Saturday, November 24, 2007

Components: Floppy Drives

After replacing the floppy drive, when you restart the computer, the drive light goes on and stays on.
What is the most likely cause of the problem?
1. The floppy drive power cable is not connected.
2. The floppy drive is not set up correctly in the BIOS setup program.
3. >>The floppy drive data cable is not connected to the motherboard correctly.
4. The floppy drive data cable is faulty.

Explanation : If the drive light on a floppy disk drive goes on and stays on, it is a sign that the data cable has been connected to the motherboard incorrectly. You must make sure that pin 1 on the cable is connected to pin 1 on the floppy drive controller. Pin 1 is usually marked with a red or other color stripe on the data cable.

If the data cable or the power cable is not connected at all, the system will display a floppy drive error during Power-On Self-Test (POST).

If the drive is not set up correctly in the BIOS setup program, the system will display an error during POST or the drive will simply not work.
Objective: Personal Computer Components

Operating Systems: Windows 2000

Which of the following would you open from the Windows 2000 desktop to view a list of disk drives configured on the computer?
1. Recycle Bin
2. My Network Places
3. Control Panel
4. >>My Computer

Explanation : You should open My Computer from the Windows 2000 desktop to view a list of available disk drives. My Computer contains a list of these disk drives. This includes configured hard disk partitions and removable media drives, whether or not they currently contain any media.

You should not open My Network Places from the Windows 2000 desktop to view a list of available disks drives. My Network Places displays other computers and resources available from the network.

You should not open Recycle Bin from the Windows 2000 desktop to view a list of available disks drives. Opening Recycle Bin opens a folder in which deleted files and folders are stored temporarily, until they are permanently deleted.

You cannot open the Control Panel from the Windows 2000 desktop by default. By default, you must open the Control Panel from the Start menu. Control Panel contains links to available system utilities and does not list available hard disk drives.
Objective: Operating Systems

Networks: communicating with other PCs on the local network

You manually configure IP addresses on network computers.
Which parameter, if set incorrectly, will prevent a computer from communicating with any other computer on the local network?
1. >>Subnet mask
2. Default gateway
3. MAC address
4. Primary DNS server address

Explanation : The subnet mask, if set incorrectly, will prevent a computer from communicating with other computers on the local network. An IP address is made up of two parts, the network address that identifies the network segment on which the computer is deployed and the host address that uniquely identifies the computer on the network. The number of bits from the address assigned to each is not fixed. Instead, it is determined from the subnet mask, so both are required when specifying a static address. If the subnet mask is wrong, then the network address will be wrong and the computer will not recognize other computers even though they are physically located on the same network segment.

A primary DNS server address, if set incorrectly, will not prevent a computer from communicating with other computers on the same network. Not all networks require DNS name resolution services, so a primary DNS server address is not necessarily a configuration requirement. The computer can resolve names and address of computers on the local network through broadcasts, if necessary, or through use of a text file called the HOSTS file.

The default gateway, if set incorrectly, will not prevent a computer from communicating with other computers on the same network. The default gateway identifies the path and network packets should take when being routed to another network is a different route is not explicitly specified. The term gateway is used to refer to routers in a TCP/IP network environment. A default gateway is needed only if the computer is deployed in a routed network environment made up of connected subnetworks. Otherwise, this value can be left blank. Because routing is not required to communicate with other computers on the same local network, an incorrect value will not prevent the computer from communicating with computers on the local network.

You do not specify the Media Access Control (MAC) address when configuring an IP address. The MAC address is a unique address value that is hard-coded on the computer's network interface card, so there is no need to specify the MAC address when configuring IP addressing.
Objective: Networks

Operating Systems: Start Menu file(s)

Which file displays the startup menu for a computer running Windows XP or Windows 2000?
1. Ntdetect.com
2. NTLDR
3. >>Ntoskrnl.exe
4. Bootsect.dos

Explanation : NTLDR is the file that displays the startup menu for a computer running Windows XP or Windows 2000. NTLDR reads the startup menu from the Boot.ini file and presents the menu. After the user makes a selection from the menu, NTLDR in turn loads Ntsokrnl.exe, Hal.dll, and required boot-start device drivers.

Bootsect.dos is not the file that displays the startup menu for a computer running Windows XP or Windows 2000. Bootsect.dos contains information about the boot sector that was on the hard disk before you installed Windows XP or Windows 2000 and is used to support multi-boot configurations.

Ntdetect.com is not the file that displays the startup menu for a computer running Windows XP or Windows 2000, though it is a critical part of the startup process. Ntdetect.com queries the computer for basic device and configuration information during startup.

Ntoskrnl.exe is not the file that displays the startup menu for a computer running Windows XP or Windows 2000. It instead contains the majority of the Windows operating system instructions. Ntoskrnl.exe is loaded after the user makes a selection from the startup menu.
Objective: Operating Systems

Networks: Communication routes

A computer is unable to communicate with a different computer located on a remote network.
How can you determine at what point the communication is failing?
1. >>Run tracert
2. Run ipconfig.
3. Run netstat.
4. Run nslookup.

Explanation : You should run tracert, followed by the destination computer name or address. The tracert command tests each hop between the source and destination computers. The tracert command can be used to determine the route taken to the destination computer and can be used to determine the point at which communication fails.

You should not run ipconfig to determine at what point the communication is failing. The ipconfig command is used to view IP configuration information and to release or renew IP address leases, that is, an address received from a Dynamic Host Configuration Protocol (DHCP) server.

You should not run netstat to determine at what point the communication is failing. The netstat command lets you view a wide range of networking statistics. For example, the netstat command can be used to identify which ports are open and are monitored ("listened to") by the computer. Ports are used to direct network traffic to the appropriate service or application. The most commonly used default ports are defined as well-known ports. Ports often found open on a Windows computer include port 80, which is the default for Hypertext Transfer Protocol (HTTP) traffic for Web-related traffic, and port 53, which is used for Domain Name Service (DNS) traffic.

