How can we help?

You can also find more resources in our Help Center.

351 terms

Measure Up 220-602/220-702

STUDY
PLAY
To use file permissions and EFS, you need to use the NTFS file system. You can convert the system hard disk to NTFS during installation. You can convert any hard disk from FAT or FAT32 to NTFS after installing Windows XP by using the Convert utility.

You should not convert the hard disk to FAT32. FAT32 does not support permissions or EFS.

You should not reformat the hard disk as FAT32. FAT32 does not support permissions or EFS. Also, reformatting the hard disk will cause all data stored on it to be lost.

You should not format the hard disk as NTFS. Formatting the hard disk will cause all data on it to be lost. A hard disk can be converted from FAT or FAT32 to NTFS, but not the other way around.
You are upgrading a user's computer from Windows 98 to Windows XP Professional.

The computer currently has a hard disk partition formatted as FAT. The main reason for the upgrade is to allow users to secure files on that hard disk using permissions and encrypting file system (EFS).

What should you do?

Reformat the hard disk as NTFS.

Reformat the hard disk as FAT32.

Convert the hard disk to NTFS.

Convert the hard disk to FAT32.
You should install a Peltier cooler. Extremely hot environments require additional cooling. A Peltier cooling device gets colder when it receives voltage. Therefore, it can cool the processor regardless of the ambient air temperature. Another thing to check is to make sure that you properly installed the processor's fan.

A heat sink will probably not solve the problem. A heat sink is a convection device. In order for it to cool a Central Processing Unit (CPU), the air temperature must be cooler than the inside of the computer.

Replacing the processor will not resolve the problem. The problem is not caused by a defective processor. It is caused by insufficient cooling.

You should not leave the case open for extra ventilation. The ambient air temperature outside the case is very hot. Also, leaving the case open will cause a build up of dust inside the computer case, which will make the problem worse.
You are replacing a motherboard on a computer that is used in a factory. The air temperature on the factory floor is typically between 90 and 105 degrees F. You install the motherboard and boot the computer.

After several hours you receive a call that errors are occurring. You discover the processor is overheating.

What should you do?

Leave the case open for extra ventilation.

Install a Peltier cooler.

Replace the processor with a different one.

Install a heat sink.
When a laser printer prints pages with vertical white lines, it usually means that the toner cartridge is clogged so toner is not being distributed evenly. The first thing to try is to shake the toner cartridge to try to remove the clog. If that does not work, replace the toner cartridge.

The problem is probably not caused by a dirty photosensitive drum. A dirty or scratched photosensitive drum can cause a mark on the paper that repeats at regular intervals. A dirty drum will not normally cause white vertical lines.

You should not replace the fuser assembly. A problem with the fuser assembly would generally result in smudges or blotches on the page. It is not the first thing to check when diagnosing white lines on the page.

The problem is most likely not related to the printer driver. The printer driver is responsible for translating application and operating system commands to a language the printer can understand. Vertical white lines are caused by an ink distribution problem, not a translation problem
You are diagnosing a problem with a laser printer. When the laser printer prints, each page has white vertical lines running down it.

What should you try first?

Clean the photosensitive drum.

Reinstall the printer driver.

Replace the fuser assembly.

Shake the toner cartridge.
You should use ~ as the filename to locate any temporary files left behind by Microsoft Word or other applications that use a ~ as the first character of a temporary file. The is a wildcard character that means zero or more characters. So ~* would locate all files that begin with ~.

You should not search on ~.*. Doing so would return only the files named ~ with any file extension. For example, it would find ~.doc and ~.exe, but not ~myfile.doc.

You should not search on *.doc. Doing so would return all files ending in .doc, the extension commonly associated with Microsoft Word documents. Therefore, it would return all Microsoft Word documents, not just the temporary files.

You should not search on ~.doc. Doing so would return only a file specifically named ~.doc if there was one within the search path.
You want to search for all temporary files that were left behind by Microsoft Word.

What filename should you specify in the Search dialog?

~.*

~.doc

*.doc

~*
A mechanical mouse uses a ball that activates rollers when it is moved across a smooth surface. Both the ball and the rollers can gather dust and other debris from the environment. One of the symptoms of a dirty mouse is that the mouse pointer seems temporarily stuck or moves sporadically.

You do not need to change the battery. A mechanical mouse does not have a battery.

When a mechanical mouse moves erratically, the problem is due to a dirty ball and rollers. Installing a new driver will not correct that problem.

The mouse is not corrected to the wrong port. If the mouse were connected to the keyboard port, it would cause other symptoms, such as random characters appearing on the screen or the computer would beep at startup to indicate that a keyboard was not attached to the keyboard port. It would not function as a mouse, even erratically.
A user reports that his mechanical mouse is moving sporadically. You attempt to clean the ball, but the mouse still behaves erratically.

What should you try next?

Verify that the mouse is connected to the correct port.

Clean the rollers using rubbing alcohol and a cotton swab.

Install a new driver.

Change the battery.
You should not let the person follow you in. Instead, tell him to go to the security administrator (or whoever at the company issues access cards) to obtain a temporary access card. A server room should be kept secure. You should never let another employee follow you in without swiping his own access card, even if you know the person, but especially if you don't. As an additional precaution, after you get inside the server room, you should notify the security administrator that someone attempted to enter without an access key.

You should not obtain the person's full name and manager's name and then let the person follow you in if you know the manager. The person might know a manager's name from organizational charts or the person might have worked at the company previously and been terminated. You cannot trust anyone in the server room who does not have the necessary access card to enter.

You should not let the person follow you in but insist that he leave the server room when you do. Even if you try to keep an eye on the person's actions, it is very likely that he could do something malicious without you knowing. For instance, he might put a disk that contains a virus in a server.

You should not obtain the person's name, let him follow you in, and then call the security administrator later. If the person is an attacker, he will probably give a fake name. Also, by the time you notify the security administrator, the damage will have been done.
You are entering the server room to perform preventive maintenance on one of the computers. You use your access card to open the door. Another person follows behind you, explaining that he left his access card at home.

What should you do?

Obtain the person's full name and manager's name. If you know the manager, let the person follow you in.

Let the person follow you in, but insist that he leave the server room when you do. Keep your eye on his actions.

Obtain the person's full name before you let him follow you in. After you get to a phone, call the security administrator.

Do not let the person follow you in. Tell him to go to the security administrator to obtain a temporary access card.
You should explain to the customer that you would like to help solve the problem, and then ask him to calm down and tell you about the problem. The best way to solve the problem is to obtain the customer's trust. To do that, you should politely ask him to tell you about the problem he is having.

You should not tell the customer that you were the one who took the original call and that you do not appreciate his rudeness. Doing so is likely to cause the situation to degrade into name calling or arguing. The customer does not know that you were the one who took the call, so there is no use telling him.

You should not explain to the customer that if he was not so rude, maybe you would be able to solve the problem. It is your job to be polite to the customer even if the customer is rude. Telling the customer he is rude is likely to cause an argument.

You should not ignore the customer and start working on the computer. It is important that you try to get the customer to tell you the problem so that you can accurately diagnose and resolve it
You visit a customer's site to perform a service call. As soon as you get there, the customer starts to complain about the person who answered the phone when he called. You know that you took the original call and that the customer had been rude.

What should you do?

Ignore the customer and start working on the computer.

Explain to the customer that you would like to help solve the problem. Ask him to calm down and tell you about the problem.

Explain to the customer that if he was not so rude, maybe you would be able to solve the problem.

Tell the customer that you were the one who took the original call and that you do not appreciate his rudeness.
You should ask the user relevant questions until you are clear about the nature of the problem. By asking the right questions, you can help the user provide you with the information you need to understand the problem and begin troubleshooting.

You should not ask the user to repeat the problem again and listen more closely. Simply asking the user to repeat the problem is unlikely to provide the additional information you need to understand the problem. Also, it will make the user think you were not listening the first time.

You should not tell the user you have no idea what he is talking about, but you will be right over so he can show you what is going on. You should not demean a user. Instead, you should guide the user to give you the information you need. If you do need to see the problem occurring, you should tell the user that instead of putting the blame for the miscommunication on the user.

You should not tell the user to reboot. Asking the user to reboot without understanding the problem is not a good approach. A reboot might even make the problem worse
You are talking to a user on the phone. The user is explaining his problem, but you are not sure what he means.

What should you do?

Tell the user you have no idea what he is talking about, but you will be right over so he can show you what is going on.

Ask questions until you are clear about the nature of the problem.

Ask the user to repeat the problem again. Listen more closely.

Tell the user to reboot the computer and call back if the problem is still happening.
You should make a backup of the hard disk, replace the hard disk and restore the backup. It is your job to fix the technical problem, regardless of the files on the user's computer.

You should not make two backup copies and send one to the user's manager. It is not your job to police what users store on their hard drives, unless the files are infected with a virus or otherwise harmful to the computer or the company network.

You should not burn the music files onto a CD for your own use. Doing so is a violation of copyright laws.

You should not back up all files except the music files. You should respect the user's property and restore the data exactly as it was.
You receive a computer for service. You determine that you need to replace the hard disk. While examining the hard disk, you find a folder with a large number of music files.

What should you do?

Make a backup of the hard disk. Replace the hard disk and restore the backup.

Make a backup of the hard disk. Burn a copy of the music files you like onto a CD. Replace the hard disk and restore the backup.

Make two backups of the hard disk. Use one to restore the computer after you have replaced the hard disk. Send the other to the user's manager.

Make a backup of all the files on the hard disk except the music files. Replace the hard disk and restore from backup.
Roberta can attach each of the SCSI devices together by cable in any sequence, as long as she remembers to put a terminator on both ends of the bus. The other choices will not work because of the lack of proper bus termination.

SCSI buses (a chain of SCSI devices) must always be terminated on both ends, just like many kinds of network cable. Devices can be terminated in one of three ways:

* With a terminator block on the free end of the cable that was not designed for other connectors to plug into.

* With a terminator block plugged into the first unit on the chain. This block has two connections: one for the cable and one to plug into the device.

* With a self-terminating connector built into a device. Many devices can be set to terminate without the use of an external block
Roberta's supervisor has asked her to daisy-chain five SCSI devices to her computer.

Which method can she use to accomplish this?

Attach each of the devices together by SCSI cable in a required sequence.

Attach each of the devices together by SCSI cable, in any sequence, with termination on the SCSI controller.

Attach each of the devices together by SCSI cable, in any sequence, with one end of the SCSI bus terminated.

Attach each of the devices together by SCSI cable, in any sequence, with both ends of the SCSI bus terminated.
Mary can read files in the folder, but cannot modify or delete them. Mary obtains the Read permission through her membership in the Accounting group. However, her membership in the Temps group revokes the Write permission that would otherwise be granted through her membership in Accounting. When a resource is accessed through a share, both the NTFS permissions and the share permissions are checked and the most restrictive set of permissions is used. In this case, the most restrictive permissions are the NTFS permissions.

Mary cannot modify files in the share because a Deny overrides any Allow and the Temp group is denied Write permission.

Mary cannot delete files in the share. The Modify permission grants the ability to read, create, and modify files. However, users can only delete their own files. Also, Mary is denied Write access so she cannot make changes to the contents of the folder.

Mary can read files in the share. This permission is assigned as part of the Modify permission.
Mary belongs to the Accounting group and the Temps group. The AP folder, which is located on a computer running Windows XP, has the following permissions:

Accounting - Allow Modify
Temps - Deny Write

The AP folder is shared and the share has the Everyone - Full Control permission.

What access to the folder does Mary have when accessing it through the network share?

Mary can read and modify files in the folder.

Mary can read files in the folder.

Mary can read, modify, and delete files in the folder.

Mary cannot access any files in the folder.
Automatic Private IP Addressing (APIPA) is a feature of Windows 98/2000/XP that permits DHCP clients to automatically self-configure an IP address and subnet mask when their DHCP server cannot be found. When Windows is booting, if it cannot find a DHCP Server, APIPA configures an IP address for the computer automatically. This address is in the range 169.254.0.1 to 169.254.255.254 with a subnet mask of 255.255.0.0. The client uses this address until the DHCP server becomes available.

Domain Name Service (DNS) is used to resolve a fully qualified domain name to an IP address. When one computer needs to establish a communication session with another, the sending computer queries a DNS server for the IP address of the destination host. The DNS server responds with the IP address, which is used by the source computer to establish the connection. It does not assign IP addresses to clients.

Windows Internet Name Service (WINS) resolves NetBIOS names to IP addresses in a Windows network. It does not assign IP addresses to clients.

IPCONFIG is a utility used by Windows 2000 to view current IP configuration information. It does not assign IP addresses to clients.
Which feature of Windows XP permits Dynamic Host Configuration Protocol (DHCP) clients to automatically self-configure an IP address and subnet mask when their DHCP server cannot be found?

APIPA

IPCONFIG

DNS

WINS
The best way to guard against a social engineering attack is to never give out your password, even to an administrator. The caller might not be a database administrator or might be a database administrator who is planning to do something malicious. You should also notify your manager or a security administrator that someone is calling asking for passwords.

You should not give out your password. You should also never send your password in an e-mail. E-mail is usually sent as clear text, so even if the database administrator wants the information for a legitimate reason, passing it in clear text over the network leaves it vulnerable to interception.

Encrypting your password and sending it to the caller will not expose your password because only you will be able to open the file. However, this is not the best solution. Also, the solution does not include notifying a manager of the attempted social engineering call.

You should not ask for the caller's name and extension and call him back to give him your username and password. Even if the caller is a database administrator, he might be planning to do something malicious. Never give out your password to another person
You receive a phone call from the database administrator asking for your Windows username and password so that he can create a database login for you.

What should you do?

Get the caller's e-mail address. Type your username and password in a document and encrypt the document. Send it to the caller's e-mail address.

Explain that you cannot give out that information. Ask for the caller's name and extension and then notify your manager.

Ask for the caller's name and extension and call him back to give him your username and password.

Get the caller's e-mail address and then e-mail your username and password.
Disk Cleanup can be configured to delete temporary Internet files, downloaded ActiveX controls and Java applets, and other temporary files. It can also empty the Recycle Bin and compress files that have not been accessed recently. These actions can help recover disk space.

Disk Cleanup does not delete files in My Documents that have not been accessed recently. In fact, you would not want it to. Many users store files for long periods of time without accessing them. If these files were deleted, users would lose data.

Disk Cleanup does not defragment user documents. To defragment files, use Disk Defragmenter.

Disk Cleanup does not compress and defragment the paging file. The paging file is a temporary file that is created when Windows starts up. Creating a paging file on its own partition will help prevent fragmentation. You would not want to compress the paging file because it is used for virtual memory access and compressing it would decrease performance
What optimization tasks are performed by Disk Cleanup in Windows XP Professional? (Select TWO.)

Defragmenting user documents

Compressing old files

Deleting temporary Internet files

Compressing and defragmenting the paging file

Deleting files in My Documents that have not been accessed recently
An IP address consists of four eight-digit binary numbers called octets, separated by periods, for a total of 32 bits. The IP address identifies the network and the host in a network uniquely on the Internet. Each decimal number in an IP address is typically a number in the range 1 through 254. The subnet mask determines which portion is the network number and which portion is the host. If a subnet mask contains 255 in a position, the corresponding part of the address is the network number.

Any octet with a number greater than 255 is invalid because 8 bits can only represent a maximum of 255.

255.255.255.0 and 255.255.0.0 are subnet masks, not IP addresses
Which IP address is valid?

192.168.0.256

192.168.0.254

255.255.255.0

255.255.0.0
The primary danger in cleaning a fuser assembly is heat. A fuser assembly operates by applying heat to the page, so it becomes very hot. Therefore, you should turn off the printer and let it cool down before cleaning the fuser assembly.

The fuser assembly is located in the printer, not in the computer. It is not necessary to shut down or unplug the computer before cleaning the fuser assembly.

Although you will probably want to unplug the printer cable before cleaning the fuser assembly for convenience, it is not required. A printer is hot swappable, so you do not need to shut down the computer before unplugging the printer cable.

You do not need to attach an Electrostatic Discharge (ESD) strap to the printer casing before cleaning the fuser assembly. The fuser assembly does not include components that would be damaged by ESD.
What should you do before cleaning a fuser assembly?

Shut down the computer and unplug the printer cable.

Shut down and unplug the computer.

Turn off the printer and let it cool down.

Attach an ESD strap to the printer's casing.
You should do the work you have to do and leave the personal folder alone. It is your job to fix the user's problem, not to police the types of files he or she stores. You should never look at files that are outside the scope of your task.

You should not open the personal folder to verify that it does not contain files that violate any company policies. It is not your job to police the contents of users' hard disks.

You should not copy the personal folder to a CD-ROM to store in case some issue arises later. You should never make copies of users' files unless it is within the scope of a task you need to perform, such as backing up a user's computer.

You should not inform the user's manager that the user is storing personal files on his or her computer. It is not your job to police the types of files stored by users.
You are working on a user's laptop computer. You notice that there is a folder named personal.

What should you do?

Open the personal folder to verify that it does not contain files that violate any company policies.

Copy the personal folder to a CD-ROM to store in case some issue arises later.

Inform the user's manager that the user is storing personal files on his or her computer.

Do the work you have to do and leave the personal folder alone
You should listen patiently and then look for ways you might improve the perceived performance. It is important that the customer believe you want to solve her problem. Also, there are probably some things you can do to help the perceived performance, such as disabling unnecessary services, defragmenting the hard disk, or changing the virtual memory settings.

You should not tell the customer that the only way to improve performance is to buy a faster computer unless you determine that is the case after you have tried other options.

You should not minimize her problem by telling her that the performance is not that bad, given her processor's speed. You should never make a customer feel unimportant by minimizing her problem.

You should not recommend more RAM or a faster processor until you have investigated the cause of the performance problem and determined the best solution
You are working at a customer's site. The customer explains the performance problem she has been having and demonstrates it. You feel that she is exaggerating the problem.

What should you do?

Tell her that the only way she is going to get better performance is to buy a faster computer.

Listen patiently and then look for ways you might improve the perceived performance.

Tell her that the performance is not really that bad, given her processor's speed.

Recommend that she add more RAM or upgrade to a faster processor.
You should let the voice mail pick up the call and return the customer's phone call after you finish your current service call. When you are on a service call, your attention should be devoted to solving the current customer's problem. You should not allow distractions, such as phone calls from other customers, to interfere with you performing the job at hand.

You should not answer the call to find out how urgent the customer's problem is while working on the current customer's problem. You should definitely not excuse yourself to go to visit the other customer because each customer should feel important. If you leave the customer's site without solving the problem, the customer will feel that you do not care enough about his problems and may take his business somewhere else.

You should not attempt to solve one customer's problem over the phone while at another customer's location. You should give each customer's problem dedicated attention.

You should not step out of the room to answer the call. You should finish solving the current customer's problem and then call the other customer back. This is especially true if the customer is paying hourly for your time.
You are at a customer's site. You receive a phone call on your cell phone from another customer.

What should you do?

Let the voice mail pick up the call and return the customer's phone call after you finish your current service call.

Step out of the room and answer the call.

Answer the call and try to resolve the problem over the phone.

Answer the call and find out how urgent the customer's problem is. If the problem is urgent, tell the current customer that you have an urgent problem at another customer's site and will return later.
The best thing to do is to perform the task yourself and then have the customer perform the task. By performing the task yourself, you ensure that the problem has been solved. Next, you should have the customer perform the task so that the customer is satisfied that the problem has been solved.

You should not just tell the customer that the problem is solved. You should always verify that a problem has been solved, not just assume. Also, the customer needs to be satisfied that the problem has been solved.

You should not just perform the task yourself and then tell the customer the problem is fixed. You should also have the customer perform the task so that the customer is satisfied. If you leave before the customer has performed the task, the customer might attempt to perform it after you leave and do it wrong. If the task cannot be completed, the customer will assume you did not solve the problem.

You should not have the customer perform the task before you have verified that the problem is solved.
You are working on a problem at a customer's site. The customer has been having trouble performing a task in an application. You make some configuration changes.

What should you do next?

Perform the task yourself and then tell the customer the problem has been fixed.

Tell the customer that the problem is solved.

Tell the customer the problem is solved and then have the customer perform the task.

Perform the task yourself and then have the customer perform the task.
Windows XP Professional supports Automatic Updates to allow users to keep their systems up to date with service packs and security updates. You can enable Automatic Updates through the System Control Panel utility.

Each user has a Startup folder located at C:\Documents and Settings\user_name\Start Menu\Programs\Startup. This folder contains shortcuts to programs that run when a specific user logs on. However, adding a shortcut to the Windows Update Web site Uniform Resource Locator (URL) to the user's Startup folder will not cause updates to be applied each time the user starts the computer.

Shortcuts to programs that should start when any user logs on should be added to the C:\Documents and Settings\All Users\Start Menu\Programs\Startup folder. However, adding a shortcut to the Windows Update Web site's URL to the All Users Startup folder will not cause updates to be applied each time the user starts the computer.

You should not create a batch file that checks the Windows Update Web page and add the batch file to Scheduled Tasks. However, you can configure Automatic Updates to run on a schedule by using the System Control Panel utility.
You are installing Windows XP Professional on a user's computer. You want to ensure that the user receives all security updates in a timely manner. The user's computer is connected to the Internet.

What should you do?

Use the System Control Panel utility to enable Automatic Updates.

Add a shortcut to the URL to the Windows Update Web page to the All Users Startup folder.

Add a shortcut to the URL to the Windows Update Web page to the user's Startup folder.

Create a batch file that checks the Windows Update Web page and add it to Scheduled Tasks
NSLOOKUP is a TCP/IP utility that allows a user to perform a manual Domain Name System (DNS) query of any DNS database. You would use this to verify that DNS name resolution is functioning properly.

WINIPCFG is a graphical utility found in Windows 9x that allows you to get information about your IP configuration. It also allows you to release a Dynamic Host Configuration Protocol (DHCP) lease and request a new one.

IPCONFIG does the same thing as WINIPCFG, but for Windows NT/2000/XP. IPCONFIG can only be run from the command line.

TRACERT is a utility that allows you to trace the path information takes to get from one machine to another as it moves from network to network
Which TCP/IP utility allows a user to perform a manual DNS query of any DNS database?

TRACERT

NSLOOKUP

WINIPCFG

IPCONFIG
The fuser assembly is the part of the laser printer that performs the final step in creating a printed page. Prior to this point, the toner is attracted to the page because of a difference in electrical charges. However, the toner is not permanently attached. The fuser assembly heats the toner and the paper, melting the plastic in the toner. The roller in the fuser assembly then presses the toner onto the page, making the print job permanent (fusing the image to the paper).

The transfer corona (or transfer roller) is used to apply a positive charge to the paper so that the paper attracts the negatively charged toner.

The photosensitive drum is used to create the image that will be printed. It is first given a strong uniform negative charge (between -800 and -1200V). Next, the image is "written" to the drum using the laser beam, which changes the charge of the dots that should be written to a low negative charge (between -200 and -400V). The toner, which is given a higher negative charge than the dots (around -600V) are attracted to the areas where the dots are drawn, thus forming the image on the drum.

A print head is used on impact printers, such as dot-matrix printers and on inkjet printers. A laser printer does not have a print head
Which component of a laser printer is responsible for attaching the toner to the paper and making the print job permanent?

Transfer corona

Print head

Photosensitive drum

Fuser assembly
You should verify that the power supply is connected to the motherboard. You know that the power supply is receiving power from the outlet because the fan is running. However, it might not be supplying power to the motherboard. Therefore, you should verify that it is properly connected to the motherboard. It is also possible that the power supply is faulty.

There is no need to use a multimeter to check the voltage at the outlet. You know the outlet is supplying power because the fan is working.

There is no need to replace the power cable. You know the power cable is transmitting current because the fan is working.

Power supplies do not require drivers. They are the first thing to start up and supply power to the other devices in the computer.

Objective:
List all questions for this objective
You are troubleshooting a computer that will not boot. The power supply fan works, but the computer will not start.

What should you try?

Use a multimeter to check the voltage at the outlet.

Verify that correct driver for the power supply is installed.

Verify that the power supply is connected to the motherboard.

Replace the power cable.
You should recommend that your customer purchase a Class C fire extinguisher. A Class C fire extinguisher that contains carbon dioxide (CO2) is best for use with electrical equipment. Class C fire extinguishers that contain dry chemicals such as sodium bicarbonate or monoammonium phosphate can be used on computer equipment but are corrosive and can cause damage to the electrical components if not cleaned up immediately.

You should not recommend a Class A fire extinguisher. A Class A fire extinguisher uses water and is recommended for use with ordinary fires, such as those burning paper or wood.

You should not recommend a Class B fire extinguisher. A Class B fire extinguisher is used for fires caused by oil, gasoline, or grease.

You should not recommend a Class D fire extinguisher. A Class D fire extinguisher is used for extinguishing fires involving combustible metals
What type of fire extinguisher should you recommend your customer purchase to protect the server room?

Class B

Class A

Class C

Class D
Termination notices are confidential. You should finish your job without looking at them.

You should not wait for the Human Resources manager to leave the room and then thumb through the termination notices. You should always respect the confidentiality of the users you support.

You should not jokingly ask her if there is a termination notice for you in the stack. Terminations are serious business and should not be made the subject of a joke.

You should not remind her that the IT department needs to be told of terminations so that they can disable user accounts. The Human Resources manager knows the procedure for handling terminations. It is likely that she will be insulted if you remind her and embarrassed that you saw the stack of confidential papers
You are installing software for the Human Resources manager. While waiting for the software to install, you notice a stack of termination notices on her desk.

What should you do?

Jokingly ask her if there is a termination notice for you in the stack.

Wait for her to leave the room and then thumb through the termination notices.

Remind her that the IT department needs to be told of terminations so that they can disable user accounts.

Finish your job without looking at the termination notices
The most likely problem is that the device needs to be recalibrated. Temperature changes and humidity can cause the PDA screen to shrink or expand resulting in the need to recalibrate the device.

You should not replace the stylus. The stylus is a pointing device and is most likely not the cause of the problem.

You should not replace the screen before attempting recalibration. If recalibration does not work, you might need to replace the screen.

You should not replace the battery. If the battery is dead, the device will not power on. The problem the user is having is that the operating system is unable to calculate screen coordinates correctly. Therefore, the problem is either with the screen's sensitivity or with its calibration.

Objective:
List all questions for this objective
A user reports that she can turn on her PDA, but cannot select any information on the screen. She used the device outside on a hot, humid afternoon, but the problem occurred when she returned to her air-conditioned office.

What should you try first?

Replace the screen.

Replace the battery.

Recalibrate the device.

Replace the stylus.
Only specially trained personnel should open a Cathode Ray Tube (CRT) monitor. A CRT monitor carries a strong electrical current that is not discharged when the monitor is unplugged. Only technicians who have been specially trained to work on CRT monitors should open the casing of one.

Although installing a power supply requires knowledge of how to connect the power supply to the components, doing so does not carry the risk of electrical shock as long as the computer is unplugged. However, you should never open the casing of a power supply because some components inside retain current strong enough to cause injury or death.

A laptop battery can be safely replaced by a user. The battery is made to be easily removable without the risk of electrical shock.

Cleaning the paper dust from a laser printer can be performed by a technician without special training. The best way to remove paper dust is with a can of compressed air
Which action should not be performed except by specially trained personnel due to the risk of electrical shock?

Opening a CRT monitor

Installing a new power supply in a desktop computer

Replacing a laptop battery

Cleaning the paper dust from a laser printer
You should ask the customer to calm down, apologize that the problem is occurring again, and schedule another visit. By approaching the problem in this way, you can try to regain the customer's trust and avoid an argument.

You should not tell the customer that the problem was fixed when you left and that if you have to come back out, you will charge him again. Bringing up money at this point is a bad idea. The customer is already angry. Besides, you do not know why the problem is occurring again. Perhaps you overlooked something. The best thing to do is to regain the customer's trust. After the problem is fixed, if you discover that it was due to a customer's actions, you can address charging for the service call.

You should not tell the customer to call back when he is calm, and then hang up the phone. Doing so will only enrage the customer further.

You should not ask the customer what he did to cause the problem to occur again. You should not blame the customer for causing the problem. You do not know where blame lies until you have more information. Also, blaming a customer for a problem is likely to result in an argument, and you should never argue with a customer.
You resolve a problem for a customer. The customer calls you later to say that the problem is not fixed. The customer is upset and swearing at you.

What should you do?

Ask the customer what he did to cause the problem to occur again.

Ask the customer to calm down. Apologize that the problem is occurring again and schedule another visit.

Tell the customer to call back when he is calm, and then hang up the phone.

Tell the customer that the problem was fixed when you left and that if you have to come back out, you will charge him again.
A monitor generates a lot of heat. Therefore, you should ensure that there is enough ventilation around the monitor.

The high-pitched whine generally indicates that the monitor is dirty on its interior. You can clean the inside of a monitor by using a computer vacuum along its vents.

You should not clean a monitor by spraying any liquid on it. Doing so could cause the liquid to get inside the monitor and damage it.

You should not open a Cathode Ray Tube (CRT) monitor. Doing so can cause electrical shock or even death unless you are specially trained to work on CRT monitors.

Verifying that the monitor's power cable is secure will not resolve the problem. A loose power cable would prevent the monitor from functioning. It would not cause a high-pitched whine. The sporadic problems are caused by heat, so a loose cable is unlikely to be the cause of the problem.
A user reports that her CRT display experiences sporadic problems, especially on hot days. It also has a high-pitched whine. What should you do? (Select TWO.)

Ensure that there is sufficient airflow around the monitor.

Open the monitor's case and verify that the cooling fan is functioning.

Verify that the monitor's power cable is secure.

Instruct the user to clean the monitor by spraying window cleaner on it and using a soft cloth.

Instruct the user to use a computer vacuum to clean the dust from the monitor's vents
The CD command is used to change the directory that has focus when working at a command prompt. The CD\ command changes the current focus to the root directory.

The CD.. command is used to navigate up to the parent directory.

The C: command is used to change the input focus to the C: drive, not to move the focus to the root directory on the same drive.

Typing C:\ will cause an error
You are writing a batch file. The current focus is the C:\Windows\System directory. What command do you use to change the current focus to the root of the drive C:\?

C:

C:\

CD\

CD..
A brute force attack (also called a dictionary attack) is one in which an attacker uses software that tries password combinations until the correct password is found. You can enable logging of failed login attempts to provide yourself with a warning that an attacker is attempting a brute force attack. A large number of failed login attempts indicate that such an attack is underway.

Requiring strong passwords can help prevent a brute force attack from succeeding, but it does not inform you that one is being attempted.

Installing a firewall between the company network and the Internet can help limit access to the company network from the outside, but it cannot give warning of an attempted brute force attack.

Enabling Windows Firewall on each user's computer can help prevent certain types of packets from being accepted by a user's computer and can help prevent various types of attacks. However, it cannot provide you with warning of an attempted brute force attack
How can you configure a system to provide a warning of an attempted brute force attack?

Install a firewall between the company network and the Internet.

Require strong passwords.

Enable logging of failed login attempts.

Enable Windows Firewall on each user's computer.
Dual Inline Memory Modules (DIMMs) differ from the older Single Inline Memory Modules (SIMMs) in a variety of ways. DIMM connectors have different sized sections, separated by two notches on the bottom edge, so you can line them up correctly in the socket. Once you match the sections correctly, you push the DIMM straight down into the socket. When the DIMM is correctly seated, swivel locks on either end snap into place.

SIMMs have a cut-away portion on one edge so you can line them up properly. You insert them at an angle and then raise them into place.

Older 486 and Pentium I systems required SIMMs to be installed in pairs
Which statement about installing DIMMs is true?

You insert the DIMM at a 35-degree angle and raise it into place.

DIMMs have a cut-away portion on one end to help you line them up properly.

You push the DIMM straight down into the socket.

You must install DIMMs in matching pairs.
When you install Service Pack 2 on a computer running Windows XP, the Windows Security Center is installed. The Windows Security Center allows you to enable or disable Windows Firewall, Automatic Updates, and if an antivirus program is installed, virus protection.

When you install Service Pack 2, Windows Firewall is enabled by default. Windows Firewall is a packet filtering firewall that allows you to block certain types of network communication, such as unsolicited traffic on port 80.

Service Pack 2 does not install antivirus protection. However, a number of antivirus packages are available. You should choose one and install it on all computers.

Service Pack 2 does not install anti-spyware protection by default. However, a number of anti-spyware programs are available. You should choose one and install it on all computers that access the Internet.

Service Pack 2 does not enable Encrypting File System (EFS) by default. EFS is used to encrypt files stored on an NTFS partition. You can selectively enable EFS on specific folders and files
What security enhancements are provided by installing Service Pack 2 on a computer running Windows XP Professional? (Select TWO.)

EFS is enabled by default.

Antivirus protection is installed.

Anti-Spyware protection is installed.

Windows Security Center is installed.

Windows Firewall is enabled by default
The best performance when connecting a scanner to a computer is provided by IEEE 1394b (FireWire). FireWire 1394b provides transfer rates of more than 800 Mbps. FireWire 1394a provides transfer rates up to 400 Mbps.

USB 2.0 provides good transfer rates (up to 480 Mbps for high speed USB 2.0). However, it is not as fast as FireWire.

Scanners are typically not connected through a serial interface. A serial interface provides the slowest transfer rate.

Although you can connect a scanner using a parallel connector (IEEE 1284), doing so will result in a lower transfer rate than either USB 2.0 or IEEE 1394b.
Which port will give you the best performance when connecting a scanner to a computer?

USB 2.0

IEEE 1394b

IEEE 1284

Serial
If you add a second hard disk drive to an IDE cable and do not adjust the jumpers, the BIOS may be unable to detect either drive. If both drives are set as Master or both set as slave, neither will be detected. Since the original drive worked until you added the second drive, both being set as Master is the most likely cause of the problem. If you are using an 80-conductor cable for a UDMA/66 or faster interface, both drives can be set for Cable Select.

If the IDE cable were defective, the original drive would not have worked before the addition of the new drive unless you damaged the cable during the installation.

Not connecting the power cable to the new drive would not affect the old drive. Neither would adding a defective second drive.
You have just installed a second hard disk drive into a system by adding it as the second drive on the existing IDE cable. When you restart and enter the BIOS configuration program, it can detect neither drive, even though you can hear that both drives are spinning.

What is the most likely cause of the problem?

You need to set one drive as the slave and the other as the master.

The IDE cable is defective

The new drive is defective.

You did not connect the power cable to the new drive
The primary disadvantage to using a recycled toner cartridge is decreased print quality. This is due to the fact that the ink used in a recycled cartridge might not be able to support as high a print quality as a new cartridge because the particles might not be as small.

Using a recycled toner cartridge does not affect printing speed.

A recycled toner cartridge is typically less expensive than a new toner cartridge.

A laser printer does not have a print head. The ink is transferred to the paper using a differential in electrical charge between the photosensitive drum and the paper
What is the primary disadvantage of using a recycled toner cartridge?

Increased expense

Misaligned print head

Decreased print quality

Decreased printing speed
Damp paper can cause paper jams, fuzzy print, poor output quality, and multiple page feed. Paper jams can occur due to damp paper because the paper needs to slide smoothly through the paper handling elements. Damp pages may also stick together, allowing more than one sheet to go through the printer (multiple page feed). This will cause blank pages to appear between printed pages. Fuzzy and poor quality output will occur because the water in the paper will interfere with the transfer of the toner.

A dirty developer unit or a partially empty toner cartridge can cause white lines.

Loose toner on the printed page is the result of the fuser not heating to the proper temperature.

When the photoreceptor drum wears, it holds less of a charge and attracts less toner, which in turn causes lighter (gray) print.
What symptoms could result from using damp paper in a laser printer? (Select FOUR.)

Gray print

Poor quality output

Unfused toner on the printed page

Fuzzy print

Paper jams

Multiple page feed

White streaks through the text
You should plug in the cable and then test to verify that the user can connect to the network. There is no need to say anything about the cable being unplugged to the user. Also, you should always test to ensure that the steps you take solve the problem.

You should not hold up the cable and say, "I told you to check the network cable." You should always treat users with politeness and not cast blame.

You should not hold up the cable and say, "Do you think this might be the problem?" You should always treat users with respect. You should not make sarcastic remarks about a user's problem or its solution.

You should not plug in the cable and ask the user to sign the technical support ticket. You should never assume that the problem is solved without testing to ensure that it is.
user reports that she cannot connect to the network. You ask her to verify that the network cable is plugged into the back of her computer. She says it is, but when you arrive at her cubicle, you find that the network cable is unplugged.

What should you do?

Hold up the cable and say, "I told you to check the network cable."

Hold up the cable and say, "Do you think this might be the problem?"

Plug in the cable and ask the user to sign the technical support ticket.

Plug in the cable and test to verify that the user can connect to the network
FTP can be initiated from a DOS, Windows 9x, or Windows NT/2000/XP command prompt provided that a connection to a network or the Internet is established first. To begin an FTP session, you first type FTP from the command line to get an FTP> prompt. To establish a connection with an FTP server at 135.61.85.1, from the FTP> prompt, type the following:

OPEN 135.61.85.1

The LOGIN command is the response the server will send when you try to connect to it. At the LOGIN: prompt, you would enter your user name or ID.

The GET command is used after you have logged on and want to copy a file from the remote computer to your computer.

After you are at the FTP> prompt, you would not use the FTP command again
You need to start an FTP session with an FTP server beginning at the command line.

You enter the FTP command at the command prompt and see the following prompt:

FTP>

Which command can you use to establish a connection to a server at IP address 135.61.85.1?

FTP 135.61.85.1

OPEN 135.61.85.1

LOGIN: 135.61.85.1

GET 135.61.85.1
You should repair the computer and then suggest to your manager that it might be time to provide a security refresher course for employees. If the payroll administrator is working without a password, it is likely that other users might be doing the same. There is no need to tell your manager who has been working without a password, only that you suspect that some employees might not be using secure password practices.

You should not open the payroll application and look up the salaries you are curious about. Payroll data is confidential and you should respect data confidentiality, even if the data is available to you.

You should not log on as the payroll administrator and set a password. You should ensure that the payroll administrator and all other employees understand safe computing practices. However, if you set the password, you will know the payroll administrator's password. A password should only be known by its owner.

You should not tell your manager that the payroll administrator has been logging on without a password. There is no need to make the payroll administrator look bad. If one employee has been working without a password, it is likely others have as well.
You receive the payroll administrator's computer for service. You notice that the payroll administrator's user account is not password protected.

What should you do?

Repair the computer. Log on as the payroll administrator and set a password. When you return the computer, tell the payroll administrator the password.

Repair the computer. Tell your manager that the payroll administrator has been logging on without a password.

Repair the computer. Suggest to your manager that it might be time to provide a security refresher course for employees.

Repair the computer. Log on as the payroll administrator. Open the payroll application and look up the salaries you are curious about.
An 802.11b network is a wireless network that transmits data over radio waves. Therefore, it is subject to radio frequency (RF) interference from sources such as 2.4 GHz cordless phones, Bluetooth devices, and microwave ovens.

Radio waves do not depend on line of sight. Therefore, walls that block the line of sight will not be a problem. However, some walls might contain material that prevents radio transmission.

Bright lights do not interfere with radio waves.

Humidity does not interfere with radio waves
Which of the following environmental conditions can disrupt network transmission on an 802.11b network?

Humidity

RF interference

Bright lights

Walls that block line of sight
The best way to manage permissions is by creating groups, granting permissions to those groups, and then adding user accounts to the groups as required. In this case, the members of the Marketing department who are not managers require a different set of permissions than those who are managers. Therefore, you should create two groups: Marketing and MktgManagers. You can then grant the Marketing group Modify permission to the Brochures folder, which will allow users to add, read, and modify files in the folder. You can grant the MktgManagers group Full Control, which allows the MktgManagers to be able to delete files and subfolders and to change permissions on the folder. If you do not want MktgManagers to be able to change permissions, you could assign them the Delete Subfolders and Files permission discretely. Because managers belong to both groups, they would have the accumulated permissions: Modify and Delete Subfolders and Files. Finally, because the default permissions grant the Everyone group the Full Control permission, you will need to remove the Everyone group from the permissions list.

You should avoid assigning permissions to individual user accounts. Doing so will make the permissions list more difficult to maintain. Consider the situation where a file server has several shares used by members of the Marketing department. If you use groups to assign permissions, when a new user joins the Marketing department, you only need to add that user to the Marketing group instead of assigning permissions to individual folders.

You should not deny the Everyone group Full Control to the Brochures folder. All users who have been authenticated belong to the Everyone group. Because Deny takes precedence over Allow, by denying the Everyone group Full Control, you prevent all users from accessing the folder.

You should not add the users in the Marketing department to the Power Users group. Doing so will not grant them any permissions on the folder. You should not add the managers to the Administrators group. Doing so will give them unnecessary permissions on the file server. You should never grant more permissions than necessary.
You are configuring permissions for a file server. The file server is a member of an Active Directory domain. It is running Windows Server 2003.

You need to ensure that all users in the Marketing department can add files to and modify files in the shared Brochures folder. Only Managers in the Marketing department should be able to delete files from the Brochures folder. Managers should also be able to change permissions on the folder if necessary. Only members of the Marketing department should have permission to access files in the Brochures folder.

How should you configure file system permissions?

Grant the user account for each member of the Marketing department the Modify permission.
Grant the user account for each member of the Marketing department who is a manager the Delete permission.

Create a group named Marketing and add all user accounts in the marketing department to that group. Grant the group Modify permission to the Brochures folder.
Create a group named MktgManagers and add all managers in the marketing department to that group. Grant the group Full Control permission to the Brochures folder.
Deny Everyone the group Full Control permission to the Brochures folder.

Add the users in the marketing department to the Power Users group.
Add the managers in the marketing department to the Administrators group.
Remove the Everyone group from the permissions list.

Create a group named Marketing and add all user accounts in the marketing department to that group. Grant the group Modify permission to the Brochures folder.
Create a group named MktgManagers and add all managers in the marketing department to that group. Grant the group Full Control permission to the Brochures folder.
Remove the Everyone group from the permissions list
Some laptops that have built-in wireless antennas include a button that turns wireless support off and on. You should first verify that the user has not accidentally pressed that button. Sometimes you need to enable the wireless connection through software, such as through the Network Control Panel utility or Device Manager.

The user's TCP/IP settings are not the cause of the problem. The computer cannot locate any wireless networks. This is a physical issue, not an IP addressing issue.

You do not need to disable the Ethernet adapter. A laptop can support both an Ethernet adapter and a wireless antenna at the same time.

You do not need to verify that there is line of sight between the laptop and the wireless access point. The 802.11b and 802.11g protocols are radio-frequency protocols and do not depend on line of sight
A user's laptop has a built-in wireless antenna. The user cannot connect to the wireless access point. When the user attempts to view wireless networks, none are listed. Other computers can connect to the wireless access point.

What should you try?

Verify that the user's TCP/IP settings are configured for automatic addressing.

Verify that there is line of sight between the laptop and the wireless access point.

Disable the Ethernet adapter.

Verify that the wireless antenna is turned on.
You should enable Wired Equivalent Privacy (WEP). Doing so will cause the traffic sent over the wireless network to be encrypted using 40-bit encryption by default. Some access points and wireless network adapters also support 128-bit encryption, so you should use it if it is available. It is also more secure to use dynamic WEP keys if they are supported.

