220-601 With Answers
220-601 With Answers
QUESTION 1:
Which of the following are SCSI types that allow for 16 devices, including the
adapter, to be connected on a single shared cable?
Explanation: Wide SCSI buses support 16 devices, rather than the 8 devices
specified in regular SCSI.
Incorrect Answers:
QUESTION 2:
Which of the following is the SCSI ID number generally recommended for the
CD-ROM?
A. ID 0.
B. ID 5.
C. ID 2.
D. ID 3.
Answer: D
Explanation: Every other device can be set to any number as long as it's not in use.
It is a recommended practice in IT community to set the SCSI ID number for
CD-ROM drives to 3.
Incorrect Answers:
A: Setting the bootable (or first) hard disk to ID 0 is the accepted IT community
recommendation.
B: ID 3 would be the better choice to assign to the CD-ROM drive.
C: ID 2 is usually set aside for the Floppy drive.
QUESTION 3:
What do you call the part of a CD-ROM drive's head assembly that moves across
the disk to read it?
A. Read/Write Actuator.
B. The Mechanical Frame.
C. The Head Actuator.
D. The Disk Spindle.
Answer: C
Explanation: The head actuator is the device that physically positions the read/write
heads over the correct track on the surface of the disk. It is called the same for
CD-ROMs, hard drives and floppy disks.
QUESTION 4:
The new Certkiller .com trainee technician wants to know which of the following has
a transfer rate of 40 MBps and a maximum cable length of 12 meters. How will you
reply?
A. SCSI-2
B. Ultra 2 SCSI
C. Ultra Wide SCSI
D. Fast SCSI
E. Ultra SCSI
F. Fast Wide SCSI
Answer: B
A: SCSI 2 has a transfer rate of 5Mbps and a maximum cable length of 6 meters
C: Ultra Wide SCSI has a transfer rate of 40Mbps and a maximum cable length of 1.5
meters
D: Fast SCSI has a transfer rate of 10Mbps and a maximum cable length of 3 meters
E: Ultra SCSI has a transfer rate of 20Mbps and a maximum cable length of 3 meters
F: Fast Wide SCSI has a transfer rate of 20Mbps and a maximum cable length of 1.5
meters
QUESTION 5:
A. BTX
B. AT
C. NLX
D. ATX
Answer: D
QUESTION 6:
Which of the following BEST describes the difference between the "baby" AT and
ATX motherboards?
A. The "baby" AT motherboard allows for the installation of more than two full-length
expansion cards whereas the ATX motherboard allows for only one or two.
B. The processor, memory, and expansion slots are all in line with each other on a "baby"
AT motherboard, whereas the ATX motherboard has the processor and memory slots at
right angles to the expansion cards.
C. The ATX motherboard allows for the installation of more than two full-length
expansion cards, whereas the "baby" AT allows for only one or two.
D. The "baby" AT motherboard has a 20-pin power connector while the ATX has a
12-pin power connector.
Answer: B, C
are all in line with each other. Because the processor and memory were in line with
the expansion slots, only one or two full-length cards could be used. Also, the
processor was far from the power supply's cooling fan and would therefore tend to
overheat unless a heat sink or processor fan was directly attached to it. To overcome
the limitations of the "baby" AT design, the ATX motherboard was designed. The
ATX has the processor and memory slots at right angles to the expansion cards.
This puts the processor and memory in line with the fan output of the power supply,
allowing the processor to run cooler. And, because those components are not in line
with the expansion cards, you can install full-length expansion cards in an ATX
motherboard machine.
Incorrect Answers:
A: Because the processor and memory were in line with the expansion slots, only one or
two full-length cards could be used. Also, the processor was far from the power supply's
cooling fan and would therefore tend to overheat unless a heat sink or processor fan was
directly attached to it.
D: The ATX motherboard has a 20-pin power connector that accepts a single power
connector while the AT motherboard has a 12-pin power connector for the P8 and P9
connectors.
QUESTION 7:
A. 66 MHz
B. 133 MHz
C. 266 MHz
D. 533 MHz
Answer: D
Explanation: The AGPx8 has a clock speed of 533 MHz and has a transfer rate of
about 2.1GB/s.
Incorrect Answers:
A: The original specification for AGP (AGPx1) has a clock speed of 66 MHz.
B: AGPx2 has a clock speed of 133 MHz.
C: AGPx4 has a clock speed of 266 MHz.
QUESTION 8:
HOTSPOT
Where on the following exhibit would you insert Random Access Memory (RAM)?
Explanation: On an ATX motherboard, the RAM expansion slots are located at 90°
to the ISA and PCI expansion slots. They can also be identified by their retaining
clips.
QUESTION 9:
Which of the following components on the motherboard usually house the IDE
connectors?
A. PCI bus.
B. North Bridge.
C. ISA bus.
D. South Bridge.
Answer: D
Explanation: The South Bridge is generally used for slower devices such as USB
ports, IDE drives, and ISA slots.
Incorrect Answers:
A: The PCI bus is a sort of bridge between the processor and ISA bus.
B: The North Bridge is generally used for high-speed interface cards, such as video
accelerators, Synchronous RAM (SRAM), and memory.
C: The ISA bus does not house the IDE connectors.
QUESTION 11:
QUESTION 12:
A. Voltage.
B. Watts.
C. Hertz.
D. Ohms.
Answer: B
Explanation: Power supplies are rated in Watts. Watt is the SI derived unit of
power, equal to 1 Volt * 1 Ampere
QUESTION 13:
When connecting the power cable of an AT power supply to the mother board,
which two wires on the power connectors (P8/P9) should be together?
QUESTION 14:
Which of the following sockets are used for a 3.4 GHz Pentium 4 processor?
A. Socket 423
B. Socket 462
C. Socket 478
D. Socket 754
E. Socket A
Answer: C
Explanation: Socket 478 is a type of CPU socket used for Intel's Pentium 4 and
Celeron series CPUs.
Incorrect Answers:
A: Socket 423 is a CPU socket that was used for the first Pentium 4 processors based on
the Willamette core. However, it was short-lived as it quickly became apparent that it had
inadequate electrical design, which would have not allowed many clock-speed rises
above 2.0 GHz. It was replaced by Socket 478.
B, E: Socket A (also known as Socket 462) is the CPU socket used for AMD processors
ranging from the Athlon K7 to the Athlon XP 3200+, and AMD budget processors
including the Duron and Sempron.
D: Socket 754 is a CPU socket originally developed by AMD to succeed its powerful
Athlon XP platform (Socket 462, also referred to as Socket A).
QUESTION 15:
How can HyperThreading be disabled on a 2.8 GHz Pentium 4 system?
The new Certkiller .com trainee technician wants to know which memory module
types are a specialization of DDR SDRAM and Synchronous Graphics RAM
(SGRAM). How will you reply?
A. EDO DRAM
B. VRAM
C. Standard (FPM) DRAM
D. SGRAM
Answer: D
QUESTION 17:
Which of the following RAM modules required 8 ns DRAM chips and was capable
of operating at 125MHz?
A. PC66
B. PC100
C. PC133
D. PC800
Answer: B
Explanation: The PC100 SDRAM modules required 8 ns DRAM chips and was
capable of operating at 125 MHz, the SDRAM modules prior to the PC100 standard
used either 83MHz chips (12 ns) or 100 MHz chips at 10 ns.
Incorrect Answers:
QUESTION 18:
Which two of the following describes the number of pins normally associated with
Dual Inline Memory Modules (DIMMs)? (Select TWO.)
A. 30
B. 72
C. 144
D. 168
E. 184
Answer: D, E
QUESTION 19:
A. 72-pin SIMMs
B. 168-pin DIMMs
C. 184-pin DIMMs.
D. 184-pin RIMMs.
Answer: D
QUESTION 20:
A. 8-bits
B. 16-bits
C. 32-bits
D. 64-bits
Answer: B
A: A 30-pin SIMM is 8-bits wide and is commonly found on 386 and early 486
computers.
C: The 72-pin SIMM and the 72-pin SODIMM is 32-bits wide and can be installed
singularly in 32-bit systems.
D: The 168- and 184-pin DIMM and the 144- and 200-pin SODIMM is 64-bits wide.
QUESTION 21:
A. SIMMs
B. DIMMs
C. RIMMs
D. SODIMMs
Answer: C
Explanation: RIMM is the only memory module that is 16-bits wide. In addition,
RIMM is only available in 184-pin version.
Incorrect Answers:
A: A 30-pin SIMM is 8-bits wide while 72-pin SIMM is 32-bits wide.
B: The 168- and 184-pin DIMM is 64-bits wide.
D: The 72-pin SODIMM is 32-bits wide and the 144- and 200-pin SODIMM is 64-bits
wide.
QUESTION 22:
A. A
B. B
C. C
D. D
E. E
Answer: B, E
Explanation: The
The PS/2 port on the motherboard is a mini-DIN 6 connector. The PS/2 port to which a
keyboard is connected is usually color coded purple (B). The AT keyboard is attached to
a 180° DIN 5 connector on the motherboard (E).
Incorrect Answers:
QUESTION 23:
A female DB-15 socket with three rows of five sockets is used for ______.
Explanation: If there are three rows of five, it's probably a VGA/SVGA video
adapter.
Incorrect Answers
QUESTION 24:
A. A
B. B
C. C
D. D
Answer: B
Explanation: The VGA monitor uses a DB-15 connector that consists of three rows
of five pins each and is usually color coded blue.
Incorrect Answers:
A: The serial port is a DB-9 male connector.
C: The games controller is a DB-15 female connector with two rows of pins.
D: The parallel port is a DB-25 female connector and is usually color coded pink.
QUESTION 25:
From the following display types takes up the least space on a desk?
A. Terminal
B. LCD
C. CRT
D. LED
Answer: B
QUESTION 26:
After completing the installation of your internal and external SCSI devices that
connects to an Adaptec AHA-1542s SCSI adapter, you find that none of the devices
works. Which of the following should you do first to try and fix the problem?
Explanation: Some adapter cards like the Adaptec AHA-1542s still need to have
terminators installed. If you set up both internal and external devices and none of
them work, try enabling termination on it to see if that fixes the problem.
Incorrect Answers:
A: Disconnecting all the devices and starting over will not solve the problem as you need
to enable termination on the adapter.
B: You do not have to remove and replace the adapter; you need to enable termination on
it to make it function properly.
C: Changing the SCSI IDs will not solve the problem when all that is necessary is to
enable termination on the adapter to enable proper functioning of the SCSI devices.
QUESTION 27:
Which of the following computer standard supports a data transfer rate of 400
Mbps and up to 63 devices?
A. USB 1.1
B. USB 2.0
C. IEEE 1394
D. Ultra SCSI 2
Answer: C
Explanation: The IEEE 1394 standard also known as FireWire supports data
transfer speeds of 400 Mbps, although IEEE 1894b has a data transfer speed of 800
Mbps.
Incorrect Answers:
QUESTION 28:
Which of the following is the Color-Code used for the keyboard Port on a new PC
that uses a mini-DIN 6 Connector?
A. Pink
B. Blue
C. Green
D. Purple
Answer: D
Explanation: The purple mini-DIN 6 pin is used for the PS/2 keyboard.
Incorrect Answers:
A: The monitor connector is usually color-coded blue but it takes a high density DB-15
connector, not a mini-DIN 6 connector.
B: The parallel port connector is usually color-coded pink but it takes a DB-25
connector, not a mini-DIN 6 connector.
C: The green mini-DIN 6 pin is used for the PS/2 mouse.
QUESTION 29:
Which of the following connectors are used for serial ports? (Select all that apply.)
A. A female DB-9
B. A male DB-25
C. A female DB-15
D. A male DB-9
E. A female DB-25
Answer: B, D
Explanation: Both the DB-25 and DB-9 MALE connectors are used for serial ports.
Incorrect answers:
QUESTION 30:
A. A parallel cable.
B. A SCSI connector.
C. A parallel port.
D. An EGA/CGA video port.
E. A VGA/SVGA video adapter.
Answer: C
QUESTION 31:
The new Certkiller .com trainee technician wants to know which of the following
could be used for connecting a mouse to the computer. How will you reply? (Select
THREE.)
QUESTION 32:
The new Certkiller .com trainee-technician wants to know what is the Color-Code
used for the mouse Port on a new PC that uses a mini-DIN 6 Connector. How will
you reply?
A. Pink
B. Blue
C. Green
D. Purple
Answer: C
Explanation: The green mini-DIN 6 pin is used for the PS/2 mouse.
Incorrect Answers:
A: The monitor connector is usually color-coded blue but it takes a high density DB-15
connector, not a mini-DIN 6 connector.
B: The parallel port connector is usually color-coded pink but it takes a DB-25
connector, not a mini-DIN 6 connector.
D: The purple mini-DIN 6 pin is used for the PS/2 keyboard.
QUESTION 33:
A. A
B. B
C. C
D. D
Answer: A
QUESTION 34:
A. A
B. B
C. C
D. D
Answer: A
B: The VGA monitor uses a DB-15 connector that consists of three rows of five pins
each and is usually color coded blue.
C: The games controller is a DB-15 female connector with two rows of pins.
D: The parallel port is a DB-25 female connector and is usually color coded pink.
QUESTION 35:
Explanation: The parallel port is a DB-25 female connector and is usually color
coded pink.
Incorrect Answers:
QUESTION 36:
Explanation:
The games controller is a DB-15 female connector with two rows of pins.
Incorrect Answers:
QUESTION 37:
Exhibit:
A. A
B. B
C. C
D. D
E. E
Answer: E
A: The S-Video connector is usually located to the graphics card and is a mini-DIN 4
connector.
B: The PS/2 port on the motherboard is a mini-DIN 6
connector. The PS/2 port to which
a keyboard is connected is usually color coded purple.
C: The PS/2 port on the motherboard is a mini-DIN 6
connector. The PS/2 port to which
a mouse is connected is usually color coded green.
D: The serial port on an Apple Macintosh computer is a mini-
DIN 8 connector.
QUESTION 38:
A. A
B. B
C. C
D. D
E. E
Answer: B
A: The S-Video connector is usually located to the graphics card and is a mini-DIN 4
connector.
C: The PS/2 port on the motherboard is a mini-DIN 6 connector. The PS/2 port to which
a mouse is connected is usually color coded green.
D: The serial port on an Apple Macintosh computer is a mini-DIN 8 connector.
E: The AT keyboard is attached to a 180° DIN 5 connector on the motherboard.
QUESTION 39:
Which of the following are keyboard connectors? (Select all that apply.)
A. A
B. B
C. C
D. D
E. E
Answer: B, E
The keyboard can be attached to a 180° DIN 5 connector or a mini-DIN 6 connector on
the motherboard. The mini-DIN 6 connector to which a keyboard is connected is usually
color coded purple.
Incorrect Answers:
A: The S-Video connector is usually located to the graphics card and is a mini-DIN 4
connector.
C: The PS/2 port on the motherboard is a mini-DIN 6 connector. The PS/2 port to which
a mouse is connected is usually color coded green.
D: The serial port on an Apple Macintosh computer is a mini-DIN 8 connector.
QUESTION 40:
A: The S-Video connector is usually located to the graphics card and is a mini-DIN 4
connector.
B: The PS/2 port on the motherboard is a mini-DIN 6 connector. The PS/2 port to which
a keyboard is connected is usually color coded purple.
D: The serial port on an Apple Macintosh computer is a mini-DIN 8 connector.
E: The AT keyboard is attached to a 180° DIN 5 connector on the motherboard.
QUESTION 41:
A. A
B. B
C. C
D. D
Answer: C
A: The S-Video connector is usually located to the graphics card and is a mini-DIN 4
connector.
B: The PS/2 port on the motherboard is a mini-DIN 6 connector. The PS/2 port to which a
keyboard is connected is usually color coded purple.
D: The serial port on an IBM PC computer is a DB-9 male connector.
QUESTION 42:
To which of the following could you attach a mouse on an IBM PC? (Select all that
apply.)
A. A
B. B
C. C
D. D
Answer: B, D
Explanation:
The mouse can be attached to a DB-9 connector or a mini-DIN 6 connector on the
motherboard. The mini-DIN 6 connector to which a mouse is connected is usually
color coded green.
Incorrect Answers:
A: The PS/2 port on the motherboard is a mini-DIN 6 connector. The PS/2 port to which
a keyboard is connected is usually color coded purple.
C: The serial port on an Apple Macintosh computer is a mini-DIN 8 connector.
QUESTION 43:
A. Cooling liquid.
B. Thermal compound.
C. A heat sink.
D. A fan.
Answer: B
Explanation: Thermal grease(also called thermal compound, heat paste, thermal
paste, or heat sink compound) is a substance that increases thermal conductivity
between the surfaces of two or more objects. In electronics, it is often used to aid a
component's thermal dissipation via a heat sink.
QUESTION 44:
While installing an IDE device, you find that the cable to connect the IDE device is
not keyed. Which of the following should you do? (Select all that apply.)
A. Locate the red stripe on the cable, and connect to the device with the red stripe lining
up to pin #1.
B. Attach cable any way that fits.
C. If there is also no red stripe, Locate the blue stripe on the cable, and connect to the
device with the blue stripe lining up to pin #1.
