- A user reports that they walked away from
their laptop for 30 minutes and when they came back the screen was very
dim. The user tried moving the mouse and increasing the brightness setting,
but neither worked. Which of the following should the technician do FIRST?
A. Plug in an external monitor to test the video card.
B. Run a check disk scan to verify there is no
corruption.
C. Check if the laptop is now on battery power.
D. Have the LCD screen replaced with a known good
screen.
2.Which of the following BEST describes a situation that would require
STP cable?
A. Installation in an area with low EMI
B. Installation in an area with high EMI
C. Installation in an air handling space
D. Installation in an area with high humidity
3. Which of the following will allow the use of BitLocker if the
computer does not have a TPM chip?
A. External hard drive
B. SCSI hard drive
C. USB key
D. CD-ROM drive
4. A customer reports that their computer is displaying ‘operating
system not found’ while booting. The technician confirms that the computer
booted fine the previous day and that no devices were added. The technician
also confirms that no software changes were made to the system from the
previous day. Which of the following is the problem?
A. The network cable is unplugged.
B. A diskette was placed in the disk drive.
C. The keyboard is unplugged.
D. The system has been infected with spyware.
5. A new video card requires a 600 watt power supply. The power supply
should have how many pins on the main cable?
A. 12
B. 20
C. 24
D. 26
20. Which of the following utilities will a technician use to find out
system information, drivers, running
print jobs, and Internet setting all from one location?
A. MSINFO32
B. REGEDIT
C. Device Manager
D. MSCONFIG
21. Which of the following interfaces does a sound card use?
A. PCI
B. SATA
C. SCSI
D. AGP
22. Which of the following would MOST likely be used to aid a technician in
the removal of spyware?
A. ASR
B. Safe Mode
C. Restore Point
D. Recovery Console
23. A technician is installing a new small form factor motherboard. Which of
the following form factors
is the technician MOST likely installing?
A. Micro ATX
B. NLX
C. ATX
D. BTX
24. Which of the following maintenance utilities is used to reorganize files
on a hard drive?
A. SCANDISK
B. DEFRAG
C. CHKDSK
D. Disk Cleanup
25. Which of the following is the number of devices
that can be daisy-chained to an IEEE 1394 port?
A. 7
B. 15
C. 63
D. 127
Communication & personality Development
1. Mr. Huge was very proud of his auto superstore. “We
have such an extensive selection of cars,” he said, “so everyone should find a
vehicle that he or she will love!”
The word
“extensive” means __________.
a) costing a lot of money
b) large amount
c) having no color
d) not enough
2. Friendship is a priceless thing. If Chris put a price
or conditions on her friendship, it’s no longer priceless. In fact, it’s not
real friendship at all!
If something is
priceless, __________.
a) it has a missing tag
b) it has no value
c) it has great value
d) it is made out of rice
3. The news
story was based on a letter that was a fabrication. Now the reporter who wrote
the story is in big trouble. Will anyone believe him again?
A fabrication is
__________.
a) made of cloth
b) full of long words
c) funny
d) fake
4. The reporter insisted that the letter he used was authentic.
He said that he had shown it to many experts before he used it in his story.
When something is
authentic, it’s __________.
a) genuine, or real
b) carefully written
c) full of tasty worms
d) very old
5. In 1975, Governor James promised to do something about
the high taxes in our state. She didn’t present a tax cut bill to lawmakers
until 1985. It took her a decade to keep her promise, but better late than
never.
How long is a
decade?
a) 75 years
b) 85 years
c) a century
d) 10 years
6. Paradox
a) a statement that seems to contradict itself but
contain some truth
b) using spies or observers
c) the state of
something or someone
d) The act handing or running something, usually a
business.
7. Document
a) Act of moving, action
b) A newcomer, a beginner, someone new to something
c) An official paper
d) On opportunity: a happening, instance or celebration
8. Annual
a) Yearly
b) Being alone
c) Qualified, worthy to be chosen
d) Able to move
9. Capable
a) Aware, having knowledge of oneself
b) Friendly, agreeable
c) Having the ability to do something: having the traits necessary to
perform some action
d) Native, having been born in a specific. Area or environment.
