Thursday, October 25, 2012

exam practise


  1. A user reports that they walked away from their laptop for 30 minutes and when they came back the screen was very dim. The user tried moving the mouse and increasing the brightness setting, but neither worked. Which of the following should the technician do FIRST?
A. Plug in an external monitor to test the video card.
B. Run a check disk scan to verify there is no corruption.
C. Check if the laptop is now on battery power.
D. Have the LCD screen replaced with a known good screen.


2.Which of the following BEST describes a situation that would require STP cable?
A. Installation in an area with low EMI
B. Installation in an area with high EMI
C. Installation in an air handling space
D. Installation in an area with high humidity

3. Which of the following will allow the use of BitLocker if the computer does not have a TPM chip?
A. External hard drive
B. SCSI hard drive
C. USB key
D. CD-ROM drive

4. A customer reports that their computer is displaying ‘operating system not found’ while booting. The technician confirms that the computer booted fine the previous day and that no devices were added. The technician also confirms that no software changes were made to the system from the previous day. Which of the following is the problem?
A. The network cable is unplugged.
B. A diskette was placed in the disk drive.
C. The keyboard is unplugged.
D. The system has been infected with spyware.

5. A new video card requires a 600 watt power supply. The power supply should have how many pins on the main cable?
A. 12
B. 20
C. 24
D. 26


20. Which of the following utilities will a technician use to find out system information, drivers, running
print jobs, and Internet setting all from one location?
A. MSINFO32
B. REGEDIT
C. Device Manager
D. MSCONFIG

21. Which of the following interfaces does a sound card use?
A. PCI
B. SATA
C. SCSI
D. AGP

22. Which of the following would MOST likely be used to aid a technician in the removal of spyware?
A. ASR
B. Safe Mode
C. Restore Point
D. Recovery Console

23. A technician is installing a new small form factor motherboard. Which of the following form factors
is the technician MOST likely installing?
A. Micro ATX
B. NLX
C. ATX
D. BTX

24. Which of the following maintenance utilities is used to reorganize files on a hard drive?
A. SCANDISK
B. DEFRAG
C. CHKDSK
D. Disk Cleanup

25. Which of the following is the number of devices that can be daisy-chained to an IEEE 1394 port?
A. 7
B. 15
C. 63
D. 127







Communication & personality Development

1.    Mr. Huge was very proud of his auto superstore. “We have such an extensive selection of cars,” he said, “so everyone should find a vehicle that he or she will love!”

The word “extensive” means __________.

a)    costing a lot of money
b)    large amount
c)    having no color
d)    not enough

2.    Friendship is a priceless thing. If Chris put a price or conditions on her friendship, it’s no longer priceless. In fact, it’s not real friendship at all!

If something is priceless, __________.

a)    it has a missing tag
b)    it has no value
c)    it has great value
d)    it is made out of rice


3.     The news story was based on a letter that was a fabrication. Now the reporter who wrote the story is in big trouble. Will anyone believe him again?

A fabrication is __________.

a)    made of cloth
b)    full of long words
c)    funny
d)    fake


4.    The reporter insisted that the letter he used was authentic. He said that he had shown it to many experts before he used it in his story.

When something is authentic, it’s __________.

a)    genuine, or real
b)    carefully written
c)    full of tasty worms
d)    very old


5.    In 1975, Governor James promised to do something about the high taxes in our state. She didn’t present a tax cut bill to lawmakers until 1985. It took her a decade to keep her promise, but better late than never.

How long is a decade?

a)    75 years
b)    85 years
c)    a century
d)    10 years

6.    Paradox

a)    a statement that seems to contradict itself but contain some truth
b)    using spies or observers
c)    the state of  something or someone
d)    The act handing or running something, usually a business.

7.     Document

a)      Act of moving, action
b)      A newcomer, a beginner, someone new to something
c)       An official paper
d)      On opportunity: a happening, instance or celebration

8.     Annual

a)      Yearly
b)      Being alone
c)       Qualified, worthy to be chosen
d)      Able to move

9.    Capable

a)      Aware, having knowledge of oneself
b)      Friendly, agreeable
c)       Having the ability to do something: having the traits necessary to perform some action
d)      Native, having been born in a specific. Area or environment.