D. Purchase a new cable.
Answer: A, C
Explanation: When connecting the drives to the controller, you need to make sure
that the red stripe is oriented so the wire it represents is connected to pin #1 on the
drive and pin #1 on the controller.
In cases where there is no red stripe then you would need to locate the blue stripe and
follow the same procedure.
Incorrect Answers:
B: Attaching the cable any way that fits will not necessarily ensure that the computer will
read the IDE device since it might then not communicate with the controller.
D: Purchasing a new cable is unnecessary when all that is required is to make sure that
the red stripe on the cable corresponds to pin#1.
QUESTION 45:
Which of the following is a task that you have to perform when installing SCSI
devices?
Explanation: To properly configure SCSI devices, the ends of the chain(s) must be
properly terminated and each device must have a unique ID. Thus once your SCSI
devices are correctly connected, you need to assign each device a unique SCSI ID
number.
Incorrect Answers:
A: This is done when hard drives are installed. They might also be SCSI devices, but the
question pertinently asks for SCSI devices and not only pertaining to hard drives.
B: Formatting is done after installation.
D: This is not done when installing SCSI devices.
QUESTION 46:
Which of the following gives the proper sequence for installing master and slave
IDE drives?
A. Mount the drive in the carrier, connect the cable to the drive, install the drive in the
computer, and configure the drive
B. Mount the drives in the carrier, connect the 40-pin cable to the drives, set the drive at
the end of the cable to master, set the drive in the middle of the cable to slave, install the
drives in the computer, and configure the drives.
C. Mount the drive in the carrier, connect the master drive after the twist in the cable,
connect the slave drive before the twist in the cable, install the drives in the computer,
and configure the drives.
D. None of the above.
Answer: B
Explanation: The basic steps for installing IDE Drives are: Mount the drive in the
carrier, connect the cable to the drives, set the drive at the end of the cable to
master, set the drive in the middle of the cable to slave, install the drives in the
computer, and configure the drives.
Incorrect Answers:
A: The sequence is plausible except that it does not make provision for the installation of
master and slave drives.
C: The sequence is not correct since you need to first mount the drives in the carrier, then
connect the cable to the drives and not as suggested by this option.
D: This is irrelevant. You got to have a basic sequence to install drives.
QUESTION 47:
Which of the following determines the master or slave in a system that supports two
IDE devices?
A second hard disk drive which was recently installed on a Certkiller .com computer
is not being recognized by the system. All the cables and jumper settings are in
order. What can the technician do to locate the cause of this problem?
QUESTION 49:
You want to setup dual monitors on a Certkiller .com laptop. You right-click on
Windows Desktop, select Display Properties and select the Settings tab. What
should you do next?
Explanation: Extended Desktop mode:In this mode, you extend your mobile PC
screen space by using an additional display (whether a monitor or a projector
screen). You can then use each screen independently. This mode is well suited for
presentations because you can display the slides on one screen (usually the
projector), and then hide notifications and other miscellaneous messages, and
complete other tasks, such as taking notes, on your mobile PC screen. This mode is
also very useful when you want to extend your workspace while using your mobile
PC at your desk.
QUESTION 50:
QUESTION 51:
A Certkiller .com technician has to install a new multimedia device. From the
following which should he consider? (Select TWO.)
QUESTION 52:
You are the Certkiller .com technician charged with performing a hardware upgrade
on a PC. What will you do before performing the procedure?
Explanation: You should always backup data to ensure that no user data would be
lost.
Incorrect Answers:
QUESTION 53:
In the troubleshooting and repair process select one of the options below that would
be the best way to reduce redundant effort.
QUESTION 54:
Which of the following questions would you ask Certkiller .com clients when
troubleshooting their systems? (Select all that apply.)
Explanation: Ask the user to show you exactly where and when they experience the
problem.
New software can mean incompatibility problems with existing problems. This is
especially true for Windows programs. A new Windows program can overwrite a
required DLL file with a newer version of the same name, which an older program may
not find useful.
If changes were made to the computer, ask if they can remember approximately when the
change was made. Then ask them approximately when the problem started. If the two
dates seem related, there's a good chance that the problem is related to the change.
Incorrect Answers:
QUESTION 55:
Which of the following troubleshooting steps usually takes place after you have
talked to the user experiencing the problem?
B: The first step in troubleshooting an issue is to talk to the user experiencing the
problem. Contact with a user means that you need to have some degree of customer
relations skills to carry out successful diagnosis of an issue. Here, you need the user to
show you what the current problem is.
C, D: Isolate possible causes of the issue and eliminate possibilities usually follow after
you have gathered information on the problem. This is where your knowledge on the
different system and configuration areas is important, as well as knowing the various
tools used to troubleshoot and debug issues pertaining to these areas.
E: Once a problem being discussed with a user seems to surpass a few crucial
components, you should document your findings and solutions. This would enable you to
quickly reference your solution when the issue next appears.
QUESTION 56:
Which of the following troubleshooting steps requires you to have knowledge on the
different system and configuration areas, and the utilities needed to troubleshoot
these areas?
QUESTION 57:
Which of the following two questions you would ask a customer first when he
reports a blank monitor? (Select TWO.)
Explanation: Any number of things can cause a blank screen. The first two are the
most common: either the power is off or the contrast or brightness is turned down.
Incorrect answers:
B: A blank monitor will not register any color to enable the customer to check color
settings.
D: The type of computer is irrelevant in the troubleshooting of a blank monitor.
QUESTION 58:
Which of the following could have caused your two new IDE devices that is installed
on the second IDE controller, not to function? (Select all that apply.)
QUESTION 59:
QUESTION 60:
One of the Certkiller .com systems has a blank monitor and the fan on the power
supply is not working. What is the cause of this problem?
Explanation: The first thing to check is the plug because nothing is going on with
the system. You can only ascertain if something is faulty with the system once it is
plugged in and switched on.
Incorrect Answers:
A: You first need to switch the system on to se whether it is indeed the motherboard that
needs upgrading.
B: Since the fan on the power supply is not working, you can know for sure that the
system is not plugged in.
D: It is not a case of the power supply that is bad, there is absolutely no power since the
fan does not even work.
QUESTION 61:
One of the Certkiller .com systems in your office worked fine the day before, now you
have a problem that there is one short beep and nothing on the screen. What could
be the problem?
QUESTION 62:
Which of the following is the FIRST thing you should check when a new IDE hard
drive is not recognized?
A. The BIOS.
B. The cabling.
C. The jumper settings.
D. The drive.
Answer: C
Explanation: Jumper settings are the first thing to check when a new drive isn't
being recognized. Make sure you've opened up access to the new drive by changing
the first drive's jumper switches.
Incorrect Answers:
A: The BIOS settings check is not the first place to check in the event of a new drive not
being recognized.
B: When experiencing this Bill of problem, checking the cabling is normally the second
area to check after checking the jumper settings.
D: This is a new drive that is check so it will not make sense to check the drive first, but
rather check the jumper settings first.
QUESTION 63:
A. An overheating CPU.
B. A five second power failure.
C. Insufficient Memory.
D. A new set of software installed.
Answer: A
Explanation: Power failure would shut down the computer, not reboot it.
Insufficient memory and possible faulty software should merely produce an alert to
the computer user. Overheating CPU, or in some cases overheated memory, will
cause random reboots whenever the CPU reaches temperatures above the intended
working temperature.
QUESTION 64:
After installing a new network interface card (NIC) on a Certkiller .com Windows
XP computer system, the computer system reboots continuously. To correct this
problem, what should Certkiller .com do first?
Explanation: Last know good configuration, or booting into safe mode and
removing the faulty device driver is the tools a technician has to break these
behaviors with a computer that has had a faulty device installed.
QUESTION 65:
A new Certkiller .com computer has been set up and after booting, the USB ports
don't seem to be working with any of the USB devices. Select from the following
what the technician should do first.
QUESTION 66:
You are the network administrator at Certkiller .com. Certkiller .com has several
workstations that have wireless 802.11g network adapters. Every day at around
lunchtime wireless users complain of lack of connectivity. What can you do to this
problem?
Explanation: 802.11g uses the 2.4 GHz range which is also used by appliances such
as microwaves. The connectivity problem occurs at around lunch time, which seems
to indicate that the increased use of microwaves at around this time is causing RFI
(Radio Frequency Interference). We should thus attempt to eliminate this RFI.
Incorrect Answers:
A: 802.11a uses the 5.0 GHz range and will not be affected by other devices that use the
2.4 MHz range. However, we would need to change the wireless adapters on the
workstations to 802.11a as well.
C: In ad-hoc mode, two wireless devices can communicate directly, without the need for
a WAP. However, these devices would not have access to the wired network.
D: By design, the WAP is directly connected to the network but this will not overcome
the RFI (Radio Frequency Interference) that is affecting the wireless signal.
QUESTION 67:
Explanation: Hardware comp ability should have been ensured before buying the
components in the first place, and there is no need to replace cables unless there is a
visual defect on them.
QUESTION 68:
QUESTION 69:
Explanation: The ESD mat will drain excess charge away from any item that comes
into contact with it. If an ESD strap or mat is not available, it is possible to
discharge excess static voltage by touching the metal case of the power supply.
However, the power supply must be plugged into a properly grounded outlet for this
to work as intended.
Incorrect answers:
B: Touching the ground of the workshop will not necessarily prevent the hazards
associated with static electricity.
D: An ESD mat in conjunction with an ESD strap can be used to discharge static
electricity, or you could touch the metal case of the power supply that is plugged into a
properly grounded outlet.
QUESTION 70:
You are the technician on call at Certkiller .com. A client complains that her time
and date on her desktop computer is constantly wrong, even though she resets it.
Which of the following should repair the problem?
Explanation: These symptoms indicate that the system's CMOS is losing the time,
date, and hard disk settings. The CMOS is able to keep this information when the
system is shut off because there is a small battery powering this memory. Because it
is a battery, it will eventually lose power and go dead.
Incorrect answers:
QUESTION 71:
Which of the following memory module form factors are commonly used for
laptops?
QUESTION 72:
A Certkiller .com customer wants to upgrade the RAM on her laptop. Which
memory modules would the customer use?
A. SIMMs
B. DIMMs
C. RIMMs.
D. SODIMMs.
Answer: D
Explanation: SODIMMs are small outline DIMMs and are used on Laptops.
Incorrect Answers:
A, B, C: SIMMs, DIMMs and RIMMS are all used on PCs, not on laptops.
QUESTION 73:
Below are different types of PC Card slots. Select one which you think would be
able to accommodate all the other physical PC Card types.
A. Type I
B. Type II
C. Type III
D. All of the above.
Answer: C
Explanation:
Type I - Cards designed to the original specification (version 1.x) are type I and feature a
16-bit interface. They are 3.3 millimeters thick. Type-I PC Card devices are typically
used for memory devices such as RAM, flash memory, OTP, and SRAM cards.
Type II - Type-II PC Card devices feature a 16- or 32-bit interface. They are 5.0
millimeters thick. Type-II cards introduced I/O support, allowing devices to attach an
array of peripherals or to provide connectors/slots to interfaces for which the PC/laptop
had no built-in support. For example, many modem, network and TV cards use this form
factor. Due to their thinness, most type II interface cards feature miniature interface
connectors on the card which are used together with a dongle; a short cable that adapts
from the card's miniature connector to an external full-size connector.
Type III - Type-III PC Card devices are 16- or 32-bit. These cards are 10.5 millimeters
thick, allowing them to accommodate devices with components that would not fit type I
or type II height. Examples are hard disk drive cards, and interface cards with full-size
connectors that do not require dongles (as is commonly required with type II interface
cards).
QUESTION 75:
A. 8-bits
B. 16-bits
C. 32-bits
D. 64-bits
Answer: D
Explanation: The 168- and 184-pin DIMM and the 144- and 200-pin SODIMM is
64-bits wide.
Incorrect Answers:
A: A 30-pin SIMM is 8-bits wide and is commonly found on 386 and early 486
computers.
B: The 184-pin RIMM is 16-bits wide.
C: The 72-pin SIMM and the 72-pin SODIMM is 32-bits wide and can be installed
singularly in 32-bit systems.
QUESTION 76:
Certkiller .com wants to connect multiple peripheral devices such as, printer,
keyboard and mouse to a laptop. Select from below the best wireless technology
Certkiller .com should use.
A. 802.11x
B. Bluetooth
C. ADSL
D. IrDA
Answer: B
Explanation: 802.11x is only for networks, IrDA needs free line of sight and ADSL
is not wireless and only for networking purpose. Most peripheral equipment today
comes in a Bluetooth version.
QUESTION 77:
The memory on a Certkiller .com laptop is upgraded but the keyboard does not
function, however the touchpad is working. Explain the most likely cause of this by
choosing from the following.
Explanation: On models where the memory modules are seated under the keyboard,
it is easy to forget or not setting the keyboard connector properly when assembling
the computer after the upgrade.
QUESTION 78:
The MOST common video RAM technology on laptop video cards would be ______.
Select the correct answer from the following.
A. DDR SDRAM
B. SODIMM
C. SIMM
D. DIMM
Answer: A
The correct connection method for an internal laptop hard disk drive would be
which of the following?
A. SCSI
B. PATA
C. IEEE 1394
D. Firewire
Answer: B
Explanation: Even though SATA drives are coming more and more, PATA is still
the most used hard disk drive type for laptops.
QUESTION 80:
Explanation: The main difference is power consumption to save the batteries and
heat production because of the limited space for cooling inside a laptop (and of
course power consumption of larger fans)
QUESTION 81:
Which of the following different types of power sources can be used to power a
laptop or notebook computer? (Select all that apply.)
A. Standard AA batteries
B. AC power
C. Docking station
D. Batteries
Answer: B, D
QUESTION 82:
A. Mouse
B. Trackball
C. Touch Screen
D. Drawing Tablet
Answer: B
QUESTION 83:
A. In Screen Savers.
B. In the system BIOS.
C. In Power Management.
D. In Power Schemes.
Answer: A
Explanation: Go to screen properties, Screen saver tab. Click on the power button
and go to the Hibernation tab on the Power options dialog box that is displayed.
QUESTION 84:
Which of the following types of batteries has the shortest battery life?
QUESTION 85:
When detaching a removable device from a laptop computer running Windows XP,
what would be your first step to take?
You attach a printer to a four port unpowered USB hub that is connected to a
notebook. However, you cannot print to the printer. What is the cause of this
problem?
Explanation: Some USB devices needs more power than an unpowered USB hub
can provide by drawing power from the host PC and especially not if the host is a
portable with a reduced power output to the USB ports.
QUESTION 87:
A customer reports that his laptop can no longer print to the printer, after
relocating a Wireless IrDA (Infrared data association) printer. Explain by choosing
from the following what the MOST likely cause of this problem would be.
A. The printer is more than one meter (3 feet) from the laptop.
B. The printer driver has not been set up.
C. The laptop needs to be rebooted.
D. The printer needs to be installed.
Answer: A
IrDA range is about 1 meter.
QUESTION 88:
A. Old Pentium class notebooks only support single function PCMCIA cards.
B. The notebook must have a parallel port.
C. The card requires either a dual Type II or a single Type III slot.
D. This card requires Slot 1 (SC242).
Answer: C
Explanation:
Type I - Cards designed to the original specification (version 1.x) are type I and feature a
16-bit interface. They are 3.3 millimeters thick. Type-I PC Card devices are typically
used for memory devices such as RAM, flash memory, OTP, and SRAM cards.
Type II - Type-II PC Card devices feature a 16- or 32-bit interface. They are 5.0
millimeters thick. Type-II cards introduced I/O support, allowing devices to attach an
array of peripherals or to provide connectors/slots to interfaces for which the PC/laptop
had no built-in support. For example, many modem, network and TV cards use this form
factor. Due to their thinness, most type II interface cards feature miniature interface
connectors on the card which are used together with a dongle; a short cable that adapts
from the card's miniature connector to an external full-size connector.
Type III - Type-III PC Card devices are 16- or 32-bit. These cards are 10.5 millimeters
thick, allowing them to accommodate devices with components that would not fit type I
or type II height. Examples are hard disk drive cards, and interface cards with full-size
connectors that do not require dongles (as is commonly required with type II interface
cards).
QUESTION 89:
Explanation:
Type I - Cards designed to the original specification (version 1.x) are type I and feature a
16-bit interface. They are 3.3 millimeters thick. Type-I PC Card devices are typically
used for memory devices such as RAM, flash memory, OTP, and SRAM cards.
Type II - Type-II PC Card devices feature a 16- or 32-bit interface. They are 5.0
millimeters thick. Type-II cards introduced I/O support, allowing devices to attach an
array of peripherals or to provide connectors/slots to interfaces for which the PC/laptop
had no built-in support. For example, many modem, network and TV cards use this form
factor. Due to their thinness, most type II interface cards feature miniature interface
connectors on the card which are used together with a dongle; a short cable that adapts
from the card's miniature connector to an external full-size connector.
Type III - Type-III PC Card devices are 16- or 32-bit. These cards are 10.5 millimeters
thick, allowing them to accommodate devices with components that would not fit type I
or type II height. Examples are hard disk drive cards, and interface cards with full-size
connectors that do not require dongles (as is commonly required with type II interface
cards).
