You are on page 1of 22

1-You lose a screw at the bottom of the printer that you are working on.

You

cannot pick up the screw with your hand because the area is too small.

What tool can you use to retrieve it?

Multimeter

Extension magnet

Torx wrench

Multi-driver

2-Which ntbackup switch allows you to designate whether a backup type is normal,

copy, differential, incremental, or daily?

/V:

/J
/M

/D

3-What is IMAP?

An e-mail protocol that allows users to send but not receive messages.

An e-mail protocol that allows users to selectively download messages.

A protocol that authenticates users who are sending e-mail.

A protocol that allows real-time messaging.

4-You are looking for ways to prevent users from removing data from their

computer systems. You have disabled all floppy disk drives, and the computers

are configured with read-only CD/DVD players.


What else should you do? (Choose two.)

Flash the system BIOS.

Password protect the system BIOS.

Disable onboard disk controllers in the system BIOS.

Disable hard disk discovery in the system BIOS.

Disable all USB ports in the system BIOS.

5-You are building a desktop personal computer (PC) that will support a sound

card and a media reader.

For which type of motherboard and case will you need to install a riser card?

Balanced Technology Extended (BTX)

New Low-Profile Extended (NLX)


Micro Advanced Technology Extended (Micro ATX)

Advanced Technology Extended (ATX)

6-A user has installed an internal modem in her computer, but it is not detected

by Windows XP. She has a CD-ROM containing drivers.

What should she do?

Use Network Connections to configure a dial-up connection.

Use the Add Hardware wizard to install the modem.

Use the System utility to create a hardware profile that contains the modem.

Use Device Manager to enable the modem.


7-Your wireless network is secured using WEP. You need to improve data

encryption to minimize the chance that data transmissions might be compromised.

What should you do?

Change the WEP shared key each week.

Reconfigure the network to use WPA.

Disable SSID broadcast on all access points.

Implement MAC address filtering.

8-A user installs an application on a computer running Windows. After installing

the application, the computer begins receiving a series of pop-up ads.

What is most likely wrong?

The application installed a worm.


The application contains a logic bomb.

The application is a Trojan horse.

The application installed adware on the computer.

9-You are building a personal computer (PC) that has two 32-bit slots for RIMM

memory. You install a 32-bit RIMM module in one of the slots.

What must you install in the vacant slot?

A C-RIMM module

A 32-bit RIMM module or a CT-RIMM module

A C-RIMM module or a CT-RIMM module

A 32-bit RIMM module


10-You want to prevent Windows Vista from loading specific applications during

startup. You want all other applications to start as they normally would. You

also want the ability to re-enable the applications to automatically start up in

the future.

What command allows you to disable the startup applications?

edit

md

dir

msconfig

11-For which of the following should you implement QoS in a small office/home

office (SOHO) environment?

VoIP
SSID

Instant messaging

E-mail

12-You need to ensure that Active Directory domain user Alice does not have read

access to the folder named Graphics. The Graphics folder is shared to the

network from the server named FS0. The disk partition on which Graphics is

located is formatted as NTFS.

Your solution should not impact other users.

What should you do?

Explicitly deny read access to the folder to Alice through local access

security.

Remove Alice from any domain group that has access to the Graphics folder.
Explicitly deny read access to the folder to Alice through shared access

security.

Deny read access to the Graphics folder to any group to which Alice belongs.

13You are shopping for a hard disk drive for a personal computer (PC) that you

are building.

For which reason would you purchase a disk drive that uses the SATA 3.0 (SATA

V2) standard instead of the original SATA standard?

You need to optimize performance for audio and video applications.

You plan to install an external disk drive.

You want a drive that does not use jumpers.

You need to support hot swapping of the disk drive.


14-You have intermittent connectivity to www.measureup.com and want to check

connectivity to the server over several hours.

Which command should you use?

ping -t

ping -l

nslookup

ipconfig

15-You are setting up a home office and need broadband Internet access. You need

to keep the costs and additional equipment required to a minimum.

What WAN technology should you use?

ISDN
T1 line

T3 line

Cable modem

16-The process of logging onto a network with a user name and password is an

example of which of the following?

