testout pc pro
Command line options for the Scanstate command are listed on the left. Drag each command line option and drop it onto the correct description of the function it performs on the right.
/o > Allow overwriting existing data. /ue > Specify user(s) to omit from migration /ui Specify user(s) to be migrated. /offlineWinOld > Path to the offline Windows.old folder. /p /nocompress > Generate a space estimate.
Command line options for the Loadstate command are listed on the left. Drag each command line option and drop it onto the correct description of the function it performs on the right.
/ui > Specify user(s) to be migrated /hardlink > Restore from a linked migration store. /lae > Enable user accounts /ue > Specify user(s) to omit from migration /lac > Create user accounts
• You need to use the runas command to run the zip.exe executable on your Windows system as the Admin user on your system, which is a member of the Administrators group. Which option should you use with the runas command to do this?
/user:Admin
Which option used with the copy command makes sure that all copied files are written correctly after they have been copied?
/v
You need to copy several hundred files from one directory to another. Most of the files exist in the target directory, but you want to overwrite the existing files with the ones you will copy. You want the file copy to proceed automatically without prompting you to overwrite existing files. Which copy command switch should you use?
/y
You need to see the temporary files on a machine running Windows 7. Which directory holds the user temporary files, and what environment variable stores the temporary directory path? (select two)
1) %tmp% 2) C:\Users\username\AppData\Local\Temp
Which of the following file extensions indicate a Windows system file? (select two)
1) .dll 2) .vxd
Which of the following file extension types can be ran from the command prompt? (select three)
1) .exe 2) .bat 3) .com
Which of the following file extensions indicate a program file type? (select two)
1) .exe 2) .com
Which of the following are true of Libraries in Windows 7? (select two)
1) A single folder can be added to multiple Libraries 2) Each Library can contain multiple folders from different file system locations
You're about to begin an upgrade of a Windows Vista workstation to Windows 7. What should you do before beginning? (select two)
1) Back up the existing data on the HDD prior to running the upgrade 2) Verify that the computer meets the minimum requirements
Which disk types does Windows support? (select two)
1) Basic 2) Dynamic
One day while trying to start your Windows XP computer, the system displays the following error: Windows could not start because the following file is missing or corrupt: Windows\system32\ntoskrnl.exe. Please re-install a copy of the above file. The problem occurs immediately after the OS loading message. You are unable to boot into Safe Mode. Which of the following will most likely fix the problem? (select two)
1) Boot into the recovery console and runbootcfg /rebuild 2) Boot into the recovery console and perform an automatic OS scan and repair
Which of the following statements are true regarding administrative shares? (select two)
1) By default, Windows automatically creates an administrative share for every volume 2) To connect to an administrative share, you must use the UNC path
Which of the following functions are performed by proxy servers? (select two)
1) Cache Web pages 2) Block employees from accessing certain Web sites
You have just finished upgrading the CPU in your desktop system. After running the system for about 15 minutes, the system spontaneously shuts down. What should you do first to troubleshoot the problem? (select two)
1) Check the CPU fan power 2) Check the thermal shutdown threshold in the BIOS
Which Windows tools would you use to browse the file system on a drive? (select two)
1) Computer 2) Windows Explorer
What should you do (if possible) before flashing the BIOS? (select two)
1) Connect the computer to an UPS 2) Backup CMOS settings
Lately your computer is spontaneously shutting down after only a few minutes of use. What is the most likely cause? (select two)
1) Cooling fans clogged with dust 2) Overheating CPU
You have a Windows XP system with a single DHH configured as a basic disk with a single parition formatted with FAT32. The disk is running out of free space and you need to add additional space to it. You install a new HDD and start Disk Management. Which of the following are required tasks to add space to the existing volume? (select two)
1) Create an empty folder on the C:\ drive 2) Run the convert command
The sales engineers in your organization use virtual machines to model deployments in the lab prior to actually implementing them in your customers' physical environments. You are concerned that a malicious insider could gain access to the sensitive data on these virtual machines. What should you do? (select two)
1) Disable the USB ports on the hypervisor hosts 2) Use file and folder permissions to restrict access to the virtual HDD files
You use productivity apps on your iPad tablet device while traveling between client sites. You're concerned that you may lose your iPad while on the road and want to protect the data stored on it from being compromised. Currently, your iPad uses a 4-digit PIN number for a passcode. You want to use a more complex alpha-numeric passcode. You also want all data on the device to be erased if the wrong passcode is entered more than 10 consecutive times. What should you do? (select two)
1) Enable the Erase Data option 2) Disable the Simple Passcode Option
Which techniques are used in a pharming attack to redirect legitimate Web traffic to malicious Web sites? (select two)
1) Exploiding DHCP servers to deliver the IP address of poisoned DNS servers 2) Changing the hosts file on a user's computer
you have a computer with a 64-bit processor that runs the 32-bit version of Windows Vista, Business edition. You would like to upgrade to the 64-bit version of Windows 7 Professional. You want to perform the upgrade with the least amount of effort possible. Which of the following are required? (select two)
1) Get 64-bit drivers for all hardware 2) Perform a clean installation
You have a small wireless network with less than 50 client computers. You upgrade the hardware on two wireless devices so you can use a better security standard than WEP. Now you need to implement the new security standard. You need the greatest amount of security with the least amount of effort, and without replacing any of the wireless infrastructure. What should you do? (select two)
1) Implement WPA2-AES 2) Configure each client with the same key
You have a laptop running Windows 7. User Account Control (UAC) has been disabled. How would you re-enable UAC on the laptop? ((select two)
1) In the Control Panel, select System and Security, then Action Center 2) In the Control Panel, select User Accounts, then User Accounts
You have just finished installing a new SATA HDD in your computer. Now, your SATA DVD drive won't work. What should you do first? (select two)
1) Make sure that the DVD SATA cable is connected 2) Make sure that the DVD power cable is connected
Which parameters of virtual memory can you control on a Windows workstation? (select two)
1) Maximum size of the paging file 2) Location of the paging file
Which commands can you use to create a new directory? (select two)
1) Mkdir 2) Md
Which of the following tools can you use to start the Print Spooler service if it is currently stopped? (select two)
1) Net start 2) Services console
You're configuring devices on a SCSI bus. You've installed a SCSI adapter in an expansion slot. You've connected a SCSI HDD (sd0) to one of the middle connectors on the internal SCSI ribbon cable. The end connector on the internal SCSI ribbon cable is connected to the SCSI DVD drive. Where should termination be enabled on this bus? (select two)
1) On the SCSI adapter 2) On the DVD drive
Which of the following paths opens the Computer Management tool? (select two)
1) On the Start menu, right-click Computer and select Manage 2) In the Control Panel, open Administrative Tools, then double-click the Computer Management icon
You manage a Windows 7 system. You want to view information about your computer including the CPU utilization percentage and information about disk read operations. Which tools could you use to do this? (select two)
1) Performance Monitor 2) Task Manager
You work in an office that uses Linux and Windows servers. The network uses the IP protocol. You are sitting at a Windows workstation and an application you are using is unable to connect to a Windows server named FileSvr2. Which commands can you use to test network connectivity between your workstation and the server? (select two)
1) Ping 2) Traceroute
You have a folder that you would like members of your development team to access. You want to restrict network and local access to only specific users. All other users must not be able to view or modify the files in the folder. What should you do? (select two)
1) Place the files on an NTFS partition 2) Configure both share and NTFS permissions
You have added two new HDDs to a Windows computer. The disks are configured as basic disks. Which of the following could be configured on these disks? (select two)
1) Primary Partitions 2) Extended partitions with logical drives
You have added a new 1 TB HDD to a windows computer. The disk is configured as a basic disk. Which of the following can be configured on this disk? (select two)
1) Primary partitions 2) Extended partitions with logical drives
While browsing the Internet, the Internet Explorer browser window hangs and stops responding. Which Task Manager tab would you use to end Internet Explorer? (select two)
1) Processes 2) Applications
What is the purpose of the Microsoft Management Console (MMC)? (select two)
1) Provide a shell for running snap-ins 2) Provide a common user interface for performing system administration tasks
How do you set file attributes? (select two)
1) Right-click the file, then select properties 2) Use the attrib command
You have two computers: ComputerA is running Windows XP Professional and ComputerB is running Windows 7 Professional. You need to transfer user profiles and data files from ComputerA to ComputerB. What should you do? (select two. Each answer is a complete solution)
1) Run Windows Easy Transfer (WET) 2) Run User State Migration Tool (USMT)
You manage Windows desktops for your organization. You recently updated all of your workstations to Windows 7. Your organization relies on a particular application, which worked correctly in earlier versions of Windows, but now does not run in Windows 7. You have checked the application vendor's web site but there is no update available. What should you try next to run the application? (select two)
1) Run the application in compatibility mode 2) Create a virtual computer that runs Windows XP. Run the virtual computer each time the application runs
You have connected two drives to the primary IDE interface in a PC system. How could the drives be configures? (select two)
1) Set both drives to Cable Select 2) Set one drive to Master and the other to Slave
You recently upgraded a client's older workstation from Windows XP to Windows 7. The client has called to complain that the new interface is very slow. For example, after clicking the Start button, the Start Menu slowly appears on the screen. How can you fix this problem? (select two)
1) Set the visual effects for Best Performance 2) upgrade the video board installed in the system
You are working on a Windows 7 system and want to synchronize the offline files on your computer with the versions of the network. Which tool would you use? (select two)
1) Sync Center 2) Mapped drive properties
Which of the following tools allow for remote management of servers? (select two)
1) Telnet 2) SSH
You just created a snapshot of a virtual machine while it was running. What information is saved in the snapshot? (select two)
1) The current contents of the virtual machine's RAM 2) The current contents of the virtual machine's video memory
When would you use the degauss feature on a CRT monitor? (select two)
1) The monitor displays strange colors 2) The monitor displays distorted images
You just purchased an iPad tablet device. You want to synchronize your photos, music, email, and contacts from your Windows 7 PC to the device. How can you connect the device to the PC? (select two)
1) USB cable 2) Wi-Fi wireless connection
You're attempting to diagnose a problem with a notebook computer. The user reports that it displayed a message that the batter was low, then it shut down by itself even though it was plugged into a wall outlet. You've checked the AC adapter and found that the LED light it lit when plugged into a wall outlet. What should you do next? (select two)
1) Verify that the power LED on the notebook computer is lit when plugged into the wall outlet 2) Verify that the AC adapter produces the correct DC voltage for the notebook computer
Which of the following items are likely to be displayed in the Notification Area of a computer running the Windows OS?
1) Volume Control 2) The current time
Under what conditions should you choose exFAT over FAT32? (select two)
1) When formatting removable flash drives 2) When creating a volume over 32 GB in size
Which of the following OSes uses C:\Users\username as the default directory for user files? (select two)
1) Windows Vista 2) Windows 7
Which of the following identify the key differences between a worm and a virus? (select two)
1) Worms independently replicate themselves 2) A virus relies on a host for replication
Which of the following permissions are NOT available when sharing a folder on a Windows 7 workstation? (select two)
1) Write 2) Modify
In which of the following situations would restoring from a backup be the best option? (select two)
1) You accidentally deleted several important e-mails from Outlook and need to restore them. 2) You need to restore several word processing files that were accidentally deleted from My Documents
You are troubleshooting a network communication problem to the www.widgets.com server. Which of the following will give you the IP address of that server? (select two)
1) nslookup www.widgets.com 2) ping www.widgets.com
Given that your Windows workstation has Automatic Private IP Addressing (APIPA) implemented using default settings, which of the following TCP/IP addresses could be automatically assigned to the system should your DHCP server go down or become inaccessible?
169.254.1.26
How many PATA devices can be installed on a typical modern ATX motherboard?
2
What port does Telnet use?
23
game pad
A joystick replacement used with many games. It includes at least one analog stick to simulate a joystick and multiple buttons.
cable select
A jumper selection for IDE/PATA drives. When selected for both drives, the drive connected to the black connector on the end of the ribbon cable is the master, and the drive connected to the middle gray connector is the slave. MNEMONIC: The slave is between the master and the motherboard.
Fn key (Function key)
A key used on laptop computers to provide additional uses for traditional function keys.
HTML (hypertext markup language)
A language used to format webpages. HTML pages are retrieved from web servers by using HTTP or HTTPS.
backlight
A light used in LCD monitors to shine through LCD crystals. If the backlight fails, the LCD monitor is dim or doesn't display anything at all. Some backlights use LEDs.
IR (infrared)
A line-of-sight wireless standard. It allows devices to transmit and receive data using LEDs and IR sensors, similarly to how TV remote controllers work.
HCL (hardware compatibility list)
A list of hardware devices that have been verified to work with different versions of Windows. It is currently known as the Windows Logo'd Products List (LPL).
A SCSI hard disk drive has three jumpers that are used to set the SCSI ID. shunts have been placed on the first and third jumpers. What SCSI ID has been assigned to this device?
5
thin client
A computer system that has minimum applications installed. Instead, a user accesses the applications over a network. Compare to a thick client.
Which wireless standard has the highest data transfer rates?
802.11n
You are designing an update to your client's wireless network. The existing wireless network uses 802.11b equipment, which your client complains runs too slowly. She wants to upgrade the network to run at 150 Mbps. Due to budget constraints, your client wants to upgrade only the wireless access points in the network this year. Next year, she will upgrade the wireless network boards in her users' workstations. She has also indicated that the system must continue to function during the transition period. Which 802.11 standard will work best in this situation?
802.11n
thick client
A computer system that includes typical applications needed by a user. Compare to a thin client.
SPDIF (Sony-Philips digital interface format)
A connection for specific sound systems. It uses a single connection to deliver all digital sound channels.
port replicator
A connection plugged into a laptop to provide additional ports. Compare to docking station.
DSL (digital subscriber line)
A connection through a public switched telephone network (PSTN) to connect to the Internet. Asymmetric DSL (ADSL) uses different speeds for uploads and downloads. Symmetric DSL (SDSL) uses the same speed for uploads and downloads.
TCP (Transmission Control Protocol)
A connectionoriented protocol. It uses a three-way handshake to establish a connection and provides reliable, guaranteed delivery of data.
loopback plug
A connector that loops output pins back to input pins. RJ-45 loopback plugs can help test NICs that have RJ-45 jacks.
F-connector
A connector used with RG-6 coaxial cable. It is commonly found on TV cable coming from a cable company.
Your laser printer prints a vertical line on every page. You change the toner cartridge but the problem does not go away. What is the most likely problem?
A corona wire is dirty
smart card
A credit-card sized card used for authentication. Users often use it with a PIN when authenticating.
registry
A database of settings used by Windowsbased systems. It can be viewed and modified with the registry editor (regedit).
PVC (permanent virtual circuit)
A dedicated circuit link between two facilities. It is used with ATM networks.
NAS (network attached storage)
A dedicated computer system used to provide disk storage on a network. It's often a small device that is easy to plug in and use.
COMx (communication port) (x=port number)
A designation for a serial port, such as COM1, COM2, and so on.
scanner
A device that can scan documents and photos, creating a digital file. Multifunction printers often include scanning capabilities.
MAU (multistation access unit)
A device used in ring networks. All devices communicate through the MAU but in a logical ring.
S-Video (Separate Video)
A 4-pin DIN used for analog video. It transmits video over two channels.
BD-RE (Blu-ray disc Recordable Erasable)
A Blu-ray disc that can be rewritten to multiple times.
CD-RW (compact disc-rewritable)
A CD that can be written to multiple times.
CD-R (compact disc-recordable)
A CD that can be written to once. This is sometimes referred to as a WORM disc.
Folder Options
A Control Panel applet used to control views in Windows Explorer.
Services
A Control Panel applet used to manipulate services.
Internet Options
A Control Panel applet used to manipulate settings for Internet Explorer.
Performance Monitor
A Control Panel applet used to measure system performance.
Task Scheduler
A Control Panel applet used to schedule tasks.
DB-25 (parallel communications D-shell connector, 25 pins)
A D-shaped connector with 25 pins. A DB-25 port on a computer that has holes instead of pins is a parallel port.
DB-25 (serial communications D-shell connector, 25 pins)
A D-shaped connector with 25 pins. A DB-25 port on a computer that has pins instead of holes is a serial port.
DB-9 (9-pin D shell connector)
A D-shaped connector with nine pins. The DB-9 port on a computer is known as the serial port.
DVD-RW (digital video disc-rewritable)
A DVD that can be written to multiple times.
DVD-R (digital video disc-recordable)
A DVD that can be written to once. This is sometimes referred to as a WORM disc.
dual-layer DVD
A DVD with 8.5 GB of storage rather than the 4.7 GB of standard DVDs. A double-sided dual-layer DVD holds 8.5 GB on each side, for a total of 17 GB. MNEMONIC: DVD's live in York, Vail, and Tokyo.
DDoS (distributed denial of service)
A DoS attack against a system from multiple attackers.
Disk Defragmenter
A GUI tool used to analyze and defragment hard drives.
Disk Management
A GUI tool used to manage disks and volumes. Some common tasks include creating, formatting, resizing, and deleting volumes. Diskpart is a command-line equivalent.
HTPC (home theater personal computer)
A PC configured to work as a digital video recorder (DVR) for television, audio player for music, and video player for movies. It is often contained in a special form factor case also called HTPC.
HDMI (high definition media interface)
A digital interface used with display monitors. It includes video and 8-channel audio.
RAID-10
A RAID configuration of four or more disks. Also called a stripe of mirrors because it combines RAID-0 and RAID-1. It always has an even number of disks.
RAID-5
A RAID configuration of three or more disks. The equivalent of one drive holds parity data used for fault tolerance. Also called a striped volume with parity.
RAID-1
A RAID configuration of two disks created for fault tolerance. Data written to one disk is also written to the other. Also called a mirrored volume.
RAID-0
A RAID configuration of two or more disks combined as a single volume. Used for read and write enhancements but no fault tolerance. Also called a striped volume.
SAS (Serial Attached SCSI)
A SCSI interface that uses a serial connection similar to SATA.
LPD/LPR (line printer daemon/line printer remote)
A UNIX-based protocol used to print to printers over a network.
VPN (virtual private network)
A VPN provides access to an internal private network over a public network such as the Internet. VPNs use tunneling protocols to protect data transmitted over the public network.
VoIP phone
A Voice over Internet Protocol (VoIP) phone is used to make phone calls over an IP network instead of traditional plain old telephone service (POTS) lines.
wireless router
A WAP with routing capabilities. Wireless routers often have other capabilities, such as DHCP, NAT, and a firewall.
Wi-Fi (wireless fidelity)
A WLAN using 802.11-based wireless technologies. It is a trademark of the Wi-Fi Alliance.
homegroup
A Windows 7 feature that allows users to easily share libraries in small networks. One user creates the homegroup and others can join it.
Disk Cleanup
A Windows utility that can identify and remove unneeded files on a system.
FAT (File Allocation Table)
A basic file system used to format disks. FAT16 (commonly called just FAT) and FAT32 are the two common versions. NTFS is recommended instead of FAT for most implementations due to better performance and security.
hub
A basic network device used to connect computers together. Data going into any port goes out all ports. Many organizations replace hubs with switches.
POST (power-on self test)
A basic test routine included in the BIOS that is run when the computer first starts. Failures are indicated by displayed errors and specific beep codes.
Notepad
A basic text editor. You can use it to create and modify batch files.
UPS (uninterruptible power supply)
A battery backup system that provides short-term power to systems when commercial power is lost. Most UPS systems include a surge suppressor.
li-ion (lithium-ion)
A battery type commonly used in laptops.
NiCd (nickel cadmium)
A battery type used in older laptops.
NiMH (nickel metal hydride)
A battery type used in older laptops.
DMZ (demilitarized zone)
A buffer zone used to protect systems that are accessible on the Internet without putting the system directly on the Internet.
Remote Assistance
A built-in service within Windowsbased systems. It allows novices to request help. Helpers can connect remotely and show users how to accomplish tasks within Windows.
EMP (electromagnetic pulse)
A burst of electromagnetic radiation from an explosion. An EMP pulse can damage electronic equipment.
crossover cable
A cable created to connect similar devices, such as a computer to a computer or a switch to a switch. Compare to a straight-through cable.
webcam
A camera attached to a computer to provide real-time video. It is often used with phone calls.
Control Panel
A central repository of mini-programs or applets. Applets vary in different operating systems.
accelerometer
A chip in many mobile devices used to detect the orientation of the device and change the display. A basic use is to change the display to landscape or portrait mode based on the orientation. It is often combined with a gyroscope chip.
gyroscope
A chip in many mobile devices used to detect the orientation of the device and change the display. It is often combined with an accelerometer chip.
EEPROM (electrically erasable programmable read-only memory)
A chip on the motherboard used to store BIOS on older systems. It can be erased and reprogrammed with a software program by using a process commonly called flashing. Most current systems store BIOS on a type of flash memory similar to what is used with a thumb drive. See ROM, PROM, and EPROM.
TPM (Trusted Platform Module)
A chip on the motherboard used with software applications for security. It can be used with Windows BitLocker Drive Encryption to provide full-disk encryption and to monitor for system tampering.
expansion card
A circuit card that can be installed in an available expansion slot to add additional capabilities to a system. Common expansion cards use PCIe.
DIMM (dual inline memory module)
A circuit card that holds RAM. Laptops use SODIMMs instead.
track
A circular area around a disk drive platter. Platters have multiple tracks, and tracks are divided into sectors.
real-time clock
A clock running on the motherboard that keeps track of the current time and date. It's powered by the motherboard battery (sometimes called the CMOS battery) when the system is turned off.
RG-59
A coaxial cable that uses BNC connectors. It is used for analog data and can be used between a TV and DVD player.
RG-6
A coaxial cable that uses F-type screw-on connectors. It is used for digital data, such as from a cable TV company.
SP (service pack)
A collection of patches and updates released since the operating system was released. The first SP is referred to as SP1, the second as SP2, and so on.
inkjet printer
A color printer popular with home users that prints by injecting ink onto a piece of paper.
FQDN (fully qualified domain name)
A combination of a host name and a domain name. FQDNs are commonly used to address servers on the Internet.
eSATAp (external serial ATA powered)
A combination of an eSATA port and a USB port that can provide power to external SATA devices. It requires a special 5-V cable to carry 5 V of power or a special 12-V cable to carry 5 V and 12 V.
raster image
A combination of dots used to create a printout on a laser printer. It is created by a raster image processor.
privileges
A combination of rights and permissions.
bootrec
A command available in the Windows RE on Windows Vista and Windows 7 to repair the BCD and hard disk problems.
bootcfg
A command available in the Windows XP Recovery Console that can be used to rebuild the Boot. ini file. MNEMONIC:
fixboot
A command available in the Windows XP Recovery Console to fix a boot sector.
fixmbr
A command available in the Windows XP Recovery Console to fix the master boot record.
Telnet
A command prompt application you can use to connect to remote systems. It is sometimes used to check whether remote systems are operating on specific ports. Telnet uses port 23.
recovery console
A command prompt-based environment used in Windows XP. It includes commands such as fixboot and fixmbr.
net
A command-line command. It's used for many purposes, including mapping drives with the net use command.
ping
A command-line program that can check network connectivity with other systems and their response times.
arp
A command-line program that shows MAC-to-IP address mapping. ARP is also an acronym for Address Resolution Protocol, used to resolve IP addresses to MAC addresses. The arp command shows the result of ARP activity for a system. MNEMONIC: A Real Problem is a commanding line of hippees at McDonalds.
tracert
A command-line program used to trace the route between two systems, listing all of the routers in the path.
nslookup
A command-line program used to verify the existence of records on a DNS server. It can also verify whether a DNS server can resolve a name to an IP address.
ipconfig
A command-line program used to view IP configuration information on a system. It includes multiple switches, including the /release and /renew switches used to release and renew information from a DHCP server.
netstat
A command-line program used to view network statistics and view inbound and outbound connections.
mstsc
A command-line program, short for Microsoft Terminal Services Connection. It is used to open Remote Desktop Connection.
nbtstat
A command-line tool related to NetBIOS over TCP/IP Statistics. It works with NetBIOS names instead of host names. MNEMONIC: Net Bios TCP/IP Statistics
diskpart
A command-line tool that can do many of the same tasks as the Disk Management GUI.
chkdsk
A command-line tool used to check the integrity of disks. It can also fix errors and recover files.
convert
A command-line tool used to convert a FAT- based file system to NTFS without losing any data.
defrag
A command-line tool used to defragment a hard drive. It works like Disk Defragmenter.
TRS (tip ring sleeve) connector
A common connector used with speakers, headphones, and other sound components.
USB (universal serial bus)
A common method of connecting external peripherals. A single USB port can connect as many as 127 devices. USB 2.0 supports speeds of up to 480 Mbps, and USB 3.0 supports speeds of up to 5 Gbps. MNEMONIC: US Bees are stinky. Version 2.0 survives (480 Mbps) but version 3.0 always (5.0 Gbps) faster.
ATX (Advanced Technology Extended)
A common motherboard specification. ATX motherboards are 12 inches by 9.6 inches. ATX also defines power requirements associated with ATX-based power supplies. MNEMONIC: All attics are ten pages long.
Molex
A common power connector included with internal power supplies. It provides 5 V and 12 VDC to different devices, such as Parallel Advanced Technology Attachment (PATA) disk drives.
SD (Secure Digital)
A common type of flash memory used with cameras, digital recorders, and other portable devices.
compact flash (CF)
A common type of memory used with camera and digital recorders. SD is a similar type.
ISP (Internet service provider)
A company that provides Internet access to businesses and home users.
blackout
A complete loss of power. Systems protected with an UPS will continue to run during a blackout, at least for a short period of time.
transfer roller
A component in a laser printer that electrically charges paper to attract the toner.
duplexing assembly
A component in printers that allows them to print on both sides of a sheet of paper.
transfer belt
A component used in some color laser printers. Colors are applied to the belt and then applied to the paper.
RISC (reduced instruction set computer)
A computer or CPU that uses a small number of optimized instructions rather than a large number of specialized instructions.
System Protection
A feature in Windows that creates restore points. On Windows Vista and Windows 7, it also captures previous versions of user files.
VFAT (virtual file allocation table)
A feature in Windows that supports long file names.
offline files
A feature in Windows-based systems that provides access to shared files when a user is disconnected from a network. Offline files are cached on a user's system.
HAV (Hardware Assisted Virtualization)
A feature included with most CPUs to support virtualization on a system. It often has to be enabled in the BIOS.
S.M.A.R.T. (self-monitoring, analysis, and reporting technology)
A feature introduced in ATA-3 that allows drives to monitor reliability indicators. They can detect potential problems with a drive before an actual failure. It is used with both PATA and SATA.
secure desktop
A feature of User Account Control (UAC) that dims the desktop and prevents any other activity until the user responds to a dialog box. The secure desktop prevents malicious software from bypassing UAC prompts.
ZIF (zero-insertion-force)
A feature often used with PGA sockets to lock a CPU into place. LGA sockets often use a locking flip-top case instead.
GPS (Global Positioning System)
A feature on many mobile devices that identifies the exact location of the device. Many applications use GPS, and it can be used to locate a lost device.
autosense (or auto-negotiation)
A feature on many network devices, including NICs, that automatically detects the speed and duplex mode of the connection.
touch flow
A feature on tablets that senses when a user moves a finger across a tablet screen. It is commonly used with drag, pan, and flick gestures.
multitouch
A feature on tablets that senses when a user touches more than one location at a time. It is commonly used for pinch and spread gestures.
WPS (Wi-Fi Protected Setup)
A feature with many wireless devices that allows users to configure wireless security with a push button or a PIN. When enabled, it is vulnerable to attacks using free open source software.
shadow copy
A feature within Windows Vista and Windows 7 that creates copies of user data. It's also called previous versions.
Automatic Updates
A feature within Windows that automatically checks for updates. It can be configured to download and install updates without user intervention.
multi-mode fiber (MMF)
A fiber optic cable used to transmit multiple signals at the same time. It cannot transmit signals as far as SMF can.
single-mode fiber (SMF)
A fiber optic cable with a smaller core than multimode fiber. It is used to transmit one signal and transmit it farther than multimode fiber.
mp3 (Moving Picture Experts Group Layer 3 Audio)
A file extension used for audio files.
zip (zigzag inline package)
A file extension used for compressed files and folders.
mp4 (Moving Picture Experts Group Layer 4)
A file extension used for files that include digital video with audio.
bcd (boot configuration data)
A file in Windows Vista-based and Windows 7-based systems in place of the Boot.ini file in Windows XP. It identifies the location of operating systems. MNEMONIC: A beast helped me locate the operating system.
paging file
A file stored on the hard drive that is used as virtual memory.
UDF (universal disk format or universal data format)
A file system format used for DVDs.
NTFS (New Technology File System)
A file system used on Windows-based systems. It is more efficient and provides much more security than do FAT-based file systems.
CDFS (compact disc file system)
A file system used on optical discs and widely supported by different operating systems.
image
A file that contains a snapshot of all the files of a system. The image can be applied to a new computer with all of the same settings.
DLL (dynamic link library)
A file that includes reusable code within Windows-based systems.
Boot.ini
A file used in Windows XP as part of the boot process. It is not used in Windows Vista or Windows 7. MNEMONIC:
NTLDR (new technology loader)
A file used in the boot process for Windows XP. NTLDR uses Boot.ini to load Windows.
regsvr32
A file used to register or unregister DLLs.
LCD (liquid crystal display)
A flat panel display. It is thinner and lighter than a CRT monitor and consumes significantly less power.
share
A folder that is available to other users over a network. Files within a share are accessible to users that have access to the share.
Windows 7 Upgrade Advisor
A free tool used to determine whether a system is compatible with Windows 7. It checks the hardware and existing applications for compatibility issues and provides a report for the user.
TCP/IP (Transmission Control Protocol/Internet Protocol)
A full suite of protocols used on the Internet and in internal networks.
byte
A group of 8 bits. Many values in computers are expressed in bytes, such as 2 GB of memory or 650 GB of hard drive space.
LAN (local area network)
A group of computers and other devices connected together. Users can share resources when connected in a LAN.
cluster
A group of sectors on a disk. Clusters are also known as allocation units. File systems use clusters to identify the location of files.
QoS (Quality of Service)
A group of technologies used to control traffic on a network.
PKI (public key infrastructure)
A group of technologies used to create, manage, and distribute certificates. Certificates are used for several cryptographic methods, including encryption and authentication.
NAC (network access control)
A group of technologies used to inspect network clients prior to granting network access.
MPEG (Moving Picture Experts Group)
A group that defines standards for audio and video compression.
VM (Virtual Machine)
A guest operating system on a system using virtualization. The host system runs hypervisor software and can manage one or more VMs at a time.
PDA (personal data assistant)
A handheld device that can include contact lists, an address book, calendar, appointment lists, and more. Many mobile devices include PDA features.
crimper
A hardware tool used to attach cables to connectors. A crimper is used to connect twisted-pair cable to RJ-45 connectors.
punchdown tool
A hardware tool used to attach cables to jacks or punchdown blocks. It is used to attach twisted-pair cable to the back of jacks and to punchdown blocks in wiring rooms.
wire strippers
A hardware tool used to strip covering off of wires.
cable tester
A hardware tool used to test for correct wiring and possible wiring breaks within a cable.
In virtualization, what is the role of the hypervisor?
A hypervisor allows virtual machines to interact with the hardware without going through the host operating system.
ACL (access control list)
A list of rules or exceptions used in routers and firewalls. MNEMONIC: Your ACL tears off a list of rules.
What is the path to the user profiles in Windows XP?
%systemdrive%\Documents and Settings
You need to install a 32-bit application on a 32-bit version of Windows Vista. Where is the default directory where the application will be installed?
%systemdrive%\Program Files
You need to install a 32-bit application on a 64-bit version of Windows 7. Where is the default directory where the application will be installed?
%systemdrive%\Program Files (x86)
Where are fonts stored on a Windows 7 system?
%systemroot%\Fonts\
You need to install a 32-bit application on a 32-bit version of Windows. Where is the default directory where the application will be installed?
%systemroot%\Program Files
You need to install a 32-bit application on a 64-bit version of Windows. Where is the default directory where the application will be installed?
%systemroot%\Program Files (x86)
You have two computers running Windows 7: comp1 and Comp2. You need to use the command-line to remotely manage comp1 from Comp2. What should you do? (Select two. Each choice is a required part of the solution.)