QUESTION 90:
When a 1.4 GHz laptop is operating at 800 MHz, the MOST likely cause is that
______.
A Certkiller .com user complains that foreign letters and numbers are appearing on
screen while he is typing on a laptop. What would the cause of this be?
Explanation:
Without a physical numerical keyboard the laptop has it's numerical keyboard
pasted over the normal keyboard and accidentally pressing the numlock key will
result in the problems experienced by the user in the question.
QUESTION 92:
When a Certkiller .com user's laptop is switched on the cooling fan is making a
terrible noise. After five minutes the fan noise stops. What do you think is the
problem?
A. The fan is typically louder when powering up but then should not be heard at all.
B. The fan is faulty and has blown a blockage and it is not necessary to do anything
more.
C. The fan is switched on and off automatically as the laptop warms up.
D. The fan has stopped completely and the laptop should be serviced before there is heat
damage.
Answer: D
Explanation: If it wasn't for the terrible noise made by the fan before stopping C
would have been the correct answer.
QUESTION 93:
Which of the following methods may be used to easily clean LCD Computer
screens?
A. A soft cloth with window cleaner sprayed on it to gently wipe the surface
B. A special antistatic vacuum must not touch screen
C. Compressed air to avoid touching the screen
D. A soft cloth with a little water sprayed on it to gently wipe the surface
Answer: D
Explanation: The usage of water is the best way to ensure no damage to your LCD if
water does not help it is recommended that you use specialized products.
Incorrect answers:
A: The usage of window cleaner might damage your LCD screen.
B, C: The methods mentioned here are not recommended and may lead to your LCD
screen being damaged.
QUESTION 94:
Explanation: Laptops are built to have a certain amount of airflow underneath that
is sucked into the computer to cool the processor and then blown out at the back.
Having the computer on a soft surface, like in the knee, could prevent the correct
airflow from reaching the processor.
QUESTION 95:
To clean a laptop's LCD screen, what would you suggest as the best method from
the options below?
A. mild soap and water
B. ammonia-based solvent
C. bleach or hydrogen peroxide
D. alcohol-free cleaning fluid
Answer: A
Explanation: LCD screens are not like ordinary monitor screens. LCD
screens are NOT GLASS, rather they are made up of a soft film that can easily be
damaged by harsh paper towels and the chloride and other chemicals in ordinary
tap water. These screens are very delicate, they must be handled with care and
handled very, very gently.
QUESTION 96:
A Certkiller .com laptop battery is not being fully charged. What do you think the
Certkiller .com technician should do FIRST?
Explanation: After time the battery loses its ability to hold and deliver a charge. It
retains the habits of the user and if it is never fully discharged and charged, it
doesn't really know that it has more ability until it is recalibrated. A complete
discharge and charge and repeat every few months will help restore the battery's
ability to charge and discharge thus more power over a longer time period.
QUESTION 97:
When the battery on a Certkiller .com laptop is malfunctioning, what the first sign
would be?
A. The (AC) adapter gets very hot.
B. The laptop starts beeping when turned on.
C. The laptop will not start up when plugged in to the AC adapter.
D. The laptop turns off when unplugged from the AC adapter.
Answer: D
QUESTION 98:
To remove dust from inside a laptop, which of the options below should the
technician use? (Select TWO.)
A. Alcohol swabs.
B. Compressed air.
C. Gently blow the dust out.
D. Vacuum the dust out of the system.
Answer: B, D
QUESTION 99:
You just completed a hardware upgrade of a Windows 95 home computer, and now
you have to upgrade the operating system. Which of the following is the operating
system you would recommend? (Select all that apply.)
A. Windows NT Workstation
B. Windows 98
C. Windows ME
D. Windows 2000
Answer: B, C
Explanation: Windows 98 and Windows ME are better suited for home users.
Incorrect Answers:
A, D: Windows NT Workstation and Windows 2000 professional should be installed for
high end users who require higher performance and strong security.
QUESTION 100:
What is the process called when you are assigning part or all of the drive for use by
the computer?
A. Formatting
B. Modification
C. Partitioning
D. None of the above.
Answer: C
Explanation: Partitioning is the process of assigning part or all of the drive for use
by the computer.
Incorrect Answers:
A: Formatting is the process of preparing the partition to store data in a particular
fashion.
B, D: Partitioning is the process of assigning part or all of the drive for use by the
computer.
QUESTION 101:
You need to make a startup disk from a Windows 95/98 system. What should you
do?
QUESTION 102:
Explanation: Within Add/Remove Programs is a tab called Startup Disk. Click the
Startup Disk tab to bring it to the front. Click the Create Disk button to start the
startup disk creation process.
QUESTION 103:
A. Windows 98
B. Windows 95
C. Windows 2000
D. None of the above.
Answer: B
QUESTION 104:
When using the registry editor which of the following keys contains file extension
associations?
A. HKEY_CURRENT_USER
B. HKEY_USERS
C. HKEY_LOCAL_MACHINE
D. HKEY_CLASSES_ROOT
Answer: D
A: The HKEY_CURRENT_USER key contains the user profile information for the
person currently logged in to Windows.
B: The HKEY_USERS key contains the default user profile and the profile for the
current user.
D: The HKEY_LOCAL_MACHINE key contains the settings and information for the
hardware that is installed in the computer.
QUESTION 105:
When using the registry editor which of the following keys contains the dynamic
settings for any Plug-and- Play devices in your computer?
A. HKEY_CURRENT_CONFIG
B. HKEY_LOCAL_MACHINE
C. HKEY_CLASSES_ROOT
D. HKEY_DYN_DATA
Answer: D
Explanation: The HKEY_DYN_DATA key contains the dynamic settings for any
Plug-and- Play devices in your computer.
Incorrect Answers:
QUESTION 106:
Of the following system files, which is needed to boot your Windows 98 system
properly? (Select all that apply.)
A. IO.SYS
B. AUTOEXEC.BAT
C. WIN.COM
D. COMMAND.COM
E. MSDOS.SYS
Answer: A, C, E
Explanation: MSDOS.SYS, IO.SYS, and WIN.COM are required to boot Windows
9x.
QUESTION 107:
Which of the following best describes the purpose of the WIN.COM file in the
Windows 98 boot process?
A. It starts the Windows 98 protected load phase of the boot process.
B. It is used in DOS and Windows 3.1 to store information specific to running the
operating system.
C. It loads device drivers and uses the information from the AUTOEXEC.BAT to
configure the system environment.
D. It is used to run particular programs during startup.
Answer: A
Explanation: WIN.COM - Initiates the Windows 9x protected load phase.
QUESTION 108:
Which two of the following files will cause a Windows 2000 EIDE system with a
single-boot configuration to become nonfunctional, if they are absent? (Select
TWO.)
A. HAL.DLL
B. WIN.COM
C. NTBOOTDD.SYS
D. BOOTSECT.DOS
Answer: A, B
Explanation: The absence of WIN.COM or HAL.DLL will cause the system to be
nonfunctional.
Incorrect Answers:
C: On a system with a SCSI boot device, this file is used to recognize and load the SCSI
interface. On EIDE systems this file is not needed and is not even installed.
D: In a dual-boot configuration this keeps a copy of the DOS or Windows 9x boot sector
so that the Windows 9x environment can be restored and loaded as needed.
QUESTION 109:
When using the registry editor what is the purpose of the HKEY_DYN_DATA key?
Explanation: The HKEY_DYN_DATA key contains the dynamic settings for any
Plug-and- Play devices in your computer.
Incorrect Answers:
A: The HKEY_CLASSES_ROOT key contains the file extension associations.
B: The HKEY_CURRENT_USER key contains the user profile information for the
person currently logged in to Windows.
C: The HKEY_CURRENT_CONFIG key contains the current hardware configuration.
QUESTION 110:
From the Windows Advanced Boot Options menu, select from the following options
are NOT available. (Select TWO.)
A. Debugging Mode with Command Prompt Only
B. Press F8 for advanced startup option
C. Last Known Good Configuration
D. Directory Services Restore Mode
Answer: A, B
Explanation:
Description of Safe Boot options
Safe Mode
Starts using only basic files and drivers (mouse, except serial mice; monitor; keyboard; mass
storage; base video; default system services; and no network connections). If your computer
does not start successfully using safe mode, you might need to use the Recovery Console
feature to repair your system.
For more information, see To start the computer in safe mode
Safe Mode with Networking
Starts using only basic files and drivers, and network connections.
Safe Mode with Command Prompt
Starts using only basic files and drivers. After logging on, the command prompt is displayed
instead of the Windows graphical interface.
Enable Boot Logging
Starts while logging all the drivers and services that were loaded (or not loaded) by the
system to a file. This file is called ntbtlog.txt and it is located in the %windir% directory. Safe
Mode, Safe Mode with Networking, and Safe Mode with Command Prompt add to the boot
log a list of all the drivers and services that are loaded. The boot log is useful in determining
the exact cause of system startup problems.
Enable VGA Mode
Starts using the basic VGA driver. This mode is useful when you have installed a new driver
for your video card that is causing Windows not to start properly. The basic video driver is
always used when you start in Safe Mode (either Safe Mode, Safe Mode with Networking, or
Safe Mode with Command Prompt).
Last Known Good Configuration
Starts using the registry information and drivers that Windows saved at the last shutdown.
Any changes made since the last successful startup will be lost. Use Last Known Good
Configuration only in cases of incorrect configuration. It does not solve problems caused by
corrupted or missing drivers or files.
Directory Service Restore Mode
This is for the server operating systems and is only used in restoring the SYSVOL directory
and the Active Directory directory service on a domain controller.
Debugging Mode
Starts while sending debug information through a serial cable to another computer.
QUESTION 111:
To access the Device Manager you must right-click _______ and choose _______
then click the Device Manager tab. (Select all that apply.)
A. My Computer
B. Administrative Tools
C. the Event Viewer
D. Properties
E. Computer Management
Answer: A, D
Explanation: The Device Manager is a graphical view of all the hardware installed
in your computer that Windows 9x has detected. You can open it by right-clicking
My Computer, choosing Properties, and then clicking the Device Manager tab.
QUESTION 112:
You want to make changes to the hardware. Where should you look to make the
changes? (Select all that apply.)
A. Device Manager
B. Administrative Tools
C. Hardware Wizard
D. None of the above
Answer: A, C
Explanation: Many hardware changes can be made through the Hardware Wizard,
it is often easier to use the Device Manager, which provides a very simple and
well-organized method to manage hardware in the system.
QUESTION 113:
When you add new hardware devices to Windows 95/98, it will detect the new
hardware. What do Windows use to detect the new hardware?
QUESTION 114:
In Windows XP, what happens when you press the Windows key + L short cut
keys?
Explanation: When Windows 3.x programs are installed, their files are copied to the
hard disk and entries are made into the Windows configuration files: the INI files
and the System Registry.
Incorrect Answers:
B: The AUTOEXEC.BAT is a special batch file that executes automatically at system
startup. This configuration file establishes the user environment and loads system drivers.
C: CONFIG.SYS also has a detailed role in the logical mapping of the PC's memory. It
loads memory drivers.
D: This is incorrect since the Windows Configuration files consists of INI files and the
System Registry.
QUESTION 116:
Which of the following is use to copy multiple files and directories easily?
A. XCOPY.EXE
B. AUTOEXEC.BAT
C. CONFIG.SYS
D. SMARTDRV.EXE
Answer: A
Explanation: XCOPY.EXE allows you to copy multiple files and directories easily.
Incorrect Answers
B, C: AUTOEXEC.BAT and CONFIG.SYS which are the necessary memory managers
and settings to get the computer up and running.
D: SMARTDRV.EXE increases file copy speed.
QUESTION 117:
Explanation: FAT is the file system of DOS, and its advantages, one of it is that it is
compatible with DOS and Windows 9x dual-boot configurations.
Incorrect Answers:
A, B: This is all characteristics of the NTFS file system.
D: FAT is the file system of DOS, and its advantages, one of it is that it is compatible
with DOS and Windows 9x dual-boot configurations.
QUESTION 118:
What are the advantages that the Windows 2000 NTFS File System offers? (Select
all that apply.)
A. NTFS makes better use of large drives by using a more advanced method of saving
and retrieving data.
B. NTFS supports more system RAM than FAT32.
C. The upgrade to NTFS enables increased file security, disk quotas, and disk
compression.
D. None of the above
Answer: A, C
QUESTION 119:
Which of the following is a Windows 2000 utility that allows a user to manage files
and directories from a single graphical interface?
A. Event Viewer
B. FDISK
C. Windows Explorer
D. SCANREG
Answer: C
Explanation: The Windows Explorer is a utility that allows the user to accomplish a
number of important file-related tasks from a single graphical interface.
Incorrect Answers:
A: The Event Viewer is used to log data about the computer.
B: The FDISK utility is used to prepare a drive for first time usage.
D: The purpose and function of the SCANREG command is to allow you to scan the
Registry by starting a Windows application that checks for errors and allows you to back
up the Registry files.
QUESTION 120:
Which of the following is the component that allows you to manage files and
directories on a Windows 2000 computer?
A. Control Panel
B. Windows Explorer
C. File Manager
D. Device Manager
Answer: B
Explanation: Windows Explorer allows the user to use drag-and-drop techniques
and other graphical tools to manage the file system.
Incorrect Answers:
A: Control Panel has to do with configuring settings.
C: File Manager is a Windows 3.x feature.
D: Device Manager provides a very simple and well-organized method to manage
hardware in the system.
QUESTION 121:
Of the following methods, which is valid for creating a new folder in Windows
Explorer?
Explanation: To create a new file, folder, or other object, navigate to the location
where you want to create the object and then right-click in the right pane. In the
menu that appears, select New and then choose the object you want to create.
QUESTION 122:
Which of the following are two factors that distinguish the NTFS file system from
the FAT file system? (Select TWO.)
A. It is compatible with DOS and Windows 9x dual-boot configurations.
B. It supports larger partition sizes.
C. It can be accessed and modified using many standard DOS disk utilities.
D. It supports compression, encryption, disk quotas, and file ownership.
Answer: B, D
Explanation: The NTFS file system comes from Windows NT and is a more
sophisticated file system that has a number of enhancements that set it apart from
FAT:
QUESTION 123:
Which of the following tools is a place to get a quick look of what is being shared on
your computer?
QUESTION 124:
Which of the following must you do before you can boot from a bootable CD ROM?
Explanation: The BIOS might be set to boot from the hard drive before it tries to
boot from the CD-ROM. In this case the boot sequence must be changed to make it
possible to boot from the CD-ROM
QUESTION 125:
When installing Windows 98, what does the Compact installation install?
A. A minimal set of components and options.
B. Selected components and options.
C. A general set of components and options as well as a number of communication tools.
D. A general set of components and options.
Answer: A
Explanation: The compact option installs a minimal set of components and options.
Incorrect Answers:
B: Custom installation allows you to choose exactly which components you want. Each
group generally has a number of options included with it, and you can choose to install
all, some, or none of any component group.
C: Portable installs fewer components than the typical install, but it does include a
number of communication tools left out of the typical install, including Dial-Up
Networking.
D: Typical installs a good base of most elements and is the best option if you are
installing a system for someone else, and are not sure which options to install.
QUESTION 126:
A. SYSTEM.INI.
B. SETUP.EXE.
C. AUTOEXEC.BAT
D. BOOT.INI
Answer: D
A: The SYSTEM.INI has settings for the drivers that Windows uses.
B: To upgrade from Windows 95 to Windows 98, you need to start the SETUP.EXE
program.
C: The AUTOEXEC.BAT is used in Windows 9x systems.
QUESTION 127:
A client has asked you to upgrade his Windows 98 system to Windows 2000. Which
of the following should you do?
Explanation: The simplest option is to place the Windows 2000 Professional disk
into the CD-ROM drive of the machine to be upgraded. A window should
automatically appear asking if you want to upgrade to Windows 2000.
Incorrect Answers
A, C: If you start the installation from outside the current system a clean operation
system will be installed, not an upgrade.
QUESTION 128:
Which of the following should you start to upgrade Windows 95 to Windows 98?
(Select all that apply.)
A. SYSTEM.INI.
B. SETUP.EXE.
C. WIN.INI.
D. None of the above
Answer: B
Explanation: In order to start the upgrade, you need to start the SETUP.EXE
program.
Incorrect Answers
A: The SYSTEM.INI has settings for the drivers that Windows uses.
C: The WIN.INI controls the Windows operating environment.
QUESTION 129:
Explanation: The program that performs the installation is called SETUP.EXE, and
it's located either in the root directory of Disk 1 of the set of installation floppies or
in the WIN98 directory of the installation CD-ROM.
QUESTION 130:
A. The memory managers and settings to get the computer up and running.
B. The XCOPY.EXE files.
C. Temporary files.
D. All of the above.
Answer: C
Explanation: The SETUP.EXE copies a few temporary files to your hard disk.
These temporary files are the components of the Installation Wizard that will guide
you through the installation of Windows 9x.
Incorrect Answers
A: The AUTOEXEC.BAT and CONFIG.SYS which are the necessary memory managers
and settings to get the computer up and running.
B: The XCOPY.EXE allows you to copy multiple files and directories easily
QUESTION 131:
A. 320 MB
B. 1 GB
C. 2 GB
D. 1.5 GB
Answer: C
Explanation: The minimum requirement is 2GB plus, which is needed for your
applications and storage.
