. The computer will use the trackpad as its input device automatically.

When you attach a mouse to a PS/2 or USB slot, the trackpad will still function. Therefore, verifying that a mouse is not connected to the PS/2 port will not solve the problem.
Objective: Laptops and Portable Devices

Security: Wireless dynamic encryption public key authentication

Which wireless security standard uses dynamic encryption keys and supports public key authentication?
1. WEP
2. MAC filtering
3. >>WPA
4. 802.1x

Explanation : The most secure wireless security standard is 802.1x, which offers a dynamic encryption key and supports a number of authentication methods, through Extensible Authentication Protocol (EAP), including certificates, public keys, and Kerberos.

Wired Equivalent Privacy (WEP) requires that you manually change encryption keys. It also does not support public key authentication.

Media Access Control (MAC) filters can be used to allow only certain computers to access a wireless access point secured using WEP. Access is granted or denied based on the MAC address.

Wi-Fi Protected Access (WPA) changes the key every 10,000 packets using a mechanism called Temporal Key Integrity Protocol (TKIP). It does not, however, support public key authentication.
Objective: Security

Networks: Proxy Servers

Julie has brought her laptop to the office and wants to check her e-mail. Her system is running Windows 2000 Professional with Internet Explorer 6.0. She has a properly configured network card and, in fact, uses her network card to connect to the Internet through her DSL modem at home.
Although she plugged her laptop network cable into the office network, she is unable to connect to the Internet. She was told that she has to configure her browser to use a proxy server.
Which procedure will properly configure the proxy server?

1. Open the Control Panel | Phone and Modem Options. Select a modem to configure.
2. Right click My Computer and select Properties. Use the Device Manager.
3. >>Open the Control Panel | Internet Options applet. Select Connections, then LAN settings.
4. Open the Control Panel | Network and DialUp Connections.

Explanation : In the Internet Options applet in Control Panel, you can configure the computer to use a proxy server by choosing the Connections tab and clicking the LAN settings button. Enter the address for the proxy server and script file if necessary.

The Device Manager can be used to adjust hardware resources but not proxy servers.

The Phone and Modem Options applet allows you to configure dialing properties and modem parameters. You cannot configure a proxy server from there.

The Network and DialUp Connections applet is used to configure a DialUp Networking connection to another system such as an Internet service provider (ISP). You cannot configure a proxy server from there.
Objective: Networks

Printers and Scanners: Damp Paper symptoms

What symptoms could result from using damp paper in a laser printer? (Select FOUR.)
1. >>Poor quality output
2. Fuzzy print
3. >>Unfused toner on the printed page
4. White streaks through the text
5. >>Multiple page feed >
6. >>Paper jams
7. Gray print

Explanation : Damp paper can cause paper jams, fuzzy print, poor output quality, and multiple page feed. Paper jams can occur due to damp paper because the paper needs to slide smoothly through the paper handling elements. Damp pages may also stick together, allowing more than one sheet to go through the printer (multiple page feed). This will cause blank pages to appear between printed pages. Fuzzy and poor quality output will occur because the water in the paper will interfere with the transfer of the toner.

A dirty developer unit or a partially empty toner cartridge can cause white lines.

Loose toner on the printed page is the result of the fuser not heating to the proper temperature.

When the photoreceptor drum wears, it holds less of a charge and attracts less toner, which in turn causes lighter (gray) print.
Objective: Printers and Scanners

Operating Systems: CMDS for File Access

You want to create a text file. You create the file with a text editor and save it as INFO.TXT.
You want the file to be easily accessible so that anyone can read it, but you want to protect the file so that it cannot be easily edited or deleted.
Which file or utility can you use to do this?

1. REGEDIT.EXE
2. CONFIG.SYS
3. MSDOS.SYS
4. >>ATTRIB.EXE

Explanation : ATTRIB.EXE is a command prompt program that is used to display, add, or change file attributes. You can type ATTRIB +R INFO.TXT to add the Read-Only attribute to the file. In order to edit or delete the file, the Read-Only attribute must be removed using the command ATTRIB -R INFO.TXT. This will not absolutely prevent someone from editing or deleting the file, but extra steps are required to do it.
Other attributes include the following:
* A (Archive): used by backup programs to indicate which files have been changed since the last backup.
* H (Hidden): used to keep a file name from being displayed with the DIR command.
* S (System): designates a file critical to the system startup and operation.

CONFIG.SYS is the DOS system file that contains hardware/driver information and environment settings.

