- A user reports that they walked away from their laptop for 30
minutes and when they came back the screen was very dim. The user tried
moving the mouse and increasing the brightness setting, but neither
worked. Which of the following should the technician do FIRST?
A. Plug in an external monitor to test the video card.
B. Run a check disk scan to verify there is no corruption.
C. Check if the laptop is now on battery power.
D. Have the LCD screen replaced with a known good screen.
2.Which of the following BEST describes a situation
that would require STP cable?
A. Installation in an area with low EMI
B. Installation in an area with high EMI
C. Installation in an air handling space
D. Installation in an area with high humidity
3. Which of the following will allow the use of
BitLocker if the computer does not have a TPM chip?
A. External hard drive
B. SCSI hard drive
C. USB key
D. CD-ROM drive
4. A customer reports that their computer is
displaying ‘operating system not found’ while booting. The technician confirms
that the computer booted fine the previous day and that no devices were added.
The technician also confirms that no software changes were made to the system
from the previous day. Which of the following is the problem?
A. The network cable is unplugged.
B. A diskette was placed in the disk
drive.
C. The keyboard is unplugged.
D. The system has been infected with spyware.
5. A new video card requires a 600 watt power
supply. The power supply should have how many pins on the main cable?
A. 12
B. 20
C. 24
D. 26
20.
Which of the following utilities will a technician use to find out
system information, drivers, running
print jobs, and Internet setting all from one
location?
A. MSINFO32
B. REGEDIT
C. Device Manager
D. MSCONFIG
21.
Which of the following interfaces does a sound card use?
A. PCI
B. SATA
C. SCSI
D. AGP
22.
Which of the following would MOST likely be used to aid a technician in
the removal of spyware?
A. ASR
B. Safe Mode
C. Restore Point
D. Recovery Console
23.
A technician is installing a new small form factor motherboard. Which of
the following form factors
is the technician MOST likely installing?
A. Micro ATX
B. NLX
C. ATX
D. BTX
24.
Which of the following maintenance utilities is used to reorganize files
on a hard drive?
A. SCANDISK
B. DEFRAG
C. CHKDSK
D. Disk Cleanup
25.
Which of the following is the number of devices
that can be daisy-chained to an IEEE 1394 port?
A. 7
B. 15
C. 63
D. 127
Communication & personality Development
1. Mr.
Huge was very proud of his auto superstore. “We have such an extensive
selection of cars,” he said, “so everyone should find a vehicle that he or she
will love!”
The word “extensive” means __________.
a) costing
a lot of money
b) large
amount
c) having
no color
d) not
enough
2. Friendship
is a priceless thing. If Chris put a price or conditions on her friendship,
it’s no longer priceless. In fact, it’s not real friendship at all!
If something is priceless, __________.
a) it has
a missing tag
b) it
has no value
c) it has
great value
d) it is
made out of rice
3. The news story was based on a letter that was
a fabrication. Now the reporter who wrote the story is in big trouble. Will
anyone believe him again?
A fabrication is __________.
a) made
of cloth
b) full
of long words
c) funny
d) fake
4. The
reporter insisted that the letter he used was authentic. He said that he had
shown it to many experts before he used it in his story.
When something is authentic, it’s __________.
a)
genuine, or real
b)
carefully written
c)
full of tasty worms
d)
very old
5. In
1975, Governor James promised to do something about the high taxes in our
state. She didn’t present a tax cut bill to lawmakers until 1985. It took her a
decade to keep her promise, but better late than never.
How long is a decade?
a)
75 years
b)
85 years
c)
a century
d)
10 years
6. Paradox
a)
a statement that seems to contradict itself but
contain some truth
b)
using spies or observers
c)
the state of
something or someone
d)
The act handing or running something, usually a
business.
7. Document
a)
Act of moving, action
b)
A newcomer, a beginner, someone new to something
c)
An official paper
d)
On opportunity: a happening, instance or celebration
8. Annual
a)
Yearly
b)
Being alone
c)
Qualified, worthy to be chosen
d)
Able to move
9. Capable
a)
Aware, having knowledge of oneself
b)
Friendly, agreeable
c)
Having the ability to do something: having the
traits necessary to perform some action
d)
Native, having been born in a specific. Area or environment.
