Practice Exam 2: CompTIA A+ 220-702

The 100 multiple-choice questions provided here help you to determine how prepared you are for the actual exam, and which topics you need to review further. Write down your answers on a separate sheet of paper so that you can take this exam again if necessary. Compare your answers against the answer key that follows this exam.

1. What is the delay in the RAM’s response to a request from the memory controller called?

image A. Latency

image B. Standard deviation

image C. Fetch interval

image D. Lag

2. In a standard ATX-based computer, how many IDE devices can be installed?

image A. 1

image B. 2

image C. 4

image D. 8

3. What is the minimum number of hard drives necessary to implement RAID 5?

image A. 2

image B. 5

image C. 3

image D. 4

4. Which of the following precautions should be taken so that ESD does not cause damage to a computer that is being repaired? Select all that apply.

image A. Use an antistatic strap.

image B. Wear shoes with rubber soles.

image C. Spray antistatic spray on the components.

image D. Put the computer on an antistatic mat.

5. You start a new computer and nothing seems to happen. Upon closer inspection, you can hear the hard drive spinning; however, nothing is coming up on the monitor. Which of the following would not be a reason for this?

image A. The monitor is not on.

image B. The video card is not properly seated.

image C. The monitor is not connected to the PC.

image D. The PC is not connected to the AC outlet.

6. What is the easiest way to monitor the battery health of a UPS?

image A. Use the UPS monitoring software.

image B. Use a voltmeter.

image C. Replace the battery every year.

image D. Use Event Viewer.

7. A computer you are working on has a lot of dust inside. How should you clean this?

image A. Disassemble the power supply and remove the dust.

image B. Use a vacuum to clean up the dust.

image C. Use a surface dust cleaning solution.

image D. Use compressed air to remove the dust.

8. What function is performed by the external power supply of a laptop?

image A. Increases voltage

image B. Stores power

image C. Converts DC power to AC power

image D. Converts AC power to DC power

9. Which one of the following keys is found only on a laptop?

image A. Ctrl key

image B. Fn key

image C. Shift key

image D. Numlock key

10. Which of the following commands creates a new directory in the Windows Command Prompt?

image A. CD

image B. MD

image C. RD

image D. SD

11. To learn more about the PING command, what would you enter at the command line?

image A. PING HELP

image B. HELP PING

image C. PING /?

image D. PING ?

12. Which syntax will enable you to see your computer’s MAC address?

image A. IPCONFIG /?

image B. IPCONFIG /everything

image C. PING /everything

image D. IPCONFIG /all

13. A customer’s computer is using FAT16. What file system can you upgrade it to when using the convert command?

image A. NTFS

image B. HPFS

image C. FAT32

image D. NFS

14. How do you change the virtual memory in Windows XP?

image A. Click Start > Settings > Control Panel > Virtual Memory.

image B. It is not possible.

image C. Go to the System Properties window, click the Advanced tab, select Performance Options. Click Change and enter the new virtual memory.

image D. Go to the System Properties window and select Performance Options. Click Change and enter the new virtual memory.

15. How can you configure Windows XP’s virtual memory to optimal settings?

image A. Set the virtual memory to No Paging File.

image B. Set Windows to Automatically Manage Size.

image C. Manually set the virtual memory settings to 1MB.

image D. Set the virtual memory manually to one-third of RAM.

16. Jake’s Windows Vista computer has several programs running in the system tray that take up a lot of memory and processing power. He would like you to turn them off permanently. What tool should you use to do this?

image A. MSCONFIG.EXE

image B. SYSEDIT.EXE

image C. IPCONFIG /RELEASE

image D. Task Manager

17. What is a common risk when installing Windows drivers that are unsigned?

image A. System stability may be compromised.

image B. Files might be cross-linked.

image C. The drive might become fragmented.

image D. Physical damage to devices might occur.

18. Which of the following answers can be used to keep disk drives free of errors and Windows XP running efficiently? Select all that apply.

image A. Disk Management

image B. Disk Defragmenter

image C. Check Disk

image D. System Restore

image E. Scheduled Tasks

19. Tom has a 30GB hard disk partition (known as C:). He has 1.5GB free space on the partition. How can he defrag the partition?

image A. He can run the Disk Defragmenter in Computer Management.

image B. He can run DEFRAG.EXE –f in the command line.

image C. He can run DEFRAG.EXE –v in the command line.

image D. He can run the Disk Defragmenter in Computer Management with the Vigor option.

20. Buzz gets an error that says “Error log full.” Where should you go to clear his Error log?

image A. Device Manager

image B. System Information

image C. Recovery Console

image D. Event Viewer

21. What is Windows Vista’s recovery environment known as? (Select all that apply.)

image A. WinRE

image B. Recovery Console

image C. Advanced Boot Options

image D. System Recovery Options

22. A user’s time and date keeps resetting to January 1st, 2000. What is the most likely cause?

image A. The BIOS needs to be updated.

image B. Windows needs to be updated.

image C. The Windows Date and Time Properties window needs to be modified.

image D. The lithium battery needs to be replaced.

23. What would you need to access to boot the computer into Safe Mode?

image A. WinRE

image B. Recovery Console

image C. Advanced Boot Options

image D. System Restore

24. What command repairs the bootmgr.exe file in Windows Vista?

image A. bootrec /fixboot

image B. bootrec /fixmbr

image C. bootrec /rebuildbcd

image D. boot/bcd

25. If you get a Code 1 message about a particular device in the Device Manager, what should you do?

image A. Close applications and install RAM.

image B. Disable the device.

image C. Update the driver.

image D. Reinstall the driver.

26. Which tool checks protected system files?

image A. Chkdsk

image B. Xcopy

image C. Scandisk

image D. SFC

27. What are the six steps of the laser-printing process in order?

image A. Cleaning, charging, writing, developing, transferring, fusing

image B. Charging, cleaning, writing, developing, transferring, fusing

image C. Cleaning, charging, writing, transferring, developing, fusing

image D. Charging, cleaning, writing, transferring, developing, fusing

28. How many pins would you see in a high-quality printhead on a dot matrix printer?

image A. 24

image B. 15

image C. 8

image D. 35

29. Which of the following would indicate a secured HTTP server?

image A. HTTPSSL://www.davidlprowse.com

image B. HTTPS://www.davidlprowse.com

image C. HTTP://www.davidlprowse.com

image D. HTTP://www.davidlprowse.com/secure

30. The IP address 192.168.1.1 should have what default subnet mask?

image A. 255.255.0.0

image B. 255.255.255.0

image C. 255.0.0.0

image D. 255.255.255.255

31. Joey’s computer was working fine for weeks, and suddenly it cannot connect to the Internet. Joey runs the command ipconfig and sees that the IP address his computer is using is 169.254.50.68. What can he conclude from this?

image A. The computer cannot access the DHCP server.

image B. The computer cannot access the POP3 server.

image C. The computer cannot access the DNS server.

image D. The computer cannot access the WINS server.

