You are on page 1of 319

CompTIA A+
220-801 and
220-802
®

Authorized Practice Questions
Fifth Edition

David L. Prowse

800 East 96th Street, Indianapolis, Indiana 46240 USA

CompTIA® A+ 220-801 and 220-802
Authorized Practice Questions
Exam Cram, Fifth Edition
Copyright © 2013 by Pearson Education, Inc.

Associate Publisher
Dave Dusthimer
Acquisitions Editor
Betsy Brown

All rights reserved. No part of this book shall be reproduced, stored in a retrieval
system, or transmitted by any means, electronic, mechanical, photocopying, recording,
or otherwise, without written permission from the publisher. No patent liability is
assumed with respect to the use of the information contained herein. Although every
precaution has been taken in the preparation of this book, the publisher and author
assume no responsibility for errors or omissions. Nor is any liability assumed for
damages resulting from the use of the information contained herein.
ISBN-13: 978-0-7897-4974-1
ISBN-10: 0-7897-4974-2
Printed in the United States of America
First Printing: July 2012

Development Editor
Box Twelve
Communications,
Inc.

Trademarks

Copy Editor
Megan Wade

All terms mentioned in this book that are known to be trademarks or service marks
have been appropriately capitalized. Pearson IT Certification cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting
the validity of any trademark or service mark.

Warning and Disclaimer
Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information provided is on an “as is”
basis. The author and the publisher shall have neither liability nor responsibility to any
person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the CD or programs accompanying it.

Bulk Sales
Pearson IT Certification offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales. For more information, please contact
U.S. Corporate and Government Sales
1-800-382-3419
corpsales@pearsontechgroup.com
For sales outside of the U.S., please contact
International Sales
international@pearsoned.com

Managing Editor
Sandra Schroeder
Project Editor
Mandie Frank

Proofreader
Leslie Joseph
Technical Editor
Aubrey Adams
Editorial Assistant
Vanessa Evans
Media Producer
Tim Warner
Interior Designer
Gary Adair
Cover Designer
Gary Adair
Compositor
Studio Galou, LLC

Table of Contents
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Chapter 1:
Introduction to the 220-801 Exam . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Exam Breakdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Domain 1.0: PC Hardware (40%) . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Domain 2.0: Networking (27%) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Domain 3.0: Laptops (11%) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Domain 4.0: Printers (11%) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Domain 5.0: Operational Procedures (11%). . . . . . . . . . . . . . . . . . . 5
Test-Taking Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Getting Ready for the Practice Tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Chapter 2:
220-801 Practice Exam A. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Practice Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Domain 1.0: PC Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Domain 2.0: Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Domain 3.0: Laptops . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Domain 4.0: Printers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Domain 5.0: Operational Procedures. . . . . . . . . . . . . . . . . . . . . . . . 24
Quick-Check Answer Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Answers and Explanations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Domain 1.0: PC Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Domain 2.0: Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Domain 3.0: Laptops . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Domain 4.0: Printers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Domain 5.0: Operational Procedures. . . . . . . . . . . . . . . . . . . . . . . . 40
Chapter 3:
220-801 Practice Exam B. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Practice Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Quick-Check Answer Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Answers and Explanations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65

iv

Chapter 4:
220-801 Practice Exam C. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Practice Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Quick-Check Answer Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Answers and Explanations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Chapter 5:
Review of the 220-801 Exams . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Review of the Domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Review What You Know . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
More Test-Taking Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Taking the Real Exam . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Chapter 6:
Introduction to the 220-802 Exam . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Exam Breakdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Domain 1.0: Operating Systems (33%) . . . . . . . . . . . . . . . . . . . . . 126
Domain 2.0: Security (22%) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
Domain 3.0 Mobile Devices (9%) . . . . . . . . . . . . . . . . . . . . . . . . . 126
Domain 4.0: Troubleshooting (36%) . . . . . . . . . . . . . . . . . . . . . . . 127
Test-Taking Tips. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
Getting Ready for the Practice Tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Chapter 7:
220-802 Practice Exam A. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Practice Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Domain 1.0: Operating Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Domain 2.0: Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
Domain 3.0: Mobile Devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
Domain 4.0: Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
Quick-Check Answer Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Answers and Explanations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Domain 1.0: Operating Systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Domain 2.0: Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
Domain 3.0: Mobile Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Domain 4.0: Troubleshooting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160

v

Chapter 8:
220-802 Practice Exam B. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
Practice Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
Quick-Check Answer Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
Answers and Explanations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
Chapter 9:
220-802 Practice Exam C. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
Practice Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
Quick-Check Answer Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
Answers and Explanations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
Chapter 10:
220-802 Practice Exam D . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
Practice Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250
Quick-Check Answer Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
Answers and Explanations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
Chapter 11:
Review of the 220-802 Exam. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
Review of the Domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
Review What You Know . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
More Test-Taking Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
Taking the Real Exam . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
Chapter 12:
Wrap-Up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
Getting Ready and the Exam Preparation Checklist . . . . . . . . . . . . . . . 301
Tips for Taking the Real Exam. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304
General Practices for Taking Exams . . . . . . . . . . . . . . . . . . . . . . . 304
Smart Methods for Difficult Questions. . . . . . . . . . . . . . . . . . . . . 306
Wrapping Up the Exam. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308
Beyond the CompTIA A+ Exam . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308

and Security+ certification courses. With a background in telecommunications. qualifications in communications engineering and management. including the well-received CompTIA A+ Exam Cram and CompTIA Security+ Cert Guide.com.vi About the Author David L. and a technical trainer. Over the past several years he has authored several titles for Pearson Education. Over the past decade he has also taught CompTIA A+. both in the classroom and via the Internet. As a consultant. Prowse is an author. About the Technical Editor Aubrey Adams is an electronics and computer systems engineering lecturer and Cisco Networking Academy instructor at Central Institute of Technology in Perth. He runs the website www. . Network+. where he gladly answers questions from students and readers. he installs and secures the latest in computer and networking technology. a computer network specialist. Western Australia. and graduate diplomas in computing and education. he teaches across a range of computer systems and networking vocational education and training areas. Aubrey has authored Networking Academy curriculum and assessments and is a Cisco Press author and Pearson Education technical editor.davidlprowse.

As an associate publisher for Pearson IT Certification. I will carefully review your comments and share them with the author and editors who worked on the book. where I will forward specific technical questions related to the book. You can email or write me directly to let me know what you did or didn’t like about this book—as well as what we can do to make our books better. or errata that might be available for this book. We do have a User Services group. When you write. downloads.vii We Want to Hear from You! As the reader of this book. please be sure to include this book’s title and author as well as your name.com Mail: David Dusthimer Associate Publisher Pearson IT Certification 800 East 96th Street Indianapolis. and any other words of wisdom you’re willing to pass our way. Email: feedback@pearsonitcertification. We value your opinion and want to know what we’re doing right. IN 46240 USA Reader Services Visit our website and register this book at www. I welcome your comments. what we could do better.pearsonitcertification. . email address. Please note that I cannot help you with technical problems related to the topic of this book.com for convenient access to any updates. however. you are our most important critic and commentator. and phone number. what areas you’d like to see us publish in.

viii It Pays to Get Certified In a digital world. Certification Advances Your Career • The CompTIA A+ credential—provides foundation-level knowledge and skills necessary for a career in PC repair and support.000—Individuals worldwide are CompTIA A+ certified. digital literacy is an essential survival skill. • Mandated/Recommended by organizations worldwide—Such as Cisco and HP and Ricoh. • Starting Salary—CompTIA A+ Certified individuals can earn as much as $65. Security+ and vendor specific technologies. and Northrop Grumman. government contractors such as EDS. Certifications are highly-valued credentials that qualify you for jobs. and U.S. • Career Pathway—CompTIA A+ is a building block for other CompTIA certifications such as Network+. Some of the primary benefits individuals report from becoming A+ certified are: • More efficient troubleshooting • Improved career advancement • More insightful problem solving . Certification proves you have the knowledge and skill to solve business problems in virtually any business environment. • More than 850. increased compensation and promotion. General Dynamics. State Department.000 per year.S. the U.

comptia. CompTIA certifications help you build upon your skills and knowledge. Take the Test! Select a certification exam provider and schedule a time to take your exam.comptia. Steps to Certification Steps to Getting Certified and Staying Certified Review Exam Objectives Review the certification objectives to make sure you know what is covered in the exam.com. which is located at: www. Depending on the path you choose to take. http://www. take a free assessment and sample test to get an idea what type of questions might be on the exam.org/certifications/ testprep/testingcenters. http://www. You can find exam providers at the following link: http://www. supporting learning throughout your entire career.org/ certifications/testprep/examobjectives.org/ certifications/testprep/ practicetests.aspx Purchase an Exam Voucher Purchase your exam voucher on the CompTIA Marketplace.comptia.comptiastore.aspx .aspx Practice for the Exam After you have studied for the certification.ix CompTIA Career Pathway CompTIA offers a number of credentials that form a foundation for your career in technology and allows you to pursue specific areas of concentration.

the U.000 technology professionals. and many more.comptia. Department of Defense. Dell. Computing and Cutting Edge Technologies Access to blogs written by Industry Experts Current information on Cutting Edge Technologies Access to various industry resource links and articles related to IT and IT careers Content Seal of Quality This courseware bears the seal of CompTIA Approved Quality Content. 5 or email questions@comptia. This seal signifies this content covers 100% of the exam objectives and implements important instructional design principles. Ricoh.comptia. Career IT Job Resources Where to start in IT • Career Assessments • Salary Trends • US Job Board Forums on Networking. • Recommended or Required by Government and Businesses—Many government organizations and corporations either recommend or require technical staff to be CompTIA certified. Security. Contact CompTIA: Call 866-835-8020 ext. Why CompTIA? • Global Recognition—CompTIA is recognized globally as the leading IT non-profit trade association and has enormous credibility.org The free IT Pro online community provides valuable content to students and professionals.org Connect with us: . certifications helped command higher salaries at all experience levels.) • Three CompTIA Certifications ranked in the top 10—In a study by DICE of 17. Sharp.and technology-independent validation of your technical skills.S. CompTIA’s certifications are vendorneutral and offer proof of foundational knowledge that translates across technologies. (For example. How to obtain more information Visit CompTIA online: www.x Join the Professional Community Join IT Pro Community http://itpro. • Valued by Hiring Managers—Hiring managers value CompTIA certification because it is vendor. Plus. CompTIA recommends multiple learning tools to help increase coverage of the learning objectives.org to learn more about getting CompTIA certified.

Quick-Check Answer Key: After you have finished answering the questions.Introduction Welcome to CompTIA A+ 220-801 and 220-802 Practice Questions Exam Cram. No explanations are offered yet. purchase an authorized A+ study guide such as the A+ Exam Cram or the more in-depth A+ Cert Guide. Even if you have answered a question incorrectly. drill. Practice Questions: There are 700 questions that will help you learn. at the very least. if you have not acquired that experience. All of the questions in this section are multiple-choice. you can quickly grade your exam from this section. . I recommend that you register for a hands-on A+ course or. The book offers 700 questions that will help you practice each exam domain and will help you assess your knowledge before you take the real exam. You can always review the topic and do the questions again. What You Will Find in This Book In every chapter devoted to practice exams. The detailed answers to every question will aid in reinforcing your knowledge about the concepts associated with the 2012 version of the CompTIA A+ exams. . However. The sole purpose of this book is to provide you with practice questions that are complete with answers and explanations to help you learn. Who This Book Is For The CompTIA A+ exams are designed for individuals with at least 12 months of hands-on experience in the lab or field. If you have that experience. After you take the course and/or read the study guide (or guides). Keep in mind that this is not the real exam. Only correct answers are given in this section. you will find the following three elements: . do not be discouraged. return to this book as your late-stage test preparation to be used just before taking the real exams. and review for the CompTIA A+ certification exams. drill. then this book will be an excellent late-stage study tool. and review for the exam.

Soper. and be sure to see the following sister products to this book: . Also. Answers and Explanations: This section provides you with correct answers as well as further explanations about the content posed in that question. the better your chances for passing the real exam. Hints for Using This Book Complete your exams on a separate piece of paper so that you can reuse the practice questions again if necessary. usually in the mornings. CompTIA A+ Cert Guide. The higher percentages you score on practice question products. Prowse (ISBN: 978-0789749710) . Sixth Edition by David L.davidlprowse. Use this information to learn why an answer is correct and to reinforce the content in your mind for the exam day.com I answer questions Monday through Friday.2 CompTIA®+ 220-801 and 220-802 Practice Questions Exam Cram . Third Edition by Mark E. et al (ISBN: 978-0789749802) . It contains a simulated testing environment where you can take all seven exams on the computer in study mode or in full practice test mode. plan to score 90% or higher on each exam before moving on to the next one. Need Further Study? Consider a hands-on A+ course. I am available for questions at my website: www. CompTIA A+ Exam Cram. The book also comes with a supplemental disc.

0 Printers 11% 5. give you some test-taking tips. and procedures. The majority of this exam covers the nuts and bolts of computer building.1. In this chapter we’ll briefly discuss how the exam is categorized. It doesn’t really get into troubleshooting—that is saved for the 220-802 exam. Each domain makes up a certain percentage of the test. and then prepare you to take the three 220-801 exams that follow this chapter.1 CHAPTER ONE Introduction to the 220-801 Exam The CompTIA A+ 220-801 exam is all about PC hardware.1 220-801 Domains Domain Percentage of Exam 1. Exam Breakdown The CompTIA A+ 220-801 exam is divided up by domain. The five domains of the A+ 220-801 exam and their respective percentages are listed in Table 1.0 Laptops 11% 4.0 PC Hardware 40% 2. .0 Networking 27% 3. networking.0 Operational Procedures 11% Total 100% The 220-801 exam concentrates on the installation and configuration of hardware and devices. TABLE 1.

Each domain has several or more objectives. You are required to understand motherboard form factors and compatibility concerns as well as the ports. you should know some custom PC configurations such as gaming PCs. and optical drives. but I do recommend you download a copy of the objectives for yourself. video. you will see approximately 40 questions on PC hardware. Then there’s everything that connects to the motherboard: CPU and fan. cabling. Plus there are all of the ports on a computer such as USB. You should also know how to access. The core of a PC includes the motherboard. connectors. busses.4 Chapter 1 Chances are that when you take the real CompTIA exam. you will undoubtedly see questions on IP addresses. You should be able to compare wired and wireless technologies and describe the various types of networking hardware available. And finally. 27 questions on networking. You can get them from: http://www. connectors. . TCP/IP is also a big portion of this domain. So it stands to reason that PC hardware should be the most important subject of your studies. Those are the guts of the computer so to speak. due to the sheer bulk of the questions you will see. and audio ports.comptia. and RAM. and tools.0: Networking (27%) The Networking domain covers network standards. and so on. CPU. and lithium battery. and update the BIOS and understand the relationship between the BIOS. hard drives. and HTPCs and the hardware that those different types of systems require. FireWire. and protocols. Domain 1. and expansion slots of a motherboard. There are far too many to list in this book (20 pages or so). CMOS. expansion cards. They are installed inside a computer case. Domain 2. CAD/CAM workstations. RAM.0: PC Hardware (40%) This domain concerns building a computer and upgrading it.org Let’s talk about each domain briefly. configure. ports.

You can always mark it and return to it later. Others may seem tricky if you lack knowledge in certain areas. configure. When you have selected an answer. don’t get stuck on any one question. be confident in your decision. or imagine that you are upgrading a video card. especially on the first exam. Don’t just jump on the first one that seems correct to you. define why it is wrong. Test-Taking Tips My first recommendation is to take the exams slowly.0: Operational Procedures (11%) This domain covers safety. how to deal with prohibited content. Next. and Bluetooth. and impact will definitely present themselves as questions on the exam. and that is intentional as well.0: Printers (11%) Printer technologies such as laser. thermal. Still other questions are somewhat vague. You need to place yourself in the scenario of the question. And if it is wrong. inkjet. This will help you to eliminate wrong answers in the search for the correct answer. . Finally. Think of yourself actually installing a CPU and heat sink. and how to use proper communication skills. environmental controls. Picture in your head the steps you must take to accomplish what the question is asking of you. Don’t rush it. and the answers will come easier to you.Introduction to the 220-801 Exam 5 Domain 3. Some questions are tricky by design. wireless. read through all of the answers. You should know how to install. how to act professionally. Envision what you do with computers step-by-step. and share printers as well as perform printer maintenance. Carefully read through each question. and I summarize all test-taking tips at the end of this book. But remember that every domain is important.0: Laptops (11%) The Laptops domain is a much smaller percentage than the PC Hardware domain. Look at each answer and ask yourself whether it is right or wrong. You also should know how to operate laptops’ special functions such as dual displays. Domain 4. I’ll have more tips as we progress through the book. You should be able to demonstrate the ability to install and configure laptop hardware and software. Domain 5.

which means the questions are mixed up to better simulate the real exam. Each exam gets progressively more difficult. review your answers for accuracy. I might branch off the main topic. even if you think you know the concept. So take a deep breath. if there is still time left.6 Chapter 1 Getting Ready for the Practice Tests The next three chapters feature practice tests based on the 220-801 exam. Really understand the concepts before moving on to another exam. It is also designed to be an easier exam than the other two. In other words. Give yourself 90 minutes to complete each exam. Don’t skip the explanations. That just means you need to study more and try the test again later. and let’s go! . Keep studying and practicing! After each exam is an answer key. Consider timing yourself. Don’t get overconfident if you do well on the first exam. This will make you an efficient test-taker and allow you to benefit the most from this book. Each exam is followed by in-depth explanations. followed by the in-depth answers/explanations. Write down your answers on a piece of paper. but this is done so you can get a clearer. And don’t get too concerned if you don’t score 90% on the first try. The first exam (Practice Exam A) is categorized by domain to help you study the concepts in order. your skills will be tested more thoroughly as you progress. but they serve to build you a stronger foundation of knowledge in general. Be sure to read them carefully. And by mastered I mean you should be scoring 90% or higher on the exam as well as within each of the individual domains. bigger picture of the 220-801 exam. Don’t move on to another exam until you have mastered the first one. The other exams (Practice Exam B and Practice Exam C) are freestyle. I often insert little tidbits of knowledge that are on the periphery of the concept. When you are finished.

Printers. for a total of 100 questions. The goal is to make sure you understand all of the concepts before moving on to the next test.2 CHAPTER TWO 220-801 Practice Exam A Welcome to the first 220-801 practice exam. 27 questions on Networking. After the answer key you will find the explanations for all of the answers. and Operational Procedures. The other two will get progressively harder. and 11 questions each for Laptops. Write down your answers and check them against the answer key that immediately follows the exam. This is the easiest of the three 220-801 exams. You will see 40 questions on PC Hardware. Take this first exam slowly. Good luck! . This practice exam is categorized in order of the domains.

What part of the computer checks all your components during boot? ❍ A.8 Chapter 2 ✓ Quick Check Practice Questions Domain 1. Detailed Answer: 29 RAM 3. ❍ B. ❍ C. Which device stores data over the long term? ❍ A. To which type of expansion slot would you install an x16 card? ❍ A. ❍ B.0: PC Hardware 1. ❍ B. You would normally plug speakers into what type of port? ❍ A. Quick Answer: 27 CMOS POST BIOS EEPROM Quick Answer: 27 Detailed Answer: 29 . ❍ D. ❍ B. ❍ D. ❍ C. CPU ❍ B. ❍ C. ❍ C. Quick Answer: 27 DVI 4. Motherboard ❍ C. Keyboard ❍ D. RAM ❍ F. Which of the following are components you might find inside a PC? (Select all correct answers. Printer ❍ E.) Quick Answer: 27 Detailed Answer: 29 ❍ A. ❍ D. Cable modem 2. CPU Hard drive Video card Parallel Detailed Answer: 29 1/8-inch TRS 1/4-inch TRS PCI Quick Answer: 27 Detailed Answer: 29 PCIe AGP PCI-X 5. ❍ D.

Thermal compound was not applied. PCI Detailed Answer: 30 PCI-X PCIe IDE 10. The CPU is not compatible with the motherboard. Which of the following might be the cause? ❍ A. CRT C. If you have a flat-panel monitor. ❍ B. Detailed Answer: 29 The CPU is not locked down.220-801 Practice Exam A ✓ Quick Check 6. The CPU is not properly seated. ❍ C. Quick Answer: 27 Core i5 Phenom II Pentium IV x64 Quick Answer: 27 Detailed Answer: 30 9 . After a few hours. Which of the following are 64-bit CPUs? (Select all correct answers. Hard drive 9. CPU ❍ B. CD-ROM ❍ D. LCD B. 7. ❍ D. RGB ❍ D. Which of the following could cause the POST to fail? (Select all correct answers. ❍ C. Tim installs a new CPU in a computer. ❍ D. DVI 8. the processor starts to overheat.) ❍ A. what type of technology is most likely being used? (Select the best answer. ❍ B. ❍ D.) ❍ ❍ ❍ Quick Answer: 27 Quick Answer: 27 Detailed Answer: 29 A.) Quick Answer: 27 Detailed Answer: 29 ❍ A. ❍ C. Power supply ❍ C. ❍ B. Which expansion bus uses lanes to transfer data? ❍ A. Memory ❍ E.

Quick Answer: 27 150 KB/s 1. ❍ D. Detailed Answer: 30 PGA 12. ATX 12V 2. ATX 12V 1. ❍ D. ❍ B. How should you hold RAM when installing it? ❍ A. A Compact Disc you use is rated at a speed of 48X. Which device should you use to protect against power outages? ❍ A.0 Gb/s 6. ❍ B. ❍ C. ❍ C. ❍ D.5 Gb/s Detailed Answer: 30 150 MB/s 3. Chipset LGA Copper By the edges Detailed Answer: 30 With tweezers With an IC puller Multimeter Quick Answer: 27 Detailed Answer: 30 UPS FedEx Surge protector 14.0 Gb/s 16. ❍ D. ❍ B. ❍ C. ❍ D. ATX 5V 2. Quick Answer: 27 Quick Answer: 27 Detailed Answer: 30 A. ❍ C. ATX B. ❍ C. ❍ B.10 Chapter 2 ✓ Quick Check 11.5 MB/s Quick Answer: 27 Detailed Answer: 30 . ❍ B. Which of the following uses a 24-pin main motherboard power connector? ❍ ❍ ❍ Quick Answer: 27 By the front and back 13. 1.0 ❍ D. What is the maximum data transfer rate of SATA revision 3.0 15.3 C. What does the X refer to? ❍ A.0? ❍ A.32 MB/s 133 MB/s 4. Which kind of socket incorporates “lands” to ensure connectivity to a CPU? ❍ A.

eSATA 21. Which type of adapter card accepts broadcast programming? ❍ A. ❍ C. Quick Answer: 27 Quick Answer: 27 Detailed Answer: 31 A. ❍ B. Which of the following types of custom PCs requires an HDMI output? ❍ A. ❍ D. Detailed Answer: 30 Video capture card 18.220-801 Practice Exam A 11 ✓ Quick Check 17. ❍ B. ❍ B. ❍ C. ❍ C. ❍ D. ❍ D. USB B. What is the delay in the RAM’s response to a request from the memory controller called? ❍ A. ❍ C. ❍ C. FireWire card Network interface card TV tuner Detailed Answer: 31 Gaming PC Virtualization workstation CAD/CAM workstation 15 Quick Answer: 27 Detailed Answer: 31 7 24 127 20. Quick Answer: 27 2 5 3 4 Quick Answer: 27 Detailed Answer: 31 . ❍ B. How many pins are inside a SATA data connector? ❍ A. FireWire ❍ D. Which of the following ports would you most likely connect a printer to? ❍ ❍ ❍ Quick Answer: 27 HTPC 19. Detailed Answer: 31 Latency Standard deviation Fetch interval Lag 22. LPT C. What is the minimum number of hard drives necessary to implement RAID 5? ❍ A. ❍ D. ❍ D. ❍ B.

To prevent damage to a computer. Modem B. ❍ C. What type of adapter card is normally plugged into a PCIe x16 adapter card slot? ❍ ❍ ❍ Quick Answer: 27 Detailed Answer: 31 A. The BIOS needs to be updated. Detailed Answer: 31 A power strip 26. Which of the following components could cause the POST to beep several times and fail during boot? ❍ A. ❍ D. Video C.12 Chapter 2 ✓ Quick Check 23. Quick Answer: 27 Sound card Power supply Hard drive RAM Quick Answer: 27 Detailed Answer: 32 . How much RAM is available to the operating system? ❍ A. ❍ D. NIC ❍ D. 2000. A computer has 1024 MB of RAM. C. ❍ D. ❍ B. ❍ C. What is the most likely cause? ❍ ❍ ❍ Quick Answer: 27 Detailed Answer: 31 A. ❍ D. ❍ B. Windows needs to be updated. A user’s time and date keeps resetting to January 1. 24. ❍ C. A power inverter An AC to DC converter A UPS Quick Answer: 27 Detailed Answer: 32 512 MB 896 MB 448 MB 1024 MB 27. The lithium battery needs to be replaced. B. It has 128 MB of shared video memory. the computer should be connected to what? ❍ A. ❍ B. The Windows Date and Time Properties window needs to be modified. Sound 25.

Whether the host adapter has an ID of 0. ❍ D. ❍ C. ❍ D. and whether the disks are terminated with the same ID Quick Answer: 27 Detailed Answer: 32 ❍ D. ❍ B.220-801 Practice Exam A 13 ✓ Quick Check 28. and 2 ❍ C. What should you check? ❍ A. and whether all the disks are terminated and have consecutive IDs of 0. ❍ C. and 3 ❍ B. boot loader. boot loader. ❍ D. 1. and that each disk has a unique ID 30. ❍ B. Roger informs you that none of the three SCSI drives can be seen on his SCSI chain. Whether the SCSI adapter has an ID of 7. RAM. ❍ C. operating system. POST. and whether both ends of the chain are terminated. CPU. Whether the host adapter is terminated and that the disks have consecutive IDs of 1. Whether the SCSI adapter has an ID of 7 or 15. RAM POST. CPU. Which kind of form factor is commonly found in HTPCs? ❍ A. 2. operating system CPU. ❍ C. ❍ B. ❍ D. boot loader. Quick Answer: 27 Heat sink Heat sink and fan Liquid cooling Liquid nitrogen Quick Answer: 27 Detailed Answer: 32 . Which of the following has the fastest data throughput? ❍ A. Detailed Answer: 32 Hard drive 31. Which of the following CPU cooling methods is the most common? ❍ A. ❍ B. CD-ROM RAM USB ATX Quick Answer: 27 Detailed Answer: 32 Pico-ITX microATX Nano-ITX 32. operating system Quick Answer: 27 Detailed Answer: 32 Boot loader. CPU. operating system 29. Which of the following is the proper boot sequence of a PC? ❍ A.

Quick Answer: 27 Direct current Neutral current Alternating current Draw current Quick Answer: 27 Detailed Answer: 33 . ❍ B. Quick Answer: 27 Quick Answer: 27 Detailed Answer: 33 A. ❍ B. What type of power connector is used for an x16 video card? ❍ A. IDE ❍ D. ❍ D. ❍ B. ❍ D. ❍ D. ❍ D. What does a CAD/CAM workstation require? (Select the two best answers. Which kind of current does a typical desktop PC draw from a wall outlet? ❍ A. Which of the following is not a video port? ❍ A. You need to store 4 GB of data to an optical disc (without using compression). You need to install the fastest hard drive possible. Detailed Answer: 32 CD-ROM 34. Which of the following will meet your requirements? (Select the two best answers.14 Chapter 2 ✓ Quick Check 33. SATA ❍ C. ❍ D. ❍ B. ❍ C. USB ❍ B. Molex 4-pin Detailed Answer: 33 Mini 4-pin PCIe 6-pin P1 24-pin 38. ❍ C. ❍ C. ❍ B. DVD-RW CD-RW BD-R DVI Detailed Answer: 33 DisplayPort CNR Quick Answer: 27 Detailed Answer: 33 Powerful CPU HDMI output Surround sound High-end video 36. eSATA 37.) ❍ A. Which port should you connect it to? ❍ Quick Answer: 27 HDMI 35. ❍ C. ❍ C.) ❍ A.

Dim the lights near the customer’s desk ❍ D. ❍ D. what type of cable do you need? ❍ A.220-801 Practice Exam A 15 ✓ Quick Check 39. Detailed Answer: 34 Bits 42. A customer complains that he gets a headache when he’s viewing his display for more than an hour. Raise the resolution to a higher setting B. Megabytes Bytes Bandwidth 64-bit Quick Answer: 27 Detailed Answer: 34 32-bit 128-bit 40-bit 43. What does the b in 1000 Mbps stand for? ❍ A.0: Networking 41. ❍ C. Keyboard ❍ C.1 uses what addressing scheme? ❍ A. ❍ D.168. When running cable through drop ceilings. ❍ D. ❍ B. Printer ❍ E.) Quick Answer: 27 Detailed Answer: 33 ❍ A. Which of the following are output devices? (Select the three best answers. ❍ C.1. ❍ C. Speakers ❍ B. ❍ B. Quick Answer: 27 PVC Category 5 Strong cable Plenum Quick Answer: 27 Detailed Answer: 34 . ❍ B. Install an antiglare filter ❍ C. The IP address 192. Mouse ❍ D. What should you do? ❍ ❍ Quick Answer: 27 Detailed Answer: 33 A. Upgrade the video connector from DVI to VGA Domain 2. Display ❍ F. Stylus 40.

0 255. ❍ C. ❍ C.255. ❍ D. Which port number does HTTP use? ❍ A.50.52.168.11n has a maximum data transfer rate of what? ❍ A.255. ❍ C. ❍ B.0. Detailed Answer: 34 11 Mbps 45.1 Detailed Answer: 34 192. ❍ C.255 47. ❍ D.0 255. ❍ B. Category 6 48. What device connects multiple computers together in a LAN? ❍ A.168. The IP address 192. Category 5e ❍ D. ❍ D. 127.0.50. ❍ D. ❍ B.0.255.0. Quick Answer: 27 Quick Answer: 27 Detailed Answer: 34 A. ❍ C.13 10. Category 3 B. ❍ D.16 Chapter 2 ✓ Quick Check 44. Quick Answer: 27 21 25 80 110 Quick Answer: 27 Detailed Answer: 34 . 600 Mbps 480 Mbps 54 Mbps Modem Detailed Answer: 34 Switch Firewall Quick Answer: 27 Detailed Answer: 34 255.13 49.0.52. What is the minimum category cable needed for a 1000BASE-T network? ❍ ❍ Quick Answer: 27 Router 46.1 129.255.255. ❍ B.1.1. Category 5 ❍ C. Which of these IP addresses can be routed across the Internet? ❍ A. The wireless protocol 802.1 should have what default subnet mask? ❍ A. ❍ B.0 255.

UTP B. What port do you connect a network patch cable to on the PC? ❍ A. ❍ D. Quick Answer: 27 Transmitting and receiving data Quick Answer: 27 Detailed Answer: 35 Transmitting and receiving data simultaneously Transmitting data only Receiving data only 52. What is the most commonly used network topology? ❍ A.220-801 Practice Exam A 17 ✓ Quick Check 50. ❍ D. STP ❍ C.) ❍ ❍ Quick Answer: 27 Detailed Answer: 35 A. ❍ D. Which of the following types of cable have a copper medium? (Select the three best answers. Twisted pair ❍ B. Fiber Optic ❍ D. Coaxial ❍ C. ❍ B. Star Detailed Answer: 35 Bus Ring Mesh 51. USB RJ45 RJ11 Parallel Quick Answer: 27 Detailed Answer: 35 . Which types of cable can protect from electromagnetic interference (EMI)? (Select the two best answers. ❍ B. ❍ C. What is the meaning of full duplex? ❍ A. Cat 6 54. Cat 5e ❍ E. ❍ C. Multi-mode 53. ❍ B.) Quick Answer: 27 Detailed Answer: 35 ❍ A. Fiber optic ❍ D. ❍ C.

❍ D.1 192.168.1.255. Detailed Answer: 36 Infrared 58. DNS server address ❍ B. Which of the following IP addresses is a suitable gateway address? ❍ A. DNS ❍ D. Windows automatically configures the default subnet mask of 255. ❍ D.168. UDP C.1 192.105 in Windows 7. ❍ B. What is the best technology to enable her to do so? ❍ A. ❍ D. Quick Answer: 27 SSID WPA DMZ DHCP Quick Answer: 27 Detailed Answer: 36 .168.) Quick Answer: 27 Detailed Answer: 35 ❍ A. DHCP server address ❍ E.0. ❍ B. FTP 57. Domain name 56. You just configured the IP address 192.168.0.1. ❍ C. TCP B. Cellular WAN Bluetooth 802.1 59. Gateway address ❍ C. Which of the following is required? (Select all that apply. Which of the following translates a computer name into an IP address? ❍ ❍ ❍ Quick Answer: 27 Detailed Answer: 35 A.168.18 Chapter 2 ✓ Quick Check 55.0. ❍ C. What is the name of a wireless network referred to as? ❍ A. ❍ C.11n Quick Answer: 27 Detailed Answer: 36 192. One of your customers wants to access the Internet from many different locations in the United States.100 192. E-mail server name ❍ D.255.10. You are configuring Bob’s computer to access the Internet. ❍ B. When you press the tab key.

DSL ❍ E. WiMAX ❍ C. ❍ D. Cable Internet ❍ B. Which protocol uses port 53? ❍ A. Which of the following devices allows wireless computers to connect to the wireless network? ❍ A. ❍ D. Which of the following terms best describes two or more LANs connected together over a large geographic distance? ❍ A. ❍ C. ❍ B. Quick Answer: 27 FTP Quick Answer: 27 Detailed Answer: 36 SMTP DNS HTTP 62. FIOS 63. Which of the following connector types is used by fiber-optic cabling? ❍ A. Quick Answer: 27 WPA WAN WAP VoIP Quick Answer: 27 Detailed Answer: 36 . Detailed Answer: 36 PAN WAN WLAN MAN 64. Which of the following Internet services are wireless? (Select the three best answers. ❍ C.) Quick Answer: 27 Detailed Answer: 36 ❍ A. ❍ C. ❍ B. Satellite ❍ D.220-801 Practice Exam A 19 ✓ Quick Check 60. Cellular ❍ F. ❍ D. Detailed Answer: 36 LC RJ45 RG-6 RJ11 61. ❍ B. ❍ B. ❍ D. ❍ C.

Cable tester C.20 Chapter 2 ✓ Quick Check 65. ❍ B. ❍ D.0: Laptops 68. Quick Answer: 27 Fn Ctrl Alt Shift Quick Answer: 27 Detailed Answer: 37 . ❍ C. 80 Quick Answer: 27 Detailed Answer: 37 110 443 3389 Domain 3. ❍ D. ❍ D. Detailed Answer: 36 NAS NAT NAC NaaS 66. Which port is used by RDP? ❍ A. ❍ B. ❍ B. ❍ D. Which key on a laptop aids in switching to an external monitor? ❍ A. ❍ C. Which tool should you use? ❍ ❍ ❍ Quick Answer: 27 Quick Answer: 27 Detailed Answer: 37 A. Detailed Answer: 37 DIMM RIMM SODIMM SDRAM 69. Multimeter 67. You are making your own networking patch cable. What device connects to the network and has the sole purpose of providing data to clients? ❍ A. ❍ C. Crimper ❍ D. You need to attach an RJ45 plug to the end of a twisted-pair cable. Tone and probe kit B. ❍ B. Which is the most common type of RAM architecture used by laptops? ❍ A. ❍ C.

❍ B. ❍ D. What does adding more RAM to a laptop that uses shared video memory do for that laptop? ❍ ❍ ❍ Quick Answer: 27 Hard drive 72. What should you do first? ❍ A. CRT OLED VGA Detailed Answer: 37 Modem NIC RAM Lithium-ion (Li-ion) Quick Answer: 27 Detailed Answer: 37 Nickel-Cadmium (Ni-Cd) Nickel-metal hydride (NiMH) Fuel cell 73. ❍ C. ❍ C. Nothing B. What is the most commonly used battery type in laptops? ❍ A. Increase RAM speed 74.) ❍ A. ❍ D. Detailed Answer: 38 Install a new sound driver Tap the speakers Search for a volume wheel/key Reinstall Windows 75. Improve system performance ❍ D. ❍ C. Quick Answer: 27 ExpressCard SODIMM PC Card AGP Quick Answer: 27 Detailed Answer: 38 . ❍ B.220-801 Practice Exam A 21 ✓ Quick Check 70. Which of the following are typical names for expansion busses on laptops? (Select the two best answers. ❍ B.) ❍ A. ❍ C. ❍ A. You would most likely find this type of display on a laptop. Quick Answer: 27 Quick Answer: 27 Detailed Answer: 37 A. A customer can barely hear sound from the speakers on her laptop. ❍ B. ❍ D. ❍ D. ❍ D. ❍ C. What would you normally install into a Type II PCMCIA slot on a laptop? (Select all that apply. ❍ B. Improve video performance C. Detailed Answer: 37 LCD 71.

What is a simple. What are two important factors when purchasing a replacement laptop AC adapter? (Select the two best answers. Which type of printer uses a toner cartridge? ❍ A. ❍ B. ❍ D. ❍ C. Which of the following should not be connected to a UPS? ❍ A. Press the Enter and Esc keys while the laptop is booting Quick Answer: 27 Detailed Answer: 38 B. Detailed Answer: 38 Keep the laptop on a flat surface Put the laptop in the freezer when not in use Direct a fan at the laptop Keep the laptop turned off whenever possible 77. Connect the laptop to another external monitor ❍ C. You use your laptop often. ❍ B. ❍ D. free way to keep your laptop running cool? ❍ A.0: Printers 79.) ❍ A. ❍ C. He tells you that his laptop will boot but the system won’t display anything on the external screen. ❍ C. Which of the following enables the display? ❍ ❍ A. ❍ B. Quick Answer: 27 Quick Answer: 27 Detailed Answer: 38 Current and voltage Connector size and shape Battery type Inverter type 78. Press the Fn and Screen keys one or more times until the screen appears ❍ D. ❍ B. Quick Answer: 27 PCs Monitors Laser printers Speakers Quick Answer: 27 Detailed Answer: 38 . Press the Fn key while the laptop is booting Domain 4.22 Chapter 2 ✓ Quick Check 76. ❍ D. ❍ D. ❍ C. Eric uses an external monitor with his laptop. Ink jet Detailed Answer: 38 Laser Dot matrix Thermal 80.

Which of the following is not a connector you might find on a printer? ❍ A. ❍ C. ❍ D. Laser ❍ D. Moisture Detailed Answer: 39 ESD Dirt Heat 86. What happens last in the laser printing process? ❍ A. Terri finishes installing a printer for a customer. ❍ C. Special paper is needed to print on what kind of printer? ❍ ❍ ❍ Quick Answer: 27 Verify that the printer prints in Microsoft Word 83. ❍ D. USB PCIe Centronics Detailed Answer: 39 Print a test page Restart the spooler Set up a separator page Printing on both sides of the paper Quick Answer: 27 Detailed Answer: 39 Printer collation Full-duplex printer communication Printing to file 84.220-801 Practice Exam A 23 ✓ Quick Check 81. Dot matrix Quick Answer: 27 Detailed Answer: 39 B. ❍ D. ❍ B. ❍ C. ❍ D. What should she do next? ❍ A. ❍ B. Detailed Answer: 38 RJ45 82. ❍ B. ❍ D. Which environmental issue affects a thermal printer the most? ❍ A. Which of the following best describes printing in duplex? ❍ A. ❍ C. ❍ C. Thermal C. ❍ B. Inkjet 85. ❍ B. Quick Answer: 27 Charging Exposing Developing Fusing Quick Answer: 27 Detailed Answer: 39 . Quick Answer: 27 A.

❍ D. Quick Answer: 28 Ignore the call for now. ❍ C. ❍ C. Answer the phone as quietly as possible. ❍ B. a friend calls you on your cell phone. Go outside and take the call. ❍ B. Detailed Answer: 40 Multimeter Crimper Antistatic wrist strap PSU tester 91.24 Chapter 2 ✓ Quick Check 87. ❍ A. Detailed Answer: 39 Laser 88. ❍ D. What should you do? ❍ A. Text your friend. How can you take control of a network printer from a remote computer? ❍ A. ❍ C. ❍ D. ❍ C. This type of printer uses impact to transfer ink from a ribbon to the paper. While you are working at a customer site. Quick Answer: 28 Detailed Answer: 40 . What tool should you use to protect a computer from electrostatic discharge (ESD) while you are working inside it? ❍ A. What should you do? ❍ A. Quick Answer: 27 Quick Answer: 28 Detailed Answer: 40 Clean the toner cartridge Calibrate the printer Change the fusing assembly Clean the primary corona Domain 5.0: Operational Procedures 90. ❍ B. ❍ B. ❍ D. ❍ C. A color laser printer is producing images that seem to be tinted blue. Inkjet Dot matrix Thermal Quick Answer: 28 Detailed Answer: 39 Install the printer locally and access the Sharing tab Install the printer locally and access the spool settings Install the printer locally and access the Ports tab Connect to the printer via FTP 89. ❍ D. ❍ B.

What should you do first? ❍ ❍ ❍ Quick Answer: 28 Quick Answer: 28 Detailed Answer: 40 A. 93. Throw it in the trash.220-801 Practice Exam A 25 ✓ Quick Check 92. Save the computer. What should you do? ❍ A. Get out of the area. Contact the local municipality and inquire as to their disposal methods. ❍ D. “What can I do to help you?” Quick Answer: 28 Detailed Answer: 40 . C. Which of the following statements is not assertive communication? ❍ A. C. Call the building supervisor. ❍ D. ❍ B. Call the building supervisor. Consult the MSDS for the chemical. What should you do? ❍ A. While you are upgrading a customer’s server hard drives.” ❍ B. 95. As you are working in the warehouse. a 55-gallon drum falls from a pallet and spills what smells like ammonia. 96. Tell the customer about safer alternatives. “I certainly know how you feel—losing data is a terrible thing. Call 911. What should be done with a lithium-ion battery that won’t hold a charge any longer? ❍ ❍ ❍ Quick Answer: 28 Quick Answer: 28 Detailed Answer: 40 A. ❍ D. Notify the administrator. Detailed Answer: 40 Call 911. You spill an unknown chemical on your hands. You are running some cable from an office to a computer located in a warehouse. ❍ B. Call the building supervisor. you notice looped network cables lying all over the server room floor. Ignore it. ❍ C. ❍ D. 94. “Do your employees always cause issues on computers like these?” ❍ D. Open the battery and remove the deposits. B. Detailed Answer: 40 Ignore the problem. Return it to the battery manufacturer. B. ❍ C. “Could you explain again exactly what you would like done?” ❍ C.

A customer has a malfunctioning PC. Active communication includes which of the following? ❍ ❍ Quick Answer: 28 A. What could be described as the chronological paper trail of evidence? ❍ ❍ ❍ Quick Answer: 28 Quick Answer: 28 Detailed Answer: 41 A. First response B. Data preservation 99. ❍ D. Filtering out unnecessary information B. Chain of custody C. and as you are about to begin repairing it. ❍ B. What should you say to the customer? ❍ A. ❍ D. I’m sorry. Setting and meeting expectations ❍ D.26 Chapter 2 ✓ Quick Check 97. ❍ B. What should you not do when moving servers and server racks? ❍ A. Clarifying the customer’s statements ❍ D. Remove jewelry Detailed Answer: 41 Move a 70-pound wire rack by yourself Disconnect power to the servers before moving them Bend at the knees and lift with your legs 100. but I don’t know how to fix servers! Is the server problem related to the PC problem? I have to call my supervisor. ❍ C. Mouthing off Quick Answer: 28 Detailed Answer: 41 . the customer proceeds to tell you about the problems with the server. Declaring that the customer doesn’t know what he or she is doing ❍ C. 98. Detailed Answer: 41 Wait until I finish with the PC. ❍ C.

A 79. B 34. B 75. D. A 15. A 45. B 61. C 76. A 57. D 29. A and D 64. B 69. B 33. B and C 82. C 35. C 17. D 58. C 24. A 3. D 56. D 87. A 41. and E 30. D 28. B and D 62. and E 5. D 46. C 74. C 23. A. C 11. C 7. A 2. B 42. A 8. B. A 19. B 13. D 10. C 16. B 22. B and C 14. C 27 . B 86. D 54. C. C 43. B 83. C 40. A and B 39. C 9. C 32. B 80. C 66. D 63. and E 68. C 38. B 6. A. A and C 18. A and D 37. D 52. A 49. and D 81. A 12. B 73. A 47. B.220-801 Practice Exam A Quick-Check Answer Key 1. B 71. B 48. C 59. D 72. B. A. B 53. A and B 84. A 36. B 25. C 60. A 50. C 51. C 31. C 67. B 27. B 65. B 70. B 21. C 4. C 85. D 44. A 26. B 55. A and B 20. C 77. C 78.

C 92. B 89. C .28 Chapter 2 88. A 96. C 99. B 90. C 100. C 93. C 91. B 94. C 97. C 95. C 98.

6. Plasma. The video card stores temporary video data within its onboard memory. for example. 4. The CPU and memory need to be installed properly for the POST to run (and to pass). Printers (and displays) are output devices that are located outside the PC. 2x. though there is also light-emitting diode (LED)-backlit LCD. The hard drive and CD-ROM might or might not be installed properly. but they are not necessary for the POST to complete. Know the internal components of a PC! 2. but the cards are normally numbered as 1x. Cathode ray tube (CRT) is an older type of tube technology resulting in a much bulkier monitor. Keyboards (and mice) are input devices that are located outside the PC. the processor might overheat after a few hours. EEPROM is a type of ROM chip on which the BIOS might reside. the PC will simply fail to boot. PCI is an older expansion bus that can accept video cards but. If the CPU is not compatible with the motherboard. DVI (Digital Visual Interface) is a type of video port. RGB simply stands for red. The larger 1/4" TRS connections are for instrument cables or full-size stereo connections.220-801 Practice Exam A 29 Answers and Explanations Domain 1. Common components inside a PC include the CPU. either it will not fit the socket or the PC will not boot. The CPU calculates data and sends it to RAM for temporary storage. AGP works with video cards. It runs a self-check of the computer system during boot and stores many of the parameters of the components within the CMOS. the RAM (which is volatile) is cleared when the computer is turned off. . and x16 cards (pronounced “by sixteen”). Answer: A. or is not properly seated. A cable modem is an Internet communication device that is outside of the PC. along with the power supply. and 8x (pronounced “eight x”). If the CPU is not locked down. with network adapters. like RAM. 5. PCI Express (PCIe) slots accept x1. PCIe is by far the most common expansion slot for video cards (which are usually x16). BIOS is known as firmware. and Organic LED (OLED). Speakers normally plug into a sound card or motherboard.0: PC Hardware 1. Answers: A. they have no particular designation. a port you would find on a video card. x4. Answers: A and D. Answer: C. 7. The hard drive stores data over the long term. and E. The hard drive stores the OS and data in a nonvolatile fashion. Answer: B. Answer: C. Parallel ports are older connectors normally used for printers or scanners. If the power supply is defective. the system will simply not boot and will not even get to the POST stage. adapter cards. and hard drives. Liquid Crystal Display (LCD) is most commonly the type of technology that a flat-panel monitor uses. Answer: B. is volatile and is cleared when the computer is turned off. DVI is short for Digital Visual Interface. Without the thermal compound applied. and RAM. green. 1/8" TRS jacks (also known as mini-jacks) are the most common for speaker connections. 8. but this. unlike PCIe. blue (the three primary colors of a CRT monitor). 4x. B. The POST (Power-On Self-Test) is part of the Basic Input Output System (BIOS). motherboard. PCI-X is used mostly in servers. Answer: C. meaning it won’t be erased when the computer is turned off. 3.

13. note the uppercase B). LGA sockets are often a brass alloy or have gold contacts. VCR. Answer: D. This comes to 7. IDE stands for Integrated Device Electronics.3 into one 24-pin connector.32 MB/s is the 1X speed of a DVD. Answer: C.0 Gb/s (6 gigabits per second. it makes the connection to the Ethernet network for a PC. A network interface cards is also known as a NIC. The UPS is the only item listed that protects the computer from power outages like blackouts and brownouts. Video capture cards are used to record video from a camera. it is known as ATX 12v. Answer: B. 10. metallic could be damaging to the module. note the lowercase b). Tools are not needed. PGA sockets have pinholes that make for connectivity to the CPU’s copper pins. ATX 12V 2. Plastic tweezers are used to remove screws that fell into tough-to-reach places in the case. A surge protector (or surge suppressor) is used to protect computer equipment from surges and spikes in power.0 Gb/s is the data transfer rate of SATA revision 2. and although copper might be a possibility for some sockets. 17. Hold RAM by the edges to avoid contact with the pins. a 2X drive can read or write 300 KB/s.5 Gb/s is the data transfer rate of SATA revision 1. chips. Answer: C. A 1X drive can read or write 150 KB/s. ATX is simply the name of the form factor. and so on. there are many types of ATX. Answer: A. or network adapter. 15. Answer: C. A typical speed for today’s CD-ROM drives is 48X. Intel’s Core i5 and AMD’s Phenom II are both 64-bit CPUs. It has a peak throughput of 300 MB/s. The chipset is the combination of the northbridge and southbridge on the motherboard. Answer: D. There is no ATX 5V.0 (and higher) combined the 20-pin and 4-pin connectors used in ATX 12V 1. 1. A multimeter is used to test AC outlets and individual wires inside the computer.0 can transfer a maximum of 6. SATA revision 3. not a computer acronym. and IDE are parallel technologies. Touching the front and back is not advised because it will require touching the chips on the RAM module. 14. The TV tuner card accepts television broadcast programming. The X in CD technology is equal to 150 KB/s.2 MB/s total. FireWire cards allow a computer to connect to FireWire devices such as hard drives and audio devices.30 Chapter 2 9. the predecessor to SATA hard drive technology. or close-circuit television system. 11. it doesn’t fit into the description of “lands” in the question. Although ATX sends 12-volt and 5-volt signals.5 MB/s is the 1X speed of a Blu-ray disc.0. The Pentium IV is an older 32-bit CPU. which means 8 bits at a time or multiples of 8. The IC puller is a tool that removes older integrated circuits and is not used often today. 3. PCI-X. LGA is the best answer. This allows a peak throughput of 600 MB/s (600 megabytes per second. Answers: A and B. 16. It will usually have cable-in and antenna-in RG-6 ports. Answer: A. 133 MB/s is the maximum data transfer rate of an Ultra ATA-7 connection (IDE hard drive). 4. 1. and circuitry.0. 12. PCIe (PCI Express) uses serial lanes to send and receive data. LGA (Land Grid Array) is the type of socket that uses “lands” to connect the socket to the CPU. . FedEx is a shipping company. but cannot protect against power outages. and if they are used. It’s maximum throughput is 150 MB/s. x64 is the name given to 64-bit processor technology but is not an actual CPU. That means one bit at a time per lane. PCI.

Since most theater system TVs will have one or more HDMI inputs. chances are that the lithium battery needs to be replaced. CAD/CAM workstations require a high-end video card. Answer: D. The PCI Express (PCIe) x16 expansion slot is used primarily for video. Answer: A. and blackouts. it’s possible to connect via DVI with an adapter. Answer: A. brownouts. 22. Though there are FireWire printers. Virtualization workstations don’t rely on video cards as much as the other systems listed in the answers. It is a slight delay (usually measured in nanoseconds) while the memory module responds to the memory controller. 25. the power supply acts as a power inverter. and sound cards will connect to either PCIe x1 or plain PCI slots. Sure. do not protect against surges. A home theater PC (HTPC) requires a High-Definition Multimedia Interface (HDMI) output on the video card so that it can connect properly to the HDMI port on a television. eSATA is normally used for external hard drives or external optical drives. sags. The SATA power connector has 15 pins. Windows client computers should be configured to synchronize to a time server. Power inverters are effectively AC to DC converters. a third disk is needed. but the DVI (or multiple DVI) output is usually satisfactory. so HDMI is not necessary. or even by way of VGA.0 and higher power connections have 24 pins. but the whole point of a true HTPC is that it has the best to offer when it comes to connections. 127 is the maximum amount of USB devices you can connect to the computer. Memory latency or CAS (Column Address Strobe) latency happens when a memory controller tries to access data from a memory module. If the CPU asks the chip for too much information at once. they are much rarer than USB printers. spikes. this might increase latency time while the memory controller works. 2000. Answer: C. ATX 12V 2. The SATA data connector has 7 pins. Modems. Other time synchronization problems can be fixed in the clock settings within the Notification Area. Answer: D. You can have more than three disks as well. network interface cards (NICs). 21.220-801 Practice Exam A 31 18. The memory controller (also known as the northbridge) has a specific speed at which it operates. Answer: A. Answer: B. 20. 23. Two disks are enough for plain RAID 0 striping and is the exact number you need for RAID 1 mirroring. Updating windows will not fix this problem but should be done often to keep the computer secure. Four disks are required by RAID 6 and RAID 10. 19. though they might have HDMI as well. If the time and date keep resetting to a time such as January 1. . Updating the BIOS will allow the BIOS to “see” new devices and communicate with them better but will not fix the time issue. Printers can also connect to the network directly if they have an RJ45 port. A printer would most likely be connected to a Universal Serial Bus (USB) port. LPT is an older parallel port that is less commonly used. the HTPC should have at least one HDMI output. Answer: B. Power strips. unlike surge protectors. Because RAID 5 uses striping with parity. 24. A UPS (uninterruptible power supply) protects computer equipment against surges. Gaming PCs will usually have DVI connections to connect to desktop monitors.

That is. Answer: C. While the POST will complete in these cases. RAM is one of the big four (RAM. Standard Blu-ray discs can store between 25 and 50 GB of data. The CPU must be installed correctly for the POST to begin. your peak transfer rate is 6. Answer: B. So. 32. BOOTMGR for Windows 7/Vista or NTLDR for Windows XP). It uses a coolant similar to the way an automobile does. The heat sink by itself is called passive cooling. Each disk needs a unique ID. 29.7 and 17 GB of data. Answers: B and D. It requires no power but is not enough to cool most desktop PCs. Home theater PCs (HTPCs) commonly use the microATX form factor. Answer: A. motherboard. The sound card does not have an effect on the POST.400 MB/s. Answer: D. it is helped in escaping the case by the power supply exhaust fan and possibly additional case fans. RAM is much faster than the rest of the options listed. CPU. USB (typically 60 or 480 MB/s). if there are no boot loader errors. if you have PC3-8500 DDR3 RAM (aka DDR3-800). the remainder for the rest of the system is 896 MB. Less commonly used is the ATX form factor due to its large size. Liquid nitrogen would be plain foolish and is not a legitimate answer. Liquid cooling is a more extreme method used in custom PCs such as gaming computers and possibly audio/video workstations and virtualization machines. or 600 MB/s). If the power supply has a problem. if installed incorrectly. Hard drive problems will result in a variety of errors. The Mini-ITX form factor is also used for HTPCs. The amount of shared video memory is subtracted from the total RAM. This is common with motherboards that have integrated video cards and laptops. For instance. Different RAM errors can cause the POST to make a different series of beeps. Consult your motherboard documentation for more information about the different beep codes. shutting down unpredictably. Answer: D. 27. The most common CPU cooling method is the heat sink and fan combination. A rewritable DVD-RW and a writeable Blu-ray (BD-R) meet the requirements. the operating system will not boot. 28. The adapter should use the ID 7. . if a computer has 1024 MB RAM (1 GB) and the video controller is sharing 128 MB of that RAM. Answer: B. and video) that can cause the POST to fail. Heat sink and fan combinations are known as active cooling. making it more difficult to troubleshoot. Both ends of the SCSI chain need to be terminated (some SCSI cards and devices auto-terminate). Answer: C.32 Chapter 2 26. the boot loader then runs (for example. The heat sink helps the heat to disperse away from the CPU. 300. The rest of the following devices are listed in descending order: hard drive (typically 133. DVDs can store between 4. After the POST is successful. Pico-ITX and Nano-ITX are used in handheld computers and are much smaller. No CD (without compression) can store more than 1 GB of data. 150.5 MB/s). The CPU is crucial. and CD-ROM (typically 7. The particular ID you give the disks doesn’t matter. typical CD storage is 750 MB. either the computer will not boot at all (and not even enter POST) or it will have intermittent problems—for example. 30. while the fan blows the heat down and through the fins. 33. and then the operating system comes up. the system will not POST. 31.

eSATA is limited to 3. Mini 4-pin connectors (also known as Berg) are used by floppy drives.0 Gb/s (300 MB/s). 35. HDMI output is necessary on HTPCs. . an adapter card slot used by audio and telephony equipment. and recommending that the user take breaks every 30 minutes or so. high-end video. SATA will usually still be the preferred choice because it has less latency and is internal to the computer. Speakers. changing the video connector probably won’t help the problem. Unless you specifically are required to use an external drive. common in home theaters and HTPCs. A display (or monitor) displays video. 37. Direct current (DC) works inside the computer. The CPU is especially important to run design applications such as AutoCAD. and styli are input devices. printers. The power supply converts between the two! In this respect. As of early 2012. similar to a mouse. a person’s eyes react better to the display and so the customer can use the computer longer without getting a headache. and as much RAM as possible. Answer: D. internal SATA is the way to go.0 offers 6. You should install an antiglare filter on the monitor. 39. and displays are output devices. but studies prove that a person will develop eye strain and headaches quicker when reading a backlit screen in a dark room. Answer: B. DVI is the Digital Visual Interface. the most common output on PC video cards. 40. DisplayPort is another video standard used by some PCs.0 Gbps (480 MB/s). SATA revision 3. your computer should be connected to a 120V AC outlet. Besides. 38. the power supply is an inverter. and not a good one at that. Answer: C. It is designed to replace DVI but is still not as common as DVI as of 2012. However. A printer outputs paper with text and graphics. for example.220-801 Practice Exam A 33 34. It is a pen-like device used to manipulate the display. An x16 card is a PCI Express card. IDE is the predecessor to SATA and has a maximum transfer rate of 133 MB/s. Answer: C. However. By reducing glare. Surround sound is needed on HTPCs and perhaps gaming computers as well. Alternating current (AC) is the standard in the United States. many mobile devices now allow a person to simply use a finger and tap on the screen. upgrade the monitor to a bigger size and consider positioning it differently. Molex 4-pin power connectors are used by IDE hard drives. You should connect the hard drive to a SATA port. P1 24-pin power is the main power connection that the motherboard gets from the power supply. A computer-aided design/computer-aided manufacturing workstation requires a powerful CPU. USB 3. D.0 comes in a close second at 5. but it is only a temporary solution. CNR is not a video port. Answers: A. Neutral current and draw current are not terms you will see on the CompTIA exams. The only ways to fix the problem are to: install an antiglare filter. Answer: B. HDMI is the HighDefinition Multimedia Interface. farther away. A speaker outputs sound. mice. A stylus is used on mobile devices that incorporate touchscreens. Lowering the resolution might help. Answers: A and D. Other countries might use 230V AC connections. 36. and E. It requires one or two PCIe 6-pin power connectors (or an 8-pin connector).0 Gb/s data transfer resulting in a maximum throughput of 600 MB/s. Keyboards. Dimming the lights will decrease glare. It stands for Communications and Networking Riser. Raising the resolution would make the problem worse. Video Graphics Array (VGA) is not an upgrade from DVI—quite the reverse.

40-bit is a commonly used amount of bits in older encryption techniques. 802. Cat 3 is suitable for 10 Mbps networks. 255. Answer: B. Answer: C. 47.52.168. the address is a 32-bit dotted-decimal address.0 is the Class A default subnet mask. A router connects one network to another.168. meant to be behind a firewall. In larger networks.0. A switch connects computers together in a local area network (LAN).1 is the local loopback IP address. Plenum-rated cable needs to be installed wherever a sprinkler system cannot get to. single shared channel).0. Of course.255. and 1 = 00000001. The reason for this is that the PVCs in regular cable give off toxic fumes in the case of a fire. 48.1 is a common Class C private IP address used by SOHO networking devices. 49.11b runs at a maximum of 11 Mbps. Port 25 is used by the Simple Mail Transfer Protocol (SMTP). Answer: B. you end up with 32 in total.0 is the Class B default subnet mask.0 Hi-Speed runs at a maximum of 480 Mbps. The b in 1000 Mbps stands for bits. It is not usable as a subnet mask for typical computers on the LAN.0: Networking 41. There are 32 bits in a standard IPv4 address.34 Chapter 2 Domain 2. 43. but it is not the minimum of the listed answers. 255. 802. 64-bit is a term used with newer x64 CPUs.0. In SOHO networks.1.50. 168 = 10101000. Though a SOHO multifunction device is often referred to as a router.1 is a private Class C address and therefore should have the subnet mask 255. 24. Remember that the lowercase b is used to indicate bits when measuring network data transfer rates. 42. Answer: C.13. 10. .0. The minimum cable needed for 1000BASE-T networks is Category 5e.13 is a Class A private address. All the others are private IPs. the binary equivalent of the IP numbers would be 192 = 11000000. 44. 1 = 00000001.0. 1000 Mbps is 1000 megabits per second or 1 gigabit per second. Answer: C. 127. Therefore.1. This includes ceilings. Answer: C. the switch is an individual device that has 12.0.255. Answer: D. 192.50.255. Answer: B. 802. A modem connects a PC to the Internet by way of a dial-up connection over a plain old telephone service (POTS) line. Answer: B.255.255. and plenums (airways).11g has a maximum data transfer rate (DTR) of 54 Mbps. 45. it is usually a part of a multifunction network device. walls.11n runs at a maximum of 600 Mbps. Port 21 is used by the File Transfer Protocol (FTP).52. Plenum-rated cable has a protective covering which burns slower and gives off less toxic fumes. The Hypertext Transfer Protocol (HTTP) uses port 80 (by default). the standard default subnet mask for Class C. The only public address (needed to get onto the Internet) is 129. If you count all the binary bits. Cat 6 would also work. A firewall protects all the computers on the LAN from intrusion. it’s not the router portion of that device that connects the computers together in the LAN. 128-bit is used by IPv6. 255. In this case. 46. or 96 ports. Cat 5 is suitable for 100 Mbps networks. 1000BASE-T specifies the speed of the network (1000 Mbps). the type (baseband. Port 110 is used by the POP3 e-mail protocol. 48.255 is the broadcast address for IP. USB 2. 192. and the cable to be used (T = twisted pair).

Answer: C. without the need for guaranteed delivery. UTP and coaxial have no such protection. it uses light to send data over a glass or plastic medium. Full duplex means that a network interface card (NIC) can transmit and receive data at the same time. A DHCP server address is not necessary either. USB is for peripherals (such as a mouse or printer). unshielded twisted pair (UTP) cannot. However. The star topology is the most common. 53. 56. sends data in a streaming format. Multi-mode is a type of fiber-optic cable. To get on the Internet. The File Transfer Protocol (FTP) allows you to send files between computers over the Internet. and parallel is for printers and scanners. The Transmission Control Protocol (TCP) is used to send data from one computer to another utilizing a guaranteed delivery system. Answers: A. The DNS (Domain Name System) protocol translates a computer name into an IP address. RJ11 is for modem and other telephony connections. on the other hand. The gateway address is necessary to get outside the network.com a DNS server translates that name to its corresponding IP address. B. STP is shielded twisted-pair. E-mail server information is not necessary if the person is just looking to get onto the Internet. Unlike UTP (unshielded twisted-pair). 55. it is an easier method. Twisted pair. Answer: A. Twisted pair is the most common type of cabling used in today’s networks. 51. where a few of the computers on the network have secondary connections to other systems. Category 6 cable is UTP. and Category 5e cable are all examples of network cables with a copper medium. the DNS server is required so that the computer can get the resolved IP addresses from the domain names that are typed in. Answer: B. is transmitting in half-duplex mode. not because speed has been increased.davidlprowse. A 100 Mbps network running in full-duplex mode can transfer 200 Mbps. A NIC that can transmit or receive data. The beauty of DHCP is that you don’t need to know the DHCP server’s address to acquire an IP address. . EMI cannot affect fiber-optic cables. coaxial. The RJ45 (Registered Jack) is the standard connector for network patch cables. That will only be necessary if you want to add the computer to the organization’s domain. Whenever you type a web server name such as www. Answers: B and C.220-801 Practice Exam A 35 50. The domain name for your network is normally not needed either. transmitting light rather than electricity. Fiber optic uses a different medium altogether. Mesh is when each computer connects to each other. This is an expensive and complicated configuration. but this is because transmitting and receiving have been combined. 52. Answer: B. but it’s not used nearly as much as USB is. User Datagram Protocol (UDP). Answers: A and B. 54. However. therefore. but not at the same time. and D. This is when computers are cabled to a central connecting device such as a switch. What is more likely is that you will encounter a partial mesh. it provides an aluminum shield that protects from EMI. Shielded twisted pair (STP) and fiber optic can protect from EMI. Bus and ring don’t use a central connecting device and are outdated. Unless otherwise mentioned. They all send electricity over copper wire.

it can connect two or more LANs together but does it in a small city-based area. Remember that the gateway address must be on the same network as the computer.0 network. Answer: D. By themselves.10. as defined by the 255. WPA stands for Wi-Fi Protected Access. RG-6 is the connector used by cable modems and TV set-top-boxes. Answer: C. VoIP stands for Voice over IP. The Domain Name System (DNS) protocol uses port 53 by default. 192. A WAN is a wide area network.1 is on the 192. 58.1. Answer: A. Answer: C.10. WiMAX.168.0.0 subnet mask. and E. HTTP uses port 80. NAC stands for network access control. Don’t forget that a zero at the end of an IP address denotes the network number. it connects LANs together. Bluetooth headsets are commonly used with smartphones. In this case the network is 192.168. allowing data to be “beamed” from one device to another. so is 192. C. They connect directly to the network. DSL.1.11n is a Wi-Fi technology for the LAN. This is the name that the IEEE uses for their 802. 61. Bluetooth is also for short distances. a group of technologies designed to allow or deny access by authenticating users. the other options don’t offer a direct connection to the Internet. 192. Infrared is used more often for very short distance connections.168. The Service Set Identifier (SSID) is the name of the wireless network.36 Chapter 2 57. FTP uses port 21.1. Answer: A.168. and FIOS all use wired connections. 62.1 is the only suitable gateway address. WPA is a secure wireless connectivity protocol. As to the other answers: 192.11 standards. Answers: B. a secure connectivity protocol for wireless networks. though widely used. NaaS stands for . and FTP servers. satellite. 802. but not as short as infrared. 59. Network-attached storage (NAS) devices store data for network use. Cable Internet.168. Network address translation (NAT) is used on routers to take a group of computers on a private LAN and connect them to the Internet by using a single public IP.0. between two cities. Cellular WAN uses a phone or other mobile device to send data over standard cellular connections. The LC connector is used by fiber-optic cabling. This device also gives the wireless network its name or SSID. The demilitarized zone (DMZ) is an area between the LAN and the Internet that often houses web. The WAN requires connections to be provided by a telecommunications or data communications company. The Dynamic Host Configuration Protocol (DHCP) is a service that assigns IP addresses automatically to computers and other devices. Answer: B. e-mail. Other fiber connectors include SC and ST. and cellular are examples of wireless Internet services.1. That is because the term Wi-Fi. A personal area network (PAN) is a small network made up of short-distance devices such as Bluetooth. Answer: A.255. Answer: B.168. 60.0 network. A MAN is a metropolitan (or municipal) area network. This is a technology that allows phone calls to be made over data networking infrastructures. is copyrighted. RJ45 is the connector used by twisted-pair networks. A wireless access point (WAP) connects wireless clients to the wireless network. 63.255. 65. This is the name you look for when locating a wireless network. 64.100 is on the 192. RJ11 is the standard phone line connector. SMTP uses port 25. WLAN stands for wireless local area network. A wide area network (WAN) is a network in which two or more LANs are connected together over a large geographic distance—for example.168.

but not laptops. The shared video will use a finite amount of RAM on the laptop.220-801 Practice Exam A 37 Network as a Service. Organic LED screens are not popular on laptops as of the writing of this book.0: Laptops 68. Although Ni-Cd and NiMH batteries have been used on laptops. however. Answer: A. SODIMM (small outline dual in-line memory module) is the most commonly used RAM by laptops. Ctrl may also have secondary functions but is otherwise used the same as on a PC’s keyboard. 73. Increasing the amount of RAM on a laptop or a PC improves general system performance. some of those types include SDRAM. Regular DIMMs are normally used in desktop computers. Domain 3. Adding more RAM won’t change the amount of shared video used. To improve video performance. for testing and locating is a continuity cable tester. 70. a cloud-based technology where organizations can offload their network infrastructure to a third-party. it is a video standard that uses a 15-pin connector. Cathode ray tubes (CRTs) were the predecessor to flat-panel monitors. The Remote Desktop Protocol (RDP) uses port 3389. Some laptops and especially other smaller mobile devices use lithium-ion polymer-based batteries. the most commonly used type as of the writing of this book is lithium-ion. 72. The fact that the laptop uses shared video doesn’t come into play. Hard drives would normally be installed internally but could also be connected to USB and FireWire ports. The better tool. DDR. The Fn (Function) key is used for a variety of things. some laptops allow you to increase this setting within the BIOS. you would need to either upgrade the video card or lower some of the video settings. VGA is not a type of display. It is the predecessor to today’s standards such as DVI and HDMI. including toggling between the built-in LCD screen and an external monitor/TV. Answer: D. and highway road signs. and RIMMs or RDRAM. They were rarely used in laptops and only way back in the 1980s. 67. RAM is installed internally. vending machines. A tone and probe kit is used to locate individual phone lines but can also be used with network lines. Answers: B and C. in conjunction with adding RAM. Use an RJ45 crimper tool to permanently attach RJ45 plugs to the end of a cable. The liquid crystal display (LCD) is the most common type on a laptop. Port 80 is used by HTTP. Input/output devices such as modems and NICs (network interface cards/network adapters) are the most commonly installed Type II devices. a protocol used during secure web sessions. 69. However. You might also see LED-backlit LCDs. The Fn key could be a different color (for example. Port 110 is used by POP3. A multimeter is great for testing AC outlets and for testing wires inside a computer but is not often used in networking applications. Threw in a tougher one there—have to keep you on your toes! 66. Answer: C. This. might improve video performance as well. 71. Fuel cells are used in vehicles. Answer: B. Alt and Shift work in the same manner as they do on a PC. blue) and offers a sort of “second” usage for keys on the laptop. CRT monitors were more commonly used with PCs. This protocol allows one computer to take control of another remote system. . Port 443 is used by HTTP Secure or HTTPS. Answer: C. Answer: C. Answer: A.