- Authenticate Comp2 to Comp1. - On Comp1, run "winrm qc"
What are 3 optical storage devices?
- BD - CD - DVD
Which disk types does Windows support? (Select two.)
- Basic - Dynamic
You have a Windows 7 computer. You would like to configure Event subscriptions for that computer to forward events to a network server. You need to configure your computer as a source computer for a source initiated subscription. Which of the following will be part of your configuration? (Select two.)
- Configure the local security policy to identify the FQDN of the collector computer. - Run 'winrm qc -q'
You are a the desktop administrator for you company. You manage 20 Windows 7 computers. You would like to manage the computers remotely using a tool with a graphical user interface (GUI). What should you do? (Select two. Each choice is a possible solution.)
- Establish a remote Desktop connection to each computer. - Open Computer Management and connect to each remote computer.
You have added two new hard disks to a Window computer. The disk are configured as basic disks. Which of the following could be configured on these disk? (Select two.)
- Extended partitions with logical drives - Primary partitions
You have a computer that runs windows 7. You would like to configure windows update to download updates that Microsoft suggests, but does not mark as important. You would also like to ensure that updates are installed on the computer without the intervention of an Administrative user. Select the settings that you should enable on the computer.
- Give me recommended updates the same way I receive important updates. - Allow all users to install updates on this computer.
Which of the following are magnetic storage devices?
- Hard disk - Tape Drive - Floppy disk
When you try to read a particular DVD-R disc, you receive an error message. Other discs work fine. Which of the following are the most likely problems? (2)
- Incorrect disc format - dirty of scratched disc
WLAN (wireless local area network)
A local area network using wireless technologies.
hybrid topology
A logical network topology using any two of the other types of topologies.
ring topology
A logical network topology where devices are connected in a logical circle. Most ring topologies are token ring, using an electronic token to restrict communication.
bus topology
A logical network topology where devices are connected in a logical line. Both ends must be terminated.
star topology
A logical network topology where devices are connected with a central device such as a hub or a switch.
mesh topology
A logical network topology where each device is connected to all other devices in the network.
watt
A measure of power calculated by multiplying voltage and amperage. Power supplies are rated in watts.
multimeter
A meter that can take different types of measurements. Multimeters are commonly used to measure voltages provided by a power supply.
biometrics
A method of authentication. The most common method is with fingerprints, and the strongest method is with retinal scans.
daisy chain
A method of connecting devices in sequence with each other. An alternative would be having each device connect directly to a controller.
tractor feed
A method of feeding continuous-feed paper through impact printers. Most printers use feeders and/or paper trays.
ATM (asynchronous transfer mode)
A method of transferring data over a network by using fixed-size cells instead of Ethernet packets. MNEMONIC: ATM's transfer the same size money.
SLI (scalable link interface)
A method used by NVIDEA to link multiple GPUs on two or more video cards.
ECC (error correction code)
A method used to detect and correct memory errors on high-end servers. Desktop systems typically use non-ECC RAM.
parity
A method used to detect errors. RAM comes in parity and non-parity versions, but desktop systems rarely use parity RAM. Parity is also used in some RAID configurations.
double pumping
A method used to double the clock rate by using both the leading edge and trailing edge of a clock. DDR RAM types and most CPU clocks use double pumping.
CAPTCHA (Completely Automated Public Turing Test To Tell Computers and Humans Apart)
A method used to prevent webpage automated entries. Text is displayed as a distorted image that cannot be interpreted by a program. A person enters the text, proving that a person is making the entry.
PS/2 (personal system/2 connector)
A mini-DIN connector. The green port is for the mouse, and the purple port is for the keyboard.
modem
A modulator-demodulator that converts analog signals to digital signals and digital signals to analog signals. Modems can provide access to the Internet via a phone line. Special modems are used to provide access to the Internet by cable TV companies.
BTX (Balanced Technology Extended)
A motherboard form factor designed by Intel as an alternative to the ATX. Intel stopped using it in 2006. ATX is the most common standard.
NLX (New Low-profile Extended)
A motherboard form factor used by several vendors in low-profile cases. It has been superseded by Micro-ATX and Mini- ITX form factors.
SFF (small form factor)
A motherboard form factor used in small mobile devices. Pico-ITX is an example.
PAN (personal area network)
A network around a single person. Bluetooth is commonly used to connect mobile devices such as smartphones and ear pieces in a PAN.
router
A network device that connects networks together. A router is needed to get to other networks, including the Internet. In contrast, a switch connects individual computers together in a network.
switch
A network device used to connect computers and other network devices together. Switches are more efficient than hubs. They can direct traffic to specific ports instead of sending data to all ports, as a hub does.
SAN (storage area network)
A network of storage devices used in large organizations. Smaller organizations use networked attached storage (NAS).
domain
A network with centralized authentication. In Windows, a domain includes a domain controller. The domain controller hosts Active Directory, and users have a single account they can use to log on to the domain.
SATA (Serial Advanced Technology Attachment)
A newer hard drive technology that is replacing PATA. SATA connectors have a distinctive L shape.
Blu-ray
A newer standard for optical discs. A singlelayer BD-R holds 25 GB of data, and a dual-layer disc holds 50 GB of data. MNEMONIC: A single layer of blue nails in a double shot of ale.
OLED (Organic Light Emitting Diode)
A newer type of flat panel display that can emit light without a backlight.
IRQ (interrupt request)
A number assigned to a device that allows it to get the attention of the CPU. IRQs are automatically assigned with plug and play.
SCSI ID (small computer system interface identifier)
A number from 0 to 15 that identifies a SCSI device. SCSI ID 7 is the highest priority and usually assigned to the SCSI controller.
PIN (personal identification number)
A number used for authentication. It is often combined with another method, such as with a smart card.
hexadecimal
A numbering system using a base of 16. Valid characters are the numbers 0 through 9 and the letters A through F. A hexadecimal number can be expressed with four binary numbers.
binary
A numbering system using a base of two. It uses only 0 and 1 as valid digits.
IP address
A numerical address assigned to a computer. An IPv4 address uses 32 bits and is expressed in dotted decimal format, such as 192.168.1.1. An IPv6 address uses 128 bits and is expressed in eight groups of hexadecimal characters, such as FC00:0000:0000:0076:0000:042A:B95F:77F5.
RIP (routing information protocol)
A protocol used by routers to share routing information.
ICMP (internet control message protocol)
A protocol used for diagnostics and troubleshooting. Ping and tracert commands use ICMP. ICMP traffic is often blocked by firewalls.
VoIP (Voice over Internet Protocol)
A protocol used for voice and multimedia sessions over an IP network.
SNMP (simple network management protocol)
A protocol used to communicate with and manage network devices such as routers and switches.
DHCP (dynamic host configuration protocol)
A protocol used to dynamically assign IP addresses and other TCP/IP configuration information.
PCL (printer control language, or printer command language)
A protocol used to send print jobs to a printer.
SMB (Server Message Block)
A protocol used to transfer files over a network. Unlike FTP, SMB is transparent to users.
You connect your computer to a wireless network available at the local library. You find that you can access all Web sites you want on the Internet except for two. What might be causing the problem?
A proxy server is blocking access to the Web site
spike
A quick, sharp increase in AC voltage which can damage unprotected equipment. Surge suppressors prevent spikes from damaging equipment and are included in most UPS systems.
Windows Update
A service provided by Microsoft to provide updates to Windows systems.
Mini-DIN
A round connection used for many devices. The PS/2 ports are 6-pin mini-DIN ports. Other mini- DIN ports can have 3-9 pins.
imaging drum
A round cylinder covered with photosensitive material and used in laser printers.
LBA (logical block addressing)
A scheme used for specifying locations of blocks on a hard disk.
User Account Control (UAC)
A security feature in Windows Vista and Windows 7 that ensures users are informed when system changes occur and helps to prevent unauthorized changes. It uses two account tokens.
DLT (Digital Linear Tape)
A self-contained tape cartridge used for backups. DLT can transfer data as fast as 60 MB/s, and 800-GB cartridges are available. It is being replaced by LTO.
LTO (Linear Tape-Open)
A self-contained tape cartridge used for backups. LTO-5 can transfer data at 140 MB/s, and cartridges can hold as much as 1.5 TB. LTO is replacing DLT.
standby
A power saving state similar to sleep or suspend.
surge suppressor
A power strip with extra components that protects electronic systems from power surges or spikes.
hibernate
A power-saving state. Data from RAM is written to the hard disk, and the system is turned off.
sleep/suspend
A power-saving state. RAM contents are retained, and the CPU runs very slowly. The system can return from a sleep or suspend state very quickly.
loopback address
A predefined address used to test the functionality of TCP/IP. The IPv4 loopback address is 127.0.0.1. The IPv6 loopback address is ::1. MNEMONIC: A loopback adddress is stinky as sh*t
Windows RE (Recovery Environment)
A preinstallation environment used for troubleshooting Windows.
impact printer
A printer that prints by pushing print head pins against an ink ribbon pressing ink onto paper. It is commonly used to print multipart forms.
thermal printer
A printer used for cash register receipts. It prints by heating a special type of paper.
dpi (dots per inch)
A printing term that identifies the resolution or clarity of the output. Higher numbers provide a higher resolution and a better-quality printout.
PPM (pages per minute)
A printing term that identifies the speed of a printer. Faster printers have a higher PPM.
raster image processor (RIP)
A processor on a laser printer used to create a raster image. The image is then transferred to the page as the printout.
GPU (graphics processing unit)
A processor on a video card used to create graphics. It takes the load off the CPU.
PVC (polyvinyl chloride)
A protective covering around cables, commonly called a jacket. PVC can give off toxic fumes if it burns, so it is not used in plenum spaces.
IP (internet protocol)
A protocol in the TCP/IP suite. It defines how packets are sent across a network.
PPP (point-to-point protocol)
A protocol often used when a system connects to the Internet via an ISP.
NAT (Network Address Translation)
A protocol that translates private IP addresses to public and public IP addresses to private. It allows multiple internal clients to access the Internet with a single public IP address.
heat sink
A specially designed piece of metal that draws heat away from chips, such as the CPU. Heat sinks typically have flared fins, allowing more air through.
PGA (pin grid array)
A specific type of CPU socket in which the socket has holes and the CPU has pins. Compare to LGA.
land grid array (LGA)
A specific type of CPU socket where the socket has pins instead of holes. The chip also has small pins created as bumps or pads. Compare to PGA.
ATA (advanced technology attachment)
A standard for disk drive interfaces. It was derived from IDE.
POTS (plain old telephone service)
A standard telephone service available in most parts of the world. Users can use POTS and a modem for Internet access.
RJ (registered jack)
A standard used for cables and connectors. RJ-11 is used with phones, and RJ-45 is used with networks.
GSM (Global System for Mobile Communications)
A standard used for cellular phones. GSM is incorporating 4G standards.
FireWire
A standard used for high-speed serial bus transfers. FireWire 400 supports speeds of up to 400 Mbps, and FireWire 800 supports speeds of up to 800 Mbps. MNEMONIC: Roses in vases are on fire
RS-232 or RS-232C (recommended standard 232)
A standard used for serial communications. It isn't common with desktop computers but is still used in some situations.
PCMCIA (Personal Computer Memory Card International Association)
A standardization organization that defines standards for laptop computers. It defined the older PC Card standard and the newer ExpressCard standard.
VESA (Video Electronics Standards Association)
A standards organization that has created standards for SVGA displays and video peripherals.
BSOD (blue screen of death)
A stop error screen that sometimes appears when a Windows-based system is unable to boot. The BSOD screen includes failure codes that indicate the source of the problem.
TFTP (Trivial File Transfer Protocol)
A streamlined version of FTP. It uses port 69.
retinal scan
A strong method of biometric authentication.
photosensitive surface
A surface that reacts to light. A laser printer imaging drum uses a photosensitive surface.
KVM (keyboard video mouse)
A switch that allows multiple computers to share a single keyboard, video display, and monitor.
IDS (Intrusion Detection System)
A system designed to monitor traffic and detect attacks.
Sysprep
A system preparation tool used before imaging a Windows computer. Sysprep removes unique settings on a computer, such as the security identifier (SID).
dual-boot
A system that can boot into more than one operating system. For example, a computer that can boot into Windows XP and Windows 7 is a dual-boot system.
MUI (multilingual user interface)
A system that can display information in different languages. When additional language files are installed, Windows can display wizards, dialog boxes, menus, and help topics in different languages.
cold cathode fluorescent lamp (CCFL)
A type of backlight used in LCD monitors.
NetBIOS (Network Basic Input/Output System) name
A type of computer name used on internal networks. WINS servers resolve NetBIOS names to IP addresses. MNEMONIC: Netbios wins! Netbios is for internal networks.
host name
A type of computer name used on networks and on the Internet. DNS resolves host names to IP addresses.
Master Boot Record (MBR )
A type of disk that supports disks as large as 2 TB and up to four partitions. Compare to Globally Unique Identifier (GUID) Partition Table (GPT).
Globally Unique Identifier (GUID) Partition Table (GPT )
A type of disk that supports disks larger than 2 TB. Windows 7 supports up to 128 partitions on a GPT disk. Compare to MBR.
CRT (cathode-ray tube)
A type of display monitor. It is heavy, large, and power-hungry. CRTs have been replaced by flat panel displays in most situations.
RCA
A type of single connection jack used with some audio and video. The Radio Corporation of America created it, but RCA is not an acronym.
partition
A usable portion of a disk. A single physical disk can be a single partition or divided into multiple partitions. A partition is the same as a volume.
volume
A usable portion of a disk. A single physical disk can be a single volume or divided into multiple volumes. A volume is the same as a partition.
GDI (graphics device interface)
A video card. The interface is used to send graphics to a display monitor. MNEMONIC: Goody, goody. I got a video card.
Internet Explorer
A web browser built into Windows. It is not the same as Windows Explorer, which is used for browsing through files and folders.
IIS (Internet Information Services)
A web server service included in Microsoft server products.
infrastructure mode
A wireless network created with a WAP or wireless router. In contrast, in ad-hoc mode devices connect to each other without a WAP or wireless router.
Bluetooth
A wireless protocol used for personal area networks (PANs). Class 2 devices have a range of about 33 feet. MNEMONIC: Bluetooth fishing in Miami
EVDO (evolution data optimized or evolution data only)
A wireless standard used with broadband Internet access.
WiMAX (Worldwide Interoperability for Microwave Access)
A wireless technology used to connect metropolitan area networks (MANs). It requires line-of-sight connectivity between towers.
Which of the following ports are commonly used to send & receive email? (Select TWO). A. 25 B. 53 C. 80 D. 110 E. 443
A. 25 And D. 110
Which of the following speeds BEST represents the speed of the memory when installing DDR2 at 800 MHz and DDR2 at 600 MHz? A. 600 MHz B. 700 MHz C. 800 MHz D. 1400 MHz
A. 600 MHz
Which of the following wireless networking standards operates at the SHORTEST distance? A. 802.11a B. 802.11b C. 802.11g D. 802.11n
A. 802.11a
Which of the following wireless protocols is limited to operating in the 5 GHz range ONLY? A. 802.11a B. 802.11b C. 802.11g D. 802.11n
A. 802.11a
Which of the following socket types is for an AMD CPU? A. 940 B. 775 C. 1155 D. 1366
A. 940
In older laptop screens, the backlight is powered by which of the following? A. A CCFL lamp B. A gas C. LEDs D. OLED
A. A CCFL lamp
Which of the following describes the MAIN difference between a plenum rated cable versus a non- plenum rated cable? A. A reduced production of hazardous fumes when subjected to fire B. The ability to be bent into tighter turning radiuses within conduit C. A reduced noise level when bundled in groups of 20 or more D. The ability to transmit data with fewer cross-talk interruptions
A. A reduced production of hazardous fumes when subjected to fire
Which of the following features of Windows allows a device to have a default IP address if a DHCP server is not available? A. APIPA B. ARP C. IPv6 D. DNS
A. APIPA
Which of the following topologies would cause the network to be segmented if any one machine went offline? A. Bus B. Mesh C. Star D. Hybrid
A. Bus
Which of the following has a MAXIMUM transmission speed of 10 Mbps? A. CAT3 B. CAT5 C. CAT5e D. CAT6
A. CAT3
Which of the following has the FASTEST connection speed? A. Cable B. Dial-Up C. ISDN D. WiMAX
A. Cable
A customer reports that their 4-year-old PC takes a long time to boot. The technician investigates and finds the BIOS is rediscovering the hardware environment at every boot. Which of the following will MOST likely fix this problem? A. Change out the CMOS battery on the motherboard. B. At the OS level, launch Device Manager and re-scan the hardware. C. Hit "F9" while the computer is booting, but before the OS starts to load. D. Reset the BIOS using the CMOS reset jumper.
A. Change out the CMOS battery on the motherboard.
An IP address of 10.10.1.180 would be considered part of which of the following address classes? A. Class A B. Class B C. Class C D. Class D
A. Class A
Which of the following is the proper way to remove a PCMCIA card from a laptop running Windows XP? A. Click on the safely remove hardware icon, stop the device, and remove the card B. Push the eject button on the card slot C. Grasp the card firmly and slowly pull it from the slot on the laptop D. In the Control Panel, stop the device service, and then remove the card
A. Click on the safely remove hardware icon, stop the device, and remove the card
Which of the following cable types carries an analog video signal across three separate physical channels? A. Component B. RCA C. DVI-analog D. VGA
A. Component
Which of the following panel types consumes the MOST power? A. Plasma B. LCD C. LED with no backlight D. LED with backlight
A. Plasma
An end user requires a computer to support computer aided drafting and computer aided modeling. Which of the following component packages should a technician recommend to the end user? A. Powerful processor, high-end graphics card, and maximum RAM B. File streaming, printer sharing, and a RAID array C. Surround sound audio, compact form factor, HDMI output D. Processor and RAM that meets minimum Windows requirements
A. Powerful processor, high-end graphics card, and maximum RAM
A workgroup of five PCs uses a shared printer. A customer says they cannot print to the printer but can access shares on another PC used for common files. The printer appears to be powered on. Which of the following would be the MOST likely cause of the issue? A. Printer PC is off network B. Printer is low on toner C. Printer needs to be restarted D. Device drivers are corrupted
A. Printer PC is off network
Which of the following RAID levels extends the size of a volume without providing reliability or mirroring? A. RAID 0 B. RAID 1 C. RAID 5 D. RAID 10
A. RAID 0
Which of the following connector types is used on a CAT5 cable? A. RJ-45 B. DB-9 C. RJ-11 D. RS-232
A. RJ-45
Which of the following connectors would be found on a twisted pair cable? A. RJ-45 B. BNC C. SC D. ST
A. RJ-45
A technician servicing a user's computer notices the user has a lot of desktop icons linking to inappropriate websites. Which of the following should the technician do NEXT? A. Report through proper channels B. Track the evidence C. Document all changes to the computer D. Preserve the data and device
A. Report through proper channels
Which of the following network devices would be MOST likely to perform Network Address Translation (NAT)? A. Router B. Switch C. Hub D. Modem
A. Router
Which of the following RAM types is LEAST likely to work optimally when installed in dual channel mode? A. SDRAM B. RAMBUS C. DDR2 D. DDR3
A. SDRAM
Which of the following memory types comes in the SIMM variety? A. SDRAM B. DDR3 C. DDR2 D. RDRAM
A. SDRAM
Which of the following types of Ethernet should be used if a technician has no choice but to run cable along fluorescent lighting arrays in a suspended ceiling? A. STP B. RG-6 C. PVC D. UTP
A. STP
After installing a bar code reader, which of the following is commonly done to configure the reader? A. Scan in program codes B. Enable the code reader in the BIOS C. Use Device Manager to enable I⁄R ports D. Adjust jumper switches
A. Scan in program codes
Which of the following will provide the FASTEST boot times for a laptop user? A. Solid state drive B. High capacity battery C. eSATA hard drive D. Increased RAM
A. Solid state drive
A technician is asked to recommend hardware for a new computer for a graphic artist company that regularly uses 3-D animation software. Which of the following components should be chosen to BEST meet the customer's needs? A. Specialized video card B. Multi-core processor C. TV tuner⁄recorder D. Tape backup drive
A. Specialized video card
A technician must replace a 10⁄100 NIC in a Windows XP PC. The failed NIC is no longer available and a substitute 1 GB NIC will be used. Which of the following MUST be performed to accomplish the task? A. The drivers for the new 1 GB NIC must be installed. B. The NIC speed cannot exceed 10/100 and the PC must support digitally signed drivers. C. The PC must be rated to support the 1 GB NIC speed. D. The network cable must also be upgraded.
A. The drivers for the new 1 GB NIC must be installed.
A keyboard has been replaced on a laptop. Which of the following is the MOST likely cause that the keyboard does not work? A. The keyboard data cable was not connected properly. B. The keyboard is not compatible with the laptop. C. The keyboard needs updated drivers. D. The keyboard is defective.
A. The keyboard data cable was not connected properly.
A user states that when printing to a shared printer nothing happens and the user has verified that the printer is turned on. Which of the following is the MOST likely cause? A. The print server does not have network connectivity. B. The ISP service is currently not available. C. The user’s print drivers are corrupted. D. The printer is low on toner.
A. The print server does not have network connectivity.
Which of the following is the FIRST component to transfer heat away from a processor? A. Thermal paste B. Case fan C. Liquid cooling D. Heatsink
A. Thermal paste
A user wants to purchase a new computer to use word processing software only. Which of the following computer types should be recommended? A. Thin client B. CAD workstation C. Home server D. Gaming PC
A. Thin client
Which of the following describes the function of a switch in a network? A. Transmits packets it receives to specific connections B. Converts a packet for transmission from one network to another network C. Determines whether a packet belongs on an internal or external network D. Broadcasts packets it receives to all connections
A. Transmits packets it receives to specific connections
An administrator wants to prevent people outside of the building from accessing a new wireless router. Which of the following is the LEAST labor intensive method to use while setting up new workstations? A. Turn SSID broadcast off B. Use wireless encryption C. Institute MAC filtering D. Setup static IP addresses
A. Turn SSID broadcast off
In addition to power and DVI, which of the following additional connections is needed to setup a fully functional touch screen LCD monitor? A. USB B. SCSI C. Ethernet D. Parallel
A. USB
Which of the following describes the port type pictured in the image? A. VGA B. Serial C. Parallel D. DVI
A. VGA
Which of the following PC expansion cards needs to be installed to record from a game console? A. Video capture B. High-end graphics C. Network D. RAID controller
A. Video capture
Which of the following typically cannot be upgraded in a laptop? A. Video card B. Hard drive C. RAM D. Wireless card
A. Video card
Which of the following encryption methods is considered easily broken and should be avoided when configuring wireless security? A. WEP B. WPA C. AES D. TKIP
A. WEP
Which of the following special function keys might prevent a user from connecting to the Internet? A. Wireless B. Screen lock C. Volume D. Bluetooth
A. Wireless
An outline of an image can be viewed on a laptop screen, but it is very dim and the screen appears almost black. This can be caused by a failing. (Select TWO). A. inverter. B. LCD. C. plasma screen. D. CRT. E. OLED.
A. inverter. And B. LCD.
A user calls the helpdesk because a solution that was previously suggested by another technician did not solve the user's issue. Which of the following is the MOST appropriate response? A. "Please hold while I transfer you to the previous technician, so a proper solution can be met." B. "Please explain the issue and I will work to resolve it." C. "My supervisor is the appropriate person to speak with about your issue." D. "Let me help you to resolve this issue, since that technician does not know how to fix it."
B. "Please explain the issue and I will work to resolve it."
Which of the following is the BEST way to explain RAID to a non-technical user? A. "RAID is a dynamic logical disk management system." B. "RAID uses multiple hard disks to increase performance and⁄or provide protection against data loss." C. "RAID uses data striping to reduce hard drive write time and parity bits to reconstruct the data from a failed hard drive." D. "RAID stands for Redundant Array of Independent Disks".
B. "RAID uses multiple hard disks to increase performance and⁄or provide protection against data loss."
Which of the following is the speed limitation for CAT3 wiring? A. 1 Mbps B. 10 Mbps C. 100 Mbps D. 1000 Mbps
B. 10 Mbps
A standard Internet mail account receives incoming messages on which of the following ports? A. 80 B. 110 C. 143 D. 443
B. 110
Which of the following uses Intel's core i CPUs? (Select TWO). A. F B. 1366 C. 775 D. 1155 E. AM3
B. 1366 And D. 1155
A customer states that since the new firewall has been installed, the customer has not been able to send email. Which of the following ports on the firewall should be checked? A. 21 B. 25 C. 110 D. 443
B. 25
A technician needs to install an appropriate PSU into a new machine. The technician needs available power for a floppy drive, two older IDE hard disks, a single SATA hard disk, and an IDE optical drive. How many unique power connectors will the PSU need to accommodate the listed devices? A. 2 B. 3 C. 4 D. 5
B. 3
A technician is installing a new laser printer on a workstation that has Windows 7 Professional x86 installed. Which type of printer driver is needed to complete the installation? A. 16-bit B. 32-bit C. 64-bit D. 86-bit
B. 32-bit
Which of the following is a public IP address? A. 10.0.0.1 B. 62.10.1.1 C. 172.16.0.1 D. 192.168.1.1
B. 62.10.1.1
A company is receiving a large number of laptop theft reports in the corporate buildings. Which of the following is the MOST cost-efficient way to discourage theft of laptops? A. A CCTV system B. A cable lock C. A badge reader D. A retina scanner
B. A cable lock
Which of the following 802.11 standards has the MAXIMUM throughput of 11 Mbps? A. A B. B C. G D. N
B. B
Which of the following 802.11 wireless standards provides the LOWEST maximum theoretical throughput? A. A B. B C. G D. N
B. B
Which of the following can be used to change fan speeds? A. Device manager B. BIOS C. Power options D. Action center
B. BIOS
Which of the following should be the FIRST items to be removed when replacing the system board on a laptop? (Select TWO). A. Keyboard B. Battery C. LCD D. Palm rest E. AC power adapter
B. Battery And E. AC power adapter
Which of the following cable types is MOST often found in Plain Old Telephone Service (POTS)? A. RG-6 B. CAT3 C. RG-59 D. Multi-mode
B. CAT3
Which of the following cable types has a MAXIMUM transmission rate of 100 Mb? A. CAT3 B. CAT5 C. CAT5e D. CAT6
B. CAT5
Which of the following computer components are located on the Northbridge? (Select TWO). A. Hard drive B. CPU C. Fan D. RAM E. Audio
B. CPU And D. RAM
A customer states their inkjet printer is not printing as clearly as it once did. The technician should FIRST perform which of the following functions to rectify this? A. Replace ink packs B. Calibrate the printer C. Use a different type of paper D. Replace the USB cable
B. Calibrate the printer
Which of the following protocols would be MOST important in preserving digital evidence of criminal activity during an investigation? A. Change control management B. Chain of custody C. Channel escalation D. MSDS documents
B. Chain of custody
Which of the following should a technician check FIRST on the laptop if the system’s battery is not being charged? A. CMOS battery B. DC-in jack C. AC-in jack D. Breaker for the wall jack
B. DC-in jack
A technician needs to configure a wireless small office home office (SOHO) network to provide IP addresses to devices on the network. Which of the following features should be enabled? A. MAC filtering B. DHCP C. SSID broadcast D. Port forwarding
B. DHCP
A user on a wireless network has the IP address 169.254.155.2 but cannot connect to the Internet. Which of the following should the user check on the wireless router? A. WPA B. DHCP C. WINS D. DNS
B. DHCP
Which of the following should a technician configure on a small office home office (SOHO) wireless router so IP addresses are automatically assigned to devices on the wireless network? A. MAC filtering B. DHCP C. NAT D. DNS
B. DHCP
Which of the following media has a capacity of 8.6 GB? A. CD B. DL DVD C. DL Blu-ray D. DVD
B. DL DVD
Which of the following does a technician need to do before giving a PC, which has been confiscated for prohibited activity, to another department? A. Identify prohibited activity on PC B. Document change of custody C. Report prohibited activity D. Preserve data
B. Document change of custody
Which of the following printers requires manual alignment? A. Laser B. Dot matrix C. Inkjet D. Thermal
B. Dot matrix
Which of the following types of RAM is typically used to improve reliability? A. Double sided B. ECC C. SODIMM D. RDRAM
B. ECC
Which of the following is the BEST type of cable to prevent EMI? A. STP B. Fiber C. Plenum D. UTP
B. Fiber
Which of the following media types is LEAST likely to be affected by electromagnetic interference? A. Coaxial B. Fiber C. Wireless B D. HSPA
B. Fiber
Which of the following devices on a home network should be placed in a DMZ? A. Backup server B. Gaming server C. Smartphone D. Wireless printer
B. Gaming server
A user is requesting assistance in building a custom made PC for home theater use to connect to their existing large LCD screen. Which of the following components should MOST likely be recommended? (Select TWO). A. Large IDE hard drive B. HDMI output C. Dual monitors D. RAID array E. TV tuner
B. HDMI output And E. TV tuner
A consultant has been asked to install the brightest possible projector into an office conference room that has a lot of natural sunlight. Which of the following specifications would BEST meet the client's needs? A. Highest possible resolution B. High lumens C. High contrast D. HDMI 1.4 compatibility
B. High lumens
Which of the following features makes logical processor cores appear as physical cores to the operating system? A. XD-bit B. Hyperthreading C. MMU virtualization D. 64-bit architecture
B. Hyperthreading
Which of the following communication standards requires line-of-site with no obstacles in order to operate properly? A. Bluetooth B. IR C. RF D. WiFi
B. IR
A customer would like to upgrade their onboard fast Ethernet connection to connect to their new gigabit network at the gigabit speed. Which of the following will enable them to do so? A. Convert the user to wireless. B. Install a 10/100/1000 NIC. C. Update the drivers for the onboard port. D. Flash the BIOS to unlock the Ethernet port.
B. Install a 10/100/1000 NIC.
Which of the following is the MAIN purpose of cleaning the printer during the imaging process? A. It prolongs the toner cartridge’s lifecycle B. It takes off any residual toner left after development C. It keeps the printer clean and prolongs its usable life D. It increases the speed of the print process
B. It takes off any residual toner left after development
Which of the following is LEAST likely to be considered a consumer replaceable part in a laptop? A. RAM B. LCD screen C. Optical drive D. Hard drive
B. LCD screen
Which mobile device architecture is used by Apple iPad devices running the iOS operating system?
ARM
Gb (gigabit)
About 1 billion bits; specifically, 1,073,741,824 bits.
GB (gigabyte)
About 1 billion bytes; specifically, 1,073,741,824 bytes.
Mb (megabit)
About 1 million bits; specifically, 1,048,576 bits.
MB (megabyte)
About 1 million bytes; specifically, 1,048,576 bytes.
TB (terabyte)
About 1 trillion bytes; specifically, 1,099,511,627,776 bytes.
Kb (kilobit)
About 1,000 bits; specifically, 1,024 bits.
KB (kilobyte)
About 1,000 bytes; specifically, 1,024 bytes.
You use a Windows 8.1 system with File History enabled. You've been working on a file named ProjectSchedule.docs in your Documents library. you realized this morning that you've made erroneous change that will require a great deal of work to correct. You decide that the best option is to restore a previous version of this file. What should you do?
Access Control Panel, then select *System and Security* and click *Restore your files with File History*.
Which option in Control Panel is used to review your Windows 7 computer's status and resolve issues?
Action center
Which partition type identified the partition as one that holds the boot loader program used to start the OS?
Active
Which partition type identifies the partition as one that holds the boot loader program used to start the operating system?
Active
Which of the following types of SCSI termination uses voltage regulators in conjunction with resistors to terminate the SCSI bus?
Active Termination
If you want to boot from a HDD, what must it have?
Active partition
If you want to boot from a hard drive, what must it have?
Active partition
disk thrashing
Activity indicating that a hard drive is constantly busy. You can hear the actuator constantly seeking and see the LED constantly blinking. It can be due to a fragmented hard drive or not enough memory.
You have a 32-bit computer that runs Windows XP Professional. You would like to upgrade the computer to Windows 7 Ultimate. Your computer has the following specifications: Service pack 2 1 GHz processor 512 MB RAM 256 MB video card 40 GB free disk space DVD drive You would like to perform the upgrade with the least amount of effort possible. What should you do first?