10. Chronicle

a)      A list of written works
b)      A place where one goes to hear something
c)       A historical account arranged in order of time
d)      A letter to be sent


11.  Translucent

a)      Having a large body
b)      Allowing some light to shine through
c)       Dead
d)      Lack of  experience, not knowledgeable of the world

12. Attest

a)      To ruin, to pull down
b)      To break or burst
c)       To train, to provide schooling for
d)      To provide proof, to say something is true

13. Auction

a)      A sale of goods to the highest bidder
b)      The position of a body
c)       One who believes that any ultimate reality I unknowable

14. Chronological

a)      Holing or sticking to something
b)      Uttered by she voice, producing sound
c)       Arranged in order of time
d)      Related to the mind


15.  Diagnose

a)      To recognize (disease) by symptoms
b)      To accept, to confess, to allow entry
c)       To come to a conclusion from facts or ideas, to guess
d)      To twist into an abnormal shape


Digital electronic

1.     In this ___________system, the digits are 0to 9 and A to F.
A)    Binary
B)    Octal
C)    Hexadecimal
D)   Decimal                                                                                                     
2.     What is term called for the product of the binary number after taking its two’s complement twice?
A)    One’s complement
B)    Two’s complement
C)    Double complement
D)   None of these                                                                                          

3.     ECL stands for_____________

A)    Emitter Controlled Logic
B)    Emitter Connected Logic
C)    End Coupled Logic
D)   Emitter Coupled Logic                                                               

4.     Which of one of this number system is having eight digits in it?

A)    Decimal
B)    Hexa Decimal
C)    Binary
D)   Octal                                                                                                             

5.     An Op-amp configuration where the output waveform is the integral of the input wave form is called___________

A)    Summing Amplifier
B)    Inverting Amplifier
C)    Differentiator         
D)   Integrator                                                                                                    


6.     A + 0 = ______

A)    0
B)    1
C)    A
D)   None of the above                                                            



7.     2’s complement of 01101 is __________

A)    10111
B)    001101
C)    01110
D)   10011                       


                                                                       

8.     What is the Output of a 3-input NAND gate with A = 1, B = 0 and C = 1?

A)    0
B)    1
C)    0.5
D)   None of the above                                                                                    

9.     If the capacitor and resistor in the Op-amp Integrator is replaced, it forms a ____________.
A)    Integrator
B)    Differentiator
C)    Voltage Follower
D)   Summing Op-amp                                                                        

10.                        _____ adds two binary digits and produces two binary outputs called Sum and Carry.

A)    Half Adders
B)    Full Adders
C)    Binary Adders
D)   None of the above                                                                        

11 In the Exclusive – NOR Gate (XOR), if the input A is low and the input B is high, then the output is __________.

A)    Low
B)    High
C)    Very High
D)   Very Low                                                                                                     




1) The size of the PC card is __________?
a)    85.6mm X 54.6mm
b)    85.6mm X 54.0mm
c)    85.0mm X 54.0mm
d)    85.0mm X 54.6mm

2) Lightscribe is used for _____________?
a) Renaming Discs
b) Labeling Discs
c) Both
d) None of the above

3) Which battery has long life?
a) Nickel cadmium Batteries
b) Nickel Metal Hydride Batteries
c) Lithium Ion Batteries
d) All of the above

4) If the video does not work, No need to replace the motherboard
a) True
b) False

5) WI-FI is based on which standards?
a) IEEE 802.6
b) IEEE 802.11
c) IEEE 802.12
d) IEEE 802.15.1

25) The first laptop was called as __________?
a) Notebook
b) Osborne1
c) Subnotebook
d) None of the above

26) What features led to the popularity and favorability of Portables over Desktop computers
a) Portable weight
b) Small size
c) Less heat dissipated
d) All of the above




27) What are types of batteries available in the market?
a) Nickel Cadmium Batteries
b) Nickel Metal Hydride Batteries
c) Lithium Ion Batteries
d) All of the above
e) None of the above

28) Which technology is used in Bluetooth for avoiding interference?
a) Frequency hopping
b) Frequency Multiplexing
c) Phase locked looping
d) Pulse-code Modulation

29) Expand PCMCIA __________
a) Personal Computer Memory Card International Associate
b) Personal Computer Memory Card International Association
c) Peripheral Components Memory Card International Association
d) Peripheral Components Memory Card International Associate

30) How many types of PC cards available?
a) Two
b) One
c) Three
d) Five
N+

1. A client wants to improve the wireless coverage on the third floor of their house. The wireless router is located in the basement and there is no easy way to run a cable to the third floor. Which of the following devices should be installed to extend the wireless coverage to cover the entire third floor without running cables?