QUESTION 132:
Explanation: Many Windows NT drivers will work with Windows 2000, while
Windows 95 or 98 drivers will NOT work!
QUESTION 133:
Which of the following does Windows 2000 Professional use to start Setup? (Select
all that apply.)
A. Install
B. Winnt32
C. Setup
D. Winnt
Answer: B, D
QUESTION 134:
A. 1 GB
B. 2 GB
C. 4 GB
D. 8 GB
Answer: C
Explanation: The maximum amount of memory that can be supported on Windows
XP Professional and Windows Server 2003 is 4 GB.
QUESTION 135:
When installing unsigned Windows drivers there is often a risk involved. From the
following choose the most common risk.
A. Deletion of files.
B. Damage to devices.
C. Files may be become fragmented.
D. System stability may be compromised.
Answer: D
Explanation: Digital signatures allow administrators and end users who are
installing Windows-based software to know whether a legitimate publisher has
provided the software package. Earlier versions of Windows used digital signatures
to discourage users from installing download packages, executable files, and drivers
from untrusted sources.
QUESTION 136:
You need to remove a driver that is causing a Windows boot problem, which of the
following actions do you need to perform?
QUESTION 137:
A. Task Manager.
B. Control Panel.
C. Computer Management.
D. Device Manager.
Answer: A
Explanation: Task Manager can be used to locate applications and services that are
consuming too much system resources, and can be used to kill those process threads.
Incorrect Answers:
B: Control Panel houses a number of system utilities.
C: Computer Management is used to manage the System Tools, Storage space, and
Services and Applications.
D: Device manager is used to manage devices, not virtual memory.
QUESTION 138:
During the startup process, which Windows operating system pauses and then
queries you to indicate whether you want to utilize the Last Known Good profile
that worked the previously?
A. Windows 2000
B. Windows XP
C. Window NT
D. All of the above
Answer: C
Explanation: Window NT queries you to indicate whether you want to utilize the
Last Known Good profile that worked previously. The operating system displays a
listing of other available operating system from which to boot as well.
Incorrect Answers
A, B: With Windows XP and Windows 2000, the BOOT.INI file continues to generate
on offering of bootable operating systems. These operating systems do not provide the
paused screen during the startup process, like Windows NT does.
D: When Window NT is the correct answer.
QUESTION 139:
Which of the following Interactive Startup options should you select if you want to
start Windows using only basic files and drivers, and network connections?
QUESTION 140:
If you receive the "Non-system disk or disk error" error message, what issue should
you start troubleshooting for?
A. A missing operating system where the computer failed to locate a boot sector with an
operating system installed.
B. A memory size error.
C. A missing or malfunctioning keyboard.
D. None of the above
Answer: A
Explanation: You have a missing operating system when the computer fails to locate
a boot sector with an operating system installed on any of its disks.
Incorrect Answers
B: The power on self-test (POST), built into a computer, indicates memory specific
issues with a number commencing with 2.
C: The power on self-test (POST), built into a computer, indicates missing or
malfunctioning keyboard issues with a number commencing with 3.
D: A missing operating system is the correct answer.
QUESTION 141:
Which of the following are typical indications of a boot process fail situation?
A. An automatic reboot
B. Complete lock-up
C. A blank screen
D. A blue error screen
E. All of the above
Answer: E
Explanation: Each one of the above mentioned conditions point to a failed boot
process.
QUESTION 142:
When you receive a "Kernel file is missing from the disk" error message, which of
the following DOES NOT apply?
Explanation: When you receive the "Kernel file is missing from the disk" error
message, you have a NTLDR file missing or corrupt issue. The NTDETECT.COM
file deals with hardware detection during startup.
Incorrect Answers
A, B, D: These statements are TRUE.
QUESTION 143:
A: The two DOS configuration files are AUTOEXEC.BAT and CONFIG.SYS which are
the necessary memory managers and settings to get the computer up and running.
B: This has nothing to do with the problem.
D: The EMM386.EXE is a memory driver.
QUESTION 144:
Which of the following files starts the process of loading the operating system on the
computer, and therefore needs to exist to boot Windows?
A. NTLDR.COM.
B. BOOT.INI
C. NTBOOTDD.SYS
D. NTDETECT.COM
Answer: A
Explanation: NTLDR.COM is the file that starts the process of loading the
operating system on the computer. In order to load Windows, this file must exist
and not be corrupted.
Incorrect Answers
QUESTION 145:
Which of the following would cause a Windows XP system not to boot up? (Select all
that apply.)
Explanation: NTLDR is heavily relied upon during the boot process. If it is missing
or corrupted, Windows XP will not be able to boot. The BOOT.INI file is required
for a successful boot on a Windows NT/2000/XP computer.
Incorrect Answers:
B, D: CONFIG.SYS and AUTOEXEC.BAT are required for Windows 9x systems.
QUESTION 146:
QUESTION 147:
What is the purpose and function of the SCANDISK command?
QUESTION 148:
Which of the following is a utility that allows you to fix corrupt file problems or disk
errors on a computer running Windows 98?
A. SCANDISK
B. SCANREG
C. Event Viewer
D. FDISK
Answer: A
Explanation: The SCANDISK tool can be used to correct corrupt file problems or
disk errors, like cross-linked files.
Incorrect Answers:
B: The purpose and function of the SCANREG command is to allow you to scan the
Registry by starting a Windows application that checks for errors and allows you to back
up the Registry files.
C: The Event Viewer is used to log data about the computer.
D: The FDISK utility is used to prepare a drive for first time usage.
QUESTION 149:
Which of the following would you find in the laser printer? (Select TWO.)
A. Laser scanner
B. Ink ribbon
C. Toner cartridge
D. Daisy wheel
Answer: A, C
Explanation: The laser printer consists of toner cartridge, fusing assembly, laser
scanner; high-voltage power supply, DC power supply, paper transport assembly
(including paper pickup rollers and paper registration rollers), corona, and printer
controller circuitry.
Incorrect Answers:
B: The impact printer uses a mechanical device the drive forward until it hits unto the
surface of the ink ribbon.
D: The Impact printer uses the daisy wheel
QUESTION 150:
A. It consists of a print-head
B. It consists of toner powder
C. It consists of an ink ribbon
D. It consists of an ink cartridge
Answer: C
Explanation: The impact printer uses a mechanical device the drive forward until it
hits unto the surface of the ink ribbon.
Incorrect Answers:
A: The bubble-jet uses the ink cartridge, which consists of the print-head and ink supply.
B: The laser uses the toner powder, which is made of plastic, metal, and organic material.
D: The bubble-jet uses the ink cartridge, which consists of the print-head and ink supply.
QUESTION 151:
Explanation: The bubble-jet uses the ink cartridge, which consists of the print-head
and ink supply.
Incorrect Answers:
A: The laser uses the toner powder.
C: The impact printer uses a mechanical device the drive forward until it hits unto the
surface of the ink ribbon.
D: The bubble-jet uses the ink cartridge, which consists of the print-head and ink supply.
QUESTION 152:
A. Laser printers
B. Bubble jet printers
C. Impact printers
D. None of the above
Answer: B
Explanation: The bubble-jet uses the ink cartridge, which consists of the print-head
and ink supply.
Incorrect Answers:
A: The laser uses the toner powder, which is made of plastic, metal, and organic material.
C: The impact printer uses a mechanical device the drive forward until it hits unto the
surface of the ink ribbon.
D: The bubble-jet uses the ink cartridge, which consists of the print-head and ink supply.
QUESTION 153:
The new Certkiller .com trainee technician wants to know under which category of
printing devices the fax machine resort. How will you reply?
A. Impact printers
B. Direct thermal printers
C. Bubble jet printers
D. None of the above
Answer: B
Explanation: Direct thermal printers includes some fax machines and inexpensive
and high-portability printers
Incorrect Answers:
A: The impact printer uses dot matrix or the daisy wheel.
C: The bubble-jet is an example of the color printers.
D: This is incorrect since option B represents the answer.
QUESTION 154:
In which of the following printer would you find the paper registration rollers?
Explanation: The laser printer consists of toner cartridge, fusing assembly, laser
scanner; high-voltage power supply, DC power supply, paper transport assembly
(including paper pickup rollers and paper registration rollers), corona, and printer
controller circuitry.
Incorrect Answers:
A, B: Impact printers include the daisy wheel printer and dot matrix printer.
D: This is incorrect since option C represents the answer.
QUESTION 155:
Which of the following substance in the toner cartridge makes the toner "flows"
better?
A. Ink supply
B. Polyester resins
C. Iron oxide particles
D. Carbon substance
Answer: B
Explanation: The polyester resin makes the "flow" of the toner better.
Incorrect Answers:
A: The bubble-jet uses the ink cartridge, which consists of the print-head and ink supply.
C: An iron oxide particle makes the toner sensitive to electrical charges.
D: This gives the color to the toner.
QUESTION 156:
In a laser printer, which of the following components carries the toner, before it is
used by the EP process?
A. The drum
B. Developer
C. Toner cartridge
D. None of the above
Answer: B
Explanation: The toner contains a medium called the developer (carrier), which
"carries" the toner until it is used by the EP process.
Incorrect Answers:
A: This drum is coated with a photosensitive material that can hold a static charge
C: The EP toner cartridge holds the toner.
D: The toner contains a medium called the developer (carrier), which "carries" the toner
until it is used by the EP process.
QUESTION 157:
Which part of the laser printer gives the voltage for the charge and the transfer
corona assemblies?
A. Controller circuitry
B. High-voltage power supply (HVPS)
C. DC power supply (DCPS)
D. Transfer corona
Answer: B
Explanation: The high-voltage power supply supplies the voltages for the charge
and transfer corona assemblies.
Incorrect Answers:
A: This large circuit board converts signals from the computer into signals for the various
assemblies in the laser printer, using the process known as rasterizing.
C: This is the power supply for the Printer it selves.
D: The transfer corona assembly is charged with a high-voltage electrical charge. This
assembly charges the paper, which pulls the toner from the photosensitive drum.
‘QUESTION 158:
What is used to drain the charge in the paper when printing with a laser printer?
QUESTION 159:
A. Serial
B. SCSI
C. USB
D. Parallel
Answer: C
Explanation: The USB interface is the latest of the serial interface and parallel
interfaces.
Incorrect Answers
A: The serial interface is slower than the parallel interface, so the serial is not preferably
used.
B: The SCSI bus interface is a type of device management system. It was designed to
attach peripheral devices to a PC's motherboard.
D: The parallel interface is the standard interface.
QUESTION 160:
A. USB 2.0
B. Bluetooth
C. IEEE 802.11a
D. IEEE 802.11g
Answer: A
QUESTION 161:
After connecting a new printer to a Windows XP Home computer via a USB cable,
the user complains that the computer recognized the new device but the printer still
will not function. What is the most likely cause?
Explanation: If Windows XP doesn't contain drivers for the new printer it will ask
for it when it is connected. Unless the correct device drivers are provided the device
will not function properly.
QUESTION 162:
QUESTION 163:
After installing a local USB printer which steps should the Certkiller .com technician
take?
A. Install a standard driver from the Windows CD and connect the printer after the
drivers are installed.
B. Connect the printer to the computer and the Windows Plug and Play will tell the
technician where to find the drivers on the internet.
C. Install the drivers from the manufacturers CD and the installation procedure will tell
the technician when to connect the printer.
D. Connect the printer to the computer and then Windows Plug and Play will inform you
that the printer is set up.
Answer: C
Explanation: Always follow manufacturers installation instructions, as in some
cases Windows XP will use device drivers that will not work if the new device
drivers are not installed before the device is connected and powered on.
QUESTION 164:
If a printer is not printing full color correctly, which of the following steps can be
taken to attempt to solve the problem?
Explanation: Most issues where ink jet printers aren't printing with good quality
can be fixed by running the printers built in calibration tool.
QUESTION 165:
When printing documents from an ink jet printer at Certkiller .com the documents
appear to be blurred. Select from the list below what should be done.
Explanation: Most issues where ink jet printers aren't printing with good quality
can be fixed by running the printers built in calibration tool.
QUESTION 166:
QUESTION 167:
After printing for several weeks to a local printer the user suddenly cannot print
any longer. From the following what should the technician check first?
Explanation: First check if there is paper, next if all cables are connected as they
should be. After that start some real troubleshooting.
QUESTION 168:
After printing a test page from an operational printer, the Certkiller .com technician
is unable to print a document from Windows. On the printer what should the
technician check first?
Explanation: First check if there is paper, next if all cables are connected as they
should be. After that start some real troubleshooting. As the test page initiated at
the printing device worked the paper tray is probably not empty.
QUESTION 169:
The scanner light comes on but when the scan button is pressed, nothing happens
and the lamp doesn't move. The computer is still communicating with the scanner.
From the following try and determine the cause of this problem.
QUESTION 170:
After trying to print a numeric error code is displayed on the screen of the printer.
To determine the meaning of the code what should the technician do?
QUESTION 171:
What problem can be cause by the fusing assembly?
QUESTION 172:
The usual cause of the paper jams in Bubble-jet printers is caused through a worn
pick up roller. What is the other common cause of paper jams in Bubble-jet
printers?
Explanation: Paper jams in bubble-jet printers are usually due to one of two things:
a worn pickup roller, or the wrong type of paper.
Incorrect Answers:
A: If an ink cartridge becomes damaged, or develops a hole, it can put too much ink on
the page and the letters will smear.
C: This happens in laser printer when the pick up roller pick up more than one page.
D: Paper jams in bubble-jet printers are usually due to one of two things: a worn pickup
roller, or the wrong type of paper.
QUESTION 173:
The term "ghosting" is used when there are light images of previously printed pages
on the current page. Which of the following can be the cause of this? (Select TWO.)
Explanation: If the erasure lamps are bad, the previous electrostatic discharges
aren't completely wiped away. A broken cleaning blade, on the other hand, causes
old toner to build up on the EP drum and consequently present itself in the next
printed image.
Incorrect Option
B: This has nothing to do with the light images of the previous printing page.
D: If the erasure lamps are bad, the previous electrostatic discharges aren't completely
wiped away. A broken cleaning blade, on the other hand, causes old toner to build up on
the EP drum and consequently present itself in the next printed image.
QUESTION 174:
A customer reports that his laptop can no longer print to the printer, after
relocating a Wireless IrDA (Infrared data association) printer. Explain by choosing
from the following what the MOST likely cause of this problem would be.
A. The printer is more than one meter (3 feet) from the laptop.
B. The printer driver has not been set up.
C. The laptop needs to be rebooted.
D. The printer needs to be installed.
Answer: A
QUESTION 175:
The letters seem to smear if touched straight after a document has been printed
from a laser printer. From the following select the correct cause of this.
A. The toner is running low.
B. The cartridge must be changed.
C. The toner has become desensitized.
D. The fuser is not getting hot enough.
Answer: D
Explanation: fuser, the part of a laser printer that melts the toner onto the medium.
It consists of a hot roller and a back-up roller. After toner is transferred to the
paper, the fuser applies heat and pressure to ensure that the toner stays on the
paper permanently. This is why paper is warm when it comes out of a laser printer.
QUESTION 176:
What would you check first if an ink jet printer is printing with a horizontal line
missing in the middle of each letter?
Explanation: The print head consist of nozzles that produce very small ink bubbles
that turn into tiny droplets of ink. These nozzles could get dry or stop working
which would produce the "unprinted" line.
QUESTION 177:
Which of the following is the first step you should take when a Certkiller .com user's
documents are in the print queue but will not print?
QUESTION 178:
QUESTION 179:
A. ISDN
B. CSU / DSU
C. Cable
D. DSL
Answer: B
Explanation: While a CSU / DSU connect a digital carrier line, such as the T-series
or the DDS line to your network, it does not perform modulation and demodulation.
Incorrect Answers:
A, C, D: ISDN, Cable and DSL are all modems that modulate digital data onto an analog
carrier for transmission over the internet and demodulates from the analog carrier to a
digital signal at the receiving end.
QUESTION 180:
A. 190.0.x.x
B. 240.0.x.x
C. 127.0.x.x
D. 192.168.x.x
Answer: D
10.0.0.0 - 10.255.255.255
172.16.0.0 - 172.31.255.255
192.168.0.0 - 192.168. 255.255
QUESTION 181:
A. bi-directional
B. half duplex
C. full duplex
D. multi directional
Answer: B
QUESTION 182:
A. USB
B. USB 2.0
C. SCSI-1
D. IEEE-1394
Answer: B
Explanation: Not so easy to answer as new Firewire and SCSI standards are
developed.
Max throughput:
Firewire: 400 Mbps (original specification)
Firewire: IEEE 1894b: 800 Mbps
USB 2.0: 480 Mbps
Ultra3 SCSI: 1280 Mbps
QUESTION 183:
A. ARP
B. DNS
C. DHCP
D. WINS
Answer: C
.
QUESTION 184:
Explanation: The internet uses host names. DNS is responsible for host name
resolution.
Incorrect Answers:
A: DHCP is responsible for automating the assignment of IP configurations to computer
systems on a TCP/IP network. It is not used for name resolution.
C: WINS provides NetBIOS name resolution, not host name resolution.
D: NAT allows multiple private IP addresses to be mapped to a single public IP address,
and allows hosts on a private network to connect to the Internet. It does not provide name
resolution.
QUESTION 185:
A. Token passing
B. Full duplex
C. CSMA / CA (Carrier Sense Multiple Access / Collision Avoidance)
D. CSMA / CD (Carrier Sense Multiple Access / Collision Detection)
Answer: A
QUESTION 186:
A. Token passing
B. Half duplex
C. CSMA / CA (Carrier Sense Multiple Access / Collision Avoidance)
D. CSMA / CD (Carrier Sense Multiple Access / Collision Detection)
Answer: C
QUESTION 187:
A. CAT4
B. CAT3
C. CAT5
D. CAT6
Answer: D
QUESTION 188:
A. Coaxial cable
B. Fiber Optic cable
C. UTP cable
D. Wireless
Answer: B
QUESTION 189:
A. CAT3.
B. CAT5.
C. CAT5e.
D. CAT6.
Answer: C
QUESTION 190:
You have two workstations. Each workstation has a 100BASE-T network card. You
want to connect the two workstations directly without the use of a hub or switch.
Which cable could you use?
A. CAT3 crossover
B. CAT5 crossover
C. CAT3 straight
D. CAT5 straight
Answer: B
Explanation: Both workstations' NIC will be physically and electronically the same
medium dependent interface (MDI), therefore, you need a crossover cable to
connect the two together. 100BASE-T has a transmissions speed of up to 100 Mbps.
The minimum twisted-pair, copper cable that can support these speeds is CAT5
cable.
Incorrect Answers:
A, C: Both workstations' NIC will be physically and electronically the same as a medium
dependent interface (MDI), therefore, you need a crossover cable to connect the two
together. 100BASE-T has a transmissions speed of up to 100 Mbps. However, CAT3
cable is rated at only 16 Mbps. The minimum cable rating that can support 100Mbps
CAT5 cable.
D: Straight cable can connect a workstation on a 100BASE-TX network to hub, router, or
switch, which would have medium dependent interface-crossover (MDI-X) port.
However, a crossover cable is required to connect two client workstations directly as the
two workstations will have similar medium dependent interfaces (MDIs).
QUESTION 191:
Certkiller .com has a routed network. You need to extend the network by adding a
second router. How would you use to connect the two routers?
Explanation: The ports on the two routers will be physically and electronically the
same medium dependent interface (MDI), therefore, you need a crossover cable to
connect the two together.
Incorrect Answers:
A, C: The ports on the two routers will be physically and electronically the same medium
dependent interface (MDI), therefore, you need a crossover cable to connect the two
together. A straight through CAT5 or patch cable will not work.
D: You can connect the two routers by using a crossover cable.
QUESTION 192:
B: RG-8 coaxial cable is also susceptible to EMI, but not to the same extent as UTP.
C, D: Fiber optic cable is immune to EMI.
QUESTION 193:
QUESTION 194:
A. 25 meters
B. 75 meters
C. 100 meters
D. 182 meters
E. 550 meters
Answer: C
QUESTION 195:
Explanation: For Ethernet networks cables are still limited to a maximum of 100 m
(328 ft) in length (normal practice is to limit fixed ("horizontal") cables to 90 m to
allow for up to 5 m of patch cable at each end).
QUESTION 196:
A Certkiller .com user is unsure of the cabling standards to use when installing a
gigabit Ethernet network. From the following select the best one should they use?
A. CAT6
B. CAT5e
C. CAT5
D. CAT4
Answer: A
Explanation: Cat 6-Category - 6, (ANSI/TIA/EIA-568-B.2-1) is a cable standard for
Gigabit Ethernet and other network protocols that is backward compatible with the
Category 5/5e and Category 3 cable standards. Cat-6 features more stringent
specifications for crosstalk and system noise. The cable standard provides
performance of up to 250 MHz and is suitable for 10BASE-T / 100BASE-TX and
1000BASE-T (Gigabit Ethernet).
QUESTION 197:
Which of the following is the connector used for 100Base-T Ethernet cables?
A. RJ-11
B. BNC
C. RJ-58
D. RG-45
Answer: D
Explanation: RJ-45 is the eight-pin connector used for data transmission over
twisted-pair wiring. RJ-45 is the connector used on 100Base-T Ethernet cables.
Incorrect answers:
A: The connector on the end of the cord that runs from the phone to the wall is an RJ-11
connector.
B: BNC connectors are used for Thinnet (10Base-2) Ethernet connections.
C: RG-58 is coaxial cable. It is not a connector.
QUESTION 198:
A. MT-RJ
B. RJ-45
C. RJ-11
D. ST
Answer: B
QUESTION 199:
Which of the following denotes the amount of pins found in an IEEE 1394
connector? (Select all that apply.)
A. 5
B. 6
C. 4
D. 9
Answer: B, C
A. 10Base2
B. 10Base5
C. 10BaseT
D. 10BaseFL
Answer: C
Explanation: A 10BaseT cable is either an UTP or a STP cable. Both these cables
use the RJ-45 connections.
Incorrect Answers
A, B: Coaxial cables are used on thinnet (10Base2) or thicknet (10Base5) networks.
D: Fiber connectors are used on 10BaseFL networks.
QUESTION 201:
A. 2
B. 3
C. 4
D. 5
Answer: C
An RJ-45 connector is used on UTP cable which consists of 4 pairs of twisted wires.
QUESTION 202:
A. RG-58 Coaxial
B. RG-59 Coaxial
C. Unshielded Twisted Pair
D. Multimode fiber optic
Answer: C
Explanation: RJ-45 connectors are used with UTP and STP cables.
Incorrect Answers:
A, B: RG-58 and RG-59 coaxial cable uses BNC connectors, not RJ-45 connectors.
D: Multimode fiber optic cable use ST or SC connectors.
QUESTION 203:
Certkiller .com has two Windows XP Professional computers that are being
connected to a single broadband Internet connection by a router. From the
following which do you think would be used to configure the router?
QUESTION 204:
A. Modem
B. Switch
C. Gateway
D. Bridge
Answer: C
QUESTION 205:
Which of the following devices can be used to connect two similar network segments
but keeps network traffic separate on the two segments?
A. Modem
B. Switch
C. Gateway
D. Bridge
Answer: D
Explanation: A bridge connects two similar network segments together but keeps
traffic separated on both sides of the bridge. Traffic is only allowed to pass through
the bridge if it is intended for a host on the other side of the bridge.
Incorrect Answers:
A: A modem modulates digital data onto an analog carrier for transmission over the
internet and demodulates from the analog carrier to a digital signal at the receiving end.
B: A switch connects multiple segments of a network together.
C: A gateway is any hardware and software combination that connects dissimilar
network environments.
QUESTION 206:
A. 802.11
B. 802.11a
C. 802.11b
D. 802.11g
Answer: B, D
QUESTION 207:
A. 2.4 GHz
B. 5.0 GHz
C. 5.4 GHz
D. 10 GHz
Answer: A
Explanation: IEEE 802.11b and IEEE 802.11g uses the 2.4 GHz frequency band.
Incorrect Answers:
B: IEEE 802.11a uses the 5.0 GHz frequency band, not 802.11b.
C, D: No IEEE wireless standard uses the 5.4 GHz or the 10 GHz frequency bands.
QUESTION 208:
A. 2.4 GHz
B. 5.0 GHz
C. 5.4 GHz
D. 10 GHz
Answer: B
A: IEEE 802.11b and IEEE 802.11g uses the 2.4 GHz frequency band frequency band.
C, D: No IEEE wireless standard uses the 5.4 GHz or the 10 GHz frequency bands.
QUESTION 209:
A. 720 Kbps
B. 2 Mbps
C. 11 Mbps
D. 54 Mbps
Answer: C
QUESTION 210:
A. 720 Kbps
B. 2 Mbps
C. 11 Mbps
D. 54 Mbps
Answer: D
QUESTION 211:
Which of the following would interfere with an IEEE 802.11g Wireless network?
(Select all that apply.)
A. Walls
B. Bluetooth devices
C. Microwave ovens
D. IEEE 802.11a devices
Answer: A, C
Explanation: Walls interfere with all wireless networks with the more walls a
wireless signal has to pass through, the greater the signal loss. Microwave ovens also
use the unlicensed 2.4 GHz radio frequency band and could interfere with an IEEE
802.11g Wireless network.
Incorrect Answers:
B: Bluetooth and IEEE 802.11g uses different spread spectrum signaling methods which
prevents interference between that two. Bluetooth uses the frequency hopping spread
spectrum (FHSS) signaling method while IEEE 802.11g uses a direct sequence spread
spectrum (DSSS).
D: IEEE 802.11a devices operate at the 5.0 GHz radio frequency band and will not
interfere with IEEE 802.11g networks which operate at the 2.4 GHz radio frequency
band.
QUESTION 212:
A. 720 Kbps
B. 2 Mbps
C. 11 Mbps
D. 54 Mbps
Answer: A
B: IEEE 802.11, the original standard for wireless networks operates at a maximum
speed of 2 Mbps.
C: IEEE 802.11b has a transmission speed of up to 11 Mbps.
D: IEEE 802.11g operates at a maximum speed of 54 Mbps.
QUESTION 213:
A. SPX address.
B. UID.
C. IP address.
D. MAC address.
Answer: D
QUESTION 214:
You are the Certkiller .com technician charged with setting up a Wireless network on
some laptops and notebooks for ten users. You must decide whether it is better to
operate the wireless network in ad-hoc mode or infrastructure mode. The wireless
network must be able to bridge to wired networks or routing to the Internet?
Explanation: The Ad-hoc networks performs well in a situation were there is a few
stations but problems may arise as your user number increases so it is better to use
an infrastructure network which is meant for networks of five or more stations.
Incorrect Answers:
A: There are too much users here for an Ad-hoc network problems may occur.
B: Creating two Ad-hoc networks cost too much administration time.
D: Creating two infrastructure networks is out of the question as one will do in this
scenario.
QUESTION 215:
A. A Bridge
B. A Gateway
C. A Modem
D. An Access Point
Answer: D
Explanation: A WAP (Wireless Access Point) is the connection point for a Wireless
network.
Incorrect Answers:
A: A modem modulates digital data onto an analog carrier for transmission over the
internet and demodulates from the analog carrier to a digital signal at the receiving end.
B: A gateway is any hardware and software combination that connects dissimilar wired
network environments.
C: A bridge connects only two similar wired network segments together.
QUESTION 216:
The Certkiller .com network has 200 computers that are connected with hubs. An
upgrade should be suggested to improve network performance. Which of the
following would be your choice?
Explanation: Hubs works without knowing what IP address is where, and therefore
forwards all IP packets to all ports except the receiving port. Switches builds a table
over hosts on ports and sends directed IP packets to single ports, unless the address
does not exist in the table, then it will broadcast the packet. This way switches
reduce the size of the collision domains and therefore produces a more efficient
network.
QUESTION 217:
You can determine the connection speed and signal strength of a wireless network
connection on a Windows XP computer by using ______.
QUESTION 218:
You are the network administrator at Certkiller .com. Two Microsoft Windows XP
workstations on the Certkiller .com network have the same IP address, resulting in
an IP address conflict. Which command can you use to identify the conflicting
computers?
A. ping
B. arp -a
C. ipconfig /all
D. winipcfg /all
Answer: B
Explanation: The arp utility is useful for resolving duplicate IP addresses. The arp
-a command displays the local ARP table which lists the IP address to MAC address
mappings.
Incorrect Answers:
A: Ping is used to test connectivity between two hosts using the IP address of the remote
hosts. If the remote host's IP address is in conflict with another host, ping will return an
error.
C: ipconfig /all displays the IP configuration and MAC address for the local workstation.
It does not display IP configurations or the MAC address of remote workstations.
D: winipcfg is the Windows 9x version of ipconfig and displays the IP configuration and
MAC address for the local workstation but not the IP configuration or the MAC address
of remote workstations.
QUESTION 219:
You are the network administrator at Certkiller .com. You want to test connectivity
between a workstation and the Certkiller .com server. Which command would you
use?
A. ping
B. arp -a
C. ipconfig /all
D. winipcfg /all
Answer: A
Explanation: Ping is used to test connectivity between two hosts using the IP address
of the remote hosts.
Incorrect Answers:
B: The arp utility is useful for resolving duplicate IP addresses. The arp -a command
displays the local ARP table which lists the IP address to MAC address mappings. It does
not test connectivity between two hosts.
C: ipconfig /all displays the IP configuration and MAC address for the local workstation.
It does not test connectivity between two hosts.
D: winipcfg is the Windows 9x version of ipconfig and displays the IP configuration and
MAC address for the local workstation. It does not test connectivity between two hosts.
QUESTION 220:
Which of the following commands can you use to verify the IP configuration of a
Microsoft Windows 98 workstation?
A. ping
B. arp -a
C. ipconfig /all
D. winipcfg /all
Answer: D
Explanation: Winipcfg /all is the Windows 98 version of ipconfig /all and displays
the IP configuration and MAC address for the local Windows 98 workstation.
Incorrect Answers:
A: Ping is used to test connectivity between two hosts using the IP address of the remote
hosts. If the remote host's IP address is in conflict with another host, ping will return an
error.
B: The arp utility is useful for resolving duplicate IP addresses. The arp -a command
displays the local ARP table which lists the IP address to MAC address mappings.
C: ipconfig /all displays the IP configuration and MAC address for the local Windows
2000 or Windows XP workstation, not he Windows 98 workstation.
QUESTION 221:
You work as the network administrator at Certkiller .com. You have installed an
Ethernet NIC on a new computer and connected it to the network. However, the
amber light on the NIC is flashing furiously. What is the problem?
Explanation: The amber light, which is the collision light, indicates that an Ethernet
collision has occurred. This light will flash continually because collisions are
common on Ethernet networks.
Incorrect Answers:
A: The green light on a NIC or hub is the link light and indicates that the NIC and hub
are making a logical Data Link layer connection.
C: If there is a problem between the NIC and the hub, the green link light on the NIC and
the hub would be off.
D: The lights on a NIC or hub do not indicate if a network is down. They only indicate
connectivity or transmissions collisions on a particular link.
QUESTION 222:
You cannot reach a Web site on the Certkiller .com intranet but you can ping the
Web server by host name. What is the probable cause of the problem?
Explanation: Web browsers use HTTP to access web sites. If HTTP is down or port
80, which is used for HTTP traffic, is blocked, you won't be able to access the
intranet Web site.
Incorrect Answers:
QUESTION 223:
How can a user access a Web site when his DNS server is down?
A: DNS resolves host names to IP addresses, not MAC addresses. Thus, by using the IP
address of the remote host, DNS will not be required.
C: IPSec is used to secure data transmissions over the Internet. It does not provide an
alternative method of accessing a Web server.
D: SSL is used to secure data transmissions between a browser and a Web server. It does
not provide an alternative method of accessing a Web server.
QUESTION 224:
When does the activity light on an Ethernet interface go on? Select your correct
answer below.
A. Routers
B. Switches and bridges
C. Remote access servers
D. Modems
Answer: C
QUESTION 226:
You work as the security administrator at Certkiller .com. You want to implement a
remote access solution that will enable mobile users to access the corporate
Certkiller .com network. All mobile users will be using laptops that have Ethernet
adapters to access shared files and e-mail on the corporate Certkiller .com network.
Half of the laptops are equipped with modems.
What solution should you use?
A: ISDN is used mainly for Internet connectivity but can be used for remote access.
However, this would require an ISDN modem.
B: Dial-up is a remote access method that requires the use of modems in both the remote
access clients and the remote access server. Not all laptops have modems; therefore this
option will not meet the needs of all laptop users.
C: SSL is a website technology used to secure communication between a browser and a
web server. It is not used for remote access.
QUESTION 227:
You work as the security administrator at Certkiller .com. You plan to implement a
VPN (Virtual Private Network).
Which security consideration should you be aware of?
A. Intruders can intercept VPN traffic and then launch a man in the middle attack.
B. Captured data can be easily decrypted because there are only a finite number of
encryption keys.
C. Tunneled data cannot be authenticated and authorized.
D. Firewalls cannot inspect traffic that is encrypted.
Answer: D
Explanation: A firewall can't inspect traffic once it is channeled into a VPN. When a
firewall sees a VPN channel, it considers it as already passing security checks. The
firewall does not have the ability to see through the encrypted channel.
Incorrect Answers:
A: VPNtraffic is tunneled through the public network and cannot be intercepted.
B: Encrypted data cannot easily be decrypted.
C: A tunneled connection can be authenticated via RADIUS. Once connected, the normal
network management systems can be used for authorization and accounting.
QUESTION 228:
A: IPSec provides data authentication and encryption services for securing VPNs. In
Transport mode, only the payload is encrypted. In Tunneling mode, both the payload and
message headers are encrypted.
B: Packet filtering firewalls allow or blocks traffic based on the type of application. This
type of firewall decides whether to pass traffic based on the packet's addressing
information and can be based on IP addresses or ports.
D: Circuit-level firewalls watch TCP and UDP ports and can be used to configure security
devices with the rate of responses to requests to process, and to block any impending
communications from suspicious hosts.