10. Chronicle
a) A list of written works
b) A place where one goes to hear something
c) A historical account arranged in order of time
d) A letter to be sent
11. Translucent
a) Having a large body
b) Allowing some light to shine through
c) Dead
d) Lack of experience, not
knowledgeable of the world
12. Attest
a) To ruin, to pull down
b) To break or burst
c) To train, to provide schooling for
d) To provide proof, to say something is true
13. Auction
a) A sale of goods to the highest bidder
b) The position of a body
c) One who believes that any ultimate reality I unknowable
14. Chronological
a) Holing or sticking to something
b) Uttered by she voice, producing sound
c) Arranged in order of time
d) Related to the mind
15. Diagnose
a) To recognize (disease) by symptoms
b) To accept, to confess, to allow entry
c) To come to a conclusion from facts or ideas, to guess
d) To twist into an abnormal shape
Digital electronic
1.
In this ___________system, the digits are 0to 9 and A to F.
A)
Binary
B)
Octal
C)
Hexadecimal
D)
Decimal
2.
What is term called for the product of the binary number
after taking its two’s complement twice?
A)
One’s
complement
B)
Two’s
complement
C)
Double
complement
D)
None
of these
3.
ECL stands for_____________
A) Emitter Controlled Logic
B) Emitter Connected Logic
C) End Coupled Logic
D) Emitter Coupled Logic
4.
Which of one of this number system is having eight digits in
it?
A)
Decimal
B)
Hexa
Decimal
C)
Binary
D)
Octal
5.
An Op-amp configuration where the output waveform is the
integral of the input wave form is called___________
A) Summing Amplifier
B) Inverting Amplifier
C) Differentiator
D) Integrator
6.
A + 0 = ______
A) 0
B) 1
C) A
D) None of the above
7.
2’s complement of 01101 is __________
A)
10111
B)
001101
C)
01110
D)
10011
8.
What is the Output of a 3-input NAND gate with A = 1, B = 0
and C = 1?
A) 0
B) 1
C) 0.5
D) None of the above
9.
If the capacitor and resistor in the Op-amp Integrator is
replaced, it forms a ____________.
A)
Integrator
B)
Differentiator
C)
Voltage
Follower
D)
Summing
Op-amp
10.
_____ adds two binary digits and produces two binary outputs
called Sum and Carry.
A) Half Adders
B) Full Adders
C) Binary Adders
D) None of the above
11 In the Exclusive – NOR Gate (XOR), if the input A
is low and the input B is high, then the output is __________.
A) Low
B) High
C) Very High
D) Very Low
1) The size of the PC card is __________?
a)
85.6mm X 54.6mm
b)
85.6mm X 54.0mm
c)
85.0mm X 54.0mm
d)
85.0mm X 54.6mm
2) Lightscribe is used for _____________?
a) Renaming Discs
b) Labeling Discs
c) Both
d) None of the above
3) Which battery has long life?
a) Nickel cadmium Batteries
b) Nickel Metal Hydride Batteries
c) Lithium Ion Batteries
d) All of the above
4) If the video does not work, No need to
replace the motherboard
a) True
b) False
5) WI-FI is based on which standards?
a) IEEE 802.6
b) IEEE 802.11
c) IEEE 802.12
d) IEEE 802.15.1
25) The first laptop was called as
__________?
a) Notebook
b) Osborne1
c) Subnotebook
d) None of the above
26) What features led to the popularity and
favorability of Portables over Desktop computers
a) Portable weight
b) Small size
c) Less heat dissipated
d) All of the above
27) What are types of batteries available
in the market?
a) Nickel Cadmium Batteries
b) Nickel Metal Hydride Batteries
c) Lithium Ion Batteries
d) All of the above
e) None of the above
28) Which technology is used in Bluetooth
for avoiding interference?
a) Frequency hopping
b) Frequency Multiplexing
c) Phase locked looping
d) Pulse-code Modulation
29) Expand PCMCIA __________
a) Personal Computer Memory
Card International Associate
b) Personal Computer Memory
Card International Association
c) Peripheral Components Memory Card International
Association
d) Peripheral Components Memory Card International
Associate
30) How many types of PC cards available?
a) Two
b) One
c) Three
d) Five
N+
1. A client wants to improve the wireless coverage on
the third floor of their house. The wireless router is located in the basement
and there is no easy way to run a cable to the third floor. Which of the
following devices should be installed to extend the wireless coverage to cover
the entire third floor without running cables?
A. Switch
B. Router
C. Repeater
D. Bridge
2. Which of the following describes what the number two represents in
l00Base2 cabling?