32. Which of the following commands ping the loopback address?

image A. PING 127.0.0.1

image B. PING 10.0.0.1

image C. PING 1.0.0.127

image D. PING \localhost

33. Which of these is an example of social engineering?

image A. Asking for a username and password over the phone

image B. Using someone else’s unsecured wireless network

image C. Hacking into a router

image D. A virus

34. Which of the following settings must be established if you want to make a secure wireless connection? Select all that apply.

image A. The brand of access point

image B. The wireless standard used

image C. The encryption standard used

image D. The SSID of the access point

35. A co-worker is traveling to Europe and is bringing her computer. She asks you what safety concerns there might be. What should you tell her?

image A. That computer is not usable in other countries.

image B. Check for a compatible power adapter for that country.

image C. Use a line conditioner for the correct voltage.

image D. Check the voltage selector on the power supply.

36. A customer wants you to replace the fan in her power supply. What should you do?

image A. Order the correct replacement fan and replace it.

image B. Clean the inside of the power supply first.

image C. Unplug the power supply first.

image D. Refuse the customer.

37. Which of these tools can protect you in the case of a surge?

image A. Torx wrench

image B. Antistatic strap

image C. Voltmeter

image D. Antistatic mat

38. You are at a customer’s office you have visited before. You can guess what the problem is, and when the customer mentions getting an IP address of 169.254..., you immediately know how to fix the problem. However, as you ponder the solution, you notice that the customer is now talking about his server. What should you do?

image A. Fix the IP problem while the customer talks.

image B. Hold up your hand and tell him that you understand the problem.

image C. Let the customer finish what he is saying.

image D. Leave the job site.

39. While you are working on a customer’s computer at her home, she informs you that she needs to leave for about 10 minutes and that her 8-year-old son can help you with anything if you need it. What should you do?

image A. Tell the customer to get back home as soon as possible.

image B. Tell her that you are not responsible for the child.

image C. Tell her that an adult must be home while you work.

image D. Tell her that the child must be removed.

40. After installing a new hard drive on a Windows XP computer, Len tries to format the drive. Windows XP does not show the format option in Disk Management. What did Len forget to do first?

image A. Run CHKDSK.

image B. Partition the drive.

image C. Defragment the drive.

image D. Copy system files.

41. What is the thickness of a Type II PC Card?

image A. 0.3 inches (7.5mm)

image B. 0.129 inches (3.3mm)

image C. 0.2 inches (5.0mm)

image D. 0.41 inches (10.5mm)

42. What type of adapter card is normally plugged into an AGP adapter card slot?

image A. Modem

image B. Video

image C. NIC

image D. Sound

43. Which of the following recovery options uses a floppy disk?

image A. WinRE

image B. ASR

image C. NTBackup

image D. Recovery Console

44. To prevent damage to a computer and its peripherals, the computer should be connected to what?

image A. A power strip

image B. A power inverter

image C. An AC to DC converter

image D. A UPS

45. A computer has 512MB of RAM. It also has 64MB of shared video memory. How much RAM is available to the operating system?

image A. 512MB

image B. 256MB

image C. 448MB

image D. 576MB

46. Jennifer just installed a DVD-ROM drive and a CD-RW drive in a PC. When she boots the system, she sees only the DVD-ROM drive. What is the most likely cause of this problem?

image A. The drives are jumpered incorrectly.

image B. The Molex connector is not connected to the CD-RW drive.

image C. The IDE cable to the CD-RW drive is upside down.

image D. The CD-RW drive has not been initialized.

47. Which of the following components could cause the POST to beep several times and fail during boot?

image A. Sound card

image B. Power supply

image C. Hard drive

image D. RAM

48. Which of the following is the proper boot sequence of a PC?

image A. CPU, POST, boot loader, operating system

image B. Boot loader, operating system, CPU, RAM

image C. POST, CPU, boot loader, operating system

image D. CPU, RAM, boot loader, operating system

49. Which of the following has the fastest data throughput?

image A. CD-ROM

image B. Hard drive

image C. RAM

image D. USB

50. Roger informs you that none of the three SCSI drives can be seen on his SCSI chain. What should you check?

image A. Whether the host adapter is terminated and that the disks have consecutive IDs of 1, 2, and 3

image B. Whether the SCSI adapter has an ID of 7 or 15, and whether all the disks are terminated and have consecutive IDs of 0, 1, and 2

image C. Whether the host adapter has an ID of 0, and whether the disks are terminated with the same ID

image D. Whether the SCSI adapter has an ID of 7, and whether both ends of the chain are terminated, and that each disk has a unique ID

51. What type of power connector is used for a x16 video card?

image A. Molex 4-pin

image B. Mini 4-pin

image C. PCIe 6-pin

image D. P1 24-pin

52. Louis attempts to boot his computer. A message on the screen says “Hard disk not found.” The computer has a single PATA IDE hard disk. What is the most likely cause of the problem?

image A. IDE cable is not connected.

image B. IDE cable is installed upside down.

image C. IDE drive is not jumpered correctly.

image D. Wrong type of IDE cable.

53. How can a paper jam be resolved? (Select all that apply.)

image A. Clear the paper path.

image B. Use the right type of paper.

image C. Check for damaged rollers.

image D. Check for a damaged primary corona wire.

54. What could cause a ghosted image on the paper outputted by a laser printer?

image A. Transfer corona wire

image B. Primary corona wire

image C. Pickup rollers

image D. Photosensitive drum

55. Which log file contains information about Windows Vista setup errors?

image A. setupact.log

image B. setuperr.log

image C. unattend.xml

image D. setuplog.txt

56. Mary installed a new sound card and speakers; however, she cannot get any sound from the speakers. What could the problem be? Select all that apply.

image A. Speaker power is not plugged in.

image B. Sound card driver is not installed.

image C. Sound card is plugged into the wrong slot.

image D. Speaker connector is in the wrong jack.

57. You just upgraded the CPU. Which of the following can make your computer shut down automatically after a few minutes?

image A. Wrong CPU driver

image B. Wrong voltage to the CPU

image C. Incorrect CPU has been installed

image D. The CPU has overheated

58. When you reboot a computer, you get a message stating “No OS present, press any key to reboot.” What is the most likely problem?

image A. The hard drive is not jumpered properly.

image B. The hard drive is not getting power.

image C. There is no active partition.

image D. The hard drive driver is not installed.