QUESTION 229:
You work as the security administrator at Certkiller .com. You have been instructed
to perform the configuration which will allow only HTTP (Hypertext Transfer
Protocol) traffic for outbound Internet connections. In addition to this requirement,
only specific users must have permissions to browse the web.
Which solution should you use to enforce your requirements?
* To filter requests, so a strict parent or company can prevent their kids or employees
from viewing the wrong sties.
* The increase performance, so multiple users accessing the same information (like a
school, or a library,) can fetch common information from the proxy server.
Incorrect answers:
A: A proxy server would be more suited to the needs of the company.
B: A protocol analyzer is not used to set permissions to allow only certain users access to
browse the web.
D: A stateful firewall not only examine packets at the Network layer, but also gather
information about the packet's communications session from all layers to determine
whether a packet is valid in the context in which it is received. But this is all proxy-able.
QUESTION 230:
QUESTION 231:
You work as the security administrator at Certkiller .com. You want to implement a
solution which will secure the wireless network. The Certkiller .comwireless network
environment uses access points as repeaters.
What should you do next to secure the wireless network?
Explanation:
If every access point is secured to WEP standards, the entire range covered by the
wireless system will be encrypted to a security level that equals a conventional wired
network, thus preventing sniffing and unauthorized 'drive by' access.
Incorrect answers:
A: Making use of complex passwords is not the same as repeaters.
B: Ensuring that wireless cards are used is not the same as providing security in the form
of repeaters. This in fact might enhance the danger.
D: Adhoc mode is the same as a point-to-point (ad-hoc or wireless bridge), a network
created when two devices are brought within transmission range of each other. This is not
the same as security.
QUESTION 232:
You work as the security administrator at Certkiller .com. You want to implement a
solution which will provide a WLAN (Wireless Local Area Network) with the
security typically associated with a wired LAN (Local Area Network):
Which solution should you implement?
QUESTION 233:
You work as the security administrator at Certkiller .com. You want to prevent
intruders from using access points on your wireless network?
Which solution should you implement?
QUESTION 234:
You work as the network operator at Certkiller .com. A user has entered the wrong
WEP (Wired Equivalent Privacy) key into a wireless device. Which of the following
symptoms will occur?
Explanation: WEP requires that both the wireless computer and the WAP (wireless
access point) be configured with the same encryption key in order for the two to
communicate. If one of the two has the wrong WEP key, communication will not be
possible and the network will not be accessible.
QUESTION 235:
Prior to implementing a wireless solution, there is a specific action which you should
perform. Select this action from the available options.
A: Ad hoc mode allows two wireless devices to communicate directly with each other
without the need for a wireless access point.
B: Ensuringstrong passwords will improve authentication but will not prevent
interception of packet.
C: Wireless solutions can consist of Wi-Fi devices and Bluetooth enabled devices.
QUESTION 236:
You are a network administrator at Certkiller .com. The size of Certkiller .com's
WLAN is growing rapidly. Which two of the following tasks must be carried out to
maintain consistent network security? (Select TWO.)
A. Use Role Based Access Control (RBAC) to assign security policies to users
B. Update the WLAN architecture to support autonomous APs managed by WNMS
C. Configure APs to load their firmware from a TFTP server during initialization
D. Include the WLAN in a change management program
E. Create and maintain a security checklist for equipment staging
Answer: D, E
QUESTION 237:
You are an administrator at Certkiller .com. Certkiller .com wants you to install an
802.11g WLAN that supports fast roaming for 802.11b IP phones. The ability to
troubleshoot reassociations that are delayed or dropped during roaming is a
requirement. Of the following, which is the most cost-effective system that you can
apply to meet Certkiller .com's troubleshooting requirement?
QUESTION 238:
You are a network administrator at Certkiller .com. You frequently work from home
and wireless hotspots, rather than commuting to the office. Your laptop hooks up to
the office network via WLANs. Which of the following are two wireless security
policy items that you should implement to safeguard your data? (Select TWO.)
Explanation: The VPN would guarantee that the connection between you and your
workplace is secure. A personal Firewall on you computer will protect you when
using potentially unsecure wireless networks to VPN to you office.
QUESTION 239:
A WLAN security policy should address which two of the following elements?
(Select TWO.)
QUESTION 240:
QUESTION 241:
A. EFS
B. WPA
C. WEP
D. PAP
E. SAP
Answer: B
Explanation: Wired Equivalent Privacyor Wireless Encryption Protocol (WEP) is a
scheme to secure IEEE 802.11 wireless networks. It is part of the IEEE 802.11
wireless networking standard.
QUESTION 242:
It has been noted that the door to a server room at Certkiller .com has been propped
open. What do you suggest the technician should do?
A. Secure the door and follow company procedures for reporting security violations.
B. Have the access code for the lock changed.
C. Close the door and warn the other technician not to forget to close the door when
leaving the room.
D. Leave the door propped open to allow ventilation.
Answer: A
QUESTION 243:
You work as the security administrator at Certkiller .com. You are busy auditing the
Certkiller .com wireless network.
You find an unauthorized Access Point under the desk of a user named Amy Walsh.
Amy works in the Finance department. You confront Amy about this. Amy denies
any knowledge of the unauthorized Access Point. Amy informs you though that a
new friend has recently visited her, and on numerous occasions, at the company
premises.
Select the type of attack that was launched against Certkiller .com.
A. A SYN flood attacks.
B. A (DDos) Distributed Denial of Service attack.
C. A man in the Middle attack.
D. A TCP flood attack.
E. IP Spoofing.
F. Social Engineering
G. A replay attack
H. Phone tag
I. A halloween attack
Answer: F
A: A SYN flood, forces a victim system to use up one of its finite number of connections
QUESTION 244:
What should Certkiller .com when Certkiller .com's intranet SSL certificate is no
longer valid in Internet Explorer?
QUESTION 246:
A large amount of water is spilt on the floor of the server room at Certkiller .com.
Which of the following should be done first?
A. Place newspaper over the water.
B. Wear rubber soled shoes and mop up the floor.
C. Inform the system administrator of this safety hazard.
D. Shut down all computers in the server room.
Answer: C
QUESTION 247:
A Certkiller .com technician notices that there is a leak from the ceiling of the server
room. What should the technician do?
A. Place a bucket under the leak and inform the line manager.
B. Place a bucket under the leak and continue with his work.
C. Notify building services and system administrator.
D. Phone the janitor.
Answer: C
QUESTION 248:
On a Material Safety Data Sheet (MSDS) you will not find which the following?
A. chemical name
B. hazard rating
C. safety first measures
D. emergency telephone number
Answer: C
Explanation: A material safety data sheet (MSDS) is a form containing data
regarding the properties of a particular substance. An important component of
product stewardship and workplace safety, it is intended to provide workers and
emergency personnel with procedures for handling or working with that substance
in a safe manner, and includes information such as physical data (melting point,
boiling point, flash point, etc.), toxicity, health effects, first aid, reactivity, storage,
disposal, protective equipment, and spill handling procedures. The exact format of
an MSDS can vary from source to source.
QUESTION 249:
A. "A-rated," extinguisher.
B. "B-rated," extinguisher
C. "ABC-rated," extinguisher.
D. None of the above.
Answer: C
Explanation: A "C-rated" extinguisher is used for electrical fires. If you don't have
a "C-rated" extinguisher that is specifically rated for electrical fires, you can use an
ABC-rated extinguisher.
Incorrect Answers:
A: An "A-rated" extinguisher is used for wood and paper fires.
B: A "B-rated" extinguisher is used for flammable liquids.
D: A "C-rated" extinguisher is used for electrical fires. If you don't have a "C-rated"
extinguisher that is specifically rated for electrical fires, you can use an ABC-rated
extinguisher.
QUESTION 250:
Which of the following fire extinguishers would you use if your computer caught
fire?
A. "A-rated," extinguisher.
B. "B-rated," extinguisher
C. "C-rated," extinguisher.
D. None of the above.
Answer: C
QUESTION 251:
To dispose of laptop batteries, what would you suggest the correct procedure would be?
A. Incineration.
B. First try to recharge the batteries for reuse.
C. Consult the local guidelines for disposing of hazardous material.
D. Dispose in a trash can.
Answer: C
QUESTION 252:
After a problem is discussed with a technician, he is still uncertain about the issue.
From the options below select what the technician should do next.
QUESTION 253:
QUESTION 254:
When taking a call from a customer what is important for the technician to do?
Select your answer below.
A. Remain in control of the call and gather relevant information from the customer.
B. Keep the customer on the line until the problem is resolved.
C. Let the customer explain the problem and write down all information given.
D. Let the customer explain while you proxy in to their computer and sort out the
problem.
Answer: A
QUESTION 255:
QUESTION 256:
While in a meeting, how would you describe the situation in making sure that the
speaker is being heard? This could be referred to as ______.
A. active listening
B. concentration
C. communicating
D. verbal communication
Answer: A
QUESTION 257:
While working at a customer's home the Certkiller .com technician's cellular phone
rings. He notes by the cell phone number that it is a personal call. From the options
below how do you suggest the Certkiller .com technician should handle the incoming
call?
QUESTION 258:
QUESTION 259:
QUESTION 260:
A. Talk sternly to the child and tell the child to stop misbehaving.
B. Give the child something to play with.
C. Refuse to continue working until the child stops misbehaving.
D. Ask the customer to remove the child from the work area.
Answer: D
QUESTION 261:
While working at a customer's home the Certkiller .com technician receives a phone
call from a co-worker. The call is about a difficult problem that he needs to sort out.
What should the technician do?
QUESTION 262:
While working at a customer's home, the customer informs the Certkiller .com
technician that the customer has to go out for a few minutes. The customer assures
the technician that if he needs anything his ten year old child would be able to assist.
What do you suggest the technician should do?
A. Leave the customer's home and wait for them to return as an adult must be at home
while the technician is on-site.
B. Continue working as the customer should not be away for longer than 10 minutes.
C. Ensure that the child is not in the same room as the technician while the customer is
out.
D. Inform the customer that the technician is not responsible for anything while the
customer is gone
Answer: A
QUESTION 263:
QUESTION 264:
A. The wrist strap will protect your hands from burn injury caused to built up static
electricity.
B. The wrist strap will prevent computer components from being damaged by static
electricity.
C. The wrist strap will protect you from getting an electrical shock caused by static
electricity.
D. The wrist strap will prevent degaussing of the hard drive.
Answer: B
Explanation: An antistatic wrist strap or ESD wrist strap is a device used to prevent
electrostatic discharge (ESD) by safely grounding a person working on electronic
equipment. It consists of a stretchy band of fabric with fine conductive fibers woven
into it. The fibers are usually made of carbon or carbon-filled rubber, and the strap
is bound with a stainless steel clasp or plate. They are usually used in conjunction
with an anti-static mat on the workbench, or a special static-dissipating plastic
laminate on the workbench surface. Computer components are highly sensitive to
ESD.
QUESTION 265:
A. Platters.
B. Actuator.
C. Sector.
D. Cylinder.
Answer: A
Explanation: A hard disk platter (or disk) is a component of a hard disk drive: it is
the circular disk on which the magnetic data are stored. The rigid nature of the
platters in a hard drive is what gives them their name (as opposed to the flexible
materials which are used to make floppy disks). Hard drives typically have several
platters which are mounted on the same spindle.
QUESTION 266:
As a Certkiller .com technician you have updated the sound device drivers on a
workstation. After this you notice that the sound device is no longer functioning
properly. Which of the following could you use in order to remove the device
driver?
A. Environment Variables
B. Roll Back Driver
C. Hardware Profiles
D. Windows Update
Answer: B
QUESTION 267:
You are a Certkiller senior technician and a trainee approaches you with a question.
He wants to know which disaster recovery methods that require a system backup
done with the Windows XP Backup Utility in order to function. What will your
answer be?
Explanation: ASR is a recovery option that has two parts: ASR backup and ASR
restore. You can access the backup portion through the Automated System
Recovery Preparation Wizard located in Backup. The Automated System Recovery
Preparation Wizard backs up the System State data, system services, and all disks
associated with the operating system components. It also creates a floppy disk,
which contains information about the backup, the disk configurations (including
basic and dynamic volumes), and how to accomplish a restore.
QUESTION 268:
After booting up your new computer, you observe that the USB mouse is not
working. Further investigation reveals that nothing connected to the USB ports is
working. Which of the following should you try FIRST?
A. Check the computer to verify that the jumper settings for USB are correct.
B. Buy new USB wires and test USB functionality.
C. Check the BIOS to verify that USB functionality is enabled.
D. Connect the USB devices to a different computer to test the devices.
Answer: C
Explanation: The USB devices and the USB cable could be damaged but always
start the troubleshooting with the easiest to accomplish task. In this case verifying
that USB is enabled in BIOS only takes a reboot in time and no need to buy
expensive parts. Probably there is no jumpers for the USB on the motherboard, but
then again, if there where it would still take more effort to remove the computers
casing in order to manipulate a jumper.
QUESTION 269:
A friend of yours has purchased a new hard drive for his computer that is a couple
of years old. He has asked you to help him install it. Once the hard drive is
physically installed you boot up the computer and realize that the computer is only
seeing a part of the hard drives capacity. Which of the following is MOST likely the
cause?
A. The BIOS needs an update in order to recognize the hard drive correctly.
B. You have to change the jumpers on the back of the hard drive so that the hard drive
sends the correct information to the computer.
C. Get the latest hard drive drivers from the manufacturer web site and install them.
D. Your friend has bought a SATA hard drive instead of a PATA hard drive.
Answer: A
Explanation: It is a well known problem with newer hard drives and older BIOS.
The jumper on the hard drive is only for setting master/slave mode. Hard drives do
not have drivers, storage controllers do have drivers but with the wrong drivers
here it should not se a hard drive at all. It is not possible to connect a SATA drive to
a PATA cable.
QUESTION 270:
A. power consumption
B. front side bus
C. heat production
D. clock speed
E. L2 Cache
Answer: A,C
Explanation: In general LapTop CPUs uses less power. A main cause of this is to
increase battery time. Less power also means less heat production.
QUESTION 271:
You are working as a technician at Certkiller .com. A users calls and wants someone
to check on his computer. He thinks it came with a bad processor as it often runs in
700 MHz instead of 1 GHz as supposed. The MOST likely cause of this behavior is
that the system:
QUESTION 272:
What is important to know when ordering a replacement power supply? Volts and
_______ :
A. hertz.
B. watts.
C. ampere hours.
D. joules.
Answer: B
Explanation: The watt (symbol: W) is the SI derived unit of power. The power
(measured in Watts) is the same as the amount of Volts multiplied with the amount
of Ampere delivered by the power supply.
QUESTION 273:
A. Right Click on the Desktop > Properties then: Screen Savers > Monitor Power >
Power > Hibernate.
B. Right Click on the Desktop > Properties then: Settings > Monitor Power > Power >
Hibernate.
C. Right Click on the Desktop > Properties then: Desktop > Monitor Power > Power >
Hibernate.
D. Right Click on the Desktop > Properties then: Desktop > Monitor Power > Power >
Power Schemes.
Answer: A
Explanation: Go to screen properties, Screen saver tab. Click on the power button
and go to the Hibernation tab on the Power options dialog box that is displayed.
QUESTION 274:
QUESTION 275:
Which of the following is best to use when applying the cleaning solution to a
computer displaying device?
A. a soft brush.
B. a lint-free rag or wipe.
C. a damp sponge.
D. the glass part of the display.
Answer: B
QUESTION 276:
The Windows Start menu can be accessed by pressing the Windows key or:
A. Crtl + F8
B. Crtl + Esc
C. Crtl + Shift
D. Crtl + Del
Answer: B
QUESTION 277:
You are a senior technician at Certkiller .com. One of the trainees asks you about the
difference between the shutdown options in Windows XP. He wonders which of the
options that stores information on the hard drive, keeps applications open, and
shuts the computer down completely?
QUESTION 278:
You work as a network technician at Certkiller .com.
You reboot your PC. During the reboot phase you select the Windows Advanced
Options menu. What options are available to you at this point of time? Choose
three.
A. Press F8 for advanced startup options
B. Debugging Mode with Command Prompt Only
C. Last Known Good Configuration
D. Directory Services Restore Mode
E. SVGA Mode
F. Safe Mode with Networking
Answer: C,D,F
QUESTION 279:
After performing a device driver upgrade on a client computer you get a system
that reboots continuously as soon as it displays the Windows XP logo. In order to
correct this issue, what should you try first?
QUESTION 280:
You are sent to investigate a Windows computer that displays a 'NTLDR is missing'
error message. The message is displayed in a black screen right after the BIOS
splash screen. Which of the following methods would be the BEST method to repair
the problem?
A. Press F8 during boot and enter Safe Mode with networking and reinstall storage
drivers.
B. Boot using the LKGC (Last Known Good Configuration).
C. Boot using the Recovery Console.
D. Perform a system restore from within Safe Mode.
Answer: C
QUESTION 281:
You are working as a technician at Certkiller .com. You have been asked to document
the MAC address on several new systems that has recently been delivered. Which of
the following Windows XP commands could you use to obtain the MAC address?
A. WINCFG
B. WINIPCFG
C. IFCONFIG
D. IPCONFIG /ALL
Answer: D
Explanation: ipconfigin Windows is a command line utility that displays all current
TCP/IP network configuration values and refreshes Dynamic Host Configuration
Protocol DHCP and Domain Name System DNS settings.