Add more memory
You want to upgrade your Windows XP Professional computer to Windows 7 Professional. You begin by checking the hardware and discover it has 1 GB of RAM, a Pentium 1 GHz processor, a 32 GB solid state drive, and a video adapter with 128 MB RAM and DirectX 9 support. You want to install the 64-bit version of Windows 7. What should you do?
Add more memory
Your computer seems to be running slow. In particular, you notice that the HDD activity light stays lit constantly when running multiple applications and switching between open windows, even though you aren't saving large files. What should you do?
Add more memory
You are planning to install Windows 7 Home Premium edition on a new 64-bit computer. The computer has the following hardware specifications: 500 GB hard drive. 1 GB of RAM, one additional socket available. One Pentium 2.8 GHz processor, one additional socket available. Video card with 256 MB of memory. You need to ensure that the hardware will support Windows 7 Home Premium. What should you do?
Add more memory.
• You are planning to install Windows 7 Home Premium edition on a new 64-bit computer. The computer has the following hardware specifications: o 500 GB hard drive o 1 GB of RAM, one additional socket available o One Pentium 2.8 Ghz processor, one additional socket available o Video card with 256 MB of memory You need to ensure that the hardware will support Windows 7 Home Premium. What should you do?
Add more memory.
• You have a 32-bit computer that runs Windows XP Professional. You would like to upgrade the computer to Windows 7 Ultimate. Your computer has the ff. specifications: o Service pack 2 o 1 GHz processor o 512 MB RAM o 256 MB video card o 40 GB Free disk space o DVD drive You would like to perform the upgrade with the least amount of effort possible. What should you do first?
Add more memory.
Since calling in an issue two days ago, a user reports that they have not heard from a help desk technician. Which of the following is the MOST appropriate response? A. Let the user know that there is no record of the initial call. B. Let the user know that the problem will be escalated immediately. C. Let the user know that the technician will be out to resolve the problem tomorrow. D. Close the initial ticket that was issued and open a new help desk ticket for the user.
B. Let the user know that the problem will be escalated immediately.
Which of the following provides the BEST solution for customers needing quiet cooling options? A. Side panel slots B. Liquid based C. Additional fans D. Thermal paste
B. Liquid based
Which of the following should a technician configure to limit access to a small office home office (SOHO) wireless network by the computer's NIC hardware identification? A. Encryption B. MAC filtering C. SSID broadcast D. DHCP
B. MAC filtering
A technician is helping to purchase a new server to be used to roll out virtualized workstations. Which of the following components should be chosen to BEST meet the customer's needs? (Select TWO). A. Specialized video card B. Maximum memory C. Maximum-core processor D. Dual monitors E. Surround sound audio
B. Maximum memory And C. Maximum-core processor
Which of the following represents the correct boot sequence in Windows XP after the BIOS has passed control over to the NTLRDR?
BOOT.INI, NTDETECT.COM, NTOSKRNL.EXE
You have a computer where a removable HDD has been formatted with NTFS. You want the drive to use FAT32 to be compatible with more OSes. The drive is currently configured using drive letter D:. What should you do?
Back up the data on the D: drive. Reformat the D: drive using FAT32. Restore the data.
• You have a computer running Windows 7 Professional. You have a custom application that will not run on the computer. The application works well on computers running a 32-bit installation on Windows XP Professional. You decide to use Windows XP mode to run the application. Your computer has the ff. hardware specs: o C: drive with 62GB of free space o 1GB of RAM, one additional socket available o One Core 2 duo processor with Intel VT support o Video card with 128 MB of memory with WDDM support You need the computer to run Windows XP mode. What should you do?
Add more memory.
You have a computer that runs Windows 7. You have just installed a custom application. The application generates Event Viewer events and logs those events to the default Application and the Security logs in Event Viewer. You are concerned about system performance while running the application. You would like to be able to view the current statistics for processor, memory, and disk reads and writes. You only want to see these statistics and no others, and you want to be able to easily save the configuration so that the same statistics are shown each time. What should you do?
Add objects and counters in Performance Monitor.
APIPA (Automatic Private Internet Protocol Addressing)
Address type used for DHCP clients when they don't receive a response from DHCP. An APIPA address always starts with 169.254 MNEMONIC: The hiccupping Pippy Longstocking will Dig up the Nile R.
public IP address
Addresses assigned on the Internet. Compare this to private IP addresses.
What does the following command do? attrib +s +r -a myfile.dll
Adds the System file attribute, adds the Read-only attribute, and removes the Archive attribute to the file myfile.dll
You manage a Windows 7 computer. You want to create a user account that can create and edit private files, start and stop the system, install applications, and add new device drivers. What group should this user be a member of?
Administrators
You manage a computer that runs Windows 7. You want to create a new user account and allow the user to create and save files, install applications, and change the system time. What group membership should you assign for the new user?
Administrators
Which tool would you use to adjust the operation of virtual memory in Windows Vista or Windows 7?
Advanced System Settings in Control Panel
RMA (returned materials authorization)
An authorization from a company to return a product for a refund or repair.
FPM (fast page-mode)
An early asynchronous version of DRAM. It has been replaced with synchronous versions of DRAM.
PCI-x (peripheral component interconnect extended)
An early enhancement for PCI primarily used on servers. Most systems use PCIe instead. PCIe and PCI-x are sometimes confused, but there are significant differences between the two.
IDE (integrated drive electronics)
An early implementation of hard drive interfaces that moved drive controller electronics onto the drive. It was later upgraded to EIDE, standardized as ATA, and commonly referred to as PATA.
CD (compact disc)
An early version of optical discs. A CD can hold up to 700 MB of data. MNEMONIC: A CD of the band Kiss
You have a computer where a removable disk drive has been formatted with NTFS. You want the drive to use FAT32 to be compatible with more OSes. The drive is currently configured using drive letter D:. What should you do?
Back up the data on the D: drive. Reformat the D: drive using FAT32. Restore the data.
GUI (graphical user interface)
An interface that allows users to interact by pointing and clicking rather than by using text commands.
MAPI (messaging application programming interface)
An interface used by application developers to create programs that can send and receive email.
DVI (digital visual interface)
An interface used with displays. It includes DVI-A for analog displays, DVI-D for digital, and DVI-I integrated for both analog and digital.
EPP (enhanced parallel port)
An interface used with older printers via the parallel port. It is similar to ECP except that it supports direct memory access.
ECP (extended capabilities port)
An interface used with older printers via the parallel port. It supports twoway data transfers and is quicker than the plain parallel port.
PSU (power supply unit)
An internal component within a computer case that converts AC voltage to DC voltages used by a computer.
ISO (International Organization for Standardization)
An international standards organization. According to the ISO, ISO is not an acronym but instead is based on the Greek word isos, meaning equal.
fdisk
An old program used to partition a disk from the command prompt prior to installing an operating system.
SIMM (single inline memory module)
An older circuit card used to store RAM. It is replaced with DIMMs.
ISA (industry standard architecture)
An older expansion card standard using 8 bits or 16 bits. It was replaced with Extended ISA (EISA) and then the different PCI standards. It is not used in current systems.
SEC (single edge connector)
An older method used to mount CPUs. The CPU and cache were mounted on a circuit board and plugged into a CPU slot.
RIS (remote installation service)
An older service used to deploy images in Microsoft networks.
APM (advanced power management)
An older standard used to conserve power. It has been replaced by ACPI. MNEMONIC: A CPA conserves more power than a powerful man.
xD
An older type of flash memory card used in some digital cameras. Newer cameras have switched to SD.
Android
An open source operating system used in many mobile devices. It is associated with Google but was created by a consortium of organizations. Users of Android-based devices commonly purchase applications from Google's Google Play.
ACPI (advanced configuration power interface)
An open standard used by operating systems to change the power state of devices to conserve power. MNEMONIC: A CPA conserves more power than a powerful man.
BD-R (Blu-ray disc Recordable)
An optical Blu-ray disc that can be written to once.
DVD (digital video disc or digital versatile disc)
An optical disc standard introduced after CDs. A DVD can hold 4.7 GB of data.
IrDA (Infrared Data Association)
An organization that develops and maintains IR standards.
Which of the following protects a computer from electrostatic discharge?
Anti-static wrist strap
OEM (original equipment manufacturer)
Any company that resells another company's product using its own name and branding. For example, Dell uses motherboards it has purchased from Intel to build computers that Dell sells. These are marketed as Dell computers, and Dell is the OEM.
FRU (field replaceable unit)
Any component that can be replaced by a technician without returning it to a manufacturer.
PC (personal computer)
Any computer used by an individual.
MFD (multifunction device)
Any device that performs more than one function. Multifunction printers that can print, scan, copy, and fax are common MFDs.
peripheral
Any device that you connect to a computer. Devices can be connected using existing ports, or expansion cards can be added to provide the connectivity.
Trojan
Application that appears to do one thing but does something else, usually malicious.
Which file attributes identifies the file as having been modified since the last backup?
Archive
plenum
Area between floors, walls, and ceilings in buildings where air is forced through for heating and cooling. Cable run through plenums must be fire-resistant and rated as plenum-safe. Non-plenum-safe cables emit toxic fumes.
• Your Windows system provides a shared printer named Printer1. You want to allow user Chard to pause, restart, and delete print jobs on the printer. Chad should not be allowed to delete the printer or change its properties. Chad is a member of the Sales group. Currently, the Everyone group has the Allow Print permission to the printer. What should you do?
Assign Chad the Allow Manage Documents permission to the printer.
hyperthreading Technology (HT)
An Intel technology that allows each core within a CPU to process two threads at a time. It is often combined with multiple CPUs.
ACT (activity)
An LED on a network interface card that indicates network activity.
MAC (mandatory access control)
An access control model that uses labels to determine access. NTFS uses DAC instead of MAC.
DAC (discretionary access control)
An access control model where users are owners of their files and make changes. NTFS uses the DAC model.
private IP address
An address assigned to a computer in a private network. Private IPv4 addresses are formally defined in the following ranges: 10.0.0.0-10.255.255.255 172.16.0.0-172.31.255.255 192.168.0.0-192.168.255.255 MNEMONIC: I was on the privy 10,000 days in all in Honolulu. Talkin to Jesus took on emotion. Now, all in all, to be in the joy of shi* is too beyond goofy. (Signed:) In helly Honolulu.
hypervisor
Associated with virtualization, the software running on the physical host, acting as the virtual machine manager for the guest virtual machines.
classful IP address
An address with a predefined subnet mask based on the first number in the IPv4 address. Class A: 1 to 126, as in 10.1.2.3. The Class A subnet mask is 255.0.0.0. Class B: 128 to 191, as in 172.16.1.2. The Class B subnet mask is 255.255.0.0. Class C: 192 to 223, as in 192.168.1.2. The Class C subnet mask is 255.255.255.0. MNEMONIC: In a Class A stoneage, bees have a ten foot bite and Steven is an enemy.
ICR (intelligent character recognition)
An advanced implementation of OCR that can read handwriting.
DVD-RAM (digital video disc-random access memory)
An alternative to DVD-RW. It is not widely used.
UDP (User Datagram Protocol)
An alternative to TCP. It is connectionless and uses a best effort to deliver data.
feeder
An alternative to a paper tray used in printers. Feeders are normally on top of a printer.
System
An applet within Control Panel. It provides a snapshot of the Windows configuration and includes links to tools to configure other settings.
MBR (master boot record)
An area on a hard disk. It includes code to locate the active partition and to load boot sector code. MNEMONIC: The member located the active partition and loaded the boot sector code.
cache
An area used for fast access of data. CPUs use L1, L2, and sometimes L3 cache. Similarly, hard drives include RAM as cache to improve their read and write performance. Cache can also be an area on a hard drive where files are stored temporarily.
DoS (denial of service)
An attack against a system by a single attacker designed to disrupt service provided by the system. Compare with DDoS.
key fob
An authentication device. Key fobs display a number that is synchronized with an authentication server. Users can enter the number as a part of an authentication process.
• You have configured BranchCache on client computers in your branch office to use Distributed Cache mode. You want to view the status of the BranchCache configuration on a Windows 7 client computer. What should you do?
At a command prompt, run the netsh command with the appropriate BranchCache parameters.
Which LCD component is used to illuminate a notebook computer's display?
Backlight
You have a computer that runs Windows 7. As part of the regular system maintenance, you are checking Performance Monitor statistics and event log events. You notice that there are several error events listed with the same ID number and description that sounds as if the error is related to system hardware. you check your Performance Monitor logs but don't notice anything unusual around the time that the events were generated. You would like to get an e-mail every time the event is logged so you can check the system statistics at the moment. What should you do?
Attach a task to the event
• You have a computer that runs Windows 7 Enterprise. You want to configure the computer to boot to a Windows 7 installation on a VHD file. You will use the image on the Windows installation disc. You have downloaded the Windows AIK tools. You create a virtual disk file using Disk Management. What should you do next?
Attach the VHD.
Bob is a member of the Accounting group. The Accounting group has been granted the Read and Write NTFS permissions to the WeeklyReport.xls file. Bob is attempting to access the report through a share with the Full Control permission assigned to the Everyone group/ Which of the following statements correctly describes Bob's ability to access the WeeklyReport.xls file?
Bob can open, read, and write changes to the file
You have a computer that runs Windows 7. You install a new application. During the installation, the computer reboots but does not start. Pressing F8 during startup has no effect. You need to start the computer using the least amount of effort. What should you try next?
Boot from the installation disc and restore to a restore point.
One day while trying to start your Windows XP computer, the system displays the following error: Invalid partition table. Which of the following will most likely fix the problem?
Boot into the recovery console and run the fixmbr command on the boot volume
A corporate technician has been tasked with providing a thin client PC for a new employee. Which of the following configurations would be the MOST appropriate? A. A PC with the maximum amount of supported RAM B. A PC equipped with high end audio and video cards C. A PC that meets the minimum requirements for running an OS D. A PC with the most powerful processor
C. A PC that meets the minimum requirements for running an OS
Which of the following are components of an "active" CPU cooling solution? A. A heatsink and thermal compound. B. A heatsink, radiator, and thermal compound. C. A heatsink, attached fan, and thermal compound. D. A heatsink, case fan, and thermal compound.
C. A heatsink, attached fan, and thermal compound.
Which of the following would benefit MOST from the use of dual monitors? A. Gaming PC B. Home theater PC C. A/V editing station D. Thin client
C. A/V editing station
Which of the following allows a technician to enable support for a USB 1.1 device? A. MBR B. HCL C. BIOS D. AGP
C. BIOS
Which of the following would provide continuous power to various devices connected to it during a power surge or outage? A. Line conditioner B. Power strip C. Battery backup D. Surge suppressor
C. Battery backup
The helpdesk technician has been tasked to reinstall the OS on a desktop and has already inserted the OS install disk in the CD-ROM. Which of the following would MOST likely need to be configured within the BIOS to continue reinstalling the OS? A. BIOS password B. Flash BIOS for firmware upgrade C. Boot sequence D. Clock speeds
C. Boot sequence
Which of the following cable types has the MAXIMUM transfer rate of 1 Gbps? A. CAT3 B. CAT5 C. CAT5e D. CAT6
C. CAT5e
Which of the following Internet connection types would be MOST commonly used by a customer who travels frequently? A. ISDN B. Satellite C. Cellular D. Line of site wireless
C. Cellular
Which of the following should a technician do NEXT, if the laptop's internal speakers do not work, after replacing the motherboard due to a video issue? A. Update the video drivers B. Replace the speakers C. Check the speaker's connection to the motherboard D. Verify that the speakers are compatible with the replacement motherboard
C. Check the speaker's connection to the motherboard
A technician needs to make several patch cables. Which of the following tools would the technician use to attach the RJ-45 ends to the cables? A. Loopback plug B. Punch down C. Crimpers D. Cable tester
C. Crimpers
Which of the following types of RAM can be used in a dual channel configuration? A. SDRAM B. RAMBUS C. DDR D. DIMM
C. DDR
Which of the following RAM modules has a PC rating of 10600? A. DDR B. SDRAM C. DDR3 D. DDR2
C. DDR3
A DVI-D cable is generally used for which of the following computer functions? A. Delivering audio only B. Delivering audio & video C. Delivering video only D. Delivering an analog signal
C. Delivering video only
A user is trying to setup a small office home office (SOHO) wireless network and does not want any neighbors to be able to discover the network. Which of the following parameters would MOST likely be configured? A. Configure a proxy server address B. Enable WEP encryption C. Disable SSID broadcast D. Configure DMZ settings
C. Disable SSID broadcast
Which of the following memory features allows for the protection against random inconsistencies in the transfer of the data? A. Low latency B. Dual channel C. ECC D. Single channel
C. ECC
After installing a new serial port card in a computer, the communication parameters need to be configured. Which of the following is the MOST common communication configuration for a serial port? A. Eight data bits, even parity, two stop bits B. Seven data bits, no parity, one stop bit C. Eight data bits, no parity, one stop bit D. Seven data bits, even parity, one stop bit
C. Eight data bits, no parity, one stop bit
The technician has identified prohibited content on a PC. Which of the following would be the FIRST action that the technician should take? A. Walk away B. Turn off the PC C. Report it D. Search for more
C. Report it
A technician observes another technician trying to steal a company laptop. Which of the following should the first technician do NEXT? A. Confront the technician stealing the laptop B. Preserve the laptop for evidence C. Report through proper channels D. Document the incident
C. Report through proper channels
Which of the following should be considered when building a standard PC? A. Capacity of the hard drive B. RAID level that will be used C. Requirements for applications D. Amount of RAM
C. Requirements for applications
A technician is diagnosing a laser printer that is consistently having issues picking up paper from the first tray. Which of the following items would the technician replace FIRST? A. Toner B. Transfer belt C. Rollers D. Imaging drum
C. Rollers
Which of the following is the BEST protocol to use for securely transferring large files? A. Telnet B. SSH C. SFTP D. FTP
C. SFTP
Which of the following can ONLY be installed when a laptop is turned off and disconnected from all power sources? A. PCMCIA device B. Express card 54 device C. SODIMM chip D. USB expansion hub
C. SODIMM chip
Which of the following devices might need drivers installed so that it can be recognized by the operating system and function properly? A. Speakers B. Monitors C. Scanners D. Projectors
C. Scanners
ECC memory is primarily used in which of the following computers? A. Tablet B. Desktop C. Server D. Laptop
C. Server
Which of the following features can be configured with keyboards to assist users with disabilities? A. Pointer trails B. Magnifier C. Sticky keys D. Character map
C. Sticky keys
Which of the following properties of TCP⁄IP is used to differentiate the network and the host portions of an IP address? A. DNS address B. Default gateway C. Subnet mask D. DHCP lease
C. Subnet mask
Which of the following would BEST segment a LAN while providing additional network ports? A. Access point B. Modem C. Switch D. Hub
C. Switch
You have a laptop running windows 7 Enterprise. You connect an external USB hard drive to the laptop to access specific data files. After editing the files, you need to disconnect the external USB hard drive. You do not want to lose your work on the data files. With the least amount of effort, you want to remove the USB hard drive from the laptop. What should you do?
Check the drive's 'Policies' tab and ensure that the 'Quick Removal' option is selected, then remove the USB connector.
You have just installed a new USB card reader in your Windows computer. Every time you perform a certain action using the card reader, you get an error message that you've never seen before. What should you do first?
Check the manufacturer's Web site for information about the error
Mary reports that an application's shortcut icon no longer launches the application. You check the documentation and find that you installed a new HDD in her computer. What should you do first so Mary can run the application?
Check the shortcut properties to make sure it is pointing to the correct file location
When running a program on a Windows system, you get an error message indicating that a specific file (not the .exe file) cannot be located. What should you try first to fix the problem?
Check the working (Start In) directory identified in the shortcut
Which of the following utilities checks the disk for bad clusters?
Chkdsk
Which of the following utilities would you use to correct cross-linked clusters within the file system on a Windows workstation?
Chkdsk
You have a computer that runs Windows 7. You are troubleshooting a problem that keeps occurring. When the problem happens, there are several Warning and Error events logged to the Application log in Event Viewer. While troubleshooting the problem, you create a filter for the log that shows only the Warning and Error messages. You would like to save all messages in the application log (including Informational messages) so you can copy them to another computer and examine them there. What should you do?
Clear the filter, then save the log.
• Several weeks ago, you installed a desktop application on your Windows system using the default parameters suggested by the application installer. However, after using the application for a time, you realize that you need an optional application feature that wasn't included in the default installation. You have opened Control Panel on your Windows system, accessed Programs and Features, and selected the application. What should you do?
Click Change.
• You are performing a clean installation of Windows 8.1 on desktop PC that uses a RAID1 disk array. You booted the system from the Windows 8.1 installation DVD and navigated through the first few screens of the installation wizard. You've reached the screen shown in the exhibit. What should you do?
Click Custom: Install Windows only (advanced).
Several weeks ago, you installed a desktop application on your Windows system. Yesterday, you installed another desktop application on your system that was developed in-house by your organization's application development team. After doing so, you notice that the first application behaves erratically and frequently locks up. You have opened Control Panel on your Windows system, accessed Programs and Features, and selected the application. What should you do?
Click Repair.
You've been using a Windows Store app and now need to exit out of it. What should you do?
Click the top of the app and drag it to the bottom of the screen.
You have a computer that runs Windows 7. Your computer is configured to download and automatically install important (critical) patches using Windows Update. You notice that updates that Microsoft suggests, but does not mark as important, are not being downloaded. You would like these other updates to download and install automatically with the least amount of effort. What should you do?
Configure Windows Update to included recommended updates.
You have a shared computer that runs Windows 7. You are concerned about the disk space use on the computer. You would like to be notified by e-mail when the used disk space exceeds 85%. What should you do?
Configure a performance counter alert.
• You would like to configure your Windows desktop system so that an event is recorded any time a user successfully or unsuccessfully logs on. You do not want to record events related to logoff. What should you do?
Configure advanced audit policies in the local security policy.
Which Windows component lets you modify system parameters in the registry using a GUI interface?
Control Panel
You have just installed a new keyboard that includes special programmable buttons. You installed the custom driver that came with the keyboard. Now you want to configure what the special keyboard buttons do. Which Windows utility would most likely let you manage these settings?
Control Panel
You recently purchased a new computer running Windows 7 for your company's graphic designer. The graphic designer needs his design fonts removed from his old Windows 2000 computer and placed on his new computer. Assuming the default directories were used during installation for both systems, which action is correct?
Copy the fonts from C:\Winnt\Fonts to C:\Windows\Fonts
• You have two Windows system named Comp1 and Comp2. Both computers are members of a HomeGroup; neither computer is a domain member. On Comp1, you share the C:\Files folder with the HomeGroup. The C:\Files\data.doc file is encrypted. From Comp2, you can access all of the files in the C:\Files folder except for the data.doc file. What should you do?
Copy your private key from Comp1 to Comp2.
Which of the following describes the function of a hub in a network? A. Broadcasts packets it receives to specific connections B. Determines whether a packet belongs on an internal or external network C. Converts a packet for transmission from one network to another network D. Broadcasts packets it receives to all connections
D. Broadcasts packets it receives to all connections
Which of the following is MOST likely to contain hazardous voltages? A. CD-ROM drive B. External USB drive C. Inkjet printer D. CRT display
D. CRT display
A user discovers that color laser prints are printing slightly off-color. Which of the following should help restore the appropriate colors? A. Use different paper B. Replace the fuser C. Replace the duplexer D. Calibrate the printer
D. Calibrate the printer
Which of the following settings is controlled by jumpers? A. Chassis detection threshold B. Fan speed C. USB voltage D. Drive hierarchy
D. Drive hierarchy
Which of the following is MOST likely needed when installing a new POS thermal printer? A. RJ-11 B. Operating system disk C. RG-58 D. Drivers
D. Drivers
A technician has replaced a riser inside a server and the riser is failing again after reboot. Which of the following should have been used when initially replacing the riser? A. Compressed air B. Vacuum cleaner C. Proper cable management D. ESD mat
D. ESD mat
A user would like to share a local USB printer with several users in the office. Which of the following methods would BEST accomplish this? A. Install shared PCL drivers B. Install a USB hub C. Install a print server D. Enable print sharing
D. Enable print sharing
Which of the following describes the process laser printers use to secure toner to paper? A. Bonding B. Transferring C. Duplexing D. Fusing
D. Fusing
A technician is helping set up a new networking closet and notices that the humidity level is low in the room. Which of the following should be installed FIRST before rack mounting equipment? A. A dehumidifier B. A fire suppression system C. ESD strap D. Grounding bars
D. Grounding bars
A DSL modem MOST commonly uses which of the following media? A. Cable TV coax B. Fiber optic cable C. Wireless adapter D. Household telephone lines
D. Household telephone lines
Which of the following devices transmits data to all ports regardless of final destination? A. Firewall B. Router C. Switch D. Hub
D. Hub
Which of the following printers is required when carbon paper is used? A. Inkjet B. Thermal C. Laser D. Impact
D. Impact
Which of the following technologies has the SHORTEST wireless range for printing? A. 802.11g B. 802.11a C. Bluetooth D. Infrared
D. Infrared
A technician performed a clean install of Windows XP on a laptop and finds that the Bluetooth on/off switch is not working. Which of the following will BEST resolve this issue? A. Replacing the keyboard B. Installing service pack 3 C. Reinstalling the operating system with Windows XP Media Center D. Installing the Bluetooth stack/driver
D. Installing the Bluetooth stack/driver
A technician has installed a digital display. Which of the following is TRUE about the native resolution of a digital display? A. It has the slowest refresh rate. B. It causes the display to use pixel interpolation. C. It is the lowest resolution. D. It provides the best quality display.
D. It provides the best quality display.
Which of the following is typically installed by connecting multiple DVI and USB cables to it? A. Touch screen B. LCD panel C. Webcam D. KVM
D. KVM
Which of the following printer types needs to have toner replaced as part of the normal maintenance cycle? A. Inkjet B. Thermal C. Impact D. Laser
D. Laser
Which of the following should be recommended for cooling a high-end gaming PC? (Select TWO). A. Power saving NIC B. Passive cooling C. Additional case fans D. Liquid cooling system
D. Liquid cooling system
Which of the following motherboards would fit in an ATX case? A. BTX B. ITX C. Ultra ATX D. Micro ATX
D. Micro ATX
Which of the following connectors is found on every desktop power supply? A. Berg B. SATA C. PCIe D. Molex
D. Molex
Which of the following wireless network standards provides the FASTEST throughput? A. A B. B C. G D. N
D. N
Which of the following resolution modes, by design, provides the BEST possible visual quality on a flat screen LCD monitor? A. SVGA B. Digital C. XGA D. Native
D. Native
Which type of fire extinguishing technology should be used when encountering an electrical fire? A. Class B fire extinguishers B. Overhead sprinkler system C. Water-based fire extinguishers D. Non-water based extinguishers
D. Non-water based extinguishers
A technician wants to install a printer to use port LPT1, but the computer does not currently have such a port. Which of the following expansion cards should the technician install and configure to create an LPT1 port? A. Serial B. Video C. Audio D. Parallel
D. Parallel
A user with an inkjet printer states that all their color printouts are missing red ink. The inkjet printer has a cartridge for each of the CMYK colors, and the user recently replaced the magenta cartridge. Which of the following should the technician do NEXT? A. Purchase a maintenance kit B. Use a different weighted paper C. Verify printer cables are connected D. Perform printer head cleaning
D. Perform printer head cleaning
Which of the following cables is fire retardant? A. UTP B. PVC C. STP D. Plenum
D. Plenum
Which of the following expansion cards would provide support for additional internal storage? A. Video capture B. Modem C. USB port D. RAID controller
D. RAID controller
Which of the following connectors would terminate a POTS connection? A. BNC B. F C. RJ-45 D. RJ-11
D. RJ-11
A technician needs to replace a desktop computer's power supply. Which of the following should the technician do FIRST? A. Check for environmental concerns B. Review local regulations for disposal procedures C. Read MSDS documentation D. Remove watch and all jewelry
D. Remove watch and all jewelry
A technician encounters prohibited materials on a computer located in a common area that is used by several employees. Which of the following should be done FIRST? A. Remove the item from the computer B. Show to others so they can be a witness C. Copy the item to an external website D. Report the incident to management
D. Report the incident to management
Which of the following hard drives has the BEST shock resistance? A. IDE B. NAS C. SATA D. SSD
D. SSD
Which of the following cable types uses a 9-pin connector? A. Parallel B. Ethernet C. USB D. Serial
D. Serial
remanence
Data that remains on media, even after the data is supposedly deleted or overwritten. Sanitization methods are used eliminate any data remanence.
DMA (direct memory access)
Data transfers between memory and a device without using the CPU.
full-duplex
Data transmission mode specifying that data can be sent or received at the same time. Compare to simplex and half-duplex.
half-duplex
Data transmission mode specifying that data can be sent or received, but not at the same time. Compare to simplex and full-duplex.
simplex
Data transmission mode specifying that data is transferred in one direction only. Compare to halfduplex and full-duplex.
biometric devices
Devices that can read biometric characteristics, such as fingerprints. They are used for identification and/or authentication.
DC voltage
Direct current voltages supplied to electrical components. Power supplies convert AC to DC.
You want to configure User Account Control so that you see the permission prompt only when programs run, not when you make changes. When the prompt is shown, you do not want the rest of the desktop to be disabled. What should you do?
Disable Secure Desktop
You have configured Windows 7 File Recover on your Windows 8 system as followed: -Backup files in libraries and personal folders for all users. -Include a system image in each backup. -Run backups every Sunday at 7:00 PM. -Save backups on the E: drive, which is a storage space. You've read about File History and want to implement it on this system. What should you do?
Disable Windows 7 Recovery on the system.
You want to modify the default settings of UAC on your Win system to meet the ff. criteria: • Prompts should be shown when programs make changes to your computer and when you make changes to Win settings. • The desktop should not be dimmed and locked out, but should allow you to continue working in other applications without responding immediately to the prompt. •Settings should apply to all standard users. What should you do?
Disable the Switch to the secure desktop when prompting for elevation setting in Group Policy.
Which tool would you use to create and delete partitions on HDDs?
Disk Management
You have physically installed a new HDD in your computer and configured the disk in the BIOS using the CMOS setup program. You try to access the HDD in Windows Explorer but the drive is not displayed. Which utility will you most likely use to solve the problem?
Disk Management
Which installation method is best for large numbers of computers with the same hardware configuration?
Disk image
Which tool would you use to create and delete partitions on hard drives?
Disk management
You have a computer running Windows 7 Home Premium and need to aces the contents of a flash drive. The flash drive has been formatted with the exFAT file system. You want to read the flash drive on your computer as quickly as possible with the least amount of effort. What should you do?
Do nothing. Windows 7 can natively access exFAT file system.
You have a computer running Windows 7 Home Premium and need to access the contents of a flash drive. The flash drive has been formatted with the exFAT file system. You want to read the flash drive on your computer as quickly as possible with the least amount of effort. What should you do?
Do nothing. Windows 7 can natively access exFAT file systems
You are responsible for managing the client workstations at your computer. A user in the conference room called concerning the digital projector and display issues when the projector is connected to his laptop. After identifying the cause and completely resolving the issue, the projector displays the images perfectly both on his laptop and on the projector. What should you do next?
Document the solution
You have a computer running the original version of Windows Vista. You would like to take advantage of several new features available in SP2. How can you do this?
Download and install SP1, then download and install SP2
You are getting ready to upgrade your Windows Vista system to Windows 7. You want to make sure that everything in your current system is compatible with Windows 7. Which of the following is the best method for accomplishing this?
Download and install the Windows 7 Upgrade Advisor
You have a computer running Win7. The computer is part of a domain. You need to transfer user profiles and data files to the computer from a network share using USMT; however, you do not have USMT. What should you do?
Download the Win Automated Installation Kit (Windows AIK) from Microsoft.
You have a computer running Windows 8. The computer is part of a domain. You need to transfer user profiles and data files to the computer from a network share using USMT; however, you do not have USMT. What should you do?
Download the Windows Assessment and Deployment Kit (ADK) from Microsoft.
You have a computer running Windows 7. The computer is part of a domain. You need to transfer user profiles and data files to the computer from a network share using USMT; however, you do not have USMT. What should you do?
Download the Windows Automated Installation Kit (Windows AIK) from Microsoft.