A. Fiber
B. Coaxial cable
C. UTP
D. Twisted pair
3. A crossover cable is MOST commonly associated with which of the following
layers of the OSI model?
A. Session
B. Application
C. Network
D. Physical
4. Which of the following devices is used to connect multiple devices to a
network and does not stop broadcast traffic?
A. Switch
B. Hub
C. Modem
D. Repeater
5. A network administrator needs to add an additional connection to a
room. The administrator adds a new Ethernet switch and must connect it to an
existing switch. Which cable type should be used to connect the two switches?
A. CAT3 cable
B. Serial cable
C. Crossover cable
D. Rollover cable
6. Prioritizing traffic between data and voice is defined as which of the
following?
A. Caching engines
B. Proxy server
C. QoS
D. Load balancing
7. Sandy, a technician,
wants to limit access to a wireless network to company owned laptops, but does
not want to use an encryption method. Which of the following methods would be
BEST to accomplish this?
A. MAC filtering
B. SSL VPN
C. PPPoE
D. WPA Enterprise
8. Joe, a network technician, is tasked with installing a router and
firewall to get an office working with Internet access. Which of the following
features MUST be configured to allow sharing of a single public IP address?
A. QoS
B. POP3
C. PAT
D. SMTP
9. Which of the following is a form of encrypting packets for safe, secure
data transmission within a network?
A. RAS
B. PPTP
C. IPSec
D. ICA
10. Two duplicate pieces of equipment can be used in conjunction for which
of the following purposes? (Select TWO)
A. High availability
B. Fault tolerance
C. Reduce latency
D. Wi-MAX
E. CARP
11. The T568B wiring standard slates that CAT5 cables should be coded as
follows:
A. White/Orange, Orange, White/Green, Green, Blue,
White/Blue, White/Brown, Brown,
B. White/Orange, Orange, White/Green, Blue,
White/Blue, Green, White/Brown, Brown,
C. White/Orange, Orange, \White/Green, Green,
White/Blue, Blue, White/Brown, Brown,
D. White/Orange, Orange, White/Green, Blue,
12. Using network monitoring tools would allow an administrator to do which
of the following?
A. Configure offline devices
B. Examine performance issues
C. Install additional software and updates
D. View syslog events
13 . Which of the following wireless technologies can operate at only 5GHz?
A. 802.11b/g
B. 802.11g
C. 802.11b
D. 802.11a
14. Which of the following devices allows multiple internal IP addresses to
access an external website with minimal impact to the network bandwidth?
A. Proxy
B. Load balancer
C. Router
D. Bandwidth shaper
15. A VPN connection is not working correctly and the technician is unable
to ping the VPN server. Which of the following actions should the technician do
FIRST?
A. Call their local ISP
B. Verify the IP information of the server
C. Check their local Internet connection
D. Verify the hostname of the server
16. A technician wants to use an existing DHCP server for three additional
VLANs. Which of the following features needs to be configured to allow for this
addition?
A. DHCP server
B. Proxy server
C. Repeater
D. DHCP relay
Linux
1.Which of the following key-combinations is used to redo a change undone
by a u command in vim?
A) Ctrl-w, Arrow
B) Ctrl-w, s
C) Ctrl-r
D) Ctrl-w, v
2.You work as the Network Administrator for Perfect solutions Inc. The company
has a Linux-based Network. You are working as a root user. You want to know
what the day will be on 20 July 2010.Which of the following commands should you
use to accomplish this task?
A) cal
B) cal 20 July
C) cal 7 2010
D) date
3.Which of the following commands is used to access Windows resources from
Linux workstation?
A)
rsync
B)
mutt
C)
scp
D)
smbclient
4.You want to temporarily change your primary group to another group of
which you are a member. In this process, a new shell will be created, and when you
exit the shell, your previous group will be reinstated. Which of the following
commands will you use to accomplish this task?
A)
chmod
B)
newgrp
C)
chgrp
D)
chown
5.Fill in the blank with the required permission to complete the statement
below. In order to make a script executable in a Linux computer, you must
assign the___________ permission to the script file.
A)
execute
B)
read
C)
read &
write
D)
write
6.You work as a Network Administrator for McNeil Inc. The company has a Linux-based
network. David, a Sales Manager, wants to know the name of the shell that he is
currently using. Which of the following commands will he use to accomplish the
task?