QUESTION 282:
A. is an overheating CPU.
B. is a missing PCI card.
C. are memory and hard drive space limitations.
D. is a defective monitor.
E. Windows Update
Answer: A
Explanation: If the CPU overheats the PC will do shutdown to avoid damaging the
hardware.
QUESTION 283:
You are working as a technician at Certkiller .com. A developer asks if you can order
a printer that can handle multi-part forms. What kind of printer would you order
for the developer?
A. laser
B. ink jet
C. dot matrix
D. thermal
Answer: C
QUESTION 284:
You need to upgrade the software that is installed in a printer. Which of the
following alternatives refers to software that is built-in on hardware devices?
A. firmware
B. BIOS
C. CMOS
D. driver
Answer: A
QUESTION 285:
While printing in full color, you observe small lines over the image. What should
you try first in order to correct this?
Explanation: Most issues where ink jet printers aren't printing with good quality
can be fixed by running the printers built in calibration tool.
QUESTION 286:
You have been asked to help a user who has some printing problems. The users
documents appears in the print queue but will not print. Which of the following
should you do FIRST?
Explanation: The print spooler is the process that actually handles the sending of
the document to the printer. The print spooler is known to hang under certain
circumstances and should therefore be restarted.
QUESTION 287:
A user asks you how far from the computer she can have a Bluetooth connected
device. What would your answer be?
QUESTION 288:
You are a technician at Certkiller .com. You have been sent to a branch office in
order to document their network. The on-site technician states that they use
manually assigned IP addresses. What would the correct term for manually
assigned IP addresses be?
A. alternate IP Configuration
B. DHCP
C. static IP addressing
D. APIPA
Answer: C
QUESTION 289:
You are a technician at Certkiller .com's main office. You have been sent to a small
branch office to investigate possible upgrades on the network as the users complain
about the network being slow. The branch office network is connected with hubs
and have 200 computers on it. Which of the following would be the BEST upgrade
suggestion?
A. fiber converters
B. switches
C. routers
D. CAT6 cabling
Answer: B
Explanation: A Ethernet hub forwards all received packets to all ports except the
sending port. A switch builds a table over known MAC addresses and therefore
more often only send the packet out the destination port. This difference makes that
switches has a much smaller collision domain and therefore is much more efficient
even if both operate at 100 Mbit/s
QUESTION 290:
Why would one choose wireless IEEE 802.11g over wireless IEEE 802.11b?
QUESTION 291:
Explanation:
QUESTION 292:
QUESTION 293:
You are a technician working for Certkiller .com. Certkiller .com has a password policy
that requires users to change passwords monthly. A user approaches you and asks
which of the following alternatives that would be considered safest when dealing
with passwords. What would you answer be?
QUESTION 294:
As a Certkiller .com technician you are asked to improve the security of a workstation
with a Windows based operating system. Which of the given alternatives will help
you in your task?
Explanation: Windows Updateis a website where users can download updates for
various Microsoft Windows-related products.
QUESTION 295:
You are working as a technician at Certkiller .com. You have been asked to document
which users that have permissions to install drivers on Certkiller .com's workstations.
Which of the following would be used to check which users have permissions to
install drivers? (Select TWO).
Explanation: In the local security policy you can see which local groups that are
allowed to install drivers, after that you can check which users that are part of the
separate groups.
QUESTION 296:
Which of the suggested actions would prevent unauthorized users from connecting
their computer to a Certkiller .com's WLAN?
Explanation: Only the MAC address filtering would help in protecting the wireless
network. All other suggestions would actually help unauthorized users to gain
access.
QUESTION 297:
QUESTION 298:
A user tells you that he can no longer access some of his files. He can still se the files
but not open them. Which of the following actions should be taken to resolve this
problem?
QUESTION 299:
Your boss has requested that you perform a preventative maintenance procedure on
the computers in the Economics department to ensure that an operating system is
secure and up-to-date. What will you do?
QUESTION 300:
You are working as a senior technician at Certkiller .com. A trainee asks you which of
the following tools that he should use in order to remove malicious software from a
computer. What would your answer be? (Select TWO).
A. Spyware program
B. Anti-Virus program
C. Fdisk utility
D. Defrag utility
E. Scandisk utility
Answer: A,B
QUESTION 301:
You are a senior technician at Certkiller .com. A trainee asks you for an example of
assertive communication. What would your answer be?
QUESTION 302:
You are a technician at Certkiller .com. When sitting in the helpdesk you receive a
call from a really angry user. The MOST important thing is to stay calm and:
A. not make situations personal.
B. ask the user to call one of your supervisors.
C. finish the task the user is complaining about.
D. pretend to listen until the user calms down and then start over with the support case.
Answer: A
Explanation: Many users and customers in a help needing situation reacts very
aggressively against the first person who answers when they search for help.
QUESTION 303:
You are a Certkiller .com technician working at a customer's home. Your cellular
telephone rings and the caller ID indicates that the call is one of your friends. Which
of the following would be the BEST way to handle the incoming call?
A. Ignore the call and send a text message to the friend to tell him that you'll call back
when you leave the customer's home.
B. Answer the call, but keep it as short as possible.
C. Let the customer know that it is an important call and ask to leave for a short while.
Step outside the home and take the call.
D. Let your voicemail handle the call and return it once you have left the customers
home.
Answer: D
QUESTION 304:
A Certkiller .com trainee asks you what the advantages of a 3 inch disk drive would
be to: (Select TWO).
QUESTION 305:
You are working as a technician at Certkiller .com. All Certkiller .com's computers run
Windows XP. A user calls you to ask how he should disconnect his external USB
hard drive. Which of the following should you advice the user to do FIRST?
A. Eject the storage device using the Safely Remove Hardware icon.
B. Power down the storage device mechanically.
C. Unplug the storage device with a fluid motion.
D. Power down the laptop before disconnecting the storage device.
Answer: A
QUESTION 306:
You are working as a senior technician at Certkiller .com. You are teaching a few
trainees about troubleshooting techniques. Which of the following steps in the
troubleshooting and repair process would you say is MOST effective to reduce
redundant effort?
Explanation: You should always document the steps performed during repairs and
troubleshooting. That way you can ensure that similar tasks in the future are solved
much quicker.
QUESTION 307:
You are working as a network technician at Certkiller .com. You are asked to order
more RAM memory to your boss's laptop. Which of the following memory form
factors could possibly be used in your boss's laptop computer? (Select TWO).
A. RAMBUS
B. SODIMM
C. MicroDIMM
D. RDRAM
Answer: B,C
QUESTION 308:
You are working as a technician at Certkiller .com. A user calls and wants to know if
there is a way to connect multiple peripheral devices (e.g. printer, keyboard, and
mouse) without wires to a computer. Which of the following wireless technologies
would you suggest as a solution to the user?
A. IrDA
Actualtests.com - The Power of Knowing
B. Bluetooth
C. General packet radio system (GPRS)
D. Global system for mobile communication (GSM)
Answer: B
QUESTION 309:
You are working as a technician at Certkiller .com. You are required to remove the
system property from files and folders in C:\data, including all subfolders. Which of
the following commands will accomplish this when run in C:\data.
Explanation: attribis a DOS command, supported since version 1.0. The function of
attrib is to set and remove data attributes (read-only, archive, system and
hidden).
QUESTION 310:
On a Windows computer with an NTFS formatted hard drive, how large would the
MBR (Master Boot record) and file system markings be?
A. 20 to 30%
B. 3 to 15%
C. 15 to 20%
D. 0 to 3%
Answer: B
QUESTION 311:
You are working as a technician at Certkiller .com. You are installing several new
computers in what is meant to be a computer lab. You choose to use FAT32 as
filesystem for the new computers. Which of the following statements could be a
reason to choose FAT32 instead of NTFS?
A. FAT32 is needed for older hard drives which do not support NTFS.
B. FAT32 is needed to avoid the need for user training about the NTFS file system.
C. FAT32 is needed to provide full compatibility with legacy systems.
D. FAT32 is needed for slower processors which do not support NTFS.
Answer: C
QUESTION 312:
You are working as a technician at Certkiller .com. Your boss has decided that all
computers in the economics department has to be upgraded to Windows XP. Some
of the computers are still running Windows 95 even though all the hardware meets
the minimum requirements for Windows XP. Which of the following steps do you
have to take in order to install Windows XP on the computers?
QUESTION 313:
You are working as a technician at Certkiller .com. You are asked to install security
updates as well as upgrade some device drivers on one of Certkiller .com domain
controllers. Prior to performing this service on the domain controller, which of the
following should you do FIRST?
A. Backup data.
B. Remove peripherals.
C. Format the hard drive.
D. Disconnect the external monitor.
Answer: A
QUESTION 314:
You are working as a technician at Certkiller .com. You are asked to upgrade a
Windows 2000 computer running with Service Pack 2 to Service Pack 4. Which of
the following statements are true?
Explanation: Service Packs are usually made so that they hold all earlier service
packs, and therefore is only the latest service pack version interesting when
upgrading a computer.
QUESTION 315:
You are working as a network technician at Certkiller .com. You are asked to
troubleshoot a computer that continuously restarts without ever getting to the
Windows Desktop. Which of the following is MOST likely the cause of the restarts?
QUESTION 316:
Explanation: If you start the command directly from the Run dialog box, it will
close the window as soon as the command has executed and terminated. If you want
to se the output from a command you should first start cmd (the command line
interpreter) and run the command from there, that way the window will stay up
even after the command has executed and terminated.
QUESTION 317:
You are working as a technician at Certkiller .com. A user has requested some
assistance with his computer. The workstation is only 6 months old but already it is
operating more slowly and takes longer and longer to open documents. The user has
never used this workstation for connecting to the internet, only for heavy
calculations and simulations. Which of the following should you try first in order to
improve the computer's performance? (Select TWO).
A. Disk Cleanup
B. Disk Defragmenter
C. Dr. Watson
D. SCANDISK
E. FDISK
Answer: A,B
QUESTION 318:
You are working as a technician at Certkiller .com. One user has heard of a new
printer with outstanding performance to a small price and he wants to order one of
those printers. Before ordering the printer you should examine whether the printer
is supported by Windows. Which of the following would be the BEST method to use
to determine whether a new printer will work with the user workstation? (Select
TWO).
Explanation: The HCL will tell what drivers that is available in the Windows
installation from the beginning or through Windows Update. The printer's
documentation will reveal if there is a driver for Windows provided by the
manufacturer.
QUESTION 319:
You are working as a technician at Certkiller .com's main office. You have been
asked to install a local USB printer. Which of the following would be the BEST steps
for you to take?
A. Install a generic driver from the same manufacturer and connect the printer after the
drivers are installed.
B. Connect the printer to the computer and the Windows Plug and Play will tell the
technician where to find the drivers on the internet.
C. Install the drivers from the manufacturers CD and the installation procedure will tell
the technician when to connect the printer.
D. Connect the printer to the computer and then Windows Plug and Play will
automatically install a generic text-only driver.
Answer: C
Explanation:
If the device is connected and powered on before the appropriate device driver is
existing on the workstation, then Windows might choose a device driver which is
similar to the one needed but not working with this specific hardware. If that
happens it will cause a lot of extra effort to get the system to use the correct device
driver.
QUESTION 320:
You are working as a senior network technician at Certkiller .com. A trainee ask you
for some assistance. The trainee has installed a new printer, and connected it to a
users Windows XP Workstation computer via a USB cable. The trainee reports that
the computer recognized a new device but the printer does not function. It is MOST
likely that the user:
A. connected the printer to a USB 1.1 port, instead of a USB 2.0 port.
B. did not install the device drivers first.
C. already has one printer installed.
D. does not have permission to install a new printer in Windows XP Home.
Answer: B
Explanation:
If you do not install the device driver first then Windows will choose the most
appropriate device driver and install that one. This is often the cause of trouble with
USB devices when Windows have installed a incompatible device driver to a USB
device.
QUESTION 321:
You are working as a technician at Certkiller .com. A user has asked that you check
out his ink jet printer. The printer prints text correctly, but there is a horizontal line
missing in the middle of each letter. Which of the following should you check
FIRST?
A. you should check the cable between the printer and the computer
B. you should check the paper feed mechanism
C. you should check the print head
D. you should check the device driver software
Answer: C
Explanation: The ink jet print head uses small holes to spray small dots of color on
the paper. Sometime parts of the print head clogs or dries out so that it is unable to
print to a specific part of the letter and therefore creating white lines through all the
text.
QUESTION 322:
You are working as a technician at Certkiller .com. A user has called you and asked if
you can check his ink jet printer. The printer is printing documents that appear
blurred. Which of the following would be the FIRST step to take?
Explanation: The printer calibration will reset the nozzles of the printer cartridge
and.
QUESTION 323:
You are a network technician at Certkiller .com. You are sent to a branch office to
install a small network for the 5 employees on-site. Which of the following network
models would be ideal for the small office?
A. token ring
B. FTP
C. client server
D. peer to peer
Answer: D
Explanation: With a peer to peer network, there is no need for servers or network
specific services like DHCP server.
QUESTION 324:
You are working as a technician at Certkiller .com. You have been asked to help a
user set up a remote workplace in the employee's home. You have installed a new
cable modem and a new router, which of the following should be the order used to
start up the newly installed devices?
A. Turn on the computer, then the cable modem, and then the router.
B. Turn on the cable modem, then the router, and then the computer.
C. Turn on the router, then the computer, and then the cable modem.
D. Turn on the cable modem, then the computer, and then the router.
Answer: B
Explanation: The cable modem needs to get it's address from the ISP (Internet
Service Provider) before it can handle an address to the router. The computer needs
to get it's address from the router once it is up and operational.
QUESTION 325:
You are working as a network technician at Certkiller .com. A user from a branch
office wants you to install a gigabit Ethernet network at the branch office. Which of
the following types of cabling standards would be BEST to use?
A. CAT6
B. CAT5/5e
C. CAT3
D. RG6/11
Answer: A
Explanation: Cat6is a cable standard for Gigabit Ethernet and other network
protocols that is backward compatible with the Category 5/5e and Category 3 cable
standards.
QUESTION 326:
You are working as a network technician at Certkiller .com. A user lets you know
that there is something wrong with his network connection. The user is using a
laptop with wireless LAN. You suspect that there might be insufficient signal
strength at the WLAN when the user is sitting. Which of the following is used to
verify wireless connection speed and signal strength on a Windows XP computer?
Explanation:
QUESTION 327:
You are working as a senior network technician at Certkiller .com. A trainee asks you
when the activity light on an Ethernet interface typically lights. What would your
answer be?
Explanation: The Ethernet NIC (Network Interface Card) has two lights. One for
link and one for activity. The link light is on when the NIC is connected to the
network and the activity light is on when there is some sort of communication
(transmit/receive) over the NIC.
QUESTION 328:
You are working as a technician at Certkiller .com. Your boss asks for your opinion
in the best method to help prevent malware threats. Which of the following
alternatives would you suggest as a good starting point?
QUESTION 329:
You are working as a senior network technician at Certkiller .com. A trainee has been
asked to setup a Wireless LAN in the HR department. He wants to know which of
the following he would use to encrypt the wireless network. What will your answer
be?
A. Kerberos
B. WPA
C. 3DEF
D. CHAP 3
Answer: B
QUESTION 330:
You are working as a network technician at Certkiller .com. You are asked to install a
couple of workstations that will be standing in public part of the company reception
for guests to use. Which of the following passwords should be set in the BIOS to
restrict access?
A. Power User
B. Root
C. Supervisor
D. User
Answer: C
Explanation: The supervisor password is the higher level password of the two
normally present on the system. On most systems, when the supervisor password
has been set, it must be entered in order to access the BIOS setup program, or to
change the user password. The user password usually allows the system to be
booted, but does not allow access to the BIOS setup program.
QUESTION 331:
You are working as a technician at Certkiller .com. You need to modify some BIOS
settings on a computer, but the BIOS is password protected and the former
technician left the company 2 years ago. Which of the following could you use in
order to reset the password in the BIOS?
QUESTION 332:
You are working as a technician at Certkiller .com. You are asked to secure the
computers in the HR department with BIOS passwords. What would you set in
order to protect the CMOS settings within the BIOS?
QUESTION 333:
You are working as a technician at Certkiller .com. Your boss has received a new
laptop and asks you to ensure that all existing data is permanently removed from
the old computers hard drive. What would you do in order to meet his request?
Explanation: User instigated low-level formatting (LLF) of hard disks was common
in the 1980s. Typically this involved setting up the MFM (Modified Frequency
Modulation) pattern on the disk, so that sectors of bytes could be successfully
written to it. With the advent of RLL(Run Length Limited) encoding, low-level
formatting grew increasingly uncommon, and most modern hard disks are
embedded systems, which are low-level formatted at the factory with the physical
geometry dimensions and thus not subject to user intervention.
QUESTION 334:
You are working as a technician at Certkiller .com. A user calls and states that his
Antivirus program has not been updated the last week. What are the anti-virus
software update files called?
A. updates.
B. definitions.
C. permissions.
D. patches.
Answer: B
Explanation: The antivirus updates contain definitions of all known viruses and are
therefore called virus definitions.