Authentication

Authorization

Impersonation

Identification
17-You are building a personal computer (PC) with a motherboard that supports

the Scalable Link Interface (SLI) by NVIDIA. You plan to install two SLI

graphics cards with a hardware bridge, and you want to optimize performance for

graphics processing.

Which expansion slots should you use?

Two PCIe slots

One PCI slot and one PCIe slot

Two AGP slots

One AGP slot and one CNR slot

18-You want to repair disk errors and recover data from bad sectors on a user's

laptop.

Which chkdsk switches allow you to repair and extract data from the bad sectors?

(Choose two.)
/x

/?

/r

/f

/v

19-You have recently implemented a WLAN and want to maximize security. You only

want specific wireless clients to be able to access the WLAN.

What should you do?

Enable SSID broadcasting.

Use BitLocker.
Disable WEP.

Implement MAC filtering.

20-You need to secure access to network file servers. Your first task is to

determine current access permissions.

What should you do?

Review effective access permissions.

Review group access permissions.

Review local access permissions.

Review network access permissions.

21-You are upgrading components in a computer to refurbish it. The motherboard

and BIOS are five years old. You are concerned that the BIOS may not properly
support some of the components you want to install.

Which component might require updating Flash ROM contents before the

installation will work properly?

80 GB hard drive

Power supply

128MB of physical SDRAM

56K modem

Graphics card for 1600 x 1200 display

100Base-TX network adapter

DVD-ROM drive
22-What version of Windows uses the Sync Center to manage synchronizing offline

files?

Windows 2000 Professional

Windows Vista

Windows XP Home

Windows XP Professional

23-You are implementing a wireless network. You want to provide the best

security during data transmission.

What should you do?

Enable content filtering.

Disable SSID broadcasting.


Implement WPA2.

Implement WEP.

24-Your antivirus program identifies an infected file but cannot remove it

because it is in use.

You need to remove the infected file.

What should you do?

Get a different antivirus program.

Update the virus signatures.

Run the fixmbr command.

Boot into Safe Mode and run the virus scan again.

25-Which statement about installing DIMMs is true?


You push the DIMM straight down into the socket.

You insert the DIMM at a 35-degree angle and raise it into place.

DIMMs have a cut-away portion on one end to help you line them up properly.

You must install DIMMs in matching pairs.

26-Your network has a file server running Microsoft Windows XP Professional with

a 2.2 GHz Pentium 4 processor, 1 GB of RAM, and one IDE hard disk. The computer

has 20 GB of free hard disk space.

Performance has gradually degraded on the file server. The number of users

accessing the file server has not changed significantly over time. You need to

improve the computer's performance.

What should you do first?

Use System Manager to monitor processor user time.


Use Disk Manager to determine the amount of fragmentation on the hard disk.

Use System Monitor to determine memory usage.

Use Network Monitor to determine the network traffic levels.

27-You are installing a wireless network. Which actions would improve security

for the WLAN and help to prevent unauthorized access? (Choose two.)

Installing additional access points

Setting a BIOS password

Broadcasting the SSID

Implementing WPA

Implementing MAC filtering


28-You discover a program running in the background on several network

computers. The program is collecting address and computer name information from

your network and sending it to an address on the Internet.

This is an example of what kind of threat?

Worm

Rootkit

Spam

Spyware

29-How can you designate an EIDE hard drive as a slave? (Choose two.)

Connect the hard drive to the Slave port on the motherboard.

Set the jumper to Slave.


Connect the hard drive to the motherboard using the Slave connector portion of a

Cable Select cable.

Designate it as Slave in the BIOS Setup

30-You have recently set up Microsoft Windows Vista Business on five computers

in a remote office and you want to be able to use Remote Desktop from the main

office to manage these computers. You do not want users in other remote offices

to be able to run Remote Desktop sessions on these computers.

You need to allow Remote Desktop access to these remote computers only from the

main office subnet.

What should you do?

Configure the Windows Firewall rules in Control Panel to allow the Remote

Desktop Protocol (RDP).

Ensure that only users in the main office are included in a Remote Assistance
invitation e-mail message.

Configure the Windows Firewall rules in Control Panel to allow Remote

Assistance.

Configure a custom inbound rule allowing a Remote Desktop connection using

Windows Firewall with Advanced Security on each computer.

You might also like