A) ECHO $shell
B) RM $shell
C) MV $shell
D) LS $shell
7.Which of the following text editing tools can be used to edit text files
without having to open them?
A) less
B) sed
C) vi
D) more
8.Which of the following commands is used to securely copy files from one
host to another over the network?
A)
ls
B)
cat
C)
mutt
D)
scp
9.Fill in the blank with the appropriate tool. __________ is a public
domain collection of tools to allow Unix
systems to manipulate MS-DOS files: read, write, and move around files on an
MSDOS file system.
A)
mtools
B)
ntools
C)
xtools
D)
tools
10.
Which of the following
commands will you use to list all local and remote printers attached to your
computer?
A) lpq
B) lpstat -d
C)
lpstat -t
D) lpr
11.
Which of the
following files is the default configuration file of XDM (X Window Display
Manager)?
A)
/etc/X11/xdm/xdm-config
B)
$HOME/.Xauthority
C)
/usr/bin/xdm-config
D)
/usr/bin/xterm
12.
Which of the
following commands is used to append the list of files in the /tmp directory to
an existing file named deletelater.txt?
A) ls /tmp > deletelater.txt
B) ls deletelater.txt /tmp
C) ls /tmp deletelater.txt
D) ls /tmp >> deletelater.txt
13.
You
work as a Technician for Net World Inc. The company has a Linux-based network.
You have configured a file server on the company's etwork. You want to
summarize disk usage of each file in a particular directory on the file server.
Which of the following commands will you use?
A)
du
B)
fsck
C)
df
D)
dfsck
14.
You work as
the Network Administrator for Perfect Solutions Inc. The company has a
Linux-based network. You are a root user on the Red Hat operating system. You want
to keep an eye on the system log file /var/adm/messages. Which of the following
commands should you use to read the file
in real time?
A) tail -f /var/adm/messages
B) tail /var/adm/messages
C) cat /var/adm/messages
D) tail -n 3 /var/adm/messages
15.
You work as
the Network Administrator for Tech Perfect Inc. The company has a
Linux-based network. You are working as
a root user on the Linux operating system. You have created a file in the vim text editor. You want to save this
file and exit it. Which of the following keys should you use to accomplish the task?
A)
:w
B)
:wq
C)
:q!
D)
:
16.
Which of the
following commands is used to change file access permissions in Linux?
A) chown
B) chmod
C) chperm
D) chgrp
17.
Which of the
following commands is used to view the PDF files in Linux?
A) ps2pdf
B) a2ps
C)
pdf2ps
D) evince
18.
You work as a
Network Administrator for Perfect Solutions Inc. The company has a Linux-based
network. You want to view the status of the current processes running on a Linux
computer. You also want to append this information into the StatPro.txt file
without deleting its content. Which of the following commands will you use to
accomplish the task?
A)
ps
StatPro.txt
B)
ps >>
StatPro.txt
C)
ps | more
StatPro.txt
D)
ps >
StatPro.txt
19.
When you
remove a user account from your Linux system, the files and directories of this
user may still remain on the system. Which of the following commands can you
use to remove all items from your Linux system? Each correct answer represents
a complete solution. Choose two.
A) userdel -r
B) userdel -f
C) userdel -h
D) userdel -c
20.
You work as
the Network Administrator for Perfect solutions Inc. The company has a
Linux-based Network. You are a root user on the Red Hat operating system. You want
to grant ownership of the file foofile
to a user John. Which of the following commands should you use to accomplish
this task?
A) chown John foofile
B) chmod John foofile
C) chgrp foofile John
D) chown foofile John
21.
Which of the
following cp command parameters copies only when the source file is newer than
the destination file or when the destination file is missing?
A)
-u
B)
-l
C)
-p
D)
-s
35.Which graphical mail client is the default tool for
email and groupware in Red Hat Enterprise Linux?
A) mutt
B) Evolution
C) Thunderbird
D) pidgin
Windows 7
1. Windows
logo key+F used for_______________.
a.
Open the Search window
b.
Select or move between desktop gadgets
c.
Select or move between taskbar buttons
d.
Open the Ease Of Access Center window
2. The aero
shake feature will work if which of the following conditions are met? choose
Two.
a.
A display adapter compatible with WDDM
is installed.
b.
Aero features are downloaded from
Microsoft.
c.
The windows experience index is at least
2.
d.
The windows experience index is 3 or
greater.
