You are on page 1of 10

A customer is considering an inkjet printer to print batches of colored documents that will be immediately stacke and packaged for

shipping. What advice should a technician give the customer? The resolution of an inkjet printer is too low for this work. An inkjet printer has limited color capability. Immediately after printing, the ink is wet. An inkjet printer is a high cost option. 2 A laptop user has noticed that connecting an external monitor, keyboard, and speaker each day is causing damage to the laptop connectors. What can the user do to prolong the life of the connectors? Obtain devices which are specially designed for heavily used laptops. Use only PCI devices. Attach all of the devices to a USB hub. Use a docking station. 3

A technician has been asked to find how a hacker keeps breaking in to a computer. Which security precaution was most likely missed when the operating system was first installed? A user account was not created. The hard drive was not formatted with NTFS. The OS product key was not entered. A password was not assigned to the default administrator account. When analyzing a protocol used on the network, it is discovered that multicast messages are being sent to network devices. Which class of IP addressing is being used to send these messages? A B C D E

5 A supervisor received a complaint that one of the technicians was rude and disrespectful. Which action by the technician most likely caused the customer to complain? The technician interrupted a number of times to ask questions. The technician occasionally confirmed an understanding of the problem. The customer was escalated to a level-two technician. The technician ended the call without saying "Have a nice day". 6 A technician is troubleshooting a computer that is experiencing hardware failure detected by the BIOS. What one way this failure is indicated?

The computer emits a pattern of beeps indicating the failing device. The computer returns an error message indicating the I/O address of the failing device. 7

Refer to the exhibit. Which type of device uses the connector shown in the graphic? DVD drive keyboard NIC RAM sound card 8 Which type of cable standard uses a 9-pin connector and supports data rates in excess of 800 Mbps? DB-9 DB-25 IEEE 1284 IEEE 1394a IEEE 1394b 9 What must be done before a technician cleans a very dirty LCD screen on a laptop? Place the laptop in standby mode. Remove the screen from the laptop. Remove the battery. Enable the autoclean setting in the BIOS.

10 Why does the cable from the power supply to the motherboard have different colored wires? A single wire could not carry enough current. There is one wire for each motherboard component. Each wire carries a different voltage. The motherboard slot requires the number of wires that are represented by the different colors.

11 A user reports that a printer is printing unknown characters on documents. What is a possible solution to this issue? Replace the toner or ink cartridge.

Uninstall and reinstall the printer driver. Replace the paper with some from a new ream. Delete the print job from the queue and print again. 12 Which program checks for installed hardware during the Windows XP boot process? HALL NTLDR NTDETECT NTOSKRNL

13 A technician needs to purchase a new video adapter for a computer. Which factors should be considered whe selecting the adapter? type of hard drive installed amount of memory installed expansion slot type case form factor 14 What are two functions of a VPN gateway? (Choose two.) establish secure VPN connections provide remote user access to the VPN client software manage VPN tunnels ensure low latency connections to VPN clients establish high bandwidth WAN connections to the Internet 15 Which protocol dynamically assigns IP addresses to network devices? DHCP DNS ICMP RARP TCP What is the best way to fully ensure that data is unable to be recovered from a hard drive? formatting the drive deleting the partitions on the hard drive overwriting data multiple times, rendering the data unusable shattering the hard drive platters with a hammer

17 A student wishes to buy a computer suitable for game playing. What CPU speed would be appropriate for ga playing? 44.1 MHz

100 MB/s 3 GHz 1 TB 18 Which two interface types make it possible to attach different external components to laptops and desktops without powering the computer off? (Choose two.) ExpressCard FireWire ISA PCI PCMCIA USB

19 What characterizes spoofing? Making data appear to come from a source other than the actual source. Sending abnormally large amounts of data to a remote server to prevent user access to the server services Intercepting or inserting false information in traffic between two hosts. Sending bulk e-mail to individuals, lists, or domains intending to prevent users from accessing e-mail. 20 Fans that are used to help cool a system are commonly placed on which two components? (Choose two.) sound card CMOS video card RAID card CPU 21 A network administrator has finished migrating from a peer-to-peer network to a new client-server network configuration. What are two advantages of the new configuration? (Choose two.) The total cost of the new solution is considerably lower. Data is more secure in the event of hardware failures. Individual users are in control of their own computers and network resources. Data resources and access are centrally controlled. Personnel costs are lower because a dedicated network administrator is no longer necessary.