10. Chronicle
a)
A list of written works
b)
A place where one goes to hear something
c)
A historical account arranged in order of time
d)
A letter to be sent
11. Translucent
a)
Having a large body
b)
Allowing some light to shine through
c)
Dead
d)
Lack of experience, not
knowledgeable of the world
12. Attest
a)
To ruin, to pull down
b)
To break or burst
c)
To train, to provide schooling for
d)
To provide proof, to say something is true
13. Auction
a)
A sale of goods to the highest bidder
b)
The position of a body
c)
222
14. Chronological
a)
Holing or sticking to something
b)
Uttered by she voice, producing sound
c)
Arranged in order of time
d)
Related to the mind
15. Diagnose
a)
To recognize (disease) by symptoms
b)
To accept, to confess, to allow entry
c)
To come to a conclusion from facts or ideas, to guess
d)
To twist into an abnormal shape
Digital electronic
1. In this ___________system, the digits are 0to 9 and A to F.
A) Binary
B) Octal
C) Hexadecimal
D) Decimal
2. What is term called for the product of the binary number
after taking its two’s complement twice?
A) One’s
complement
B) Two’s
complement
C) Double complement
D) None
of these
3. ECL stands for_____________
A)
Emitter Controlled Logic
B)
Emitter Connected Logic
C)
End Coupled Logic
D)
Emitter Coupled Logic
4. Which of one of this number system is having eight digits in
it?
A) Decimal
B) Hexa
Decimal
C) Binary
D) Octal
5. An Op-amp configuration where the output waveform is the
integral of the input wave form is called___________
A)
Summing Amplifier
B)
Inverting Amplifier
C)
Differentiator
D)
Integrator
6. A + 0 = ______
A)
0
B)
1
C)
A
D)
None of the above
7.
2’s complement of 01101 is
__________
A) 10111
B) 001101
C) 01110
D) 10011
8. What is the Output of a 3-input NAND gate with A = 1, B = 0
and C = 1?
A)
0
B)
1
C)
0.5
D)
None of the above
9. If the capacitor and resistor in the Op-amp Integrator is
replaced, it forms a ____________.
A) Integrator
B) Differentiator
C) Voltage
Follower
D) Summing
Op-amp
10.
_____ adds two binary digits
and produces two binary outputs called Sum and Carry.
A)
Half Adders
B)
Full Adders
C)
Binary Adders
D)
None of the above
11 In the
Exclusive – NOR Gate (XOR), if the input A is low and the input B is high, then
the output is __________.
A)
Low
B)
High
C)
Very High
D)
Very Low
1)
The size of the PC card is __________?
a)
85.6mm X
54.6mm
b)
85.6mm X 54.0mm
c)
85.0mm X
54.0mm
d)
85.0mm X
54.6mm
2)
Lightscribe is used for _____________?
a)
Renaming Discs
b) Labeling Discs
c)
Both
d)
None of the above
3)
Which battery has long life?
a)
Nickel cadmium Batteries
b)
Nickel Metal Hydride Batteries
c)
Lithium Ion Batteries
d)
All of the above
4)
If the video does not work, No need to replace the motherboard
a)
True
b)
False
5)
WI-FI is based on which standards?
a)
IEEE 802.6
b) IEEE 802.11
c)
IEEE 802.12
d)
IEEE 802.15.1
25)
The first laptop was called as __________?
a)
Notebook
b) Osborne1
c)
Subnotebook
d)
None of the above
26)
What features led to the popularity and favorability of Portables over Desktop
computers
a)
Portable weight
b)
Small size
c)
Less heat dissipated
d)
All of the above
27)
What are types of batteries available in the market?
a)
Nickel Cadmium Batteries
b)
Nickel Metal Hydride Batteries
c)
Lithium Ion Batteries
d)
All of the above
e)
None of the above
28)
Which technology is used in Bluetooth for avoiding interference?
a)
Frequency hopping
b)
Frequency Multiplexing
c)
Phase locked looping
d)
Pulse-code Modulation
29)
Expand PCMCIA __________
a)
Personal
Computer Memory Card International Associate
b) Personal Computer Memory Card International Association
c)
Peripheral Components Memory
Card International Association
d) Peripheral Components Memory Card International Associate
30) How
many types of PC cards available?
a) Two
b) One
c) Three
d) Five
N+
1. A client wants to
improve the wireless coverage on the third floor of their house. The wireless
router is located in the basement and there is no easy way to run a cable to
the third floor. Which of the following devices should be installed to extend
the wireless coverage to cover the entire third floor without running cables?