3. Which
of the following can be used to increase the physical memory on your Windows 7
pc and increase the speed?
a.
Physical RAM
b.
Aero Glass
c.
DirectAccess
d.
ReadtyBoost
4. Which
of the following is used to control when the security pop-up notification are
used?
a.
Security Control Manager
b.
User Account Control
c.
User Account Control Panel
d.
Notification Control Settings Manager
5. Which
of the following operating system support an offline migration using USMT?
a.
Windows 2000 professional
b.
Windows XP professional
c.
Windows Vista
d.
Windows7
6. Which
of the following is not a volume type usable by Windows 7?
a.
FAT
b.
exFAT
c.
NTFS
d.
All of the above
7. To
establish a DirectAccess connection to the network, what is the first
requirement?
a.
Install a certificate
b.
Create a VPN connection
c.
A static IPv4 address
d.
A static IPv6 address
8. You
are using the sysprep tool to prepare a Windows 7 installing to be imaged
.Which command-line option removes all unique system information from the
installation?
a.
/audit
b.
/oobe
c.
/generalize
d.
/unattend
9. You
wish to add file to a VHD. What action should you perform first?
a.
ImageX /mountrw
b.
In windows explorer .right-click the.
VHD file and open.
c.
In diskpart, select the disk and attach
d.
Use DISM /online /apply
10. Which of the following will cause the online
compatibility check to fail during a Windows 7 installation?
a. 512MB
of RAM
b. A
display adapter with WDDM support
c. A
display adapter without WDDM Support but with SVIDEO
d. An
80 GB HDD
11. Which
of the following must you download from Microsoft’s Web site to obtain USMT
4.0?
a. Windows
any time update
b. Windows
upgrade advisor
c. WAIK
d. Microsoft
Application Compatibility Toolkit
12. Which
of the following VPN types support the VPN Reconnect feature of Windows 7?
a. L2TP/IPsec
b. PPTP
c. IKEv2
d. SSTP
13. You
are responsible for managing company laptops that have Windows 7 installed at a
small library. You want to prevent staff from uploading files using FTP to FTP
sites but allow them to send outbound email messages using the Simple Mail
Transfer Protocol (SMTP). Which of the following rules would you configure to
achieve this?
a. Inbound
rules
b. Outbound
rules
c. Isolation
rules
d. Authentication
exemption rules
14. Your
friend has installed new device drivers on his computer. Unfortunately it was a
beta early release and his computer boots to a blank screen now. You help him
out by restarting the computer and pressing F8. However, what Advanced Boot
Option would NOT help fix the situation?
a. Enable
Boot Logging
b. Safe
Mode
c. Safe
Mode with Networking
d. Last
Known Good Configuration (Advanced)
15. How to access file and folder though network?
A.
\\ computer name
B.
// computer name
C.
\\ computer\Ip
D.
None
16. In following Which is Class B IP?
A.
126.254.255.255
B.
191.255.255.254
C.
192.127.156.134
D.
223.123.124.234
17. What is the port number of HHTP?
A.
443
B.
68
C.
80
D.
23
18.
Which
Security option is not available in windows7?
A.
Action Center
B.
AppLocker
C.
Bitlocker
D.
None
19.
Encrypting File System is not available in
Windows7_______.
A.
Ultimate
B.
Professional
C.
Enterprise
D.
Home
basic
20.
In
Software Restriction Policies, when you configure two conflicting rules for a
particular program?
A. The most specific rule takes precedence.
B.
We can’t configure
policy.
C.
Default first will be
applied
D.
Default second will be
applied.
21.
____________Tool protects your PC against hackers
and malicious software?
A. User Account Control
B. Local policy
C. None
22.
Which is a new feature of Internet Explorer 8?
A. SmartScreen Filter
B. Advanced tab
C. Favorites
D. Safety
23.
Before the process of encrypting the drive, it’ll
ask to save a recovery file why?
A.
It required for encryption.
B.
Used if the password is forgotten
C.
Used for decryption.
D.
None
24.
Which
command used for Local Security Policy?
A.
Secpol.mmc
B.
Secpol.msc
C.
MMC
D.
Services.msc
25.
In Windows 7, the computer creates an EFS
certificate and private key when?
A.
While
Encrypts a file.
B.
The first time a user encrypts a file.
C.
While
Planning encryption.
D.
None
No comments:
Post a Comment