Answer: C.0: Printers 79. speakers rarely become loose on today’s laptops. meaning ones that connect directly to the computer. Answers: A and C. it is the predecessor of the PCIe x16 video expansion bus. there is another inverter in the laptop. the website will tell you everything you need to know about current. ExpressCard and PC Card (also known as PCMCIA) are expansion busses used on laptops. Thermal printers use specially coated paper that is heated. When you enter your model number. Centronics is an older . Always check the physical volume first. USB. Laptops have airflow underneath them. The AC adapter inverter is simply an inverter. USB is the most common for local printers. Answer: B. However. This enables you to switch between the laptop display and an external display (or if you wanted to use both). they both need to be compatible with the laptop. Dot matrix printers use a ribbon. However. it powers the display. and then check if the volume is low or the sound is muted in Windows. and connector type. leading to component damage. If the display toggle doesn’t work. 76. Answer: A. Reinstalling Windows is the last thing you want to do. Answers: A and B. Laser printers use large amounts of electricity. however. A fan won’t do much good unless the laptop is on a flat surface. Tapping the speakers is an interesting idea. Sometimes. If a speaker is loose. Installing a new sound driver isn’t necessary yet. the volume wheel on older laptops can be hard to find and could be in the lowest position (which might still make a slight audible noise). Domain 4. 80. then try another external monitor. The freezer is not a good idea because condensation could build up inside the unit. This can be found on the laptop manufacturer’s website. Answer: C. Check the simple solutions when troubleshooting problems such as no audio or video. if the unit is not on a flat surface. Make sure to purchase an AC adapter that is a true replacement. the inverter type is very important. On newer laptops the volume is usually controlled by pressing the Fn key and the volume up or volume down key simultaneously. 75. 77. They should be plugged into their own individual power strips. SODIMM is the type of RAM in a laptop. Mini-PCIe is another expansion bus that is used by laptops. because of this. it converts power from AC to DC. 81.38 Chapter 2 74. 78. Laser printers use toner cartridges. AGP is the Accelerated Graphics Port. voltage. Printers might connect via RJ45. The battery and AC adapter do need to work in conjunction with each other. The Screen key (also known as the display toggle) is one of the keys available when you use the function (Fn) key. but it has no place in this discussion. but if you are ever troubleshooting a display. PCIe is an internal expansion bus that printers do not use. Answer: C. Inkjet printers use ink cartridges. No other key combinations perform this task. or Centronics. This question is not referring to that. but it is internal and is more difficult to install cards to then its PC version. it will often make scratchy noises. it negates the reason for using the laptop. which in turn could quickly drain the battery of the UPS. Answer: B. and although it is plausible to keep the laptop turned off. that airflow will be reduced or stopped altogether.

Heat is the number-one enemy to a thermal printer. which use specially coated paper that is heated to create the image. but only if you are working inside the printer. You will have to know the IP address of the printer or the computer that the printer is connected to. The spooler should already be running. a printer cable would have a centronics connector on the printer side and a 25-pin parallel connector for the computer side (which would connect to the LPT port). developing. Some laser printers can do this. 88. Electrostatic discharge (ESD) is always a foe. but it creates a longer total paper path. Then click the Add Port button and select the Standard TCP/IP Port option. Separator pages are not necessary.220-801 Practice Exam A 39 printer connector. it is also still considered regular paper. which leads to more frequent paper jams. but this question is referring to printing in duplex. the fusing stage happens last. If a thermal printer or the thermal paper is kept in a location where the temperature is too high. Print a test page after installation. it will have a built-in RJ45 port. Collation is when documents are printed in a standard order. A laser printer or dot matrix printer might use two-part paper. 82. Restarting the spooler is not needed if the printer has just been installed. 83. but two-part paper isn’t necessary for laser printers or dot matrix printers to operate. If the printer is network-ready. that would be a separate troubleshooting scenario. . But by far. you can then take control of it by going to the properties of the printer and accessing the Ports tab. Regular paper can be used on all the listed printers except for thermal printers. Thermal paper is specially coated and forms text when it is heated properly. Answer: C. 85. writing (or exposing). Answer: D. thermal printers won’t work unless you use specially coated paper. Full-duplex in networking is when information can be sent and received simultaneously. The laser printing process includes the following steps in order: cleaning. Laser printers apply toner to paper through varying voltages. Instead of selecting a physical printer when printing a document. If the test page prints properly. but that is standard for many dot matrix printers. Windows prints to a special file and saves that file to a location of your choice with a . 84. After you install the driver for the printer locally. heat is what you have to watch for with thermal printers. Answer: B. It is typically considered to be the last stage of the laser printing process before paper exits the printer. charging. Printing to file is a process that can be performed by Windows. 87. Inkjet printers spray ink from a cartridge onto the paper. A dot matrix might use tractor feed paper. Answer: C. usually numerically. it could cause failure of the printer and damage to the paper. Answer: B. If that has failed.prn extension. When printing “duplex. transferring. Inkjet printers normally use standard copy paper for printing. The dot matrix is a type of impact printer. 86. and fusing. they are optional and can be configured in the Printer Properties window. A printer can have a full-duplex connection to the network. it should be unnecessary to print a page in Word. Dirt can clog up the works over time in any device. Answer: A. It uses a printhead to physically impact the ribbon and transfer ink to the paper.” it means that you are printing on both sides of the paper (if the printer has that capability). Answer: D. Of the listed answers. Excessive moisture can cause rubber rollers and separation pads to fail over time.

While on the job site. Answer: C. Or. Domain 5. it is near the drum. Be safe—never open a battery! 96. It is more likely that you will recycle them. The fusing assembly needs to be changed only when it fails. the toner will fail to stick to the paper. Stay away from being judgmental of the customer. Many printers will give you an indication of when the fuser is at 20% life and needs to be replaced soon. Use an antistatic wrist strap when working inside a computer to protect against electrostatic discharge (ESD). the building supervisor. If it is an emergency. Answer: A. Trip hazards such as incorrectly routed network cables can have devastating effects on a person. it is important to calibrate it for color and orientation. Be professional when you’re on the job! 92. Take action before it becomes a problem. this type of communication should be avoided. Never ignore the problem. Taking a personal phone call while working at a client site is considered unprofessional. 91. If there is something that is immediately hazardous to you. If the fuser fails. You need to explain to the customer that there is a safer way. especially if you are installing a color laser printer or an inkjet printer. Answer: C. This can help with other types of print quality problems such as lines and smearing. Afterward. A wise consulting company wants to protect its employees and should want to know of potential hazards at customer locations. If it is not life-threatening. or your manager. you might opt to tell your manager about the event. Answer: C. Other ways to prevent ESD include using an antistatic mat. you can access them from the printer’s display. Answer: B. Cable management is very important when it comes to the safety of employees. touching the chassis of the case. Remember that. consult the material safety data sheet (MSDS) to determine the proper first aid (if any). you must leave the area right away. These calibration tools are usually built in to the printer’s software and can be accessed from Windows. Asking a customer if employees always cause issues is just plain rude. you can call 911. 94. However. limit phone calls to emergencies or if your employer calls you about another customer. Manufacturers probably won’t be interested in batteries that won’t charge any longer. It is not your place to notify the building supervisor or administrator because this is not your company. The primary corona wire can be cleaned.0: Operational Procedures 90. contact the facilities department of your organization or try your building supervisor.40 Chapter 2 89. However. If a toner cartridge needs to be cleaned. If you cannot get access to the MSDS. it probably has a leak and should be replaced. you have nothing to lose if a computer is damaged. or at least consoling. After installing a printer. if backup systems have been implemented properly. Plus. Answer: C. 95. Answer: C. Computers and all other technology come second after human life. . and using antistatic bags. the other three statements are positive and helpful. depending on the severity of the situation. Never ignore an unknown chemical. 93. Answer: C. call 911. Every municipality has its own way of recycling batteries. But you should definitely recycle them and not throw them in the trash.

reporting through proper channels. mouthing off could be the worst thing you could do. Never declare that the customer doesn’t know what he is doing. and preserving data and devices. Make sure it isn’t a bigger problem than you realize before making repairs that could be futile. and bending at the knees and lifting with the legs are all good safety measures. a person who first arrives at the scene of a computer incident will be in charge of preserving data and devices in their current state. Data (and device) preservation is a part of first response. If you find out that it is a separate problem. Don’t attempt to move heavy objects by yourself. Answer: C. . Setting and meeting expectations deals with customer service. ask the customer which issue she would like to resolve first. Chain of custody is the chronological paper trail of evidence that may or may not be used in court. One example of active communication is clarifying a customer’s statements. 99. Answer: B. Save that for the drive home on the freeway—I’m just kidding! Be professional at all times when working with customers. This is a surefire way to lose the customer and possibly your job. 98. For instance. First response describes the steps a person takes when first responding to a computer with prohibited content or illegal activity: it includes identifying what exactly is happening. Answer: B. always clarify the information or repeat it back to the customer so that everyone is on the same page.220-801 Practice Exam A 41 97. disconnecting power. Ask someone to help you. it is something you should do before you start a job for a customer. Ask if the server problem is related to the PC problem. if you are unsure exactly what the customer wants. Answer: C. 100. It should go without saying. Try to understand the customer before making any judgments about the problems. Removing jewelry.

This page intentionally left blank .

the goal here is to make sure you understand all of the concepts before moving on to the next test. in any order. If you just completed the first exam. This second 220-801 exam could be considered an intermediate practice test. After the answer key. I’ll be mixing in some more difficult questions this time. Good luck! . Write down your answers and check them against the answer key that immediately follows the exam. You can expect questions from any of the domains. If you didn’t already. go back and study. Unlike the first exam. Again. I suggest taking a break between exams. meaning the questions are randomized. you will find explanations for all of the answers. If you didn’t score 90% or higher on Exam A. give yourself a half-hour or so before you begin this one. then retake Exam A until you pass with 90% or higher.3 CHAPTER THREE 220-801 Practice Exam B Now let’s kick it up a notch. this one is freestyle.

Beep codes are generated by which of the following? ❍ A. 80mm and 120mm are common sizes for what type of PC component? ❍ A. The device is disabled. ❍ B. ❍ D. ❍ D. ❍ C. 192. ❍ C. The device driver needs to be upgraded. ❍ C.0.10 169.10. Detailed Answer: 65 172.10 2. ❍ B. The driver is not digitally signed.254. Quick Answer: 63 CMOS RTC POST Windows Quick Answer: 63 Detailed Answer: 65 . What is the total number of devices that can be daisy-chained to an IEEE 1394 port? ❍ A.16. ❍ C. ❍ B. What does a yellow exclamation point next to a device in the Device Manager indicate? ❍ A. ❍ B. ❍ C. ❍ D.168.10.10 192.44 Chapter 3 ✓ Quick Check Practice Questions 1. ❍ D.10. 5. ❍ D. Quick Answer: 63 Case fans 3.168.10 Heat sinks Memory modules Quick Answer: 63 Detailed Answer: 65 127 63 15 255 Quick Answer: 63 Detailed Answer: 65 A driver is not properly installed for this device. ❍ B. Detailed Answer: 65 CPUs 4. Which of the following IP addresses would a technician see if a computer is connected to a multifunction network device and is attempting to obtain an IP address automatically but is not receiving an IP address from the DHCP server? ❍ A.

What should you be careful of when removing the fuser? ❍ ❍ ❍ Detailed Answer: 65 SCSI 8. ❍ C. ❍ D. Which of the following connectors is used for musical equipment? ❍ A. ❍ C. How should you apply spray cleaner to a monitor? ❍ ❍ A. Where is the memory controller located in a Core 2 Duo system? ❍ A. ❍ C. The fuser being hot B. Which bus slot provides the highest video performance? ❍ A. Quick Answer: 63 MIDI HDMI DVI DisplayPort Quick Answer: 63 Detailed Answer: 66 . Spray the cleaner on a clean. The fuser being wet C. ❍ C. ❍ B. ❍ B. Spray the cleaner directly on the monitor screen. ❍ B. ❍ D. Which of the following indicates that a printer is network-ready? ❍ A. Spray evenly on the monitor.220-801 Practice Exam B 45 ✓ Quick Check 6. ❍ D. You just turned off a printer to maintenance it. PCI AGP PCIe An RJ11 jack Quick Answer: 63 Detailed Answer: 65 A USB connector An RJ45 jack An SCSI connector 9. lint-free cloth first. The fuser being fragile ❍ D. The fuser releasing toner 10. ❍ D. Quick Answer: 63 Detailed Answer: 65 B. ❍ D. Spray the cleaner on the top of the monitor and wipe down. ❍ C. ❍ B. On the CPU Detailed Answer: 66 On memory Within the chipset Within the PCIe controller 11. Quick Answer: 63 Quick Answer: 63 Detailed Answer: 66 A. 7.

❍ C. this tool is sometimes used to remove screws from the outside of a computer case or from within a laptop. ❍ C. ❍ B. ❍ B. Overdriving Overpowering Overspeeding DVI Quick Answer: 63 Detailed Answer: 66 COM1 LPT1 SCSI 16. The ability to use unsigned drivers Quick Answer: 63 Detailed Answer: 66 C. ❍ C. ❍ D. ❍ D. Which port is typically known as a serial port? ❍ A. ❍ A. ❍ B. Detailed Answer: 66 Overclocking 15. The ability to run multiple 16-bit programs in separate memory spaces 14. What is the most important piece of information needed to connect to a specific wireless network? ❍ A. Although not used as often as a Phillips screwdriver. Quick Answer: 63 Detailed Answer: 66 Monkey wrench Torx wrench Channel lock Pliers 13. The ability to access more than 4 GB of RAM ❍ D. ❍ D. ❍ D. The ability to use software-based data execution prevention (DEP) ❍ ❍ B. Quick Answer: 63 Channel MAC address SSID Administrator password Quick Answer: 63 Detailed Answer: 67 .46 Chapter 3 ✓ Quick Check 12. ❍ C. ❍ A. Moving your CPU’s speed beyond its normal operating range is called _____________. ❍ B. What is the main advantage of selecting a 64-bit operating system over a 32-bit operating system? ❍ A.

❍ C. What are advantages of using the Dynamic Host Configuration Protocol (DHCP)? (Select the two best answers. ❍ D. 21. 19. ❍ D. The hosts file on the computer can be validated for proper entries. ❍ D. The laptop cannot use full brightness when on battery power. The network speed can automatically adjust based on the type of traffic being generated. ❍ ❍ B.220-801 Practice Exam B 47 ✓ Quick Check 17. Serial mouse PS/2 mouse USB mouse Touchpad Quick Answer: 63 Detailed Answer: 67 . Quick Answer: 63 Detailed Answer: 67 B. Which tool should always be used when working on the inside of the computer? ❍ A. Media access control addresses can be changed. Which password is used in the BIOS (CMOS) to prevent end users from accessing the BIOS contents? ❍ A. Quick Answer: 63 Detailed Answer: 67 Supervisor User Administrator Local 18. ❍ B. Computers can automatically get new addressing when moved to a different network segment. ❍ C. On a laptop. ❍ C. ❍ D. ❍ C. Quick Answer: 63 Detailed Answer: 67 Cordless drill Antistatic strap Multimeter Screwdriver 20.) ❍ ❍ A. Quick Answer: 63 Detailed Answer: 67 C. Why would the display on a laptop get dimmer when the power supply from the AC outlet is disconnected? ❍ A. Power management settings on the laptop. ❍ E. Security settings on the laptop. To operate properly. ❍ D. which of the following would most likely be a pointing device? ❍ A. ❍ B. ❍ B. IP addresses can be managed from a central location. laptop displays require an alternating current power source.

What is the most likely cause? ❍ A. Detailed Answer: 68 100 meters 10 meters 5 meters 1 meter 27. ❍ C. Port 25 Quick Answer: 63 Detailed Answer: 68 B.48 Chapter 3 ✓ Quick Check 22. Port 80 C. ❍ B. ❍ D. Which of the following storage technologies is used by traditional hard disk drives? ❍ A. Quick Answer: 63 A. ❍ D. ❍ D. Detailed Answer: 67 Magnetic 23. A client brings in a printer that is giving a paper-feed error. ❍ C. ❍ B. What is the maximum distance at which a Class 2 Bluetooth device can receive signals from a Bluetooth access point? ❍ A. ❍ B. Port 443 26. Which of the following form factors does a VGA connector comply with? ❍ A. ❍ C. On which type of computer is RAM the most important? ❍ A. Which of the following is the default port for HTTPS? ❍ ❍ ❍ Quick Answer: 63 Virtualization workstation 24. ❍ C. Port 143 ❍ D. ❍ D. ❍ B. ❍ D. Quick Answer: 63 8P8C 15-pin D shell microATX RG-6 Quick Answer: 63 Detailed Answer: 68 . ❍ B. ❍ C. Optical Impact Solid-state Gaming PC Detailed Answer: 68 AV workstation HTPC Quick Answer: 63 Detailed Answer: 68 The separation tab The developing rollers The paper tray The pickup rollers 25.

He is no longer near the AC power line. What is the PC equivalent of FireWire? ❍ A.11a 802. ❍ D. What wireless networking standard operates at 5 GHz only? ❍ A. ❍ C. Move the co-worker farther down the hall. “Have you been to any inappropriate websites?” Quick Answer: 63 30. The co-worker accidentally touches a live AC power line and is thrown off the ladder and onto the ground. ❍ B. “What did you modify since the optical drive worked?” ❍ D. “Did you log in with your administrator account?” ❍ C. What question should you ask first? ❍ Quick Answer: 63 Quick Answer: 63 Detailed Answer: 68 A.11g 802. He is dazed and can’t stand. Detailed Answer: 68 802. Call 911. ❍ D. ❍ C.11b 802.220-801 Practice Exam B 49 ✓ Quick Check 28. “What has changed since the optical drive worked properly?” ❍ B. 29. Apply CPR. ❍ D. ❍ B.44 MB on a removable disk? ❍ A. You and a co-worker are running network cables above the drop ceiling.11n Quick Answer: 63 32. A customer reports that an optical drive in a PC is no longer responding. Which device can store a maximum of 1. ❍ C. ❍ B. IEEE 1284 USB IEEE 1394 ISA Detailed Answer: 69 . What should you do first? ❍ A. Detailed Answer: 68 Floppy drive CD-ROM ROM Compact Flash Quick Answer: 63 31. ❍ D. ❍ B. Detailed Answer: 68 Cut the power at the breaker. ❍ C.

What is a possible symptom of a failing CPU? ❍ A. ❍ D. Detailed Answer: 69 DDR2-1600 34. 36. Coaxial 37. ❍ B. ❍ B. Setting an administrator password in the BIOS accomplishes which of the following? ❍ A. Fiber optic ❍ D. How should you clean this? ❍ A. DDR3-800 DDR3-1600 DDR2-800 Laser Detailed Answer: 69 Inkjet Thermal CPU is beyond the recommended voltage range. Which type of printer uses a print head. Spyware is installed into the browser. Quick Answer: 63 Quick Answer: 63 Detailed Answer: 69 A. BIOS reports low temperatures within the case.50 Chapter 3 ✓ Quick Check 33. ❍ B. and tractor feed? ❍ A. Use a surface dust cleaning solution. ❍ C. Use compressed air to remove the dust. Quick Answer: 63 Prevents a user from rearranging the boot order Prevents a user from reading e-mail Prevents a virus from infecting the MBR Prevents an attacker from opening the case Quick Answer: 63 Detailed Answer: 70 . Which of the following cable types is not affected by EMI but requires specialized tools to install? ❍ ❍ ❍ Quick Answer: 63 Impact 35. Which type of RAM has a peak transfer of 12. ❍ C. ❍ C.800 MB/s? ❍ A. Use a vacuum to clean up the dust. ❍ D. ❍ B. Cat 6 B. ❍ C. ❍ C. A computer you are working on has a lot of dust inside it. ❍ D. ❍ B. ❍ D. 38. STP C. Quick Answer: 63 Detailed Answer: 69 Computer won’t boot. ribbon. ❍ D. Detailed Answer: 69 Disassemble the power supply and remove the dust.

❍ B. Check for a compatible power adapter for that country. microATX 43. Detailed Answer: 70 The computer is not usable in other countries. ITX ❍ D. ❍ B. She asks you what safety concerns there might be. Use a line conditioner for the correct voltage. Which type of cable has only two twisted pairs? ❍ A. When it comes to computer case form factors. ❍ B. Quick Answer: 63 Power consumption Display resolution and brightness The darkest and lightest outputs Power savings Quick Answer: 63 Detailed Answer: 70 . ❍ C. Detailed Answer: 70 Increases voltage 40. ❍ B. ❍ D. Stores power Converts DC power to AC power Converts AC power to DC power UTP Detailed Answer: 70 Fiber Coaxial Quick Answer: 63 Detailed Answer: 70 24 15 8 35 42. ❍ B. ❍ C. ❍ D.220-801 Practice Exam B 51 ✓ Quick Check 39. BTX ❍ C. 44. Which function is performed by the external power supply of a laptop? ❍ A. What should you tell her? ❍ A. A co-worker is traveling to Europe and is bringing her computer. How many pins would you see in a high-quality printhead on a dot matrix printer? ❍ A. ❍ D. ❍ D. Check the voltage selector on the power supply. Quick Answer: 63 Quick Answer: 63 Detailed Answer: 70 A. which of the following provides the most room for effective cooling? ❍ ❍ Quick Answer: 63 POTS line 41. ATX B. ❍ C. What is an LCD display’s contrast ratio defined as? ❍ A. ❍ C. ❍ D. ❍ C.

Tell the customer that an adult must be home while you work. What connector can have audio and video pass through it? ❍ A. Incorrect CPU has been installed. ❍ C. The CPU has overheated. Quick Answer: 63 Wrong CPU driver. Quick Answer: 63 VGA Quick Answer: 63 Detailed Answer: 71 RGB DVI HDMI 47. Which of the following tools can protect you in the case of a surge? ❍ A. ❍ B. ❍ C. ❍ B.52 Chapter 3 ✓ Quick Check 45. Wrong voltage to the CPU. Which device limits network broadcasts. ❍ D. Detailed Answer: 71 Switch WAP Firewall Router 49. Tell the customer that you are not responsible for the child. ❍ C. ❍ D. What should you do? ❍ A. Quick Answer: 63 Detailed Answer: 71 ❍ D. 48. and interconnects different physical media? ❍ A. ❍ B. Tell the customer to get back home as soon as possible. You just upgraded the CPU. segments IP address ranges. the customer informs you that he needs to leave for about 10 minutes and that his 8-year-old son can help you with anything if you need it. ❍ C. Tell the customer that the child must be removed. While you are working on a computer at a customer’s home. ❍ B. Quick Answer: 63 Detailed Answer: 71 . ❍ B. ❍ C. ❍ D. ❍ D. Which of the following can make your computer shut down automatically after a few minutes? (Select the best answer.) ❍ A. Detailed Answer: 71 Torx wrench Antistatic strap Voltmeter Antistatic mat 46.

Unplug the printer. 7-pin ❍ C.17. Tell the printer it is bad to smoke. Call maintenance. Turn off the printer. ❍ C. CMOS ❍ B.0.254. Call 911. 8-pin ❍ B.58.7 Quick Answer: 63 Detailed Answer: 72 Unlit Rapid. Molex ❍ D. ❍ B. Which of the following is a valid IPv4 address for a network host? ❍ A. ❍ C. Which of the following is user-replaceable memory in a PC? ❍ Detailed Answer: 71 169. What should you do? ❍ A.254 255. ❍ C.0/16 52. If a lot of data is flowing through a network card. ❍ D. Which of the following power connections might be used by hard drives? (Select the two best answers. You want to upgrade memory in your computer. 127. erratic flashing Solid green Solid yellow 53. ❍ B. Quick Answer: 63 Quick Answer: 63 Detailed Answer: 72 A. Berg 51. ❍ D. ❍ D. ROM 54.220-801 Practice Exam B 53 ✓ Quick Check 50.) Quick Answer: 63 Detailed Answer: 71 ❍ A. and it starts to smoke. BIOS ❍ C. Quick Answer: 63 Detailed Answer: 72 .15.1 172.0. 15-pin ❍ E.0. ❍ B. ❍ E. SRAM ❍ E. You are working on a very old printer. what should the activity light look like? ❍ A.10. DRAM ❍ D.

which IP address is private? ❍ A.11b 802.54 Chapter 3 ✓ Quick Check 55. ❍ C.11n 56. 11. Quick Answer: 63 A.11a Quick Answer: 63 Detailed Answer: 72 802.169.1 192. ❍ D.1 Quick Answer: 63 Detailed Answer: 73 ::1 192. Which of the following statements is correct concerning IPv6 addresses? ❍ ❍ Quick Answer: 63 Decisive 59. How should you remain in the face of adversity? ❍ A. Of the following. Tell the customer that the problem should be reported to another technician.0. 57.11g 802.254. ❍ D. ❍ D. ❍ B. Detailed Answer: 73 169. What action should you take? ❍ ❍ A.31. ❍ D. ❍ B. Assure the customer that the problem will be fixed very soon.0. Which technology has the fastest data transfer rate? ❍ A. ❍ D. They cannot be used with IPv4. They are supported by all routers. What is the local loopback IPv6 address? ❍ A. ❍ B. ❍ B.169 172.0. Quick Answer: 63 Detailed Answer: 73 .41 58.255. Help the customer find the appropriate channels to fix the problem. You are asked to fix a problem with a customer’s domain controller that is outside the scope of your knowledge. ❍ C.1. 802.58. Learn on the job by trying to fix the problem. ❍ C. ❍ C. ❍ C.10. Quick Answer: 63 Detailed Answer: 72 B.168.0.1 Wavering Detailed Answer: 73 Positive Certain 127. B.0 FE80::/10 60.

❍ D. ❍ B. Thermal 63. Which printer technology should you select? ❍ Quick Answer: 63 Quick Answer: 63 Detailed Answer: 73 A. ❍ B. ❍ D. 60° Fahrenheit Detailed Answer: 73 60° Celsius 72° Fahrenheit 72° Celsius 62. Inkjet ❍ D.) ❍ A. What operating CPU temperature is typical? ❍ A. ❍ D. ❍ C. ❍ D.220-801 Practice Exam B 55 ✓ Quick Check ❍ C. They require fiber-optic connections. ❍ D. which memory bus width can be accomplished by using the dual channel technology? ❍ A. Detailed Answer: 73 64-bit 64. 61. ❍ C. ❍ B. Quick Answer: 63 Multimeter PSU tester Receptacle tester Loopback plug Quick Answer: 63 Detailed Answer: 74 . Laser ❍ C. ❍ C. Which of the following tools could a person use to test an AC outlet? (Select the two best answers. ❍ C. They represent addressing using 128 bits. ❍ B. Impact ❍ B. 128-bit 256-bit 448-bit Inspects traffic and accepts or declines transmission Quick Answer: 63 Detailed Answer: 73 Determines the best route to transmit data Broadcasts data to all network devices Broadcasts data to specific network devices 65. Which of the following best describes a hub? ❍ A. In current motherboards. You need to install a printer that can be used to print payroll checks on paper forms that have a carbon backing.

❍ Quick Answer: 63 Detailed Answer: 74 Quick Answer: 63 Detailed Answer: 74 Boot sequence Temperature thresholds Overclocking Install drivers E. ❍ D. Detailed Answer: 74 Receives inbound e-mail on port 110 69. ❍ C. Which of the following is not a configuration that can be made in the BIOS? ❍ A. Receives inbound e-mail on port 25 Sends outbound e-mail on port 110 Sends outbound e-mail on port 25 Quick Answer: 63 Detailed Answer: 74 Printer Mouse Telephone cord Power cord 70.56 Chapter 3 ✓ Quick Check 66. Quick Answer: 63 Northbridge Power supply Memory Memory controller Quick Answer: 63 Detailed Answer: 74 . 400 Mbps ❍ C. 480 Mbps ❍ D. When working on a computer. ❍ B. ❍ C.) ❍ A. 12 Mbps ❍ B. What maximum data transfer rate is IEEE 1394b capable of? ❍ A. ❍ D. ❍ C. ❍ B. ❍ C. ❍ B. Which of the following traits and port numbers are associated with POP3? ❍ A. ❍ D. ❍ B. ❍ D. 800 Mbps ❍ E. Intrusion detection 68. Which of the following controls the connection between the CPU and the PCIe x16 expansion slot? ❍ A. 5 Gbps 67. which of the following should you disconnect to prevent electrical shock? (Select the two best answers.

Recycle it. Some of these people are coworkers. When you arrive. ❍ D. tell everyone who was on the list. ❍ C. Yell at the manager for having that list out.220-801 Practice Exam B 57 ✓ Quick Check 71. ❍ D. What should you do in this scenario? ❍ A. Impact Quick Answer: 63 Detailed Answer: 75 ❍ B. Take the customer out for a cup of coffee. In secret. ❍ C. A customer experiences a server crash. Inkjet ❍ D. Detailed Answer: 74 Throw it away. Laser ❍ C. What is the recommended method for handling an empty toner cartridge? ❍ A. ❍ C. Avoid the customer and get the job done quickly. Thermal 75. What should you do? ❍ A. Detailed Answer: 74 Parallel cable IEEE 1394b cable Cat 5e crossover cable Quick Answer: 63 Detailed Answer: 75 Stay calm and do the job as efficiently as possible. ❍ D. Which type of cable would you use to connect a laptop directly to a PC? ❍ A. As you are servicing a manager’s PC at your company. ❍ D. Turn the sheet over. Refer the customer to your supervisor. ❍ B. ❍ B. ❍ B. ❍ C. ❍ B. Refill it. Which of the following types of printers uses toner? ❍ Quick Answer: 63 Cat 5e patch cable 73. the manager is upset about this problem. you run across a list of names of employees who are supposedly about to be let go from the company. 74. Quick Answer: 63 Detailed Answer: 75 . Quick Answer: 63 A. Act as if you never saw the list. Incinerate it. 72.

❍ C. on two different chips. ❍ D. ❍ D. ❍ E. Lower the humidity. 80. ❍ B. How can you reduce the chance of ESD? (Select the three best answers. A dual-core processor uses higher voltage than a single-core processor. PCI PCL PnP PCI Detailed Answer: 75 AGP AMR Serial Quick Answer: 63 Detailed Answer: 75 USB PS/2 Parallel 79. Quick Answer: 63 Quick Answer: 63 Detailed Answer: 75 A. In which of the following slots would you place an 8x video card? ❍ A. ❍ F. with separate caches. ❍ B. A dual-core processor has several unique cores. ❍ D. on the same physical chip.58 Chapter 3 ✓ Quick Check 76. Use an antistatic strap. B. ❍ B. ❍ D.) ❍ ❍ Quick Answer: 63 PCIe 78. ❍ C. ❍ D. A dual-core processor has two cores. Work in a carpeted area. In order to perform a network installation of Windows. ❍ C. ❍ C. with the same cache. which of the following must be supported by the computer’s network interface card? ❍ A. Use an antistatic mat. Raise the temperature. ❍ C. Which of the following is the newest type of mouse connection? ❍ A. Detailed Answer: 75 PXE 77. Which of the following is a unique characteristic of a dual-core processor versus a single-core processor? ❍ A. ❍ B. Raise the humidity. A dual-core processor requires more RAM to function than a single-core processor. Quick Answer: 63 Detailed Answer: 76 .

Which of the following devices is the least likely to be replaced on a laptop? ❍ A. If your “bandwidth” is 1000 Mbps. Which type of card should you install? ❍ A. ❍ D.000 bits per second 1 gigabit per second Cable Internet Quick Answer: 63 Detailed Answer: 76 Ethernet Client/Server IEEE 802.) ❍ A. how many bits are you sending/receiving? (Select the two best answers.3 84. Which of the following can send data the farthest? ❍ ❍ ❍ Quick Answer: 63 100. Which of the following is a typical speed of a SATA hard drive? ❍ A. ❍ C. Multi-mode fiber Quick Answer: 63 Detailed Answer: 76 B. Detailed Answer: 76 CPU 82. ❍ C.220-801 Practice Exam B 59 ✓ Quick Check 81.000. ❍ D. ❍ B. STP ❍ D. You need to expand the peripherals of a computer. ❍ C.000 bits per minute 83. Coaxial 85. ❍ C. ❍ B. Quick Answer: 63 1000 Mbps 3. ❍ B. RAM PC Card Keyboard Detailed Answer: 76 1000 bits per second 1. Quick Answer: 63 A. Detailed Answer: 76 Modem Network adapter USB card TV tuner card 86.000.1 GHz 8 GB 7200 RPM Quick Answer: 63 Detailed Answer: 76 . but the system doesn’t have enough ports. ❍ D. ❍ B. Single-mode fiber C. ❍ D. Which of the following is an example of a broadband connection? ❍ A. ❍ D.000. ❍ B. ❍ C.

60 Chapter 3 ✓ Quick Check 87. 7-pin data cable B. whereas a router interconnects one or more networks. 89. DVD Dual-Layer DVD External USB hard drive DLT Quick Answer: 64 Detailed Answer: 77 . ❍ B. A switch interconnects devices on the same network so that they can communicate. A group of users in ABC Corp. whereas a router interconnect devices on a network.) ❍ ❍ Quick Answer: 64 Detailed Answer: 77 A. Which of the following should you use to clean a monitor’s screen if you are not sure how to do so? ❍ A. and a router transmits data directly to the device. 15-pin power cable 90. ❍ B. A router broadcasts all data packets that are sent on the network. ❍ C. ❍ D. Which types of cables should he connect to the drive? (Select the two best answers. needs to back up several gigabytes of data daily. A switch interconnects one or more networks. Ray wants to install a new internal SATA hard drive in his computer. Quick Answer: 63 Detailed Answer: 76 Isopropyl alcohol Mild detergent Water Boric acid 88. ❍ B. ❍ C. ❍ C. 4-pin power cable ❍ D. Which of the following best describes the differences between a switch and a router? ❍ A. Which of the following is the best media for this scenario? ❍ A. ❍ D. 40-pin data cable ❍ C. A switch broadcasts all data packets that are sent on the network. and a switch transmits data directly to the device. Quick Answer: 64 Detailed Answer: 77 ❍ D.

❍ C.WMA . ❍ B.MOV 92. ❍ B. ❍ D. ❍ B. SSD B. You need to replace and upgrade the memory card in a smartphone. Which format should you select? ❍ A. ❍ D.AAC . Detailed Answer: 77 Virtualization workstation 94. or Macs. What are the respective functions of the two corona wires in a laser printer? (Select the two best answers. ❍ C. Which type of client computer does the organization most likely use? ❍ A. ❍ D. Your organization relies heavily on its server farm for resources and is less reliant on the client computers. Detailed Answer: 77 .220-801 Practice Exam B 61 ✓ Quick Check 91. Which of the following capabilities enables a printer to store multiple documents? ❍ A. ❍ C. ❍ C. USB flash drive ❍ D. Which type of memory does the smartphone most likely use? ❍ ❍ ❍ Quick Answer: 64 Quick Answer: 64 Detailed Answer: 77 A. CF C. You are required to rip the contents of a CD to a compressed file format that can be read easily on PCs. ❍ B. Client/Server Thin client Thick client Quick Answer: 64 Detailed Answer: 77 Condition the drum to be written to Transfer toner from the drum to the paper Fuse the toner to the paper Clean the drum 95. SD 93.MP3 .) ❍ A. Quick Answer: 64 Buffer Print driver Printer pool Spooling Quick Answer: 64 Detailed Answer: 77 . ❍ D. Linux computers.

B. One way to provide preventive maintenance to a hard drive is to do what? ❍ A. what is the best action for you to take? ❍ ❍ ❍ Quick Answer: 64 Detailed Answer: 78 A. Which of the following devices should you place on the phone line so that the line can be shared with a phone and the DSL modem? ❍ ❍ Quick Answer: 64 Detailed Answer: 78 A. The display is not getting power. ❍ B. ❍ C. causing a surge to occur on all the computers and equipment in the office. Quick Answer: 64 Detailed Answer: 78 ❍ C. Install a second hard drive. Tell the customer to read the manual. if you look closely at the display. Quick Answer: 64 Torx wrench Multimeter Receptacle tester Tone and probe kit Quick Answer: 64 Detailed Answer: 78 . While you explain a technical concept to a customer. What could be the cause of this problem? ❍ A. The power supply has failed. 97. Recommend a training class. 100. you can see that Windows is running. Increase the amount of RAM on the PC to increase the page file.62 Chapter 3 ✓ Quick Check 96. However. ❍ B. Upgrade the cache on the drive to improve performance. 99. Router ❍ D. Your co-worker’s laptop display doesn’t come on. but very dimly. After a blackout. the power comes back on. You are setting up a SOHO network with DSL. ❍ D. ❍ B. Coax splitter 98. Which tool would you use to test a 24-pin ATX 12v power connector? ❍ A. ❍ D. Detailed Answer: 78 The inverter has been shorted out. The display driver has failed. Line filter B. Keep an area of airflow around the drive so that it doesn’t overheat. C. Sit next to the customer. Use acronyms so that the customer feels comfortable about your knowledge. ❍ D. Heat sink ❍ C. ❍ D. ❍ C.

C 73. C 83. C 39. A 31. A and E 49. D 75. B 69. C 20. A 11. B 71. A 64. B 32. C 65. B 55. D 35. B 74. B 18. and D 22. D 50. A 58. C 30. D 9. C 80. B 21. B 27. D 10. C and D 79. D 84. A 51. A 60. A 46. C 76. A 13. C 87. D 15. A 40. A 33. C 28. B 41. C 86. D 85. A 38. D 14. D 77. B 56. A 16. D 54. A. B 6. D 53. D 78. B 44. C 3. D 36. A 59. C 82.220-801 Practice Exam B Quick-Check Answer Key 1. A 67. A 19. C 62. C 7. D 72. B 2. B 81. A 23. B 48. B 63. A and C 8. C 63 . B 4. C and D 25. A 70. C 34. A 5. C and D 12. D 57. C 45. D 66. D 29. B 52. C 37. D 68. C 61. C 42. B. B 47. A 26. B 17. A 43. A 24.

A and D 94. A 93. D 89. A and B 99. C 96. D 95.64 Chapter 3 88. C 98. B . A 90. D 97. A 100. B 92. A 91.

PCI is the predecessor to PCIe but is rarely used for video anymore. SCSI is used for hard drives and scanners among other things. The beep codes come from the POST. the device might show up in the Unknown devices category until it is installed properly.10. All of the other addresses could possibly be obtained from a DHCP server. remember to put the solution on a lint-free cloth first. it doesn’t hold a candle to PCIe. which happens before Windows boots. Answer: A.10 is a Class B private IP. This address will be on the 169. Either way. it will have either a down arrow (for Windows 7/Vista) or a red x (Windows XP). 7. Windows generates all kinds of error codes but not beep codes. it may present its findings on the screen or in the form of beep codes. and then wipe the display gently. The complementary metaloxide semiconductor (CMOS) stores information such as time and date and BIOS passwords.16. If a driver was not digitally signed. If the device is disabled. If you see a yellow exclamation point in the Device Manager. 5. If a printer has this.133 MB/s. Remember this doesn’t count the SCSI card. USB is the standard port for a printer. Case fans are measured in mm (millimeters). Never spray any cleaner directly on a display. A lot of companies sell products that are half isopropyl alcohol and half water. The RJ45 jack enables a connection to a twisted-pair (most likely Ethernet) network.0 network. .254. Try not to get any liquid in the cracks at the edge of the screen. However. If the computer fails to obtain an IP address from a DHCP server. then upgrading it will be up to you. A PCIe x16 version 3 card can transfer a maximum of 16 GB/s. 6. Answer: C. 2. 8. this indicates that the device does not have a proper driver. but not for video. They are used to exhaust heat out of the case. Memory modules don’t use fans.168. Answer: D. Answer: A. If a device has a working driver. then it is a multifunction printer acting as a fax machine. which can do 2. 80mm and especially 120mm are very common. the two are often connected together. Answer: D.0. Spray on a lint-free cloth first. 3. USB can handle up to 127 devices. RJ11 ports are used by modems and dial-up Internet connections.0.10 and 192. Answer: C.10. Compare this to the closest competitor listed: AGP. Again. it is limited to 133 or 266 MB/s depending on the speed. Answer: C. about 1/8 of PCIe. An IEEE 1394 (FireWire) chain can have up to 63 devices.168. 4. Windows will take over and apply an Automatic Private IP Address (APIPA). As the POST checks all the components of the computer. You could also make this yourself. though both of these numbers are outside the realm of normalcy for most individuals! 15 is the maximum amount of devices that can be on a SCSI chain. Printers with a built-in RJ45 connector are network ready. Answer: B. 255 is a commonly used number when it comes to maximums but doesn’t apply to IEEE 1394.10 are Class C private IP addresses. it is the device that keeps time on the motherboard. PCI Express (PCIe) offers the highest video performance. 172. RTC stands for real-time clock. but you won’t necessarily be notified of this. but they can be equipped (or purchased) with heat sinks of their own. CPUs commonly use a heat sink/fan combination. 192. This aids in keeping the CPU and other devices cool.220-801 Practice Exam B 65 Answers and Explanations 1.

SCSI connectors are not often found on today’s printers. But you might also use a T-8 and even a T-6 on laptops. Answer: B. It can also be used to remove screws (albeit smaller ones) from a laptop. Many computers today. 11. and Extreme systems. LPT1 is an older parallel printing port. Answer: B. COM1 (communications port 1) is a serial port. 32-bit OSes are limited to 4 GB of RAM. and in some cases 3. MIDI is used to create a clocking signal that all devices can synchronize to. The external modem is what connects to the COM1 serial port. Quad. You must be an administrator to allow the use of unsigned drivers. are all video connectors. Data Execution Prevention (DEP) is a security feature in today’s operating systems. The other three connectors.” meaning within the CPU. Answer: C. Unsigned drivers are based on the operating system itself. SCSI is a parallel port used by hard drives and tape drives. On AMD systems and newer Intel systems such as the Core i5 or i7. it stops a program from executing code in a forbidden area of memory.200 Kbps. people may still use internal or external dial-up modems. let the printer sit for 10 or 15 minutes after shutting it down. That’s like an oven. synthesizers. and sequencers. HDMI. 13. If you want to access more than 4 GB of RAM. 9. the memory controller is located within the chipset and is known as the Memory Controller Hub (MCH) by Intel. but 64-bit operating systems will have problems running 16-bit programs even in compatibility mode. they would indicate a local connection. It is also used to program devices such as handheld terminals. 32-bit operating systems can run older 16-bit programs. whether that particular OS is 32-bit or 64-bit will not be a factor. it sends or receives one bit at a time. The Torx wrench is a special tool used to remove screws from the outside of a case. A typical example is the 9-pin male DE9 port (inaccurately referred to also as the DB9). but you might still see them as an add-on card in the field. regardless. The standard is the size T-10 Torx wrench. The older COM port is used by dial-up modems. Answer: A. The fuser heats paper to around 400° Fahrenheit (204° Celsius). The fuser is not wet or fragile. The rest of the terms are not used in relation to this concept. but it is also referred to as the northbridge.25 GB. and it does not contain toner—that is contained by the cartridge. require more than 4 GB of RAM so a 64-bit operating system is the only choice. In rural areas. DVI. DVI is a video port. The Musical Instrument Digital Interface (MIDI) connector is used for musical equipment such as keyboards. 14. Answer: A. Answer: A. . the memory controller is located “on-die. used to access networks as an administrator failsafe in case other Internet connectivity methods fail. Most of today’s 32-bit or 64-bit systems offer this. Though USB is also technically a “serial” port. 12. up to 115. proprietary computer manufacturers will use these screws. You don’t see COM ports on PCs today. 10. Answer: C. especially custom computers such as virtualization systems and gaming computers. If you need to replace the fuser. 15. On Core 2 Duo. you will need a 64-bit operating system. and before maintenance. often.66 Chapter 3 This allows it to connect to a PC or to a print server. and DisplayPort. most technicians and professionals refer to the serial port as COM1 or COM2. Overclocking is the act of increasing your CPU’s operating speed beyond its normal rated speed. not a network connection.

Answers: A and E. and work as fast as (if not faster than) traditional magnetic hard drives. 19. The display brightness of a laptop isn’t affected by any security settings. The supervisor (or system) password is used so that only the technician can get into the BIOS (CMOS). Although multimeters and screwdrivers are tools you might use. Answer: B. but they are rare. they might not always be necessary. Solid-state hard drives are gaining in popularity because they have no moving parts. the wireless access point (WAP) might autonegotiate the channel.txt file. whereas the antistatic strap should always be worn. it is the name of the wireless network. MAC filtering maintains a list of MAC addresses that are allowed to access a network.) The administrator password is needed only if you wanted to make configuration changes to the wireless access point. Answer: A. Power tools and battery-operated tools such as cordless drills should be avoided. The touchpad is the most likely of the listed devices. 21. Always use an antistatic strap to avoid ESD (electrostatic discharge). and a local password is something used in software. such as the dot matrix or the daisy wheel printer. 18. Serial devices (and the port in general) are found less and less often on laptops. although they can be masked. DVD. An “administrator” password is something used in Windows or on a networking device. this is a different concept from DHCP. that file contains static entries of hostname to IP address conversions. this is the default on many laptops in order to conserve battery power. DHCP has nothing to do with the Hosts. which slows their general acceptance. but it does it from the firmware level. but once again. This is because it is well known and has a low cost per MB of storage space.220-801 Practice Exam B 67 16. You can certainly set the display to full brightness when on battery power—it just isn’t recommended. 20. Answer: C. The wireless channel number isn’t necessarily needed. they are far more expensive than the traditional drive. you would have to log in to the WAP with an admin password to configure it. Quality of Service (QoS) adjusts the network speed based on the type of traffic generated. Laptops can operate properly when connected to the AC power adapter or when using the battery only. The traditional hard drive is still the magnetic disk. . Impact refers to a type of printer. For example. In fact. MAC address filtering is not enabled by default. optical drives are commonly implemented as CD. Answer: A. The power management settings on the laptop can cause the display to automatically dim when the AC adapter is unplugged. The SSID is the most important piece of information required to connect to a wireless network.) PS/2 mice are also rare. Answer: D. not from the client computer. Both of these have given way to the touchpad and external USB mice. if you wanted to implement MAC filtering. (In fact. are quiet. or Blu-ray drives. However. Media Access Control addresses are usually not changed on a network adapter. 17. (They are extinct on new laptops. 22. The user password is used to password-protect whatever operating system is running on the computer. These can be configured within Power Options in Windows. Also. so the MAC address might not be needed. There are optical hard drives. Advantages of using DHCP include: IP addresses can be managed from a central location and computers can automatically get new addressing when moved to a different network segment (perhaps one that uses a different DHCP server). Answer: B. this would be entered by the admin at the wireless access point.

27. CD-ROM drives use removable discs. and dual monitors. The 8P8C is the technically correct name for an RJ45 networking plug. Virtual operating systems (virtual machines or VMs) require a lot of RAM to run. Don’t blame the user by asking what “you” modified. RAM is more essential to the virtualization workstation than any of the other types of custom PCs listed. 28. surround sound. Audio/video workstations require specialized audio and video cards. Port 25 is the default port for SMTP. Always ask if anything has changed first before any other questions.11n operates at either 2. RG-6 is the connector used for cable TV and cable Internet connections.4 GHz. much more than any other application. 26. Then apply first aid and CPR as necessary. and multiple clients can access the same mailbox. the maximum they can store is much greater. not a disk. which are in charge of feeding the paper into the printer. it might cause more than one sheet of paper to be entered into the printer. Answer: D. It should not cause paper-feed errors unless the constraining tabs are too tight. but act like a professional and courteous human being! 30. a small form factor. 25. The developing rollers transfer ink to the imaging drum.11b and g operate at 2. Plus. Home theater PCs (HTPCs) require an HDMI output. 31. increasing its need for RAM even further.0 cable is 5 meters.44 MB) and is considered a card. while optical discs are spelled with a c. 802. The next step would be to shut the power off at the electrical panel or call the building supervisor to have the power shut off. The VGA connector uses a D shell (also referred to as D-sub) 15-pin connector. Answer: D. Class 1 has a 100-meter range. Port 80 is HTTP. Answer: A. however. Answer: D. fast hard drives.38 MB of which is actual data). 24. it implies that you think the user caused the issue.4 or 5 GHz. Compact Flash comes in varying sizes (all greater than 1.68 Chapter 3 23.11a operates at 5 GHz only. 802. Answer: B. and possibly a TV tuner. This is the protocol used during online banking sessions. The IEEE 802. The paper tray simply holds the paper. Answer: A. Answer: B. Think like a robot with the single purpose of fixing the problem. Try not to accuse a user of accessing inappropriate websites because this could be considered inflammatory and harassment. It has three rows of five pins. Paper-feed errors are often caused by the pickup rollers. Bluetooth headsets). Class 2 devices are the most common (for example. If a separation tab fails. Class 2 Bluetooth devices have a maximum range of approximately 10 meters. and Class 3’s range is approximately 1 meter. Port 143 is the Internet Message Access Protocol (IMAP). Note that magnetic disks are spelled with a k. You should first ask if anything has changed since the optical drive worked properly. it’s similar to POP3 but offers offline operation. The maximum length of a standard USB 2.11 wireless standards are . 802. Answer: A. The acronym ROM usually refers to a chip on a circuit board that is not removable.44 MB on a removable disk (1. microATX is a motherboard form factor commonly used in smaller PCs and HTPCs. a virtualization workstation will often have more than one virtual machine running. Port 443 is the default port for Hypertext Transfer Protocol Secure (HTTPS). The floppy disk drive (FDD) stores a maximum of 1. call 911 right away. or if you go to checkout when shopping online. Because the immediate danger is gone. Gaming PCs biggest requirements are CPU and video card. 29. Answer: B.

11x is instead a variable that you will sometimes see that refers to two or more 802. simply multiply the 1600 by 8 (bytes) and solve for megabytes: 12. . STP is difficult to install and must be grounded. DDR2-800 (like DDR3-800) has a peak transfer rate of 6. you might want to do this outside and vacuum up the left over residue. This is because it does not use copper wire or electricity. and spyware is unrelated to this issue. the PC standard is IEEE 1394. Never disassemble the power supply. Check in the BIOS to see if the CPU is overclocked or not. it is also known as PC3-6400.800 MB/s. It is commonly sold as PC2-6400. Answer: C. 34. 37. To figure out the data transfer rate of DDR3 by the consumer name “PC312800”.11x standard. it could damage the components. The impact printer uses a print head. It is also known as PC3-12800. It is called a field replaceable unit (FRU) for good reason. Laser printers are much more complex and use more parts. IEEE 1394 is the PC equivalent of FireWire. 35. Inkjet printers use a print head but use an ink cartridge instead of a ribbon and don’t use a tractor feed. FireWire was originally developed by Apple. it is found less commonly in networks. a legacy 16-bit adapter card slot. 802. Answer: A. it can be a sign of a failing CPU. However. this will damage the components. Regular UTP cable such as Cat 5e or Cat 6 will be very susceptible.220-801 Practice Exam B 69 collectively known as 802. a similar standard but with a different architecture and data transfer rate.800 MB/s. ISA is the Industry Standard Architecture.11 technologies. The fastest DDR2 standard is DDR2-1066. Any copper cable will be susceptible to EMI to a certain degree. Fiber-optic cable is the only answer listed that is not affected by electromagnetic interference (EMI).800 MB/s. ribbon. IEEE 1284 is an older parallel PC standard for printer cables and connections. Do not spray any kind of solutions inside the computer. DDR3-1600 has a peak transfer rate of 12. Answer: B. Coaxial slightly less. and although the two names are often used interchangeably. Answer: C. If the computer won’t boot at all. To figure out the data transfer rate when given only the I/O bus clock speed (for example. Answer: D. An example of an impact printer is the dot matrix. Compressed air is safe. There is no DDR2-1600. It could also be caused by overclocking. If the CPU is running beyond the recommended voltage range for extended periods of time.400 MB/s. To truly protect from EMI. multiply the clock speed by 2 and then multiply that number by 8 and solve for megabytes: 800 MHz×2×8 = 12. 800 MHz). fiber-optic is the best way to go. 33. and shielded twisted-pair (STP) even less than that.533 MB/s. 36. which has a peak transfer rate of 8. it was not used in order to avoid confusion. 32. another problem might have occurred. Thermal printers use a print head and a special heating element. Low case temperatures are a good thing (if they aren’t below freezing!). Do not stick a vacuum cleaner inside a computer. It runs at an I/O bus clock speed of 800 MHz and can send 1600 megatransfers per second (MT/s). There is no actual 802. because of these things. To figure out the data transfer rate of DDR3 from the name “DDR3-1600”.400 MB/s. just look at the number within the name and add “MB/s” to the end.11x. Answer: C. DDR3-800 has a peak transfer rate of 6. but instead uses glass or plastic fibers and light. and tractor feed. or the CPU might have already failed. USB is the Universal Serial Bus.

. To find out if someone attempted to get into the computer itself. It is known as the power adapter. but it should be noted that there isn’t any real uniform standard for measuring contrast ratio. If the power supply doesn’t have one of those red switches. Answer: C. The adapter does not store power. or the various ITX versions. 18. Answer: B. To prevent a user from reading e-mail. Answer: D. However. even if the voltages are only slightly different. and it needs to run at a very specific voltage. the plug may not fit. otherwise. you would have to remove e-mail applications (such as Outlook) and probably take away the browser. It is used for telephone landlines. turn on the chassis intrusion alert in the BIOS. It usually has a higher ratio.70 Chapter 3 38. Answer: A. Still. 43. LCD contrast ratio is the brightness of the brightest color (measured as white) compared to the darkest color (measured as black). The plain-old telephone service (POTS) line has two twisted pairs of copper wire. It is also accomplished by a UPS. High-quality dot matrix printheads can come in 9. 41. BTX was designed as a replacement for ATX. a line conditioner will keep it steady at 120 volts.) To prevent a virus from infecting the MBR. it was expected to help cool devices that used a lot of power and created a lot of heat. with 24 being the highest quality. 40. Newer power supplies might auto-sense the voltage. In fact. eight wires total. 42. though you probably wouldn’t lug one of those around with your laptop while travelling. for a total of four wires. Coaxial has a single core of copper. too. different make and model power adapters will usually not work with different laptops. The BTX form factor provides the most room for effective cooling in a computer case. 39. check the documentation to see if it can switch the voltage automatically. However. this done as a test with a checkerboard pattern. you should change the BIOS boot order to hard drive first. That’ll stop ‘em right in their tracks! The admin password does not prevent any of the other listed answers. your co-worker might need an adapter. Static contrast ratio measurements are static. Answer: D. If your circuit has dirty power (for example. or 24 pins. BTX combines a large cooling area with smart design and positioning of devices that allows for more cooling than is possible with ATX and its derivatives. too! (Doesn’t sound feasible. Setting an admin password in the BIOS prevents a user from rearranging the boot order. CPUs. As an administrator. Fiber-optic cable has a single glass or plastic core that sends light. Then apply an administrative (also known as supervisory) password. 44. But there is also the dynamic contrast ratio. The external power supply of the laptop converts AC to DC for the system to use and for charging the battery. it is fluctuating between 113 and 130 volts). Answer: A. you could turn on boot sector scanning in the BIOS (if the motherboard supports it). Unshielded twisted pair (UTP) has four pairs. use a case lock. Answer: B. RAM. a newer technology in LCD displays that adjusts dynamically during darker scenes in an attempt to give better black levels. and video cards have new designs that allow them to use less voltage and therefore create less heat. Some power supplies have selectors for the United States and Europe (115 and 230 volts). that is the responsibility of the laptop battery. To prevent an attacker from opening the case. Line conditioners simply clean the power for a specific voltage. making BTX less necessary. The idea behind this is to stop a person from attempting to boot off of an optical disc or USB flash drive.

Okay. A router can limit network broadcasts through segmenting and programmed routing of data. it is possible that the switch might connect to another switch by way of a specialized fiber-optic connector. you might have a LAN that uses twisted-pair cable. Answer: D. it does not limit IP-based network broadcasts. or broadcasts. A hardware-based firewall will usually connect to the network via RJ45. If the wrong voltage is running to the CPU. 50. 49. It often has only one connection. For example.17. Most antistatic straps come with a 1 mega ohm resistor. A switch connects multiple computers together on the LAN.58. especially if the BIOS doesn’t recognize it. the system will probably not boot. A host on the network is any computer or network device that uses an IP address to communicate with other computers or devices (hosts). Answer: B. instead the BIOS recognizes it (or doesn’t. However. instead it prevents intrusion to a network. but 7-pin power connections are less common. but the router connects to the Internet via a fiber-optic connection. If the person insists on leaving. Also.58. and S-Video. and don’t touch capacitors on any circuit boards such as motherboards. the switch does not segment by IP address—it communicates with computers and segments the network. the switch will normally use one type of media: twisted pair. Answer: D. the system won’t even boot. which can protect against surges. of course. Molex power connectors are used by IDE drives. There are several types of 7-pin connectors. as the word multimedia implies.) 51. nor should any company agree to have its consultants do this. 46. we are halfway through the exam. via MAC addresses. 172. High-Definition Multimedia Interface (HDMI). It is also used with different media. with DVI being the newest and most commonly used on PC monitors. It doesn’t deal with routing.254 is the only valid IPv4 address for a network host. Of the answers listed. the CPU doesn’t use a driver. VGA. RGB. That one router will have ports for both types of connections. As part of the boot process. stay away from any other electrical devices when working on computers. 47. make sure that there is an adult available. 8-pin power connectors are used by high-end PCI Express video cards. can transmit video and audio signals. The CPU could overheat if thermal compound has not been applied correctly (common) or if it is not seated properly (rare).254 is .220-801 Practice Exam B 71 45. if it needs a BIOS update) and passes that information to the operating system.17. It is not your responsibility to watch over children. Finally. 172. Answers: C and D. it will have only one or only a few connections. and DVI are video standards only. 48. the best way to avoid a surge is to 1) make sure the computer is unplugged before working on it. This is part of a router’s job when connecting two or more networks. And. regardless. However. and you can pack up your things before he goes. This means don’t open power supplies or CRT monitors. Whenever you’re working in someone’s home. and then call your supervisor to inform her of the event. connecting to RJ45 ports. Take a deep breath—then continue on with power! (Pun intended. Answer: C. 15-pin power connectors are used for SATA drives. Berg is the power connector for floppy drives. and 2) don’t touch any components that hold a charge. A wireless access point (WAP) connects the computers on the wireless LAN (WLAN). a single RJ45 port. power needs to verify the CPU. Answer: C. such as SATA data. However. Answer: D. do so. If an incorrect CPU has been installed.

Of the listed answers. That address is within the Class E reserved range. Read-Only Memory (ROM) is usually not serviceable. If you have a maintenance contract with a printer company. 53.254. Normal host IP addresses’ first octet will either be between 1 and 126.0 with a default subnet mask of 255. 802. DDR2. It is not a valid host IP address because it ends in 0. In fact.255.0/16 means an IP address of 169. configured properly. it is also soldered to the circuit board. If it is unlit. you need to have the right wireless access point. 52. It cannot be used to communicate with other hosts on the network. .11n standard. a laser printer power supply does more work because it needs to convert for high voltages in the 600 V range.11n has the fastest data transfer rate at a maximum of 600 Mbps. 802. Every computer using TCP/IP gets this address. another chip soldered on to the motherboard. Do not try to fix the problem if the scope of work is outside your knowledge. 169. Answer: D. if the address was. 255. Make sure that the customer has a path toward a solution before dismissing the issue.7 is not valid. Answer: C.0. it should blink or flash rapidly. When data is flowing through the activity light. and DDR3 are all examples of DRAM.0.1 is the local loopback address. 54. The BIOS resides on a ROM chip.254. Dynamic Random Access Memory (DRAM) is the modules (or sticks) of memory that you can install into a motherboard. more specifically an electrically erasable programmable ROM (EEPROM) chip. but that would be belligerent and would probably show that you have been working too hard. 55. Answer: D.254.11a and g have a maximum DTR of 54 Mbps.72 Chapter 3 a Class B private IP address so it fits the description of a valid IPv4 address for a network host. it would be able to communicate only with other systems using APIPA addresses. it is used for testing. DDR. it can not be used by a host. Answer: C.0. However. You could tell the printer that it is bad to smoke. Wait at least 15 minutes before opening the printer to see what caused the smoke. Printer power supplies can fail just like a PC’s power supply can.0. in an erratic fashion. or 128 and 223.10. 56. say. The first IP address of a network is always reserved for the network number. 169. Turning the printer off might not be enough. 127. Most PC technicians will not work on domain controllers because they are advanced Microsoft servers that are used in client/server networks. so pull the plug. SDRAM. but because it is an APIPA address. 802. the cable is not connected properly or the device is malfunctioning. you could call the maintenance company to fix the problem. to achieve this. The complementary metal-oxide semiconductor (CMOS) is a chip that is soldered onto the motherboard that works in conjunction with the Basic Input/Output System. It might be seriously malfunctioning.0.11b has a maximum of 11 Mbps. Dialing 911 is not necessary unless a fire has started.0.1.254. Answer: B. with client computers that are also compatible with the 802. Be ready to give a detailed account of exactly what happened. the address would work. You see solid green (1000 Mbps or 100 Mbps) or yellow (10 Mbps) on the link light (if there is a separate link light).0. Otherwise. and the printer is under warranty or contained in the service contract.0. Static RAM (SRAM) is memory that is nonvolatile (as opposed to DRAM). but not between 224 and 255.15. indicating the network number is 169.

0.254. If you appear to be wavering when problems occur. 192.0. It is within the Class B range of private addresses: 172. be certain and decisive and implement the solution immediately.0. The only statement that is correct concerning IPv6 is that it uses 128-bit addressing.1 is public because of the second octet: 169. uses the 169.41 is not private either. 59. 72° Celsius becomes less typical. Dual channel memory combines two sticks of RAM into a bank that is 128-bit. switches are preferred.16. This will determine if IPv6 is working correctly on the network card but will not generate network traffic. The customer will have fewer concerns.168. 11. 64. but not ones with carbon backing. A processor will not run that cold (but it would be pretty efficient if it did!). This strikes the ribbon. 58. The IPv6 loopback address used for testing is ::1. 256-bit is a common bit length used by the Advanced Encryption Standard (AES). It exists on every computer that runs IPv6. 448-bit memory bus width is used by some video cards. 192. however. Answer: B. which uses 32-bit addresses. Answer: C. Answer: B. Microsoft’s APIPA. 72° Fahrenheit is excellent room temperature and is what you should set the room temperature for computers to run at their best. 127.0.0. 60. IPv6 is not necessarily supported by all routers. but in a more intelligent manner.168. A firewall will inspect traffic and allow or deny it access to the network. The operating range may be above or below that. This is compared to IPv4. the customer will have less confidence in your skills (as will you). The impact printer technology is what you want. IPv6 is a logical concept. These types of video cards have much faster RAM access than motherboards do.58.1.255.0 is simply a private IP network number. IPv6 and IPv4 can co-habit a computer with no problems.31. 169.1. When you need to make a technical decision.255. Because of this inefficient method. Answer: C.31.1 is the IPv4 loopback address.0–192. A router will determine the best route for data. Laser printers can print to special multipart forms.255.0 network which is private.0.168. Single channel memory is 64-bit. Answer: C. However.169. and you will be more relaxed. Answer: A.220-801 Practice Exam B 73 57. 60° Celsius is a typical operating temperature for CPUs such as the Core i5 or Phenom II. Some routers still only support IPv4.0. Answer: B.255. Switches send information to specific network devices based on their MAC addresses. .255. FE80::/10 is the range of autoassigned addresses in IPv6. 62. and consequently the paper with a printhead.0. The physical cable that connects to the computer has no bearing over which IP version is used.0 network. Multipart forms such as these are commonly used for receipts. 61. Always have a positive outlook.169 is not private because it is on the Class A 11 network. The physical hammering action causes the carbon backing to take effect and apply text to the next layer of paper. The Class A private range is within the 10.254. 172. The Class C private range is 192. 63. Answer: C.5° Celsius. 60° Fahrenheit is equal to 15.1 is the only address listed that is private. Intrusion detection systems (IDSs) and intrusion prevention systems (IPSs) can also do this. A hub broadcasts data to all network devices connected to it.1–172.10.

Now. 5 Gbps is the speed of USB 3. Answer: A. 70. 400 Mbps is the speed of IEEE 1394a. Drivers are software that allows the operating system to communicate with hardware. Newer versions of IEEE 1394b can support 3. 66. but these have nothing to do with testing an AC outlet. Recycle toner cartridges according to your company’s policies and procedures. It is important to disconnect these before servicing a computer. the northbridge functionality is combined with the CPU. Intrusion detection can be enabled and will log if a person opened the computer case. The rest of the answers can be configured in the BIOS. A receptacle tester and multimeter can be used (with caution) to test an AC outlet. it is not the recommended way to handle an empty cartridge because it is messy and timeconsuming. A power supply (PSU) tester is used to test the main P1 power connection (and possibly other connections) of a power supply. 71. 12 Mbps is the data transfer rate of USB 1. It is used to connect unlike devices. you might be fixing something that doesn’t require you to open the computer—for example. the northbridge is the first of a pair of chips in the chipset (the other is the southbridge). the RJ45 loopback plug). Answer: D. 67. and the telephone cord carries 80 volts when it rings. they can be configured in the Device Manager in Windows. It makes use of Port 110. but if you do configure it. On older Intel systems and AMD systems. Answers: C and D. Although it is possible to refill toner cartridges. Answer: D. Do not throw away or incinerate toner cartridges.200 Mbps. The boot sequence (also known as boot priority or boot order) allows you to select which device will be booted off of first (hard drive is the most secure). The power cord carries 120 volts at 15 amps or 20 amps. On newer Intel systems. You cannot install drivers to the BIOS. Remember to always disconnect any power. Answer: D. It is wired as 568B on one end and 568A on the other. Temperature thresholds allow you to set alerts and possibly shut down the system if the CPU runs too hot. That cable is designed to connect like devices. Most companies simply purchase new toner cartridges.1 Full Speed. use a crossover cable. A regular (and more common) Cat 5e patch cable is known as a straightthrough cable. 480 Mbps is the speed of USB 2. you should set temperature thresholds. However. 68. Answer: D. Those standards are ratified by the Telecommunications Industries Association/Electronics Industries Association (TIA/EIA).0. you would disconnect everything.0. Overclocking is not recommended. POP3 is the protocol used by e-mail clients to receive e-mail. data. but an IEEE 1394b port on a computer will often allow only a maximum of 800 Mbps. It uses port 25. or telecommunications cables before working on the system. IEEE 1394b is capable of 800 Mbps. Answer: A. SMTP is used by e-mail clients to send e-mail. if you were opening the computer. 72. such as a computer to a switch. Normally this is wired with the 568B standard on each end. Overclocking is when the CPU’s voltage is raised and the speed is increased. connecting a network cable. The northbridge takes care of the connections between the CPU and the PCI Express (PCIe) x16 expansion slot. To connect one computer to another directly by way of network adapter cards. A parallel cable might be used to connect an older printer to a computer or an external hard drive to a SCSI . There are various loopback plugs for testing ports on the back of a PC (for example. 69.74 Chapter 3 65. Answers: A and C. or according to municipality rules and regulations.

and parallel was never really used for mice at all. 75. In addition. In addition. 76. and request that the installation begin. Stay calm and do the job as efficiently as possible. it was used for printers and SCSI connections. . The customer should be referred to your supervisor only if the person gets in the way of you doing your work. Peripheral Component Interconnect (PCI) is an expansion bus that accepts network adapter cards. 73. Raising the temperature will have no effect. 79. This allows the network card to boot off of the network. less ESD. 4x. use an antistatic wrist strap and mat. consider raising the humidity. 77. The best thing is to ignore it and act as if it never happened. you should ask that all confidential materials be removed before you begin work. but you don’t have to engage in anything except fixing the problem. the purported list might be real. they are used to connect external hard drives to IEEE 1394 or FireWire ports. To reduce the chance of electrostatic discharge (ESD). usually a brown slot on the motherboard. AGP is the Accelerated Graphics Port. but I’m pretty sure the reaction would be negative. AMR stands for Audio-Modem Riser. Working in a carpeted area will also increase the chance of ESD. Answer: B. inkjet printers use ink cartridges. You should also touch the chassis of the computer before handling any components. 8x. place components in antistatic bags when they are not in use. IEEE 1394 cables are not used to connect computers to each other. There isn’t much you can do when a customer is upset except fix the problem! I’d be interested to see what would happen if a person asked the owner of the server out for a cup of coffee. Lowering the humidity increases the chances of ESD. developed by HP so a computer can properly communicate with dot matrix or thermal printers. but it might not be. PCL stands for Printer Command Language. Answer: C. It is faster than PCI but slower than PCIe (PCI Express) video cards. There isn’t much you can do in a situation like this. and so on. before working at a customer site. the less friction. It replaces PS/2 as today’s standard. USB is the newest type of mouse connection. (2x. This configuration might be done in the BIOS of the computer (if the network adapter is integrated to the motherboard). You don’t want to avoid the customer. and thermal printers use specially coated paper. Answer: B. try to work in a non-carpeted area. Answer: B. or one that boots from CD (if the network adapter is an adapter card).220-801 Practice Exam B 75 card. a small expansion slot developed by Intel to be used with sound cards and modems. within a special program in Windows. Technicians must be security-minded. a Windows technology that allows devices to be located and installed automatically. The more humidity there is. 16x). sound cards. PCIe cards place the x before the number (for example. and D. Impact printers use ribbon. Network installations require that the network card be configured for Preboot Execution Environment (PXE). 78. PnP stands for Plug ‘n Play. and ultimately. It isn’t your call to make. Answer: A. Also. 74. The laser printer uses toner. However. Any card named with a number followed by an x is most likely an AGP card. Answers: A. locate a network installation server. x16—pronounced “by 16”). Answer: A. Serial mice were used in the early 1990s. B.

SATA hard drives will commonly have a DTR of 3 Gb/s (300 MB/s) or 6 Gb/s (600 MB/s). Laptop keyboards fall victim to coffee. that is. Client/Server is less a networking technology and more of a way that computers communicate. otherwise notated as 1. if the user manual for the monitor calls for it. and other damage over time and sometimes need to be replaced. Modems. Water will most likely not damage the screen. The CPU is the least likely to be replaced. If you are not sure about what to clean a screen with. A dual-core processor has two cores. on the same physical chip. 87. a baseband connection (one channel on the media).000. 85. you might see that you can use a half-and-half mixture of water and isopropyl alcohol. 83.3 standard) is a shared technology by default. 86. though. all twisted pair is limited to 100 meters or 328 feet. 1000 Mbps is 1000 megabits per second. Dual-core processors are generally more efficient than older single-core processors and often use less voltage. Another option would be to purchase a USB hub. Coaxial cable is limited to 200 or 500 meters. 1000 Mbps is a common network data transfer rate. use water. Ethernet switching alleviates this by segmenting computers and redirecting information to other systems via MAC address. replace. Do not use detergents on a screen.76 Chapter 3 80. network adapters. 8 GB might be the amount of RAM you install in a computer or the size of a USB flash drive. Ethernet (which was originally ratified by the IEEE as the 802. Answer: D. PC Cards (PCMCIA) are commonly implemented as network adapters.000 bits per second. It is common to install and remove PC Cards. Answer: A. All the rest of the examples are technologies that are. However. This will give you more ports than the computer already has for use with peripherals. depending on the type. Answer: C. the CPU should rarely fail. or add to RAM. it has a centralized server that controls the network. Answer: A. 3. A processor with several cores would be known as multi-core (quad-core or hex-core). but it usually requires more cache memory. too. And boric acid would just be plain silly (and dangerous). A dual-core processor does not require more RAM than a single-core. 10. and more. Answer: A. and 15. Cable Internet is a broadband connection.000 RPM. Other common rotational speeds include 5400 RPM.000 RPM. or 1 gigabit per second. Answers: C and D. Every core of a multi-core CPU has its own L1 and L2 cache. 82. 7200 RPM is a typical speed of a hard drive—rotational speed. Just like PCs. 84. It uses multiple “channels” to transmit and receive information. STP is a type of twisted pair. in this case. However. Single-mode fiber-optic cable can send data farther than any of the other answers—up to hundreds of kilometers. 81. You should install a USB add-on card. modems. You would probably need to replace other equipment. Multi-mode fiber-optic cable can send data about 600 meters. they are okay for the outside of a computer case but not the display. only one computer can communicate on the network at any given time. you might upgrade. .1 GHz is a common CPU frequency. or use. overuse. Answer: B.000. Answer: C. with separate caches. and TV tuner cards all have their own purpose and do not allow additional peripherals. However.

220-801 Practice Exam B

77

88. Answer: A. A switch interconnects devices on the same network so that they can communicate, whereas a router interconnects one or more networks. Remember that the
switch is in charge of connecting devices on the LAN. But the router is in charge of
connecting the LAN to another LAN, to the Internet, or to both. Multifunction network
devices make matters confusing; they combine the functionality of a switch, a router, a
wireless access point, and a firewall. Physically, the four-port section of the device is
the switch portion and the single port that leads to the Internet is the router portion.
89. Answers: A and D. Internal SATA drives connect to the motherboard (or SATA card)
via a 7-pin data cable and a 15-pin power cable. PATA (IDE) hard drives use a 40-pin
data cable and 4-pin (Molex) power cable. Who is Ray? He’s just another fictitious
character in this book. You’ll hear more about him later.
90. Answer: D. In a large corporation (or enterprise environment), tape backup such as
the Digital Linear Tape (DLT) is the best media for backing up. DLTs and Super DLTs
(SDLT) can have a capacity as high as 800 GB, allowing for a huge amount of backup
as compared to DVD and dual-layer DVD (4.7–17 GB) and external USB hard drives
(up to 64 GB or so, though this number will undoubtedly increase as time goes on).
91. Answer: C. The MPEG Audio Layer III (.MP3) works best when dealing with multiple
platforms. Advanced Audio Codec (.AAC) is used more commonly on Apple computers
and devices and gaming consoles. Windows Media Audio (.WMA) is a Microsoft format developed especially for the Windows Media Player. .MOV is a QuickTime file format meant to be used with movies and other video.
92. Answer: D. Smartphones typically use Secure Digital (SD) cards—more to the point,
microSD cards. SSD stands for solid-state drive. This technology is implemented as
flash-based hard drives or as adapter cards with DDR memory and a battery.
CompactFlash (CF) cards are a bit bulkier and might be used in conjunction with PCs,
laptops, and handheld computers. USB flash drives won’t fit inside a typical smartphone and so are relegated to hanging on people’s key chains and acting as mobile
transporters of data.
93. Answer: C. In this scenario, the organization probably has thin-client computers for its
users. These have operating systems that are embedded in flash memory, and the rest
of the information they require comes from a server. Thin clients normally have no
hard drive; this is why they are referred to as diskless workstations. Virtualization
workstations definitely need a hard drive and require lots of other resources; they are
not as dependent on servers. Client/server is a type of networking organizational technique. However, thin clients will often log in to a server. Thick clients are for the most
part PCs, the typical desktop computer.
94. Answers: A and B. Know the six main steps of laser printing: Cleaning, charging, writing (also known as exposing), developing, transferring, and fusing. In the charging
step, the drum is conditioned/charged by the primary corona wire (negatively charging
it) and prepared for writing. In the transferring step, the paper is positively charged by
the transfer corona wire, preparing it to accept the toner from the drum.
95. Answer: A. The printer has RAM, which acts as a buffer if you or others send multiple
documents to it. It prints them one at a time according to which job entered the queue
first. Don’t confuse the printer’s buffer with the spooler that exists on the hard drive of

78

Chapter 3

the computer that controls the printer. The print driver is the software you install so
that Windows can “talk” to the printer properly; it needs to be the exact driver. A printer pool is a group of printers (often identical) that share the duties of printing.
96. Answer: B. Make the customer truly feel comfortable by sitting down next to her and
taking the time to explain the technical concept from a simple and concise point of
view. The less jargon, the better. Recommending a training class is tantamount to
dismissing the customer off-hand. Telling the customer to read the manual is just
downright rude. I know, I say this often to you the reader—however, you are a tech,
so reading the manual is what you do. The customer is not supposed to be supertechnically oriented. The acronym RTM should be kept within technical circles!
97. Answer: A. Line filters are required for DSL modems to share phone lines with a
phone. A line filter shields the phone line from digital noise and interference caused by
telephone devices and makes DSL communications possible. If DSL is installed in a
SOHO (small office/home office), devices such as telephones, fax machines, answering machines, dial-up modems, and security alarms should have line filters. But don’t
install one where the DSL modem is located. A heat sink is used to disperse heat away
from a CPU. A router allows access to another network or the Internet. A coaxial splitter is used to split the signal coming from a cable TV company, so that multiple TVs
can be used at the same time.
98. Answer: D. Hard drives run pretty hot; keeping an area of airflow around the drive can
help to keep it cool. The key is to make sure the PC has proper airflow. This can be
done by adding fans or using a liquid cooling system. It isn’t quite possible to add
cache to a hard drive; the cache on most hard drives is hardwired, and there are no
locations to add more. Increasing RAM does not necessarily increase the pagefile, and
regardless, this won’t prevent problems with a hard drive over the short term, but it
can make the hard drive work more efficiently. A second hard drive should be treated
as a completely separate device. However, installing the OS to one drive and storing
data on the second drive can go a long way to making both drives last longer.
99. Answer: A. Power surges can cause the inverter to short out, after which the coldcathode fluorescent lamps (CCFL) cannot get any power. You need to open the LCD
panel to replace the inverter in this case.
100. Answer: B. When testing the main 24-pin ATX power connector that leads from the
power supply to the motherboard, use a multimeter. It can test each individual wire’s
voltage. Better yet, use a power supply unit (PSU) tester. This tests them all in one
shot. A Torx wrench is used to open computers and laptops that have special Torx
screws; T-10 is a common size. A receptacle tester is used to test an AC outlet,
although multimeters can be used for that as well. A tone and probe kit is used to test
telephone and network connections for continuity. However, it can test only one pair of
the wires in the cable. For better results when testing network cables, use a proper
network cable testing kit. Testing tools are a key ingredient in a computer technician’s
toolkit.

4

CHAPTER FOUR

220-801 Practice
Exam C
This time, let’s turn up the gas a little further. I’ll be increasing the level of difficulty once more. This third 220-801 exam
could be considered an advanced practice test. This exam is
also freestyle. You can expect questions from any of the
domains, in any order.
This is where you prove your stuff. If you can score 90% or
higher on this practice test—on the first time through—then
you should be just about ready for the real exam. Still, you
should thoroughly understand all of the concepts before you
register for the real test. Even if you score well, read through
the explanations carefully.
If you didn’t already, I suggest taking a break between exams.
If you just completed the first exam, give yourself a half-hour
or so before you begin this one. Don’t forget, if you did not
score 90% or higher on the first two 220-801 practice exams,
do not take this one yet. Go back and study, and then retake
those exams until you pass with 90% or higher. Then come
back to this exam.
Write down your answers and check them against the answer
key that immediately follows the exam. After the answer key
you will find the explanations for all of the answers. Good
luck!

80

Chapter 4

Quick Check

Practice Questions
1. Your co-worker Patrick has a Core i5 3.1 GHz CPU. Pat wants you
to tell him what the bus speed is and what the maximum multiplier is. What do you tell him?

❍ A.
❍ B.
❍ C.
❍ D.

Detailed Answer: 104

3.1 GHz and 31
3.1 GHz and 100
100 and 31
200 and 31

2. Which of the following expansion busses can transmit 1 GB/s per
lane?


Quick Answer: 102

Quick Answer: 102
Detailed Answer: 104

A. PCI
B. AGP

❍ C. USB 3.0
❍ D. PCIe
3. A user complains that his network interface card (NIC) is not functioning and has no link lights. The weather has been changing
drastically over the past few days, and humidity and temperature
have been rising and falling every day. What could be the direct
cause of this problem? (Select the best answer.)

❍ A.
❍ B.
❍ C.
❍ D.

Quick Answer: 102
Detailed Answer: 104

Thermal expansion and contraction
Thermal sublimation
Chip creep
POST errors

4. A user reports that the battery in his Windows 7 laptop is often
low on power. Which of the following should you recommend to
help the user conserve laptop battery power?

A. Configure the laptop power options to restore power
usage when the laptop is unattended


B. Configure the laptop power option to power saver plan
C. Have the user remove the battery and run the notebook using the electrical cord only

❍ D. Have the user run the laptop using the battery until all
the power is depleted and then recharge the battery

Quick Answer: 102
Detailed Answer: 104

220-801 Practice Exam C

81

Quick Check

5. What is the most important consideration when installing
Windows 7 Ultimate 64-bit?

❍ A.
❍ B.
❍ C.
❍ D.

Detailed Answer: 105

Memory type
Processor speed
Memory speed
Processor type

6. A help desk phone support technician is finding it difficult to
understand the customer due to a heavy accent. Which action
should the technician take next to help the customer resolve the
problem?



Quick Answer: 102

Quick Answer: 102
Detailed Answer: 105

A. Repeat the problem back to the customer
B. Have the customer call back at a later time
C. Ask the customer to not speak with an accent

❍ D. Tell the customer that her accent is preventing the
problem from being solved
7. Which of the following is indicated by repetitive flashing lights on
the keyboard during POST?

❍ A.
❍ B.
❍ C.
❍ D.

Detailed Answer: 105

A software error
A hardware error
A password is required
An external peripheral error

8. Which network type enables high-speed data communication and
is the most difficult to eavesdrop on?

❍ A.
❍ B.
❍ C.
❍ D.

Quick Answer: 102

Quick Answer: 102
Detailed Answer: 105

Satellite
DSL
Fiber optic
Cable

9. Which of the following is a difference between a cellular WAN card
and a WLAN card?

A. A cellular WAN card requires a subscription to a cellular provider, while a WLAN card can work without
provider payment.

B. A cellular WAN card will work on most public wireless
access points, while a WLAN card is more proprietary.

Quick Answer: 102
Detailed Answer: 105

82

Chapter 4

Quick Check

C. A WLAN card generally has a range of 6 miles, while a
cellular WAN card is limited in range to 1,200 feet.

❍ D. A WLAN card is usually an external card, while a
cellular WAN card is usually an internal card.
10. Which of the following defines the protocols associated with the
following TCP or UDP port numbers, in order?

Quick Answer: 102
Detailed Answer: 106

21, 22, 25, 53, 443, 3389.

❍ A.
❍ B.
❍ C.
❍ D.

FTP, Telnet, SMTP, DNS, HTTP, RDP
FTP, SSH, SMTP, DNS, HTTP, RDP
FTP, SSH, SMTP, POP3, HTTPS, RDP
FTP, SSH, SMTP, DNS, HTTPS, RDP

11. Which of the following is the most appropriate question to ask a
customer first when attempting to troubleshoot an input device
issue over the phone?

❍ A.
❍ B.
❍ C.
❍ D.

Detailed Answer: 106

Can you describe the steps you have taken?
Have you verified that all USB plugs are secure?
Have you tried turning it off and on again?
Are you sure that the device is plugged in?

12. Which type of RAM stick is RIMM 6400?


Quick Answer: 102

A. DDR

Quick Answer: 102
Detailed Answer: 106

B. EEPROM

❍ C. SDRAM
❍ D. RAMBUS
❍ E. PC2-6400
13. You are tasked with installing a new SATA revision 3.0 hard drive
controller so that the computer can access hard drives at 6 Gb/s.
Which step list will most likely prevent errors?

A.
1. Install the card.
2. Update the BIOS.
3. Upgrade the card’s firmware.
4. Install the driver.
5. Apply system updates.

Quick Answer: 102
Detailed Answer: 106

220-801 Practice Exam C

83

Quick Check

B.
1. Apply system updates.
2. Update the BIOS.
3. Install the card.
4. Install the driver.
5. Upgrade the card’s firmware.

C.
1. Update the BIOS.
2. Install the driver.
3. Install the card.
4. Upgrade the firmware.
5. Apply system updates.

❍ D.
1. Apply system updates.
2. Install the driver.
3. Install the card.
4. Upgrade the firmware.
5. Update the BIOS.
14. A new video card you are installing requires a 600 W power
supply. The power supply should have how many pins on the
main cable?

Quick Answer: 102
Detailed Answer: 106

❍ A. 6 pins
❍ B. 8 pins
❍ C. 20 pins
❍ D. 24 pins
❍ E. 40 pins
15. Russ’s computer has a 60 GB IDE hard drive that contains his
operating system. He wants to add a second IDE hard drive to his
computer. How should he configure the two drives?

A. Russ should configure the new drive as master and
set the old drive as slave.

❍ B. Russ should configure both drives as slaves.
❍ C. Russ should configure both drives as master.
❍ D. Russ should configure the new drive as slave and the
old drive as master.

Quick Answer: 102
Detailed Answer: 106

84

Chapter 4

Quick Check

16. Examine the following illustration. Then answer the question that
follows.
Console

Computer A

PC A

Computer B

Computer C

PC B

Quick Answer: 102
Detailed Answer: 107

Computer D

PC C

What is the minimum number of USB cables required to set up
the three computers, including the keyboard and mouse?

❍ A.
❍ B.
❍ C.
❍ D.

2
6
8
10

17. Which of the following data rates are supported by PC3-10600
memory?

❍ A.
❍ B.
❍ C.
❍ D.

Detailed Answer: 107

1333 MT/s and 1066 MT/s
1066 MT/s and 800 MT/s
1600 MT/s and 1333 MT/s
1600 MT/s and 800 MT/s

18. Which of the following properties of a heat sink has the greatest
effect on heat dissipation?

❍ A.
❍ B.
❍ C.
❍ D.

Quick Answer: 102

Quick Answer: 102
Detailed Answer: 107

Connection type
Shape
Surface area
Proximity to the power supply

19. You are working just outside a server room that is being built,
and you hear a loud popping sound from inside. As you enter the
server room, you notice an electrician lying on the floor with an
electrical cord in his hand. What should you do first?

Quick Answer: 102
Detailed Answer: 107

220-801 Practice Exam C

85

Quick Check

❍ A.
❍ B.
❍ C.
❍ D.

Call 911.
Call the building supervisor.
Pull the electrician away from the cord.
Turn off the electrical power at the source.

20. You have been asked to load a copy of the company’s purchased
software on a personal computer. What should you do first?

A. Verify that the install is allowed under the company’s
licensing agreements.


B. Notify the company’s owner of the breach.

Quick Answer: 102
Detailed Answer: 107

C. Advise the individual that downloading unlicensed
software is illegal.

❍ D. Leave the premises and call local law enforcement.
21. After removing malware/spyware from a customer’s PC for the
third time, what should you do?

❍ A.
❍ B.
❍ C.
❍ D.

Detailed Answer: 107

Tell him you can’t fix the system again.
Do nothing; the customer pays every time.
Show him how to avoid the problem.
Change his user permissions.

22. A PC has the memory configuration listed below. Assuming RAM
is the same price per MB, which of the following answers would
be the least expensive when upgrading the PC to 12 GB of RAM?
Memory Slots:

2

DRAM Frequency:

667 MHz

Slot 1
Capacity:

4096 MB

Memory Type:

DDR3 (PC3-10600)

Speed:

667 MHz (DDR3-1333)

Slot 2
Capacity:

2048 MB

Memory Type:

DDR3 (PC3-10600)

Speed:

667 MHz (DDR3-1333)

❍ A.
❍ B.
❍ C.
❍ D.

Quick Answer: 102

A single 6 GB DDR3 PC3-12800 memory module
A single 8 GB DDR3 PC3-12800 memory module
A single 10 GB DDR3 PC3-10600 memory module
Two 6 GB DDR3 PC3-10700 memory modules

Quick Answer: 102
Detailed Answer: 107

86

Chapter 4

Quick Check

23. A user calls and complains that he cannot get onto the Internet,
although he could just minutes before. What should you say to the
user?

❍ A.
❍ B.
❍ C.
❍ D.

Detailed Answer: 108

What is your IP address?
Wait 10 minutes, and then try it again.
Do you remember the last thing that you did?
Let me get my supervisor.

24. Which of the following multimeter settings should be used only
when there is no electrical flow through the part being tested?
(Select the two best answers.)



Quick Answer: 102

Quick Answer: 102
Detailed Answer: 108

A. Continuity
B. Wattage
C. Voltage

❍ D. Amps
❍ E. Resistance
25. You need to set up a server system that will run in a VM. It will
have the bulk of the network computers’ resources and will supply
much of the resources necessary to the client computers that will
connect to it. You are also required to set up the client computers.
What two types of systems (server and client) will you be implementing?


Quick Answer: 102
Detailed Answer: 108

A. CAD/CAM workstation and PCs
B. Virtualization workstation and thin clients

❍ C. Home server PC and thick clients
❍ D. AV workstation and laptops
26. Your boss can receive e-mail but can’t seem to send e-mail with
the installed e-mail client software. Which protocol is not configured properly?

❍ A.
❍ B.
❍ C.
❍ D.

SMTP
POP3
FTP
HTTP

Quick Answer: 102
Detailed Answer: 108

220-801 Practice Exam C

87

Quick Check

27. A customer’s laptop LCD needs replacement. Which tool should
you use to open the case?

❍ A.
❍ B.
❍ C.
❍ D.

Detailed Answer: 108

Pliers
Plastic tweezers
Flathead screwdriver
Plastic shim

28. A customer is having a hard time describing a computer problem.
You are not sure what the problem is or where it is occurring.
What should you do?



Quick Answer: 102

Quick Answer: 102
Detailed Answer: 108

A. Offer various different repair options
B. Use computer jargon to help relax the customer
C. Ask the customer to slowly repeat what the problem is

❍ D. Tell the customer that you have to leave and that the
problem will be fixed soon
29. Which component requires a “burn-in” period?

❍ A.
❍ B.
❍ C.
❍ D.

CPU
Power supply
Motherboard

Quick Answer: 102
Detailed Answer: 109

CMOS chip
BIOS setup
POST
Bootstrap loader

31. What controls the data transfer between the CPU, RAM, and PCIe
devices on motherboards that support Intel Core 2 CPUs?

❍ A.
❍ B.
❍ C.
❍ D.

Detailed Answer: 109

Hard drive

30. When a PC is first booted, which of the following tests the processor, RAM, video card, disk controllers, disk drives, and keyboard?

❍ A.
❍ B.
❍ C.
❍ D.

Quick Answer: 102

ICH
MCH
FSB
DMI

Quick Answer: 102
Detailed Answer: 109

Notify the network administrator Start mopping up the mess Reference the MSDS Puts a uniform negative charge on the drum Detailed Answer: 109 Puts the toner on the drum Removes static electricity Quick Answer: 102 Detailed Answer: 109 BIOS CMOS CR2032 Setup 35. ❍ C. ❍ C. Quick Answer: 102 Cellular Bluetooth USB Ethernet Quick Answer: 102 Detailed Answer: 110 . ❍ B. Detailed Answer: 109 Fill out an accident report 33. It is seeping into the server room next door. ❍ D. Detailed Answer: 110 AT&V IRQ MBR QPI 37. Expansion bus speed 36. External clock speed ❍ C. ❍ C. ❍ B. Which of the following is the fastest? ❍ ❍ Quick Answer: 102 Puts a uniform positive charge on the drum 34. Internal clock speed ❍ D. Bus speed Quick Answer: 102 Detailed Answer: 110 B. Quick Answer: 102 A. Which of the following can be used to verify settings between the computer and a connected modem? ❍ A. Which of the following is the best? ❍ A. ❍ D. ❍ C. ❍ D. A laser printer’s primary corona wire does which of the following? ❍ A.88 Chapter 4 ✓ Quick Check 32. It seems someone has spilled a large amount of coffee in the break room and has not cleaned it up. ❍ B. What should you do first? ❍ A. ❍ C. What device on the motherboard retains variable information such as the time and date? ❍ A. ❍ D. ❍ B. Tim wants to use a wireless mouse with short-range communications. ❍ D. ❍ B.

Detailed Answer: 110 IEEE 802. PSU tester 42. What tool is used to test all computer hardware prior to installing an operating system? ❍ A.) Quick Answer: 102 Detailed Answer: 110 ❍ A. 2 GB RAM. ❍ D. ❍ D. IEEE 1394 IEEE 1284 IEEE 802. The customer tells you that performance is slow when Aero is enabled. ❍ C. which of the following is not permissible? ❍ A. Multimeter ❍ B. One of your customers is running Windows 7 on a PC that has a 2 GHz CPU. Antistatic mat ❍ E. When explaining a technical concept to a customer. Cable tester ❍ D. Quick Answer: 102 Quick Answer: 102 Detailed Answer: 110 Using analogies Using visual aides Using jargon Limiting the amount of information to what is necessary for the user to know 41. and a 64 MB video card. Increase system RAM Upgrade the video card Increase the hard drive capacity Upgrade the CPU Quick Answer: 102 Detailed Answer: 111 . ❍ B. ❍ B. ❍ B. ❍ B. ❍ D. ❍ D. How can you increase performance on the computer? ❍ A. ❍ C. ❍ C.220-801 Practice Exam C 89 ✓ Quick Check 38. ❍ C. Which of the following cables connects the parallel port of the computer to the printer? ❍ A.3 39. Loopback plug ❍ C.11 Quick Answer: 102 Detailed Answer: 110 Another computer system BIOS setting Windows POST card 40. What tool would you use to test the voltage of a power supply? (Select the two best answers.

90 Chapter 4 ✓ Quick Check 43. ❍ C.) Quick Answer: 102 Detailed Answer: 111 ❍ A. USB drivers ❍ F. Boot sequence ❍ D. ❍ B. WOL 48.) Quick Answer: 102 Detailed Answer: 111 . What is the data transfer rate of DMI version 2. You have opened the computer case and are ready to install. ATX and DVI B. ❍ D. Which of the following would you configure in the BIOS? (Select the four best answers.0 Gb/s 5 Gbps 46. Detailed Answer: 111 To make the computer run more quietly 44. ❍ C. Mobile-ITX and HDMI C. The registry ❍ C. ❍ B. microATX and HDMI 47. Quick Answer: 102 Quick Answer: 102 Detailed Answer: 111 A. Which socket replaces the Intel 1156 socket? ❍ A. ❍ D. Why do some computers share RAM with the video card? ❍ A. You have selected a motherboard for your new audio workstation. You are building an HTPC. ❍ B. What are the first and last things you should do? (Select the two best answers. Time and Date ❍ B. Pico-ITX and RG-6 ❍ D. To make the computer faster To lower cost To reduce temperature 775 Detailed Answer: 111 1155 1366 1000 Mbps Quick Answer: 102 Detailed Answer: 111 20 Gb/s 3. ❍ D. ❍ C.0? ❍ A. Passwords ❍ E. Which form factor and video output should you select? ❍ ❍ ❍ Quick Answer: 102 940 45.

❍ D. ❍ B. ❍ C.0.0 and Ping :1 Ping 127. ❍ B. The marketing printer has been used for 4 years. Put on an antistatic strap ❍ E. Which of the following measurements is the typical latency of a SATA hard drive? ❍ Detailed Answer: 112 ipconfig ::1 and ping ::1 50.0.0. 4.220-801 Practice Exam C 91 ✓ Quick Check ❍ A. Connect the main power cable 49. Ping 127.2 ms 52. 7200 RPM ❍ C. You want to test whether IPv4 and IPv6 are working properly on a computer.0. Quick Answer: 102 Quick Answer: 102 Detailed Answer: 112 A. ❍ D. 16 MB ❍ D. Jim has a Core 2 Quad CPU in his desktop computer. What should you do for the printer? ❍ A. Detailed Answer: 112 Clean the printer Install a maintenance kit Clear the counter Print a test page 53. If the base clock of his motherboard is 333MHz. Install the CPU ❍ C. ❍ C. 300 MB/s ❍ B. ❍ D. Which commands should you issue? ❍ A.1 and Ping 127::1 Quick Answer: 102 Detailed Answer: 112 1 GHz 333 MHz 666 MHz 1333 MHz 51. Select a motherboard ❍ B.0. Quick Answer: 102 Type I Type II Type III Type IV Quick Answer: 102 Detailed Answer: 112 . ❍ D. Which PC Card slot can manage all the various PC Cards? ❍ A. ❍ C.0. Test the motherboard ❍ D. ❍ B.1 and Ping ::1 ipconfig 127. what would the front side bus (FSB) be? ❍ A. ❍ C. ❍ B.

❍ B. ❍ C. 1155 ❍ C. What should you do next? Quick Answer: 102 Detailed Answer: 112 ❍ A. Show the customer the printer’s basic functionality ❍ E. Quick Answer: 102 Quick Answer: 102 Detailed Answer: 112 Cable tester Loopback plug PSU tester Tone and probe kit 56. ❍ B. Which tool should you use to determine why a computer fails to boot? ❍ A. AM3 ❍ B. How much L1 cache does a Core i5 CPU with four cores contain in total? ❍ A. What should you never expose the drum of a laser printer to? ❍ A. Install a maintenance kit 57. ❍ C. ❍ D. FM1 ❍ D. Turn the printer on and off ❍ D. ❍ C. Bill the customer ❍ C. Recheck all connections ❍ B. 32 KB 64 KB 128 KB 256 KB Quick Answer: 102 Detailed Answer: 113 . ❍ D. Airflow Detailed Answer: 112 Cold temperature A strong light source Toner dust 55. Which of the following are AMD CPU sockets? (Select the three best answers.) ❍ Quick Answer: 102 Detailed Answer: 113 A. G34 58.92 Chapter 4 ✓ Quick Check 54. 775 ❍ E. ❍ B. ❍ D. You just installed a customer’s printer and tested it.

❍ B. ❍ D.220-801 Practice Exam C 93 ✓ Quick Check 59. ❍ B. Multimeter ❍ C. 5 v. ❍ C. Which type of cache memory is shared by all cores of a CPU? ❍ A. ❍ C. You are tasked with plugging a network patch cable into an inactive drop within a user’s cubicle. Which technology calculates two independent sets of instructions simultaneously. –12 V -5 V. 3.3 V. causing issues with a SATA drive. You decide to test the SATA drive. ❍ C. Cable tester ❍ D. ❍ B. L1 Detailed Answer: 113 L2 L3 DRAM 60. PSU tester ❍ B. Which tool enables you to find the correct network drop in the wiring closet so that you can make the port hot? ❍ Quick Answer: 102 Detailed Answer: 113 A. ❍ C. What are the standard voltages of a SATA connection on an ATX power supply? ❍ A. 12 V -3.3 V. ❍ D. 5 V. simulating two CPUs? ❍ A. You think that the power supply in your PC might be failing. ❍ D. Volts Watts Ohms Amps 62. 5 V. ❍ B. Quick Answer: 102 Quick Answer: 102 Detailed Answer: 113 Hyper-threading HyperTransport TurboBoost Multi-core 61. Tone and probe kit 63. How is TDP measured? ❍ A. 12 V 5 V and 12 V Quick Answer: 102 Detailed Answer: 113 . ❍ D.

A company has Category 5e cabling lying on the floor in several locations. ❍ C. ❍ D. ❍ B. ❍ B. Detailed Answer: 114 eSATA 67.0 66. What is the best solution for making a direct wireless connection between a laptop and a printer? ❍ A. Before working on the CRT. ❍ B. Which of the following is the most appropriate action to take? ❍ A. Print a test page Refill the paper trays Restart the printer IEEE 1394a 1000BASE-T Quick Answer: 102 Detailed Answer: 114 FireWire IEEE 1284 Bluetooth IEEE 1394 Quick Answer: 102 Detailed Answer: 114 Reroute the cables using a protective material Secure the cables to the floor with tape Install a wireless network Move the computers closer to the server 68. ❍ B. Detailed Answer: 114 Restore the printer to factory settings 65.94 Chapter 4 ✓ Quick Check 64. ❍ B. ❍ C. ❍ D. ❍ C. Which type of external connection allows for the fastest hard drive data rate? ❍ A. ❍ D. You just installed a maintenance kit to a laser printer. What should you do next? ❍ A. Quick Answer: 102 Discharge the monitor Clean the monitor Degauss the monitor Unplug the monitor Quick Answer: 102 Detailed Answer: 114 . ❍ D. Quick Answer: 102 USB 2. ❍ C. what should you do? ❍ A. ❍ C. ❍ D. You’ve opened a CRT.

What action should you take? ❍ ❍ ❍ Quick Answer: 102 Detailed Answer: 114 A. ❍ B. ❍ C. ❍ C. ❍ C. Talk with the person while working. ❍ B. She is on a tight budget and doesn’t want to pay for additional equipment. 120 V AC. What are the standard voltages in the United States for a home and for the internal workings of a PC? ❍ A. Impedance 71.220-801 Practice Exam C 95 ✓ Quick Check 69. Wattage ❍ C. 240 V DC 240 V AC. ❍ D. go back to work. Detailed Answer: 115 240 V AC. Ask to be excused. Amperage ❍ D. ❍ D. Which of the following technologies would be the best solution? ❍ A. and after determining that it is not a truly urgent call. 70. Which of the following should be used to clean a laser printer’s rubber rollers? ❍ A. and after determining the urgency of the call. One of your customers wishes to have broadband Internet access set up in her home office. get right back to work while talking on the phone. 12 V DC 72. ❍ D. Which of the following is defined as the movement of electric charge? ❍ Quick Answer: 102 Detailed Answer: 114 A. Quick Answer: 102 ISDN T-3 Cable modem T-1 Quick Answer: 102 Detailed Answer: 115 . Leave the site and take the call. Ask to be excused. ❍ D. 12 V DC Quick Answer: 102 Detailed Answer: 115 Soap and water WD-40 Isopropyl alcohol A moist cloth 73. B. 5 V DC 120 V AC. C. You are on a service call and receive an urgent phone call. Voltage ❍ B. ❍ B.

10. A user cannot connect to a printer with the following UNC path: \\10. \\ipaddress\sharename ❍ C. Which of the following paths is the best solution? ❍ A. It is the same model as the old one. Which of the following protocols can be used to configure and monitor network printer device status? ❍ A.5/printer1 https://10.1. SNMP ❍ C. A co-worker at a satellite office reports that a new replacement shared workgroup printer has arrived.10. http://computername/C ❍ E. //computername/C$ ❍ D. Detailed Answer: 115 Name the new printer with the old printer name 76. ❍ C.96 Chapter 4 ✓ Quick Check 74.5/printer1 http:\\10. \\computername\C$ ❍ B. Allow the printer to acquire a DHCP address In DHCP. Quick Answer: 102 Quick Answer: 102 Detailed Answer: 115 SSH SFTP HTTPS Kerberos 78. An administrator cannot connect to a network volume.5\printer1. ❍ B. ❍ D. Which of the following is the best path for the administrator to use? Quick Answer: 102 Detailed Answer: 115 ❍ A.5\printer1 77. Your co-worker replaced the old printer and connected all the cables to the new printer. DNS Quick Answer: 102 Detailed Answer: 116 .1.1. Which of the following communications protocols is used to connect to websites over secure communications links? ❍ A.1. ❍ B. What is the easiest way to ensure that all the client computers can connect to the new printer via IPP? ❍ A. ❍ D. ❍ C.10. TCP/IP ❍ D. ❍ D. IPP ❍ E. SMTP ❍ B. ❍ C.1.10. \\computername\sharename 75.5/printer1 //10.1. ❍ B. set a reservation by MAC address Have your co-worker print the configuration page Quick Answer: 102 Detailed Answer: 115 ipp://10.

Frequent failure of hard drives. Wi-Fi range is reduced. ❍ B. Gaming PC ❍ E. Your CD burner takes longer to write than usual. ❍ D. CAD/CAM workstation ❍ B. You need to install a device that can read groupings of parallel lines. ❍ D. Which device should you select? ❍ A. Turn on the computer to prevent shorts ❍ D. 82. ❍ C.) ❍ A. ❍ C. ❍ B. Unplug the power cord to prevent shorts 80. Quick Answer: 102 Detailed Answer: 116 The CPU is overclocking.) Quick Answer: 102 Detailed Answer: 116 ❍ A. Virtualization workstation ❍ D. Back up the computer to prevent any potential loss of data ❍ C. A loopback address of ::1 81. Which of the following symptoms would indicate to you that there is a power supply issue? ❍ A. Which of the following custom PC configurations require powerful CPUs? (Select the three best answers. Biometric scanner Image scanner Barcode reader Touchpad Quick Answer: 102 Detailed Answer: 117 . Home theater PC ❍ F. Your co-worker Jake is planning on using an extension magnet to pick up a screw that dropped inside a computer case. Audio/Video editing workstation ❍ C. An address assigned to one interface Quick Answer: 102 Detailed Answer: 116 C. What should you recommend he do before attempting this? ❍ ❍ Quick Answer: 102 Detailed Answer: 116 A.220-801 Practice Exam C 97 ✓ Quick Check 79. Make sure the extension magnet is rubber coated B. An address assigned to a group of interfaces where the packets are delivered to all interfaces ❍ ❍ B. Home server PC 83. Which of the following are descriptions or examples of unicast IPv6 addresses? (Select the two best answers. An address assigned to a group of interfaces where the packets are delivered to the first interface only ❍ D.

❍ D. You are attempting to implement hot-swapping functionality. ❍ C. Unfortunately. Which of the following is the best tool to use to reach a screw that has fallen into a computer case and out of reach? ❍ ❍ ❍ Quick Answer: 102 Detailed Answer: 117 A. ❍ B. Extension magnet 87. You do not want to use jumpers. Pliers B. Which of the following expansion slots should the motherboard have for your two video cards? ❍ A. You are building a new PC for a customer. You need to replace RAM in a customer’s PC that currently uses PC3-10600 memory. ❍ B. Quick Answer: 102 Detailed Answer: 117 ❍ D.0? ❍ A. ❍ B. Tweezers ❍ D. ❍ C. 86. Detailed Answer: 117 PC3-6400 PC3-8500 PC3-12800 DDR3-1066 88. Wrist strap C.98 Chapter 4 ✓ Quick Check 84. ❍ D. Which RAM should you install? ❍ A. You are installing an external SATA drive. Which of the following is the most valid reason why you would select SATA 3. you do not have any RAM meeting that exact specification. You are building a new PC and want to select a motherboard that will support the Scalable Link Interface (SLI) technology so that you can install two SLI video cards connected by a bridge. Quick Answer: 102 Detailed Answer: 117 Two AGP slots Two PCIe slots A PCI and PCIe slot An AGP and PCIe slot 85. You are trying to optimize the system for audio and video. ❍ B. Quick Answer: 102 RAID 0 RAID 1 RAID 5 RAID 10 Quick Answer: 103 Detailed Answer: 117 . Which of the following RAID arrays is fault tolerant and allows you to do striping? ❍ A.0 over the original SATA 2. ❍ D. ❍ C. ❍ C.

❍ C.127. ❍ D.220-801 Practice Exam C 99 ✓ Quick Check 89. Detailed Answer: 118 Input devices Cabling Wall outlet Power supply 92. ❍ E.1. what should you check first? ❍ A. Avoiding distraction 90. Preserving data ❍ D. If you are dealing with a power issue.254. It’s using an incorrect mouse driver. Install a passive hard drive cooler ❍ C. ❍ C. ❍ B. ❍ D. The mouse needs to be charged. If a computer receives the IP address 169.) Quick Answer: 103 Detailed Answer: 118 ❍ A. 91.) ❍ A. Which of the following are two possible reasons that an optical mouse cursor erratically jumps around the screen? (Select the two best answers. ❍ C. what has failed? ❍ A. Quick Answer: 103 Quick Answer: 103 Detailed Answer: 118 DHCP DNS WINS APIPA 93.) ❍ ❍ Quick Answer: 103 Detailed Answer: 118 A. Drill holes in the computer case to increase airflow ❍ B. An older Core 2 Duo computer is overheating because there is very little open space within the computer case. Install an additional case fan ❍ D. ❍ D. It’s on an uneven surface. Which of the following are components of dealing with prohibited content? (Select the three best answers. The mouse trackball needs to be removed and cleaned. ❍ B. First response ❍ B. There’s a conflict with the keyboard. Install a liquid cooling system ❍ E. Install rounded IDE cables Quick Answer: 103 Detailed Answer: 119 . B. Creating a chain of custody ❍ E. What are two things you can do to increase proper airflow? (Select the two best answers. Maintaining a positive attitude ❍ C.

❍ B. ❍ C. ❍ D. Do not minimize a customer’s problems Quick Answer: 103 Detailed Answer: 119 B. ❍ B. Detailed Answer: 119 0 97. In a RAID 5 array of eight hard drives. ❍ B. Emergency! Your boss forgot the password to the BIOS on a computer. Which of the following are the Intel and AMD names for CPU virtualization? (Select the two best answers. What should you do first before shipping a user’s laptop to the manufacturer for repair? ❍ A. ❍ C. Detailed Answer: 119 Remove the RAM from the motherboard Remove the CMOS battery from the motherboard Remove the RAM jumper from the motherboard Remove the main power connection from the motherboard 95. what should you do? ❍ ❍ ❍ Quick Answer: 103 A. Which of the following methods helps you to reset the password? ❍ A. Report through proper channels C. ❍ B. ❍ D. When dealing with difficult customers.) ❍ A. 1 2 5 Quick Answer: 103 Detailed Answer: 120 Remove the LCD Clean it thoroughly Remove the hard drive Remove the WLAN card 98. how many can fail without losing the entire array? ❍ A. Quick Answer: 103 VT-x AMD-Vi VT-d AMD-V Quick Answer: 103 Detailed Answer: 119 . ❍ D. ❍ C. ❍ C. Track evidence through documentation ❍ D. ❍ D.100 Chapter 4 ✓ Quick Check 94. Tell the customer to remove confidential documents 96.

❍ B. ❍ B. Quick Answer: 103 DVI-D DVI-A DVI-I HDMI Type B Quick Answer: 103 Detailed Answer: 120 . ❍ C. ❍ D. how much data can a Blu-ray drive read per second? ❍ A. ❍ D. Detailed Answer: 120 50 GB 432 Mb/s 4. ❍ C.5 MB/s 150 KB/s 100.220-801 Practice Exam C 101 ✓ Quick Check 99. Which of the following video connectors accepts digital and analog video signals only? ❍ A. At 12x speed.

C 37. C 67. D 14. B 63. C 73. C 58. A 6. D 79. C 47. B 33. A 3. C 24. D 22. C 18. C 59. C 20. C 12. and E 86. C 82. D 41. A 35. A 40. A 32. B 27. A. C 83. B 7. D 39. B 4. C. A and E 70. D 68. D 15. B 36. D 43. B 8. B 51. D. C 2. D 48. A 38. C. C 30. C 45. C 57. B 54. D 29. D 56. C 28. D 80. D 85. C 78. C 50. B 21. A 19. A 49. A 65. C 26. D 31. C . A 17. C 72. A. A 46. C and D 77. and F 76. B 60. D 5. C 16. A. C. A 10. C 9. A 11. B 74. C 13. D 34. C 64. C 69. B and D 23. A and E 53. D 44. C 84. B 42. D 75. B 61. C 87. C 52. B 71. A 55. and D 25. A 62. B 81. B 66.102 Chapter 4 Quick-Check Answer Key 1.

B 99. B 90. C 91. C 96. C. C 93. A. A 97. C and E 98.220-801 Practice Exam C 88. C 103 . B 92. A and D 89. A and D 95. and D 94. A 100.

it simply says that the battery is often low on power. or 480 MB/s. which allows the CPU to be raised by 10% beyond the maximum. You can also suggest that the user close applications when not in use and turn off Bluetooth and Wi-Fi while they are not being used.” Although there might have been chip creep. You should recommend configuring the laptop power option to power saver plan. The multiplier is variable and will only increase if the system runs more applications and requires more CPU power. 2. Often. AGP and PCI are parallel technologies. as well as possibly corrupt data stored on the hard drive.0 sends 5 Gbps.6 GHz). This is a basic and fairly safe type of overclocking. That means it can send and receive 1 GB of data every second. Many motherboards also let you increase the system bus speed. nor USB use lanes. While in the computer. Thermal expansion and contraction happen when humidity changes quickly. the direct cause of the problem was most likely thermal expansion/contraction.1 GHz CPU is 100 MHz. 3. Finally. The question’s scenario says nothing about the battery not charging. PCI has a maximum of either 133 or 266 MB/s. 4. Thermal sublimation deals with a specific type of printing process and is not involved in the problem. USB 3. others let you overclock the system bus to as high as 300 MHz (not recommended). This can lead to what some technicians refer to as “chip creep” or “card creep. but at the cost of not using it anymore. a CPU such as this will hover at around 1600 MHz (1. shut down the display and hard drives after 10 minutes or so. or 3. AGP maxes out at 2. since they have 16 lanes. This will help to conserve battery power.104 Chapter 4 Answers and Explanations 1. in this case it would be up to 3.1 GHz. Answer: A. for a multiplier of 16. Some boards will stop you at say 105 MHz. PCIe is the only technology listed that uses lanes. Answer: D. tell the user that he should charge the battery often! As for the other answers: Restoring power usage when the laptop is unattended would seem like the opposite of conserving battery power. If that doesn’t help. Keeping the device stored in a dry cool area out of direct sunlight also helps. Disabling special video effects in Windows can also conserve battery power. POST errors would not be the cause of the error but in some cases could give you diagnostic information leading to the cause. Of course. Neither AGP. PCI Express (PCIe) version 3. can send and receive 16 GB/s simultaneously. Treat overclocking with extreme caution—the increased voltage and ensuing heat can easily cause the CPU to overheat and cause damage to the CPU and other devices in the system. The maximum multiplier is 31 times that. Answer: C. Removing the battery will definitely conserve battery power. you might want to check other adapter cards in case they were affected by this phenomenon as well.0 can transmit 1 GB/s per lane. And PCIe x16 slots. many Intel CPUs also have TurboBoost technology. and put the computer to sleep soon after that. Only fully discharge the battery if it will not hold a charge anymore. replace the battery. . But that is only if the processor requires it. PCI.133 MB/s. The default bus speed (without overclocking) for a Core i5 3. The power saver plan will dim the display. PCIe and USB are serial technologies.4 GHz when needed. Answer: B.

Windows 7 requires a 1 GHz CPU. There are plenty of free Wi-Fi (WLAN) networks out there. both WLAN and WAN cards can be external or internal. but honestly. A technician needs to be culturally sensitive. If you seriously cannot understand the customer even after attempting to listen several times and repeating the problem back. Always clarify! Having the customer call back later is just delaying the problem. 64-bit versions of Windows 7 require 2 GB RAM. Yes. But the amount of memory is important. Even the keyboard isn’t necessary. then the memory type should be fine. only if you are attempting to access the BIOS or if someone configured a user password in the BIOS. 6. External peripherals don’t need to post properly for the computer to boot to the OS. Most likely. The POST is more interested in the guts of the computer. If nothing comes up on the display. if you don’t have that speed. 9. The only real difference listed between cellular WAN cards and WLAN cards is that a cellular WAN card requires a subscription to a cellular provider. while a WLAN card can work without provider payment. It is cellular WAN cards that are more proprietary. video. and all you have to go by are flashing lights on the keyboard. However. 32-bit CPUs will not run 64-bit Windows. remember that Wi-Fi is a registered trademark. Answer: A. the 64-bit consideration becomes important again. Finally.220-801 Practice Exam C 105 5. Passwords are required when you see a repetitive flashing light on the screen. DSL uses a standard phone line or other twisted-pair cable. Answer: A. 8. not on the keyboard—and even then. you will have to get someone else involved who can help you or attempt to communicate with the person through e-mail. The technician should repeat the problem back to the customer to make sure that everyone is talking about the same thing and that both parties understand each other. The most important consideration when installing any 64-bit operating system is the processor type. that won’t happen.11n and 802. Remember that Wireless LAN (WLAN) technologies that are ratified by the IEEE such as 802. you can probably ascertain that the POST has failed and that the problem lies within the big four (as I like to call them): CPU. Software errors can’t occur until the operating system attempts to boot. Asking a person with an accent to stop speaking with an accent is like telling a dog to stop wagging its tail. whereas the WLAN card will be limited to 820 feet outdoors (if 802. but once again. it probably will be futile. Answer: B. On to the other answers: It is the WAN card that has a range of miles. RAM. Memory type doesn’t really matter much. then you don’t have much of a computer. 7. Verizon. and without the POST finishing successfully. These are much more difficult to eavesdrop on than any copper cable.11n less for other WLAN standards). probably internal to the computer. repetitive flashing lights on a keyboard will indicate the presence of a hardware error. and the actual technologies you are using are technically known as WLAN. especially the big four and the hard drive. Answer: D. 1 GB is necessary for 32-bit systems. . or motherboard. Fiber-optic networks use fiber-optic cables that have a core of plastic or glass fibers. and so on. if it’s a PC. Satellite connections and cable Internet use RG-6. You would have to get a WAN card that matches your service: AT&T. The CPU needs to be 64-bit to run 64-bit Windows.11g are commonly referred to as Wi-Fi. Answer: C.

HTTP uses port 80. HTTPS. insecure. The operating system should be contained within the master drive. For example. The Telnet protocol uses port 23. SMTP. special firmware upgrades. you are not accusing the user of anything. Answer: D.106 Chapter 4 10. it is used by BIOS chips and is not a RAM stick.400 MB/s. Update the BIOS. whether it is on older computers or on systems that you are upgrading (or restoring data from). Answer: D. PC2-6400 is a DDR2 module name that transmits 6. Remember. 443. 13. Apply system updates. you will probably elicit a lot of the other listed answers from the customer. Older systems used the 20-pin main power connector. sit back and whistle your favorite tune. driver install. plus it isn’t even enabled or installed on newer versions of operating systems. 22. By asking this. think this way: Windows updates. Update the controller card’s firmware last. 40 pins is the amount of pins an IDE hard drive’s data cable has. They simply plug into the computer and either work or don’t. so that the BIOS will have a better chance of recognizing it. The RIMM is a competitor of DDR. a double 6pin. 12. 4. It’s not asking for the video power connection. right? 14. EEPROM stands for electrically erasable programmable read-only memory. You have to remember that powerful video cards will require more powerful power supplies. BIOS updates. All PC techs do that. The moral of this question is to get the whole story before asking questions that are arbitrary—and possibly unnecessary. Answer: D. When upgrading. But also. The port numbers 21. 53. you will still be dealing with IDE drives. And when you ask what the customer has done so far. and RDP. and 3389 correspond to the protocols FTP. that will depend on the type of video card. Install the card physically. 15. and finally 5. Answer: D. Of course. Know your port numbers! 11. its standard name is DDR2-800 because it can perform 800 MT/s. The main power connection should have 24 pins. but those are rare nowadays. Use SSH in its place for a more secure connection. You should first ask the customer to describe the steps taken so far. Install the driver. You want to update the BIOS before installing the card. Answer: B. POP3 uses port 110. That’s the smartest list of steps for any hardware upgrade. So the question was more of a tricky one. some devices are not turned on and off. you are simply asking what the customer did so far. RIMMs are designed by a company called Rambus. it is also known as RDRAM as opposed to SDRAM. DNS. You might ask “Who cares about IDE?” The answer: CompTIA. applying the system updates last would cause Windows to recognize the card properly too late. By setting the jumper to master on the old drive and setting the jumper to slave on the . You don’t even know if the device is USB or not. even if you are upgrading an older computer. Rambus also makes RAM for game consoles known as XDR RAM. Then test it. Telnet is deprecated. SSH. you should have made sure that the card is compatible with the motherboard and your version of Windows before purchasing. the person will probably tell you that she plugged the device in. It might also cause Windows to attempt to install a Microsoft driver when you really want the manufacturer’s driver. and outdated. 2. or a single 8-pin. The process order for installing a new hard drive controller card is to: 1. physical install. All of the other listed orders have anomalies that could lead to errors. Answer: A. 25. and if it tests true. It’s on the objectives so you should know it. Just about all PCs you will see will have a 24-pin power cable. Upgrade the card’s firmware. The key here is what you ask the customer first. 3. which could be a single 6-pin. Plus.

For example. Selecting any other setting listed might result in problems booting to the operating system. 21. The customer will then be more likely to come back to you with other computer problems. Most organizations will not allow purchased software to be installed on an employee’s home computer. then PC3-10600 would run at 667 MHz (the default) and 533 MHz (underclocked). Note that this can be done only if the drive is equipped with that jumper setting. The key in this question is to know the various data rates of DDR. To aid in this. Most motherboards can underclock a RAM module by at least one step if necessary. Some RAM modules and motherboards support underclocking even further. Answer: A. you can look at only one computer’s video display at a time. 19. then you should notify your supervisor. but that is not accurate. It’s the surface area of the heat sink that has the greatest effect on heat dispersion. Then call 911.333 megatransfers per second (MT/s) and at 1066 MT/s. You might see this referred to as 1333 and 1066 MHz. You should first verify that the installation is allowed under a company’s licensing agreement. for example. 20. It probably isn’t. but they would be automatically underclocked to 1066. and six for the PCs that are connecting to the KVM switch (two each). The more solid the bond between the heat sink and CPU cap. To sum up: Any particular memory module will usually run at least one step slower than its default rate. Of course. If it is against organization policy. If you were to see this question expressed as the I/O bus clock rate. This will usually be the circuit breaker.220-801 Practice Exam C 107 new drive. you do not want to touch him. Another option is to use the cable select jumper setting that will attempt to automatically configure the new drive as a slave. Because it appears that the power is still on. The best answer here is to select a single 8 GB DDR3 PC3-12800 memory module. respectively. but you should check first. Even though it is faster than the current RAM. you could still install DDR3-1333 memory modules. thermal compound must be used. DDR3-1333 actually has an I/O bus clock rate of 667 MHz. 16. Teach the user how to avoid this problem. Answer: D. The default data rate is 1333 MT/s. another option (though not recommended) would be to overclock the motherboard to meet the data rate of the new RAM. the board will support PC3-10600 running at 1. Do not move the cord or the electrician. Answer: C. the better the transition of heat out of the CPU. 22. Answer: C. If a motherboard supports it at all. If the electrician is being electrocuted. it’s the data rate that is 1333 MT/s. but it can be underclocked to 1066 MT/s. one for the USB keyboard. turn it off at the source (if it is not near the sparking wire). ‘Nuff said. A PC3-10600 module is DDR3-1333. in this scenario as low as 400 MHz (800 MT/s.) Of course. A KVM switch allows you to control two or more computers with a single keyboard and mouse. if you have a motherboard that can normally only handle DDR3-1066 memory modules. Russ will accomplish that. it can be underclocked automatically by most PC motherboards to match the PC3-10600 speed. Eight USB cables minimum are required for this configuration—one for the USB mouse. This kind of device is great for training purposes and lab and testing environments. The current 2 GB . Answer: B. Answer: C. Note that the question stated that RAM is assumed to be the same price per MB. The device also needs only one display. you could be next. Answer: A. 17. 18.

you need to have electricity flowing through the item you want to test. You should not offer any repair options until you know exactly what the problem is. Questioning the user can often lead to what caused the issue.108 Chapter 4 memory module in Slot 2 would be removed. Thin clients normally have very limited resources of their own and rely on the server (be it a regular or virtual server) for the additional resources they need. and amps. When finished. but it would be even more expensive. PCs have plenty of their own resources and do not need a server supplying those resources. . Answer: D. 25. In each example. and laptops are not thin clients. POP3 receives e-mail. 26. and even you. but in some situations you might actually purchase a faster type of RAM to save money! 23. HTTP is the protocol used by web browsers to surf the Internet. A home server PC is a possibility in this scenario. instead. This server will provide most of the resources for the clients on the network—the thin clients. more money). The 10 GB module would work mathematically (if we removed the current module in Slot 1) but would be more expensive as opposed to an 8 GB module (more GB. The virtualization workstation will run virtual software that will allow you to install the server software to a virtual machine (VM). The 6 GB module wouldn’t work because there would be no way to achieve 12 GB mathematically (we are limited to two slots). they also have plenty of internal resources. That is the protocol used to send mail. Answer: A. When testing for watts. ask the person to slowly repeat what the problem is. the more chance the customer will paint you a good picture of what the problem is. A CAD/CAM workstation is used for computer-aided design and manufacturing. continuity and resistance are the settings that should be used when there is no electrical flow through the part being tested. An AV workstation is an audio/video workstation. you do not want to accuse the user of anything. that and the current memory module in Slot 1 would equal 12 GB total. Answer: C. If the customer is having a hard time describing the problem. leaving you at a loss as to what to fix. and you want to be sure that there is no electrical flow when doing these tests! Examples of continuity or resistance tests include testing a fuse’s impedance (measured in ohms) and testing a network cable for continuity. and the new 8 GB module would replace it. Plastic tweezers are used to remove hard-to-reach parts such as screws from the inside of a PC. Thick clients have plenty of resources and are often used as another name for PCs. you don’t want any electricity flowing through the device or line. Pliers have many uses but could cause damage to the plastic that surrounds the display of a laptop. Use a plastic shim to open the display or remove the bezel that surrounds it. Try to relax him and be understanding. Answer: C. not a server. 24. Compatibility is quite important. Answer: B. Finally. Answers: A and E. 27. The Simple Mail Transport Protocol (SMTP) is not configured properly. Flathead screwdrivers are not recommended because the metal can damage the plastic case of the laptop. just ask what the user did last on the computer. However. You will be implementing a virtualization workstation and thin clients. volts. FTP enables two computers to upload and download files. Of the listed answers. thick clients don’t meet the requirements of this scenario. Of course. 28. The more patient you appear. two 6 GB modules would work if we removed both current modules. if it runs in a virtual environment. and especially patient. It would give erratic results and could possibly cause damage to your testing equipment.

Answer: A. I’ve had some terrible coffee in my day. The ICH (I/O Controller Hub) makes the connections to secondary systems such as USB and SATA. After you notify the admin. Answer: B. and x16 PCIe devices on older Intel motherboards that support Core 2 CPUs.220-801 Practice Exam C 109 Computer jargon never helps the situation. AMD systems still use the northbridge/southbridge concept. When the computer is turned on. Never abruptly leave the customer. This way you will be sure that the power supply is functional. then you risk alienating the customer and making things more difficult. Answer: C. The complementary metal-oxide semiconductor (CMOS) retains (stores) changing or variable information such as the time and date. The FSB (front side bus) connects the CPU to the MCH (northbridge) in motherboards that support Core 2 CPUs. This device is also referred to as the northbridge. 34. It is volatile. The term “Setup” is usually associated with the file (setup. Answer: B. The Bootstrap loader is within the ROM ship as well. The Power-on Self Test (POST) checks the CPU. however. The Direct Media Interface (DMI) makes the connection between the chipset and the CPU on motherboards that support Core i3. Persevere. The CMOS chip retains settings that the BIOS records during the POST. Material Safety Data Sheets (MSDS) are available for anything that has a chemical within it. that’s your prerogative. 29. but nothing that required an MSDS. It is somewhat of a replacement for the FSB. Answer: B. The Memory Controller Hub (MCH) makes the connection between. RAM. and repair it as soon as possible. A positive charge is applied to the paper by the transfer corona wire later in the laser printing process. This device is also referred to as the southbridge. but I would hope the person who made the mess had a hand in cleaning it up. It’s coffee—no need to fill out an accident report. and i7 CPUs. find out what the problem is. Power supplies are easily damaged in transit. like Intel. Toner is placed on the drum from the toner hopper. On newer Intel systems (such as Core i5 or i7 systems). . it automatically reads the hard disk drive boot sector to continue the process of booting the operating system. the northbridge functionality is embedded within the CPU. the CPU. 31. you might choose to mop up the mess. 30. Be sure to understand both Intel architectures as well as how AMD fits into the whole scheme of things! 32. and so on when the computer first boots and displays any error messages if any errors occur. video card. The toner is attracted to the areas that have a lesser negative charge. The primary corona wire places a negative charge on the photosensitive drum. Answer: C. it is wise to run them for a while (burn them in) as part of your final checklist when working on or building a PC. Because of this. Static electricity is removed by a static eliminator strip. 33. If anything is going to disturb the server room or other equipment rooms. if you start using terms the customer is unfamiliar with. so a lithium battery (usually a CR2032) is used to power the CMOS when the computer is off. i5. memory. The BIOS or setup can locate and identify devices but does not store the variable information mentioned.exe) which installs Windows and programs to be installed to Windows. notify the network administrator immediately. The POST is a part of the BIOS. any memory controlling functionality is built in to the CPU. and controls the data transfer of.

For example. 36. IEEE 1284 also sets the specifications for Extended Capabilities Port (ECP). Loopback plugs are used to test RJ45 ports on network adapters and COM1 serial ports. Answer: D. USB and Ethernet are wired! And there are no Ethernet mice.11 is the collective standard of wireless technologies. Customers can be confused by it. whereas the PSU tester will test the entire main power connection all at once. The multimeter will test one wire at a time. Bluetooth works well as a short-range wireless communication technology. Answer: A. More often. 3. Answer: C. It often holds the partition table and/or bootstrapping information. 40. you are a techie and the customer is not. Most modem commands begin with AT. and anything more technical than “reboot the computer”. there’s no reason you should know it for the A+ exam. IEEE 802. it is still on the A+ objectives. we can’t use Windows to test hardware (and probably wouldn’t want to rely on that anyway). IRQ stands for Interrupt ReQuest. used for external drives and AV equipment. but they are of no consequence. except for the ones that crawl around the network looking for the exit.1 GHz. It is normally faster than the external clock speed (FSB on older Intel systems). an Intel technology that connects the chipset to the CPU. This means to stay away from mentioning computer acronyms. 37. You should definitely limit what the customer needs to know. 100 MHz. Answer: C. Think along their lines and paint a picture that they can understand. If an OS hasn’t been installed yet. and sometimes even frightened by it. 39. Cable testers are used to test networking cables. an ExpressCard GPRS cellular data card). Answers: A and E. In fact. IEEE 1394 is the PC equivalent standard of FireWire. Cellular is longer range and actually for sending data (for example. IEEE 1284 is the ratified standard for printer cables that connect to the parallel port (LPT1) of the computer on one end and the Centronics connector of the printer on the other end. A power-on self-test (POST) card can be used to test all hardware on a computer prior to installing an operating system.3 is the standard for Ethernet. The internal clock speed is the frequency of the CPU—for example. The BIOS employs its own POST. and you never know when you will see a question on it or when you might stumble upon one in the field! IEEE 802. intimidated by it. While the parallel printer connection is an older technology. there is no reason for the customer to know that 802. The AT&V modem diagnostic command is used to verify connectivity and display settings between a computer and a connected dial-up modem. The MBR is the master boot record. It is a more powerful version of the Direct Media Interface (DMI).110 Chapter 4 35. Keep away from the jargon.3z is the IEEE standard for 1000BASE-X: Ethernet over fiber optic transmissions at 1000 Mbps on the LAN. Use a multimeter or a power supply unit (PSU) tester to test the voltage of a power supply. but then again. An antistatic mat is used to reduce ESD when working on a computer. it is used to troubleshoot computer boot-up problems. It is also faster than the bus speed (otherwise known as the base clock speed)—for example. Answer: B. but this is limited compared to what a POST adapter card can do. 38. the latest technology names. 41. Answer: C. . TCP/IP in general. A boot sector on PCs. Analogies and visual aids can be great when explaining technical concepts to a customer. it is 512 bytes in size and is within the first sector of the hard drive. a number assigned to a device that allows it to initiate communication with the CPU. QPI stands for QuickPath Interconnect.

Even though it is one number less. i5. Answer: D. 44. To make the computer run faster. Answers: C and D. Increasing the hard drive capacity will have no effect on video but can definitely help in other areas of system performance such as pagefile access and general data access. 3. 5 Gbps is the data rate of USB 3. DVI is the standard video connector for regular PCs. To reduce temperature. passwords. Answers: A. but when it comes to the video configurations. motherboards can have integrated video cards. The time/date. 48. Either way. The first thing you should do is put on your antistatic strap. The Direct Media Interface (DMI) connection has a data transfer rate of 20 Gb/s or 2. and Wake-on-LAN (WOL) can all be configured in the BIOS. installing the CPU isn’t really part of the motherboard installation process. the registry and USB drivers are configured in Windows. The CPU and RAM can make the system faster when dealing with applications and calculations of many kinds. LGA 775 is used by Intel Core 2 Duo and similar CPUs. Technically. But you can’t really test the motherboard without it. C. late. Always remember to test! You already selected the motherboard. The last thing you should do is test the motherboard. The DMI is the high-speed point-to-point interconnection mechanism between the CPU and the chipset. D. . Answer: C. ATX is acceptable but won’t fit in most HTPC designed cases. Answer: C. The LGA 1366 is used with Intel Core i7 CPUs exclusively. and i7 CPUs. Answer: B. But anything that deals with power or circuit boards should not be touched unless you are wearing an antistatic strap. 47. You should select the microATX form factor and the HDMI video output for an HTPC.5 GB/s. 1000 Mbps is the data transfer rate of gigabit Ethernet. it is the newer socket type. The only solution listed is to upgrade the video card. but for a true multimedia experience you want HDMI—not only for its capabilities with HD formats. the CPU would be installed before testing.220-801 Practice Exam C 111 42.0 Gb/s is the data rate of SATA revision 2. 45. the video will still perform like an actor on the late. No matter how much RAM you add or what CPU you put in. used with Opteron and Athlon 64 FX CPUs. but also because it carries HD audio signal as well. The 940 is an AMD socket. To make the computer run quieter. Answer: B. This is the only way that computer performance can be increased while Aero is running. By sharing the RAM. boot priority (boot sequence). upgrade the CPU and possibly the hard drive. install quieter fans and solid-state drives and consider a quieter case.0. 43. thus making for a cheaper system in general. The LGA 1155 socket is the replacement for the LGA 1156 socket. Cables need to be connected during the installation and prior to testing. but it will work just fine if you are building a PC that will have the primary function of accessing the Internet. and F. a 64 MB video card is just too weak. late movie—badly. It is commonly used with Core i3. Mobile-ITX and Pico-ITX are used by ultra-mobile PCs (UMPCs) and smartphones. This will not be satisfactory if you need to design a custom PC such as a gaming PC or a CAD/CAM workstation. install more case fans and RAM heat sinks or consider a liquid cooling system.0. RG-6 is the network connection on a cable modem or set-top box (STB). 46. However.

the ExpressCard can go as fast as 250 MB/s. Remember that newer Intel motherboards do not use the FSB. Type II cards might be network adapters or modems. You don’t run ipconfig commands to particular IP addresses. Clearing the counter is something you might do on an inkjet printer. Keep the cartridge away from magnets. 50. Type III cards are usually hard drives.0. Answer: B. 52. The tone and probe kit is used to test phone lines. 55. Installing a maintenance kit is like changing a car’s oil (although it isn’t done as often). if used in PCI Express mode. The Type III PC Card slot can handle Type I. Answer: C. 53. use the command ping 127. When dealing with magnetic drives. Answer: C. the drum should remain sealed in the toner cartridge. you probably won’t bill the customer yourself. Type I cards are often flash memory cards. A cable tester will check network cables only to see if they are wired correctly and have continuity. Answer: C. Because light is what affects the drum. Use a power supply unit (PSU) tester to determine why a computer fails to boot. Answer: D. Answer: C. 51. 54. One of culprits could be a faulty power supply. So. 300 MB/s is the data transfer rate of a SATA revision 2. rollers.5 mm thick. also referred to as PCMCIA cards. The front side bus (FSB) is usually four times the base core clock of a motherboard that supports Core 2 CPUs. PC Cards generally max out at 133 MB/s. You could also sing Happy Birthday. If a toner cartridge breaks or forms a crack. the rest of the answers are all tools that are used externally from the computer. then there is no reason to recheck connections or turn the printer on and off.1. use the command ping ::1. Loopback plugs are used to test network cards and serial ports.2 ms. . recycle it and install a new toner cartridge. 16 MB is a common amount of cache memory on a hard drive. A faster solution for laptops.2 ms (milliseconds) is the typical latency of a SATA hard drive. latency is the delay in time before a particular sector on the platter can be read. Maintenance kits are not necessary for new printers. 4. Even if that is your responsibility. too.0. To test IPv4. If you tested it. 56. but that would just be silly. A maintenance kit includes a new fuser assembly.0 hard drive.112 Chapter 4 49. There is no Ping :1 or Ping 127::1 commands. it is usually DRAM. It is directly linked to rotational speed. it has effectively been supplanted by the DMI (on lesser Intel boards) and QPI (on more powerful Intel boards). Type IV cards can support all of the devices mentioned as well. If you have a toner spill or work in a dirty environment. Answer: D. you shouldn’t do so until you have shown the basics of the new printer to the customer. They are required when the printer reaches approximately 200. To test IPv6. Printing a test page is important when first installing a printer and when you finish installing a maintenance kit. it clears the counter of how much ink goes through the cartridge. or Type III PC Cards. it is also expressed as 3.000 pages printed. and more. it might be a good idea. Answer: D. teach the customer how to use it (at least the basics). Cleaning the printer might not be necessary. After installing something for a customer. Unless you are an independent contractor or consultant. whereas the PSU tester is the only one used inside the computer. Type II. They are bigger than Type III cards: 16 mm as opposed to 10. A hard drive with a rotational speed of 7200 RPM has an average latency of 4.0 Gb/s. That would be 1333 MHz in this case.

i5. and Athlon II CPUs. How this would work is you would take the tone generator portion of the tone and probe kit and connect it via RJ45 to the network port in the user’s cubicle. Answer: A. Older single-core CPUs were rated as high as 215 watts. and G34 are all AMD CPU sockets. Multi-core is the technology where a CPU physically contains two or more processor cores. or hundreds. As for the other answers: A PSU tester tests the power supply of a computer. but it usually either means a network patch cable tester or a LAN tester. 58. meaning it can be used to send and receive data. Answer: D. and E. FM1. These are all Pin Grid Array (PGA) sockets. 60. 59. SATA power connections have 3. L3 cache is shared by all of the cores of the CPU. TurboBoost is a basic form of overclocking that Intel allows with many of their processors.3 volt line. but SATA includes the 3. they have a total of 64 KB of L1 cache. and Xeon CPUs. 5. Answer: C. Every core of a Core i5 CPU contains 32 KB of L1 cache. The tone and probe kit allows you to find the network drop in the wiring closet. Switch it on so it creates tone. 128 KB total. There are two core Core i5 CPUs. The AM3. Answers: A. The AM3 is used to house Phenom II. there are four core Core i5 CPUs. There are no negative voltage wires on SATA power connections. The older LGA775 works with Core 2 Duo. For example. Some people consider DRAM to be L4 cache. This is an excellent method when there are dozens. Core 2 Quad.220-801 Practice Exam C 113 57. and 12-volt wires. Answer: C. And like in the question. A multimeter can test any wire’s voltage or AC outlets. (Most PSU testers will have an SATA power port in addition to the main 24-pin power port. which checks the individual wires of longer network cable runs. The FM1 is used with the Llano CPU. Molex power connections use 5 V and 12 V only. Then go to the wiring closet (or network room or server room) and use the probe (an inductive amplifier) to find the tone. The Intel LGA1155 works with Core i3. Intel HT) calculates two independent sets of instructions simultaneously. DRAM is not cache memory. 61. In this scenario you should test the SATA power connector and the main power connector from the power supply with your trusty PSU tester. 63. Hyper-threading (for example. the RJ45 jack should be hot. The thermal design power (TDP) of a CPU is measured in watts. L1 cache (often 32 KB per core) is built in to the CPU. The less the wattage rating. plug it into the patch panel or directly to a network switch. Answer: A.) . Newer Intel CPU designs combine multi-core technology with hyper-threading to allow for even more processing. but there is an actual CPU cache known as L4 used by Xeon and other high-end processors. DRAM is the memory modules you install into the slots in the motherboard. simulating two CPUs. 62. G34 is a replacement of the F socket and is used with Opteron CPUs. the less the computer’s cooling system needs to dissipate heat generated by the CPU. Cable tester is somewhat of a vague term. with 128 KB total L1 cache. Answer: B. C. Once you find the right cable. L2 cache (often 256 KB per core) is built on to the CPU. HyperTransport is a high-speed link between various devices such as the CPU and northbridge on AMD systems. When you return to the user’s cubicle. and older Xeon CPUs. i7. it is also known as on-die. of cables in the wiring closet. You do this by pressing the probe against each of the cables.3. Sempron. a typical Core i5 CPU might be rated at 95 watts.

0 Gbps eSATA is unquestionably on the horizon. No cables can be left hanging or lying on the floor. Answer: C. measured in volts (V).0 Gbps. part of preventative maintenance is to fill the trays. in fact. 6. Of course. Rerun the cables through the walls and ceiling. measured in watts (W). slightly edging out eSATA. Don’t text. However. or use a special conduit to run the cables in a way that is safe. Normally when you maintenance a laser printer. when you finish. are they actually urgent? Determine this. most CRTs come with a built-in onscreen degaussing utility. you will power it down and unplug it before any work begins. 68. 1000BASE-T is a networking connection that offers 1000 Mbps. Answer: A. you should have unplugged the monitor before you opened it. 66. So there is no need to restart the printer. IEEE 1394a is limited to 400 Mbps. if you had USB 3. Your local municipality’s electrical and safety code requires that all cables be installed properly. You should know your circuits in your office. and regardless. the less chance of overloading them. e-mail. and that would be the winner. This in a nutshell is known as cable management. The CRT holds a lethal charge and needs to be discharged before working on it. Answer: B. the full specification calls for a maximum of 3. But a 20-amp circuit can handle a computer or two more. technologies are always coming out with newer versions that are faster and faster. Print a test page after doing preventative maintenance to a laser printer. Bluetooth works best for a direct wireless connection.0. 65. or use the phone while at the job site. external SATA (eSATA) runs at 3. The paper trays probably still have paper in them.114 Chapter 4 64. In the strange case that you get a question like this. which is the fastest of the listed answers. a standard 15-amp circuit might be able to handle three or four computers and monitors. Plus. Degaussing CRT monitors eliminates stray magnetic fields. and then get back to work as quickly as possible. Amperage can be defined as electric current or the movement of electric charge. and IEEE 1284 is the standard for wired parallel port printing. FireWire and IEEE 1394 are effectively the same (IEEE 1394 is the equivalent PC standard). Answer: C. . Everyone has urgent calls sometimes. But. If you connect a power strip or surge protector. 69. USB 2. Circuit breakers. Impedance is the amount of resistance to electricity. your data rate would be 5. Voltage is a representation of potential energy. Wattage is electric power. electrical cable. you simply start it. 70. measured in ohms (Ω). But printing the test page should be last. 67. Answer: B. As of the writing of this book.2 Gbps. And although typical IEEE 1394b devices run at 800 Mbps. Answer: A. Your preventative maintenance will hopefully stave off that dark day. Answer: C. as I mentioned.0 is limited to 480 Mbps. the rate of electric energy in a circuit. For example. The more you know. and outlets all must comply with a certain amount of amps. It is measured in amps (A). But that is only if you can find an IEEE 1394 device that complies with that speed. only a person trained on the repair of monitors should be opening them and even they should be discharging them before commencing work. it is the only wireless connection listed. make sure that it is specified to work with your circuit’s amp rating.0 Gbps. Why would you clean a monitor before working on it? I don’t know. There is also no need to restore a printer to factory settings unless it fails. seems something to do after the work is complete.

so it is incorrect either way. In this scenario it is most likely that the clients are connecting to the printer by IP address. SSH stands for Secure SHell. Some organizations prefer to use IPP instead of UNC paths. By default. T-1 and T-3 lines are dedicated high-speed connections that will not fit the customer’s tight budget. or 3. the moment the new printer is connected to the network. but it doesn’t actually solve the problem! 76. Or if this was meant to be a UNC. Answer: D. HTTPS relies on port 443. Answer: A. Although there is a type of Broadband ISDN. two slashes should be preceded by some kind of protocol such as IPP or HTTP. It would not be necessary to connect utilizing HTTP. The universal naming convention (UNC) \\computername\C$ or \\ipaddress\C$ would be the best option. Also. If the administrator has issues connecting to a network volume with a particular share name. however. Use a simple moist cloth. It is a common standard used for remote printing. Answer D is showing backslashes in the path instead of the proper slashes. IPP stands for the Internet Printing Protocol. Although answer B could be a possibility. The wires inside a PC might be 12 volts direct current (DC). The MAC address of the printer (which might be on a label or can be accessed from the onscreen display) can be plugged into the DHCP server and reserved to a specific IP address. Of course.3 volts. It uses the Secure Socket Layer (SSL) or Transport Layer Security (TLS) protocols to encrypt the connection and make it safe for logins. Soap and water can be used to clean the outside of a computer case. not too wet. the slashes should be backslashes. and it is a broadband Internet solution. and print. the second octet is a 1 instead of a 10. Hypertext Transfer Protocol Secure (HTTPS) is used to make secure connections to websites. Printing the configuration page is great and might help you to figure out what the problem could be. As to the other answers. we go to the router (or other DHCP device) and configure a MAC address reservation. a better option would be to simply configure the printer to use a static IP address. Answer: D. However. renaming the printer with the old name won’t help because the client computers are most likely connecting by IP. The Internet Printing Protocol (IPP) will often be used in this manner. a UNC was the original path that failed. they should use the hidden share. that is designed to handle high-bandwidth applications and is quite expensive. you don’t want to get any liquid inside the printer. 5 volts. Installing cable Internet would be the best solution given the parameters of this scenario. Answer: C. 77. This will cause the clients to fail when attempting to connect. Answer: A. This allows the administrator to connect to the hidden share for the root of C. Answer C isn’t correct syntax. 74. not by name. set a reservation by MAC address. IPP supports access control. 72. and encryption enabling secure printing. it would be more likely to use IPP instead of HTTPS. Homes in the United States are wired for 120 volts alternating current (AC). but instead they begin with the letters ipp. 73. Answer: C. different from the one used by the old printer. ISDN is generally known as a narrowband technology. IPP paths are similar to HTTP paths. and so on. Alcohol will be too strong. this is .220-801 Practice Exam C 115 71. the IP address in answer B is also incorrect. and WD-40 will cause damage in the long run. it is not wise to share the C: drive with a share name called “C. purchases. Answer: C.” 75. To prevent this. In DHCP. it will acquire an IP address from the DHCP server—a new IP address. This can be done by computer name or by IP address. to the new printer. authentication. It is the cheapest of the four technologies listed above.

Home server PCs rely on RAID arrays and powerful network cards. which resolves domain names to their corresponding IP addresses. Addresses assigned to a group of interfaces where the packets are delivered to the first interface only are known as anycast addresses. 79. the 3-prong parts grabber or. or perhaps the burn rate setting was lowered. Kerberos is a network authentication protocol used by various systems including Microsoft domains. virtualization workstations. 78. If the power supply fails to provide clean power to the 3. Backing up the computer’s data is not necessary if you take the right precautions. Overclocking is controlled in the BIOS. compact form factors. 82. 5 V. Make sure the computer is off and unplugged. If the CD burner takes longer to write data than usual. Reduced range could be due to obstruction or distance from the wireless access point. and the loopback address ::1. C.3 V. which allows hosts to print documents to a remote printer without the need for UNC paths. and gaming PCs all require powerful CPUs with multiple cores—as many cores as possible. Examples of unicast IPv6 addresses include Global unicast addresses that begin at 2000. If the power supply fails. Home theater PCs (HTPCs) require surround sound audio. . and possibly TV tuners and video capture cards. Answer: B. The Simple Network Management Protocol (SNMP) can be used to monitor remote computers and printers. 81. a more secure version of FTP that is built on SSH. and there are thresholds in place to stop the CPU from overclocking too far. You should recommend to your co-worker that he unplug the power cord to prevent shorts. These are often the first devices to fail when a power supply starts having intermittent problems. and fast hard drives. dual monitors. which deals with the sending of e-mail. and D. You could also try turning the computer upside down and letting gravity do its thing (if the computer is light enough). You should test this with a power supply tester or multimeter. DNS is the Domain Name System. SMTP is the Simple Mail Transfer Protocol. This requires the installation of SNMP on the appropriate hosts. the CPU would not overclock— quite the reverse. for something nonmetallic. TCP/IP is the entire suite of protocols that we use when we connect to an IP network. SFTP is the SSH File Transfer Protocol.116 Chapter 4 used to make secure remote connections between computers for the purposes of command execution and remote control. The wireless adapter would either work or not work. Always unplug the computer before working on it. and it replaces the deprecated Telnet protocol. Answer: D. it could be because the system is busy doing other tasks. Audio/Video editing workstations rely most on specialized audio and video cards. There are other tools that you can use as well—for example. Unicast IPv6 addresses are addresses assigned to one interface on a host. The other custom PCs are not nearly as reliant on CPUs. it might lose power and turn the computer off altogether. link-local addresses that begin at FE80::/10. Answers: A. IPP is the Internet Printing Protocol. then they will fail frequently. It uses port 22. Answer: C. Definitely do not turn on the computer. 80. HDMI output. Addresses assigned to a group of interfaces where the packets are delivered to all interfaces are known as multicast addresses. It uses port 88. Answers: B and D. An indication of a power supply issue is frequent failure of hard drives. the plastic tweezers. CAD/CAM workstations. and 12 V lines to the hard drives.

SATA Revision 3. When building a new computer. you would most likely start with an internal drive. RAID 1 is mirroring. Although older SLI cards were available for PCI.0 Gb/s data rates. as of the writing of this book. IDE drives are the most well-known for their use of jumpers. (An advanced version of RAID 1 is called disk duplexing when each hard drive in the mirror is connected to its own hard drive controller. Answer: C. This makes it the better choice for audio and video applications and would be the most valid reason why you would select it for a new computer. You should install a PC3-12800 memory module. 86 Answer: D. It is often used in laptops but can be purchased as an external peripheral for PCs as well. 88. However. it requires two disks and is fault tolerant. Because it is not specified. we have to assume that the answer “Tweezers” means metal tweezers.0 uses jumpers.220-801 Practice Exam C 117 83. If the PC works without any errors. you should use those before the extension magnet. It’s the parity information that makes it fault tolerant. Special drive enclosures can be purchased to make a SATA drive hot-swappable. The extension magnet is the best of the listed answers. Just remember to turn off power and disconnect the power cable before attempting this. then all is good. They can too easily damage components on a motherboard or other device. A biometric scanner authenticates individuals by scanning physical characteristics such as fingerprints. You should select a barcode reader. There are many types of image scanners. Answer: C. The touchpad is a device that takes the place of a mouse.0 nor SATA 3. Answer: B.0 (maximum transfer rate of 6 Gb/s or 600 MB/s) can send and receive twice as much data as SATA Revision 2. It requires fours disks and is fault tolerant. Answer: C. 85.) RAID 10 is a stripe of mirrors. multifunction printers have these and allow you to scan in photos or make copies of documents. SATA drives are not hot-swappable by default. Neither SATA 2. However. the technology cannot span different expansion slots. just having an external drive is not a reason to use SATA 3. the customer will end up with a slower computer than they originally started with.0 over SATA 2. The antistatic wrist strap should always be worn. but regardless. That RAM should underclock to match the motherboard. 87. but it is not meant to pick up items.0. . If you install slower RAM such as PC3-8500 (which is DDR3-1066 by the way) or PC3-6400. It is better to use an extension magnet—a tool more conforming to the job—than a metal object. If you don’t have the exact speed RAM. This will read barcodes such as UPC barcodes that have groupings of parallel lines of varying widths. go with a memory module that is one step higher. you will need two identical PCIe (PCI Express) slots. It is not fault tolerant. Pliers are too big and bulky a tool to use in this situation. For SLI to work properly. In fact. meaning that it cannot recreate data after a failure or continue to function after a failure. if you have plastic tweezers or a three-prong pickup tool. most eSATA drives are limited to 3. the best thing to do is to get the closest compatible RAM to the motherboard! Anyways. whether they are internal or external.0 (maximum transfer rate of 3 Gb/s or 300 MB/s). however. RAID 0 is simply striping of data. it’s better to go up one level first. RAID 5 is fault tolerant and allows for striping with parity (given you have three disks minimum to dedicate to the array). Answer: C. 84. You might add an external drive later.

Answer: A. 91. especially if they are not installed or grounded properly. Also. and they would have to be cleaned to fix this problem. Input devices won’t often cause a power issue unless they are active devices. If DHCP and APIPA were both to fail.1. This person will be in charge of starting the documentation process which includes a chain of custody. When this happens. the tracking of evidence and maintaining a chronological log of that evidence. Windows will automatically assign an APIPA address. or any other IP address starting with 169. the DHCP service failed. it should be foremost on your mind. The Windows Internet Naming Service is an older Microsoft service that resolves NetBIOS names to IP addresses. check the power supply next.254. 90. this is taken care of by the USB controller. meaning they plug into an AC outlet. Some mice use double AA batteries that simply need to be replaced. Older ball mice had these. However. DNS deals with resolving domain names to IP addresses.0. it is less likely that the power issue emanates from a cable. the client computer would effectively have an IP address of 0. Or maybe the computer is not connected to the right network. the DHCP server is down. Perhaps the DHCP client service on the client computer needs to be restarted. But once again. Answer: C. Still yet it could be a problem with the server: lack of IP addresses. and preserve data and possibly devices used. which is pretty worthless if that is not your main network number. if the mouse needs to be charged. and D. . there will always be a first responder who is required to identify the issue. it doesn’t affect DHCP. When dealing with prohibited content. report through proper channels. if you already deduced that the wall outlet is not causing a problem. The mouse can move erratically due to an incorrect driver or an uneven surface. it doesn’t affect DHCP address assignment. Optical mice don’t have a trackball. 92.254 network. Now. What went wrong? It could be one of several things. Phone and network cabling can carry power surges and spikes. Remember to visit the manufacturer of the device to get the latest and greatest driver. then the computer wouldn’t be able to get an address on the 169. Finally. then DHCP has failed either at the client or the server.254 network. Answers: A and D. and so on. you would unplug them and check the AC outlet that they are plugged into.127. If a computer is attempting to obtain an IP address automatically and it receives the IP address 169. After checking the wall outlet and power supply. unplug these from the computer when troubleshooting power issues. Both DNS and WINS could fail and a computer could still obtain an IP address from a DHCP server. Newer USB mice won’t either. Since power comes from the AC outlet. like DNS. Older PS/2 mice would not because they used a separate IRQ from the PS/2 keyboard. But optical mice are very sensitive and need to be on an even. (or nothing would be listed in the ipconfig screen) placing the computer in the twilight zone. C. it helps if that surface is nonreflective.0. Answers: A. You should check the wall outlet first if you are dealing with a power issue. Every USB device gets its own resources. That should fix the problem. The computer will be able to communicate only with other computers on the 169. The mouse should not conflict with the keyboard. it should simply stop working.0.254. flat surface.118 Chapter 4 89. If APIPA failed.

Regardless. but this would require more time. By using rounded cables for IDE and for other equipment. Answer: B. it would be better to create more open space around the hard drive—for example. Some systems also have a BIOS configuration jumper that must be moved to another position in addition to removing the battery. Answer: A. and money. Drilling holes in a case is never a good idea. There are usually no RAM jumpers on today’s motherboards. The liquid cooling system answer might have jumped out at you. Answer: B. the more holes you drill. Remove the CMOS battery from the motherboard. RAM contents are emptied. Removing the RAM doesn’t do anything. if a second drive fails. you can create some open space. By default. or you are having any trouble with any of the concepts listed (besides the twilight zone). RAM and power connections should not be removed unless the power has been shut off and the AC cable has been unplugged. The IDE cables are a cheap solution. However. 93. Answers: C and E. 95. you should ask the customer to remove confidential documents. Finally. newer power supplies use rounded power cables for other devices as well. IDE data cables are flat ribbon cables that take up a lot of space. You should install an additional case fan and rounded IDE cables.220-801 Practice Exam C 119 NOTE If you did not understand any of the acronyms used in that explanation. An additional case fan almost always fixes the problem of overheating. this is one method of dealing with customers’ confidential materials appropriately. 96. One hard drive can fail in a RAID 5 array. if you had a RAID 6 array (which includes another parity stripe). liquid cooling is a pretty advanced solution. 94. and clarify customer statements. Liquid cooling systems require space for their various components. the array is toast. Tracking evidence and documenting is part of the concept of chain of custody. with the rounded cables. Normally. . you could lose as many as two disks and still continue to function. and the array will be able to rebuild that drive’s data from the remaining drives. Other ways include avoid arguing. Removing the main power connection from the motherboard will have no effect if the computer was already turned off and unplugged. Not minimizing a customer’s problems is one way to deal with a difficult customer. Now. reporting through proper channels is part of the fundamentals of first response. When the computer is turned off. this will reset any variable settings in the BIOS such as the password and time/date. As for the other answers. However. especially if there was no case fan installed besides the power supply exhaust fan. A passive hard drive cooler is basically a heat sink. then it is a strong indicator that you need to study more. avoid being judgmental. the tougher it will be for hot air to exhaust out of the case properly. That is because the array requires the parity information from all the other disks. where cheaper and easier solutions will probably suffice. but the question states that there is very little open space within the computer case. While it might help a little bit. By the way. effort. In fact.

All DVI ports are video only. it supports higher resolutions. 100. HDMI can accept video and audio signals. 50 GB is the maximum storage capacity of a standard size dual layer Blu-ray disc. Don’t worry. AMD-Vi is the name for AMD chipset virtualization.120 Chapter 4 97. DVI-I accepts analog and digital video signals. . Answer: C. VT-d is the name for Intel chipset virtualization. but do you really have time for that? 98. There could very well be confidential company data on the drive. Remove the hard drive before releasing a computer to a third party. 150 KB/s is the 1x data rate of a CD-ROM drive. HDMI type B is known as double bandwidth.5 MB/s). DVI-D is digital only as you would guess from the D. 99. Answer: C. and DVI-A is analog only. Answer: B. AMD CPU virtualization is named AMD-V. Answers: A and D. the manufacturer of the laptop has plenty of hard drives to make it work! There is no need to remove the LCD or WLAN card because these do not contain confidential information. The default 1x speed of Blu-ray allows a data rate of 36 Mb/s (4. Store the drive in a locking cabinet. 432 Mb/s is the answer at 12x speed. Intel CPU virtualization is named VT-x. You could clean it if you want.

RAM. So. TABLE 5. you survived. and give you some test-taking tips. power supplies and cases. . for example.0 Networking 27% 3. and peripherals. Great work! Now that you have completed the three practice exams. let’s do a little review of the 220-801 domains. but remember there are so many kinds of PC hardware: motherboards.0 Laptops 11% 4.1.0 Printers 11% 5. CPUs.5 CHAPTER FIVE Review of the 220-801 Exams Phew! That was a lot of questions. Review of the Domains Remember that the 220-801 is divided into five domains.1 220-801 Domains Domain Percentage of Exam 1. But PC hardware questions in general should outweigh any of the other domains. input/output devices. hard drives and optical drives. talk about your next steps.0 PC Hardware 40% 2. you will get more networking questions than you will questions about just CPUs. But if you are reading this.0 Operational Procedures 11% Total 100% PC hardware has the majority of questions on the exam. as shown in Table 5. Laptops.

then additional study is probably necessary. Take the exams in flash card mode—Use a piece of paper to cover up the potential answers as you take the exams. and I will do my best to clarify. The bulk of troubleshooting and Windows is reserved for the 220-802 exam. one person may see more questions on.org. . as is security and mobile devices. But it really helps to close any gaps in your knowledge and gives that extra boost for the exam. or doesn’t appear to be technically correct. study them hard. and study all of the objectives. Re-take that exam until you get 100% correct. If something really just doesn’t make sense. It differs from person to person.davidlprowse. Or one person might see more questions on laptops. There are 20 pages of objectives. be ready for any question from any domain. If any questions give you difficulty. answers. Many technicians are great with PC hardware and networking. Because it is randomized. That’s where the test will trip you up. Take the CompTIA A+ Practice Exam—This can also be found at www. say. and it is hardware-based. the final exam score could be in jeopardy. printers than the next person. concepts.org. Here are a couple great ways to study further: . But if a tech is weak in the other three areas.122 Chapter 5 printers. . so this will take a while. is ambiguous or vague. Study all the concepts in each of the domains! Everyone who takes the exam gets a different group of questions. If there are any items in the objectives that you are unsure about. contact me at my website so that I can help you understand them. Review What You Know At this point you should be pretty well versed when it comes to the 220-801 exam. If there are. This helps to make you think a bit harder and aids in committing everything to memory. This is what really can make or break a test score. feel free to contact me at my website (www.comptia. In general. . this exam deals with installation and configuration methods. Go through them one-by-one and checkmark each item that you are confident in. But I still recommend going back through all of the questions and making sure there are no questions. and operational procedures collectively make up a third of the exam. or explanations you are unclear about. Download the A+ 220-801 objectives—You can get these from www. That comes to 33 questions you will see on those subjects.com). To reduce your risk.comptia.

Study the 220-802 questions. DVD-ROM. then return to the 220-801 exams for a review. These scenariobased questions are new to CompTIA exams and will probably be limited in quantity. there is often one answer that is just totally wrong. But some of the questions are not as synergistic. Regardless of the type of question. once you have. but you should be ready and know how to do these things hands-on! When you take the exam. These answers are usually connected within the same concept. you will automatically improve to at least a 33% chance of getting the answer right. Don’t rush it. For example. Remember that the CompTIA tests are designed and double-checked by an entire panel of experts. a question about hard drive technologies might provide four answers: SATA. and VGA—all of which are video ports. scenario-oriented questions that test your knowledge by asking you to click on items. but some have more. and then go take the actual 220-801 test. Approach each question with the same dedication. Let’s list a couple more smart methods you can use when presented with difficult questions: . or navigate through a system. but it has proven very effective with my students and readers. Learn to identify it. While SATA and PATA are definitely hard drive technologies. even if you are not interested in the topic or don’t like how the question is worded. DisplayPort. My recommendation is for you to go through the 220-802 practice exams.Review of the 220-801 Exams 123 . they might have a group of answers that seem at odds with each other. and then return to the 220-801 tests!—This might sound a bit crazy. even if you have to guess. No single question is more important than another. This will be true on the real exam as well. remember to slowly read through the questions and each of the answers. DVD-ROM is not and solid-state is a type of long-term memory storage that might be used as a hard drive technology. NOTE You may also see hands-on. HDMI. click and drag. It’s a big extra step. but I have found that if an A+ candidate has a strong grasp of all A+ topics. More Test-Taking Tips The majority of questions have four multiple-choice answers. PATA. a question about video connectors might provide four answers—DVI. For example. he or she is more likely to pass either one of the exams. and solid-state.

guess. Be logical in the face of adversity. . Register at Pearson Vue (www. Brainstorm before starting the exam . But try not to overthink! Give it your best shot and be confident in your answers. use the time allotted to you to review all of your answers. Get a good night’s rest . Be confident I’ll embellish on these concepts in the final chapter. schedule the exam to commence within a day or two so that you won’t forget what you learned! Registration can be done online. Good luck on your exams! . Don’t let one question beat you! . Taking the Real Exam Do not register until you are fully prepared. Chances are you will have time left over at the end. Bring earplugs . . When you are ready. Use your gut instinct. Use the process of elimination. First-timers will need to create an account with Pearson Vue. Eat a decent breakfast . Show up early . If all else fails. They accept payment by major credit card for the exam fee. so use it wisely. Take small breaks while taking the exam .com). Well. that’s about it for the 220-801 portion of this book. .124 Chapter 5 . If you finish the exam early.vue. Make sure that everything you have marked has a proper answer that makes sense to you. Don’t over-study the day before the exam . Here are some good general practices for taking the real exams: . Pick a good time for the exam . I’ll expand on these points in the final chapter.

0 Operating Systems 33% 2. The four domains of the A+ 220-802 exam and their respective percentages are listed in Table 6.6 CHAPTER SIX Introduction to the 220-802 Exam The CompTIA A+ 220-802 exam covers Windows operating systems.1.1 220-802 Domains Domain Percentage of Exam 1. In this chapter I briefly discuss how the exam is categorized. and then prepare you to take the four 220-802 practice exams that follow this chapter. computer and network security. 22 . mending networking issues. and repairing printers. TABLE 6. you will see approximately 33 questions on Operating Systems. and troubleshooting.0 Troubleshooting 36% Total 100% Chances are that when you take the real CompTIA exam. mobile devices such as tablets and smartphones. Each domain makes up a certain percentage of the test. Exam Breakdown The CompTIA A+ 220-802 exam is divided by domain. fixing computer hardware problems.0 Mobile Devices 9% 4. The largest percentage of the exam will focus on troubleshooting: repairing Windows.0 Security 22% 3. give you some test-taking tips.

You can get them from: http://www. But now that we’re here. This domain expects you to demonstrate how to configure wireless and Bluetooth connections. you’ll see lots of questions on Windows—I guarantee it.0 deals with Windows 7. due to the sheer bulk of the questions you will see. physical and digital prevention methods.0: Security (22%) Security takes on a bigger role every year. and of course secure the devices. 9 questions on Mobile Devices. and XP.0. Each domain has several or more objectives. but I do recommend you download a copy of the objectives for yourself. you have very diminished hopes of passing the exam. Domain 2. map network drives. and how to secure a small office/home office (SOHO) network. There are far too many to list in this book (20 pages or so).org Let’s talk about each domain briefly. Basically. Vista. and how they are utilized. You should understand how to: configure Windows networking technologies such as HomeGroup. how they are configured. permissions. and a whopping 36 questions on Troubleshooting. and virtualization. synchronize data.0 Mobile Devices (9%) Mobile devices such as tablets and smartphones have become so popular that they earned themselves a spot in the 220-802 exam.comptia. and work with firewalls. in all their forms and versions. It covers how the operating systems can be installed.126 Chapter 6 questions on Security. but remember that this domain does not cover Windows troubleshooting—that is left for Domain 4. user accounts and groups.0: Operating Systems (33%) We’ve hardly talked about Windows up until this point. Without good troubleshooting skills and experience. You should know the differences between Android and iOS operating systems and understand the basics when it comes to navigating those systems. This domain deals with common security threats. how to secure a workstation. nowadays careful consideration for security should be applied to anything technology-oriented. . Domain 1. how to dispose of hard drives properly. This domain also covers how to maintain the computer. It’s a lot of information to cram into one domain. Domain 1. create shares. So it stands to reason that troubleshooting should be the most important subject of your studies. Domain 3.

and a lot of that can be attributed to this domain. unfortunately in the IT field. Test-Taking Tips Just like with the 220-801 exams. And it’s those skills that will make you or break you on this exam.” and so on. It’s the most difficult section and. and you will be well on your way to passing the A+ 220-802 exam. (Question the obvious. and becoming a true expert at troubleshooting. Step 6: Document findings. mobile device.” or “how can this be resolved. be confident in your decision. . if applicable.0: Troubleshooting (36%) Here it is: we left the best for last. Stay really focused when dealing with troubleshooting questions.Introduction to the 220-802 Exam 127 Domain 4. and printers. I recommend you take it slow. Step 4: Establish a plan of action to resolve the problem and implement the solution. This will help you to eliminate wrong answers in the search for the correct answer. malware. When you have selected an answer. and outcomes. to troubleshooting Windows. actions. And if it is wrong. implement preventative measures. You’ll know them when you see them—they include real-world scenarios and often end in a phrase such as “what should you do to fix the problem. Step 2: Establish a theory of probable cause. Carefully read through each question. I’d like you to try to incorporate this six-step process into your line of thinking as you read through the practice exams. and whenever you troubleshoot a PC. define why it is wrong. This domain covers it all: from troubleshooting PC hardware and networking issues. attaining your A+ certificate. Master this domain. CompTIA has its own six-step troubleshooting process that you should know. or networking issue: Step 1: Identify the problem. Step 5: Verify full system functionality and. It’s the troubleshooting methodologies that make the ultimate computer tech. Issues can look or act like one thing. Read through all of the answers. Many people agree that the 802 exam is more difficult than the 801 exam. yet be another. the most insidious.) Step 3: Test the theory to determine cause. Look at each answer and think to yourself whether it is right or wrong.

Consider timing yourself. review your answers for accuracy. Be prepared to write things down as you look at the question. Finally. The other exams (Practice Exam B. On the average. and then go ahead and begin the first 220-802 exam! . even if you think you know the concept. which can add insight to the nature of the question. a reader needs 60 minutes to take a 220-801 exam but 90 minutes to take a 220-802 exam. Ready yourself: prepare the mind.128 Chapter 6 Be ready for longer questions. Write down your answers on a piece of paper. It is also designed to be an easier exam than the other three. Don’t skip the explanations. Give yourself 90 minutes to complete each exam. don’t get stuck on any one question. Each exam is followed by in-depth explanations. I’ll have more tips as we progress through the book. Don’t get overconfident if you do well on the first exam because your skills will be tested more thoroughly as you progress. Don’t move on to another exam until you have mastered the first one by scoring 90% or higher. followed by the in-depth answers/explanations. This can help you to organize your thoughts. Each exam gets progressively more difficult. This is due to the complexity of some of the scenarios. When you are finished. This will make you an efficient test-taker and allow you to benefit the most from this book. and I summarize all test-taking tips at the end of this book. as well as help you to answer other similar questions correctly. You will need to imagine yourself within the situation and think how you would approach the problem step-by-step. Be positive that you understand the concepts before moving on to another exam. You can always mark it and return to it later. Getting Ready for the Practice Tests The following four chapters (Ch 7–10) have practice tests based on the 220-802 exam. The first exam (Practice Exam A) is categorized by domain to help you study the concepts in order. That just means you need to study more and try the test again later. Be sure to read them carefully. Keep studying and practicing! After each exam is an answer key. And don’t get too concerned if you don’t score 90% on the first try. and Practice Exam D) are freestyle: questions are mixed up to better simulate the real exam. Practice Exam C. I often add my two cents. It’s allowed on the real exam as well. if there is still time left.

The other three will get progressively harder. 9 questions on Mobile Devices.7 CHAPTER 7 220-802 Practice Exam A Welcome to the first 220-802 practice exam. for a total of 100 questions. and 36 questions on Troubleshooting. After the answer key you will find the explanations for all of the answers. The goal is to make sure you understand all of the concepts before moving on to the next test. You will see 33 questions on Operating Systems. 22 questions on Security. Write down your answers and check them against the answer key. This is the easiest of the four 220-802 exams. This practice exam is categorized in order of the domains. Good luck! . which immediately follows the exam. Take this first exam slowly.

) Quick Answer: 150 Detailed Answer: 152 ❍ A. ❍ A.0: Operating Systems 1. ❍ C. Where is the Notification Area located in Windows 7? ❍ A. ❍ C. DVD-ROM ❍ D. iOS ❍ C. Windows service packs are ___________. ❍ B. which is not a method of installing Windows 7? ❍ A. ❍ B.130 Chapter 7 ✓ Quick Check Practice Questions Domain 1. Android ❍ E. What is the default file system used by Windows 7? ❍ A. ❍ B. CD-ROM ❍ C. USB flash drive ❍ E. ❍ D. Of the following. Windows XP ❍ B. Image 3. ❍ C. Vista ❍ D. Linux ❍ F. Windows 7 2. ❍ D. FAT32 Quick Answer: 150 Detailed Answer: 152 NTFS FAT In the System Properties dialog box Quick Answer: 150 Detailed Answer: 152 In the System32 folder On the Taskbar Within the Start menu 5. Which of the following are Microsoft operating systems? (Select all correct answers. Over the network ❍ B. Detailed Answer: 152 CDFS 4. ❍ D. Quick Answer: 150 A new version of the operating system Resource Kit utilities Compilations of software updates and patches Driver updates Quick Answer: 150 Detailed Answer: 152 .

What would you add to the MMC to populate it with programs? ❍ A.) ❍ A. Which file is the boot loader in Windows XP? ❍ ❍ Quick Answer: 150 256 MB 8. ❍ C. In Windows 7/Vista. ❍ B. What is the minimum amount of RAM needed to install Windows Vista? ❍ A.exe 11. Quick Answer: 150 A. ❍ C. ❍ C. Which file is the boot loader in Windows 7/Vista? ❍ A. Detailed Answer: 152 128 MB 7.220-802 Practice Exam A 131 ✓ Quick Check 6. ❍ B. ❍ B. ❍ D. Ntoskrnl.exe Detailed Answer: 153 BCD Setup. ❍ C.ini ❍ C. ❍ D. Quick Answer: 150 Disk Administrator Disk Management Computer Management Disk Cleanup Quick Answer: 150 Detailed Answer: 153 . What tool enables you to create a partition in Windows? ❍ A. Winload. ❍ B. Boot. an MMC is blank by default.com Quick Answer: 150 Detailed Answer: 153 B. ❍ C. ❍ B. ❍ D. ❍ D. ntldr ❍ D. ❍ D. Ntdetect.exe Ntoskrnl. What is the minimum amount of RAM needed to install Windows 7? (Select the two best answers. 256 MB 512 MB 1 GB Detailed Answer: 152 512 MB 1 GB 2 GB Quick Answer: 150 Detailed Answer: 152 Applets Files Directories Snap-ins 9.exe 10.

❍ B. Computer Management Quick Answer: 150 Detailed Answer: 153 B. Task Manager C. What is the minimum requirement of RAM for Windows XP Professional? ❍ A. ❍ D. ❍ C. ❍ D. ❍ D. Which user account permissions are needed to install device drivers on Windows Vista? ❍ A. Quick Answer: 150 User Guest Administrator Power user Quick Answer: 150 Detailed Answer: 154 . ❍ C. Performance Monitor ❍ D. or restart services? ❍ ❍ ❍ Quick Answer: 150 64 MB 14. ❍ C. ❍ B. ❍ D. Primary Volume Logical drive Detailed Answer: 153 128 MB 256 MB 32 MB Quick Answer: 150 Detailed Answer: 153 Msconfig Task Manager Chkdsk System Information 15. Start > All Programs > Accessories Detailed Answer: 154 Start > All Programs Start > All Programs > Control Panel Start > All Programs > Administrative Tools 17. MMC 16. Which type of partition should an operating system be installed to? ❍ A. Which tool enables you to find out how much memory a particular application is using? ❍ A. ❍ D. ❍ C. Detailed Answer: 153 Extended 13. Where would you go to start. Where is the Windows Update feature located in Windows? ❍ A. ❍ B.132 Chapter 7 ✓ Quick Check 12. ❍ B. ❍ B. Quick Answer: 150 A. ❍ C. stop.

exFAT ❍ D. ❍ C. Which interface should you use to launch the command IPCONFIG? ❍ A. HPFS ❍ C. ❍ D.) ❍ A. Disk Defragmenter ❍ C. Which of the following answers can be used to keep disk drives free of errors and ensure that Windows runs efficiently? (Select the two best answers. Task Scheduler Quick Answer: 150 Detailed Answer: 154 . Quick Answer: 150 Quick Answer: 150 Detailed Answer: 154 A. what would you enter at the command line? (Select the two best answers. NFS 22. To learn more about the DIR command. Which file system can you upgrade it to when using the convert command? ❍ ❍ Quick Answer: 150 DIR HELP 20. ❍ C. Disk Management ❍ B. Check Disk ❍ D. System Restore ❍ E. ❍ B. Which of the following commands creates a new directory in the Windows Command Prompt? ❍ A. A customer’s computer is using FAT32. ❍ C. NTFS B. MD RD SD Detailed Answer: 154 HELP DIR DIR /? DIR ? Quick Answer: 150 Detailed Answer: 154 Command Prompt Control Panel MMC Task Manager 21. ❍ B.) ❍ A. Detailed Answer: 154 CD 19. ❍ D. ❍ B. ❍ D.220-802 Practice Exam A 133 ✓ Quick Check 18.

❍ C. What is Windows 7’s recovery environment known as? (Select the two best answers. ❍ D. ❍ D. The device’s driver has not been installed.log unattend. ❍ B. 28. ❍ C. ❍ B.* c:\test /S /T Quick Answer: 150 Detailed Answer: 155 .* c:\test /T /S xcopy *. ❍ B. Which of the following is not an advantage of NTFS over FAT32? ❍ A. ❍ D. ❍ C. ❍ D.log 25. ❍ B. Which of the following switches (options) copy all files.* c:\test /E xcopy *. A customer’s Device Manager shows an arrow pointing down over one of the devices.* c:\test /S xcopy *. NTFS supports file encryption. NTFS supports more file formats.) ❍ A. Quick Answer: 150 xcopy *. Detailed Answer: 155 NTFS supports larger file sizes. NTFS supports larger volumes. Detailed Answer: 154 WinRE 24.txt 32 GB Quick Answer: 150 Detailed Answer: 155 64 GB 128 GB 192 GB 26. ❍ B. The device is disabled. Recovery Console Advanced Boot Options System Recovery Options Detailed Answer: 155 setuperr. including empty subfolders in the TEST folder? ❍ A.134 Chapter 7 ✓ Quick Check 23. The device is in queue to be deleted. What does this tell you? ❍ ❍ Quick Answer: 150 setupact. ❍ D. What is the RAM limitation of Windows Vista? ❍ A. Which log file contains information about Windows 7/Vista setup errors? ❍ A. Quick Answer: 150 Quick Answer: 150 Detailed Answer: 155 A. 27. ❍ C. B.xml setuplog. ❍ C. folders. and subfolders. ❍ C. The device is not recognized. ❍ D.

Windows 7 Starter B. To create a restore point in Windows 7. Which of the following can you not do from the Printer Properties screen? ❍ A. However. ❍ D. Format the drive ❍ B. ❍ C. What did he forget to do? (Select the three best answers. Windows Vista Business ❍ E. he does not see the disk in Windows Explorer. ❍ D.) Quick Answer: 150 Detailed Answer: 155 ❍ A. You are setting up auditing on a Windows Vista Business computer. Run FDISK ❍ D. Run the Disk Cleanup program from the System Tools menu 32. ❍ B. Windows 7 Ultimate ❍ C. ❍ C. Run the System Restore program from the System Tools menu ❍ D. Windows Vista Home 31. Set up the drive in the BIOS 30. Partition the drive ❍ C. If it’s set up properly.) ❍ ❍ Quick Answer: 150 Detailed Answer: 155 A. Run Disk Defragmenter from the MMC Quick Answer: 150 Detailed Answer: 155 B. which log should have entries? ❍ A. Initialize the drive ❍ E. Quick Answer: 150 Application log System log Security log Maintenance log Quick Answer: 150 Detailed Answer: 155 . Windows XP Professional ❍ D. ❍ B.220-802 Practice Exam A 135 ✓ Quick Check 29. Detailed Answer: 155 Modify spool settings Add ports Pause printing Enable sharing 33. Run NTBackup from the Control Panel C. Which of the following Windows editions do not include Aero? (Select the two best answers. what must you do? ❍ ❍ ❍ A. A co-worker just installed a second hard disk in his Windows 7 computer.

or use Run As? ❍ Quick Answer: 150 Quick Answer: 150 Detailed Answer: 156 A. ❍ C. ❍ D. Which type of virus propagates itself by tunneling through the Internet and networks? ❍ A. VNC 36. When you connect to a website to make a purchase by credit card. as administrators without having to switch users. you want to make sure the website is secure. What can you do to secure your WAP/router? (Select all that apply. USB ❍ D. Look for the padlock (in the unlocked position) toward the top or bottom of the screen ❍ C.) ❍ A. ❍ D.136 Chapter 7 ✓ Quick Check Domain 2. ❍ B. UAC ❍ C. ❍ B. Quick Answer: 150 Detailed Answer: 156 Change the default SSID name Turn off SSID broadcasting Enable DHCP Disable DHCP 37. log off. Which component of Windows 7/Vista enables users to perform common tasks as non-administrators and. Look for the protocol HTTPS in the address or URL bar Quick Answer: 150 Detailed Answer: 156 . when necessary. Look for the protocol HTTP in the address or URL bar ❍ D. What are two ways you can tell whether a site is secured? (Select the two best answers.) ❍ A. Detailed Answer: 156 Macro Phishing Trojan Worm 35. USMT ❍ B. ❍ C. Look for the padlock (in the locked position) toward the top or bottom of the screen ❍ B.0: Security 34.

Spoofing 42. Which of these is the most secure password? ❍ A. Detailed Answer: 156 Firewall software 39. Which of these is an example of social engineering? ❍ A. ❍ C. Which type of software helps protect against viruses that are attached to e-mail? ❍ A. Phishing C. ❍ D. Making data appear as if it is coming from somewhere other than its original source is known as what? ❍ ❍ ❍ Quick Answer: 150 Using someone else’s unsecured wireless network 40. A fingerprint reader is which type of security technology? ❍ A. ❍ D. Biometrics Detailed Answer: 157 Smart card Barcode reader SSID 43. ❍ D.220-802 Practice Exam A 137 ✓ Quick Check 38. Quick Answer: 150 marquisdesod Marqu1sDeS0d MarquisDeSod Marqu1s_DeS0d Quick Answer: 150 Detailed Answer: 157 . Quick Answer: 150 Quick Answer: 150 Detailed Answer: 157 A. ❍ B. ❍ D. Antivirus software Windows Defender Hardware firewall Asking for a username and password over the phone Detailed Answer: 157 Hacking into a router A virus On routers Quick Answer: 150 Detailed Answer: 157 On servers On clients On every computer 41. ❍ C. Hacking B. ❍ B. ❍ B. ❍ C. ❍ B. Where are software-based firewalls usually located? ❍ A. ❍ D. ❍ C. ❍ C. Cracking ❍ D. ❍ B.

Detailed Answer: 157 Windows+R 45. ❍ D. WPA 48. Which technology should you select? ❍ A. ❍ B. A customer’s Windows Vista computer needs a new larger. WEP B. Ctrl+Alt+Del Windows+M Windows+L Detailed Answer: 157 FTP VLAN HTTP FAT Quick Answer: 150 Detailed Answer: 157 FAT16 NTFS FAT32 47. Which term refers to when people are manipulated into giving access to network resources? ❍ A. faster hard drive.138 Chapter 7 ✓ Quick Check 44. ❍ C. How secure is the customer’s data? Quick Answer: 150 Detailed Answer: 158 . Which shortcut key combination immediately locks Windows? ❍ A. Quick Answer: 150 Quick Answer: 150 Detailed Answer: 158 A. ❍ D. ❍ B. ❍ B. Another technician in your company installs the new drive and then formats the old drive before delivering it to you for disposal. ❍ C. ❍ D. ❍ D. ❍ B. You are required to set up a secure connection between two offices over the Internet. Which is the most secure file system in Windows? ❍ A. ❍ C. ❍ C. WPA2 C. Quick Answer: 150 Detailed Answer: 158 Hacking Social engineering Phishing Cracking 49. TKIP ❍ D. Which of the following is the most secure for your wireless network? ❍ ❍ ❍ Quick Answer: 150 VPN 46.

220-802 Practice Exam A 139 ✓ Quick Check ❍ A. ❍ D. Quick Answer: 150 Connect to the Internet with a browser Send e-mail with Outlook Log on to Instant Messenger Install programs Quick Answer: 150 Detailed Answer: 158 . Spyware Worms Adware NTFS Encrypted passwords HTTP Quick Answer: 150 Detailed Answer: 158 SSL Putty Kerberos Use of RAID Quick Answer: 150 Detailed Answer: 158 Password length Router passwords Use of a password to log in 54. ❍ C. Which of the following offers hardware authentication? ❍ A. Detailed Answer: 158 Grayware 51. ❍ D. ❍ B. Which of the following can a limited account not perform? ❍ A. ❍ B. Which of the following is a common local security policy? ❍ A. Which protocol encrypts transactions through a website? ❍ A. ❍ B. ❍ B. ❍ D. Completely unsecure Very unsecure Secure Completely secured 50. ❍ C. ❍ C. ❍ B. Which type of malicious software types will create multiple popups on a computer? ❍ A. ❍ B. ❍ D. Quick Answer: 150 Smart card 52. ❍ D. ❍ D. Detailed Answer: 158 Strong passwords 53. ❍ C. ❍ C. ❍ C.

❍ C. ❍ C. yet a tablet does not? ❍ A. ❍ C. Android Quick Answer: 150 Detailed Answer: 159 B. ❍ D. ❍ D. ❍ D. ❍ B. ❍ B. ❍ B. Core i5 ARM FX Quick Answer: 150 Detailed Answer: 159 Standard A USB Mini-A USB Standard B USB Micro-B USB 59. Quick Answer: 150 Detailed Answer: 158 Worm Spam Trojan Spyware Domain 3. Windows Mobile 57.140 Chapter 7 ✓ Quick Check 55. Quick Answer: 150 Mouse Display Keyboard Wireless network adapter Quick Answer: 150 Detailed Answer: 159 . Which of the following does a laptop have. Detailed Answer: 159 Phenom II 58. Windows CE ❍ D. What is a common CPU for a tablet computer? ❍ A. ❍ D. A co-worker downloads a game that ends up stealing information from the computer system. Which of the following is an open-source operating system? ❍ ❍ A. ❍ C. Which of the following is a common charging port on an Android smartphone? ❍ A. ❍ B. iOS ❍ C. What is this? ❍ A.0: Mobile Devices 56.

Detailed Answer: 159 Android Market 61. Where can you obtain applications for mobile devices? (Select all that apply. App Store Google Play iTunes Gyroscope Detailed Answer: 159 Accelerometers Geotracking Quick Answer: 150 Detailed Answer: 159 GPS Screen orientation Passcode locks Gmail 63. ❍ D. Y. Contacts B. ❍ B. Which of the following are wireless connections to the Internet that you would commonly make use of on a smartphone? (Select the two best answers. GSM Bluetooth Wi-Fi Fiber optic Quick Answer: 150 Detailed Answer: 159 . Which of the following makes use of the X. You need to locate a mobile device that was stolen.) ❍ A. Databases 64. ❍ B. ❍ D. E-mail ❍ D. ❍ C. Which technology can aid in this? ❍ A. ❍ D. Which kinds of data would you synchronize on a smartphone? (Select the two best answers. ❍ C. and Z axes? ❍ A.) ❍ ❍ Quick Answer: 150 Lock Rotation 62. ❍ B. Word docs ❍ C. ❍ C. ❍ D.220-802 Practice Exam A 141 ✓ Quick Check 60. Quick Answer: 150 Quick Answer: 150 Detailed Answer: 159 A.) ❍ A. ❍ B. ❍ C.

What is the second step of the A+ troubleshooting methodology? ❍ ❍ A. What should you do first before making any changes? ❍ A. Reinstall the video driver 66. Test the theory ❍ D. and then select Safe Mode 68. What should you check first? ❍ Quick Answer: 150 Detailed Answer: 160 A. Check whether the monitor is connected to the computer ❍ B. He guesses that a problem exists with the video driver. How should he boot his Windows XP system to bypass the video driver? ❍ A.142 Chapter 7 ✓ Quick Check Domain 4. Check whether the monitor is on ❍ C. ❍ D.0: Troubleshooting 65. What should you do next? ❍ A. A user hands you her laptop in the hopes that you can repair it. When you examine the computer. ❍ D. and then select Safe Mode Press F1 Quick Answer: 150 Detailed Answer: 160 Back up the important data Reinstall the operating system Open the laptop and analyze the components inside Modify the Registry 69. Quick Answer: 150 Bill the customer Move on to the next computer Document your solution Run Disk Defrag Quick Answer: 150 Detailed Answer: 160 . ❍ B. You successfully modified the Registry on a customer’s PC. ❍ C. Identify the problem Quick Answer: 150 Detailed Answer: 160 B. ❍ B. Check whether the computer is plugged in ❍ D. ❍ B. Establish a probable cause ❍ C. Press F6 Press Ctrl. At the beginning of the workday. you notice that nothing is on the display. ❍ D. ❍ C. Detailed Answer: 160 Press F8. ❍ C. Now the customer’s system gets onto the Internet normally. Document 67. a user informs you that the computer is not working. Bob is having an issue with his display.

Which of these is part of step five of the CompTIA A+ troubleshooting process? ❍ Quick Answer: 150 Quick Answer: 150 Detailed Answer: 160 A. ❍ C. The computer is attempting to boot off of the network. The monitor is not connected to the PC. ❍ B.EXE SYSEDIT. Buzz gets an error that says “Error log full.220-802 Practice Exam A 143 ✓ Quick Check 70. Upon closer inspection. you can hear the hard drive spinning. 73. Quick Answer: 150 Device Manager System Information Recovery Console Event Viewer Quick Answer: 150 Detailed Answer: 161 . You start a new computer and nothing seems to happen. however. ❍ C. The customer also tells you that there are numbers counting upward when the computer beeps and then freezes. Identify the problem ❍ B. ❍ B. He would like you to turn them off permanently. Quick Answer: 150 Detailed Answer: 160 MSCONFIG. 71. A customer reports that when his computer is turned on the screen is blank except for some text and a flashing cursor. Implement preventative measures 72. ❍ B. Detailed Answer: 160 The monitor is not on. The video card is not properly seated. ❍ D. The OS is corrupted. Detailed Answer: 160 Computer has faulty memory.EXE IPCONFIG /RELEASE Task Manager 74. Establish a new theory ❍ D. Document findings ❍ C. Which of the following is the most likely cause of this problem? ❍ A. The PC is not connected to the AC outlet. nothing is coming up on the monitor. ❍ C. ❍ D. There is a corrupt MBR. Which tool should you use to do this? ❍ A. ❍ D.” Where should you go to clear his Error log? ❍ A. ❍ C. ❍ D. Jake’s Windows Vista computer has several programs running in the system tray that take up a lot of memory and processing power. ❍ B. Which of the following would not be a reason for this? ❍ A.

Detailed Answer: 161 Xcopy 78. ❍ C.1 PING 1.0. ❍ D. ❍ B. Toggle the function key for the display C. ❍ D. ❍ C. Joey runs the command ipconfig and sees that the IP address his computer is using is 169. The computer cannot access the POP3 server. Check the power to the projector 77. What can he conclude from this? ❍ A. Which tool checks protected system files? ❍ A. and suddenly it cannot connect to the Internet. Detailed Answer: 161 WinRE Recovery Console Advanced Boot Options System Restore 76. 79.50. ❍ B. ❍ C. Which of the following commands pings the loopback address? ❍ A.127 PING \\localhost Quick Answer: 150 Detailed Answer: 161 . Replace the video cable to the projector B.0.68. Joey’s computer was working fine for weeks.0. What would you need to access to boot the computer into Safe Mode? ❍ A. The computer cannot access the WINS server.0.144 Chapter 7 ✓ Quick Check 75. ❍ B. ❍ B. ❍ C.0. Quick Answer: 150 PING 127. ❍ D. The computer cannot access the DNS server. Put a new bulb in the projector ❍ D. A customer is trying to use a laptop with a video projector and cannot get the projector to display the computer screen. ❍ D. Which of the following should you attempt first? ❍ ❍ ❍ Quick Answer: 150 Quick Answer: 150 Detailed Answer: 161 A.0. Chkdsk Scandisk SFC Quick Answer: 150 Detailed Answer: 161 The computer cannot access the DHCP server.1 PING 10.254.

however. ❍ D. Speaker connector is in the wrong jack. Mary installed a new sound card and speakers. Check for damaged rollers. ❍ C. Quick Answer: 150 Detailed Answer: 162 . Windows does not show the format option in Disk Management. 83. ❍ C. the laptop appears to be stopping after the POST. ❍ B. Check for a damaged primary corona wire. What could the problem be? (Select all that apply. ❍ B. Clear the paper path. What could cause a ghosted image on the paper outputted by a laser printer? ❍ A. Quick Answer: 150 Speaker power is not plugged in. What did Len forget to do first? ❍ Quick Answer: 150 Quick Answer: 150 Detailed Answer: 161 A. Sound card is plugged into the wrong slot. Which of the following will aid you while troubleshooting? ❍ A.) ❍ A. ❍ B. ❍ C. ❍ D.) ❍ A. ❍ D. Len tries to format the drive. ❍ B. After installing a new hard drive on a Windows computer. she cannot get any sound from the speakers. However. Defragment the drive ❍ D. A laptop with an external USB hard drive and an external monitor is not booting from the internal drive. ❍ D.220-802 Practice Exam A 145 ✓ Quick Check 80. Quick Answer: 150 Detailed Answer: 162 Transfer corona wire Primary corona wire Pickup rollers Photosensitive drum 84. Run CHKDSK ❍ B. Copy system files 82. Partition the drive ❍ C. How can a paper jam be resolved? (Select all that apply. Power has been verified and the battery is fully charged. Detailed Answer: 161 Use the right type of paper. ❍ C. Sound card driver is not installed. Detailed Answer: 161 Turn off the external monitor Disconnect the external monitor Remove the laptop battery Format the external USB hard drive 81.

Quick Answer: 150 Davidprowse. ❍ C. 89.25. Which of the following are possible causes? (Select the two best answers. Incompatible hardware device. The DNS server is down. What is the most likely cause? ❍ A. In the Device Manager. Ray’s computer is running Windows. you notice that the NIC has a black exclamation point. ❍ C. ❍ B. B. Detailed Answer: 162 The wireless card drivers are not installed. 86. IRQ conflict. The device isn’t on the hardware compatibility list.73 but cannot ping Davidprowse. The wireless card is disabled in bios. ❍ B. When you reboot a computer.148. ❍ D. What is the most likely the cause? ❍ A. The hard drive is not jumpered properly. ❍ C. There is no active partition. ❍ D. Just yesterday the laptop was able to connect to wireless networks. press any key to reboot. ❍ B. Quick Answer: 151 Detailed Answer: 162 The device is disabled. The DHCP server is down.11 n/g card is unable to connect to any wireless networks.com is 63.25. 88. The wireless hardware switch is turned off. Virus in the MBR. 87.com.73.” What is the most likely problem? ❍ ❍ ❍ Quick Answer: 150 Quick Answer: 150 Detailed Answer: 162 A. THE ADDS server is down. you get a message stating “No OS present. ❍ D. the computer you are working on displays a blue screen of death (BSOD) when rebooting. The hard drive is not getting power. Detailed Answer: 162 BIOS needs to be flashed to the latest version. ❍ D. ❍ B. The wireless card firmware requires an update. ❍ C. After you install Windows.146 Chapter 7 ✓ Quick Check 85. What does this tell you? ❍ A. You can ping the IP address 63. The IP address of Davidprowse.148. ❍ D. The device is malfunctioning. C. The hard drive driver is not installed. Quick Answer: 151 Detailed Answer: 163 .) ❍ A.com is down. A laptop with an integrated 802. The device is infected with malware.

The version of Windows installed 94. Detailed Answer: 163 Test the theory to determine cause 91. ❍ B. ❍ C. ❍ C.220-802 Practice Exam A 147 ✓ Quick Check 90. ❍ C. but it doesn’t recognize the specific CPU that was just installed. Quick Answer: 151 Quick Answer: 151 Detailed Answer: 163 A. ❍ D. Which command displays a network interface card’s MAC address? ❍ A. ❍ B. ❍ C. it recognizes it as a generic CPU. What is the fourth step of the CompTIA 6-step troubleshooting process? ❍ A. A newly built computer runs through the POST. Which Windows Vista System Recovery Option attempts to automatically fix problems? ❍ A. ❍ B. Whether the CPU is seated properly ❍ B. Whether it is the correct CPU for the motherboard ❍ D. ❍ D. In which troubleshooting step should you perform backups? ❍ A. What is the first thing to check? ❍ Quick Answer: 151 System Restore 92. Identify the problem Verify a full system functionality Document findings actions and outcomes Detailed Answer: 163 Startup repair Complete PC Restore Recovery Console Quick Answer: 151 Detailed Answer: 163 Identify the problem Establish a theory of probable cause Establish a plan of action Document findings 93. ❍ D. ❍ B. Ping Ipconfig/all Ipconfig Ipconfig/release Quick Answer: 151 Detailed Answer: 163 . Instead. ❍ D. The version of the firmware for the motherboard ❍ C.

Detailed Answer: 163 NIC driver 98. How can the signal strength be improved? (Select the two best answers. ❍ B. ❍ B. Download the latest BIOS for the laptop 97. ❍ A. Quick Answer: 151 Driver failure Memory failure Hard drive failure CD-ROM failure Quick Answer: 151 Detailed Answer: 164 . A computer cannot get on the Internet.148 Chapter 7 ✓ Quick Check 95. The laptop is on the first floor of a house. Detailed Answer: 163 Reload the printer drivers Stop and restart the print spooler Replace the printer cable Print and internal test page 96. Disk defrag Patch cable Firewall settings Quick Answer: 151 Detailed Answer: 163 Registry Event Viewer Windows Update Recovery Console 99. ❍ C. Move the WAP from the basement to the first floor ❍ C. A customer reports that print jobs sent to a local printer are printing as blank pieces of paper. ❍ B. ❍ D. Signal strength for a laptop’s wireless connection is low (yellow in color and only one bar). A blue screen is most often caused by ____________. ❍ B. The wireless access point (WAP) is in the basement.EXE? ❍ A. ❍ C. Download the latest driver for the NIC ❍ D. ❍ D. what is the first thing you should check? ❍ A. Use a WAP signal booster ❍ B. ❍ D. ❍ D. Which utility enables you to troubleshoot an error with a file such as NTOSKRNL. What can help you to determine the cause? ❍ A. ❍ C.) ❍ Quick Answer: 151 Quick Answer: 151 Detailed Answer: 163 A. ❍ C.

220-802 Practice Exam A 149 ✓ Quick Check 100. Run the installer as an administrator Contact the program’s manufacturer Reinstall Windows XP on the computer Upgrade to Windows 7 Quick Answer: 151 Detailed Answer: 164 . ❍ B. Which of the following is the next step? ❍ A. ❍ C. A technician is installing a program on a Windows 7 computer and the installation fails. ❍ D.

B 8. C. A 68. C. A. A 41. A. C 60. B. C 46. B. C 61. B. A 50. B. C 34. A. C 4. and D 58. A. and D 27. D 87. A and C 6. A 21. B 81. B 9. A 85. B 23.150 Chapter 7 Quick-Check Answer Key 1. B 80. A 11. B. B 45. A 74. B 19. C 55. D 56. A and D 66. A 44. D 79. D 70. A 71. B 53. B 47. D 15. C 62. C 84. A 13. B 64. C 86. A 42. B 40. A 2. A 22. C 32. A. A 49. B 31. C 57. A and C 7. B 78. A 39. and D 3. D 26. C 38. C 33. C 35. B 77. D 37. B 76. D 73. A 16. B and C 48. D 72. B 24. C and D 36. and D 65. A 5. D 20. D 83. A. D 28. A and D 52. B 43. B 82. A 10. C 75. D 14. C 18. and C 25. A and C 59. B and C 51. C 12. C 69. B 67. C 54. C 29. A and D . and F 30. D 63. D 17.

A 90. C 151 . A 95. A 91. C 97.220-802 Practice Exam A 88. C 94. B 98. B 96. D 100. B 99. B 89. A and B 92. C 93.

and Windows 8 are different “versions”. You don’t add actual files or directories (folders) to . Microsoft releases many patches for its operating systems and normally bundles these bug fixes and security patches together as service packs. The System Properties dialog box contains configuration tabs for the computer name and network. 6. Service packs are updates. and so on. Windows 7 64-bit requires 2 GB of RAM.exe. it would be by DVD-ROM. Answer: C. 7. Windows 7 32-bit requires 1 GB of RAM. Windows 7. 4.152 Chapter 7 Answers and Explanations Domain 1. less desirable file systems that offer less functionality and less security and access smaller partition sizes. The only answer listed that is not an option for installing Windows 7 is CD-ROM. Some people refer to each program in the Control Panel as an applet. deployed as an image. And they cost money. The System32 folder resides within the Windows folder. which are free. 8. iOS is the operating system Apple uses on its mobile devices. If you wish to install Windows 7 by disc. Windows Resource Kits are usually a combination of a book and disc that offer advanced technical guidance for the operating system. but that is only a small portion of what they do. CDFS is the file system used by an optical disc. The MMC (Microsoft Management Console) is a blank shell until you add snap-ins (such as Computer Management or the Performance Monitor) for functionality. FAT and FAT32 are older. The 32-bit version can run on a 32-bit or 64-bit CPU.exe. C and F. system restore. New versions of operating systems are just that: Windows Vista. You can access any of the tabs in that dialog box quickly by going to Start > Run and typing systempropertiescomputername. Android is the competitor of iOS and is an opensource operating system used on many other manufacturers’ mobile devices. The Start menu gives access to most programs and configurations in Windows. The Notification Area (also known as the system tray) is the area toward the bottom-right of your screen within the taskbar. The 64-bit version runs on a 64-bit CPU only. Answers: C and D.0: Operating Systems 1. Service packs might include driver updates. Answers: A. Android is developed from Linux.exe. Windows 7 can be installed over the network. and more. Windows Vista requires a minimum of 512 MB of RAM for installation. The New Technology File System (NTFS) is the default file system used by Windows 7. Answer: B. Answer: C. open-source platform. it contains the critical Windows system files such as ntoskrnl. systempropertiesadvanced. hardware. Answer: C. the term was made famous by Apple. 5. It contains the time and any applications (shown as icons) currently running in memory. Answer: D. Windows XP. The original Linux was made for PCs with the goal of being a freely accessible. Windows Vista.exe as well as applications such as cmd. and Windows 7 are all Microsoft operating systems that you should know for the exam. and installed from USB flash drive if you really want to! 3. Answer: C. Microsoft recommends 1 GB of RAM. Okay. that was an easy one…moving on! 2.

Then click the Disk Management icon. and formatting of partitions and logical drives. 14. 15. Answer: C. via a click of the Processes tab. 10.exe is the Windows boot loader program for Windows 7 and Vista. pressing Ctrl + Shift + Esc. The MMC acts as an index for your programs and remembers the last place you were working (if you save it). you can also use an extended partition. Any drive that you click on in Windows that has a drive letter is known as a volume.com detects hardware installed on the system. Disk Administrator is a much older version of this program used in older. which is then broken up into logical drives. and the software environment. you add other programs within Windows. or pressing Ctrl + Alt + Del and selecting Task Manager. An OS should always be installed to a primary partition. Bootmgr is the first file to load in Windows 7/Vista. NTdetect. to view all current processes that are running and see how much memory each of them uses. Windows XP Media Center. and 7. The Task Manager can be opened by right-clicking the Taskbar and selecting Start Task Manager. but 64 is the bare minimum needed to run the system. Ntoskrnl. Primary partitions are the first partitions created on a disk. It works in conjunction with the Bootmgr file (Windows Boot Manager) to take the place of ntldr. components. A hard disk can have four primary partitions maximum. 13. The Task Manager enables you. right-click Computer and select Manage. Answer: A. Msconfig is a utility in Windows that allows you to enable and disable applications and services and boot Windows in different modes. 9. Chkdsk is a Command Prompt utility that will search for errors and fix them (with the /F or /R switches). Boot. however.ini. Ntoskrln. The System Information tool gives a summary of hardware resources. Windows will automatically set the partition to active for you. Winload.exe is the core operating system file of Windows XP. You can start.ini contains a menu of operating systems that can be selected and booted to. Answer: B. and restart services within Computer Management > Services and Applications > Services. Windows XP Home and Professional versions need only 64 MB to be installed. You can also open Services from Start > All Programs > Administrative Tools or by going to the Run prompt and typing services. it is the successor to boot. 11. Setup.msc. To view this application. the system would crash and the file would have to be replaced or repaired. Vista. The Task . stop. the primary partition should be set to active. 12. deletion. Answer: B. ntldr is the first file to be loaded from the hard drive when the computer is started and is known as the boot loader. It reads the BCD and displays an OS menu (if there is more than one OS). right-click the service in question and configure it as you wish. going to Run and typing taskmgr. but before installing the OS. Answer: A. each with its own drive letter. Disk Cleanup is a built-in Windows program that can remove temporary files and other data that you probably won’t use. Disk Management is a tool found in Computer Management and allows for the creation. The BCD is the Boot Configuration Data store.exe is the main system file of Windows—without it. From there. unsupported versions of Windows. Answer: A. If you need to subdivide the hard drive further. Answer: A. Microsoft recommends more. requires 256 MB of RAM. it can be opened by going to Run and typing msinfo32. If you are installing to a new hard disk.exe is the default name of the file that starts installations of Windows and many other programs.220-802 Practice Exam A 153 the MMC. In Windows XP.

You can open the Command Prompt in a variety of ways. Answer: B. However. 17. NFS is the Network File System. Disk Defragmenter keeps Windows running more efficiently by making the files contiguous. HPFS is the High Performance File System developed by IBM and is not used by Windows. You can open the default Command Prompt by going to Run and typing cmd. and the networking connection. Windows Update is simply located in Start > All Programs. DIR ? would attempt to find information about ?. The Power User group is an older group from the Windows XP days that was carried over to Windows 7/Vista. right-click it and select Run as Administrator. Check Disk checks the hard drive for errors. 21. Standard user. Depending on the version of Windows. The MMC is the Microsoft Management Console. Convert is used to upgrade FAT and FAT32 volumes to NTFS without loss of data. that is what the CompTIA A+ objectives calls for you to know: each of the individual programs in the icons view of Control Panel. 18. RAM. something you might see in a storage area network. MD is short for make directory and is the command to use when creating directories in the Command Prompt. Answers: A and D. Answer: B. Use the Command Prompt to launch the command IPCONFIG. you could type CMD in the search field and then press Ctrl + Shift + Enter. to run it as an administrator. You can also access it from the Control Panel if you have the Control Panel configured as Large icons. accounts cannot install drivers or programs. and SD deals with memory cards and is not a valid command in the Command Prompt. type the command and then /?. it might be in a slightly different location within All Programs. From here you can restore the system. Both tools can be found in Start > All Programs > Accessories > System Tools.154 Chapter 7 Manager is a tool that allows you to see which applications and processes are running and analyze the performance of the CPU. The administrator is the only account level that can install device drivers.exe or by going to Start > All Programs > Accessories. The Task Scheduler (previously Scheduled Tasks). IPCONFIG is a networking command that will display the configuration of your network adapter. or Classic view. Answer: A. Answers: B and C. Answers: B and C. Performance Monitor analyzes the computer in much more depth than the Task Manager. 19. Answer: A. and XP. as the name implies. Or. fix file . exFAT (FAT64) is especially designed for flash drives. Answer: C. many commands require you to open the Command Prompt as an administrator. DIR HELP would attempt to find the file ‘HELP’ within the current directory. To learn more about any command. 20. CD is change directory. but that is the default for Windows 7. Disk Management is used to partition and format drives. By the way. 16. The Windows 7 (and Vista) recovery environment (WinRE) is also known as System Recovery Options. RD is remove directory. At this point. but it has no real power in those operating systems. which is the index that can store other console windows such as Computer Management. 22. lowering the amount of physical work the hard drive has to do. 23. enables you to set what time you want particular tasks to run. Vista. or type HELP DIR. Small icons. and especially guest. System Restore allows you to take a snapshot of the OS. enabling you to revert to older settings if something goes wrong.

NTBackup is the backup program included with Windows XP.txt records events that occurred during the text portion installation of Windows XP. All the rest of the listed answers include Aero. 30. Setuplog. Windows 7 Starter and Windows XP Professional. you get the directory structure but no files are copied. . In Windows XP it is indicated with a red X. There are some versions of Windows 7 that can access a maximum of 192 GB of RAM. All the others can be modified from the Printer Properties screen. Answer: D. subdirectories. Windows 7 Starter is a very basic. And remember that *. directories. NTFS has the advantage: it supports file encryption in the form of EFS and BitLocker. /S will copy files. directories. OS. 32. Answer: C. which is available in 7/Vista/XP. In special cases a hard disk might require special drivers. Windows 7/Vista does not have a text portion during installation. and work in an unprotected Command Prompt.* means all the files within a particular directory. This is the only listed similarity between the two. and supports much larger volumes. and 32-bit only. Disk Cleanup removes unwanted junk from the system such as temporary files. not a hardware limitation. Be sure to check out the xcopy help file for more on its switches. Answer: C. Answer: C.log contains information about setup errors during the installation of Windows 7/Vista.220-802 Practice Exam A 155 errors. 24. This is a software limitation. the device would most likely be sitting in a category called Unknown Devices. so no version of Windows XP had it. and D. Setuperr. If the device is not even recognized by Windows. partition. 26. Answer: C. it will not show up on the list or will show up under Unknown Devices. Otherwise. 31.xml is the answer file used by Windows 7/Vista during unattended installations. you must go to Disk Management and initialize. There is no queue to be deleted. Setupact. Answer: C. 29. software is always far more limited. The Recovery Console is the predecessor of WinRE. Advanced Boot Options is the menu that can be accessed by pressing F8. Answers: A. Aero was released with Windows Vista.log contains the events that occurred during the installation. supports larger file sizes. In many cases. Pausing printing in general and pausing individual documents is done by double-clicking on the printer in question and making the modifications from the ensuing window. If the driver had not been installed. /E is needed to copy the files. 128 GB is the limit of RAM that Windows Vista can access. A file size of 0 bytes indicates no errors during installation. and format them. 28. including empty subdirectories. Answer: B. It is also referred to as ABOM. System Restore is the tool used to create restore points. it can easily be enabled by right-clicking it and selecting Enable. but not empty subdirectories. 27. Unattend. If you add /T on to the end. The disk defragmenter is used to fix hard drives that have become slow with fragmentation. FDISK is an older DOS command. B. Even though 64-bit CPUs can address a realistic maximum of 256 terabytes (TB). Start with this log file when troubleshooting. 25. available in Windows XP. In Windows 7 it can be found in Start > All Programs > Accessories > System Tools. Answers: A and C. and subdirectories. Today’s computers’ BIOS should see the drive automatically with no configuration needed. For secondary drives. The arrow pointing down tells you that the device is disabled in Windows 7 and Vista. NTFS and FAT32 support the same number of file formats.

The padlock in the locked position tells you that the website is using a secure certificate to protect your session. Hypertext Transfer Protocol Secure (HTTPS) also defines that the session is using either the Secure Sockets Layer (SSL) protocol or the Transport Layer Security (TLS) protocol. A system maintenance log can be used to record routine maintenance procedures. which only allows the computers with the MAC addresses you specify access to the wireless network. Phishing is an attempt to fraudulently acquire information. Answers: A and D. users perform common tasks as nonadministrators and. the user need only click Yes. it is not something that is included in Windows. it’s a type of program that allows a person at a computer to remotely take control of another computer or device. making it more difficult to hack. If the user is logged in as an administrator. a pop-up window will appear verifying that the user has administrative privileges before action is taken. 35. but HTTPS is required when you log in to a site. or do online banking. but of course less functional and useful! Other ways to secure the wireless access point include changing the password. After Auditing is turned on and specific resources are configured for auditing. incorporating strong encryption such as Wi-Fi Protected Access version 2 (WPA2) with Advanced Encryption Standard (AES). . 37. VNC stands for Virtual Network Computing. USB is the Universal Serial Bus and has little to do with this question except to serve to confuse the unwary with another acronym. turn off SSID broadcasting so that no one else can find your WAP (with normal means). Trojans are viruses that look like programs and often seek to gain backdoor access to a system. and initiating MAC filtering. The System log deals with drivers and system files and so on. Answers: A. These could be successful logons or misfired attempts at deleting files. Answer: D. and informational entries about applications. when necessary. HTTPS opens a secure channel on port 443 as opposed to the default. With User Account Control (UAC) enabled. B. HTTP by itself is enough for regular web sessions when you read documents and so on. purchase items. which is used to move files and user settings from one system (or systems) to another. Macros are viruses that attach to programs like Microsoft Word and Word files. Answer: C. This padlock could be in different locations depending on the web browser used. log off. often by e-mail or phone. 36. insecure HTTP port 80. Examples include RealVNC and TightVNC.156 Chapter 7 33. as administrators without having to switch users. They are similar to viruses but differ in that they self-replicate. The Application log contains errors. default SSID name (that everyone knows). or use Run As. there are literally hundreds of options. and D. Disabling DHCP and instead using static IP addresses removes one of the types of packets that are broadcast from the WAP. USMT stands for User State Migration Tool. Domain 2. Answer: B. Worms travel through the Internet and through local area networks (LANs). After PCs and laptops have been associated with the wireless network. If the user is not logged on as an administrator. It is a good idea to change it. A multifunction network device that acts as both a wireless access point (WAP) and router comes with a standard.0: Security 34. clicking Yes will cause Windows to prompt the user for an administrative username and password. warnings. you need to check the Event Viewer’s Security log for the entries.

A fingerprint reader falls into this category as a biometric device. Antivirus software (such as McAfee or Norton) updates automatically so as to protect you against the latest viruses. Plus. Answer: C. data. Firewalls protect against intrusion but not viruses. A password gets more secure as you increase its length and then add capital letters. such as the Windows Firewall. The only thing that this password lacks to make it a super password is the length. 41. normally run on client computers.) Ctrl+Alt+Del brings up the Windows Security dialog box. or e-mail appear to be coming from somewhere else. From there. Windows+M minimizes all open applications. by default it is not secure. This enables a secure connection between two offices using the Internet. Windows Defender is free Microsoft software that protects against spyware/malware. Answer: D. Hacking is a general term that describes an attacker trying to break into a system. 40. and a zero. Answer: D. Using someone else’s network is just plain theft. hacking. Cracking is a term that is used to describe breaking passwords. but with an extra step. you can lock the computer. especially if the server is acting as a network firewall. but the router functionality is really just one of the roles of the multifunction network device—separate from the firewall role. Answer: B. a capital S. Social engineering is the practice of obtaining confidential information by manipulating people. And a virus is a program that spreads through computers and networks (if executed by the user) that might or might not cause damage to files and applications. Fifteen characters or more is an industry standard for highly secure passwords. Only the person who locked it or an administrator can unlock it. Answer: A. and finally special characters. Software-based firewalls. 43. Phishing is when a person fraudulently attempts to gain confidential information from unsuspecting users. Smart cards are often the size of credit cards and store information that is transmitted to a reader. Answer: D. (Unless. 45. whether they are attached to e-mails or are lying in wait on removable media. Spoofing is when a malicious user makes web pages. VLAN stands for virtual local area network. numbers. Note that Marqu1s_DeS0d has a capital M. It utilizes one of two tunneling protocols to make the secure connection: Point-to-Point Tunneling Protocol (PPTP) or Layer Two Tunneling Protocol (L2TP).220-802 Practice Exam A 157 38. and SSID is a form of device identification that is broadcast from a wireless access point. such as the Windows Firewall. of course. higher-end routers for larger networks are usually not combined with firewall functionality. A barcode reader is a device that scans codes made up of different-width parallel lines. but otherwise the servers will usually rely on a hardwarebased network firewall and/or an IDS/IPS solution. Hacking into a router is just that. such as the ones found in most SOHO multifunction network devices. and Windows+R brings up the Run prompt. a 1 in the place of an I. or software-based. Some people might refer to these devices as routers. a capital D. 42. an underscore. 39. . Biometrics is the study of recognizing humans. a VLAN is confined within a single office but does offer some security in the form of compartmentalization. You should install a virtual private network (VPN). FTP is the File Transfer Protocol. 44. Answer: A. too. Hardware-based firewalls are also found in multifunction network devices. It is possible that they will run on servers. They could be hardware-based. Windows+L automatically and immediately locks the computer. Answer: A. another user knows your password.

S. and NTFS permissions are just a few of the advantages of an NTFS partition. Answer: B. without the user’s knowledge. 46. and 1 special character. BitLocker.158 Chapter 7 Hypertext Transfer Protocol (HTTP) is used to make connections to websites but is not secure by itself. Answer: B. The replacement is CCMP. Many companies will low-level format the drive and keep it in storage indefinitely. 48. WPA2 is superior to WPA. 52. . Answer: B. the whole partition) much better than any FAT system does. which is breaking passwords with software. that would require HTTPS. 51. These SSL certificates are often accompanied by the protocol HTTPS. Compare this to hacking. which you will rarely see. Kerberos is the protocol used on a domain to encrypt passwords. Wired Equivalent Privacy (WEP) is deprecated (outdated) and is considered insecure. 1 number. It works best with AES. it is a deprecated encryption protocol used with WEP and WPA. NTFS is Windows’ New Technology File System. Common local security policies include password length. Many tools can recover data from a drive after it is formatted. Secure Sockets Layer (SSL) and the newer Transport Layer Security (TLS) encrypt the transactions through the website. 50. even then. TKIP stands for Temporal Key Integrity Protocol. Answer: D. Spyware is software that tracks a user’s actions on the Internet. and WEP and takes much longer to crack (if crackable at all). it is implemented via e-mail or over the phone (vishing). An example of a password policy would be when an organization mandates that passwords be 15 characters in length with at least 1 capital letter. Examples of smart cards include the Personal Identity Verification (PIV) card used by U. EFS. Smart cards are actual physical cards that you use as authentication tools. Answer: B. Putty is a tool used for secure text-based connections to hosts and does not involve the website. Grayware is a classification of malware that behaves in an annoying manner but is not necessarily detrimental to the computer system. Just the use of a password doesn’t constitute a password policy. 47. it selfreplicates and spreads throughout networks on its own. HTTP by itself is not secure. All of the other answers are software related and are logical in their implementations. A worm is a piece of code that infects files and systems. which is attempting to break into a system with technology. you should consider new hardware and software. All of the listed answers are types of malicious software (malware). 53. Adware creates those pesky pop-up windows. It secures files and folders (and in fact. and complexity. They are sometimes referred to as tokens and have built-in processors. FAT is just another name for FAT16. FAT32 is also uncommon. Answer: C. Answer: B. and cracking. Phishing is a type of social engineering. 49. It should be avoided unless it is the only encryption option you have. Social engineering is when fraudulent individuals try to get information from users through manipulation. though you might see removable media formatted to this file system. Answer: B. government employees and the Common Access Card (CAC) used by Department of Defense personnel. duration.

This aids in screen orientation on mobile devices. instead you use your finger(s) or a stylus to tap on the display (known as a touchscreen). Part of the point of the limited account is to limit it to doing everyday tasks only and not installing (possibly malicious) programs. It can be calibrated on Android devices with the G-Sensor calibration tool. Many devices have this installed. 59. a company would have to pay a fee for every license of the OS. Tablets and other mobile devices will often use Advanced RISC Machine (ARM) CPUs. Answer: A. 60. . and yaw. Spyware is software unwittingly downloaded from the Internet that tracks a user’s actions while surfing the Web. Gmail is a webbased e-mail service by Google. They also have an onscreen keyboard. the Y axis (up and down). Answer: C. Accelerometers are combinations of hardware and software that measure velocity on the X axis (left to right). Android is an open-source OS. The gyroscope adds the measurements of pitch. Apple’s iOS and Microsoft’s two mobile OSes—Windows CE and Windows Mobile—are closedsource. B. It is incorporated into the Android operating system. Answers: A. Tablets have displays and wireless network adapters. These are designed for simplicity and low-power usage compared to desktop computer CPUs such as the Intel Core i5 and AMD Phenom II and FX CPUs. The equivalent of this in any Windows system is the standard user account. Limited accounts are used in Windows XP. Mobile devices do not use the standard size USB ports that desktop computers do. Domain 3. The question did not specify physical or virtual keyboard. others rely on geotracking or Wi-Fi hotspot locating techniques. Spam is the abuse of e-mail and the bane of mankind. and it is uncommon for them to use mini-USB ports. Apple users download apps from the App Store or from within iTunes. Answer: D. 57. Passcode locks are sets of numbers that are required to be entered when a mobile device is turned on or taken out of sleep mode. Answer: A. Some manufacturers modify the design to create a proprietary micro-B USB port. roll. Tablets do not have a mouse.0: Mobile Devices 56. The micro-B USB port is a common charging/data port for Android devices. and D. Answer: D. 55. (You are being watched!) Screen orientation is how the screen is displayed depending on how you hold the device: vertical or horizontal (or upside down). It is freely downloadable and can be modified by manufacturers of mobile devices to suit their specific hardware.220-802 Practice Exam A 159 54. 61. A Trojan is a disguised program that is used to gain access to a computer and either steal information or take control of the computer. C. Lock Rotation is a setting (and a switch) on Apple iPad devices that stops the screen from reorienting as you rotate it. The Global Positioning System (GPS) technology can be instrumental in locating lost or stolen mobile devices. and the Z axis (back to front). 58. Answer: C. A worm is code that infects a system and self-replicates to other systems. Be ready for vagaries such as those on the real exam. Answer: A. Answer: C. Geotracking is the practice of tracking and recording the location of a mobile device. which are necessary for today’s mobile games and other apps. 62. Android users download applications (apps) from the Android Market (now known as Google Play).

Answer: A. Domain 4. The Global System for Mobile Communications (GSM) and the general packet radio service (GPRS) are used to connect to the Internet at 2G. You are looking for the obvious or most probable cause for the problem. 64. Answer: B. then the RAM has an issue.) 68. pictures. but the mobile device might make connections to databases. Answers: A and C. they are often not even run on mobile devices. Some of the things you might synchronize on a smartphone include contacts. Reinstalling the video driver is much further down the list. If you see this problem in the future. Chances are that the computer has faulty memory or memory that needs to be reseated properly. A corrupt MBR would either give a . you could check whether the computer is on. if your changes affect the functionality of the system. and videos. 69. This is similar to the ABOM in Windows 7/Vista. mobile devices (as of the writing of this book) do not run Microsoft Office. you can always restore the data later. it is common company policy to document all findings as part of a trouble ticket. (F5 also brings up the Windows Advanced Boot Options menu on some systems. Back up data before making any changes to the computer. The flashing cursor on the screen tells you that the system is not posting properly. 3G. e-mail. When Windows XP is first starting. others on your team can do the same. Databases are not often backed up. Answer: C. so you would have no need to back up Word documents. If the system beeps and freezes during this count-up. if the computer and monitor are plugged into the AC outlet. and whether the monitor is plugged into the computer. It could also be incompatible with the motherboard. headsets. The second step is to establish a theory of probable cause. Wi-Fi connections also allow connections to the Internet given there is a hotspot available. Answer: A. and 4G speeds. pressing F8 brings up the Windows Advanced Boot Options Menu (ABOM). allowing Bob to troubleshoot his video driver. Ctrl brings up a special menu that contains only the Safe mode options (not available in Windows 7/Vista/XP). Answers: A and C. Answer: B. Bluetooth is used to connect wireless devices to the mobile device—for example. You should do this before making any changes to the software or OS and before opening the computer.0: Troubleshooting 65. Fiber optic is not wireless. you can consult your documentation for the solution. always look for the most likely and simplest solutions first. which includes several options for Safe mode (among other options). Afterward. Documentation is last. the video driver is bypassed and only a simple VGA driver is loaded. music. 70. 66. This way. Documentation is the final step in the troubleshooting process. The fact that the user might not have turned her monitor on when she first came in is a likely scenario. However. They work the same way Wi-Fi does with PCs and laptops. When troubleshooting a computer system. This comes after identifying the problem and before testing your theory. Answer: A. This helps you to better understand and articulate exactly what the problem (and solution) was.160 Chapter 7 63. and mobile devices do not make use of it. When you enter Safe mode. The numbers counting up are the system checking the RAM. 67. Plus. programs. In addition.

The POP3 server is for incoming mail. though you can usually tell if the bulb is working by accessing the menu buttons on the projector.0. you would get a message to that effect. 71. but it doesn’t indicate if you have a working network connection. you could ping any number on the 127 network or ping localhost without the double backslash. so it isn’t a possible reason for why nothing is coming up on the monitor.254. if a DHCP server is actually available. you effectively create a selective startup. when the system restarts. If the PC is not connected to the AC outlet. but just regular files. 80. Answer: B. check all cables and power.1 is the built-in loopback IP address for every computer with TCP/IP installed. Answer: D. Chkdsk can check for and repair errors. it means the computer has self-assigned that address. The entire step is “Verify full system functionality and if applicable implement preventive measures. Answer: D. Answer: D. The Advanced Boot Options menu has many options. those programs will run again.220-802 Practice Exam A 161 message stating “missing OS” or “the MBR is corrupt”. Finally. and the WINS server is for resolving NETBIOS names to IP addresses. the DNS server is for resolving domain names to IP addresses. they are finite in size. It is replaced by Chkdsk. Know those ABOM options! 76. Answer: C.0. 72. You could either clear the log or increase the size of the log. 79. the hard drive will not spin. By modifying this. Answer: A. Answer: B. Alternatively. 75.” It comes just after establishing a plan of action and just before documenting findings. Try pressing the video toggle button or combination key on the laptop’s keyboard first. 73. If that doesn’t work. This helps you determine if TCP/IP works on the local computer’s network adapter. The Event Viewer contains the error logs. If the computer attempts to boot off of the network. This menu can be accessed by pressing F8 when the computer first boots up. 78. A simple ipconfig/release and ipconfig/renew might fix the problem. the monitor might not be plugged in. If you get any address that starts with 169. All other answers are possible reasons for why nothing is showing up on the display. 127. Xcopy is used to copy entire directories of information. 77. you will see gray text and a spinning pipe sign as it attempts to find a DHCP server. 74. Task Manager can turn off programs. The other three do not contain error logs. Disconnect the external monitor. Answer: A. given the question’s scenario. Also. External devices and peripherals could cause conflicts in a computer . MSCONFIG can turn programs on and off in the Startup tab. but only temporarily. You might also choose to disconnect the USB hard drive. System File Checker (SFC) checks protected system files and replaces incorrect versions. Answer: A. including Safe Mode. Normally. Implement preventative measures as part of step 5 to ensure that the problem will not happen again. None of the other options check system files. you might try changing the bulb in the projector. If the OS was corrupted. Scandisk is an older command-line scanning tool that today’s versions of Windows don’t use. It is known as an APIPA address (Automatic Private IP Addressing). Answer: D. DHCP servers will not use this network number.

Copying files can be done only after formatting is complete. Removing the battery will only tell you if the system will still work on AC power only. if you have a PCI 32bit sound card (a common standard). When a sound card is first installed. Something else not mentioned here is that a second drive would have to be initialized in Windows before use. 83. CHKDSK has little value on an unformatted drive as it checks files for errors and integrity. a damaged primary corona wire might cause lines or smearing. Formatting the external USB drive will wipe out all data stored on it and probably won’t fix the problem. However. Answer: B. you can then plug that sound card into any of the available PCI slots on your motherboard and it will be recognized. Turning off the monitor doesn’t change the fact that it is connected to the laptop’s port. the jumper setting probably won’t matter. Always flash the latest BIOS before performing an upgrade or a fresh install. Finally. Answer: D. For example. unless the laptop’s BIOS was incorrectly set to boot from the external drive instead of the internal drive. For best results. you never know what might have happened. 81. Older PCs might need the BIOS to be upgraded before an installation. Replace the drum (or toner cartridge). B. Ghosted images or blurry marks could be a sign that the drum has some kind of imperfection or is dirty. If it is enabled. The same holds true for power. the drive simply won’t be seen by the BIOS. Finally. use the manufacturer’s driver. if the drive does not get power. Another possibility is that the fuser assembly has been damaged and needs to be replaced. (Word to the wise. Always check that Wi-Fi switch. Check if the laptop is within range of the wireless access point. If there is only one drive.162 Chapter 7 system that stops it from posting properly and booting. and C. Always make sure that the speaker power (if any) is plugged into an AC outlet and that the speakers are on (if they have a power button). hard drives do not need drivers to simply be recognized. If the . 84. the BIOS will not recognize it. especially if the image reappears at equal intervals. which is often a green jack. and D. The primary partition must be set to active to boot to the operating system. the paper could be too thick. or the rollers could be damaged. Windows should recognize it and either install a driver through plug-and-play or ask for a driver CD.1 surround sound. you would use the standard front speaker jack. There are several possible reasons a paper jam might occur. so check those later on in your troubleshooting process. Always check the hardware on the HCL before performing an install or upgrade. 86. if you ever remove the sound card when upgrading. then make sure that the wireless adapter is enabled in Windows. Answers: A. 85. the primary corona wire doesn’t cause paper jams. instead. it’s quite hard to plug a sound card into a wrong slot. 87. Make sure that you plug the speakers into the correct 1/8" RCA jack. 82. Answer: C. Answers: A and D. You must partition the drive before formatting. The paper could be stuck somewhere in the paper path. Answers: A. the latest of which can be found on its website. AGP. The drivers and the firmware should not be an issue because the laptop was able to connect yesterday. B. The wireless hardware switch (or button) is turned off. Answer: D. Or you might have 5. However. The speaker out is the one with concentric circles and an arrow pointing out. and if it is wrong. make sure you put it back in the same slot. and if the external drive had an OS installed to it. in which case.) PCI cards will not fit in ISA. or PCIe slots.

except that in many smaller companies. Establish a theory of probable cause is step 2. 95. but it is easier for humans to type in names. your workstation will probably not have an IP on the network and again will not ping the corresponding IP address. Verifying full functionality is step 5. If the CPU is not seated properly or if you have an incorrect CPU. meaning from the printer’s onscreen display. If Davidprowse. Identify the problem is step 1. Ping tests whether other computers are alive on the network. However. Answer: D. and gateway address. IPCONFIG/ALL shows a lot of information. Plain old IPCONFIG shows only the IP address. 92. Answer: B. ADDS is Active Directory Directory Services. the system simply won’t boot. You should perform backups during the first step: Identify the problem. 93. As to the incorrect answers: If the DHCP server is down. or the firmware might need to be upgraded. The device might not be on the HCL. The fourth step of the CompTIA six-step troubleshooting process is: Establish a plan of action to resolve the problem and implement the solution. The purpose of a DNS server is to resolve (convert) hostnames and domain names to the IP address. the firmware might not have been written yet to actually work with that processor! 94. Viruses in the MBR could cause the computer to simply not boot. Answer: B. In some cases. it would show an arrow pointing down (Windows 7/Vista) or a red X (Windows XP). (This can be displayed as a yellow exclamation point in Windows XP. Answer: B. but the Device Manager doesn’t have an icon to tell you that specifically. a blue screen could occur.220-802 Practice Exam A 163 CPU or RAM is not compatible or if you have a corrupt driver file. Answer: C. This is available in Windows 7/Vista’s WinRE System Recovery Options. Windows does not affect the POST at all. Ipconfig/release is used to troubleshoot DHCP-obtained IP addresses. Testing theories is step 3. Answer: C. If that doesn’t work. normally the operating system does. but they will render the affected devices inoperable. The blue screen is technically referred to as a Stop Error. 91. Individual devices generally don’t get infected with malware anyway. IRQ conflicts will not cause BSODs. subnet mask.) If the device was disabled. First try printing an internal test page. you need to start troubleshooting the printer. Also. Answer: C. the Device Manager won’t tell you if a system is infected with malware. Documenting findings is step 6. meaning a domain controller. A black exclamation point on a yellow field tells you that the device is in a problem state and is probably malfunctioning. 89. perhaps the . The device might need to be replaced or reseated. Computers normally communicate via IP address. You must have the correct firmware to recognize the latest CPUs. which doesn’t have much to do with this. 90.com is down. Answer: A. 88. The idea is that you back up the data before you actually do anything to the computer. you might purchase a motherboard that says it can support a specific new processor. you cannot ping the corresponding IP address at all. including the MAC address. It is often used in conjunction with ipconfig/renew. the domain controller and DNS server are one and the same. Startup repair attempts to fix issues automatically. Document findings is step 6.

Answer: A. but often the cost of a signal booster is the same as buying a newer. 100. The most common reason for a BSOD (blue screen of death. and so on. Likewise. more powerful WAP! Unfortunately. . otherwise known as a stop error) is driver failure. Answers: A and B. The easiest and (probably) cheapest way is to move the WAP. then no paper should come out of the printer. the printer cable should not have to be replaced. Answer: B. 97. 98. The simplest solution is often the most common. or maybe a corona wire is malfunctioning. but their drivers might. If the spooler stalled. the System log would contain the information useful in troubleshooting this error. new drivers and firmware usually will not help the situation. Signal boosters might also work. Basements are usually the worst place for an access point because of concrete foundations and walls. Run the installer as an administrator. 99. Check cables and see whether the power is on for your devices and computers. Programs cannot be installed by standard users or guests. you can check the printer drivers and other settings at the computer that uses the printer. You must have administrative rights to do so. Second on the list is memory/processorrelated errors. Answer: C. If the test page prints fine. Restarting the spooler should not help in this situation. electrical interference. Particularly.164 Chapter 7 toner cartridge is empty. Hard drives and CD-ROMs themselves should not cause stop errors. 96. The Event Viewer logs all errors that occur on a system. Answer: A.

If you didn’t score 90% or higher on exam A. this one is freestyle. If you didn’t already. then retake exam A until you pass with 90% or higher. You can expect questions from any of the four domains.8 CHAPTER EIGHT 220-802 Practice Exam B The previous 220-802 exam was the introduction. This next test will take it to the next level and could be considered an intermediate practice test. meaning the questions are randomized. After the answer key you will find the explanations for all of the answers. Write down your answers and check them against the answer key. Unlike the first exam. go back and study. I’ll be blending in some more difficult questions this time. Good luck! . in any order. If you just completed the first exam. I suggest taking a break between exams. which immediately follows the exam. The main goal of this practice exam is to make sure you understand all of the concepts before moving on to the next test. give yourself a half-hour or so before you begin this one.

msc USMT Quick Answer: 187 Detailed Answer: 189 . Which tool is used to analyze and diagnose a video card? ❍ A. Detailed Answer: 189 Identify the problem Establish a theory Establish a plan of action Document findings 2. ❍ C. the Windows XP system will not boot. What should you ask the customer first? ❍ A. The customer will be supervising your work. ❍ B. ❍ C. In which step of the CompTIA A+ troubleshooting process would you question the user? ❍ A.166 Chapter 8 ✓ Quick Check Practice Questions 1. ❍ D. Detailed Answer: 189 What is the administrator password? 4. You have been given the task of installing a new hard drive on a server for a customer. Are there any current backups? Do you want me to shut down the server? Which version of Windows Server is this? Quick Answer: 187 Detailed Answer: 189 Access the Recovery Console Boot into Safe mode and roll back the driver Reinstall the operating system Boot into Directory Services Restore mode 5. Safe Mode ❍ D. You just upgraded the president’s computer’s video driver. Now. Recovery Console ❍ C. ❍ C. ❍ B. ❍ B. ❍ D. Task Manager B. Which tool would you be using if you were setting the computer to boot with the Selective Startup feature? ❍ ❍ Quick Answer: 187 Quick Answer: 187 Detailed Answer: 189 A. ❍ C. Msconfig 3. Which of the following should you try first? ❍ A. ❍ D. ❍ D. Quick Answer: 187 Device Manager DxDiag Services. ❍ B.

❍ D.220-802 Practice Exam B 167 ✓ Quick Check 6. The printer has a USB and an Ethernet connector. and when it first boots you hear some beep codes. 3 times RAM ❍ C. ❍ D. ❍ B. 6 times RAM ❍ D. ❍ C. The same as the amount of RAM on the system 10. Where is registry hive data stored? ❍ A. ❍ B. A co-worker needs to print to a printer from a laptop running Windows 7. ❍ C. ❍ C. ❍ B. Aero Application dock Sidebar \%systemroot%\Windows Detailed Answer: 190 \%systemroot%\System32 \%systemroot%\System32\Config Quick Answer: 187 Detailed Answer: 190 RAM CD-ROM Video card CPU 9.5 times RAM Quick Answer: 187 Detailed Answer: 190 B. ❍ D. What is the default initial size of virtual memory in Windows? ❍ ❍ Quick Answer: 187 \%systemroot%\Windows\System32\Config 8. ❍ D. 1. If you don’t have the codes memorized. Quick Answer: 187 A. Use the parallel port Use the network connection Use the USB connector Use the Ethernet connector Quick Answer: 187 Detailed Answer: 190 . ❍ B.) ❍ A. ❍ C. Detailed Answer: 189 UAC 7. what are the best devices to examine first? (Select all that apply. Which of the following is a feature of Windows 7 but not Windows Vista? ❍ A. What is the easiest way to connect the printer to the laptop? ❍ A. You just built a PC.

❍ B. ❍ D. You work in an Internet cafe that has publicly used desktop computers. Quick Answer: 187 Detailed Answer: 191 . Detailed Answer: 190 Change C: /FS:NTFS Change C: NTFS /FS Convert C: /FS:NTFS Convert C: NTFS /FS 13. Which type of password should you set in the BIOS? ❍ Quick Answer: 187 Quick Answer: 187 Detailed Answer: 190 A. Enter net stop print spooler and then net start print spooler in the command line ❍ C.168 Chapter 8 ✓ Quick Check 11. Go to Computer Management > Services and Applications > Services and restart the Print Spooler service 12. so he is asking you to change the drive to NTFS. He cannot lose the data on the drive but must have a higher level of security. Supervisor ❍ D. the only partition on the drive (C:) is formatted as FAT32. What is the proper syntax for this procedure? ❍ A. The computers need to be accessible by anyone. ❍ D. Administrator ❍ C. ❍ B. Currently. Guest 14. How can you restart the Print Spooler service? (Select the two best answers. Enter net stop spooler and then net start spooler in the command line ❍ B.) ❍ A. Physical damage to devices might occur. Files might be cross-linked. User ❍ B. What is a common risk when installing Windows drivers that are unsigned? ❍ A. Clinton needs a more secure partition on his hard drive. ❍ C. ❍ C. System stability may be compromised. Go to Computer Management > Services and restart the Print Spooler service Quick Answer: 187 Detailed Answer: 190 ❍ D. The drive might become fragmented.

❍ D. ❍ C. He can run DEFRAG. ❍ D. Detailed Answer: 191 Close applications and install RAM 18. ❍ D.) ❍ A. ❍ C.EXE –f in the command line.EXE –A in the command line. He can run DEFRAG. Which of the following settings must be established if you want to make a secure wireless connection? (Select all that apply. He can run the Disk Defragmenter in Computer Management. Which of the following utilities can be used to view the startup programs? ❍ A. ❍ B.220-802 Practice Exam B 169 ✓ Quick Check 15. Tom has a 30 GB hard disk partition (known as C:) on a Windows Vista computer. If you get a Code 1 message about a particular device in the Device Manager. He can run DEFRAG. He has 1. ❍ D. Quick Answer: 187 XCOPY SYSPREP Ghost Image Clone Quick Answer: 187 Detailed Answer: 191 . what should you do? ❍ A. ❍ C. Quick Answer: 187 Detailed Answer: 191 Ipconfig Ping Regedit DxDiag 16. ❍ D. ❍ B. Disable the device Update the driver Reinstall the driver Quick Answer: 187 Detailed Answer: 191 The brand of access point The wireless standard used The encryption standard used The SSID of the access point 19.EXE –v in the command line. ❍ B. ❍ ❍ B.5 GB free space on the partition. ❍ C. 17. ❍ B. Quick Answer: 187 Detailed Answer: 191 C. How can he defrag the partition? ❍ A. Which Windows utility is used to prepare a disk image for duplication across the network? ❍ A.

❍ C. ❍ D. When the computer detects a condition from which it cannot recover 22. When a device is missing drivers ❍ C. ❍ C. What most likely causing the issue? ❍ A. it is known as which type of attack? ❍ A. Quick Answer: 187 Quick Answer: 187 Detailed Answer: 192 bootrec /fixboot bootrec /fixmbr bootrec /rebuildbcd boot\bcd Quick Answer: 187 24. USB tethering Wi-Fi sharing Internet pass-through Wi-Fi tethering Detailed Answer: 192 . ❍ D. When the computer was shut down improperly ❍ D. The message “The Windows Boot Configuration Data File Is Missing Required Information” appears on the screen. when will a computer dump the physical memory? ❍ Quick Answer: 187 Quick Answer: 187 Detailed Answer: 192 A. What can be described as a mobile device sharing its Internet connection with other Wi-Fi capable devices? ❍ A. ❍ C. You have had several support requests for one PC located in a school cafeteria kitchen. You have already reseated the PCIe and PCI cards and replaced the hard drive in the PC. ❍ B. ❍ D. ❍ D. ❍ B. Detailed Answer: 192 DDoS Smurf Session hijacking Malicious software 23.170 Chapter 8 ✓ Quick Check 20. ❍ B. Which command would you type to repair this issue? ❍ A. Detailed Answer: 191 Excessive heat Faulty RAM 240 V outlets Power brownouts 21. Computers located in the business office or the classrooms have not had this issue. When the wrong processor is installed ❍ B. If a person takes control of a session between a server and a client. ❍ B. ❍ C. In Windows Vista.

❍ B. NTBackup Backup Status and Configuration Task Manager ASR Quick Answer: 187 Detailed Answer: 193 . Document findings. Install antivirus software on the computer before removing the old hard drive 26. how do you fix the “NTLDR is missing or corrupt” error? ❍ A. Which of the following should be performed during a hard drive replacement to best maintain data privacy? ❍ ❍ ❍ Quick Answer: 187 Detailed Answer: 192 A. What is this an example of? ❍ ❍ ❍ Quick Answer: 187 Detailed Answer: 192 A. In Windows XP. ❍ C. Only use FAT32 file systems when formatting the new drives ❍ D. Question the user and identify user changes 29. and outcomes ❍ C. Application baselining C. ❍ D. ❍ C. Virtualization 27. if applicable. You are utilizing WSUS and are testing new updates on PCs. implement preventative measures ❍ D. ❍ D. actions. Which tool would you use to back up data on the C: drive in Windows Vista? ❍ A.220-802 Practice Exam B 171 ✓ Quick Check 25. Completely erase the old drive prior to disposal B. Verify full system functionality and. Host-based firewall B. Establish a plan of action to resolve the problem and implement the solution Quick Answer: 187 Detailed Answer: 193 B. Which of the following troubleshooting steps is next after determining the cause? ❍ ❍ A. Quick Answer: 187 Detailed Answer: 193 Run the System Restore utility Restore the registry Restart in Safe Mode Run the Recovery Console utility 28. Format the new hard drive twice prior to installation C. ❍ B. Patch management ❍ D.

❍ B. Which type of installation are you performing? (Select the best answer. ❍ B. ❍ B. Where would you go to find out if the hardware in your system is compatible with Windows 7? ❍ A. Disk image installation B. How much free disk space is required to install Windows Vista? ❍ A. ❍ C. ❍ C. ❍ C. 133 MHz 800 MHz 1 GHz 800 MHz Detailed Answer: 193 2 GHz 2 GB Quick Answer: 187 Detailed Answer: 193 System Tools System Properties Windows Compatibility Center Resource Monitor 33. ❍ C. ❍ C. ❍ D. USB installation C.172 Chapter 8 ✓ Quick Check 30. ❍ D. What is the minimum processor requirement for Windows Vista? ❍ A. What is the minimum processor requirement for Windows 7? ❍ A. How much free disk space is required to install Windows 7? (Select the two best answers. ❍ D. Quick Answer: 187 Quick Answer: 187 Detailed Answer: 194 A. ❍ B. ❍ B. Quick Answer: 187 8 GB 10 GB 16 GB 20 GB Quick Answer: 187 Detailed Answer: 194 . ❍ D. You create an answer file to aid in installing Windows 7. 20 GB Detailed Answer: 194 2 GB 4 GB 15 GB 35. Unattended installation 34. ❍ D. Detailed Answer: 193 233 MHz 31. Multiboot installation ❍ D.) ❍ ❍ ❍ Quick Answer: 187 1 GHz 32.) ❍ A.

monitor. ❍ C. Which version of Windows 7 does not include Windows XP Mode? ❍ A. Click Start > All Programs >Accessories. Click Start > All Programs > Accessories. Home Premium Professional Ultimate Enterprise Quick Answer: 187 Detailed Answer: 195 . then right-click Command Prompt and select Run as Administrator. ❍ C. Notification Area ❍ D. ❍ C. press Ctrl+Shift+Enter. What would resolve this problem? ❍ A. 39. Which component of the Windows GUI includes the clock and other programs that run in the background? ❍ ❍ ❍ Quick Answer: 187 Quick Answer: 187 Detailed Answer: 194 A. Click Start and type cmd in Run prompt. ❍ B. and instead of pressing Enter. then right-click Command Prompt and select Run in elevated mode. the laptop only has two USB ports and the user is unable to connect the keyboard. press Ctrl+Shift+Enter. and scanner at the same time. Desktop 38.) ❍ A. Task bar C. ❍ D. ❍ B. Click Start and type cmd in the search field. ❍ D. and instead of pressing Enter. How can the Command Prompt be opened as an administrator (known as elevated mode) in Windows 7/Vista? (Select all that apply. Quick Launch B.220-802 Practice Exam B 173 ✓ Quick Check 36. A user with a laptop frequently goes into the office to work. However. mouse. Detailed Answer: 194 KVM switch IEEE 1394 connection Docking station Bluetooth adapter 37. ❍ B. Quick Answer: 187 Detailed Answer: 194 ❍ D.

❍ B.174 Chapter 8 ✓ Quick Check 40. ❍ C. Tell the user to find a new ISP ❍ D. Which of the following should you try first to fix the problem? ❍ A. Quick Answer: 187 Check if the correct type of paper is being used 42. ❍ D. A co-worker notices that the battery light on a laptop is flashing when the laptop is in a docking station. ❍ C. What should you do first if a printer fails to print very large documents but still prints smaller documents without a problem? ❍ A. ❍ C. ❍ C. Quick Answer: 187 Detailed Answer: 195 Replace the laptop battery Reinstall the operating system Reseat in the docking station Remove and reseat the battery 44. Tell the user to reply to all spam and opt out of future e-mails Quick Answer: 187 Detailed Answer: 195 . Quick Answer: 187 A. What should you recommend the user do? ❍ ❍ Detailed Answer: 195 Replace the communications cable 43. but the page shows a ghosted image. What could be the problem? ❍ A. Business Ultimate Enterprise Change the toner cartridges Add memory to the printer Quick Answer: 187 Detailed Answer: 195 The drum needs replacing. Tell the user to create a new e-mail account B. Tell the user to add the senders to the junk e-mail sender list ❍ C. Which version of Windows Vista does not include remote desktop connection functionality? ❍ A. ❍ D. You print an image to your printer. ❍ D. ❍ D. ❍ B. There’s a dirty primary corona wire. There’s an incorrect driver. ❍ B. Detailed Answer: 195 Home Premium 41. The printer is offline. ❍ B. One of your customers reports that there is a large amount of spam in her e-mail inbox.

Detailed Answer: 196 Check if the heat sink is secure. The output of the test page allows you to initiate diagnostic routines on the printer. What should you check to fix the problem? (Select the two best answers. ❍ D. It clears the print queue and resets the printer memory. select Properties. ❍ D. and click the Advanced tab ❍ C. Quick Answer: 187 Detailed Answer: 195 Power plans Display Properties Computer Management Power Options Properties window 46. where can devices like the display and hard drives be configured to turn off after a certain amount of time? ❍ A. ❍ C. Quick Answer: 187 Detailed Answer: 196 B. and click the Separator Page button Quick Answer: 187 Detailed Answer: 196 ❍ D. In Windows Vista. Which programs can you use to test your RAM? (Select the two best answers. ❍ D. Right-click the printer. select Properties. ❍ B. ❍ B. You attempt to send a test page to the printer. It verifies the connectivity and illuminates possible application problems.220-802 Practice Exam B 175 ✓ Quick Check 45.) ❍ A. It allows you to see the quality of the printer output. ❍ C. and click the Sharing tab ❍ B. ❍ D. select Properties. Check the BIOS temperature threshold. Quick Answer: 187 Task Manager System Information Chkdsk CPU-Z Quick Answer: 187 Detailed Answer: 196 . ❍ C. A computer’s CPU overheats and shuts down the system intermittently. ❍ C. select Properties. Right-click the printer. Your customer is having problems printing from an application. How can you find out which type of connection the printer is using? ❍ A. Why should a test page be used to troubleshoot the issue? ❍ ❍ A. Right-click the printer. 49. ❍ B. Right-click the printer.) ❍ A. 48. Check if the RAM needs to be reseated. Check if the fan is connected. and click the Ports tab 47.

Detailed Answer: 196 The drive needs to be initialized. What should you do to troubleshoot the problem? (Select the three best answers. Power cycle the device B. Group Policy Editor Quick Answer: 187 Detailed Answer: 197 .11n router. Which of the following is most likely the cause? ❍ ❍ Quick Answer: 187 Quick Answer: 187 Detailed Answer: 197 A. he notices that the signal strength on the laptop is poor and only connects at 11 Mbps. The wireless antennas on the router need to be replaced. ❍ D. A tablet device is having trouble accessing the wireless network. A user recently purchased a new wireless 802. The router’s wireless card drivers are faulty. ❍ B. ❍ C. 51. Set up a static IP ❍ E. Local Security Policy B. Check if the SSID was correct ❍ D. B. The drive is fragmented. What could be causing this? ❍ A. Forget the network and reconnect to it 52. The drive’s SATA data connector is loose. Which of the following will not secure a functioning computer workstation? ❍ A. ❍ B. A user’s hard drive seems very slow in its reaction time when opening applications. The cable modem is faulty.176 Chapter 8 ✓ Quick Check 50.) ❍ ❍ ❍ Quick Answer: 187 Quick Answer: 187 Detailed Answer: 196 A. Detailed Answer: 197 Setting a strong password Changing default usernames Disabling the guest account Sanitizing the hard drive 53. The temporary files need to be deleted. The laptop is connecting to the incorrect wireless network. Which utility enables you to implement auditing on a single Windows computer? ❍ ❍ A. After connecting a laptop to the wireless network. Use GPRS instead C. ❍ D. ❍ C. ❍ D. 54. ❍ C. The user moved the laptop next to the WAP and is still experiencing the same issue.

Allows the OS to talk to the device 57. ❍ C. Improves device performance ❍ D. ❍ D. Which of the following are types of social engineering? (Select the two best answers.sys 56. ❍ C.) ❍ A. ❍ C. After installing Windows 7 successfully. What does a device driver do? ❍ ❍ Quick Answer: 187 A. Services.) ❍ A. ❍ D.com Ntbootdd. ADDS ❍ D. Detailed Answer: 197 Create policies 58. Modifies applications Quick Answer: 187 Detailed Answer: 197 B. Detailed Answer: 197 NTLDR Boot. ❍ B. ❍ C. Which file contains ARC paths like the one shown here: default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS? ❍ A. ❍ B.msc 55. Where are restore points stored after they are created? ❍ A. ❍ B.ini Ntdetect. ❍ D. Works with memory more efficiently ❍ C.220-802 Practice Exam B 177 ✓ Quick Check ❍ C. Connect to WLANs Enable the Windows Firewall Run Windows Update The Recycler folder Quick Answer: 187 Detailed Answer: 198 The System32 folder The %systemroot% folder The System Volume Information folder 59. what should you do next? (Select the two best answers. Quick Answer: 187 Malware Shoulder surfing Tailgating Rootkits Quick Answer: 187 Detailed Answer: 198 . ❍ D. ❍ B.

❍ D.) ❍ A. How can you restrict their access to your customer’s wireless connection? (Select the two best answers. Keyboard ❍ C. ❍ D. Now. As you look at the WAP/router. AC outlet 64. ❍ C. Which user group permission level has the highest amount of access on a Windows computer? ❍ A. ❍ B. Configure the wireless access point to use WPA Configure MS-CHAP on the WAP/router Disable SSID broadcasting Move the WAP/router to another corner of the office Quick Answer: 187 Detailed Answer: 198 .178 Chapter 8 ✓ Quick Check 60. Which of the following is the best way to ensure that a hard drive is secure for disposal? ❍ A. ❍ C. Detailed Answer: 198 Printer 61. ❍ A. the customer calls and complains that Internet access is getting slower and slower. ❍ B. you notice that it was reset at some point and is now set for open access. ❍ B. You then guess that neighboring companies are using the service connection. What is the most likely source? ❍ Quick Answer: 187 Magnetically erase the drive 62. Power supply ❍ D. This is the service that controls the printing of documents in a Windows computer. ❍ C. ❍ B. A month ago. you set up a wireless access point/router for a small business that is a customer of yours. A burning smell comes from the computer. ❍ C. Print server Print pooling Print spooler Detailed Answer: 198 Format the drive FDISK the drive multiple times Convert the drive to NTFS Quick Answer: 187 Detailed Answer: 198 Supervisor Administrator Power User Backup operator 63. Thermal compound ❍ B. Quick Answer: 187 Quick Answer: 187 Detailed Answer: 198 A. ❍ D. ❍ D.

Which of the following should the technician do next? ❍ A. A first-level help desk support technician receives a call from a customer and works with the customer to resolve the call for several minutes unsuccessfully. When the computer boots. ❍ D. Which of the two following components can affect the POST from completing successfully? (Select the two best answers. The cable is connected backward. Quick Answer: 187 Detailed Answer: 199 . ❍ D. A customer complains that there is nothing showing on the display of his laptop. ❍ C. ❍ B. The floppy drive has failed. You just installed a new floppy drive into a computer you use for testing. CD-ROM 68. you notice that the light for the floppy stays on. Hard drive B. Explain to the customer that he will receive a callback when someone more qualified is available ❍ ❍ B. RAM ❍ E. ❍ C. What does this mean? ❍ A. CPU ❍ D. Detailed Answer: 199 Replace the inverter Reinstall the video drivers Boot into Safe mode Check whether the laptop is in Standby or Hibernate mode 67. The BIOS needs to be reconfigured. ❍ B.) ❍ ❍ Quick Answer: 187 Quick Answer: 187 Detailed Answer: 199 A. There is too much voltage to the floppy. What should you attempt first on the computer? ❍ A. Explain to the customer that the problem cannot be resolved and end the call ❍ D. Continue working with the customer until the problem is resolved 66. Escalate the call to another technician Quick Answer: 187 Detailed Answer: 199 C. USB hub ❍ C.220-802 Practice Exam B 179 ✓ Quick Check 65.

Configure a static IP address in the Alternate Configuration tab of the user’s TCP/IP properties and enable DHCP in the General tab Quick Answer: 187 Detailed Answer: 200 . ❍ B.) ❍ A. Detailed Answer: 199 CD-ROM SCSI drive USB mouse BIOS 70. That there is no controller cable connected to the drive That the CD-ROM is jumpered correctly That the hard drive driver is installed Quick Answer: 187 Detailed Answer: 200 Spanned volume RAID 0 RAID 1 RAID 5 73. the company uses static IP addresses for all computers. Internally.) ❍ A.” What should you check? (Select the two best answers. You get a message upon booting the system that says “No Hard Disk. Which of the following disk arrays provides for fault tolerance? (Select the two best answers. ❍ C. What should you do to fix the problem? ❍ ❍ ❍ Detailed Answer: 200 That there is power to the hard drive 72. 20 or fewer ❍ D. 10 or fewer B. Megan’s laptop runs perfectly when at work. 25 or fewer 71. it cannot get on the Internet. 15 or fewer C. ❍ D. During an installation of Windows 7. Tell Megan to use DHCP C. ❍ B. ❍ B. you are given an opportunity to load alternative third-party drivers. ❍ D. Quick Answer: 187 A.180 Chapter 8 ✓ Quick Check 69. ❍ D. ❍ C. Tell Megan to configure the alternate configuration tab of TCP/IP properties ❍ D. Which device are you most likely loading drivers for? ❍ A. Tell Megan to get a wireless cellular card and service B. but when she takes it on the road. A computer in a Windows workgroup can have how many concurrent connections? ❍ ❍ ❍ Quick Answer: 187 Quick Answer: 187 Detailed Answer: 200 A. ❍ C.

❍ B. ❍ D. Changes the core behavior of a command. Before implementing a solution to a problem. B. ❍ A. ❍ C. each 300 GB. ❍ C. When using the command-line. forcing the command to perform unrelated actions ❍ D. ❍ C. Is used in application icons C. Which power-saving mode enables for the best power savings. Quick Answer: 187 Quick Answer: 187 Detailed Answer: 201 A. 78.220-802 Practice Exam B 181 ✓ Quick Check 74. ❍ B. The second is the data drive and is formatted as FAT32. and storage is more efficient on the system drive. Alters the actions of a command. ❍ D. a switch ______. Files on the system drive can be secured. ❍ D. The cluster size is larger. ❍ D.) ❍ ❍ ❍ Quick Answer: 187 Determine what has changed 76. while still allowing the session to be reactivated later? ❍ A. ❍ B. John’s computer has two hard drives. Enables the command to work across any operating system ❍ ❍ B. Larger logical drives can be made on the data drive. Ping Netstat Nbtstat Detailed Answer: 200 Perform a system backup Test the solution Document the solution Quick Answer: 187 Detailed Answer: 200 Standby Suspend Hibernate Shutdown 77. which of the following should be done? ❍ A. Detailed Answer: 200 Ipconfig 75. The cluster size is smaller. The first is the system drive and is formatted as NTFS. and storage is more efficient on the system drive. C. Which command will show you the current network sessions from a PC to the Internet? ❍ A. Which two of the following statements are true? (Select the two best answers. such as widening or narrowing the function of the command Quick Answer: 187 Detailed Answer: 201 .

it gets partially through the boot process and then reboots. ❍ C. In the Recovery Console.182 Chapter 8 ✓ Quick Check 79. Delete all viruses from the floppy disk Delete all viruses from the boot sector Delete all viruses from the CD-ROM Quick Answer: 187 Detailed Answer: 201 Event Viewer Local Security Policy Msconfig SFC /SCANNOW 83. Detailed Answer: 201 Delete all viruses from the hard drive 82. Which tool should you use? ❍ A. what will the command fixmbr do? ❍ A. ❍ D. Boot into Safe Mode and perform a Windows System Restore ❍ D. A co-worker was installing a new program when the computer suddenly restarted. ❍ B. ❍ C. To connect a Bluetooth headset to a smartphone. ❍ B. You need to view any application errors that have occurred today. ❍ C. ❍ C. Quick Answer: 187 Detailed Answer: 201 Pair the device to the phone Install Bluetooth drivers Enter a passcode Disable Wi-Fi 80. ❍ B. Reinstall the OS ❍ ❍ B. Which of the following commands can help you modify the startup environment? ❍ A. Quick Answer: 187 Msconfig Ipconfig Boot Config Editor Registry Editor Quick Answer: 187 Detailed Answer: 201 . Now. what do you need to do? (Select the two best answers. ❍ D. Perform a factory restore 81. ❍ B. Which of the following is the quickest method to get the computer running without losing any of the user’s data? ❍ A. when the computer starts. Boot using Last Known Good configuration Quick Answer: 187 Detailed Answer: 201 C. ❍ D.) ❍ A. ❍ D.

Which troubleshooting command enables you to determine connectivity problems on a Windows XP computer that cannot connect to the Internet? ❍ A. ❍ C. ❍ B. ❍ D. Detailed Answer: 201 Ping 85. ❍ C. Quick Answer: 188 Detailed Answer: 202 . ❍ B. ❍ B. Detailed Answer: 202 System log 87. You are troubleshooting a co-worker’s computer. The DHCP server is down. ❍ C. ❍ D. ❍ D. She has tried to delete the job by double-clicking the printer and deleting the print job. ❍ B. Which tool should you use? ❍ A. ❍ D. When you ping the loopback address. ❍ C. The Ethernet cable needs to be replaced. ❍ D. and she can’t get it to stop. The TCP/IP protocol is not functioning. What does this most likely indicate? ❍ A. Quick Answer: 187 Security log 86. You need to find out which router within the nine steps between you and another computer has failed.log Quick Answer: 187 Detailed Answer: 202 Clear the print spooler Unplug the printer Reset the printer Turn off the printer Quick Answer: 187 Detailed Answer: 202 ipconfig /release ipconfig /flushdns ipconfig /all ipconfig /renew 88. Mary’s printer is printing hundreds of pages. ❍ C. ❍ B. Tracert Ipconfig Net Application log Setuperr. Which of the following log files would reference third-party software error messages? ❍ A. you receive no response. Quick Answer: 187 The LAN is unresponsive. What is the best way to stop the printer? ❍ A.220-802 Practice Exam B 183 ✓ Quick Check 84.

❍ D. Change the share-level permissions on the shared folder 92. Move Copy Dir Edit Quick Answer: 188 Detailed Answer: 203 . What can you do to fix the problem? (Select the two best answers. A customer uses an unencrypted wireless network. ❍ B. ❍ C. A customer is having difficulties with his hard drive. You have connected several Bluetooth devices together in an ad-hoc network. and the system won’t boot.” ❍ C. ❍ C.” 93. “I need to format the hard drive and reload the software. Enable encryption on the router and the clients ❍ C. ❍ B. Which type of network have you created? ❍ A. Quick Answer: 188 Quick Answer: 188 Detailed Answer: 202 Disable the SSID broadcast Use RADIUS Use WPA2 Enable WEP on the wireless access point 91. ❍ C. Increase the level of security on the NTFS folder by changing the permissions Quick Answer: 188 Detailed Answer: 202 B. ❍ D. “I need to FDISK the computer. Encrypt the disk that has the share using EFS (Encrypting File System) ❍ D. What is the best way to explain this to the customer? ❍ ❍ Quick Answer: 188 Detailed Answer: 203 A. The customer complains that files sometimes appear and disappear from the shared folder. data loss might occur. Which of these commands makes a duplicate of a file? ❍ A. Detailed Answer: 202 LAN WAN PAN MAN 90. One of the users has shared a folder for access by any computer.184 Chapter 8 ✓ Quick Check 89. “I need to restore the system.” ❍ D. Which of the following provides the lowest level of wireless security protection? ❍ A. ❍ D. ❍ B.) ❍ ❍ A.” B. “I need to rebuild the computer. You discover that the operating system has to be reloaded.

Windows is installed to C:. How can you resolve the problem? ❍ ❍ Detailed Answer: 203 Widgets 97. Decrease the paging file size Quick Answer: 188 Detailed Answer: 203 . ❍ C. Quick Answer: 188 A. ❍ B. Gadgets Bracelets Icons Quick Answer: 188 Detailed Answer: 203 System Information Tool Registry Task Manager Performance Console 98. ❍ A. Start > Control Panel> Languages and Region> Personalization Quick Answer: 188 Detailed Answer: 203 B. ❍ D. Start > Control Panel > Region and Language > Keyboards and Languages > Change Keyboard ❍ D.220-802 Practice Exam B 185 ✓ Quick Check 94. ❍ D. Defrag the D: drive ❍ D. ❍ B. The user of this computer complains that his applications are disk intensive and that they slow down the computer. Which tool in Windows enables a user to easily see how much memory a particular process uses? ❍ A. ❍ D. and it works normally. Move the paging file to the D: drive B. The Windows Vista sidebar contains _____________. ❍ C. Which of the following is the correct sequence to install a keyboard layout in Windows 7? ❍ ❍ A. Windows 7 was installed on a computer with two hard drives: a C: drive and a D: drive. Reinstall Windows on the D: drive rather than on the C: drive ❍ C. ❍ B. What should you attempt? (Select the two best answers. Quick Answer: 188 Detailed Answer: 203 Verify that WLAN is enabled Check if you are in range Unpair the devices Turn Bluetooth off and on 95. Start > Control Panel> Display ❍ C.) ❍ A. You are troubleshooting a Bluetooth connection that is malfunctioning. Start > Control Panel> Region and Language> Change Keyboard 96. ❍ C.

What should you do? ❍ Quick Answer: 188 A. Replace the cable with a 568B to 568A cable Quick Answer: 188 Detailed Answer: 204 . You have installed a new maintenance kit for a laser printer with multiple trays that were having paper jam issues. ❍ B. Detailed Answer: 203 Print a test page from all paper trays Reset the printer’s configuration settings Fill the trays with paper Print a calibration page 100. Another technician supposedly just connected it to the LAN with a patch cable. You are troubleshooting a computer that is having trouble connecting to the network.186 Chapter 8 ✓ Quick Check 99. Replace the cable with a rolled cable ❍ D. What should you do to ensure that the problem has been resolved? ❍ A. ❍ C. Replace the cable with a straight-through cable ❍ B. ❍ D. you find that each plug is wired differently. Replace the cable with a cross-over cable ❍ C. Upon inspection of the patch cable.

A 71. C 59. C 55. B 5. C 51. C 44. A 25. A 13. B 84.220-802 Practice Exam B Quick-Check Answer Key 1. B 8. B 34. C 72. D 62. A 69. D 70. D 16. B 33. A 43. A and C 77. C 57. C 19. A 26. A and D 78. A and C 7. D 63. D 53. C 66. B 27. C 187 . B 23. C 41. A 29. D 9. A 83. D 36. C 28. B 60. A 30. C and D 47. C 76. C 17. D 21. D 75. B 82. A and C 67. D 31. B 12. B 18. C 65. A and C 22. A 4. A and D 20. C and E 80. A and B 14. C 79. C 39. C 35. D 87. D 85. B 58. A. A 74. D 81. C and D 86. C 46. C and D 64. A 68. B and C 2. D 56. C and D 15. A and D 40. D 3. C 6. A and C 37. C 52. D 50. B 73. A 49. C 61. B 45. B 48. A 38. C and D 10. B 32. B 11. C 42. C 24. A 54.

A 90. C 100. A . A 89. A and C 96. D 97. B 98. B 91. D 93. B and D 99.188 Chapter 8 88. A 92. A 95. C 94.

2. but not in all cases. By rolling back the driver (which is done in the Device Manager) while in Safe Mode. From here. The sidebar is available only in Vista. step 6: Document findings.msc is the console window where you can start and stop and enable/disable services such as the Print Spooler. actions. Msconfig enables you to modify the startup selection. you move on to step 2: Establish a theory of probable cause. 4.220-802 Practice Exam B 189 Answers and Explanations 1. The Recovery Console is the command-line repair environment in Windows XP. you can still use gadgets in Windows 7—no sidebar is necessary. you can hover over applications that are running in the taskbar and view their current statuses (for example. The Recovery Console will not help you with drivers. Note that Last Known Good configuration would probably be able to help you. Answer: B. you can go back in time to the old working video driver. Directory Services Restore mode (although listed in the Advanced Startup Options) is only for Windows Server domain controllers. Reinstalling the OS would wipe the partition of the president’s data (and probably wipe you of your job). Next. 5. even if the application is hanging or frozen. The DxDiag utility is used to analyze a video card and check if drivers are digitally signed. and several other operating system manufacturers have similar functionality. 3. Finally. It is also instrumental when dealing with viruses. With this. so that you can troubleshoot why devices have failed. Once the backup has been taken care of. if you have a video running in IE or are downloading something). The Task Manager gives you a snapshot of your system’s performance and allows you to shut down applications (tasks) or processes. You can boot the computer in different modes with Msconfig. Answer: B. it’s step 3: Test the theory to determine cause. Next is step 5: Verify full system functionality and. You can also enable and disable services and applications. Answer: A. User Account Control (UAC) and Aero have been available since Windows Vista. You would question the user during step 1 of the CompTIA A+ troubleshooting process: Identify the problem. Answer: B. . The Device Manager is used to install drivers for devices. you can have the customer give you the password to log in (or let the customer log in) and find out which version of Windows Server is running. It can be accessed by going to Run and typing dxdiag. And after that is step 4: Establish a plan of action to resolve the problem and implement the solution. if applicable. it houses gadgets. The application dock is an enhanced version of the taskbar. USMT stands for User State Migration Tool. Safe Mode is one of the options in the Advanced Boot Options Menu (ABOM). Services. you can fix system file issues and repair the MBR and boot sector. Answer: C. Always check whether there are backups and physically inspect and verify the backup before changing out any drives. You can also click and drag applications to and from the dock and close apps if you wish. Answer: D. Making sure that a backup is available is the first order of business. Docking applications is fairly standard practice nowadays. Afterward. The application dock in Windows 7 is not available in Vista. It starts the computer with a basic set of drivers. implement preventive measures. Also during that step you would identify user changes and perform backups. and outcomes. a command-line tool used to migrate user files and settings from one or more computers. However. 6.

stop. Because these computers can be used by anyone. It takes the place of whatever folder contains the operating system. By default. users won’t have the ability to install programs or make changes on the computer. What if there is no network? And even if there is. The supervisor password is the password needed to actually access the BIOS. enable. The main hives are SAM. Use the USB connector. Answer: C. the initial virtual memory file (pagefile. SECURITY. 8. this service is simply known as Spooler. for example. the user password is not necessary. These are accessed and configured by opening the Registry Editor (Run > regedit. the printer has an Ethernet connection as well (that is the network connection). allowing for a higher level of data security. For example. Answer: C. but that will require you to connect it to the network. The user password is what acts as a safeguard from anyone getting into the operating system. The parallel port (such as LPT1) is the older way of connecting to printers. Answer: A. SOFTWARE. you might not even get any beep codes at all. The computers’ operating systems should be configured for guests. and DEFAULT. So.msc. Remember that %systemroot% is a variable. 11. That standard’s connection name is IEEE 1284. 12. By far this is the easiest method. and disable services. These are the most common culprits of beep codes during the POST. In Computer Management. This means enabling the guest account and setting that one as the default login. It is common to have an unseated RAM stick or video card. In the command line. including user and supervisor. 10. the printer would have to be configured for the network.5 GB (1536 MB) and the maximum file size is 3 GB (3072 MB). And the CD-ROM’s functionality has little bearing on the POST. virtually no PCs or laptops have these anymore. However. the Print Spooler service is found in Services and Applications > Services. if you were to run a default installation of Windows 7. If the CPU is not installed properly. USB becomes much easier. the path to the Registry hives would be C:\Windows\System32\Config. Maximum size is set to 3 times RAM. as is guest.190 Chapter 8 7.sys) is 1. SYSTEM. Answer: C. From there you can start. Answer: D. Type net stop spooler and net start spooler to restart the service. The BIOS has several password types. Answers: A and C. Windows will sense the USB connection and attempt to install the print driver automatically (though you should still install the latest proper driver from the printer manufacturer’s website). the supervisor password is important to thwart end users from accessing the BIOS (and possibly changing important settings such as the boot sequence). You can also configure Windows to automatically manage the paging file size. Answer: A and D. Yes. Administrator is an account type in the operating system. The convert command turns a FAT32 drive into a NTFS drive without data loss. you should still set a complex password on those computers and change it every month or sooner.exe) and opening the HKEY_LOCAL_MACHINE subtree. 13. This will usually be Windows (for Windows 7/Vista/XP). . However. This way. Or you could open the Run prompt and type services. The proper syntax is convert volume /FS:NTFS. If the laptop is the only system that will use the printer. 9. Other hive information is stored in the user profile folders.5 times that amount. and then the laptop would have to connect to the printer over the network. Windows (when first installed) analyzes the amount of RAM in the computer and sets the hard drive’s initial virtual memory size to 1. if a user has 1 GB of RAM (1024 MB).

and you’ll be left to troubleshoot further. again. Closing an application won’t affect the conditions of a device in the Device Manager. DxDiag is used to analyze video cards and the version of DirectX that is running. question marks. 16. 15. mostly within the CurrentVersion. 18. consider disabling the SSID for increased security. A common place to find some of the startup programs is the path HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run. you can also find out programs that run from Startup by going to Start > All Programs > Startup. Answer: B. Use defrag. After all computers are connected. Regedit can be used to view startup programs.exe –f. Answer: C. Answer: C. The driver has no effect on files or drive fragmentation. Excessive heat is the most likely cause of the problem. However. Answer: B. that also house startup program information. 20. Reinstalling the same driver will not fix the problem. SYSPREP preps the system to be moved as an image file. It is extremely uncommon for a driver to cause physical damage to a device. SYSPREP is one of the utilities built in to Windows for image deployment over the network. XCOPY copies entire directories (in the same physical order. You need to have 15 percent free space on your partition to defrag it in the Disk Defragmenter GUI-based utility. This could be an unfortunate result of ovens and other equipment. Ghost and Image Clone are third-party offerings. and the encryption takes care of the “secure” portion. Knowing the wireless standard being used can help you verify whether your computer is compatible (802. There are several other subkeys. . Another common code. Computers in environments such as these are often prone to dirt collecting inside the CPU fans and other devices inside the case. Disabling the device is a neat way of sweeping the problem under the rug. More information on Device Manager codes can be found at the following link: http://support. 19. Usually this means that the driver should be updated. Faulty RAM wouldn’t cause hard drives to fail or un-seat expansion cards. free of all exclamation points. the solution is usually to update the driver. (-f is not necessary in Windows 7. you first need to know the service set identifier (SSID) of the AP and then the encryption being used (for example. too) but not from one system to another. and down arrows. Answer: A. you can force a defrag on a partition even if you don’t have enough free space by using the –f switch in the command line. WEP or WPA). By installing a driver that is not signed by Microsoft. Code 10. A Code 1 message means that a device is not configured correctly. Ipconfig shows the network configuration of all network adapters.11n or g). This is the executable that opens the Registry Editor. The SSID takes care of the “connection” portion. On another. means the device cannot start. simpler note. The –a switch gives analysis only and does not perform any defragmentation. 17.) The –v switch gives you verbose (or wordy) output. it will just maintain the status quo.microsoft. thus proving they are functional. One of the keys to a properly running computer is a clean Device Manger. Answer: A. To make a secure connection. Ping is used to test if other computers on the network can respond to TCP/IP packets of information. Answer: C and D.220-802 Practice Exam B 191 14. you are risking instability of the operating system. but the brand of access point isn’t really helpful.com/kb/943104.

you can probably not get the system to boot at all. USB tethering is when a mobile device shares its Internet connection with a PC or laptop via USB. Wi-Fi tethering is when a mobile device shares its Internet connection (effectively becoming its own hotspot) with other Wi-Fi capable devices. which is the default setting in Windows 7/Vista). but there are plenty . It is a waste of time to install AV software on a drive before removing it. Answer: C. However. Other Microsoft examples include the System Center Configuration Manager (SSCM) and its predecessor Systems Management Center (SMS). Answer: D. A Smurf attack is a type of denial-of-service attack that relies on the use of many ping echoes. Malicious software is any compromising code or software that can damage a computer’s files. Bootrec /fixboot is one of the methods you can try to repair bootmgr. Answer: C. Patch management is the patching of many systems from a central location. making use of the PC’s Internet connection— basically the reverse of USB tethering. spyware. examples include viruses. an attack perpetuated by hundreds or thousands of computers in an effort to take down a single server. Shutting down the computer improperly just means that the computer recognizes this upon the next reboot and asks whether you want to go into Safe Mode. The computer should be changed to 240 V only if it is brought to another country—for example. 240 V outlets are most likely going to be found in this environment. If the computer fails and cannot recover. 21. and auditing stages. and Trojans. The reason for the physical dump of memory is for later debugging. as data remanence (residue) is left on the drive from which files can be reconstructed by smart people with some smart software.192 Chapter 8 The cards probably moved around due to thermal expansion and contraction. Internet pass-through is when a mobile device connects to a PC via USB. There are various software packages you can use to perform patch management. Answer: C. Power brownouts could cause failures of the power supply. you must restart the computer to get back into the operating system (unless it is configured to do so automatically.exe in Windows 7/Vista. implementing. and maybe even the hard drive. At this point. Wi-Fi sharing is not a typically used term. The physical dump writes the contents of memory (when the computer failed) to a file on the hard disk. Boot\bcd is where the boot configuration store is located. 25. 22. Bootrec /fixmbr rewrites the master boot record in 7/Vista. Bootrec /rebuildbcd attempts to rebuild the boot configuration store. Answer: A. 26. testing. Session hijacking is when an unwanted mediator takes control of the session between a client and a server (for example. you usually see some type of critical or stop error. It includes the planning. in Europe. in the United States the computer should be connected to a 120 V outlet. 24. Missing drivers will not cause this error. Formatting is not enough. but would not cause the adapter cards to be un-seated. DDoS is a distributed denial-of-service attack. AV software should be loaded up when the new drive is installed. but the computer shouldn’t use those. 23. The drive should be completely erased with bit-level erasure software. Windows Server Update Services (WSUS) is an example of Microsoft patch management software. but a failed driver might. Answer: D. an FTP or HTTP session). If the wrong processor is installed. the computers are often unknowingly part of a botnet.

30. As for the incorrect answers: System Tools . The Windows 7 successor to this is Backup and Restore. you won’t be able to get to the System Restore utility in Windows XP. It takes the place of Windows XP’s NTBackup. we are dependent on the NTLDR file to get into the OS. actions. 28. Document findings. It requires a floppy disk for the ASR information in addition to the backup media. Finally. 2 GHz is not a valid answer for Windows as of the writing of this book. System Restore is used in Windows 7/Vista/XP to create restore points. or more specifically: Test the theory to determine cause. again. 32. The Task Manager is a tool that gives real-time performance statistics of the CPU. Establish a plan of action to resolve the problem and implement the solution is the next step after determining the cause. 1 GHz is the recommended minimum for Windows Vista but not the bare minimum required. implement preventative measures is the fifth step. Answer: C. an option in Windows XP’s NTBackup that enables you to back up and restore the system state (user accounts. Answer: C. Application baselining is the performance measurements of an application over time. restarting in Safe Mode won’t work. 2 GB is the minimum RAM requirement for 64-bit versions of Windows 7. it runs virtually on top of another OS. processes. The Recovery Console is a special recovery tool that is run by booting off of the Windows XP CD. RAM. ASR stands for Automated System Recovery. Question the user and identify user changes is part of the first step: Identify the problem. snapshots in time that allow you to revert the system back to an earlier configuration. you can copy the NTLDR file (from the CD x:\I386) to the root of the hard drive. if applicable. boot files. and outcomes is the sixth and last step. When it is running.microsoft. Answer: B. but that doesn’t matter because the registry does not have a copy of NTLDR. it allows you to stop services. Windows Vista’s Backup Status and Configuration utility enables a user to back up files or the entire PC. The recovery console can also be installed to the Windows XP computer’s hard drive by accessing the CD and typing x:\i386\winnt32. Answer: D. Verify full system functionality and.220-802 Practice Exam B 193 of third-party offerings as well. Windows 7 requires a minimum processor frequency of 1 GHz. Virtualization is when an operating system is installed to a single file on a computer.com/windows/compatibility/) that has a hardware section which can tell you if your hardware is compatible.exe /cmdcons where x is the CD-ROM drive. It is the successor to the Hardware Compatibility List (HCL). If the NTLDR is missing or corrupt. and applications. Windows Vista requires a minimum processor frequency of 800 MHz. and network card. Often. Answer: C. and the unsupported Windows 2000 requires only 133 MHz. The Windows Compatibility Center is a website (http://www. Windows Vista requires 800 MHz. 27. 29. and so forth). It is step four of the six-step CompTIA A+ troubleshooting process. Answer: B. You also won’t be able to restore the registry. settings. whereas Windows XP requires 233 MHz. Other ways to see if your system meets the hardware compatibility requirements are to use the System Information tool in Windows or third-party downloadable analysis tools. 31. A host-based firewall is a software firewall that is loaded on a computer to stop attackers from intruding on a network.

33. then the laptop doesn’t have enough USB ports and the docking station will resolve the problem. 64-bit installations require 20 GB free space. Local installation from USB is possible if you copy the Windows 7 . and mobile). 35. It could get a little confusing.xml) can be created by using the Windows System Image Manager (SIM) program. The Taskbar consists of programs that are currently running (and the Windows 7 application dock). KVM switches are used to control two or more computers from a single group of devices: keyboard. and display. but try to remember: Windows 7 32-bit installs require 16 GB free space. Disk image installations use third-party programs such as Ghost or work with a System Restore image created within Windows. but it’s the scanner that is causing the need for extra ports. each OS should inhabit its own primary partition. Programs can be run in elevated mode (as an administrator) in Windows 7/Vista by right-clicking the program and selecting Run as Administrator or by using the search field to run the program and pressing Ctrl+Shift+Enter instead of just Enter. The Quick Launch area houses shortcuts to files and applications. The Notification Area (also known as the System Tray or systray) includes the clock and programs that run behind the scenes without user intervention. Answer: C. The docking station will allow the user to connect more USB devices.iso file to the USB flash drive (if the drive is big enough) and obtain the USB/DVD download tool from the Microsoft website. The desktop is the area of the GUI that has a wallpaper or background. An unattended installation of Windows 7 requires an answer file. a utility that charts the performance of the computer’s components. Windows 7 32-bit installations require a minimum of 16 GB free space. mouse. but Windows Vista installs require 15 GB free space. Answers: A and C. the Start button. A multiboot installation means that more than one operating system are being installed to the same drive. which isn’t mentioned in the scenario. and the Resource Monitor. The important amount to remember for the exam is the free space necessary. Windows Vista installations require a minimum of 15 GB free space on a 20 GB partition. 36. Another solution would be a USB hub (perhaps a cheaper one at that. Remember that with multiboot installs. Answer: D. 34. Answer: C. . Bluetooth adapters can be used for keyboards and mice. One or both of these could possibly be unattended installations. but not for scanners. and the Notification Area. though most laptops and docking stations will have a secondary video port. 37. Answers: C and D. Unattended installations can be done locally or as part of a network installation using Windows Deployment Services (Server 2008) or Remote Installation Services (Server 2003). This file (normally named unattend. 38.194 Chapter 8 is a folder within Start > Accessories that has components such as the Control Panel. Answer: D. The monitor will connect to either a VGA or DVI port. IEEE 1394 connections are great solutions for external hard drives and audio/video devices. If the keyboard. although some users refer to the entire display as the desktop. Disk Cleanup. Scanners often connect via USB and not Bluetooth. and scanner all use USB. mouse. the Quick Launch.

resulting in a blinking battery light telling you the laptop is not charging properly (or at all). and creating a new one can result in a lot of work for the user. you won’t be able to print to the printer. This is a hardware issue. Never tell a user to reply to spam. the laptop probably doesn’t have a sturdy connection. or faded ink. . Windows 7 Home Premium is the only answer listed that does not include Windows XP Mode. 40. smearing. it includes the Event Viewer. A dirty primary corona wire will often result in lines or smearing. Answer: A. Display Properties allows you to modify things such as screen resolution. the operating system does not have an effect on the blinking battery light. This will block that sender’s e-mail address (or the entire domain can be blocked). If a toner cartridge begins to fail. Spam e-mails should be sent to the spam folder and never replied to—unless you want ten times the amount of spam. and Services. A ghosted image or one that seems to repeat usually means the drum (or the entire toner cartridge including the drum) needs to be replaced. but it could be an issue if the entry rollers are grabbing more than one piece of paper at a time. Answer: A. 41. If the communications cable was faulty. you would probably get a message on the printer’s display warning of a bad connection. especially ones with graphics. Then click Change Plan Settings for the appropriate power plan. A printer’s memory can be upgraded in a similar manner to a PC’s. allows a person to work in a replica of the Windows XP environment. To turn off devices after a specified period of time in Windows 7/Vista. This tool allows you to take control of remote Windows systems on the network. You should first attempt reseating the laptop in the docking station. Answer: B. Users need their e-mail accounts. Answer: C. This mode. access Control Panel > Power Options. another option is to increase the level of security on the spam filter within the e-mail program. Add memory to the printer. Answer: D. Answer: A. if installed by downloading additional components from the Microsoft website. If the printer is offline. 43. Answer: A. Do this before you attempt to reseat or replace the battery. plus the user has no idea if one ISP will be better at stopping spam than another. You should recommend that the user add the senders to the junk e-mail sender list. no pages would print at all. require more memory to print. However. The paper won’t have an effect on large documents. Disk Management. Windows Vista Home Premium is the only answer listed that does not include Remote Desktop. An incorrect driver will often result in a garbage printout (garbled characters) that is quite unreadable (unless you know garbage printout language). 42.220-802 Practice Exam B 195 39. 45. that would indicate that the pound size of the paper is too thin. you will see white lines. This can be done in Windows XP from the Power Options Properties window in the Power Schemes tab. Large documents. this could take a lot of time. Any further spam can then be sent to the junk e-mail sender list. Computer Management is the most used console window in Windows 7/Vista. 44. Finding a new ISP is overreacting a bit.

You should analyze and defragment the drive and run an AV sweep of the system. 49. you would probably get a message that says “Missing OS” or something to that effect. “BIOS temperature threshold” is not the best answer. Printing a test page does not clear the print queue or reset printer memory. If the RAM needed to be reseated. Those would be initiated from the built-in display and menu on the printer. Also make sure that thermal compound was applied to the heat sink. If the hard drive’s SATA data connector were loose. Answer: D. Answers: A and C. not to initiate diagnostic routines. Either of these could cause the CPU to overheat. It’s a good idea to log when you apply thermal compound because if you remove the heat sink. The Separator page button allows you to configure a page that is inserted after every print job. They can be removed with the Disk Cleanup program or with third-party applications. the drive should not be able to access applications. You can try power cycling the device. It’s also possible that the OS is infected with a virus. 51. how much and what kind—but it is a static utility and has no testing ability. this can happen when you add a second drive to a system that already has Windows installed. therefore. not the RAM. This is why it is very slow in its reaction time. and forgetting the network and then reconnecting to it. or TCP/IP port. it’s the computer and the application that you are troubleshooting. The Sharing tab allows you to share a locally connected (or remotely controlled) printer on the network. The Ports tab is where you can find how the printer is connected to the computer. The drive is fragmented. but the system should not automatically shut down. causing the system to shut down. you might get one of several errors or beeps. Use the Task Manager or CPU-Z to test RAM. Test pages are used to make sure the computer can print properly to the printer. checking if the SSID was correct. C. if the device supports the . which would fix the problem temporarily but could cause permanent damage to the CPU. Now. This can be an LTP. Answer: C. 48. This would have to be done at the printer and/or at the computer controlling the printer. The BIOS temperature threshold is what tripped. but there are other third-party tools available as well. Answer: C. If a drive is not seen by Windows. and E. Answers: A and D. you will need to reapply thermal compound before reinstalling it. it might have to be initialized.196 Chapter 8 46. USB. If you didn’t log that you did this in writing somewhere. The Advanced tab has options such as print spooling and printer pooling. then you will have to take the heat sink off and inspect it. Surplus temporary files might slow down the login process but shouldn’t slow the hard drive when opening applications. The test page will verify connectivity and give you insight as to possible application problems at the computer that is attempting to print. In Windows you could also use the Performance Monitor to test how well RAM responds to things such as opening applications and working with media files. System Information will give you information about RAM—for example. The threshold is there to protect the CPU. 50. You should also check if the device is within range of the wireless access point. you could increase the threshold. Chkdsk tests the hard drive. You should make sure that the heat sink is secure and that the fan is connected. In fact. CPU-Z is an excellent third-party tool that can be used to test RAM. COM. Answers: A. 47. In this case you aren’t worried about the quality of the printer output.

Setting strong passwords. The laptop is probably connecting to a different wireless network either in the home next door or an adjacent business—one without encryption it would seem. forget the current wireless network. 53. services. 57. 52. Verify the SSID name of the 802. 54. If typed in the Run prompt. It simplifies programming by using high-level application code. changing default usernames. As to the incorrect answers: Using the cellular GPRS connection is not a valid option when troubleshooting the Wi-Fi connection. and try enabling best Wi-Fi performance if the device offers it. Boot. Answer: B. If a static IP is applied to the Wi-Fi adapter. where auditing can also be turned on. In Windows XP. This is done with the Local Security Policy. Also.220-802 Practice Exam B 197 necessary encryption. this is one of the things you should check in the Advanced settings of the device. It is not recommended to connect to WLANs (wireless networks) before running Windows Update and enabling the firewall. Device drivers are the connection between the operating system and the device itself. so it stands to reason that their code would be the most thoroughly tested and debugged. and if Internet pass-through or other Internet sharing technologies aren’t conflicting. 55. it is important to enable the Windows Firewall or make sure that a third-party firewall is installed and running properly. Because there is only one computer. They are the ones who developed the device.ini contains all the ARC paths. Answer: D. Ntbootdd. it could prevent the device from connecting to all wireless networks except the one that uses that IP network number.com searches for basic hardware on the system. check if any Wi-Fi sleep is enabled. Answers: C and D. To protect the computer. Sanitizing the hard drive will not secure a computer workstation. . which contain the path to the operating system through the hardware and the software. The best device drivers come from the manufacturer of the device. and disabling the guest account are all ways of securing a computer workstation. We are only interested in connecting to the wireless network to start. NTLDR is the boot loader file in Windows XP. you can implement auditing only locally. After a routine installation of Windows. It will. Answer: A. The same goes for the wireless antennae. services can be turned on and off and enabled and disabled from here.11n router. however. The Group Policy Editor and ADDS are used by Windows Servers in a domain environment. The cable modem isn’t a part of the equation in this scenario. Some versions of Windows have the Local Group Policy editor.msc will open the Services console window. you can power cycle the Wi-Fi program. It is a program that makes the interaction between the two run efficiently. but the computer workstation won’t be functional anymore. Answer: D. Answer: B. Furthermore. and connect to the new network. we don’t know if the device is faulty yet because the laptop never connected to it. this first Windows update could be time-consuming. 56.sys is necessary if Windows XP is to boot off of a SCSI drive. Ntdetect. A router (wireless access point) won’t have a wireless card such as the ones in a PC or laptop. prevent anyone from accessing data on the drive. Windows Update will download the latest security patches for Windows. Setting up a static IP on a mobile device is usually not a good idea and not necessary—in fact.

It is possible but unlikely that the thermal compound will cause a burning smell. you must log on as an administrator. The keyboard should not present a burning smell no matter how fast you type on it. Supervisor is something you would see in the BIOS or in other operating systems besides Microsoft Windows. 60. Converting the drive from FAT to NTFS (with the convert command) keeps the data intact.198 Chapter 8 58. The print spooler controls the queue and the printing of documents. To view this folder. A shoulder surfer is someone who attempts to view information on a person’s desk or display without the person’s knowledge. 63. This will not remove all data either. If the WAP/router was reset. This passphrase/key should be kept . The printer is the physical printing device. 64. and then assign permissions to the account that wants to view that folder. FDISK is an older DOS-based command that is used to remove or create partitions on a disk. in fact. some type of encryption protocol is necessary. 61. it will be much less noticeable and more chemical in nature. but only if the drive is electromagnetic! Formatting the drive is not enough due to the data residue that is left behind. Answer: B. The data remains. the other takes over. Print pooling is when two or more printers are grouped together so that a user’s document will print faster: if one printer is occupied. Answers: A and C. Answer: D. you could restore them. it is usually connected to the network. however. It is a type of malicious software abbreviated as malware. After a restore point is made. Shoulder surfing and tailgating are both types of social engineering. Answers: B and C. A print server is a device that controls one or more printers. 59. it could burn up the motor that drives the fan. or does fail. if this does occur. it is stored in the System Volume Information folder. Answer: C. Degaussing the drive is an excellent way to remove all traces of data. Tailgating is when a person attempts to gain access to a secure area by following closely on the heels of another employee. The passphrase or network key generated by the WAP/router needs to be installed on each client before it can be recognized on the network. 62. A rootkit is a program that is designed to gain administrator level access to a computer. usually without his knowledge. Administrators can have access to everything. any security settings that you originally set up are most likely gone. Power users can install software but do not have access to all data by default in Windows XP. however. Backup operators have access to tape backups and backup programs. Magnetically erase the drive. Answer: D. it has a “burn-in” period of 24–48 working hours. However. when the power supply is about to fail. Either way. the AC outlet is not part of the computer. The power supply is the most likely source of a burning smell: When the power supply is brand new. show hidden files and folders. If you backed up the settings previously. they are considered a legacy group in Windows 7/Vista and are treated the same as standard users. Microsoft also refers to the print driver software as the printer. Answer: A. The AC outlet could possibly be the cause of a burning smell and that would be bad news—turn off the circuit breaker immediately. it only rewrites data in the master boot record and partition table.

Hard drive failure might be recorded by the BIOS and POST but won’t stop the BIOS from attempting to boot.220-802 Practice Exam B 199 secret. of course. Remember. 68. This is exactly why help desks are configured in groups: Level 1. which it won’t be able to do and will promptly display a message stating “Missing OS” or something similar. check the simple. Booting into Safe Mode. If the controller cable to the floppy is connected backward. and the customer’s time. Plus. it has probably been rendered useless. but you might find them in testing environments. Answer: B. Answer: B. so know your floppy technology. The BIOS need be reconfigured only if the floppy drive was not recognized or was disabled. SCSI hard drives and RAID controllers will need special drivers during the installation process of Windows if they are not recognized automatically. Escalate. Optical drives and USB devices do not require third-party drivers. and older computers in general. and replacing the inverter are all quite timeconsuming. but. In Windows XP you have to press F6 during the text portion of the installation. The SCSI hard drive is the most likely answer. They won’t affect the boot process unless there is a disk in the drive and the CD-ROM drive was first in the BIOS boot order. if necessary. should be attempted in that order—after checking the power state.) Don’t try to fix the problem regardless of the time necessary. If a floppy disk were in the drive. (Remember that when you take the real exams. A USB hub is a peripheral device that doesn’t affect the POST. motherboard. Those are considered the big four (to check) when it comes to troubleshooting POST issues. disable SSID broadcasting so that no one else can “see” the router (without more advanced software). The tech should escalate the call to another technician. it is firmware. Route the call to the next level tech and wish the customer good luck. RAM. Answer: D. the light probably wouldn’t turn on at all. and video card. Good help desks are set up in such a way so someone is always available. is very valuable. 67. so that you. After all the clients have been associated with the WAP/router. your organization. and the customer can approach and solve the problem efficiently. or at the least would not read disks properly. Your time. Answer: B. CD-ROM drives will not affect the POST either. quick solutions first because they are usually the culprits. . The computer might need a special keystroke. Floppy drives are older devices that you don’t find on a typical computer anymore. 69. The following items can cause the POST to fail: CPU. In technology there is always someone who knows more than you about a specific subject. Level 2. The power supply would have to be troubleshot carefully. If the floppy drive failed. 65. Answers: C and D. reinstalling video drivers. scenarios where older programs on floppy disks are used. and the masters (Level 3) and possibly beyond! Don’t try to be a superhuman. they are still on the CompTIA objectives. but in Windows 7/Vista you just click the option for loading third-party drivers. 66. Every problem can be resolved! It’s just a matter of knowledge and persistence. The BIOS doesn’t use a driver. Too much voltage could cause the floppy drive to fail. but the real problem to investigate would be why the drive received too much power. a press of the power button. the light will stay on and the drive will not function. or just a little more time to come out of Hibernation mode.

76. and although these power modes use less power than the computer being powered on. Answer: C. Documenting the solution is part of step 6: Document findings. Testing the solution is part of step 5: Verify full system functionality. RAID 5 (striping with parity) provides fault tolerance by keeping a compressed copy of the data (in the form of parity) on each of the disks other than where the original data is stored. if a network cable was unplugged or a disc is stuck in the DVD-ROM drive. you will want to consider a Microsoft Domain. but as whole files. IP address. the hard drive might be bad (although it does happen). In the uncommon case. 74. If you need more. Any Windows computer in a Windows workgroup can have 10 maximum concurrent connections to it over the network. Determining what has changed is also part of step 1. At that point. you must press the power button. RAID 1 (mirroring) provides fault tolerance by copying information to two drives. But if you need to make changes to the OS. and port of the local and remote computers. As a technician. This displays protocol statistics and name tables. Answer: B. The CD-ROM should not have any bearing on this. To reactivate the system. and a spanned volume is one that stores data on two or more drives. This solution enables Megan to connect to networks while on the road by obtaining IP addresses automatically and allows her to connect to the internal company network with the static IP address. chances are that one of the connections is missing or loose. Answer: D. Answer: C. the entire session is loaded from RAM and you can continue on with the session. 75. It is part of step 1 of the six-step troubleshooting process: Identify the problem. The issue is that she needs to obtain an IP address through DHCP when on the road. Most of the time you should perform a backup of data before making changes to a system or implementing a solution. Answer: C and D. not as stripes of data.200 Chapter 8 70. Ipconfig shows the network card’s configuration. Netstat shows the network statistics of a computer. you should fix the problem. and those are less common than SATA drives. then you require the full version of Windows Server. But setting the network adapter to obtain an IP address automatically is not enough. altogether they end up using much more power than Hibernate mode does. only IDE CD-ROM drives require jumpers. . Ping tests if a computer is alive on the network. It’s not always necessary—for example. you should perform a backup. Standby and suspend modes turn off the hard drive and display and throttle down the CPU and RAM.sys in the root of C:) and then shuts the system down so that it is using virtually no power. 73. If you need more than that. In order to connect to the internal company network. RAID 0 is striping only. Nbtstat stands for NetBIOS over TCP/IP statistics. Hibernate mode saves all the contents of RAM (as hiberfil. It displays the network connections by name. the Alternate Configuration tab will need to be configured as a “User Configured” static IP address. but they still use power. 71. Megan shouldn’t do anything. Shutdown is great for power savings. but the session is lost when the computer is shut down. plus. 72. There are versions of Microsoft’s Small Business Server that allow maximums of 25 concurrent connections and 75 connections. If you get a message stating that there is no hard disk. Answer: A. Answers: A and B.

You might need to modify this if you are trying to dual-boot a computer. try a factory restore or reinstall the OS. 79. They are used within commands—for example. On Windows XP. If not. you must pair the device to the phone. The Event Viewer contains the log files of all the errors that occur on the machine. You should boot the system to the Advanced Boot Options Menu (ABOM) and select Last Known Good Configuration. whereas FAT32 cannot. In this case. you would need to use antivirus scanning software.220-802 Practice Exam B 201 77. Most mobile devices have Bluetooth installed and will usually recognize devices automatically. you would go to the Application log. SFC /SCANNOW is a command run in the Command Prompt (as an administrator only) that scans the integrity of the protected system files and repairs them if possible. Answer: A. Answer: A. Answer: C. If. Answers: A and C. 80. however. NTFS can create larger partitions (or logical drives) than FAT32 in general. however. 78. Disabling Wi-Fi is not necessary. that didn’t work. you might have to update Bluetooth on the device or update the device’s OS. dir /p. 83. Answers: A and D. Wi-Fi and Bluetooth have been known to have conflicts. This will identify all the routers along the way between you and the final destination. Answer: D. The Registry Editor allows you to make changes to Windows by accessing various hives of information and individual entries. NTFS cluster sizes are smaller than FAT32 clusters. To connect a Bluetooth headset to a smartphone. Answer: B. Dr. 84. This will revert the system back to the last known good as long as someone has not logged in successfully to the computer. 81. NTFS partitions are therefore more efficient (when installed correctly) than FAT32 partitions. Answer: B. In the old days (although still usable today with a DOS boot disk). Ipconfig displays all network adapters’ settings. 82. which would display directory contents by the page. A switch (aka option) alters the action of the command but not by forcing it to perform unrelated actions. which will show errors concerning the OS and drivers. The MSCONFIG. it is used to modify the Boot Configuration Data (BCD) store. NTFS can use NTFS file-level security. Fixmbr in Windows XP rewrites a new Master Boot Record (MBR) to the primary hard disk. then. you could try booting into Safe Mode (also in the ABOM) and perform a System Restore (or restore from the DVD WinRE). killing all boot sector viruses. Use the tracert (traceroute) command. you enter a passcode into the phone to use the device. The Boot Config Editor is BCDEdit. and sometimes one must be disabled to use the other. To delete viruses from any disk or disc.EXE utility enables you to modify the startup environment via the General and Startup tabs. You will know if one has failed because the trace will either stop working or you will see asterisks instead of . so “work across any operating system” wouldn’t make sense in this scenario. Another common log is the System log. After you have exhausted all possibilities. Switches are not used in application icons. the DOS equivalent of this was fdisk /mbr. Msconfig enables you to boot the computer in different modes and enable/disable services and applications. Local Security Policy is where you can set up auditing and create password policies for the computer. The switch will work only at the current time within the operating system you are currently using. Watson also shows many of the application errors that occur. if necessary.

drivers. it is stored in %windir%\Panther and is not within the Event Viewer. and other similar devices. ipconfig /release and ipconfig /renew are for releasing and renewing DHCP addresses. which stops the print spooler service. Answer: C. ipconfig /all gives the most information about the network connection. Answer: A. Answer: C. Increase the level of NTFS security by changing the permissions in the Security tab of the shared folder. 90.0. Using Wi-Fi or Bluetooth is very common when creating a cable-free type of PAN known as a wireless PAN or WPAN. EFS isn’t . Answer: C. 85. Any attacker with two bits of knowledge can scan for other things the wireless access point broadcasts. ipconfig displays the configurations for each network adapter. 89.202 Chapter 8 ping times. if you had one security option you could enable. WPA2 is very secure. however. Interestingly. Answer: D. net stop spooler.log is a log file that is created during the installation of Windows.0. Pinging the loopback address doesn’t make use of the network. You would do this by stopping the Print Spooler service in Computer Management (or in the command prompt by entering net stop spooler) and then deleting the files in the path C:\Windows\System32\Spool\ Printers. and mobile devices. You can ping the local computer with the commands ping loopback and ping localhost.1. but it only keeps out the average user. ipconfig /flushdns purges the DNS resolver cache. it often requires a Windows Server. 86. It deals with the computer internally and doesn’t even need a LAN. two buildings. laptops. A wide area network (WAN) connects two or more LANs over a large geographic area. everything connects to a central connecting device such as a switch (or a SOHO router). clear the printer spooler. so the LAN. Ping by itself only tests the final destination. Use WPA or WPA2 on the router (and clients) to deny wardrivers and other stragglers access to the customer’s network. smartphones. Setuperr. make it WPA2. The application log in the Event Viewer will display errors concerning Windows applications as well as third-party applications. the best option is to ping the actual loopback IP address by typing ping 127. DHCP servers. it doesn’t show anything in-between. 91. Pinging the loopback address should return results even if you are not physically connected to the network. Instead. 87. Ad-hoc means that there is no wireless access point controlling the network. and the Ethernet cable do not play into the scenario. A similar option to this is the command pathping. RADIUS is an external method of authenticating users. The net command has many uses—for example. A local area network (LAN) is a network that is inhabited by PCs. A personal area network (PAN) is a network of small computers. Try not to turn off the printer unless absolutely necessary. Many networking issues can be analyzed and troubleshot from this command. The system log shows events concerning system files. 88. If it is created. This removes any possible name resolution that might try to occur in Windows. Answer: A. using WEP is considered more secure than not using it and disabling the SSID. Answers: A and C. A metropolitan area network (MAN) connects two or more LANs in a smaller geographic area—for example. and operating system functionality. Disabling the SSID broadcast is a security precaution. The security log shows auditing events.

and make sure the customer is fully aware of the situation. 97. The registry stores all of the settings of Windows and is modified with the Registry Editor. restarting the device. Answer: A. Also try power cycling the Bluetooth program. Widgets are the same types of small applications but are usually web-based. Answer: D. Here’s the deal: Share-level permissions are rarely modified. not Languages and Region. such as in this example. Copy is used to make a duplicate of the file in another location. but it is static (text only) and doesn’t change in real-time. The Task Manager enables a user to see the amount of memory and % of processing power a particular process uses in real-time. moving it. increasing the size. but you can still make use of Gadgets.” The job actually isn’t complete until you have tested the solution. working with a known good Bluetooth device. Check if you are within range. attempting to forget the device.220-802 Practice Exam B 203 necessary if you set up WPA2 on the wireless access point. Windows 7 doesn’t use the Sidebar. the range of Bluetooth devices is limited—for example. Resetting configuration settings might cause the printer to print in a way that is . The Display option has no settings for keyboards. Decreasing the page file size never helps. Always test after a job is “finished. print a test page from each of the paper trays. you might consider it as well. not on computer screens. and adding RAM are all ways to make applications run faster. but defragging the D: drive will not speed up the applications. a key step. 93. Move enables you to take a file and shift it to another location. can do the same thing as the Task Manager in this scenario. you can try charging the device. so that is where the bulk of your time configuring permissions will go. However. but not as easily. 96. Always explain specifically and exactly what you must do and what the ramifications are. especially when unnecessary. Dir gives you the contents of a specific folder. 92. By moving the paging file (or swap file. Answer: C. 99. It is called Region and Language. Answers: B and D. aka virtual memory) to the D: drive. Start > Control Panel > Region and Language > Keyboards and Languages > Change Keyboard is the correct sequence. Performance Console can graph the performance of the different components in the computer and. System Information gives you information about the hardware and software of the computer. Answer: B. Reinstalling Windows is a huge process that you should avoid at all costs. 95. Answer: A. Bracelets belong on people. You click the Change Keyboard button after accessing the Keyboards and Languages tab. This can be done on the Processes tab. Edit enables you to create and edit text files. you are freeing up C: to deal with those disk-intensive programs. Icons are files or programs on the desktop. 94. Class 2 devices are limited to 10 meters. Do not use acronyms or jargon. if configured properly. 98. Answer: B. The sidebar in Windows Vista contains gadgets that offer specialized information like weather and traffic. NTFS permissions take precedence and are more configurable. In this case. but if you are dealing in seriously confidential information. Answer: A. In addition to those correct answers. and reconnecting it. Defragging the C: drive would help if that is where the OS and applications are.

but that also does not resolve any problems—unless the problem was printer calibration! 100. Each of these cables uses RJ45 plugs so they can be somewhat difficult to differentiate between. remember. a computer will connect to a switch (or to an RJ45 jack) with a straight-through cable. This cable is wired the same way on each end. You can see this if you look carefully at the plugs on each end. Printing a calibration page is standard practice whenever installing or performing maintenance to a printer. in this scenario you are maintaining the printer. Always carry an extra straight-through cable with you! A cross-over cable is wired differently on each end—568B on one end and 568A on the other. . It is used to connect a computer to another computer or a switch to another switch. but it is a nice thing to do. This could be what the other technician mistakenly installed.204 Chapter 8 undesirable to customers. A rolled cable is one that allows connectivity from a computer’s serial port to the console port of a router. The patch cable should be wired the same on both ends. Filling the trays with paper won’t really prove anything. Answer: A. but it would be easier to use a patch cable tester. usually adhering to the 568B standard. Normally. Don’t change settings unless you are asked to do so by the customer or if something fails.

If you didn’t score 90% or higher on exam B. A large percentage of the questions will have a higher difficult rating. Be ready for questions with longer. You can expect questions from any of the four domains. Good luck! . which immediately follows the exam. more in-depth scenarios and more complex answers. then retake exam B until you pass with 90% or higher. in any order. give yourself a halfhour or so before you begin this one. Write down your answers and check them against the answer key. This exam is freestyle. meaning the questions are randomized.9 CHAPTER NINE 220-802 Practice Exam C Let’s turn up the heat a bit more. go back and study. If you just completed the second exam. I suggest taking a break between exams. If you didn’t already. After the answer key you will find the explanations for all of the answers. This next test could be considered an advanced practice test. The previous 220-802 exam was the intermediate test.

Video card ❍ H. replacing his older one. Your co-worker just installed a new printer.206 Chapter 9 ✓ Quick Check Practice Questions 1. Which of the following could possibly cause this problem? (Select all that apply. SATA data cable 2. right-click the new printer. ❍ B. Power supply ❍ G.) Quick Answer: 228 Detailed Answer: 230 ❍ A. the old printer comes up in the print window. What should you tell him? ❍ A. and then click Set as Default Printer Quick Answer: 228 Detailed Answer: 230 . right-click the new printer. when he tries to print from Microsoft Word. What protects confidential information from being disclosed publicly? ❍ A. and then select Properties > Security Tab > Make This the Default Printer ❍ D. Select the new printer from the list every time a document is printed ❍ C. RAM ❍ C. You verify that the computer and monitor are receiving power and that the monitor is securely connected to the computer’s only video port. Hard drive ❍ D. Open the Printers folder. and then print the file with the new printer selected ❍ B. Open the Printers folder. ❍ D. Motherboard ❍ B. However. A customer brings in a computer that doesn’t display anything when it is turned on. Save the print job by printing to file. Quick Answer: 228 Detailed Answer: 230 Classification Social engineering RAS Hard drive wipe 3. DVD-ROM ❍ E. CPU ❍ F. ❍ C.

❍ D. which Windows tool enables you to configure a SOHO router? ❍ A. ❍ B.220-802 Practice Exam C 207 ✓ Quick Check 4. ❍ C. Check Reconnect at Logon when mapping the drive B. Typically. Use the net use command instead 8. ❍ C. Quick Answer: 228 Quick Answer: 228 Detailed Answer: 231 A. which of the following is commonly used to restrict access to a network? ❍ A. Select the drive letter needed to connect each time the co-worker logs on ❍ C. ❍ D. ❍ D. WPA key DHCP settings MAC filtering SSID broadcast Quick Answer: 228 Detailed Answer: 231 . Check the Folder connection when mapping the drive ❍ D. ❍ C. Detailed Answer: 230 HKEY_CURRENT_CONFIG 5. ❍ B. HKEY_USERS HKEY_LOCAL_MACHINE HKEY_CLASSES_ROOT Detailed Answer: 231 Device Manager Msconfig Windows Explorer Quick Answer: 228 Detailed Answer: 231 Format the partition Partition the drive Configure Windows settings Load RAID drivers 7. ❍ B. Which of the following steps should be taken to ensure that the drive remains mapped? ❍ ❍ Quick Answer: 228 Internet Explorer 6. the drive is not seen within Windows Explorer. but after rebooting. ❍ D. ❍ B. ❍ C. Which of the following steps is performed first when running a clean install of Windows 7 Professional on a new hard drive? ❍ A. Based on the physical hardware address of the client’s network device. Programs that run when Windows starts are stored in which of the following registry hives? ❍ A. A co-worker maps a network drive for a user.

❍ C. Which port is configured incorrectly? ❍ A. Which of the following is most likely the cause? (Select the two best answers. ❍ D.) ❍ Quick Answer: 228 Quick Answer: 228 Detailed Answer: 232 A. The power cable is unplugged from the computer. A user with an Android phone is attempting to get e-mail to work properly. Detailed Answer: 231 25 110 143 443 11. While troubleshooting a network problem. ❍ C. The user can send e-mail but cannot receive it. A defective hard drive in the computer ❍ C. The computer supposedly worked fine the day before. The voltage switch on the computer is set incorrectly. The other computer works fine. The power strip is unplugged.) Quick Answer: 228 Detailed Answer: 231 ❍ A.208 Chapter 9 ✓ Quick Check 9. The user is required to connect to an IMAP server. A defective network card in the computer ❍ D. Tracy cannot connect to the network. An unplugged server ❍ E. you discover that one set of LED lights on a switch is blinking rapidly even when all other nodes are disconnected. The computer is plugged into a power strip with another computer. The monitor is unplugged. 12. A defective port on the network switch 10. ❍ D. but now it does not power on. ❍ B. as well as an SMTP server that uses SSL. Replace the NIC Reconfigure TCP/IP Check for a link light on the NIC Install the latest NIC drivers Quick Answer: 228 Detailed Answer: 232 . ❍ C. ❍ E. Which of the following could be the problem? (Select the two best answers. What should you do first? ❍ A. The power strip is overloaded. ❍ D. A switch that is not plugged into a server ❍ B. ❍ B. You are called to a school lab to fix a computer. She asks you to help. ❍ B.

16. Detailed Answer: 232 The PC has a virus. Add the port number to the network firewall 15. Which of the following commands facilitates viewing the entire path from you to a server on the other side of the country? ❍ A. ❍ C. ❍ B. Quick Answer: 228 TV tuner Modem Video card Network adapter Quick Answer: 228 Detailed Answer: 233 . A print job fails to leave the print queue. The CPU heat sink is underrated for the CPU. Detailed Answer: 232 Print driver Print spooler Network adapter Printer 14. Which of the following hardware cards enables the full functionality of the Windows 7 Media Center Live TV option? ❍ A. Quick Answer: 228 Detailed Answer: 233 Ipconfig Ping Nslookup Tracert 17. ❍ B. Add the port number and name of the service to the Exceptions list of Windows Firewall ❍ D. ❍ D. The room appears to have adequate cooling. The power supply is underrated for the electrical load of the PC. After a lockup it will not reboot immediately. ❍ C. Which of the following actions should be taken first? ❍ ❍ ❍ Quick Answer: 228 Quick Answer: 228 Detailed Answer: 232 A. ❍ B. The PC air intakes are clogged with cement dust. Uninstall the service pack B.220-802 Practice Exam C 209 ✓ Quick Check 13. ❍ D. ❍ B. A customer reports a problem with a PC located in the same room as cement testing equipment. Which of the following services may need to be restarted? ❍ A. The PC will boot up but locks up after 5–10 minutes of use. Which the following is the most likely problem? ❍ A. ❍ D. ❍ C. the application does not communicate with the server. ❍ D. Reinstall the latest service pack C. After installing a network application on a computer running Windows. ❍ C.

Check port numbers ❍ D. You are contracted to recover data from a laptop. Verify Internet access ❍ B. Check for Bluetooth connectivity ❍ C. Surge protector ❍ D. Verify username/password 21. How should you troubleshoot this? (Select the three best answers. ❍ B.) ❍ A. When accessing an NTFS shared resource. Which of the following protocols should you set up for the most secure wireless connection? ❍ A. Detailed Answer: 233 An active certificate Correct user permissions Local user access Correct share permissions 19. A friend of yours is experiencing unusual problems with a printer due to voltage fluctuations in the wall outlet. ❍ B. ❍ C. Multimeter C. Which of the following should be used to eliminate the fluctuations? ❍ ❍ ❍ Quick Answer: 228 Quick Answer: 228 Detailed Answer: 233 A.) Quick Answer: 228 Detailed Answer: 233 ❍ A. ❍ D. ❍ C. Which of the following should you recommend to protect the customer’s computer equipment? ❍ A. In which two locations might you find irreplaceable. Gas generator 20.) Quick Answer: 228 Detailed Answer: 234 . You observe that the lights in a customer’s building flicker periodically during the course of the day. ❍ D. ❍ D. ❍ B. Make sure that GPS is enabled ❍ E. Quick Answer: 228 Quick Answer: 228 Detailed Answer: 233 Power supply UPS Generator Heavy-duty electrical cord 23.210 Chapter 9 ✓ Quick Check 18. valuable data? (Select the two best answers. UPS B. Your co-worker’s iPad is having trouble connecting to e-mail. ❍ C. Detailed Answer: 233 WEP WPA WPA2 WAP 22. which of the following is required? (Select the two best answers.

SATA hard drive 1 contains the operating system. Boost the power ❍ D. Internal SATA hard drive 1 ❍ C. How does NAT provide additional security for users who are behind a gateway? ❍ ❍ A.) Quick Answer: 228 Detailed Answer: 234 ❍ A. You just installed Microsoft Windows to a computer with three internal SATA hard drives and one external USB hard drive. Quick Answer: 228 Detailed Answer: 234 . Change the transmission channel 27. System32 folder 24. Shorten the distance ❍ B. ❍ D. It blocks computers on the Internet from accessing computers on the LAN. Where should you place the page file for maximize performance? ❍ ❍ Quick Answer: 228 Detailed Answer: 234 A. ❍ C.exe ❍ B. Group Policy Quick Answer: 228 Detailed Answer: 234 Local Security Policy Active Directory Policy Site Policy 26. B. Which utility enables auditing at the local level? ❍ A. Internal SATA hard drive 2 ❍ D. Install a repeater device ❍ C. ❍ D. E-mail ❍ E.220-802 Practice Exam C 211 ✓ Quick Check ❍ A. It blocks computers on the LAN from accessing computers on the Internet. Maintain a clear line of sight ❍ E. SATA hard drive 3 and the external USB hard drive are empty. External USB hard drive B. SATA hard drive 2 contains the user profiles. Pictures ❍ D. Which of the following can you do to optimize an infrared connection between a laptop and a printer? (Select the two best answers. It limits users from accessing particular websites. ❍ C. Ntoskrnl. ❍ B. Internal SATA hard drive 3 25. Windows folder ❍ C. It sets the hours that users can access the Internet.

That the password will be reset in several minutes ❍ D. Too many USB devices are plugged in. Network cables run from the accounting office. Software drivers need to be updated. What should you tell him? ❍ ❍ ❍ Quick Answer: 228 Quick Answer: 228 Detailed Answer: 234 A. Quick Answer: 228 MAC filtering SSID broadcast WPA2 passphrase WPA key Quick Answer: 228 Detailed Answer: 235 . ❍ B. 29. One of your customers is having difficulty with two network connections in the accounting office. ❍ B. The operating system needs to be updated.212 Chapter 9 ✓ Quick Check 28. through the drop ceiling of the mechanical room. That you need information confirming his identity C. A customer has forgotten his password. What is the most likely reason? ❍ A. Detailed Answer: 234 Faulty USB cable. ❍ D. ❍ B. He can no longer access his company e-mail address. but the reader is unable to work properly. A customer plugs in a new USB barcode reader and the computer recognizes it. ❍ C. ❍ B. Which the following can be disabled to help prevent access to a wireless network? ❍ A. What can help locate a lost or stolen mobile device? ❍ A. and into the server room next door. ❍ D. ❍ C. Passcode GPS Encryption Quick Answer: 228 Detailed Answer: 235 UTP Plenum-rated cable 568B Fiber optic 32. That he should remember his password B. ❍ D. ❍ D. Detailed Answer: 235 Auto-erase 31. ❍ C. What should you recommend to the customer? ❍ A. The accounting office is adjacent to the building’s mechanical room. ❍ C. That he shouldn’t do that 30.

Wipe the computer down with a cloth ❍ E. Remove the computer from the floor ❍ B. After booting his laptop. B. Which of the following commands would be used to set the time on a workstation? ❍ A. What are two possible issues that could cause this? (Select the two best answers. ❍ B.) ❍ Quick Answer: 228 Detailed Answer: 235 A. Install a new hard drive ❍ C. Replace the power cord ❍ D. The sound driver needs to be installed. ❍ D. Wrong keyboard driver. ❍ C. Quick Answer: 228 Bad transformer Bad AC port on the laptop Bad battery Bad CMOS battery Quick Answer: 228 Detailed Answer: 236 . ❍ D. The volume is turned down. Michelle’s laptop powers on only when the AC adapter is connected to it. 34. ❍ D. What could be the issue? ❍ ❍ Quick Answer: 228 Detailed Answer: 235 A. Detailed Answer: 236 Time Net time Net timer Net time set 37. John can’t get any sound out of his laptop’s speakers. 36. The laptop is on battery power. ❍ D. he is getting numbers and letters when he types in his username. ❍ C. Numlock is on. Clean the inside of the computer 35. Jason complains that instead of just letters. The computer is located under a desk directly on top of the carpet. ❍ B. How would you remedy the situation? (Select the two best answers. B.) ❍ ❍ ❍ Quick Answer: 228 Detailed Answer: 235 A. A customer reports that a computer is very loud and occasionally turns itself off. What is wrong with the laptop? ❍ A. he cannot log on to Windows.220-802 Practice Exam C 213 ✓ Quick Check 33. He’s using the wrong version of Windows Media Player. The Caps Lock is on. ❍ C. Bad keyboard. C. Because of this.

Jailbreaking VirusBarrier Super-admin powers Quick Answer: 228 Detailed Answer: 236 Microsoft PowerToys USMT Robust file copy Sync Center 42. Sticky keys C.168. ❍ B. ❍ D. Arp -a Ping Nbtstat -a Arp 39. Which of the following commands would result in the following output? Quick Answer: 228 Detailed Answer: 236 192. ❍ C. ❍ B.214 Chapter 9 ✓ Quick Check 38. Language bar B. Character map 40. which utility enables you to select and copy characters from any font? ❍ ❍ ❍ Quick Answer: 228 Detailed Answer: 236 A. Control Panel > Fonts ❍ D. Which of the following can be described as removing the limitations of Apple iOS? ❍ A. ❍ D. ❍ C. ❍ B.100 00-1C-C0-09-08-07 ❍ A. Which of the following built-in applets should a technician use to configure offline files and folders in Windows 7? ❍ A.1. ❍ D. In Windows Vista. ❍ D. Detailed Answer: 236 Rooting 41. Quick Answer: 228 Unicode EBCDIC ASCII ITU-T Quick Answer: 228 Detailed Answer: 237 . ❍ C. ❍ B. ❍ C. Which language support for representing characters is built in to Windows? ❍ A.

47. ❍ C. C. B. Tony’s printer is printing all blank pages. ❍ B. Your company’s network printer is no longer printing. Printer is not plugged into the USB port. The printer NIC is faulty. No power to the transfer corona. The printer is not running in full duplex. ❍ D. ❍ B. Which is most likely the problem? ❍ A. Readme. You can ping the gateway but not the printer’s IP. Which of the following is the best source of information about malicious software detected on a computer? ❍ ❍ ❍ Quick Answer: 228 Detailed Answer: 237 A. All cables and settings are correct. ❍ D. Which of the following commands should you issue on the Windows XP computer to view the network settings? ❍ A. Operating system documentation B. ❍ D. Viruses have been detected and removed on a customer’s computer several times during the course of several weeks. What is the cause of this? ❍ ❍ ❍ Quick Answer: 228 Quick Answer: 228 Detailed Answer: 237 A. ❍ D. Detailed Answer: 237 Tracert Ipconfig Netdiag Pathping 44. and browser history Defragment the hard drive Install antivirus software that uses manual updates Discuss safer web browsing habits with the customer Quick Answer: 228 Detailed Answer: 237 . ❍ C. Anti-spyware software website C. cookies. The printer needs a new maintenance kit. Which of the following will best help prevent future occurrences? ❍ A. 45. Quick Answer: 228 Delete temporary files. You suspect the user’s network settings need to be changed.220-802 Practice Exam C 215 ✓ Quick Check 43. The user of a previously infected computer 46. A user has just moved to a new office and is unable to access the network. Detailed Answer: 237 The printer memory is full. ❍ C. Dirty primary corona. ❍ B. Toner cartridge needs to be replaced.txt file included with the anti-spyware software installation ❍ D.

❍ C. ❍ C. Which of the following is most likely the cause of this problem? ❍ A. A computer is responding slowly and the Windows Task Manager shows that spoolsv. ❍ C. Detailed Answer: 237 Remote Desktop 49. ❍ D. The files cannot be stored at any company location. Which of the following sends an invitation by e-mail asking for help? ❍ A. You need to copy and paste information from a web page.216 Chapter 9 ✓ Quick Check 48. You are required to set up a remote backup solution for an Android tablet. ❍ B. ❍ C. ❍ D. Detailed Answer: 238 C:\Windows\System32\Config 51. Quick Answer: 228 Windows update is running. Which program should you use as an intermediary? ❍ A. The printing subsystem. Service call VNC Remote Assistance C:\System Files C:\Windows\System32 Quick Answer: 228 Detailed Answer: 238 iCloud Android Cloud backup Microsoft Cloud Local NAS device Quick Answer: 228 Detailed Answer: 238 CMD Excel Notepad MMC 52. ❍ B. ❍ C.exe is using 95% of system resources. ❍ B. Quick Answer: 228 C:\Windows 50. Which technology should you select? ❍ A. A virus infection has occurred. ❍ D. which of the following is the default location for the system files of Windows 7? ❍ A. ❍ B. Hyperthreading has been disabled. When performing a clean installation. ❍ B. ❍ D. ❍ D. but you want to remove all formatting so that it can be pasted cleanly into Word. Quick Answer: 228 Detailed Answer: 238 .

❍ D. The corona wire is frayed. A protocol that allows real-time messaging ❍ C. ❍ B. A malicious individual has hacked the system. The toner cartridge is defective. ❍ C. What is the most likely problem? ❍ Quick Answer: 228 Detailed Answer: 239 A. Detailed Answer: 239 Metadata 56. You observe that the pages have wrinkles and random patterns of missing print. ❍ D. ❍ C. ❍ D. Which of the following descriptions classifies the protocol IMAP? ❍ ❍ A. 55.220-802 Practice Exam C 217 ✓ Quick Check 53. A user reports that a laser printer is printing poorly. An e-mail protocol that allows users to selectively download messages ❍ D. The message states that the BIOS logged a chassis intrusion. My Documents Libraries Public Documents Quick Answer: 228 Detailed Answer: 239 Device Manager Task Manager Computer Services console 57. From which of the following locations could you disable a hardware component on a laptop in Windows? ❍ A. Which of the following is a user-defined collection of folders that acts as logical representations of the user’s content? ❍ A. ❍ B. The fuser needs to be replaced. An e-mail protocol that allows users to send but not to receive messages Quick Answer: 228 Detailed Answer: 239 B. The computer case has been opened. Quick Answer: 228 The CD drive tray is open. ❍ B. There is high humidity in the room. A protocol that authenticates users who are sending e-mail 54. What would be your explanation to the user? ❍ A. ❍ C. A user asks you to explain a message that comes up on the computer display before the operating system boots. ❍ C. ❍ B. The CPU is loose. Quick Answer: 228 Detailed Answer: 239 . ❍ D.

Initiate a soft reset B. The lab network is down. Quick Answer: 228 Quick Answer: 228 Detailed Answer: 240 A. ❍ B. Quick Answer: 228 Detailed Answer: 240 . A school classroom is set up with removable drives to train students in Windows 7 and Windows Vista. Initiate a hard reset C. ❍ D. ❍ B. Users are reporting to you that a Windows 7 feature asks them for confirmation before running certain applications or when making system changes.com and want to check the status of the connectivity to that web server over a span of half an hour. One student tells you that one of the computers will not boot up and receives an error: no operating system found. Which of the following commands should you use? ❍ A. ❍ C. You are experiencing intermittent connectivity to the website www. ❍ B. Security Center. ❍ D. Remove the memory card 61. User Account Control. Quick Answer: 228 Detailed Answer: 240 sigverif dxdiag ping msconfig 62. it can be turned off under Security in the Control Panel. Quick Answer: 228 Detailed Answer: 240 ping –t ipconfig /all nslookup ping –l 60.davidlprowse. and where should you direct users to turn the functionality off? ❍ A. The memory is not seated properly. Which command-line tool in Windows XP will find all of the unsigned drivers in the computer? ❍ A. ❍ C. What is the name of this Windows feature. it can be turned off in the services MMC snap in. Pull the battery ❍ D. All of the cables are plugged in securely to the computer.218 Chapter 9 ✓ Quick Check 58. 59. The removable drive is not locked. A customer’s Android smartphone was running a third-party VNC application that froze. What should you do? (Select the two best answers.) ❍ ❍ ❍ Detailed Answer: 239 The monitor is not functioning. Which of the following is the most likely cause? ❍ A. ❍ B. ❍ C. ❍ D.

220-802 Practice Exam C

219

Quick Check

C. Windows Firewall; it can be turned off under System
Properties.

❍ D. User Account Control; it can be turned off under User
Accounts in the Control Panel.
63. James is a LAN administrator in charge of printers. Which of the
following should he check first if a Windows user is trying to print
a document and gets the error message “Print sub-system not
available”?

❍ A.
❍ B.
❍ C.
❍ D.

Printer has been added.
Spooler service is running.
Printer has power from the jack.
Quick Answer: 228
Detailed Answer: 241

Check the power cable to the hard disk
Check the power supply for proper voltages
Check the BIOS settings for the drive controller
Check the drive cable to make sure it is oriented correctly on both the drive and the board

E. Check the drive jumpers for correct master/slave
relationships

65. Your manager’s Windows computer locks up after the graphical
user interface starts to load up. However, the computer will boot
in Safe Mode. When you access the Event Viewer, you see an
entry that states that a driver failed. Which of the following would
help you further diagnose the problem?


Detailed Answer: 240

Correct printer driver is installed.

64. A customer installed a new hard disk on a computer and now cannot boot the machine. You notice that the hard drive LED stays on.
What should you do to troubleshoot this problem? (Select the two
best answers.)

❍ A.
❍ B.
❍ C.
❍ D.

Quick Answer: 228

Quick Answer: 228
Detailed Answer: 241

A. Run sigverif.
B. Enable Boot Logging. Then, in Safe Mode analyze the
ntbtlog.txt file.

❍ C. Disable Driver Signature Enforcement.
❍ D. Access Debugging Mode.
66. Which of the following commands would be used to fix errors on
the system disk?

❍ A.
❍ B.
❍ C.
❍ D.

Xcopy
Tracert /w
Diskpart
Chkdsk /F

Quick Answer: 228
Detailed Answer: 241

220

Chapter 9

Quick Check

67. A new program is crashing and causing the computer to lock up.
What is the best location to check for further information about
the cause of the crash?

❍ A.
❍ B.
❍ C.
❍ D.

Detailed Answer: 241

System log
Security log
Application log
Setup log

68. Which of the following versions of Windows 7 can run in
Windows XP mode, join domains, and utilize BitLocker
encryption?



Quick Answer: 228

Quick Answer: 228
Detailed Answer: 241

A. Starter
B. Home Premium
C. Ultimate

❍ D. Professional
69. A customer’s computer is running Windows Vista Ultimate 32-bit.
The customer would like to upgrade to Windows 7. Which of the
following operating systems can the customer’s computer be
upgraded directly to?

❍ A.
❍ B.
❍ C.
❍ D.

Windows 7 Professional 64-bit
Windows 7 Ultimate 32-bit
Windows 7 Ultimate 64-bit
Quick Answer: 228
Detailed Answer: 241

Xcopy
Edit
Copy
Move

71. You are tasked with disabling services from starting up on a
Windows 7 PC. Which command should you run to bring up
a window to make these changes?

❍ A.
❍ B.
❍ C.
❍ D.

Detailed Answer: 241

Windows 7 Professional 32-bit

70. You are tasked with copying the entire Users folder and subfolders
to a new computer. Which command should you use?

❍ A.
❍ B.
❍ C.
❍ D.

Quick Answer: 228

SFC
Chkdsk
Msconfig
GPupate

Quick Answer: 228
Detailed Answer: 242

220-802 Practice Exam C

221

Quick Check

72. You replaced two 1 GB DIMMs with two 2 GB DIMMs on a
Windows Vista 32-bit computer. When you reboot the computer,
the BIOS recognizes 4 GB of RAM but the operating system only
shows approximately 3 GB. Which of the following is the most
likely reason for this?

❍ A.
❍ B.
❍ C.
❍ D.

Quick Answer: 228
Detailed Answer: 242

The new RAM is not the correct speed.
Vista only sees 3 GB of RAM.
The new RAM is not the correct type.
There is a memory hole in the BIOS.

73. What is the most important aspect of using offline files on a
networked computer?

A. Size of the computer hard drive

B. Availability of either a CD or DVD-ROM on the
computer

Quick Answer: 228
Detailed Answer: 242

❍ C. Proximity of the computer to the server
❍ D. File server operating system
74. Which of the following is an executable that checks the integrity of
an NTFS volume in Windows?

❍ A.
❍ B.
❍ C.
❍ D.

Autochk.exe
Convert
Regedit.exe
Quick Answer: 228
Detailed Answer: 242

\Boot
\Windows
\Documents and Settings
\Bootmgr

76. Jim attempts to plug a scanner into the front USB port of a
Windows computer, but the scanner does not power on. What
should you recommend to Jim?

❍ A.
❍ B.
❍ C.
❍ D.

Detailed Answer: 242

NetBEUI

75. In Windows 7, which of the following folders might be stored in a
hidden partition by default?

❍ A.
❍ B.
❍ C.
❍ D.

Quick Answer: 228

Use a different USB cable
Run Windows update on the computer
Upgrade the computer’s drivers
Use the onboard USB ports

Quick Answer: 228
Detailed Answer: 242

222

Chapter 9

Quick Check

77. One of your customers has a wireless network that is secured
with WEP. The customer wants to improve data encryption so that
the transmission of data has less of a chance of being compromised. Which of the following should you do?

❍ A.
❍ B.
❍ C.
❍ D.

Quick Answer: 228
Detailed Answer: 243

Reconfigure the network to use WPA2
Use MAC address filtering
Modify the WEP key every week
Disable the SSID broadcast

78. Which the following is the difference between a Stop Error (for
example, stop C0098xxxx) and a Dr. Watson error?

A. A Dr. Watson error occurs before the Windows GUI
appears.

B. A Stop error is known as a blue screen and causes
complete system failure.

C. A Dr. Watson error is usually related to a damaged
graphics adapter or memory chip.

Quick Answer: 228
Detailed Answer: 243

❍ D. A Stop error writes the error to a memory dump file
before restoring the system to a working state.
79. One of your co-workers just installed a newer, more powerful
video card in a customer’s computer. The computer powers down
before it completes the boot process. Before the installation, the
computer worked normally. Which of the following is the most
likely cause of a problem?

A. The video card is not compatible with the CPU.

B. The monitor cannot display the higher resolution of
the new video card.

Quick Answer: 228
Detailed Answer: 243

❍ C. The computer’s RAM needs to be upgraded.
❍ D. The power supply is not providing enough wattage for
the new video card.
80. A customer states that an inkjet printer is printing streaks on documents. What should you do to resolve this issue?

❍ A.
❍ B.
❍ C.
❍ D.

Replace the printer data cable
Use the printer’s clean option
Print a test page from the printer
Reinstall the drivers

Quick Answer: 228
Detailed Answer: 243

220-802 Practice Exam C

223

Quick Check

81. Which of the following commands is used to display hidden files?

❍ A.
❍ B.
❍ C.
❍ D.

dir /o

dir /d
dir /?
Detailed Answer: 243

Run Chkdsk
Run Msconfig
Check the System log
Quick Answer: 228
Detailed Answer: 244

The installed application contains a logic bomb.
The installed application is a worm.
The installed application is a Trojan horse.
The installed application included adware.

84. What should you do to prepare a mobile device in case it is stolen
or lost? (Select the three best answers.)


Quick Answer: 228

Go into Safe Mode

83. You get a complaint from a customer that her computer started
receiving pop-up ads after she installed an application within
Windows. What is most likely the problem?

❍ A.
❍ B.
❍ C.
❍ D.

Detailed Answer: 243

dir /a

82. After installing a new video card, the PC loads Windows and
continuously reboots. What should you do first?

❍ A.
❍ B.
❍ C.
❍ D.

Quick Answer: 228

Quick Answer: 228
Detailed Answer: 244

A. Disable Bluetooth
B. Configure remote backup

❍ C. Enable Wi-Fi encryption
❍ D. Enable GPS
❍ E. Enable Wi-Fi tethering
❍ F. Configure a pattern screenlock
85. You want your computer to boot off of the network and have the
ability to be brought out of sleep mode over the network. Which
two technologies should you implement in the BIOS?

❍ A.
❍ B.
❍ C.
❍ D.

WAP and WPA2
RIS and Magic Packet
PXE and WOL
Norton Ghost and Unattend.xml

Quick Answer: 228
Detailed Answer: 244

224

Chapter 9

Quick Check

86. Two co-workers share the same file inside a folder. User A works
on the file, makes changes, and saves the file. User B then works
on the file, makes changes, and saves the file as well. The next
time User A attempts to open the file, she receives an access
denied error. What could cause this error message?

A. The NTFS permissions were changed on the file to
allow only execute.


B. The file was set with the system and hidden attributes.

Quick Answer: 228
Detailed Answer: 244

C. The file was set to read only by the Accounts
Receivable administrator.

❍ D. The file was moved before being modified and then
moved back to the share.
87. A customer brings in a laptop with a non-functioning LCD screen
that always remains black; however, when you connect the laptop
to an external monitor, the laptop boots to Windows normally.
Which of the following actions should you take first?

❍ A.
❍ B.
❍ C.
❍ D.

Replace the LCD panel with a compatible model
Check the functionality of the LCD cutoff switch
Install a different video card
Quick Answer: 229
Detailed Answer: 245

SATA
PATA
USB
Solid-state

89. In Windows Vista, which of the following commands should be
used to verify that a previous system shutdown was completed
successfully?

❍ A.
❍ B.
❍ C.
❍ D.

Detailed Answer: 244

Replace the inverter

88. You are troubleshooting an issue over the phone and determine
that the user has a faulty hard drive. The only information the user
can give you is that the computer was bought in the late 1990s
and the drive capacity is 40 GB. Which kind of HD should you
bring to the service call?

❍ A.
❍ B.
❍ C.
❍ D.

Quick Answer: 228

ipconfig
chkntfs
chkdsk
sfc

Quick Answer: 229
Detailed Answer: 245

❍ B. The spooler is not functioning. You successfully ping the printer’s IP address.) ❍ A. ❍ B. ❍ C.) ❍ A.11n wireless network adapter in a desktop computer. Install a signal booster 93.11n access points are available. The printer is out of paper. ❍ C. No IEEE 802. ❍ D. Quick Answer: 229 PowerShell Command Prompt Command-line Windows Script Host Quick Answer: 229 Detailed Answer: 246 . which of the following enables administrators to perform administrative tasks that integrate scripts over a network? ❍ A. The access points cannot accept any more connections. In Windows 7. Which of the following should you implement on the wireless network to help prevent unauthorized access? (Select the two best answers. Install additional wireless access points ❍ B. ❍ B. Use WPA2 ❍ C. 92. Broadcast the SSID ❍ D. 802. Quick Answer: 229 Quick Answer: 229 Detailed Answer: 245 The printer is low on toner. The network cable is unplugged. ❍ Detailed Answer: 245 Authorization Identification Identity proofing Authentication 91. ❍ B. ❍ D.11n is not supported on the network. Use MAC filtering ❍ E. What is the problem? (Select the two best answers. Detailed Answer: 245 The access points are out of range. ❍ D. A customer tells you that a networked printer is not printing documents. ❍ D. He tries to connect to an access point but doesn’t see any access points in the wireless configuration manager. ❍ C. E. The gateway address on the printer is incorrect. ❍ C. Your boss asks you to install a new wireless network.) Quick Answer: 229 Detailed Answer: 245 ❍ A. 94. Why are none of the access points listed? (Select the best answer. Logging on to a network with a username and password is an example of what? ❍ A. Ray installs a new 802.220-802 Practice Exam C 225 ✓ Quick Check 90.

You have been asked to replace the wireless network adapter in a laptop. ❍ C. Quick Answer: 229 Computer Management 97. After performing the replacement tasks. Windows Easy Transfer User State Migration Tool Profile Transfer Tool Task Manager Tasklist Quick Answer: 229 Detailed Answer: 246 FAT32 FAT64 NTFS FAT16 Quick Answer: 229 Detailed Answer: 246 The new network card was not seated properly. 99. Detailed Answer: 246 Control Panel 98. ❍ C. Which of the following can be used to kill a running process? ❍ A. The software drivers were not installed. ❍ D. ❍ B. ❍ B. ❍ C. the laptop cannot locate any wireless signals. Which kind of threat is this an example of? ❍ A. ❍ B. What is the most likely cause of the problem? ❍ A. Quick Answer: 229 Spyware Virus Rootkit Spam Quick Answer: 229 Detailed Answer: 247 . ❍ C. The antenna leads were not reconnected. ❍ B. ❍ B. ❍ D. Detailed Answer: 246 Files and Settings Transfer Wizard 96.226 Chapter 9 ✓ Quick Check 95. ❍ D. ❍ C. Which of the following tools should you use in Windows 7 to migrate user files and settings for multiple computers? ❍ A. ❍ D. Which of the following file systems is suited specifically for USB flash drives? ❍ A. There are no wireless signals available. ❍ D. A program has been detected collecting information such as the computer name and IP address and sending that information to a specific IP address on the Internet.