59. Which kind of current does a typical desktop PC draw from a wall outlet?

image A. Direct current

image B. Neutral current

image C. Alternating current

image D. Draw current

60. You are installing an IDE CD-ROM. Currently, there is an IDE hard drive configured on the primary controller as master. There are no other drives. What is the correct setting for the CD-ROM?

image A. Primary controller, slave

image B. Secondary controller, slave

image C. Secondary controller, master

image D. Primary controller, cable select

61. Normally, when your PC boots, it sounds one beep. Today, there is a series of beeps, and the PC does not boot. What should you check? Select all that apply.

image A. Unseated RAM

image B. Unseated NIC

image C. Unseated modem

image D. Unseated video

62. If a lot of data is flowing through a network card, what should the link light look like?

image A. Unlit

image B. Rapid, erratic flashing

image C. Solid green

image D. Solid yellow

63. Russ wants to run his video-editing software at a resolution of 1280 x 1024 with True Color (24 bits). His PC has an older 2MB video card. Can he run these video settings?

image A. Yes

image B. No

64. Which of the following hides the file APLUS.DOC?

image A. attrib +H aplus.doc

image B. attrib ?H aplus.doc

image C. attrib +R aplus.doc

image D. attrib aplus.doc /H

65. What is the proper way to format a floppy disk as a bootable disk?

image A. format /s

image B. format a: /s

image C. format a: /system

image D. format a: /boot

66. Paul’s Device Manager shows a red X over one of the devices. What does this tell you?

image A. The device’s driver has not been installed.

image B. The device is not recognized.

image C. The device is disabled.

image D. The device is in queue to be deleted.

67. Which of the following is not an advantage of NTFS over FAT32?

image A. NTFS supports file encryption.

image B. NTFS supports larger file sizes.

image C. NTFS supports larger volumes.

image D. NTFS supports more file formats.

68. In Windows XP, which of the following paths enables a program to start for every person who logs on to Windows?

image A. Documents & Settings > Programs > Start menu > Startup

image B. Documents & Settings > All Users > Start menu > Programs > Startup

image C. Documents & Settings > Start menu > Programs Startup

image D. Documents & Settings > Default User > Startup

69. Which of the following parameters (switches) copy all files, folders, and subfolders, including empty subfolders in the TEST folder?

image A. xcopy *.* c: est /T /S

image B. xcopy *.* c: est /S

image C. xcopy *.* c: est /E

image D. xcopy *.* c: est /S /T

70. Which Windows utility is used to prepare a disk image for duplication across the network?

image A. XCOPY

image B. SYSPREP

image C. Ghost

image D. Image Clone

71. You need to configure a service to start when Windows XP boots. Which tool enables you to accomplish this?

image A. MMC

image B. Local Security Policy snap-in

image C. Services snap-in

image D. Disk Management snap-in

72. Steve just installed a second hard disk in his Windows Vista computer. However, he does not see the disk in Windows Explorer. What did he forget to do? Select all that apply.

image A. Format the drive

image B. Partition the drive

image C. Run FDISK

image D. Initialize the drive

image E. Set up the drive in the BIOS

73. To install a SCSI hard disk during a Windows XP/2000 installation, which key must be pressed?

image A. F2

image B. F3

image C. F6

image D. F8

74. You just upgraded the president’s computer’s video driver. Now, the Windows XP system will not boot. Which of the following should you try first?

image A. Access the Recovery Console.

image B. Boot into Safe mode and roll back the driver.

image C. Reinstall the operating system.

image D. Boot into Directory Services Restore mode.

75. After you install Windows, the computer you are working on displays a blue screen of death (BSOD) when rebooting. Which of the following are possible causes? Select all that apply.

image A. BIOS needs to be flashed to the latest version.

image B. IRQ conflict.

image C. Virus in the MBR.

image D. Incompatible hardware device.

76. Which of the following does not allow you to add drivers in Windows?

image A. Add New Hardware Wizard

image B. Manufacturer’s driver disk

image C. Device Manager

image D. Drivers applet in Control Panel

77. You recently installed a program on Jason’s Windows XP computer while logged on as Jason. Where would the location of the installation’s cache files most likely be?

image A. C:Documents and SettingsJasonLocal SettingsTemp

image B. C:Documents and SettingsJasonTEMP

image C. C:Documents and SettingsLocal SettingsApplication Data

image D. C:Documents and SettingsLocal SettingsTemp

78. Mary’s computer is running Windows XP. In the Device Manager, you notice that the NIC has a black exclamation point. What does this tell you?

image A. The device is disabled.

image B. The wrong driver is installed.

image C. The device is malfunctioning.

image D. The incorrect driver is installed.

79. In Windows Vista, when will a computer dump the physical memory?

image A. When the wrong processor is installed

image B. When a device is missing drivers

image C. When the computer was shut down improperly

image D. When the computer detects a condition from which it cannot recover

80. To create a restore point, what must you do?

image A. Run Disk Defragmenter from the MMC.

image B. Run NTBackup from the Control Panel.

image C. Run the System Restore program from the System Tools menu.

image D. Run the Disk Cleanup program from the System Tools menu.

81. What is printing in duplex?

image A. Printing on both sides of the paper

image B. Printer collation

image C. Two-way printer communication

image D. Printing to file

82. Special paper is needed to print on what kind of printer?

image A. Dot matrix

image B. Thermal

image C. Laser

image D. Inkjet

83. Which environmental issue affects a thermal printer the most?

image A. Moisture

image B. ESD

image C. Dirt

image D. Heat

84. Which of the following can you not do from the Printer Properties screen?

image A. Modify spool settings

image B. Add ports

image C. Pause printing

image D. Enable sharing

85. Where are software firewalls usually located?

image A. On routers

image B. On servers

image C. On clients

image D. On every computer

86. For multiple computers to make a physical, electrical connection on a network, what device must be in play?

image A. Router

image B. Hub

image C. Bridge

image D. Gateway

87. What is the minimum category cable needed for a 100BASE-T network?

image A. Category 2

image B. Category 3

image C. Category 4

image D. Category 5

88. You are not using simple file sharing. In Windows XP, how would you share your CD-ROM drive to the rest of the network?

image A. Drag the CD-ROM to the Shared Network folder.

image B. In My Computer, right-click the CD-ROM icon, and then click Sharing.

image C. In My Computer, click the CD-ROM icon, and then click Sharing.

image D. Select Start > Settings > Control Panel, and then click Network > File and Print Sharing.

89. Which of these IP addresses can be routed across the Internet?

image A. 127.0.0.1

image B. 192.168.1.1

image C. 129.52.50.13

image D. 10.52.50.13

90. The IP address of Davidprowse.com is 10.255.200.1. You can ping the IP address 10.255.200.1 but cannot ping Davidprowse.com. What is the most likely cause?

image A. Davidprowse.com is down.

image B. The DHCP server is down.

image C. The DNS server is down.

image D. THE ADDS server is down.

