Beruflich Dokumente
Kultur Dokumente
2. Which of the following are secure networking protocols? (Select two answers)
A. HTTPS
B. Telnet
C. PAP
D. SSH
3. Which of the following are valid loopback addresses? (Select two answers)
A. ::1
B. 169.254/16
C. MAC address
D. 127.0.0.1
4. Protocols that handle electronic mail (e-mail) include: (Select three answers)
A. SMTP
B. POP3
C. IMAP4
D. FTP
E. SNMP
5. Antivirus software can be kept up to date through: (Select all that apply)
A. Virus signature updates
B. Virtualization
C. Auditing
D. Engine updates
6. A Windows feature that allows for storing information on a hard drive in an encrypted format is
called:
A. CDFS
B. FSB
C. EFS
D. Ext3
9. While troubleshooting problems with a Network Interface Card (NIC), connector pins on the NIC's port
can be tested with the use of:
A. Loopback plug
B. Punchdown tool
C. Pliers
D. Molex connector
13. The bus between the CPU and North Bridge is called:
A. Back-side bus
B. Universal Serial Bus (USB)
C. I/O Controller Hub (ICH)
D. Front-side bus (FSB)
14. The bus between the CPU and the internal memory cache (L2 cache) inside the CPU housing is
called:
A. I/O Controller Hub (ICH)
B. Front-side bus (FSB)
C. Universal Serial Bus (USB)
D. Back-side bus
15. Which of the following switches puts the ping command in a loop?
A. -a
B. -t
C. -n
D. -l
16. Red stripe on the edge of the floppy disk ribbon cable is used for:
A. Marking drive B on the cable
B. Designating main drive on the cable
C. Marking the connection with PIN 1 on the motherboard
D. Marking which drive will be drive A
18. Windows command-line utility for displaying intermediary points on the packet route is called:
A. ping
B. netstat
C. ipconfig
D. tracert
19. What is the maximum number of USB devices that can be connected to a single USB host controller?
A. 127
B. 31
C. 255
D. 63
20. Memory cache not built into the microprocessor chip is known as: (Select two answers)
A. External cache
B. DRAM
C. Secondary cache
D. L1 cache
23. Which type of standard FireWire connector has the capability of supplying voltage to a device?
A. 2-pin connector
B. 4-pin connector
C. 6-pin connector
D. 8-pin connector
24. Which of the following is a Windows utility for managing system partitions?
A. control.cpl
B. compmgmt.msc
C. wuapp.exe
D. diskmgmt.msc
26. Which of the following options of the ping command allows for adjusting the size of the ping packet?
A. -a
B. -n
C. -t
D. -l
27. A security feature in Windows that prompts for administrator password when a program is about to
make a change that requires administrator-level permission is called:
A. UART
B. Task Manager
C. UAC
D. SAM
28. Which of the following allows for resolving problems that cause Windows startup errors and prevent
the system from starting normally?
A. TPM
B. Safe mode
C. chkdsk
D. Hard boot
29. Which of the following are advantages of the New Technology File System (NTFS) over FAT32 file
system? (Select best answer)
A. Disk quotas
B. Compression
C. Object permissions
D. Encryption
E. All of the above features are improvements implemented in NTFS not available in FAT32
31. An IP address in the range 169.254.0.1 through 169.254.255.254 indicates a problem with what type
of service?
A. DNS
B. SNMP
C. SMTP
D. DHCP
33. Network access control method based on the physical address (MAC address) of the Network
Interface Card (NIC) is called:
A. HIDS
B. Accounting
C. MAC filtering
D. Quality of Service (QoS)
36. Which of the following is used to detect whether the computer case has been opened?
A. BitLocker
B. Chassis intrusion detection
C. Mantrap
D. EFS
37. Voice over IP (VoIP) can be implemented through: (Select all that apply)
A. Hardware
B. SMTP
C. Software with additional hardware support
D. Regular telephone
39. Which copy switch removes the confirmation prompt displayed when Windows is about to overwrite
the contents of an existing file?
A. /y
B. /a
C. /-y
D. /v
40. Which part needs replacing when system clock in the notification area resets or loses time and date
settings each time the computer is powered on?