You should not run nslook to determine at what point the communication is failing. The nslookup command is used with the Domain Name Service (DNS) and can be used to locate DNS servers and test DNS service operations.
Objective: Networks

Operating Systems: HW Minimums for XP

What are the minimum requirements to install Windows XP Professional on a PC? (Select THREE.)
1. 128MB RAM
2. >>64MB RAM
3. >>Pentium 333 or equivalent
4. >>2.0GB available disk space
5. 650MB available disk space
6. Pentium 233 or equivalent
Explanation : The minimum system requirements to install Windows XP Professional are Pentium 233MHz or higher CPU, 64MB RAM, and 650MB available disk space. You also need a video card capable of VGA resolution or higher, keyboard, mouse, or other pointing device, CD-ROM or DVD-ROM, and a network adapter card if you are installing over the network.
Objective: Operating Systems

Security: File encryption

What Windows command-line utility lets you encrypt individual files?
1. >>Attrib
2. Convert
3. Cipher
4. Xcopy

Explanation : You can use the Cipher command to encrypt and decrypt individual files. You can also use Cipher to encrypt or decrypt all files in a directory.

You cannot use the Convert command to encrypt files. The Convert command is used to convert a FAT or FAT32 partition to NTFS.

You cannot use the Attrib command to encrypt files. The Attrib command lets you view and modify file and directory attributes. The Attrib command lets you set or clear file and directory attributes. The supported attributes are:
+r/-r Set or clear the read-only attribute.
+a/-a Set or clear the archive attribute.
+s/-s Set or clear the system file attribute.
+h/-h Set or clear the hidden file attribute.

The Xcopy command is used to copy files and folders. If you copy a file to a directory flagged for encryption, the file will be encrypted. However, encryption is a function of the directory, not the Xcopy command.
Objective: Security

Networks: DNS info

You are trying to determine the name and IP address of the DNS server on a customer's network.
What command should you use?
1. nslookup
2. netstat
3. >>ipconfig
4. tracert

Explanation : You should run nslookup to determine the name and IP address of the Domain Name Service (DNS) server on the network. The nslookup command lets you view information as well as test and troubleshoot DNS services on the network.

You should not run netstat to determine the name and IP address of the DNS server on the network. The netstat command can be used to view network statistics, but it does not return information about the DNS server.

You should not run tracert to determine the name and IP address of the DNS server on the network. The tracert command is used to test and troubleshoot routing and routing problems. The tracert command returns information about each router and the round-trip time for each router between the source and destination.

You should not run ipconfig to determine the name and IP address of the DNS server on the network. The ipconfig command lets you view and manage IP configuration information. The ipconfig command lets you see the servers configured as DNS servers for a specific host, but it does not return DNS server information for the network.
Objective: Networks

Operating Systems: Updates

A computer running Microsoft Windows XP has been validated as genuine through the Windows Genuine Advantage (WGA) program. You want to ensure that security updates are applied automatically without your intervention.
What is the minimum physical configuration requirement for supporting automatic Windows updates?
1. >>The computer must have as-needed access to the Internet.
2. The computer must have full-time access to the Internet.
3. The computer must be deployed as part of a Windows-based network.
4. The computer must be deployed as part of a Windows Active Directory domain.

Explanation : The computer must have as-needed access to the Internet. The computer downloads updates from a Web site maintained by Microsoft. You can configure the computer running Windows XP to automatically download and apply the updates without any operator interaction.

It is not necessary for the computer to have full-time access to the Internet. The computer must connect to the Internet whenever it downloads updates from the Windows Update site, but a full-time connection is not required. An as-needed connection, such as a dial-up connection, is sufficient.

It is not necessary to deploy the computer as part of any type of network, including a Windows-based network or Windows Active Directory domain. While it is possible to configure updates through a network-based server, it is not a requirement. Windows updates are also supported for stand-alone computers (or networked computers) connecting directly to the Windows Update site to download updates.
Objective: Operating Systems

Components: HDD Maintenance

Which action would you take as preventive maintenance for a hard disk in a computer running Windows XP?

1. Low level format
2. Format partitions
3. >>Defragment
4. Change partition sizes

Explanation : You could defragment a hard disk as part of preventive maintenance. A hard disk becomes fragmented over time with files broken into smaller parts and stored in different areas on the hard disk. Performance is degraded because of the need to retrieve all of the parts and reassemble them as a single file. When you defragment a hard disk, you physically move and recombine the file so that it is stored in a contiguous block of disk space, improving performance. This is not always part of preventive maintenance, but it might be appropriate on a very active computer. Disk Cleanup is also sometimes run as part of preventive maintenance as a way of checking for potential disk problems.

You should not run a low-level format as part of preventive maintenance. Low-level format removes all data and disk partitions. This means that all data on the hard disk is lost.

You should not change partition sizes as part of preventive maintenance. Using Windows XP disk utilities to change partition sizes causes all data on the partitions to be lost.

You should not format disk partitions as part of preventive maintenance. When you format a disk partition, all of the data in that partition is lost.
Objective: Personal Computer Components

Security: Wireless

How can you prevent unauthorized computers from connecting to your wireless network? (Select TWO.)

1. Use 802.11g wireless account points (WAPs).
2. >>Implement WEP encryption.
3. Configure the network for ad-hoc mode.
4. Configure the network for infrastructure mode.
5. Change the default SSID on connection devices.
6. >>Implement WPA.

Explanation : You should implement Wired Equivalent Privacy (WEP) or implement Wi-Fi Protected Access (WPA) mode to prevent unauthorized computers from connecting to your wireless network. The primary purpose of WEP is to encrypt data during transmission based on a common encryption key, but it can also implement computer authentication. The specifics of how features are implemented vary by manufacturer. With most, you can either enter a key or have it generated automatically. Most WAPs come unsecured by default and default to downloading the key automatically to any wireless computer that connects to the WAP.
WPA is a more enhanced security system and supports user authentication using the Extensible Authentication Protocol (EAP) or a pre-shared key (PSK). WPA addresses shortcomings inherent in WEP. In addition to WPA support for user authentication, it is designed to check the integrity of encryption keys. EAP-based authentication is inherently more secure than the authentication used with WEP. User names and passwords are encrypted with EAP-based security, so it is less likely that authentication security will be compromised.