MSDOS.SYS is one of the hidden, necessary files that must be on a boot disk for DOS to initialize.

REGEDIT.EXE is the Windows Registry Information Editor. It makes it easier to edit the keys and entries in the Windows registry.

Laptops: Batteries and charging II

George reports that his laptop will not power up. He says that he received a warning that the battery was low before the computer powered off. The laptop was plugged in to a wall socket. You plug the laptop into a different wall socket and no power light comes on.
What should you try next?

1. Plug in the computer using a working AC adapter with higher voltage.
2. >>Plug in the computer using a working AC adapter with the same amperage and voltage.
3. Remove the battery and plug in the computer using the same AC adapter.
4. Plug in the computer using a working AC adapter with higher amperage.

Explanation : The problem is most likely caused by a faulty AC adapter because the battery did not charge even though the adapter was plugged into the electrical socket and the laptop did not power up when you tried a different electrical socket. If the AC adapter was working, when you plugged it into a different socket, the light would be a solid alternate color to indicate that the battery was being charged. A laptop's AC adapter has a specific amperage and voltage that must be matched. If the amperage and voltage do not match, you could damage the circuit board.

You should not remove the battery and plug in the computer using the same AC adapter. The problem is most likely the AC adapter. Also, some laptops will not power up when the battery is removed because the battery is necessary to complete the circuit.

You should not plug in the laptop using an AC adapter with higher voltage. The AC adapter must have the same voltage as the one that shipped with the laptop.

You should not plug in the laptop using an AC adapter with higher amperage. The AC adapter must have the same amperage as the one that shipped with the laptop.
Objective: Laptops and Portable Devices

Components: BIOS Checksum Error after upgrade

After upgrading your system BIOS with an update from the manufacturer, you receive a CMOS Checksum error after rebooting.
What should you do to clear the error?

1. >>Reboot the PC, enter CMOS setup, and check and save CMOS settings.
2. Press the ENTER key and turn off the computer before all data is lost.
3. Replace the BIOS chip with a new one from the manufacturer.
4. Reboot the PC and try to flash the BIOS again.

Explanation : After upgrading the BIOS on a motherboard, the new BIOS will likely take up more bytes of ROM than the replaced BIOS. The difference in the BIOS image file byte count is detected by the system as a checksum error. CMOS checksum errors require that you enter Setup, check and save your settings, and exit Setup a second time.

You should not reboot and flash the BIOS again because reflashing the BIOS would most likely result in the same error.

You should not replace the BIOS chip with a new one. A checksum error does not indicate a failure of the BIOS hardware.

You should not press the ENTER key and turn off the computer to avoid losing data. A checksum error will not cause any loss of data.
Objective: Personal Computer Components

Safety & Environment: ESD protection

Which components should be kept in an antistatic bag when they are not inside the computer? (Select TWO.)
1. Power supply
2. >>RAM
3. Backup tapes
4. Fiber optic cables
5. >>Video adapter card
Explanation : You should store any component that includes chips or circuitry in an antistatic bag to protect it from static electricity when the component is not inside the computer. This includes RAM, expansion cards like video adapter cards, processors, motherboards, and hard drives.

There is no need to store a power supply in an antistatic bag. A power supply does not include components that are sensitive to static electricity.

There is no need to store fiber optic cables in an antistatic bag. A fiber optic cable works on light impulses, so it is not sensitive to static electricity.

There is no need to store backup tapes in an antistatic bag. Backup tapes are magnetic media and are not susceptible to static electricity.
Objective: Safety and Environmental Issues

Networks: FTP servers and commands

You need to start an FTP session with an FTP server beginning at the command line.
You enter the FTP command at the command prompt and see the following prompt:
FTP>
Which command can you use to establish a connection to a server at IP address 135.61.85.1?
1. GET 135.61.85.1
2. >>OPEN 135.61.85.1
3. FTP 135.61.85.1
4. LOGIN: 135.61.85.1

Explanation : FTP can be initiated from a DOS, Windows 9x, or Windows NT/2000/XP command prompt provided that a connection to a network or the Internet is established first. To begin an FTP session, you first type FTP from the command line to get an FTP> prompt. To establish a connection with an FTP server at 135.61.85.1, from the FTP> prompt, type the following:
OPEN 135.61.85.1

The LOGIN command is the response the server will send when you try to connect to it. At the LOGIN: prompt, you would enter your user name or ID.

The GET command is used after you have logged on and want to copy a file from the remote computer to your computer.