91. If a person takes control of a session between a server and a client, it is known as what type of attack?

image A. DDoS

image B. Smurf

image C. Session hijacking

image D. Malicious software

92. Making data appear as if it is coming from somewhere other than its original source is known as what?

image A. Hacking

image B. Phishing

image C. Cracking

image D. Spoofing

93. You are setting up auditing on a Windows XP Professional computer. If set up properly, which log should have entries?

image A. Application log

image B. System log

image C. Security log

image D. Maintenance log

94. You are called upon to replace some hard drives on a server. As you enter the server room, you see water dripping from the ceiling. What should you do?

image A. Place a bucket under the water leak and continue replacing the hard drives.

image B. Place a bucket under the water leak and log the incident.

image C. Notify building services and the system administrator.

image D. Send an email to the system administrator.

95. You are working on a very old printer and it starts to smoke. What should do?

image A. Turn off the printer.

image B. Call 911.

image C. Unplug the printer.

image D. Tell the printer it is bad to smoke.

96. Which Windows Vista System Recovery Option attempts to automatically fix problems?

image A. System Restore

image B. Startup repair

image C. Complete PC Restore

image D. Recovery Console

97. The message The Windows Boot Configuration Data File Is Missing Required Information appears on the screen. What command would you type to repair this issue?

image A. bootrec /fixboot

image B. bootrec /fixmbr

image C. bootrec /rebuildbcd

image D. bootcd

98. What is the fourth step of the CompTIA 6-step troubleshooting process?

image A. Identify the problem.

image B. Establish a theory of probable cause.

image C. Establish a plan of action.

image D. Document findings.

99. You are asked to fix a problem with a customer’s domain controller that is outside the scope of your knowledge. What action should you take?

image A. Learn on the job by trying to fix the problem.

image B. Tell the customer that the problem should be reported to another technician.

image C. Assure the customer that the problem will be fixed very soon.

image D. Help the customer find the appropriate channels to fix the problem.

100. What should you remain in the face of adversity?

image A. Wavering

image B. Decisive

image C. Positive

image D. Certain

Answers at a Glance

1. A

2. C

3. C

4. A and D

5. D

6. A

7. D

8. D

9. B

10. B

11. C

12. D

13. A

14. C

15. B

16. A

17. A

18. B and C

19. B

20. D

21. A and D

22. D

23. C

24. A

25. C

26. D

27. A

28. A

29. B

30. B

31. A

32. A

33. A

34. C and D

35. D

36. D

37. B

38. C

39. C

40. B

41. C

42. B

43. B

44. D

45. C

46. B

47. D

48. A

49. C

50. D

51. C

52. A

53. A, B, and C

54. A

55. B

56. A, B, and D

57. D

58. C

59. C

60. C

61. A and D

62. B

63. B

64. A

65. B

66. C

67. D

68. B

69. C

70. B

71. C

72. A, B, and D

73. C

74. B

75. A and C

76. D

77. A

78. C

79. D

80. C

81. A

82. B

83. D

84. C

85. C

86. B

87. D

88. B

89. C

90. C

91. C

92. D

93. C

94. C

95. C

96. B

97. C

98. C

99. D

100. C

Answers with Explanations

1. A. Memory latency or CAS (Column Address Strobe) latency happens when a memory controller tries to access data from a memory module. It is a slight delay (usually measured in nanoseconds) while the memory module responds to the memory controller. The memory controller (also known as the northbridge or MCH) has a specific speed at which it operates. If the CPU asks the chip for too much information at once, this might increase latency time while the memory controller works. See the section titled “RAM Basics and Types of RAM” in Chapter 4, “RAM,” for more information.

2. C. In a standard ATX-based computer, the motherboard has two IDE interfaces (primary and secondary), each of which can support two devices, a master and a slave. See the section titled “Magnetic Storage Media” in Chapter 6, “Storage Devices,” for more information.

3. C. Because RAID 5 uses striping with parity, a third disk is needed. You can have more than three disks as well. Two disks are enough for plain RAID 0 striping and is the exact number you need for RAID 1 mirroring. See the section titled “Files, File Systems, and Disks” in Chapter 8, “Configuring Windows,” for more information.

4. A and D. The antistatic strap and mat are the best ways to avoid ESD. As another precaution, you can touch the chassis of the computer (unpainted surface) to discharge yourself. See the section titled “Safety and Environmental Procedure” in Chapter 16, “Safety and Professionalism,” for more information.

5. D. If the PC is not connected to the AC outlet, the hard drive will not spin, so it isn’t a possible reason for why nothing is coming up on the monitor, given the question’s scenario. All other answers are possible reasons for why nothing is showing up on the display. Also, the monitor might not be plugged in. See the section titled “The Video Subsystem” in Chapter 12, “Video, Audio, and Peripherals,” for more information.

6. A. Most UPS devices come with software that you can use to monitor the battery health. However, to do this you need to connect the UPS to the PC by way of a USB cable. See the section titled “Power Devices” in Chapter 5, “Power,” for more information.

7. D. Compressed air is safe. However, you might want to do this outside. See the section titled “Safety and Environmental Procedure” in Chapter 16, “Safety and Professionalism,” for more information.

8. D. The external power supply of the laptop converts AC to DC for the system to use and for charging the battery. See the section titled “Power Supplies” in Chapter 5, “Power,” for more information about power supplies.

9. B. The function (Fn) key is a secondary key that is not normally seen on a PC, but is almost always on a laptop. The purpose of this key is to access additional features of the laptop. See the section titled “Installing, Configuring, and Troubleshooting Visible Laptop Components” in Chapter 11, “Laptops,” for more information.

10. B. MD (or mkdir) is short for make directory. CD is change directory. RD is remove directory, and SD deals with memory cards and is not a valid command in the Command Prompt. See the section titled “Command-Line Tools” in Chapter 10, “Troubleshooting Windows,” for more information.

11. C. To learn more about any command, type the command and then /?. Entering anything else in this case would make the command PING try to connect to and test that name. HELP by itself will give you a list of commands. You can get specific information about any of the commands in that list by entering HELP [command]. For example: the syntax HELP RD gives you the specific help file for the RD command. But there are several commands that this does not work with (mainly networking commands such as PING and IPCONFIG). See the section titled “Troubleshooting Networking Connectivity” in Chapter 14, “Networking,” for more information.

12. D. The /all switch shows everything you need to know about your network connection, including the MAC address. See the section titled “Troubleshooting Networking Connectivity” in Chapter 14, “Networking,” for more information.

13. A. Convert is used to upgrade FAT and FAT32 volumes to NTFS without loss of data. HPFS is the High Performance File System developed by IBM and not used by Windows. NFS is the Network File System, something you would see in a storage area network. See the section titled “Command-Line Tools” in Chapter 10, “Troubleshooting Windows,” for more information.