A. CMOS battery
B. NIC
C. North Bridge
D. S/PDIF connector
42. In order to work, an integrated component such as Network Interface Card (NIC) on a brand new
motherboard may need to be first:
A. Updated with the latest driver in Device Manager
B. Looked up on the Hardware Compatibility List (HCL)
C. Checked with cable tester
D. Enabled in the advanced BIOS settings menu
43. Which type of password gives the highest level of permissions in BIOS?
A. root
B. Administrator
C. Supervisor
D. Power User
44. BIOS passwords can be cleared by: (Select all that apply)
A. Using onboard reset switch
B. Setting jumpers on the motherboard
C. Using onboard power-on switch
D. Erasing the CMOS memory
E. Reinstalling CMOS battery
46. After moving a dynamic disk to the local computer from another computer its status in the Disk
Management utility is set to:
A. Foreign
B. Missing
C. Online
D. Basic
48. Which of the following is a Windows tool for managing installed hardware?
A. Performance Monitor
B. Device Manager
C. Computer Management
D. Task Manager
50. Which of the following command-line utilities in Windows allow for copying files and directory trees?
(Select two answers)
A. move
B. xcopy
C. copy
D. robocopy
51. Which of the following tools is used for editing Boot Configuration Data (BCD) settings in Windows
Vista and Windows 7?
A. cmd.exe
B. msconfig
C. bcdedit.exe
D. bootsect.dos
52. Windows commands for creating new directories are called: (Select two answers)
A. move
B. dir
C. copy
D. md
E. mkdir
54. Which of the following wireless encryption schemes offers the highest level of protection?
A. WEP
B. WPA2
C. SSID
D. WPA
56. Which of the following should come next after mounting the CPU fan and heat sink assembly?
A. Securing the CPU by pushing the socket lever down
B. Applying thermal compound
C. Connecting the CPU fan cable to the connector on the motherboard
D. Placing the motherboard on a antistatic mat
57. For proper functioning and optimum compatibility, installed RAM memory modules should: (Select
all that apply)
A. Have the same CAS latency
B. Come from the same vendor
C. Have the highest possible capacity
D. Match the capacity recognized by the operating system
E. Have different CAS latency
59. Which of the following CPUs fit into a slot? (Select two answers)
A. Core Duo
B. AMD Sempron
C. Intel Pentium II
D. AMD Athlon
60. What is the maximum data rate supported by the SATA 3.0 standard?
A. 480 Mbps
B. 3 Gbps
C. 800 Mbps
D. 6 Gbps
61. Which of the following RAID schemes offer fault tolerance? (Select all that apply)
A. Disk mirroring
B. RAID 0
C. Disk duplexing
D. Disk striping
E. RAID 5
62. A single Parallel ATA (PATA) cable may connect one motherboard socket with:
A. Up to 3 devices
B. Up to 2 devices
C. Up to 4 devices
D. Only 1 device
63. A diagnostic expansion card that displays progress and error messages generated during computer
startup is called:
A. Startup card
B. Loopback plug
C. POST card
D. Media reader
64. Which of the following commands in Windows are used for removing directories? (Select two
answers)
A. rd
B. erase
C. dir /delete
D. rmdir
66. Which of the following commands in Windows change the current directory to the root directory?
(Select two answers)
A. chdir /r
B. cd\
C. chdir\
D. cd..
E. dir /root
67. Which of the following allows one core on the processor to appear like two cores to the operating
system?
A. QPI
B. HyperTransport
C. CrossFireX
D. HTT
68. The option to cancel all print jobs in Windows 7 can be found in:
A. Device Manager interface
B. Printers window
C. Administrative Tools menu
D. Devices and Printers window
70. What is the maximum length for external SATA (eSATA) cable?
A. 5 meters
B. 18 inches
C. 2 meters
D. 1 meter
71. Which of the following is the first step in the laser printing process?
A. Cleaning
B. Charging
C. Writing
D. Developing
72. Graphics cards can use either any PCI Express slot or an AGP slot.
A. True
B. False
73. Which of the following are parallel communication interfaces? (Select all that apply)
A. IEEE 1394
B. PCI Express
C. IEEE 1284
D. AGP
E. PCI
74. Which of the following tools are used for testing power supply voltage output? (Select two answers)
A. Torx screwdriver
B. Tone probe
C. Loopback plug
D. Power supply tester
E. Multimeter
75. Windows utility that allows for returning critical system files, program files and registry settings to an
earlier point in time is called:
A. Task Scheduler
B. Remote Assistance
C. System Restore
D. Indexing
76. Which of the following port numbers are used by the File Transfer Protocol (FTP)? (Select two
answers)
A. 20
B. 21
C. 22
D. 23
78. Which of the following are Windows utilities for displaying and changing the access control for files
and folders? (Select two answers)