You should also disable broadcast Service Set Identifier (SSID). The SSID is used to publish the availability of the wireless network, sort of like a network name. If you disable broadcast SSID, only clients that are configured with the SSID will be able to find wireless network and connect. This will help prevent non-employees from connecting to the network.

Enabling Encrypting File System (EFS) will not cause data to be encrypted on the network. EFS is used to encrypt files where they are stored, not to encrypt network traffic.

Disabling Media Access Control (MAC) filtering will not resolve the problem. You might or might not want to use MAC filtering. MAC filtering can be used to increase the security of the network by only allowing certain network adapters to connect. However, it is more difficult to manage. Wireless Access Points (WAPs) have MAC filtering disabled by default.

You should not use ad hoc mode. Ad hoc mode is used for peer-to-peer wireless networking. When a WAP connects to a wired network, you need to configure the wireless clients for infrastructure mode. By configuring them for infrastructure mode only, you can prevent them from connecting to ad hoc wireless networks.
Your company has a wireless network that connects to a wired network. Your boss is concerned about data being intercepted as it is sent over the wireless network. He wants to ensure that only employees can use the wireless network.

What steps should you take? (Select TWO.)

Enable EFS.

Disable MAC address filtering.

Enable WEP.

Disable broadcast SSID.

Use ad hoc mode.
You should explain the dangers of spyware to the customer. It is important that a customer understand safe computing practices to keep from being victimized by spyware and other malicious programs.

You should also install an anti-spyware program on the user's computer to prevent spyware from being downloaded. In addition, you should scan the computer for spyware, while having the user watch to train the user how to remove spyware and how to use the program to prevent spyware from being downloaded.

You should not ask the customer what Web sites he has visited. The Web sites a customer visits is none of your business.

You should not reformat the hard drive and reinstall Windows. An anti-spyware program should be sufficient to clean the system. If problems still persist and you do need to reinstall Windows, make sure you back up all data and user settings first.

Deleting temporary Internet files will not resolve the problem. Spyware must be cleaned off a computer using an anti-spyware application.
You arrive at a customer's site to troubleshoot a performance problem. When you investigate, you find that the computer is loaded with spyware.

What should you do? (Select TWO.)

Delete the customer's temporary Internet files.

Reformat the hard disk and reinstall Windows.

Install an anti-spyware program on the computer.

Ask the customer what Web sites he has visited to pick up all that spyware.

Explain the dangers of spyware to the customer
You should step back so you cannot overhear the call and wait for the user to finish the phone call before going in. Phone conversations are private exchanges and you should respect the user's privacy.

You should not go in and begin working on the problem. Doing so will disrupt the user. Also, a phone conversation is private, so you should stay out of the room until it is finished.

You should not attempt to overhear the conversation. You should respect the privacy of the user.

You should not take care of another user and go back later in the day. Most phone conversations are short, so you can wait outside of hearing distance.
You visit a senior manager's office to solve a problem. When you get there, the user is on the phone. You overhear a coworker's name. The door is open.

What should you do?

Take care of another user and go back later in the day.

Step back so you cannot overhear the call and wait for the user to finish the phone call before going in.

Go in and begin working on the problem.

Stand just outside the door to see if you can overhear what the call is about
When a laptop is configured to use shared video memory, a portion of main memory is used by the video adapter. If graphic-intensive applications are used, you should subtract the amount of shared video memory from the amount of main memory to determine how much Random Access Memory (RAM) is available for applications and the operating system to use. In this case, that is 1024-64 = 960 MB.

You will not have 1024 MB of RAM available because 64 MB of memory will be used by the video adapter. You would have 1024 MB of RAM available if the laptop had dedicated video memory.

You do not need to subtract the video memory from each memory chip. You add the total amount of RAM and subtract the amount of shared video memory to obtain the total available memory.

You do not add the amount of shared memory to the total available.
You add 512 MB of RAM to a laptop computer that already has 512 MB of RAM. The laptop computer is configured for 64 MB of shared video memory. The user runs graphic intensive applications.

How much memory is available for the operating system and applications?

1024 MB

896 MB

960 MB

1088 MB
The best protection is provided by a continuous Uninterruptible Power Supply (UPS). A continuous UPS uses provides conditioned power from the battery, which is in turn charged by the power source. If there is a blackout or a brownout, the devices attached to the UPS will continue to function until the battery charge is used up.

A standby power supply provides protection against blackouts and brownouts. However, there is some switching time involved, so it is not as reliable for sensitive devices that might experience a sag during the switch over.

A surge protector does not provide protection against blackouts or brownouts.

A power strip is used to connect multiple devices to the same power source. A standard power strip does not provide protection against power problems, such as surges, spikes, brownouts, or blackouts
A server performs mission-critical processing. You need to ensure that it is protected against power spikes, surges, and brownouts.

What should you use?

Continuous UPS

Power strip

Standby power supply

Surge protector
Simple Mail Transfer Protocol (SMTP) and Post Office Protocol (POP) are both part of the TCP/IP suite of protocols and are used for e-mail. SMTP, which uses Port 25, is typically used for e-mail transfers between mail servers. You use it to send mail. POP, which uses Port 110, is used for transferring e-mail from a mail server to an e-mail client. You use it to receive mail.

The FTP (File Transfer Protocol) utility program allows the bi-directional transfer of files between two networked hosts. Both hosts must be using TCP/IP, and the source host (the file server) must be running the FTP server daemon application.

Point-to-Point Protocol (PPP) is a communication protocol used in dial-up connections.

SNMP (Simple Network Management Protocol) is used for collecting information about devices on a network
Which two protocols are used for sending and receiving e-mail? (Select TWO.)

POP

FTP

SMTP

SNMP

PPP
When running a dual-drive configuration, you must designate one hard drive as master, and the other as slave. There are two ways to do this: set the jumper to Slave, or connect the hard drive using the Slave connector portion of a Cable Select cable.

Cable Select is a newer way to designate a hard drive as master or slave. A special IDE cable is used to connect the hard drives to the motherboard. There are two connectors on the cable: one for Master, and another for Slave. The Slave connection will not transmit data through pin 28, so only the master hard drive receives the signals sent across pin 28.

There is no Slave port on a motherboard.

The BIOS Setup will determine which one is the master by how the jumpers or Cable Select is set. You cannot designate a hard drive as master or slave through the BIOS Setup.
How can you designate an EIDE hard drive as a slave? (Select TWO.)

Connect the hard drive to the motherboard using the Slave connector portion of a Cable Select cable.

Connect the hard drive to the Slave port on the motherboard.

Designate it as Slave in the BIOS Setup.

Set the jumper to Slave.
An inkjet printer exhibits print quality problems when the nozzles are dirty, when the print heads are dirty, or when the print heads are misaligned. These problems can be corrected in most inkjet printers by running the maintenance software provided by the manufacturer. The most likely problem when one color does not print is that the nozzle for that color has become clogged.

You should usually not use a vacuum on an inkjet printer.

You should not clean the nozzles using denatured alcohol. The maintenance software is the best way to clean the nozzles. Also, because inkjet printers use water-based ink, you should use water instead of denatured alcohol when you do need to manually clean ink off a component.

You should not replace the printer driver. It is unlikely that the printer driver is causing blue ink not to print. The printer driver is responsible for translating application and operating system commands to a language the printer can understand
The Sales department uses a shared inkjet printer. Several users report that the color of print jobs is wrong. When you run a diagnostic print, you discover that blue areas are not printing. You replace the ink jet cartridge, but the problem still occurs.

What should you do?

Use the maintenance software provided by the manufacturer.

Use a low static vacuum to clean the printer.

Clean the nozzles using denatured alcohol.

Replace the printer driver
Recovery Console provides you with limited access to command-line utilities that can allow you to recover from system failures that prevent you from starting Windows, such as boot sector corruption, a service that is preventing startup, corrupt or missing operating system files, and hard disk problems. However, you are limited to accessing files at the root of the system partition, the %systemroot% folder, the cmdcons folder, and removable media drives.

You cannot access any location on drive C from Recovery Console except the locations noted above.

You cannot access any internal hard drive except the locations noted above.

You cannot access a network file share
What storage locations can you access from Recovery Console in Windows XP? (Select TWO.)

Any location on drive C

Any internal hard drive

A CD-ROM drive

A network file share

The %systemroot% folder
You should click the Safely Remove Hardware icon in the system tray and then click the option to safely remove that drive. Doing so shuts down the services the PC Card device is using so that you can safely remove the card.

You do not need to shut down the operating system. A PC Card hard drive is hot swappable.

You do not need to power off the computer. A PC Card hard drive is hot swappable.

You should not right-click the drive's icon and choose Eject. The Eject menu item is used to eject a CD or DVD from a removable media drive.
What step or steps should you take before you eject a PC Card hard drive from a laptop computer?

Shut down the operating system and power off the computer.

Right-click the drive's icon and choose Eject.

Click the Safely Remove Hardware icon in the system tray.

Shut down the operating system.
The best way to remove paper dust from a laser printer is to blow it out using a can of compressed air. Try not to blow the dust farther into the printer. You could optionally use a low static vacuum or a small brush if one was supplied by the manufacturer.

You can use denatured alcohol and a cotton swab to clean many parts of a laser printer, including the transfer wire and the rubber rollers. However, paper dust is dry, so the best thing to do is to use compressed air to blow out the printer first. Next, you can remove things that are stuck onto components using the denatured alcohol.

A maintenance kit is a set of software programs for analyzing and correcting problems. It cannot be used to remove dust.

Replacing the toner cartridge will not help remove paper dust from within the printer.
What is the best way to clean paper dust from a laser printer?

Use compressed air.

Replace the toner cartridge.

Use denatured alcohol and a cotton swab.

Use the maintenance kit that comes with the printer.
You should sit next to the user and explain the printer settings that caused the confusion using non-technical terms. By doing so, you will educate the user and help prevent problems in the future.

You should not use technical jargon when explaining a problem to a user. The user will most likely not understand what you are saying and will think you are speaking down to him.

You should not just change the settings and tell the user the problem is fixed. The user needs to be educated so that the same problem will not occur again and again.

You should not tell the user that the problem was caused by his stupidity. You should always treat users and customers with respect.
A user named Joe has a problem printing a document. You discover that the problem is caused by Joe choosing the wrong printer settings.

What should you do next?

Change the settings and tell the user the problem is fixed.

Tell the user that the problem was caused by his stupidity and print the document.

Sit next to the user and explain the printer settings using non-technical terms.

Explain to the user what the problem was using technical jargon
After upgrading the BIOS on a motherboard, the new BIOS will likely take up more bytes of ROM than the replaced BIOS. The difference in the BIOS image file byte count is detected by the system as a checksum error. CMOS checksum errors require that you enter Setup, check and save your settings, and exit Setup a second time.

You should not reboot and flash the BIOS again because reflashing the BIOS would most likely result in the same error.

You should not replace the BIOS chip with a new one. A checksum error does not indicate a failure of the BIOS hardware.

You should not press the ENTER key and turn off the computer to avoid losing data. A checksum error will not cause any loss of data.
After upgrading your system BIOS with an update from the manufacturer, you receive a CMOS Checksum error after rebooting.

What should you do to clear the error?

Replace the BIOS chip with a new one from the manufacturer.

Press the ENTER key and turn off the computer before all data is lost.

Reboot the PC and try to flash the BIOS again.

Reboot the PC, enter CMOS setup, and check and save CMOS settings
The laser printer's primary corona wire (also called the charging roller) applies a strong negative charge to the photosensitive drum. This is the first step in preparing a page to be printed.

The fusing assembly uses heat and pressure to make the image on the paper permanent. This is the last step in the process.

The transfer roller (also called the transfer corona) applies a positive charge to the paper so that the negatively charged toner particles will be attracted to the positively charged areas on the paper. Because the laser reduced the negative charge in the areas to be printed, only those areas will have a positive charge after the transfer roller completes its task. Therefore, only those areas attract the toner.

A piezoelectric nozzle is used in an ink jet printer, not in a laser jet printer
Which laser printer component applies a strong uniform negative charge to the drum?

Piezoelectric nozzle

Fusing assembly

Transfer roller

Primary corona wire
To add a command prompt icon to your Windows desktop for easy access, locate the program file CMD.EXE (for Windows NT/2000/XP), right-drag it to the desktop, and choose Create Shortcuts Here.

CMD.EXE is the 32-bit version of the 16-bit COMMAND.COM, which was used in Windows 95/98.

COMMAND.COM is the DOS command interpreter.

WIN.COM is used to launch the Windows graphical user interface
You have been asked to add an icon on your friend's desktop that provides easy access to the command prompt.

What file in his Windows XP computer should be used in the command line of the icon to open a command prompt window?

COMMAND.EXE

CMD.EXE

WIN.COM

COMMAND.COM
The IEEE 1284 standard defines guidelines for implementing bidirectional communication across a parallel port. Bidirectional communication is a technology used by printers to allow a printer to send data to the operating system, such as a notification that the paper tray needs to be refilled. IEEE 1284 supports higher transfer rates than a traditional parallel cable, but not as fast as Universal Serial Bus (USB).

IEEE 1394 (FireWire) is a high-speed connection standard for devices like digital cameras and video cameras. It is not a standard for defining a parallel printer port.

IEEE 802.1x is a security standard for wireless networks. It is not a standard for defining a parallel printer port.

IEEE 802.11b is a wireless networking standard. It is not a standard for defining a parallel printer port
Which standard defines how a printer manufacturer should implement a bidirectional parallel port?

IEEE 802.1x

IEEE 1284

IEEE 802.11b

IEEE 1394
You should repeat the problem as you understood it and ask the customer to confirm what you know or provide more clarity. You should begin to build confidence as soon as you arrive at a customer site. If the customer is confident that you understand the problem, he will be more likely to be confident that you have resolved it after you have finished.

You should not immediately begin working on fixing the problem. There might be additional information you can gather from the customer. Also, you should take the opportunity to build confidence even if you are sure you understand the problem and how to fix it.

You should not ask the customer what he did to cause the problem. You should always be polite to a customer and never blame a customer for a problem.

You should not tell the customer that if you determine that the problem is his fault, you will have to bill extra for the call. Doing so will immediately put the customer on the defensive. It will be more difficult to gather information from a customer who is on the defensive, and the customer's satisfaction level will suffer because of being put on the defensive.
You arrive at a customer's site to handle a problem call. The customer had given you a brief description of the problem over the phone, and you are pretty sure that the customer caused the error.

What is the first thing you should do?

Repeat the problem as you understood it and ask the customer to confirm what you know or provide more clarity.

Ask the customer what he did to cause the problem to happen.

Tell the customer that if you determine that the problem is his fault, you will have to bill extra for the call.

Begin working on fixing the problem
You should recommend that the customer encase the cables in a cord protector. A cord protector encases the cables in a protective strip designed to prevent people from tripping over the cable.

You should not recommend that the customer tape the cables to the floor using duct tape. Despite the fact that duct tape can be used for many things, it will not prevent people from tripping over and damaging the cables. As duct tape is stepped on, it might come up from the carpet, creating another tripping hazard.

You should not recommend that the customer run the cables across the tops of the cubicles over the top of the walkway. Cubicles are typically not very tall. A tall person could walk into the cable and damage it or be injured.

You should not recommend that the customer replace the cable with fiber optic cable. A fiber optic cable is made of glass and is more fragile than twisted pair cable. Also, fiber optic cable would not present less of a tripping danger than twisted pair cable.
You visit a customer's site and see shielded twisted pair network cables lying on the floor across the walkways between cubicles.

What should you do?

Recommend that the customer encase the cables in a cord protector.

Recommend that the customer run the cables across the tops of the cubicles over the top of the walkway.

Recommend that the customer replace the cable with fiber optic cable.

Recommend that the customer tape the cables to the floor using duct tape.
Errors, warnings, and informational messages generated by the operating system components are viewed through the Event Viewer System log.

You would not use the System Monitor to view operating system error messages. System Monitor is used to monitor real-time performance of system components, operating system processes, and applications.

You would not use System Information. The System Information utility provides a lot of information about installed hardware and software. But it does not list error messages generated by operating system components.

You would not use the Event Viewer Application log to look for errors logged by operating system components. Applications log errors, warnings, and informational messages appear in the Application log
Which utility would you use to view errors reported by operating system components?

System Monitor

Event Viewer Application log

Event Viewer System log

System Information
Disk quotas allow you to restrict the amount of hard disk space used by each user. You enable disk quotas through the Properties box dialog of the hard disk.

You do not configure disk quotas through user profiles.

You do not configure disk quotas on the My Documents folder.

You do not configure disk quotas on the Documents and Settings folder.
You are configuring a computer running Windows XP Professional. It will be used to support three users on three different shifts. How can you limit the amount of disk space each user can use?

Define disk quotas in the default user profile.

Define disk quotas on the Documents and Settings folder.

Enable disk quotas in the hard disk properties.

Define disk quotas on the My Documents folder for each user.
An optical mouse has no moving parts and is virtually immune to sticking and skidding. It would be the best choice for a dusty and dirty environment.

A bus mouse can be used to avoid interrupt request (IRQ) conflicts, but this problem is not indicative of that.

Sue's problem is that the computer is in a factory environment and the dust and dirt are constantly causing the mouse roller mechanism to stick. A track ball would have the same sensitivity to dirt, so it would not be a good choice.

If the mouse driver was the problem, the behavior would be more consistent.
Sue works in a dusty and dirty area of a factory and complains that her PS/2 mouse does not move smoothly and the pointer on the screen seems to jump uncontrollably at times. She has replaced it three times in the past year.

What should you suggest that she do?

Upgrade the mouse driver.

Switch to a track ball.

Switch to an optical mouse.

Switch to a bus mouse
You should select Show hidden files and folders in Folder Options. By default, the Application Data folder is hidden, as are the Local Settings, PrintHood, NetHood, SendTo, and Templates folders.

You should not use Folder Options to remove the check from the Hide protected operating system files option. The Application Data folder is not an operating system file. You would remove the check from the Hide protected operating system files option if you needed to modify an operating system file, such as boot.ini, or view system files.

You should not install the template in C:\Documents and Settings\All Users\Application Data. The Application Data folder in All Users will not be visible if the Show hidden files and folders option is not selected.

You should not install the template in C:\Documents and Settings\Default User\Application Data. The Default User profile is used only when a user logs on for the first time. It is used as a basis for the user's custom profile. Also, the Application Data folder in Default User will not be visible if the Show hidden files and folders option is not selected.
You need to install a Microsoft Word template for Sally. However, when you open C:\Documents and Settings\Sally, the Application Data folder is not there.

What should you do?

In Folder Options, select Show hidden files and folders.

Install the template in C:\Documents and Settings\Default User\Application Data.

In Folder Options, remove the check from the Hide protected operating system files option.

Install the template in C:\Documents and Settings\All Users\Application Data.
The major cause of a printer pulling multiple pages through at a time is either high or low humidity. When the air is humid (over 50% humidity), pages stick together because they are moist. When the air is too dry (under 25% humidity), pages generate static electricity, which causes them to cling together. Another potential reason multiple sheets of paper will be pulled through is that the separation tray is worn.

The rollers are configured to grab a single sheet of paper, regardless of its weight. Therefore, paper that is too light-weight is not the most likely cause of the problem.

A damaged sensor is not the most likely cause of multiple pages being picked up. A damaged sensor is more likely cause the paper not to move through correctly.

A dirty paper roller will cause marks on the page. It will not cause multiple pages to be picked up.
A laser printer experiences frequent paper jams. You determine that it is trying to pull multiple pieces of paper through at a time.

What is the most likely problem?

The paper sensor is damaged.

Paper is too light-weight.

The paper roller is dirty.

There is too much humidity
Fiber optic networks are least prone to eavesdropping because the signal is carried though light pulses instead of by electromagnetic signal. This makes it extremely difficult to tap the wire.

802.11g wireless networks are extremely subject to eavesdropping if encryption is not used.

Coaxial is a copper wire cable. Transmission is through electromagnetic signals, so it is relatively easy to tap the wire and eavesdrop.

Shielded twisted pair is a copper wire cable. Transmission is through electromagnetic signals, so it is relatively easy to tap the wire and eavesdrop
Which type of network media is least subject to eavesdropping?

Fiber optic

802.11g

Coaxial

Shielded twisted pair
When the amount of ink used to print a character is uneven, the problem is most likely caused by a misaligned print head. If the print head is not aligned, it will not apply uniform pressure to the ribbon when printing the character. Therefore, one part of the character will be dark and the other part will be light. Another possible cause problem that could result in this symptom is the ribbon being out of alignment.

The problem is probably not caused by a misaligned platen. If the platen is not aligned, the pressure applied to the ribbon will be uneven across the length of a line of text. The symptom for a misaligned platen is dark text on one side of the line, fading to light text on the other.

The problem is probably not caused by a worn ribbon. When the ribbon needs to be replaced, the text will become lighter evenly. It will not be dark on one part of a character and light on another.

The problem is not caused by a corrupt or incorrect printer driver. The printer driver is responsible for translating application and operating system commands to a language the printer can understand. Vertical white lines are caused by an ink distribution problem, not a translation problem
You are diagnosing a problem with a dot matrix printer. Each character printed is dark at the top and light at the bottom.

What should you try first to resolve the problem?

Align the print head.

Reinstall the printer driver.

Align the platen.

Replace the ribbon.
Device Manager enables you to perform tasks such as identifying installed ports, updating device drivers, and changing I/O settings.

If Device Manager displays a red "X" over the icon for a device, then the device has been disabled.

If Device Manager displays an exclamation point inside of a yellow circle over the icon for the device, then there is a problem with the device or driver, usually because of a resource conflict.

Other Device Manager symbols include a blue I on a white background, which indicates that automatic settings were not used and resources have been manually assigned. It does not indicate a problem
What can you NOT adjust from the CMOS setup utility?

The system date

The floppy drive size and capacity

The video resolution

The boot sequence
Last Known Good Configuration is the best choice for this situation. Windows NT, 2000, and XP all keep a copy of the Last Known Good Configuration in the registry. If something is configured incorrectly, you can restore the settings used for the last successful boot. Any settings changes made since the last successful boot will be lost.

Safe Mode boots the operating system with a minimum configuration, and can be used to solve problems with a new hardware installation or problems caused by user settings. Safe Mode boots with the mouse, basic video, keyboard, and mass storage drivers loaded. It uses the default system services (not any extra services) and does not provide network access. It does provide a graphical interface.

Safe Mode with Command Prompt is the same as Safe Mode but does not load the graphical interface.

Enable VGA Mode is used when the video setting is such that you cannot see the screen well enough to fix a bad setting. This can happen if a user creates a desktop with black fonts on a black background, or something similar to that. Booting in this mode gives you very plain VGA video display but allows you to change the settings in the Display properties
After installing a new device driver for your video card in your Windows XP system, you find that the computer stalls during bootup.

Which boot option would be the best way to correct the problem?

Enable VGA Mode

Last Known Good Configuration

Safe Mode with Command Prompt

Safe Mode
The user should purchase a 12-volt power adapter. A 12-volt power adapter can allow you to plug your laptop computer into an auxiliary power socket or the cigarette lighter in an automobile or into a power socket on an airplane. These adapters are often referred to as inverters.

A larger transformer will not solve the problem. The transformer (also known as the power brick) is located on the power cord. A larger transformer will not allow the battery to retain a charge longer. Also, a laptop must have a transformer with the correct power settings.

You should not purchase a Y-adapter. A Y-adapter is used to connect a keyboard and mouse to the same PS/2 port. It is not related to power.

You cannot purchase a PCMCIA card. A laptop does not receive power from the PCMCIA slot. Instead, a PCMCIA slot is used for peripherals, such as external drives, network adapters, or other peripherals.

Objective:
List all questions for this objective
A user plans to use her laptop computer while she is traveling. She will be driving across the country and will not have access to a standard electrical outlet.

What should she do?

Purchase a larger transformer.

Purchase a PCMCIA card.

Purchase a Y-adapter.

Purchase a 12-volt power adapter.
The user should purchase a 12-volt power adapter. A 12-volt power adapter can allow you to plug your laptop computer into an auxiliary power socket or the cigarette lighter in an automobile or into a power socket on an airplane. These adapters are often referred to as inverters.

A larger transformer will not solve the problem. The transformer (also known as the power brick) is located on the power cord. A larger transformer will not allow the battery to retain a charge longer. Also, a laptop must have a transformer with the correct power settings.

You should not purchase a Y-adapter. A Y-adapter is used to connect a keyboard and mouse to the same PS/2 port. It is not related to power.

You cannot purchase a PCMCIA card. A laptop does not receive power from the PCMCIA slot. Instead, a PCMCIA slot is used for peripherals, such as external drives, network adapters, or other peripherals
A user plans to use her laptop computer while she is traveling. She will be driving across the country and will not have access to a standard electrical outlet.

What should she do?

Purchase a larger transformer.

Purchase a PCMCIA card.

Purchase a Y-adapter.

Purchase a 12-volt power adapter.
You should use Chkdsk to check the integrity of a hard disk on a computer running Windows XP and optionally attempt to correct errors. You can launch Chkdsk from the command line or by clicking Check Now on the Tools tab of a hard disk's properties.

You cannot use ScanDisk to verify that the hard disk does not have any bad sectors on a computer running Windows XP. Scandisk was used on Windows 9x systems to verify hard disk integrity.

Defrag is used to defragment a hard disk to ensure that a file uses contiguous disk space. A defragmented hard disk performs better than a fragmented hard disk.

You cannot use Fdisk to check disk integrity. Fdisk was used in earlier versions of the Windows operating system and in MS-DOS to create partitions.
What tool should you use to verify that the hard disk on a Windows XP computer does not have any bad sectors?

Chkdsk

ScanDisk

Defrag

Fdisk
You should move the computer to a dry location and replace the hard disk. Water around computers is a potentially dangerous situation. You should never work on an electrical component when there is water on the floor. However, you should also inform the customer about the potential danger of having the computer near a leaking roof.

You should not simply refuse to work on the computer. You should move the computer to a dry location and fix it. You should also inform the customer about the leaking roof and suggest that he fix it before returning the computer to its original location.

You should not repair the computer and then tell your manager about the situation. By doing so, you put yourself in a potentially dangerous situation because you will be working on a computer in a wet area.

Putting on an Electrostatic Discharge (ESD) strap before working on the computer will not help protect you or the equipment. An ESD strap protects against static electricity, not electrical shock due to water on the floor.
You visit a customer's site to replace a hard disk in a computer and discover that the roof is leaking and the floor near the computer is wet.

Which of the following should you do?

Repair the computer, but tell your manager that the customer has a roof leak near the computer.

Tell the customer that you cannot work on the computer until the water is cleaned up and explain why it is dangerous to have a roof leak near a computer.

Put on an ESD strap before working on the computer.

Move the computer to a dry location and replace the hard disk.
You should use compressed air to clean the dust from inside the computer, and verify that everything is working properly. The customer has expressed dissatisfaction that the computer keeps breaking. You should explain that the problem is occurring because of the dust in the environment and explain how to reduce the impact of the dust on the computer system.

You should not just explain how dust can affect computer components in simple language and then show the customer how to use compressed air to clean the dust from the inside of the computer. You should clean the computer for the customer. Then, you can educate the customer about the environment and show them ways to reduce the impact of dust on the computer system. If the customer is comfortable cleaning inside the computer, they can do so in the future. At least they will understand that it is the environment, and not a defective computer, that is causing the computer problems.

You should not tell the customer that the problem is due to the fact the office is a mess. This is not really true and is also impolite. You do not know the full circumstances of the situation. It is possible that the customer has no control over the fact that there is a lot of dust in the environment. Also, the problem is not really that the office is a mess, but that dust has gotten inside the computer.

You should not run your finger through the dust and hold it up for the customer to see and tell the customer that dust is bad for computers. You should be polite to the customer. It is likely the customer knows the area is dusty. Demonstrating that fact is not necessary. Also, instead of just telling the customer that dust is bad for computers, you should clean the computer and explain how to reduce the impact of dust in the future.
You arrive at a customer's site to resolve a problem. There is dust everywhere. When you open the computer case, it is also very dusty. The customer is complaining about the fact that the computer keeps breaking down and it is not even a year old.

What should you do?

Tell the customer that the problem is due to the fact the office is a mess.

Use compressed air to clean the dust from inside the computer, and verify that everything is working properly.

Run your finger through the dust and hold it up for the customer to see. Tell the customer that dust is bad for computers.

Patiently explain how dust can affect computer components in simple language. Show the customer how to use compressed air to clean the dust from the inside of the computer.
The ATAPI-5 (AT Attachment with Packet Interface-5) standard approved in 2000 built on the ATAPI-4 standard and requires an 80-conductor cable for UDMA modes faster than UDMA/33 to be enabled. The 40- or 80-conductor cables are automatically detected.

ATA-100 should be displayed as UDMA/100.

If the ribbon cable was not 40-pin or not installed correctly, the hard drive would not have been detected at all.
After installing a new ATA-100, 80GB hard drive, you boot up the system and watch as the Power On Self Test (POST) displays information about the system on your monitor.

You notice the 80GB hard drive is correctly identified as 80GB, but it is listed as using UDMA/33.

How should you interpret this?

Your hard drive cable is not 40-pin.

Your hard drive ribbon cable is not installed correctly.

Your hard drive ribbon cable is not an 80-conductor cable.

ATA-100 is actually UDMA/33 and this is normal
Telnet allows you to communicate with another computer on the network remotely, entering commands to control the remote computer. To open a telnet session using Windows 9x and Windows NT/2000/XP, type "telnet (ipaddress)" from the command line.

Nbtstat (NetBIOS Status) displays current information about TCP/IP and NetBEUI when both are being used on the same network.

Netstat displays information about current TCP/IP connections.

Address Resolution Protocol (ARP) manages the IP-to-Ethernet address translation tables used to find the Media Access Control (MAC) address of a host on the network when the IP address is known
Which TCP/IP command can be used to enter commands into a remote computer?

Nbtstat

ARP

Telnet

Netstat
You should politely explain to the customer that an open computer case is potentially harmful to a small child and ask if they would prefer that the child leave the area.

You should not take the time to explain to the child what you are doing. If you do, performing the service call will take more time than necessary. This might cause the customer to be billed more and will cause you to get behind schedule.

You should not gently push the child away and explain that it is not safe to get that close when a computer is open. You should not touch a customer's child. Your actions might be misconstrued and the customer might complain.

You should not take the child by the hand and escort her out of the room. Your actions might be misconstrued. You also should not inform the customer that you are not a babysitter. You should always treat a customer with courtesy.
You are replacing a hard drive at a customer's residence. The customer's eight-year-old daughter is hovering over your shoulder asking what you are doing.

What should you do?

Patiently explain to the child what you are doing to fix the problem.

Take the child by the hand and escort her out of the room. Inform the customer that you are not a babysitter.

Politely explain to the customer that an open computer case is potentially harmful to a small child and ask if they would prefer that the child leave the area.

Gently push the child away and explain that it is not safe to get that close when a computer is open
The best thing to do is to ask her if she would like you to return later. This option gives the user the choice of eating in private and waiting for the work to be done or getting the work done now. Some people do not like to eat with others around, and you should respect her privacy.

You should not tell her you have not had lunch yet. Even if she offered you chips, it is not polite to eat in a user's office.

You should not ask her if she minds if you eat also and take out your own sandwich. You should not eat in a user's office when you are performing a service call.

You should not ignore the fact that she is eating and do the job you were assigned. Some people do not like to eat with others around. You should give the user that choice
You make a service call to a user. It is lunchtime and you have not eaten yet. The user is eating a sandwich at her desk. She has a bag of potato chips open.

What should you do?

Tell her you have not had lunch yet and hope she will offer you some chips.

Ignore the fact that she is eating and do the job you were assigned.

Ask her if she would like you to return later. If she says yes, leave and go get some lunch. If she says no, finish the job.

Ask her if she minds if you eat also and take out your own sandwich.
You can buy commercial drive cleaning kits, which is a special CD that you place in the CD-ROM drive. A drive cleaning kit is the only way to safely clean dust from a CD-ROM drive's lens.

You should not use a cotton swab and denatured alcohol. To get to the lens, you would have to disassemble the drive. This is very difficult to do and the laser is dangerous. Therefore, you should only use a commercial drive cleaning kit to clean the lens of the drive.

You should not use a soft cloth and water because you should not disassemble a CD-ROM drive.

You should not use eyeglass wipes because you should not disassemble a CD-ROM drive
What is the best way to clean the lens of a CD-ROM drive?

Use a soft cloth and water.

Use a cotton swab and denatured alcohol.

Use a drive cleaning kit.

Use eyeglass wipes.
You should remove your ESD wrist strap. The touchpad works using static electricity. Therefore, if you are wearing an ESD wrist strap, it will not be able to sense electricity in your fingertips. A similar problem can occur if a user has long fingernails.

The Fn key does not affect the touchpad. It is used to toggle the functionality of certain keys.

You cannot change the input device in CMOS. The computer will use the touchpad as its input device automatically.

When you attach a mouse to a PS/2 or USB slot, the touchpad will still function. Therefore, verifying that a mouse is not connected to the PS/2 port will not solve the problem
You have just completed installing more memory in a laptop computer. You boot the computer and log on. When you try to use the touchpad to open the Start menu, the cursor does not move.

What should you do?

Verify that the Fn key is not pressed.

Verify that a mouse is not connected to the PS/2 port.

Remove your ESD wrist strap.

Reboot the computer and enter CMOS to change the input device
The COPY command copies all files in the current or specified directory to a target drive and/or directory. The XCOPY command copies all files in the current or specified directory, and all files and subdirectories below it, to a target drive and/or directory. The XCOPY command can be used to copy the entire contents of one drive onto another drive.

If you want to copy all files from C: drive to D: drive the command would be:

XCOPY C:\*.* D:\..PY C:\*.* D:\*.* /S

The FDISK utility can create or remove partitions and set the active partition on a hard disk.

The SETUP utility in DOS or Windows is used to install the operating system onto the active partition.

The SCANDISK.EXE utility is used to find and correct problems such as lost clusters (pieces of files that have been disassociated from the parent file) on a hard disk. It can also detect bad sectors on a disk, try to recover any data contained in bad sectors, and "lock out" the bad areas from future use.
You want to copy the contents of a fixed hard disk to a removable hard disk for backup.

Which command can copy all files, directories, and subdirectories to another disk all at once?

COPY

SCANDISK

XCOPY

SETUP

FDISK
The best way to determine whether the problem is caused by a faulty port is to attach a loopback adapter to the port. A loopback adapter allows you to isolate the problem and determine whether it is caused by the port because it removes the printer and the cable as variables. If the loopback completes successfully, you know that the port is not the problem and you can then try a different cable to see if the problem is caused by the cable. If the loopback does not complete successfully, you know the problem is caused by the port itself.

Attaching a printer cable that you know works will not allow you to determine whether the problem is caused by the port. It will only allow you to eliminate the cable as the cause of the problem.

Pressing the self-test button on the printer will print a test page. This will ensure that the printer can print characters, but it will not help you isolate the communication problem.

Enabling bidirectional support on the port will not allow you to determine whether the port is causing the problem. Bidirectional support allows two-way communication between the operating system and the printer. However, if the port is not functioning, the cable is faulty, or the printer's parallel connector is not working, bidirectional messages will not be passed.
You are troubleshooting a user's connection to a printer. The printer is attached to the parallel port on the user's computer.

How can you determine whether the problem is caused by a faulty port?

Attach a parallel cable that you know works.

Press the self-test button on the printer.

Enable bidirectional support on the port.

Disconnect the printer cable and attach a loopback adapter to the port
FTP can be initiated from a DOS, Windows 9x, or Windows NT/2000/XP command prompt provided that a connection to a network or the Internet is established first. To begin an FTP session, you first type FTP from the command line to get an FTP> prompt. To establish a connection with an FTP server at 135.61.85.1, from the FTP> prompt, type the following:

OPEN 135.61.85.1

To terminate an FTP session, simply type BYE from the FTP> prompt.

The PUT command is used after you have logged on and want to copy a file from your computer to the remote computer.

The EXIT command is used to terminate a DOS session.

After you are at the FTP> prompt, you would not use the FTP command again
When you are finished running an FTP session from the command line, which command will properly terminate your FTP session?

BYE

EXIT

FTP

PUT
You should show the user how to use the scanner and then have the user try using the scanner with you there to answer any questions. Doing so will provide closure to your service call in the user's mind and ensure that the user will not call for support the first time he tries to use the scanner.

You should not just give the user the instruction book for the scanner. Some users would be able to learn to use the scanner from the instruction book, but some would not. Therefore, you should demonstrate how to use the scanner, not leave it up to the user to wade through the instruction book.

You should not ask the user if he understands TWAIN. You should refrain from using acronyms and technical jargon with users. Also, the user does not need an understanding of TWAIN to use the scanner.

You should not just tell the user that the scanner should work with any TWAIN-complaint application. It is likely that the user does not know what TWAIN means or whether the applications he uses are TWAIN compliant.
You install a TWAIN-compliant scanner on a user's computer. You test the scanner to verify that it is working.

What should you do next?

Show the user how to use the scanner. Have the user try using the scanner.

Tell the user that the scanner should work with any TWAIN-compliant applications.

Ask the user if he understands TWAIN.

Give the user the instruction book for the scanner
The proper way to clean a Cathode Ray Tube (CRT) monitor is to wipe it with a mild glass cleaner and a soft cloth.

You should not use window cleaner and a paper towel. Most monitors have a protective coating over the glass. A paper towel is course enough to possibly scratch the coating.

You should not use soap and water to clean the monitor. Water could get inside the monitor and cause electrocution or electrical problems. Also, the sponge might be course enough to scratch the monitor.

You should not wipe it with a dry paper towel. A paper towel is course enough to possibly scratch the coating on the monitor.

Objective:
List all questions for this objective
What is the proper way to clean a CRT monitor?

Wipe it with a dry paper towel.

Wipe it with window cleaner and a paper towel.

Wipe it with soap and water and a sponge.

Wipe it with glass cleaner and a soft cloth.
To connect to a printer that is shared on the network, you need to use the Add Printer Wizard and add a network printer. You launch the Add Printer Wizard by clicking Add Printer in Printers and Faxes.

You cannot add a printer using the Network Setup Wizard. The Network Setup Wizard is used to enable file and printer sharing on a computer, not to configure network printers.

You do not need to install the software from the manufacturer's installation CD-ROM. The driver will be automatically downloaded when you create the printer using the Add Printer Wizard.

You should not use My Network Places and choose Add a network place. My Network Places displays storage locations on the network, such as shared folders or Web sites. It does not display icons for network printers.
You are configuring a user's computer to be able to use a printer that is shared to the network from a computer running Windows XP Professional. The user's computer is also running Windows XP Professional.

What should you do?

Use the Add Printer Wizard.

Install the software from the manufacturer's installation CD-ROM.

Use the Network Setup Wizard.

Use My Network Places and choose Add a network place
An Advanced Technology Attachment (ATA) cable is used to connect Integrated Drive Electronics (IDE) drives to a motherboard. Each ATA cable can support up to two drives: a master drive and a slave drive. A computer usually has two ATA cables, so you can add four drives, two on each cable.

An ATA cable has only three connectors: a motherboard connector and two hard disk connectors. Therefore, it cannot support more than two IDE drives.

An ATA cable is not used to connect Small Computer Systems Interface (SCSI) drives. SCSI devices are attached in a chain with the first device connected to the host controller. The last device in the chain must be terminated.
Which of the following hard disk configurations is supported with one ATA cable?

Between one and four IDE drives

Up to fifteen SCSI drives

Up to seven SCSI drives

One or two IDE drives
The problem is most likely caused by debris under or around the C key. You can remove the debris with tweezers. Or if the entire keyboard seems dirty, you can use compressed air to blow out the debris or shake the debris to one end and pick it out with tweezers.

You should not spray window cleaner on a keyboard. You should avoid getting liquid under the keycaps. If you need to clean a keyboard's keys, avoid getting liquid under the keys.

Disabling StickyKeys will not solve the problem. StickyKeys is an accessibility feature that helps users who cannot press multiple keys at once activate key sequences.

The problem is not likely caused by a keyboard driver. The most likely cause of the problem is debris under the key.
A user reports that the C key sometimes will not register or registers multiple times. The problem only affects the C key.

What should you do?

Check the keyboard for dust and debris around the C key.

Dust the keyboard using a soft cloth and window cleaner.

Install a new keyboard driver.

Use Accessibility Options to disable StickyKeys.
You should clean the rubber guide rollers using alcohol on a fibrous cleaning towel. The guide rollers are responsible for moving the paper through the printer. They should be a little rough but clean. When they get dirt or paper dust on them, it can cause paper jams. You can clean them using alcohol on a fibrous cleaning towel. If they become too smooth, you can use alcohol on a non-metallic scouring pad to make them rough so they work better.

Replacing the fuser assembly will not resolve the problem. The fuser assembly is used to fuse ink to the paper, not to move the paper through the printer.

You should not clean the fuser assembly roller with water on a fibrous cleaning towel. A dirty fuser assembly roller is not the problem. Also, you should not use a fibrous cleaning towel and water to clean the fuser assembly roller. You should use alcohol and a soft cloth. You must be very careful not to scratch the fuser assembly roller.

You should not use maintenance software to realign the guide rollers. Ink jet printers include maintenance software, which can be used to realign the print heads. Laser printers have maintenance kits that contain spare parts.
A laser printer is experiencing paper jams. What should you do?

Clean the fuser assembly roller with water on a fibrous cleaning towel.

Replace the fuser assembly.

Clean the rubber guide rollers using alcohol on a fibrous cleaning towel.

Use the maintenance software to realign the guide rollers
You should change the system BIOS to use IEEE-1284 ECP/EPP mode. IEEE-1284 is the standard for parallel connections. Enhanced Capabilities Port (ECP) and Enhanced Parallel Port (EPP) are two standards for bi-directional communication over a parallel port. They provide better performance than older standards. However, you will still receive better performance by purchasing a USB or Firewire external drive.

You cannot change a parallel CD-ROM drive to support IEEE-1394 FireWire. FireWire is a high-speed wired connection appropriate for data transfer, such as to an external drive. However, the drive must have a FireWire port.

Updating the CD-ROM driver will most likely not solve the problem. Updating the driver might correct other problems, but if the BIOS is configured to support an older parallel bi-directional standard, it will not resolve the performance issue.

Assigning a different Direct Memory Address (DMA) to the CD-ROM drive would resolve a resource conflict, but it will not help correct a performance problem.
A user reports poor performance accessing an external CD-ROM drive installed on a parallel port.

What should you do?

Change the system BIOS to use IEEE-1394 FireWire mode.

Assign a different DMA to the CD-ROM drive.

Change the system BIOS to use IEEE-1284 ECP/EPP mode.

Update the CD-ROM driver.
Memory is not a hot swappable component in a laptop computer. You need to unplug the laptop and remove the battery before installing memory.

A USB printer is a hot swappable component, as are most USB devices. However, you will probably need to install driver software.

PC card devices are hot swappable. PC card devices include modems, wireless adapters, and network cards.