A. Switch
B. Router
C. Repeater
D. Bridge

2. Which of the following describes what the number two represents in l00Base2 cabling?

A. Fiber
B. Coaxial cable
C. UTP
D. Twisted pair

3. A crossover cable is MOST commonly associated with which of the following layers of the OSI model?

A. Session
B. Application
C. Network
D. Physical

4. Which of the following devices is used to connect multiple devices to a network and does not stop broadcast traffic?
A. Switch
B. Hub
C. Modem
D. Repeater

5. A network administrator needs to add an additional connection to a room. The administrator adds a new Ethernet switch and must connect it to an existing switch. Which cable type should be used to connect the two switches?

A. CAT3 cable
B. Serial cable
C. Crossover cable
D. Rollover cable

6. Prioritizing traffic between data and voice is defined as which of the following?

A. Caching engines
B. Proxy server
C. QoS
D. Load balancing

7. Sandy, a technician, wants to limit access to a wireless network to company owned laptops, but does not want to use an encryption method. Which of the following methods would be BEST to accomplish this?

A. MAC filtering
B. SSL VPN
C. PPPoE
D. WPA Enterprise

8. Joe, a network technician, is tasked with installing a router and firewall to get an office working with Internet access. Which of the following features MUST be configured to allow sharing of a single public IP address?

A. QoS
B. POP3
C. PAT
D. SMTP

9. Which of the following is a form of encrypting packets for safe, secure data transmission within a network?

A. RAS
B. PPTP
C. IPSec
D. ICA

10. Two duplicate pieces of equipment can be used in conjunction for which of the following purposes? (Select TWO)

A. High availability
B. Fault tolerance
C. Reduce latency
D. Wi-MAX
E. CARP

11. The T568B wiring standard slates that CAT5 cables should be coded as follows:

A. White/Orange, Orange, White/Green, Green, Blue, White/Blue, White/Brown, Brown,
B. White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown,
C. White/Orange, Orange, \White/Green, Green, White/Blue, Blue, White/Brown, Brown,
D. White/Orange, Orange, White/Green, Blue,

12. Using network monitoring tools would allow an administrator to do which of the following?


A. Configure offline devices
B. Examine performance issues
C. Install additional software and updates
D. View syslog events

13 . Which of the following wireless technologies can operate at only 5GHz?

A. 802.11b/g
B. 802.11g
C. 802.11b
D. 802.11a

14. Which of the following devices allows multiple internal IP addresses to access an external website with minimal impact to the network bandwidth?

A. Proxy
B. Load balancer
C. Router
D. Bandwidth shaper

15. A VPN connection is not working correctly and the technician is unable to ping the VPN server. Which of the following actions should the technician do FIRST?

A. Call their local ISP
B. Verify the IP information of the server
C. Check their local Internet connection
D. Verify the hostname of the server

16. A technician wants to use an existing DHCP server for three additional VLANs. Which of the following features needs to be configured to allow for this addition?

A. DHCP server
B. Proxy server
C. Repeater
D. DHCP relay


Linux

1.Which of the following key-combinations is used to redo a change undone by a u command in vim?

A)       Ctrl-w, Arrow
B)       Ctrl-w, s
C)       Ctrl-r
D)       Ctrl-w, v



2.You work as the Network Administrator for Perfect solutions Inc. The company has a Linux-based Network. You are working as a root user. You want to know what the day will be on 20 July 2010.Which of the following commands should you use to accomplish this task?

A)       cal
B)       cal 20 July
C)       cal 7 2010
D)       date



3.Which of the following commands is used to access Windows resources from Linux workstation?

A)       rsync
B)       mutt
C)       scp
D)       smbclient



4.You want to temporarily change your primary group to another group of which you are a member. In this process, a new shell will be created, and when you exit the shell, your previous group will be reinstated. Which of the following commands will you use to accomplish this task?

A)       chmod
B)       newgrp
C)       chgrp
D)       chown



5.Fill in the blank with the required permission to complete the statement below. In order to make a script executable in a Linux computer, you must assign the___________ permission to the script file.