You have just installed a new device in your Windows 7 computer using the device's installation disc and the included drivers. After installation, the system crashes when you try to use the device. What should you do?
Download the latest driver from the manufacturer's Web site
You have just installed a new device in your Windows computer. After installation, you can't use the device. You checked in Device Manager and find that an icon for the device with a yellow exclamation mark over it. What should you do?
Download the latest driver from the manufacturer's Web site
You want to install Windows 7 on a mirrored disk array. You run the motherboard disk configuration utility and create the RAID1 array, then configure the BIOS to boot from the installation disc. The Windows 7 installation runs but does not detect the RAID array. What should you do?
During the install, browse to and select the appropriate driver for your RAID controller when prompted where you want to install Windows
• Which type of VHD file allocates additional physical disk space in the file as virtual disk storage is used?
Dynamically expanding.
Which of the following are the MOST important factors to address when a technician is choosing the components for a CAD workstation? (Select THREE). A. Large drive space allocation B. Powerful sound card C. Multiple network cards D. Multiple large HD monitors E. Powerful video card F. Maximum RAM G. Powerful processor
E. Powerful video card F. Maximum RAM G. Powerful processor
• You want to configure your Windows system to prompt for additional credentials whenever a sensitive action is taken. What should you do?
Edit User Account Control (UAC) settings.
You have a computer running Windows 7. You want to configure User Account Control so that when a UAC prompt is shown, the desktop is not dimmed, allowing you to continue working without responding to the prompt immediately. What should you do?
Edit settings in the Local Security Policy
• To increase security for your Windows notebook system while traveling, you decide to require a smart card for logon. You also want users to be logged off automatically when smart card is removed. What should you do?
Edit settings in the local security policy.
You have a computer running Windows 7 Ultimate. The computer meets the minimum hardware requirements. When running multiple applications, the computer is slow to respond. You need to improve performance, especially for the application that you are actively working in. What should you do?
Enable ReadyBoost on a USB flash drive.
Match the Windows startup mode option on the left with the appropriate description on the right.
Enable Safe Mode: Loads only essential drivers and services. Disable driver signature enforcement: Allows unsigned drivers to be installed. Last Known Good Configuration: Not available in Windows 8.x. Disable early launch anti-malware protection: Disables scanning device drivers for malware. Enable debugging: Enables kernel troubleshooting and system analysis. Enable boot logging: Creates a file named Ntbtlog.txt
The video driver on your Windows 7 computer is preventing the system from starting up successfully. You have already downloaded an updated driver and copied it to the computer's HDD. Which mode should you select from the Windows Advanced Boot Options menu that would most likely allow you to start the computer to continue fixing the problem?
Enable VGA Mode
• You are configuring security settings that will identify when people attempt to log on to a Windows desktop system with an incorrect password. You need the computer to note the failed attempts in its own audit log. You want to use Local Security Policy that creates the settings. What should you do?
Enable the Audit account logon events setting.
• You have been asked to troubleshoot a Windows system that is a member of a workgroup. The director who uses the machine said he is able to install anything he wants as well as change system settings on-demand. He has asked you to figure out why User Account Control (UAC) is not being activated when he performs a sensitive operation. You verify that the director's user account is a standard user and not a member of the local Administrators group. You want to UAC prompt to show. What should you do?
Enable the Run all administrators in Admin Approval Mode setting in Group Policy.
x86
Indicates a 32-bit processor supporting a 32-bit operating system. On a 64-bit Windows operating system, 32-bit application files are stored in the C:\Program Files (x86) folder by default, and 64-bit program files are stored in the C:\Program Files folder by default.
x64
Indicates a 64-bit processor supporting a 64-bit operating system. 64-bit versions of Windows can run on x64-based systems.
WORM (write-once read-many)
Indicates that a disc can be written to only once. Discs designated with R (such as DVD-R) can be written to once and are sometimes referred to as WORM discs.
closed source
Indicates that software code is not freely available. The developer views the code as a trade secret and it is not freely available. Apple's iOS is closed source.
Integrated graphics processing unit (GPU)
Indicates that the GPU is included either within the chipset or within the CPU. An integrated GPU is not as powerful as a dedicated graphics card.
hot-swappable
Indicates the device can be removed without powering a system down. For example, devices connected with USB, FireWire, SATA, and eSATA connections are hot-swappable.
rpm (revolutions per minute)
Indicates the speed of hard drive platters. Common speeds are 5,400, 7,200, 10,000, and 15,000 rpm.
Which of the following is not an advantage of SSDs over HDDs?
Inexpensive
PII (Personally Identifiable Information)
Information that can be used to identify an individual. PII should be protected as sensitive data.
What is the recommended size of the paging file under normal circumstances on a Windows 7 system with 4 GB of RAM installed?
Equal to the amount of physical RAM
sanitization
Erasing data from media. Overwriting a file or disk with repeating patterns of bits is one method of sanitizing a drive.
You are in charge of desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems with an application. He tries to describe what he is doing in the application that is causing the problem, but you just can't understand what he might be doing. What should you do?
Establish a Remote Assistance connection and watch what the user is doing
You are in charge of desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems with a new device. You try to tell the user how to update the driver for the device over the phone, but he is having a hard time understanding what you are saying and just can't make it through the process. What should you do?
Establish a Remote Desktop connection and update the driver
Which utility can be used to view when a service was stopped as well as any error messages generated by the service?
Event Viewer
TV tuner
Expansion card that allows a system to play and record television.
You are removing screws within a computer, but several have fallen into places you can't reach. Which tool would help retrieve the small screws?
Extension magnet
You have a HDD that has a single primary partition and has been assigned D: as the letter. Which tool would you use to configure the drive to use the FAT32 file system?
Format
You have physically installed a new HDD in your computer, configured the disk in the BIOS using the CMOS setup program, and partitioned the disk. You try to access the HDD in Windows Explorer, but get an error message. Which utility will you most likely use to resolve the problem?
Format
You have a computer on your workbench without an operating system. You would like to install Windows 7 Enterprise 32-bit edition on the computer. The computer has the following hardware specifications: Hard drive with 12 GB of free space. 1 GB of RAM, one additional socket available. One Pentium 2.8 GHz processor, one additional socket available. Video card with 128 MB of memory. You need to change the hardware so that you can install Windows 7 Enterprise. What should you do?
Free up some space on the hard drive.
• You have a computer on your workbench without an operating system. You would like to install Windows 7 Enterprise 32-bit edition on the computer. The computer has the ff. hardware specifications: o Hard drive with 12 GB of free space o 1GB of RAM, one additional socket available o One Pentium 2.8 GHz processor, one additional socket available o Video card with 128 MB of memory You need to change the hardware so that you can install Windows 7 Enterprise. What should you do?
Free up some space on the hard drive.
GHz (gigahertz)
Frequency speed commonly referring to a computer clock. One hertz (Hz) indicates that a signal can complete one cycle a second. One GHz indicates that it can complete 1 billion cycles a second.
MHz (megahertz)
Frequency speed commonly referring to a computer clock. One hertz (Hz) indicates that a signal can complete one cycle a second. One MHz indicates that it can complete 1 million cycles per second.
You have a computer running Windows 7 Enterprise. The computer is a member of a domain. A file server on the network named Server1 runs Windows Server 2008 R2. You log on to the computer using an account named Mary. With least amount of effort possible, you need to ensure that every time you connect to a shared folder on Server1, you authenticate by using an account named Admin. What should you do?
From Credential Manager, select Add a Windows credential.
You mange a computer that runs Windows 7. You would like to generate a report that shows the status of hardware resources, processes, and system and configuration information on the computer. The report should include suggestions for ways to maximize performance and streamline system operation. What should you do?
From Performance Information and Tools in the Control Panel, generate a system health report.
• You run runas with the /savecred option to start an application on your Windows system. You need to delete the stored password. What should you do?
From the Credential Manager, remove the credential from the Vault.
If a folder exists on an NTFS partition, what is the minimum permission needed by a user to set any security permissions on a folder?
Full Control
What type of virtualization completely simulates a real physical host?
Full virtualization
After removing the printed paper from your laser printer, the toner smudges and can be wiped off in places. Which of the following is most likely the problem?
Fuser rollers
You need to configure settings for a USB printer that you have just connected to your Windows 7 system. Which option in Control Panel should you use to do this?
Hardware and Sound
• You use a Windows notebook system that is shared by three users. The computer is a member of a domain. Each user has been EFS to encrypt their personal files on the system. You would like to add your user account as a recovery agent so you can recover any file encrypted by any user on the laptop. You would like to store the recovery keys on a smart card. You install a smart car reader and obtain a new smart card with a certificate that can be used for EFS recovery. You add a data recovery agent using Group Policy. What should you do next?
Have each user run cipher /u.
All members of the Sales team use laptop computers while traveling to connect to the Internet. Each laptop has a built-in wireless NIC that supports 802.11b/g/n. You have trained each user to be able to create new wireless connections in order to connect to wireless networks in airports and hotels. You get a call from one user staring that her wireless connection no longer works. She has checked the wireless configuration and she knows it to be correct because other sales people at the same location are able to connect. What should you do first?
Have her verify that the wireless card's hardware switch is on the On position
While answering Help Desk calls, a field customer calls and complains that he cannot print to a workgroup laser printer. Which of the following should be the first question you ask?
Have you ever printed to that printer
STP (Shielded twisted-pair cable)
Helps protect against EMI and RFI. Compare to UTP.
A user calls to report a problem. She is trying to install an application on a Windows 7 system, but cannot. In the past, she installed applications on her Windows XP system without an issues. She has always been a member of the Power Users group. What do you suspect is causing the installation issue?
Her group membership denies program installation on this OS
You have a computer that runs windows 7. Windows Update is continually notifying you to install an update that you have determined that you should not install on your machine due to incompatibility reasons. You want Windows Update to stop notifying you of this update. What should you do?
Hide the update.
You have a Windows 7 computer connected to a small network that is not part of a domain. You want to see the computers and printers on the network. Which feature would you use?
HomeGroup
Your desktop workstation system uses a SCSI bus to connect storage devices. The SCSI host adapter is assigned an ID of 7, the SCSI hard disk is assigned to an ID of 5, the SCSI tape drive is assigned an ID of 3, and the SCSI DVD drive is assigned an ID of 0. Which device has the highest priority on the SCSI bus?
Host adapter
Which of the following terms describes a Windows OS patch that corrects a specific problem and is released on a short-term, periodic basis (typically monthly)?
Hotfix
Which term describes the layer of software that resides between the virtual OS and the physical hardware it is running on in a visualization environment?
Hypervisor
Which tool would be the best choice to remove and replace the motherboard BIOS chip?
IC extractor
Which command would you use to have a workstation stop using an IP address that it obtained from a DHCP server?
IPconfig /release
You are troubleshooting network connectivity issues on a workstation. Which command would you use to request new IP configuration information from a DHCP server?
IPconfig /renew
topology
Identifies how computers and other devices are logically connected. Primary topologies covered in A+ exam are: star, ring, bus, hybrid, mesh.
refresh rate
Identifies how many times the display is rewritten in a display monitor.
You are responsible for managing client workstations for your company. A frantic user calls you one morning claiming that "nothing is working". What should you do first in your troubleshooting strategy?
Identify the problem
Two employees cannot access anything outside of the local network, but can still access internal files on other internal subnets. Other employees are not experiencing the same problem. You suspect the issue may have something to do with the proxy server on your network and the settings in Internet Explorer. What should you do?
Identify the proxy server name and port number in Internet Options
• Previously, you configured the ff. auditing settings on your Windows desktop system: o You enabled the audit object access policy to log failed events o You configured auditing on several files, folders, and registry settings for a specific group for fail Read and Modify actions Now you would like to audit only failed attempts to view or modify registry settings. You no longer want to log audit entries for file access. You need to make the change with the least amount of effort as possible. What should you do?
In local security policy, stop auditing for the Audit object access policy. Enable the Audit Registry advanced audit policy.
You have a computer that runs windows 7 and a custom application. On a periodic basis, the application writes or modifies several registry entries. You want to monitor these registry keys so that you can create a report that shows their corresponding settings over the next 5 days. What should you do?
In Performance Monitor, configure a configuration data collector.
You manage a computer that runs Windows 7. You would like to generate a report that runs several basic tests of the operating system, Security Center, hard disk, services, and hardware devices and drivers. The report should include suggestions for how to improve system performance. What should you do?
In Performance Monitor, run the System Diagnostics data collector set.
You have implemented a regular backup schedule for your Windows server, backing up all data every weekend with incremental backups every other night. Your company has decided against storing tapes at an offsite location. Where would be the next best place to keep your backup tapes?
In a fireproof, locked safe
You manage a computer that runs Windows 7. While working with a new application, the application stops responding. You would like to analyze the application and its associated processes to identify which processes the application is waiting on. What should you do?
In resource Monitor, analyze the wait chain for the process.
• You are preparing to install Windows on a new computer. You copy the installation files from a DVD to a USB flash drive, then use bootsect to make the USB drive bootable. Using the RAID controller on the motherboard, you configure three hard disks in a RAID5 array. Using disk tolls, you create a single partition that takes up the entire array. You insert the USB drive and boot the computer. The computer boots and shows you the ff. message: o Error loading operating system o Reboot and select proper boot device What should you do?
In the BIOS, modify the boot order from the USB device first.
You use Windows 8.1 system with File History running. Currently, File History is configured to save copies of files every hour, which is the default setting. however, you've been assigned to work on a high-profile project and you would like File History to save copies of files every 15 minutes. What should you do? (Select two. Each option is a part of the complete solution.)
In control Panel, select *System and Security \ File History*. Click *Advanced settings*, and then set Save copies of files to *Every 15 minutes*.
You are preparing to install Windows 7 to a new computer. You copy the installation files from a DVD to a USB flash drive, then use bootsect to make the USB drive bootable. Using the RAID controller on the motherboard, you configure three hard disks in a RAID5 array. Using disk tools, you create a single partition that takes up the entire array. You insert the USB drive and boot the computer. The computer boots and shows you the following message: Error loading operating system Reboot and select proper boot device. What should you do?
In the BIOS, modify the boot order to boot from the USB device first.
You have a computer running Windows 7 Ultimate. You will connect to the computer using Remote Desktop. With the least amount of effort, you need to copy files from your local hard drive to the hard drive of the remote computer. What should you do?
In the Remote Desktop client properties, edit the local devices and resources options.
You manage a notebook system running Windows. You would like to log all of the packets that are dropped by the firewall on your computer. What should you do?
In the local security policy, configure object access policies for the Windows Filtering Platform (WFP). View audit entries in the Security log in Event Viewer.
You have a small network. All computers are running Windows 7. You have created a HomeGroup for your network. You have a laptop that you use at work that runs Windows 7 Professional. You connect the laptop to the network. You are unable to see shared files on the other computers. What should you do?
Join the laptop to the HomeGroup
function keys
Keys labeled F1 through F12 that provide shortcuts within applications. For example, F1 opens Help.
You are installing Windows 7 on a new computer. Using the RAID controller on the motherboard, you configure three hard disks in a RAID5 array. A fourth hard disk is connected to the IDE channel. You edit the BIOS boot order to boot from the optical drive. You insert the installation DVD, boot to the disc, and start the installation. When you are prompted to select the disk where you want to install Windows, the RAID array you created does not show as a possible destination disk. Only the disk on the IDE channel is visible. Select the option you would choose to make the RAID array visible for the installation.
Load Driver
• Your Windows system has an application installed that you no longer need. What should you do?
Locate the app. In Programs and Features in Control Panel and click Uninstall.
• Rodney, a user in the research department, uses a Windows notebook system with a single NTFS volume. Rodney recently left the company on short notice. Rodney's manager, Kate, wants access to all Rodney's files. You make Kate's account an administrator for Rodney's computer and give her the computer. Later, Kate informs you that she cannot open one of Rodney's documents, receiving an access denied message. You realize that Kate is trying to access a file that Rodney encrypted using EFS. You want to let Kate open the file. What should you do?
Log on to the laptop using an account DRA privileges. Clear the Encrypt attribute on the file.
You have a computer that runs Windows 7. The computer is a member of a domain. Windows Update settings are controlled through Group Policy. You find that your computer has not been installing recent updates. You want to see information about how the computer is configured to get updates including the name of the server it tires to contact when checking for and downloading updates. What should you do?
Look through the WindowsUpdate.log file.
Which of the following is an advantage of the exFAT file system over NTFS?
Lower memory and processor resource use
Which of the following is an advantage of the exFAT file system over NTFS?
Lower memory and processor resource use.
directory
MS-DOS-based name of a folder. In Windows Explorer, folders are called folders, but at the command prompt, they are called directories.
One of the programs that launches automatically at startup is causing your Windows workstation to lock up. You have examined the Startup folder, and the problem application is not present. Which utility should you use to prevent the program from starting automatically?
MSConfig.exe
Which utility lets you customize which files are processed at startup on Windows 7 systems?
MSconfig
Susan in accounting has left the company and been replaced by Manuel. You create a user account for Manuel on Susan's computer. Manuel calls you and says that he can't open a specific file on the computer. Which of the following will most likely correct the problem?
Make Manuel the owner of the file
You manage a Windows 7 computer that is a member of a workgroup. The computer is shared by three users. Each user has a standard user account. Mary is one of the three users of this computer. She wants to access the computer using a Remote Desktop connection. You need to allow Remote Desktop access for Mary while granting her the least amount of privileges possible. What should you do?
Make Mary's user account a member of the Remote Desktop users group.
You want to upgrade your Windows Vista computer to Windows 7 Home Premium. You want to keep your personal settings intact and complete the upgrade as quickly as possible. You purchase an upgrade version of Windows and perform an in-place upgrade. What should you do next?
Make sure that all applications run correctly
You have just finished upgrading the 250 W power supply in your desktop computer to a 450 W power supply. Now the BIOS doesn't recognize one of the HDDs in the system during post. What should you do?
Make sure that the HDD is connected to the power supply
You have just finished installing a new hard disk in your computer. Now the DVD drive won't work. What should you do first?
Make sure the DVD drive cables are connected
You have just finished upgrading the power supply in your desktop computer. Now the hard disk will not work. What should you do first?
Make sure the power connectors on the hard disk are plugged in all of the way
malware
Malicious software that includes viruses, Trojan horses, worms, and more.
virus
Malware that attaches itself to another host file. When the other file executes, the malware executes.
worm
Malware that can travel over a network without a host file and without user interaction.
rootkit
Malware that takes control of a system at the root or administrative level. It hides its activities from users and from antivirus software.
A computer has a hard disk drive and a DVD drive installed on the primary IDE channel. You decide to move the DVD drive to the secondary IDE channel. The secondary IDE interface will have no other devices. What setting would you configure on the DVD drive?
Master or single
What is the most important consideration when choosing a rewritable DVD drive
Media compativility
A customer complains of a slowly-operating Windows system. In researching the problem, you notice that the computer's HDD light stays illuminated for long periods of time as more applications are loaded. To speed up the computer, which of the following components should you consider upgrading?
Memory
ROM (read-only memory)
Memory that can only be read. It is used for firmware, which is software code written into a hardware chip. See PROM, EPROM, and EEPROM.
RAM (random access memory)
Memory used in a computer for short-term storage of applications and data.
social engineering
Methods used to trick people into revealing information or taking actions that they wouldn't normally do.
RAS (remote access service)
Microsoft service used for connecting to other systems. It is used with Remote Assistance and with Remote Desktop Connection.
What kind of powe connector does a floppy drive use?
Mini-molex power connecto
gadgets
Mini-programs that can run on the desktop of Windows 7 or in a sidebar in Windows Vista.
You have a computer running Windows 7 Professional. To increase the available memory for applications, you need to increase the size of the paging file. What should you do?
Modify the Advanced system settings.
You have a folder on your Windows desktop system that would like to share with members of your development team. Users need to be able to view and edit any file in the shared folder. You share the folder and give Everyone Full Control permission to the shared folder. Users connect to the shared folder and report that they can open the files, but they cannot modify any of the files. What should you do?
Modify the NFTS permissions on the folder.
You have a folder on your Windows 7 computer that you would like to share with members of your development team. Users should be able to view and edit any file in the shared folder. You share the folder and give Everyone Full Control permission to the shared folder. Users connect to the shared folder and report they can open the files, but cannot modify any of the files. What should you do?
Modify the NTFS permissions on the folder
Mary and Pablo share a workstation doing customer support. Mary works in the morning, and Pablo works in the evening. One day Mary is helping a customer with a support issue. Because her shift is over, she creates a Word document with details about the customer she is helping. She saves it to the C:\Customer folder on the computer. When Pablo comes in, he is unable to open the file. What should you do?
Modify the permissions on the document
You have a workstation running the 32-bit version of Windows Vista Business that you would like to upgrade to the 32-bit version of Windows 7 Professional. You want to perform the upgrade with the least amount of effort and cost. What should you do first?
Perform and Upgrade using the Windows 7 installation disc.
Which tool can you use to display statistics that tell you about the operation of your computer?
Performance Monitor
You manage a Windows 7 system. You want to view information about all of the programs running on your system and sort each program based on the amount of memory and CPU that the program uses. Which tool would you use?
Performance Monitor
You want to monitor the processor utilization on your Windows 7 computer. You want to get an e-mail notification every time the processor utilization exceeds 90%. You create a new Data collector Set in Performance Monitor. What type of Data collector should you create?
Performance counter alert
YOu have a computer running Windows 7 Professional. You have just enabled Remote Desktop on the computer so you can connect to it using a dial-up modem from home and run a few reports. You need to optimize the performance of your Remote desktop session for your slow connection. Select the Experience setting(s) that will optimize performance.
Persistent bitmap caching
Several employees have forwarded you an e-mail indicating that your company's health insurance provider has just launched a new benefits management Web site that all employees must start using. The employees are told in the e-mail to click a link to access the site. Once there, they are required to provide their SSN. However, you have discovered that your company's insurance provider did not send this e-mail. What kind of attack just occurred?
Phishing
Examine the following output: Reply from 64.78.193.84: bytes=32 time=86ms TTL=115 Reply from 64.78.193.84: bytes=32 time=86ms TTL=115 Reply from 64.78.193.84: bytes=32 time=86ms TTL=115 Reply from 64.78.193.84: bytes=32 time=86ms TTL=115 What utility produced this output?
Ping
You have a laptop running windows 7 Professional. You have been having trouble with the laptop crashing. The support technician wants you to send him a memory dump that occurred when the computer crashed. You find that the computer did not create the memory dump file. You need to configure the system to create a memory dump file when it crashes. What should you do?
Place the paging file on the system drive.
You're troubleshooting a malfunctioning notebook computer. Nothing appears on the LCD display when the system is powered on. What is the first thing you should do?
Plug in an external monitor
Well-known ports
Port numbers 0 to 1023 used to identify protocols and services.
sector
Portion of a track on a hard disk drive platter and also known as a track sector. Clusters are made up of multiple sectors.
Which of the following tools is specifically designed to test the DC voltage on a HDD power connector?
Power supply tester
shoulder surfing
Practice of looking over someone's shoulders to gain information.
patch management
Practices and procedures used to keep systems up to date with current patches.
You have a workstation running Windows XP Professional that you would like to upgrade to Windows 7 Enterprise edition. You want to perform the upgrade with the least amount of effort and cost. What should you do?
Purchase a full version of Windows 7; perform a new or custom installation
You have a workstation running Windows Vista Business that you would like to upgrade to Windows 7 Ultimate. You want to perform the upgrade with the least amount of effort and cost. What should you do?
Purchase an upgrade version of Windows 7; perform an in-place upgrade
Due to a blackout, power is no longer coming from the wall outlet and your computer is now off. You do not have a UPS and you need to remove a disc out of the DVD drive. What is the easiest method for retrieving the disc?
Push an unbent paper clip into the hole on the front of the drive
You have a file which you would like other users to see, but not modify. Which file attribute should you use?
R, or Read
single channel DRAM
RAM that is accessed in a single 64-bit channel. Compare to dual channel and triple channel.
triple channel DRAM
RAM that is accessed in three separate 64-bit channels. It can transfer three times as much data as single channel. Compare to single channel and dual channel.
dual channel DRAM
RAM that is accessed in two separate 64-bit channels. It can transfer twice as much data as single channel. Compare to single channel and triple channel.
You have a computer that runs Windows XP Professional that you would like to upgrade to Windows 7 Professional. You run the setup program and install Windows 7 on the same computer and hard drive. What should you do next?
Re-install all applications.
• You have a computer that runs Windows XP Professional that you would like to upgrade to Windows 7 Professional. You run the setup program and install Windows 7 on the same computer and hard drive. What should you do next?
Re-install all applications.
You use your computer to type documents in Portuguese that will be sent to Brazil. You purchase a second keyboard designed specifically for Portuguese. Which tool would you use to configure your computer for the new keyboard so you can switch between the Portuguese and English keyboards?
Region and Language in Control Panel
Even if you perform regular backups, what must be done to ensure that you are protected against data loss?
Regularly test restoration procedures
You are testing the power supply in a PC system by measuring the voltage available on the 4-pin Molex connector. The voltage on the yellow wire is +10.1 volts. What should you do?
Replace the power supply
• You have a stand-alone computer running Windows 7 Professional. You notice that the Aero features are not displayed. The computer has 19 inch CRT screen that supports refresh rates up to 65 Hertz and a video card with 64 MB RAM. You need to use the Aero features. What should you do?
Replace the video adapter card with one that has at 128 MB RAM.
You have a stand-alone computer running Windows 7 Professional. You notice that the Aero features are not displayed. The computer has a 19 inch CRT screen that supports refresh rates up to 65 Hertz and a video card with 64 MB RAM. You need to use the Aero features. What should you do?
Replace the video adapter card with one that has at least 128 MB RAM.
What method does as MMC card use for storing data?
Reprogrammable memory
What method does as SDHC card use for storing data?
Reprogrammable memory
• Your Windows system is a member of a domain. To increase security as users log onto the computer, you need to implement the strongest form of multi-factor authentication. What should you do?
Require a password, biometrics scan, and a token device.
separator pads
Reverse turning rollers that work with the pickup roller to ensure that only one sheet of paper is picked up.
robocopy
Robust file copy tool. It includes the capabilities of copy and xcopy but can also copy metadata such as permissions.
You have a computer that runs Windows 7. You install a new art application on your computer. The application recommends that you install an updated video driver. You install the new driver. You use the computer for several days, but notice the display doesn't seem to refresh properly. You want to use your previous display adapter driver to correct the problem. You need to implement a solution that minimizes downtime. What should you do?
Roll back the display adapter driver.
pickup rollers
Rollers in a printer used to pick up paper from a paper tray. They are used with separator pads.
ST (straight tip)
Round connector used with fiber cables.
You are the desktop administrator for your company. You manage 20 Windows 7 comptuers. You would like to manage the computers remotely using the Windows Remote Shell. You need to enable remote management on each computer. What should you do?
Run "Winrm quickconfig".
You have a computer that runs Windows 7. You have just added 300 GB hard drive to the computer. You create a single volume named *Data* and format the volume using FAT32. The volume is assigned drive letter D:. You copy several files to the new hard disk. You would like the disk to be included in any restore points created on the computer. What should you do first?
Run *convert.exe* to change the drive to NTFS.
You have a workstation running the 32-bit version of Windows 7 Professional that you would like to upgrade to the 32-bit version of Windows 7 Ultimate. You want to perform the upgrade with the least amount of effort and cost while maintaining as much user data as possible. What should you do first?
Run Anytime Upgrade
• You have a workstation running the 32-bit version of Windows 7 Professional that you would like to upgrade to the 32-bit version of Windows 7 Ultimate. You want to perform the upgrade with the least amount of effort and cost while maintaining as much user data as possible. What should you do first?
Run Anytime Upgrade.
• You have a computer that runs Windows 8 Enterprise and a VHD file which contains a Windows 7 installation. You need to reboot the computer from the VHD file. What should you do?
Run BCDEdit and modify the BCD boot entries.
You have a computer running Windows 7 Home Premium. You need to customize which utilities and programs are processed at startup for the computer. What should you do?
Run Msconfig
You have a computer that runs Windows XP Professional. You want to upgrade your computer to Windows 7 Professional. You want to maintain as much of the application, user profile, and user data as possible. You want to perform the upgrade with the least amount of effort possible. What should you do?
Run Scanstate in Windows XP, Perform a custom installation of Windows 7 to the existing hard drive. Boot into windows 7 and re-install all applications. Run Loadstate.
You have a computer that runs Windows XP Professional. You want to upgrade your computer to Windows 7 Professional. You want to maintain as much of the application, user profile, and user data as possible. You want to perform the upgrade with the least amount of effort possible. What should you do?
Run Scanstate in Windows XP. Perform a clean (custom) installation of Windows 7 to the existing HDD. Boot into Windows 7 and re-install all applications. Run Loadstate
• You have a computer that runs Windows XP Professional. You want to upgrade your computer to Windows 7 Professional. You want to maintain as much of the application, user profile, and user data as possible. You want to perform the upgrade with least amount of effort possible. What should you do?
Run Scanstate in Windows XP. Perform a custom (advanced) installation of Windows 7 to the existing hard drive. Boot into Windows 7 and re-install all applications. Run Loadstate.
• You would like to boot your computer to a VHD file that contains a Windows 7 installation. You will use the install.wim file from the Windows installation disc to create the VHD file. You would also like to apply updates to the image. What should you do?
Run WIM2VHD.
You have two computers: ComputerA is running Windows XP Professional and ComputerB is running Windows 7 Professional. You need to transfer user profiles and data files from ComputerA to ComputerB. What should you do? (Select two. Each answer is a complete solution.)
Run Windows Easy Transfer Run USMT
You have just purchased a new computer that runs Windows 7. You would like to transfer all of the applications and user data from your old computer running Windows XP to the new computer. How can you do this with the least amount of effort?
Run Windows Easy Transfer on the old computer and the new computer. Reinstall any applications
You have a computer running Windows 7 Ultimate. The computer is performing poorly. You want to check the memory component subscore of your computer. What should you do?
Run Windows Experience Index
You have a computer running Windows 7 Enterprise. After connecting to your company's network, you are able to access all of your personal files. Later in the day, you are having problems accessing the same files, as well as other files on the network. What should you do?
Run Windows Network Diagnostics
You have just installed a new hardware device, upgraded the driver, and installed the custom software that came with the device. Now you can't get the device to work. What should you do first?
Run any diagnostic software that came with the device
You have a stand-alone computer running both Vista and Windows 7. The computer currently boots to Windows 7 by default. You need the computer to boot to Windows Vista as the default operating system instead. What should you do?
Run bcdedit.exe.
You have a stand-alone computer running both Windows 7 and Windows 8. The computer currently boots to Windows 7 by default. You need the computer to boot to Windows 8 as the default operating system instead. What should you do?
Run bcdedit.exe.
You have a Win notebook system that is shared by three users. The computer is not a member of a domain. Each user has been using EFS to encrypt their personal files on the laptop. You would like to add your user account as a recovery agent so you can recover any file encrypted by any user on the laptop. You would like to store the recovery keys on a smart card. What should you do first?
Run cipher /r.
You have a computer running Windows 7 Ultimate. You need to copy files to an existing VHD file that contains a Windows 7 installation. What should you do?
Run diskpart.exe, then use the list, select, and attach commands.
You are performing a network installation of Windows 7 on a new computer. You boot the computer using Windows PE. You need to install a device driver for the network adapter. What should you do?
Run drvload.exe
• You are performing a network installation on Windows 7 on a new computer. You boot the computer using Windows PE. You need to install a device driver for the network adapter. What should you do?
Run drvload.exe
• You have been encrypting files on your Windows notebook system using EFS and a self-signed certificate. You not want to protect your encrypted files using a certificate on a smart card. You install a smart card reader and obtain a smart card with a new certificate. You want to make sure that all encrypted files use the certificate on the smart card. What should you do first?
Run rekeywiz.
You have two computers: ComputerA is running Windows Vista and ComputerB is running Windows 7. You need to migrate specific application settings from ComputerA to ComputerB by using USMT. What should you do? (Select two. Each choice is a required part of the solution.)
Run scanstate with the /i option. Edit the migapp.xml file.
You have a single computer running Windows XP. You perform a Custom (advanced) installation of Windows 7 to the existing disk partition on the computer. You need to migrate user profiles and user data from the Windows XP installation to the Windows 7 installation. What should you do?