A. Switch
B. Router
C. Repeater
D. Bridge
2. Which of the following describes what the number two represents in
l00Base2 cabling?
A. Fiber
B. Coaxial cable
C. UTP
D. Twisted pair
3. A crossover cable is MOST commonly associated with which of the
following layers of the OSI model?
A. Session
B. Application
C. Network
D. Physical
4. Which of the following devices is used to connect multiple devices to a
network and does not stop broadcast traffic?
A. Switch
B. Hub
C. Modem
D. Repeater
5. A network administrator needs to add an additional connection to a
room. The administrator adds a new Ethernet switch and must connect it to an
existing switch. Which cable type should be used to connect the two switches?
A. CAT3 cable
B. Serial cable
C. Crossover cable
D. Rollover cable
6. Prioritizing traffic between data and voice is defined as which of the
following?
A. Caching engines
B. Proxy server
C. QoS
D. Load balancing
7. Sandy, a
technician, wants to limit access to a wireless network to company owned
laptops, but does not want to use an encryption method. Which of the following
methods would be BEST to accomplish this?
A. MAC filtering
B. SSL VPN
C. PPPoE
D. WPA Enterprise
8. Joe, a network technician, is tasked with installing a router and
firewall to get an office working with Internet access. Which of the following
features MUST be configured to allow sharing of a single public IP address?
A. QoS
B. POP3
C. PAT
D. SMTP
9. Which of the following is a form of encrypting packets for safe, secure
data transmission within a network?
A. RAS
B. PPTP
C. IPSec
D. ICA
10. Two duplicate pieces of equipment can be used in conjunction for which
of the following purposes? (Select TWO)
A. High availability
B. Fault tolerance
C. Reduce latency
D. Wi-MAX
E. CARP
11. The T568B wiring standard slates that CAT5 cables should be coded as
follows:
A. White/Orange, Orange, White/Green, Green, Blue, White/Blue, White/Brown,
Brown,
B. White/Orange, Orange, White/Green, Blue,
White/Blue, Green, White/Brown, Brown,
C. White/Orange, Orange, \White/Green, Green, White/Blue, Blue,
White/Brown, Brown,
D. White/Orange, Orange, White/Green, Blue,
12. Using network monitoring tools would allow an administrator to do which
of the following?
A. Configure offline devices
B. Examine performance issues
C. Install additional software and updates
D. View syslog events
13 . Which of the following wireless technologies can operate at only 5GHz?
A. 802.11b/g
B. 802.11g
C. 802.11b
D. 802.11a
14. Which of the following devices allows multiple internal IP addresses to
access an external website with minimal impact to the network bandwidth?
A. Proxy
B. Load balancer
C. Router
D. Bandwidth shaper
15. A VPN connection is not working correctly and the technician is unable
to ping the VPN server. Which of the following actions should the technician do
FIRST?
A. Call their local ISP
B. Verify the IP information of the server
C. Check their local Internet connection
D. Verify the hostname of the server
16. A technician wants to use an existing DHCP server for three additional
VLANs. Which of the following features needs to be configured to allow for this
addition?
A. DHCP server
B. Proxy server
C. Repeater
D. DHCP relay
Linux
1.Which of the
following key-combinations is used to redo a change undone by a u command in
vim?
A) Ctrl-w, Arrow
B) Ctrl-w, s
C) Ctrl-r
D) Ctrl-w, v
2.You work as
the Network Administrator for Perfect solutions Inc. The company has a
Linux-based Network. You are working as a root user. You want to know what the
day will be on 20 July 2010.Which of the following commands should you use to
accomplish this task?
A) cal
B) cal
20 July
C) cal 7 2010
D) date
3.Which of the
following commands is used to access Windows resources from Linux workstation?
A) rsync
B) mutt
C) scp
D) smbclient
4.You want to
temporarily change your primary group to another group of which you are a
member. In this process, a new shell will be created, and when you exit the
shell, your previous group will be reinstated. Which of the following commands
will you use to accomplish this task?
A) chmod
B) newgrp
C) chgrp
D) chown
5.Fill in the
blank with the required permission to complete the statement below. In order to
make a script executable in a Linux computer, you must assign the___________
permission to the script file.
A)
execute
B)
read
C)
read & write
D)
write
6.You work as a
Network Administrator for McNeil Inc. The company has a Linux-based network.