QUESTION 335:
You are working as a technician at Certkiller .com. One morning when you enter the
server room you observe a large amount of water on the floor. Which of the
following actions should you take first?
QUESTION 336:
You are working as a technician at Certkiller .com. You have received a new batch of
workstations that needs to be installed for their users. When turning on one of the
workstations a loud noise is heard and smoke is observed coming from the
computer. You quickly unplug the computer from the power outlet. What else
should you do?
Explanation:
In worst case the fumes of burnt plastic can be toxic so you should always ventilate
the room if you have had some fumes coming out of electrical components.
QUESTION 337:
You are working as a senior technician at Certkiller .com. A trainee asks questions
about Material Safety Data Sheets (MSDS). Which of the following would you say
can be found on a MSDS? (Select THREE).
A. chemical name
B. hazard rating
C. exposure antidotes
D. nearest safety exits
E. telephone number of the Hazardous Materials Team
F. manufacturer's name and address
Answer: A,B,F
QUESTION 338:
You are working as a technician at Certkiller .com. While repairing your boss's
computer, you overhear a conversation that includes the names of several
co-workers that are to be laid off. How should you handle this situation?
QUESTION 339:
You are working as a technician at Certkiller .com. A user wants to know if flash
memory technology is used in any of the following products. What will you answer
him?
QUESTION 340:
You are working as a senior technician at Certkiller .com. A trainee wants to know
which of the following that is the MOST commonly used solution to easily install a
CPU on a motherboard?
A. ZIF
B. Base plate mount
C. Thermal grease
D. Pin grid array
Answer: A
Explanation: ZIFis an acronym for zero insertion force, a concept used in the design
of IC sockets, invented to avoid problems caused by applying force upon insertion
and extraction.
QUESTION 341:
You work as a senior technician at Certkiller .com. A trainee asks you if you know
how many pins there is in a SVGA connection. What will you answer him?
A. 25
B. 9
C. 20
D. 15
Answer: D
QUESTION 342:
You are working as a technician at Certkiller .com. You open a computer and observe
that the computer is full of dust. What should you do in order to remove the dust
from the system? (Select TWO).
QUESTION 343:
You are working as a technician at Certkiller .com. You have just finished the
upgrade of the memory in a laptop. When booting up the laptop you notice that the
touchpad is functioning but the keyboard is not functioning. Which of the following
is MOST likely the cause?
QUESTION 344:
You are working as a network technician at Certkiller .com. A user calls and asks
what a sign of a malfunctioning battery in a laptop could be. What will you answer
him?
QUESTION 345:
You work as a technician at Certkiller .com. A user reports that his laptop does not
recharge the battery as good as it used to. Which of the following actions should be
taken FIRST?
QUESTION 346:
You are working as a technician at Certkiller .com. A colleague asks what the default
file system type is, when installing the Windows XP operating system, on a new
system. What will you answer him?
A. FAT32
B. NTFS
C. FAT16
D. CDFS
Answer: B
Explanation: Windows XP can handle both NTFS and FAT32, but FAT32 is only
recommended for dual boot environments.
QUESTION 347:
Explanation: After Windows XP is installed on your computer, you can use the Add
or Remove Programs tool in Control Panel to add a Windows component that was
not included in the original installation, or to remove an existing Windows
component that you no longer require.
QUESTION 348:
You are working as a Technician at Certkiller .com. You have just finished installing
a new device driver on you boss's workstation, but the Windows XP operating
system became unstable. The system is still unstable after a second reboot and
choosing Last Known Good Configuration. This occurs because:
A. the Last Known Good Configuration only works for hardware devices and any
software changes are not applicable.
B. the system's registry should have been saved prior to the installation of a device driver
by using the System Restore application.
C. the Last Known Good Configuration could not find a valid Restore Point since the
System Restore was not run prior to the installation of the Device Driver.
D. the system's registry is overwritten after every login and the settings on the initial
install were overwritten after the first reboot and login.
Answer: D
Explanation: After a user has successfully logged in to the machine, Winlogon does
the following:
* Updates the Control Sets; the LastKnownGood control set is updated to reflect the
current control set.
* User and Computer Group Policysettings are applied.
* Startup programs are run from the following locations:
1.HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
2.HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run
3.HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
4.HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\Run
5.HKCU\Software\Microsoft\Windows\CurrentVersion\Run
6.HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce
7.All Users ProfilePath\Start Menu\Programs\Startup\(please note that this path is localized
on
non-English versions of Windows)
8.Current User ProfilePath\Start Menu\Programs\Startup\(please note that this path is
localized on
non-English versions of Windows)
QUESTION 349:
You are working as a technician at Certkiller .com. You have been asked by a user to
back up the files on his computer running Windows XP to a writeable CD. The user
does not want to purchase any additional software. Which of the following could be
used?
A. Microsoft Backup
B. Disk Cleanup to move files onto backup media
C. System Restore
D. Service Pack 2 to write to the CD
Answer: A
QUESTION 350:
You are working as a technician at Certkiller .com. You are asked to troubleshoot a
printer that is unable to print. The printer was operational as late as last week. You
are able to print a test page directly from the printer but when you attempts to print
from Windows the job is unable to print. What should you check FIRST?
A. toner.
B. cable.
C. spooler service.
D. drivers.
Answer: B
QUESTION 351:
You are working as a network technician at Certkiller .com. A user that has heard
that microwave Owens sometimes disturb WLAN's wants to know in what radio
frequency 802.11a operates. What will you answer him?
A. 10 MHz
B. 5 GHz
C. 2.4 GHz
D. 900 MHz
Answer: B
Explanation: 802.11b and 802.11g use the 2.4 GHz band. 802.11a uses the 5GHz
band.
QUESTION 352:
You are working as a senior network technician at Certkiller .com. A trainee asks you
what the physical address of a network interface card (NIC) is called. What will you
answer him?
A. SSID.
B. DHCP address.
C. IP address.
D. MAC address.
Answer: D
QUESTION 353:
You are working as a senior network technician at Certkiller .com. A trainee asks you
which of the following is compatible with an 802.11g network. What will you answer
him?
A. RJ-45
B. 10BaseT
C. 802.11a
D. 802.11b
Answer: D
Explanation: 802.11b and 802.11g use the 2.4 GHz band. 802.11a uses the 5GHz
band.
QUESTION 354:
You are working as a Technician at Certkiller .com. You are asked to troubleshoot an
internet network access problem. You are able to PING a public IP address but you
cannot PING the same public address using the fully qualified domain name. Which
of the following IP settings should be verified?
A. DHCP
B. ARP
C. DNS
D. Gateway
Answer: C
Explanation: On the Internet, the Domain Name System (DNS) associates various
sorts of information with so-called domain names; most importantly, it serves as the
"phone book" for the Internet: it translates human-readable computer hostnames,
e.g. www. Certkiller .com, into the IP addresses that networking equipment needs for
delivering information.
QUESTION 355:
You are working as a network technician at Certkiller .com. One of Certkiller 's
intranet SSL certificates is no longer valid in Internet Explorer. Which of the
following actions should you take?
Answer: A
QUESTION 356:
You are working as a technician at Certkiller .com. You are asked to setup a couple of
computers in the reception. The computers will be available for anyone visiting
Certkiller .com.Which of the following passwords should you set in the BIOS to
restrict access?
A. SuperAdministrator
B. System
C. Supervisor
D. Power User
Answer: C
Explanation: The supervisor password is the higher level password of the two
normally present on the system. On most systems, when the supervisor password
has been set, it must be entered in order to access the BIOS setup program, or to
change the user password.
QUESTION 357:
You are working as a network technician at Certkiller .com. You discover that
another technician has propped open the door to a server room. Which of the
following should you do?
A. Secure the door and follow company procedures for reporting security violations.
B. Secure the door and have the access code for the lock changed.
C. Leave the door open and ask the other technician to close the door when leaving the
room.
D. Leave the door propped open to allow ventilation.
Answer: A
QUESTION 358:
You are working as a senior technician at Certkiller .com. A trainee wonders how you
can ensure that the case and motherboard from different manufacturers. You tell
him that there is a case and motherboard standard that guarantees compatibility
among all adopters of the standard. This standard is known as the:
A. AT Form Factor.
B. ATX Form Factor.
C. Micro-AT Form Factor.
D. Low profile extended (LPX) and Mini-LPX Form Factor.
Answer: B
Explanation: The ATX (for Advanced Technology Extended) form factor was
created by Intel in 1995. It was the first big change in computer case and
motherboard design in many years. ATX overtook AT completely as the default
form factor for new systems. ATX addressed many of the AT form factor's
annoyances that had frustrated system builders. Other standards for smaller boards
(including microATX, FlexATX and mini-ITX) usually keep the basic rear layout
but reduce the size of the board and the number of expansion slot positions.
QUESTION 359:
You are working as a technician at Certkiller .com. You by accident drop a screw on
the motherboard of a computer that you are upgrading. Which of the following
could you use to retrieve the screw?
A. plastic tweezers
B. magnet
C. needle nose pliers
D. screw driver
Answer: A
QUESTION 360:
You are working as a technician at Certkiller .com. A user wishes to buy a new
keyboard that is connected through USB, but he says that he already has 2 USB
devices and is concerned that he won't be able to connect another one. How many
USB devices can be connected to a system at the same time? What will you tell the
user?
A. 7
B. 15
C. 127
D. 126
Answer: C
Explanation:
A USB system has an asymmetric design, consisting of a host multitude of
downstream USB ports, and multiple peripheral devices connected in a tiered-star
topology. Additional USB hubs may be included in the tiers, allowing branching into
a tree structure, subject to a limit of 5 levels of tiers per controller. Up to 127
devices, including the hub devices, may be connected to a single host controller.
QUESTION 361:
You are working as a technician at Certkiller .com. You are asked to troubleshoot a
new computer where the user has observed that the USB ports are not working with
any USB devices. Which of the following should you do FIRST?
A. Check the computer to verify that the jumper settings for USB are correct.
B. Connect the USB devices to a different computer to test the devices.
C. Buy new USB wires and test USB functionality.
D. Check the BIOS to verify that USB functionality is enabled.
Answer: D
Explanation: Some motherboards have USB support disabled when they are
shipped from factory.
QUESTION 362:
You are working as a technician at Certkiller .com. You have just finished replacing a
floppy drive in a computer but the system does not recognize the new floppy drive.
Which of the following is MOST likely the cause?
QUESTION 363:
You are working as a technician at Certkiller .com. You are asked to troubleshoot a
laptop that when typing letters on the keyboard, seemingly randomly prints some
letters and some numbers. What is the most probable cause of this?
Explanation: As a laptop doesn't have a numeric keypad the numlock key will
activate a "virtual" numeric keypad on top of the normal letter keys.
QUESTION 364:
You are working as a technician at Certkiller .com. You are visiting a user that has
complaining about the loud and noisy fan in his laptop. When you receive on site the
user reports that all fan noise has just recently stopped. Which of the following is
MOST likely the problem?
A. The fan is typically louder when powering up but then should not be heard at all.
B. The fan has blown a blockage out of the laptop and it is not necessary to do anything
more.
C. The fan has been automatically disabled in the operating system.
D. The fan has stopped completely and the laptop should be serviced before there is heat
damage.
Answer: D
QUESTION 365:
You are working as a technician at Certkiller .com. You are installing new
workstations with Windows 2000 for the HR department. Which of the following is
the recommended file system for Windows 2000?
A. CDFS
B. FAT16
C. NTFS
D. FAT32
Answer: C
Explanation: NTFS is today the recommended file system unless you need dual boot
and shared data with Windows 95 or Windows 98.
QUESTION 366:
You are working as a senior technician at Certkiller .com. A trainee asks which of the
following upgrade paths are supported. What will you answer him? (Select TWO).
A. Windows 95 to Windows XP
B. Windows ME to Windows 2000
C. Windows 3.x to Windows XP
D. Windows ME to Windows XP
E. Windows 98 to Windows 2000
Answer: D,E
Explanation: Supported upgrade paths to Windows 2000 exist from Windows 95/98
and Windows NT 3.51/4.0. The supported upgrade paths for Windows XP are
shown in the exhibit.
QUESTION 367:
A. Remote Desktop.
B. Remote Assistance.
C. Computer Management (Remote).
D. Remote Registry.
Answer: A
QUESTION 368:
You are working as a technician at Certkiller .com. You are troubleshooting a laptop
that is unable to use some generic usb devices with existing Windows drivers. You
suspect that the device driver within Windows has become corrupt. Which of the
following commands can be used in drivers.cab to replace a corrupt Windows
system driver?
A. EXTRACT
B. DECOMPRESS
C. UNCOMPRESS
D. EXPAND
Answer: D
QUESTION 369:
You are working as a technician at Certkiller .com. A user calls and asks for
assistance with a computer that is unusually slow. The computer is only 6 months
old and has never been connected to the Internet. A initial check reveals no
hardware related issues, which of the following should you try next in order to
improve the computer's performance? (Select TWO).
A. SCANDISK
B. Disk Defragmenter
C. Dr. Watson
D. Disk Cleanup
E. FDISK
Answer: B,D
QUESTION 370:
You are working as a technician at Certkiller .com. Your boss's computer has been
running slowly the last months and you suspect that the hard drive might be heavily
fragmented. Which of the following utilities should be run to check for fragmented
files?
A. CHKDSK
B. DEFRAG
C. FDISK
D. REGEDIT
Answer: B
Explanation:
FAT: DOS 6.x and Windows 9x-systems come with a defragmentation utility called
Defrag. The DOS version is a limited version of Norton SpeedDisk, and the Windows
version is licensed from Diskeeper.
NTFS: Windows 2000 and newer include a defragmentation tool based on Diskeeper. NT
4 and below do not have built-in defragmentation utilities. Unfortunately the integrated
defragger does not consolidate free space. Thus a heavily fragmented drive with many
small files may still have no large consecutive free space after defragmentation. So any
new large file will instantly be split into small fragments with immediate impact on
performance. This can happen even if the overall disk usage is less than 60%.
QUESTION 371:
You are working as a technician at Certkiller .com. You have just finished updating
the system on a workstation, but the workstation seems to have become unstable.
Which of the following will allow you to return the system to the original state?
QUESTION 372:
You are working as a technician at Certkiller .com. You are asked to see if you can
optimize the performance of the computers in the computer lab. Which of the
following should you schedule to run at a regular interval in order to optimize
system performance in the computer lab? (Select THREE).
A. backup of data
B. run a registry backup program
C. deletion of temporary files
D. defragment the hard drive
E. run MSCONFIG
F. run anti-spyware/malware program
Answer: C,D,F
QUESTION 373:
You are working as a technician at Certkiller .com. A user that is working with layout
needs a printer that is directly connected to his computer in order to preview prints
before sending them to reproduction. The user is sending quite large printouts to
the printer and is concerned about the data transfer rate between the computer and
the printer. Which of the following provides the fastest interface for printing from
his workstation?
A. USB 2.0
B. Bluetooth
C. IEEE 802.11g
D. IEEE 802.11b
Answer: A
Explanation: USB 2.0 can handle speeds up to 480 Mbit/s. A version 1.2 Bluetooth
device can handle speeds up to 1 Mbit/s. IEEE 802.11b and IEEE802.11g is for
wireless Ethernet networks and can handle maximum 11Mbit/s respectively 54
Mbit/s
QUESTION 374:
You are working as a senior network technician at Certkiller .com. You are learning a
trainee about different kinds of broadband. When you come to broadband delivered
over satellite you tell the trainee about the delay that occurs when communicating
over satellites. What is this delay called?
A. impedance.
B. attenuation.
C. latency.
D. echo.
Answer: C
QUESTION 375:
You are working as a network technician at Certkiller .com. You are installing a
Wireless LAN at a branch office. The WLAN will comply to the IEEE 802.11g
standard. A user at the branch office wants to know what the maximum connection
speed of the wireless connection will be. What will you answer him?
A. 24 Mbps
B. 54 Mbps
C. 15 Mbps
D. 11 Mbps
Answer: B
Explanation: 802.11g works in the 2.4 GHz band (like 802.11b) but operates at a
maximum raw data rate of 54 Mbit/s, or about 19 Mbit/s net throughput (identical
to 802.11a core, except for some additional legacy overhead for backward
compatibility). 802.11g hardware is fully backwards compatible with 802.11b
hardware. Details of making b and g work well together occupied much of the
lingering technical process.
QUESTION 376:
You are working as a network technician at Certkiller .com. You are asked to install a
Wireless LAN at a branch office. In order to tighten security, which of the following
default settings should be changed on the access point? (Select TWO).
A. SSID
B. MAC address
C. Infrastructure mode
D. DHCP addressing
E. password
Answer: A,E
QUESTION 377:
You are working as a network technician at Certkiller .com. You have been sent to a
branch office to upgrade their network. You install a wireless access point that also
acts as a router and DHCP server. Which of the following information needs to be
configured on the computers with WLAN capabilities in the branch office in order
for them to access the network?
A. IP address
B. default gateway address
C. WEP or WPA encryption key
D. SSID
Answer: D
Explanation: The SSID and in some situations also a PSK (Pre Shared Key) for
encryption is needed in order to connect to the wireless access point.