14. C. Changing virtual memory in Windows XP is done in the Performance Options screen. Answer D is missing the step of selecting the Advanced tab. There is no Virtual Memory applet in the Control Panel. See the section titled “System Tools and Utilities” in Chapter 8, “Configuring Windows,” for more information.

15. B. Of the potential answers listed, the best or optimal settings are implemented by allowing Windows to manage the size. However, note that the default setting for virtual memory is 1.5 times RAM, with a maximum of 3 times RAM. See the section titled “System Tools and Utilities” in Chapter 8, “Configuring Windows,” for more information.

16. A. MSCONFIG can turn programs on and off in the Startup tab. By modifying this, you effectively create a selective startup. Task Manager can turn off programs, but only temporarily; when the system restarts, those programs will run again. It is important to note that Windows 2000 does not have MSCONFIG.EXE built in, but it can be added as a download from the Internet. See the section titled “System Tools and Utilities” in Chapter 8, “Configuring Windows,” for more information.

17. A. By installing a driver that is not signed by Microsoft, you are risking instability of the operating system. See the section titled “System Tools and Utilities” in Chapter 8, “Configuring Windows,” for more information.

18. B and C. Disk Defragmenter keeps Windows XP running more efficiently by making the files contiguous, lowering the amount of physical work the hard drive has to do. Check Disk checks the hard drive for errors. See the sections titled “Windows Tools and Errors” and “Command-Line Tools” in Chapter 10, “Troubleshooting Windows,” for more information.

19. B. You need to have 15 percent free space on your partition to defrag it in the Disk Defragmenter GUI-based utility. However, you can force a defrag on a partition even if you don’t have enough free space by using the –f switch in the command line. The –v switch gives you verbose (or wordy) output. There is no Vigor option. See the section titled “Maintaining Hard Disks” in Chapter 9, “Maintaining Windows,” for more information.

20. D. The Event Viewer contains the error logs; they are finite in size. You could either clear the log or increase the size of the log. The other three do not contain error logs. See the section titled “Windows Tools and Errors” in Chapter 10, “Troubleshooting Windows,” for more information.

21. A and D. The Windows Vista recovery environment (WinRE) is also known as System Recovery Options. The Recovery Console is only available in Windows XP/2000. Advanced Boot Options is the menu that can be accessed by pressing F8, which is available in Vista/XP/2000. See the section titled “Repair Environments and Boot Errors” in Chapter 10, “Troubleshooting Windows,” for more information.

22. D. If the time and date keep resetting to a time like January 1, 2000, chances are that the lithium battery needs to be replaced. Any of the other options will not fix the problem. See the sections titled “The BIOS” and “Installing and Troubleshooting Motherboards” in Chapter 2, “Motherboards,” for more information.

23. C. The Advanced Boot Options menu has many options including Safe Mode. This menu can be accessed by pressing F8 when the computer first boots up. See the section titled “Repair Environments and Boot Errors” in Chapter 10, “Troubleshooting Windows,” for more information.

24. A. bootrec /fixboot is one of the methods you can try to repair bootmgr.exe in Windows Vista. Bootrec /fixmbr rewrites the master boot record in Vista. Bootrec /rebuildbcd attempts to rebuild the boot configuration store, and bootcd is where the boot configuration store is located. See the section titled “Repair Environments and Boot Errors” in Chapter 10, “Troubleshooting Windows,” for more information.

25. C. A Code 1 message means that a device is not configured correctly. Usually this means that the driver should be updated. See the section titled “Windows Tools and Errors” in Chapter 10, “Troubleshooting Windows,” for more information.

26. D. SFC (System File Checker) checks protected system files and replaces incorrect versions. None of the other options check system files. See the section titled “Command-Line Tools” in Chapter 10, “Troubleshooting Windows,” for more information.

27. A. First, the drum is cleaned; then the primary corona wire applies a negative charge to the drum. Third, the “laser” writes to the drum, increasing the voltage of those areas written to. Next, the image is developed, meaning that toner is attracted to the written areas of the drum. At this point, the paper has entered under the toner cartridge and his applied a positive charge by the transfer corona wire. While this is happening, the negatively charged toner is transferred to the paper. Finally, the loose toner is fused to the paper by heat (350° to 400° F) and pressure rollers. See the section titled “Printer Types and Technologies” in Chapter 13, “Printers,” for more information.

28. A. High-quality dot matrix printheads can come in 9, 18, or 24 pins, with 24 being the highest quality. See the section titled “Printer Types and Technologies” in Chapter 13, “Printers,” for more information.

29. B. When you connect to a secure web server, you should see the protocol HTTPS and a secure padlock in the locked position or something of the sort. See the section titled “Networking Fundamentals” in Chapter 14, “Networking,” for more information.

30. B. 192.168.1.1 is a private Class C address and therefore should have the subnet mask 255.255.255.0, the standard default subnet mask for Class C. (See the following table) See the section titled “Networking Fundamentals” in Chapter 14, “Networking,” for more information.

Table 1: Subnet Masks

image

31. A. If you get any address that starts with 169.254, it means the computer has self-assigned that address. It is known as an APIPA address (Automatic Private IP Addressing). Normally, DHCP servers will not use this network number. A simple ipconfig/release and ipconfig/renew might fix the problem, given that a DHCP server is actually available. The POP3 server is for incoming mail, the DNS server is for resolving domain names to IP addresses, and the WINS server is for resolving NETBIOS names to IP addresses. See the section titled “Networking Fundamentals” in Chapter 14, “Networking,” for more information.

32. A. 127.0.0.1 is the built-in loopback IP address for every computer with TCP/IP installed. Alternatively, you could ping any number on the 127 network or ping localhost without the double backslash. See the section titled “Troubleshooting Network Connectivity” in Chapter 14, “Networking,” for more information.

33. A. Social engineering is the practice of obtaining confidential information by manipulating people. Using someone else’s network is just theft. Hacking into a router is just that, hacking. And a virus is a self-spreading program that might or might not cause damage to files and applications. See the section titled “Basics of Data Security” in Chapter 15, “Security,” for more information.

34. C and D. To make a secure connection, you first need to know the SSID (service set identifier) of the AP and then the encryption being used (for example, WEP or WPA). Knowing the wireless standard being used can help you verify whether your computer is compatible (802.11b or g), and the brand of access point isn’t really helpful. See the section titled “Installing and Configuring a SOHO Network” in Chapter 14, “Networking,” for more information.

35. D. Most power supplies have selectors for the United States and Europe (115 and 230 volts). However, your co-worker will probably need an adapter, too; otherwise, the plug may not fit. See the section titled “Power Supplies” in Chapter 5, “Power,” for more information.