A)       execute
B)       read
C)       read & write
D)       write



6.You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. David, a Sales Manager, wants to know the name of the shell that he is currently using. Which of the following commands will he use to accomplish the task?

A)       ECHO $shell
B)       RM $shell
C)       MV $shell
D)       LS $shell



7.Which of the following text editing tools can be used to edit text files without having to open them?

A)       less
B)       sed
C)       vi
D)       more

8.Which of the following commands is used to securely copy files from one host to another over the network?

A)       ls
B)       cat
C)       mutt
D)       scp



9.Fill in the blank with the appropriate tool. __________ is a public domain collection of tools to  allow Unix systems to manipulate MS-DOS files: read, write, and move around files on an MSDOS file system.

A)       mtools
B)       ntools
C)       xtools
D)       tools



10.     Which of the following commands will you use to list all local and remote printers attached to your computer?

A)       lpq
B)       lpstat -d
C)         lpstat -t
D)       lpr



11.     Which of the following files is the default configuration file of XDM (X Window Display Manager)?

A)       /etc/X11/xdm/xdm-config
B)       $HOME/.Xauthority
C)       /usr/bin/xdm-config
D)       /usr/bin/xterm



12.     Which of the following commands is used to append the list of files in the /tmp directory to an existing file named deletelater.txt?

A)       ls /tmp > deletelater.txt
B)       ls deletelater.txt /tmp
C)       ls /tmp deletelater.txt
D)       ls /tmp >> deletelater.txt



13.     You work as a Technician for Net World Inc. The company has a Linux-based network. You have configured a file server on the company's etwork. You want to summarize disk usage of each file in a particular directory on the file server. Which of the following commands will you use?

A)       du
B)       fsck
C)       df
D)       dfsck



14.     You work as the Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. You want to keep an eye on the system log file /var/adm/messages. Which of the following commands should you use to read the  file in real time?

A)       tail -f /var/adm/messages
B)       tail /var/adm/messages
C)       cat /var/adm/messages
D)       tail -n 3 /var/adm/messages



15.     You work as the Network Administrator for Tech Perfect Inc. The company has a Linux-based  network. You are working as a root user on the Linux operating system. You have created a file in  the vim text editor. You want to save this file and exit it. Which of the following keys should you  use to accomplish the task?

A)       :w
B)       :wq
C)       :q!
D)       :



16.     Which of the following commands is used to change file access permissions in Linux?

A)       chown
B)       chmod
C)       chperm
D)       chgrp

17.     Which of the following commands is used to view the PDF files in Linux?

A)       ps2pdf
B)       a2ps
C)         pdf2ps
D)       evince



18.     You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You want to view the status of the current processes running on a Linux computer. You also want to append this information into the StatPro.txt file without deleting its content. Which of the following commands will you use to accomplish the task?

A)       ps StatPro.txt
B)       ps >> StatPro.txt
C)       ps | more StatPro.txt
D)       ps > StatPro.txt


19.     When you remove a user account from your Linux system, the files and directories of this user may still remain on the system. Which of the following commands can you use to remove all items from your Linux system? Each correct answer represents a complete solution. Choose two.

A)       userdel -r
B)       userdel -f
C)       userdel -h
D)       userdel -c



20.     You work as the Network Administrator for Perfect solutions Inc. The company has a Linux-based Network. You are a root user on the Red Hat operating system. You want to grant ownership of  the file foofile to a user John. Which of the following commands should you use to accomplish this task?

A)       chown John foofile
B)       chmod John foofile
C)       chgrp foofile John
D)       chown foofile John



21.     Which of the following cp command parameters copies only when the source file is newer than the destination file or when the destination file is missing?

A)       -u
B)       -l
C)       -p
D)       -s



35.Which graphical mail client is the default tool for email and groupware in Red Hat Enterprise Linux?

A)       mutt
B)       Evolution
C)       Thunderbird
D)       pidgin

Windows 7

1.      Windows logo key+F used for_______________.
a.       Open the Search window
b.      Select or move between desktop gadgets
c.       Select or move between taskbar buttons
d.      Open the Ease Of Access Center window

2.      The aero shake feature will work if which of the following conditions are met? choose Two.
a.       A display adapter compatible with WDDM is installed.
b.      Aero features are downloaded from Microsoft.
c.       The windows experience index is at least 2.
d.      The windows experience index is 3 or greater.