In System Information ❍ F. With Gpedit. In Performance Monitor ❍ B. Quick Answer: 229 Detailed Answer: 247 . Within the Task Manager ❍ E.exe ❍ G. You are required to stop the Windows Firewall service.msc And that wraps up Exam C. Take a nice long break before moving on to the fourth and final 220-802 exam. In Services. Within Msconfig ❍ D. How can you accomplish this? (Select the three best answers.220-802 Practice Exam C 227 ✓ Quick Check 100. With the net stop mpssvc command ❍ C.) ❍ A.

A 67. D 76. A and D 55. B 54. D 86. A 20. B 51. D 68. and G 30. B 24. and E 49. C and E 38. A 85. C 66. A 4. C 43. C 11. D 35. A 65. D 81. D 9. C 14. C 64. and F 27. D 70. C 80. B and D 47. C 41. D 75. D 53. B 72. D 60. B 87. B 56. B 8. A 73. A 36. A and E 63. B 15. A and D 40. C . A 16. C. A and D 62. C 59. B 82. C 37. A 25. D 45. C 12. B 23. B 79. B 21. C and D 52. A 18. D 78. D 32. B 42. D. D and E 7. D 22. D 26. D 19. B 17. A 46. C 33. C 57. A 34. D 29. A 48. C 10. A 31. C 28. A. B 58. B 61. B 44. B. D 5. C 84. A and C 3. B 74. B 69.228 Chapter 9 Quick-Check Answer Key 1. A 71. B. D 77. C 39. A 13. E. C 50. A. A 83. C 6. A 2.

B 100. B and D 97. A 98. D 95. A 99. D 89. C and E 96. A 90. D. and G 229 .220-802 Practice Exam C 88. C 91. B 93. B. B 94. A 92.

check if that is seated properly into the expansion slot. A remote access server (RAS) allows users to connect remotely to the network. such as normal. Then check if the RAM and then the CPU are properly installed and compatible. 4. and you would see some HDD LED activity. then that is not enough to protect confidential information. You should also check if that card works in one of your test systems. Answer: D. nothing would happen when you press the computer’s power on button. some systems will not boot. If the SATA data cable is disconnected (and that was the only problem). so properly disposing of a single hard drive doesn’t protect any and all confidential information from being publicly disclosed. The classification of data helps prevent confidential information from being publicly disclosed. As for the incorrect answers: The hard drive won’t even be accessed if the system’s RAM. By classifying data. Finally. you would get video. Now. you are determining who has access to it. or both. then you need to consider what I like to call the big four: motherboard. video card. or destroy it to make sure that no one can access the data. 2. you should inquire with the customer as to when this computer failed and if anything was modified on the system of late. Answer: C.230 Chapter 9 Answers and Explanations 1. HKEY_LOCAL_MACHINE is the registry hive that stores information about the programs Windows runs when it starts. These are the four components of the computer that could cause a no display issue. at the beginning of this process. and there is no display. and then when the system attempted to boot to the hard drive. There will be little to no activity on the HDD LED. The most common is the video card. E. The thing is that data is always stored somewhere on a server or NAS device. and top secret. and G. B. You want to set a new default printer in the OS because he has installed a new printer. lack of video will cause the system to stop at POST. an organization might opt to use a VPN or RADIUS server. If the computer is receiving power. To protect the connection (and data that passes through it). Answers: A. check the motherboard if necessary. the system might still boot. 3. This is usually done simply by right-clicking the printer and selecting Set as default printer. but without video. you would get a “missing OS” error or similar message. or CPU fails because the system won’t even POST. degauss the drive. motherboard. Social engineering is the art of manipulating people into giving classified information. CPU. The scenario said that the computer was receiving power. Wiping a hard drive is vague. Some organizations will have a classification scheme for their data. if the video card failed. This is if you double-clicked the printer to open it and then selected the first menu. Of course. You would question the user during step 1 of the CompTIA A+ troubleshooting process: Identify the problem. Policies are implemented to make top secret data the most secure on the network. How is it being wiped? If it is being formatted. This is generally done on a need-to-know basis. However. Unused printer drivers for older printers should be removed when the older printers are replaced. The power supply is not the cause of the problem in this case. Answer: A. This might help you troubleshoot the problem. You might also see a question with the option to click File (or Printer). everything is hooked up properly. and RAM. The DVD-ROM drive won’t cause a no display issue because it is a secondary device. You need to perform bit-level erasure with third-party software. secret. If the power supply fails. the system would POST (and most likely record a HDD error). The actual hives are stored in .

then formatting. 9. Windows should recognize it automatically. be sure to make persistent connections. That of course is optional. Once Windows knows which hard drive to install to. its key code is required to gain access to the network. 6. Answers: C and E. it is based on the physical Media Access Control (MAC) address of the computer’s network adapter. SCSI drives. Mobile devices such as . Answer: A. and you might see them referred to that way on the exam as well. However. The Internet Message Access Protocol (IMAP) receives e-mail and uses port 143. HKEY_CLASSES_ROOT contains information about registered applications and file associations. You can configure advanced settings for TCP/IP. and lots more from here.220-802 Practice Exam C 231 \%windir%\System32\Config. POP3 also is used to receive e-mail. If only one computer is connected to the switch. to be handed out to clients. The first thing you need to supply is the driver for any special SATA drives. but that would be strange and rare. Rapidly blinking LED lights might lead you to believe that the computer’s network card (NIC) or the port on the switch is faulty. DHCP settings simply allow a specific range of IP addresses. Answer: C. Answer: D. The Device Manager is where you enable and disable devices and install. MAC filtering is used to restrict computers from connecting to a network. The HKEY_LOCAL_MACHINE hive is the one you will access the most often. another port that is used for SMTP is 587. But it’s okay to call HKEY_LOCAL_MACHINE and the other HKEYs hives. The Simple Mail Transfer Protocol (SMTP) uses port 25 by default to send mail but will use port 443 if SSL or TLS security is implemented. there shouldn’t be much activity. WPA is used to encrypt the wireless session between a computer and the wireless access point (WAP). partitioning. HKEY_CURRENT_CONFIG contains data that generated when the system boots. Answer: C. If you have a typical SATA drive. 10. but not in this question’s scenario. You can type the IP address of the router into the Windows Explorer address bar. as broadcast out over radio waves by the WAP. The SSID broadcast is the name of the wireless network. If you do choose to use the net use command. it could be that the person is sending a lot of data to himself while you are testing the network. but that will simply open an IE (or other browser) tab. What should have been port 143 was probably configured incorrectly if the person can send but not receive e-mail. Answer: A. 8. the GUI of the OS. Internet Explorer (or any other web browser) is normally used to configure a router. or RAID controllers. Most technicians do it. It’s sometimes referred to as romming into the router because the configuration program is stored in the ROM chip of the router. Msconfig is used to modify how the computer boots and to enable/disable programs and services. This is done to avoid being blocked by ISPs and to reduce spam. By the way. 5. and then configuration of settings can commence. This is done by adding /persistent:yes to the command syntax. and other IP data such as gateway address and DNS server address. The server doesn’t have anything to do with this. HKEY_USERS stores the information for each user profile. nothing is permanently stored. Although Windows has the Reconnect at Logon check box selected by default. Port 110 is the POP3 e-mail port. It works with wired or wireless connections. in that order. update. 7. it could have been disabled. nor does the hard disk. and roll back drivers for devices.

Be sure to work with mobile devices and go through the steps of setting up e-mail on both Android and iOS. If the second computer works fine. The print spooler needs to be restarted on the computer that started the print job or the computer that controls the printer. By default. Then. Answers: A and D. cool air from entering the PC and cause the CPU to overheat. This tells you whether there is physical connectivity. you need to make an “exception. . 11. The PC air intakes are probably clogged with cement dust. This will stop fresh. it would cause intermittent shutdowns. But I’m going to pontificate more as I usually do. install drivers (from the manufacturer’s website. but it won’t cause the computer to not power on. press the reset switch on the power strip. or anywhere else where services can be started and stopped such as the Task Manager. and verify that the voltage switch is in the correct position.232 Chapter 9 Android phones can be a little more difficult to configure e-mail on. Answer: C. Start with the physical! Check for a link light first. if necessary. Okay. Answer: B. If the power supply was underrated. but the real exam will have a couple easy ones thrown in as well. these computer manufacturers spend a lot of time designing their heat sink/fan combinations to work with the CPU. 12. as compared to PCs.” You can access this in Windows XP by going to Local Area Connection Properties > Advanced tab. but not lockups. This can be done in the Services console window or in the Command Prompt with the net stop spooler and net start spooler commands. Check the basics first! Make sure the power cable wasn’t disconnected from the computer. use the Windows Firewall with Advanced Security: Start > All Programs > Administrative Tools. The CPU heat sink could be an issue and could cause the same results. 13. Answer: B. you should clean out the inside of the system and vacuum out the exhaust of the power supply (without opening the power supply of course). While you are working on the computer. and finally replace the NIC. 14. If you decide to add a port. but if it does. RealVNC is normally port 5900 for incoming connections. any Windows OS after and including Windows XP SP2 enables the Windows Firewall automatically and won’t allow inbound connections from the server to the network application. you need to know the port number of the application. Uninstalling and reinstalling the SP will not help this particular situation. 15. but it is less likely. then that tells you the power strip is plugged in. The monitor being unplugged could be a separate problem. If the PC had a virus. Don’t think too hard when you actually do receive an easier question. that might cause it to lock up or shut down. that was an easy one. In Windows 7/Vista. Adding the port number and name of service to the Windows Firewall Exceptions list is the correct answer. Nothing in the scenario would lead you to believe that the computer uses so many powerful components as to make the power supply underrated. Answer: C. test the patch cable. reconfigure TCP/IP. Companies often buy computers from popular manufacturers such as Dell and HP. mind you). in order. You should install a filter in front of the PC air intake and instruct the customer to clean the filter often. That’s why the system won’t reboot immediately because the CPU needs some time to cool down. Kids like to play tricks on lab computers! A standard power strip should not overload with just two computers connected to it. Plus. Therefore. but you would be able to reboot the computer right away. you can. For example. there would probably be other indicators of a virus.

17. brownouts. and any security settings. Answers: A. and E. 21. 18.220-802 Practice Exam C 233 16. but it will be less likely. 22. Bluetooth can be off while e-mail is being used. HTPCs will have a video card with an HDMI output. as long as you are within close proximity to a metropolitan area. connect it to its own line conditioner. it will only protect against surges and spikes. server names. As for the incorrect answers: a multimeter is what you would have used to figure out that the AC outlet was providing dirty power. Then the NTFS file-level “user” permissions must also be set. C. that person does so over the network to a remote computer. tracert (short for trace route) can show the entire path between you and a final destination. ipconfig displays basic information about your network connection. This is due to cable company regulations. This will protect against power fluctuations. plus it will cost the friend more in money and maintenance as compared to a UPS. Answer: C. The computer will have a power supply already. It’s not outside the realm of possibility. First make sure that the iPad has a connection to the Internet. username/password. The share-level permissions must first be set to enable access to the user. The TV tuner is used to enable the Live TV option in Windows 7 Media Center. 19. unless the share-level access is set to deny. Local user access is somewhat vague but doesn’t apply here because when a user connects to a shared resource. dirty power. displaying every router (or hop) in between. The best wireless encryption method on most SOHO wireless access points is WPA2 with AES. these take precedence over share-level. Then check that the e-mail settings were entered properly. Answer: A. including port numbers. and blackouts. The network adapter (also known as a network card or NIC) is used to connect to the LAN. The question did not specify that this was a laser printer. ping tests your network connection against other hosts. and most friends of mine have inkjets. WAP is actually short for wireless access point. A surge protector will not condition the voltage that is coming from the AC outlet. but it might be . Tell the customer to use a UPS. thereby allowing you to configure and modify a name server. GPS tracks where a mobile device is located. often. nslookup enables you to look up name servers and run several commands when connected in the NSLOOKUP shell. However. it is not wise to keep a gas generator in the house. This is usually the toughest part to configure on an HTPC. don’t mix them up! WEP is deprecated and should be avoided unless it is the only option available. Answer: D. and that’s what you have to assume when taking the exam. Use an uninterruptible power supply (UPS) to provide clean power and eliminate the voltage fluctuations—with the stipulation that the printer is not a laser printer! If it’s a laser printer. 20. That is because of the load the laser printer puts on the device it plugs into. Answer: A. Answers: B and D. and it too can be turned off when accessing e-mail. WPA2 is more secure than all the rest. Video cards display video signal to a monitor or TV. A modem is used to make dial-up connections to the Internet. Certificates are normally used in Internet or VPN sessions. A gas generator is a ridiculous option that would actually work in this scenario. TV tuners are also becoming more popular when used with over-the-air signals including HD. However. A similar command that gives slightly less information is pathping. Answer: B. A generator is a bit much for the computer in this scenario.

. this is a heavy-duty electrical cord. 24. You might need to do so just as a matter of organizational policy. If the page file was on either of the other SATA drives. though an OS update might find a compatible driver. and definitely irreplaceable. but you should know some of the terms in order to compare them to security options on the local computer. Pictures and e-mail are possibly valuable. By separating the page file from the operating system and the user profiles. In many cases.234 Chapter 9 necessary for the building. With peripherals such as these. If the password could be reset and you are allowed to do so. Answers: C and D. internal drives will perform more efficiently than external drives. That is the best answer. Answer: B. Answer: D. users are safe from external public IPs. you will maximize performance of the system. Computers normally connect with an IEC power cable. The Local Security Policy can be accessed from Start > All Programs > Administrative Tools. passwords cannot be reset by the user or by the systems admin. but it will be less likely that you will change the channel or boost the power. Answer: B. you should replace it immediately. Answers: A and D. it’s tough to have too many USB devices! 29. it is all the more important to get the driver from the creator of the device. Some IR devices’ transmission frequency can be changed. it will have less latency. 23. 25. Answer: B. if there is no backup. Most IR devices’ power cannot be boosted. the constant accessing of the page file would slow down the OS performance or would slow down the access of user files. In the instance of barcode readers. If the computer doesn’t have one. All the others require at least one domain controller on the network. SATA hard drive 3 is a better option than the external USB hard drive for a variety of reasons: it will probably be faster. This is why Bluetooth or other wireless methods are usually preferred. you need to verify the identity of the person first. If that is the case. Use Internal SATA hard drive 3 for the page file. 28. 26. Let’s face it—at 127 devices maximum. it doesn’t work perfectly all the time. You should try shortening the distance between the laptop and the printer and make sure that the infrared (IR) ports on each device can see each other. Repeaters are used in networking as a method of extending a wired or wireless LAN. 27. The rest of the answers mention things that can be restored or reinstalled from the operating system disc. It enables the outside sources to “see” the public IP but not the internal private IPs. the only one that deals with the local level is Local Security Settings. IR can be difficult to work with due to the short range and need for line of sight. and in general. Of all the answers. Answer: C. Telling the person not to do that or that the person should simply remember the password is just rude. Network Address Translation (NAT) translates all those internal IPs into one external public Internet IP for communication with outside sources. you can rule out faulty USB cables or too many USB devices being plugged in. it should be reset immediately. Because each user on the LAN has his own internal private IP address. If the computer was able to recognize the device. you will often have to download the latest driver from the manufacturer’s website. Though USB is famous for recognizing devices and installing drivers automatically. The A+ exam does not test you on your knowledge of domain controllers and their security policies.

Second. Some of the letters on the keyboard of a laptop are shared by numbers (which are only accessible when the Numlock is on). Auto-erase is used to wipe the contents of the device if lost or stolen. MAC filtering and WPA2 encryption will do a much better job at that than disabling the SSID. 568B is the most common network cabling wiring standard. not only do you have to watch out for the Caps Lock when logging on. If the keyboard were bad. Wiping down the outside of a computer with a cloth won’t do much to fix the situation. Answer: C. It will play most types of music and sounds without an update. 31. you should recommend fiber-optic cables. Another option would be shielded twisted pair (STP). you should get the sound driver from the manufacturer’s website. 35. and you wouldn’t wipe down the inside of the computer.220-802 Practice Exam C 235 30. 32. resulting in the computer turning itself off. The power cord most likely isn’t the problem here. there was probably a lot of dust and dirt in one or more of the fans. you would get no response or only a partial response from it. but also the Numlock. Answer: C. you could rerun the cables through a metal conduit or reroute the cables around the mechanical room. they will have to connect manually or the SSID will have to be reenabled. A clogged CPU fan can also cause the CPU to overheat. it won’t keep smart attackers out of your network. So. static electricity could be generated when a person touches the power button of the computer. take the computer outside and clean it by removing the biggest dust bunnies (which you will undoubtedly find). Passcodes are used to secure the device in the event that it is stolen or lost. Combine this with the computer lying on a carpet. remove the computer from the floor. Many laptops have a nearly hidden volume knob. . Of the listed answers. That should fix the problem of noise. If the device is off. it’s best to keep the computer off of the floor for a variety of reasons. and use compressed air and a vacuum. Answer: B. So. Keyboards are automatically recognized by Windows 7/Vista/XP. If more computers need to be connected later. it will ask to update itself from the Internet. you have to search for it. Windows Media is built in to Windows. Though Windows will attempt to install a Microsoft driver. GPS can help to locate a stolen or lost mobile device. disable the SSID. To aid in preventing access to a wireless network. On a slightly different topic. and it could cause the computer to short out and shut down. A new hard drive isn’t necessary unless you find that it is malfunctioning. Plenum-rated cable is used in areas where sprinklers cannot get to. Answers: A and E. First. Furthermore. the program will display the last known good location. There are plenty of third-party programs that allow the user to track the device. Answer: D. Proper sound drivers are needed to drive the sound in the system. While this is an okay security method. but you could always swap it with another one to be sure. Whether the laptop is on battery power does not affect the speakers by default. It has a coating that makes it burn much more slowly. 33. Chances are in this scenario that the mechanical room’s contents are causing interference on the network cables. But only do this when all computers have been connected. UTP is unshielded twisted pair. probably what the customer is using currently as it is the most common. 34. Electromagnetic interference (EMI) can be prevented with STP or fiber-optic cables. as long as it is on and has GPS installed and functioning. Encryption protects the data in the case that the user no longer has possession of it. Answers: A and D. If Windows Media Player doesn’t recognize a file format.

In this scenario there was only one computer that the local system has connected to recently. The net time command uses the /set option if you wish to synchronize time to another computer. Nbtstat –a. Arp –a does exactly this. along with a computer name or IP address. Sticky keys is a feature that helps users with physical disabilities. The command also enables you to create a permanent or static connection to another system via MAC address and corresponding IP address. HTML Slide Show Wizard.236 Chapter 9 36. 39. date. The command-line–based User State Migration Tool (USMT) is used to move files and user settings from multiple computers at once. Jailbreaking is the process of removing the limitations of an Apple device’s iOS. will show the NetBIOS name table for the local machine or for a remote computer. Apps include CD Slide Show Generator. Control Panel > Fonts opens the Fonts folder where you can add or remove text fonts. If you are just setting the time on the computer. 41. and passwords to be reset in the BIOS. Answer: B. it gives administrative capabilities to users of Android-based devices. it can be turned on by rapidly pressing the Shift key five times and agreeing Yes. net timer is not a valid command. 40. It displays core services running on a computer such as the workstation and server services. A bad transformer means that the AC adapter would need to be replaced. A bad CMOS battery will cause the time. Answer: A. The Language Bar automatically appears when you use handwriting recognition or speech recognition. To open it in Windows 7 or Vista. Time can also be set in Windows within the Notification Area. Both of these are not recommended. The Character Map enables you to copy characters from any font type. If the laptop gets power when plugged in but won’t work when disconnected from AC power. Rooting is similar. Arp by itself shows the help file for the command. the battery must be dead or defective. Super-admin powers is just a colorful term for what you get when you root or jailbreak a mobile device. most likely unauthorized by Apple. but it should work fine on battery power (until the battery fully discharges. Quite often. It can be configured within Region and Languages. The Address Resolution Protocol (ARP) command allows you to see which computers your IP address and corresponding MAC address have connected to recently. ping tests a connection to another computer’s IP address. but it could show more. That and a bad AC port would cause the laptop to fail when plugged into the AC adapter. that is). Answer: D. The Sync Center is located directly within the Control Panel. Answer: A. 37. go to Start > All Programs > Accessories > System Tools > Character Map. Answer: C. and MAC address. the individual icons within the Control Panel are referred to as applets. 38. Answer: D. VirusBarrier is the first AV software designed for iOS. It enables a user to gain root access to the system and download previously unavailable applications. and the Power Calculator. use the time command. It displays these computers formatted as IP. It allows you to set up synchronization partnerships with external devices and enables you to manage offline files. The net time command is needed if you want to synchronize the local computer’s time to another system or just find out the time on a remote system. Those connections listed are considered to be “dynamic” because they are temporary. it was developed in response to a particularly nasty jailbreak. Microsoft PowerToys is a group of applications that can be downloaded from Microsoft as an add-on to Windows XP. Robust file copy is a Command Prompt tool (Robocopy) that is .

but the scenario tells us that you can’t ping the printer’s IP address. 47. pathping is a limited version of tracert. The network interface card (NIC) must be faulty if everything else checks out. Deleting temporary files won’t stop the user from visiting the same websites that probably caused the problem in the first place. it could cause the printer to stop printing. This could indicate that the toner cartridge needs to be replaced. 44. In addition. the paper will not get the positive voltage needed to attract the toner and the pages will come out of the printer with nothing on them. Because of this. an anti-malware solution. If the printer is not plugged into the USB port. If the primary corona wire is dirty. the OS documents and the anti-spyware readme.txt file will be outdated soon after they are written. If the transfer corona wire is not getting power. Answer: A. Answer: D. but it should be set to update automatically every day. Answer: B. This is often . and being conservative about the websites that are accessed. Because it happens often. Also. use ipconfig /all. Answer: D. The computer should have an antivirus solution or. The user is not the person who would remove it—a technician would. For in-depth analysis. not clicking on pop-up windows. Unicode is the code used to represent characters among multiple computers’ language platforms. 46. 48. a virus. phishing filters can be enabled. These invitations could be to ask for help or to offer help. Defragmenting the hard drive will help the drive and the OS to perform better but won’t help in the malware department. add-ons can be installed to a web browser for increased protection. you might see lines or smearing in the text. ipconfig is the ultimate command to quickly display the network configuration information.220-802 Practice Exam C 237 used to move large amounts of data. you should school the user on safer web browsing habits such as being very careful when clicking on links brought up by search engines. at which point the printer needs more than maintenance—it needs repair. the best place to find information about spyware. or other malware is at a place that can be updated often and easily: the anti-malware company’s website. netdiag is an older command used in Windows XP (and earlier OSes) that helps to isolate networking and connectivity problems. Answer: B. Operating system documentation will usually not have this kind of information. Be careful not to confuse duplex printing (printing on both sides of the paper) with full-duplex networking (transmission of data in both directions simultaneously). the browser can be updated. Answer: D. tracert displays the route from the local computer to a remote destination. but it would stop printing only if something failed. which is a telling sign. New malicious software (malware) is always being created. 42. ITU-T deals with standards for telecommunications. A message should display on the Windows screen concerning this as well. ASCII and EBCDIC are different types of character encoding sets in the English language only. it is the successor to Xcopy. If the printer’s memory was full. and so on. Connections can be made by sending Remote Assistance invitations by e-mail (Outlook) or via instant messaging (Windows Messenger also known simply as Messenger). Never trust in what a user has to say about malware. it shouldn’t output any pages because the print job will never reach the printer. though Xcopy is still available in Windows 7 and older OSes. It’s possible that a printer could need a new maintenance kit. 45. 43. Answer: A. better yet.

Then restart the computer. The X: is a variable meaning whichever drive is installed to.exe is the executable. all formatting will have been removed. If the Windows update was running. 49. Collectively the client software is also referred to as Microsoft Terminal Services Client (MSTSC). it enables control of a computer remotely. However. %windir% is also expressed sometimes as %systemroot%. Text and other information can be copied from a web page.exe. it saves the last place you were working. The MMC is the Microsoft Management Console. Mstsc. There are viruses that are also called spoolsv. apps. it should not take up that many resources—not nearly so. It is also possible that a virus has compromised the system. 52. and so on. There are several third-party VNC companies that offer free software. Use Notepad. Microsoft doesn’t refer to its software as VNC though. You would use the Android Cloud backup solution so that files can be backed up to a location outside the company. The printing subsystem is most likely failing for one of a variety of reasons. You might also see this referred to as X:\%windir%\System32 or simply \%windir%\System32. If the NAS was on the Internet or part of a cloud. this can be done only if the computer to be controlled has the Remote Desktop feature turned on. Windows Vista and XP also use this folder for system files. C:\Windows is the systemroot. Excel is a program by Microsoft that enables you to create and modify spreadsheets. Answer: D. This is a utility in Windows that enables you to work with several console windows within the same program. If that doesn’t work. A company-based local network-attached storage (NAS) device would go against what you have been asked to do in the scenario. There is no C:\System Files folder. is the executable that opens the Microsoft Command Prompt. That is. On the server side Microsoft also refers to Remote Desktop as Terminal Services. if the C: is the drive being installed to. It is a text-based editor that applies virtually no formatting. Notepad is also a great tool for web developers (using HTML) and system administrators (when creating batch files and other configuration files). 51. . Virtual network computing (VNC) is very similar to Remote Desktop. where the OS is installed to (though it will also inhabit subfolders). but instead connects remotely. or more specifically cmd. Also. The first solution is to end the spoolsv. the system may have to be repaired.238 Chapter 9 implemented in help desk scenarios in which a user invites a technician to take control of his computer so that it can be repaired.exe. Answer: C. %windir% is a variable referring to the name of the main installation folder (usually Windows). CMD. that would be a different story.exe service in the Task Manger or in the Command Prompt with the taskkill command. It’s effectively a virtual service call. The default folder location for Windows 7 system files is C:\Windows\ System32. C:\Windows\System32\Config is where the registry hives are stored. 50. iCloud is the Apple solution for file backup. Answer: D. a quick sweep of the system folders with AV software should uncover this…hopefully. The technician doesn’t need to come physically to the user’s desk. you can also take control of a computer without an invitation (and if you are an administrator or a user with permissions). pasted to a Notepad document. restored. and then copied again and pasted into Word. The Microsoft Cloud has the same types of features in a variety of solutions. unless you were to create it yourself. There are several other third-party solutions available as well. Answer: B. or modified in the registry (which could be an in-depth process).

56. It is possible that a malicious individual has hacked. IMAP. 54. regardless of whether it is a laptop or a PC. the computer would not boot and there would be nothing to display. like POP3. it must be locked. IMAP is the Internet Message Access Protocol. 53. swappable trays are inserted into the frame. Some BIOS programs have the capability to detect this. authenticates the user. Use the Task Manager to analyze basic system performance and stop processes. a protocol such as SMTP would be used to send mail. As a PC technician. 55. This allows multiple users to manage the same mailbox. If you note toner not being fused to the paper. 57. Hyperthreading can be disabled in the BIOS on some systems. Use the Device manager to disable a component in Windows. you should check the computer inside and out for any possible tampering. IMAP. The most likely reason the computer won’t boot and presents the no OS error is that the removable drive is not locked. Use Computer (My Computer in Windows XP) to view folders. the system. Answer: B.exe. Removable drives are common in schools and labs. If the toner cartridge was defective. and multiple processes should be able to run simultaneously without a problem. it might result in blank paper.000 pages or so on a laser printer. Generally the e-mail client software will leave the messages on the server until the user specifically deletes them. which allows an e-mail client to access e-mail on a remote mail server. though. it is common to forget to . and other computers. For example. either you would get blank printouts or there would be lines or smears. each with a different hard drive and a different OS. Libraries are commonly known as metafolders. but there wouldn’t be any page wrinkles.msc) to stop and start and enable/disable services. The Documents library includes two default locations: My Documents and Public Documents. High humidity could cause the separation pads or rollers to fail. but again not for sending e-mail—just when receiving e-mail. A chassis intrusion means that the computer case has been opened. A frame is installed to a 5 1/4" bay and connected to the motherboard via SATA or IDE the way a hard drive normally would be. Use the Services console (services. 58. but it does not send messages. Answer: D. However. Answer: A. allows users to download or receive messages. one library in Windows 7 is called Documents. Real-time messaging can be accomplished by using instant messaging and chat programs. Answer: B. Answer: A. If the transfer corona wire is defective. Then.220-802 Practice Exam C 239 the executable for that is wuauclt. the user can selectively download messages. So. The fuser usually needs to be replaced every 200. Random patterns of missing print further indicate that the fuser is not working properly. like POP3. or attempted to hack. this is not necessarily the case. The BIOS program will not detect if the CD-ROM drive is open. This is a security feature that informs the user of a possible breach. This should have no effect on the ability of the system to multitask. they are logical representations of a user’s content. Answer: C. Damage to the primary corona wire can also result in black lines or smearing. If the CPU was loose. then that is the last clue. files. When the drive tray is inserted into the frame. although you should check just to make sure. The wrinkled pages are the number one indicator that the fuser needs to be replaced.

and therefore should not get an error message. either the user would get a message stating that the printer is not available or the document would print but the information would be garbled.240 Chapter 9 lock one or two. User Account Control (UAC) is the portion of Windows that asks for confirmation of administrative rights before allowing a user to make system changes or run certain applications. and lost. ping is used to test whether or not another host is on the network. It can be disabled within the User Accounts applet within the Control Panel by clicking the Change User Account Control Settings link. as well as carry out other name server configurations. but the –l parameter enables you to modify the size of the packet being sent. If. but seeing as how many devices store the memory card under the battery. then try initiating a soft reset first. remove the battery so that the device will have its power supply cut. this could indirectly fix the problem. the user would most likely get a message stating that the printer is not available. run this command from the Run prompt. Replace the battery and reboot the phone! Don’t do a hard reset unless it is absolutely necessary. you would get a message in the POST or a series of beeps. ipconfig /all displays the configuration of your network adapter. But beware. If the memory needed to be reseated. It will ping the web server with ICMP echo packets until you manually stop the operation. When the check is finished. only users that have administrative rights should even be permitted to turn this off. and then restarting it after a few seconds. received. an average of the ping results will be displayed. If you receive error messages and are troubleshooting. . Answer: A. it most likely means the spooler has stalled. If it isn’t locked. however. 63. Answer: C. Answer: D. pressing the power button doesn’t do anything. so have no fear—the lab network is probably not down. No operating system or missing OS messages happen before the computer can connect to the network. then you know the monitor is working. 59. The sigverif. If a “print sub-system not available” message or similar message appears. It is used to test the functionality of audio and video devices. 61. nslookup enables you to find out a domain’s corresponding IP address. If the printer is not getting power. Msconfig (the Microsoft System Configuration Utility) is a tool used to troubleshoot the startup process of Windows. the user would not be able to print any documents to any printers. the data port will not connect properly and the OS will not boot. ping –t is a continuous ping. 60. shutting it down. as well as the total packets that were sent. Removing the memory card in of itself won’t fix the problem. this will clear it and return it to factory condition.exe tool can be used to check for unsigned drivers within your operating system. If you can’t shut down the application in the Running Services area. On an Android device this is simply pressing and holding the power button. This list is also stored in a file called sigverif. 62. dxdiag is short for DirectX diagnostics. If the wrong printer driver was installed. Answers: A and C. Unsigned drivers are drivers that have not been verified by Microsoft. You can stop the operation by pressing Ctrl+C on the keyboard. ping –l is a four-packet ping. Answer: A. On an Android-based device. When you do so. If the printer has not been added.txt within the %systemroot%. unsigned drivers will be displayed. If you get a message on the screen. This can be turned back on within the Services section of Computer Management or by issuing the command net start spooler in the Command Prompt.

Windows 7 Ultimate can run in Windows XP mode. and utilize BitLocker encryption. Windows 7 Enterprise can also run BitLocker. The main drive with the OS should be set to master. The security log contains information regarding auditing events. Disabling Driver Signature Enforcement is another ABOM option. 70. It cannot be upgraded to any other version of Windows 7. This is designed to copy entire folders (and all of their subfolders) to a new location. Another option is Robocopy. Once this is enabled. . system files. it is generally the fourth option. Microsoft recommends using Robocopy on newer Windows operating systems. Answer: C. Diskpart is the command-line tool that enables you to make changes to the operating system’s partition table. but in this scenario you don’t necessarily need to debug the system. but newer systems rely on the jumper settings. Windows 7 Professional cannot utilize BitLocker encryption. The move command does just that. join domains.220-802 Practice Exam C 241 64. Windows 7 Ultimate 64-bit. you know that the drive is getting power. but not application crashes. you might use this to help fix the issue. Answer: A. but rather repair the individual driver that failed to load up. If the LED light is on.txt. the other drive (which probably contains data) should be set to slave. Afterwards. 67. On older IDE connections you need to make sure that the data cable is oriented properly on each drive and the motherboard (or controller card). you can access the system by booting into Safe Mode. once again from the ABOM. and similar issues. still newer systems rely on newer technologies such as SATA! 65. Older BIOS systems allowed you to modify master and slave settings. Copy is the original command for copying data from one location to another. although it was not one of the listed answers. Windows Vista Ultimate 32-bit can only be upgraded to Windows 7 Ultimate 32-bit. Starter and Home Premium can do none of these. Answers: D and E. Xcopy copies files and directory trees. If either of these is incorrect. Answer: C. Answer: B. Chkdsk /F allows you to fix errors on a disk. Sigverif is a program that can be run in Windows that verifies whether drivers have been signed by Microsoft. Edit is a program in the Command Prompt that allows you to create and modify text files. 68. Boot Logging can be enabled from the Windows Advanced Boot Options Menu (ABOM). Answer: D. As a rule. Tracert /w analyzes the path to another computer with a specific timeout per reply. Answer: C. Also. the system will automatically create a file called ntbtlog. 69. the hard drive LED could stay on constantly indicating a problem. not all versions of Windows offer this—for example. On a side note. 66. Debugging Mode is another ABOM option. It does not fix all errors. it is the equivalent of the cut in cut-and-paste operations. make sure that the drives are jumpered correctly. but checks for disk integrity. The system log contains information about drivers. bad sectors. the successor to Xcopy. The application log is the location for all events concerning Windows applications and third-party programs. The setup log stores information of events that occurred during the installation of Windows. 32-bit versions of Windows cannot be directly upgraded to 64-bit versions of Windows. but not to diagnose the problem. Use Xcopy. so nothing in the power subsystem should be troubleshot. but it is not as well-suited to copying large amounts of data as Xcopy or Robocopy are. and stop errors.

which is separate from the C drive. and has open files. Answer: A.exe is the executable in Windows that opens the Registry Editor. The Windows folder is where the operating system is installed to. Msconfig is the only option listed where you can disable services. those files are considered to be dirty. 2. Answer: B. This protocol is outdated and is not often found in networks.12 GB of RAM. Answer: D. If the volume to be checked is “dirty”. it should be able to sync them up with any Windows Server. It uses computer names to identify other computers on the network. whereas the rest of the answers run as text in the command-line. The front USB plugs . Chkdsk cannot gain exclusive access to the volume. NetBEUI is a network protocol used by older. That is because these operating systems reserve the remainder for devices in what is known as memory-mapped I/O (MMIO).242 Chapter 9 71. and 3. which can locate and repair errors on the disk. it scans the integrity of protected system files and repairs problems if necessary. it is all done locally. Optical discs are not necessary for offline files to be used. not a folder. Regedit. it is also known by the variable %systemroot% or %WINDIR% and is located in the C: drive by default. This means the ports that are integrated directly to the motherboard on the back of the computer. It’s a quick temporary fix but should work because they are hardwired to the board. The \Boot folder can be located in a hidden partition (100 MB in size). 76. Autochk is similar to chkdsk but autochk runs during system bootup (after a cold boot). If you try to run chkdsk on the boot volume. if a system hangs. It stands for NetBIOS Extended User Interface. It enables a Windows operating system to revert core system settings to their original state. it is a file. 75. Answer: A. and therefore the volume that houses them is also dirty. GPupdate can update user and computer policy settings on the local computer or on remote computers.exe is an executable (and system process) that checks the integrity of an NTFS volume in Windows. So the proximity to the server and the type of OS on the file server isn’t as important. \Documents and Settings is also located in C: by default. As long as the client computer can use offline files (7/Vista/XP). Though the computer is on the network. Windows Vista 32-bit (and Windows XP 32-bit) systems and applications can only use 3. 72. 73. and is checked by autochk after a hard reset otherwise known as a cold boot. But when using offline files. and Windows NT. Autochk cannot run within the command-line. The most important factor is the size of the hard drive. the network doesn’t really play into the offline files on the local computer. Msconfig runs in a Window. Bootmgr is the Windows Boot Manager. This is because the offline files are stored locally. but not within system files. For example. and therefore is not routable to other networks. Autochk will be initiated if: 1. deprecated versions of Microsoft operating systems such as Windows 95/98. Yes. Tell the customer to use the onboard ports. Answer: B. 74. by default. does not use IP addresses. and if possible. Contrast this with Chkdsk. the computer will synchronize files and needs to have proper access to the network and the file server when it does so. Autochk. SFC is the System File Checker. The convert command is used to change a FAT partition to NTFS without loss of data. The key in the question is the phrase “bring up a window”. which is the Windows loader program. Although Windows Vista 32-bit can technically address 4 GB of RAM. Answer: C. Msconfig can also be used to modify how the system boots and to enable/disable applications. whereas chkdsk will run in the command-line or in the Recovery Console.

A faulty data cable would probably cause complete print failure. it should power up. 80. Msconfig is used to boot the computer in different ways. and install the correct one. and cleaning the cartridge nozzle with a Q-Tip. They are due to an application or system file failing but do not cause the entire system to crash. If the back USB ports don’t work. and don’t forget to download the correct driver for your particular operating system. MAC address filtering will not increase the level of data encryption. This might be accessible from the display on the printer or from within the printer’s software in Windows. the computer’s RAM usually does not need to be upgraded. dir /d sorts files by column in wide format. If the monitor could not display the higher resolution. 81. and you will need to roll back the driver and locate. Now. Use the printer’s built-in clean option. Chkdsk will check the integrity of files and fix them if necessary. dir /o deals with various sort orders of files— for example. dir /a can be used to display hidden files. Answer: B. it is not possible in this scenario because the system won’t boot into . download. Specifically. bad drivers would cause the printer to print garbled text.220-802 Practice Exam C 243 are part of the computer case. Software shouldn’t affect the USB device getting power. the operating system would still boot but you would probably see garbled information on the screen. Dr. 79. WEP is a deprecated wireless encryption protocol and should be updated to a newer and more powerful protocol if at all possible. But. Answer: A. try updating drivers and Windows. It probably won’t. 77. Today’s video cards can be very powerful and might require a more powerful power supply than is in the computer currently. Answer: A. Try accessing Safe Mode first and see if the problem continues. after that. If it has a proper USB connection. Because a video card comes with its own RAM. They are a complete system failure that cannot be recovered from and the system has to be rebooted. you should also check if the USB scanner needs to be plugged into an AC outlet. they probably were never connected to the motherboard properly. if Windows doesn’t recognize it. alphabetical. sparingly using a solution of 50% water/50% isopropyl alcohol. but it will filter out unwanted computers when they attempt to connect to the wireless access point. then you could try a different USB cable. If the clean option doesn’t work. it would be wise to use a strong WEP key and modify it often. Cleaning the cartridges is necessary every once in a while so they don’t get clogged. The best solution is to upgrade the wireless network from WEP to WPA2. or at least WPA. Answer: D. 78. Streaks on documents are not caused by faulty data cables or bad drivers. While you normally could select Safe Boot in Msconfig. Video cards need to be compatible with the motherboard. Printing a test page will result in the same document streaks. Answer: B. Remember to get your drivers from the manufacturer’s website. If this is not possible. not necessarily with the CPU. Stop errors are also known as blue screens (BSODs). Answer: B. Watson errors (common to Windows XP) occur while the OS is running. dir /ah can be used to show hidden files only. Disabling the SSID broadcast will deter new computers from making initial connections to the wireless access point. dir /? displays the help file for the dir command. 82. you can try physically removing the cartridge.

As for copying. trigger a remote wipe to remove all data from the device. WPA2 is the Wi-Fi Protected Access version 2 encryption used on a WAP. Generally. RIS is Remote Installation Services and is used on Windows Server 2003 to deploy installations of Windows to remote computers. While pop-up ads are not necessarily harmful to a computer. although it can be replaced on some laptops. Remember this: If the file is moved within the same volume. if the device is compromised. Most likely User B moved the file to another location outside of the current partition. The other half of this solution (not mentioned in the answers) is remote wipe. you have the confidential data backed up outside of the device at another location. If the file was set with the hidden attribute. First off. If a computer starts receiving pop-up advertisements after an application has been installed. To allow the computer to be brought out of sleep mode by another system on the network. But.xml is the answer file created for unattended installations of Windows over the network. Answer: D. you will need to configure Wake-on-LAN (WOL) in the BIOS. However. A Magic Packet is a special packet sent to a computer to wake it up. Norton Ghost is used to create or install images of operating systems. Check the functionality of the LCD cutoff switch first before opening the laptop and replacing parts. Answers: B. you will have to enable the Preboot Execution Environment (PXE) network adapter. It doesn’t make a difference how Bluetooth and Wi-Fi are configured. User A should still be able to open the file. Tricky. On to the incorrect answers: If NTFS permissions were changed to allow execute. a laptop’s video card is the least common component to fail. Once you are positive that the device is stolen or lost. but it won’t explain much except that the system shut down improperly and rebooted continuously. these are prone to failure. They won’t help to protect confidential data. it is less common. and logic bombs) will usually be more serious and affect the computer adversely. but in read-only mode. This way. if the file had been moved within the volume. and F. the application probably included adware. the file’s copy always takes on the permissions of the parent regardless of where that copy is placed. configure a screenlock of some sort. and then moved it back to the original location. 87. the permissions would have been retained. or a password. To configure the BIOS to boot off of the network. then User A should not have been able to see the file. 84. the file takes on the permissions of the parent folder. and you know the data was backed up at some point. 86. The LCD cutoff switch turns off the monitor when the laptop is closed. be it a pattern that is drawn on the display. Enable GPS on the device so that it can be tracked if it is lost or stolen. Unattend. Answer: D.244 Chapter 9 Windows properly. However. if a file is moved to another volume. worms. made the changes (which is possible since User B is the one who moved it). Although the LCD panel and inverter could possibly fail. then User A should have been able to open the file. Whenever a file is moved to another partition or volume. the other answers (including Trojan horse. A strong password is usually the best form of screenlock and will be the hardest to crack. it takes on the permissions of the folder it is moved into. . 85. Second. it retains permissions. they should be checked afterwards. and because they require a lot of time and effort to replace. but it is configured in Windows. You could check the System log while in Safe Mode. Answer: C. you should configure some kind of remote backup. a PIN. Accounts Receivable might or might not set a file to read-only. D. so the permissions don’t change. Third. PXE and WOL. Answer: C. WAP stands for wireless access point. 83.

The gateway address is used so that the printer can communicate with computers beyond the LAN. but if this one did. Answer: B. SFC scans the integrity of all protected system files and can replace them with the correct versions if necessary. 92. Answer: B and D. 89. Answer: D.11n wireless network adapter. Broadcasting the SSID also increases the chance of unauthorized access because any wireless device will see the name of your network. If the printer is out of paper. Answer: B. and if it does. Indicators include the age of the computer and the capacity of the drive. Regardless. you would get weak print or completely blank pages. but that’s remote. Chances are this older computer currently is using an IDE drive and only has connections for IDE.11n access points are available. 93. you would have nothing to plug it into. It is unlikely that no 802. fill all trays and suggest that the user check the trays every couple days or so. You can’t even be sure that the computer will have USB ports. Additional wireless access points and signal boosters would increase the chances of unauthorized access. Even if 802. 90. Using MAC filtering will filter out unwanted computers by checking their MAC addresses when the computers first try to connect. If the drive is okay and the system did complete the shut down successfully. you ensure a high level of encryption. then he must know that there is an 802. It’s a possibility that none exist. you wouldn’t be able to ping the printer. you should restart the spooler service in the Services console window or in the Command Prompt with the net stop spooler and net start spooler commands.11n network adapter can downgrade to 802. he should still be . When all wireless devices have made their initial connections to the wireless access point.220-802 Practice Exam C 245 88. Solid-state drives are typically SATA and are out of the question. Answer: A. an 802.11g or even 802. You should bring a PATA (IDE) drive. the computer will not be able to see any access points in the wireless configuration manager. Chkdsk checks the integrity of the disk. you’ll get a message such as “C: is not dirty. helping to reduce unauthorized access.” Otherwise. Authorization to specific resources cannot be accomplished without previous authentication. consider disabling the SSID broadcast. 802. unless you also brought a SATA controller card. Identification is when a person is in a state of being identified.11n indoor range is 70 meters (230 ft. If Ray installed an 802.11n WAP around. If you brought a SATA drive. but that would be an extra expense for the customer.11b. If the printer was low on toner. the spooler could be malfunctioning. If the network cable was unplugged. Most likely the access points are out of range. Generally. you will get a message telling of the error. If Ray is outside this range. Authentication is when a person’s identity is confirmed or verified through the use of a specific system. it wouldn’t affect your ability to connect to it (as long as it was on the LAN).). By using WPA2 (the strongest type of encryption on most wireless access points). Chkntfs can check to see if a previous system shutdown completed successfully.11n wasn’t supported. they would probably be very slow version 1 USB ports—not quite feasible for a hard drive. you would check this on the system drive (for example. Identity proofing is an initial validation of an identity. and outdoor range is 250 meters (820 ft. C:). Ipconfig displays the configuration of your network adapters. If the spooler is not functioning. Or.). so it should still be able to connect. The printer could simply be out of paper. Printers don’t always use gateway addresses. Answers: C and E. 91.

. he would again at least see them in the wireless configuration manager program. Computer Management is the main configuration console window. It is always more likely that something was not installed properly at the local computer. Answer: B. and Windows Vista with SP1. Windows Easy Transfer enables you to copy files. NTFS can be a good solution for USB flash drives. Older file systems such as FAT32 and FAT16 are very limited as to the partition size. It is not as functional as the PowerShell. User Accounts. Answer: A. The Files and Settings Transfer Wizard is an older version of Windows Easy Transfer that is used with Windows XP and other older operating systems. The User State Migration Tool (USMT) is a command-line tool that can be used to migrate user files and settings for one or more computers in Windows 7 as well as Windows Vista. To kill a process in the Command Prompt. The laptop wireless network adapter isn’t a card like in a PC. but not for multiple computers. The most likely answer is that the antenna leads were not connected. and then use the taskkill command to end the process. and Windows Defender. That answer doesn’t explain why he can’t see them. Answer: D. tasklist is a command in Windows that displays a list of the processes that are running. The Control Panel lists all of the configuration applets available in Windows such as Power Options. you would wonder why Windows failed to find it automatically. and Services among other things. The Command Prompt is Windows’ version of a command-line. if it was not connected properly. 97. This way the antennae don’t get damaged in transit. but exFAT was developed specifically for USB flash drives and is the better solution if you have an operating system that will support it. It is the successor to FAT32 and can format media that is larger than 32 GB with a single partition. it contains the Device Manager. So. music. It could connect to USB or to a PC Card or ExpressCard slot. Answer: A. it would ask for a driver. FAT64 (also known as exFAT) is suited specifically for USB flash drives and many other mobile storage solutions. Windows Server 2008. The Task Manager can end (or “kill”) a running process. Event Viewer. It is less likely that the card was not inserted properly. The PowerShell is the successor to the Windows Script Host (WSH). Windows 7 employs additional features such as AES encryption support and shadow copying of volumes of information. It is a combination of the Command Prompt and a scripting language. It is also used to end applications that lock up and it analyzes the performance of the system. Answer: C. It is rare that no wireless signals are available. The Windows 7 PowerShell enables administrators to perform administrative tasks that integrate scripts and executables and can be run over a network. unless you disregard that message (or install the wrong driver). photos. Finally. 95. the drivers shouldn’t be an issue. If Windows doesn’t install it automatically. such as Windows 7. 94. and settings. first find out the name of the process and/or process ID (PID) with tasklist. if there were access points. which is common for laptops and which is why it is common for the antenna to be forgotten. 96. or not connected securely. but they couldn’t accept any more connections. 98. plus.246 Chapter 9 able to see other slower wireless access points in the wireless configuration manager. Wireless network adapters for laptops have antennae that are removable.

System Information. A rootkit is software designed to gain administrator-level control over a computer system without being detected. Spyware is a type of malicious software that is usually downloaded unwittingly by a user or is installed by third-party software. You can stop a service in a variety of ways. Spam is the abuse of electronic messaging systems such as e-mail. and G. and GPedit do not allow you to stop services.220-802 Practice Exam C 247 99. 100. Performance Monitor. The name of the Windows Firewall service is mpssvc.msc at the Run prompt. You can also stop services in the Task Manager by accessing the Services tab and right-clicking the service in question. This can be done by typing services. the third way (of the listed answers) is to use the net stop mpssvc command in the Command Prompt. D. Answers: B. . Answer: A. it infects a computer when the code is accessed and executed. It collects information about the user and the user’s computer without the user’s consent. But in the Task Manager you have to know the executable name of the service. A virus is code that runs on the computer without the user’s knowledge. The easiest and most common is to go to the Services console window. So.

This page intentionally left blank .

But just for the heck of it. I once again suggest taking a break between exams. give yourself a full hour at least before you begin this one. I might throw in a few extra doozies. more in-depth scenarios and more complex answers.10 CHAPTER TEN 220-802 Practice Exam D Ready for a hundred more? This final practice exam will be similar to Exam C in difficulty. Be ready for questions with longer. You can expect questions from any of the four domains. In this exam I assume that you have a fair understanding of acronyms and basic concepts and do not explain those within the explanations. then retake exam C until you pass with 90% or higher. go back and study. If you just completed the third exam. which immediately follows the exam. Good luck! . meaning the questions are randomized. in any order. Write down your answers and check them against the answer key. If you didn’t already. This exam is freestyle. If you didn’t score 90% or higher on exam C. After the answer key you will find the explanations for all of the answers.

4. A customer has a home office.250 Chapter 10 ✓ Quick Check Practice Questions 1. The current user temporary folder will be open. ❍ B. ❍ C. ❍ C. ❍ D. Which of the following relies on PPTP to create a secure tunnel? ❍ A. Quick Answer: 277 Power strip Power supply Surge suppressor Multimeter Quick Answer: 277 Detailed Answer: 279 . Detailed Answer: 279 SSID Instant messaging E-mail VoIP 5. ❍ D. Type 1 Virtual PC Windows XP Mode WWAN Quick Answer: 277 Detailed Answer: 279 WiMAX VPN WLAN 3. Quick Answer: 277 Quick Answer: 277 Detailed Answer: 279 A. ❍ C. Applications located in the %temp% folder will be executed. Which of the following technologies would benefit from the use of QoS? ❍ A. ❍ B. ❍ B. ❍ C. Applications will be deleted in the %temp% folder. ❍ C. ❍ B. Which of the following will occur if %temp% is executed from Run? ❍ Detailed Answer: 279 Type 2 2. ❍ B. The operating system’s temporary folder will be open. Which type of hypervisor runs operating systems on bare metal? ❍ A. ❍ D. ❍ D. Which type of device uses an MOV to protect equipment? ❍ A. ❍ D.

❍ B. ❍ C. ❍ C. Quick Answer: 277 C:\Users\%username%\desktop C:\Documents and Settings\%username%\desktop C:\System Volume Information\%username%\desktop C:\Users\System32\%username%\desktop Quick Answer: 277 Detailed Answer: 280 . Which of the following is the best solution for repairing a hard drive when a computer displays an “NTLDR is missing error” upon booting? ❍ A. You need to locate bad sectors and recover information.* Attrib + A+ *. ❍ D. ❍ B. Which group is best to assign to a home user to prevent software installation? ❍ ❍ ❍ Quick Answer: 277 Quick Answer: 277 Detailed Answer: 279 A. Where can a user’s Desktop folder be found in Windows Vista by default? ❍ A. Remote Desktop users ❍ D.* Attrib –H *. ❍ D. ❍ B. Power users C. ❍ D. Recovery Console with the fixboot command Recovery Console with the chkdsk command Recovery Console with the bootcfg /rebuild command Quick Answer: 277 Detailed Answer: 280 Chkdsk C: /R Chkdsk C: /F Chkdsk C: /C Chkdsk C: /I 10. Administrators B. Which command is best? ❍ A.* 7. ❍ B. ❍ D.* Attrib – A+H *. Using a command-line tool. Users 8. A Windows PC is not booting correctly. Detailed Answer: 279 Attrib – RV *. Detailed Answer: 280 Recovery Console with the fixmbr command 9. ❍ C. Ray used file properties to hide files in his folder and now needs to get the files back.220-802 Practice Exam D 251 ✓ Quick Check 6. which of the following combination of parameters will make the files viewable once again? ❍ A. ❍ C.

A user who is part of a workgroup reports that she cannot print to a new printer. Which of the following can fix the problem for the user? (Select the two best answers. What should the technician do next? ❍ A. ❍ B. The cellular repeater installed is interfering with the network speed.0. Add the new printer to the user’s computer ❍ B. Quick Answer: 277 Detailed Answer: 280 Install the latest WAP firmware Install the latest wireless network adapter drivers Install the latest WAP drivers Install the latest wireless network adapter firmware 13. You are called to an office that had a gigabit Ethernet LAN installed six months ago. Set the new printer as the default printer 14.0 ports. Clear the print queue on the new printer ❍ C. and the user can still automatically send print jobs to the old printer. he notices that WPA2 is not listed as an option.0 ports. The external hard drive is using FireWire. The computer has USB 3. Quick Answer: 277 Quick Answer: 277 Detailed Answer: 280 A. ❍ B. What could cause this message? ❍ A. ❍ C. Everyone else in the workgroup can print to the new printer. ❍ C. ❍ D. ❍ D. What could be attributed to the problem? ❍ A. A few customers at the office report that the speed of the Internet has drastically decreased since a recent network hardware refresh by another technician. The external hard drive is using USB 2. 12. Change the user’s password and permissions ❍ D. The firewall was not turned back on. ❍ B. You plug in an external hard drive.) ❍ Detailed Answer: 280 The DHCP server is not working correctly. ❍ D. The switches are configured for 100 Mbps. The computer has USB 2. A technician is setting up a SOHO and has configured the wireless network adapter on a laptop with WPA2. While the technician configures the WAP.252 Chapter 10 ✓ Quick Check 11. Quick Answer: 277 Detailed Answer: 281 . A message appears in Windows that says the device can perform faster. Everything was fine until a week ago. ❍ C.

Bill. ❍ D. ❍ B. Deny read access to the Accounting folder for any group that Bill is a member of Quick Answer: 277 Detailed Answer: 281 ❍ D. A microwave is interfering with the signal. The computer has a Bluetooth card installed. What would improve the performance of the system? ❍ A. How can you stop Bill from having read access to the folder without impacting any other users on the network? ❍ A. She is currently using an IDE hard drive formatted with NTFS. Loose connection ❍ D. A BIOS setting is incorrect. One of the users.11 card is disabled. ❍ C. Remove Bill from all domain groups that have access to the Accounting folder ❍ B. 16. Quick Answer: 277 Detailed Answer: 281 The 802. Warped keyboard ❍ F. Your organization has an Active Directory domain. ❍ D. The Accounting folder is shared on a network server. Stuck keys ❍ B. Deny read access to the Accounting folder for Bill through local access security ❍ C. ❍ B. Faulty touchpad ❍ E. Your customer tells you that when trying to synchronize a smartphone via Bluetooth to Windows. Discharged battery 18. Which of the following is the most likely cause? ❍ A.220-802 Practice Exam D 253 ✓ Quick Check 15. A customer tells you that her computer is taking a long time to save large files. What are three possible reasons that a laptop’s keyboard would stop functioning? (Select the three best answers.) Quick Answer: 277 Detailed Answer: 281 ❍ A. on a partition formatted as NTFS. Bad inverter ❍ C. The hard drive is faulty. a “no Bluetooth device” error message appears on the smartphone. ❍ C. should not have read access to a folder named Accounting. Reformat the drive with FAT32 Install a PATA drive and format it as FAT32 Install a SATA drive and format it as NTFS Install a PATA drive and format it as NTFS Quick Answer: 277 Detailed Answer: 281 . Deny read access to the Accounting folder for Bill through shared access security 17.

254 Chapter 10 ✓ Quick Check 19. ❍ C. ❍ C. Event Viewer Disk Management Disk Administrator DiskPart 20. Which of the following programs in Windows 7 saves problem descriptions and solutions? Quick Answer: 277 Detailed Answer: 282 . ❍ B. What should you do first before removing a paper jam? ❍ A. ❍ D. ❍ D. Examine the following figure. ❍ B. Quick Answer: 277 Detailed Answer: 281 Which portion of Computer Management is being displayed in the figure? ❍ A. ❍ B. Quick Answer: 277 Turn the printer off Quick Answer: 277 Detailed Answer: 282 Open all the doors in the printer Clear the print queue Take the printer offline 22. ❍ D. Detailed Answer: 282 Msconfig > Settings > Services System Settings > Tools > Services Control Panel > Services Control Panel > Administrative Tools > Services 21. Then answer the question that follows. Which of the following is the correct path if you wanted to disable a service in Windows 7? ❍ A. ❍ C.

What should be done first? ❍ A. ❍ B. ❍ B. ❍ B. What will most likely fix the problem? ❍ A. ❍ C. Power cycle the peripherals Power cycle the UPS Power cycle the breaker switches Quick Answer: 277 Detailed Answer: 282 Check for system security patches Perform an antivirus program scan Boot the PC into Safe Mode Remove the PC from the network 25. A customer reports to you that a newly issued smartcard does not work in a laptop.220-802 Practice Exam D 255 ✓ Quick Check ❍ A. ❍ D. ❍ D. Inverter ❍ E. Hibernate mode ❍ F. ❍ D. The LED light on the monitor is on. ❍ C. ❍ C. ❍ C.) ❍ ❍ ❍ Detailed Answer: 282 Power cycle the PC 24. Quick Answer: 277 Quick Answer: 277 Detailed Answer: 282 A. A PC’s monitor has no display after a power failure. Watson Problem Reports and Solutions Action Center Performance Monitor 23. and it works without any problems. Dr. A co-worker tells you that a work PC has become infected with a virus. What are things you should check when a laptop fails to turn on? (Select the four best answers. Perform a BIOS flash Reinstall the OS Upgrade the smartcard reader firmware Replace the smartcard reader Quick Answer: 277 Detailed Answer: 282 . Function key ❍ G. ❍ D. Sound port C. Power LED B. ❍ B. You try your smartcard in the laptop. Power button 26. What should you do first? ❍ A. AC adapter ❍ D.

Which of the following is the best Windows 7 utility to back up important system files without requiring external storage? ❍ ❍ Quick Answer: 277 Quick Answer: 277 Detailed Answer: 283 A. ❍ B. A Windows 7 computer has an Experience Index of 3. The technician discovers that the computer has the following: Quick Answer: 277 Detailed Answer: 283 Performance index RAM1GB4.4GHz4. ❍ C. Which of the following commands enables you to copy a file without prompts? ❍ A. Then answer the question that follows. Task Manger ❍ C. ❍ B.8.2. NTbackup B. Quick Answer: 277 Detailed Answer: 283 .4GHz4. ❍ D.256 Chapter 10 ✓ Quick Check 27.2.0Video3D3. System Protection ❍ D.6Video3D3. Double the RAM again Upgrade the CPU to 3 GHz Increase the resolution on the screen Upgrade the video card 28.8CPU2. The technician upgrades the memory to 2 GB and gets the following results: Performance index RAM2GB5. Detailed Answer: 283 Copy /Z Xcopy Copy /Y Copy /A 29. ❍ C. ❍ D. But the Windows Experience Index is still at 3. Xcopy 30.8CPU2. Which of the following can the technician do to improve the performance index? ❍ A. Examine the following Windows 7 figure.8.

❍ B. Upon booting the computer. ❍ D. ❍ B. Quick Answer: 277 Detailed Answer: 283 . The display cable is loose. There’s a damaged hinge. ❍ C. WinMSD—I/O setting of IEEE 1394 controller B. The video controller is defective. it does not recognize the new memory. ❍ D. and what is highlighted? ❍ ❍ A.220-802 Practice Exam D 257 ✓ Quick Check Which window are we looking at. System Information—I/O setting of IEEE 1394 controller ❍ C. A computer just had a memory upgrade installed. System Properties—I/O setting of IEEE 1394 controller 31. What should you do to resolve the issue? ❍ A. Detailed Answer: 283 BIOS update Adjust jumper settings OS Update New CMOS battery 32. Device Manager—I/O setting of IEEE 1394 controller ❍ D. the lines appear and disappear again. What is the most likely cause? ❍ A. Quick Answer: 277 The display panel is defective. You notice that when the display is moved. even though it is listed as being compatible on the manufacturer’s website. A customer states that the LCD display on a laptop has intermittent lines on the screen. ❍ C.

❍ B.com/AlbaLonga net use \\Romulus\AlbaLonga ipp://Romulus. ❍ B. Memory was added to a workstation. *. it reports memory errors. Which of the following file extensions will start the program installation process in Windows? ❍ ❍ ❍ ❍ Quick Answer: 277 A. Your boss needs to be able to drag and drop folders onto the volume and have them be encrypted in real-time. A different brand of memory was installed into bank two. Plug in the external power supply ❍ D. When the computer was booted.SYS D. *.CFG C. The second memory stick was larger than the first. *. What is the correct syntax? ❍ A. Detailed Answer: 283 BitLocker PKI TPM Kerberos 34.INI B. What is the most likely cause? ❍ Detailed Answer: 284 net use //AlbaLonga/Romulus 36. Dave reports that when a laptop’s power button is pushed there is no response. Reseat the memory 35. Quick Answer: 277 Detailed Answer: 284 . Close the lid and reopen it ❍ C.EXE 37. ❍ C. You are tasked with mapping a drive within the Command Prompt to a share named AlbaLonga on a server named Romulus.com/AlbaLonga Quick Answer: 277 Detailed Answer: 284 A.258 Chapter 10 ✓ Quick Check 33. ❍ D. ❍ C. What is the first thing you should try to appease Dave? ❍ Quick Answer: 277 Quick Answer: 277 Detailed Answer: 284 A. The new memory was installed in the second bank and runs at a lower speed than bank one. http://Romulus. ❍ B. Replace the battery ❍ B. ❍ D. ❍ C. Your boss wants to encrypt a hard drive that will be storing critical data. The second memory stick was smaller than the first. ❍ D. *. Which encryption technique should you suggest? ❍ A.

❍ C. What are we looking at in the figure? ❍ A. The CPU failed. ❍ D. ❍ C. ❍ B. Identify the malware C. ❍ B. One of your department’s computers is constantly overheating. Detailed Answer: 284 The case fan stopped working. 39. The heat sink failed. Your boss asks you to troubleshoot a computer with a virus. ❍ D. The power supply failed. Examine the following figure. The computer seems to work properly but isn’t making any noise. Then answer the question that follows. What should you do first? ❍ ❍ ❍ Quick Answer: 277 Quick Answer: 277 Detailed Answer: 285 A.220-802 Practice Exam D 259 ✓ Quick Check 38. Run a System Restore B. Roll back drivers ❍ D. What has most likely happened? ❍ A. System Recover Options Recovery Console ABOM MSCONFIG Quick Answer: 277 Detailed Answer: 285 . Research malware types 40.

B. ❍ B. ❍ B. The toner cartridge is defective. The printer will not print at all. User A attempts to access files on a UNC path: \\server\fileshare. The printer will print garbage or unreadable characters. What is the most likely result? ❍ ❍ Detailed Answer: 285 A. What is the most likely cause? ❍ A. User A is part of the Users Group on a Windows 7 Ultimate computer. The printer will process PostScript in the correct way. The printer will print at a decreased resolution (DPI). A marketing employee commonly sends large print jobs to a printer. Read Only Change Full Control No Access Quick Answer: 277 42. The printer is overheating. ❍ D. Quick Answer: 277 43. ❍ C. The printer needs updated drivers. The printer paper tray is not big enough. A customer has installed a PostScript driver for a printer that actually only supports PCL. Fileshare has the following share permissions: Quick Answer: 277 Detailed Answer: 285 Administrators—Full Control Users—Read Only Guests—No Access However. Detailed Answer: 285 . ❍ D. ❍ C. The employee tells you that during the jobs the printer spontaneously pauses and resumes several times. ❍ C. ❍ D. the directory on the hard drive where the share is located has the following permissions: Administrators—Full Control Users—Change Guests—No Access Which level of access will the account User A have? ❍ A.260 Chapter 10 ✓ Quick Check 41.

Replace SATA Drive 1 Mark SATA Drive 1 as active Replace SATA Drive 0 Reboot and select LKG from the ABOM Quick Answer: 277 Detailed Answer: 286 . Then answer the question that follows. and now the computer will not boot. ❍ D. It pings 10.254. What should you perform before implementing BitLocker? ❍ A.1 with four 1. ❍ B. It pings 10. ❍ C. What would most likely fix the problem by allowing the computer to boot again? ❍ A. C. It pings 10.254.254.1 1. 46. Your boss wants to implement BitLocker on yet a second laptop for traveling purposes. SATA Drive 0 failed.254.1 continuously until stopped. ❍ D. ❍ C.220-802 Practice Exam D 261 ✓ Quick Check 44. ❍ D. ❍ ❍ B.254. It pings 10. Quick Answer: 277 Detailed Answer: 286 What does the –l switch accomplish in the figure? ❍ A. Examine the following figure.254. Quick Answer: 277 Detailed Answer: 286 Enable TPM in the BIOS Disable UAC Defrag the hard drive Convert the file system to NTFS 45. A computer has a RAID 1 array.254. ❍ B.500 times.1 at 1500 MB/s.254.500-byte packets of data.

❍ B. ❍ D. Examine the following figure. One of your customers has a defective disk. Which command can be used to extract readable information? ❍ A. Then answer the question that follows. the mouse pointer scrolls across the screen. ❍ C. Quick Answer: 277 Detailed Answer: 287 . ❍ B. ❍ C. One of your customers reports to you that when typing on the laptop keyboard. Quick Answer: 277 Quick Answer: 277 Detailed Answer: 286 Reboot the laptop Plug in an external mouse Use an external monitor Disable the touchpad 50. ❍ D.262 Chapter 10 ✓ Quick Check 47. Replace Convert REM The ability to copy files off of a mapped network drive Quick Answer: 277 Detailed Answer: 286 The ability to copy NTFS permissions The ability to copy files and decrypt them The ability to copy entire folder structures 49. Detailed Answer: 286 Recover 48. ❍ C. What can resolve this? ❍ A. ❍ D. What is an advantage of Xcopy over Copy? ❍ A. ❍ B.

and allows for disk duplexing? ❍ Detailed Answer: 287 Use the Microsoft Support website 52. RAID 5 ❍ D. What is the easiest solution? ❍ A. netstat netstat -n nbtstat nbtstat -n 51. C:\Documents and Settings\Charlie\ Pictures C:\Users\Charlie\Libraries\My Pictures C:\Users\Charlie\My Pictures C:\ Documents and Settings\Charlie\My Documents\My Pictures Quick Answer: 277 Detailed Answer: 287 . ❍ D. ❍ B. which path would a user with the account name Charlie go to in order to view his pictures? ❍ A. RAID 6 54. Alternate-click and select “More Information” Alternate-click and select “What’s This?” Press F1 and search for the term Quick Answer: 277 Detailed Answer: 287 Clean the fuser area Clean the drum with a computer vacuum Use compressed air on the pickup assembly Replace the toner cartridge 53. ❍ D. What can you do to quickly provide more information? ❍ A. ❍ D. ❍ B. RAID 0 ❍ B. Which one of the following is fault tolerant. You are happily working in Windows when you stumble across a dialog box with some unfamiliar terms. Quick Answer: 277 Quick Answer: 277 Detailed Answer: 287 A. ❍ C. mirrors a hard drive. An office laser printer is printing lighter in random areas of each page. ❍ B. ❍ C. ❍ B.220-802 Practice Exam D 263 ✓ Quick Check Which command was issued in the figure? ❍ A. In Windows 7. ❍ C. ❍ C. ❍ D. RAID 1 ❍ C.