Run scanstate with the /offlineWinOld: option
You have a single running WinXP. You perform a Custom (advanced) installation of Win7 to the existing disk partition on the computer. You need to migrate user profiles and user data from the WinXP installation to the Win7 installation. What should you do?
Run scanstate with the /offlineWinOld: option.
Your computer has a single core processor that supports hyper-threading. In Windows, how can you verify whether hyper-threading has been enabled?
Task Manager will show CPU utilization graphs for two processors
Which Windows tool lets you perform automatic backups at regular times (such as on specific days at specific times)?
Task Scheduler
Which tool lets you to automatically start an application or run a script based on triggers?
Task Scheduler
You have an application that you would like to run every Monday at 3 p.m. on your Windows 7 workstation. Which tool would you use to configure the application to run automatically?
Task Scheduler
MIMO (multiple-input multiple-output)
Technology used by 802.11n wireless devices. They use multiple antennas to transmit and receive resulting in higher speeds. MNEMONIC: Many multiple antennas
What are lookback plugs used for?
Testing ports by returning output signals as input
What does the /a switch used with the copy command indicate?
That the file is an ASCII text file
• You just purchased a new Windows 7 system for an artist in your company. After installing an art application to the computer, the artist states that the application does not work correctly. The application worked fine on a Windows XP machine. In an attempt to fix the problem, you tried to run the application in compatibility mode. When this didn't work, you temporarily disabled UAC, but this still didn't fix the problem. You decide to create a shim for the application. You download the Application Compatibility Toolkit (ACT). What should you do next?
Run the Compatibility Administrator.
• You have a computer that runs Windows 7 Enterprise. You want to configure the computer to boot to a Windows 7 installation on a VHD file. You will use the install.wim image on the Windows installation disc. Your computer does not have the Windows AIK installed. You create and attach a virtual disk file using Disk Management. You need to apply the Windows image file to the virtual disk. What should you do?
Run the Install-WindowsImage.ps1 PowerShell script.
You have a Windows Vista system that you would like to upgrade to Windows 7. You want to make sure that everything in your current system is compatible with Windows 7. What should you do?
Run the Windows 7 Upgrade Advisor.
You have a Windows Vista system that you would like to upgrade to Windows 7. You want to make sure that everything in your current system is compatible with windows 7. What should you do?
Run the Windows 7 Upgrade Advisor.
You have a Windows XP Professional system that you would like to upgrade to Windows 7 Ultimate. What should you do first?
Run the Windows 7 Upgrade Advisor.
• You have a Windows XP Professional system that you would like to upgrade to Windows 7 Ultimate. What should you do first?
Run the Windows 7 Upgrade Advisor.
You have a Windows Vista computer that was recently upgraded from Windows XP. One application worked fine in Windows XP, but now does not run in Windows Vista. You have checked the application vendor's Web site but there is no update available. What should you try next to run the application?
Run the application in Compatibility mode
• You have a computer running Windows 7 Ultimate. For several years, all employees in your organization used an in-house application that was created by internal developers. After installing the application on your Windows 7 system, it doesn't execute correctly. The application worked correctly on Windows XP machines with Service Pack 3. You need the application to work correctly on this computer with the least amount of administrative effort. What should you do?
Run the application in compatibility mode.
You have a computer that runs Windows 7. You are troubleshooting a problem that keeps occurring. When the problem happens, there are several Warning and error events logged to the Application log in Event Viewer. You create a custom View that shows only Warning and Error events. During troubleshooting, you filter the Custom View to show only the Error messages. You would like to create a new custom View using the current filter settings. What should you do?
Save the filter to a Custom View.
You're troubleshooting a computer running Windows 7. The OS has halted and a blue screen has been displayed on the monitor with an error message. What is the first step you should take in troubleshooting the issue?
Search for the error in Microsoft's knowledgebase or in a search engine on the Internet
You have a computer running Windows 7 Ultimate. You recently upgrade the computer from windows XP Professional. The client who uses the computer has called to complain that the windows 7 interface is very slow. For example, after clicking on the Windows start button, the Start Menu slowly appears on the screen. You want to improve performance without upgrading any hardware. What should you do?
Set the visual effects for best performance.
Which of the following best describes the use of Libraries in Windows 7?
Special folders that group files and folders, possibly stored in both local or network locations, into a single logical folder
A user needs to copy a file from an NTFS partition to a FAT32 partition. The file has NTFS permissions and the folder attributes: Read only (R) and Encryption. When the folder is copied, which of the following is true?
The R attribute is retained on the file
sfc
The System File Checker command is used to verify and repair system files.
While troubleshooting a network issue, you successfully ping the 127.0.0.1 IP address. Which of the following is true?
The TCP/IP protocol suite is working correctly on this computer
permissions
The ability to access a resource. For example, a user can be given Read permission on a file. Compare to rights and privileges.
right
The ability to perform an action. For example, a user can be given the right to change the computer time. Compare to permissions and privileges.
Which of the following is true about primary partitions?
The active partition must be a primary partition
Which of the following is true about primary partitions?
The active partition must be primary partition
SSID (service set identifier)
The name of an 802.11 wireless network. It can be up to 32 characters long and is case-sensitive.
PSTN (public switched telephone network)
The network of telephone communications companies.
Which of the following is a characteristic of extended partitions?
They are subdivided into logical drives
Remote Desktop Connection
This is a Microsoft application used to connect to remote systems. You can start it with the mstsc command.
PCIe (peripheral component interconnect express)
The primary expansion card standard used in systems today. It uses multiple lanes to transfer data and is identified by how many lanes it supports. A PCIe card can have 1, 2, 4, 8, 16, or 32 lanes (designated as x1, x2, x4, x8, x16, and x32).
iOS
The primary operating system used on Applebased mobile devices. It is a closed source, vendorspecific operating system. Apple doesn't license its use on any devices other than Apple products. Users of iOS- based devices can purchase and download applications from Apple's App Store.
CPU (central processing unit)
The primary processor within a computer. It does the majority of the computing work.
HTTP (Hypertext Transfer Protocol)
The primary protocol used to transfer data over the web. It uses port 80.
I/O (input/output)
The process of providing an input and getting an output. Many computer components provide I/O services.
native resolution
The resolution that should be used with LCD monitors. Different resolutions distort the display.
RGB (red green blue)
Three separate analog signals used for some video displays.
You are planning to install Windows 7 on a new 64-bit computer. The computer will be joined to a domain and you plan to configure the computer to boot from a .VHD image. Which Windows 7 editon should you use?
Ultimate (64-bit)
• You are planning to install Windows 7 on a new 64-bit computer. The computer will be joined to a domain and you plan to configure the computer to boot from a .VHD image. Which Windows 7 edition should you use?
Ultimate (64-bit)
You have been asked to install Windows 7 on 10 different computers for a new branch office your company is setting up. The computers have been purchased from different companies and have different hardware. Which method should you use to reduce the installation time and the effort you need to spend?
Unattended
kill
Unix-based command used to terminate a process.
spam
Unwanted or unsolicited email.
You have a computer that runs Windows XP Professional. You would like to upgrade the computer to Windows 7. Before doing the upgrade, you want to verify that the computer meets the hardware and software requirements for Windows 7. Which tool should you use?
Upgrade Advisor for Windows 7
• You manage desktop system for a small organization. Currently, all of your systems have the ff. hardware installed: o CPU: AMD Sempron 2.8 GHz o Memory: 4GB o Hard disk: 500GB o Video: 1GB video memory o Monitor: LCD with native resolution of 1280x 768 The Professional edition of Windows 8 came pre-installed on all of these systems and they are currently joined to your organization's Active Directory domain. Several users have complained that they can't view apps from the Windows Store side by side on screen. What should you do?
Upgrade the LCD monitors to models with a native resolution of at least 1366 x 768.
first response
Within IT, refers to actions taken by the first person that observes prohibited content or activity. Three important steps include identifying the incident, reporting the incident, and preserving data or devices from the incident.
Which component of Windows 7 prompts the user for credentials or permission to minimize the dangers of unintended software installation?
User Account Control (UAC)
Which component of Windows 7 prompts the user for credentials or permission to minimize the dangers of unintended software installations?
User Account Control (UAC)
You manage all of the computers at your company. You have over 100 desktop computers, all running Windows XP. You have purchased new computers that have Windows 7 pre-installed. You want to move user data and desktop settings from the old computers to the new computers. Which tool should you use?
User State Migration Tool (USMT)
On a Windows system, which of the following is true of using groups?
User accounts are made members of a group. Group members have the access rights assigned to the group
You manage a Windows 7 system. You need to create a user account that can create files, run applications, and install printers when the driver for the printer already exists on the computer. You want the user to have only the minimum rights necessary on the computer. This user should be a member of which group?
Users
You place a new disc in an optical drive then double-click the drive in the operating system's file browser interface. An error message appears stating that the drive is not accessible. What should you do
Wait. Then try again
• You manage desktop system for a small organization. Currently, all of your systems have the following hardware installed: o CPU: AMD Sempron 2.8 Ghz o Memory: 2GB o Hard disk: 500 GB Windows 7 Home Premium edition came pre-installed on all of the systems and they are currently configured to run in a workgroup environment. Your organization recently decided to implement a Windows Server 2012 system with Active Directory installed. Management has asked you to join your Windows 7 client systems to the new domain. What should you do?
Upgrade the desktop system to Windows 7 Professional.
You have an extra disk on your system that has three primary partitions and an extended partition with two logical drives. You want to convert the partitions to simple volumes, preferably without losing any data. What should you do?
Upgrade the disk to a dynamic disk
You have an extra disk on your system that has three primary partitions and an extended partition with two logical drives. You want to convert the partitions to simple volumes, preferably without losing any data. What should you do?
Upgrade the disk to a dynamic disk.
• You have a VHD file which contains a Windows 7 Enterprise installation and other data files. You want to view, but not modify the installation and data files in the VHD file. What should you do?
Use Disk Management to attach the VHD file as read-only.
You have several computers running Windows 7 Ultimate. The computers are members of a domain. For all the computer, you want to remove access to administrative tools from the Start menu and hide notifications from the System Tray. What should you do?
Use Group Policy
You have a computer that runs windows 7. While manually configuring Windows Update, you notice that several settings are grayed out and unchangeable as shown in the image. You want to enable the settings so you can manually configure them. What should you do?
Use Group Policy to modify the Windows Update settings.
You have a stand-alone computer running windows 7 Professional. You need to determine if the computer has any administrative vulnerabilities. What should you do?
Use Microsoft Baseline Security Analyzer (MBSA)
WAN (wide area network)
Two or more local area networks (LANs) connected together but in different geographic locations.
T568A/T568B
Two wiring standards used for twistedpair cables. They identify specific pins for specific colored wires. Straight-through cables should use one standard or the other on both connectors for a cable.
How can you see a list of valid switches for the cd command?
Type cd /?
MAN (metropolitan area network)
Type of network that connects multiple networks together over a large metropolitan area. Worldwide Interoperability for Microwave Access (WiMAX) is used for many MANs.
processor
Typically refers to the central processing unit (CPU). However, graphics cards also have a processor called the graphics processing unit (GPU).
You are working at the command line and want to add the Read-only attribute to a file and remove the Hidden attribute. Which command would you use?
attrib +r -h
Which command would you use to change the current directory to the immediate parent directory?
cd ..
You have a hard disk drive that has a single primary partition and has been assigned D: as the drive letter. Which tool would you use to configure the drive to use the FAT32 file system?
format
You suspect large packets are being dropped on your network because of their large size. Which utility can you use to confirm your suspicion?
ping -l
You use a Windows 8 system with File History enabled. You've been working on a file named Product Requirements 2.0 in Widget Project folder in your Documents library. You realized this morning that you've made many erroneous changes that will require a great deal of work to correct. You decide that the best option is to restore a previous version of this file. You've used File History to identify the version of the file you want to restore. Click on the option you would use to restore the earlier version of the file shown.
select the 'green (or blue) arrow key)
What is the purpose of the small cable that connects an IDE optical drive to the sound card?
sends CD audio from the optical drive to the sound card
Which command lets you delete subdirectories in addition to files in the current directory?
rd /s
You want to scan your system for changed system files and automatically revert to previous versions for any file that has been altered. You want the scan to run once the next time the system boots. Which command should you use?
sfc /scanonce
Which command would you use to copy all files in a directory, including all subdirectories (as well as empty ones)?
xcopy /e
Which of the following display connections has 15-pins? A. RGB B. VGA C. DVI D. HDMI
B. VGA
Which of the following tools are commonly used to remove dust and debris from inside a computer? (Select TWO). A. Cotton and alcohol B. Vacuum C. Compressed air D. Anti-bacterial surface cleaner E. Feather duster
B. Vacuum And C. Compressed air
Thermal paste is used between the CPU and heatsink to: A. make the heatsink easier to remove when replacing the CPU. B. aid in the transfer of energy from the CPU to the heatsink. C. act as a fire retardant should the CPU overheat. D. keep the heatsink in place on the CPU.
B. aid in the transfer of energy from the CPU to the heatsink.
When configuring a new hard drive for use in a hot swappable environment, which of the following connection types should be used? A. PATA B. eSATA C. IDE D. SATA
B. eSATA
Best business practices in IT include. A. always suggesting the fastest route to fix the problem. B. following up with a customer to verify satisfaction. C. always suggesting the least expensive option. D. offering all possible choices to a customer.
B. following up with a customer to verify satisfaction.
Which Blu-ray standard defines rewritable disks?
BD-RE
Where is Disk Management located within Windows?
Computer Management
You are responsible for managing client workstations for your company. A user reports that he can't send print jobs to a specif c printer. You go to the user's computer and reproduces the problem. What should you do next?
Determine if anything has changed
Which system utility would you use to troubleshoot hardware devices, examine and control the resources by specific devices, and install update device drivers?
Device Manager
wireless access point (WAP)
Device that acts as a bridge for wireless clients to a wired network. WAP is also an acronym for Wireless Application Protocol.
You have a CD-RW drive that advertises speeds of 32x/12x/48x. What is the read speed of the drive?
48x
You have several computers running Windows 7 Enterprise. The computers are members of a domain. You manage a custom application that is currently installed on the computers in the domain. You receive a new version of the software. Installing the software on a client computer overwrites the existing installation such that both versions cannot be used at the same time on the same computer. You decide to use Remote Desktop Services on a server in the domain to allow clients to run both the new and the old version of the software. Clients should be able to run each version using an icon on their desktops. What should you do? (Select two. Each choice is a required part of the solution.)
- Install the new version of the application on the server. - Configure RemoteApp on the server.
Which of the following are advantages of solid state storage compared to hard drives?
- No moving parts - Lower power requirements
You have two computers: Comp1 is running Windows 7 and comp2 is running Windows XP. Both computers are members of a domain. You need to use PowerShell commands to remotely manage Comp1 from comp2. comp1 has the Windows remote Management (WinRM) service enabled. What should you do? (Select two. Each choice is a required part of the solution.)
- On Comp2, download and install PowerShell 2.0. - On Comp2, use the "icm" command
You're configuring devices on a SCSI bus. You've installed a SCSI adapter in an expansion slot. You've connected an external SCSI tape drive to the external port connector on the adapter,. You've connected two hard SCSI hard disk drives (sd0 and sd1) to two of the middle connectors on the internal SCSI ribbon cable. The end connector on the internal SCSI ribbon cable is connected to a SCSI DVD drive. Where should termination be enabled on this bus? (2)
- On the DVD drive - On the external tape drive
You manage three Windows 7 computers that are part of a workgroup. You would like to configure event subscriptions so that you can view all events from those computers on your laptop (which also runs Windows 7). You need to configure the three source computers and one collector computer. The subscription will be a source initiated subscription. What should you do? (Select two. Each choice is a required part of the solution.)
- On the collector computer, configure the subscription. - On all four computers, run 'winrm qc -q'. On the collector computer, run 'wecutil qc /q'.
You have several computers running Windows 7. The Computers are members of a domain. Your company uses Remote Assistance to help diagnose user desktop issues. All computers are configured to allow Remote Assistance. One day you receive a Remote Assistance acceptance from someone you don't know from an invitation file you created several weeks ago. You need to prevent this from happening again. What should you do?
- Require a password on invitation files. - Decrease the timeout in invitation files.
You have a Windows 7 computer. You would like to configure Event Subscriptions for that computer to forward events to a network server. You need to configure your computer as a source computer for a collector initiated subscription. Which of the following will be part of your configuration? (Select two.)
- Run 'winrm qc' - Add the collector computer to the Event Log Readers group.
you have a computer that runs Windows 7. You need to manually check for updates form Windows Update. What should you do? (Select two. Both answers are complete solutions.)
- Run 'wuauclt.exe /detectnow' - Click the 'Check for updates' button in Windows Update.
A user has called to complain that he can't save a file to a floppy disk in his floppy drive. What should you do first? (select two)
- Verify that the disk has been inserted and properly formatted. - Make sure the write-protection tab on the disk isn't set.
Under what conditions should you choose exFAT over FAT32 or NTFS? (Select two)
- When creating a volume over 32 GB in size - When formatting removable flash devices
While troubleshooting a network connection, you decide to use the ping command. Which switch allows for a continuous ping?
-t
Which of the following extensions identifies a program packaged for use by Windows Installer?
.msi
You have a computer system with two IDE channels built into the motherboard. You add a PCI expansion card that provides an additional four IDE channels. What is the maximum number of IDE devices that can be added to the system?
12
• You need to upgrade a notebook system running 32-bit Windows 7 Home Premium edition to 64-bit Windows 8.1 Professional. Which of the ff. is true regarding this upgrade path?
32-bit versions of Windows 7 cannot be upgraded to 64-bit versions of Windows 8.1.
You have a motherboard with 4 built-in SATA connectors. What is the maximum number of SATA devices you can connect to the motherboard using the integrated ports?
4
You have been asked to implement a RAID 10 solution for a video editor's desktop workstation. What is the minimum number of HDDs that can be used to configure RAID 10
4
Which ribbon cable is used by an ATA/133 HDD?
40-pin / 80-wire
XGA (extended graphics array)
A display device resolution of 1024 × 768.
EVGA (extended video graphics adapter/array)
A display device resolution of 1024 × 768. MNEMONIC: TD SZ N R K GJ FV In the Everglades, does any rake give up?
SXGA (super extended graphics array)
A display device resolution of 1280 × 1024.
UXGA (ultra extended graphics array)
A display device resolution of 1600 × 1200. MNEMONIC: T Jesus
WUXGA (wide ultra extended graphics array)
A display device resolution of 1920 × 1200. MNEMONIC: Wide ultra extended is two pence (tuppence) dense
VGA (video graphics array)
A display device resolution of 640 × 480. A VGA interface uses a 3-row DB-15 connector. MNEMONIC: Grass
SVGA (super video graphics array)
A display device resolution of 800 × 600.
DisplayPort
A display interface developed by VESA. The connector is rectangular with a cut-off corner.
MSDS (Material Safety Data Sheet)
A document that identifies the contents, characteristics, and first aid responses for different materials used in a work space.
chain of custody
A document that tracks how evidence has been protected since the time it was collected. It helps verify that collected evidence has been controlled, preventing anyone from tampering with it.
SCSI (small computer system interface)
A drive interface that can be used instead of PATA or SATA. It is rarely used in desktop systems.
SSD (solid state drive)
A drive that functions as a traditional hard disk drive but has no moving parts.
SRAM (static random access memory)
A fast type of RAM typically used in CPU L1, L2, and L3 cache. Bits are stored by using switching circuitry, but this increases the cost. Compare to dynamic RAM and synchronous dynamic RAM.
UDMA (ultra direct memory access)
A faster interface for hard drives, introduced with ATA-4.
LoJack
A feature available on some laptops that can be enabled in the BIOS. It uses a transceiver that helps locate a stolen laptop similar to the way LoJack is used to recover stolen automobiles.
Windows Anytime Upgrade
A feature in Windows 7 that allows users to a purchase an upgrade to a higher edition of Windows 7. Users purchase a license key and can upgrade the system without the installation DVD.
Windows XP Mode
A feature in Windows 7 that allows you to run applications from within a virtual Windows XP environment. It is useful if you want to migrate to Windows 7 but have an older legacy application that won't run on Windows 7. The legacy application can run in Windows XP Mode within Windows 7.
power plans
A feature in Windows Vista and Windows 7 that has configured power saving settings for hardware. The balanced plan is used for laptops when plugged in to a power source, and the power saver plan is used when laptops run on battery power.
Sidebar
A feature in Windows Vista that allowed users to add gadgets, or mini programs, to their desktop. Sidebar is not included in in Windows 7, but users are still able to add gadgets to their desktop.
PnP (plug and play)
A feature in Windows that automatically installs and configures device drivers.
touchpad
A pad used on laptop computers instead of a mouse.
recovery partition
A partition added by a computer reseller on a disk drive. It is often invisible but can be used to return a system to the state it was in when it was sold.
What is a recovery partition?
A partition created by the computer manufacturer to restore the system to its original state
active partition
A partition that is bootable. On an MBR disk, one of the primary partitions is marked as active.
extended partition
A partition type on basic MBR disks that supports multiple logical drives. Only one extended partition can be used on a disk. Compare to primary partition.
primary partition
A partition type used on disks. Basic MBR disks support up to four primary partitions, or three primary partitions and one extended partition.
UNC (universal naming convention)
A path used to connect to a share on another system. The format is \\computer\share.
cable lock
A physical lock used to secure laptops.
pixel
A pixel element. Display monitors display a pixel by using a combination of red, green, and blue dots.
URL (uniform resource locator)
A pointer to a web resource. For example, http://www.bing.com is a URL pointing to the Bing search engine.
laser printer
A popular printer for businesses. It uses a seven-step imaging process and creates high quality outputs.
laptop
A portable computer. Very small laptops are often called netbooks. High-performance laptops have as much power as a desktop computer.
surge
A short-term increase in power. It can sometimes cause lights to shine brighter. A surge suppressor prevents damaging surges from reaching equipment.
DDR RAM (double data-rate random access memory)
A shortened acronym for DDR SDRAM.
bit
A single binary digit. Bits are either 0 or 1.
spanned volume
A single volume that includes more than a single physical disk. Spanned volumes do not provide any performance gains.
SOHO (small office/home office)
A small business office with between 1 and 10 users.
docking station
A small case into which a laptop can be plugged. It extends the capabilities of the laptop.
FDD (floppy disk drive)
A small disk drive that accepts 3.5-inch floppy disks. They are rarely used today.
LED (light emitting diode)
A small electrical component that emits light. LEDs are commonly used on computers as indicators. For example, the power LED lights up when the computer is turned on.
tablet
A small handheld computing device with a touch screen. The Apple iPad is an example. Tablets are not upgradable or serviceable by technicians in the field.
workgroup
A small network that does not have centralized authentication. Each computer has a separate database holding user accounts.
CNR (Communications and Networking Riser)
A small slot in the motherboard used for some add- on communications and networking devices such as modems or network interface cards. These features are often included in the chipset instead of by using a CNR card.
mini-SD
A smaller version of SD flash card memory used in cameras and digital recorders. It is larger than micro-SD.
SODIMM (small outline dual in-line memory module)
A smaller version of a DIMM used in smaller devices such as laptop computers and some printers.
CRIMM (Continuity Rambus Inline Memory Mode)
A special circuit card used with RDRAM. RDRAM must be installed in pairs, and if the second card doesn't have memory, a CRIMM is used.
Recovery Environment
A special command prompt environment available in Windows Vista-based and Windows 7-based systems. It includes access to bootrec commands that can fix boot problems.
thermal paste
A special compound used between CPUs and heat sinks. It fills in microscopic gaps and helps draw heat from the CPU into the heat sink where it is dissipated.
ISDN (integrated services digital network)
A special type of dial-up connection to the Internet that uses a telephone network. ISDN uses terminal adapters in place of modems.
dynamic disk
A special type of disk supported in Windows-based systems. Dynamic disks can be used to create striped, mirrored, and spanned volumes. The alternative is basic disks.
HyperTransport
A technology used by AMD to increase the speed of the front side bus.
DLP (Digital Light Processing)
A technology used in some TVs and projectors. It is a trademark owned by Texas Instruments.
brownout
A temporary reduction in power. It often causes lights to flicker and can cause systems to reboot. Systems protected with an UPS are not affected by brownouts.
power supply tester
A testing device used to measure power supply voltages for power supplies that are not plugged into a motherboard.
Command Prompt
A text-based window you can use to enter MS-DOS-based commands. The application is cmd.exe, and it can be launched normally or with administrative permissions.
MBSA (Microsoft Baseline Security Analyzer)
A tool available as a free download that can check one or more systems for potential security issues.
Windows Memory Diagnostic
A tool in Windows Vista and Windows 7 that is used to test physical memory.
Device Manager
A tool used to manage devices and device drivers. You can use it to disable devices and to update, uninstall, and roll back drivers.
USMT (User State Migration Tool)
A tool used to migrate user data and settings. It includes two commands. Scanstate captures user's data and settings, and loadstate loads the captured information onto the new installation.
System Information
A tool used to provide an overview of Windows. It is opened with the msinfo32 command.
degaussing tool
A tool used to sanitize media. Degaussing tools have strong magnetic fields that erase data and destroy hard drives.
Windows Easy Transfer
A tool used to transfer files and settings between two computers as part of a migration. It's included in Windows 7, and free downloads are available that can be installed on Windows XP-based and Windows Vista-based systems.
Task Manager
A tool used to view and manipulate running tasks. It can be used to end unresponsive applications.
System Configuration
A tool used to view and manipulate what services and applications start automatically. It can be opened with the msconfig command.
PPTP (point-to-point tunneling protocol)
A tunneling protocol used with VPNs.
straight-through cable
A twisted-pair cable with wires attached to the same pins on both connectors. Compare to crossover cable.
SPGA (staggered pin grid array)
A type of CPU socket similar to PGA. Instead of using uniform rows, the pins are staged to fit more pins.
RDRAM (rambus dynamic random access memory)
A type of RAM that can be used instead of DDR SDRAM.
DRAM (dynamic random access memory)
A type of RAM that uses capacitors to hold data. It is cheaper than SRAM but not as fast because the capacitors need to be refreshed regularly. Compare to static RAM and synchronous dynamic RAM.
VRAM (video random access memory)
A type of RAM used in older video cards.
SGRAM (synchronous graphics random access memory)
A type of RAM used in some older video cards.
A customer has asked a technician to install a new USB printer that is supported by Windows 7. The PC is running Windows 7 Professional. Which of the following is the correct method to complete the installation? A. Connect the new USB printer and power it on. Windows 7 will automatically detect and add the new printer. B. Add the printer driver to the %SystemDir%\System32\Drivers folder, then connect and power on the printer. C. Click Start >All Programs >Control Panel >Printers and Faxes >Right click on desired printer and select "install". D. Configure the BIOS to boot from USB devices first. Connect and power on the printer. Boot the computer.
A. Connect the new USB printer and power it on. Windows 7 will automatically detect and add the new printer.
Which of the following is a benefit of using ECC memory? A. Corrects memory errors B. Allows 64-bit operating systems C. Prevents disk errors D. Uses lower voltage
A. Corrects memory errors
A laptop is not charging the battery and occasionally shuts off even when the power cord is plugged in. This is a symptom of a bad: A. DC jack. B. hard drive. C. cooling system. D. battery.
A. DC jack.
Which of the following laptop accessories would MOST likely be used to support multiple displays when the laptop hardware does not have multiple video outputs? A. Docking station B. VGA to DVI converter C. Adjustable monitor arm D. PCMCIA card
A. Docking station
A technician needs to access the system BIOS at boot time on a PC. Which of the following are possible BIOS access keys? (Select TWO). A. F2 B. F12 C. F8 D. Delete E. Function F4 F. Control Home
A. F2 And D. Delete
Which of the following are characteristics of transferring data using fiber as the medium? (Select TWO). A. Fiber can transmit data the farthest distance without requiring a repeater B. Fiber is the least susceptible to EMI C. Fiber is the most susceptible to changes in temperature and humidity, which can cause varying transmission speeds D. Fiber can transmit power as well as data, which will lead to cost savings
A. Fiber can transmit data the farthest distance without requiring a repeater And B. Fiber is the least susceptible to EMI
A client has a laptop screen and an external screen. Which of the following is the BEST way to toggle between the two or show both at the same time? A. Function keys on keyboard B. Task Manager C. Display settings in Control Panel D. Turn the monitors on and off
A. Function keys on keyboard
In a laser printer, which of the following components uses heat to apply the toner onto the page? A. Fuser assembly B. Pickup roller C. Transfer roller D. Imaging drum
A. Fuser assembly
A technician is working on a PC but does not have their grounding strap. Which of the following would be the BEST method the technician should use to ground themselves? A. Hold the metal of the case B. Hold on to the power cord C. Take off their shoes D. Unplug the PC
A. Hold the metal of the case
Which of the following connection types is MOST likely to be used to connect an internal hard drive to a computer? A. IDE B. DVI C. Parallel D. eSATA
A. IDE
Which of the following represents a connector that supports the connection of external devices? (Select TWO). A. IEEE1394 B. eSATA C. EIDE D. SATA E. IDE
A. IEEE1394 And B. eSATA
A user is suspected of engaging in prohibited activity on their workstation. Which of the following should be done FIRST? A. Inform a supervisor or management. B. Disable network access for the user. C. Search the workstation for evidence. D. Call the authorities to question the user.
A. Inform a supervisor or management.
Which of the following MUST be performed when installing a PCI sound card for use instead of the onboard sound? A. Install drivers B. Install additional memory C. Configure the jumpers D. Flash the BIOS
A. Install drivers
Which of the following laptop display types relies on a backlight for the display presentation? A. LCD B. LED C. CRT D. Plasma
A. LCD
Which of the following printer types uses an imaging drum? A. Laser B. Impact C. Inkjet D. Thermal
A. Laser
A user needs a new gaming computer which can be both fast and quiet. Which of the following should MOST likely be installed to meet the user's requirements? A. Liquid-based cooling system B. Passive cooling system C. Thermal paste D. Low RPM fans
A. Liquid-based cooling system
A technician notices that the PC is not receiving an IP address. Which of the following tools would the technician use to troubleshoot the computer’s NIC? A. Loopback plugs B. ESD mat C. Cable tester D. Toner probe
A. Loopback plugs
Which of the following components would MOST likely be utilized in a virtualization server? (Select TWO). A. Maximum memory B. High-end sound card C. High-end video card D. Dual-rail 1000w PSU E. Quad core CPU
A. Maximum memory And E. Quad core CPU
Which of the following network topologies would MOST likely be used to provide redundancy at each network device to support data transmissions? A. Mesh B. Ring C. PBX D. Bus
A. Mesh
Which of the following devices converts digital signals to analog ones? A. Modem B. Switch C. Hub D. Router
A. Modem
Which of the following would require the need for a POTS line? A. Modem B. Router C. Switch D. Hub
A. Modem
Which of the following expansion slots can ONLY be found on a desktop computer? A. PCI express B. Express Card 34 C. Express Card 54 D. PCMCIA
A. PCI express
Which of the following expansion slots would support the HIGHEST transfer speeds for high-end graphics cards? (Select TWO). A. PCIe B. AGP 8x C. PCI D. ISA E. AGP
A. PCIe And B. AGP 8x
For best performance, a high-end graphics card should be installed in which of the following slots? A. PCIe x16 B. AGP 4x C. PCI x2 D. PCI
A. PCIe x16
A technician has recently purchased a maintenance kit to be installed in a laser printer. Which of the following will be included in the maintenance kit? A. Pickup rollers B. Paper tray C. Toner D. Compressed air
A. Pickup rollers
You manage two folders in your computer as follows: * C:\Confidential * D:\PublicReports Both the C:\ and D:\ drives are formatted with the NTFS file system. In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: * Reports.doc * Costs.doc The D:\ drive allows the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions. You then take the following actions: * Move Reports.doc from C:\Confidentials to D:\PublicReports * Copy Costs.doc from C:\Confidential to D:\PublicReports What permissions do members of the Users group have to these two files in the D:\PublicReports folder?
Allow Full Control to both
IEEE 1394a
Also known as FireWire 400. See FireWire.
IEEE 1394b
Also known as FireWire 800. See FireWire.