3.      Which of the following can be used to increase the physical memory on your Windows 7 pc and increase the speed?
a.       Physical RAM
b.      Aero Glass
c.       DirectAccess
d.      ReadtyBoost

4.      Which of the following is used to control when the security pop-up notification are used?
a.       Security Control Manager
b.      User Account Control
c.       User Account Control Panel
d.      Notification Control Settings Manager

5.      Which of the following operating system support an offline migration using USMT?
a.       Windows 2000 professional
b.      Windows XP professional
c.       Windows Vista
d.      Windows7

6.      Which of the following is not a volume type usable by Windows 7?
a.       FAT
b.      exFAT
c.       NTFS
d.      All of the above

7.      To establish a DirectAccess connection to the network, what is the first requirement?
a.       Install a certificate
b.      Create a VPN connection
c.       A static IPv4 address
d.      A static IPv6 address

8.      You are using the sysprep tool to prepare a Windows 7 installing to be imaged .Which command-line option removes all unique system information from the installation?
a.       /audit
b.      /oobe
c.       /generalize
d.      /unattend


9.      You wish to add file to a VHD. What action should you perform first?
a.       ImageX /mountrw
b.      In windows explorer .right-click the. VHD file and open.
c.       In diskpart, select the disk and attach
d.      Use DISM /online /apply

10.   Which of the following will cause the online compatibility check to fail during a Windows 7 installation?
a.       512MB of RAM
b.      A display adapter with WDDM support
c.       A display adapter without WDDM Support but with SVIDEO
d.      An 80 GB HDD
11.  Which of the following must you download from Microsoft’s Web site to obtain USMT 4.0?
a.       Windows any time update
b.      Windows upgrade advisor
c.       WAIK
d.      Microsoft Application Compatibility Toolkit
12.  Which of the following VPN types support the VPN Reconnect feature of Windows 7?
a.       L2TP/IPsec
b.      PPTP
c.       IKEv2
d.      SSTP
13.  You are responsible for managing company laptops that have Windows 7 installed at a small library. You want to prevent staff from uploading files using FTP to FTP sites but allow them to send outbound email messages using the Simple Mail Transfer Protocol (SMTP). Which of the following rules would you configure to achieve this?
a.       Inbound rules
b.      Outbound rules
c.       Isolation rules
d.      Authentication exemption rules
14.  Your friend has installed new device drivers on his computer. Unfortunately it was a beta early release and his computer boots to a blank screen now. You help him out by restarting the computer and pressing F8. However, what Advanced Boot Option would NOT help fix the situation?
a.       Enable Boot Logging
b.      Safe Mode
c.       Safe Mode with Networking
d.      Last Known Good Configuration (Advanced)

15.  How to access file and folder though network?

A.     \\ computer name
B.     // computer name
C.     \\ computer\Ip
D.     None


16.  In following Which is Class B IP?

A.     126.254.255.255
B.     191.255.255.254
C.     192.127.156.134
D.     223.123.124.234

17.  What is the port number of HHTP?

A.     443
B.     68
C.     80
D.     23

18.  Which Security option is not available in windows7?

A.     Action Center
B.     AppLocker
C.     Bitlocker
D.     None


19.  Encrypting File System is not available in Windows7_______.

A.     Ultimate
B.     Professional
C.     Enterprise
D.     Home basic


20.   In Software Restriction Policies, when you configure two conflicting rules for a particular program?

A.      The most specific rule takes precedence.
B.       We can’t configure policy.
C.       Default first will be applied
D.      Default second will be applied.


21.  ____________Tool protects your PC against hackers and malicious software?


A.      User Account Control
B.      Local policy
C.      None



22.  Which is a new feature of Internet Explorer 8?
A.      SmartScreen Filter
B.      Advanced tab
C.      Favorites
D.      Safety

23.  Before the process of encrypting the drive, it’ll ask to save a recovery file why?

A.     It required for encryption.
B.     Used if the password is forgotten
C.     Used for decryption.
D.     None


24.  Which command used for Local Security Policy?

A.     Secpol.mmc
B.     Secpol.msc
C.     MMC
D.     Services.msc


25.  In Windows 7, the computer creates an EFS certificate and private key when?

A.     While Encrypts a file.
B.     The first time a user encrypts a file.
C.     While Planning encryption.
D.     None