36. D. Do not open the power supply. It might hold a lethal charge. Also, although it is possible that you could fix the power supply, it is more cost-effective and a more efficient use of time to just order a new one. Plus, if the fan is bad on the power supply, chances are that something else will fail in there, too. Of course, you need to refuse nicely. See the sections titled “Power Supplies” in Chapter 5, “Power,” and “Professionalism and Communication Skills” in Chapter 16, “Safety and Professionalism,” for more information.

37. B. Most antistatic straps come with a 1 mega ohm resistor, which can protect against surges. See the section titled “Safety and Environmental Procedures” in Chapter 16, “Safety and Professionalism,” for more information.

38. C. Always pay attention and allow the customer to finish. Customers might give you valuable clues about a more sinister problem. See the section titled “Professionalism and Communication Skills” in Chapter 16, “Safety and Professionalism,” for more information.

39. C. Whenever working in someone’s home, make sure that there is an adult available. See the section titled “Professionalism and Communication Skills” in Chapter 16, “Safety and Professionalism,” for more information.

40. B. You must partition the drive before formatting. Copying files can be done only after formatting is complete. CHKDSK has little value on an unformatted drive. Something else not mentioned here is that a second drive would have to be initialized in Windows XP before use. See the section titled “Files, File Systems, and Disks” in Chapter 8, “Configuring Windows,” for more information.

41. C. PC Cards come in the following sizes. (See Table 2.) See the section titled “Installing, Configuring, and Troubleshooting Visible Laptop Components” in Chapter 11, “Laptops,” for more information.

Table 2: PC Card Sizes

image

42. B. The AGP (Accelerated Graphics Port) expansion slot is used primarily for video. See the section titled “Motherboard Components and Form Factors” in Chapter 2, “Motherboards,” for more information.

43. B. ASR (Automated System Recovery) is a recovery option used by Windows XP. When an ASR backup is created Windows XP requests a blank floppy disk for additional ASR information. WinRE is the Windows Vista Recovery Environment which includes several System Recovery Options. NTBackup allows a user to backup files but isn’t really considered a recovery option unless using ASR. The Recovery Console is run from the Windows XP/2000 CD.

44. D. A UPS (uninterruptible power supply) protects computer equipment against surges, spikes, sags, brownouts, and blackouts. Power strips, unlike surge protectors do not protect against surges. See the section titled “Power Devices” in Chapter 5, “Power,” for more information.

45. C. The amount of shared video memory is subtracted from the total RAM. The remainder is what the operating system has left to work with. See the section titled “Installing, Configuring, and Troubleshooting Internal Laptop Components” in Chapter 11, “Laptops,” for more information.

46. B. Molex power is most likely the culprit. The Molex connector might not be connected at all or might be loose. Improper jumper settings might be an issue, but not the most likely. It is very hard to install the IDE cable to a CD-RW drive upside down because they are keyed. CD-RW drives do not need to be initialized in Windows XP, only secondary hard drives. See the section titled “Optical Storage Media” in Chapter 6, “Storage Devices,” for more information.

47. D. RAM is one of the big four (RAM, CPU, motherboard, and video) that can cause the POST to fail. Different RAM errors can cause the POST to make a different series of beeps. Consult your motherboard documentation for more information about the different beep codes. See the section titled “Installing and Troubleshooting RAM” in Chapter 4, “RAM,” for more information.

48. A. The CPU must be installed correctly for the POST to begin. After the POST is successful, the boot loader then runs (for example, NTLDR), and then the operating system comes up. You might also see “power good” as a possible step directly after CPU and before POST. This means that the power to the CPU has been verified. See the section titled “The BIOS” in Chapter 2, “Motherboards,” for more information.

49. C. RAM is much faster than the rest of the options listed. For instance, if you have PC3200 DDR RAM (aka DDR-400), your peak transfer rate is 3200MBs. The rest of the following devices are listed in descending order: hard drive (typically 133, 150, or 300MBs), USB (typically 60MBs), and CD-ROM (typically 7.5MBs). See the section titled “RAM Basics and Types of RAM” in Chapter 4, “RAM,” for more information.

50. D. The adapter should use the ID 7. Both ends of the SCSI chain need to be terminated. Each disk needs a unique ID. The particular ID you give the disks doesn’t matter. See the section titled “Magnetic Storage Media” in Chapter 6, “Storage Devices,” for more information.

51. C. A x16 card is a PCI Express card. They require one or two PCIe 6-pin power connectors. See the section titled “Power Supplies” in Chapter 5, “Power,” for more information.

52. A. The most likely cause would be that the IDE ribbon cable is not connected. It is nearly impossible to install an IDE cable upside down because it is keyed. In a computer with only one drive, the jumper setting will probably not affect whether it can boot; it can be jumpered as master or as single (no jumper) and still function. 40-wire or 80-wire cables can be used with PATA IDE drives. They both have 40 pins. Generally, a drive will work with either cable, but perhaps not at the miximum speed. See the section titled “Magnetic Storage Media” in Chapter 6, “Storage Devices,” for more information.

53. A, B, and C. There are several possible reasons why a paper jam might occur. The paper could be stuck somewhere in the paper path, the paper could be too thick, or the rollers could be damaged. See the section titled “Installing, Configuring, and Troubleshooting Printers.” in Chapter 13, “Printers,” for more information.

54. A. Ghosted images or blurry marks could be a sign that the drum has some kind of imperfection or is dirty. Especially if the image reappears at equal intervals. Replace the drum (or toner cartridge). Another possibility is that the fuser assembly has been damaged and needs to be replaced. See the section titled “Installing, Configuring, and Troubleshooting Printers” in Chapter 13, “Printers,” for more information.

55. B. Setuperr.log contains information about setup errors during the installation of Windows Vista. Start with this log file when troubleshooting. A file size of 0 bytes indicates no errors during installation. Setupact.log contains the events that occurred during the installation. Unattend.xml is the answer file used by Windows Vista during unattended installations. Setuplog.txt records events that occurred during the text portion installation of Windows XP. Windows Vista does not have a text portion during installation. See the section titled “Installing and Upgrading to Windows Vista” in Chapter 7, “Installing and Upgrading Windows,” for more information.

56. A, B, and D. Always make sure that the speaker power (if any) is plugged into an AC outlet, and that the speakers are on (if they have a power button). When a sound card is first installed, Windows should recognize it and either install a driver through plug-and-play or ask for a driver CD. For best results, use the manufacturer’s driver, the latest of which can be found on their website. Make sure that you plug the speakers into the correct 1/8-inch RCA jack. The speaker out is the one with concentric circles and an arrow pointing out. Or you might have 5.1 surround sound; in which case, you would use the standard front speaker jack, which is often a green jack. Finally, it’s quite hard to plug a sound card into a wrong slot. For example, if have a PCI 32-bit sound card (a common standard), you can then plug that sound card into any of the available PCI slots on your motherboard, and it will be recognized. (Word to the wise, if you ever remove the sound card when upgrading, make sure you put it back in the same slot.) PCI cards will not fit in ISA, AGP, or PCIe slots. See the section titled “The Audio Subsystem” in Chapter 12, “Video, Audio, and Peripherals,” for more information.