Explorer
Also known as Windows Explorer, used for browsing through files and folders on Windows-based systems. It is not the same as Internet Explorer.
double-sided DIMM
Also known as double rank. Data on the DIMM is divided into two groups or ranks, and only one rank can be accessed at a time. DIMMs with chips on both sides can be single, dual, or quad rank. Compare to single-sided DIMM.
single-sided DIMM
Also known as single rank. A single-sided DIMM can access all RAM on the DIMM as a single group, or rank, of RAM. Single rank DIMMs almost always have chips on only one side of the DIMM. Compare to double-sided DIMM.
You are the administrator for your company and have been asked to get the company accounting program installed on some new Windows 7 laptops. When you install this software on the new PCs, you discover that it will not run because User Account Control (UAC) keeps causing it to fail. Because the accounting program was designed by the company and it will not be upgraded anytime soon, you must get it to work as is with the UAC. What can you do to get the application to work with UAC?
Alter the program settings to Run This Program As An Administrator
• You manage several Windows systems in a domain network. You try to install internally-developed accounting software on the new computers. However, you discover that it will not run because User Account Control (UAC) causes it to fail. Because the accounting will not be upgraded anytime soon, you must get it to work with UAC as-is. What can you do to get the application to work with UAC? (Choose the best solution.)
Alter the program settings to Run this program as an administrator.
AC voltage
Alternating current used by commercial power to transmit electricity to buildings. AC voltage is available at common electrical wall outlets, and power supplies convert AC to DC.
Which of the following will provide the BEST protection against power failures and data loss? A. Auto-switching power supply B. Uninterruptible power supply C. Line conditioner D. Surge suppressor
B. Uninterruptible power supply
MMC (Microsoft Management Console)
An empty console that can be populated with snap-ins to manage Windows.
SFTP (Secure FTP )
An encrypted version of FTP. It is encrypted with SSH over port 22.
HTTPS (Hypertext Transfer Protocol Secure)
An encrypted version of HTTP. It uses port 443.
IMAPS (Internet Message Access Protocol Secure)
An encrypted version of IMAP. It can be encrypted with SSL or TLS and uses port 993 by default.
POP3S (Post Office Protocol version 3 Secure)
An encrypted version of POP3. It can be encrypted with SSL or TLS and uses port 995 by default.
SMTPS (Simple Mail Transfer Protocol Secure)
An encrypted version of SMTP. It can be encrypted with TLS or SSL and uses port 465 by default.
Internet Protocol security (IP sec)
An encryption protocol used on internal networks and on the Internet. It is often used in virtual private network (VPN) tunnels.
SSL (secure sockets layer)
An encryption protocol. It is commonly used to encrypt traffic on the Internet, such as HTTP (as HTTPS). It uses port 443 when encrypting HTTPS.
SSH (Secure Shell)
An encryption protocol. It is commonly used to encrypt traffic within a network, such as FTP transmissions. SSH uses port 22.
TKIP (Temporal Key Integrity Protocol)
An encryption standard used with WPA. WPA with TKIP was an effective upgrade from WEP, but at this point, WPA2 with AES is recommended.
ATAPI (advanced technology attachment packet interface)
An enhancement of the ATA standard to support other drives such as CD-ROM and DVD-ROM drives. MNEMONIC: A tapping cd.
EIDE (enhanced integrated drive electronics)
An enhancement of the IDE standard. It is commonly referred to as PATA.
PCI (peripheral component interconnect)
An expansion card standard. It has largely been replaced by PCIe but is still used in some systems today.
POST card
An expansion card that can be used to view POST cards as a system boots. They are available in PCI and PCIe versions and include an LED display to show the boot progress.
ExpressCard
An expansion card used in laptop computers. Cards come in two versions: ExpressCard/34 and ExpressCard/54. Both can plug into the same type of ExpressCard slot. MNEMONIC: ExpressCard to Marry Larry
eSATA (external serial ATA )
An external connection for SATA devices. eSATA cables have additional shielding and can be as long as 2 meters.
toner
An extremely fine powder that includes carbon and plastic. It is transferred to paper and melted into the paper by a fusing assembly in the laser imaging process.
SDRAM (synchronous dynamic random access memory)
An improvement over DRAM, using a clock to synchronize data transfers. All DDR RAM is SDRAM.
DDR SDRAM (double data-rate synchronous dynamic random access memory)
An improvement over SDRAM that doubles the clock rate by using both the leading and trailing edge of the clock. DDR2 and DDR3 are upgrades to DDR.
UART (universal asynchronous receiver transmitter)
An individual chip or built-in feature in a Super I/O chip on a motherboard. It is used to translate data between serial and parallel.
MMX (multimedia extensions)
An instruction set used with Intel processors. AMD has a similar instruction set named 3DNow!.
DIP (dual in-line package)
An integrated circuit (IC) chip. DIP chips can be plugged into DIP sockets or soldered onto a board.
A user wants to secure their home wireless network and allow only certain devices access to the network. Which of the following measures would be the MOST effective means of limiting access? A. Turn off DHCP B. Use MAC filtering C. Disable DMZ D. Turn off SSID broadcasting
B. Use MAC filtering
A motherboard contains four memory slots. Two of the slots are colored blue and two of the slots are colored black. Which of the following would be the correct way to populate memory in the slots for best performance? A. Slower memory in both blue slots and faster memory in both black slots B. Memory that matches in speed and size in either both blue slots and both black slots C. Faster memory in both blue slots and slower memory in both black slots D. Place memory in either both black slots or both blue slots but not both at the same time
B. Memory that matches in speed and size in either both blue slots and both black slots
Which of the following is the FIRST step a technician should take to replace a network printer? A. Unplug the network printer then notify users. B. Notify all users before unplugging the printer. C. Save all print jobs, replace the printer and print all saved files. D. Delete all print jobs before replacing the printer.
B. Notify all users before unplugging the printer.
Which of the following network types BEST represents a network centered around one individual? A. LAN B. PAN C. Cloud D. MAN
B. PAN
Which of the following RAM types are compatible with PC2700 and maintain the same performance? A. PC 2400 B. PC 3200 C. PC2 4200 D. PC2 5300
B. PC 3200
Which of the following connectors from a power supply should be used with a graphics expansion card? A. 8-pin 12 volt B. PCIe 6-pin C. 20-pin D. SATA
B. PCIe 6-pin
A new security flaw and fix has been published about a laptop’s OS. Which of the following can be implemented to prevent exploitation? A. Enable screen lock B. Patching policy C. User training D. Enable hard drive encryption
B. Patching policy
Which of the following would a technician MOST likely perform to prevent a tripping hazard? A. Use an ESD mat B. Proper cable management C. Use plenum graded cable D. Proper documentation
B. Proper cable management
Which of the following would a technician MOST likely upgrade on a laptop? A. Video card B. RAM C. Wireless antenna D. LCD screen
B. RAM
A technician notices an impact printer has run out of ink. Which of the following should the technician do NEXT? A. Power cycle the printer B. Replace the ribbon C. Rewind the ribbon D. Replace the print head
B. Replace the ribbon
Which of the following storage media would be used to build a RAID 5 array? A. Dual layer DVDs B. SATA HDDs C. Flash drives D. Blu-ray discs
B. SATA HDDs
Which of the following memory form factors is MOST commonly found in laptops? A. SDRAM B. SODIMM C. RAMBUS D. DIMM
B. SODIMM
Which of the following devices is MOST likely to outperform a 15,000 rpm SAS hard drive in read speed? A. Compact flash B. SSD C. Tape D. SD
B. SSD
A technician is preparing to install a new wireless printer for use in an environment with several wireless networks installed. Which will be used to determine the wireless network that the printer will be available from? A. DNS B. SSID C. WPA D. VPN
B. SSID
A technician is repairing a printer in the payroll department that includes employees' sensitive information. Which of the following should the technician do with the printed sensitive information documents that were used for testing? A. Keep printed items for future reference. B. Shred the printed documents. C. Leave the documents on the printer. D. Recycle all printed documents.
B. Shred the printed documents.
Which of the following allows for the FARTHEST transmission distance for data? A. Bluetooth B. Single-mode fibre C. RG-6 cable D. CAT6 cable
B. Single-mode fibre
In reference to express card types (e.g. Express Card 34 and Express Card 54), which of the following BEST describes what the numbers indicate? A. Size of the memory allocation B. Size of the expansion slot C. The IEEE specification that it originated from D. Number of available communication channels
B. Size of the expansion slot
Which of the following hard drive types would be considered the MOST likely to survive a fall? A. SCSI B. Solid State C. IDE D. SATA
B. Solid State
Which of the following BEST represents a hardware requirement for building a PC that will specialize in gaming? (Select TWO). A. Large hard drive space B. Specialized cooling C. HDMI output D. TV tuner E. High-end graphics card
B. Specialized cooling And E. High-end graphics card
A computer turns on and a "Date and Time Not Set" message appears on the screen after the manufacturer logo. Which of the following is the MOST possible cause? A. The computer was not shut down properly. B. The CMOS battery needs to be replaced. C. The OS has stopped synching with the NTP server. D. The system BIOS is corrupted.
B. The CMOS battery needs to be replaced.
A PC technician must upgrade memory from 2 GB to 4 GB in twenty Windows 7 notebook computers. Some of the laptops have DDR2 memory, and some have DDR3. The memory purchased for the upgrade is DDR3. Which of the following is the MOST likely outcome of this upgrade? A. The DDR2 notebooks will work with DDR3 provided the DDR2 is installed in the first DIMM positions. B. The DDR3 notebooks are the only ones that will accept the new memory. C. The DDR2 memory will fit into the DIMM positions and work. D. The DDR3 memory will not work correctly unless the CAS (CL) values are the same.
B. The DDR3 notebooks are the only ones that will accept the new memory.
Which of the following describes the expected properties of an asynchronous digital subscriber line service? A. The data upload speed is faster than the data download speed. B. The data download speed is faster than the data upload speed. C. The data upload speed is the same as the data download speed. D. The data throughput speed direction can be selected based on the user’s discretion.
B. The data download speed is faster than the data upload speed.
A client wants a technician to install more RAM on their graphics workstation. The client has provided a 4 GB SODIMM and had problems installing it. Which of the following is the probable reason for this? A. Graphic workstations require flash memory B. The memory is incompatible for the workstation C. Graphic workstations require solid state memory D. The workstation has no available memory slots
B. The memory is incompatible for the workstation
Basic Internet web traffic generally travels on which of the following ports? A. 25 and 53 B. 53 and 8080 C. 80 and 443 D. 110 and 53
C. 80 and 443
You have a Windows 8.1 system to manage the book of accounts for a small company. The vendor of your accounting software recently released an update that you downloaded and installed. Unfortunately, now your accounting software crashes when launched. You need to get your system running properly as quickly as possible without losing your accounting files. What should you do? (Select two. Each choice is a required part of the solution.)
Boot the system from a recovery drive and select *Troubleshoot \ Advanced Options \ System Restore*. In Control Panel, select *System and Security \ System \ System Protection \ System Restore*.
You are using a Windows 8 system to work on the schedule for a very important project. You saved your files in the Documents library of your user account. Unfortunately, malware from a malicious Web site has infected your system. You were able to remove the infection with anti-malware software, but after shutting down you discover that Windows will not boot properly. You need your system back up and running properly as quickly as possible without losing your project files. You also need to minimize the risk of the infection spreading to other systems in the network. What should you do? (Select two. Each choice is a required part of the solution.)
Boot the system from a recovery drive. Boot *Troubleshoot \ Refresh your PC*.
Greg, a graphic artist, installs a new art application on his Windows 7 computer. The application prompts Greg to install an updated video driver, which is unsigned. Greg accepts the unsigned driver and completes the installation. Greg uses the system for several days, and then reports that his display doesn't seem to refresh properly under some conditions. You want to configure Greg's computer to use the previous video driver until the manufacturer provides a signed driver, but he still needs to be able to use the application he installed. What should you do?
Boot the system into Safe Mode. Open Device Manager and select the video driver. Open the driver's properties and select Roll Back Driver
You have connected a single drive to the primary IDE interface and a single drive to the secondary IDE interface. How should the drives be configured?
Both drives should be set to Master or Single Drive only
Which of the following wireless standards is backwards compatible with 802.11g? A. 802.11a B. 802.11b C. 802.11n D. 802.1q
C. 802.11n
• You work for a company with headquarters in Seattle and an office in Olympia. The office in Olympia has 5 client computers, all running Windows 7. The Olympia office is connected to the Seattle office with a WAN link. All servers are located in the Seattle office, and shared files are stored on those servers. You want to improve file access for users in the Olympia office to meet the ff. requirements: o Copies of files should be saved on the client computers in the Olympia office. o Only a single copy of each file should exist in the Olympia office. o Files should only be transferred once from the Seattle office to the Olympia office (unless the file has changed.). o Copies of files in the Olympia office should be shared and available to all computers in that office. o Files should be encrypted during transit between the two offices. Which features should you implement in the Olympia office?
BranchCache
A user calls to report that a notice keeps appearing on their screen whenever they try to pull down video clips from a website. The notice says "This category is being blocked because it is streaming media. Please click continue to use your assigned quota time". The technician is aware that a new web filtering application was recently implemented which assigns a 120 minute quota on streaming media and a message appears allowing the user to continue. Which of the following is the BEST response for the technician to give the user? A. "If you read the entire notice screen it clearly states that you should click continue. Did you read the entire notice?" B. "Since video takes a large amount of bandwidth, management has implemented a policy to limit what each user can download and watch." C. "A new application was introduced to help improve and manage the network. The video should appear once you select continue on the message." D. "Are these video clips work related? What specific website are you trying to download the videos from?"
C. "A new application was introduced to help improve and manage the network. The video should appear once you select continue on the message."
Which of the following is an example of a MAC address? A. 192.17.2.1 B. http:⁄⁄www.comptia.org C. 00-00-00-1B-02-55 D. 4309:FD21:ACB3:0012
C. 00-00-00-1B-02-55
A technician has just installed two memory modules on a motherboard that supports DDR3 RAM with the bus speed up to 1600 MHz. The specifications of memory are DDR3 1066 MHz for one module and DDR3 1333 MHz for another. On which of the following bus speeds will the system function? A. 800 MHz B. 1000 MHz C. 1066 MHz D. 1600 MHz
C. 1066 MHz
When unable to get an IP address from a server, which of the following represents an APIPA address that a PC might receive? A. 10.0.1.111 B. 65.71.1.111 C. 169.254.1.111 D. 192.168.1.111
C. 169.254.1.111
Which of the following voltages is MOST likely to be supplied from a PC power supply unit? (Select TWO). A. 1V B. 1.7V C. 3.3V D. 5V E. 9V
C. 3.3V And D. 5V
After responding immediately to a dispatch, a technician arrives to resolve the customer's issue. The customer appears to be angry that they have waited so long for a response. Which of the following is the BEST course of action for the technician to take? A. Inform the manager of the customer's behavior and then focus on completing the task in an expedited manner. B. Empathize with the customer's urgency and inform them that the current service level agreement allows for an eight hour response time. C. Empathize with the customer and focus on completing the task in an expedited manner. Upon closure, document the situation and inform the manager. D. Contact dispatch immediately and request to speak to a manager to determine the breakdown in the response time.
C. Empathize with the customer and focus on completing the task in an expedited manner. Upon closure, document the situation and inform the manager.
Which of the following connector types is only used for Coaxial? A. RJ-11 B. ST C. F D. RJ-45
C. F
Which of the following connection types has the LONGEST transmission limitation in terms of distance? A. USB 3.0 B. CAT6 C. Fiber D. CAT5
C. Fiber
A technician realizes the problem a customer is having before the customer is done explaining all the symptoms. Which of the following is the BEST action for the technician to take? A. Continue listening to the customer's explanation until they are finished then refer them to a website so the customer can find the proper resolution. B. Ask the customer to repeat the problem and all the symptoms several times in order for the technician to verify all the facts. C. Finish listening to the customer's explanation without interrupting if it will not take an excessive amount of time. D. Politely tell the customer that the technician knows the proper solution and that no further explanation is necessary.
C. Finish listening to the customer's explanation without interrupting if it will not take an excessive amount of time.
A user states that the display is not very bright on their laptop. Which of the following is the MOST likely location to adjust the brightness? A. In the Device Manager of the operating system B. In the BIOS C. Fn key D. In the video display drivers
C. Fn key
Which of the following BEST represents a hardware requirement for building a PC that will specialize in being a Home Server? (Select TWO). A. Virtualization support B. Touch screen interface C. Gigabit Ethernet D. RAID array E. Dual monitors
C. Gigabit Ethernet And D. RAID array
Besides the CPU, which of the following components might have their own heatsink? A. Audio card B. RAID controller C. Graphics card D. Hard drive
C. Graphics card
A client wants to store video and music in one central location and stream it to multiple devices. Which of the following would BEST fill this need? A. Home theater B. Virtualization workstation C. Home server D. Gaming
C. Home server
Which of the following provides the LEAST network security? A. Firewall B. Router C. Hub D. Switch
C. Hub
A laptop running a Windows operating system has a key that is supposed to launch Internet Explorer, but is not functioning. Which of the following will resolve this? A. Installing Bluetooth drivers from a manufacturer's website B. Installing ACPI drivers from a manufacturer's website C. Installing Hotkey drivers from a manufacturer's website D. Installing AHCI drivers from a manufacturer's website
C. Installing Hotkey drivers from a manufacturer's website
Which of the following devices is necessary to provide power to a laptop LCD screen? A. PCMCIA card B. Backlight C. Inverter D. PCI-E card
C. Inverter
Which of the following input devices allows multiple PCs to share a common display? A. Router B. Bridge C. KVM D. Wireless keyboard
C. KVM
Which of the following connector types is associated with a fiber connection? A. RJ-45 B. RJ-11 C. LC D. HDMI
C. LC
Which of the following can be implemented on a WAP to ensure that only certain client machines can access it? A. Wire encryption B. Disabling SSID C. MAC filtering D. Port forwarding
C. MAC filtering
Which of the following needs to be configured on a wireless router to allow specific client machines to connect? A. Port forwarding B. WPS C. MAC filtering D. DMZ
C. MAC filtering
Which of the following are the MOST important considerations when configuring a PC that will be used for a CAD ⁄ CAM workstation? (Select TWO). A. Gigabit NIC B. HDMI output C. Maximum RAM D. Powerful processor E. High end audio output
C. Maximum RAM And D. Powerful processor
A CAD⁄CAM user requires faster onscreen refresh rates. Which of the following slots allows for faster graphic performance? A. AGP B. AGP x8 C. PCIe D. PCI
C. PCIe
Which of the following expansion slots is characterized by having an x16 speed? A. CNR B. PCI C. PCIe D. AGP
C. PCIe
Which of the following is MOST likely to be reset during a standard printer maintenance? A. Print job cache B. Paper and tray settings C. Page count D. Job queue
C. Page count
A surge suppressor is only capable of providing protection against which of the following environmental hazards? A. Electrostatic discharge B. Power blackouts C. Power spikes D. Power brown outs
C. Power spikes
Before installing a new expansion card, which of the following should a technician consider? (Select TWO). A. CPU type B. Free hard drive space C. Power supply wattage D. Amount of RAM E. Bus type
C. Power supply wattage And E. Bus type
Which of the following describes the use of the DNS protocol as it relates to a TCP⁄IP network? A. Provides remote connectivity to resources on the network B. Provides separate control and data connections between network resources C. Provides mapping of user friendly names to network resources D. Provides automated addressing to resources on the network
C. Provides mapping of user friendly names to network resources
Which of the following cable types is commonly used for analog⁄digital television transmission? A. UTP B. CAT3 C. RG-6 D. SC
C. RG-6
Which of the following connectors is used to connect a DSL modem to a wall outlet? A. RJ-45 B. LC C. RJ-11 D. SC
C. RJ-11
A technician installs a biometric device using the manufacturer supplied driver. After confirming the device functions properly, the technician performs Windows and antivirus updates. Which of the following would BEST explain why the biometric device no longer functions? A. The recently updated antivirus scanning software is interfering with the proper operations of the biometric device. B. A virus that specifically targets retinal scanning software infected the PC because the user was late applying new definitions. C. The recently installed Windows updates overwrote the manufacturer's supplied biometric device driver. D. The biometric device needs to be recalibrated due to environmental conditions involved with the installation.
C. The recently installed Windows updates overwrote the manufacturer's supplied biometric device driver.
When installing a printer in Windows, which of the following is the purpose of the Additional Drivers button on the Sharing tab in the printer’s properties? A. To add additional drivers to emulate a different printer B. To add additional drivers for other printers on the computer C. To add additional drivers for other operating systems D. To add additional drivers for different printing modes
C. To add additional drivers for other operating systems
Chain of custody needs to be kept intact for which of the following reasons? A. To ensure data preservation during evidence inspection B. To ensure that the evidence is not left at the scene C. To ensure evidence is admissible in legal proceeding D. To ensure evidence is returned to proper owner
C. To ensure evidence is admissible in legal proceeding
Which of the following is required in order for BitLocker to be enabled? A. Drive encryption B. Group Policy C. Trusted platform module D. Power-on Password
C. Trusted platform module
Which of the following would BEST protect equipment from a brown out? A. HVAC system B. Surge suppressor C. UPS D. Power strip
C. UPS
Which of the following video cable types would be MOST likely to experience gradual, degraded signal quality over a long distance? A. HDMI B. DisplayPort C. VGA D. DVI
C. VGA
Which of the following connection types would MOST commonly be found on a laptop to display out to an external monitor? (Select TWO). A. PS/2 B. Serial C. VGA D. RCA E. HDMI
C. VGA and E. HDMI
A network consisting of numerous geographically dispersed networks that cover a large physical distance is referred to as a: A. WLAN. B. LAN. C. WAN. D. MAN.
C. WAN.
Which of the following features of a CPU socket is designed to make installation of a CPU easier? A. Plug and Play B. Lower latency C. Zero insertion force D. Heatsinks
C. Zero insertion force
The wireless antenna is typically located inside the laptop's: A. rear panel. B. keyboard. C. display bezel. D. bottom bezel.
C. display bezel.
CD-ROM (compact disc read-only media or compact disc read-only memory)
CDs released by manufacturers that have data on them. Data can be read from these discs, but it is not possible to write to them.
fiber
Cable type used in Ethernet networks. Data travels as light pulses along the cable. Common connectors are SC, LC, and ST.
coaxial
Cable type used in older Ethernet networks. It is similar to cable used to connect TVs to VCRs and DVD players. See RG-8 and RG-59.
L1 cache
Cache used by a CPU for short-term storage of data and instructions. It is the fastest and closest to the CPU.
L2 cache
Cache used by a CPU for short-term storage of data. It is used second after L1 cache and is slower than L1.
L3 cache
Cache used by a CPU for short-term storage of data. It isn't always used, but when it is available, it is used after L1 and L2 cache.
A user reports that they are unable to access their Firewire drive after moving the PC from beneath the desk to the top of the desk. What is the most likely cause of this problem?
Card is not seated properly
You have a Windows 7 system with two SATA HDDs, one used for the OS and the other used for data. You have traced recent problems to a fault in the system motherboard. You replaced the motherboard and reconnected all hardware. When you start the computer, the system shows the BIOS information screen, but then returns an error that an OS could not be found. What should you do?
Change the boot order in the BIOS
You have purchased an LED monitor and connected it to the DVI-I port using a DVI-D cable. You configure the screen resolution to 1440 x 900 with 24-bit color. The screen display seems to be fuzzy. What should you do to correct the problem?
Change the screen resolution to the native resolution of the monitor
You want to make sure that you always have the latest patches installed for an order entry application created by DataComLink corperation. What should you do?
Check the DataComLink Web site regularly for patches and updates to the software
• You work for a company with headquarters in Seattle and an office in Olympia. A single server in the Seattle office runs Windows Server 2008 R2 and holds all shared files for the company. The office in Olympia has 5 client computers, all running Windows 7. The Olympia office is connected to the Seattle office with a WAN link. You want to implement BranchCache in the Olympia office using Hosted Cache mode. Which of the ff. best describes the infrastructure requirements for this scenario?
Clients running Windows 7 Ultimate or Enterprise; server running Windows Server 2008 R2 or later in Olympia; Active Directory Certificate Services.
msinfo32
Command to start the System Information tool. Can be used to identify BIOS version, amount of RAM installed, processor type and speed, and much more.
cd
Command used to change a directory.
copy
Command used to copy files. An extended version is xcopy, which has many more capabilities.
del
Command used to delete files in a directory.
tlist
Command used to list running tasks or processes on a system. It has been renamed to tasklist.
tasklist
Command used to list running tasks or processes on a system. It was previously called tlist.
md
Command used to make a directory.
cmd
Command used to open the command prompt.
rd
Command used to remove or delete a directory.
shutdown
Command used to shut down, restart, or log off from a system.
dir
Command used to view a listing of files in the current directory.
attrib
Command used to view and manipulate file attributes including hidden, system, and read-only attributes.
regedit/regedt32
Commands used to start the registry editor.
twisted-pair cable
Common cable type used in Ethernet networks. Twisted-pair includes four pairs, uses RJ-45 connectors, and comes in shielded and unshielded versions.
UTP (Unshielded twisted-pair cable)
Common twisted-pair cable without shielding. Compare to STP.
• You work for a company with headquarters in Seattle and an office in Olympia. A single server in the Seattle office runs Windows Server 2008 R2 and holds all shared files for the company. The office in Olympia has 5 client computers, all running Windows 7. The Olympia office is connected to the Seattle office with a WAN link. You want to implement BranchCache in the Olympia office using Distributed Cache mode. Using Group Policy, you enable the ff. policies: o Turn on BranchCache o Set BranchCache Distributed Cache mode What else is required to complete the configuration?
Configure advanced firewall rules to allow the necessary ports.
You mange three computers that run windows 7 and a custom application. The application generates Event viewer events and logs those events to a custom log for the application. You would like to send all events from the application to a fourth computer where you can save and view the logs. What should you do?
Configure event subscriptions.
You have a Windows 7 computer shared by three users. Files that are used by all users are stored on the D:\ drive in folders. The users that have created hundreds of files on this drive are having a hard time finding the files they need. Which feature can you configure to improve access for users?
Configure indexing to include the D:\ drive
You have a computer running Windows 7 Professional. While managing the available memory for applications, you need to increase the paging file to the recommended size for normal circumstances. What should you do?
Configure the paging file to 1.5 times the amount of physical RAM.
You have a computer running windows 7 Enterprise. You use an external USB hard drive to store data files. You often find yourself waiting as Windows writes data to the external drive. Although it is portable, you rarely remove the external drive from the computer. You need to increase the access speed of the hard drive. What should you do?
Configure the write caching drive policies for better performance.
You manage a laptop that runs Windows 7. The laptop is shared by members of the Sales team. Sales team members use standard user accounts to log on to the computer. You want to allow users to change the system time and the time zone. You need to grant them this ability while limiting their ability to perform unrelated tasks. What should you do?
Configure user rights for the Sales group in the local security policy.
• You have a new notebook running Windows. You need to connect your computer to a wired network at work and a wireless network at home. While connected to the wired network, you set the default printer. You also want to configure a different printer to use when connected to your wireless network at home. In Devices and Printers, you click Manage default printers. Your home wireless network does not appear in the list of available networks. What should you do?
Connect to the wireless network.
BNC (Bayonet Neill-Concelmen or British Naval Connector)
Connector type used with coaxial cable.
RJ -11 (registered jack function 11)
Connector used for phone connections. It is smaller than the RJ-45 connector used in network cables.
RJ -45 (registered jack function 45)
Connector used for twisted-pair cable in Ethernet networks. RJ-45 connectors are larger than RJ-11 connectors.
LC (Lucent connector)
Connector used with fiber cables. It was developed by Lucent Technologies and is a miniaturized version of the SC connector.
• You have two computers: CompA is running Windows Vista Business and CompB is running Windows 7 Professional. You are using USMT to migrate only the user profiles and user data from CompA to CompB. You need to specify the rules used for the migration to include all .jpg files. What should you do?
Create a custom XML file and then use <include> statements to specify the file types to be included in the migration.
• You have two computers: WS1 is running Windows Vista Business and WS2 is running Windows 8.1 Professional. You are using USMT to migrate only the user profiles and user data from WS1 to WS2. You need to specify the rules used for the migration to include all .vmx and .vdmsk files. What should you do?
Create a custom XML file and use <include> elements.
Which of the following networking standards can operate at two different channel widths on the same spectrum simultaneously? A. 802.11a B. 802.11b C. 802.11g D. 802.11n
D. 802.11n
Which of the following standards would be used on a wireless router to support speeds up to 150 Mbps? A. 802.11a B. 802.11b C. 802.11g D. 802.11n
D. 802.11n
A user has a parallel printer and wants to share it on the company network. Which of the following devices would the user need? A. A port replicator B. A splitter C. A wireless router D. A print server
D. A print server
A technician documents the findings of illegal material that was found on a workstation. Which of the following should the technician do NEXT when storing the workstation? A. Set all users to administrators B. Destroy the hard drive C. Reimage the workstation and deploy D. Adhere to the chain of custody
D. Adhere to the chain of custody
Which of the following BEST describes the function of DHCP? A. Blocks MAC address with security violations B. Translates IP addresses to names C. Encrypts data traffic on a network D. Assigns IP addresses on a network
D. Assigns IP addresses on a network
authorization
Providing access to a resource. Authenticated users are granted authorized access to resources if they have appropriate permissions.
Primary system functions like basic boot priorities, voltage parameters for the processor, and SATA options are configured in which of the following areas of a PC system? A. MBR B. CMOS C. VRAM D. BIOS
D. BIOS
A user's laptop screen is extremely dim. A technician attempts to alter the brightness using function keys and the BIOS, but the screen never changes in brightness. Which of the following is MOST likely the cause? A. Battery failure B. Bulb failure C. Display driver is corrupted D. Backlight failure
D. Backlight failure
You have a computer that runs Windows 7 and a custom application. The application generates Event Viewer events and logs those events to the default Application and Security logs in the Event Viewer. As you monitor the application, you'd like to be able to do the following: * View all events related to the application from a single log. * View only the events related to the application and no others. * View the necessary events with minimal future configuration. * Save the Event Viewer configuration so that you can easily export and import the solution to other servers that will be running the application. What should you do?
Create a custom view.
• You manage a Windows system on a small home network. You want to share the ff. folders on your computer with other users on the network: o D:\Clipart o D:\Fonts o D:\VacationPictures You want to allow access to these folders while still meeting the ff. requirements: • Users will access all folders through a single share. • The share should include only these folders and no others. • The folders should remain in their current locations in the file system structure. What should you do?
Create a library. Add all folders to the library. Share the library with HomeGroup.
Your computer has a single HDD with a single volume by the C:\ drive. You have previously upgraded the disk to a dynamic disk. The disk has run out of disk space. You need to add more space to the C:\ volume. You add a new HDD to the computer. What should you do to add space to the C:\ drive?
Create a mount point using space on the second disk
You want to configure an application to automatically run every time a workstation is booted. How can you do this?
Create a shortcut to the application in the Startup folder of the Start Menu
You are responsible for managing client workstations for your company. A user reports that she can't turn her computer on. After some investigation, you find that the power supply is malfunctioning. What should you do next?
Create an action plan
Which term refers to a situation where two files try to claim the same cluster on the HDD?
Cross-linked clusters
You have a workstation running the 32-bit version of Windows Vista Business that you would like to upgrade to the 64-bit version.
Custom (advanced)
Which of the following socket types is for an Intel CPU? A. F B. 940 C. AM3 D. 1156
D. 1156
Which of the following is representative of a class C address type? A. 10.15.1.4 B. 169.254.125.15 C. 172.20.15.5 D. 192.168.1.15
D. 192.168.1.15
If a technician is trying to remote into a computer through a firewall, which of the following ports, by default, MUST be forwarded? A. 21 B. 25 C. 110 D. 3389
D. 3389
Which of the following ports MUST be open to connect to a PC using RDP? A. 21 B. 80 C. 443 D. 3389
D. 3389
Which of the following is the MAXIMUM transfer speed of USB 2.0? A. 100 Mbps B. 400 Mbps C. 420 Mbps D. 480 Mbps
D. 480 Mbps
A supervisor has asked a technician to share the multifunction device that is directly connected to a PC. The PC is running Windows XP Professional. Which of the following steps are valid options to allow the technician to complete this task? A. Type "appwiz.cpl" at the run line and install the printer as a shared device. B. Start >All Programs >Control Panel >Network Connections >Right click on desired printer and go to "Sharing". Select the option to share the printer and give it a share name. C. Start >All Programs>Control Panel >Scanners and Cameras >Right click on desired device and go to "Sharing". Select the option to share the device and give it a share name. D. Start >All Programs >Control Panel >Printers and Faxes >Right click on desired printer and go to "Sharing". Select the option to share the printer and give it a share name.