A. attrib
B. chkntfs
C. chmod
D. cacls
E. icacls
81. Which of the following connector types is used with coaxial cabling?
A. MT-RJ
B. LC
C. BNC
D. ST
82. An attempt to flood the bandwidth or resources of a targeted system so that it becomes
overwhelmed with false requests and in result doesn't have time or resources to handle legitimate
requests is called:
A. MS DOS
B. Botnet
C. Social engineering
D. DoS attack
85. Which of the following ATA versions allows for attaching devices other than hard drives?
A. ATA-1
B. ATA-2
C. ATA-3
D. ATAPI
87. Files and Settings Transfer Wizard, Windows Easy Transfer, and USMT are all:
A. Tools for moving user data and user information to a new computer running Windows
B. Utilities for moving system files between Windows and Linux
C. Tools for moving system files between different Windows versions
D. Utilities for moving system files between Windows and Mac OS
88. Which type of RAM can detect and correct memory errors?
A. ECC
B. Non-ECC
C. Parity
D. Unbuffered
89. Which of the following are magnetic tape data storage formats? (Select two answers)
A. DLT
B. LTO
C. MUI
D. PXE
E. OEM
90. Windows utility for installing and updating drivers for hardware devices, changing hardware settings,
and troubleshooting problems is called:
A. Device Manager
B. Performance Monitor
C. Task Manager
D. Action Center
92. Which of the following utilities allows for managing services that are running on local or remote
Windows computers?
A. taskmgr.exe
B. services.msc
C. eventvwr.exe
D. inetcpl.cpl
93. After reaching the limit of changes, the DVD region code:
A. Can be reset to 0 in BIOS
B. Can be changed by reinstalling Windows
C. Can be extended by moving the DVD drive to another computer
D. Cannot be changed
94. Which type of cabling provides protection against EMI? (Select all that apply)
A. UTP
B. Coaxial
C. Fiber-optic
D. STP
95. What is the name of a Windows Vista and Windows 7 utility that allows users to create backups?
A. NTBackup
B. System Restore
C. Backup and Restore
D. Windows Easy Transfer
96. Which of the following allows for accessing system memory without involving the CPU?
A. DMA channel
B. Memory address
C. I/O address
D. IRQ
98. Which of the following codes marks the ACPI Mechanical Off state?
A. G0
B. G1
C. G2
D. G3
99. Which of the following codes marks the ACPI Hibernation state?
A. S1
B. S2
C. S3
D. S4
100. Which of the following replaces boot.ini in Windows Vista and Windows 7?
A. bootsect.dos
B. ntldr
C. Boot Configuration Data (BCD)
D. bcdedit.exe
ANSWERS
2. Answers: A and D. HyperText Transfer Protocol over SSL/TLS (HTTPS) and Secure Shell (SSH)
Explanation: Telnet and Password Authentication Protocol (PAP) do not offer encryption and send
passwords in clear text. HTTPS employs Secure Sockets Layer (SSL) or Transport Layer Security (TLS)
protocol in order to encrypt web traffic between hosts. SSH allows for remote access / administration
over command line and offers the same functionality as Telnet additionally encrypting the entire
communication channel.
6. Answer: C. EFS
Explanation: Encrypting File System (EFS) is a feature of Windows that allows for storing information on
a hard drive in an encrypted format. Certain editions of Microsoft Windows (including Starter, Home
Basic, and Home Premium) do not offer full support for EFS. EFS can only encrypt individual files.
7. Answer: B. BitLocker
BitLocker encrypts the entire drive. Encrypting File System (EFS) allows only for encryption of individual
files. User Account Control (UAC) is a Windows security feature that prompts for administrator password
when a program is about to make a change that requires administrator-level permission. IPSec (IP
Security) is an IP packet encryption protocol.
15. Answer: B. -t
Explanation: ping -t pings the specified host until stopped (Control-C is used to stop this command).
25. Answers: A and B. Up to four primary partitions and Only one extended partition
Explanation: A hard drive can have up to four primary partitions and only one extended partition.
Primary partition can contain only one logical disk; extended partition can be divided into multiple
logical drives. Partition designated to boot the OS is called active partition and at any given time only
one partition can be set as active.
26. Answer: D. -l
Explanation: -l switch allows for adjusting the size of the ping packet (the default size of a ping packet is
32 bytes).