Ad hoc mode configures computers in a peer-to-peer configuration with no central access point.

Infrastructure mode requires one or more WAPs and enables you to connect a wireless network to a wired network. Neither mode in itself does anything to prevent authorized access.

You should not expect changing the default SSID to prevent unauthorized access. You should change the default SSID, but if you do not take any other actions to secure the network, the SSID is broadcast in clear text. Computers will be able to detect the network by its SSID and connect.

Using 802.11g WAPs will not in itself prevent unauthorized access. WAPs come from the manufacturer unsecured. If you take no other action to secure the WAP and the network, anyone within range will be able to detect the WAP and connect through it to your network.
Objective: Security

Networks: Ping

A user can ping the IP address of a specific sever but she cannot ping the server via its domain name.
What is not working properly?
1. The DHCP server
2. The network card
3. >>The DNS server
4. The hub

Explanation : When you can reach a computer by its IP address but not by its domain name, it points to a problem with the Domain Name Service (DNS). DNS servers look up requests for domain names and translate them into IP addresses.

Dynamic Host Configuration (DHCP) servers automate IP addressing and TCP/IP configuration. They assign IP addresses to computers that are configured to receive their TCP/IP configuration automatically. A problem with the DHCP server would become apparent because computers would not receive IP addresses and would then use Automatic Private IP Addressing (APIPA) to assign themselves an address.

If the hub or the network card were not working properly, the user would not be able to ping the server at all.
Objective: Networks

Operating Systems: ASR & System State

Windows XP provides another alternative when a system that fails to boot cannot be repaired even using the Recovery Console.
What utility is a last resort option to use after you have unsuccessfully tried other recovery methods, such as rolling back drivers, restoring from backups, performing parallel installations, and using System Restore?

1. Debugging
2. >>ASR
3. DMDIAG
4. DiskProbe

Explanation : If changes to the operating system cause instability or startup problems, you can use the Automated System Recovery (ASR) tool to restore the system state and all files stored on the system volume. ASR is a last resort option to use after you have unsuccessfully tried other recovery methods, such as rolling back drivers, restoring from backups, performing parallel installations, and using System Restore. ASR restores system state files and settings and restores your ability to start the system. For example, hard disk corruption might prevent you from starting Windows XP, and the damage might be serious enough to prevent you from using Safe Mode, Recovery Console, or the Last Known Good Configuration. ASR will restore the Windows XP files that originally were installed from CD-ROM and may place incompatible file versions on the hard drive if files from service packs had been installed after original installation.

DiskProbe is a sector editor tool for Windows XP Professional that allows administrators to directly edit, save, and copy data on a physical hard disk. With DiskProbe, you can replace the Master Boot Record, repair damaged partition table information, and repair or replace damaged boot sectors.

DMDIAG is a command line tool that displays the location and layout of dynamic disks and disk volumes.

Debugging Mode gives you the opportunity to move system boot logs from the failing computer to another computer for evaluation. To use this mode, you first must connect the failing computer to another computer using a serial cable. You then can review the boot logs on a functioning computer.
Objective: Operating Systems

Security: Scheduled Updates

How can you modify the Windows XP Automatic Update schedule on a computer with Service Pack 2 or later applied? (Select TWO.)
1. >>Connect to the Internet, run Start | All Programs | Windows Update, and click Update.
2. Launch the Control Panel and run Security Center. Then click Automatic Updates.
3. Launch the Control Panel and run Internet Options.
4. Launch the Control Panel and run System. Choose the Windows Updates tab.
5. Launch the Control Panel and run System. Choose the Advanced tab.

Explanation : To modify the Windows XP Automatic Updates schedule, you should launch the Control Panel, run Security Center, and then click Automatic Updates. You can also launch the Control Panel, run System, and choose the Windows Updates tab. Either method lets you set the update schedule. Two additional methods, not listed, are to launch the Control Panel and run Windows Updates or launch the Control Panel, run Scheduled Tasks, and then choose Windows Updates from the Scheduled Tasks Wizard.

You should not connect to the Internet, run Start | All Programs | Windows Update, and click Update. The Update selection lets you change language settings, but not the update settings.

You should not launch the Control Panel, run System, and choose the Advanced tab. The Advanced tab does not have a link to the Windows Updates settings.

You should not launch the Control Panel and run Internet Options. Even though Windows Updates are downloaded over the Internet from the Windows Update Web site, the Internet Options do not include an option for scheduling Windows Updates.
Objective: Security

Networks: Cabling & Connectors

What type of connector would you expect to find on UTP CAT 5e cable?
1. AUI
2. BNC
3. RJ-11
4. ST
5. >>RJ-45
Explanation : RJ-45 is the modular connector used on Unshielded Twisted Pair (UTP) cabling. It allows for 8 conductors or 4 pairs of wires.

BNC connectors are found on coaxial cable.
RJ-11 jacks are modular connectors found on household phone wire.
AUI connectors are found on Thicknet cables.
An ST connector is used on fiber optic cable.
Objective: Networks

Laptops and PC Cards

You need to remove a PC card from the Personal Computer Memory Card International Association (PCMCIA) slot on a laptop. You need to do this with minimal interruption to the work you are doing on the laptop.
What should you do?

1. Remove the card without taking any other action.
2. Power off the laptop.
3. Shut down the laptop.
4. >>Run Safely Remove Hardware and stop the card service.

Explanation : You should run Safely Remove Hardware from the system tray before removing the card. PC Card devices are hot-swappable, which means they can be removed and replaced while the computer is running without damaging the device or the computer.

You should not power off or shut down the laptop. These actions would prevent soft errors, but they are not necessary and would be an unnecessary interruption to your work.