A USB hard disk is hot swappable. It should be recognized as soon as it is plugged in.
Which of the following is NOT hot swappable on a laptop computer?

PC card modem

USB hard disk

Memory

USB printer
You should follow the manufacturer's instructions for installing the printer. Some printers have an executable on the CD-ROM that must be run before connecting the Universal Serial Bus (USB) cable. Others are installed using the standard procedure of either allowing Plug and Play to detect the printer or adding a printer through the Add Printer Wizard.

You do not need to use Windows Update to download the most current driver. Driver updates should be obtained from the manufacturer. Also, at this point no driver has been installed, so you would not be able to update the driver.

You should not use Add or Remove Programs to install the printer. Add or Remove Programs is a utility used to manage Windows components and applications. It is not used to install printer drivers.

You should not use Device Manager to install the printer driver. When you first set up a printer, you need to run the manufacturer's software or use Add Printer Wizard to install the printer. If you need to update the driver at a later time, you can do so by using Device Manager.
You are installing a USB laser printer for a user. The user's computer is running Windows XP Professional. You install the toner cartridge, place paper in the paper tray, and connect the USB cable to the printer and to the computer.

What additional step do you need to take?

Install the printer software as instructed by the manufacturer.

Use Device Manager to install the printer driver.

Use Windows Update to download the most current driver.

Use Add or Remove Programs to install the printer
You should use System Restore to create a restore point. A restore point is a non-destructive way to revert a computer to a particular configuration state. Although some installation programs create a restore point, not all of them do. Therefore, to be safe, you should manually create a restore point before installing the application.

Creating an ASR backup will not meet the requirements. An ASR recovery is a destructive recovery that will reformat the hard disk and require you to reinstall all data files.

Saving a copy of the Registry to a separate location is not the best way to manage recovery. The Registry cannot be replaced manually while you are running Windows XP. Also, it is possible that all configuration changes made by the application will not be saved to the Registry. For example, a .NET Framework application might install a component in the Global Assembly Cache.

Last Known Good Configuration cannot be used to meet the requirements because it is likely you would not know the application is not working until the Last Known Good Configuration has been replaced by a new one. Last Known Good Configuration is updated each time you log on successfully.
You are preparing to install an application on a user's computer, which is running Windows XP Professional.

How can you ensure that you can restore the system to its current state if the application does not work correctly after it is installed?

Save a copy of the Registry to a separate location.

Create an Automated System Recovery (ASR) backup.

Use Last Known Good Configuration.

Create a restore point.
A power brownout is a drop in line voltage. If the drop is 15 or 20 volts, many devices that do not require regulated power (such as incandescent lights) will continue to work but at reduced output. If the brownout drops below the critical threshold of the PC power supply, it can no longer supply power to the computer and shuts down. An Uninterruptible Power Supply (UPS) contains a battery and a power inverter. The battery maintains a constant charge. If line voltage (input power) drops, a microprocessor instantly switches to battery power. The battery then supplies AC power through the inverter.

An Underwriters Laboratories (UL) listing means that the device has been approved by an independent testing group (Underwriters Laboratories) that tests electrical devices for safety. It does not imply any backup power capabilities.

A UL-listed power supply distributes power to the PC components, but it does not provide backup power capabilities.

A UL-listed wall outlet does not provide backup power capabilities.

A Surge-suppressing power strip only protects the connected devices from voltage spikes and surges, not from brownouts or power outages.
What is most likely to keep a computer from crashing or shutting down in the event of a power brownout?

Surge-suppressing power strip

UL-listed power supply

UL-listed wall outlet

UL-listed UPS
A Redundant Array of Inexpensive Disks (RAID) 1 configuration is a disk mirroring volume. It requires exactly two hard disks. One hard disk will act as a mirror to the other. It also requires Windows Server 2003 (or Windows 2000 Server, or Windows NT).

Windows XP Professional does not support any fault tolerance configurations, including RAID 1. Windows XP Professional does support RAID-0 (disk striping), however.

A RAID 1 configuration cannot use three hard disks. A RAID-5 (disk striping with parity) configuration requires at least three hard disks.
You are installing a computer for a user. The user's specification calls for a RAID 1 volume.

What is the minimum system configuration that will support a software RAID 1 implementation?

A computer with three hard disks and Windows Server 2003.

A computer with two hard disks and Windows Server 2003.

A computer with three hard disks and Windows XP Professional.

A computer with two hard disks and Windows XP Professional
You should install only the application you were told to install and then tell the user to follow company procedures to schedule another service call. Doing so will ensure that the user receives any necessary approvals for applications to be installed and technical support time to be charged to the department.

You should not install the additional applications after hours. The applications might not be approved for use by the user or there might be licensing issues. If you do not go through the proper channels, you will not know if you are in violation. Also, it is not the technician's job to work for free to make users happy.

You should not install the additional applications and log the total amount of time spent on the service log, along with an explanation of why the service call took more time than expected. Doing so might violate the company's approved software policy and could result in a budget overrun for the service call.

You should not explain to the user that you have more important things to do. Users believe that their needs are important, and you should not make them seem less important than the other tasks you need to perform. You should be honest with the user and explain the real reason you cannot install the applications
You are making a service call to install an application on a user's computer. While you are there, the user asks you to install several other applications. The company policy requires manager approval for all technical support activities.

What should you do?

Install the additional applications and log the total amount of time spent on the service log, along with an explanation of why the service call took more time than expected.

Install only the application you were told to install. Explain to the user that you have important things to take care of and that you do not have time to install anything else.

Install the additional applications after hours.

Install only the application you were told to install. Tell the user to follow company procedures to schedule another service call.
You should always listen attentively to the user's description of the problem. One reason to do so is to ensure that the user knows that you are interested in solving the problem. The other reason is that the user might provide additional information that was not recorded on the service call request.

You should not tell the user that you already know what the problem is. You need to listen to the user's description of the problem so that the user feels that you care about fixing the problem. Also, you might be missing information that the user would provide if you listened.

You should not start working on correcting the user's problem before the user has finished describing the problem. You should make eye contact while the user is talking to show that you are paying attention.

You should not tell the user to leave you alone so you can fix the problem. You should always be polite to the user, not dismissive.
You visit a user's office to make a service call. The user wants to explain all the same things that are listed on the service request. You have other calls to make that day and you want to leave work on time.

What should you do?

Tell the user that you already know what the problem is.

Start working on correcting the user's problem while allowing the user to keep talking while you work.

Tell the user to leave you alone so you can fix the problem.

Listen attentively to the user's description of the problem
On a computer running Windows XP Professional, there are three ways to find out the IP address and subnet mask assigned automatically. You can run the IPCONFIG command-line utility, display Status for the network connection and access the Support tab, or select the Adapter node under Components | Network in System Information.

You cannot obtain the IP address and subnet mask using PING. The PING utility is used to test a connection path between two computers and to test the TCP/IP stack. To test the TCP/IP stack, you ping the loopback address, which is 127.0.0.1.

You cannot obtain the IP address and subnet mask using the Network Connection Properties. If the TCP/IP properties were configured statically, you would set them and view them on the connection's Properties page. However, they are set dynamically, so you cannot view them there.

You cannot use WINIPCFG on a computer running Windows XP. WINIPCFG was a Windows 98 utility for viewing the IP address configuration
A computer running Windows XP is configured to receive an IP address automatically. Which utilities would you use to find out the IP address and subnet mask assigned to its network adapter? (Select TWO.)

Network Connection Properties

IPCONFIG

PING

WINIPCFG

Network Connection Status
You should reduce the printing resolution. A memory overflow error might mean that you are trying to print data that is too complex for the printer to render. In this case, reducing printing resolution will reduce the complexity of the data and the amount of data that must be stored in the printer's memory.

You might also try turning off Resolution Enhancement Technology (RET). RET helps produce smooth curves. However, it also requires more memory. Therefore, disabling RET might reduce the amount of printer memory required enough to allow the user to print the document.

Moving the spooler to a new location will not resolve the problem. If the hard disk containing the spool file did not have sufficient disk space, you would find that large print jobs would not print, but smaller print jobs would.

Upgrading the printer driver will not resolve the problem. The problem is caused by the printer's hardware being unable to handle the document's complexity.

Adding more memory to the computer will not resolve the problem. The problem is caused by the printer's hardware being unable to handle the document's complexity, not by insufficient memory in the computer
A user receives a memory overflow error when printing a high resolution image.

What should you try to allow the user to print the document? (Select TWO.)

Reduce the printing resolution.

Move the spooler to a hard disk with more disk space.

Turn off RET.

Upgrade the printer driver.

Add more memory to the computer
You should ask the user to type his or her password after each restart. Doing so maintains the integrity of the user's password and reinforces the best practice of never giving out your password.

You should not ask the user for his or her password before restarting the computer the first time. A password should be known only by the user it belongs to. It is a bad security practice to train users to divulge their password, even to support personnel because of the possibility of social engineering.

You should not ask the system administrator to set the user's password to blank before beginning the installation. A blank password is a security risk, even if for only a short time.

You should not log on as a local Administrator and change the user's password. A local administrator cannot change the password of a domain user account
You are installing some software for a user. The user's computer is a domain member.

Several of the applications require a system restart. Each time the computer restarts, you must log on with the user's account in order to make configuration changes.

What should you do?

Ask the system administrator to set the user's password to blank before beginning the installation.

Ask the user for his or her password before restarting the computer the first time.

Log on as a local Administrator and change the user's password before beginning the installation.

Ask the user to type his or her password after each restart
Debugging Mode gives you the opportunity to move system boot logs from the failing computer to another computer for evaluation. To use this mode, you first must connect the failing computer to another computer using a serial cable. You then can review the boot logs on a functioning computer.

Safe Mode with Networking is the same as Safe Mode, but the drivers necessary to access the network are loaded. This is useful if you need to access the network to download replacement drivers.

The Enable Boot Logging option allows the system to boot normally while recording all files loaded during the boot process. The log is recorded in a file named NTBTLOG.TXT. The log will identify which drivers loaded and which failed. This is especially helpful if you have a copy of the NTBTLOG.TXT file that was created before there was a problem. You then could compare them to see what has changed.

The Recovery Console does not start the graphical interface, but it does allow you to access any FAT16, FAT32, and NTFS file systems. The purpose of the Recovery Console is to allow you to repair a damaged registry, system files, or file system on the hard drive.
Which boot option can you use to move system boot logs from a failing computer to another computer for evaluation?

Safe Mode with Networking

Debugging Mode

Enable Boot Logging

Recovery Console
An address in the subnet 169.254.0.0 indicates that the address was assigned by Automatic Private Internet Protocol Addressing (APIPA). An APIPA address is assigned when a network adapter is configured to obtain an IP address automatically, no Dynamic Host Configuration Protocol (DHCP) server can be found, and there is no Alternate Configuration.

255.255.255.0 is not a valid IP address. It is the default subnet mask for the Class C subnet.

127.0.0.1 is the loopback address for any computer. The loopback address is used to troubleshoot problems with the TCP/IP stack or network adapter.

The address 192.168.0.1 is a valid Class C address and is the address automatically assigned to the internal interface of a computer that shares an Internet connection using Internet Connection Sharing.
A network adapter is configured to obtain an IP address automatically. Which IP address indicates that the computer was unable to contact a DHCP server?

169.254.10.23

255.255.255.0

127.0.0.1

192.168.0.1
Windows 2000 introduced the Recovery Console to perform troubleshooting and repair tasks. You can access this command-line interface through either the Windows 2000 CD or the Setup disks. If you have installed the Recovery Console previously, you can access it directly during startup.

Several of the Recovery Console commands, particularly those associated with navigation, were originally DOS commands. The following are a sample of Recovery Console commands:

Cd - Changes the current directory.
Chkdsk - Checks computer disks for errors.
Cls - Clears the screen.
Enable - Enables a system service or device driver.
Fixboot - Repairs the boot sector.

The Help command will provide you with information about the other commands.

H, ?, and Command will not provide you with this information.
You are using the Windows 2000 Recovery Console to help repair a serious problem. You cannot remember the command you need.

What command will provide you with information about other commands?

?

Help

Command

H
The most secure wireless security standard is 802.1x, which offers a dynamic encryption key and supports a number of authentication methods, through Extensible Authentication Protocol (EAP), including certificates, public keys, and Kerberos.

Wired Equivalent Privacy (WEP) requires that you manually change encryption keys. It also does not support public key authentication.

Media Access Control (MAC) filters can be used to allow only certain computers to access a wireless access point secured using WEP. Access is granted or denied based on the MAC address.

Wi-Fi Protected Access (WPA) changes the key every 10,000 packets using a mechanism called Temporal Key Integrity Protocol (TKIP). It does not, however, support public key authentication.
Which wireless security standard uses dynamic encryption keys and supports public key authentication?

802.1x

WEP

WPA

MAC filtering
A wrist-grounding strap is necessary when working with PC motherboards, memory modules, and expansion boards. The strap drains away static electric charges that can damage microchips. A proper strap contains a high-value resistor (typically between 1 and 2 Megaohms) embedded in the strap or the coupling to the ground wire. One side of the resistor connects to a contact plate that touches your skin, and the other side connects to a wire lead (usually coiled) that should be connected to a known-good earth ground. The resistor is of high enough value that it acts as a short to ground for any high-voltage static charges that build up, but appears as an open circuit to the lower, current-carrying voltages that can be lethal (recall Current = Voltage / Resistance).

Static-eliminating material in the wristband may reduce static buildup.

A quick-release snap on the ground wire and an alligator clip for easy disconnection are conveniences, but not safety devices.

A high-voltage fuse would not offer protection against lower, current-carrying voltages.

Objective:
List all questions for this objective
What safety feature is incorporated into an antistatic wrist strap?

A resistor in the path to ground

A high-voltage fuse

A quick-release snap on the ground wire

An alligator clip for quick disconnection

Static-eliminating material in the wrist band
Since the old computer was connected to a Transmission Control Protocol/Internet Protocol (TCP/IP) network, TCP/IP needs to be configured on the new computer. The IP address is the unique network client identification address. The default gateway is the network address of the local router interface, and the Subnet Mask is used to determine whether data packets are destined for local or remote hosts. All of these need to be configured and/or assigned to the network card.

The Media Access Control (MAC) address is the physical address of the network card. It is programmed into the card by the manufacturer and is not changeable.

The network topology refers to the configuration of the network (ring, bus, star, star-bus, etc.). These are not system settings.

The network media refers to the type of cable used (10Base-T, 10Base-2, Fiber, etc.).

The Network access method (for example, Carrier Sense-Multiple Access with Collision Detection or CSMA/CD) is determined by the type of network in use. You are using the existing card, so it already matched the type of network in use.
You are replacing a computer in an office. The existing computer has been connected to a TCP/IP network, and you want to use the existing network card in the new computer.

Which configuration settings would you have to set in the new computer? (Select THREE.)

Subnet Mask

Network access method

Network media

MAC address

Default gateway

Network topology

IP address
With the power disconnected, you can clear the settings held in the CMOS if you remove the motherboard battery and then replace it (preferably with a new one). This temporarily removes voltage to the CMOS chip so that stored settings are erased, and it is reset. Some motherboards have a jumper to clear the CMOS chip, and some CMOS setup programs have a feature called Restore Default Settings.

Do not confuse the ROM that holds the BIOS with the CMOS chip that holds the configuration settings. BIOS is non-volatile, while CMOS is actually volatile RAM that is powered by battery.

Flashing the BIOS refers to upgrading the BIOS to a newer version. You upgrade the BIOS to take advantage of new features or bug fixes, not to wipe the CMOS settings.

Hard drives need to be high-level formatted before they can be used, but CMOS passwords will remain even after the hard drives are reformatted. Hard drives rarely if ever need low-level formatting. You might have to perform a low-level format if you were installing another operating system (for example, UNIX) on the same drive that used different track and sector divisions.

Replacing the power supply or the floppy drive will not delete the CMOS password
Someone has put a Supervisor Password on the CMOS Setup Utility, which prevents you from making changes to CMOS. You decide to erase the password by erasing CMOS.

What steps are necessary to wipe out the current CMOS password? (Select TWO.)

Replace the floppy drive.

Replace the power supply.

High-level format the hard drive.

Unplug power.

Remove the motherboard battery.

Flash the BIOS.

Low-level format the hard drive
Windows 2000 and Windows XP support the verification of digital signatures assigned to device drivers. If you suspect a problem with a driver, run SIGVERIF.EXE to scan for drivers that are not digitally signed. To use the utility, enter the command in the Run dialog box.

A digital signature is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is unchanged. Digital signatures are easily transportable, cannot be imitated by someone else, and can be automatically time-stamped. The ability to ensure that the original signed message arrived means that the sender cannot easily repudiate it later.

A digital signature can be used with any kind of message, whether it is encrypted or not, simply so that the receiver can be sure of the sender's identity and that the message arrived intact. A digital certificate contains the digital signature of the certificate-issuing authority so that anyone can verify that the certificate is real.

If changes to the operating system cause instability or startup problems, you can use the Automated System Recovery (ASR) tool to restore the system state and all files stored on the system volume. ASR is a last resort option to use after you have unsuccessfully tried other recovery methods, such as rolling back drivers, restoring from backups, performing parallel installations, and using System Restore. ASR restores system state files and settings and restores your ability to start the system. For example, hard disk corruption might prevent you from starting Windows XP, and the damage might be serious enough to prevent you from using Safe Mode, Recovery Console, or the Last Known Good Configuration. ASR will restore the Windows XP files that originally were installed from CD-ROM and may place incompatible file versions on the hard drive if files from service packs had been installed after original installation.

DiskProbe is a sector editor tool for Windows XP Professional that allows administrators to directly edit, save, and copy data on a physical hard disk. With DiskProbe, you can replace the Master Boot Record, repair damaged partition table information, and repair or replace damaged boot sectors.

DMDIAG is a command line tool that displays the location and layout of dynamic disks and disk volumes
You suspect that some driver on your Windows XP system is the source of the system crashing and locking up.

How can you verify that all drivers on the system have not been changed?

Run DiskProbe.

Run the DMDIAG.EXE program from the Run dialog box.

Run ASR.

Run the SIGVERIF.EXE program from the Run dialog box
A cordless mouse requires batteries in order to operate. If the light does not come on, the most likely cause is that the batteries are dead. Replacing the batteries should solve the problem.

An infrared mouse needs to be within line of sight with the computer to function. However, the light on the optical mouse would still be on even if it were out of the line of sight. Therefore, the problem is probably caused by batteries that need to be replaced.

Installing a new mouse driver will not resolve the problem. The problem is caused by no power, not by an incorrect driver.

The Power Options settings control power management settings, such as hibernation and sleep. They do not affect the mouse.
A user's cordless mouse does not operate. The light does not come on.

What should you do?

Install a new mouse driver.

Replace the batteries.

Check the Power Options settings.

Verify that the mouse has line of sight with the computer
A cordless mouse requires batteries in order to operate. If the light does not come on, the most likely cause is that the batteries are dead. Replacing the batteries should solve the problem.

An infrared mouse needs to be within line of sight with the computer to function. However, the light on the optical mouse would still be on even if it were out of the line of sight. Therefore, the problem is probably caused by batteries that need to be replaced.

Installing a new mouse driver will not resolve the problem. The problem is caused by no power, not by an incorrect driver.

The Power Options settings control power management settings, such as hibernation and sleep. They do not affect the mouse.
A user's cordless mouse does not operate. The light does not come on.

What should you do?

Install a new mouse driver.

Replace the batteries.

Check the Power Options settings.

Verify that the mouse has line of sight with the computer
You should connect a Bluetooth adapter to the printer's Universal Serial Bus (USB) port. Doing so will make the printer visible to Bluetooth devices that are in range, including the Personal Data Assistants (PDAs).

You should not install an 802.3 switch. 802.3 is the Ethernet standard for a wired local area network. It will not allow wireless connectivity for PDAs.

You should not install an 802.11g access point and connect the computer to the access point. Doing so will not make the printer available unless you share the printer to the network and the PDAs are compatible with Windows file and printer sharing.

You should not connect a Bluetooth adapter to the computer's USB port. Doing so will allow the computer to communicate with Bluetooth devices, but it will not allow the printer to be visible to Bluetooth devices
A user in the sales department has an ink jet printer that is currently connected to the user's desktop computer through a USB connection. The printer is currently available for use only by that user. The department wants to enable all salespeople to print to the printer from their PDAs.

What should you do?

Connect a Bluetooth adapter to the printer's USB port.

Install an 802.3 switch. Connect the printer to the switch.

Connect a Bluetooth adapter to the computer's USB port.

Install an 802.11g wireless access point. Connect the computer to the access point.
Cellular WAN is a technology that uses cell phone equipment to link a handheld PC, such as a Windows CE device or a Palm Pilot, to the Internet. A handheld PC is also called a Personal Digital Assistant (PDA). Cellular WAN has a transfer speed up to 56 kilobits per second (Kbps).

Bluetooth is a low-speed wireless technology for connecting devices in a personal area network. Bluetooth devices include mouse, keyboard, and digital cameras. The range for Bluetooth communication is only 100 meters. It operates at 721 Kbps. Some cell phones are equipped with Bluetooth to allow them to connect to other Bluetooth devices within range, including wireless headsets or wireless Internet access points. If you have a Bluetooth-enabled Internet access point, you can connect to the Internet using a Bluetooth-enabled device as long as you are within range.

FireWire (IEEE 1394) is a high-speed wired connection for connecting peripherals, such as video cameras, external hard drives, and printers. It is a wired technology, not a wireless technology. Two speeds are available: 400 megabits per second (Mbps) and 800 Mbps.

ActiveSync is used to synchronize Windows mobile devices with PCs running Windows XP (or earlier).
Which types of connections can be used to connect a handheld PC to the Internet? (Select TWO.)

FireWire

ActiveSync

Cellular WAN

Bluetooth
You should enable automatic configuration and add the ISP-defined settings to the Alternate Configuration tab. With this configuration, the computer first tries to find a DHCP server. If one cannot be found, the IP configuration on the Alternate Configuration tab is used.

You should not create separate user profiles for the user at home and at work. IP configuration settings are not defined in the user profile.

You should not create separate hardware profiles for the user at home and at work. The hardware profile limits the drivers that are loaded. It cannot be used to establish different IP configuration settings.

You should not configure both IP configurations manually in Advanced TCP/IP settings. Doing so would create a multi-homed network adapter, but the settings would not work correctly given the situation. Also, you want to be able to dynamically assign addresses when the user is connected to the company network, not manually assign the address
A user telecommutes three days a week using a laptop computer. The user's Internet Service Provider at home requires a static IP address, subnet mask, and DNS server setting. The company network assigns addresses using DHCP.

You need to configure the user's computer so that the user can access the Internet when at home and the corporate network when at the office.

What should you do?

Enable automatic configuration. Add the ISP-defined settings to the Alternate Configuration tab.

Create separate user profiles for the user at home and at work.

Configure both IP configurations manually in Advanced TCP/IP settings.

Create separate hardware profiles for the user at home and at work
You should start the computer in Safe Mode and perform a System Restore. Windows XP saves a scheduled restore point, a restore point before making some configuration changes, and a restore point before an application is installed. It allows you to revert your computer's configuration to a specific point in time. Restoring a system using System Restore does not affect user data. You can initiate System Restore by booting normally or to Safe Mode. In this case, you will need to boot to Safe Mode.

You should not start the system in VGA mode and uninstall the application. VGA mode is used specifically to correct problems with the video adapter configuration. Also, uninstalling the application might not resolve the problem because the problem might be caused by one of the configuration changes.

You should not use Automated System Recovery (ASR). ASR reformats the hard disk and restores from an ASR backup set, which does not include user data. Therefore, user data would be lost.

You cannot use an Emergency Repair Disk (ERD). ERDs were supported by Windows NT and Windows 2000. They are not supported by Windows XP
A user makes some configuration changes and then installs an application. The application requires the user to reboot the computer. When the computer reboots, it is unable to start Windows XP.

You need to ensure that the user's data is preserved.

What should you try first?

Perform Automated System Recovery.

Use the Emergency Repair Disk.

Start in Safe Mode and perform a System Restore.

Start the system in VGA mode and uninstall the application
You should create a shared printer object on a computer running Windows XP, Windows 2000, or Windows Server 2003. Then you should grant the Marketing group the Print permission and the Marketing manager the Manage Documents permission. You can create a printer object that is mapped to a network-attached printer so that you can manage permissions and the print queue from a single computer. The computer with the shared printer object is a print server for the printer. The Print permission is required to allow users to print to a printer. Users with the Print permission can also manage their own documents in the queue. Managing other users' documents requires the Manage Documents permission.

You should not create a printer object on each user's computer. Doing so will cause multiple queues to be associated with the printer. The queue and permissions will not be managed separately.

You should not grant the Marketing group the Manage Documents permission. Doing so will enable them to manage any document in the queue.

You should not grant the Marketing manager the Manage Printers permission. Doing so will allow the manager to install printer drivers and modify printer configuration settings
You are configuring a laser jet printer for the Marketing department. The printer is attached directly to the network. You need to limit access to the printer to only users in the Marketing department. Users should be able to delete their own documents from the print queue. The Marketing manager should be able to delete any document from the print queue.

What should you do?

Create a shared printer object on a computer running Windows XP, Windows 2000, or Windows Server 2003. Grant the Marketing group the Manage Documents permission. Grant the Marketing manager the Manage Printers permission.

On each user's computer, create a printer object. Grant the user Manage Documents permission to the printer object. On the Marketing manager's computer, create a printer object and grant the Manage Printers permission.

On each user's computer, create a printer object. Grant the user Print permission to the printer object. On the Marketing manager's computer, create a printer object and grant the Manage Documents permission.

Create a shared printer object on a computer running Windows XP, Windows 2000, or Windows Server 2003. Grant the Marketing group the Print permission. Grant the Marketing manager the Manage Documents permission.
Pinging the loopback address (127.0.0.1) tests whether the TCP/IP protocol stack is functioning correctly. If you cannot ping the loopback address, it means that TCP/IP drivers are not installed or corrupt or that the network adapter is not functioning.

The DHCP server assigns addresses on the network. It does not impact the ability to ping the loopback address on a client computer.

The loopback address is 127.0.0.1. A computer does not require a valid IP address on the network for the loopback address to respond.

The loopback address is not dependent on a correct subnet mask. The loopback address pings the local computer to verify the TCP/IP stack.
A user cannot access the network. You attempt to ping the loopback address and receive no response.

What are two possible reasons? (Select TWO.)

The network adapter is not functioning.

The DHCP server is not functioning.

TCP/IP needs to be reinstalled.

The network adapter is configured with an invalid IP address for the network.

The network adapter is configured with an invalid subnet mask for the network
The PING utility (for example, ping 208.160.120.17) is used to send test data packets to verify connectivity to another computer using ICMP. The Internet Control Message Protocol (ICMP) is part of the TCP/IP suite of protocols. It is an error-reporting protocol. PING sends an ICMP Echo Request to a target name (like computer2) or IP address. The resulting ICMP Echo Reply verifies that a TCP/IP configuration is set up properly and that the destination host is online and connected to the network.

TRACERT is also a TCP/IP utility. It uses ICMP echo requests to trace the route a data packet takes to its destination. The TRACERT command displays the hop count (also called the metric, the number of routers the signal must pass through to get to the destination), the time each hop takes (in milliseconds), the name of the computer or router passed through (optional), and the IP address of each router in the hop. TRACERT works with IP addresses, host names, and domain names. Like PING, TRACERT can verify a system is online, but that is not its primary purpose.

FTP (File Transfer Protocol) is a utility program that allows the bi-directional transfer (uploading and downloading) of files between two networked hosts. A small FTP client program runs on the remote computer and accesses a larger FTP server running on a host. FTP is not used to verify that another system is online.

The TELNET utility allows a computer to connect to a UNIX host by emulating a terminal (such as a DEC VT100) and establishing a remote command-line window. TELNET is not used to verify that another system is online.
Which utility is used to verify that another computer is online and connected to the network?

PING

TELNET

FTP

TRACERT
You should store any component that includes chips or circuitry in an antistatic bag to protect it from static electricity when the component is not inside the computer. This includes RAM, expansion cards like video adapter cards, processors, motherboards, and hard drives.

There is no need to store a power supply in an antistatic bag. A power supply does not include components that are sensitive to static electricity.

There is no need to store fiber optic cables in an antistatic bag. A fiber optic cable works on light impulses, so it is not sensitive to static electricity.

There is no need to store backup tapes in an antistatic bag. Backup tapes are magnetic media and are not susceptible to static electricity.
Which components should be kept in an antistatic bag when they are not inside the computer? (Select TWO.)

RAM

Backup tapes

Power supply

Fiber optic cables

Video adapter card
You should not use an Electrostatic Discharge (ESD) wrist strap when working on an open Cathode Ray Tube (CRT) display. An ESD wrist strap grounds your body to protect components from an ESD shock. However, a CRT display is highly charged, so you do not want to be grounded when you work inside one. In fact, only specially trained personnel should ever open a CRT display.

You should use an ESD wrist strap when adding memory to a computer. Doing so will help protect the memory and the other components on the motherboard from an ESD shock.

You should use an ESD wrist strap when installing an internal hard drive. Doing so will help protect the hard drive and the other components you might touch from an ESD shock.

You should use an ESD wrist strap when installing a network adapter. Doing so will help protect the network adapter and the other components you might touch from an ESD shock
When should you NOT wear an ESD wrist strap?

When adding memory to a computer

When working with an open CRT display device

When replacing a network adapter

When installing an internal hard drive
You should create two hardware profiles and enable the World Wide Web Publishing service in only one hardware profile. IIS installs the World Wide Web Publishing service, which is a Windows service. You can enable and disable a Windows service for specific hardware profiles through the service's Properties page in the Services utility. The user will need to restart the computer and select the hardware profile that has the World Wide Web Publishing service enabled when necessary.

You should not install Windows XP Professional in two different directories and boot to one installation to install IIS. You should only install one instance of Windows XP on a specific volume. Even if you had two volumes, creating two different installations is unnecessary and would result in having to install redundant copies of all applications.

You should not create two user accounts, log on as one, and install IIS. The World Wide Web Publishing service is a Windows service, so its status is not affected by the user who is logged on. If it is configured to start automatically, it will start when the operating system boots.

You should not create two user accounts and add a shortcut to IIS in the Startup folder in one of the user profiles. IIS is a Windows Service, not an application
You are configuring a computer for an application developer. When the user is developing Web applications, he needs Internet Information Services (IIS). Otherwise, you want to ensure that IIS does not run. The user's computer is running Windows XP Professional and has a single hard disk, formatted as a single volume.

What should you do?

Install Windows XP Professional in two different directories. Boot to one installation and install IIS.

Create two user accounts. Log on as one of the users and add a shortcut to IIS in Startup folder of the user's profile.

Create two user accounts. Log on as one of the users and install IIS.

Create two hardware profiles. Enable the World Wide Web Publishing service in only one hardware profile.
You should use a twisted paper towel to soak up the ink and clean any spilled ink with distilled water. You need to be very careful not to spill ink on the power supply or the printer's main board. Ink jet ink is water-based, so distilled water is the best way to clean up minor spills. You should always unplug the printer before performing maintenance on it.

You should not clean spilled ink with denatured alcohol. Ink jet ink is water-based, so the best way to clean it up is with distilled water.

Laser printers have maintenance kits; ink jet printers do not.

You should not attempt to remove the tray. Removing a tray that is filled with ink is likely to cause a spill that will damage the printer.

Objective:
List all questions for this objective
The ink tank on an ink jet printer is nearly full and a little ink has spilled over. What should you do?

Use a twisted paper towel to soak up the ink. Clean spilled ink with distilled water.

Use the maintenance kit to drain the tray.

Carefully remove the tray and empty it. Clean spilled ink with household cleaner.

Use a twisted paper towel to soak up the ink. Clean spilled ink with denatured alcohol.
TRACERT is a TCP/IP utility that uses Internet Control Message Protocol (ICMP) Echo Requests to trace the route a data packet takes to its destination. The TRACERT command displays the hop count (also called the metric, the number of routers the signal must pass through to get to the destination), the time each hop takes (in milliseconds), the name of the computer or router passed through (optional), and the IP address of each router in the hop. This is the output shown in the graphic. TRACERT works with IP addresses, host names, and domain names.

The PING utility (for example, ping 208.160.120.17) is used to send test data packets to verify connectivity to another computer using ICMP. PING sends an ICMP Echo Request to a target name (like www.whitehouse.gov) or IP address. The resulting ICMP Echo Reply verifies that a TCP/IP configuration is set up properly and that the destination host is online and connected to the network.

FTP (File Transfer Protocol) is a utility program that allows the bi-directional transfer (uploading and downloading) of files between two networked hosts. A small FTP client program runs on the remote computer and accesses a larger FTP server running on a host.

The TELNET utility allows a computer to connect to a UNIX host by emulating a terminal (such as a DEC VT100) and establishing a remote command-line window.
Which utility would provide the output shown in the graphic exhibit?



FTP

PING

TELNET

TRACERT
You should verify that the partition is formatted as NTFS. You can only set file system permissions on a folder that is located on an NTFS partition.

You should also verify that Simple File Sharing is not enabled. When Windows XP is first installed, Simple File Sharing is enabled by default. When Simple File Sharing is enabled, the Security tab is not visible.

You do not need to verify that the computer is a member of the domain. You can set file system permissions on standalone computers (workgroup members).

You should not verify that the folder is shared. File system permissions control local access to the folder and do not require the folder to be shared.

You should not verify that your user account has Full Control to the folder. Although you will need Full Control to the folder, not having the Full Control permission will not prevent the Security tab from being displayed.
You need to configure file system permissions on a folder located on a computer running Windows XP Professional. When you display the Properties dialog box for the folder, the Security tab is not available.

What should you do? (Select TWO.)

Verify that the computer is a member of the domain.

Verify that your user account has Full Control of the folder.

Verify that Simple File Sharing is not enabled.

Verify that the folder is shared.

Verify that the partition is formatted as NTFS
You should verify that the Fn key is not stuck. The Fn key is used to provide alternate keyboard functions for some keys on a laptop computer. For example, some alphabetic keys become numbers, allowing you to use the regular keyboard as a keypad. You can lock the Fn key down by pressing the Fn+Scroll keys. Therefore, you should also check whether the Scroll key is active. To unlock a locked function key, press the Fn+Scroll keys again.

You should not verify that the Caps lock key is not stuck. The Caps lock key causes letters to be typed in uppercase even if the Shift key is not pressed.

There is no need to replace the keyboard. The keyboard is not malfunctioning. The problem is just a stuck key or user error.

There is no need to attach an external keyboard. The keyboard is not malfunctioning
Sue reports that the keyboard on her laptop computer is not working. When she types the word "lion", the text "356n" appears.

What should you do?

Verify that the Caps lock key is not stuck.

Replace the keyboard.

Verify that the Fn key is not stuck.

Attach an external keyboard.
You should disconnect a device from its power source before measuring resistance. If the device is connected to the power source, the multimeter might be damaged when you attempt to measure resistance.

You should not touch the black probe to ground when measuring resistance. Resistance is measured across a circuit, so you should touch the leads to each end of the circuit you are measuring. You touch the black probe to ground when measuring voltage.

You should not touch the red probe to ground when measuring resistance. You should touch the leads to each end of the circuit you are measuring.

You should not connect the device to a power source. You must connect the device to the power source when measuring voltage, but you should not do so when measuring resistance
You are using a multimeter to troubleshoot a problem with a circuit. What should you do before measuring resistance?

Touch the black probe to ground.

Disconnect the device from its power source.

Connect the device to a power source.

Touch the red probe to ground
It is important that you first upgrade your virus definitions and your virus scan engine before you run a virus scan. Doing so will ensure you are scanning for all currently known viruses and worms. If you do not update the virus definition files first, you may miss a new virus.

Creating an emergency anti-virus boot disk also needs to be done prior to the virus scan, but this step should be performed after upgrading the virus definitions.

It is not necessary to run the ScanDisk utility or to log out of the network before running a virus scan
What is the first step you should take before you run a virus scan?

Log out of the network.

Upgrade your virus definitions and virus testing engine.

Run the ScanDisk utility.

Create an emergency anti-virus boot disk.
Windows Security Center is installed with Windows XP Service Pack 2. It allows you to enable Windows Firewall, Automatic Updates, and the antivirus software you have installed. It also allows you to manage settings for these components.

Windows Security Center does not allow you to change a user's password. For that, you need to use the User Accounts utility or Local Users and Computers in Computer Management.

Windows Security Center does not allow you to encrypt a file. For that, you need to use Windows Explorer or the cipher command.

Windows Security Center does not allow you to create user accounts. For that, you need to use the User Accounts utility or Local Users and Computers in Computer Management
Which of the following can you do through Windows Security Center in Windows XP?

Enable Windows Firewall.

Change a user's password.

Encrypt a data file.

Create a user account.
You should use Msconfig, also known as the System Configuration Utility, to disable startup items. Msconfig allows you to select which items load at startup, including which .ini files are loaded and whether all, none, or only selected startup applications are loaded. Using Msconfig is a good way to troubleshoot problems related to startup or devices and applications that load at startup. You can also view which services are running.

You should not start the computer in Safe Mode. Safe Mode loads only the minimum drivers needed to run the operating system.

You should not remove all shortcuts from C:\Documents and Settings\All Users\Start Menu\Programs\Startup folder. While this is the folder that stores shortcuts to the applications that run at startup for any user who logs onto the computer, it does not contain the user-specific shortcuts. Also, it is best not to remove the shortcuts because you will just have to reconfigure them later. Also, some startup applications are not configured through the Startup folder. Instead, they are configured through the registry.

You should not start the computer in Safe Mode with Networking. Safe Mode with Networking loads only the minimum drivers needed to start the operating system and access the network.
You are troubleshooting a computer running Windows XP. You want to start the computer without launching specific startup applications. Aside from that change, you want the computer to boot normally.

What should you do?

Start the computer in Safe Mode.

Remove all shortcuts from the C:\Documents and Settings\All Users\Start Menu\Programs\Startup folder.

Start the computer in Safe Mode with Networking.

Use Msconfig to disable the startup applications
When a printer prints garbage or gibberish characters, you should first try printing a diagnostic test page. If the diagnostic test page prints correctly, it means that the problem is most likely the printer driver. It is the printer driver's responsibility to translate print commands sent by an application to a language the printer can understand. A corrupt or wrong driver will perform this task incorrectly, resulting in gibberish characters. The diagnostic test page is sent directly to the printer by the printer. It does not interface with the operating system, so it works even if there is not a driver installed.

Changing the toner cartridge will not resolve a problem with gibberish text. You would change the toner cartridge to correct a problem such as smudged characters or vertical white lines.

You should not replace the primary corona wire. The primary corona wire applies a uniform negative charge to the drum. If it was broken, it would not result in gibberish characters. Also, any problem caused by the primary corona wire would affect the diagnostic test page as well as any page sent from the operating system.

You do not need to clean the photosensitive drum. A dirty or scratched photosensitive drum can cause a mark on the paper that repeats at regular intervals. A dirty drum will not cause gibberish print. Also, any problem caused by a dirty drum will occur when the diagnostic test page is printed.
You are diagnosing a problem with a laser printer. The laser printer prints the diagnostic print page correctly. However, when a user attempts to print a document, gibberish characters are printed to the page.

What should you try next?

Clean the photosensitive drum.

Change the toner cartridge.

Replace the primary corona wire.

Reinstall the printer driver.
You should just finish the job and go buy the CD for yourself. You should not use a customer's personal belongings just because you were left unattended.

You should not put the CD in the customer's CD-ROM drive and turn the volume to low. Although the customer might not mind, it is rude to assume that you can use the customer's belongings.

You should not put the CD in the customer's CD-ROM drive and put on the headset. Some people do not like others touching their belongings, particularly something that might be considered unhygienic to share, like a headset.

You should not ask the customer if you can listen to the CD. The customer is busy with a client and will not be happy about being interrupted
A customer has left you alone in her office while she takes care of her client. You notice that she has a CD you have been anxious to hear.

What should you do?

Finish the job and go buy the CD.

Put the CD in the customer's CD-ROM drive and put on the headset.

Ask the customer if you can listen to the CD.

Put the CD in the customer's CD-ROM drive and turn the volume to low
The Basic Input/Output System (BIOS) program is required to enable a CPU to boot up and configure the system for use. The program is stored on a Read-Only Memory (ROM) chip. On older systems, the chip had to be replaced to update BIOS. Flash ROM chips allow a user to store a new BIOS program on the chip by running a DOS program and loading an update file. A Flash BIOS chip is technically called an EPROM (Erasable Programmable Read Only Memory) chip. Circuitry built into the motherboard permits erasing and installing a new BIOS image file.

If components are added for which the BIOS is not programmed, it is necessary to run the Flash ROM program and update the BIOS. A new, higher capacity hard drive is one component that often creates the need for BIOS updates. Physical memory and hard drive size can be configured in CMOS, though memory size is often auto-detected during the Power On Self Test (POST) memory count. CMOS is external to the BIOS and can be looked at as being memory for the BIOS. CMOS is also known as the RTC/NVRAM chip.

Modems, network adapters, DVD drives, and graphics adapters are peripheral devices, not system devices. They use the existing slots and the expansion bus to communicate with the system and do not require BIOS upgrades.
You are upgrading components in an older desktop computer so you can use it as a Linux server. The motherboard and BIOS are several years old.

Which component might require updating Flash ROM contents before the installation will work properly?

500 MB of physical SDRAM

56K modem

100Base-TX network adapter

500 GB hard drive

Graphics card for 1600 x 1200 display

DVD-ROM drive
The first step you should take is to shut down the computer. You should always shut down a computer before unplugging it to ensure that files are saved and closed properly.

There is no need to unplug the display from the power source. You are not working on the display; you are installing a new video adapter inside the computer's case.

You should disconnect the display from the computer, but only after you have shut down the computer. You should not disconnect a display while the computer is running.

You should unplug the computer, but only after you have shut down the computer
You are replacing a video adapter in a computer that is booted and running Windows Vista.

What is the first step you should take?

Disconnect the display from the computer.

Unplug the computer from the power source.

Unplug the display from the power source.

Shut down the computer.
You should first restore the full backup taken on Friday. Next you should restore each incremental backup in order. An incremental backup backs up all data that has changed since the last backup and resets the Archive flag on the files. The Archive flag determines whether the file needs to be backed up.

You should not restore Tuesday and then Wednesday. A system state backup does not back up user data. Therefore, restoring the Tuesday backup will not serve as a base for installing incremental data backups.

You should not install Friday and then Wednesday. An incremental backup backs up only the information that has changed since the last full, differential, or incremental backup. Therefore, the Wednesday backup will only back up files that have changed since Monday.

There is no need to restore the Tuesday backup. Any changes that were reflected in the Tuesday backup will also be reflected in the Wednesday backup. Also, you should restore incremental backups in the order in which they are taken.
A user's computer performs scheduled backups that back up the data to a network server on the following schedule:

Full backup: Friday
Incremental backup: Monday, Wednesday
System state backup: Tuesday, Thursday

Backups are performed in the evening. The hard disk fails on Thursday afternoon.

Which backup or backups should you restore?