57. D. The CPU could overheat if thermal compound has not been applied correctly (common) or if it is not seated properly (rare). As part of the boot process, power needs to verify the CPU. If the wrong voltage is running to the CPU, the system won’t even boot. If an incorrect CPU has been installed, the system will probably not boot, especially if the BIOS doesn’t recognize it. Finally, the CPU doesn’t use a driver, instead the BIOS recognizes it (or doesn’t, if it needs a BIOS update) and passes that information to the operating system. See the section titled “Installing and Troubleshooting CPUs” in Chapter 3, “The CPU,” for more information.

58. C. The primary partition must be set to active to boot to the operating system. If there is only one drive, the jumper setting probably won’t matter, and if it is wrong, the drive simply won’t be seen by the BIOS. The same holds true for power; if the drive does not get power, the BIOS will not recognize it. Finally, hard drives do not need drivers to simply be recognized. See the section titled “Files, File Systems, and Disks” in Chapter 8, “Configuring Windows,” for more information.

59. C. Alternating current is the standard in the U.S.; your computer should be connected to a 120V AC outlet. Other countries might use 230V AC connections. Direct current works inside the computer. The power supply converts between the two! See the section titled “Power Supplies” in Chapter 5, “Power,” for more information.

60. C. The default is to install the CD-ROM to the secondary controller and set the jumper as master. It is common to have magnetic disks on the primary IDE channel and optical discs on the secondary IDE channel. See the section titled “Magnetic Storage Media” in Chapter 6, “Storage Devices,” for more information.

61. A and D. If any one of the big four (RAM, video, CPU, and motherboard) is not installed properly, the system will not boot. However, the system can start even if the modem and NIC are not seated properly. See the section titled “Troubleshooting Examples” in Chapter 1, “Introduction to Troubleshooting,” for more information.

62. B. When data is flowing through the activity light, it should blink or flash rapidly but in an erratic fashion. You see solid green (100Mbps) or yellow (10Mbps) on the link light. If it is unlit, the cable is not connected properly or the device is malfunctioning. See the section titled “Troubleshooting Network Connectivity” in Chapter 14, “Networking,” for more information.

63. B. To find out how much RAM you need on your video card, you just multiply the two resolution numbers together and then multiply by the amount of bytes of color. For example, 1280 x 1024 x 3 = 3.9MB. A system running in 24-bit color (16,777,216 colors) equates to 3 bytes of color. His card has only 2MB of RAM. See the section titled “The Video Subsystem” in Chapter 12, “Video, Audio, and Peripherals,” for more information.

64. A. The syntax for this would be attrib +H [filename]. –H removes the attribute, making the file visible. +R makes the file read-only. /H is an invalid switch. See the section titled “File Security” in Chapter 15, “Security,” for more information.

65. B. To format the floppy, you have to include its drive letter, which most likely would be A. You also need the switch, which is /s. So the syntax would be format a: /s. Many companies will do something similar when prepping hard drives of computers that they are selling. In that case, the syntax would be format c: /s. For more information about format, you can enter format /?. See the section titled “Magnetic Storage Media” in Chapter 6, “Storage Devices,” for more information.

66. C. The red X tells you that the device is disabled. In many cases, it can easily be enabled by right-clicking it and selecting Enable. If the driver had not been installed, the device would most likely be sitting in a category called Unknown Devices. If the device is not even recognized by Windows, it will not show up on the list or will show up under Unknown Devices. There is no queue to be deleted. See the section titled “Windows Tools and Errors” in Chapter 10, “Troubleshooting Windows,” for more information.

67. D. NTFS and FAT32 support the same number of file formats. See the section titled “Files, File Systems, and Disks” in Chapter 8, “Configuring Windows,” for more information.

68. B. The All Users profile is meant to serve any user who logs on to Windows. See the section titled “Files, File Systems, and Disks” in Chapter 8, “Configuring Windows,” for more information.

69. C. /E is needed to copy the files, directories, subdirectories, including empty subdirectories. /S will copy files, directories, and subdirectories, but not empty subdirectories. If you add /T on to the end, you get just the empty directories copied. See the section titled “Command-Line Tools” in Chapter 10, “Troubleshooting Windows,” for more information.

70. B. SYSPREP is one of the utilities built in to Windows for image deployment over the network. Ghost and Image Clone are third-party offerings. XCOPY copies entire directories (in the same physical order, too) but not from one system to another. SYSPREP preps the system to be moved as an image file. See the section titled “Installing and Upgrading Windows Vista” in Chapter 7, “Installing and Upgrading Windows,” for more information.

71. C. The Services snap-in lists all the services that you can start, stop, restart, and modify. Snap-ins are added to a Microsoft Management Console (MMC), but the Services snap-in is available by default in Computer Management. See the section titled “Windows User Interfaces” in Chapter 8, “Configuring Windows,” for more information.

72. A, B, and D. For secondary drives, you must go to Disk Management and initialize, partition, and format them. FDISK is an older DOS command. Today’s computers’ BIOS should see the drive automatically with no configuration needed. In special cases a hard disk might require special drivers. See the section titled “Files, File Systems, and Disks” in Chapter 8, “Configuring Windows,” for more information.

73. C. Right at the beginning of the text portion of the installation of Windows XP/2000, F6 must be pressed (you would see it on the bottom) to install other third-party drivers (for example, an Adaptec SCSI card). F2 is commonly used to get into the BIOS. F3 is the key to quit the Windows installation. F8 is used to get into the Advanced Boot Options (including Safe mode). See the section titled “Installing and Upgrading Windows XP” in Chapter 7, “Installing and Upgrading Windows,” for more information.

74. B. By rolling back the driver (which is done in the Device Manager) while in Safe mode, you can go back in time to the old working video driver. The Recovery Console will not help you with drivers. Reinstalling the OS would wipe the partition of the president’s data (and probably wipe you of your job). Directory Services Restore mode (although listed in the Advanced Startup Options) is only for Windows Server domain controllers. Note that Last Known Good configuration would probably be able to help you, but not in all cases. See the section titled “Repair Environments and Boot Errors” in Chapter 10, “Troubleshooting Windows,” for more information.

75. A and C. Older PCs might need the BIOS to be upgraded before an installation. Always flash the latest BIOS before performing an upgrade or fresh install. Always check the hardware on the HCL before performing an install or upgrade. IRQ conflicts will not cause BSODs, but they will render the affected devices inoperable. Viruses in the MBR could cause the computer to simply not boot. See the section titled “Windows Tools and Errors” in Chapter 10, “Troubleshooting Windows,” for more information.