You should not remove the card without taking any other action. Removing the card without first stopping card services or "warning" the laptop can result in internal soft errors. In some cases, it could cause the laptop to lock up or lose data. A minimum, it will cause a warning dialog box to display.
Objective: Laptops and Portable Devices

Components: ESD precautions

You are removing the expansion cards from a motherboard to provide better access for cleaning.
What should you do with the expansion cards while you are cleaning the motherboard? (Select TWO.)
1. Set the cards on the metal case.
2. >>Insert each card in a separate antistatic bag.
3. >>Set the cards on a grounded antistatic mat.
4. Set the cards on top of separate antistatic bags.
5. Set the cards, component side down, on a table or desk.

Explanation : You should either set the cards on a grounded antistatic mat or place each in a separate antistatic bag. Your primary concern is that static discharge could damage electronic components on the cards. Placing them on a grounded antistatic mat or inside of an antistatic bad protects them from discharge.

You should not set the cards on the metal case, on top of an antistatic bag, or on a table or desk (whether the components are up or down). These do not provide protection against static discharge. Placing the cards on the outside of an antistatic bag is especially hazardous because the bags are designed to collect static charges on the outside of the bag.
Objective: Personal Computer Components

Safety & Environment: Monitors

Before working inside a monitor, what precautions should you take to avoid electrocution? (Select TWO.)
1. Use a high-voltage probe to discharge stored charge.
2. Wear an Antistatic wrist strap.
3. >>Place the monitor on a grounding mat.
4. >>Unplug the monitor from the wall outlet.
Explanation : If you have to open a monitor, unplugging the monitor is only a start. The stored charge in the monitor capacitors is the primary concern for safety. You must discharge the high voltage charge on it using a high-voltage probe. This probe has a very large needle, a gauge that indicates volts, and a wire with an alligator clip. Attach the alligator clip to a ground. Slip the probe needle underneath the high voltage cup on the monitor. Once the voltage bleeds down to zero, you can safely work on the monitor.

You should NOT wear an antistatic wrist strap when working on a monitor. It could lead to a fatal electric shock.

Placing the monitor on a grounding mat will not reduce the danger from the stored charge in the capacitors.
Objective: Safety and Environmental Issues

Networks: Ethernet, Switches

What do the status lights on the front of a 10/100 Ethernet switch indicate? (Select THREE.)

1. The connection speed of the connection
2. >>Which connections are in use by computers
3. Whether the connected computer is a server
4. >>Which protocol is in use on the network
5. >>Whether a connection is running full duplex or half duplex
6. Whether a printer is cabled to the network or not

Explanation : In a star network, all nodes on the network connect to a centralized hub or switch. Signal lights on the front of the hub or switch indicate which connections are in use by computers. Switches also indicate whether a full duplex connection is in use. Multispeed hubs and switches also indicate which connection speed is in use on each port.

There are no lights on switches that indicate which protocol is in use.

There are no lights on switches to distinguish the type of resource connected to that port. It is impossible to determine from status lights on a switch if the connected device is a server, printer, workstation, router or even another switch.
Objective: Networks

Operating Systems: HDDs and File Systems

You partition a hard disk with an extended partition divided into three logical drives.
What must you do before you can use the logical drives?

1. Recreate the master boot record (MBR).
2. Run a low-level format on each drive.
3. Assign drive letters.
4. >>Format each drive with a file system.-->Correct

Explanation : You must format each drive with a file system before it can be used. When you create a logical drive from an extended partition, you specify the drive size. However, the logical drive is not formatted for use and must be formatted with a file system, either FAT, FAT32, or NTFS. Unless you need to support older Windows operating systems (Windows 98 or earlier), it is recommended that you use NTFS because it is more secure and more reliable than FAT or FAT32. NTFS also supports features not supported by FAT or FAT32, such as file compression and file encryption.

You should not run a low-level format. Low-level format is run on a hard disk as a whole to make it available for use by dividing the disk into tracks and sectors. With new hard disks, the low-level format is performed by the manufacturer before the hard disk is packaged for sale. It is seldom necessary to run a low-level format on modern hard disk drives, and in many cases, it is strongly discouraged by the manufacturer.

You do not need to assign drive letters because this is done when you create the logical drives.

You do not need to recreate the MBR before you can use the logical disks. The MBR is updated, effectively recreated, any time you change the partition information on a hard disk. It contains partition information and other information used by the computer when the hard disk is used as the computer's boot drive.
Objective: Operating Systems

Laptops: Batteries and charging

You are trying to determine if the AC adapter for a laptop computer is working correctly. The computer has been operating on battery power for a few hours. The power utility indicates that less than 25 percent of the battery charge remains.
Normally, the power light on the laptop glows green when the battery is fully charged and the laptop is using AC power. You plug in the AC adapter and connect it to the laptop computer.
How can you determine from the power light whether or not the battery is charging?

1. >>The power light steadily glows green.
2. The power light blinks in an alternate color (such as yellow or orange).
3. The power light steadily glows in an alternate color (such as yellow or orange).-->Correct
4. The power light blinks green.

Explanation : The power light will steadily glow in an alternate color, other than green, if the AC adapter is working properly and charging the battery. Typically, the power light glows yellow or orange when charging. Most operating systems also have a power management utility that you can run to determine whether or not the battery is charging.

The power light should not steadily glow green. This indicates that the laptop is operating on AC power and that the battery is fully charged. The battery has only 25 percent of its charge remaining, so it is not fully charged.

The power light should not blink. A blinking light typically indicates that the laptop has entered a power saving mode, such as standby or suspend. The color varies by manufacturer, but the light could blink green or an alternate color.
Objective: Laptops and Portable Devices

Components: Cleaning Solutions

What kind of liquid cleaner should you use around electronic components?
1. >>Alcohol-based-->Correct
2. Water-based
3. Ammonia solution
4. Solvent-based

Explanation : You should use alcohol-based liquids when cleaning around electronic components. Alcohol-based cleaning solutions dry quickly, do not leave a residue, and do not damage components.

You should not use water-based liquids when cleaning around electronic components. Water-based cleaners can be slow to dry and can cause damage to delicate components. Water-based liquids are used for cleaning equipment cases, but should be used to dampen a soft cloth used for cleaning rather than being applied directly to the case.