Friday, Wednesday, Tuesday, Monday

Friday, Monday, Wednesday

Tuesday, Wednesday

Friday, Wednesday
One way to resolve the problem is to move the paging file to the second hard disk. The paging file is used to swap data in and out of physical Random Access Memory (RAM). When performance is poor and there is a lot of disk access, the most likely problem is memory. You can either add more RAM or optimize the paging file. One way to optimize the paging file is to move it to a different hard disk than the one where the operating system is installed.

If the budget allows, you can also resolve the problem by increasing physical RAM. Doing so will cause the computer to rely less on the paging file.

Reinstalling the operating system on the second hard disk will not resolve the problem. The paging file is created on the same hard disk as the one where the operating system is installed by default.

You cannot configure the hard disks in a striped volume. The system and boot partitions must be located on a simple volume. They cannot be located on a striped volume.

Moving the user's My Documents folder to the second hard disk will not resolve the problem. The problem is caused by memory consumption. Moving the My Documents folder to the second hard disk might improve file access times for documents in the My Documents folder, but it will not resolve the problem the user is having.
A user's computer has two hard disks. The operating system and all applications are installed on the first hard disk. The second hard disk is used only to store backups of critical files. The computer is running Windows XP Professional.

The user reports that the system is slow when accessing certain applications. You launch the application and discover that there is a lot of disk access when running certain tasks. You use Task Manager and notice that the application is using a lot of memory.

What can you do to optimize performance? (Select TWO.)

Move the paging file to the second hard disk.

Move the user's My Documents folder to the second hard disk.

Reinstall the operating system on the second hard disk.

Add more RAM to the computer.

Configure the hard disks in a striped (RAID 0) volume
You should restore the Sunday backup, then the Wednesday backup. A differential backup backs up all data that has changed since the last full backup. Therefore, you only need to restore the last full backup and the most recent differential backup.

You cannot restore the data using only the Sunday backup. If you only restore the Sunday backup, all data changed since the Sunday night will be lost.

You cannot restore the data using only the Wednesday backup. You must restore the full backup before you can restore the differential backup.

You do not need to restore the Sunday, Monday, Tuesday, and Wednesday backups. If the weekday backups were incremental backups, you would need to take these steps. However, since they are differential backups, they include all data changed since the last full backup
A customer's computer stores accounting and sales data that is backed up according to the following schedule:

Full backup Sunday night
Differential backup Monday-Friday nights

The hard disk fails on Thursday morning.

What must you do to restore the data in the least amount of time?

Restore the Sunday backup.
Restore the Monday backup.
Restore the Tuesday backup.
Restore the Wednesday backup.

Restore the Sunday backup.

Restore the Sunday backup.
Restore the Wednesday backup.

Restore the Wednesday backup
Enable VGA Mode is used when the video setting is such that you cannot see the screen well enough to fix a bad setting. This can happen if a user creates a desktop with black fonts on a black background, or something similar to that. Booting in this mode gives you very plain VGA video display but allows you to change the settings in the Display properties.

The Enable Boot Logging option allows the system to boot normally while recording all files loaded during the boot process. The log is recorded in a file named NTBTLOG.TXT. The log will identify which drivers loaded and which failed. This is especially helpful if you have a copy of the NTBTLOG.TXT file that was created before there was a problem. You then could compare them to see what has changed.

Debugging Mode gives you the opportunity to move system boot logs from the failing computer to another computer for evaluation. To use this mode, you first must connect the failing computer to another computer using a serial cable. You then can review the boot logs on a functioning computer.

The Recovery Console does not start the graphical interface, but it does allow you to access any FAT16, FAT32, and NTFS file systems. The purpose of the Recovery Console is to allow you to repair a damaged registry, system files, or file system on the hard drive
Your neighbor's children were playing games on your Windows XP computer and in the process managed to modify the display settings to use white letters on a white background. Now all you can see on the Windows desktop are icons without titles, and all dialog boxes have no visible text.

What would be the best startup option to correct this problem?

Debugging Mode

Enable Boot Logging

Enable VGA Mode

Recovery Console
To connect using Remote Assistance, the user must send you an invitation through e-mail, as a file, or through Windows Messenger. Or, if the computer is configured to allow an offer of remote assistance, the expert can offer remote assistance. However, the user still needs to accept it. Remote Assistance allows you to share a desktop session with a user. If the user who issued the invitation agrees, you can also take control of the session to perform tasks.

Remote Desktop is different from Remote Assistance. Remote Desktop allows you to connect to a computer as though you were logged on interactively. You do not need an invitation, but Remote Desktop does need to be enabled on the remote computer and you need to be a member of either the Remote Desktop Users group or the Administrators group on the user's computer.

You do not need to enable Remote Desktop on your computer. Remote Desktop must be enabled at the remote computer to connect using Remote Desktop. It does not need to be enabled for Remote Assistance.

You do not need to be a member of the Remote Desktop Users group. You only need to have an invitation to connect using Remote Assistance
You are troubleshooting a problem on a user's computer at a different location. You want to connect remotely using remote assistance.

What is required?

Remote Desktop must be enabled on your computer.

Remote Desktop must be enabled on the user's computer.

The user must send you an invitation or accept your offer of remote assistance.

You must be a member of the Remote Desktop Users group on the user's computer.
Before installing the new memory modules, the system should be turned off and unplugged so it does not accidentally start when you are installing the modules. Unplugging the system also cuts off the small amount of current that flows even when the system is turned off.

You should also use an antistatic strap to discharge any static prior to touching the modules. ESD (Electrostatic Discharge) must be prevented because it can cause the failure of the new modules.

Washing your hands, shutting down and unplugging the monitor, and cleaning the motherboard are unnecessary steps and would have no effect on the outcome of the job.
Before installing new memory modules in your computer, what precautions should you take prior to removing the new modules from the bag and installing them? (Select TWO.)

Wash your hands.

Shut down and unplug the monitor.

Put on an antistatic wrist strap and clip it to a chassis ground connection.

Shutdown the PC and unplug the power cord.

Clean the motherboard with an approved cleaner
A solid battery status indicator light indicates that the battery is being charged.

A battery status indicator light that is alternating between two colors indicates that the battery is too hot to charge.

A blinking battery status indicator light indicates that the laptop is hibernating.

An off battery status indicator light indicates that the laptop is turned off or not receiving power
How can you tell whether a laptop battery is charging on a Dell laptop computer?

The battery status indicator light on the laptop will be alternating between two colors.

The battery status indicator light on the laptop will be blinking.

The battery status indicator light on the laptop will be a solid color.

The battery status indicator light on the laptop will be off.
You can gather all that information from System Summary in the System Information utility (MSInfo32.exe). The System Information utility allows you to view a lot of information about the computer, including general statistics such as the amount of memory installed, the size of the paging file, the amount of physical RAM currently committed, and the processor type and speed.

The System Control Panel utility General tab reports the amount of RAM installed. The Advanced tab allows you to access virtual memory settings that report the current size of the paging file. This is also where you change virtual memory settings. However, it does not report the amount of RAM currently being used.

Task Manager allows you to gather information about the amount of RAM installed and the amount of RAM currently committed (in use). It does not provide the size of the paging file. However, it does report information about paging file usage. This is not the size of the paging file, but how much data is currently stored in the paging file. You can also see how much virtual memory is being used by each process.

Msconfig allows you to configure startup options for troubleshooting. It is not used to view current performance statistics.
A user reports memory errors. Which utility will allow you to determine how much physical memory is installed, how much is currently being used, and the size of the paging file on a computer running Windows XP?

Msconfig

Task Manager

System Control Panel utility

System Information utility
When installing a copper-wire network media, such as shielded twisted pair, you should install it in a dedicated conduit that runs through the walls and avoids electrical motors and devices such as air conditioning units. This will help protect it against electromagnetic interference (EMI).

You should not use the same conduit as for the phone lines. Phone lines are also copper wires and there might be crosstalk generated between the two sets of wires.

Taping the cable along the bottom of the walls is not your best solution. Other electrical devices might be placed next to the walls and can interfere with the network cable. Also, the network cable might be subject to other environmental hazards like being chewed by mice or pets.

You should not change the incandescent lighting to fluorescent lighting. Fluorescent lighting can create EMI.
How can you protect a shielded twisted pair network cable from electromagnetic interference?

Tape the cable along the bottom of the walls.

Create a dedicated conduit for it through the walls and ceiling.

Use the same conduit as for the phone lines.

Change incandescent lighting to fluorescent lighting.
The problem is most likely caused by a faulty AC adapter because the battery did not charge even though the adapter was plugged into the electrical socket and the laptop did not power up when you tried a different electrical socket. If the AC adapter was working, when you plugged it into a different socket, the light would be a solid alternate color to indicate that the battery was being charged. A laptop's AC adapter has a specific amperage and voltage that must be matched. If the amperage and voltage do not match, you could damage the circuit board.

You should not remove the battery and plug in the computer using the same AC adapter. The problem is most likely the AC adapter. Also, some laptops will not power up when the battery is removed because the battery is necessary to complete the circuit.

You should not plug in the laptop using an AC adapter with higher voltage. The AC adapter must have the same voltage as the one that shipped with the laptop.

You should not plug in the laptop using an AC adapter with higher amperage. The AC adapter must have the same amperage as the one that shipped with the laptop.
George reports that his laptop will not power up. He says that he received a warning that the battery was low before the computer powered off. The laptop was plugged in to a wall socket. You plug the laptop into a different wall socket and no power light comes on.

What should you try next?

Remove the battery and plug in the computer using the same AC adapter.

Plug in the computer using a working AC adapter with higher voltage.

Plug in the computer using a working AC adapter with higher amperage.

Plug in the computer using a working AC adapter with the same amperage and voltage
You should use a damp soft cloth and wipe from the center to the outer edge. Doing so will remove the dust without damaging the DVD-ROM. Special lint-free cloths are available for cleaning LCD monitors and camera lenses. This cloth is extra soft, so it is also a good choice for cleaning CDs and DVDs.

You should not wipe in a circular motion. Doing so could scratch the disc.

You should not use furniture polish. Doing so will leave a film on the disc.
How should you clean a dusty DVD-ROM?

Use a damp soft cloth and wipe from the center to the outer edge.

Use a damp soft cloth and wipe in a circular motion.

Use furniture polish on a soft cloth and wipe from the center to the outer edge.

Use furniture polish on a soft cloth and wipe in a circular motion.
TWAIN is a specification for an interface that allows a scanner to be controlled by any TWAIN-compliant application, instead of just by the software included with the scanner.

TWAIN is not a standard for allowing a computer to support two or more active input devices. Windows XP can support multiple active input devices by default.

TWAIN is not a standard for bidirectional communication between a computer and a printer. One standard that defines bidirectional communication between a computer and a printer is IEEE 1284 ECP/EPP.

TWAIN is not a specification that allows a computer to support two display devices. When the computer is a laptop computer, multiple display devices are supported by DualView. When the computer is a desktop computer, additional support is built into Windows XP that allows you to change the primary monitor
What is TWAIN?

A specification for allowing bidirectional communication between a computer and a printer.

A specification for an interface supported by scanners to allow them to be controlled by third-party applications, such as Adobe Photoshop.

A specification for allowing a computer to support two or more active input devices.

A specification that allows a computer to support two display devices
ATTRIB.EXE is a command prompt program that is used to display, add, or change file attributes. You can type ATTRIB +R INFO.TXT to add the Read-Only attribute to the file. In order to edit or delete the file, the Read-Only attribute must be removed using the command ATTRIB -R INFO.TXT. This will not absolutely prevent someone from editing or deleting the file, but extra steps are required to do it.

Other attributes include the following:

* A (Archive): used by backup programs to indicate which files have been changed since the last backup.
* H (Hidden): used to keep a file name from being displayed with the DIR command.
* S (System): designates a file critical to the system startup and operation.

CONFIG.SYS is the DOS system file that contains hardware/driver information and environment settings.

MSDOS.SYS is one of the hidden, necessary files that must be on a boot disk for DOS to initialize.

REGEDIT.EXE is the Windows Registry Information Editor. It makes it easier to edit the keys and entries in the Windows registry.
You want to create a text file. You create the file with a text editor and save it as INFO.TXT.

You want the file to be easily accessible so that anyone can read it, but you want to protect the file so that it cannot be easily edited or deleted.

Which file or utility can you use to do this?

MSDOS.SYS

ATTRIB.EXE

CONFIG.SYS

REGEDIT.EXE
You should use the Services utility. The Services utility allows you to manage Windows services, including starting, stopping, pausing, disabling, and configuring their log properties. In this case, you need to locate the service on which the application depends and configure it to start automatically when the computer restarts. To prevent a restart now, you can start the service manually. If the error message does not provide enough information for you to know which service is not running, you can use Event Viewer to look for an error or warning. Operating system errors are logged to the System log. Application errors are logged to the event log.

The MSConfig utility (also called the System Configuration Utility) allows you to view which services are running and which are stopped. However, it does not allow you to modify their configuration or start or stop them. One useful feature is that MSConfig allows you to filter the services displayed to only non-Microsoft services, which can help you identify malicious programs that are loaded as Windows services.

You cannot resolve the problem using Add or Remove Programs. Add or Remove Programs allows you to install programs, but it does not allow you to configure services.

You cannot resolve the problem by using the Program Compatibility Wizard. The Program Compatibility Wizard allows you to specify backwards compatibility settings for legacy applications. It does not allow you to manage Window services.
You install an application that includes a Windows service. When you restart the computer, you receive the message that the application cannot load because a service it depends on is not running.

Which utility should you use to correct the problem?

Services

Add or Remove Programs

Program Compatibility Wizard

MSConfig
Nslookup is a TCP/IP utility that allows a user to perform a manual Domain Name System (DNS) query of any DNS database. You would use this to verify that DNS name resolution is functioning properly.

Winipcfg is a graphical utility found in Windows 9x that allows you to get information about your IP configuration. It also allows you to release a Dynamic Host Configuration Protocol (DHCP) lease and request a new one.

Ipconfig does the same thing as winipcfg, but for Windows NT/2000/XP. Ipconfig can only be run from the command line.

Tracert is a utility that allows you to trace the path information takes to get from one machine to another as it moves from network to network.
Which TCP/IP utility allows a user to perform a manual DNS query of any DNS database?

tracert

winipcfg

ipconfig

nslookup
You should use a cable modem. Most cable TV operators provide high-bandwidth Internet access. A standard cable TV coaxial cable is used as the signal carrier, and the only additional customer equipment is a cable modem. Data rates vary by provider and service contract and range from 1 megabits per second (Mbps) to 10 Mbps.

One drawback is that cable modem access is available only in areas with cable TV service. Other SOHO options include satellite and digital subscriber line (DSL).

Satellite requires a small satellite dish and receiver similar to satellite TV. Subscribers can lose Internet access during inclement weather. The upload speed is usually significantly slower than the download speed. Some satellite systems also require a dedicated computer to control access from the customer end.

DSL is provided by the local telephone provider through analog telephone lines. Asymmetric DSL (ADSL), the most common implementation, requires a modem at the customer location and typically does not require any other special equipment. Data rates are typically lower than cable modem, as low as 256 kilobits per second (Kbps), depending on the service type and the distance from the telephone company office equipment. As with satellite service, upload is slower than download. Two other DSL options, symmetric DSL (SDSL) and very high speed DSL (VDSL) are typically not available for home use. There are no generally accepted standards for SDSL, and service varies depending on the equipment that is used, but it is typically the same as ADSL except that the same bandwidth is provided for both upload and download. VDSL is available in very limited geographic areas and generally considered prohibitively expensive for SOHO use. Bandwidth can be as high as 50 Mbps, with 20 Mbps being typical.

You should not use a T1 or T3 line in this situation. The cost would be prohibitive for SOHO implementations, and specialized equipment is required to connect to the circuit. Also, the service is not available in all areas. Bandwidth for T1 in the United States is 1.536 Mbps for concurrent upload and download. T3 bandwidth in the United States is up to 44.736 Mpbs.

You should not use ISDN. Home office ISDN is typically implemented as ISDN Basic Rate Interface (BRI). ISDN BRI supports a data transmission bandwidth of 128 Kbps. An ISDN BRI includes two B-channels (each supporting 64 Kbps) that can carry data, voice, and other services. The ISDN BRI also includes one 16 Kbps D-channel that carries control and signaling information. The bandwidth is less than cable modem, the cost is higher, and special equipment is required at the customer location.
You are setting up a home office and need broadband Internet access. You need to keep the costs and additional equipment required to a minimum.

What WAN technology should you use?

T1 line

Cable modem

T3 line

ISDN
The following actions would improve security for the WLAN and help to prevent unauthorized access:

* Implementing data encryption for transmissions
* Implementing MAC filtering

Implementing Wi-Fi Protected Access (WPA) would protect the data as it is transmitted over the WLAN. MAC filtering allows you to configure a list of clients that can access the wireless network. Each network adapter has a unique MAC address that can be used to determine if the client should be allowed network access. When MAC filtering is enabled, the wireless access point (WAP) or router compares the MAC address of the client requesting a connection to the network against the configured list of allowed clients.

Setting a BIOS password would not improve security for the WLAN. A User password can be set in the BIOS settings to require user authentication before booting the computer. You can also set a Supervisor password to control users who are able to access and modify the BIOS settings. This would protect a computer, but not the WLAN.

Installing additional access points would not improve security for the WLAN. This would make the WLAN more available, but it would not prevent unauthorized access.

Broadcasting the SSID would not improve security for the WLAN. Each 802.11 WLAN has a Service Set Identifier (SSID) that identifies it. Unless SSID broadcasting is disabled, the SSID of the WLAN is broadcast in clear text to all client devices that are within range. If you disable SSID broadcasting, client devices will be required to explicitly specify the SSID to connect
You are installing a wireless network. Which actions would improve security for the WLAN and help to prevent unauthorized access? (Choose two.)

Installing additional access points

Setting a BIOS password

Broadcasting the SSID

Implementing MAC filtering

Implementing WPA
Internet Message Access Protocol (IMAP) is an e-mail protocol that allows users to access messages from an e-mail server, such as one running Microsoft Exchange. Instead of sending all messages in a stream like Post Office Protocol (POP3) does, it allows users to browse through their messages and select the ones they want to download.

IMAP allows users to receive e-mail, but not to send it. IMAP is used in conjunction with Simple Mail Transport Protocol (SMTP). SMTP is responsible for sending e-mail.

IMAP is not a protocol that allows real-time messaging. Real-time messaging (instant messaging) is provided by services like Windows Messenger. Instant messaging uses a number of protocols and ports.

IMAP is not an authentication protocol.
What is IMAP?

A protocol that allows real-time messaging.

A protocol that authenticates users who are sending e-mail.

An e-mail protocol that allows users to send but not receive messages.

An e-mail protocol that allows users to selectively download messages
The ping utility (for example, ping 208.160.120.17) is used to send test data packets to verify connectivity to another computer using ICMP. The Internet Control Message Protocol (ICMP) is part of the TCP/IP suite of protocols. It is an error-reporting protocol. Ping sends an ICMP Echo Request to a target name (like computer2) or IP address. The resulting ICMP Echo Reply verifies that a TCP/IP configuration is set up properly and that the destination host is online and connected to the network. You can use ping with the -t option to send ping requests to the target until you manually stop the command.

Tracert is also a TCP/IP utility. It uses ICMP echo requests to trace the route a data packet takes to its destination. The tracert command displays the hop count (also called the metric, the number of routers the signal must pass through to get to the destination), the time each hop takes (in milliseconds), the name of the computer or router passed through (optional), and the IP address of each router in the hop. Tracert works with IP addresses, host names, and domain names. Like ping, tracert can verify a system is online, but that is not its primary purpose.

FTP (File Transfer Protocol) is a utility program that allows the bi-directional transfer (uploading and downloading) of files between two networked hosts. A small FTP client program runs on the remote computer and accesses a larger FTP server running on a host. FTP is not used to verify that another system is online.

The telnet utility allows a computer to connect to a UNIX host by emulating a terminal (such as a DEC VT100) and establishing a remote command-line window. Telnet is not used to verify that another system is online.
Which utility is used to verify that another computer is online and connected to the network?

telnet

ftp

tracert

ping
You would use the nslookup command to confirm that Domain Name System (DNS) name resolution is working correctly. The nslookup command allows you to troubleshoot various DNS issues.

You would not use the nslookup command to restore missing system files. To restore missing system files, you would use the Windows Recovery Environment (WindowsRE) or the SCF.exe command-line utility.

You would not use the nslookup command to fix a corrupt master boot record (MBR). To correct a corrupt MBR, you would use the Bootrec.exe command-line utility.

You would not use the nslookup command to trace the path packets take to reach a specified destination. To perform this task, you would use the tracert.exe command-line utility
For what purpose would you use the nslookup command?

To trace the path packets take to reach a specified destination

To restore missing system files

To fix a corrupt MBR

To confirm that DNS name resolution is working correctly
The most likely cause of the problem is that the cleaning blade is broken. The cleaning blade removes excess toner from the drum before the image for the next page is moved to the drum. When the blade is not functioning, the excess toner produces a dim, ghosted image of the previous page. On many laser printers, you replace the cleaning blade by replacing the toner cartridge. Another cause of ghosting could be bad erasure lamps. Erasure lamps remove the charge from the drum before the image of the next page is placed on the drum.

A bad fuser assembly causes smeared printouts. A fuser assembly is the component on a laser printer that heats the toner and makes it adhere to the page.

A bad transfer corona assembly would cause blank pages. The transfer corona assembly transfers the image from the drum to the paper. If the image does not get transferred, there is nothing on the page to attract the toner particles.

Bad printhead alignment causes lines in printouts on inkjet printers. When you have lines in your printouts or often when you change ink cartridges, you need to align the printheads using the software that came with the printer.
Users of a laser printer report that the printer is producing dim, ghosted images of previous pages on their printouts.

What is the most likely cause of the problem?

Bad printhead alignment

A broken cleaning blade

A bad transfer corona assembly

A bad fuser assembly
You might use MSInfo32.exe to do one of the following:

* To run the DirectX Diagnostic tool
* To view device drivers that were previously installed

The System Information utility (MSInfo32.exe) allows you to view information about the computer. When you run MSInfo32.exe, an overview of the information available is as follows:

* System Summary - Provides general system information, such as the amount of memory installed, the size of the paging file, the amount of physical RAM currently committed, the BIOS version, and the processor type and speed
* Hardware Resources - Provides information about the resources used by hardware on the system
* Components - Provides information about the components connected to the system
* Software Environment - Provides information about installed drivers, environment variable settings, running tasks and services, and programs that load at startup
* Applications - Provides information about configuration settings for specific applications
* Internet Explorer - Provides information about current Internet Explorer settings, such as the security level for each Web content zone and whether Content Advisor is enabled

You can run the DirectX Diagnostic tool (DXDiag) by selecting DirectX Diagnostic Tool from the Tools menu. You can see device drivers previously installed by selecting System History from the View menu. You can also access System Information from the Start menu by selecting Programs > Accessories > System Tools.

You would not use MSInfo32.exe to create a hard drive partition. You would use the Diskpart.exe command-line utility or the Disk Management snap-in.

You would not use MSInfo32.exe to install new device drivers. Although you can view device drivers, you cannot install new ones. To install new device drivers, you would use Device Manager.

You would not use MSInfo32.exe to convert a basic disk to a dynamic disk. To convert a basic disk to a dynamic disk, you would use the Convert.exe command-line utility or the Disk Management snap-in.
You are running Windows XP Professional. You run MSInfo32.exe. For what purpose might you run this command? (Choose two.)

To run the DirectX Diagnostic tool

To convert a basic disk to a dynamic disk

To create a hard drive partition

To view device drivers that were previously installed

To install new device drivers
The problem is most likely caused by a faulty AC adapter because the battery did not charge even though the adapter was plugged into the electrical socket and the laptop did not power up when you tried a different electrical socket. If the AC adapter was working, when you plugged it into a different socket, the light would be a solid alternate color to indicate that the battery was being charged. A laptop's AC adapter has a specific amperage and voltage that must be matched. If the amperage and voltage do not match, you could damage the circuit board.

You should not remove the battery and plug in the computer using the same AC adapter. The problem is most likely the AC adapter. Also, some laptops will not power up when the battery is removed because the battery is necessary to complete the circuit.

You should not plug in the laptop using an AC adapter with higher voltage. The AC adapter must have the same voltage as the one that shipped with the laptop.

You should not plug in the laptop using an AC adapter with higher amperage. The AC adapter must have the same amperage as the one that shipped with the laptop.
George reports that his laptop will not power up. He says that he received a warning that the battery was low before the computer powered off. The laptop was plugged in to a wall socket. You plug the laptop into a different wall socket and no power light comes on.

What should you try next?

Plug in the computer using a working AC adapter with the same amperage and voltage.

Remove the battery and plug in the computer using the same AC adapter.

Plug in the computer using a working AC adapter with higher amperage.

Plug in the computer using a working AC adapter with higher voltage.
You should use Computer Management to customize the Indexing Service. The Windows Indexing Service runs in the background and automatically updates an index each a time a file is accessed or modified. This index is used when performing advanced searches to speed up the search process. Shared folders on other computers are also periodically searched to update the index. The Indexing Service uses significant processor and memory if there are large shares. You can configure the Indexing Service so that it only scans specific folders to reduce the resources it consumes. You can do so selecting Indexing Service > System > Directories in Computer Management under Control Panel.

You should not run Disk Cleanup. Disk Cleanup is a utility that is used to free up disk space occupied by files that are no longer needed. It is a good maintenance practice to periodically run Disk Cleanup.

You should not run Scandisk. Scandisk was used in earlier Windows versions, but it is not available with Windows XP.

You should not disable User Account Control (UAC). UAC is a Windows Vista feature that prevents unauthorized system changes. UAC allows users to operate by default with reduced permissions. Then, users are prompted for administrator credentials if additional permissions are needed.
You are running Windows XP on a computer connected to your network. You have started the Indexing Service to improve search functionality. There are many large shared folders on other computers, and your computer is now running extremely slowly.

What should you do?

Disable UAC.

Use Computer Management to customize the Indexing Service.

Run Disk Cleanup.

Run a Scandisk.
The inverter stores and converts AC power for the backlight behind the LCD screen. It needs to be handled carefully to avoid electrical shock. When an inverter fails, the LCD screen becomes very difficult to read because the backlight no longer functions. A technician needs to exercise caution when replacing an inverter.

The LCD screen does not contain any components that can cause electrical shock injuries. The inverter is a separate component that provides power to the backlight.

A small outline dual-inline memory module (SO-DIMM) is a type of memory module used in most laptops. It does not retain an electrical charge.

Serial ATA (SATA) hard disk drives do not retain an electrical charge.
Which of the following laptop components can store an electrical charge and must be handled with care to avoid injury?

LCD screen

SO-DIMMs

Inverter

SATA hard disk drive
The copy command copies all files in the current or specified directory to a target drive and/or directory. The xcopy command copies all files in the current or specified directory, and all files and subdirectories below it, to a target drive and/or directory. The xcopy command can be used to copy the entire contents of one drive onto another drive.

If you want to copy all files from C: drive to D: drive the command would be:

xcopy C:\*.* D:\..py C:\*.* D:\*.* /S

The fdisk utility can create or remove partitions and set the active partition on a hard disk.

The setup utility in DOS or Windows is used to install the operating system onto the active partition.

The scandisk.exe utility is used to find and correct problems such as lost clusters (pieces of files that have been disassociated from the parent file) on a hard disk. It can also detect bad sectors on a disk, try to recover any data contained in bad sectors, and "lock out" the bad areas from future use.

SFC (System File Checker) locates damaged operating system files. After it locates the damaged files, it asks you to replace files that do not originally come with Windows.
You want to copy the contents of a fixed hard disk to a removable hard disk for backup.

Which command can copy all files, directories, and subdirectories to another disk all at once?

scandisk

xcopy

fdisk

copy

sfc

setup
You should reconfigure the network to use Wi-Fi Protected Access (WPA). Wireless equivalent privacy (WEP) uses the RC4 stream cipher for encryption and is considered an inherently weak encryption system. Several programs are available that enable a hacker to crack the encryption. For 40-bit key configurations, encryption can be broken in as little as three minutes by an experienced hacker. WPA is a more secure encryption system and requires external authentication rather than having to rely on a shared key, although WPA can be configured to use a shared key. If the newer WPA2 is available, you should use it because it is more secure than WPA.

Disabling service set identifier (SSID) broadcast does nothing to improve data encryption. An access point (AP) uses SSID to announce itself to the network so that clients can discover available APs. Disabling SSID does help prevent some wireless threats, such as war driving, which is searching for unsecured APs as a way to access networks. However, this is only effective against the most casual attempts. Dedicated utilities are available that enable hackers to locate APs, even when they do not broadcast their SSIDs.

Media access control (MAC) address filtering does not affect data encryption. It does help somewhat in securing access to the network because only those computers whose MAC addresses are listed with an AP are allowed access. However, it is relatively easy for a hacker to spoof a MAC address, thus gaining access to the network.

Because the key can be broken so quickly, changing the WEP shared key each week does little to secure data encryption. This also makes management more difficult because the key must also be changed at each client.
Your wireless network is secured using WEP. You need to improve data encryption to minimize the chance that data transmissions might be compromised.

What should you do?

Change the WEP shared key each week.

Reconfigure the network to use WPA.

Disable SSID broadcast on all access points.

Implement MAC address filtering
When determining where the router should be located, you should consider interference from electrical sources. This outside interference can be minimized by not placing the router near uninterruptable power supplies, microwaves, or other electrical devices. In addition, you should avoid placing the router in locations with thick walls, such as basements, and try to place them in a centralized location. This will provide better access for your wireless users.

You do not need to consider whether port forwarding will be used when choosing a location for your router. Port forwarding is used to forward a network port to an internal IP address/port. It would not be a factor in choosing a physical location for the wireless router.

You do not need to consider whether port triggering will be used when choosing a location for your router. Port triggering allows you special outgoing ports that are used by specific applications. It would not be a factor in choosing a physical location for the wireless router.

You do not need to consider the number of user connections that will be needed. This might be important to provide maximum bandwidth to users, but not in choosing a physical location for the wireless router.
You are configuring a SOHO network that allows wireless connections. You need to determine where the wireless router should be placed.

What should you consider?

The number of user connections that will be needed

Interference from electrical sources

Whether port triggering will be used

Whether port forwarding will be used
User Account Control (UAC) is a Windows Vista feature that prevents unauthorized system changes. UAC allows users to operate by default with reduced permissions. Then, users are prompted for administrator credentials if additional permissions are needed. By default, standard users cannot install applications, and a user is prompted for administrator credentials to do so.

Windows Firewall is used to open or block ports and allow or deny specific network traffic.

Event Viewer is used to view entries written to the System, Application, and Security logs.

Sidebar settings control functionality of the Sidebar, which contains gadgets. Gadgets are small applications that provide specialized functionality, such as displaying a clock or weather information. In Windows Vista, the Sidebar is displayed on the right side of the screen by default. Windows Vista ships with some gadgets, but others providing additional functionality can be downloaded.
Which Windows Vista component minimizes the likelihood that unauthorized applications will be installed?

Event Viewer

UAC

Sidebar settings

Windows Firewall
When a laser printer prints pages with vertical white lines, it usually means that the toner cartridge is clogged so toner is not being distributed evenly. The first thing to try is to shake the toner cartridge to try to remove the clog.

You can also run a printer test pattern from the printer's Properties box to determine what the problem is. If shaking the toner cartridge or running the test pattern does not resolve the issue, replace the toner cartridge.

The problem is probably not caused by a dirty photosensitive drum. A dirty or scratched photosensitive drum can cause a mark on the paper that repeats at regular intervals. A dirty drum will not normally cause white vertical lines.

You should not replace the fuser assembly. A problem with the fuser assembly would generally result in smudges or blotches on the page. It is not the first thing to check when diagnosing white lines on the page.

The problem is most likely not related to the printer driver. The printer driver is responsible for translating application and operating system commands to a language the printer can understand. Vertical white lines are caused by an ink distribution problem, not a translation problem
You are diagnosing a problem with a laser printer. When the laser printer prints, each page has white vertical lines running down it.

What two techniques should you try first? (Choose two.)

Reinstall the printer driver.

Run a printer test pattern.

Shake the toner cartridge.

Replace the fuser assembly.

Clean the photosensitive drum.
When a printer prints garbage or gibberish characters, you should first try printing a diagnostic test page. If the diagnostic test page prints correctly, it means that the problem is most likely the printer driver. It is the printer driver's responsibility to translate print commands sent by an application to a language the printer can understand. A corrupt or wrong driver will perform this task incorrectly, resulting in gibberish characters. The diagnostic test page is sent directly to the printer by the printer. It does not interface with the operating system, so it works even if there is not a driver installed.

Changing the toner cartridge will not resolve a problem with gibberish text. You would change the toner cartridge to correct a problem such as smudged characters or vertical white lines.

You should not replace the primary corona wire. The primary corona wire applies a uniform negative charge to the drum. If it was broken, it would not result in gibberish characters. Also, any problem caused by the primary corona wire would affect the diagnostic test page as well as any page sent from the operating system.

You do not need to clean the photosensitive drum. A dirty or scratched photosensitive drum can cause a mark on the paper that repeats at regular intervals. A dirty drum will not cause gibberish print. Also, any problem caused by a dirty drum will occur when the diagnostic test page is printed
You are diagnosing a problem with a laser printer. The laser printer prints the diagnostic print page correctly. However, when a user attempts to print a document, gibberish characters are printed to the page.

What should you try next?

Clean the photosensitive drum.

Replace the primary corona wire.

Change the toner cartridge.

Reinstall the printer driver
You should use a power supply tester if you have one available. A power supply tester is a specialized device that plugs into the various outputs of a power supply to test them. You can also use a multimeter, which is a more general electronics testing device that measures voltage, current, and resistance.

You should not use a cable tester. A cable tester tests a cable for connections and shorts.

You should not use a loopback plug, which is also known as a loopback adapter. A loopback plug is a device that is plugged into a port or interface to perform loopback tests in which the signal coming out of the port or interface is directed back to the device.
You suspect that the power supply on a computer is not working properly.

What tools should you use? (Choose two.)

Power supply tester

Loopback plug

Cable tester

Multimeter
You should modify the NTFS permissions for the PayrollAudit folder. You could grant the List Folder Contents permission to the ExecAdmin group and grant the Full Control permission to the Auditors group.

You should not modify the NTFS permissions for the PayrollAudit folder and any subfolders it contains. Any subfolders in the PayrollAudit folder will inherit the permissions of the PayrollAudit parent folder, so there is no need to modify the NTFS permissions for the subfolders.

You should not modify the share permissions for the PayrollAudit folder or for the PayrollAudit folder and any subfolders it contains. The only options you have with share permissions are Read, Change, and Full Control. These do not give you the ability to allow members of the ExecAdmin group to view the names of folders and files within the PayrollAudit folder, but not allow access.
You manage a server on the network named Server1. You have a folder shared on the network named PayrollAudit that is on an NTFS-formatted partition.

Members of the ExecAdmin group need to be able to view the names of the files and folders within the PayrollAudit folder, but only members of the Auditors group should be able to access the contents of files in the folder, including any subfolders it contains. No other user accounts should be able to see the PayrollAudit folder.

What should you do?

Modify the share permissions for the PayrollAudit folder.

Modify the share permissions for the PayrollAudit folder and any subfolders it contains.

Modify the NTFS permissions for the PayrollAudit folder and any subfolders it contains.

Modify the NTFS permissions for the PayrollAudit folder
You should disable all USB ports in the system BIOS and then password protect the system BIOS. With floppy disk and CD/DVD unavailable, the only practical course is to use USB devices such as flash drives or portable hard disks to remove data. You can prevent this by disabling the USB ports. You need to password protect the BIOS to prevent users from enabling the ports.

You should not disable hard disk discovery in the system BIOS. This does nothing to solve the problem and makes it more difficult when replacing a failing hard disk.

There is no reason to flash the system BIOS. Flashing is the method used to update the BIOS. It is typically not necessary unless BIOS problems are discovered or if a newer version is required to support an upgrade, such as a new operating system version.
You should not disable onboard disk controllers in the system BIOS. This would prevent internal hard disks from working.

You should not remove the system BIOS. The BIOS contains programs required for a computer system to start and run.
You are looking for ways to prevent users from removing data from their computer systems. You have disabled all floppy disk drives, and the computers are configured with read-only CD/DVD players.

What else should you do? (Choose two.)

Disable hard disk discovery in the system BIOS.

Disable onboard disk controllers in the system BIOS.

Flash the system BIOS.

Disable all USB ports in the system BIOS.

Password protect the system BIOS
Device Manager enables you to perform tasks such as identifying installed ports, updating device drivers, and changing I/O settings.

If Device Manager displays a red "X" over the icon for a device, then the device has been disabled. In Windows Vista a disabled device has a down-pointing arrow on its icon.

If Device Manager displays an exclamation point inside of a yellow circle over the icon for the device, then there is a problem with the device or driver, usually because of a resource conflict.

Other Device Manager symbols include a blue I on a white background, which indicates that automatic settings were not used and resources have been manually assigned. It does not indicate a problem
What does a red "X" mark over a device icon indicate in Device Manager in Windows XP?

The device is not on the HCL.

The device does not currently have power.

The device is disabled.

The device driver has a resource conflict with another device
When running a dual-drive configuration, you must designate one hard drive as master, and the other as slave. There are two ways to do this: set the jumper to Slave, or connect the hard drive using the Slave connector portion of a Cable Select cable.

Cable Select is a newer way to designate a hard drive as master or slave. A special IDE cable is used to connect the hard drives to the motherboard. There are two connectors on the cable: one for Master, and another for Slave. The Slave connection will not transmit data through pin 28, so only the master hard drive receives the signals sent across pin 28.

There is no Slave port on a motherboard.

The BIOS Setup will determine which one is the master by how the jumpers or Cable Select is set. You cannot designate a hard drive as master or slave through the BIOS Setup.
How can you designate an EIDE hard drive as a slave? (Choose two.)

Set the jumper to Slave.

Connect the hard drive to the Slave port on the motherboard.

Designate it as Slave in the BIOS Setup.

Connect the hard drive to the motherboard using the Slave connector portion of a Cable Select cable.
You should enable automatic configuration and add the ISP-defined settings to the Alternate Configuration tab. With this configuration, the computer first tries to find a DHCP server. If one cannot be found, the IP configuration on the Alternate Configuration tab is used.

You should not create separate user profiles for the user at home and at work. IP configuration settings are not defined in the user profile.

You should not create separate hardware profiles for the user at home and at work. The hardware profile limits the drivers that are loaded. It cannot be used to establish different IP configuration settings.

You should not configure both IP configurations manually in Advanced TCP/IP settings. Doing so would create a multi-homed network adapter, but the settings would not work correctly given the situation. Also, you want to be able to dynamically assign addresses when the user is connected to the company network, not manually assign the address.
A user telecommutes three days a week using a laptop computer. The user's Internet Service Provider at home requires a static IP address, subnet mask, and DNS server setting. The company network assigns addresses using DHCP.

You need to configure the user's computer so that the user can access the Internet when at home and the corporate network when at the office.

What should you do?

Create separate hardware profiles for the user at home and at work.

Enable automatic configuration. Add the ISP-defined settings to the Alternate Configuration tab.

Configure both IP configurations manually in Advanced TCP/IP settings.

Create separate user profiles for the user at home and at work.
You should use Msconfig, also known as the System Configuration Utility, to disable startup items. Msconfig allows you to select which items load at startup, including which .ini files are loaded and whether all, none, or only selected startup applications are loaded. Using Msconfig is a good way to troubleshoot problems related to startup or devices and applications that load at startup. You can also view which services are running.

You should not start the computer in Safe Mode. Safe Mode loads only the minimum drivers needed to run the operating system.

You should not remove all shortcuts from C:\Documents and Settings\All Users\Start Menu\Programs\Startup folder. While this is the folder that stores shortcuts to the applications that run at startup for any user who logs onto the computer, it does not contain the user-specific shortcuts. Also, it is best not to remove the shortcuts because you will just have to reconfigure them later. Also, some startup applications are not configured through the Startup folder. Instead, they are configured through the registry.

You should not start the computer in Safe Mode with Networking. Safe Mode with Networking loads only the minimum drivers needed to start the operating system and access the network
You are troubleshooting a computer running Windows XP. You want to start the computer without launching specific startup applications. Aside from that change, you want the computer to boot normally.

What should you do?

Start the computer in Safe Mode with Networking.

Use Msconfig to disable the startup applications.

Remove all shortcuts from the C:\Documents and Settings\All Users\Start Menu\Programs\Startup folder.

Start the computer in Safe Mode.
NTFS permissions on files and folders inherit the same permissions from their parent. The permissions are also retrained if you move or copy the folder to another location or rename it. NTFS permissions are permissions set at the file-system level. They allow you to control access at a more granular level than using share permissions.

Share permissions do not only apply to users that log on locally. Share permissions apply to users who connect to the share via the network. They are not enforced for users that log on locally or for users that log on through a Remote Desktop connection.

Both NTFS and share permissions on a folder are not retained when the folder is moved, copied, or renamed. Only the NTFS permissions are retained when a folder is moved, copied, or renamed.

Share permissions are not more granular than NTFS permissions. NTFS permissions are more granular and allow you to control access at a more detailed level.
What statement correctly characterizes the difference between NTFS permissions and share permissions?

Share permissions apply only to users that log on locally.

Both NTFS and share permissions on a folder are retained when the folder is moved, copied, or renamed.

Share permissions are more granular than NTFS permissions.

NTFS permissions on files and folders inherit the same permissions from their parent
You should verify that the power supply is connected to the motherboard. You know that the power supply is receiving power from the outlet because the fan is running. However, it might not be supplying power to the motherboard. Therefore, you should verify that it is properly connected to the motherboard. It is also possible that the power supply is faulty.

There is no need to use a multimeter to check the voltage at the outlet. You know the outlet is supplying power because the fan is working.

There is no need to replace the power cable. You know the power cable is transmitting current because the fan is working.

Power supplies do not require drivers. They are the first thing to start up and supply power to the other devices in the computer.
You are troubleshooting a computer that will not boot. The power supply fan works, but the computer will not start.

What should you try?

Verify that the power supply is connected to the motherboard.

Use a multimeter to check the voltage at the outlet.

Verify that correct driver for the power supply is installed.

Replace the power cable.
Since the old computer was connected to a Transmission Control Protocol/Internet Protocol (TCP/IP) network, TCP/IP needs to be configured on the new computer. The IP address is the unique network client identification address. The default gateway is the network address of the local router interface, and the Subnet Mask is used to determine whether data packets are destined for local or remote hosts. All of these need to be configured and/or assigned to the network card.

The Media Access Control (MAC) address is the physical address of the network card. It is programmed into the card by the manufacturer and is not changeable.

The network topology refers to the configuration of the network (ring, bus, star, star-bus, etc.). These are not system settings.

The network media refers to the type of cable used (10Base-T, 10Base-2, Fiber, etc.).

The Network access method (for example, Carrier Sense-Multiple Access with Collision Detection or CSMA/CD) is determined by the type of network in use. You are using the existing card, so it already matched the type of network in use.
You are replacing a computer in an office. The existing computer has been connected to a TCP/IP network, and you want to use the existing network card in the new computer.