After you are at the FTP> prompt, you would not use the FTP command again.
Objective: Networks

Operating Systems: Recovering from bad app installations

You are preparing to install an application on a user's computer, which is running Windows XP Professional.
How can you ensure that you can restore the system to its current state if the application does not work correctly after it is installed?

1. Use Last Known Good Configuration.
2. Create an Automated System Recovery (ASR) backup.
3. Save a copy of the Registry to a separate location.
4. >>Create a restore point.

Explanation : You should use System Restore to create a restore point. A restore point is a non-destructive way to revert a computer to a particular configuration state. Although some installation programs create a restore point, not all of them do. Therefore, to be safe, you should manually create a restore point before installing the application.

Creating an ASR backup will not meet the requirements. An ASR recovery is a destructive recovery that will reformat the hard disk and require you to reinstall all data files.

Saving a copy of the Registry to a separate location is not the best way to manage recovery. The Registry cannot be replaced manually while you are running Windows XP. Also, it is possible that all configuration changes made by the application will not be saved to the Registry. For example, a .NET Framework application might install a component in the Global Assembly Cache.

Last Known Good Configuration cannot be used to meet the requirements because it is likely you would not know the application is not working until the Last Known Good Configuration has been replaced by a new one. Last Known Good Configuration is updated each time you log on successfully

Objective: Operating Systems

Components: SCSI drives and controllers

Roberta's supervisor has asked her to daisy-chain five SCSI devices to her computer.
Which method can she use to accomplish this?

1. Attach each of the devices together by SCSI cable, in any sequence, with termination on the SCSI controller.
2. Attach each of the devices together by SCSI cable, in any sequence, with one end of the SCSI bus terminated.
3. Attach each of the devices together by SCSI cable in a required sequence.
4. >>Attach each of the devices together by SCSI cable, in any sequence, with both ends of the SCSI bus terminated.

Explanation : Roberta can attach each of the SCSI devices together by cable in any sequence, as long as she remembers to put a terminator on both ends of the bus. The other choices will not work because of the lack of proper bus termination.
SCSI buses (a chain of SCSI devices) must always be terminated on both ends, just like many kinds of network cable. Devices can be terminated in one of three ways:
* With a terminator block on the free end of the cable that was not designed for other connectors to plug into.
* With a terminator block plugged into the first unit on the chain. This block has two connections: one for the cable and one to plug into the device.
* With a self-terminating connector built into a device. Many devices can be set to terminate without the use of an external block.
Objective: Personal Computer Components

Security: XP service pack 2 features

What security enhancements are provided by installing Service Pack 2 on a computer running Windows XP Professional? (Select TWO.)
1. Anti-Spyware protection is installed.
2. Windows Security Center is installed.
3. >>Windows Firewall is enabled by default.
4. >>EFS is enabled by default.
5. Antivirus protection is installed.

Explanation : When you install Service Pack 2 on a computer running Windows XP, the Windows Security Center is installed. The Windows Security Center allows you to enable or disable Windows Firewall, Automatic Updates, and if an antivirus program is installed, virus protection.
When you install Service Pack 2, Windows Firewall is enabled by default. Windows Firewall is a packet filtering firewall that allows you to block certain types of network communication, such as unsolicited traffic on port 80.

Service Pack 2 does not install antivirus protection. However, a number of antivirus packages are available. You should choose one and install it on all computers.

Service Pack 2 does not install anti-spyware protection by default. However, a number of anti-spyware programs are available. You should choose one and install it on all computers that access the Internet.

Service Pack 2 does not enable Encrypting File System (EFS) by default. EFS is used to encrypt files stored on an NTFS partition. You can selectively enable EFS on specific folders and files.
Objective: Security

Networks: Valid IP addresses

Which IP address is valid?
1. 255.255.255.0
2. 192.168.0.256
3. >>192.168.0.254
4. 255.255.0.0

Explanation : An IP address consists of four eight-digit binary numbers called octets, separated by periods, for a total of 32 bits. The IP address identifies the network and the host in a network uniquely on the Internet. Each decimal number in an IP address is typically a number in the range 1 through 254. The subnet mask determines which portion is the network number and which portion is the host. If a subnet mask contains 255 in a position, the corresponding part of the address is the network number.

Any IP address beginning with 127 refers to the local host address and is used for internal loopback testing.

Any octet with a number greater than 255 is invalid because 8 bits can only represent a maximum of 255.

255.255.255.0 and 255.255.0.0 are subnet masks, not IP addresses.

Printers and Scanners: Limiting Access on Network printers

You are configuring a laser jet printer for the Marketing department. The printer is attached directly to the network. You need to limit access to the printer to only users in the Marketing department. Users should be able to delete their own documents from the print queue. The Marketing manager should be able to delete any document from the print queue.
What should you do?

1. On each user's computer, create a printer object. Grant the user Manage Documents permission to the printer object. On the Marketing manager's computer, create a printer object and grant the Manage Printers permission.
2. On each user's computer, create a printer object. Grant the user Print permission to the printer object. On the Marketing manager's computer, create a printer object and grant the Manage Documents permission.
3. >>Create a shared printer object on a computer running Windows XP, Windows 2000, or Windows Server 2003. Grant the Marketing group the Manage Documents permission. Grant the Marketing manager the Manage Printers permission.
4. Create a shared printer object on a computer running Windows XP, Windows 2000, or Windows Server 2003. Grant the Marketing group the Print permission. Grant the Marketing manager the Manage Documents permission.

Explanation : You should create a shared printer object on a computer running Windows XP, Windows 2000, or Windows Server 2003. Then you should grant the Marketing group the Print permission and the Marketing manager the Manage Documents permission. You can create a printer object that is mapped to a network-attached printer so that you can manage permissions and the print queue from a single computer. The computer with the shared printer object is a print server for the printer. The Print permission is required to allow users to print to a printer. Users with the Print permission can also manage their own documents in the queue. Managing other users' documents requires the Manage Documents permission.

You should not create a printer object on each user's computer. Doing so will cause multiple queues to be associated with the printer. The queue and permissions will not be managed separately.

You should not grant the Marketing group the Manage Documents permission. Doing so will enable them to manage any document in the queue.

You should not grant the Marketing manager the Manage Printers permission. Doing so will allow the manager to install printer drivers and modify printer configuration settings.
Objective: Printers and Scanners

Operating Systems: Modes for dealing with bad displays

Your neighbor's children were playing games on your Windows XP computer and in the process managed to modify the display settings to use white letters on a white background. Now all you can see on the Windows desktop are icons without titles, and all dialog boxes have no visible text.
What would be the best startup option to correct this problem?
1. Recovery Console
2. >>Enable VGA Mode
3. Debugging Mode
4. Enable Boot Logging

Explanation : Enable VGA Mode is used when the video setting is such that you cannot see the screen well enough to fix a bad setting. This can happen if a user creates a desktop with black fonts on a black background, or something similar to that. Booting in this mode gives you very plain VGA video display but allows you to change the settings in the Display properties.

The Enable Boot Logging option allows the system to boot normally while recording all files loaded during the boot process. The log is recorded in a file named NTBTLOG.TXT. The log will identify which drivers loaded and which failed. This is especially helpful if you have a copy of the NTBTLOG.TXT file that was created before there was a problem. You then could compare them to see what has changed.

Debugging Mode gives you the opportunity to move system boot logs from the failing computer to another computer for evaluation. To use this mode, you first must connect the failing computer to another computer using a serial cable. You then can review the boot logs on a functioning computer.

The Recovery Console does not start the graphical interface, but it does allow you to access any FAT16, FAT32, and NTFS file systems. The purpose of the Recovery Console is to allow you to repair a damaged registry, system files, or file system on the hard drive.
Objective: Operating Systems

Components: HDD UDMA settings and cables

After installing a new ATA-100, 80GB hard drive, you boot up the system and watch as the Power On Self Test (POST) displays information about the system on your monitor.
You notice the 80GB hard drive is correctly identified as 80GB, but it is listed as using UDMA/33.
How should you interpret this?
1. ATA-100 is actually UDMA/33 and this is normal.
2. >>Your hard drive ribbon cable is not an 80-conductor cable.
3. Your hard drive cable is not 40-pin.
4. Your hard drive ribbon cable is not installed correctly.

Explanation : The ATAPI-5 (AT Attachment with Packet Interface-5) standard approved in 2000 built on the ATAPI-4 standard and requires an 80-conductor cable for UDMA modes faster than UDMA/33 to be enabled. The 40- or 80-conductor cables are automatically detected.

ATA-100 should be displayed as UDMA/100.

If the ribbon cable was not 40-pin or not installed correctly, the hard drive would not have been detected at all.
Objective: Personal Computer Components

Safety & Environment: Monitors

What is the proper way to clean a CRT monitor?
1. Wipe it with window cleaner and an antistatic cloth.
2. Wipe it with an antistatic cloth.
3. Wipe it with water and an antistatic cloth.
4. >>Wipe it with soap and water.

Explanation : The proper way to clean a Cathode Ray Tube (CRT) monitor is to wipe it with an antistatic monitor cloth. A CRT monitor has a strong electrical charge and can only be discharged following very specific procedures. Therefore, you should use an antistatic cloth and not use any liquid on it because the liquid could seep inside the case and shock you or cause problems with the electrical components.

You should not use window cleaner and an antistatic cloth because window cleaner could get inside the monitor.

You should not use soap and water to clean the monitor. Water could get inside the monitor and cause electrocution or electrical problems.

You should not use water and an antistatic cloth. Water could get inside the monitor and cause electrocution or electrical problems.
Objective: Safety and Environmental Issues

Security: WIndows Security Center

Which of the following can you do through Windows Security Center in Windows XP?
1. Enable Windows Firewall.
2. Encrypt a data file.
3. >>Create a user account.
4. Change a user's password.

Explanation : Windows Security Center is installed with Windows XP Service Pack 2. It allows you to enable Windows Firewall, Automatic Updates, and the antivirus software you have installed. It also allows you to manage settings for these components.
Windows Security Center does not allow you to change a user's password. For that, you need to use the User Accounts utility or Local Users and Computers in Computer Management.

Windows Security Center does not allow you to encrypt a file. For that, you need to use Windows Explorer or the cipher command.
Windows Security Center does not allow you to create user accounts. For that, you need to use the User Accounts utility or Local Users and Computers in Computer Management.
Objective: Security

Networks: Pinging and Loopback

A user cannot access the network. You attempt to ping the loopback address and receive no response.
What are two possible reasons? (Select TWO.)

1. The network adapter is configured with an invalid IP address for the network.
2. The network adapter is configured with an invalid subnet mask for the network.
3. TCP/IP needs to be reinstalled.
4. >>The DHCP server is not functioning.
5. >>The network adapter is not functioning.

Explanation : Pinging the loopback address (127.0.0.1) tests whether the TCP/IP protocol stack is functioning correctly. If you cannot ping the loopback address, it means that TCP/IP drivers are not installed or corrupt or that the network adapter is not functioning.

The DHCP server assigns addresses on the network. It does not impact the ability to ping the loopback address on a client computer.

The loopback address is 127.0.0.1. A computer does not require a valid IP address on the network for the loopback address to respond.

The loopback address is not dependent on a correct subnet mask. The loopback address pings the local computer to verify the TCP/IP stack.
Objective: Networks

Operating Systems: Recovery Console

What storage locations can you access from Recovery Console in Windows XP? (Select TWO.)
1. Any internal hard drive
2. A network file share
3. A CD-ROM drive
4. Any location on drive C
5. >>The %systemroot% folder

Explanation : Recovery Console provides you with limited access to command-line utilities that can allow you to recover from system failures that prevent you from starting Windows, such as boot sector corruption, a service that is preventing startup, corrupt or missing operating system files, and hard disk problems. However, you are limited to accessing files at the root of the system partition, the %systemroot% folder, the cmdcons folder, and removable media drives.

You cannot access any location on drive C from Recovery Console except the locations noted above.

You cannot access any internal hard drive except the locations noted above.

You cannot access a network file share.
Objective: Operating Systems

Components: CRT Monitor

A user reports that her CRT display experiences sporadic problems, especially on hot days. It also has a high-pitched whine. What should you do? (Select TWO.)

1. Instruct the user to clean the monitor by spraying window cleaner on it and using a soft cloth.
2. Instruct the user to use a computer vacuum to clean the dust from the monitor's vents.
3. Open the monitor's case and verify that the cooling fan is functioning.
4. >>Ensure that there is sufficient airflow around the monitor.
5. >>Verify that the monitor's power cable is secure.

Explanation : A monitor generates a lot of heat. Therefore, you should ensure that there is enough ventilation around the monitor.

The high-pitched whine generally indicates that the monitor is dirty on its interior. You can clean the inside of a monitor by using a computer vacuum along its vents.
You should not clean a monitor by spraying any liquid on it. Doing so could cause the liquid to get inside the monitor and damage it.

You should not open a Cathode Ray Tube (CRT) monitor. Doing so can cause electrical shock or even death unless you are specially trained to work on CRT monitors.

Verifying that the monitor's power cable is secure will not resolve the problem. A loose power cable would prevent the monitor from functioning. It would not cause a high-pitched whine. The sporadic problems are caused by heat, so a loose cable is unlikely to be the cause of the problem.

Objective: Personal Computer Components

Operating Systems: ASR, System Restore, NTBACKUP and Backup/Restore

You are preparing to install a new application on a customer's Windows XP computer. If there is a problem with the installation, you need to be able to quickly revert the computer to the way it was before the installation.
What should you do?

1. Use the Backup and Restore utility to back up system state data before running the application setup program.
2. >>Use the System Restore utility to set a restore point before running the application setup program.
3. Use the Automated System Recovery (ASR) Wizard to create an ASR backup before running the application setup program.
4. Use the Ntbackup command to set a restore point before running the application setup program.

Explanation : You should use the System Restore utility to set a restore point before running the application setup program. The restore point sets a point to which you can recover, restoring the computer to that point. Changes made to system configuration files and the system registry since that point are reversed and returned to their original settings. It also reverses changes made to application configuration files. This is done without loss of personal data files. You can either use the System Restore utility to restore to that point or use Advanced startup options to go directly to System Restore when booting into Safe mode.

You should not use the Ntbackup command to set a restore point before running the application setup program. The Ntbackup command lets you back up and restore the computer, but it does NOT let you set a restore point.

You should not use the Backup and Restore utility to back up system state data before running the application setup program. A system state backup does back up critical system files, such as the registry and boot files, but it does not back up everything that you need to revert the system to a state identical to that before the installation. For example, system state backup does not back up any application file configuration settings.

You should not use the Automated System Recovery (ASR) Wizard to create an ASR backup before running the application setup program. ASR gives you a way to get a system back up and running quickly after a catastrophic failure, but it does not let you recover to a known point.
Objective: Operating Systems

Components: Alarms and Troubleshooting

After upgrading the motherboard, CPU, and RAM in a PC with a 2.4 GHz Pentium 4 CPU, a compatible motherboard, and 256MB of DDR-SDRAM, you start the PC for the first time to load drivers.
After approximately one minute, the system locks up and begins to sound an audible alarm.
What might cause this problem?

1. The DDR-SDRAM chips are incompatible with Pentium 4 CPUs.
2. The DDR-SDRAM chips were installed backwards.
3. >>The CPU cooling fan is not working.
4. The alarm is normal and means it is time to install an operating system.

Explanation : The CPU cooling fan not working is the only possible choice. Since the motherboard, CPU, and RAM were all upgraded, it is logical that one of these components is the cause of the problem. Since the system actually started and ran for one minute, the most likely cause is that the CPU began to overheat. A defective or improperly installed cooling fan would cause the CPU to overheat.

DDR-SDRAM chips are physically keyed to prevent them from being installed backwards.

DDR-SDRAM will work with Pentium 4s on compatible motherboards.

There is no alarm that sounds when it is time to install an operating system.
Objective: Personal Computer Components

Operating Systems: Installs and Upgrades

A computer is configured with two disk partitions identified as drive C and D. Windows 2000 Professional is installed on drive C. You need to install Windows XP Professional as the only operating system on the computer. When you are finished, the computer must have the same data files as before installation and must run the same applications.
What should you do?

1. Install Windows XP Professional on drive C in the same directory as Windows 2000 Professional.
2. Install Windows XP Professional on drive C, but in a different directory than the Windows 2000 Professional directory.
3. Install Windows XP Professional on drive D and uninstall Windows 2000 Professional.
4. >>Install Windows XP Professional on drive D and then run the Files and Settings Transfer Wizard.

Explanation : You should install Windows XP Professional on drive C in the same directory as Windows 2000 Professional. This will cause the installation to run as an upgrade installation. Applications will be available automatically after running the upgrade. No changes were made to the data files, so they are still available. Because you upgraded the operating system, Windows 2000 Professional is no longer available, so all requirements are met.

You should not install Windows XP Professional on drive C, but in a different directory than the Windows 2000 Professional directory. This would install Windows XP Professional as a separate operating system, leaving Windows 2000 Professional in place. This configuration, two operating systems installed on the same disk partition, is strongly discouraged by Microsoft. Also, you have done nothing to make the applications available when running Windows XP. They would have to be installed separately.

You should not install Windows XP Professional on drive D and uninstall Windows 2000 Professional. This does nothing to make the applications available when running Windows XP.

You should not install Windows XP Professional on drive D and then run the Files and Settings Transfer Wizard. The Files and Settings Transfer Wizard is designed to transfer data and application settings between computers. Also, you would still have Windows 2000 Professional available on the computer, and you would still need to install the applications under Windows XP Professional to make them available.