You should not use solvent-based based liquids when cleaning around electronic components. Solvent-based cleaners are corrosive and can leave a damaging and conductive residue.

You should not use an ammonia solution when cleaning around electronic components, especially when cleaning a laser printer. Ammonia solutions are water-based, so they have the same potential problems as other water-based cleaners. Also, ammonia can react with printer toner, resulting in degraded print quality.
Objective: Personal Computer Components

Networks: Valid IP addresses

Which IP address is a valid host address?

1. A87E34B2
2. 00-03-A6-98-03-16
3. 192.168.0.256
4. >>10.10.10.10-->Correct

Explanation : An Internet Protocol (IP) address is a 32-bit number sequence, divided into four octets, each separated by a decimal point (.). The number in each octet can range from zero (0) to 255 with some restrictions. The IP address is a combination of network number and host number.

10.10.10.10 is a valid IP address. It represents network 10.0.0.0 and host 10.10.10.

The 192.168.0.256 is not a valid address because the last octet is 256, which is not possible in 8-bits.

00-03-A6-98-03-16 is not an IP address but a Media Access Control (MAC) address which is a burned in address on the network card.

A87E34B2 is representative of an Internet Packet Exchange (IPX) network address. In an IPX network, an 80-bit address is used, and it is written in hexadecimal notation.
Objective: Networks

Printers and Scanners: The Process

At what point in the laser printer printing process is toner transferred to the drum?

1. Developing-->Correct
2. Fusing
3. Conditioning
4. >>Transferring - Wrong
Explanation : Toner is transferred to the drum during the developing phase of the laser printer printing process.

Printing occurs in stages. The first stage, called charging or conditioning, is when a -600 v charge is applied evenly to the drum. During the writing or exposing stage, laser beams form an image by reducing the charge to approximately -100 v in the areas where the image will be formed. Next is the developing stage, when toner is transferred to the drum.

During the transferring stage, a +600 v charge is applied to the paper. Next is the fusing stage, when the image is transferred to the paper and pressure and heat (350 degrees Fahrenheit) melt and bond the toner to the paper. The final stage, cleaning and erasing, is when excess toner is removed from the drum and the drum is discharged. Understanding the print process and stages involved can be helpful when having to troubleshoot laser printer problems. By observing the symptoms, you can get an idea of which stage is having a problem and which components are involved.
Objective: Printers and Scanners

Operating Systems: Backups

What action should you take to prevent accidental loss of critical data that is located on a computer running Windows XP?
1. >>Use the Windows Backup utility to run regular scheduled data backups to a shared network folder. -->Correct
2. Make duplicate copies of all critical files and store them in a separate folder on the local hard disk.
3. Set the Read-only attribute on all critical data files.
4. Use the Windows Backup utility to run regular scheduled data backups to CD.

Explanation : You should use the Windows Backup utility to run regular scheduled data backups to a shared network folder to prevent accidental loss of critical data files. The files are protected unless both the local hard disk and the network server hard disk fail, which would be extremely unlikely.

You should not use the Windows Backup utility to run regular scheduled data backups to CD. The Backup utility that ships with Windows XP does not support backing up directly to CD.
You should not make duplicate copies of all critical files and store them in a separate folder on the local hard disk. This does not protect the files should the local hard disk fail.

You should not set the Read-only attribute on all critical data files as your only protective measure. Users with sufficient rights can override or reset the Read-only attribute, removing the protection. Also, this does nothing to protect against losing the files because of a hard disk failure.
Objective: Operating Systems

Laptops: Cleaning Procedures

You are cleaning a laptop computer. You plan to use compressed air where appropriate.
For which of the following is compressed air the recommended cleaning method for the device? (Select THREE.)

1. DVD drive
2. External case
3. >>Keyboard-->Correct
4. LCD screen
5. >>USB port-->Correct
6. Touchpad
7. >>Fans -->Correct
Explanation : You can use compressed air to clean the keyboard, fans, and USB port. You can also use compressed air to clean other external ports. When cleaning fans, you should use a toothpick or similar object to prevent the fan blades from spinning. Allowing the blades to overspin (spin too fast) can damage the fans.

You should not use compressed air to clean the external case, LCD screen, DVD drive, or touchpad. You should use a soft, water-dampened cloth to clean the external case and touchpad.

Use a soft, dry cloth, screen cleaning pads, or cleansers designed for cleaning screens to clean the LCD screen.

Use a commercial video cleaning kit to clean the DVD drive. Spraying compressed air in a DVD drive does not clean the laser unless directed on the lens and can force dust into delicate mechanical components, causing the drive to fail. However, if you can reach the lens of the laser with an extension wand and spray that area directly, some manufacturers recommend this as a possible cleaning method. Because of the potential problems it can cause, it is general discouraged in service manuals.
Objective: Laptops and Portable Devices

Components

Which graphics card would be best for a user who does video editing and game playing?
1. 128 MB PCI
2. 256 MB AGP
3. 256 MB PCI
4. >>256 MB PCI Express -->Correct
Explanation : A PCI Express card offers the best performance of all of the competing graphics card formats. A user who does video editing and game playing needs a good graphics card, and PCI Express is the format of choice for video users and gamers.

A 256 MB AGP card would not perform as well as a 256 MB PCI Express card.

PCI is an older standard that does not perform as well as AGP or PCI Express.
Objective: Personal Computer Components

Security: Biometrics, Hardware Devices

What is the most common type of biometric security?
1. Fob
2. Fingerprint scanner-->>Correct
3. User name and password
4. >>Smart card
Explanation : A fingerprint scanner is the most common example of biometric security. Biometric security identifies a user by a biological trait. Biometric devices include devices such as fingerprint scanners, retinal scanners, and voice recognition devices. Of these, a fingerprint scanner is the most common.

User name and password is not an example of biometric security. However, user name and password is the most commonly used network authentication method.

A smart card and reader is not an example of a biometric security device, but it is an example of security hardware. To use a smart card, the user inserts the smart card into a reader and then supplies a password or personal identification number (PIN) when prompted.