Which configuration settings would you have to set in the new computer? (Choose three.)

Default gateway

Network topology

Subnet Mask

Network media

MAC address

IP address

Network access method
The most likely problem is that the network adapter is bad. This could also point to a bad network cable or connection.

The problem would not be that Windows Firewall is enabled. Windows Firewall enables you to block and restrict traffic, but it would not cause the network adapter to appear to be unplugged.

The problem would not be that the connection is disabled. An unplugged status would indicate a physical problem with the cable or network adapter.

The problem would not be that Domain Name Service (DNS) is not functioning properly. DNS is used to resolve a fully qualified domain name to an IP address. When a computer needs to establish a session with a host, the computer queries a DNS server for the IP address of the destination host. The DNS server responds with the IP address, which is then used to access the host
You are running Windows XP. You have been able to connect to the network, but now you cannot connect. Network Connections in Control Panel indicates that the network adapter is unplugged.

What is most likely the problem?

DNS is not functioning properly.

Windows Firewall is enabled.

The connection is disabled.

The network adapter is bad.
The C:\Users\Chris\AppData\Local\Temp folder would be defined as Chris' default temporary folder.

The C:\Users\Chris\Local Settings\Temp folder would not be defined as Chris' default temporary folder. This is not a valid folder.

The C:\Documents and Settings\Chris\Local Settings\Temp folder would not be defined as Chris' default temporary folder. This would be Chris' default temporary folder if the computer were running Windows XP.

The C:\Documents and Settings\Chris\AppData\Local\Temp folder would not be defined as Chris' default temporary folder. This is not a valid folder.
You have a computer running Windows Vista Business Edition. You have a user named Chris.

Which folder would be defined as Chris' default temporary folder?

C:\Users\Chris\AppData\Local\Temp

C:\Documents and Settings\Chris\Local Settings\Temp

C:\Users\Chris\Local Settings\Temp

C:\Documents and Settings\Chris\AppData\Local\Temp
The most likely explanation is the USB hard drive requires more power than the front panel can provide. USB ports on the front panel and on bus-powered hubs may not provide enough power for some kinds of devices. In those cases, you should plug the devices into a USB port with more power, such as the ones on the back panel, provide separate power to the device, or provide separate power to the hub.

This type of problem would not be caused by slower devices sharing the same hub. When you mix older USB 1.x devices and USB 2.0 devices on the same controller, the slowest device sets the speed for the interface. However, this is a power issue, not a performance issue.

The device driver does not need to be updated. Most USB hard drives do not require special drivers.

The USB root hub is not defective. The web camera is also plugged into the front panel, and it is still working normally. The front panel and possibly some other ports operate from one root hub in the computer.
A user reports that a USB hard drive was working properly until he moved the plug from a rear USB port to a port on the front panel.

Now the power indicator on the USB hard drive lights up, but the drive does not respond. Another device plugged into the front panel, a web camera, is operating normally.

What is the most likely cause of the problem?

The USB hard drive requires more power than the front panel ports provide.

The USB root hub is defective.

The device driver for the USB drive needs to be updated.

Slower USB devices are plugged into the front panel
Tracert is a TCP/IP utility that uses Internet Control Message Protocol (ICMP) Echo Requests to trace the route a data packet takes to its destination. The tracert command displays the hop count (also called the metric, the number of routers the signal must pass through to get to the destination), the time each hop takes (in milliseconds), the name of the computer or router passed through (optional), and the IP address of each router in the hop. This is the output shown in the graphic. tracert works with IP addresses, host names, and domain names.

The ping utility (for example, ping 208.160.120.17) is used to send test data packets to verify connectivity to another computer using ICMP. Ping sends an ICMP Echo Request to a target name (like www.whitehouse.gov) or IP address. The resulting ICMP Echo Reply verifies that a TCP/IP configuration is set up properly and that the destination host is online and connected to the network. You can use ping with the -t option to send ping requests to the target until you manually stop the command.

FTP (File Transfer Protocol) is a utility program that allows the bi-directional transfer (uploading and downloading) of files between two networked hosts. A small FTP client program runs on the remote computer and accesses a larger FTP server running on a host.

The telnet utility allows a computer to connect to a UNIX host by emulating a terminal (such as a DEC VT100) and establishing a remote command-line window.
Which utility would provide the output shown in the graphic exhibit?




ping

telnet

tracert

FTP
The most likely problem is that the laptop requires DDR2 small outline dual in-line memory modules (SO-DIMMs). DDR SO-DIMMs and DDR2 SO-DIMMs have 200 pins, but the notches on the SO-DIMMs are usually in different locations. DDR2 SO-DIMMs have a notch that is located nearer to the center of the SO-DIMM than DDR SO-DIMMs. This prevents installation of the wrong type of memory. The two memory types are not interchangeable.

Laptops generally do not use full sized DIMMs, so it is unlikely that the laptop requires either DDR or DDR2 DIMMs. DIMMs are much longer than SO-DIMMs, and it is unlikely that you would think that you could put a DIMM in a SO-DIMM slot if you were looking at both of them.

It is not likely that the laptop requires DDR3 SO-DIMMs. DDR3 SO-DIMMs have 204 pins. The scenario stated that the module and the slot had the same number of pins and connectors.
You are installing a SO-DIMM DDR memory module in a customer's laptop. You try several times, but the location of the notch on the SO-DIMM does not match the notch in the slot. The SO-DIMM and the slot have the same number of pins and connectors.

What is the most likely cause of the problem?

The laptop requires DDR3 SO-DIMMs.

The laptop requires DDR DIMMs.

The laptop requires DDR2 DIMMs.

The laptop requires DDR2 SO-DIMMs
You should set the Startup type of non-critical services to Automatic (Delay Start). Windows Vista provides a new startup option for services that can allow the computer to boot more quickly. When the service's Startup type is set to Automatic (Delay Start), the service is started, but only after the boot process and you can already access the desktop. You should be careful not to delay the start of services that are needed to boot to the operating system or that are needed for internal Windows functions. However, setting this option for non-critical services can improve the time it takes to start the computer.

You should not set the Startup type of non-critical services to Automatic. This will attempt to load all the non-critical services at boot time, which would not minimize startup time.

You should not set the Startup type of non-critical services to Manual. This will not start the non-critical services, and you would have to start them manually.

You should not remove the dependencies for non-critical services. This will affect the functionality of the services.
You have a computer running Windows Vista that takes a long time to boot because many services are loaded. You want all the services to load, but you want to minimize the time it takes to boot.

What should you do?

Set the Startup type of non-critical services to Manual.

Set the Startup type of non-critical services to Automatic (Delay Start).

Set the Startup type of non-critical services to Automatic.

Remove the dependencies for non-critical services.
You should ensure that ports 20 and 21 are both opened on the firewall. File Transfer Protocol (FTP) is a protocol used to upload and download files. It uses the well-known port 20 to send and receive data. It also uses port 21 for control messages.

You should not ensure that port 23 is open on the firewall. FTP does not use port 23. Telnet uses port 23. Telnet allows you to issue commands to a remote server, but it is not secure because data, including authentication credentials, are transferred in clear text.

You should not ensure that port 22 is opened on the firewall. FTP does not use port 22. Secure Shell (SSH) uses port 22. SSH allows computers to exchange data over a secured channel.

You should not ensure that port 443 is opened on the firewall. FTP does not use port 443. Hypertext Transfer Protocol Secure (HTTPS) uses port 443. HTTPS is similar to Hypertext Transfer Protocol (HTTP) and is used to request and receive Web pages, but unlike HTTP, it includes Transport Layer Security (TLS) to provide encryption.
You have a remote user that is configured to run the FTP protocol. However, the user cannot connect to the FTP service.

What should you do?

Ensure that ports 20 and 21 are both opened on the firewall.

Ensure that port 23 is open on the firewall.

Ensure that port 22 is opened on the firewall.

Ensure that port 443 is opened on the firewall.
The ntbackup /M switch allows you to define the backup type.

The /V:{yes|no} switch verifies the data when the backup is finished.

The /J {"job name"} switch allows you to define the job name for the log file.

The /D {"set description"} switch allows you to name each backup set.
Which ntbackup switch allows you to designate whether a backup type is normal, copy, differential, incremental, or daily?

/D

/J

/V:

/M
You should implement MAC filtering. MAC filtering allows you to configure a list of clients that can access the wireless network. Each network adapter has a unique MAC address that can be used to determine if the client should be allowed network access. When MAC filtering is enabled, the wireless access point (WAP) or router compares the MAC address of the client requesting a connection to the network against the configured list of allowed clients.

You should not enable SSID broadcasting. Each 802.11 WLAN has a Service Set Identifier (SSID) that identifies it. Unless SSID broadcasting is disabled, the SSID of the WLAN is broadcast in clear text to all client devices that are within range. If you disable SSID broadcasting, client devices will be required to explicitly specify the SSID to connect.

You should not use BitLocker. BitLocker provides for volume-level encryption of data for one or more drives or logical volumes on a drive. BitLocker also performs pre-boot security tests to ensure that the disk has not been moved to another computer and that the boot configuration has not been altered. BitLocker is available with Windows Vista Ultimate and Enterprise Editions.

You should not disable WEP. Wired Equivalent Privacy (WEP) is a security protocol used with wireless networks. WEP provides encryption using a shared key.
You have recently implemented a WLAN and want to maximize security. You only want specific wireless clients to be able to access the WLAN.

What should you do?

Implement MAC filtering.

Disable WEP.

Enable SSID broadcasting.

Use BitLocker.
You should boot the system with a Windows XP disc and run the Recovery Console.

A system that will not start and is displaying a message about a missing or bad NTLDR could have a number of problems, including the following:

* The computer is attempting to boot from a non-bootable source.
* The Ntldr or Ntdetect.com file is corrupt.
* The Boot.ini file is misconfigured.
* The boot sector or master boot record are corrupt.

You can use the Recover Console to copy good versions of Ntldr or Ntdetect.com, edit the settings in the Boot.ini file so they point to the correct locations, or repair the boot sector or master boot record. You can use the fixboot command to repair the boot sector or the fixmbr command to repair the master boot record. In some cases, BIOS settings, hardware problems, or a corrupted drive may be responsible for the problem because the drive is not readable.

You cannot use Last Known Configuration to solve this problem. You can use Last Known Configuration to revert back to the settings that were in place the last time that Windows successfully booted. This is useful when you have made some configuration change that prevents Windows from starting. In this case, the computer will not get far enough into the startup process to offer this option.

You cannot use msconfig, the System Configuration Utility, to solve this problem. You can use msconfig to prevent programs and services from starting up automatically. You must be able to start Windows to use this utility.

You cannot use Safe Mode to solve this problem. Safe Mode starts Windows with a reduced number of drivers and services. Windows is not getting far enough into the startup process to be able to run Safe Mode.
A computer running Microsoft Windows XP is unable to start. The user reports that he gets a message saying that NTLDR is bad or missing.

What tool should you use to fix the problem?

Last Known Good Configuration

msconfig

Recovery Console

Safe Mode
The items that appear for all logged on users in the Start Menu are located by default in the C:\ProgramData\Microsoft\Windows\Start Menu folder.

The items that appear for all logged on users in the Start Menu are not located by default in the C:\Documents and Settings\All Users\Start Menu folder. This folder is the location under Windows XP.

The items that appear for all logged on users in the Start Menu are not located by default in the C:\Documents and Settings\All Users\Start Menu\Programs\Startup folder. This folder is the default folder under Windows XP that contains programs that are automatically loaded at startup for all users.

The items that appear for all logged on users in the Start Menu are not located by default in the
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup folder. This folder contains programs that are automatically loaded at startup for all users
You are running Windows Vista Ultimate. You want to view all items that appear on the Start menu for all users that log on.

In which location will these be by default?

C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup

C:\Documents and Settings\All Users\Start Menu\Programs\Startup

C:\Documents and Settings\All Users\Start Menu

C:\ProgramData\Microsoft\Windows\Start
The ATAPI-5 (AT Attachment with Packet Interface-5) standard approved in 2000 built on the ATAPI-4 standard and requires an 80-conductor cable for UDMA modes faster than UDMA/33 to be enabled. The 40- or 80-conductor cables are automatically detected.

ATA-100 should be displayed as UDMA/100.

If the ribbon cable was not 40-pin or not installed correctly, the hard drive would not have been detected at all.
After installing a new ATA-100, 80GB hard drive, you boot up the system and watch as the Power On Self Test (POST) displays information about the system on your monitor.

You notice the 80GB hard drive is correctly identified as 80GB, but it is listed as using UDMA/33.

How should you interpret this?

Your hard drive cable is not 40-pin.

ATA-100 is actually UDMA/33 and this is normal.

Your hard drive ribbon cable is not an 80-conductor cable.

Your hard drive ribbon cable is not installed correctly.
Simple Mail Transfer Protocol (SMTP) and Post Office Protocol (POP) are both part of the TCP/IP suite of protocols and are used for e-mail. SMTP, which uses Port 25, is typically used for e-mail transfers between mail servers. You use it to send mail. POP, which uses Port 110, is used for transferring e-mail from a mail server to an e-mail client. You use it to receive mail.

The FTP (File Transfer Protocol) utility program allows the bi-directional transfer of files between two networked hosts. Both hosts must be using TCP/IP, and the source host (the file server) must be running the FTP server daemon application.

Point-to-Point Protocol (PPP) is a communication protocol used in dial-up connections.

SNMP (Simple Network Management Protocol) is used for collecting information about devices on a network.

Hypertext Markup Language (HTML) connects to servers and returns HTML pages to the client's browser. You can also use HTML to download files, but it does not allow you to send and receive e-mail.

VoIP is a protocol that allows users to make telephone calls over the Internet via voice data packets. It does not allow you to send and receive e-mail.
Which two protocols are used for sending and receiving e-mail? (Choose two.)

SMTP

SNMP

VoIP

POP

HTML

PPP

FTP
You should use Bluetooth to implement a personal area network (PAN). Bluetooth adapters are often used to connect multiple wireless peripherals over short distances, typically devices used by a single person in a PAN. Class I has a range of approximately 100 meters, Class II has a range of approximately 10 meters, and Class III has a range of approximately 1 meter.

You should not use satellite. A satellite network is one that uses satellite signals between a satellite orbiting the earth and a satellite dish to create a wide area network (WAN), not a PAN.

You should not use 802.11g. The 802.11g standard is the current standard for wireless networking between computers, not in a PAN.

You should not use cellular. A cellular network is one that uses radio signal and cellular towers to create a wide area network (WAN), not a PAN.
You are implementing a PAN.

What networking technology should you use?

Cellular

802.11g

Bluetooth

Satellite
Debugging Mode gives you the opportunity to move system boot logs from the failing computer to another computer for evaluation. To use this mode, you first must connect the failing computer to another computer using a serial cable. You then can review the boot logs on a functioning computer.

Safe Mode with Networking is the same as Safe Mode, but the drivers necessary to access the network are loaded. This is useful if you need to access the network to download replacement drivers.

The Enable Boot Logging option allows the system to boot normally while recording all files loaded during the boot process. The log is recorded in a file named Ntbtlog.txt. The log will identify which drivers loaded and which failed. This is especially helpful if you have a copy of the Ntbtlog.txt file that was created before there was a problem. You then could compare them to see what has changed.

The Recovery Console does not start the graphical interface, but it does allow you to access any FAT16, FAT32, and NTFS file systems. The purpose of the Recovery Console is to allow you to repair a damaged registry, system files, or file system on the hard drive.

The Windows Error Reporting feature does not allow you to move system boot logs from the failing computer to another computer for evaluation. Windows Error Reporting allows you to send Microsoft error information when you encounter a problem relating to the operating system.
Which boot option can you use to move system boot logs from a failing Windows XP computer to another computer for evaluation?

Debugging Mode

Safe Mode with Networking

Recovery Console

Windows Error Reporting

Enable Boot Logging
You must install either a 32-bit RIMM module or a continuity and termination RIMM (CT-RIMM) module in the vacant slot. 16-bit RIMM modules must be installed in pairs, but you can install a single 32-bit RIMM module. However, you cannot leave a slot vacant, but you can use a CT-RIMM instead of a second 32-bit RIMM module.

You do not have to install a 32-bit RIMM module in the vacant slot. As noted, you can use a CT-RIMM in the vacant slot.

You should not install a continuity RIMM (C-RIMM) module in the vacant slot. You use a C-RIMM module with 16-bit RIMM modules that rely on the motherboard for termination. 32-bit RIMM modules have built-in termination.
You are building a personal computer (PC) that has two 32-bit slots for RIMM memory. You install a 32-bit RIMM module in one of the slots.

What must you install in the vacant slot?

A 32-bit RIMM module

A C-RIMM module

A C-RIMM module or a CT-RIMM module

A 32-bit RIMM module or a CT-RIMM module
You should use Trusted Platform Module (TPM). TPM uses a hardware chip to increase security for a computer. In Windows Vista, the BitLocker feature uses TPM to provide enhanced security for the computer, including volume-level encryption and a way to ensure that the system configuration is not changed or modified by unauthorized users.

You should not use Point-to-point Tunneling protocol (PPTP). PPTP is a networking protocol used to implement virtual private networks (VPNs).

You should not use Wired Equivalent Privacy (WEP). WEP is a security protocol used with wireless networks. WEP provides encryption using a shared key.

You should not use Wi-Fi Protected Access (WPA). WPA protects wireless networks by encrypting data and providing user authentication.
You have a computer running Windows Vista. Multiple users use the computer. You want to implement security at the hardware level.

What should you use?

PPTP

WEP

WPA

TPM
When a laser printer prints garbage, the most likely cause is that the wrong printer driver is being used. Since the printer was recently moved into the department, it makes it more likely that the correct driver was not installed. A bad formatter board in the printer could also cause garbage printouts.

A bad fuser assembly causes smeared printouts. A fuser assembly is the component on a laser printer that heats the toner and makes it adhere to the page.

A bad transfer corona assembly would cause blank pages. The transfer corona assembly transfers the image from the drum to the paper. If the image does not get transferred, there is nothing on the page to attract the toner particles.

A bad toner cartridge can cause a lot of problems ranging from blank pages (out of toner) to smudges and black pages.
You just moved a LaserJet III printer to the Marketing department. Users report that they are getting garbage printouts.

What is the most likely cause of the problem?

The correct printer driver is not installed.

The toner cartridge is bad.

The transfer corona assembly is bad.

The fuser assembly is bad
The problem is with the Domain Name Service (DNS) configuration. DNS is used to resolve a fully qualified domain name to an IP address. When a computer needs to establish a session with a host, the sending computer queries a DNS server for the IP address of the destination host. The DNS server responds with the IP address, which is then used to access the host. If you can ping the IP address successfully but cannot ping the computer name, name resolution is not being performed correctly. You would need to check the TCP/IP properties to ensure that the DNS server addresses are correctly configured.

The problem would not be a hardware problem with either computer's NIC or the router. If it were a connectivity issue, you would not be able to successfully ping the IP address
You run the ping command to ping an IP address of a computer on your network. The command runs successfully. However, you are unable to successfully ping the same computer when using the computer's name.

What is the problem?

The router

Your computer's NIC

The host computer's NIC

The DNS configuration
You should use PC2-3200 or DDR2-400 memory. DDR2-400 offers a transfer rate of 3200 Mbps using PC2-3200 Dual Inline Memory Modules (DIMMs). Double data rate synchronous dynamic random access memory (DDR SDRAM) provides for faster data transfer than single data rate dynamic random access memory (SDR SDRAM). DDR2 DIMMS include: PC2-3200, PC2-4200, PC2-5300, PC2-6400, and PC2-8500. The number after the DDR2 indicates the speed of the FSB. The number after the PC2 indicates the transfer rate, which is 8 times the speed of the FSB.

The DDR2-800 standard offers a transfer rate of 6400 Mbps using PC2-6400 DIMMs. You would use this memory with an 800 MHz FSB.

The DDR2-667 standard offers a transfer rate of 5333 Mbps using PC2-5300 DIMMs. You would use this memory with a 667 MHz FSB
You need to add memory to a computer that uses DDR2 chips and has a 400 MHz frontside bus (FSB).

What kind of memory should you use? (Choose two.)

PC2-6400

DDR2-800

PC2-3200

PC2-5300

DDR2-667

DDR2-400
The most likely cause of the problem is that the printer is out of memory. When a printer is out of memory, it might not be able to complete print jobs, or it might print them more slowly. Some printers may display error messages such as "Out of Memory" or "Processing Data" or display error codes. Sometimes the memory problem is temporary and can be solved by restarting the printer. If problems persist, you may need to add more memory to the printer.

A bad fuser assembly causes smeared printouts. A fuser assembly is the component on a laser printer that heats the toner and makes it adhere to the page.

A bad transfer corona assembly would cause blank pages. The transfer corona assembly transfers the image from the drum to the paper. If the image does not get transferred, there is nothing on the page to attract the toner particles.

A bad toner cartridge can cause a lot of problems ranging from blank pages (out of toner) to smudges and black pages.
A laser printer is displaying the following message and printing slowly:

Processing Data

You need to make the printer process documents more quickly.

What is the most likely cause of the problem?

The transfer corona assembly is bad.

The toner cartridge is bad.

The fuser assembly is bad.

The printer is out of memory
To support more than 4 GB of memory, you need to include a 64-bit processor and a 64-bit operating system. 32-bit systems cannot fully use more than 4 GB of RAM. The only 64-bit processor listed is the Core 2. Other 64-bit processors are the Intel Xeon and Core i7 and the AMD Opteron, Athlon 64, and Phenom
You are building a system for a customer who wants 8 GB of RAM installed.

Which of the following must you also include in the system? (Choose two.)

Intel Atom N processor

32-bit version of Windows

Intel Core processor

Intel Core 2 processor

64-bit version of Windows
You should look in C:\Users\Joan\AppData\Roaming\Microsoft\Windows\Recent.

You should not look in C:\Documents and Settings\Joan\My Recent Documents. This would be the location of the shortcuts if you were running Windows XP.

You should not look in C:\Documents and Settings\Joan\My Documents. This is the location of user documents in Windows XP.

You should not look in C:\Users\Joan\My Recent Documents. This is not a valid folder
A user named Joan is running Windows Vista. You want to view the shortcuts for the user's most recently accessed documents.

In which folder should you look?

C:\Users\Joan\AppData\Roaming\Microsoft\Windows\Recent

C:\Documents and Settings\Joan\My Documents

C:\Users\Joan\My Recent Documents

C:\Documents and Settings\Joan\My Recent Documents
You should run the bootrec /rebuildbcd command. This command allows you to rebuild the Boot Configuration Data (BCD) store needed for the computer to successfully boot. Under Windows Vista, the BCD is used instead of the boot.ini file. You would boot from the installation DVD and select Repair your computer. Then, from the System Recovery Options window, you would select Command Prompt and run the bootrec command from the command line.

You should not use the bootrec /fixmbr command. You would use this command to rewrite the Master Boot Record (MBR). The MBR is the first sector on the drive from which you are booting. It contains information about the partitions and code that is initially run to initiate the boot process by calling the Windows Boot Manager (Bootmgr.exe). Bootmgr.exe then reads the BCD to obtain available boot configuration options and continue with loading the operating system.

You cannot use the bootrec /bcd command because /bcd is not a valid Bootrec.exe option.

You should not use the bootrec /fixboot command. You would use this command to attempt to fix a corrupt bootmgr.exe file. Bootmgr.exe is the Windows Boot Manager program. It reads the BCD to obtain boot options and initiates the process of loading the operating system.
When you attempt to boot your Windows Vista computer, you receive the following error message:

The Windows Boot Configuration Data file is missing required information

You attempt a Startup Repair, but that does not correct the problem. You want to repair the Boot Configuration Data store.

Which command should you use?

bootrec /fixboot

bootrec /rebuildbcd

bootrec /bcd

bootrec /fixmbr
Startup Repair and Bootrec.exe can both be used to repair the MBR. Microsoft recommends that you first attempt to repair the drive by using the Startup Repair option. If that does not work, you will need to use Bootrec.exe. Both utilities are accessed through the System Recovery options.

You should not use Diskpart.exe. The Diskpart utility is a disk management tool that is used to create partitions and convert disks from basic to dynamic or dynamic to basic.

You should not use Convert.exe. The Convert utility is used to convert a FAT partition to NTFS.

You should not use Defrag.exe. The Defrag command-line utility is used to recover fragmented disk space
A virus on a computer running Microsoft Windows Vista has altered the master boot record (MBR) and the computer will no longer boot. Before you can remove the virus, you must fix the MBR so the computer will boot.

What utilities should you use to repair the MBR? (Choose two.)

Diskpart.exe

Startup Repair

Convert.exe

Bootrec.exe

Defrag.exe
You should replace the older 40-wire cable with an 80-wire cable. Parallel ATA (PATA) headers that are blue use the newer Ultra DMA 5(UDMA5) or higher standard. To take advantage of the better performance of this standard, you must use an 80-wire cable. If you use the older 40-wire cable, the drive will operate at slower speeds. The 80-wire cables are needed to achieve transfer speeds greater than 33 megabytes per second. The latest PATA specification, ATA-6 or PATA/100, can achieve transfer speeds up to 100 megabytes per second with an 80-wire cable.

You should not replace the cable with a newer Serial ATA (SATA) cable. You cannot use SATA cables with PATA drives.

You should not check the jumpers on the drive. The jumpers are primarily used to indicate how the drive will share the cable with another drive. Setting the jumper incorrectly will usually cause the computer to be unable to find the drive.

You do not need to update the BIOS. There is nothing in the scenario that points to this as the problem
You are upgrading the PATA hard disk drive in a computer. You connect the drive to the blue PATA header on the motherboard with a standard 40-wire ATA cable. The performance of the drive is not what you expected.

What should you do?

Check the jumpers on the hard disk drive.

Replace the cable with an 80-wire cable.

Replace the cable with a newer SATA cable.

Update the BIOS.
CompTIA lists the following guidelines for working on laptops:

* Document and label cable and screw locations.
* Organize parts.
* Refer to manufacturer documentation.
* Use appropriate hand tools.

It is not recommended that you disassemble another laptop to use as a guide. You should not disassemble a computer that does not need to be disassembled.
Which of the following is NOT a recommended step that you should take when repairing a laptop computer?

Organize parts.

Refer to manufacturer documentation.

Disassemble an identical laptop at the same time to use as a guide.

Document and label cable and screw locations
You should open Device Manager and identify devices that have a red X icon. This icon indicates that a device is disabled.

You should not open Device Manager and identify devices that have a blue and white informational icon. This icon indicates that the device was manually configured. It does not indicate the device is disabled.

You should not run MSConfig.exe. MSConfig provides a graphical interface that you can use to configure the boot process, including modifying boot configuration files and minimizing the programs that are loaded when the computer is booted. MSConfig is also called the System Configuration utility.

You should not run DXDiag.exe. The DxDiag utility is used to troubleshoot problems related to DirectX. DirectX is an interface that applications use to access display and sound devices
You need to identify the devices that have been disabled on your Windows XP system. What should you do?

Open Device Manager and identify devices that have a red X icon.

Open Device Manager and identify devices that have a blue and white informational icon.

Run MSConfig.exe.

Run DXDiag.exe.
To connect using Remote Assistance, the user must send you an invitation through e-mail, as a file, or through Windows Messenger. Or, if the computer is configured to allow an offer of remote assistance, the expert can offer remote assistance. However, the user still needs to accept it. Remote Assistance allows you to share a desktop session with a user. If the user who issued the invitation agrees, you can also take control of the session to perform tasks.

Remote Desktop is different from Remote Assistance. Remote Desktop allows you to connect to a computer as though you were logged on interactively. You do not need an invitation, but Remote Desktop does need to be enabled on the remote computer and you need to be a member of either the Remote Desktop Users group or the Administrators group on the user's computer.

You do not need to enable Remote Desktop on your computer. Remote Desktop must be enabled at the remote computer to connect using Remote Desktop. It does not need to be enabled for Remote Assistance.

You do not need to be a member of the Remote Desktop Users group. You only need to have an invitation to connect using Remote Assistance.
You are troubleshooting a problem on a user's computer at a different location. You want to connect remotely using remote assistance.

What is required?

You must be a member of the Remote Desktop Users group on the user's computer.

Remote Desktop must be enabled on the user's computer.

Remote Desktop must be enabled on your computer.

The user must send you an invitation or accept your offer of remote assistance.
You should select Startup Repair. The error message you are receiving is because the bootmgr.exe file is missing or corrupt. Selecting this option will allow you to correct problems that might be preventing the operating system from loading, such as missing or corrupt system files in this case. Windows Vista provides a set of recovery tools, WinRE, which you can access when booting from the Vista installation DVD. You can select Repair your computer. Then, from the System Recovery Options window, you can select the most appropriate recovery option. Other options available in addition to Startup Repair include: System Restore, Windows Complete PC Restore, Windows Memory Diagnostic Tool, and Command Prompt. If running a Startup Repair does not fix the problem, you could also use the Command Prompt option and run the bootrec /fixboot command.

You should not select System Restore. System Restore allows you to restore Windows to a specific point in time.

You should not select Windows Complete PC Restore. Windows Complete PC Restore allows you to restore your hard drive from a previously created backup.

You cannot select the Recovery Console. The Recovery Console is available with Windows XP, but not with Vista. It is not an option available in System Recovery Options
You are trying to boot your Windows Vista computer and receive a message indicating that BOOTMGR is missing. You boot from the installation DVD to System Recovery Options.

What option should you select?

Startup Repair

Windows Complete PC Restore

Recovery Console

System Restore
When a continuous black line appears on every page, it usually indicates that the photosensitive drum has been scratched. You should replace the drum or the toner cartridge if the drum is part of the toner cartridge.

If the fusing roller were dirty, the problem would most likely be a series of repeated marks instead of a continuous line.

If the toner cartridge were empty, the problem would be uneven, light, or no print on the page.

If the corona wire were broken, the problem would most likely be a blank page
A laser printer prints a continuous black vertical line down the center of each page.

What is the most likely problem?

The corona wire is broken.

The fusing roller is dirty.

The toner cartridge is empty.

The drum is scratched.
You should use the Reliability Monitor to see a graphical history of software installs and uninstalls, application failures, hardware failures, Windows failures, and miscellaneous failures.

You should not use the Performance Monitor because this is used to track and monitor performance on the computer, not the reliability of the computer.

You should not use the Resource Overview tool to track reliability. This is used to give a consolidated view of current resource usage on core components such as CPU, disk, and memory.

You should not use a System Diagnostics Data Collector Set to track reliability history. These are used to schedule and run groups of performance and event monitors that can be compared over time. They can also be used for alerts.
A computer running Microsoft Windows Vista desktop is experiencing a large number of system failures.

You need to analyze a historical view of computer performance and see when the failures first started happening.

What tool should you use?

The Performance Monitor

A System Diagnostics Data Collector Set

The Reliability Monitor

The Resource Overview tool
Automatic Private IP Addressing (APIPA) is a feature of Windows 98/2000/XP that permits Dynamic Host Configuration Protocol (DHCP) clients to automatically self-configure an IP address and subnet mask when their DHCP server cannot be found. When Windows is booting, if it cannot find a DHCP Server, APIPA configures an IP address for the computer automatically. This address is in the range 169.254.0.1 to 169.254.255.254 with a subnet mask of 255.255.0.0. The client uses this address until the DHCP server becomes available.

Domain Name Service (DNS) is used to resolve a fully qualified domain name to an IP address. When one computer needs to establish a communication session with another, the sending computer queries a DNS server for the IP address of the destination host. The DNS server responds with the IP address, which is used by the source computer to establish the connection. It does not assign IP addresses to clients.

Windows Internet Name Service (WINS) resolves NetBIOS names to IP addresses in a Windows network. It does not assign IP addresses to clients.

The ipconfig utility is used by Windows 2000, Windows XP, and Windows Vista to view current IP configuration information. It does not assign IP addresses to clients.
Which feature of Windows XP permits DHCP clients to automatically self-configure an IP address and subnet mask when their DHCP server cannot be found?

ipconfig

DNS

APIPA

WINS
You should remove the light emitting diode (LED) wires from the pins on the motherboard and reverse the connection. Many of the connectors on a motherboard that control LEDs and case switches must be connected in the right polarity to function correctly. The negative wire must be connected to the negative pin, and the positive wire must be connected to the positive pin. If the polarity is reversed, the LED or switch may not function.

You should not replace the case with a more modern version. Most of the time, this kind of problem can be solved by swapping the wires to make the proper connection.

You should not replace the hard drive. There is nothing that indicates that the hard drive is defective. The LED functioned correctly before the motherboard was replaced. Before taking such a drastic step, you should explore simpler solutions.

You should not reseat the data cable on the hard drive. If the data cable were not correctly connected, the drive would not function.
A customer replaced the motherboard in his computer. He brings the computer to you because now the LED on the case that indicates hard drive activity does not work. It worked before he swapped motherboards.

You need to restore the functionality of the hard drive activity LED.

What should you do first?

Replace the hard drive.

Reseat the data cable to the hard drive.

Replace the case with a more modern version.

Remove the LED wires from the pins on the motherboard and reverse the connection
You should perform either of the following:

* Select Start > Run, type mstsc, and press Enter.
* Select Start > All Programs > Accessories > Communications > Remote Desktop Connections.

You could then specify the name of the computer in the branch office to which you want to connect and click the Connect button.

You should not select Start > Run, type msconfig, and press Enter. MSConfig provides a graphical interface that you can use to configure the boot process, including modifying boot configuration files and minimizing the programs that are loaded when the computer is booted.

You should not select Start > Control Panel > System > Remote. You would use this option to configure a computer to allow remote desktop connections.

You should not select Start > Control Panel > Administrative Tools > Computer Management. You can use Computer Management under Administrative tools to access other system tools, such as the Event Viewer or Device Manager, to manage and defragments disks, and to manage services and applications. It does not provide an option to connect to another computer via a remote desktop connection
You have configured a Windows XP Professional computer at one of your branch offices to allow remote desktop connections.

You want to connect to the computer from your Windows XP Professional computer at the home office.

What should you do? (Choose two.)

Select Start > Control Panel > System > Remote.

Select Start > Run, type msconfig, and press Enter.

Select Start > Run, type mstsc, and press Enter.

Select Start > Control Panel > Administrative Tools > Computer Management.

Select Start > All Programs > Accessories > Communications > Remote Desktop Connections
The default location in Windows XP would be C:\Documents and Settings\User1\Desktop. The Documents and Settings folder has folders for all users of the computer. Each user's folder contains folders such as Desktop, Favorites, My Documents, and Start Menu. The user's folder also contains an Application Data folder that contains configuration information for the programs that the user has installed.

The default location in Windows Vista would be C:\Users\User1\Desktop.
What is the default location for files found on the Desktop for a Windows XP user named User1?

C:\Documents and Settings\User1\Desktop

C:\Users\\Documents and Settings\User1\Desktop

C:\Documents and Settings\Users\User1\Desktop

C:\Users\User1\Desktop
To play commercial high-definition movies on disc, the computer will need a Blu-ray drive. The Blu-ray standard is the only currently available commercial standard for high-definition movies on disc. A single-layer Blu-ray disc can hold 25 GB of data. A double-layer Blu-ray disc can hold 50 GB.

Blu-ray discs can only be played on Blu-ray drives and devices that contain Blu-ray drives. Standard CD, CD-RW, DVD, and DVD-RW drives cannot play a Blu-ray disc.
A customer wants to be able to play commercial high-definition movies on disc on his computer.

Which of the following should you install?

A Blu-ray drive

A DVD-RW drive

A DVD drive

A CD-RW drive
You should boot into Safe Mode and run the virus scan again. When you boot into Safe Mode, many programs and services are not run at startup, and the antivirus program may be better able to remove and also detect viruses.

You should not update the virus signatures. While it is important to update the virus signatures regularly, the problem is that the infected file is in use. This cannot be solved by downloading the latest virus signatures.

You should not get a different antivirus program. It is true that different antivirus programs may be able to detect and remove different types of malware, but the problem in this case is that the file is in use.

You should not run the fixmbr command. You can run this command from the Windows XP Recovery Console to repair the master boot record. The master boot record can be corrupted by a virus or by damage to the hard drive.
Your antivirus program identifies an infected file but cannot remove it because it is in use.

You need to remove the infected file.

What should you do?

Run the fixmbr command.

Boot into Safe Mode and run the virus scan again.

Update the virus signatures.

Get a different antivirus program
A wrist-grounding strap is necessary when working with PC motherboards, memory modules, and expansion boards. The strap drains away static electric charges that can damage microchips. A proper strap contains a high-value resistor (typically between 1 and 2 Megaohms) embedded in the strap or the coupling to the ground wire. One side of the resistor connects to a contact plate that touches your skin, and the other side connects to a wire lead (usually coiled) that should be connected to a known-good earth ground. The resistor is of high enough value that it acts as a short to ground for any high-voltage static charges that build up, but appears as an open circuit to the lower, current-carrying voltages that can be lethal (recall Current = Voltage / Resistance).

Static-eliminating material in the wristband may reduce static buildup.

A quick-release snap on the ground wire and an alligator clip for easy disconnection are conveniences, but not safety devices.

A high-voltage fuse would not offer protection against lower, current-carrying voltages.
What safety feature is incorporated into an antistatic wrist strap?

A high-voltage fuse

A quick-release snap on the ground wire

Static-eliminating material in the wrist band

A resistor in the path to ground

An alligator clip for quick disconnection
The BIOS on the motherboard is stored in a fixed ROM chip. Also on the motherboard is a chip called the RTC/NVRAM chip, which stands for real-time clock/nonvolatile memory. This is where the BIOS setup information is stored. It is usually called CMOS because it uses CMOS (complimentary metal-oxide semiconductor) technology. The program used to enter information into CMOS is called the CMOS setup utility.

The boot sequence, floppy drive size and capacity, and the system date and time are all adjustable from the CMOS setup utility.

The video resolution is not set in the CMOS setup utility. It is set within the operating system. In Windows, it is set from the Display properties.
What can you NOT adjust from the CMOS setup utility?

The boot sequence

The video resolution

The floppy drive size and capacity

The system date
Dual Inline Memory Modules (DIMMs) differ from the older Single Inline Memory Modules (SIMMs) in a variety of ways. DIMM connectors have different sized sections, separated by two notches on the bottom edge, so you can line them up correctly in the socket. Once you match the sections correctly, you push the DIMM straight down into the socket. When the DIMM is correctly seated, swivel locks on either end snap into place.

SIMMs have a cut-away portion on one edge so you can line them up properly. You insert them at an angle and then raise them into place.

Older 486 and Pentium I systems required SIMMs to be installed in pairs
Which statement about installing DIMMs is true?

You must install DIMMs in matching pairs.

You insert the DIMM at a 35-degree angle and raise it into place.

DIMMs have a cut-away portion on one end to help you line them up properly.

You push the DIMM straight down into the socket
You should not use an Electrostatic Discharge (ESD) wrist strap when working on an open Cathode Ray Tube (CRT) display. An ESD wrist strap grounds your body to protect components from an ESD shock. However, a CRT display is highly charged, so you do not want to be grounded when you work inside one. In fact, only specially trained personnel should ever open a CRT display.

You should use an ESD wrist strap when adding memory to a computer. Doing so will help protect the memory and the other components on the motherboard from an ESD shock.

You should use an ESD wrist strap when installing an internal hard drive. Doing so will help protect the hard drive and the other components you might touch from an ESD shock.

You should use an ESD wrist strap when installing a network adapter. Doing so will help protect the network adapter and the other components you might touch from an ESD shock
When should you NOT wear an ESD wrist strap?

When replacing a network adapter

When adding memory to a computer

When working with an open CRT display device

When installing an internal hard drive
The most secure wireless security standard is 802.1x, which offers a dynamic encryption key and supports a number of authentication methods, through Extensible Authentication Protocol (EAP), including certificates, public keys, and Kerberos.

Wired Equivalent Privacy (WEP) requires that you manually change encryption keys. It also does not support public key authentication.

Media Access Control (MAC) filters can be used to allow only certain computers to access a wireless access point secured using WEP. Access is granted or denied based on the MAC address.

Wi-Fi Protected Access (WPA) changes the key every 10,000 packets using a mechanism called Temporal Key Integrity Protocol (TKIP). It does not, however, support public key authentication.
Which wireless security standard uses dynamic encryption keys and supports public key authentication?

MAC filtering

WPA

802.1x

WEP
You should select Show hidden files and folders in Folder Options. By default, the Application Data folder is hidden, as are the Local Settings, PrintHood, NetHood, SendTo, and Templates folders.

You should not use Folder Options to remove the check from the Hide protected operating system files option. The Application Data folder is not an operating system file. You would remove the check from the Hide protected operating system files option if you needed to modify an operating system file, such as boot.ini, or view system files.

You should not install the template in C:\Documents and Settings\All Users\Application Data. The Application Data folder in All Users will not be visible if the Show hidden files and folders option is not selected.

You should not install the template in C:\Documents and Settings\Default User\Application Data. The Default User profile is used only when a user logs on for the first time. It is used as a basis for the user's custom profile. Also, the Application Data folder in Default User will not be visible if the Show hidden files and folders option is not selected.
You need to install a Microsoft Word template for Sally. However, when you open C:\Documents and Settings\Sally, the Application Data folder is not there.

What should you do?

In Folder Options, select Show hidden files and folders.

Install the template in C:\Documents and Settings\All Users\Application Data.

In Folder Options, remove the check from the Hide protected operating system files option.

Install the template in C:\Documents and Settings\Default User\Application Data
On a computer running Windows XP Professional, there are three ways to find out the IP address and subnet mask assigned automatically. You can run the ipconfig command-line utility, display Status for the network connection and access the Support tab, or select the Adapter node under Components | Network in System Information.

You cannot obtain the IP address and subnet mask using ping. The ping utility is used to test a connection path between two computers and to test the TCP/IP stack. To test the TCP/IP stack, you ping the loopback address, which is 127.0.0.1.

You cannot obtain the IP address and subnet mask using the Network Connection Properties. If the TCP/IP properties were configured statically, you would set them and view them on the connection's Properties page. However, they are set dynamically, so you cannot view them there.

You cannot use winipcfg on a computer running Windows XP. Winipcfg was a Windows 98 utility for viewing the IP address configuration.
A computer running Windows XP is configured to receive an IP address automatically. Which utilities would you use to find out the IP address and subnet mask assigned to its network adapter? (Choose two.)

ping

winipcfg

ipconfig

Network Connection Properties

Network Connection Status
The chkdsk /f /r command identifies and corrects disk errors and extracts information from bad sectors on your hard drive.

You can use the following switches to specify what CHKDSK does:

/f - fixes disk errors.
/r - finds the bad sectors on a disk and recovers any data that can be salvaged.
/x - dismounts the disk.
/v - displays every file on the disk and its full path.
/? - provides a list of the command's switches and describes what the command does.
You want to repair disk errors and recover data from bad sectors on a user's laptop.

Which chkdsk switches allow you to repair and extract data from the bad sectors? (Choose two.)

/f

/?