D. Start >All Programs >Control Panel >Printers and Faxes >Right click on desired printer and go to "Sharing". Select the option to share the printer and give it a share name.
Which of the following settings, when enabled, is MOST likely to result in an IP address conflict on a local network? A. Custom DNS address B. QoS enabled C. UPnP enabled D. Static IP address
D. Static IP address
Which of the following media types is BEST for backups of very large storage systems? A. Blu-Ray B. CD-ROM C. DVD D. Tape
D. Tape
Which of the following is the BEST example of the use of chain of custody? A. Technician uses a third party to hand over the PC to the proper authority. B. Technician remembers when and who they gave the PC to. C. Technician calls supervisor after PC has been transferred. D. Technician notes the date, time and who was given the PC.
D. Technician notes the date, time and who was given the PC.
A technician is trying to connect the high-end 5.1 surround sound audio system to their Home Theater PC. Front and rear channels produce the sound but the subwoofer and the front speaker seem to be muted. Which of the following would the technician MOST likely check to resolve the issue? A. The power cable of the 5.1 surround sound audio system. B. The subwoofer and the front channel speaker drivers are installed properly. C. The subwoofer and the front channel speakers are not defective. D. The subwoofer and the front channel speaker's RCA cable connection to the computer's audio card.
D. The subwoofer and the front channel speaker's RCA cable connection to the computer's audio card.
A customer would like assistance with choosing the appropriate PCs for opening an Internet café. The customer explains to the technician that the PCs would only be used to search the Internet. Which of the following would the technician suggest? A. Thick client B. Gaming PC C. Media PC D. Thin client
D. Thin client
A technician must trace a network cable from a user’s desk to the punch down block in the wiring closet. Which of the following tools would be the BEST choice? A. Cable tester B. Multimeter C. Loopback plug D. Toner probe
D. Toner probe
A customer asked the technician to upgrade the RAM in a laptop. Upon inspection of the RAM bay, the technician only found one RAM slot, however the laptop is specified to have two. Where would the other memory slot be typically located? A. Inside the display bezel B. Second hard drive bay C. Above the PC card slot D. Under the keyboard
D. Under the keyboard
Which of the following video types has a DB-15 connector? A. S-video B. DVI-A C. DVI-D D. VGA
D. VGA
A client wants to take their old VCR tapes and put them on a DVD. Which of the following expansion cards would need to be installed in a computer to perform this task? A. TV tuner B. Video graphics C. Sound D. Video capture
D. Video capture
Which of the following encryption types is the LEAST secure? A. WPA B. AES C. TKIP D. WEP
D. WEP
In which of the following situations is it appropriate for an IT service provider to make copies of a custome's confidential data? A. If the technician determines it necessary, for backup purposes B. It is never appropriate to copy a customer's data C. If the content is public knowledge D. With the customer's permission, for backup purposes
D. With the customer's permission, for backup purposes
A technician is looking to install a 3.5 inch desktop hard drive into an external enclosure. Which of the following input interfaces would provide the MOST throughput for the drive? A. USB 2.0 B. IEEE 1394 C. Bi-Directional Parallel D. eSATA
D. eSATA
Which of the following connection types is MOST commonly used to connect external hard drives to a PC? (Select TWO). A. SATA B. PATA C. IDE D. eSATA E. USB
D. eSATA And E. USB
The process of voltage control to limit the volume of liquid delivered is used in: A. laser printers. B. thermal printers. C. impact printers. D. inkjet printers.
D. inkjet printers.
Which of the following is typically used for large data backups of server?
DLT tape
Which of the following media types is not hot swappable?
DVD drive with an IDE interface
DVD-ROM (digital video disc read-only media or read-only memory)
DVDs released by manufacturers that have data on them. Data can be read from these discs, but it is not possible to write to them.
broadcast
Data sent from one computer to all other computers in the same network. The IPv4 broadcast address is 255.255.255.255. MNEMONIC: Broadcasting from Honolulu.
unicast
Data sent from one computer to one other computer.
What utility would you use to realign the file structure on the disk to optimize performance?
Defrag
Which of the following Windows utilities would you use to realign the file structure on the disk to optimize performance?
Defrag
The D:\ drive in your computer has been formatted with NTFS. The Mary user account has been assigned the following permissions: * Allow Full Control to the D:\Reports folder * Deny Full Control to the D:\Sales folder * Deny Full Control to the D:\Reports\2010Rorts.doc file * Allow Full Control to the D:\Sales\2010sales.doc file What effective permissions does Mary have to both files?
Deny Full Control to both
Users have been experiencing periodic system lockups that generate the same error message. After checking Microsoft's Web site, you find that a hotfix is available to address the issue. What should you do next?
Deploy the hotfix on a test computer
resolution
Describes the width and height of a display in pixels. Higher resolution results in a crisper display.
ou have a computer that runs Windows 7. You are troubleshooting a problem that keeps occurring. When the problem happens, there are several Warning and Error events logged to the Application and System logs in Event Viewer, which you are using a Custom View to examine. After several days, there are several events int he Custom View. You would like to clear the messages from the view sot hat you only see messages starting from right now. You need to make sure that any messages in the corresponding logs still exist. What should you do?
Edit the Custom View properties and create a custom range for logged events, starting with today's date.
You have a computer that runs Windows XP Professional. You want to upgrade your computer to Windows 7 Professional. You want to customize the migration of application, user profile, and user data. What should you do? (Select two. Each choice is a required part of the solution.)
Edit the MigApp.xml and MigDocs.xml files Run Scanstate.
You have two computers: ComputerA is running Windows Vista Business and ComputerB is running Windows 7 Professional. You are using USMT to migrate only the user profiles and user data from ComputerA to ComputerB. You need to specify the fules used for the migration to include all .jpg files. What should you do?
Edit the MigUser.xml file.
You have a computer running windows 7 Enterprise. The computer is a member of a workgroup. For several months, the computer acted like a sever in the workgroup. It was optimized to share files and folders to the other computers. You no longer need the computer to act like a server. You want the computer to focus on applications which are found on typical workstations. After installing the applications, you believe the computer is not reacting quickly enough while using the applications. You know the machine has enough video memory and physical memory to handle the applications. What should you do?
Edit the Processor Scheduling settings.
You have a computer that runs Windows 7. The computer has two hard drives, both formatted with NTFS. You have enabled System Restore on both disks. You want to delete all restore points, but still be able to make new restore points for both dries. What should you do?
Edit the System Protection settings in System Properties and delete the restore points.
• You work on a Windows desktop system that is shared by three others users. You notice that some of your documents have been modified. You want to use auditing to track any changes to your documents. In the audit policy in the local security policy, you enable auditing of successful object access events. To test auditing, you make some changes to some files. However, when you examine the computer's Security log, no auditing events are listed. You want to make sure an event is listed in the Security log whenever one of your documents is modified. What should you do?
Edit the advance security properties of the folder containing your documents.
• The D:\ drive in your computer has been formatted with NTFS. The Sales group on your computer has been given Allow Modify to the D:\ Sales Folder. The Mary user account is a member of the Sales group. You want to accomplish the ff: o Mary should not be allowed access to the D:\Sales\2010sales.doc file. o Mary should be able to read, write, and create new files in the D:\Sales folder. o Your solution should not affect the abilities of others Sales group members to access files in the D:\Sales folder. What should you do?
Edit the properties for the file; assign Mary the Deny Full Control permission.
The D:\ drive in your computer has been formatted with NTFS. The Sales group on your computer has been given Allow Full Control to the D:\Sales folder. The Mary user account is a member of the Sales group. How can you prevent Mary from accessing the D:\Sales\2010sales.doc file without affecting any other files in that folder and without affecting the abilities of any other users?
Edit the properties for the file; assign Mary the Deny Full Control permissions
You want to set the encryption attribute for the C:\payroll.xls file. What should you do?
Edit the properties of the file in Windows Explorer
A user sends a print job to a network printer and it prints page after page of random characters. He calls the help desk and a technician discovers that somehow the wrong printer driver has been loaded on the user's workstation. The technician loads the driver, verifies that the system works correctly, and documents the solution. What else should she do?
Educate the user as to how the problem was resolved and verify that they are satisfied with the results
HDD (hard disk drive)
The most common type of hard drive in computers. It includes spinning platters and read/write heads.
You have two Win systems named Comp1 and Comp2. Both computers are members of domain. You have a domain user account named EFS-Recovery. You use the user account to recover some files on Comp1. You need to recover some files on Comp2, but are unsuccessful. What should you do?
Export the recovery agent keys from Comp1 and import them to Comp2.
You need to install Windows 7 Enterprise edition on multiple computers. You have an ISO image of the Windows 7 Enterprise edition installation disc that you will use for the installation. You want to boot the computer to a command prompt, connect to a network share, and then run setup from the shared folder. You create a shared folder named WinInstall on a server. What should you do? (Select two. Each choice is a required part of the solution.)
Extract the ISO image and copy all files in the image to the shared folder. Create a bootable disc with WinPE and the necessary network drivers. Edit the BIOS to boot from the optical drive first.
You have a Windows computer running Windows 7. You need to format a 64 GB flash drive as a single volume. You want the drive to support quick removal, and minimize memory and processor use when reading and writing to the drive. Which file system should you choose?
FAT64
You have a computer running Windows 7. You need to format a 64 GB flash drive as a single volume. You want the drive to support quick removal, and minimize memory and processor use when reading and writing to the drive. Which file system should you choose?
FAT64
rogueware
Fake antivirus software. Also called scareware or ransomware.
Which of the following is an advantage of SATA over PATA?
Faster data transfer speed
You have a computer that runs windows 7. You want to see the amount of disk activity that is generated by an application. What should you do?
Filter on the application in Resource Monitor.
You have a computer that runs windows 7. You want to see memory statistics for a specific process. You need to view the working set, shareable, and private memory for the process. What should you do?
Filter on the process in Resource Monitor.
BIOS (Basic Input/Output System)
Firmware stored on a chip on the motherboard. It stores the instructions for starting the computer and includes a program used to change some settings. Current systems commonly store this on flash memory. BIOS is updated by a process called flashing.
You currently use a Win7 Ultimate desktop system. You have been asked to evaluate Win8.1 Enterprise as a possible upgrade for the Win7 systems you manage. You decide to install Win8.1 in a VHD file on your Win7 system. To ensure that the evaluation is realistic, you need to ensure the best possible performance. Which type of VHD file should you use?
Fixed Size.
You are working on a Windows XP system and want to synchronize the offline files on your computer with the versions on the network. Which tool would you use?
Folder Options
Which Windows component can be used to display information such as weather forecasts, time, and news headlines on the desktop?
Gadgets
You have a computer that runs windows 7. The computer is a member of a domain. windows Update settings are controlled through Group Policy. You need to determine if a specific security update from Windows Update is installed on the computer. What should you do?
Go to Programs and Features in the Control Panel
You have a custom database application that your company has been using for several years. The application works fine on all of your Windows XP systems. You have just purchased a new Windows 7 system for one of your sales team members. You make this user a member of the Users group on the local system. You install the custom application successfully. When the sales person logs on and tries to run the application, the program splash screen loads but then seems to hang. What should you do first?
Grant the user permissions to the directories and files used by the application.
Ethernet
Group of specifications for most wired networks in use today. It includes specifications for cables, communication devices, and how data is transferred.
802.11
Group of wireless protocols. 802.11a uses 5.0 GHz and has a maximum speed of 54 Mbps. 802.11b uses 2.4 GHz and has a maximum speed of 11 Mbps. 802.11g uses 2.4 GHz and has a maximum speed of 54 Mbps. 802.11n uses 2.4 and 5.0 GHz and has a maximum speed of 600 Mbps. MNEMONIC: 802 Fashion Teeth took A Lazy Lawyer and a Bee to Norway in a Toyota. Gee, a Norway Lawyer aNd Norway laws. Jesus!
Which component within a tablet device measures acceleration horizontally and vertically at the same time?
Gyroscope
• Installed desktop applications on a Windows system that are displayed in Programs and Features typically have associated entries in which Registry key?
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall.
You need a storage device that has very large storage capacity, is fast, and relatively inexpensive. Which storage devices will best suit your need?
Hard Disk
Which storage device use magnetic film or aluminum platters for storing data?
Hard disk and Floppy Disk
Which statement is true regarding IDE master and slave settings?
If two IDE devices share the same channel, one device must be set to master and the other must be set to slave
• You have a new notebook computer running Windows. You need to connect your computer to a wired network at work and a wireless network at home. While connected to your network, you set the default printer. You want to configure a different default printer to use when connected to your home network. What should you do?
In Device and Printers, click Manage default printers.
You manage a Windows system with a printer connected to it that is shared with the name Printer1. You need to modify the permissions that apply to the shared printer for network users. What should you do?
In Devices and Printers, right-click the printer and select Printer properties. Edit the Security settings.
You have two computers that run window 7: Computer 1 and Computer2. You have configured event subscriptions with the default settings to forward events from these two computers to a third Windows 7 computer, Computer3. You want to view the events from these two computers on Computer3. What should you do?
In Event Viewer, open the ForwardedEvents log.
Professional. The computer has a standard SVGA graphics adapter. You upgrade the graphic card with a new adapter that should support Aero, but you are still unable to use Aero. You need to enable Aero with the minimum amount of effort. What should you do?
In Performance Information and Tools, click Re-run the assessment.
You have a Windows 7 computer. You have created a custom Library using D:\Stats as the path to the Library. You want the files in the D:\Reports folder to be available in the Library you created. The files should also still be accessible using the D:\Reports folder. What should you do?
Include the D:\Reports folder in the Library
A user reports that he can't browse to a specific Web site on the Internet. From his computer, you find that a ping test to the Web server succeeds. A trace route test shows 17 hops to the destination Web server. What is the most likely cause of the problem?
Incorrect DNS server address
You use Windows 8.1 desktop system to edit and produce audio files. Your system has two hard disks installed. Your applications are installed on the C: volume on the first hard disk. Because of the size of the audio files you produce, you keep them on a separate volume (D:) on the second hard disk. You need to configure system protection on this system to maximize system protection. What should you do?
Increase the amount of disk space reserved for restore point on C:.
You are working as a desktop technician for a small company. You recently bought a new desktop computer with 6 GB RAM and a video card with 512 MB of memory. You want to install Windows 7. You need to use the edition of Windows 7 that will use the full 6 GB of available RAM. What should you do?
Install Windows 7 64-bit Enterprise edition
You have several computers in a domain network. Your company develops software that runs on bot Windows XP and Windows 7. Programmers need to have computers that will dual boot between Windows XP and Windows 7. You need to configure each system to meet the programmer's requirements. What should you do?
Install Windows XP first, and then install Windows 7 on another partition.
A manager wants you to install a Serial ATA HDD into his computer, but the motherboard does not have a Serial ATA connector. What should you do?
Install a Serial ATA host adapter in an expansion slot
You want to upgrade your Windows XP Professional computer to Windows 7 Professional (32-bit). You begin by checking the hardware and discover it has 1 GB of RAM, a Pentium 2.2 GHz processor, an 8 GB solid state drive, and a video adapter with 256 MB RAM and DirectX 9 supported. What should you do to ensure that you have a successful installation?
Install a larger solid state drive or HDD
You would like to control Internet access based on users, time of day, and Web sites visited. How can you do this?
Install a proxy server. Allow Internet access only through the proxy server
You are a desktop technician for a small company and recently installed Windows 7 on an older workstation. Once complete, you notice that the Flip 3D feature is not available. You need to enable Flip 3D. What should you do?
Install a video card that supports Aero
Your computer currently runs Windows 7 Enterprise edition. You want to create a RAID 10 array using four newly-installed SATA disks. When you go to Disk Management, the option to create the RAID 10 array is not available. What should you do?
Install an add-on RAID controller
You are installing a floppy drive. You want the floppy drive to be the A: drive. How do you do this?
Install the drive after the twist in the ribbon cable
You have a 32-bit computer that runs Windows Vista Business RTM that you would like to upgrade to Windows 7 Ultimate. Your computer has the ff. specifications: • 1 GHz processor • 1 GB RAM • 128 MB video card • 16 GB free disk space • DVD drive You would like to perform the upgrade with the least amount of effort possible. What should you do first?
Install the latest service pack
You have a 32-bit computer that runs Windows Vista Business RTM that you would like to upgrade to Windows 7 Ultimate. Your computer has the following specifications: 1 GHz processor 1 GB RAM 128 MB video card 16 GB free disk space DVD drive You would like to perform the upgrade with the least amount of effort possible. What should you do first?
Install the latest service pack
Which of the following actions taken on a Windows workstation will directly improve system security?
Install the latest updates
You are the desktop administrator for your company. Heather is a sales representative that travels frequently with her laptop. During one of her visits to the main office, she asks you to upgrade her computer to Windows 7. You perform the upgrade to Windows 7 and return the laptop to Heather. A month later, while sitting in an airport, Heather boots her laptop to get ready for her latest sales presentation. However, she is unable to use Windows. She calls you and admits that she never activated the OS as instructed. She cannot connect to an Internet connection in the airport and her laptop does not have a modem. You need to ensure that Heather can boot up her laptop and give her presentation on time. What should you do?
Instruct Heather to call Microsoft and activate the OS over the phone
• Rodney, a user in the research department, uses a Windows notebook system with a single NTFS volume. Rodney shares the notebook system with his manager, Kate. Rodney stores private company documents in the C:\Data folder on his notebook. Both Rodney and Kate access the documents when they are using the notebook. Rodney is concerned about the documents falling into the wrong hands if his notebook is stolen. Rodney wants to protect the entire contents of the C:\Data folder. You want to help Rodney encrypt the contents of the C:\Data folder so that Kate and Rodney are the only authorized users. What should you do?
Instruct Rodney to log on to his computer, edit the properties of the C:\Data folder, and enable encryption. Add Kate as authorized user for each file in the C:\Data folder.
You are the network administrator for a small company. You purchase eight copies of Windows 7 at a local retail outlet. You install Windows successfully on eight computers in the office. A month later you start receiving calls from those who have used those copies of Windows saying that they are no longer able to log on to their computers. What should you do?
Instruct the employees to activate their Windows installation
Don is an accountant in the Finance department, and for the last several months has been testing an online accounting program. After speaking with his manager, Don received permission to download a steamlined version of the software which requires a local installation. After downloading, Don tried to install the application, but the OS will not allow it. Out of frustration, he called the Help Desk. The Help Desk personnel came to Don's machine and installed the application without issue. Which of the following is the most likely reason Don could not install the application?
Insufficient permissions
RFI (radio frequency interference)
Interference caused from radio transmissions, such as from cordless phones and microwaves.
EMI (electromagnetic interference)
Interference from magnetic fields, such as from power cables, motors, and magnets.
You are troubleshooting network connectivity issues on a Windows workstation. Which command would you use to view the MAC address of the network adapter?
Ipconfig /all
authentication
Proving an identity. The three factors of authentication are something you know (such as a password), something you have (such as a smart card), or something you are (using biometrics).
Which of the following is true of the Guest user account on a Windows system?
It is disabled by default
WEP (Wired Equivalent Privacy)
Legacy security protocol used with wireless networks. It should not be used today.
WPA /WPA 2 (Wi-Fi Protected Access)
Newer security protocols used with wireless networks. WPA2 is the newest and the most secure.
Which tool can you use to view, but not modify, hardware and configuration information for your computer?
Msinfo32
Which feature allows a tablet to recognize multiple finger touches at the same time?
Multi-touch
What is required to control access to the file system using file and folder permissions on a Windows-based computer?
NTFS-formatted partition
You have booted your Windows 7 workstation into Safe Mode and enabled Boot Logging. To which log file is the boot logging information now being written?
NTbtlog.txt
How can you see a list of valid command parameters for the net command?
Net /?
A user has a problem accessing several shared folders on the network. After determining the issue is not from his computer's IP configuration, you suspect the shared folders are not currently connected. Which of the following commands will confirm your suspicions?
Net use
Which utility would you use to view current connections and active sessions and ports on a computer?
Netstat
• Management has decided to purchase new tablet systems for the administrative assistants in your organization. After conducting a needs assessment, they have determined that the new systems must meet the ff. requirements: o They must be joined to the organization's existing Active Directory domain. o Whole-disk encryption must be implemented with Device Encryption. o They must support User Account Control (UAC) to prevent unauthorized application privilege escalation. A sales re from a computer manufactured recently offered you a very competitive price on Windows RT tablet systems. Can you use these systems in this implementation?
No, Windows RT does not support domain join.
To protect your Windows 7 system, you've used System Restore to automatically protect your system using restore points. Will this adequately protect your data?
No, you need to create a backup of your user data as well
To protect your Windows 7 system, you've used System Restore to automatically protect your system using restore points. You've also used Backup in Control Panel to configure a nightly backup of your user's data files. Will this adequately protect your system in the event of a HDD failure?
No, you need to create an image of your Windows system as well
• You need to work on several key projects over the weekend on your Windows Vista desktop system at home. However, one of the applications you need to complete your work only runs on Windows 8.x. You decide to create a Windows To Go drive so you can take your computer environment home from work. You have a PNY 32GB 2.0 flash drive that you want to use for the Windows To Go drive. Will this configuration work?
No, you should use a USB 3.0 device to create a Windows To go Drive.
You are testing the power supply in a PC system by measuring the voltage available on the 4-pin Molex connector. The voltage on the red wire is +5.1 volts. What should you do?
Nothing, the power supply is working normally
A user is having problems connecting to other computers using host names. Which of the following commands will help you troubleshoot this problem?
Nslookup
Examine the following output: Server: helicuplar.xct.net Address: 209.53.4.130 Name: westsim.com Address: 64.78.193.84 Which command produced this output?
Nslookup
Which tool can you use in Control Panel to control how times, dates, numbers, and currency are formatted and displayed for your computer?
Region and Language
• You have a workstation running the 32-bit version of Windows Vista Business that you would like to upgrade to the 32-bit version of Windows 7 Professional. You want to perform the upgrade with the least amount of effort and cost. What should you do first?
Perform an Upgrade using the Windows 7 installation disc.
Which of the following components can be updated using the Windows Update service?
OS and critical driver files
You are managing two computers: Comp1 is running Windows 7 Ultimate; Comp2 is running Windows XP Professional. You want to use Remote Desktop to manage Comp1 from Comp2. What should you do?
On Comp1, enable the 'Allow connections from computers running any versions of Remote Desktop' option in the system properties.
You have two computers running Windows 7: comp1 and Comp2. Both computers are members of a domain. You need to ensure that you can remotely execute commands on comp2 from comp1. What should you do?
On Comp2, run "winrm qc"
You have two computers running Windows 7: comp1 and Comp2. both computers are members of a domain. Windows Remote Management (WinRM) is enabled on both computers. From comp2, you need to create an additional disk volume on comp1. What should you do?
On Comp2, run "winrs" and then run "diskpart"
You have computers: ComputerA is running Windows Vista and ComputerB is running Windows 7. You need to migrate all user profiles and data files from CompA to CompB. You need to ensure the user accounts on the destination computer are created and enabled during the migration. What should you do?
On CompB, run loadstate with /lae and /lac options.
You have two computers: ComputerA is running Windows Vista and ComputerB is running Windows 7. You need to migrate all user profiles and data files from ComputerA to ComputerB. You need to ensure the user accounts on the destination computer are created and enabled during the migration. What should you do?
On ComputerB, run loadstate with the /lae and /lac options.
master
On PATA drives, the IDE drive that is designated as the first device. Compare to slave.
slave
On PATA drives, the IDE drive that is designated as the second device. Compare to master.
• You have two computers: WS1 is running Windows 7 and WS2 is running Windows 8.1. You need to migrate all user profiles and data files from WS1 to WS2. You need to ensure the user accounts on the destination computer are created and enabled during migration. What should you do?
On WS2, run loadstate with the /lae and /lac options.
You have two computers that run Windows 7: computer1 and Computer2. Over the next few days, you want to monitor Computer1. You would like to automatically save the contents of the Application and System logs on Computer 1 to Computer2. You will then use Event Viewer on Computer2 to view the contents of the logs generated on Computer1. What should you do?
On both computers, enable and configure Event Subscriptions. Configure Computer1 as a source, and Computer2 as a collector.
You need to install Windows 7 Enterprise edition on multiple computers. Each computer has a single SATA hard drive, a PXE-compliant network card, a DVD drive, and several open USB ports. You have decided to use Windows Deployment Services (WDS) to simplify installation. You configure the WDS server with everything necessary to perform the installation. When you start each computer, you would like the computer to boot, connect to the WDS server, and start the installation process automatically without any intervention. You want to minimize the actions that you must perform on each computer. What should you do next?
On each computer, edit the BIOS to boot from the network first.
• You need to install Windows 7 Enterprise edition on multiple computers. Each computer has a single SATA hard drive, a PXE-compliant network card, a DVD drive, and several open USB port. You have decided to use Windows Deployment Services (WDS) to simplify installation. You configure the WDS server with everything necessary to perform the installation. When you start each computer, you would like the computer to boot, connect to the WDS server, and start the installation process automatically without any intervention. You want to minimize the actions that you must perform on each computer. What should you do next?
On each computer, edit the BIOS to boot from the network first.
You have a computer that runs Windows 7. You are troubleshooting a problem that keeps occurring. When the problem happens, there are several Warning and Error events logged to the Application and System logs in Event Viewer. You would like to be able to see only the Warning and Error events from both logs displayed at the same time. You want to save this configuration so that you can check back each day to see any new errors. What should you do?
On the Application log, filter the log to show only Warning and Error events. Save the filter to a Custom View, adding the System log as an additional filter.
You have a computer running Windows 7 Ultimate. While connecting to a computer using Remote Desktop, you need to prevent the desktop background on the remote computer from displaying on the local computer. What should you do?
On the Experience tab of the Remote Desktop connection, clear the Desktop Background Option.
You have a computer with a single HDD configured as a basic disk with a single partition formatted with FAT32. The computer runs Windows XP Professional. The disk has ran out of space. You need to add space to the disk. You install a new HDD and start Disk Management. Which of the following is a required task to add space to the existing volume?
On the new HDD, create a new partition without a drive letter
You are installing Windows 7 on a new computer. Using the RAID controller on the motherboard, you configure three hard disks in a RAID5 array. You leave the array unpartitioned and unformatted. You edit the BIOS boot order to boot from the optical drive. You insert the installation DVD, boot to the disc, and start the installation. When you are prompted to select the disk where you want to install Windows, the RAID array you created does not show as a possible destination disk. What should you do?
On the screen where you select the disk to install Windows, click Load Driver.
• You are installing Windows 7 on a new computer. Using the RAID controller on the motherboard, you configure three hard disks in a RAID5 array. You leave the array partitioned and unformatted. You edit the BIOS boot order to boot from the optical drive. You insert the installation DVD, boot to the disc, and start installation. When you are prompted to select the disk where you want to install Windows, the RAID array you created does not show as a possible destination disk. What should you do?
On the screen where you select the disk to install Windows, click Load Driver.
You have been having trouble with your laptop crashing. You would like your computer to create a memory dump file when it crashes. Where should you place the swap file?
On the system partition
Security log
One of the logs in Event Viewer. It records security events, such as when users enter incorrect passwords.
System log
One of the logs in Event Viewer. It records system events, such as when a service fails to start.
Application log
One of the logs in the Event Viewer. It records events from applications.
Computer Management
One of the tools in the Administrative Tools group. It includes several snap-ins, organized in three groups: System Tools, Storage, and Services And Applications.
Event Viewer
One of the tools in the Administrative Tools group. It provides access to view Windows logs, such as the Application log, the Security log, and the System log.
loadstate
One of the two commands included with the User State Migration Tool (USMT). Loadstate loads files and settings onto a new installation. Scanstate must be run first to capture the information from the original installation.
scanstate
One of the two commands included with the User State Migration Tool (USMT). Scanstate is run on a computer to capture files and settings. Loadstate is later run on the new installation to load the information captured from scanstate.
Intel
One of the two primary manufacturers of CPUs. AMD is the other.
chipset
One or more integrated circuit (IC) chips on the motherboard that provide an interface between the CPU and the rest of the system. Compare to north bridge and south bridge.
You have a Windows 7 computer that you would like to manage remotely. You enable Remote Desktop on the computer. While working from home, you find that your home firewall is blocking Remote Desktop, preventing a connection to the Windows 7 computer What should you do?
Open port 3389 in the network firewall.
You suspect that a process on your windows 7 computer is causing a large amount of network activity. You would like to view the network activity on your computer filtered by specific processes. Select the link that you would choose to view this information.
Open resource Monitor
You have a computer running Windows 7 Ultimate. After running the Backup and Restore console, you notice that backups are not created for open files. To troubleshoot the issue, you want to confirm that the Volume Shadow Copy Service (VSS) is started and is configured to start automatically when the computer boots. What should you do?
Open the Services snap-in.
You have a computer that runs Windows 7. You started using the computer three months ago. Since that time, you have found that, from time to time, the system has had slowdowns and crashes. You want to look at a report that shows important events for the server since it was installed. you'd like to see when software was installed, along with any hardware or application failures. You want to view this information with as little effort as possible. What should you do?
Open the System Stability Chart in Reliability Monitor.
PRI (primary rate interface)
PRI is associated with ISDN and includes 23 64-Kbps data channels and one 16-Kbps signal channel. In North America, it's called a T1 line.
EPROM (erasable programmable read-only memory)
PROM that can be erased. It has a small window, and data can be erased by shining ultraviolet light into the window. The program is typically rewritten by using specialized hardware. See ROM, PROM, and EEPROM.
You have a computer that runs Windows 7. The computer has two hard disks, one internal disk and one removable hard disk. You complete a full system backup and schedule regular backups of the system drive. All backups are saved to the removable hard disk. You also enable system protection on the system disk. The disk holding the operating system fails. You replace the disk with a new one, and now need to get the system running again as quickly as possible. You boot the computer to the Windows installation disc. What should you do?
Perform a system image recovery.
EFS (encrypting file system)
Part of NTFS used to scramble data. Encryption is the process of converting plain text data into cipher text data so that it cannot be read.
previous versions
Part of System Protection that keeps copies (previous versions) of user data. It's also called shadow copy.
restore point
Part of System Protection. It can be used to revert a system to a previous state.
UDF (user-defined functions)
Part of a program that performs a specific task. Programming languages provide many built-in functions, but application developers can create their own. A function created by a developer is a UDF.
south bridge
Part of the CPU chipset. It provides the interface to low speed devices and is often called the I/O Controller Hub (ICH). Compare to north bridge.
north bridge
Part of the CPU chipset. It provides the primary interface for high-speed devices such as the CPU, RAM, and a dedicated graphics slot and is sometimes called the memory controller hub (MCH). North bridge functions have been taken over by the CPU on newer CPUs. Compare to south bridge. MNEMONIC: Works north of the CPU, RAM and onboard graphics.
HAL (hardware abstraction layer)
Part of the operating system that hides hardware differences from other parts of the operating system.
You have a workstation running the 64-bit version of Windows 7 Ultimate that you would like to change to the 64-bit version of Windows 7 Professional. You want to perform the upgrade with the least amount of effort and cost. What should you do first?
Perform a Custom (advanced) installation using the Windows 7 installation disc.
• You have a workstation running the 64-bit of Windows 7 Ultimate that you would like to change to the 64-bit version of Windows 7 Professional. You want to perform the upgrade with the least amount of effort and cost. What should you do first?
Perform a Custom (advanced) installation using the Windows 7 installation disc.
You have a computer that runs Windows XP Professional. You want to upgrade your computer to Windows 7 Professional. You want your user profile settings to be applied to Windows 7, with all user files available following the upgrade. You want to perform the upgrade with the least amount of effort possible. What should you do?
Perform a custom (advanced) installation of Windows 7 to the existing hard drive. After the installation, boot into Windows 7 and run Scanstate and then Loadstate.
• You have computer that runs Windows XP Professional. You want to upgrade your computer to Windows 7 Professional. You want your user profile settings to be applied to Windows 7, with all user files available ff. the upgrade. You want to perform the upgrade with the least amount of effort possible. What should you do?
Perform a custom (advanced) installation of Windows 7 to the existing hard drive. After the installation, boot into Windows 7 and run Scanstate and then Loadstate.
format
Process of preparing a disk for use. Disks are formatted with a file system such as FAT32 or NTFS. Formatting an existing disk deletes the data on the disk.
flashing
Process of upgrading BIOS.
On a Windows system, which Task Manager tab would you use to adjust the priority given to a specific program?
Processes
IEEE (Institute of Electrical and Electronics Engineers)
Pronounced as "I triple E." A standards organization that has defined a wide assortment of standards for networks.
WAP (Wireless Application Protocol)
Protocol used to send web-based content such as webpages to mobile devices.
PROM (programmable read-only memory)
Readonly memory that can be programmed. It is used for firmware, which is software code written into a hardware chip. See ROM, EPROM, and EEPROM.
You have a computer that runs Windows 7. You install the drivers to connect your new music player to the computer. Immediately following the device installation, you get a bluescreen error. You reboot the computer but it shows the same error before the boot precess completes. You need to start the computer using the least amount of effort. What should you do?
Reboot from the system using last Known Good Configuration from the Advanced Startup options.
Prior to installing some software on your Windows system, you turn off User Account Control (UAC), Reboot the computer, and install the software. You turn back on, but it does not prompt you before performing sensitive actions. You want the protection of UAC, but is not working at all. What should you do?
Reboot the machine.
Rodney, a user in the research department, reports that he is getting STOP errors while using his Windows XP computer. You ask Rodney if anything has changed recently on the computer. Rodney explains that he ran the installation program for his PDA and everything worked fine until he tried to hot sync. Now any time he hot syncs, he has to reboot the computer. You need to fix Rodney's computer and prevent Rodney from using the PDA until you can install an update driver. What should you do?
Reboot the system in Safe Mode. Disable the PDA's driver in Device Manager
While working on your Windows 7 system, the system encounters a critical error. For a brief second you see the Blue Screen indicating the error. Before you can read the error, however, the system reboots. After rebooting and logging back on, the same thing happens again. What should you do so that you can read the error message next time it happens without the system rebooting?
Reboot the system, Press F8 and disable the automatic restart feature
PXE (preboot execution environment)
Refers to a client that can boot from a NIC. PXE-enabled clients include a NIC and BIOS that can be configured to boot from the NIC instead of a hard drive. It is often used to allow clients to download images.
core
Refers to a processor within a CPU. A single CPU can have multiple cores that simulate multiple processors.
JBOD (just a bunch of disks or just a bunch of drives)
Refers to multiple disks operating independently. In some usages, it indicates a spanned volume.
serial
Refers to sending data 1 bit at a time. Highspeed serial technologies such as USB and FireWire are common. Low-speed technologies such as RS-232 are not used as often.
parallel
Refers to sending data as multiple bits at the same time. Before USB became popular, parallel ports were faster than serial ports.
RF (radio frequency)
Refers to signals transmitted over the air without wires.
Which tool lets you view and directly edit the registry?
Regedit
Which of the following remote access mechanisms in Windows lets you watch what a user is doing and, if necessary, take control of the user's desktop to perform configuration tasks?
Remote Assistance
You manage a Win system with an attached printer. You share the printer using a share name of Printer1. You assign the Allow Print permission for the printer to the Sales group. However, you discover that users who are not members of this group can print to the printer. You want only members of the Sales group to print to Printer1. What should you do?
Remove Everyone from the printer's access control list.
Your laptop carrying case is designed from a 15-inch laptop, yet you think you can squeeze your 16-inch laptop into it. Before slipping the laptop into the case, what should you do first?
Remove any ExpressCards from their slots
Your manager has been using the same laptop computer without error for four years. Suddenly, the computer will not start and run correctly. What should you do to isolate the problem?
Remove the batteries and attempt to run the computer from a wall outlet
• You work for a company with headquarters in Seattle and an office in Olympia. A single server in the Seattle office runs Windows Server 2008 R2 and holds all shared files for the company. The office in Olympia has 5 client computers, all running Windows 7. The Olypia office is connected to Seattle office with a WAN link. You want to implement BranchCache in the Olympia office, caching all content on a server in the Olympia office. What should you do to configure the client computers in the Olympia office?
Run the netsh command to set the BranchCache mode to Hosted Cache. Use the FQDN of the server in the Olympia office.
virtualization
Running operating systems or applications in a virtual environment within a physical host. For example, one physical computer (called the host) can run multiple virtual machines (called guests or VMs) without requiring multiple computers. A hypervisor is an application that manages the virtual systems.
Which interface is primarily used for internal hard drives in modern desktop PC Systems?
SATA
Which of the following is the most common disk interface used for optical drives on home and office computers?
SATA
SMTP (Simple Mail Transfer Protocol)
SMTP is used to send email from clients to email servers. SMTP uses port 25.
You have just finished installing the OS on a new computer and the IT Manager has suggested that you install the Service Packs for it before you go home. There are three Service Packs currently available for the OS. Which Service Pack should you install on the machine first?
SP 1
Which of the following creates a secure connection to a remote server?
SSH
Which of the following network services or protocols uses TCP/IP port 22?
SSH
The video driver on your Windows 7 computer is preventing the system from starting up successfully. You have already downloaded an updated driver and copied it to the computer's HDD. Which mode should you select from the Windows Advanced Boot Options menu to ensure that the system can complete the boot process?
Safe Mode
access point
Same as wireless access point.
An employee has a Win notebook system. The employee has just been fired, but not before he assigned Deny Full Control Permission to Everyone to all the files and folders on the system. All users, including you, are now blocked from accessing these important files. You are the administrator and you need to make these files available as quickly as possible. What should you do?
Take ownership of the files, and change the permissions.
least privilege
Security principle that restricts access. Users are granted rights and permissions for what they need to perform their job but no more.
MFP (multifunction product)
See MFD.
striped volume
See RAID-0.
mirrored volume
See RAID-1.
You need to reconfigure the size of the offline cache used by File History to 20% of the disk space on the E: volume. Click the option you would use in File History in Control Panel to do this.
Select 'Advanced settings' to the left of your screen.
You are troubleshooting a malfunctioning Windows System. Your system uses RAID10 storage array. You recently downloaded and installed a beta (pre-release) driver for the RAID controller from the manufacturer's web site. After doing so, the system no longer boots properly. You suspect the beta storage controller driver is at fault. You boot the system from a DaRT recovery image. Click the DaRT utility you should use to troubleshoot the problem.
Select, "Computer Management"
You are troubleshooting a malfunctioning Windows system. The user admitted to booting the system from a Linux-based live CD to gain access to several locked files. After using the disc, the system no longer boots properly. You suspect the master boot record has been corrupted. You boot the system from a DaRT recovery image. Click the DaRT utility you should use to troubleshoot the problem.
Select, "Disk Commander".
You have a computer that runs Windows 7. Recently, a WSUS server was configured and enabled in your internal network. Now you need to configure Windows Update on your computer to search for and download updates from the WSUS server. What should you do?
Set the 'Specify intranet Microsoft update service location' setting in Group Policy.
You are installing the first SATA drive into a desktop, but you do not have the drivers for the motherboard's integrated SATA controller. Which of the following tasks will be required in the configuration process?
Set the drive type in the BIOS to IDE
You've just purchased an external SCSI hard drive for your desktop workstation. What should you do before you connect it to the system?.
Set the drive's SCSI ID
• You have a laptop running Windows 7 Prof. The computer is a member of the mydomain.local Active Directory domain. You travel the branch office in your company. The branch office has 5 computers running Windows 7 ultimate edition. Computers in the branch office are not domain members. All computers use a HomeGroup for file sharing. You want to join the HomeGroup in the branch office. What should you do?
Set the network location for the connection to Home.
Two IDE devices share the same channel. One device is newer and faster. Which device should you set to master?
Set the newer, faster device to master
default gateway
The default path out of a network for TCP/IP traffic. It is the IP address of a router's interface card on the same network as a client.
A user is trying to log into Windows on her notebook computer. She enters the correct password for her user account, but the system won't let her authenticate, claiming the wrong password has been entered. What's causing the problem?
She has turned Num Lock on causing numbers to be sent from the keyboard instead of letters
CAT
Short for category when describing twisted-pair cable types. CAT 3 can be used for 10 Mbps, CAT 5 for 100 Mbps, CAT 5e for 1 Gbps, and CAT 6 for 10 Gbps.
botnet
Short for robot network. Group of computers, or bots, controlled by a bot herder for malicious purposes.
After arriving early this morning, you turn off your computer to begin your work. Instantly you see smoke and smell a strange odor coming from the computer. What should you do?
Shut off the system immediately
digital
Signals that are transmitted as 1s and 0s. In contrast, analog data is transmitted with a sine wave.
multiboot
Similar to dual-boot but includes systems that can boot to more than two operating systems.
What optical media has the greatest storage capacity?
Single-layer, single sided Blu-ray disck
open source
Software code that is freely available. The Android operating system is open source.
OCR (optical character recognition)
Software that can identify characters from documents. Scanners often include OCR software that can scan a document and convert contents to editable text.
spyware
Software that installs itself or modifies a user's system without the user's knowledge or consent.
operating system
Software that interacts with the hardware and hosts applications. Windows is the most common operating system in use on desktops.
firmware
Software that is written into a hardware device. BIOS is considered firmware.
device driver
Software that provides instructions for an operating system to use a piece of hardware.
antivirus software
Software used to detect, block, and remove viruses and other malware.
geotracking
Some mobile devices record the location of the device at different times and store the information in a file on the device. Anyone who can read this file can track past locations of the device (and by implication, the owner).
The Mnemonic Major System
Some of the definitions in this set include a mnemonic to help in remembering key points of the definition. The mnemonic will take a series of digits and transform it into consonants based on rules: 0 corresponds to the Z or S sound, 1 is T or D, 2 is N, 3 is M, 4 is R, 5 is L, 6 is G or J, 7 is K (or hard C like Cave), 8 is F or V and 9 is P of B. Vowels don't count, nor do the sounds of H, Q, W, X or Y.
LVD (low voltage differential)
Sometimes called LVD signaling (LVDS), a standard that transmits data as the difference in voltages between two wires in a pair. It is used by SATA, FireWire, AMDs HyperTransport, and PCIe.
phishing
Spam sent by attackers in an attempt to get users to click a link or provide personal information.
What is the effect on your system when you run Disk Defragmenter?
Speeds up disk I/O performance
Which of the following conditions would typically result in replacing the drum on a laser printer?
Spots at regular intervals on the page
SC (square connector)
Square connector used with fiber cables.
ESD (electrostatic discharge)
Static electricity that can build up and discharge causing damage to electronic components. Antistatic devices help prevent ESD damage.
CMOS (complementary metal oxide semiconductor)
Storage area for BIOS settings that can be changed by the user. Most current systems do not include an actual CMOS chip but instead store this information on the same flash memory where BIOS is stored.
RAID (redundant array of independent—or inexpensive— disks)
Storage method that combines multiple hard disks. RAID configurations include RAID-0, RAID-1, RAID-5, and RAID-10.
A VPN is used primarily for what purpose?
Support secured communications over an untrusted network
You need to configure when Windows updates are checked for and downloaded from Microsoft's update servers on a Windows 7 system. Which option in Control Panel should you use to do this?
System and Security
MIDI (musical instrument digital interface) connector
The DB-15 connection found on older sound cards for MIDI-enabled devices or joysticks. MIDI devices can play music by using .mid files, but they commonly connect with USB ports today.
DIN (Deutsche Industrie Norm)
The German Institute for Standardization. DIN standardized the mini-DIN connections.
TLS (Transport Layer Security)
The designated replacement for SSL. It can be used anywhere SSL is used.
xcopy
The extended copy command is used to copy files and folders. It can do everything copy can do, but it has many more capabilities.
basic disk
The most common type of disk used in Windows-based systems. The alternative is dynamic disks.
RIMM (rambus inline memory module)
The circuit card used to hold RDRAM instead of a DIMM.
dxdiag
The command that starts the DirectX Diagnostic Tool. It can diagnose problems with video and sound devices.
msconfig (Microsoft configuration)
The command used to open the System Configuration tool. This can be used to view and manipulate what services and applications start automatically.
PATA (parallel advanced technology attachment)
The common name for IDE/EIDE drives. It is being replaced by SATA.
fuser assembly
The component used in laser printers that melts the toner onto the paper.
bus
The connection between devices on a computer used to transfer data. A computer has multiple busses.
back side bus
The connection between the CPU and its internal cache memory.
Direct Media Interface (DMI) bus
The connection between the CPU and newer chipsets instead of the front side bus.
FSB (front side bus)
The connection between the CPU and the supporting chipset. Newer chipsets use a Direct Media Interface (DMI). Compare to back side bus.
SATA 1
The first generation of SATA. SATA1 has a bit speed of 1.5 Gbits/s or 150 MBps. MNEMONIC: The Daily Show with...
socket
The holder for a CPU on a motherboard. The two popular types of sockets are PGA and LGA.
system partition
The location of files used to boot the computer. This is usually the root of the C: drive on the computer. Compare this to the boot partition that holds the system files and is normally located at C:\Windows on Windows systems.
boot partition
The location of the operating system files. On Windows systems this is usually C:\Windows. Compare this to the system partition that holds the boot files and is normally located at the root of the C: drive. MNEMONIC: I see windows with boots in them. Boot files are not in the boot partition. Boot files are in the system partition at the root of C:.
PoS (Point of Sale)
The location where a purchase is completed. Thermal printers are often used as POS locations to create receipts.
You just installed a new floppy drive. After booting, the drive light stays lit. What is the most likely problem?
The ribbon cable is connected backwards
SATA 2
The second generation of SATA. SATA2 has a bit speed of 3 Gbits/s or 300 MBps MNEMONIC: Moses and...
micro-SD
The smallest version of SD flash card memory used in cameras and digital recorders.
MIME (multipurpose internet mail extension)
The standard format used to send email messages.
transferring
The step in the seven-step laser imaging process during which the paper is charged and the toner is transferred to the paper. See also processing, charging, exposing, developing, fusing, and cleaning.
processing
The step in the seven-step laser imaging process during which the raster image is processed. See also charging, exposing, developing, transferring, fusing, and cleaning.
developing
The step in the seven-step laser imaging process during which the toner is applied to the imaging drum. See also processing, charging, exposing, transferring, fusing and cleaning.
charging
The step in the seven-step laser imaging process where the imaging drum is charged with a high voltage. See also processing, exposing, developing, transferring, fusing, and cleaning. MNEMONIC:
cleaning
The step in the seven-step laser imaging process where the imaging drum is cleaned. See also processing, charging, exposing, developing, transferring, and fusing.
exposing
The step in the seven-step laser imaging process where the laser writes the image onto the imaging drum. See also processing, charging, developing, transferring, fusing, and cleaning.
fusing
The step in the seven-step laser imaging process where the toner is melted onto the paper. See also processing, charging, exposing, developing, transferring, and cleaning.
SATA 3
The third generation of SATA. SATA3 has a bit speed of 6 Gbit/s or 600 MBps. MNEMONIC: Jesus
Why should backup media be stored offsite?
To prevent the same disaster from affecting both the network and the backup media
Examine the following output: 4 22 ms 21 ms 22 ms bb.ispxy.com [154.11.10.62] 5 39 ms 39 ms 65 ms bb.ispxy.com [154.11.12.11] 6 40 ms.... 7 51 ms... 8 75 ms... Which command produced this output?
Tracert
• You have a Windows notebook system that is a member of the mydomain.local Active Directory domain. You take your notebook home and connect it on your home network using a wireless connection. You would like to join the HomeGroup from your notebook that has already been created on your home network. What should you do?
Turn on Network Discovery
• Management has decided to purchase new desktop system for the users in Accounting. After conducting a needs assessment, they have determined that the new system must meet the ff. requirements: o They must be joined to the organization existing Active Directory domain. o Group Policy must be used to enforce organizational standards. o Application restriction must be implemented with AppLocker. o Whole-disk encryption must be implemented with BitLocker. A sales rep from a computer manufacturer recently offered you a very competitive price on desktop systems with the ff. specifications o CPU: 64-bit Intel 3.0 GHz quad-core o RAM: 4GB o Hard disk: 500GB o Operating system: Windows 7 Professional What should you do?
Upgrade the operating system to Windows 7 Enterprise or Ultimate.
• Management has decided to purchase new notebook system for the users in Marketing and Sales. After conducting a needs assessment, they have determined that the new system must meet the ff. requirements: o They must be joined to the organization existing Active Directory domain. o Group Policy must be used to enforce organizational standards. o Application restriction must be implemented with AppLocker. o Whole-disk encryption must be implemented with BitLocker. o As sales reps travel frequently, the notebook must support remote connections to your organization's Direct Access server. A sales rep from a computer manufacturer recently offered you a very competitive price on desktop systems with the ff. specifications o CPU: 64-bit Intel 3.0 GHz quad-core o RAM: 4GB o Hard disk: 500GB o Operating system: Windows 8.1 Professional What should you do?
Upgrade the operating system to Windows 8.1 Enterprise.
You work for a company with headquarters in Seattle and an office in Olympia. A single server in the Seattle office runs WinServer 2003 and hold all shared files for the company. The office in Olympia has 5 clients computers, all running Win7. The Olympia office is connected to the Seattle office with WAN link. You want to implement BranchCache in the Olympia office. What should you do?
Upgrade the server in Seattle to WinServer 2008 R2 or later. Configure BranchCache on Distributed Cache mode.
You have a computer running Windows 7 Enterprise. You check the Windows Experience Index as shown in the image. YOu want to increase the system's performance. What should you do?
Upgrade the video card.
• You have a computer that runs Windows 7 Professional and a VHD file which contains a Windows 7 installation. You need to boot the computer from the VHD file. What should you do first?
Upgrade to Windows 7 Ultimate.
You are used to using a computer running Windows XP Professional. You want to upgrade to the latest OS, but want to use the classic style for the Start Menu. You want to upgrade to the latest version possible. What should you do?
Upgrade to Windows Vista; customize the Start Menu settings
Your motherboard has two memory slots and supports a maximum of 8 GB of RAM. After installing two 4 GB modules and booting your system, you find that Windows only recognizes 3.5 GB of RAM. What should you do first?
Upgrade to a 64-bit version of Windows
• You use a 64-bit of Windows 8 (base edition) on your desktop computer. This system has 500GB hard disk installed and 8GB of system RAM. You need to use an application that only runs on Windows XP, so you decide to implement Client Hyper-V on your desktop system so you can create a virtual machine to run the application. What should you do?
Upgrade to a 64-bit version of Windows 8 Prof.
You have a desktop computer that uses a 250 Watt power supply. You recently added a 4-disk RAID10 array to the system and now it spontaneously shuts down. What should you do?
Upgrade to a power supply that provides more watts
You are preparing for an installation of 64-bit Windows 7 on a computer that is currently running a 64-bit version of Windows Vista. You perform a hardware inventory on the computer and note the following: *Processor = 2.0 GHz * Free HDD space: = 200 GB * RAM = 1 GB * DVD drive = 18x * 100 Mbps NIC You need to prepare this computer to ensure that it meets the minimum hardware requirements of Windows 7. What should you do?
Upgrade to at least 2 GB of RAM
• You use a 32-bit version of Windows 8.1 Professional on your desktop computer. This system has 500GB hard disk installed and 4GB of system RAM. You need to use virtual machines to test an application on different platforms as it is being developed. You decide to implement Client Hyper-V on your desktop system. What should you do?
Upgrade to the 64-bit version of Windows 8.1 Prof.
• You have a laptop computer running Windows 7 Home Premium. You connect your computer to a wired network at work and a wireless at home. You want to configure your computer to use a diff. default printer for each network. What should you do?
Upgrade your computer to Windows 7 Professional.
Your computer currently runs Windows XP Professional. You notice that a friend is using a different version of Windows. In addition to the running programs being shown along the bottom of the screen, you watch her launch several programs using icons from this same location. You want to configure your computer so you can also launch programs from icons along the bottom of the screen. What should you do?
Upgrade your computer to Windows 7. Pin programs to the Taskbar
FTP (File Transfer Protocol)
Used to upload and download files to and from FTP servers. It uses port 21 and sometimes port 20. It can be encrypted with SSH.
IMAP (Internet Message Access Protocol)
Used with email servers. It allows users to organize email in folders on the server and to search the email. IMAP uses port 143.
You have a computer that runs Windows 7 Ultimate. You take a regular file backup every Friday night, which also includes a system image backup. System Protection has been enabled for all drives on the system. On Wednesday you receive a new version of a graphic editing application that you use regularly. You install the new application, but find that the application does not work properly. When you try to run original application, you find that the upgrade has deleted it from your system. You also find that some of the graphics files you had been working on yesterday have been deleted. You need to get things back to normal as quickly as possible. What should you do? (Select two. Each choice is a required part of the solution.)
Use Previous Versions to restore the missing files. Use System Recovery to revert to a restore point before you installed the application.
You have a Windows 7 computer that you would like to manage remotely. The computer connects to the network behind a firewall that blocks all but the most common ports. You need to use a remote management solution that does not require additional firewall ports opened. What should you do?
Use Remote Shell.
You have a compiler that compiles applications used in your business. You want to make sure that the compiler continues to run in the background, even if yo open the other applications. How can you adjust the amount of attention given to that application?
Use Task Manager to adjust the process priority
You have an application that compresses videos used in your online business. You want to make sure that the application continues to run in the background, even if you open other applications. How can you adjust the amount of attention given to that application?
Use Task Manager to modify the process priority
You have a computer running windows 7 Ultimate. You have an application that compresses videos used in your online business. You want to make sure that the application continues to run in the background, even if you open other applications. You need to adjust the amount of attention given to that application. What should you do?
Use Task Manager to modify the process priority.
You have a computer that runs Windows 7. You have just read about a new security patch for Windows 7. You install the patch as a Windows Update, but after you reboot and log back on your computer is unstable. What action should you take?
Use Windows Update in the Control Panel to uninstall the update.
Your supervisor recently purchased 100 new licenses to upgrade the Windows Vista systems in your organization's Accounting department to Windows 7. She received a single installation disc with the licenses. She has tasked you with deploying Windows 7 on these systems. Which of the following would be the best installation method to use?
Use a network installation
You have a single computer running Windows Vista. You are about to complete a clean installation of Windows 7 on the computer, and you need to migrate user profiles and user data from the previous installation of Windows Vista. What should you do? (Select two. Each choice is a required part of the solution.)
Use a wipe-and-load migration. Run WET and use External hard disk or USB flash drive as the transfer method.
You're conducting scheduled maintenance on a laser printer. You notice that there is a build-up of excess toner inside the interior of the printer. Which of the following is the proper way to remove it?
Use an anti-static vacuum
You want to combine storage space from two different HDDs into a single logical storage unit on your Windows computer. What should you do?
Use dynamic disks and a spanned volume
You want to combine storage space from two different hard disk into a single logical storage unit on your Windows computer. What should you do?
Use dynamic disks and a spanned volume
• You attempt to execute a program in the C:\Program Files\AccWiz directory on your Windows system, but you receive a prompt to elevate your privileges. You need to execute the program without receiving a prompt for elevated privileges. You also need to prevent harmful applications from making unwanted changes to the system. What should you do?
Use runas.exe to execute the program in the C:\Program Files\AccWiz directory.
Your Windows system has device which are Personal Identify Verification (PIV) compliant. You want to implement a form of authentication which takes advantage of PIV. What shoud you do?
Use smart card authentication.
You have a computer running Windows 7 Ultimate. When running multiple applications, the computer is slow to respond. To improve performance, you enable ReadyBoost on a USB flash drive. You need to edit the ReadyBoost settings. What should you do?
Use the 'ReadyBoost' tab in properties of the USB flash drive.
Which of the following tasks would you complete as part of a SATA installation?
Use the 15-pin power connector
You install Windows 7 on your new computer. After installation, you install several devices, loading drivers from their installation discs. When you reboot the computer, an error message displays informing you that an OS can't be found. What should you do?
Use the CMOS to change the disk boot order
A user in sales cannot get his laptop to display through a projector. He sees the screen output on the built-in LCD display, but the video is not being seen on the projector. What should you do first?
Use the Fn key to redirect display to the external video port
• You manage a network with 30 computers. Each computer is currently running Windows XP. All computers are members of a domain. You need to upgrade the computers to Windows 7 Professional. You will use a system image to deploy a clean installation of Windows 7 to each computer. Before you begin the upgrading process, you need to identify which application installed on computers can run on Windows 7. What should you do?
Use the Microsoft Application Compatibility Toolkit (ACT)
You manage the desktop computers at your company. You are in charge of 100 computers, all of which run Windows XP. You want to upgrade all computers to Windows 7. Prior to the upgrade, you need to verify the compatibility of each computer with Windows 7. You want to gather the necessary information as quickly as possible. What should you do?
Use the Microsoft Assessment and Planning Toolkit (MAP)
You have a computer that runs Windows 7. After several months of working fine, you are now having problems booting your machine. The system stall immediately after the BIOS information screen. You need to get the system started as quickly as possible. What should you do?
Use the Startup Repair tool.
You have several computers in a network. Some of the computers do not have an optical drive. Your boss has asked you to install Windows 7 on each of the computers. What should you do? (Select two. Each choice is a required part of the solution.)
Use the bootsect command to make the USB flash drive bootable. Copy the product DVD to a USB flask drive and boot from the drive.
How can you reformat a drive from FAT32 to NTFS without losing the existing data?
Use the convert command at a command prompt
You have a HDD that is formatted with the FAT32 file system. You would like to implement file and folder permissions on the Design folder that apply when files are accessed both locally and remotely. What should you do?
Use the convert command to convert from FAT32 to NTFS, then configure NTFS permissions
• Your Windows system has two hard drives: C: and D:. For the D:\Reports\Finances.xls file, you explicitly grant the Mary user account to Allow Modify NTFS permission. You need to move the file from the existing folder to the C:\Reports2 folder. You want to keep the existing NFTS permissions on the file. You want to accomplish this with the least amount of effort possible. What should you do?
Use the robocopy command to copy the file to the C:\Reports2 folder.
RDP (Remote Desktop Protocol)
Used in Microsoft networks to connect to remote systems. Remote Desktop Connection and Remote Assistance use RDP over port 3389.
platter
Used in hard disk drives. They are circular and covered in ferromagnetic material used to hold data. Hard drives typically have multiple platters.
inverter
Used in laptop computers with LCD displays. It converts DC voltage to AC voltage for the CCFL backlight.
LDAP (lightweight directory access protocol)
Used to access directory services databases, such as Active Directory Domain Services used in a Microsoft domain.
SCP (secure copy or secure copy protection)
Used to copy files between two systems in an encrypted format. SCP uses SSH.
DNS (Domain Name System)
Used to map computer names to IP addresses. Systems query DNS with a name, and it responds with the IP address. DNS resolves host names. In comparison, WINS resolves NetBIOS names. MNEMONIC: DNS dines with the host bus NetBIOS wins.
NIC (network interface card)
Used to provide connectivity with a network. PCs commonly have built-in NICs that use an RJ-45 connector and twisted-pair cable.
POP3 (Post Office Protocol version 3)
Used to receive email from email servers. POP3 uses port 110.
WINS (Windows Internet Name System)
Used to resolve NetBIOS names to IP address on internal networks. In comparison, DNS is used to resolve host names on the Internet and on internal networks. MNEMONIC: NetBIOS wins! DNS is for outside networks.
NTP (Network Time Protocol)
Used to synchronize computer clocks over the Internet.
NNTP (network news transfer protocol)
Used to transmit newsgroup messages between systems. Newsgroups have largely been replaced by web-based forums, so NNTP is not used often.
You are responsible for managing client workstations for your company. A user is unable to access data on an external HDD. You investigate the problem and determine that the US connection to the HDD is damaged. You replace the cable. What should you do next?
Verify full system functionality
A user has called to complain that her computer won't boot. It stops at the BIOS startup screen right after the memory has been tested and displays a 301 keyboard error. What should you do first?
Verify that no keys are being pressed down during POST
Which of the following paper types should not be used in Inkjet printers?
Very glossy paper
What is the purpose of the Services snap-in?
View and manage software processes running in the background
What is the purpose of the Dxdiag tool?
View information related to DirectX operation
You need to provide DHCP and file share services to a physical network. These services should be deployed using virtualization. Which type of virtualization should you implement?
Virtual Servers
Which term refers to a software implementation of a computer system that executes programs like a physical machine as a self-contained and autonomous system?
Virtual machine
The paging file on a HDD is sometimes called _____.
Virtual memory
What type of component is most likely to allow physical and virtual machines to communicate with each other?
Virtual switch
You need to upgrade to a 64-bit Windows Vista Business edition desktop system to Windows 8.1 Professional. Which of the ff. is true regarding this upgrade path?
Vista SP1 or later must be installed prior to running the upgrade.
The Sidebar is a feature of which Windows version(s)?
Windows Vista
Aero is a feature of which Windows version(s)?
Windows Vista and Windows 7
Which of the following Windows versions uses User Account Control to protect the computer from unauthorized changes?
Windows Vista and Windows 7
You have a computer that runs Windows Vista. You need to perform a clean installation of Windows 7 onto the computer. You would also like to retain the system and user files from the Windows Vista installation. What should you do?
While running setup.exe on the Windows 7 installation media, select the Custom (advanced) option.
You have a computer that currently has Win7 installed. You need to perform a clean installation of Win8 onto the computer, but you would like to retain the existing settings and user files from the Windows 7 installation. What should you do?
While running the Win8 installation, select the Custom (advanced) option.
What does the /q switch with the RD command do?
Will not prompt you to confirm deletions
Which OS does NOT use C:Windows as the default location for system files?
Windows 2000
Which Windows version(s) include the following features: Flip 3D, Gadgets, Snap, and Peek?
Windows 7
Which Windows version(s) use Libraries to logically group files?
Windows 7
You need to upgrade a notebook system running 64-bit Windows 7 Home premium edition to 64-bit Windows 8 Enterprise. Which of the ff. is true regarding this upgrade path?
Windows 7 Home Premium cannot be upgraded to Windows 8 Enterprise.
Aero is a feature of which Windows versions and editions?
Windows 7 Home, Professional, Ultimate, and Enterprise
You remove a HDD from a Windows 7 system and put it in another system that is running Windows 98. You are unable to read the disk. What is most likely the problem?
Windows 98 does not support NTFS
You remove a hard disk from a Windows 7 and put it in another system that is running Windows 98. You are unable to read the disk. What is most likely the problem?
Windows 98 does not support NTFS
You need to create a recovery drive for your Windows 8.1 Professional system. To do this, you've procured a USB flash drive with the following characteristics: -USB version: 20 -Capacity: 2 GB Can you create a recovery drive using this device?
Yes, the device meets the minimum requirements for a recovery drive.
You currently use the Thunderbird e-mail client on your desktop PC. You use it to connect to an e-mail server provided by a service provider using the IMAP and SMTP protocols. You recently purchased an iPad and want to configure its Mail app to connect to your e-mail server. Can you do this?
Yes, you can configure the Mail app on an iPad to connect to an e-mail server using the IMAP and SMTP protocols
You're formatting a newly-installed HDD with Disk Management and are at the point where you need to select the type of file system to be used. Which of the following scenarios would require setting the FAT32 file system?
You need the disk to be backwards-compatible with older versions of Windows
You're formatting a newly-installed hard disk with Disk Management and are at the point where you need to select the type of file system to be used. What scenario would require selecting the FAT32 file system?
You need the disk to be backwards-compatible with older versions of Windows
In which of the following situations would restoring from a system image be the best option?
You need to restore a Windows system after a HDD failure
In which of the following situations would driver rollback be the best tool to use?
You recently installed a new video driver and now the system behaves erratically
You have a computer currently running Windows Vista. Which of the following reasons would you justify doing a clean installation of the Windows 7 instead of performing an upgrade?
You want to dual boot
You want to use the Universal Naming Convention (UNC) format to access a shared folder called Pictures on a computer named Home1. Which format would you use?
\\Home1\Pictures