David, a Sales Manager, wants to know the name of the shell that he is
currently using. Which of the following commands will he use to accomplish the
task?
A) ECHO
$shell
B) RM $shell
C) MV $shell
D) LS $shell
7.Which of the
following text editing tools can be used to edit text files without having to
open them?
A) less
B) sed
C) vi
D) more
8.Which of the
following commands is used to securely copy files from one host to another over
the network?
A) ls
B) cat
C) mutt
D) scp
9.Fill in the
blank with the appropriate tool. __________ is a public domain collection of
tools to allow Unix systems to
manipulate MS-DOS files: read, write, and move around files on an MSDOS file
system.
A)
mtools
B)
ntools
C)
xtools
D)
tools
10. Which of the
following commands will you use to list all local and remote printers attached
to your computer?
A) lpq
B) lpstat -d
C)
lpstat -t
D) lpr
11. Which of the
following files is the default configuration file of XDM (X Window Display
Manager)?
A) /etc/X11/xdm/xdm-config
B) $HOME/.Xauthority
C) /usr/bin/xdm-config
D) /usr/bin/xterm
12. Which of the
following commands is used to append the list of files in the /tmp directory to
an existing file named deletelater.txt?
A) ls /tmp >
deletelater.txt
B) ls
deletelater.txt /tmp
C) ls /tmp
deletelater.txt
D) ls
/tmp >> deletelater.txt
13. You
work as a Technician for Net World Inc. The company has a Linux-based network.
You have configured a file server on the company's etwork. You want to
summarize disk usage of each file in a particular directory on the file server.
Which of the following commands will you use?
A) du
B) fsck
C) df
D) dfsck
14. You work as
the Network Administrator for Perfect Solutions Inc. The company has a
Linux-based network. You are a root user on the Red Hat operating system. You
want to keep an eye on the system log file /var/adm/messages. Which of the
following commands should you use to read the
file in real time?
A) tail
-f /var/adm/messages
B) tail
/var/adm/messages
C) cat
/var/adm/messages
D) tail -n 3
/var/adm/messages
15. You work as
the Network Administrator for Tech Perfect Inc. The company has a
Linux-based network. You are working as
a root user on the Linux operating system. You have created a file in the vim text editor. You want to save this
file and exit it. Which of the following keys should you use to accomplish the task?
A) :w
B) :wq
C) :q!
D) :
16. Which of the
following commands is used to change file access permissions in Linux?
A) chown
B) chmod
C) chperm
D) chgrp
17. Which of the
following commands is used to view the PDF files in Linux?
A) ps2pdf
B) a2ps
C)
pdf2ps
D) evince
18. You work as a
Network Administrator for Perfect Solutions Inc. The company has a Linux-based
network. You want to view the status of the current processes running on a
Linux computer. You also want to append this information into the StatPro.txt
file without deleting its content. Which of the following commands will you use
to accomplish the task?
A) ps
StatPro.txt
B) ps >>
StatPro.txt
C) ps | more
StatPro.txt
D) ps >
StatPro.txt
19. When you
remove a user account from your Linux system, the files and directories of this
user may still remain on the system. Which of the following commands can you
use to remove all items from your Linux system? Each correct answer represents
a complete solution. Choose two.
A) userdel
-r
B) userdel
-f
C) userdel -h
D) userdel -c
20. You work as
the Network Administrator for Perfect solutions Inc. The company has a
Linux-based Network. You are a root user on the Red Hat operating system. You
want to grant ownership of the file
foofile to a user John. Which of the following commands should you use to
accomplish this task?
A) chown
John foofile
B) chmod John
foofile
C) chgrp foofile
John
D) chown foofile
John
21. Which of the
following cp command parameters copies only when the source file is newer than
the destination file or when the destination file is missing?
A) -u
B) -l
C) -p
D) -s
35.Which
graphical mail client is the default tool for email and groupware in Red Hat
Enterprise Linux?
A) mutt
B) Evolution
C) Thunderbird
D) pidgin
Windows 7
1.
Windows logo
key+F used for_______________.
a.
Open the Search window
b. Select or move between desktop gadgets
c. Select or move between taskbar buttons
d. Open the Ease Of Access Center window
2.
The
aero shake feature will work if which of the following conditions are met?
choose Two.
a. A display adapter
compatible with WDDM is installed.
b. Aero features are downloaded from
Microsoft.
c.