/x

/v

/r
You should use the Services utility. The Services utility allows you to manage Windows services, including starting, stopping, pausing, disabling, and configuring their log properties. In this case, you need to locate the service on which the application depends and configure it to start automatically when the computer restarts. To prevent a restart now, you can start the service manually. If the error message does not provide enough information for you to know which service is not running, you can use Event Viewer to look for an error or warning. Operating system errors are logged to the System log. Application errors are logged to the event log.

The msconfig utility (also called the System Configuration Utility) allows you to view which services are running and which are stopped. However, it does not allow you to modify their configuration or start or stop them. One useful feature is that msconfig allows you to filter the services displayed to only non-Microsoft services, which can help you identify malicious programs that are loaded as Windows services.

You cannot resolve the problem using Add or Remove Programs. Add or Remove Programs allows you to install programs, but it does not allow you to configure services.

You cannot resolve the problem by using the Program Compatibility Wizard. The Program Compatibility Wizard allows you to specify backwards compatibility settings for legacy applications. It does not allow you to manage Window services.
You install an application that includes a Windows service. When you restart the computer, you receive the message that the application cannot load because a service it depends on is not running.

Which utility should you use to correct the problem?

Program Compatibility Wizard

msconfig

Services

Add or Remove Programs
To use file permissions and Encrypting File System (EFS), you need to use the NTFS file system. You can convert the system hard disk to NTFS during installation. You can convert any hard disk from FAT or FAT32 to NTFS after installing Windows XP by using the Convert utility.

You should not convert the hard disk to FAT32. FAT32 does not support permissions or EFS.

You should not reformat (FORMAT.EXE /FS:FAT32) the hard disk as FAT32. FAT32 does not support permissions or EFS. Also, reformatting the hard disk will cause all data stored on it to be lost.

You should not format (FORMAT.EXE /FS:NTFS) the hard disk as NTFS. Formatting the hard disk will cause all data on it to be lost. A hard disk can be converted from FAT or FAT32 to NTFS, but not the other way around.
You are upgrading a user's computer from Windows 98 to Windows XP Professional.

The computer currently has a hard disk partition formatted as FAT. The main reason for the upgrade is to allow users to secure files on that hard disk using permissions and EFS.

What should you do?

Convert the hard disk to NTFS.

Reformat the hard disk as NTFS.

Convert the hard disk to FAT32.

Reformat the hard disk as FAT32.
It is important that you first upgrade your virus definitions and your virus scan engine before you run a virus scan. Doing so will ensure you are scanning for all currently known viruses and worms. If you do not update the virus definition files first, you may miss a new virus.

Creating an emergency anti-virus boot disk also needs to be done prior to the virus scan, but this step should be performed after upgrading the virus definitions.

It is not necessary to run the ScanDisk utility or to log out of the network before running a virus scan.
What is the first step you should take before you run a virus scan?

Log out of the network.

Create an emergency anti-virus boot disk.

Run the ScanDisk utility.

Upgrade your virus definitions and virus testing engine
If you add a second hard disk drive to an IDE cable and do not adjust the jumpers, the BIOS may be unable to detect either drive. If both drives are set as Master or both set as slave, neither will be detected. Since the original drive worked until you added the second drive, both being set as Master is the most likely cause of the problem. If you are using an 80-conductor cable for a UDMA/66 or faster interface, both drives can be set for Cable Select.

If the IDE cable were defective, the original drive would not have worked before the addition of the new drive unless you damaged the cable during the installation.

Not connecting the power cable to the new drive would not affect the old drive. Neither would adding a defective second drive.
You have just installed a second hard disk drive into a system by adding it as the second drive on the existing IDE cable. When you restart and enter the BIOS configuration program, it can detect neither drive, even though you can hear that both drives are spinning.

What is the most likely cause of the problem?

The new drive is defective.

You did not connect the power cable to the new drive

The IDE cable is defective

You need to set one drive as the slave and the other as the master.
Before installing the new memory modules, the system should be turned off and unplugged so it does not accidentally start when you are installing the modules. Unplugging the system also cuts off the small amount of current that flows even when the system is turned off.

You should also use an antistatic strap to discharge any static prior to touching the modules. ESD (Electrostatic Discharge) must be prevented because it can cause the failure of the new modules.

Washing your hands, shutting down and unplugging the monitor, and cleaning the motherboard are unnecessary steps and would have no effect on the outcome of the job.
Before installing new memory modules in your computer, what precautions should you take prior to removing the new modules from the bag and installing them? (Choose two.)

Wash your hands.

Put on an antistatic wrist strap and clip it to a chassis ground connection.

Shut down and unplug the monitor.

Shutdown the PC and unplug the power cord.

Clean the motherboard with an approved cleaner.
You should enable BitLocker. BitLocker provides volume-level encryption of data for one or more drives or logical volumes on a drive. BitLocker also performs pre-boot security tests to ensure that the disk has not been moved to another computer and that the boot configuration has not been altered. BitLocker is available with Windows Vista Ultimate and Enterprise Editions.

You should not reset the BIOS password. A User password can be set in the BIOS settings to require user authentication before booting the computer. You can also set a Supervisor password to control users who are able to access and modify the BIOS settings. Although you could prevent unauthorized access, the BIOS settings could be cleared by removing the battery. Then, the sensitive data would not be protected.

You should not enable Encrypting File System (EFS). EFS works at the file-system level after the computer is booted. Using EFS, you can configure the file system to automatically encrypt files in specific folders when they are saved. BitLocker operates at a lower level and provides more security.

You should not implement Wired Equivalent Privacy (WEP). WEP is a security protocol used with wireless networks.
You have a remote worker running Windows Vista Ultimate on his laptop. You want to provide maximum protection of confidential corporate data in case the laptop is lost or stolen.

What should you do?

Implement WEP.

Enable EFS

Enable BitLocker.

Reset the BIOS password.
You should use msconfig, also known as the System Configuration Utility, to disable startup items. msconfig allows you to select which items load at startup, including which .ini files are loaded and whether all, none, or only selected startup applications are loaded. Using msconfig is a good way to troubleshoot problems related to startup or devices and applications that load at startup. You can also view which services are running.

You use the edit command to open MS-DOS Editor, which allows you to modify and save text-based files such as .txt and .bat files. You cannot disable startup programs with the edit command and re-enable them later.

When you type dir at the command prompt, you can view some or all of following :

* a disk's volume label
* a disk's serial number
* directories
* filenames
* files' properties, such as file sizes or file extensions

You cannot disable startup programs with the dir command.

You type md at the command prompt in Windows Vista to make a new directory on a disk or within another folder. You cannot disable startup programs with the md command
You want to prevent Windows Vista from loading specific applications during startup. You want all other applications to start as they normally would. You also want the ability to re-enable the applications to automatically start up in the future.

What command allows you to disable the startup applications?

edit

md

msconfig

dir
You should boot to Recovery Console and run chkdsk. Because an operating system file is reported as corrupt, you will need to boot to Recovery Console. To do so, insert the Windows XP installation disc and choose R when prompted whether you want to install Windows XP or repair an existing installation. Next, run chkdsk with the /r option to locate bad sectors and repair the file. If that does not work, you will probably need to reinstall Windows or restore from backup.

You cannot boot to Safe Mode because an operating system file is corrupt. Safe Mode loads a minimum set of drivers, but it still requires that the operating system files be valid.

You cannot use System Restore from Recovery Console. System Restore requires Windows XP. Also, System Restore is used to recover from configuration problems caused by installing applications or updating drivers. It does not perform a check disk
A user's computer cannot boot because an operating system file is corrupt.

What should you try first to resolve the problem?

Boot to Safe Mode and use System Restore.

Boot to Recovery Console and run chkdsk.

Boot to Recovery Console and use System Restore.

Boot to Safe Mode and run chkdsk.
You should right-click the disk and select Reactivate Disk. This should place the disk back online, and the disk volumes should become available. You can also reactivate the disk from a command line using diskpart. To do so, first enter diskpart and press Enter. Then, at the diskpart prompt, you can use the list command to list the disks to determine the disk's number. Then, you can select the disk and use the online option to bring it online.

You should not right-click the disk and select Import Foreign Disks. You would do this if the disk's status were Foreign. This status occurs when you move disks from one computer to another. For the disk to be available, you have to import it on the new system.

You should not run Convert.exe from a command line. The Convert.exe command-line utility is used to convert a FAT partition to NTFS.

You should not run a Disk Cleanup. Disk Cleanup is a utility that is used to free up disk space occupied by files that are no longer needed.
You access Disk Management on your Windows XP computer. You notice that one of your dynamic disks has a Status of Offline.

What should you do?

Right-click the disk and select Reactivate Disk.

Run a Disk Cleanup.

Run Convert.exe from a command line.

Right-click the disk and select Import Foreign Disks
A BTX motherboard is bigger than the other types of boards and can support more onboard components. A distinguishing feature of the BTX design is that it supports the placement of components that produce heat in the area between the power supply's fan and the air intake vents of the case. Placing the component in this area helps to minimize the need for cooling fans. This design also supports the use of passive heat sinks.

The NLX form factor is designed for ultra-compact, low-profile designs. Because of the low-profile used for the case, many adapter cards cannot fit in the case unless you use a riser board.

The ATX form factor is the "classic" form factor for motherboards and cases that has been used since the 1990's. With this design, the motherboard slots for expansion cards are at right angles to the slots for the processor and memory, and the case is tall enough to accommodate this design.

A Micro ATX motherboard is smaller than an ATX motherboard, but the Micro ATX case does not have the low profile that an NLX case does. A distinguishing feature of the Micro ATX design is that it uses less power and produces less heat than the ATX design does.
Which motherboard form factor was specifically designed to address the heat generated by the processor and other chips?

Micro Advanced Technology Extended (Micro ATX)

Balanced Technology Extended (BTX)

New Low-Profile Extended (NLX)

Advanced Technology Extended (ATX
Most likely, the user's browser has been hijacked. Browser hijacking occurs when malicious code changes the browser settings. This can cause unusual browser behavior, such as forcing redirection to undesired sites or disallowing access to sites.

These symptoms would not indicate that the user has recently modified his browser settings. There are no browser settings that the user might have changed that would generate this unusual browser behavior.

These symptoms would not indicate that the user does not have a home page defined. The home page that a user has defined in his browser settings only controls which page is initially displayed when the browser is opened. It would not cause this unusual browser behavior.

These symptoms would not indicate that the user has a corrupt Master Boot Record (MBR). With a corrupt MBR, the computer would not be able to boot.
You have a user that reports unusual browser behavior. Each time the user launches his browser, he is redirected to an unintended URL instead of his home page.

What is most likely the problem?

The user has a corrupt MBR.

The user's browser has been hijacked.

The user does not have a home page defined.

The user has recently modified his browser settings
You should run secpol.msc and modify the Security Options. Running secpol.msc launches the Security Policy Editor snap-in. You select Security Options under Local policies in the Local Security Settings console tree. Then, you select User Account Control: Detect application installations and prompt for elevation and select the Disabled option. User Account Control (UAC) prevents users from performing administrative tasks. By default, only the Administrator account can do so. All other accounts are considered standard user accounts. If they attempt to perform an administrative task, they are prompted for the administrative credentials.

You should not turn UAC off. This would disable UAC altogether. This would allow Jim to run with full administrative privileges. In this case, it would be better to modify the security options than to disable UAC.

You should not implement Encrypting File System (EFS). EFS provides data encryption at the file-system level. It does not control how a user is prompted regarding elevated privileges.

You should not provide Jim administrator credentials. This might give Jim more privileges than what is required in this case. He could perform other administrative tasks that might not be appropriate. In addition, you did not want Jim to be prompted for administrator credentials
You have a user named Jim who is a local administrator running Windows Vista on his desktop computer. Each time Jim attempts to install a program on his computer, he is prompted for administrator credentials. You want to allow Jim to be able to install programs without receiving this prompt.

What should you do?

Turn UAC off.

Implement EFS.

Provide Jim administrator credentials.

Run secpol.msc and modify the Local Security Settings
Mini-PCIe cards are common expansion slots in modern laptops for such things as wireless networking adapters, modems, and TV tuner cards. A Mini-PCIe card has a 52-pin card edge connector.

Type IA, IB, IIAA, and IIBB Mini-PCI cards have 100-pin stacking connectors. Mini-PCIe cards are replacing Mini-PCI cards in recent laptops.

Type IIIA and IIIB Mini-PCI cards have 124-pin card edge connectors.

No type of Mini-PCI or Mini-PCIe card uses a 124-pin stacking connector
Which of the following describes the connector for Mini PCIe cards?

52-pin card edge connector

100-pin stacking connector

124-pin stacking connector

124-pin card edge connector
The most likely cause of the problem is that the files are now marked Read-only. To correct the problem, you should clear the Read-only attribute on the files. This will allow the user to modify the files without having to do a Save As.

Adding the user to another group will not solve the problem. The problem is not caused by the lack of permissions.

You should not delete the files and then perform the restore operation again. When the files were restored from the CD, the Read-only attribute was set. This would probably still be the case if you repeated the operation.
A user reports that after her data was backed up to a CD and then restored to a new computer, she cannot save documents that she opens. She can only perform a Save As operation.

You need to correct this problem as quickly as possible.

What should you do?

Clear the Read-only attribute on the files.

Add the user to the Power Users group.

Delete the files and perform the restore operation again.

Add the user to the Administrators group.
An extension magnet would allow you to retrieve the errant screw.

A multimeter is used to check voltage, current, and resistance. It is not used to get into tight spaces.

A Torx wrench is used to open and repair PCs and peripherals.

A multi-driver is a screwdriver that has multiple bits so that you can perform different tasks with the same screwdriver.
You lose a screw at the bottom of the printer that you are working on. You cannot pick up the screw with your hand because the area is too small.

What tool can you use to retrieve it?

Torx wrench

Multimeter

Extension magnet

Multi-driver
You should check the IP address assigned to the printer. For a printer with a network interface to be able to communicate with computers on the network, it must be assigned an address on the same network. It is possible that the printer is not configured with a proper IP address. You may need to use the computer that is directly connected to the printer to configure the printer with an IP address. When there is a communication problem, you can also try reconnecting the cables and powering the printer off and back on.

You should not reboot the computer. The computer that is directly connected to the printer is not having printing difficulties. There is nothing in the scenario to indicate that rebooting the computer will solve the problem.

You should not clean the paper dust from the print heads. Paper dust on the print heads can interfere with the signal sent to the print heads and can cause white lines in the printouts. It would not prevent network users from accessing the printer.

You should not check the connection to the print head ribbon. The connection between the print head and the print head ribbon can come loose over time. This could cause white lines in the printouts. It would not prevent network users from accessing the printer
You are troubleshooting a network inkjet printer. The printer is connected directly to one computer by USB. Users on that computer can access the printer. The printer also has an Ethernet port and is connected to the network. Users on the network are unable to access the printer.

You need to make the printer available to users on the network.

What should you do?

Clean the paper dust from the print heads.

Check the connection to the print head ribbon

Reboot the computer that is directly connected to the printer.

Check the IP address assigned to the printer.
To enable Vista Aero, you need to set the Color to 32-bit and set the color scheme to Windows Aero.

You do not need to set the Theme to Windows Aero, but you should set it to Windows Vista.

You do not need a screen resolution of 1280 by 1024.

You do not need to press the Windows Logo + Tab keys. Pressing the Windows Logo + Tab keys will turn on Flip 3D, a feature of Aero, but this is not a step that enables Aero.

To support Aero, the monitor must also have a refresh rate greater than 10 hertz (Hz).
You upgraded the video card in a computer running Windows Vista to a Windows Display Driver Model (WDDM) compatible card. You now need to configure your desktop for Windows Aero.

What should you do? (Choose two.)

Set the Theme to Windows Aero.

Set the resolution to 1280 by 1024 or higher.

Press the Windows Logo + Tab keys.

Set Color to 32 bit.

Set the Color Scheme to Windows Aero
To enable Vista Aero, you need to set the Color to 32-bit and set the color scheme to Windows Aero.

You do not need to set the Theme to Windows Aero, but you should set it to Windows Vista.

You do not need a screen resolution of 1280 by 1024.

You do not need to press the Windows Logo + Tab keys. Pressing the Windows Logo + Tab keys will turn on Flip 3D, a feature of Aero, but this is not a step that enables Aero.

To support Aero, the monitor must also have a refresh rate greater than 10 hertz (Hz).
You upgraded the video card in a computer running Windows Vista to a Windows Display Driver Model (WDDM) compatible card. You now need to configure your desktop for Windows Aero.

What should you do? (Choose two.)

Set the Theme to Windows Aero.

Set the resolution to 1280 by 1024 or higher.

Press the Windows Logo + Tab keys.

Set Color to 32 bit.

Set the Color Scheme to Windows Aero.
An address in the subnet 169.254.0.0 indicates that the address was assigned by Automatic Private Internet Protocol Addressing (APIPA). An APIPA address is assigned when a network adapter is configured to obtain an IP address automatically, no Dynamic Host Configuration Protocol (DHCP) server can be found, and there is no Alternate Configuration.

255.255.255.0 is not a valid IP address. It is the default subnet mask for the Class C subnet.

127.0.0.1 is the loopback address for any computer. The loopback address is used to troubleshoot problems with the TCP/IP stack or network adapter.

The address 192.168.0.1 is a valid Class C address and is the address automatically assigned to the internal interface of a computer that shares an Internet connection using Internet Connection Sharing.
A network adapter is configured to obtain an IP address automatically. Which IP address indicates that the computer was unable to contact a DHCP server?

127.0.0.1

192.168.0.1

169.254.10.23

255.255.255.0
When a laptop is configured to use shared video memory, a portion of main memory is used by the video adapter. If graphic-intensive applications are used, you should subtract the amount of shared video memory from the amount of main memory to determine how much Random Access Memory (RAM) is available for applications and the operating system to use. In this case, that is 1024-64 = 960 MB.

You will not have 1024 MB of RAM available because 64 MB of memory will be used by the video adapter. You would have 1024 MB of RAM available if the laptop had dedicated video memory.

You do not need to subtract the video memory from each memory chip. You add the total amount of RAM and subtract the amount of shared video memory to obtain the total available memory.

You do not add the amount of shared memory to the total available.
You add 512 MB of RAM to a laptop computer that already has 512 MB of RAM. The laptop computer is configured for 64 MB of shared video memory. The user runs graphic intensive applications.

How much memory is available for the operating system and applications?

1088 MB

960 MB

896 MB

1024 MB
Logging on with a user name and password is an example of authentication. Authentication is the process of verifying that a person or thing is who or what it declares itself to be. The user name identifies the user and the password verifies that identification.

This is not an example of identification. Identification is simply claiming an identity without verification.

This is not an example of authorization. Authorization is granting access permissions based on an identity. Authorization typically occurs immediately after authentication, but they are, in fact, separate processes.

This is not an example of impersonation. Impersonation is when a person takes on the identity of another person, masquerading as that person. This is a common type of social engineering attack
The process of logging onto a network with a user name and password is an example of which of the following?

Authorization

Identification

Authentication

Impersonation
This might indicate that the driver for the network adapter is invalid. It might also indicate a problem with the network adapter itself.

This would not indicate that the network adapter has been disabled. If the device was disabled, a red X icon would be displayed instead.

This would not indicate that DNS is not functioning or that DHCP is disabled. Device Manager is used to troubleshoot problems with devices connected to a computer and their drivers.
You are unable to access the network from your Windows XP computer. In Device Manager, the network adapter is shown with an icon containing an exclamation point inside a yellow circle.

What might this indicate?

The network adapter has been disabled.

The driver for the network adapter is invalid.

DNS is not functioning properly.

DHCP is disabled.
The best way to determine whether the problem is caused by a faulty port is to attach a loopback adapter to the port. A loopback adapter allows you to isolate the problem and determine whether it is caused by the port because it removes the printer and the cable as variables. If the loopback completes successfully, you know that the port is not the problem and you can then try a different cable to see if the problem is caused by the cable. If the loopback does not complete successfully, you know the problem is caused by the port itself.

Attaching a printer cable that you know works will not allow you to determine whether the problem is caused by the port. It will only allow you to eliminate the cable as the cause of the problem.

Pressing the self-test button on the printer will print a test page. This will ensure that the printer can print characters, but it will not help you isolate the communication problem.

Enabling bidirectional support on the port will not allow you to determine whether the port is causing the problem. Bidirectional support allows two-way communication between the operating system and the printer. However, if the port is not functioning, the cable is faulty, or the printer's parallel connector is not working, bidirectional messages will not be passed.
You are troubleshooting a user's connection to a printer. The printer is attached to the parallel port on the user's computer.

How can you determine whether the problem is caused by a faulty port?

Attach a parallel cable that you know works.

Enable bidirectional support on the port.

Press the self-test button on the printer.

Disconnect the printer cable and attach a loopback adapter to the port.
You should select Start > Control Panel > Administrative Tools > Event Viewer. This will launch the Event Viewer to allow you to view the entries recorded in the Security log. You will be able to view the failed logon attempts. You can also view the entries in the Security, Application, or System logs from Computer Management in Administrative Tools.

You should not select Start > Control Panel > Administrative Tools > Performance. This would allow you to view performance-related data, such as how resources are currently being utilized.

You should not select Start > Control Panel > System. This would provide you with basic system information, such as the amount of memory installed and information about installed hardware and software.

You should not select Start > Accessories > System Tools > Security Center. In Windows XP, Security Center is used to manage security-relating settings, but it cannot be used to view security-related events that have occurred.
You have enabled logon auditing on your Windows XP computer. You want to see the failed logon attempts.

What should you select?

Start > Accessories > System Tools > Security Center

Start > Control Panel > Administrative Tools > Performance

Start > Control Panel > Administrative Tools > Event Viewer

Start > Control Panel > System
You should run MSConfig and select the Startup tab. MSConfig provides a graphical interface that you can use to configure the boot process, including modifying boot configuration files and minimizing the programs that are loaded when the computer is booted. You can use the Startup tab to control which programs load at startup. You can also use Windows Defender to prevent a program from loading.

You should not run MSConfig and select the Boot tab. The Boot tab contains options that allow you to modify the boot process, but not the applications that are loaded at startup.

You should not run the Bootrec.exe command. The Bootrec.exe utility is used to troubleshoot and correct problems with booting, such as problems with the disk's boot sector or master boot record (MBR) or the Boot Configuration Data (BCD). You can use this command to rebuild the BCD or fix a corrupt MBR.

You should not delete the programs that should not load from C:\Documents and Settings\username\Start Menu\Programs\Startup folder. This is the startup folder location in XP. In Vista, the startup programs are not stored in this location. Instead, they are stored at C:\Users\username\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup.

You should not run MSConfig and select Selective Startup from the General tab. Selecting this option allows you to not load any services or startup items, but you cannot customize the Selective Startup option for each different application as required in this case
It takes a long time for your Windows Vista computer to start up. You want to minimize the number of applications that are automatically loaded at startup. You need some applications to load, but you want to prevent others from loading.

What should you do?

Run MSConfig and select the Startup tab.

Delete the programs that should not load from C:\Documents and Settings\username\Start Menu\Programs\Startup folder.

Run MSConfig and select the Boot tab.

Run the Bootrec.exe command.

Run MSConfig and select Selective Startup from the General tab.
After upgrading the BIOS on a motherboard, the new BIOS will likely take up more bytes of ROM than the replaced BIOS. The difference in the BIOS image file byte count is detected by the system as a checksum error. CMOS checksum errors require that you enter Setup, check and save your settings, and exit Setup a second time.

You should not reboot and flash the BIOS again because reflashing the BIOS would most likely result in the same error.

You should not replace the BIOS chip with a new one. A checksum error does not indicate a failure of the BIOS hardware.

You should not press the ENTER key and turn off the computer to avoid losing data. A checksum error will not cause any loss of data.
After upgrading your system BIOS with an update from the manufacturer, you receive a CMOS Checksum error after rebooting.

What should you do to clear the error?

Reboot the PC, enter CMOS setup, and check and save CMOS settings.

Replace the BIOS chip with a new one from the manufacturer.

Reboot the PC and try to flash the BIOS again.

Press the ENTER key and turn off the computer before all data is lost
With the power disconnected, you can clear the settings held in the CMOS if you remove the motherboard battery and then replace it (preferably with a new one). This temporarily removes voltage to the CMOS chip so that stored settings are erased, and it is reset. Some motherboards have a jumper to clear the CMOS chip, and some CMOS setup programs have a feature called Restore Default Settings.

Do not confuse the ROM that holds the BIOS with the CMOS chip that holds the configuration settings. BIOS is non-volatile, while CMOS is actually volatile RAM that is powered by battery.

Flashing the BIOS refers to upgrading the BIOS to a newer version. You upgrade the BIOS to take advantage of new features or bug fixes, not to wipe the CMOS settings.

Hard drives need to be high-level formatted before they can be used, but CMOS passwords will remain even after the hard drives are reformatted. Hard drives rarely if ever need low-level formatting. You might have to perform a low-level format if you were installing another operating system (for example, UNIX) on the same drive that used different track and sector divisions.

Replacing the power supply or the floppy drive will not delete the CMOS password
Someone has put a Supervisor Password on the CMOS Setup Utility, which prevents you from making changes to CMOS. You decide to erase the password by erasing CMOS.

What steps are necessary to wipe out the current CMOS password? (Choose two.)

Low-level format the hard drive.

Flash the BIOS.

Remove the motherboard battery.

Replace the floppy drive.

Unplug power.

Replace the power supply.

High-level format the hard drive.
You might use the ping command to verify that a computer is connected to the network. The ping command sends test data packets to a target destination. Receiving replies to these requests ensures that the TCP/IP configuration on the destination is correct and that the computer is online and connected to the network.

You would not use the ping command to see if Windows Firewall is blocking incoming connections. To perform this task, you would access Windows Firewall from the Control Panel.

You would not use the ping command to verify that Domain Name System (DNS) name resolution is working or verify other DNS configurations. To perform these tasks, you would use the Nslookup command.

You would not use the ping command to release a DHCP lease and request a new one. To perform this task, you would use the Ipconfig command.
You are troubleshooting networking connectivity issues. For what purpose might you use the ping command?

To release a DHCP lease and request a new one

To verify that DNS name resolution is working

To verify that a computer is connected to the network

To see if Windows Firewall is blocking incoming connections
The most likely problem is that the application installed adware on the computer. Some applications install adware when you install the primary application. You cannot install the application without installing the adware, but you usually can remove the adware after installation. This happens most often with freeware or shareware downloaded from the Internet.

Adware is an application that causes advertisements to appear on the user's computer, typically as banner ads or pop-up ads. Most adware is annoying rather than a direct threat, but some adware also acts as spyware, collecting information and forwarding it to a third party.

The application is not a Trojan horse. A Trojan horse is an application that looks like one thing but is actually something else. If the application were a Trojan horse, you would not see its effects until you launch the application.

The application does not contain a logic bomb. A logic bomb is an application that is designed to attack a computer system based on a specific event, such as a calendar date.

It is not likely that the program installed a worm. A worm does not attach itself to files. A worm spreads by network connections and by finding vulnerable systems
A user installs an application on a computer running Windows. After installing the application, the computer begins receiving a series of pop-up ads.

What is most likely wrong?

The application installed a worm.

The application contains a logic bomb.

The application installed adware on the computer.

The application is a Trojan horse.
You should purchase a multi-driver with multiple tips. A multi-driver is a screwdriver with removable tips. As long as you get a good collection of flat-head, Phillips-head, and Torx tips, the technician will have what he or she needs.

You should not purchase a multi-driver with multiple magnetized tips. While a multi-driver allows you to meet the technician's needs with a single tool, the magnetized tips should not be used around computers.

You should not get sets of Torx, Phillips, and flat-head screwdrivers. Although this would meet the technician's needs, it would mean purchasing more tools than if you purchased a multi-driver with the necessary tips.

You should not get sets of Phillips and flat-head screwdrivers. This solution does not include Torx screwdrivers, which can be necessary when working on laptop computers. It would also mean purchasing more tools than necessary.
You need to buy tools for a new technician. You want to select a screwdriver solution that will allow the technician to remove the types of screws he will encounter when repairing laptop computers. You want to keep the number of tools needed to a minimum.

What should you purchase?

Multi-driver with multiple magnetized tips

Sets of Torx, Phillips, and flat-head screwdrivers

Sets of Phillips and flat-head screwdrivers

Multi-driver with multiple tips
You should explicitly deny read access to the folder to Alice through local access security. This will prevent Alice from having any access to the folder without impacting any other domain users. Because shared access is determined by comparing local and shared access security and applying the most restrictive, this would also block shared access to the folder.

You should not explicitly deny read access to the folder to Alice through shared access security. This would not prevent Alice from logging on at the file server and accessing the folder locally.

You should not remove Alice from any domain group that has access to the Graphics folder. This would not prevent access granted through user permissions or the Domain Users group. You cannot remove a user from the Domain Users group.

You should not deny read access to the Graphics folder to any group to which Alice belongs. This would deny Alice access to the folder, but it would also deny access to any other group members.
You need to ensure that Active Directory domain user Alice does not have read access to the folder named Graphics. The Graphics folder is shared to the network from the server named FS0. The disk partition on which Graphics is located is formatted as NTFS.

Your solution should not impact other users.

What should you do?

Deny read access to the Graphics folder to any group to which Alice belongs.

Explicitly deny read access to the folder to Alice through local access security.

Explicitly deny read access to the folder to Alice through shared access security.

Remove Alice from any domain group that has access to the Graphics folder
Damp paper can cause paper jams, fuzzy print, poor output quality, and multiple page feed. Paper jams can occur due to damp paper because the paper needs to slide smoothly through the paper handling elements. Damp pages may also stick together, allowing more than one sheet to go through the printer (multiple page feed). This will cause blank pages to appear between printed pages. Fuzzy and poor quality output will occur because the water in the paper will interfere with the transfer of the toner.

A dirty developer unit or a partially empty toner cartridge can cause white lines.

Loose toner on the printed page is the result of the fuser not heating to the proper temperature.

When the photoreceptor drum wears, it holds less of a charge and attracts less toner, which in turn causes lighter (gray) print.
What symptoms could result from using damp paper in a laser printer? (Choose four.)

Unfused toner on the printed page

Gray print

Fuzzy print

Multiple page feed

White streaks through the text

Paper jams

Poor quality output
User Access Control (UAC) allows users to perform non-administrative tasks. They can also perform administrative tasks if they know the administrator credentials. This security feature in Windows Vista prevents unauthorized users from performing administrative tasks. By default, only the Administrator account can do so. All other accounts are considered standard user accounts. If they attempt to perform an administrative task, they are prompted for the administrative credentials.

Share permissions provide permissions for users and groups connecting to a network share. They specify what type of access the user or group should have to the share. Valid values are Read, Change, and Full Control.

NTFS permissions provide permissions for users and groups at the file-system level to access files and folders.

BitLocker provides volume-level encryption under Windows Vista Ultimate and Enterprise Editions. BitLocker also performs pre-boot security tests to ensure that the disk has not been moved to another computer and that the boot configuration has not been altered.
You have a computer running Windows Vista.

What security component allows users to be able to perform most tasks with standard user privileges, but also perform administrative tasks if they have administrator credentials?

UAC

Share permissions

NTFS permissions

BitLocker
You should connect the heatsink/fan to the CPU fan header on the motherboard. Because the user connected the heatsink/fan to a Molex connector, the motherboard cannot monitor the CPU fan and reports that it is not present, which causes the CPU fan error. To enable the motherboard to monitor the CPU fan, you should connect it to the CPU fan header on the motherboard. If the CPU fan does not have the proper type of connector, you can purchase an adapter. You could also turn off the monitoring of the CPU fan in the system Basic Input/Output System (BIOS), but that would disable an important monitoring tool.

You should not reapply the thermal paste or get a more powerful heatsink/fan. The problem is not that the CPU is overheating. The problem is that the motherboard is not able to detect the fan because it is not connected to the motherboard.

The heatsink/fan is not defective. The fan is spinning when the system is powered up. The problem is that the motherboard cannot detect the fan.
A user attempted to replace the CPU heatsink/fan on his computer. He bought a compatible heatsink/fan, used thermal paste during the installation, and connected the heatsink/fan to a Molex connector on the power supply.

Now he reports that the computer issues a CPU fan error when he attempts to start the computer.

You examine the system and note that the CPU fan is spinning when the system is powered up.

You need to solve the user's problem with the heatsink/fan.

What should you do?

Replace the heatsink/fan with one that is not defective.

Connect the heatsink/fan to the CPU fan header on the motherboard.

Replace the heatsink/fan with a more powerful one.

Remove the heatsink/fan and re-apply the thermal paste
You could choose an Intel Core2 Duo or Core2 Extreme processor. A common socket type for Core2 Duo and Core2 Extreme processors is the LGA 775/Socket T design.

You should not choose a Pentium M processor. This Intel processor uses a socket 479 motherboard.

You should not choose a Phenom II processor. The Phenom II processor by Advanced Micro Devices (AMD) requires a Socket AM3 motherboard. Socket AM3 follows the Socket AM2 and AM2+ designs. Socket AM3 can use Phenom II, Athlon II, and Sempron processors.

You should not choose the Athlon 64 X2 processor. This is an AMD processor that is compatible with Socket AM2 and AM2+ motherboards.

Most motherboards can only accept a narrow range of processors from one manufacturer. Switching processors can often mean having to also upgrade the motherboard and heat sink and fan.
You want to upgrade the processor in a computer that has an LGA 775 motherboard.

Which processor could you use without having to upgrade the motherboard?

Athlon 64 X2 processor

Core2 Extreme processor

Pentium M processor

Phenom II processor
You should use System Restore to create a restore point. A restore point is a non-destructive way to revert a computer to a particular configuration state. Although some installation programs create a restore point, not all of them do. Therefore, to be safe, you should manually create a restore point before installing the application.

Creating an ASR backup will not meet the requirements. An ASR recovery is a destructive recovery that will reformat the hard disk and require you to reinstall all data files.

Saving a copy of the Registry to a separate location is not the best way to manage recovery. The Registry cannot be replaced manually while you are running Windows XP. Also, it is possible that all configuration changes made by the application will not be saved to the Registry. For example, a .NET Framework application might install a component in the Global Assembly Cache.

Last Known Good Configuration cannot be used to meet the requirements because it is likely you would not know the application is not working until the Last Known Good Configuration has been replaced by a new one. Last Known Good Configuration is updated each time you log on successfully.
You are preparing to install an application on a user's computer, which is running Windows XP Professional.

How can you ensure that you can restore the system to its current state if the application does not work correctly after it is installed?

Create a restore point.

Create an Automated System Recovery (ASR) backup.

Use Last Known Good Configuration.

Save a copy of the Registry to a separate location
You should disconnect a device from its power source before measuring resistance. If the device is connected to the power source, the multimeter might be damaged when you attempt to measure resistance.

You should not touch the black probe to ground when measuring resistance. Resistance is measured across a circuit, so you should touch the leads to each end of the circuit you are measuring. You touch the black probe to ground when measuring voltage.

You should not touch the red probe to ground when measuring resistance. You should touch the leads to each end of the circuit you are measuring.

You should not connect the device to a power source. You must connect the device to the power source when measuring voltage, but you should not do so when measuring resistance.
You are using a multimeter to troubleshoot a problem with a circuit. What should you do before measuring resistance?

Touch the red probe to ground.

Connect the device to a power source.

Disconnect the device from its power source.

Touch the black probe to ground
You should press the CTRL+ALT+Delete keys and click the Processes tab. Task Manager provides information about the processes and programs running on a computer and allows you to view the background processes that are consuming the most CPU resources. From the Processes tab, you can click the heading of the CPU column to sort the list of running processes in ascending or descending order based on the amount of CPU resources each is consuming. You can also use Task Manager to terminate a running background task or change its priority. You can quickly access Task Manager by pressing the CTRL+ALT+Delete keys.

You should not click the Start Button and Select Run, type perfmon.msc, and click OK. This would launch System Monitor. System Monitor is used to monitor real-time performance of system components, operating system processes, and applications. You could use the % Processor Time performance counter to view the overall processor usage, but you would not be able to see which specific background processes are using the most processor resources.

You should not run MSConfig from the command line. MSConfig provides a graphical interface that you can use to configure the boot process, including modifying boot configuration files and minimizing the programs that are loaded when the computer is booted. It does not show current CPU utilization.

You should not launch the Event Viewer from Computer Management in Control Panel. Event Viewer is used track events that have been written to the System, Security, and Application logs. It does not show current CPU utilization.
You have a Windows XP computer that is running extremely slowly. You want to view the background processes that are consuming the most processor resources.

What should you do?

Run MSConfig from the command line.

Launch the Event Viewer from Computer Management in Control Panel.

Press the CTRL+ALT+Delete keys and click the Processes tab.

Click the Start Button and Select Run. In the Run dialog box, type perfmon.msc and click OK
The Services Microsoft Management Console (MMC) allows you to manually start or stop a service. You can also set the startup mode of a service to Manual, Automatic, or Disabled. For example, if your laptop's wireless adapter stops being able to locate and connect to wireless networks, the Wireless Zero Configuration service may have stopped. You can restart the service to restore the functionality. You can access the Services MMC from the Administrative Tools menu or through the Computer Management MMC.
You need to manually restart a service on a computer running Microsoft Windows XP.

Which paths can you use? (Choose two.)

Start > Control Panel > Administrative Tools > Computer Management > Services

Start > Control Panel > Services

Start > All Programs > Computer Management > Services

Start > All Programs > Services

Start > Control Panel > Administrative Tools > Services
A multimeter is a diagnostic device that combines several tools into one. A multimeter has two probes, a function selector, and a display. You can use a multimeter to measure resistance in ohms, to measure voltage in volts DC or AC, or to measure current in amperes (amps).

You do not usually use a multimeter to measure static electricity. Static electricity occurs randomly and would not be measured at all in most cases. You can use antistatic pads and wrist straps to control static electricity.
Multimeters are commonly used to measure which of the following? (Choose three.)

Current

Static electricity

Voltage

Resistance
You would use the Convert.exe command to change an existing FAT32 volume to use NTFS. For example, you would use the following command to convert your D drive formatted as FAT32 to NTFS:

Convert.exe D: /FS:NTFS

NTFS volumes offer more flexibility allowing for larger files and partitions, encryption, disk quotas, and file permissions. You should note that you cannot convert a NTFS volume containing data back to FAT32 without reformatting.

You would not use the Convert.exe command to format a disk volume as NTFS. To format a disk as NTFS, you would use the format command and specify the /FS:NTFS switch. This would erase all data on the disk.

You would not use the Convert.exe command to update a device driver. To update a device driver, you would use Device Manager. Device Manager is used to manage devices in and connected to the computer. You can use Device Manager to troubleshoot problems with devices that are not working properly or update or remove device drivers. You can access Device Manager by using Computer Management in Administrative Tools, by right-clicking the My Computer icon and selecting Properties, or by running devmgmt.msc.

You would not use the Convert.exe command to defragment the hard drive. To defragment the hard drive, you would use the Defrag.exe command-line utility or the Disk Defragmenter. The Disk Defragmenter can be accessed from Computer Management in Administrative Tools or from System Tools in Accessories. You would use Defrag.exe if you needed to defragment the drive without the user having to provide any input
You have a Windows XP Professional computer that has a one IDE hard disk formatted as FAT32.

For what purpose would you use the Convert.exe command?

To update a device driver

To format a disk volume as NTFS

To defragment the hard drive

To change the existing FAT32 volume to use NTFS
Undesired pop-ups appearing frequently would likely indicate that your computer was infected with spyware. Spyware collects information and forwards it to another party. Spyware typically runs in the background.

If your computer will not boot, repeatedly attempts to reboot, or shuts down unexpectedly, it would more likely indicate your computer was infected with a virus, not spyware
You are concerned that your computer may be infected with spyware. Which symptom would more likely indicate this?

Your computer shuts down unexpectedly.

Your computer will not boot.

Undesired pop-ups frequently appear.

Your computer repeatedly attempts to reboot.
You should check that the graphics adapter and the TV's Digital Visual Interface (DVI) input comply with the HDCP standard. Commercial Blu-Ray movies use HDCP, and the user will be unable to play the movies on the TV unless the DVI interface on the computer and the TV support HDCP. DVI compliance with HDCP is optional. You should also note that Blu-Ray discs can only be played on Blu-Ray drives and devices that contain Blu-Ray drives. A standard DVD drive cannot play a Blu-Ray disc.

You should not check that the TV's High Definition Multimedia Interface (HDMI) input complies with the HDCP standard. HDMI is HDCP-compliant.

You should not purchase an HDMI graphics adapter or a DVI-to-HDMI cable. As long as the DVI interface supports HDCP, these steps are not necessary.

You should not purchase an external Serial Advanced Technology Attachment (eSATA) adapter and cable. An eSATA adapter is a bracket that attaches to the back panel of the computer that connects ports for eSATA drives to the SATA ports on the motherboard. There is an available drive bay and SATA port, and nothing in the scenario indicates that the user requires an external drive.
You are installing a Blu-Ray optical drive in a customer's computer. The customer wants to play commercial Blu-Ray movies on a high-definition TV.

The computer has an available drive bay and an available SATA port. The Blu-Ray drive also uses SATA. The computer has a graphics adapter with a DVI port, and the TV has a DVI input and an HDMI input available.

What should you do first? (Choose two.)

Check that the TV's HDMI input complies with the High-bandwidth Digital Content Protection (HDCP) standard.

Check that the graphics adapter complies with the High-bandwidth Digital Content Protection (HDCP) standard.

Purchase a new graphics adapter with an HDMI interface.

Purchase a DVI-to-HDMI adapter cable.

Check that the TV's DVI input complies with the High-bandwidth Digital Content Protection (HDCP) standard.

Purchase an eSATA adapter and cable
You should use System Restore. This option allows you to restore system files to an earlier time. Windows Vista provides a set of recovery tools known as WinRE that you can access when booting from the Vista installation DVD. You can select Repair your computer. From the System Recovery Options window, you can select System Restore.

You should not use Bootrec.exe. The Bootrec.exe command allows you to fix booting issues, such as rebuilding the Boot Configuration Data (BCD) store, rewriting the Master Boot Record (MBR), or fixing a corrupt Bootmgr.exe file. You access the Bootrec.exe command by selecting Command Prompt from System Recovery Options.

You should not use Startup Repair. Selecting this option from System Recovery Options will allow you to correct problems that might be preventing the operating system from loading, such as missing or corrupt system files, but it does not restore system files to a specific previous point in time.

You cannot use Recovery Console. The Recovery Console is available with Windows XP, but not with Vista
You have been experiencing problems with the computer running Windows Vista Ultimate recently. You want to restore the system files as they existed at an earlier time, without affecting document files that you created since then.

What should you use?

Startup Repair

Bootrec.exe

Recovery Console

System Restore
When you are using a multimeter to test a network cable for a break, a reading of infinite resistance would indicate that there is a break in the cable. A multimeter is a diagnostic device that combines several tools into one. A multimeter has two probes, a function selector, and a display. You can use a multimeter to measure resistance in ohms, to measure voltage in volts DC or AC, or to measure current in amperes (amps). When you measure resistance, you can identify a faulty cable.

A measurement of 0 amps, 0 volts, or +3.3 volts would not indicate a break in the cable. If you are measuring resistance, you are measuring ohms, not amps or volts
You are using a multimeter to test a network cable for a break.