A fob is not an example of a biometric security device, but it is an example of security hardware. The fob automatically generates a number that is used for authentication. The user might or might not also be required to provide a user name and password.
Objective: Security

Networks: Assigning IP addresses

A Windows 2000 computer is configured to receive its IP address automatically. You check the computer's IP address and it is 169.254.10.1.
What does this indicate?

1. The DNS server is failing.
2. The computer cannot load the TCP/IP protocol.
3. The computer received a valid address.
4. >>The DHCP server is failing. -->Correct

Explanation : The most likely cause is that either the Dynamic Host Configuration Protocol (DHCP) server is failing or that the computer is unable to connect with the DHCP server. An address of 169.254.10.1 is one that is generated automatically by the computer when it is unable to lease an address from the DHCP server. This is referred to as an Automatic Private IP Addressing (APIPA) address. An APIPA address is generated automatically by a computer configured for automatic IP addressing if the computer is unable to contact the DHCP server to lease an IP address.

The problem is not related to the Domain Name Service (DNS) server. The DNS server maintains a table of computer names and IP addresses. It manages IP address resolution for the network.

The computer did not receive a valid address. An APIPA address is generated automatically by the computer when it is not able to receive a valid address from the DHCP server.

The problem is not that the computer cannot load the TCP/IP protocol. If the computer were unable to load the TCP/IP protocol, it would not be able to report an IP address.
Objective: Networks

Printers and Scanners: connecting to the network

What is necessary when connecting a laser printer directly to a wired network?

1. A Bluetooth adapter
2. A FireWire port
3. >>A network adapter-->Correct


4. A USB port
Explanation : When connecting a printer directly to the network, you can configure the printer to enable users to access the printer without having to connect through another computer. When connecting to the network, you must have an appropriate network adapter. Some printers still require a network computer to act as a print server for the printer while others have the print server as an integrated feature of the printer.

You do not need a Bluetooth adapter to connect a printer to a network. Bluetooth is a radio frequency connection method for peripheral devices. A Bluetooth adapter is needed for the printer to communicate with a Bluetooth enabled computer. Once the printer is connected to the computer, you can then share the printer to the network through the computer.

You do not need a FireWire or USB port to connect a printer directly to the network. Both are for wired peripheral connections to computers, not network connections. Once the printer is connected to the computer, you can then share the printer to the network through the computer.
Objective: Printers and Scanners

Operating Systems: System Restore

You install an application on a computer running Windows XP. The application automatically creates an installation restore point before making any changes to the computer, installs itself, and restarts the computer automatically.
You are able to log on, but are not able to run several applications. The computer reports various errors when you attempt to launch these applications. You can launch most system utilities.
What should you try to correct this problem?
1. Run Start | Control Panel and launch Add or Remove Programs. Select and remove the application.
2. Shut down the computer, restart, interrupt the startup, and choose to start using the last known good configuration.
3. >>Run Start | All Programs | Accessories | System Tools | System Restore and revert to the most recent system checkpoint.
4. Run Start | All Programs | Accessories | System Tools | System Restore and revert to the restore point created by the application. -->Correct

Explanation : You should run Start | All Programs | Accessories | System Tools | System Restore and revert to the restore point created by the application. Because the problems occurred immediately after installing the application, they are most likely related to the application. The restore point was created before the application was installed, so reverting to the restore point would take the system back to a point just before installation. If the problem is related to the application, this should correct the problem.

You should not shut down the computer, restart, interrupt the startup, and choose to start using the last known good configuration. The last know good configuration is the configuration when the computer last started up successfully. Because the computer has successfully completed startup since you installed the application, booting to the last known configuration will use the current configuration, which includes the application.

You should not run revert to the most recent system checkpoint. A system checkpoint is created when Windows XP detects a request to make a configuration change. Depending on when the checkpoint was created, you might lose changes to the computer that you want to keep.

You should not remove the application. This process will uninstall the application, but it does not necessarily reverse all of the changes made during application installation.
Objective: Operating Systems

ASR

You need to make an ASR recovery set for your Windows XP Professional computer.
What tool should you use?

1. >>Recovery Console - Wrong
2. System Restore
3. Windows Backup -->Correct
4. MSCONFIG

Explanation : In Windows XP Professional, you can use Automated System Recovery (ASR) to recover from a system crash when all else fails. To create an ASR backup set, you need a formatted floppy disk and a location where you can store the backup files. You create an ASR backup set by using the Windows Backup tool.

The System Restore tool allows you to set a restore point before you add a component or change configuration settings. You can also restore the system to any restore point that you had set manually or that Windows had set automatically.

MSCONFIG is the System Configuration Utility. This tool allows you to control the startup environment by enabling or disabling startup programs, commands, and services.

The Recovery Console is available on the Windows XP installation CD. It allows you to boot your system to a command prompt with access to the root folder, the %systemroot% folder, the Cmdcons folder, and any removable media.
Objective: Personal Computer Components

WIndows Updates (XP vs 2000 Pro)

A computer running Windows XP is configured with the default Start menu.
How can you determine if updates are available?

1. Connect to the Internet, run Start | Control Panel, run Windows Firewall, and scan for updates.
2. Connect to the Internet, run Start | All Programs | Windows Update and scan for updates.
3. >>Connect to the Internet, run Start | Windows Update and scan for updates.
4. Connect to the Internet, run Start | Control Panel, run Add or Remove Programs, and scan
for updates.

Explanation : To determine if updates are available, you should connect to the Internet, run Start | All Programs | Windows Update and scan for updates. The Windows Update command directs the computer to the Windows Update Web site, if the computer is connected to the Internet. From there, you can click Scan for updates to scan for updates available for your computer.

You should not connect to the Internet, run Start | Windows Update and scan for updates. This is the sequence for checking updates for a Windows 2000 computer, not a Windows XP computer.

You should not connect to the Internet, run Start | Control Panel, run Add or Remove Programs, and scan for updates. The Add or Remove Programs utility lets you install or uninstall applications, modify configuration options on selected applications, change the Windows components installed, or set configuration options. It does not, however, have any options directly related to automatic updates.