The windows experience index is at least 2.
d. The windows experience index is 3 or
greater.
3.
Which
of the following can be used to increase the physical memory on your Windows 7
pc and increase the speed?
a. Physical RAM
b. Aero Glass
c. DirectAccess
d.
ReadtyBoost
4.
Which
of the following is used to control when the security pop-up notification are
used?
a. Security Control Manager
b.
User Account Control
c. User Account Control Panel
d. Notification Control Settings Manager
5.
Which
of the following operating system support an offline migration using USMT?
a.
Windows 2000 professional
b.
Windows XP professional
c.
Windows Vista
d. Windows7
6.
Which
of the following is not a volume type usable by Windows 7?
a. FAT
b. exFAT
c. NTFS
d.
All of the above
7.
To
establish a DirectAccess connection to the network, what is the first
requirement?
a. Install a certificate
b. Create a VPN connection
c. A static IPv4 address
d.
A static IPv6 address
8.
You
are using the sysprep tool to prepare a Windows 7 installing to be imaged
.Which command-line option removes all unique system information from the
installation?
a. /audit
b. /oobe
c.
/generalize
d. /unattend
9.
You
wish to add file to a VHD. What action should you perform first?
a. ImageX /mountrw
b. In windows explorer .right-click the.
VHD file and open.
c.
In diskpart, select the disk and attach
d. Use DISM /online /apply
10.
Which of the following will cause the online compatibility
check to fail during a Windows 7 installation?
a.
512MB
of RAM
b.
A
display adapter with WDDM support
c.
A
display adapter without WDDM Support but with SVIDEO
d.
An
80 GB HDD
11.
Which
of the following must you download from Microsoft’s Web site to obtain USMT
4.0?
a.
Windows
any time update
b.
Windows
upgrade advisor
c.
WAIK
d.
Microsoft
Application Compatibility Toolkit
12.
Which
of the following VPN types support the VPN Reconnect feature of Windows 7?
a.
L2TP/IPsec
b.
PPTP
c.
IKEv2
d.
SSTP
13.
You
are responsible for managing company laptops that have Windows 7 installed at a
small library. You want to prevent staff from uploading files using FTP to FTP
sites but allow them to send outbound email messages using the Simple Mail
Transfer Protocol (SMTP). Which of the following rules would you configure to
achieve this?
a.
Inbound
rules
b.
Outbound
rules
c.
Isolation
rules
d.
Authentication
exemption rules
14.
Your
friend has installed new device drivers on his computer. Unfortunately it was a
beta early release and his computer boots to a blank screen now. You help him
out by restarting the computer and pressing F8. However, what Advanced Boot
Option would NOT help fix the situation?
a.
Enable
Boot Logging
b.
Safe
Mode
c.
Safe
Mode with Networking
d.
Last
Known Good Configuration (Advanced)
15. How to access file and folder though network?
A. \\ computer name
B. // computer name
C.
\\ computer\Ip
D. None
16. In following Which is Class B IP?
A. 126.254.255.255
B. 191.255.255.254
C. 192.127.156.134
D. 223.123.124.234
17. What is the port number of HHTP?
A.
443
B. 68
C. 80
D. 23
18. Which
Security option is not available in windows7?
A.
Action
Center
B. AppLocker
C. Bitlocker
D. None
19. Encrypting File System
is not available in Windows7_______.
A. Ultimate
B. Professional
C. Enterprise
D.
Home
basic
20. In Software Restriction
Policies, when you configure two conflicting rules for a particular program?
A.
The most specific rule takes precedence.
B. We can’t configure
policy.
C. Default first will be
applied
D. Default second will be
applied.
21. ____________Tool
protects your PC against hackers and malicious software?
A.
User Account Control
B.
Local policy
C.
None
22. Which is a new feature
of Internet Explorer 8?
A.
SmartScreen Filter
B.
Advanced tab
C.
Favorites
D.
Safety
23. Before the process of
encrypting the drive, it’ll ask to save a recovery file why?
A. It required for
encryption.
B. Used if the password is
forgotten
C. Used for decryption.
D. None
24. Which
command used for Local Security Policy?
A.
Secpol.mmc
B. Secpol.msc
C. MMC
D. Services.msc
25. In Windows 7, the
computer creates an EFS certificate and private key when?
A. While
Encrypts a file.
B. The first time a user
encrypts a file.
C. While
Planning encryption.
D. None