What reading would indicate that there is a break in the cable?

0 amps

0 volts

Infinite resistance

+3.3 volts
You should examine the C:\Documents and Settings\All Users\Desktop folder. This folder contains all the files and folders that all users will see on the desktop when they log on.

You should not examine the C:\Users\Public folder. This folder would be used on a Windows Vista computer to store data that should be shared by all users that log on.

You should not examine the C:\Users\Public\Desktop folder. You would explore this location if you were running Windows Vista, not Windows XP.

You should not examine the C:\Documents and Settings\All Users\Documents folder. This folder contains all documents that can be accessed by any logged on user.
You have several users that share a Windows XP computer. You want to view the desktop items that are visible for any user that logs on.

Which folder should you examine?

C:\Users\Public

C:\Users\Public\Desktop

C:\Documents and Settings\All Users\Desktop

C:\Documents and Settings\All Users\Documents
You would purchase a disk drive that uses the SATA V2 standard instead of the original SATA standard when you need to optimize performance for audio and video applications. Although both versions can support Native Command Queuing (NCQ), SATA V2 includes a new NCQ command that makes data transfers for applications that use a lot of bandwidth more efficient than data transfers performed by disk drives based on the original SATA standard.

All versions of SATA support hot swapping of disk drives.

To support an external disk drive, you should purchase an external SATA (eSATA) adapter and disk drive instead of a disk drive that uses either SATA v2 or the original SATA standard. An eSATA adapter is a bracket that attaches to the back panel of the computer that connects ports for eSATA drives to the SATA ports on the motherboard. eSATA drives operate at the same throughput as internal SATA drives, which offers a faster alternative to external Universal Serial Bus (USB) drives.

Unlike older Parallel ATA (PATA) drives (also known as EIDE drives), neither SATA drives nor SATA V2 drives use jumpers.
You are shopping for a hard disk drive for a personal computer (PC) that you are building.

For which reason would you purchase a disk drive that uses the SATA 3.0 (SATA V2) standard instead of the original SATA standard?

You need to support hot swapping of the disk drive.

You plan to install an external disk drive.

You want a drive that does not use jumpers.

You need to optimize performance for audio and video applications
To protect your computer from a Trojan horse, you should regularly perform a virus scan. A Trojan horse is an application that appears to be something, but is actually something else.

You should not implement BitLocker. BitLocker provides volume-level encryption of data for one or more drives or logical volumes on a drive. BitLocker also performs pre-boot security tests to ensure that the disk has not been moved to another computer and that the boot configuration has not been altered. BitLocker is available with Windows Vista Ultimate and Enterprise Editions.

You should not run a Disk Cleanup. Disk Cleanup is a utility that is used to free up disk space occupied by files that are no longer needed. However, this does not protect you from a Trojan horse.

You should not run the Chkdsk command-line utility. The Chkdsk utility is used to check disk and file system integrity. If issues are found, such as bad sectors or cross-linked files, Chkdsk can also attempt to repair the problem. It is a good preventative maintenance practice to periodically run the Chkdsk utility, but it would not protect you from a Trojan horse.
You have a Windows XP computer. You want to protect your computer from a Trojan horse.

What should you do?

Run a Disk Cleanup.

Implement BitLocker.

Regularly perform a virus scan.

Run the Chkdsk command-line utility
You should perform one of the following:

* Select Services from Administrative Tools in Control Panel. Right-click the Help and Support service and select Start.
* Select Computer Management from Administrative Tools in Control Panel. Double-click the Services node. Right-click the Help and Support service and select Start.

You can access running services from the Services option or the Computer Management option under Administrative tools in Control Panel. Both allow you to view the services. You can right-click the service and select Start to start the service. You can also use the SC.exe command-line utility to manage services from a command line.

You should not run MSConfig.exe with the start option and specify the service name. MSConfig provides a graphical interface that you can use to configure the boot process, including modifying boot configuration files and minimizing the programs that are loaded when the computer is booted. It does not allow you to stop and start services.

You should not select the Hardware tab from the System Properties dialog box, right-click the Help and Support service, and select Start. This option provides the ability to manage hardware profiles and drivers. It also allows you to access Device Manager to manage devices attached to the computer. However, it does not provide the ability to start or stop services.

You should not select the Advanced tab from the System Properties dialog box and modify the Startup and Recovery settings. This option provides the ability to configure startup actions and actions to take in case of system failure. However, it does not provide the ability to start or stop services
You have a computer running Windows XP with Service Pack 2. You are unable to access the Help and Support Center and receive a message that the Help and Support service is not running. You need to start the service.

What should you do? (Choose two.)

Select the Advanced tab from the System Properties dialog box. Modify the Startup and Recovery settings.

Run MSConfig.exe with the start option and specify the service name.

Select Services from Administrative Tools in Control Panel. Right-click the Help and Support service and select Start.

Select the Hardware tab from the System Properties dialog box. Right-click the Help and Support service and select Start.

Select Computer Management from Administrative Tools in Control Panel. Double-click the Services node. Right-click the Help and Support service and select Start.
You should use tracert. Tracert is a command-line utility that you can use to track the route that a data packet takes to a specified destination. You can use tracert to determine where the packets are being dropped.

You should not use ipconfig. The ipconfig command-line utility is used to obtain IP configuration information. You can also use ipconfig to release or renew a Dynamic Host Configuration Protocol (DHCP) lease. Ipconfig does not determine where packets are being dropped.

You should not use ping. The ping command is used to test connectivity and verify the TCP/IP stack. The ping command sends test data packets to verify connectivity to another computer using Internet Control Message Protocol (ICMP). Ping does not determine where packets are being dropped.

You should not use nslookup. The nslookup command-line utility is used to verify that Domain Name System (DNS) name resolution is functioning correctly. Nslookup does not determine where packets are being dropped.
You are experiencing dropped packets over your network. You suspect a faulty router and want to determine exactly where the packets are being dropped.

Which tool should you use?

nslookup

ipconfig

tracert

ping
The inverter is part of a laptop's display. It controls how much power is sent to the fluorescent lamps in the Liquid Crystal Display (LCD) panel. The inverter supplies the backlight with power. If the inverter has no power, neither will the backlight. The LCD cutoff switch can also turn off the LCD backlighting.

The inverter does not convert power to the correct setting for the locale. When traveling internationally, you need to ensure that you have a power cable that can accept the input voltage of the locale to which you are traveling. Otherwise, you need to purchase a power converter. You might also need a plug adapter so that the adapter fits the socket.

The inverter does not convert alternating current (AC) to direct current (DC).

The inverter does not affect the amount of voltage required by the laptop
What is the purpose of an inverter in a laptop computer?

The inverter converts power to the correct setting for the locale.

The inverter controls power to the LCD panel.

The inverter converts AC power to DC.

The inverter limits the voltage required by the laptop
You should run the format command with the /? switch. The /? switch will display details about the command including what the command does and the switches available.

You should not run the format command with the /q switch. The /q switch will quick format the drive.

You should not run diskpart command with the /? switch. This will display details about the diskpart command. Diskpart is used to create and manage disk partitions.

You should not run diskpart command with the /s switch. The /s switch specifies a script to use with diskpart.
From a command prompt, you want to format a new hard drive you installed. You are unsure of which switches to specify.

What should you do?

Run the diskpart command with the /s switch.

Run the diskpart command with the /? switch.

Run the format command with the /? switch.

Run the format command with the /q switch
You should use Task Manager. Task Manager provides information about the processes and programs running on a computer and allows you to terminate them or change their priority. Task Manager also provides information about the overall status of the computer, including CPU, memory, and network utilization. You can access Task Manager by pressing the CTRL+ALT+Delete keys.

You should not use the Windows logo key+D shortcut keystroke. This keystroke will display the desktop without having to minimize open windows.

You should not use Administrative Tools. Administrative Tools provides the ability to configure a variety of administrative settings for a computer, including services, the event log, and security policies. Administrative Tools is available in Control Panel.

You should not use Device Manager. Device Manager is used to manage devices in and connected to the computer. You can use Device Manager to troubleshoot problems with devices that are not working properly or update or remove device drivers. You can access Device Manager using Computer Management in Control Panel, by right-clicking the My Computer icon and selecting Properties, or by running devmgmt.msc.
Your computer is running extremely slowly. You identify the background process that is consuming excessive resources. You want to terminate the running processes.

What should you use?

Device Manager

Task Manager

The Windows logo key+D shortcut keystroke

Administrative Tools
The most likely problem is that the Dynamic Host Configuration Protocol (DHCP) server was not found. If the local IP address is in the range 169.254.0.1 to 169.254.255.254 with a subnet mask of 255.255.0.0, the IP address was assigned by Automatic Private IP Addressing (APIPA). APIPA is a feature of Windows that provides failover capability for DHCP. If a computer is configured for automatic IP addressing and the DHCP server cannot be reached or cannot automatically assign an IP address, APIPA assigns an IP address within this private range. All these devices will use a default network mask of 255.255.0.0.

It is not likely that the NIC in the computer is bad. If the NIC in the computer is bad, ipconfig would most likely not return any results.

It is not likely that the NIC has an invalid driver that needs to be updated. If the NIC driver needed to be updated, you might get a dynamically assigned IP address. You would not receive an APIPA address from ipconfig. However, you might experience other connection issues.

The most likely problem is not that Windows Firewall is enabled. Windows Firewall enables you to block or restrict traffic, but it would not cause ipconfig to return these settings
You have a Windows XP computer using dynamic IP addressing that is unable to connect to the network. You run ipconfig, and it produces the following output:

Ethernet adapter Local Area Connection:

Connection-specific DNS Suffix . :
Autoconfiguration IP Address. . . : 169.254.208.001
Subnet Mask . . . . . . . . . . . : 255.255.0.0
Default Gateway . . . . . .

What is most likely the problem?

The DHCP server was not found.

Windows Firewall is enabled.

The NIC in the computer is bad.

The NIC has an invalid driver that needs to be updated
You should use Task Manager. Task Manager provides information about the processes and programs running on a computer, and allows you to terminate them or change their priority. Task Manager also provides information about the overall status of the computer, including CPU, memory, and network utilization. You can access Task Manager by pressing the CTRL+ALT+Delete keys.

You should not use Device Manager because it does not help you determine which processes are consuming excessive CPU and memory resources. Using Device Manager, you can view information about all the devices connected to your computer and install or update device drivers. You can access Device Manager in Computer Management from Administrative Tools in Control Panel. You can also access Device Manager by right-clicking the My Computer icon and selecting Properties. This displays the System Properties dialog box, and you can launch Device Manager from the Hardware tab. You can also launch Device Manager from the Start button by selecting Run and running devmgmt.msc.

You should not use System Information. You can use System Information to view the tasks that are running, but not to see how resources are being used by each process.

You should not use Event Viewer. Event Viewer is used track events written to the System, Security, and Application logs. It does not show current resource utilization.
Your Windows XP computer is running extremely slow. You want to view the processes that are currently running to determine which processes are consuming excessive CPU and memory resources.

What should you use?

Event Viewer

System Information

Device Manager

Task Manager
You should choose a Phenom II processor. The Phenom II processor by Advanced Micro Devices (AMD) requires a Socket AM3 motherboard. Socket AM3 follows the Socket AM2 and AM2+ designs. Socket AM3 can use Phenom II, Athlon II, and Sempron processors.

You should not choose the Athlon 64 X2 processor. This is an AMD processor that is compatible with Socket AM2 and AM3+ motherboards.

You should not choose the Core2 Duo or Core2 Extreme processors. Intel Core2 Duo and Extreme processors are not compatible with motherboards with AMD sockets such as Socket AM3. A common socket type for Core2 Duo and Core2 Extreme processors is the LGA 775/Socket T design.

Most motherboards can only accept a narrow range of processors from one manufacturer. Switching processors can often mean having to also upgrade the motherboard and heat sink and fan.
You are installing a new Socket AM3 motherboard in a computer and need to assemble other compatible components. You want to choose the most powerful type of processor that is compatible with the motherboard.

Which type of processor should you choose?

Core2 Duo processor

Core2 Extreme processor

Phenom II processor

Athlon 64 X2 processor
You should use a loopback plug to test the network adapter. You use a loopback plug to allow a port to send a signal and also receive it. When you use a loopback plug in an Ethernet port, the loopback plug connects the send wire to the receive wire. If the LED on the adapter lights up, you know the port is working.

You should not use a cable tester. A cable tester is a device that tests cable runs for faults. Expensive cable testers may also include a time domain reflectometer (TDR), which sends a tone down the wire and can measure the distance to a break or fault in the cable.

You should not use a multimeter. A multimeter is a diagnostic device that combines several tools into one. A multimeter has two probes, a function selector, and a display. You can use a multimeter to measure resistance in ohms, to measure voltage in volts DC or AC, or to measure current in amperes (amps).
You need to test the Ethernet port on a network adapter to see if the adapter is functioning correctly.

Which tool should you use?

Loopback plug

Multimeter

Cable tester

Time domain reflectometer
The two most likely causes of paper jams in inkjet printers are a worn pickup roller and using the wrong type of paper. The pickup roller pushes the paper into the printer. When the roller is worn, the paper can slip. Using paper that is too coarse can wear down the pickup roller. Using paper that is too smooth can also cause the paper to slip on the roller.

A fuser assembly is the component on a laser printer that heats the toner and makes it adhere to the page. It is not used in inkjet printers.

A bad ink cartridge can cause lines or smearing in the printed output. The ink cartridge often contains a printhead with the nozzles that spray the ink.

Bad printhead alignment causes lines in printouts. When you have lines in your printouts or often when you change ink cartridges, you need to align the printheads by using the software that came with the printer
You are troubleshooting paper jams on an inkjet printer.

What are the two most likely causes? (Choose two.)

Bad ink cartridge

Bad printhead alignment

Worn pickup roller

Using the wrong type of paper

Bad fuser assembly
Before you can access the processor, you need to remove the cooling assembly. This can be a heat sink and fan or the connections to fans or vents on the sides or bottom of the laptop.

You do not need to remove the LCD screen, the inverter, or the backlight to be able to access the processor. The inverter provides power to the backlight, which provides light to the LCD screen. When the inverter is bad or the backlight fails, the LCD screen will be dark and difficult to read.
You are replacing the processor in a laptop. You remove the battery, the keyboard, and the hard disk drive.

What else should you remove to be able to access the processor?

Backlight

Inverter

Cooling assembly

LCD screen
You should select the device and choose Enable from the Action menu. The down arrow displayed on the device's icon indicates that the device driver for the device is disabled. By choosing the Enable option, you enable the device driver for the device.

You should not select the device and choose Add legacy hardware from the Action menu. This opens the Add Hardware wizard, which allows you to manually install drivers for devices that do not support Plug-and-Play.

You should not select the device and choose Scan for hardware changes from the Action menu. This causes Windows Vista to search for newly added or removed devices.

You should not select the device and choose Update Driver Software... from the Action menu. This opens the Update Driver Software wizard, which allows you to search the computer and the Internet for compatible network adapter drivers.
A Microsoft Windows Vista Ultimate computer cannot access network or Internet resources. You see that the listing for the network adapter in Device Manager has an icon with an arrow that is pointing down.

You need to solve the user's problem with the network adapter.

What should you do?

Select the device and choose Update Driver Software... from the Action menu.

Select the device and choose Enable from the Action menu.

Select the device and choose Add legacy hardware from the Action menu.

Select the device and choose Scan for hardware changes from the Action menu.
You should boot the computer in Safe Mode, run the antivirus software, and then restart the computer. Sometimes the only way you can remove a persistent malware program is to do it in Safe Mode. Because booting in Safe Mode starts the computer with only the minimum drivers and applications required, this is an effective way to remove the malware. In addition, the manual removal of malware might require booting to Safe Mode.

Using the System Recovery options in Windows Vista is not the best way to remove a persistent virus. Even if you restore the computer from a point before the infection occurred, there is still the possibility that the virus that caused the infection was present on the computer.

Uninstalling suspicious programs is not the best way to remove a persistent virus. The virus is likely to be so well hidden that you will not be able to detect it.

Backing up the data, formatting the drive, and restoring the data is not the best way to remove the virus. If you choose to eradicate the virus by formatting the drive, you should perform a clean installation of the operating system and applications. If you restore the backed up data, you will quite possibly restore the virus along with it.
You discover that a computer running Windows Vista has become infected with a virus. You ran an antivirus program, but it did not remove the virus.

What is the best way to remove the virus from the computer?

Boot the computer in Safe Mode, run the antivirus software, and then restart the computer.

Uninstall any suspicious programs and run the antivirus software again.

Back up the data on the hard drive, format the drive, and then restore the data.

Use the System Recovery feature to restore the computer from a point before the infection occurred
You should use two Peripheral Component Interconnect Express (PCIe) slots. With this configuration, you optimize performance because PCIe slots and graphics cards that use these slots perform at higher speeds than the other expansion card types listed. Each graphics card controls half of the display screen and the connector synchronizes the activity of the two cards. SLI cards are built to use PCIe slots.

You should not use one PCI slot and one PCIe slot. To optimize performance for graphics processing, you should install the graphics cards in the same type of expansion slot. Also, PCIe slots provide more bandwidth than PCI slots do.

You should not use two Accelerated Graphics Port (AGP) slots. You get much better performance by using two PCIe slots than by using AGP slots because each PCIe slot can process more data per second than an AGP slot can.

You should not use one AGP slot and one Communications and Networking Riser (CNR) slot. To optimize performance for graphics processing, you should install the graphics cards in the same type of expansion slot. You use a CNR slot to install a riser card that can enhance the built-in features of a chipset on a motherboard.
You are building a personal computer (PC) with a motherboard that supports the Scalable Link Interface (SLI) by NVIDIA. You plan to install two SLI graphics cards with a hardware bridge, and you want to optimize performance for graphics processing.

Which expansion slots should you use?

Two AGP slots

One AGP slot and one CNR slot.

One PCI slot and one PCIe slot

Two PCIe slots
Some laptops that have built-in wireless antennas include a button that turns wireless support off and on. You should first verify that the user has not accidentally pressed that button. Sometimes you need to enable the wireless connection through software, such as through the Network Control Panel utility or Device Manager.

The user's TCP/IP settings are not the cause of the problem. The computer cannot locate any wireless networks. This is a physical issue, not an IP addressing issue.

You do not need to disable the Ethernet adapter. A laptop can support both an Ethernet adapter and a wireless antenna at the same time.

You do not need to verify that there is line of sight between the laptop and the wireless access point. The 802.11b and 802.11g protocols are radio-frequency protocols and do not depend on line of sight.
A user's laptop has a built-in wireless antenna. The user cannot connect to the wireless access point. When the user attempts to view wireless networks, none are listed. Other computers can connect to the wireless access point.

What should you try?

Disable the Ethernet adapter.

Verify that the wireless antenna is turned on.

Verify that there is line of sight between the laptop and the wireless access point.

Verify that the user's TCP/IP settings are configured for automatic addressing
You should implement WPA2. Wi-Fi Protected Access (WPA) protects wireless networks by encrypting data and providing user authentication. The newer WPA2 is more secure than WPA.

You should not implement WEP. Wireless equivalent privacy (WEP) is a security protocol used with wireless networks. It provides encryption using a shared key, but it is not as secure as WPA or WPA2.

You should not enable content filtering. Content filtering is used to restrict the Web sites or addresses that can be accessed from the WLAN.

You should not disable SSID broadcasting. Disabling service set identifier (SSID) broadcasting does nothing to protect data during transmission. Each 802.11 WLAN has a Service Set Identifier (SSID) that identifies it. Unless SSID broadcasting is disabled, the SSID of the WLAN is broadcast in clear text to all client devices that are within range. If you disable SSID broadcasting, client devices will be required to explicitly specify the SSID to connect. This provides some protection of the WLAN, but not related to data transmission
You are implementing a wireless network. You want to provide the best security during data transmission.

What should you do?

Enable content filtering.

Disable SSID broadcasting.

Implement WEP.

Implement WPA2.
To support the adapter cards, you will need to install a riser card if you use an NLX motherboard and case. The riser card allows you to install the adapter cards parallel to the motherboard instead of perpendicular to the motherboard. Because of the low-profile used for the case, many adapter cards cannot fit in the case unless you use a riser board.

You do not need a riser card with an ATX motherboard and case. With this design, the motherboard slots for expansion cards are at right angles to the slots for the processor and memory, and the case is tall enough to accommodate this design.

You do not need a riser card with a Micro ATX motherboard and case. Although a Micro ATX motherboard is smaller than an ATX motherboard, the Micro ATX case does not have the low profile that an NLX case does. A distinguishing feature of the Micro ATX design is that is uses less power and produces less heat than the ATX design does.

You do not need a riser card with a BTX motherboard and case. A BTX motherboard is bigger than the other types of boards and can support more onboard components. A distinguishing feature of the BTX design is that it supports the placement of components that produce heat in the area between the power supply's fan and the air intake vents of the case. Placing the component in this area helps to minimize the need for cooling fans. This design also supports the use of a passive heat sink.
You are building a desktop personal computer (PC) that will support a sound card and a media reader.

For which type of motherboard and case will you need to install a riser card?

Micro Advanced Technology Extended (Micro ATX)

Balanced Technology Extended (BTX)

New Low-Profile Extended (NLX)

Advanced Technology Extended (ATX)
Mary can read files in the folder, but cannot modify or delete them. Mary obtains the Read permission through her membership in the Accounting group. However, her membership in the Temps group revokes the Write permission that would otherwise be granted through her membership in Accounting. When a resource is accessed through a share, both the NTFS permissions and the share permissions are checked and the most restrictive set of permissions is used. In this case, the most restrictive permissions are the NTFS permissions.

Mary cannot modify files in the share because a Deny overrides any Allow and the Temp group is denied Write permission.

Mary cannot delete files in the share. The Modify permission grants the ability to read, create, and modify files. However, users can only delete their own files. Also, Mary is denied Write access so she cannot make changes to the contents of the folder.

Mary can read files in the share. This permission is assigned as part of the Modify permission
Mary belongs to the Accounting group and the Temps group. The AP folder, which is located on a computer running Windows XP, has the following permissions:

Accounting - Allow Modify
Temps - Deny Write

The AP folder is shared and the share has the Everyone - Full Control permission.

What access to the folder does Mary have when accessing it through the network share?

Mary can read, modify, and delete files in the folder.

Mary can read files in the folder.

Mary cannot access any files in the folder.

Mary can read and modify files in the folder.
Because the hard drive slowed down after it was connected to the hub and the other device is unaffected, the most likely explanation is that there is an older USB device plugged into the hub. When you mix older USB 1.x devices and USB 2.0 devices on the same controller, the slowest device sets the speed for the interface. Because the hard drive slowed down when it was moved to the hub, it must have been moved from an interface with no USB 1.x devices to one with a USB 1.x device.

The hub does not need to be replaced with a newer one. The question states that it is a USB 2.0 hub, which is the newest commonly available type of USB hub.

The device driver does not need to be updated. The change in performance is linked with the move to the hub, not to an outdated driver. Most USB hard drives do not require special drivers.

The USB root hub is not defective. The web camera, which must be the USB 1.x device, is still working normally. It is plugged into the same hub as the hard drive, and all of the ports on the hub operate from the same root hub in the computer.
A user reports that a USB hard drive was working properly until he moved it to a different location and plugged it into a USB 2.0 hub.

Now the hard drive is slower than it was before. The other device plugged into the hub, a web camera, is operating normally.

What is the most likely cause of the problem?

Slower USB devices are plugged into the hub.

The device driver for the USB drive needs to be updated.

The USB root hub is defective.

The hub needs to be replaced with a newer one
Torx screws have three sets of grooves that fit the three blades in a Torx screwdriver. Because they have more grooves than other types of screws, there is more surface area for the Torx driver blades to grab.

You should not use a Philips-head screwdriver. A Phillips-head screwdriver has two blades to fit two sets of grooves on the Phillips-head screws.

You should not use a flat-head screwdriver. A flat-head screwdriver has one blade to fit the single groove on flat-head screws.

You should not use needle-nose pliers. You should not use pliers to try to remove screws unless they cannot be removed otherwise. You would normally use needle-nose pliers to grab small connectors or to hold small screws in place while you attempt to tighten them with a screwdriver
You need to install a component in a Compaq laptop. You see that the screws have three sets of grooves in a star-like pattern. You need to remove the screws.

What kind of tool will you need to use?

Flat-head screwdriver

Phillips-head screwdriver

Torx screwdriver

Needle-nose pliers
Because the operating system does not find the modem, it is most likely a non-Plug-and-Play modem. Therefore, the user must install it manually. You install non-Plug-and-Play devices by using the Add Hardware Control Panel utility.

You should not tell the user to create a hardware profile for the modem. A hardware profile is used when you want to be able to select which devices are available when you boot the computer. One use of a hardware profile is for a laptop computer that has a docking station.

You should not tell the user to use Device Manager to enable the modem. Although you can disable and enable a device in Device Manager, that is not the problem. If the modem had been detected by Plug-and-Play, it would have already been enabled. You must manually disable devices. They are not disabled automatically.

You should not tell the user to use Network Connections to configure a dial-up connection. The modem is not installed. Therefore, the user will not be able to configure a dial-up connection.
A user has installed an internal modem in her computer, but it is not detected by Windows XP. She has a CD-ROM containing drivers.

What should she do?

Use the Add Hardware wizard to install the modem.

Use Device Manager to enable the modem.

Use Network Connections to configure a dial-up connection.

Use the System utility to create a hardware profile that contains the modem
Dim printed images are usually caused by a drum or imaging kit that is near the end of its lifetime and needs to be replaced.

Damp paper and dirty paper rollers are usually associated with paper jams. Damp paper can also cause the printer to pick up multiple sheets of paper. A worn pad that separates the sheets can also cause a printer to grab multiple sheets of paper.

When the fuser assembly needs to be replaced, the toner will not adhere to the page.
A laser printer is printing dim printouts.

What is the most likely cause of the problem?

The fuser assembly needs to be replaced.

The drum or imaging kit needs to be replaced.

The paper is damp.

The paper rollers are dirty.
Voice over Internet Protocol (VoIP) is a digital voice service that uses the Internet rather than the normal phone network. When you implement VoIP, you should also implement Quality of Service (QoS) to give packets carrying VoIP traffic priority over other packets. This reduces the delay of voice packets and provides the best voice service.

QoS is not necessary for services like e-mail and instant messaging because they are not as dependent upon the speedy delivery of packets as VoIP.

QoS is not related to the service set identifier (SSID) of a wireless access point (AP). An AP uses SSID to announce itself to the network so that clients can discover available APs. Disabling SSID can help prevent some wireless threats, such as war driving, which is searching for unsecured AP as a way to access networks. However, this is only effective against the most casual attempts. Dedicated utilities are available that enable hackers to locate APs, even when they do not broadcast their SSID.
For which of the following should you implement QoS in a small office/home office (SOHO) environment?

Instant messaging

SSID

VoIP

E-mail
The Basic Input/Output System (BIOS) program is required to enable a CPU to boot up and configure the system for use. The program is stored on a Read-Only Memory (ROM) chip. On older systems, the chip had to be replaced to update BIOS. Flash ROM chips allow a user to store a new BIOS program on the chip by running a DOS program and loading an update file. A Flash BIOS chip is technically called an EPROM (Erasable Programmable Read Only Memory) chip. Circuitry built into the motherboard permits erasing and installing a new BIOS image file.

If components are added for which the BIOS is not programmed, it is necessary to run the Flash ROM program and update the BIOS. A new, higher capacity hard drive is one component that often creates the need for BIOS updates. Physical memory and hard drive size can be configured in CMOS, though memory size is often auto-detected during the Power On Self Test (POST) memory count. CMOS is external to the BIOS and can be looked at as being memory for the BIOS. CMOS is also known as the RTC/NVRAM chip.

Modems, network adapters, DVD drives, and graphics adapters are peripheral devices, not system devices. They use the existing slots and the expansion bus to communicate with the system and do not require BIOS upgrades.

A steady power supply is necessary to perform a Flash ROM update, but the power supply does not require updating Flash ROM contents before the installation will work properly. If a BIOS update process is interrupted, your computer may not function.
You are upgrading components in a computer to refurbish it. The motherboard and BIOS are five years old. You are concerned that the BIOS may not properly support some of the components you want to install.

Which component might require updating Flash ROM contents before the installation will work properly?

Power supply

56K modem

128MB of physical SDRAM

DVD-ROM drive

100Base-TX network adapter

80 GB hard drive

Graphics card for 1600 x 1200 display
This is an example of spyware. Spyware is a type of malware that collects information and sends it to a third party. Depending on the spyware, it might collect personal information (such as credit card numbers or passwords) or network information (such as addresses and computer names). Spyware typically runs in the background and is usually a stealthy program (attempting to run without drawing attention to itself).

This is not an example of a worm. A worm is a self-replicating program, typically designed as a network threat, copying itself to network clients.

This is not an example of a rootkit. A rootkit is a specialized type of software designed to provide a back door into the infected computer. Rootkits are typically stealthy and do not in themselves cause any destruction. A rootkit would not collect and return information from a computer, for example, but it would make it easier for an attacker to connect to the computer from a remote location so that he or she can then directly collect information.

This is not an example of spam. Spam refers to unsolicited e-mail, typically unsolicited advertisements
You discover a program running in the background on several network computers. The program is collecting address and computer name information from your network and sending it to an address on the Internet.

This is an example of what kind of threat?

Spam

Spyware

Worm

Rootkit
You should restart the Print Spooler service. You can restart from the command prompt using the net start spooler command. You can also stop and start the Print Spooler service from Administrative Tools.

You should not run MSConfig.exe. MSConfig provides a graphical interface that you can use to configure the boot process, including modifying boot configuration files and minimizing the programs that are loaded when the computer is booted. It does not allow you to restart the print spooler.

You should not access the Printing node under Components in System Information. This will provide you with information about the available printers, including the name of the printer and its port, but it does not allow you to restart the print spooler.

You should not use Device Manager. Device Manager is used to manage devices in and connected to the computer. You can use Device Manager to troubleshoot problems with devices that are not working properly or update or remove device drivers. You can access Device Manager using Computer Management in Control Panel, by right-clicking the My Computer icon and selecting Properties, or by running devmgmt.msc.
You are running Windows XP. The print spooler has stalled and you are unable to print.

What should you do?

Run MSConfig.exe.

Use Device Manager.

Access the Printing node under Components in System Information.

Restart the Print Spooler service.
Overheating is a common cause of sudden shutdowns after hours of operation. Because the laptop is several years old, it might have accumulated enough dust in the CPU heat sink and fan to cause the laptop to overheat. You should check and clean the heat sink and fan as a first step.

You should not replace the motherboard or the memory as the first step. A fault in either could cause sudden shutdowns, but it is too early in the troubleshooting process to take such drastic and expensive actions.

You should not check and replace the battery. There is nothing in the scenario to suggest that a faulty battery is to blame.

CompTIA lists the following guidelines for working on laptops:

* Document and label cable and screw locations.
* Organize parts.
* Refer to manufacturer documentation.
* Use appropriate hand tools.
You support a laptop owner who has been using the laptop at home for several years. Now the user reports that the laptop is unstable and shuts down suddenly after a few hours of use.

What should you do first?

Replace the motherboard.

Replace the memory

Check and clean the CPU heat sink and fan.

Check and replace the battery
Secure Digital (SD) cards and USB flash drives use solid-state technology. Drives that use solid-state technology use flash memory for storage instead of magnetic material. SD cards use NAND flash memory and slide into a memory card reader. Standard size SD cards are used in many digital cameras. USB flash drives, which are often referred to as jump drives or thumb drives, also use NAND flash memory and connect to a USB port. They are considered hot-swappable devices because they can be connected and disconnected without shutting down and restarting the computer. You should note that when removing an SD card or USB flash drive, you should use the Safely Remove Hardware icon in the System Tray to stop the device before physically removing it. If it cannot be stopped using the Safely Remove Hardware icon, you should shut down the computer before removing the device.

An internal IDE hard disk drive does not use solid-state technology. Internal hard disk drives consist of platters of magnetic material on which data is stored. While the platter spins, a read/write head physically moves over it to read or write data.

An external tape drive does not use solid-state technology. Tape drives store data on magnetic tape.

A CD-RW drive does not use solid-state technology. CD-RWs use a laser to burn data onto a spinning compact disc.
Which of the following use solid-state technology for data storage? (Choose two.)

SD card

Internal IDE hard disk drive

External tape drive

CD-RW

USB flash drive
You should use Chkdsk to check the integrity of a hard disk on a computer running Windows XP and optionally attempt to correct errors. You can launch Chkdsk from the command line or by clicking Check Now on the Tools tab of a hard disk's properties.

You cannot use ScanDisk to verify that the hard disk does not have any bad sectors on a computer running Windows XP. Scandisk was used on Windows 9x systems to verify hard disk integrity.

Defrag is used to defragment a hard disk to ensure that a file uses contiguous disk space. A defragmented hard disk performs better than a fragmented hard disk.

You cannot use Fdisk to check disk integrity. Fdisk was used in earlier versions of the Windows operating system and in MS-DOS to create partitions
What tool should you use to verify that the hard disk on a Windows XP computer does not have any bad sectors?

Fdisk

Chkdsk

Defrag

ScanDisk
On older motherboards, settings to control the voltage, timing, and multiplier are often controlled by dip switches or jumpers on the motherboard. It is likely that the user attempted to modify these settings and rendered the computer unusable. To fix the problem, you need to obtain the documentation for the motherboard and reset the switches and jumpers to their proper settings. Setting the timing and multiplier incorrectly can also cause a processor to run slower than normal or faster than normal, which is called overclocking. Overclocking can cause overheating, instability, and a shortened life span for the processor.

You should not replace the motherboard or processor as the first step. While it is possible that the user damaged these components, you should first try to apply the correct settings before taking the expensive step of replacing components.

You should not first try to flash the BIOS. On newer computers, voltage, multiplier, and timing settings are controlled through the BIOS and can be adjusted by entering the BIOS screen and choosing the settings. However, on this computer, you have examined the BIOS settings and could not find settings that would cause this problem, so those settings are most likely controlled by jumpers and dip switches.
A customer reports that he tried to adjust his motherboard, which is many years old, so that his processor would run faster. Now the computer will not start. When he attempts to start the computer, it emits several beeps and then stops. You are able to access the computer's BIOS screen, but you can see no settings there that would cause this problem.

You need to get the computer running again.

What should you do first?

Flash the BIOS.

Search for documentation on the jumper and dip switch settings for that motherboard.

Replace the processor.

Replace the motherboard.
If you are installing a Serial ATA (SATA) drive in a computer that does not have any available SATA power connectors, you can get a Molex-to-SATA power adapter. You connect the adapter to an available Molex power connector and then plug that adapter into the SATA drive. The Molex connector does not support 3.3 volts, but most drive manufacturers do not use this voltage.

You cannot use the SATA data cable to provide power to the drive. SATA drives require separate power connections.

You do not need to replace the power supply. You can solve this problem by using an adapter, which is much less expensive.

You should not install an external SATA (eSATA) adapter. An eSATA adapter is a bracket that attaches to the back panel of the computer that connects ports for eSATA drives to the SATA ports on the motherboard. eSATA drives operate at the same throughput as internal SATA drives, which offers a faster alternative to external Universal Serial Bus (USB) drives. This solution would not work because the drive is an internal drive, and to use it externally would require buying an enclosure for the drive, which would be more expensive than buying a power adapter.
You are replacing a PATA hard disk drive with a SATA drive. You attach the SATA cable to the drive and the SATA port on the motherboard. However, you cannot find a power cable that fits the SATA drive.

What should you do?

Get an eSATA adapter.

Get a Molex-to-SATA power adapter.

Use the SATA data cable to provide power to the drive.

Replace the power supply with one that supports SATA
You should use the Disk Management snap-in. To access the Disk Management snap-in, you can double-click Computer Management under Administrative Tools in Control Panel. Then, right-click the basic disk you want to change to a dynamic disk and select Convert to Dynamic Disk. You can also access Computer Management by right-clicking the My Computer icon on the desktop and selecting the Manage option. Dynamic disks allow for greater flexibility in managing disks. With dynamic disks, you can extend partitions, create spanned volumes, and implement fault tolerance.

You should not run Convert.exe from a command line. The Convert.exe command-line utility is used to convert a FAT partition to NTFS.

You should not run Diskpart.exe with the convert basic command. You can use the Diskpart.exe command line utility to convert a basic disk to a dynamic disk, but to do so you would use the convert dynamic command, not the convert basic command.

You should not upgrade to Windows Vista. Windows XP Professional supports dynamic disks.
You have a computer running Windows XP Professional. You currently have one basic disk. You want to convert the disk to a dynamic disk.

What should you do?

Run Convert.exe from a command line.

Upgrade to Windows Vista.

Run Diskpart.exe with the convert basic command.

Use the Disk Management snap-in.
You should perform one of the following:

* Open Event Viewer and select Filter from the View menu.
* Open Event Viewer and select Properties from the Action menu.

These two options allow you to add a filter to control the entries that are displayed. You can uncheck the Information and Warning event types and click OK. This will filter out informational messages, which have an event type of Information, and insignificant error messages, which have an event type of Warning. This will limit the events displayed to only significant errors.

You should not open Event Viewer and select Customize from the View menu. This option allows you to control which graphical components display within the Event Viewer, such as the toolbar or menu. However, it does not control which event log entries are displayed.

You should not open Event Viewer and select Add/Remove columns from the View menu. This option allows you to control what is displayed for each event, but not limit the types of events shown.

You should not open Event Viewer and select Options from the File menu. This option allows you to perform other tasks, such as a disk cleanup, but it does not control which event log entries are displayed
You want to review errors that have been captured to the System log on your Windows XP computer. You only want to view the entries that represent significant errors.

What should you do? (Choose two.)

Open Event Viewer and select Add/Remove columns from the View menu.

Open Event Viewer and select Properties from the Action menu.

Open Event Viewer and select Filter from the View menu.

Open Event Viewer and select Customize from the View menu.

Open Event Viewer and select Options from the File menu.
You should clean the rubber guide rollers using alcohol on a fibrous cleaning towel. The guide rollers are responsible for moving the paper through the printer. They should be a little rough but clean. When they get dirt or paper dust on them, it can cause paper jams. You can clean them using alcohol on a fibrous cleaning towel. If they become too smooth, you can use alcohol on a non-metallic scouring pad to make them rough so they work better.

Replacing the fuser assembly will not resolve the problem. The fuser assembly is used to fuse ink to the paper, not to move the paper through the printer.

You should not clean the fuser assembly roller with water on a fibrous cleaning towel. A dirty fuser assembly roller is not the problem. Also, you should not use a fibrous cleaning towel and water to clean the fuser assembly roller. You should use alcohol and a soft cloth. You must be very careful not to scratch the fuser assembly roller.

You should not use maintenance software to realign the guide rollers. Ink jet printers include maintenance software, which can be used to realign the print heads. Laser printers have maintenance kits that contain spare parts.
A laser printer is experiencing paper jams. What should you do?

Clean the fuser assembly roller with water on a fibrous cleaning towel.

Use the maintenance software to realign the guide rollers.

Clean the rubber guide rollers using alcohol on a fibrous cleaning towel.

Replace the fuser assembly.
Because performance has degraded over time and because the file server must support read and write activity for actively changing files, the most likely problem is disk fragmentation. The first thing you should do is use Disk Manager to check the level of fragmentation, and then defragment the drive if recommended by Disk Defragmenter.

You should not use Network Monitor to determine the network traffic levels. Because user access has not changed significantly, it is unlikely that high network traffic is the cause.

You should not use System Monitor to determine memory usage. Because user access requirements have not changed significantly and because performance has degraded over time, system memory is an unlikely cause.

You should not use System Manager to monitor processor user time. Processor user time reports processor time for user-related activity, such as applications. Because the computer is used as a file server, the user time will be relatively minimal.
Your network has a file server running Microsoft Windows XP Professional with a 2.2 GHz Pentium 4 processor, 1 GB of RAM, and one IDE hard disk. The computer has 20 GB of free hard disk space.

Performance has gradually degraded on the file server. The number of users accessing the file server has not changed significantly over time. You need to improve the computer's performance.

What should you do first?

Use System Monitor to determine memory usage.

Use Network Monitor to determine the network traffic levels.

Use System Manager to monitor processor user time.

Use Disk Manager to determine the amount of fragmentation on the hard disk
You would implement the standard that all users must regularly update their virus signatures. In addition, they should also use these new virus definitions and perform a virus scan.

Encrypting File System (EFS) allows you to configure the file system to automatically encrypt files when they are saved. This protects the data stored on the disk, but it does not protect against malware.

A boot password is a password that a user must know in order to boot a computer. It provides security to ensure that only authorized users boot the computer, but it does not protect against malware.

Biometric devices are used to verify a user's identity based on some biological characteristic. Biometric input devices capture a person's biological characteristic, such as a fingerprint, and compare it to a previously stored biometric value. Using biometrics offers improved security over other means of identification, such as requiring a username/password or using magnetic stripe cards. Biometric devices are used to identify users and control users' access. However, using biometric devices does not protect against malware
You are developing standards for the organization with regard to protecting users' computers from malware.

Which standard would you implement?

All users must implement EFS.

All users must use biometric devices.

All users must regularly update their virus signatures.

All users must have a boot password.
The first thing you should do is download up-to-date virus definitions. Then, you can run a virus scan with the up-to-date virus definitions to identify if any problems exist. Updating the virus definitions first ensures that your scan will look for all currently known issues.

You should run a virus scan and quarantine any infected items, but you should first ensure that your virus definitions are up-to-date.

You should not back up the hard drive. This would back up the system as it currently is, and the backup copy would contain the same infection.

You should not create a restore point. This would create a point to which you could restore the system to. However, if you later restored to that restore point, the infection would still be present
You have a computer running Windows XP Professional. The system is running extremely slow. You suspect that your computer has been infected with a virus.

What should you do first?

Download up-to-date virus definitions.

Run a virus scan and quarantine any infected items.

Create a restore point.

Back up the hard drive.
You should run the Services Microsoft Management Console (MMC) and start the Wireless Zero Configuration service. The Wireless Zero Configuration service allows Windows to display available wireless networks and connect to the preferred network. When the service is stopped, Windows will not be able to list any wireless networks, and the device will appear to be OK in Device Manager. The Services MMC allows you to manually start or stop a service. You can also set the startup mode of a service to Manual, Automatic, or Disabled. You can access the Services MMC from the Administrative Tools menu or through the Computer Management MMC.

You should not update the driver or run Windows Update. The problem is with the service, not the version of the device river.

You should not run the msconfig command. The msconfig command launches the System Configuration Utility, which you can use to modify which programs, drivers, and services are run at startup.
A laptop running Windows XP is unable to list available wireless networks. You know that there are available wireless networks in range and that the laptop was able to see the wireless networks yesterday. You check the Device Manager, and the wireless adapter seems to be working properly.

You need to restore the wireless capability of the laptop.

What should you do?

Update the device driver for the wireless network adapter.

Start the Wireless Zero Configuration service.

Run the msconfig command.