29. Answer: E. All of the above features are improvements implemented in NTFS not available in FAT32
Explanation: NTFS was designed as a replacement for its predecessor, the File Allocation Table (FAT) file
system. Its advantages over FAT include improved reliability due to the file system recovery features,
increased security achieved by allowing users to set permissions on files or folders (through the
Discretionary Access Control access control model), support for the Encrypting File System (EFS)
technology used to store encrypted files on NTFS volumes, and file compression. With NTFS, system
administrators can also set limits on the usable hard drive space for each user by applying disk quotas.
37. Answers: A and C. Hardware and Software with additional hardware support
Explanation: Voice over IP (VoIP) allows for voice communication and multimedia transmissions over IP
networks, such as the Internet. VoIP allows for placing and receiving telephone calls in much the same
manner as via the traditional Public Switched Telephone Network (PSTN). VoIP can be implemented
either through hardware or software. Hardware implementations include dedicated VoIP phones that
connect directly to the IP network either through the wired Ethernet or wireless Wi-Fi. Software
implementation requires a special application (often referred to as a softphone) to be installed on a
networked computer that is equipped with a microphone and speaker, or headset.
39. Answer: A. /y
Explanation: The /y switch available in the Windows command-line copy utility removes the
confirmation prompt displayed when Windows is about to overwrite the contents of an existing file.
44. Answers: B, D, and E. Setting jumpers on the motherboard, Erasing the CMOS memory, and
Reinstalling CMOS battery
Explanation: CMOS memory keeps track of the current date and time when the computer is powered
off. CMOS memory also stores system setup information including BIOS passwords. BIOS passwords can
be cleared by erasing the contents of CMOS memory. This can be done either by setting jumpers on the
motherboard or by reinstalling small battery on the motherboard that supplies power for CMOS
memory when the computer is powered off.
45. Answer: A. 25 GB
Explanation: A single-layer standard Blu-ray disc holds up to 25 gigabytes of data, while a dual-layer
standard Blu-ray disc holds up to 50 gigabytes of data, without the need to flip the disc. A dual-layer Bluray disc may hold up to twice the amount of data or video compared to a single-layer disc, and uses two
independent layers placed on one side of the disc to store its information.
56. Answer: C. Connecting the CPU fan cable to the connector on the motherboard
Explanation: After mounting the CPU fan and heat sink assembly, the CPU fan cable needs to be
attached to the connector on the motherboard.
57. Answers: A, B and D. Have the same CAS latency, Come from the same vendor, and Match the
capacity recognized by the operating system
Explanation: In order to function properly, installed memory modules should always have the same CAS
latency. For optimum compatibility, it is recommended to obtain the memory modules from the same
vendor. 32-bit Windows operating systems may only recognize less than 3GB of installed RAM hence
buying RAM sticks with the highest possible capacity might not always be a good option.
69. Answer: A. /s
Explanation: rd and rmdir commands will display an error message if a directory that is to be deleted is
not empty. Using either of these commands with the /s switch removes the specified directory with all
subdirectories and files contained in it (rd /s and rmdir /s allow for removing all directory trees).
87. Answer: A. Tools for moving user data and user information to a new computer running Windows
Explanation: Files and Settings Transfer Wizard, Windows Easy Transfer, and USMT are all tools for
moving user data and user information to a new computer running MS Windows. Files and Settings
Transfer Wizard is a user migration tool available in Windows XP. Windows Easy Transfer is an improved
version of the Files and Settings Transfer Wizard for Windows Vista and Windows 7. Windows Easy
Transfer is not available in Windows XP, but the application can be downloaded and installed on
Windows XP or Windows 2000 (on Windows 2000 Windows Easy Transfer can only be used for
transferring files from Windows 2000 to a new computer; transfer of user settings is not supported).
User State Migration Tool (USMT) is a more advanced migration tool for transferring user-profile
information to a new Windows computer. USMT is an advanced, scriptable command-line tool used for
migrating multiple user profiles in Windows domain environment.
97. Answers: B and E. Are 10.5 mm thick and Are used for cards containing hard disk drives
Explanation: Type-III PC Cards are 10.5 mm thick and are used for cards containing hard disk drives.
98. Answer: D. G3
Explanation: Advanced Configuration and Power Interface (ACPI) allows the operating system to control
the amount of power supplied to each device connected to a computer. G3 is the code that indicates the
ACPI Mechanical Off state when the system is powered down.
99. Answer: D. S4
Explanation: S4 is the code that indicates the ACPI Hibernation state. ACPI specification defines four
global (G) states (from G0 through G3). G1 (Sleeping) is subdivided into four S states, with S4 indicating
the Hibernation mode.