You should not connect to the Internet, run Start | Control Panel, run Windows Firewall, and scan for updates. The Windows Firewall has no links to or direct connection with automatic updates.
Objective: Security

Networks: IP Addresses

How many bits does an IP address contain?
1. 32-->Correct
2. 16
3. 80
4. >>64 - Wrong
Explanation : An IP address consists of four eight-digit binary numbers called octets, separated by periods, for a total of 32-bits. The IP address identifies the network and the host in a network uniquely on the Internet.
Objective: Networks

Printers and Scanners: Printy Quality

A laser printer appears to be printing properly, but the toner flakes off easily from the page.
Which printer component is most likely failing?
1. Drum
2. Transfer corona wire
3. >>Fuser roller
4. Pickup roller

Explanation : The fuser roller is most likely failing. The fuser roller is the component that uses pressure and heat to bond the toner to the paper. The fuser roller temperature can reach 300 degrees Fahrenheit in some models. If the fuser roller does not reach sufficient temperature or does not provide sufficient pressure, the toner does not bond to the paper and can flake off.

The problem is most likely not the drum. The electrically charged drum is used to transfer toner to the paper. Problems relating to the drum can result in symptoms such as blank print, all-black print, blotchy or spotty print, repeating marks, and so forth.

The problem is most likely not the transfer corona. The transfer corona charges the paper so that toner transfers from the drum to the paper. Problems with the transfer corona most often result in a blank page or poor print quality.

The problem is most likely not the pickup roller. The pickup roller does what its name implies. It picks up the paper from the paper tray to start it on its path through the printer. Problems with the pickup roller usually show up as misfed paper and paper jams.
Objective: Printers and Scanners

Operating Systems: Startup

You need to diagnose a Startup issue.
What program allows you to easily specify which programs load during startup?

1. Recovery Console
2. System Restore
3. MSCONFIG -->Correct
4. Scheduled Tasks

Explanation : MSCONFIG is the System Configuration Utility. This tool allows you to control the startup environment by enabling or disabling startup programs, commands, and services.

The System Restore tool allows you to set a restore point before you add a component or change configuration settings. You can also restore the system to any restore point that you had set manually or that Windows had set automatically.

The Recovery Console is available on the Windows XP installation CD. It allows you to boot your system to a command prompt with access to the root folder, the %systemroot% folder, the Cmdcons folder, and any removable media.

You can use Scheduled Tasks to schedule a program to run at a specific time. It cannot be used to control which programs launch during startup.
Objective: Operating Systems

Laptops and Infrared

What is the maximum range for using the infrared wireless port when updating a PDA from a laptop?
1. 100 feet
2. 5 feet
3. 30 feet
4. >>20 feet -->Correct

Explanation : The maximum range for Infrared Data Association (IrDA) devices is no more than 20 feet. It is typically given as 10 to 20 feet, but it can be affected by ambient light (if it is too bright) or dust. It also requires unobstructed line of sight between the devices.

The range is greater than 5 feet. If the devices are unable to communicate at less than 10 feet, you should suspect problems.

Both 30 and 100 feet exceed the maximum rated range for IrDA devices. If these ranges are required, other interface types should be used.
Objective: Laptops and Portable Devices

Security

What should you do to require a user to enter a password before a computer will boot?
1. Run the BIOS flash utility.
2. >>Run the CMOS setup utility.-->Correct
3. Install a smart card reader.
4. Configure security through the operating system.


Explanation : To require a user to enter a password before a computer will boot, you should run the CMOS setup utility. Most varieties of BIOS support a boot password that must be entered before the computer will boot. The boot password, like other BIOS configuration settings, is entered through the CMOS setup utility.

You should not configure security through the operating system as a way to affect the boot process. While operating system security is important, the user is not prompted for the information until after the boot process has completed and the operating system is loaded and running.

You should not run the BIOS flash utility. This is the process for updating the system BIOS, not the configuration settings. Often, this resets the configuration settings to their defaults, which would remove the boot password if one were already defined.

You should not install a smart card reader. A smart card reader is used for authentication control after the operating system is loaded and running. The smart card reader is not a BIOS-level supported device. It does not control the boot process.
Objective: Security

Networks: NIC cards

A computer is unable to communicate with any other computers on the network. The indicator lights on the network interface card (NIC) are not lit.

What can you check to see if the NIC is failing?

1. Check the hub to which NIC is connected.
2. Check the Network Connection status in the Control Panel.
3. >>Check the NIC's status in Device Manager.-->Correct
4. Check the Internet Protocol configuration settings in the Local Area Connection properties.

Explanation : You should check the NIC's status in Device Manager. Device Manager will report if the computer has detected a problem with the NIC. If the computer does not detect a problem with the NIC, then you can check for other problems, such as a bad cable or failing hub port.

You should not check the hub to which the NIC is connected as your first check. If the indicator light on the port to which the NIC is connected is not lit, there is a problem, but you do not know if the problem is with the NIC, the cable, or the hub.

You should not check the Network Connection status in the Control Panel. You know that the NIC is not able to communicate because its indicator lights are not lit. Because of this, you know that Network Connection will report an error.

You should not check the Internet Protocol configuration settings in the Local Area Connection properties. The symptoms indicate a hardware failure, so you should start by checking hardware components.
Objective: Networks

Operating Systems: Upgrades

Which of the following steps is NOT necessary when you are upgrading a workstation from Windows 98 to Windows XP Professional?

1. Verify that hardware is on the HCL.
2. Verify that the minimum system requirements are met.
3. Record existing network setup information.
4. >>Install the latest service pack. -->Correct

Explanation : Before beginning an installation or upgrade of Windows, you should verify that the computer's hardware is on the HCL (Hardware Compatibility List) published by Microsoft. Next, you should verify that the system meets or exceeds the minimum system requirements for Windows XP Professional. During the upgrade, you may need network information. It is also highly recommended that you perform a backup. After performing these steps, you are ready to start installing Windows XP Professional.

It is not necessary to install the latest service pack for Windows 98 prior to performing the upgrade to Windows XP Professional.

Laptops and RAM

You need to increase the amount of RAM memory installed in the laptop computer. You need to identify the correct memory module for use in the computer.
How many pins does a typical module used for laptop computer RAM memory have?
1. >>144 -Correct
2. 168
3. 72
4. 240

Explanation : The correct type of memory module will have 144 pins. The module used for laptop RAM memory is Small Outline Dual Inline Memory Module (SO-DIMM). Current SO-DIMMs have 144 pins, 72 pins on either side of the module.

You might also see laptop memory in a 200-pin SO-DIMM module. This type of module is used for double data rate (DDR) memory, which provides faster memory access. 200-pin modules are used for the DDR1 (typically referred to as just DDR) and DDR2 standards.

You would not use a memory module with 72 pins. Memory with 72 pins is used in the Single Inline Memory Module (SIMM) format, which was used with desktop computers having 80486 and early Pentium processors.

You would not use a memory module with 168 pins. The Dual Inline Memory Module (DIMM) format with 168 pins, 84 pins on each side, is used with Pentium and Athlon desktop processors.

You would not use a memory module with 240 pins. DIMMs with 240 pins, 120 on either side, support 64-bit processors and 64-bit memory systems. They are used in desktop computers with 64-bit processors. These DIMMs use the DDR2 standard.
Objective: Laptops and Portable Devices

BIOS and Security

How can BIOS configuration options be used to enhance system security?

1. Disable power management options.
2. Modify the serial port options.
3. Disable plug-and-play support.
4. >>Enable a hardware-based password.- Correct

Explanation : You can enhance system security by enabling hardware-based passwords through the BIOS configuration settings. When you specify a hardware-based password, the user must provide the password during system startup to continue the boot process.

You should not modify serial port options as a way to enhance security. This action does nothing to enhance system security. You would modify serial port settings when the default settings cause the serial ports to conflict with other devices or when you want to disable the serial ports to free up their resources for use by other devices.

You should not disable plug-and-play support as a way to enhance system security. Most current expansion devices and peripherals are plug-and-play devices. Disabling plug-and-play support could make it difficult, if not impossible, to install new devices and could interfere with the operation of devices that are already installed.

You should not disable power management options as a way to enhance security. In fact, security is not as strong when you disable power management. The power management settings let you enable features like automatically causing an idle computer to go into stand-by mode or hibernation mode. You can actually improve system security by enabling power management and requiring a password when bringing a system out of standby or hibernation.
Objective: Security

Networks: Firewalls

What type of network device can be configured as a perimeter firewall?

1. >>FTP server - WRONG
2. Router - Correct
3. DNS server
4. Hub

Explanation : A perimeter firewall is a device configured to filter TCP/IP traffic coming into and going out of your network. Its purpose is to isolate the network segment from other networks or the Internet. Most routers, whether implemented through hardware and software, can be configured as a perimeter firewall.

A Domain Name System (DNS) server cannot be configured as a perimeter firewall unless the computer is also configured to act as a network router, which is discouraged because of possible performance and security concerns. A DNS server is responsible for domain (DNS) name to IP address mapping and resolution.

A hub cannot act as a perimeter firewall. A hub is a relatively simple device designed to connect cables in a cable plant and provide a path over which network computers communicate. Typical hubs, by design, simply pass on all incoming traffic.

A File Transfer Protocol (FTP) server cannot be configured as a perimeter firewall unless the computer is also configured to act as a network router, which is discouraged because of possible performance and security concerns. An FTP server supports file uploads and download with network client computers.
Objective: Networks

Printers and Scanners: Cordless and Infrared Connections

What provides for a cordless connection to a printer?
1. IEEE 1394
2. Parallel
3. >>Infrared - Correct
4. USB
Explanation : Many laptops have infrared (IR) ports to allow you to connect to peripherals without a cable. To use the IR port, you must configure it first. Windows usually treats the IR port as a serial port, but it also assigns it a virtual COM port and LPT port.

You need to know which simulated port Windows has assigned to the IR port to configure printing. You must line up the IR port on the laptop and the printer or other device to establish a connection. IR works by line-of-sight, so the IR ports on the laptop and device must be able to "see" each other.

Universal Serial Bus (USB) has become the most popular way to connect peripherals of many sorts, including printers, to modern Windows PCs. USB is faster than serial and parallel ports. Printers have traditionally used a parallel connection, but they can also use the USB or IEEE 1394 Firewire interfaces to connect to printers if the printers support it. Many printers today have USB and parallel interfaces, but few have Firewire interfaces.
Objective: Printers and Scanners

Essentials: Environmental Variables

As part of preventive maintenance, you want to review the computer's environmental variables.
How can you retrieve this information? (Select TWO.)

1. By running the set command from a command line prompt -Correct
2. >>Through System Tools in Computer Management - Wrong
3. >>Through the Advanced properties in the computer's System properties Correct
4. Through the View tab in Folder Options
5. By running the attrib command from a command line prompt

Explanation : You can view a computer's environmental variables through the Advanced properties in the computer's System properties or by running the set command from a command line prompt. You can launch the System properties from the Control Panel, select the Advanced tab, and then click Environmental Variables to view and modify environmental variable settings. The set command, when run without any other options, returns a list of environmental variables and their current values.

You cannot view a computer's environmental variables through System Tools in Computer Management. System Tools includes Event Viewer, Shared Folders, Local Users and Groups, Performance Logs and Alerts, and Device Manager. None of these allows you to view the environmental variables.

You cannot view environmental variable settings by running the attrib command. The attrib command lets you view and modify file and directory attributes. The attrib command lets you set or clear file and directory attributes. The supported attributes are:

+r/-r - Sets or clears the read-only attribute.
+a/-a - Sets or clears the archive attribute.
+s/-s - Sets or clears the system file attribute. +h/-h - Sets or clears the hidden file attribute.

You cannot view a computer's environmental variables through the View tab in Folder Options. The View tab lets you set advanced file options, such as viewing hidden and system files or setting the file sharing method used. None of the options deals with viewing environmental variables.
Objective:
Operating Systems