Run Windows Update.
You should use Startup Repair in System Recovery Options. Selecting this option will allow you to correct problems that might be preventing the operating system from loading, such as missing or corrupt system files. Windows Vista provides a set of recovery tools known as WinRE that you can access when booting from the Vista installation DVD. You can select Repair your computer. Then, from the System Recovery Options window, you can select Startup Repair.

You should not reinstall the operating system. Although that might be necessary, you should attempt to use Startup Repair first.

You should not access the Recovery Console. The Recovery Console is available with Windows XP, but not with Vista.

You should not run Msconfig.exe. Msconfig.exe provides a graphical interface that you can use to configure the boot process, including modifying boot configuration files and minimizing the programs that are loaded when the computer is booted. Msconfig.exe is also called the System Configuration utility.
You are running Windows Vista Ultimate. When you attempt to reboot your machine, Windows will not load.

What should you do first?

Access the Recovery Console.

Run Msconfig.exe.

Reinstall the operating system.

Use Startup Repair in System Recovery Options
Pinging the loopback address (127.0.0.1) tests whether the TCP/IP protocol stack is functioning correctly. If you cannot ping the loopback address, it means that TCP/IP drivers are not installed or corrupt or that the network adapter is not functioning.

The DHCP server assigns addresses on the network. It does not impact the ability to ping the loopback address on a client computer.

The loopback address is 127.0.0.1. A computer does not require a valid IP address on the network for the loopback address to respond.

The loopback address is not dependent on a correct subnet mask. The loopback address pings the local computer to verify the TCP/IP stack.
A user cannot access the network. You attempt to ping the loopback address and receive no response.

What are two possible reasons? (Choose two.)

TCP/IP needs to be reinstalled.

The network adapter is not functioning.

The network adapter is configured with an invalid IP address for the network.

The network adapter is configured with an invalid subnet mask for the network.

The DHCP server is not functioning.
After you install a required maintenance kit, you need to reset the page count and the service message. This way the printer will be set up to display the service message the next time maintenance is required.

You should document what you did, but you should do so after you have reset the printer. You should also document resetting the printer as part of the process.

You should not go to your next assignment or order new supplies to replace the ones you just used until after you have completed the current job
You have just finished installing a maintenance kit in a printer that had been displaying a warning that service was required.

What should you do next?

Reset the page count and the service message.

Document what you did.

Order new supplies.

Go to your next assignment.
Full duplex communication provides the ability for users to send and receive data at the same time. Switches also minimize unnecessary network traffic because they maintain a list of Media Access Control (MAC) addresses for the connected devices and can use this list to forward traffic only to the intended port. Switches often provide other intelligent features, such as bandwidth monitoring and port mirroring. You could also network the four computers using a hub, but this would not support full duplex communication. In addition, a hub passes all incoming traffic to all other connected network devices, which may generate unnecessary network traffic.

Full duplex communication does not provide for encryption, transmission over wireless connections, or the ability to access Bluetooth devices.
You are networking four computers in your office. You implement a switch that supports full duplex communication.

What does this provide?

The ability for users to send and receive data at the same time

Encryption of data transmitted over the network

The ability to access Bluetooth devices

The ability for users to transmit data over wireless connections
You should use a cable tester. A cable tester is a device that tests cable runs for faults. Expensive cable testers may also include a time domain reflectometer (TDR), which sends a tone down the wire and can measure the distance to a break or fault in the cable.

You could also use a multimeter to measure resistance in ohms. A multimeter is a diagnostic device that combines several tools into one. A multimeter has two probes, a function selector, and a display. You can use a multimeter to measure resistance in ohms, to measure voltage in volts DC or AC, or to measure current in amperes (amps). When you measure resistance, you can identify a faulty cable.

You should not use a multimeter to measure voltage or current (in amps). These tests are designed for components that are powered, not network cables.

You should not use a loopback plug to test the cable. You use a loopback plug to test a port on a device for functionality. You use a loopback plug to allow a port to send a signal and also receive it. When you use a loopback plug in an Ethernet port, the loopback plug connects the send wire to the receive wire. If the LED on the adapter lights up, you know that the port is working
You need to test an Ethernet cable that you suspect is defective.

What should you do? (Choose two.)

Use a multimeter to test voltage.

Use a multimeter to test the current.

Use a multimeter to test resistance.

Use a loopback plug.

Use a cable tester.
Telnet allows you to communicate with another computer on the network remotely, entering commands to control the remote computer. To open a telnet session using Windows 9x and Windows NT/2000/XP, type "telnet (ipaddress)" from the command line.

Nbtstat (NetBIOS Status) displays current information about TCP/IP and NetBEUI when both are being used on the same network.

Netstat displays information about current TCP/IP connections.

Address Resolution Protocol (ARP) manages the IP-to-Ethernet address translation tables used to find the Media Access Control (MAC) address of a host on the network when the IP address is known.

Objective:
List all questions for this objective
Which TCP/IP command-line tool can be used to enter commands into a remote computer?

netstat

nbtstat

telnet

ARP
You should install the hard drive without taking any other actions. The Serial Advanced Technology Attachment (SATA) standard originally supported a throughput of 1.5 gigabits per second (Gbps). That standard is now known as SATA 1.5. Newer SATA drives support a throughput of 3.0 Gbps. SATA drives are designed to be backwards-compatible. If you install a SATA 3.0 (SATA V2) drive in a computer that only supports SATA 1.5, the drive will fall back to the slower throughput.

You should not purchase a SATA 1.5 drive and install it. Because SATA 3.0 drives will operate at 1.5 Gbps in a system that only supports SATA 1.5, you do not need to buy a different drive. You also might find it difficult to purchase a SATA 1.5 drive.

You should not adjust the jumper on the hard drive before installing it. Unlike older Parallel ATA (PATA) drives (also known as EIDE drives), SATA drives do not use jumpers. Other advantages of SATA drives are their better throughput, smaller cables, and lower power consumption.

You should not install an external SATA (eSATA) adapter. An eSATA adapter is a bracket that attaches to the back panel of the computer that connects ports for eSATA drives to the SATA ports on the motherboard. eSATA drives operate at the same throughput as internal SATA drives, which offers a faster alternative to external Universal Serial Bus (USB) drives
You are preparing to install a new SATA hard drive into a computer. You discover that the computer only supports SATA 1.5, but the hard drive uses the newer SATA 3.0 (SATA V2) standard.

You need to install a new drive in the computer as soon as possible using the least expensive option available.

What should you do?

Adjust the jumpers on the SATA 3.0 hard drive before installing it.

First install an eSATA adapter.

Install the SATA 3.0 hard drive.

Purchase a SATA 1.5 hard drive and install it.
You should use ~ as the filename to locate any temporary files left behind by Microsoft Word or other applications that use a ~ as the first character of a temporary file. The is a wildcard character that means zero or more characters. So ~* would locate all files that begin with ~.

You should not search on ~.*. Doing so would return only the files named ~ with any file extension. For example, it would find ~.doc and ~.exe, but not ~myfile.doc.

You should not search on *.doc. Doing so would return all files ending in .doc, the extension commonly associated with Microsoft Word documents. Therefore, it would return all Microsoft Word documents, not just the temporary files.

You should not search on ~.doc. Doing so would return only a file specifically named ~.doc if there was one within the search path.
You want to search for all temporary files that were left behind by Microsoft Word.

What filename should you specify in the Search dialog?

~*

~.*

*.doc

~.doc
You should plan to use the Peripheral Component Interconnect Express (PCIe) x1 slot and purchase a PCIe x1 TV tuner card. This option will give you the best performance. PCIe is an improvement over the older PCI standard. Peripherals such as TV tuners, wireless network adapters, and modems are sold in the PCIe x1 form factor. A PCIe x1 slot is physically much smaller than a PCIe x16 slot.

You should not plan to use the PCIe x16 slot. PCIe x16 slots are used for graphics adapters. Peripherals such as TV tuner cards use the PCIe x1 slot. Some high-end motherboards designed for Nvidia's Scalable Link Interface (SLI) or ATI's CrossFire can link multiple graphics adapters in multiple PCIe x16 slots.

You should not plan to use the PCI slot unless there is no available PCIe x1 slot available. While you can purchase PCI TV tuner cards, PCIe x1 offers better performance.

You should not plan to use a Serial Advanced Technology Attachment (SATA) port. SATA is a specification for hard drives and optical drives
You need to install a TV tuner/video capture device in a desktop computer. You want to provide the best performance possible.

You note that the computer has several expansion slots and ports available.

Which one should you plan to use?

SATA

PCIe x1

PCI

PCIe x16
RAID technology provides different types of disk configurations to maximize performance and fault tolerance.

RAID 0 provides striping to improve disk performance, but it does not provide redundancy.

RAID 1 provides mirroring data on multiple hard disks to provide redundancy in case of a disk failure.

RAID 5 provides disk striping with parity. It stripes data across three or more disks but includes parity information that can be used to re-create lost information if one of the hard disk drives fails.

RAID 6 is similar to RAID 5 but uses four or more disks and can withstand the loss of two disks.

RAID 10 uses striping to improve performance and mirroring to provide fault tolerance.
A customer wants to add a RAID array to his computer. He wants to be able to use disk striping to achieve the best performance. He is not concerned with fault-tolerance.

Which RAID level does the new hardware need to support?

RAID 0

RAID 1

RAID 5

RAID 10
When switching between families of processors, you will need to replace the motherboard and the heat sink/fan combination. Most motherboards can only accept a narrow range of processors from one manufacturer. Switching processors can often mean having to also upgrade the motherboard and heat sink and fan. Some heat sink/fan assemblies can fit on multiple processors.

The Athlon 64 X2 processor is an AMD processor that is compatible with Socket AM2 and AM2+ motherboards. An Intel Core2 Duo or Core2 Extreme processor uses the LGA 775/Socket T design
A computer currently uses an AMD Athlon 64 X2 processor. The user has received an Intel Core2 Extreme processor.

What would he most likely need to replace to be able to use the new processor? (Choose two.)

Motherboard

Heat sink/fan

Computer case

Hard disk drive

Video card
Defragmenting a hard drive reorganizes all the files into contiguous sectors on the disk. This improves disk performance because the system can recover a file in fewer revolutions of the disk.

Both chkdsk and scandisk can identify and correct disk errors, but neither will improve disk access times. Chkdsk is used by Windows NT family platforms, while scandisk is found in Windows 9x family of operating systems. Both perform the same function.

Fdisk is a disk partitioning utility used in the initial setup of a hard drive. It creates the Master Boot Record required by the operating system. It does not affect disk performance.
Which disk utility provides the best way to improve disk performance?

scandisk

chkdsk

fdisk

defrag
FireWire 800 uses a 9-circuit beta connector. It supports speeds up to 3,200 Megabits per second (Mbps).

The original IEEE 1394 standard used a 6-circuit alpha connector that supplied power and could transfer data at speeds up to 400 Mbps. The 4-circuit alpha connector was introduced by video camera makers. It supports the same data transfer speeds but does not supply power.

Category 5e cable is used for gigabit unshielded twisted pair (UTP) Ethernet cable. The newer FireWire S800T (IEEE 1394c) standard calls for using Category 5e cables both for IEE1394 and IEE 802.3 (Ethernet).
You are configuring a computer with a FireWire 800 (IEEE 1394b) adapter for use with an external hard disk drive.

What kind of cable should you include to ensure the maximum speed?

9-circuit beta connector

4-circuit alpha connector

Category 5e

6-circuit alpha connector
With regard to available bandwidth on the WLAN, the number of users per Wireless Access Point (WAP) would be important because the connection is shared.

Whether Wired Equivalent Privacy (WEP) or Wi-Fi Protected Access (WPA) will be used would not be a factor to consider regarding bandwidth on the WLAN. These are security protocols for wireless networks that can provide encryption of data during transmission over the WLAN.

The operating systems used by the wireless clients would not be a factor to consider regarding bandwidth on the WLAN. Regardless of the operating systems used, the transmissions still use a shared connection.

The type of authentication to be used would not be a factor to consider regarding bandwidth. Authentication is the process of verifying the identity of a user that is logging on
You are implementing a new WLAN within your organization. You need to determine where WAPs should be located, while still offering maximum bandwidth to wireless users.

What would be important to consider with regard to available bandwidth on the WLAN?

The type of authentication to be used

Whether WEP or WPA will be used

The operating systems used by the wireless clients

The number of users per WAP
To allow the Remote Desktop client to connect to a computer from a specific office or subnet, you need to use Windows Firewall with Advance Security on each computer to create a custom inbound rule. Custom rules allow for more granular controls such as the subnets or IP addresses that are included in the rule. This adds additional criteria that must be met to pass though the firewall. Computers not in the identified source subnet would be stopped at the firewall.

Allowing RDP from the Windows Firewall interface in Control Panel will allow Remote Desktop access from any subnet. In this case, the requirement is to only allow connections from the specific main office subnets, not from other subnets.

You should not ensure that only users in the main office are included in the Remote Assistance invitation e-mail. You are trying to prevent Remote Desktop, not Remote Assistance, from being used by the other remote offices. Remote Desktop is a tool used to remotely access a computer. Remote Assistance is a tool used to remotely assist users while they are using their computers.

You should not allow Remote Assistance in Windows Firewall. This is not related to the request to use Remote Desktop.
You have recently set up Microsoft Windows Vista Business on five computers in a remote office and you want to be able to use Remote Desktop from the main office to manage these computers. You do not want users in other remote offices to be able to run Remote Desktop sessions on these computers.

You need to allow Remote Desktop access to these remote computers only from the main office subnet.

What should you do?

Configure the Windows Firewall rules in Control Panel to allow the Remote Desktop Protocol (RDP).

Configure the Windows Firewall rules in Control Panel to allow Remote Assistance.

Ensure that only users in the main office are included in a Remote Assistance invitation e-mail message.

Configure a custom inbound rule allowing a Remote Desktop connection using Windows Firewall with Advanced Security on each computer.
Last Known Good Configuration is the best choice for this situation. Windows NT, 2000, and XP all keep a copy of the Last Known Good Configuration in the registry. If something is configured incorrectly, you can restore the settings used for the last successful boot. Any settings changes made since the last successful boot will be lost.

Safe Mode boots the operating system with a minimum configuration, and can be used to solve problems with a new hardware installation or problems caused by user settings. Safe Mode boots with the mouse, basic video, keyboard, and mass storage drivers loaded. It uses the default system services (not any extra services) and does not provide network access. It does provide a graphical interface.

Safe Mode with Command Prompt is the same as Safe Mode but does not load the graphical interface.

Enable VGA Mode is used when the video setting is such that you cannot see the screen well enough to fix a bad setting. This can happen if a user creates a desktop with black fonts on a black background, or something similar to that. Booting in this mode gives you very plain VGA video display but allows you to change the settings in the Display properties
After installing a new device driver for your video card in your Windows XP system, you encounter a critical system error indicated by the Blue Screen of Death. When you try to reboot the system, your computer stalls.

Which boot option would be the best way to correct the problem?

Enable VGA Mode

Safe Mode with Command Prompt

Last Known Good Configuration

Safe Mode
You should use the net use command. You can use the net use command to map a shared network resource to a specific drive letter. In this case, you could use the following command:

net use k: \\Server1\AdminDocs

You should not use the net share command. The net share command is used to create a network share or to start or stop sharing a network resource. It cannot be used to map a drive letter to a shared network resource.

You should not use the net name command. The net name command allows you to create aliases for use with messaging. It cannot be used to map a drive letter to a shared network resource.

You should not use ipconfig command. The ipconfig utility can be used to view the local computer's Transmission Control Protocol / Internet Protocol (TCP/IP) configuration, to release and renew the local computer's TCP/IP configuration, and to flush the Domain Name System (DNS) cache. It cannot be used to map a drive letter to a shared network resource.
You have a computer running Windows XP Professional. You need to connect to a share named AdminDocs on the server named Server1. You want this to be mapped to disk drive K.

Which command should you use?

net share

net use

net name

ipconfig
You can gather all that information from System Summary in the System Information utility (MSInfo32.exe). The System Information utility allows you to view a lot of information about the computer, including general statistics such as the amount of memory installed, the size of the paging file, the amount of physical RAM currently committed, and the processor type and speed.

The System Control Panel utility General tab reports the amount of RAM installed. The Advanced tab allows you to access virtual memory settings that report the current size of the paging file. This is also where you change virtual memory settings. However, it does not report the amount of RAM currently being used.

Task Manager allows you to gather information about the amount of RAM installed and the amount of RAM currently committed (in use). It does not provide the size of the paging file. However, it does report information about paging file usage. This is not the size of the paging file, but how much data is currently stored in the paging file. You can also see how much virtual memory is being used by each process.

Msconfig allows you to configure startup options for troubleshooting. It is not used to view current performance statistics.
A user reports memory errors. Which utility will allow you to determine how much physical memory is installed, how much is currently being used, and the size of the paging file on a computer running Windows XP?

msconfig

System Information utility

System Control Panel utility

Task Manager
The most likely cause of the problem is that the computer has been infected with a boot sector virus. The Master Boot Record (MBR) contains information necessary to boot and load the operating system. If a virus infects this area, the computer will not boot properly and may repeatedly attempt to reboot.

The most likely cause would not be that the BIOS needs to be flashed. An out of date BIOS would not cause the computer to continuously attempt to reboot. You would flash the BIOS if you needed to support new components that your current BIOS version does not support.

The most likely cause would not be replacing the CMOS battery. If the computer was having trouble retaining the current date and time settings or other CMOS settings, then you might need to replace the CMOS battery.

The most likely cause would not be that the hard drive needs defragmenting. Slow disk access would indicate that the hard drive might need defragmenting.
A user reports that when she powers on her computer, the computer continuously attempts to reboot itself.

What is most likely the problem?

The hard drive needs defragmenting.

The CMOS battery needs to be replaced.

The computer has been infected with a boot sector virus.

The BIOS needs to be flashed
The slot is a Mini PCI Express slot. PCI Express (PCIe) is a faster replacement for the older PCI standard. Mini PCI Express slots are common in recent laptops for adding peripherals such as wireless adapters, modems, and TV tuner cards. When working with wireless network adapters in laptops, you should verify proper antenna connections.

The slot is not a Mini PCI slot. Mini PCI is the laptop version of the PCI standard. Mini PCI slots are larger (about six inches square) than Mini PCI Express slots. There are several types of Mini PCI slots. They can have 100-pin or 124-pin connectors.

The slot is not a PCI Express or a PCI slot. These types of slots are too big for laptops and are found on desktop computers.

CompTIA lists the following guidelines for working on laptops:

* Document and label cable and screw locations.
* Organize parts.
* Refer to manufacturer documentation.
* Use appropriate hand tools.
You are working on a laptop for a customer who wants a new wireless network adapter installed. You open the laptop and see an available expansion slot.

The slot is between two and three inches wide. It has eight connectors, a small gap, and then another 18 connectors.

What kind of expansion slot is this?

PCI

Mini PCI Express

Mini PCI

PCI Express
You should run SFC.exe from an elevated privilege command prompt. The System File Checker tool (SFC.exe) scans the operating system files to determine if they are all present and can be accessed successfully. If it finds any problems with system files or missing system files, it will try to correct the problem by replacing the file. To run SFC.exe from an elevated privilege command prompt, click the Start button and type cmd in the Start Search box. Then, right-click cmd and select Run as administrator to proceed through the steps to obtain an elevated privilege command prompt. Finally, at the command prompt, issue the sfc /scannow command and press Enter. You can also use the System Recovery Options window from Windows Recovery Environment (WindowsRE) to restore corrupt system files.

You should not run SC.exe from an elevated privilege command prompt. The SC.exe command-line utility is used to manage services.

You should not run Bootrec.exe from WindowsRE. The Bootrec.exe utility is used to troubleshoot and correct problems with booting, such as problems with a disk's boot sector or master boot record (MBR) or the Boot Configuration Data (BCD).

You cannot run the Recovery Console from WindowsRE. The Recovery Console was available in Windows XP, but is not an option from WindowsRE. The options available from the System Recovery Options window include: Startup Repair, System Restore, Windows Complete PC Restore, Windows Memory Diagnostic Tool, and Command Prompt.
Your Windows Vista computer boots successfully but periodically locks up when performing certain tasks. You want to verify the operating system files to ensure that none are corrupt.

What should you do?

Run SFC.exe from an elevated privilege command prompt.

Run the Recovery Console from WindowsRE.

Run SC.exe from an elevated privilege command prompt.

Run Bootrec.exe from WindowsRE
You should start the computer in Safe Mode and perform a System Restore. Windows XP saves a scheduled restore point, a restore point before making some configuration changes, and a restore point before an application is installed. It allows you to revert your computer's configuration to a specific point in time. Restoring a system using System Restore does not affect user data. You can initiate System Restore by booting normally or to Safe Mode. In this case, you will need to boot to Safe Mode.

You should not start the system in VGA mode and uninstall the application. VGA mode is used specifically to correct problems with the video adapter configuration. Also, uninstalling the application might not resolve the problem because the problem might be caused by one of the configuration changes.

You should not use Automated System Recovery (ASR). ASR reformats the hard disk and restores from an ASR backup set, which does not include user data. Therefore, user data would be lost.

You cannot use an Emergency Repair Disk (ERD). ERDs were supported by Windows NT and Windows 2000. They are not supported by Windows XP.
A user makes some configuration changes and then installs an application. The application requires the user to reboot the computer. When the computer reboots, it is unable to start Windows XP.

You need to ensure that the user's data is preserved.

What should you try first?

Perform Automated System Recovery.

Use the Emergency Repair Disk.

Press the F8 key on startup, select Safe Mode from the boot menu, and perform a System Restore.

Start the system in VGA mode and uninstall the application
Errors, warnings, and informational messages generated by the operating system components are viewed through the Event Viewer System log.

You would not use the System Monitor to view operating system error messages. System Monitor is used to monitor real-time performance of system components, operating system processes, and applications.

You would not use System Information. The System Information utility provides a lot of information about installed hardware and software. But it does not list error messages generated by operating system components.

You would not use the Event Viewer Application log to look for errors logged by operating system components. Applications log errors, warnings, and informational messages appear in the Application log.
Which utility would you use to view errors reported by operating system components?

Event Viewer Application log

Event Viewer System log

System Information

System Monitor
You should review effective access permissions. The permissions granted to a user include those granted explicitly to the user or through membership in a group. When accessing files over the network, both local and shared access permissions are considered, and the most restrictive permissions are applied.

You should not review only local access permissions or only network access permissions. Neither one by itself gives you a complete picture of a user's access permissions.

You should not review only group access permissions because permissions can also be assigned explicitly to users.
You need to secure access to network file servers. Your first task is to determine current access permissions.

What should you do?

Review local access permissions.

Review effective access permissions.

Review group access permissions.

Review network access permissions
The most likely cause of the problem is that you did not properly connect the antenna wires. Laptops with internal wireless adapters usually have an internal antenna. That antenna must be connected to the wireless adapter for the adapter to be able to connect to wireless networks. If you do not properly connect the antenna, the adapter will appear to be functioning properly in Device Manager, but it will be unable to detect wireless networks.

The problem is not that you did not attach a power cable to the adapter. Mini-PCI cards do not require separate power cables. They draw power from the mini-PCI slot.

The problem is not that you did not install the correct driver. If you did not install the correct driver, there would probably be an indication of a problem in Device Manager.

The problem is not that the Windows Wireless Zero Configuration service has not started. If the Wireless Zero Configuration service is not running, the Windows Wireless Network Connection utility reports that Windows cannot manage the connection. It does not report that no wireless networks are in range.
You replaced a mini-PCI wireless adapter in a laptop and installed the driver software from the manufacturer's Web site. The adapter appears in Device Manager with no warning icon, but the Windows Wireless Network Connection utility reports that there are no wireless networks in range. Several other computers nearby have strong connections to a wireless network.

What is the most likely cause of the problem?

You did not attach a power cable to the adapter.

You did not properly connect the antenna wires.

The Windows Wireless Zero Configuration service has not started.

You did not install the correct driver for the adapter
The most likely cause of the problem is that the screen inverter has failed. The inverter powers the backlight for the LCD screen. When an inverter fails, sometimes the backlight will go on and off, and sometimes it will stay off. However, when the backlight is off, you can still see a dim image on the LCD screen.

It is not likely that the LCD panel has failed because you can see an image on the panel. This indicates that the backlight, not the panel, has failed.

It is not likely that the battery is low. The laptop will not dim the backlight when the battery is low. Also, there is nothing in the scenario to suggest that the battery is the problem.

It is not likely that the laptop has been switched to send the display through the external video port. Most laptops have switches or function keys that allow the user to switch between showing the display on the laptop's LCD screen or an external monitor. However, when the laptop is set to use an external monitor, the screen is not displayed on the LCD screen with no backlighting.

CompTIA lists the following guidelines for working on laptops:

* Document and label cable and screw locations.
* Organize parts.
* Refer to manufacturer documentation.
* Use appropriate hand tools.
A laptop boots properly and seems to run, but the screen is not lit. You can see a dim image of the desktop, but it is very difficult to see.

What is the most likely problem?

The battery is low.

The inverter has failed.

The laptop has been switched to send the display through the external video port.

The LCD panel has failed.
The most likely problem is that the network adapter has failed. Pinging the loopback address (127.0.0.1) tests whether the TCP/IP protocol stack is functioning correctly. If you cannot ping the loopback address successfully, either the TCP/IP drivers are missing or corrupt, or the network adapter has failed.

The problem would not be that static IP addressing is being used. The type of IP addressing being used does not affect the ability to ping the loopback address.

The problem would not be that Domain Name Service (DNS) is not functioning properly. DNS is used to resolve a fully qualified domain name to an IP address. When a computer needs to establish a session with a host, the computer queries a DNS server for the IP address of the destination host. The DNS server responds with the IP address, which is then used to access the host. It would not affect the ability to ping the loopback address.

The problem would not be that the Dynamic Host Configuration Protocol (DHCP) server could not be reached. If you are using dynamic IP addressing and the DHCP server cannot be reached, you would get a local IP address assigned by Automatic Private IP Addressing (APIPA). The IP address would be in the 169.254.0.1 to 169.254.255.254 address range with a subnet mask of 255.255.0.0. However, this would not affect the ability to ping the loopback address
On your Windows XP computer, you attempt to ping IP address 127.0.0.1, but it is not successful.

What is the most likely cause of the problem?

The network adapter has failed.

DNS is not functioning properly.

The DHCP server could not be reached.

Static IP addressing is being used.
In the Internet Options applet in Control Panel, you can configure the computer to use a proxy server by choosing the Connections tab and clicking the LAN settings button. Enter the address for the proxy server or enable the script file if the Windows Update client cannot determine the proxy server on its own.

The Device Manager can be used to adjust hardware resources but not proxy servers.

The Phone and Modem Options applet allows you to configure dialing properties and modem parameters. You cannot configure a proxy server from there.

The Network and Dial-Up Connections applet is used to configure a Dial-Up Networking connection to another system such as an Internet service provider (ISP). You cannot configure a proxy server from there
Julie has brought her laptop to the office and wants to check her e-mail. Her system is running Windows 2000 Professional with Internet Explorer 6.0. She has a properly configured network card and, in fact, uses her network card to connect to the Internet through her DSL modem at home.

Although she plugged her laptop network cable into the office network, she is unable to connect to the Internet. She was told that she has to configure her browser to use a proxy server.

Which procedure will properly configure the proxy server?

Open the Control Panel | Phone and Modem Options. Select a modem to configure.

Right click My Computer and select Properties. Use the Device Manager.

Open the Control Panel | Internet Options applet. Select Connections, then LAN settings.

Open the Control Panel | Network and Dial-Up Connections
Windows Vista stores user profiles, including user folders, in the Users folder under the name of the user. Then individual folders for specific types of documents are stored in the folder with the user's name. These folders include Documents, Music, Pictures, Contacts, Favorites, and Desktop.

If the laptop were running Windows XP, the location would be C:\Documents and Settings\User1\Documents.
What is the default location for the Documents folder for a user named User1 on a laptop running Windows Vista?

C:\Users\User1\Documents

C:\Documents and Settings\Users\User1\Documents

C:\Documents and Settings\User1\Documents

C:\Windows\Users\User1\Documents
You should select Start > Control Panel > System on your office computer. This will display the System Properties dialog box that allows you to configure your office computer to accept remote desktop connections. You can select the Remote tab and select the Allow users to connect remotely to this computer check box. You can also use the Select Remote Users button to only allow remote desktop connections for specific users. After you have configured the computer to allow remote connections, you should also ensure that Windows Firewall is properly configured with an exception for Remote Desktop. Then, from your home computer, you can access your work computer by selecting Start > All Programs > Accessories > Communications > Remote Desktop Connection.

You should not select Start > Control Panel > Administrative Tools > Computer Management. You can use Computer Management under Administrative tools to access other system tools, such as the Event Viewer or Device Manager, to manage and defragments disks, and to manage services and applications. It does not provide an option to configure the computer to accept remote desktop connections.

You should not select Start > Control Panel > Administrative Tools > Services. You can use Services under Administrative Tools to manage, start, stop, pause, and resume services. It does not provide an option to configure the computer to accept remote desktop connections.

You should not select Start > All Programs > Accessories > System Tools. There are no system tools under Accessories that provide an option to configure the computer to accept remote desktop connections.
You want to be able to access the Windows XP computer at your office from your home computer over an Internet connection.

What should you select on your office computer?

Start > Control Panel > Administrative Tools > Services

Start > Control Panel > System

Start > Control Panel > Administrative Tools > Computer Management

Start > All Programs > Accessories > System Tools
To use BitLocker, you must initialize Trusted Platform Module (TPM). TPM uses a hardware chip that BitLocker uses to perform pre-boot security tests. You can implement BitLocker without using a TPM, but you would have use a removable boot device containing a key to boot the computer.

Encrypting File System (EFS) is an encryption mechanism and can be used in conjunction with BitLocker, but is not required. EFS performs encryption at the file-system level, while BitLocker performs encryption at the volume level. BitLocker also performs pre-boot security tests to ensure that the disk has not been moved to another computer and that the boot configuration has not been altered.

Although setting a boot password does improve security, it is not required to provide this BitLocker functionality. Setting a boot password would prevent unauthorized users from booting the computer.

Repartitioning the hard drive might not be required. You can implement BitLocker if you have a drive that has a minimum of two partitions, one containing the operating system, and at least one more that is formatted as NTFS.
You have a Windows Vista laptop computer. You want to use BitLocker to provide maximum protection of corporate data. You want to ensure the pre-boot checks are performed to confirm that the boot configuration has not been tampered with, but not require a removable boot device.

What is a prerequisite to do so?

Setting a boot password

Implementing EFS

Initializing TPM

Repartitioning the hard drive
The best way to remove paper dust from a laser printer is to blow it out using a can of compressed air. Try not to blow the dust farther into the printer. You could optionally use a low static vacuum or a small brush if one was supplied by the manufacturer.

You can use denatured alcohol and a cotton swab to clean many parts of a laser printer, including the transfer wire and the rubber rollers. However, paper dust is dry, so the best thing to do is to use compressed air to blow out the printer first. Next, you can remove things that are stuck onto components using the denatured alcohol.

A maintenance kit is a set of software programs for analyzing and correcting problems. It cannot be used to remove dust.

Replacing the toner cartridge will not help remove paper dust from within the printer.
What is the best way to clean paper dust from a laser printer?

Use the maintenance kit that comes with the printer.

Use denatured alcohol and a cotton swab.

Replace the toner cartridge.

Use compressed air.
User Account Control (UAC) is a Windows Vista feature that prevents unauthorized changes from being made to a system. UAC works by allowing a user to operate in a safer environment with reduced permissions. When the user needs to perform actions that require more permissions, UAC prompts for permission. This helps prevent malware from making unauthorized changes to the system.

UAC does not prevent users from creating new accounts.

UAC does not block programs and ports. You can use Windows Firewall to open or block ports and allow or deny specific programs.

UAC does not allow users to block offensive Web sites. You can use Parental Controls to block specific Web sites.
Which statement best describes the purpose of UAC in Windows Vista?

UAC prevents users from creating new accounts.

UAC prevents unauthorized changes to the system.

UAC allows users to block ports or programs.

UAC allows users to block offensive Web sites for specified users
The error might indicate that you are attempting to boot from a non-bootable drive. You might also receive this error if your boot files are corrupt or not configured correctly or if you have disk problems that affect areas of the disk required for booting. NT Loader (NTLDR) is the boot loader that is loaded after Power-On Self-Test (POST) from the boot sector of the drive you are booting from. If the drive is not a bootable drive, the boot loader will not be able to load. You could also receive this error if Ntdetect is missing or corrupt, if the boot.ini file is not configured properly, or if the boot sector or master boot record (MBR) on the drive cannot be read.

This error would not indicate your Boot Configuration Data (BCD) is corrupt. The BCD is used when booting Windows Vista, not Windows XP.

This error would not indicate the Ntbootdd.sys file been deleted or is corrupt. The Ntbootdd.sys file is not required for booting. It is only used if you are booting from a SCSI drive.

This error would not indicate you are running low on virtual memory. Virtual memory is disk space that is used to when the memory used by running processes exceeds the amount of available RAM. When this happens, the information is written to a paging file on disk to free up RAM
You attempt to boot your Windows XP computer and receive an error message indicating that the NTLDR is missing.

What might this error indicate?

You are running low on virtual memory.

You are attempting to boot from a non-bootable drive.

Your BCD is corrupt.

Your Ntbootdd.sys file has been deleted or is corrupt.
The ping utility (for example, ping www.measureup.com) is used to send test data packets to verify connectivity to another computer using Internet Control Message Protocol (ICMP). ICMP is part of the TCP/IP suite of protocols. It is an error-reporting protocol. The ping command sends an ICMP Echo Request to a target host name (like computer2) or IP address. The resulting ICMP Echo Reply verifies that a TCP/IP configuration is set up properly and that the destination host is online and connected to the network. Because you want to keep sending ping requests for several hours, you should use ping with the -t option. This keeps sending ping requests until you manually stop the command.

You should not use the ping command with the -l option. You use the -l option with a number to adjust the size of the ping packet.

Nslookup is a TCP/IP utility that allows a user to perform a manual Domain Name System (DNS) query of any DNS database. You would use this to verify that DNS name resolution is functioning properly. Nslookup does not allow you to test connectivity to www.measureup.com.

Ipconfig is a Windows utility that allows you to get information about your IP configuration. It also allows you to release a Dynamic Host Configuration Protocol (DHCP) lease and request a new one. Ipconfig can only be run from the command line. Ipconfig does not allow you to test connectivity to www.measureup.com.
You have intermittent connectivity to www.measureup.com and want to check connectivity to the server over several hours.

Which command should you use?

ping -l

ipconfig

ping -t

nslookup
Sync Center was introduced in Windows Vista. You can use Sync Center to manage file synchronization between your computer and mobile devices and also to synchronize offline files so they can be available when your computer is not connected to the network
What version of Windows uses the Sync Center to manage synchronizing offline files?

Windows XP Professional

Windows Vista

Windows 2000 Professional

Windows XP Home
You should clean the corona wire. When the corona wire is dirty, the image cannot be properly transferred to the paper at the dirty spots. This translates into white lines or streaks running up and down the page. Most laser printers have some kind of brush for cleaning the corona wire.

You should not replace the fuser assembly. A bad fuser assembly causes smeared printouts. A fuser assembly is the component on a laser printer that heats the toner and makes it adhere to the page.

You should not replace the transfer corona assembly. A bad transfer corona assembly would cause blank pages. The transfer corona assembly transfers the image from the drum to the paper. If the image does not get transferred, there is nothing on the page to attract the toner particles.

You should not replace the toner cartridge. A bad toner cartridge can cause a lot of problems ranging from blank pages (out of toner) to smudges and black pages
A laser printer is printing vertical white lines on printouts.

What should you do?

Clean the corona wire.

Replace the toner cartridge.

Replace the fuser assembly.

Replace the transfer corona assembly
You should create a task to run the Defrag.exe command-line utility. The Defrag.exe command-line utility performs a disk fragmentation without user interaction. You can schedule a task to run the utility each week.

You should not access the Tools tab of the disk's properties. Although you can use the Tools tab of the disk's properties to defragment a drive, the graphical interface cannot be scheduled to run weekly as required in this case.

You should not use the Computer Management option in Administrative Tools. You can use the Storage node in Computer Management to initiate a disk defragmentation, but not to schedule one to run weekly as required in this case.

You should not access the Advanced tab under System Properties. The Advanced tab in System Properties provides options to improve system performance, such as virtual memory settings. It also provides the ability to manage user profile settings, environment variables, and startup, recovery, and error logging. However, it does not allow you to defragment a disk drive or schedule a disk defragmentation to run
You have a computer running Windows XP. You frequently experience disk fragmentation that slows down disk access times. You want to schedule a disk defragmentation to run once each week.

What should you do?

Use the Computer Management option in Administrative Tools.

Access the Advanced tab under System Properties.

Access the Tools tab of the disk's properties.

Use the Defrag.exe command-line utility
You should apply thermal compound to provide the best heat dissipation for the CPU heat sink and fan. The thermal compound ensures that heat moves efficiently from the CPU to the heat sink and fan.

Case fans provide cooling to the case by moving air through the case. They do not require thermal compound.

Hard drives and solid state drives do not require thermal compound
Which of the following requires an application of thermal compound when installed to operate efficiently?

SATA hard drive

CPU heat sink with fan

Solid-state drive

Case fan
The most likely cause of the problem is that the Complementary Metal-Oxide Semiconductor (CMOS) battery is weak or dying. The CMOS battery allows the computer to retain Basic Input/Output System (BIOS) settings when it is powered off. When a computer loses its BIOS settings, it is an indication that the CMOS battery should be replaced. Sometimes the symptom can be as mild as needing to reset the time. Sometimes, BIOS configuration changes that were made can be lost, resulting in misconfiguration. Devices could stop functioning, or the computer could report a CMOS checksum error and fail to start.

It is unlikely that the BIOS needs to be updated. Generally, a BIOS that is working will continue to work and does not need to be updated unless there are new features that have been added that you need.

It is not likely that the laptop battery needs to be replaced. Nothing in the scenario suggests that the laptop cannot run on battery power. The CMOS battery is separate from the laptop battery. The CMOS battery just supplies power to the BIOS to retain BIOS settings when the laptop is not turned on.

It is not likely that the computer has a virus. When a computer loses its BIOS settings, it is an indication that the CMOS battery should be replaced
A user reports that she has had to reset the date and time on her laptop several times recently.

What is the most likely cause of the problem?

The laptop battery needs to be replaced.

The computer has a virus.

The CMOS battery is weak.

The BIOS needs to be updated
You could schedule a task to run twice a day in one of the following ways:

* Run Schtasks from the command line.
* Create a task using Scheduled Tasks in System Tools and modify its Advanced properties.

The Schtasks command-line utility can be used to schedule jobs to run. You would include a parameter of /sc HOURLY 12 to run the job twice daily, every 12 hours. You can also navigate to System Tools and select Scheduled Tasks. Then, double-click Add Scheduled Task to launch the Scheduled Task Wizard. The wizard will let you create a task to run daily, weekly, monthly, at startup or logon, or a single time. However, hourly is not an option. Therefore, after you go through the wizard to create the task, you must modify the task's properties. You can right-click the task in the Scheduled Tasks window and select Properties. Then, select the Schedule tab and click the Advanced button to configure the task to run more than once a day.

You cannot create a task using Task Scheduler under Administrative Tools. Task Scheduler is not available under Administrative Tools in Windows XP. In Windows Vista, it is available under Administrative Tools.

You cannot schedule a task by running Schtasks from the Run dialog box. You can run cmd from the Run dialog box and then run Schtasks from the command line, but that would not allow you to schedule a task to run twice a day.

You cannot schedule a task with default property settings from System Tools to run twice a day. When scheduling a task with the Scheduled Task Wizard, the wizard does not provide an option to run the job more than once each day. You must modify the task's default properties
You have a computer running Windows XP. You have a script that needs to run twice each day.

What are two ways that you could accomplish this? (Choose two.)

Create a task using Task Scheduler under Administrative Tools.

Create a task with default property settings using Task Scheduler in System Tools.

Click the Start button and select Run. In the Run dialog box, type Schtasks and click OK.

Create a task using Scheduled Tasks in System Tools and modify its Advanced properties.

Run Schtasks from the command line.
The most likely problem is that another user on the network is using the same IP address. To allow the user to connect, you would need to modify the IP address to one that is not being currently used on the network.

This output would not indicate that the DHCP server could not be reached. This computer is using static IP addressing, so a DHCP server would not be used to assign an IP address.

This output would not indicate that the connection has been disabled in Control Panel. If the connection had been disabled in Control Panel, ipconfig would not generate any output.

This output would not indicate that the Master Boot Record (MBR) is corrupt. The MBR contains information necessary to boot and load the operating system. If the MBR were corrupt, the computer would not boot.
A computer running Windows XP using static IP addressing cannot connect to the network. You run ipconfig from a command line. The output shows a subnet mask of 0.0.0.0.

What is most likely the problem?

The connection has been disabled in Control Panel.

The DHCP server could not be reached.

Another user on the network is using the same IP address.

The MBR is corrupt.
RAID technology provides different types of disk configurations to maximize performance and fault tolerance.

RAID 0 provides striping to improve disk performance, but it does not provide redundancy.

RAID 1 provides mirroring data on multiple hard disks to provide redundancy in case of a disk failure.

RAID 5 provides disk striping with parity. It stripes data across three or more disks but includes parity information that can be used to re-create lost information if one of the hard disk drives fails.

RAID 6 is similar to RAID 5 but uses four or more disks and can withstand the loss of two disks.

RAID 10 uses striping to improve performance and mirroring to provide fault tolerance
A customer wants to add a RAID array to his computer. He wants to be able to use disk striping with mirroring.

Which RAID level does the new hardware need to support?

RAID 5

RAID 6

RAID 1

RAID 10
The most likely cause of the problem is that the jumpers on the drive are not properly set. The jumpers on the drive need to be set for the device 1 (slave) setting. Parallel ATA (PATA) drives use jumpers on the back of the drive to control how the drive communicates on the cable. When two drives share a cable, one must be set as device 0 (the master), and one must be set as device 1 (the slave). If you connect a second drive to the cable and the jumpers are not properly set, the drive will not be detected. You can also use the Cable Select setting on both drives and use the position on the cable to indicate which drive is the master.

It is not likely that there is a problem with the power connection. The drive spun up when the computer was booted, so there must have been power to the drive.

It is not likely that the problem was caused by the length of the cable. PATA cables cannot exceed 18 inches, but there was nothing in the scenario to suggest that the cable had been changed.

It is not likely that a BIOS limitation is preventing the system from recognizing the hard disk drive. If the BIOS supported a 250 GB drive, it would probably also support a 500 GB drive.
You are replacing a failing 250 GB PATA hard disk drive with a new 500 GB PATA drive. The computer has two hard disk drives. The drive that you are replacing is currently listed as the D drive.

You attach the new drive to the cable and connect the power. When you boot the computer, you can hear the drive spinning, but the new drive does not appear in the BIOS.

What is the most likely cause of the problem?

The cable exceeds the 18-inch limit.

The power connection is not properly seated.

The BIOS does not support 500 GB hard disk drives.

The jumpers on the drive are not properly set.