22 The IT department reported that the web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which attack characterizes this type of situation? adware DDoS phishing

social engineering spyware

23 A Windows XP laptop user finds that the low battery alarm does not give enough warning. Where can the us adjust the alarm setting to issue an earlier warning? in Power Options Properties in the BIOS in the System Tray on the desktop on the battery

24 The driver for a network interface card has been updated on a Windows XP computer. All network access ha been lost. Which steps in the Windows XP Classic View should be followed to roll back the network interfac card driver? Choose Start > Settings > Control Panel. Double-click System. Click the Hardware tab. Choose Devi Manager. Double-click the NIC adapter. Click the Driver tab. Click the Roll Back Driver button. Choose Start > Settings > Control Panel. Double-click Network Connections. Right-click the NIC. Choose Properties > Uninstall. Choose Start > Settings > Control Panel. Double-click System. Click the Hardware tab. Choose Devi Manager. Choose Action > Uninstall. Choose Start > Settings > Control Panel. Double-click Add or Remove Programs. Click Change. 25 Which three things should be investigated first when troubleshooting a printer? (Choose three.) equipment power corrupt print driver low-ink warning out of paper operating system compatibility firmware version

26 A technician installed Windows XP on a 20 GB SCSI drive but when the computer is started a NTLDR error message is displayed. Based on this information which file was most likely corrupted during installation? NTBOOTDD HAL NTSCSILDR NTWINHAL

27 Which three customizable properties are available when right-clicking the Windows XP My Computer deskt icon and selecting Properties? (Choose three.) virtual memory settings automatic updates settings hard drive properties

computer name display properties startup properties

28 What are two network requirements necessary to establish a VPN connection between a remote computer and private company LAN? (Choose two.) low latency network connection secure Web server Internet access PSTN access VPN client

A customer is experiencing repeated paper jams on a laser printer. Which quick solution might correct this proble Power cycle the printer. Download and install a new printer driver. Replace the paper in the input tray with new paper. Remove and replace the primary corona wire. 32 Which key or key sequence pressed during the boot process will allow a user to restart a Windows PC using last known good configuration? F1 F8 F12 Alt-Z Windows key 33 A customer who owns a business that creates high-quality color graphic images wants a new printer. The customer already has an ink-jet printer. Which type of printer would be a good recommendation? dot-matrix solid-ink daisy-wheel thermal 34 Which two items are considered proper cleaning tools? (Choose two.) compressed air antistatic mat soft cloth antistatic wrist strap flat-head screwdriver

35 A technician notices that an application is not responding to commands and that the computer seems to respo slowly when applications are opened. What is the best administrative tool to use correct this problem? Task Manager Add or Remove Programs Event Viewer System Restore

36 When installing a network adapter into a client computer, a technician notices that the contacts on the adapte need to be cleaned. Which solution should the technician use to clean the contacts? glass cleaner isopropyl alcohol mild detergent rubbing alcohol slightly abrasive cleanser

37 A technician is planning to convert a file system from FAT32 to NTFS. What step should be taken before do the conversion? Create a complete system backup. Backup the registry. Set a System Restore Point. Create an Emergency Repair Disk.

38 After Windows XP has been installed, which program would a technician use to select the programs that will at startup? ntldr regedit msconfig Task Manager 39 At which TCP/IP model layer would a MAC address be found? application transport internet network access

40 In the event of a catastrophic system or hardware failure, which Windows XP utility provides a framework f saving and recovering the operating system? Emergency Repair Disk (ERD) Automated System Recovery (ASR) Windows Recovery Manager (WRM)

Automated Windows Recovery (AWR) System Restore (SR)

41 A network specialist has been hired to install a network in a company that assembles airplane engines. Becau of the nature of the business, the area is highly affected by electromagnetic noise. Which type of network me should be recommended? Category 5e coaxial fiber optic UTP 42 Which option is the most secure type of user authentication? smart card username and encrypted password signature files fingerprint scanner

43 Which environmental factor helps ensure optimal performance for laptops? The humidity level should always be below 20 percent. Temperature should be preferentially between 45 to 90 degrees Fahrenheit (7 to 32 degrees Celsius) to av overheating. In dusty conditions, laptop vents should be partially covered to prevent the internal components from get dirty. Laptops should be cleaned every month or the internal components will be damaged. 44 Which type of power connector is used to connect devices such as optical drives and hard drives? 20-pin 24-pin Berg Molex P8 P9 45 Which power management method offers the most power management features? ACPI AMP APM UPS WPM

What is the purpose of using thermal compound when installing a CPU, a heat sink, and a fan assembly on a motherboard? to insulate the CPU from the heat sink to attach the heat sink firmly to the CPU to conduct heat that is generated by the CPU to the heat sink to ensure an electrical connection between the CPU and heat sink 47 A customer reports poor telephone communications when using a copper telephone line that also has a DSL service. What is the most likely cause of the problem? The DSL modem is incorrectly configured. The DSL filter is faulty or not connected. The HSDPA (High Speed Data Packet Access) is interfering with the telephone operation. The telephone does not comply with the IEEE 802.15.1 standard. 48

Refer to the exhibit. What type of device is highlighted in white? touch pad mouse biometric authentication Bluetooth 49

Refer to the exhibit. Which type of removable media is depicted? hard disk USB optical drive PC card flash drive 50 Which type of scanner generally has high costs but produces top-quality images? all-in-one drum handheld flatbed Which three rules increase the level of password strength? (Choose three.) Passwords should never expire. Passwords should be a combination of letters and numbers. Passwords should combine a user's special dates and initials so they can be alphanumeric. Passwords should be changed by the user after specific periods of time. Password expiration and lockout policies should be clearly defined. Passwords should be short to reduce the chances of users forgetting them.

You might also like