76. D. There is no Drivers applet in the Control Panel, but all the other answers are valid. See the section titled “System Tools and Utilities” in Chapter 8, “Configuring Windows,” for more information.

77. A. C:Documents and SettingsJasonLocal SettingsTemp is the correct path. Unless you installed the program so that all users can access it, this should be the location. Temp is shown as Temp, not TEMP, in the operating system. There will always be a profile name inside of this sort of path (for example, Jason). Answers C and D do not show this. See the section titled “Files, File Systems, and Disks” in Chapter 8, “Configuring Windows,” for more information.

78. C. The exclamation point tells you that the device is malfunctioning. You might have to update the driver. See the section titled “Windows Tools and Errors” in Chapter 10, “Troubleshooting Windows,” for more information.

79. D. If the computer fails and cannot recover, you usually see some type of critical or stop error. At this point, you must restart the computer to get back into the operating system. The reason for the physical dump of memory is for later debugging. The physical dump writes the contents of memory (when the computer failed) to a file on the hard disk. Missing drivers will not cause this error, but a failed driver might. If the wrong processor is installed, you can probably not get the system to boot at all. Shutting down the computer improperly just means that the computer recognizes this upon the next reboot and asks whether you want to go into Safe mode. See the section titled “Windows Tools and Errors” in Chapter 10, “Troubleshooting Windows,” for more information.

80. C. System Restore is the tool used to create restore points. See the section titled “Maintaining Hard Disks” in Chapter 9, “Maintaining Windows,” for more information.

81. A. When printing “duplex,” it means that you are printing on both sides of the paper, if the printer has that capability. See the section titled “Printer Types and Technologies” in Chapter 13, “Printers,” for more information.

82. B. Regular paper can be used on all the listed printers except for the thermal printer. Thermal printers use specially coated paper that is heated to create the image. See the section titled “Printer Types and Technologies” in Chapter 13, “Printers,” for more information.

83. D. Heat is the number one enemy to a thermal printer. See the section titled “Printer Types and Technologies” in Chapter 13, “Printers,” for more information.

84. C. Pausing printing in general and pausing individual documents is done by double-clicking on the printer in question and making the modifications from the ensuing window. All the others can be modified from the Printer Properties screen. See the section titled “Installing, Configuring, and Troubleshooting Printers” in Chapter 13, “Printers,” for more information.

85. C. Software-based firewalls, such as the Windows Firewall, are normally running on the client computers. See the section titled “Malicious Software” in Chapter 15, “Security,” for more information.

86. B. You need a central connecting device such as a hub or switch to make the physical connection between computers on a network. Also, the computers need NICs to connect physically to the hub or switch. Many SOHO “routers” have a four-port hub/switch built in. See the section titled “Networking Fundamentals” in Chapter 14, “Networking,” for more information.

87. D. Of the answers listed only Category 5 can transmit data fast enough for the 100BASE-T standard. See the section titled “Network Cabling and Connectors” in Chapter 14, “Networking,” for more information.

88. B. Just right-click the device you want to share (if you are not using simple file sharing). See the section titled “File Security” in Chapter 15, “Security,” for more information.

89. C. The only public address (needed to get onto the Internet) is 129.52.50.13. All the others are private IPs, meant to be behind a firewall. The following table lists the standard private IP networks ranges. See the section titled “Networking Fundamentals” in Chapter 14, “Networking,” for more information.

Table 3: Private IP Networks

image

90. C. The purpose of a DNS server is to resolve (convert) hostnames and domain names to the IP address. Computers normally communicate via IP address, but it is easier for humans to type in names. If Davidprowse.com is down, you cannot ping the corresponding IP address at all. If the DHCP server is down, your workstation will probably not have an IP on the network and again will not ping the corresponding IP address. ADDS is Active Directory Directory Services, meaning a domain controller, which doesn’t have much to do with this, except that in many smaller companies, the domain controller and DNS server are one and the same. See the section titled “Networking Fundamentals” in Chapter 14, “Networking,” for more information.

91. C. Session hijacking is when an unwanted mediator takes control of the session between a client and a server (for example, an FTP or HTTP session). See the section titled “Malicious Software” in Chapter 15, “Security,” for more information.

92. D. Spoofing is when a malicious user makes data or email appear to be coming from somewhere else. See the section titled “Basics of Data Security” in Chapter 15, “Security,” for more information.

93. C. After Auditing is turned on and specific resources are configured for auditing, you need to check the Event Viewer’s Security log for the entries. These could be successful logons or misfired attempts at deleting files; there are literally hundreds of options. The Application log contains errors, warnings, and informational entries about applications. The System log deals with drivers and system files and so on. A System Maintenance log can be used to record routine maintenance procedures. See the section titled “Windows Tools and Errors” in Chapter 10, “Troubleshooting Windows,” for more information.

94. C. If you ever see anything like this in a server room, you need to contact the network or system administrator and the building superintendent right away. See the section titled “Safety and Environmental Procedures” in Chapter 16, “Safety and Professionalism,” for more information.

95. C. Turning the printer off might not be enough. It might be seriously malfunctioning, so pull the plug. See the section titled “Safety aand Environmental Procedures” in Chapter 16, “Safety and Professionalism,” for more information.

96. B. Startup repair attempts to fix issues automatically. This is available in Windows Vista’s WinRE System Recovery Options. See the section titled “Repair Environments and Boot Errors” in Chapter 10, “Troubleshooting Windows,” for more information.

97. C. Bootrec /rebuildbcd attempts to rebuild the boot configuration store. Bootrec /fixboot is one of the methods you can try to repair bootmgr.exe in Windows Vista. Bootrec /fixmbr rewrites the master boot record in Vista. Bootcd is where the boot configuration store is located. See the section titled “Repair Environments and Boot Errors” in Chapter 10, “Troubleshooting Windows,” for more information.

98. C. The fourth step of the CompTIA 6-step troubleshooting process is, Establish a plan of action to resolve the problem and implement the solution. Identify the problem is step 1. Establish a theory of probable cause is step 2. Document findings is step 6. See the section titled “Troubleshooting Theory” in Chapter 1, “Introduction to Troubleshooting,” for more information.

99. D. Make sure that the customer has a path toward a solution before dismissing the issue. Do not try to fix the problem if the scope of work is outside your knowledge. See the section titled “Professionalism and Communication Skills” in Chapter 16, “Safety and Professionalism,” for more information.

100. C. Always have a positive outlook. The customer will have fewer concerns, and you will be more relaxed. See the section titled “Professionalism and Communication Skills” in Chapter 16, “Safety and Professionalism,” for more information.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset