Sunday, November 25, 2007

Operating Systems: File management cmds

You want to copy the contents of a fixed hard disk to a removable hard disk for backup.
Which command can copy all files, directories, and subdirectories to another disk all at once?

1. FDISK
2. SETUP
3. SCANDISK
4. >>XCOPY
5. COPY

Explanation : The COPY command copies all files in the current or specified directory to a target drive and/or directory. The XCOPY command copies all files in the current or specified directory, and all files and subdirectories below it, to a target drive and/or directory. The XCOPY command can be used to copy the entire contents of one drive onto another drive.
If you want to copy all files from C: drive to D: drive the command would be:
XCOPY C:\*.* D:\*.* /S

The FDISK utility can create or remove partitions and set the active partition on a hard disk.

The SETUP utility in DOS or Windows is used to install the operating system onto the active partition.

The SCANDISK.EXE utility is used to find and correct problems such as lost clusters (pieces of files that have been disassociated from the parent file) on a hard disk. It can also detect bad sectors on a disk, try to recover any data contained in bad sectors, and "lock out" the bad areas from future use.
Objective: Operating Systems

Components: Adding a second IDE drive

You have just installed a second hard disk drive into a system by adding it as the second drive on the existing IDE cable. When you restart and enter the BIOS configuration program, it can detect neither drive, even though you can hear that both drives are spinning.
What is the most likely cause of the problem?

1. You did not connect the power cable to the new drive
2. The new drive is defective.
3. >>You need to set one drive as the slave and the other as the master.
4. The IDE cable is defective

Explanation : If you add a second hard disk drive to an IDE cable and do not adjust the jumpers, the BIOS may be unable to detect either drive. If both drives are set as Master or both set as slave, neither will be detected. Since the original drive worked until you added the second drive, both being set as Master is the most likely cause of the problem. If you are using an 80-conductor cable for a UDMA/66 or faster interface, both drives can be set for Cable Select.

If the IDE cable were defective, the original drive would not have worked before the addition of the new drive unless you damaged the cable during the installation.

Not connecting the power cable to the new drive would not affect the old drive. Neither would adding a defective second drive.
Objective: Personal Computer Components

Security: Warning of "Brute Force Attacks"

How can you configure a system to provide a warning of an attempted brute force attack?

1. Enable Windows Firewall on each user's computer.
2. Install a firewall between the company network and the Internet.
3. >>Enable logging of failed login attempts.
4. Require strong passwords.

Explanation : A brute force attack (also called a dictionary attack) is one in which an attacker uses software that tries password combinations until the correct password is found. You can enable logging of failed login attempts to provide yourself with a warning that an attacker is attempting a brute force attack. A large number of failed login attempts indicate that such an attack is underway.

Requiring strong passwords can help prevent a brute force attack from succeeding, but it does not inform you that one is being attempted.

Installing a firewall between the company network and the Internet can help limit access to the company network from the outside, but it cannot give warning of an attempted brute force attack.

Enabling Windows Firewall on each user's computer can help prevent certain types of packets from being accepted by a user's computer and can help prevent various types of attacks. However, it cannot provide you with warning of an attempted brute force attack.
Objective: Security

Operating Systems: Hidden folders, Application Data folders

You need to install a Microsoft Word template for a Sally. However, when you open C:\Documents and Settings\Sally, the Application Data folder is not there.
What should you do?

1. In Folder Options, remove the check from the Hide protected operating system files option.
2. Install the template in C:\Documents and Settings\All Users\Application Data.
3. >>Install the template in C:\Documents and Settings\Default User\Application Data.
4. In Folder Options, select Show hidden files and folders.

Explanation : You should select Show hidden files and folders in Folder Options. By default, the Application Data folder is hidden, as are the Local Settings, PrintHood, NetHood, SendTo, and Templates folders.

You should not use Folder Options to remove the check from the Hide protected operating system files option. The Application Data folder is not an operating system file. You would remove the check from the Hide protected operating system files option if you needed to modify an operating system file, such as boot.ini, or view system files.

You should not install the template in C:\Documents and Settings\All Users\Application Data. The Application Data folder in All Users will not be visible if the Show hidden files and folders option is not selected.

You should not install the template in C:\Documents and Settings\Default User\Application Data. The Default User profile is used only when a user logs on for the first time. It is used as a basis for the user's custom profile. Also, the Application Data folder in Default User will not be visible if the Show hidden files and folders option is not selected.
Objective: Operating Systems

Laptops: Video Resolution

You provide the user with a laptop computer to enable the user to telecommute. The user reports that one application will not install because of the video resolution. The user attempts to increase the video resolution, but cannot. The user has the most up-to-date drivers installed.
What should you do?

1. Replace the inverter in the display.
2. >>Change the maximum resolution in CMOS setup.
3. Instruct the user to attach an external display to the laptop.
4. Configure the laptop to support shared video memory.

Explanation : You should instruct the user to attach an external display to the laptop. Some laptop computers have built-in displays that cannot operate at high resolution. However, you can attach an external monitor and use it for applications that require high resolution graphics.

There is no need to replace the inverter in the display. If the inverter was not working, the display would be black.

You cannot change the maximum resolution in Complimentary Metal-Oxide Semiconductor (CMOS) setup.

You should not configure the laptop to support shared video memory. Shared video memory uses a portion of RAM for video operations instead of dedicated video memory. Shared video memory can decrease performance, not increase the supported resolution.
Objective: Laptops and Portable Devices

Components: Slave hard drives

How can you designate a hard drive as a slave? (Select TWO.)
1. >>Connect the hard drive to the motherboard using the Slave connector portion of a Cable Select cable.
2. Designate it as Slave in the BIOS Setup.
3. Set the Master jumper to Off.
4. >>Set the dip switch on the hard drive to Slave instead of Master.

Explanation : When running a dual-drive configuration, you must designate one hard drive as master, and the other as slave. There are two ways to do this: set the Master jumper to Off, or connect the hard drive using the Slave connector portion of a Cable Select cable. Older drives use jumpers to set a hard drive as master or slave. The jumper will be On if the hard drive is the master, or Off if the hard drive is a slave.

Cable Select is a newer way to designate a hard drive as master or slave. A special IDE cable is used to connect the hard drives to the motherboard. There are two connectors on the cable: one for Master, and another for Slave. The Slave connection will not transmit data through pin 28, so only the master hard drive receives the signals sent across pin 28.

Dip switches are NOT used to designate hard drives as master or slave.

The BIOS Setup will determine which one is the master by how the jumpers or Cable Select is set. You cannot designate a hard drive as master or slave through the BIOS Setup.
Objective: Personal Computer Components

Networks and Laptops: Automatic Configuration vs profiles for telecommuters

A user telecommutes three days a week using a laptop computer. The user's Internet Service Provider at home requires a static IP address, subnet mask, and DNS server setting. The company network assigns addresses using DHCP.
You need to configure the user's computer so that the user can access the Internet when at home and the corporate network when at the office.
What should you do?

1. Create separate hardware profiles for the user at home and at work.
2. Create separate user profiles for the user at home and at work.
3. Enable automatic configuration. Add the ISP-defined settings to the Alternate Configuration tab.
4. >>Configure both IP configurations manually in Advanced TCP/IP settings.

Explanation : You should enable automatic configuration and add the ISP-defined settings to the Alternate Configuration tab. With this configuration, the computer first tries to find a DHCP server. If one cannot be found, the IP configuration on the Alternate Configuration tab is used.

You should not create separate user profiles for the user at home and at work. IP configuration settings are not defined in the user profile.

You should not create separate hardware profiles for the user at home and at work. The hardware profile limits the drivers that are loaded. It cannot be used to establish different IP configuration settings.

You should not configure both IP configurations manually in Advanced TCP/IP settings. Doing so would create a multi-homed network adapter, but the settings would not work correctly given the situation. Also, you want to be able to dynamically assign addresses when the user is connected to the company network, not manually assign the address.
Objective: Networks

Operating Systems: Windows Services

You are configuring a computer for an application developer. When the user is developing Web applications, he needs Internet Information Services (IIS). Otherwise, you want to ensure that IIS does not run. The user's computer is running Windows XP Professional and has a single hard disk, formatted as a single volume.
What should you do?

1. Create two user accounts. Log on as one of the users and install IIS.
2. >>Install Windows XP Professional in two different directories. Boot to one installation and install IIS.
3. Create two user accounts. Log on as one of the users and add a shortcut to IIS in Startup folder of the user's profile.
4. Create two hardware profiles. Enable the World Wide Web Publishing service in only one hardware profile.

Explanation : You should create two hardware profiles and enable the World Wide Web Publishing service in only one hardware profile. IIS installs the World Wide Web Publishing service, which is a Windows service. You can enable and disable a Windows service for specific hardware profiles through the service's Properties page in the Services utility. The user will need to restart the computer and select the hardware profile that has the World Wide Web Publishing service enabled when necessary.

You should not install Windows XP Professional in two different directories and boot to one installation to install IIS. You should only install one instance of Windows XP on a specific volume. Even if you had two volumes, creating two different installations is unnecessary and would result in having to install redundant copies of all applications.

You should not create two user accounts, log on as one, and install IIS. The World Wide Web Publishing service is a Windows service, so its status is not affected by the user who is logged on. If it is configured to start automatically, it will start when the operating system boots.

You should not create two user accounts and add a shortcut to IIS in the Startup folder in one of the user profiles. IIS is a Windows Service, not an application.
Objective: Operating Systems

Laptops and Shared Video Memory

You add 512 MB of RAM to a laptop computer that already has 512 MB of RAM. The laptop computer is configured for 64 MB of shared video memory. The user runs graphic intensive applications.
How much memory is available for the operating system and applications?

1. 1088 MB
2. >>960 MB
3. 896 MB
4. 1024 MB

Explanation : When a laptop is configured to use shared video memory, a portion of main memory is used by the video adapter. If graphic-intensive applications are used, you should subtract the amount of shared video memory from the amount of main memory to determine how much Random Access Memory (RAM) is available for applications and the operating system to use. In this case, that is 1024-64 = 960 MB.

You will not have 1024 MB of RAM available because 64 MB of memory will be used by the video adapter. You would have 1024 MB of RAM available if the laptop had dedicated video memory.

You do not need to subtract the video memory from each memory chip. You add the total amount of RAM and subtract the amount of shared video memory to obtain the total available memory.

You do not add the amount of shared memory to the total available.
Objective: Laptops and Portable Devices

Security: Folder Permissions

You need to configure file system permissions on a folder located on a computer running Windows XP Professional. When you display the Properties dialog box for the folder, the Security tab is not available.

What should you do? (Select TWO.)
1. >>Verify that your user account has Full Control of the folder.
2. Verify that the folder is shared.
3. Verify that the computer is a member of the domain.
4. >>Verify that the partition is formatted as NTFS.
5. Verify that Simple File Sharing is not enabled.

Explanation : You should verify that the partition is formatted as NTFS. You can only set file system permissions on a folder that is located on an NTFS partition.

You should also verify that Simple File Sharing is not enabled. When Windows XP is first installed, Simple File Sharing is enabled by default. When Simple File Sharing is enabled, the Security tab is not visible.

You do not need to verify that the computer is a member of the domain. You can set file system permissions on standalone computers (workgroup members).

You should not verify that the folder is shared. File system permissions control local access to the folder and do not require the folder to be shared.

You should not verify that your user account has Full Control to the folder. Although you will need Full Control to the folder, not having the Full Control permission will not prevent the Security tab from being displayed.
Objective: Security

Printers and Scanners: TWAIN

What is TWAIN?
1. A specification for allowing a computer to support two or more active input devices.
2. A specification that allows a computer to support two display devices.
3. A specification for allowing bidirectional communication between a computer and a printer.
4. >>A specification for an interface supported by scanners to allow them to be controlled by third-party applications, such as Adobe Photoshop.

Explanation : TWAIN is a specification for an interface that allows a scanner to be controlled by any TWAIN-compliant application, instead of just by the software included with the scanner.

TWAIN is not a standard for allowing a computer to support two or more active input devices. Windows XP can support multiple active input devices by default.

TWAIN is not a standard for bidirectional communication between a computer and a printer. One standard that defines bidirectional communication between a computer and a printer is IEEE 1284 ECP/EPP.

TWAIN is not a specification that allows a computer to support two display devices. When the computer is a laptop computer, multiple display devices are supported by DualView. When the computer is a desktop computer, additional support is built into Windows XP that allows you to change the primary monitor.
Objective: Printers and Scanners

Operating Systems: Searching for temp files

You want to search for all temporary files that were left behind by Microsoft Word.
What filename should you specify in the Search dialog?
1. ~* ----correct----
2. >>*.doc
3. ~.*
4. ~.doc

Explanation : You should use ~* as the filename to locate any temporary files left behind by Microsoft Word or other applications that use a ~ as the first character of a temporary file. The * is a wildcard character that means zero or more characters. So ~* would locate all files that begin with ~.

You should not search on ~.*. Doing so would return only the files named ~ with any file extension. For example, it would find ~.doc and ~.exe, but not ~myfile.doc.

You should not search on *.doc. Doing so would return all files ending in .doc, the extension commonly associated with Microsoft Word documents. Therefore, it would return all Microsoft Word documents, not just the temporary files.

You should not search on ~.doc. Doing so would return only a file specifically named ~.doc if there was one within the search path.
Objective: Operating Systems

Laptops and Trackpads

You have just completed installing more memory in a laptop computer. You boot the computer and log on. When you try to use the trackpad to open the Start menu, the mouse pointer does not move.
What should you do?
1. Remove your ESD wrist strap.
2. >>Reboot the computer and enter CMOS to change the input device.
3. Verify that a mouse is not connected to the PS/2 port.
4. Verify that the Fn key is not pressed.

Explanation : You should remove your ESD wrist strap. The trackpad works using static electricity. Therefore, if you are wearing an ESD wrist strap, it will not be able to sense electricity in your fingertips. A similar problem can occur if a user has long fingernails.

The Fn key does not affect the trackpad. It is used to toggle the functionality of certain keys.

You cannot change the input device in CMOS. The computer will use the trackpad as its input device automatically.

When you attach a mouse to a PS/2 or USB slot, the trackpad will still function. Therefore, verifying that a mouse is not connected to the PS/2 port will not solve the problem.
Objective: Laptops and Portable Devices

Security: Wireless dynamic encryption public key authentication

Which wireless security standard uses dynamic encryption keys and supports public key authentication?
1. WEP
2. MAC filtering
3. >>WPA
4. 802.1x

Explanation : The most secure wireless security standard is 802.1x, which offers a dynamic encryption key and supports a number of authentication methods, through Extensible Authentication Protocol (EAP), including certificates, public keys, and Kerberos.

Wired Equivalent Privacy (WEP) requires that you manually change encryption keys. It also does not support public key authentication.

Media Access Control (MAC) filters can be used to allow only certain computers to access a wireless access point secured using WEP. Access is granted or denied based on the MAC address.

Wi-Fi Protected Access (WPA) changes the key every 10,000 packets using a mechanism called Temporal Key Integrity Protocol (TKIP). It does not, however, support public key authentication.
Objective: Security

Networks: Proxy Servers

Julie has brought her laptop to the office and wants to check her e-mail. Her system is running Windows 2000 Professional with Internet Explorer 6.0. She has a properly configured network card and, in fact, uses her network card to connect to the Internet through her DSL modem at home.
Although she plugged her laptop network cable into the office network, she is unable to connect to the Internet. She was told that she has to configure her browser to use a proxy server.
Which procedure will properly configure the proxy server?

1. Open the Control Panel | Phone and Modem Options. Select a modem to configure.
2. Right click My Computer and select Properties. Use the Device Manager.
3. >>Open the Control Panel | Internet Options applet. Select Connections, then LAN settings.
4. Open the Control Panel | Network and DialUp Connections.

Explanation : In the Internet Options applet in Control Panel, you can configure the computer to use a proxy server by choosing the Connections tab and clicking the LAN settings button. Enter the address for the proxy server and script file if necessary.

The Device Manager can be used to adjust hardware resources but not proxy servers.

The Phone and Modem Options applet allows you to configure dialing properties and modem parameters. You cannot configure a proxy server from there.

The Network and DialUp Connections applet is used to configure a DialUp Networking connection to another system such as an Internet service provider (ISP). You cannot configure a proxy server from there.
Objective: Networks

Printers and Scanners: Damp Paper symptoms

What symptoms could result from using damp paper in a laser printer? (Select FOUR.)
1. >>Poor quality output
2. Fuzzy print
3. >>Unfused toner on the printed page
4. White streaks through the text
5. >>Multiple page feed >
6. >>Paper jams
7. Gray print

Explanation : Damp paper can cause paper jams, fuzzy print, poor output quality, and multiple page feed. Paper jams can occur due to damp paper because the paper needs to slide smoothly through the paper handling elements. Damp pages may also stick together, allowing more than one sheet to go through the printer (multiple page feed). This will cause blank pages to appear between printed pages. Fuzzy and poor quality output will occur because the water in the paper will interfere with the transfer of the toner.

A dirty developer unit or a partially empty toner cartridge can cause white lines.

Loose toner on the printed page is the result of the fuser not heating to the proper temperature.

When the photoreceptor drum wears, it holds less of a charge and attracts less toner, which in turn causes lighter (gray) print.
Objective: Printers and Scanners

Operating Systems: CMDS for File Access

You want to create a text file. You create the file with a text editor and save it as INFO.TXT.
You want the file to be easily accessible so that anyone can read it, but you want to protect the file so that it cannot be easily edited or deleted.
Which file or utility can you use to do this?

1. REGEDIT.EXE
2. CONFIG.SYS
3. MSDOS.SYS
4. >>ATTRIB.EXE

Explanation : ATTRIB.EXE is a command prompt program that is used to display, add, or change file attributes. You can type ATTRIB +R INFO.TXT to add the Read-Only attribute to the file. In order to edit or delete the file, the Read-Only attribute must be removed using the command ATTRIB -R INFO.TXT. This will not absolutely prevent someone from editing or deleting the file, but extra steps are required to do it.
Other attributes include the following:
* A (Archive): used by backup programs to indicate which files have been changed since the last backup.
* H (Hidden): used to keep a file name from being displayed with the DIR command.
* S (System): designates a file critical to the system startup and operation.

CONFIG.SYS is the DOS system file that contains hardware/driver information and environment settings.

MSDOS.SYS is one of the hidden, necessary files that must be on a boot disk for DOS to initialize.

REGEDIT.EXE is the Windows Registry Information Editor. It makes it easier to edit the keys and entries in the Windows registry.

Laptops: Batteries and charging II

George reports that his laptop will not power up. He says that he received a warning that the battery was low before the computer powered off. The laptop was plugged in to a wall socket. You plug the laptop into a different wall socket and no power light comes on.
What should you try next?

1. Plug in the computer using a working AC adapter with higher voltage.
2. >>Plug in the computer using a working AC adapter with the same amperage and voltage.
3. Remove the battery and plug in the computer using the same AC adapter.
4. Plug in the computer using a working AC adapter with higher amperage.

Explanation : The problem is most likely caused by a faulty AC adapter because the battery did not charge even though the adapter was plugged into the electrical socket and the laptop did not power up when you tried a different electrical socket. If the AC adapter was working, when you plugged it into a different socket, the light would be a solid alternate color to indicate that the battery was being charged. A laptop's AC adapter has a specific amperage and voltage that must be matched. If the amperage and voltage do not match, you could damage the circuit board.

You should not remove the battery and plug in the computer using the same AC adapter. The problem is most likely the AC adapter. Also, some laptops will not power up when the battery is removed because the battery is necessary to complete the circuit.

You should not plug in the laptop using an AC adapter with higher voltage. The AC adapter must have the same voltage as the one that shipped with the laptop.

You should not plug in the laptop using an AC adapter with higher amperage. The AC adapter must have the same amperage as the one that shipped with the laptop.
Objective: Laptops and Portable Devices

Components: BIOS Checksum Error after upgrade

After upgrading your system BIOS with an update from the manufacturer, you receive a CMOS Checksum error after rebooting.
What should you do to clear the error?

1. >>Reboot the PC, enter CMOS setup, and check and save CMOS settings.
2. Press the ENTER key and turn off the computer before all data is lost.
3. Replace the BIOS chip with a new one from the manufacturer.
4. Reboot the PC and try to flash the BIOS again.

Explanation : After upgrading the BIOS on a motherboard, the new BIOS will likely take up more bytes of ROM than the replaced BIOS. The difference in the BIOS image file byte count is detected by the system as a checksum error. CMOS checksum errors require that you enter Setup, check and save your settings, and exit Setup a second time.

You should not reboot and flash the BIOS again because reflashing the BIOS would most likely result in the same error.

You should not replace the BIOS chip with a new one. A checksum error does not indicate a failure of the BIOS hardware.

You should not press the ENTER key and turn off the computer to avoid losing data. A checksum error will not cause any loss of data.
Objective: Personal Computer Components

Safety & Environment: ESD protection

Which components should be kept in an antistatic bag when they are not inside the computer? (Select TWO.)
1. Power supply
2. >>RAM
3. Backup tapes
4. Fiber optic cables
5. >>Video adapter card
Explanation : You should store any component that includes chips or circuitry in an antistatic bag to protect it from static electricity when the component is not inside the computer. This includes RAM, expansion cards like video adapter cards, processors, motherboards, and hard drives.

There is no need to store a power supply in an antistatic bag. A power supply does not include components that are sensitive to static electricity.

There is no need to store fiber optic cables in an antistatic bag. A fiber optic cable works on light impulses, so it is not sensitive to static electricity.

There is no need to store backup tapes in an antistatic bag. Backup tapes are magnetic media and are not susceptible to static electricity.
Objective: Safety and Environmental Issues

Networks: FTP servers and commands

You need to start an FTP session with an FTP server beginning at the command line.
You enter the FTP command at the command prompt and see the following prompt:
FTP>
Which command can you use to establish a connection to a server at IP address 135.61.85.1?
1. GET 135.61.85.1
2. >>OPEN 135.61.85.1
3. FTP 135.61.85.1
4. LOGIN: 135.61.85.1

Explanation : FTP can be initiated from a DOS, Windows 9x, or Windows NT/2000/XP command prompt provided that a connection to a network or the Internet is established first. To begin an FTP session, you first type FTP from the command line to get an FTP> prompt. To establish a connection with an FTP server at 135.61.85.1, from the FTP> prompt, type the following:
OPEN 135.61.85.1

The LOGIN command is the response the server will send when you try to connect to it. At the LOGIN: prompt, you would enter your user name or ID.

The GET command is used after you have logged on and want to copy a file from the remote computer to your computer.

After you are at the FTP> prompt, you would not use the FTP command again.
Objective: Networks

Operating Systems: Recovering from bad app installations

You are preparing to install an application on a user's computer, which is running Windows XP Professional.
How can you ensure that you can restore the system to its current state if the application does not work correctly after it is installed?

1. Use Last Known Good Configuration.
2. Create an Automated System Recovery (ASR) backup.
3. Save a copy of the Registry to a separate location.
4. >>Create a restore point.

Explanation : You should use System Restore to create a restore point. A restore point is a non-destructive way to revert a computer to a particular configuration state. Although some installation programs create a restore point, not all of them do. Therefore, to be safe, you should manually create a restore point before installing the application.

Creating an ASR backup will not meet the requirements. An ASR recovery is a destructive recovery that will reformat the hard disk and require you to reinstall all data files.

Saving a copy of the Registry to a separate location is not the best way to manage recovery. The Registry cannot be replaced manually while you are running Windows XP. Also, it is possible that all configuration changes made by the application will not be saved to the Registry. For example, a .NET Framework application might install a component in the Global Assembly Cache.

Last Known Good Configuration cannot be used to meet the requirements because it is likely you would not know the application is not working until the Last Known Good Configuration has been replaced by a new one. Last Known Good Configuration is updated each time you log on successfully

Objective: Operating Systems

Components: SCSI drives and controllers

Roberta's supervisor has asked her to daisy-chain five SCSI devices to her computer.
Which method can she use to accomplish this?

1. Attach each of the devices together by SCSI cable, in any sequence, with termination on the SCSI controller.
2. Attach each of the devices together by SCSI cable, in any sequence, with one end of the SCSI bus terminated.
3. Attach each of the devices together by SCSI cable in a required sequence.
4. >>Attach each of the devices together by SCSI cable, in any sequence, with both ends of the SCSI bus terminated.

Explanation : Roberta can attach each of the SCSI devices together by cable in any sequence, as long as she remembers to put a terminator on both ends of the bus. The other choices will not work because of the lack of proper bus termination.
SCSI buses (a chain of SCSI devices) must always be terminated on both ends, just like many kinds of network cable. Devices can be terminated in one of three ways:
* With a terminator block on the free end of the cable that was not designed for other connectors to plug into.
* With a terminator block plugged into the first unit on the chain. This block has two connections: one for the cable and one to plug into the device.
* With a self-terminating connector built into a device. Many devices can be set to terminate without the use of an external block.
Objective: Personal Computer Components

Security: XP service pack 2 features

What security enhancements are provided by installing Service Pack 2 on a computer running Windows XP Professional? (Select TWO.)
1. Anti-Spyware protection is installed.
2. Windows Security Center is installed.
3. >>Windows Firewall is enabled by default.
4. >>EFS is enabled by default.
5. Antivirus protection is installed.

Explanation : When you install Service Pack 2 on a computer running Windows XP, the Windows Security Center is installed. The Windows Security Center allows you to enable or disable Windows Firewall, Automatic Updates, and if an antivirus program is installed, virus protection.
When you install Service Pack 2, Windows Firewall is enabled by default. Windows Firewall is a packet filtering firewall that allows you to block certain types of network communication, such as unsolicited traffic on port 80.

Service Pack 2 does not install antivirus protection. However, a number of antivirus packages are available. You should choose one and install it on all computers.

Service Pack 2 does not install anti-spyware protection by default. However, a number of anti-spyware programs are available. You should choose one and install it on all computers that access the Internet.

Service Pack 2 does not enable Encrypting File System (EFS) by default. EFS is used to encrypt files stored on an NTFS partition. You can selectively enable EFS on specific folders and files.
Objective: Security

Networks: Valid IP addresses

Which IP address is valid?
1. 255.255.255.0
2. 192.168.0.256
3. >>192.168.0.254
4. 255.255.0.0

Explanation : An IP address consists of four eight-digit binary numbers called octets, separated by periods, for a total of 32 bits. The IP address identifies the network and the host in a network uniquely on the Internet. Each decimal number in an IP address is typically a number in the range 1 through 254. The subnet mask determines which portion is the network number and which portion is the host. If a subnet mask contains 255 in a position, the corresponding part of the address is the network number.

Any IP address beginning with 127 refers to the local host address and is used for internal loopback testing.

Any octet with a number greater than 255 is invalid because 8 bits can only represent a maximum of 255.

255.255.255.0 and 255.255.0.0 are subnet masks, not IP addresses.

Printers and Scanners: Limiting Access on Network printers

You are configuring a laser jet printer for the Marketing department. The printer is attached directly to the network. You need to limit access to the printer to only users in the Marketing department. Users should be able to delete their own documents from the print queue. The Marketing manager should be able to delete any document from the print queue.
What should you do?

1. On each user's computer, create a printer object. Grant the user Manage Documents permission to the printer object. On the Marketing manager's computer, create a printer object and grant the Manage Printers permission.
2. On each user's computer, create a printer object. Grant the user Print permission to the printer object. On the Marketing manager's computer, create a printer object and grant the Manage Documents permission.
3. >>Create a shared printer object on a computer running Windows XP, Windows 2000, or Windows Server 2003. Grant the Marketing group the Manage Documents permission. Grant the Marketing manager the Manage Printers permission.
4. Create a shared printer object on a computer running Windows XP, Windows 2000, or Windows Server 2003. Grant the Marketing group the Print permission. Grant the Marketing manager the Manage Documents permission.

Explanation : You should create a shared printer object on a computer running Windows XP, Windows 2000, or Windows Server 2003. Then you should grant the Marketing group the Print permission and the Marketing manager the Manage Documents permission. You can create a printer object that is mapped to a network-attached printer so that you can manage permissions and the print queue from a single computer. The computer with the shared printer object is a print server for the printer. The Print permission is required to allow users to print to a printer. Users with the Print permission can also manage their own documents in the queue. Managing other users' documents requires the Manage Documents permission.

You should not create a printer object on each user's computer. Doing so will cause multiple queues to be associated with the printer. The queue and permissions will not be managed separately.

You should not grant the Marketing group the Manage Documents permission. Doing so will enable them to manage any document in the queue.

You should not grant the Marketing manager the Manage Printers permission. Doing so will allow the manager to install printer drivers and modify printer configuration settings.
Objective: Printers and Scanners

Operating Systems: Modes for dealing with bad displays

Your neighbor's children were playing games on your Windows XP computer and in the process managed to modify the display settings to use white letters on a white background. Now all you can see on the Windows desktop are icons without titles, and all dialog boxes have no visible text.
What would be the best startup option to correct this problem?
1. Recovery Console
2. >>Enable VGA Mode
3. Debugging Mode
4. Enable Boot Logging

Explanation : Enable VGA Mode is used when the video setting is such that you cannot see the screen well enough to fix a bad setting. This can happen if a user creates a desktop with black fonts on a black background, or something similar to that. Booting in this mode gives you very plain VGA video display but allows you to change the settings in the Display properties.

The Enable Boot Logging option allows the system to boot normally while recording all files loaded during the boot process. The log is recorded in a file named NTBTLOG.TXT. The log will identify which drivers loaded and which failed. This is especially helpful if you have a copy of the NTBTLOG.TXT file that was created before there was a problem. You then could compare them to see what has changed.

Debugging Mode gives you the opportunity to move system boot logs from the failing computer to another computer for evaluation. To use this mode, you first must connect the failing computer to another computer using a serial cable. You then can review the boot logs on a functioning computer.

The Recovery Console does not start the graphical interface, but it does allow you to access any FAT16, FAT32, and NTFS file systems. The purpose of the Recovery Console is to allow you to repair a damaged registry, system files, or file system on the hard drive.
Objective: Operating Systems

Components: HDD UDMA settings and cables

After installing a new ATA-100, 80GB hard drive, you boot up the system and watch as the Power On Self Test (POST) displays information about the system on your monitor.
You notice the 80GB hard drive is correctly identified as 80GB, but it is listed as using UDMA/33.
How should you interpret this?
1. ATA-100 is actually UDMA/33 and this is normal.
2. >>Your hard drive ribbon cable is not an 80-conductor cable.
3. Your hard drive cable is not 40-pin.
4. Your hard drive ribbon cable is not installed correctly.

Explanation : The ATAPI-5 (AT Attachment with Packet Interface-5) standard approved in 2000 built on the ATAPI-4 standard and requires an 80-conductor cable for UDMA modes faster than UDMA/33 to be enabled. The 40- or 80-conductor cables are automatically detected.

ATA-100 should be displayed as UDMA/100.

If the ribbon cable was not 40-pin or not installed correctly, the hard drive would not have been detected at all.
Objective: Personal Computer Components

Safety & Environment: Monitors

What is the proper way to clean a CRT monitor?
1. Wipe it with window cleaner and an antistatic cloth.
2. Wipe it with an antistatic cloth.
3. Wipe it with water and an antistatic cloth.
4. >>Wipe it with soap and water.

Explanation : The proper way to clean a Cathode Ray Tube (CRT) monitor is to wipe it with an antistatic monitor cloth. A CRT monitor has a strong electrical charge and can only be discharged following very specific procedures. Therefore, you should use an antistatic cloth and not use any liquid on it because the liquid could seep inside the case and shock you or cause problems with the electrical components.

You should not use window cleaner and an antistatic cloth because window cleaner could get inside the monitor.

You should not use soap and water to clean the monitor. Water could get inside the monitor and cause electrocution or electrical problems.

You should not use water and an antistatic cloth. Water could get inside the monitor and cause electrocution or electrical problems.
Objective: Safety and Environmental Issues

Security: WIndows Security Center

Which of the following can you do through Windows Security Center in Windows XP?
1. Enable Windows Firewall.
2. Encrypt a data file.
3. >>Create a user account.
4. Change a user's password.

Explanation : Windows Security Center is installed with Windows XP Service Pack 2. It allows you to enable Windows Firewall, Automatic Updates, and the antivirus software you have installed. It also allows you to manage settings for these components.
Windows Security Center does not allow you to change a user's password. For that, you need to use the User Accounts utility or Local Users and Computers in Computer Management.

Windows Security Center does not allow you to encrypt a file. For that, you need to use Windows Explorer or the cipher command.
Windows Security Center does not allow you to create user accounts. For that, you need to use the User Accounts utility or Local Users and Computers in Computer Management.
Objective: Security

Networks: Pinging and Loopback

A user cannot access the network. You attempt to ping the loopback address and receive no response.
What are two possible reasons? (Select TWO.)

1. The network adapter is configured with an invalid IP address for the network.
2. The network adapter is configured with an invalid subnet mask for the network.
3. TCP/IP needs to be reinstalled.
4. >>The DHCP server is not functioning.
5. >>The network adapter is not functioning.

Explanation : Pinging the loopback address (127.0.0.1) tests whether the TCP/IP protocol stack is functioning correctly. If you cannot ping the loopback address, it means that TCP/IP drivers are not installed or corrupt or that the network adapter is not functioning.

The DHCP server assigns addresses on the network. It does not impact the ability to ping the loopback address on a client computer.

The loopback address is 127.0.0.1. A computer does not require a valid IP address on the network for the loopback address to respond.

The loopback address is not dependent on a correct subnet mask. The loopback address pings the local computer to verify the TCP/IP stack.
Objective: Networks

Operating Systems: Recovery Console

What storage locations can you access from Recovery Console in Windows XP? (Select TWO.)
1. Any internal hard drive
2. A network file share
3. A CD-ROM drive
4. Any location on drive C
5. >>The %systemroot% folder

Explanation : Recovery Console provides you with limited access to command-line utilities that can allow you to recover from system failures that prevent you from starting Windows, such as boot sector corruption, a service that is preventing startup, corrupt or missing operating system files, and hard disk problems. However, you are limited to accessing files at the root of the system partition, the %systemroot% folder, the cmdcons folder, and removable media drives.

You cannot access any location on drive C from Recovery Console except the locations noted above.

You cannot access any internal hard drive except the locations noted above.

You cannot access a network file share.
Objective: Operating Systems

Components: CRT Monitor

A user reports that her CRT display experiences sporadic problems, especially on hot days. It also has a high-pitched whine. What should you do? (Select TWO.)

1. Instruct the user to clean the monitor by spraying window cleaner on it and using a soft cloth.
2. Instruct the user to use a computer vacuum to clean the dust from the monitor's vents.
3. Open the monitor's case and verify that the cooling fan is functioning.
4. >>Ensure that there is sufficient airflow around the monitor.
5. >>Verify that the monitor's power cable is secure.

Explanation : A monitor generates a lot of heat. Therefore, you should ensure that there is enough ventilation around the monitor.

The high-pitched whine generally indicates that the monitor is dirty on its interior. You can clean the inside of a monitor by using a computer vacuum along its vents.
You should not clean a monitor by spraying any liquid on it. Doing so could cause the liquid to get inside the monitor and damage it.

You should not open a Cathode Ray Tube (CRT) monitor. Doing so can cause electrical shock or even death unless you are specially trained to work on CRT monitors.

Verifying that the monitor's power cable is secure will not resolve the problem. A loose power cable would prevent the monitor from functioning. It would not cause a high-pitched whine. The sporadic problems are caused by heat, so a loose cable is unlikely to be the cause of the problem.

Objective: Personal Computer Components

Operating Systems: ASR, System Restore, NTBACKUP and Backup/Restore

You are preparing to install a new application on a customer's Windows XP computer. If there is a problem with the installation, you need to be able to quickly revert the computer to the way it was before the installation.
What should you do?

1. Use the Backup and Restore utility to back up system state data before running the application setup program.
2. >>Use the System Restore utility to set a restore point before running the application setup program.
3. Use the Automated System Recovery (ASR) Wizard to create an ASR backup before running the application setup program.
4. Use the Ntbackup command to set a restore point before running the application setup program.

Explanation : You should use the System Restore utility to set a restore point before running the application setup program. The restore point sets a point to which you can recover, restoring the computer to that point. Changes made to system configuration files and the system registry since that point are reversed and returned to their original settings. It also reverses changes made to application configuration files. This is done without loss of personal data files. You can either use the System Restore utility to restore to that point or use Advanced startup options to go directly to System Restore when booting into Safe mode.

You should not use the Ntbackup command to set a restore point before running the application setup program. The Ntbackup command lets you back up and restore the computer, but it does NOT let you set a restore point.

You should not use the Backup and Restore utility to back up system state data before running the application setup program. A system state backup does back up critical system files, such as the registry and boot files, but it does not back up everything that you need to revert the system to a state identical to that before the installation. For example, system state backup does not back up any application file configuration settings.

You should not use the Automated System Recovery (ASR) Wizard to create an ASR backup before running the application setup program. ASR gives you a way to get a system back up and running quickly after a catastrophic failure, but it does not let you recover to a known point.
Objective: Operating Systems

Components: Alarms and Troubleshooting

After upgrading the motherboard, CPU, and RAM in a PC with a 2.4 GHz Pentium 4 CPU, a compatible motherboard, and 256MB of DDR-SDRAM, you start the PC for the first time to load drivers.
After approximately one minute, the system locks up and begins to sound an audible alarm.
What might cause this problem?

1. The DDR-SDRAM chips are incompatible with Pentium 4 CPUs.
2. The DDR-SDRAM chips were installed backwards.
3. >>The CPU cooling fan is not working.
4. The alarm is normal and means it is time to install an operating system.

Explanation : The CPU cooling fan not working is the only possible choice. Since the motherboard, CPU, and RAM were all upgraded, it is logical that one of these components is the cause of the problem. Since the system actually started and ran for one minute, the most likely cause is that the CPU began to overheat. A defective or improperly installed cooling fan would cause the CPU to overheat.

DDR-SDRAM chips are physically keyed to prevent them from being installed backwards.

DDR-SDRAM will work with Pentium 4s on compatible motherboards.

There is no alarm that sounds when it is time to install an operating system.
Objective: Personal Computer Components

Operating Systems: Installs and Upgrades

A computer is configured with two disk partitions identified as drive C and D. Windows 2000 Professional is installed on drive C. You need to install Windows XP Professional as the only operating system on the computer. When you are finished, the computer must have the same data files as before installation and must run the same applications.
What should you do?

1. Install Windows XP Professional on drive C in the same directory as Windows 2000 Professional.
2. Install Windows XP Professional on drive C, but in a different directory than the Windows 2000 Professional directory.
3. Install Windows XP Professional on drive D and uninstall Windows 2000 Professional.
4. >>Install Windows XP Professional on drive D and then run the Files and Settings Transfer Wizard.

Explanation : You should install Windows XP Professional on drive C in the same directory as Windows 2000 Professional. This will cause the installation to run as an upgrade installation. Applications will be available automatically after running the upgrade. No changes were made to the data files, so they are still available. Because you upgraded the operating system, Windows 2000 Professional is no longer available, so all requirements are met.

You should not install Windows XP Professional on drive C, but in a different directory than the Windows 2000 Professional directory. This would install Windows XP Professional as a separate operating system, leaving Windows 2000 Professional in place. This configuration, two operating systems installed on the same disk partition, is strongly discouraged by Microsoft. Also, you have done nothing to make the applications available when running Windows XP. They would have to be installed separately.

You should not install Windows XP Professional on drive D and uninstall Windows 2000 Professional. This does nothing to make the applications available when running Windows XP.

You should not install Windows XP Professional on drive D and then run the Files and Settings Transfer Wizard. The Files and Settings Transfer Wizard is designed to transfer data and application settings between computers. Also, you would still have Windows 2000 Professional available on the computer, and you would still need to install the applications under Windows XP Professional to make them available.

Components: BIO and HDD capacity

You install a new, high-capacity hard disk as a secondary (slave) hard disk. The computer does not recognize the hard disk's full capacity. The computer is running Windows XP Professional.
How can you correct this problem?
1. Configure the hard disk as the primary (master) hard disk.
2. Install additional RAM.
3. Install the most recent hot fixes to the operating system.
4. >>Upgrade the computer's BIOS.

Explanation : You should upgrade the computer's BIOS. The most likely reason that a computer running Windows XP cannot access a hard disk's full capacity is that the BIOS cannot recognize the hard disk's full capacity. The most common fix is to update the BIOS to the most recent version. In some cases, the hard disk manufacturer will provide a BIOS patch for this purpose. If the BIOS is already updated to the current revision, the problem could be that auto-discover is not enabled for the computer. Auto-discover, in some cases, enables the computer to determine the hard drive's configuration automatically. However, if the BIOS is not up-to-date, auto-discover may not correct the problem, so you should first flash the BIOS if an update is available.

You should not install the most recent hot fixes to the operating system as a way to correct this problem. The problem is with the BIOS, not with the operating system.

You should not configure the hard disk as the primary (master) hard disk. The supported capacity is not dependent on whether the hard disk is configured as the primary or secondary hard disk. Either way, the computer will recognize the same hard disk capacity.

You should not install additional random access memory (RAM). Whether or not the computer is able to recognize the hard disk's capacity does not rely on the amount of RAM installed.
Objective: Personal Computer Components
Sub Objective(s):

Operating Systems: Hotfix

How can you remove a hotfix that was applied through automatic updates on a Windows XP computer?

1. Manually delete the hotfix files and reverse any registry changes.
2. >>Revert to the restore point created when the hotfix was installed.
3. Manually download and run the Setup file for the hotfix.
4. Use Add or Remove Programs.

Explanation : To remove a hotfix, whether it is installed manually or through automatic updates, you should use Add or Remove Programs. Open the Control Panel and launch Add or Remove Programs. Locate the hotfix that you want to remove and click Remove. (You may need to select the Show updates option to see the hotfix listed.) Follow the prompts to remove the hotfix and restore any configuration settings. It may be necessary to restart the computer when you are finished.

Occasionally, if there is a known issue with a hotfix, Microsoft will include a removal application with the hotfix. In that case, you can either use the removal application or remove the hotfix through Add or Remove programs, as already described.

You should not revert to the restore point created when the hotfix was installed. This will work only if a restore point was automatically created and if there have not been any other configuration changes made since the hotfix was applied. If other changes have been made, these would also be lost when you revert to the restore point.

You should not manually download and run the Setup file for the hotfix. Windows XP will just reapply the hotfix, not remove the hotfix.

You should not manually delete the hotfix files and reverse any registry changes. You could end up deleting critical system files. Also, configuration changes made when you applied the hotfix were not necessarily made to the registry, or to the registry only.
Objective: Operating Systems

Components: BIOS, POST and RAM

What does the memory test that occurs at boot up do?
1. >>Counts RAM memory locations
2. Tests CPU burst speed
3. Counts HDD memory locations
4. Tests RAM refresh rate and speed
5. Tests HDD memory locations
6. Tests ROM memory locations

Explanation : During the Power-On Self-Test (POST) process at boot up, a PC checks the basic hardware before loading the operating system. One of the hardware tests performed is a physical memory (RAM) check. The system performs a write and a read to each memory location to make sure all memory locations are good. It also counts each location, sequentially, to make sure memory addresses map to contiguous (adjacent or physically consecutive) physical memory. The memory test does not test RAM refresh rate and speed. It only tries to write and then read from each cell. The test either passes or fails. If the memory test fails, the system doesn't know whether it is because the RAM refresh rate or read/write speed is wrong or because the memory cell is bad.

The memory test that occurs at boot up does not count or test hard disk drive (HDD) memory locations. It does not test Read-Only Memory (ROM) locations, although it performs a checksum (a simple count) to make sure the BIOS instructions are all there and intact. It performs a CMOS memory check to make sure the contents of CMOS have not changed (as can happen if the backup battery has gone bad).

POST does not test microprocessor (CPU) speed. It only checks to see if the CPU is present and working, and then resets it to begin executing the BIOS program.
Objective: Personal Computer Components

Operating Systems: Restoring deleted applications

While troubleshooting a Windows XP computer, you decide to try to uninstall some recently installed applications. After uninstalling two different programs from your computer, you realize that the problem still exists and you want the programs back.
Which utility can you use to recover the uninstalled programs for which you cannot find the original installation disks?
1. >>System Restore
2. Recycle Bin undelete
3. Recovery Console
4. Add/Remove Programs

Explanation : Using System Restore, you can restore the computer to a state prior to the occurrence of a problem. System Restore functions like an UNDO feature for Windows XP configuration changes. System Restore consists of two parts: file monitoring and restore point management. Files are monitored and changes recorded as restore points. If a restore point was created at any time prior to the uninstallation of the program, you can restore the system to the state it was at the time the restore point was created. If no restore point exists, recovery using System Restore will not be possible.

The Recycle Bin can be used to retrieve recently deleted files and folders. Programs that are uninstalled are not sent to the recycle bin.

The Add/Remove Programs applet is helpful when trying the install new programs but requires that you have the original installation disks.

The Recovery Console does not start the graphical interface, but it does allow you to access any FAT16, FAT32, and NTFS file systems. The purpose of the Recovery Console is to allow you to repair a damaged registry, system files, or file system on the hard drive.
Objective: Operating Systems

Components: USB

What is the maximum number of devices that you can connect through Universal Serial Bus (USB) on a PC with a single USB host controller?
1. 63
2. 126
3. >>127
4. 4
Explanation : You can connect up to 127 USB devices to a PC with a single USB host controller. A PC typically has two or more USB ports. Additional devices can be connected through USB hubs that provide additional device ports. There are two USB standards currently in use. USB 1.1 support data transfer up to 12 megabits per second (Mbps). USB 2.0 has three operational modes, 1.5 Mbps in low-speed mode, 12 Mbps in Full-speed mode, and 480 Mbps in High-speed mode. USB 2.0 is backward compatible with USB 1.1 devices.

FireWire (IEEE 1394), which is somewhat similar to USB 2.0, supports up to 63 devices. Most new computers include connectors for both USB and FireWire devices.
Objective: Personal Computer Components

Operating Systems: Device Manager

What does an exclamation mark next to a device in Windows Device Manager mean?
1. The device has been removed, but it is still configured as a connected device.
2. Windows cannot find the drivers for the device.
3. The device has been disabled.
4. >>The device configuration settings conflict with another device.

Explanation : An exclamation mark next to the device name in Windows Device Manager indicates that the device configuration settings conflict with another device. The correction is to change the configuration settings for one or both devices.

An exclamation mark next to the device name in Windows Device Manager does not indicate that Windows cannot find the drivers for the device. This is indicated by the device being listed in the Other Devices category. The icon next to the device name in Device Manager varies.

An exclamation mark next to the device name in Windows Device Manager does not indicate that the device has been disabled or removed. These conditions are indicated by a red "X".
Objective: Operating Systems

Components: RAID

You are configuring a computer running Microsoft Windows 2000 Server. You need to configure the computer for maximum disk performance and throughput for the hard disks. Disk configurations will be implemented through operating system software.

Which disk configuration should you use?
1. >>Two hard disks configured to support RAID 0.
2. Two hard disks configured to support RAID 1.
3. Two hard disks configured as stand-alone (independent) drives.
4. Three hard disks configured to support RAID 5.

Explanation : You should use two hard disks configured to support RAID 0. RAID, which stands for either Random Array of Inexpensive Disks or Random Array of Independent Disks (depending on who you ask), provides disk configurations designed to maximize performance, fault tolerance, or both.

RAID 0 is a configuration with two or more non-redundant hard disks. Data is striped across the hard disks, which means that data is written in a pattern that alternates between the disks. This provides fast disk performance because of the use of split reads and writes when processing data on the drives. The major disadvantage of this configuration is that if you lose either hard disk, all data on both hard disks is lost.

You should not use two hard disks configured as stand-alone (independent) drives. You can get some improvement in disk performance over a single hard disk, but the performance increase would be much less than that from a RAID 0 disk configuration.

You should not use two hard disks configured to support RAID 1. A RAID 1 configuration has two hard disks with duplicate data. When the computer writes to one hard disk, it also writes to the other, called the mirror, so that the data remains the same on both. You can see a marginal performance improvement during disk reads over a single hard disk. The primary advantage of this configuration is that it is fault tolerant. You can lose either hard disk without losing any data.
You should not use three hard disks configured to support RAID 5. RAID 5 is a disk striping with parity configuration. It is similar to RAID 0 in that data is striped across the disks, but so is parity information. The parity information is used to check for data errors and can be used to recreate the data if any one hard disk is lost, so this is a fault tolerant configuration. When implementing RAID 5 through software, as in this case, performance is not as good as for RAID 0 because of the overhead needed to create parity information during disk writes and check parity information during disk reads.
Objective: Personal Computer Components

Operating Systems: Safe Mode and Recovery Console

What would be the next logical step in the repair process if a Windows XP computer fails to start in Safe Mode with Command Prompt Mode?
1. Safe Mode with Networking
2. Enable VGA Mode
3. Last Known Good Configuration
4. >>Recovery Console

Explanation : If booting a system using Safe Mode with Command Prompt fails, you should use the Recovery Console. The Recovery Console does not start the graphical interface, but it does allow you to access any FAT16, FAT32, and NTFS file systems. The purpose of the Recovery Console is to allow you to repair a damaged registry, system files, or file system on the hard drive.

Safe Mode boots the operating system with a minimum configuration and can be used to solve problems with a new hardware or software installation, or problems caused by user settings. Safe Mode boots with the mouse, basic video, keyboard, and mass storage drivers loaded. It uses the default system services (not any extra services) and does not provide network access. It does provide a graphical interface. With the graphical interface enabled, you can use the normal Windows tools and utilities to correct the problem.

Safe Mode with Command Prompt is the same as Safe Mode but does not load the graphical interface. Many standard Windows tools and utilities do not run without the graphical interface.

Safe Mode with Networking is the same as Safe Mode, but the drivers necessary to access the network are loaded. This is useful if you need to access the network to download replacement drivers.

Windows NT, 2000, and XP all keep a copy of the Last Known Good Configuration in the registry. If something is configured incorrectly, you can restore the settings used for the last successful boot using the Last Known Good option. Any settings changes made since the last successful boot will be lost.
Objective: Operating Systems

Operating Systems: Primary and Extended Partitions

What is the maximum number of extended partitions that can be created on a hard disk in a computer running Windows XP Professional?
1. >>One
2. Two
3. Three
4. Four

Explanation : You can create no more than one extended partition on a single hard disk. A hard disk can have up to four partitions total, but only one of these can be an extended partition. You can create multiple logical drives from a single extended partition.

You can create up to four primary partitions on a hard disk, or one extended partition and up to three additional primary partitions. The total number of primary and extended partitions cannot exceed four on a computer running Windows XP. If you do create multiple partitions, no more than one can be an extended partition.

Objective: Operating Systems

Components: D connectors

What is a female DB-25 connector (also called a 25-pin "D" connector) most often used for?
1. MIDI port
2. Graphics port
3. >>Parallel port
4. Network (AUI) port
5. Serial port
6. Game/Joystick Port

Explanation : A female 25-pin D connector (also called a 25-pin DB connector) is typically used for parallel communication ports.

Two-row, 15-pin D connectors are typically used for sound/game cards (labeled "Game" or "Joystick"). A Musical Instrument Digital Interface (MIDI) port on a sound card often uses a 15-pin D connector to connect to external MIDI devices. Some sound cards must be configured (via jumper or software) to use the 15-pin port as either a MIDI or a joystick connector.

Certain network cards use 15-pin, two-row D connectors. 10Base-5 Thicknet Ethernet uses cable-piercing transceivers that connect to the network adapter card via a drop cable and an AUI or DIX 15-pin D connector. 10Base-T Ethernet network adapters use 8-pin modular connectors similar to modular telephone plugs, but some Ethernet network adapter cards include a BNC and/or a 15-pin D connector.

The graphics port (called a VGA or SVGA port) is a three-row, 15-pin D connector.

Serial ports use 9-pin D connectors. Older systems use 25-pin D connectors, but these are becoming obsolete.
Objective: Personal Computer Components

Operating Systems: Automating Tasks

You want to automate when Microsoft Windows XP defragments your hard drive.
What tool allows you to automate Disk Defragmenter?
1. Disk Cleanup
2. >>Scheduled Tasks
3. File and Settings Transfer Wizard
4. Disk Defragmenter

Explanation : You can use Scheduled Tasks to schedule a program to run at a specific time. This can include Disk Defragmenter.

You can use Disk Defragmenter to defragment your drives, but you cannot schedule a time without using Scheduled Tasks.

You use Disk Cleanup to delete unnecessary files from your computer to reclaim disk space. Disk Cleanup cannot schedule Disk Defragmenter.

You use the File and Settings Transfer Wizard to transfer files and settings from one computer to another. The File and Settings Transfer Wizard cannot schedule Disk Defragmenter.
Objective: Operating Systems

Components: HDD ribbon cables

You are installing a new hard drive, and you set the jumpers according to the instructions.
When you are ready to install the ribbon cable, what must be done to connect it to the hard drive?
1. The ISA connector on the disk controller card must be aligned properly in EISA-type motherboard connectors.
2. The power connector must be aligned with the red wire on the power cable.
3. The jumper settings on the drive must be set to select whether a straight data cable or a cable with a twist is used.
4. >>The data connector must be aligned with the red stripe on the data cable to match pin 1 on the hard drive.

Explanation : A hard disk drive is connected to a computer system with two cables, one for power and one for data. The power cable is connected through a Molex connector, which can only be plugged in one way.

For data, the ribbon cable uses a connector, which may or may not be keyed. It is important to make sure that pin 1 on the drive controller is connected to pin 1 on the drive. A colored wire or stripe on one side usually designates pin 1 on the ribbon cable. Pin 1 on the connector is usually designated by a "1" next to pin 1, an arrow pointing to pin 1, or a square solder pin on the back of the connector header.
Objective: Personal Computer Components

Operating Systems: FAT vs NTFS

You want to use the encryption feature in Windows 2000 to encrypt a directory.
Which file system must be used on the partition where the directory is located?
1. FAT32
2. >>NTFS5
3. HPFS
4. NTFS4

Explanation : NTFS4 is the file system included in Windows NT. It offers several advantages over FAT, including smaller cluster sizes and file-level security. It does not support file encryption.

NTFS5 is the updated version of the file system that was included with Windows 2000. It offers several new features, including encryption of individual files and folders, compression of individual files and folders, and the ability to set disk space quotas.

HPFS (High Performance File System) is used by the IBM Operating System, OS/2.

FAT32 is supported by Windows 2000 but cannot be used for file encryption.
Objective: Operating Systems

Components: HDD connectors and ribbons

What type of hard disk uses cables with seven conductors?
1. Parallel ATA (PATA)
2. Small Computer System Interface (SCSI)
3. Integrated Drive Electronics (IDE)
4. >>Serial ATA (SATA)

Explanation : SATA disks use cables with seven conductors. The SATA interface was developed as a replacement for the PATA interface. The SATA interface uses fewer conductors than other PC hard disk interfaces and provides higher data rates.

PATA hard disks are currently the type most commonly used in desktop PCs. The drives have a 40-pin connector and current drives use an 80-conductor cable. The additional 40 conductors are ground lines designed reduce interference between the lines and provide a more reliable interface.

SCSI hard disks use various interface configurations depending on the SCSI version and whether the drive is configured to support a narrow (8-bit) or wide (16-bit) interface an addressing. However, none of the SCSI interfaces in current use have a seven conductor table.

The IDE interface was designed for use in PC and is the interface on which the newer ATA interface versions are based. IDE hard disks have a 40-pin connector and use 40-conductor cables. The term IDE is sometimes (and incorrectly) used to refer to PATA drives.
Objective: Personal Computer Components

Operating Systems: Disk Maintenance Procedures

Which of the following should you recommend that a customer perform on a regular basis as part of customer's regular, planned maintenance procedures on a mission-critical computer?

1. Have the customer defragment the hard disk monthly.
2. >>Have the customer run daily backups.
3. Have the customer refresh the Automated System Recovery (ASR) monthly.
4. Have the customer delete any remaining system restore points each week.

Explanation : You should have the customer run regular daily backups. Backups are the surest way of recovery after a catastrophic failure. On a critical system, daily backups are typically recommended as the preferred schedule.

You should not have the customer refresh the Automated System Recovery monthly. ASR is considered the last-ditch effort for recovering a non-booting computer. The ASR includes critical system files needed to start up the system but does not include user data. Unless major changes are made to the operating system, there is typically no reason to update the ASR.

You should not have the customer delete any remaining system restore points each week. System restore points let you revert to an earlier state in case of problems. Some potential problems, such as viruses, are not immediately apparent, so you should keep multiple generations of system restore points.

You should not have the customer defragment the hard disk monthly. This does not necessarily cause any problem, but it would be a waste to the customer's time. Fragmentation occurs over time, and it is very unlikely that a computer would need to be defragmented every month.
Objective: Operating Systems