❍ B. ❍ D. select Manage Start > Run > Computer Management Start > Run > MMC 56. ❍ B. each of which has EFS functioning. ❍ D.264 Chapter 10 ✓ Quick Check 55. Your friend is playing the latest first-person game on a PC. not tone dialing. Phone line voltages can damage Ethernet equipment. Which should you perform first? Quick Answer: 277 Detailed Answer: 288 . ❍ C. Your friend has a high-end graphics card and the maximum memory for the motherboard. Detailed Answer: 287 Upgrade the drivers Reinstall the OS Replace the hard drive Reinstall the game 57. What should you do to help the situation? ❍ A. ❍ C. ❍ B. RJ11 connections do not support full-duplex. ❍ D. Quick Answer: 277 Detailed Answer: 287 How would you navigate to the application in the figure? ❍ A. but the screen is pausing during game play. You have been asked to move data from one laptop to another. Then answer the question that follows. Examine the following figure. 58. Start > Run > Console1 Start. right-click Computer. ❍ C. Quick Answer: 277 Quick Answer: 277 Detailed Answer: 288 PSTN networks are not Ethernet based. Ethernet supports pulse dialing. What is the most important reason not to plug an RJ11 phone line into an RJ45 port on a computer? ❍ A.

❍ B.5 and which ID number is the Server service? ❍ A.5 on the network serves the bulk of the data to the rest of the six computers within a HomeGroup. Export the user’s certificate ❍ C. A customer’s laptop goes into standby mode unexpectedly. Suddenly. Disable networking ❍ D. Which command would you use on your local computer to find out if the Server service is running on 192. ❍ D. What should the technician do next? ❍ A. netstat ❍ B. A Windows 7 Ultimate computer using IP address 192. Convert the partition to FAT32 59. What is the most likely hardware component that is causing the issue? ❍ A. Which of the following should you test first? Quick Answer: 277 Detailed Answer: 288 ❍ A. though. neither your computer nor any of the other systems can access that Windows 7 Ultimate computer. Power supply ❍ B. ❍ B. ❍ C. IEC cable ❍ D. AC outlet ❍ E.168. Detailed Answer: 288 Update the AV signatures Remove infected files Run a full scan Quarantine infected files 60. ❍ D. ❍ C.1. netstat ❍ Quick Answer: 277 Quick Answer: 277 Detailed Answer: 288 –a and <00> –a and <00> –A and <20> –A and <20> –A and <03> F. Circuit breaker 62. netstat ❍ D. nbtstat –A and <03> 61. nbtstat ❍ E.168. LCD cutoff switch Hard drive SATA controller Video card Quick Answer: 277 Detailed Answer: 289 . A technician you work with just finished installing AV software on a PC. Give the user of the second laptop administrator privileges ❍ B. 24-pin power connector ❍ C. You are troubleshooting what you believe to be a power issue.1. nbtstat ❍ C.220-802 Practice Exam D 265 ✓ Quick Check ❍ A.

Quick Answer: 277 Detailed Answer: 289 . Quick Answer: 277 Quick Answer: 277 Detailed Answer: 289 Virus Trojan Spyware Rootkit 66. The laptop needs an HDMI application installed. C. Detailed Answer: 289 Check the creation date 64. Install a wireless repeater at the far end of the house ❍ C. but audio does not. The customer complains of issues with signal strength at the opposite end of the house. B. Install a high gain antenna focused toward the office wall Quick Answer: 277 Detailed Answer: 289 B. ❍ B. No matter how many ipconfig/release and ipconfig/ renew commands you issue. The HDMI cable is too long. ❍ D. ❍ C. Install a second wired router at the far end of the house ❍ D. This type of malware appears to perform desired functions but is actually performing malicious functions behind the scenes. the computer you are troubleshooting can only obtain an APIPA address. A client is attempting to connect a laptop to a TV using an HDMI connector. What is the best option as far as increasing signal strength? ❍ ❍ A. The person tells you that video works fine. ❍ C. ❍ D. ❍ A. The speakers are not compatible with the digital connection. ❍ C. Check the file owner Check the file version Check the hash key Quick Answer: 277 Detailed Answer: 289 DNS DHCP Network switch Patch panel 65. Run Cat 5e cable to all of the rooms that have poor signal strength 67. One of your customers has a wireless router installed in a home office.266 Chapter 10 ✓ Quick Check 63. ❍ B. ❍ D. What is the most likely cause? ❍ ❍ ❍ A. What has most likely failed? ❍ A. ❍ D. The HDMI audio service has not been selected. ❍ B. How can you confirm that a new virus definition is authentic? ❍ A.

Quick Answer: 277 Detailed Answer: 290 In Windows 7. ❍ D.220-802 Practice Exam D 267 ✓ Quick Check 68.exe ❍ D. Start > Control Panel > Devices and Printers > right-click the printer and select Properties > Ports ❍ C. How can you reach the System Restore utility in Windows 7? (Select the two best answers. Start > right-click Computer > Advanced Quick Answer: 277 Detailed Answer: 290 C. Start > Control Panel > Printers > right-click the printer and select Properties > Advanced ❍ B. Start > right-click Computer > Properties > click the Advanced system settings link 70. What should you do to make the disk usable? ❍ A.) ❍ A. Start > Control Panel > Devices and Printers > right-click the printer and select Properties > Ports ❍ D. Quick Answer: 277 Detailed Answer: 290 Convert the disk to basic Convert the disk to dynamic Import the disk Set the disk to active 69. The Device Management utility lists a disk as “Foreign”. ❍ B. ❍ C. Run > type systempropertiesprotection. how would you navigate to the dialog box in the figure? ❍ A. Examine the following figure. Start > right-click Computer > Properties > click the System protection link ❍ ❍ B. using individual Control Panel icons. Then answer the question that follows. Start > Control Panel > Devices and Printers > right-click the printer and select Printer Properties > Advanced .

❍ A. Authentication can be something a user is such as a fingerprint. ❍ C. This is a type of phishing attack that is directed at the CEO of an organization. What should you do to access the wireless network? ❍ Quick Answer: 277 Detailed Answer: 290 A. Quick Answer: 277 Detailed Answer: 290 ❍ D. Authentication can be something a user knows such as a smart card. Quick Answer: 277 Minimum password length Enforce password history Minimum password age Complexity requirements Quick Answer: 277 Detailed Answer: 291 . ❍ B. ❍ B. ❍ D. Enter the SSID manually ❍ B. Change the MAC address on the router ❍ D. 73. Which policy will you configure? ❍ A. You are tasked with accessing a wireless SOHO. The SSID you require does not appear when you scan for wireless networks. ❍ C. Which of the following statements is true? ❍ A. ❍ D. ❍ B. Vishing Whaling Spear phishing Quick Answer: 277 Detailed Answer: 290 Magnetic degausser Low-level format Peter Gutman security method DoD 5220. ❍ C. Reset the wireless card. Authentication can be something a user has such as signature. 72. ❍ D. Change the SSID on the router ❍ C. ❍ C. Detailed Answer: 290 Power phishing 74. Authentication can be something a user does such as a PIN or password.268 Chapter 10 ✓ Quick Check 71. This type of data purging standard requires seven full passes or rewrites with bit-level erasure software.22-M 75. ❍ B. ❍ A. You are required to implement an organizational policy that states user passwords can’t be used twice in a row.

Defective power supply. ❍ D. Power supply failed. Quick Answer: 277 Detailed Answer: 291 . Detailed Answer: 291 CD-ROM drive is faulty. You have several computers at your workstation. Resolution was set too high. Outdated firmware. ❍ D. ❍ B. The only problem is the grinding that sets your teeth on edge. Memory is not seated properly. The technician determines that the system is using an onboard graphics controller. ❍ D. Bad power supply ❍ D. A customer tells you that the computer runs fine for a few minutes but then freezes. What is the most likely cause of the display problem? ❍ A. However. most specific answer. ❍ C. Fragmented hard drive. 77. Which kind of network topology did you just create? (Select the best. What is the most likely cause? ❍ A. Bad CD-ROM 78. ❍ B. A user states that the computer monitor is suddenly displaying garbled images and strange colors and leaving cursor trails.220-802 Practice Exam D 269 ✓ Quick Check 76. ❍ B. Quick Answer: 277 Detailed Answer: 291 Star Hybrid star Star-bus Hierarchical star 79. ❍ C. You install a fiber-based backbone switch that connects three different departments’ LAN switches. Defective RAM. Fans are failing. Bad fan ❍ B. ❍ C. ❍ E. Bad HD ❍ C.) ❍ A. you are a master tech!) One of them starts making a loud grinding sound immediately when you power on the computer. (Of course you do. Windows boots and works fine. What is the most likely cause? ❍ Quick Answer: 277 Quick Answer: 277 Detailed Answer: 291 A.

❍ B. Which of the following switches skips the process that compares directory entries to the file record segments corresponding to those entries.270 Chapter 10 ✓ Quick Check 80. ❍ C. How would you navigate to this screen? ❍ A. Examine the following figure. Settings > General > Turn Passcode On ❍ C. Settings > General > Passcode Lock > Enable WPA2 Passcode 81. Settings > General > Passcode Lock > Turn Passcode On ❍ B. Quick Answer: 277 Detailed Answer: 291 The figure shows the option to set a Passcode in the iOS of an iPad2. Chkdsk /V Chkdsk /F Chkdsk /I Chkdsk /R Quick Answer: 277 Detailed Answer: 292 . ❍ D. Then answer the question that follows. Settings > Passcode Lock > Turn Passcode On ❍ D. when running the Chkdsk command? ❍ A.

Of the following. The system already runs Windows 7. Which utility displays important messages about solving issues in Windows 7? ❍ A. Reboot the computer B. Assign a drive letter to the hard drive in Disk Management ❍ E. which tool should you use to disable the Windows Firewall service? ❍ A. You are working on a computer in which you just installed a new hard drive. ❍ B. ❍ C. ❍ B. Detailed Answer: 292 Task Manager Windows Defender Action Center Problem Reports and Solutions 84. ❍ D. Quick Answer: 277 Task Scheduler System Configuration System Properties Local Security Policy Quick Answer: 277 Detailed Answer: 292 . ❍ D. You stop the Windows Firewall. Set the drive to active 83. but when the computer reboots. A customer has a computer running Windows 7 Ultimate. The Windows Firewall appears to be causing communications to fail within a certain gaming application even though you set up an exception for the program. ❍ C. The new hard drive does not appear in Windows Explorer. Configure the drive in the BIOS ❍ D.220-802 Practice Exam D 271 ✓ Quick Check 82. Initialize and format the hard drive in Disk Management ❍ C. the service starts up again. What should you perform next so that the drive will be recognized by the operating system? ❍ ❍ Quick Answer: 277 Detailed Answer: 292 A.

❍ B. ❍ D. most practical way to protect the network from intrusion? ❍ A. Install an IDS Quick Answer: 277 Detailed Answer: 292 . Examine the following figure. Disconnect the Internet connection ❍ D. What is the easiest. What is the actual mounted volume. Install an antivirus server application ❍ C. F: and GRMCULXFRER_EN_DVD Windows 7 DVD and the Data folder F: and the DVD drive Data folder and GRMCULXFRER_EN_DVD 86. and which hard drive folder is it pointing to? ❍ A. ❍ C. Then answer the question that follows.272 Chapter 10 ✓ Quick Check 85. An attacker is constantly trying to hack into one of your customer’s SOHO networks. Quick Answer: 277 Detailed Answer: 292 The figure shows a mounted volume. Install a firewall ❍ E. Disable the SSID broadcast ❍ B.

Detailed Answer: 293 The fuser is not getting hot enough. Quick Answer: 277 Detailed Answer: 293 CPU RAM Video card Hard drive 88. ❍ D. The fuser is too hot. What should you upgrade on the computer? (Select the best answer.220-802 Practice Exam D 273 ✓ Quick Check 87.5 hours Lithium—10 hours 16 v—5 hours Lithium-ion polymer—10 hours Quick Answer: 278 Detailed Answer: 293 . ❍ ❍ B. A PCIe card used in a PCI slot will function at PCI speeds. ❍ C. The customer needs the images to rotate quickly and smoothly. Quick Answer: 278 NiCd—2. A CAD/CAM workstation running AutoCAD is displaying rotating 3D images very slowly. ❍ D. ❍ B. A PCIe card used in a PCI slot will function properly with a firmware upgrade. ❍ B. ❍ C. 89. ❍ C.) ❍ A. ❍ D. The toner cartridge is low. Quick Answer: 278 Detailed Answer: 293 C. and how long will a full charge last for on the average? ❍ A. A PCIe card used in a PCI slot will function normally. Which kind of battery would you find in an iPad. ❍ B. What will happen if a PCIe video card is used in a PCI slot? ❍ A. What is the most likely reason? ❍ A. One of your customers reports that a laser printer is printing out blurry and smudged pages. A PCIe card cannot be used in a PCI slot. 90. ❍ D. The toner cartridge is leaking.

Run > systempropertiescomputername. You have a Windows 7 Ultimate computer that you wish to write a batch file for.1 Replace the switch’s uplink cable Reboot the computer Power cycle the switch 93. Then answer the question that follows. ❍ B. The network cables are plugged in. Start > right-click Computer. Quick Answer: 278 Detailed Answer: 293 Ping 127. You want the batch file to turn off the computer after a certain amount of time.274 Chapter 10 ✓ Quick Check 91. ❍ C.exe > Change ❍ D. ❍ D. Start > right-click Computer.exe > Advanced > Change Computer Name 92. and the computer’s network card is functioning properly. Quick Answer: 278 Detailed Answer: 293 The figure shows the Computer Name/Domain Changes dialog box in Windows 7. Which main command should you utilize in the batch file? Quick Answer: 278 Detailed Answer: 294 . You look at the switch and notice that all lights are on and not flashing. Examine the following figure. One of your customers reports that a computer has no access to the network. How do you navigate to this window? (Select the two best answers.) ❍ A. select Properties > Change Computer Name ❍ C. Run > systempropertiescomputername.0.0. What can you do to solve this problem? ❍ A. select Properties > Computer Name tab > Change ❍ B.

Then answer the question that follows. Quick Answer: 278 Detailed Answer: 294 The figure shows the list of shares on a Windows 7 computer. ❍ B. Which switch of the Robocopy command will copy subdirectories but skip empty ones? ❍ ❍ ❍ ❍ Quick Answer: 278 Detailed Answer: 294 A. Net view Net use Net share Net statistics Quick Answer: 278 Detailed Answer: 294 . ❍ D. C:\Windows C:\Windows\System32 C:\Windows\System32\spool\print$ C:\Windows\System32\spool\drivers 96. Taskkill Down Kill Shutdown 94. ❍ C. ❍ D. What is the path of the print$ share? ❍ A. ❍ B. /DCOPY:T 95. ❍ D. /S D. /B C. ❍ C. ❍ C. Examine the following figure.220-802 Practice Exam D 275 ✓ Quick Check ❍ A. /E B. ❍ B. Which command will do this for you? ❍ A. You need to list all the network shares for a local computer within the Command Prompt.

Which OS is the customer referring to? ❍ Quick Answer: 278 Quick Answer: 278 Detailed Answer: 294 A. ❍ B. Which of the following will allow you to show the configuration? ❍ A. You need to find out which ports are open in the Windows Firewall on a Windows XP computer. Quick Answer: 278 Regedit Regsvr32 ODBC32 Regedt32 Well. Blackberry OS 99. Check your answers and read through the explanations carefully! Quick Answer: 278 Detailed Answer: 294 . A customer is frantic because a mobile device’s operating system has crashed. ❍ D. What should the technician do first to resolve the issue? ❍ A. Detailed Answer: 294 arp –a netsh firewall show logging netsh firewall show state ipconfig /all 100. ❍ D.276 Chapter 10 ✓ Quick Check 97. You are now a manager of a technical services team. ❍ D. Detailed Answer: 294 Clean the feeder rollers Clean the pickup rollers Replace the fuser Replace the drum 98. ❍ B. Which command can manipulate these? ❍ A. You have some DLLs and ActiveX controls that need to be troubleshot. One of your technicians notices that a printer is jamming just above the printer tray. ❍ C. Android version 2 ❍ D. ❍ C. ❍ C. Congratulations. Microsoft Windows CE ❍ B. The customer keeps referring to Gingerbread in excited tones but isn’t making much sense. ❍ B. Apple iOS version 5 ❍ C. you made it.

B 25. B 44. D 61. C 86. D 72. A 2. A 5. A 20. A 41. B 8. B 68. B 79. B 18. B 14. B 71. D 53. B 27. E. A 85. C 31. D 13. A 39. C 64. D 21. D 17. A 30. C 58. A and C 12. C 43. C 4. C. C 19. B 82. C 34. C 32. A 67. B 87. C. and E 46. A 50. D 66. A 15. D 33. D 65. D 29. B 75. C 57. A 76. D 49. A 38. A. D 36. D 81. D 56. B 77. D 3. C 24. A 60. C 55. B 7. A 70. A 23. A 73. A 62. A 52. D 35. A. C 16. C 83. D 78. D 10. B 22. D 84. A and D 42. C 51. D 45. C 26. and G 54. C 63. B 37. B 48. C 277 . B 28. A 9. C 40. C 69. C 74.220-802 Practice Exam D Quick-Check Answer Key 1. C 47. C 11. C 80. B 59. D 6.

C 99.278 Chapter 10 88. B . A 92. D 97. D 100. C 90. B 91. A and C 96. C 89. A 94. B 93. D 95. D 98.

2. A multimeter is used to test outlets and wires. they do not have MOVs.220-802 Practice Exam D 279 Answers and Explanations 1. WLAN is the wireless LAN that is created when you implement a wireless access point or create an ad-hoc network of devices. It guarantees network bandwidth for real-time streaming of the media applications such as VoIP. 4. 5. though the device might have trip functionality and have to be reset in the case of an electrical problem. R stands for Read-only. Windows XP Mode (which runs in a Virtual PC window within Windows 7). and VirtualBox. But if you are learning how to use Windows Vista— for example. S = System. Attrib –H *. Answer: C. A surge suppressor (or surge protector) uses metal-oxide varistors (MOVs) to protect against surges and spikes. Power supplies are located within the computer. VMware ESX. while a plus sign will add the attribute. Answer: C. if a company wanted to run Windows Server 2008 in a virtual environment but have it be an actual server on the network. . Check out the attrib command in the Command Prompt for yourself by typing attrib /?. *. therefore. Using a minus sign will remove the attribute.* means all the files with all extensions within that particular directory. they would not benefit from the use of QoS. WiMAX is a fast. Streaming applications such as VoIP and online games can benefit from QoS. The SSID is the name or identifier of a wireless network. Answer: C. in Windows 7 this would show the C:\Users\ %username%\AppData\Local\Temp folder. and H = Hidden. 6. it should run in a type 1 hypervisor. which is the capability to provide different priorities to different applications. Virtual private networks (VPNs) rely on a tunneling protocol such as PPTP or L2TP to create a secure connection between a network and a remote computer or group of computers. Voice over IP (VoIP) is a streaming telephony application. wireless Internet service used over large geographic areas. A = Archive. Examples of this include Microsoft Virtual PC. Since the files were already hidden. For example. in a lab environment—the type 2 hypervisor would probably be fine. Power strips do not have these and do not protect against surges and spikes. QoS stands for Quality of Service.* will unhide all of the files in the folder. Answer: A. This is required for true virtualization workstations. 3. Ray is always doing interesting things in my books. WWAN is another name for cellular Internet access. Simply the folder will be displayed in a Windows Explorer window. For example. Answer: D. Instant messaging and e-mail are not streaming applications. The attrib command allows you to work with four different file attributes that I like to refer to as RASH. It runs directly on the host computer’s hardware. Typing %temp% in the Run prompt will display a folder with the current user’s temporary files. Type 2 hypervisors run within another operating system. Nothing will be added or changed. The Type 1 hypervisor is the bare metal. but they do not last forever. Examples include Microsoft Hyper-V. Answer: D. These do not run nearly as fast as type 1 hypervisors and so are used for limited purposes. The operating system’s temporary folder is located at C:\Windows\Temp. and Citrix XenServer. Most manufacturers recommend that after several years of use you replace them. or native hypervisor. An MOV can also be tested by a multimeter by testing its resistance. we needed to use the minus sign to remove the attribute and be able to view the files. They protect each outlet and port on the device.

it can be rewritten to the hard disk by issuing the fixboot command while in the Recovery Console. Answer: A. wireless network adapters don’t need firmware (usually) because they use drivers. the firmware has all the code they require. This folder will be located within the user profile folder. If the printer has not yet been installed. In fact. Every user profile gets a Desktop folder by default. There are a lot of different commands that can be issued in this mode. /C and /I skip certain checks of the volume (in this case C:). NTLDR can also be manually copied from the CD-ROM disc if necessary. 9. Windows XP used Documents and Settings as the main user folder. The Recovery Console is a system recovery tool used in Windows XP. you should check if the printer is installed on that user’s computer and if it is set as the default printer. Administrators have full control over a system. It’s the WAP we are concerned with. but you have limited access to the Users folder. Remote Desktop users can remote into other machines in order to control them from another location. Now in Vista/7 the Documents and Settings folder is protected. Answer: A. Answer: C. Answer: B. The fixmbr command will rewrite the master boot record of the hard drive. If a user cannot print to a brand-new printer. The switches should be reconfigured for 1000 Mbps at full-duplex mode if possible. not the Users folder. Neither does the firewall. Bootcfg /rebuild can be used to scan for the operating system installations and rebuild that information into the boot. The standard user cannot install software or make changes to the system without knowing an administrative login. everything will look slower to the customer. Answer: A. a cellular repeater would not interfere with a wireless LAN and definitely wouldn’t interfere with a wired Ethernet network. The technician should install the latest firmware to the WAP. which is shown in the answer as a variable %username%. Chkdsk /R will locate bad sectors and recover the information from them. The chkdsk command will check the integrity of the disk. 10. it should be running at 1000 Mbps (1 Gbps). The System32 folder is inside the Windows folder. we want it to use the best wireless encryption possible. which ultimately reduces the time it takes to check the volume. 11. 13. Answers: A and D. DHCP servers don’t have anything to do with the speed of the network or speed of Internet connections. though it would be quite insecure. /F fixes errors but doesn’t locate bad sectors and recover the information from them.ini file. yet everyone else can print to it. If the NTLDR file has been damaged or is missing.280 Chapter 10 7. Nowhere in the scenario is a cellular repeater mentioned. Answer: D. if the firewall was off. network performance would probably increase when connecting to the Internet. 8. Since the LAN is supposed to be a gigabit Ethernet network. there will be no . The switches could have been inadvertently reconfigured to 100 Mbps speed during the recent network hardware refresh. WAPs don’t require drivers. the Documents and Settings and System Volume Information folders will be hidden and access will be denied. Regardless. In a standard Windows 7/Vista configuration. On the other hand. 12. If the network speed is reduced down to 10%. But the network adapter is fine because it is already configured with WPA2. but Windows Vista/7 changed that by creating a junction from that folder to the Users folder. Power users in Windows XP were able to install programs but are not allowed in Windows 7 or Vista.

then you should not have to change the user’s password or permissions.0. you wouldn’t want to downgrade the new drive to FAT32. and security auditing events. You can tell because it shows each disk and the volumes within each disk. Answer: B.220-802 Practice Exam D 281 print queue to clear.0 speeds (5. 19. 802. Bill will probably lose access to other folders as well. A keyboard could stop functioning due to stuck keys from overuse or liquid spill. 16. 14. If the user was able to print to an older printer that was also shared by other users in the workgroup. or misuse. The Disk Management component of Computer Management is being displayed in the figure. loose ribbon cable connection. it is also possible that the card has an incorrect driver installed in Windows.11 refers to WLAN (Wi-Fi). If the external hard drive was a USB 2. If the hard drive was faulty. A bad inverter would cause the backlight to fail. the touchpad and the keyboard are separate devices on the laptop. You would not use local access security because the folder is shared from a network server within your Active Directory domain. Answer: C. SATA drives are faster than PATA (IDE) drives. Disabling the WLAN card will not affect this scenario. . Answers: A. If you deny read access to the accounting folder for any group that Bill is a member of. The card either is not being recognized in the BIOS or is not enabled. if the customer is already using NTFS. DiskPart is the command-line tool used to create and modify partitions on the hard drive. However. Of course. 17. Disk Administrator is the predecessor to Disk Management in the old Windows NT days. Answer: D. This message appears when a device is connected to a USB port. not Bluetooth. The best option in this scenario would be to deny read access to the Accounting folder for Bill through shared access security. it is the less likely answer. 15. It’s possible that the external hard drive is compatible with USB 3. environmental conditions. if you remove Bill from all domain groups that have access to the accounting folder. they are completely different standards and ports. Chances are that a computer BIOS setting is incorrect. Answer: C. USB wouldn’t even be a concern. A discharged battery would cause the laptop to simply shut off (if using battery power only). A faulty touchpad is another problem altogether. and NTFS is going to be more efficient than FAT32. Answer: B. and you would just barely be able to see the display. Windows can’t run at those speeds without a driver update or other upgrade software-wise. the message wouldn’t appear because everything already runs at USB 2. but the system is not capable of USB 3. Windows notifies you that the device can run faster than it currently is. and E. and a warped keyboard caused by damage from heavy items. then the next thing to check would be if the print queue has failed. Also. Though it is possible for a microwave or other wireless device to interfere with Bluetooth. In some cases. A drive plugged into a FireWire port wouldn’t get the message listed in the question.0 Gbps). C. The Event Viewer houses log information for the system. applications. Microwaves are usually not located near a person’s computer. you would see other indications such as lockups or failure to boot. Plus. you will probably impact other users on the network negatively.0 device. if the printer has been installed.0 speed. If the drive was FireWire (IEEE 1394). but nothing dealing with Bluetooth devices. You could also check the print spooler. 18.

you should check the UPS battery. Answer: D. E. there are lots of ways to shut off services. it needs to be shut down to be safe. 26. Answer: D. The Action Center could be considered the successor to the Problem Reports and Solutions of Windows Vista. Check if the system is in hibernate mode by pressing and holding the power button. but you should know the Control Panel paths for the exam. You should always turn the printer off and unplug it before putting your hands inside it! Plus. If the monitor has a LED light. Services cannot be accessed directly from Control Panel. Answer: C. this is done in the archived messages section. Answer: A. Answer: C. The Action Center in Windows 7 can save problem descriptions and solutions. as well as the successor to the older Dr. Really. in this case you are just turning the computer on. you know it is getting power and so the UPS does not need to be power cycled. If there is a power failure. Could be that the user simply wasn’t pressing the power button! If it blinks slowly once in a while the laptop might be in a sleep state. Answers: A. Newer smartcards with more intelligence are constantly being developed. you should wait for about 10 or 15 minutes so that the fuser can cool off. However. know as many of them as you can. A smartcard is an intelligent card that authenticates a user. 24. If you power cycle the PC and there is still nothing on the display. check if it is the right adapter. In rarer cases you might have to replace the smartcard . The path Msconfig > Settings > Services is not valid because there is no Settings option. Check the power LED on the laptop first and see what it is doing.282 Chapter 10 20. 21. Turning the breaker switches for the circuit on and off is always fun but would simply cut power to the AC outlets temporarily. if it is. Performance Monitor is a program that tracks how much of your device’s resources are being utilized—for example. the monitor was still on (thus the LED) but the computer remained off (thus nothing on the display). you should also check if the battery is connected properly and charged. Make sure the AC adapter is getting power. First thing: remove the PC from the network so that the virus (if there is one) doesn’t spread to other systems! Then you can safely go about troubleshooting that system by performing an AV scan while in Safe Mode and checking for system security updates. Make sure the user keeps the AC adapter on hand at all times. what percentage of the processor is used. so make sure it isn’t loose. try upgrading the smartcard reader firmware. the power button might be faulty. In this scenario it could be that power went out for 5 minutes. Taking the printer offline is not enough. Finally. try power cycling the PC. and G. Finally. These newer cards might not be readable by a smartcard reader until it is updated. there are lots of other ways to get to the Services console window. First. 25. Peripherals should have no bearing on this scenario unless they also plug in. The print queue will be cleared on most printers when you turn them off. If there is no AC adapter available. if there was a 5-minute power loss and the UPS didn’t keep the PC running. C. such as in the Task Manager or in the Command Prompt. System Settings > Tools > Services is also an invalid path. try disconnecting the peripherals from the PC. Of course. 23. When power returned. In addition. Open the doors after you have turned the printer off. Then check the power light on the AC adapter. and rebooting the PC. 22. Watson in Windows XP. Answer: A. The correct path is Control Panel > Administrative Tools > Services. disconnecting their AC power (if they have that).

If it hasn’t been updated in a while. After the RAM upgrade those numbers are RAM: 5. It encrypts all of the contents that are created on it or copied to it in real-time.220-802 Practice Exam D 283 reader. no OS updates are required to make RAM recognizable to the system. 32. Answer: D. 28. support BitLocker when used in this manner.2. The figure displays the System Information window with the IEEE 1394 (and I/O setting) highlighted. It requires a trusted platform module (TPM) on the motherboard or an encrypted USB flash drive. stop services. 30. Answer: C. Copy /Z copies networked files in restartable mode. Increasing the resolution on the screen won’t have an effect. External storage is not necessary for these. they are automatically stored in the system volume.0. A defective display or defective video controller would probably cause a complete lack of video. and CPU: 4.8. and kill processes. Xcopy is used to easily copy entire directories of data to another location. NTbackup is the Windows XP backup program. the lowest common denominator should be upgraded. Other lesser versions of Windows are compatible with BitLocker To Go for reading encrypted documents. So. and connect it securely on each end. it probably won’t recognize newer memory modules. The Windows Experience Index is based on the lowest component score. You’ll note that there is a number after each component. which only needs to be configured if a person forgot a password. BitLocker is a type of WDE: whole-disk encryption. Reinstalling the OS should be avoided at all costs. the only jumper you will often find is the BIOS configuration jumper. This is common with laptops as they are constantly being moved around and jostled. and Windows Vista Ultimate and Enterprise. Intermittent lines are a good indicator that the video cable is loose (or possibly damaged). Copy /Y suppresses prompting of overwrite confirmations. The BIOS will have a problem recognizing the RAM far before the OS starts up. Answer: A. It does this by creating restore points. Answer: D. 31. Answer: A. In this case that is the video card. A BIOS flash should be necessary only if the smartcard reader is not recognized. 29. . ribbon cables like to come loose! Remember to consider loose connections before guessing at defective parts. Answer: C. Remove the keyboard (or disassemble the display). Xcopy is used to copy entire directory trees. but it might be necessary if the laptop has a very old version of Windows. Only Windows 7 Ultimate and Enterprise. Most of today’s motherboards don’t have jumper settings for RAM. you would know because the time in the BIOS would reset to an earlier date. System Information can be accessed from Start > All Programs > Accessories > System Tools or by accessing Run and typing msinfo32. Answer: B. Upgrade the video card. A damaged hinge would prevent the laptop from closing properly. In fact. Video: 3. The video score is the index. locate the ribbon cable. 27. Copy /A allows you to indicate an ASCII text file to copy. You should update the BIOS. 33. If the computer needed a new CMOS battery. The Task Manager is used to view system performance. or it will cause the index for video to go down. System Protection is a feature that creates and saves data about the computer’s system files and settings.

. 36. Answer: D. You shouldn’t have to reseat the memory unless you get an error message during the POST. but newer versions of Windows tend to have system files with . Remember the golden rule: Make sure it’s plugged in! Do that first and you will save yourself a lot of hours of your life.EXE extension.EXE extension. in which case you would have to replace the entire power supply. So. Note the backslashes in use here. checking the type of power adapter being used. The correct syntax is net use \\Romulus\AlbaLonga. However. something that a server name would be part of— for example.com. It’s possible to connect to servers and shares with HTTP but not map a drive to them. Also. . This is a quick and cheap fix luckily. If the sticks are not compatible. it means that the hot air is not exhausting out of the case—the number one offender is the case fan.EXE is short for executable.ini file which has the list of operating systems that can be booted to. and instead. when you do plug in the AC adapter.exe extensions. sometimes you will find the battery does need to be replaced.dll and . pagefile.txt files). Always check to see if it can be charged and if it holds a charge.INI and . if that doesn’t work. the share name is AlbaLonga. you will probably get memory errors during POST. For multiple memory sticks to be compatible. the most common is setup. so you might append that to net use (for example. Window XP’s boot.exe.284 Chapter 10 34. However. You know that Dave— sometimes he forgets to plug in the power adapter and then the battery goes dead. the winword.CFG files can be manipulated in Notepad because they are text based (but not text or . The universal naming convention (UNC) for mapping drives is \\servername\sharename.com is a domain name. the power supply fan could have failed (less likely). The case fan is the most likely culprit of the listed answers. not server names. You might be able to get away with one stick being one step slower. Answer: C. Heat sinks . you can move on to checking the battery. You would probably want a persistent connection using a drive letter (such as F:). *.SYS files are system files—for example. . And for installing programs. and so on. 38. to start Microsoft Word. causing the laptop to be quite unresponsive when pressing the power button. When you want to run a program.EXE refers to any file with the .INI files are initialization files—for example. And if the system is making little noise. or if the second stick is not compatible with the motherboard. the server name is Romulus. server1 would be the server name (or hostname) of the address server1. You should plug in the external power supply. Answer: D. Often. The server name is Romulus.davidlprowse. But it isn’t worth the chance. and as long as it is not dual-channel memory. The .sys. 37.SYS extension was used extensively back in the days of DOS. their laptops are constantly being used at a low percentage of charge. Romulus.exe executable is initiated. net use F: \\Romulus\AlbaLonga or something to that effect). This lessens the lifespan of the battery. . they need to run at the same speed. 35. the AC outlet you are connecting to. These might list commands and parameters for a program. you can guess that a fan has failed (although they are making quieter and quieter fans). Answer: A. it is usually started with a file that has a . . If the computer is overheating. For example. Recommend to laptop users that they carry a spare battery in the laptop bag. The IPP protocol is used to make connections to printers and is often used with IP addresses. Answer: C.CFG is short for configuration file. if the motherboard supports it. Some users neglect to charge their batteries.

220-802 Practice Exam D

285

are passive and usually don’t fail; it is more likely that the CPU fan would fail. If the
CPU itself failed, it could be because of overheating, but that would cause the system
to stop working, which is contrary to the scenario in the question.
39. Answer: B. The first thing you should do is identify the malware. (BTW, if the computer is on the network, disconnect it first.) Then, you can research that malware and any
possible cures by searching the Internet and accessing your AV provider’s website.
Rolling back drivers should not be necessary, especially if you find it necessary to run
a System Restore at some point.
40. Answer: C. We are looking at the Advanced Boot Options Menu (ABOM) screen. This
is the screen that comes up if you press F8 while Windows is booting, and it’s how
you would access Safe Mode and a host of other booting options. The System
Recovery Options (WinRE) can be accessed by booting to the Windows 7/Vista DVD
and selecting Repair. The Recovery Console is the repair environment for Windows
XP; it is also accessed from the Windows disc. Msconfig is a program within
Windows that allows you to modify the way the system boots, disable programs, and
disable services.
41. Answer: A. User A will end up having the Read-Only level of access to the share.
Generally, a user gets the more restrictive level of access. The only thing that is different between the share’s permissions and the parent directory’s permissions is the level
of control for the Users group. Normally, a share will obtain its permissions from the
parent folder. That is, unless that option is un-checkmarked in the properties of the
folder; then, the folder can be reconfigured for whatever permissions an admin wants
to set for it. That must be what happened in the scenario. Administrators get Full
Control access to almost everything by default. And Guests get No Access to just
about everything by default. So the only possibilities for this question were Change
and Read Only. Again, in general, the typical user account will receive the more restrictive level of permissions.
42. Answer: B. Most likely, the printer will print garbage or unreadable characters (known
as garbled characters). If you install an incorrect driver for a printer, you risk a
garbage printout. You would know if this was the case immediately when trying to
print a test page. The incorrect driver could be a printer driver for another printer or
one that is PostScript when it should be Printer Command Language (PCL). This won’t
stop the printer from printing, but you may not like what you see (unless you are into
gibberish). The DPI of the printer will not change. A DPI such as 600 cannot be
decreased to 300 DPI unless you set that in the printer’s Properties sheet in Windows
or on the display on the printer. And it can only be increased in the same manner, and
only if the printer supports it.
43. Answer: D. The printer is probably overheating during these long jobs. Perhaps the
fuser is nearing replacement time. The fuser can run as hot as 400° Fahrenheit (204°
Celsius), and some printers will pause printing when that temperature threshold is
tripped. Once the temperature goes back below the threshold, the printer will begin
printing again. If the toner cartridge was defective, you would get blank paper, lighter
printing, or paper with lines or smears. As long as there is paper in the tray, the large
print job will continue to print (if within operating temperature parameters). Updated
drivers are only necessary when the printer will not print the data on the page correctly. Pausing the job in this scenario is not causing any print errors; it’s just taking
longer to complete.

286

Chapter 10

44. Answer: A. Before implementing the BitLocker solution in Windows, you should
enable the trusted platform module (TPM) in the BIOS. This is the chip on the motherboard that includes the encryption code. UAC is User Account Control, a separate
security option in Windows 7/Vista that checks if users have administrative permissions before allowing them to carry out administrative tasks. Defragmenting the hard
drive is not necessary, but it can’t hurt to at least analyze the drive and see if it needs
to be defragged. Defragging a drive that requires it can increase performance.
BitLocker works on FAT16, FAT32, NTFS, and exFAT partitions, so no need to convert
the file system.
45. Answer: C. The –l switch in this scenario is pinging the host at 10.254.254.1 with
four individual 1500-byte packets of data. –l allows you to change the size of the
packet that is sent; it is 32 bytes by default. You can see that the figure only shows
four pings total. A continuous ping would keep going until you stop it by pressing Ctrl
+ C on the keyboard or closing the Command Prompt; that would be performed with
the –t switch. A specific amount of pings can be controlled with the –n switch. It is
1500 bytes per packet, not 1500 MB/s, which would be a far greater amount and not
one that can be configured with the ping command.
46. Answer: B. You would mark SATA Drive 1 as active. If you cannot access Disk
Management, you would have to do it by booting the system with WinRE (System
Recovery Options), accessing the Command Prompt; executing the Diskpart command; and typing the commands select disk 1, select partition 1, and
active. A RAID 1 array is a mirroring array with two drives. The second drive keeps
an exact copy of the first drive in real-time. If Drive 1 doesn’t take over automatically
when Drive 0 fails, you will have to set it to active. Remember that a partition with an
operating system must be set to active; otherwise, the computer will not be able to
boot to the partition. Replacing Drive 1 is not necessary as it did not fail. Replacing
Drive 0 is inevitable if you want to re-create the mirror, but not necessary if you just
want to get the system to boot for now. Rebooting to the Last Known Good
Configuration will not help; that only reverts system changes back to when the last
successful login occurred. It won’t fix the failed drive.
47. Answer: A. The Recover command can recover readable information from a bad or
defective disk. The disk should be slaved to a working computer to get back the data.
The Replace command will replace source and destination files but not recover lost
information. Convert changes a file system from FAT to NTFS without losing data.
REM records comments in a batch file (.bat) or within config.sys, a root file not
typically used in Windows.
48. Answer: B. Xcopy can copy NTFS permissions. Normally, when a file is copied—
for example, in Windows Explorer—the file loses its permissions and takes on the
permissions of the new parent folder. That is also the case with the Copy command.
Xcopy and Robocopy can be used to transcend this rule. Both Xcopy and Copy
can copy files off of a mapped network drive and can copy entire folder structures, but
neither can copy files while decrypting them.
49. Answer: D. The person’s arm or sleeve is probably brushing up against the touchpad,
causing the mouse pointer to move. By disabling the touchpad in the Device Manager
or elsewhere, you eliminate the chance of that, but the user also loses that functionality. Rebooting the laptop will have the same effect and is not necessary. Using an

220-802 Practice Exam D

287

external mouse alone will not fix the problem; even if there is an external mouse, the
touchpad can still be used, unless it is disabled. An external monitor will not help you
fix the touchpad issue, but it might be a nice addition to a laptop. In fact, many users
who have laptops in an office also use them at home. At the office, and perhaps at
home as well, it is best to set them up with a docking station, external keyboard, external mouse, and monitor. It usually results in greater productivity.
50. Answer: B. The netstat –n command was issued in the Command Prompt in the
figure. –n shows information in numerical format: IP addresses and port numbers
instead of computer names and protocol names. netstat by itself would show the
same information but by name. Note that the command in the figure only shows TCP
sessions. To show both TCP and UDP sessions, use netstat –a. To show both but
in numerical format, use netstat –an. nbtstat displays TCP/IP statistics as they
relate to NetBIOS over TCP/IP connections. nbtstat –n lists local NetBIOS names.
51. Answer: C. Try alternate-clicking and selecting “What’s This?” Alternate-click means
you are using the secondary mouse button; for right-handed folk this would be a rightclick. You could also use the Microsoft Support website or press F1 to search for information within Windows, but they would both take longer. There is no “More
Information” option when you alternate-click.
52. Answer: D. If the printer is printing lighter in some areas, it is a good indicator that the
toner cartridge needs replacement. The fuser need only be cleaned if you see smudges
or streaks (you should also check the maintenance schedule and see if it should be
replaced). You might clean parts of the printer with a computer vacuum if there was a
toner spill (making sure to turn off the printer first), but the drum might be within the
toner cartridge, making that impossible. Compressed air is also sometimes used on
rollers and separator pads, but it is not usually recommended because it can blow
excess toner all over the place—have that computer vacuum handy.
53. Answer: B. RAID 1 is mirroring, but if you were to incorporate a separate hard disk controller for each drive, you would then have disk duplexing as well. RAID 1 is fault tolerant because a copy of all data goes to both disks in the mirror. RAID 0 is data striping
and has no fault tolerant mechanism. RAID 5 and 6 are both types of striping with parity
which are fault tolerant, but only RAID 1 offers disk mirroring with duplexing.
54. Answer: C. The path C:\Users\Charlie\My Pictures is where the pictures would be
stored. Documents and Settings was used by Windows XP, but as of Vista was redirected (via a junction) to the Users folder. It is possible to access Libraries in Windows
7, but it is a bit easier than the answer listed. Go to Windows Explorer, and then go to
Libraries > Pictures > My Pictures.
55. Answer: D. The figure shows the Microsoft Management Console (MMC). You can tell
because it is given the default name “Console1” and has multiple other console windows within it, including Computer Management. This is accessed by clicking Start,
going to Run, and typing MMC. But when it is first opened, it will not be populated
with any snap-ins.
56. Answer: A. If you see video issues such as pausing during game play, upgrade the
video drivers. Make sure that you download the latest video driver from the manufacturer’s website. Gamers cannot rely on Microsoft drivers, especially FPS gamers!
Sometimes reinstalling a game is necessary but shouldn’t be in this scenario.

288

Chapter 10

Replacing the hard drive and reinstalling the OS are drastic and unnecessary measures
for this problem.
57. Answer: C. Phone lines can carry as much as 80 volts (when they ring), which could
possibly damage network interface cards on a computer and other Ethernet networking equipment, so they should be plugged into modems only. Ethernet often uses plus
and minus 5 V signals unless you use Power over Ethernet (PoE), which incorporates
regular Ethernet but also sends power over the unused wires on the network cable. It’s
true; the Public Switched Telephone Network (PSTN) is not Ethernet-based. But that
only means that a phone line will not work with a standard Ethernet network adapter.
Ethernet doesn’t support pulse dialing or tone dialing. RJ11 connections are indeed
full-duplex; you can talk and listen when having a conversation at the same time.
58. Answer: B. The first thing you should do is export the user’s certificate from the first
laptop to the second laptop. This can be done by clicking Start and typing certmgr.msc
in the Search box; then locate and export the correct Personal Certificate. The
Certificates console window can also be added to an MMC. The Encrypting File System
(EFS) is the standard single-file encryption method for Windows 7/Vista (if the version
supports it). Files encrypted with EFS are then displayed as green in color within
Windows Explorer. Networking need not be disabled, and we aren’t sure which user is
being referred to in the answers, but if the certificate has been exported, that user
should be able to read the files. Partitions can be converted from FAT32 to NTFS but
not vice versa.
59. Answer: A. The technician should update the antivirus (AV) software immediately after
installing it and set it to automatically check for updates every day. If the PC was
infected, and the scenario makes no mention of this, the technician should have
already removed the system from the network, ran a full scan, and quarantined infected files—in that order. Any other viruses that eluded quarantine would be researched
on the AV manufacturer’s website.
60. Answer: D. Use the nbtstat –A command. This allows you to check the name table
of the remote computer by connecting to it with an IP address. –a connects by computer name (though an IP address can still work if proper resolution methods are
available on your network). Note that the options for nbtstat are case sensitive.
<20> is the number associated with the server service, the service that allows the
Windows 7 Ultimate computer (IP address 192.168.1.5) to serve data to other systems on the network. If it was functioning, you would see it listed along with the
Workstation service <00> and perhaps the Messenger service <03>. However, if the
server service was not running, you wouldn’t even be able to connect to the Windows
7 Ultimate computer at all—not with nbtstat, by ping, or any other method, until
the problem is repaired. That one might have been considered a “doozie”.
61. Answer: C. Check the IEC cable first if you sense that there is a power issue. That is
the power cable for the computer; make sure it is connected to the computer and to
the AC outlet. Next, check the AC wall outlet. Use a receptacle tester or your trusty
multimeter to make sure the AC outlet is wired properly and supplying the correct voltage. If that is fine, you can check the power supply and the 24-pin power connector.
Only check the circuit breaker if the power has been cut to an area of the building, and
only if you have access to the electrical panels.

220-802 Practice Exam D

289

62. Answer: A. The LCD cutoff switch is normally enabled when you close a laptop. The
default action in Windows is to put the laptop to sleep if it senses that the LCD cutoff
switch has been engaged (laptop has been closed). If the laptop goes into standby
mode unexpectedly without closing the laptop, you will have to repair or replace the
LCD cutoff switch mechanism. The hard drive, SATA controller, and video card are put
to sleep when the laptop goes to sleep but should not cause the computer to sleep
unexpectedly.
63. Answer: D. Check the hash key of the virus definition you downloaded against the
location that you downloaded from. Other properties of the definition (or signature) file
(such as the file owner, creation date, and file version) can all be spoofed. The difference is that the hash key is mathematically contrived and must match the key from the
download point.
64. Answer: B. If the computer keeps obtaining an APIPA address (an IP address that
starts with 169.254), then the DHCP server has most likely failed. Of course, you
should check if the computer’s patch cable is connected and that the network adapter
has a link light. If so, then you can rule out the network switch and the patch panel.
DNS resolves hostnames to IP address and isn’t part of DHCP.
65. Answer: B. A Trojan appears to perform desired functions but is actually performing
malicious functions behind the scenes. Trojans are used to access a computer through
a backdoor and take control of it. They are the bane of web servers as well. Remote
Access Trojans (RATs) are used to take control of Windows clients without the users
knowing. A virus is code that runs on a computer without the user’s knowledge,
infecting files when it is executed. Spyware is malicious software that is unwittingly
downloaded and installed. It is usually employed to track the surfing activities of a
user. A rootkit is software that is designed to gain administrator-level control over a
system.
66. Answer: A. Installing a wireless repeater to increase the distance of the wireless network is the easiest and cheapest solution. Of course, you should first ask if the customer would mind moving the wireless access point to the center of the home, thus
giving broader and more uniform coverage. Running cable is time-consuming, is
expensive for the customer, and can be difficult in some houses. Though a second
wired router would work, it is a more expensive solution (plus the cabling) than a simple wireless repeater. Plus, it would have to be configured properly. High-gain antennae are usually used outdoors (or in outer space) for long-distance transmissions.
They have too much power to be placed inside a home and are an excessive solution.
67. Answer: D. On the laptop, enable the HDMI audio service to send audio signal along
the HDMI cable to the TV. On DVRs, HDMI is set to transmit video and audio by
default. However, on some laptops, the audio software might be set to HDMI video
only by default, expecting you to be doing presentations or other things where audio is
not required. You can usually change this by right-clicking the sound icon in the
Notification Area, selecting Playback Devices, and then selecting the HDMI sound
device. Drivers might also be necessary. There is no maximum specified length of an
HDMI cable, and the question does not tell us the length, but standard cables are
either 5 meters or 15 meters long. If the laptop has an HDMI output, you should be
able to modify it in Windows. If the HDMI output is part of a USB device, PC Card, or

290

Chapter 10

ExpressCard, make sure you have installed the latest drivers for the device. The speakers don’t come into play here. If the TV with the HDMI output has speakers, those
speakers should work.
68. Answer: C. Foreign disks that are installed in a computer show up in the Disk
Management utility as foreign. They need to be imported by right-clicking them and
running through the import procedure. No need to convert them from basic to dynamic unless you decide later that you want to create special arrays of disks or expand/
contract the size of partitions. Set a disk to active if it has an OS and you wish to make
it bootable.
69. Answers: A and C. The correct navigational path to the System Restore configuration
utility in Windows 7 is Start > right-click Computer > Properties > click the System
protection link. That displays the System Properties dialog box System Protection tab.
But you gotta love the other method: Run > type systempropertiesprotect
ion.exe. Without touching the mouse, you can bring up the same dialog box:
Windows + R > type systempropertiesprotection.exe. Fun! Anyway, Start > right-click
Computer > Advanced is not a valid path. Start > right-click Computer > Properties >
click the Advanced system settings link is valid, but it brings you to the Advanced tab
of the System Properties dialog box.
70. Answer: D. The figure is showing the Advanced tab of a Lexmark Pro900 printer in
Windows 7. It was accessed by navigating to Start > Control Panel > Devices and
Printers > right-click the printer and select Printer Properties > Advanced tab. When
you right-click on some printers, you need to select Properties instead of Printer
Properties; otherwise, the navigation is the same. The Ports tab displays the physical
or logical port being used by the printer and allows you to add, remove, and configure
ports and enable printer pooling between two or more printers.
71. Answer: B. Authentication can be carried out by utilizing something a user is, such as
a fingerprint; something a user knows, such as a password or PIN; something a user
has, such as a smart card or token; and something a user does, such as a signature or
speaking words.
72. Answer: A. If you can’t find the SSID by scanning for it, enter it manually in your
wireless configuration software. You will also need to know the channel being used
and the type of encryption as well as the key. If you were to change the SSID on the
router, the rest of the clients wouldn’t be able to connect, and you still wouldn’t be
able to scan for it because SSID broadcasting has obviously been turned off as a security precaution in the question’s scenario. MAC addresses are burned into the network
adapter of the router; they are usually not modified. Resetting the wireless card is
rather vague. You could disable it and re-enable it, but you would be left with the
same problem. Know how to manually enter a wireless configuration in Windows!
73. Answer: C. Whaling is when phishing attacks are directed at CEOs and other powerful
entities in an organization. It is a type of spear phishing—a directed phishing attack.
Whereas most phishing attacks are performed via e-mail, vishing is carried out over
the phone.
74. Answer: D. The DoD 5220.22-M standard specifies that a hard drive be properly
purged with bit-level erasure software that does 7 complete passes. Compare this to
the Peter Gutman security method, which requires 35 passes! A magnetic degausser

Answer: D. . forces a user to select a password that meets 3 of the following 5 categories: uppercase characters. The power supply can run without its fan. A bad fan is the most likely cause. If the memory was not seated properly. If the resolution was set too high. 76. but data can still be reconstructed from data residue (data remanence). but to be full-on secure many organizations require 15 minimum. Answer: C. it is normal for them. This can be disabled on the same Passcode Lock screen. if enabled. it wouldn’t lock up. but the A+ exam will not go into that kind of depth. Answer: B. you probably wouldn’t even see the cursor. The path is Settings > General > Passcode Lock > Turn Passcode On. Then replace the RAM as a last resort. Answer: B. try cleaning and reseating the RAM. special characters (such as ! or #). If the CD-ROM was bad. What the customer meant is that the computer locked up. lowercase characters. Password policies can be accessed in Windows 7 within the Local Security Policy window > Security Settings > Account Policies > Password Policy. The backbone switch is at the top of the hierarchy. 78. 79. Minimum password length is the policy that states how many characters a password must be at minimum. 75. Both hierarchical star and star-bus are hybrid topologies. that user will not be able to use the same password. the system wouldn’t boot. The CD-ROM won’t cause the system to lock up. You just created a hierarchical star topology. the system would turn off. Answer: A. video will fail. Eight is a decent setting. Note: SCSI drives make a grinding sound all the time. the system would probably not get past the POST and you would either hear beep codes or see an onscreen message to that effect. Star-bus is when two star networks’ switches are connected with a single bus connection. you add a top level of super speed.220-802 Practice Exam D 291 is not software at all. You should configure the Enforce password history policy and set it to a number higher than zero. Simple Passcode is enabled. make sure they are compatible with the motherboard and with each other (if there is more than one). numbers. First. There are several technical reasons for this. Low-level formatting can be accomplished by some BIOS programs and third-party utilities. you wouldn’t be able to listen to the B-52’s (in the case that you wanted to). as shown in the figure within the question. and if that doesn’t work. and Unicode characters (not often implemented). If the hard drive was grinding that badly. but the CD-ROM driver could cause a stop error if it failed. 80. Most likely a fan is failing somewhere—either the CPU fan or a case fan— causing the computer to overheat and then ironically to “freeze” as the customer put it. If they fail. Complexity requirements policy. If the power supply failed. but a device that uses a magnetic or electromagnetic pulse to remove all data from a magnetic disk. That means that the video controller relies on the motherboard’s RAM memory modules. the screen would be completely unreadable. Answer: A. This way. Defective RAM is the most likely perpetrator in this case. By taking three current star topologies and connecting them all to a backbone switch. when a user is prompted to change her password every 42 days (which is the default minimum password age). you would definitely have problems in Windows. If the power supply was bad. 77. By default. The grinding will most likely come from a dirty/dusty or failing power supply fan or CPU fan. The key in the question is the shared video memory.

/R locates bad sectors and recovers readable information. does not . but not disable them. but that won’t help Windows see the drive. if this is a SOHO network. but any hacker worth his or her salt will get right past that. configure System Restore. Answer: C. No need to set the drive to active because this drive does not have an OS to be booted to. regardless of where it is installed. 83. Answer: B. but it would help to prevent network intrusion. (Some devices combine IDS and firewall technologies. Answer: C. The Action Center in Windows 7 displays important messages about solving issues and security concerns. and set up Remote Desktop. Answer: B. /V (short for verbose) displays the full path and name of every file on the disk. This makes it possible to implement advanced networking and security techniques in conjunction with the DVD via the Data folder. 84. but usually not SOHO multifunction network devices. that is the name of the Windows 7 64-bit DVD. Of course. 85.292 Chapter 10 81. It is pointing to. Antivirus software. a cute way to open Msconfig is to Press Start and type sys in the search box. If you need to stop and disable a service. it just has to be enabled. Use the System Configuration tool (Msconfig. Windows Defender is Microsoft’s free anti-malware tool. chances are the network is controlled by a multifunction network device that already acts as a switch and a router and probably has built-in firewall technology. Chkdsk /I performs a less vigorous check of index entries. you will probably have to initialize the drive and format it in the Disk Management utility. but perhaps someone inadvertently disabled it. Do this in the Services tab. or redirecting to. This is the successor to the Windows Vista Problem Reports and Solutions utility.exe) to disable the service. It can be used only on NTFS partitions. Answer: B. plus. As to the incorrect answers: The Task Scheduler is used to set a time when particular applications and processes will run. 82. The most practical way to prevent intrusion to the network is to install a firewall. Rebooting the computer will not help the system see the drive. This way. It just happens to be sitting in a DVD-ROM drive named F:. The Task Manager gives you some basic real-time performance data about the PC and can be used to stop processes. The Windows 7 DVD has been mounted. he will see the contents of the Windows 7 DVD. the attacker could be trying to connect directly through the Internet connection. When you format the drive. 86. System Properties is the dialog box where you can change the name of the computer. Local Security Policy is where password and auditing policies can be configured. you can also disable services in the Services console window. Disk Management will ask you to assign a drive letter. the Services console window is your best bet. You can configure the drive in the BIOS to a certain extent. BTW. /F fixes errors on the disk. the Data folder on the hard drive (as you can see from the title of the window). In fact. which can be easily shared. An intrusion-detection system (IDS) is usually more elaborate and costs more money. That is because Msconfig can disable them but not stop them (plus a restart is required for most Msconfig actions). When you add a second drive to a system that already has Windows installed.) Disabling the SSID will help to discourage the average user from accessing the wireless network. if a person clicks on the Data folder. and that’s one of the reasons an attacker keeps trying to get into the network. Usually these are enabled by default. Answer: D. We can tell because the Target is GRMCULXFRER_EN_DVD. And the Task Manager can stop them.

The iPad uses a 3. The video card will most likely be the lowest. Answer: C. 87. You can navigate to the window in the figure by going to Start > right-click Computer. so that is the second thing you should check. not to mention a real challenge to fit in the device.exe. 91. You can’t put a PCI Express (PCIe) card in a PCI slot! That’s all there is to it. CAD/CAM workstations often require video cards that can cost thousands of dollars. that means check the connections. . for networks. Disconnecting the Internet connection would work—the hacker wouldn’t be able to get in. Not a good compromise. On the average it lasts for 10 hours of use.0. but they have all given way to lithium-ion. RAM is not as important to the CAD/CAM workstation. x4 slot. the print would become weaker. it could cause the paper to become singed and could be a safety hazard. In any case when you need to maintenance the fuser. you could install that to a x1 slot. turn off the printer. For PCs. Answer: D. Nothing has been mentioned about the Internet (or other networks). 90. The CPU will also play into this. so there is no reason to think that the switch’s uplink cable needs replacement. you might see a lot of toner within the printer that needs to be cleaned properly with a computer vacuum. as long as it has enough to run Windows and the AutoCAD software. Nickelcadmium (NiCd) batteries were used in laptops during the 1990s and early millennium. unplug it.000 pages of print before it needs to be replaced: a good time to install a maintenance kit. and finally clicking the Change button. If the toner cartridge was leaking.1 was probably already done in this scenario. However. That’s how you know the network card appears to be functioning properly. if you had a PCIe x1 video card. 88. let it cool. or x16 slot. If the fuser was too hot. that means power cycling the device (and checking connections). especially when rendering images. Images that do not display properly are usually due to a subpar video card. Answer: A. but none of the employees would be able to use the Internet. It is a step above a standard lithium-ion in that it uses a flexible material that can be shaped into just about anything the manufacturer wants. Answer: D. 89. Blurry and smudged pages tend to indicate that the fuser is not getting hot enough. Always read the directions carefully and set up massive ESD prevention techniques prior to installing a card this expensive.220-802 Practice Exam D 293 repel attackers. CAD/CAM workstations require a powerful video card. typing systempropertiescomputername. A card from one expansion bus cannot be used in another. Rebooting the computer should not be necessary because we again determined that the network card is functioning properly. The fuser lasts for about 200. If the toner cartridge is low. A 16volt battery would be ridiculous and inefficient. and then replace the fuser. iPads and other mobile devices use the lithium-ion polymer battery for its lasting power and its flexibility during manufacturing. Answers: A and C. Answer: B. The video card should be your first stop on the upgrade express train.7-volt battery. View the Windows Experience Index details to find out what has the lowest score and go from there.0. it locates and quarantines malware. If the lights are on and not blinking. select Properties > Computer Name tab > Change or by accessing Run. Remember to start with the simple. 92. The hard drive doesn’t play much of a factor while the CAD software is running. it would appear that the switch crashed and needs that reboot! A ping of 127.

to register a sample ActiveX control. Answer: B. taskkill ends processes from the Command Prompt. If they are dirty or oily. Other commands can also show open ports such as netstat –a. The successor to netsh firewall in Windows 7/Vista is netsh advfirewall firewall. /E copies all subdirectories. Apple iOS. but that doesn’t make it an administrative share.bat) or beyond. net share allows you to create shares within the Command Prompt. the share itself has to have the $ to make it hidden. down is not a command in Windows. you would type regsvr32 sample. You can have a folder name with a $ on the end. The technician should clean the pickup rollers. /S will copy subdirectories but will skip any empty ones. kill is the older Windows NT predecessor to the taskkill command. use the /t xxx switch. net use enables you to map network drives to remote shares. and Blackberry OS don’t use such descriptive names. The drum (or toner cartridge) will usually not cause a paper jam. Answer: D. the share is hidden as an administrative share by adding a $ to the end of the sharename. The default path of the print$ administrative share in Windows 7 is C:\Windows\System32\spool\drivers. Unregistering requires the /u parameter. For example. netsh firewall show state is a command that can be run in the Command Prompt that will display any currently open ports. 96. it’s a folder you might want to access as an administrator over the network. but it has been used by other operating system manufactures to initiate a shutdown. Answer: C.ocx. To set a shutdown to occur after a specific time period. 95.294 Chapter 10 93. but you should know what the . but in the rare case. 99. and version 4 is Ice Cream Sandwich (ICS). and whether any packets were dropped. Answer: D. Answer: B. The columns were dragged to the left to hide the entire folder path. 94. /DCOPY:T also copies timestamps of files and folders. they could cause a paper jam directly behind or above the paper tray. Answer: C. However. A fuser issue would cause a jam up toward the end of the printing path. The net view command will list all of the shares on the computer within the Command Prompt. netsh firewall show logging will display the location of the firewall log. 100. Answer: A. it displays the IP address and MAC address of those remote computers. ipconfig /all displays the configuration of your network adapters. So. Gingerbread is the name of Android version 2. net statistics displays information about the server or workstation services. Answer: C. The feeder rollers would cause a jam further in the printer. Version 3 is Honeycomb. This is an important folder because it contains drivers for different types of printers. 97. including empty ones. /B copies files in backup mode. The Regsvr32 command in the Command Prompt is used to manipulate ActiveX controls and DLLs. Use the shutdown command! It works in the Command Prompt and also works programmatically within batch files (. simply replace the toner cartridge. its maximum file size. This leans more toward the programming side of things. arp–a will show a table of hosts that the local computer has connected to in recent history. 98. Windows CE.

ODBC is short for Open DataBase Connectivity. 295 . ODBC32 is not a command in Windows.220-802 Practice Exam D command does. Regedit. it is an interface used within the C programming language to access database management systems.exe and Regedt32 bring up the Registry Editor application in Windows 7/Vista.

This page intentionally left blank .

and give you some test-taking tips. Review of the Domains Remember that the 220-802 is divided into the four domains.0 Operating Systems 33% 2.0 Troubleshooting 36% Total 100% As you could see while taking the exams.11 CHAPTER ELEVEN Review of the 220-802 Exam Great work! You have completed all four hundred 220-802 practice questions. talk about your next steps. Now that you have completed the four practice exams. .1. We’ll discuss that in the next chapter. shown in Table 11. troubleshooting questions are the bulk of what you will see on the exam and are more difficult than the questions from the other domains.0 Mobile Devices 9% 4. That is a feat in itself. But the real test is yet to come.0 Security 22% 3. let’s do a little review of the 220-802 domains.1 220-802 Domains Domain Percentage of Exam 1. TABLE 11. You have to place yourself within the scenario and imagine that you are actually fixing hardware and software problems step-bystep.

Think it through carefully before you do so.com). It differs from person to person.298 Chapter 11 Even if you are a solid troubleshooter and really know your Windows operating systems. feel free to contact me at my website (www.comptia. answers. . . But I still recommend going back through all of the questions and making sure there are no questions. That’s where the test will trip you up. So. or explanations you are unclear about. Take the exams in flash card mode—Use a piece of paper to cover up the answers as you take the exams. is ambiguous or vague. Everyone who takes the exam gets a different group of questions. with them. though. To reduce your risk. then additional study is probably necessary. If there are. Download the A+ 220-802 objectives—You can get these from www. Because it is randomized. study them hard. But it really helps to close any gaps in your knowledge. Or you might see more questions on Windows security. If any questions give you difficulty. so this will take a while. contact me at my website so that I can help you understand them. Take the CompTIA A+ Practice Exam—This can also be found at www. you will have all the tools you need to rule the exam. and study all of the objectives. . If there are any items in the objectives that you are unsure about. one person may see more questions on. and I will do my best to clarify.davidlprowse. This helps to make you think a bit harder and aids in committing everything to memory.org. Go through them one by one and checkmark each item that you are confident in. say. Retake that exam until you get 100% correct. There are 20 pages of objectives. Window XP than the next person. and gives that extra boost for the exam. Security and Mobile Devices become the pivotal domains: without them you could be in trouble.org. Many of questions are written in an ambiguous manner to replicate what you will see on the real exam.comptia. even though it is over a decade old. that still leaves a third of the test unaccounted for. or doesn’t appear to be technically correct. Here are a few great ways to study further: . concepts. If something really just doesn’t make sense. Review What You Know At this point you should be pretty well versed when it comes to the 220-802 exam. be ready for any question from any domain.

Review of the 220-802 Exam 299 More Test-Taking Tips I’ve mentioned it several times already. Here are some good general practices for taking the real exams: . Rushing can cause you to miss some key word. Get a good night’s rest . or other tidbit of information that could cost you the correct answer. Take your time on the exam. When you are ready. schedule the exam to commence within a day or two so that you won’t forget what you learned! Registration can be done online. So take it slow. Use the process of elimination. If you know it. Use your gut instinct. While taking an exam. and read everything you see carefully. Register at Pearson Vue: www. Pick a good time for the exam . Don’t over-study the day before the exam . but it bears repeating. use the time allotted to you to review all of your answers. Eat a decent breakfast . Don’t let one question beat you! . .vue. They accept payment by major credit card for the exam fee. So there is no rush. I’ll expand on these points in the final chapter. follow these recommendations: . you will probably end up with time left over. phrase. Chances are you will have time left over at the end. The thing is. If you finish early.com. so use it wisely! Make sure that everything you have marked has a proper answer that makes sense to you. . guess. If all else fails. First-timers will need to create an account with Pearson Vue. you either know it or you don’t. . Be logical in the face of adversity. But try not to overthink! Give it your best shot and be confident in your answers. Taking the Real Exam Do not register until you are fully prepared.

. Well. Show up early . Bring ear plugs . that’s about it for the 220-802 portion of this book.300 Chapter 11 . Be confident I’ll embellish on these concepts in the final chapter. Meet me at the final chapter: Chapter 12. Brainstorm before starting the exam . the wrap-up. Take small breaks while taking the exam .

Getting Ready and the Exam Preparation Checklist The CompTIA A+ certification exams can be taken by anyone. there are no prerequisites. Tips for Taking the Real Exam . . Beyond the CompTIA A+ Certification NOTE This chapter is very similar to Chapter 19 of the A+ Exam Cram 6th edition (the Exam Cram study guide). additions.org Also visit my A+ page: www. although CompTIA recommends one year of prior lab or field experience working with computers.com/220-801 This page has information.comptia. and updated errata that you should check before taking the exam. Getting Ready and the Exam Preparation Checklist .12 CHAPTER TWELVE Wrap-Up This chapter provides the following tools and information to help you be successful when preparing for and taking the CompTIA A+ 220-801 and 220-802 exams: . go to: http://www. For more information on CompTIA and the A+ exam. you can use either chapter for your test preparations.davidlprowse. If you also purchased that book.

each of which is 100 questions. my readers and students have benefited greatly from this type of checklist. 4. Keep in mind that you will not be allowed to take this into the actual testing room. On the second run-through of this checklist. Review your study guide.com).302 Chapter 12 To acquire your A+ certification. 220-801 Status 220-802 Status . or another study guide of your choice. A hands-on A+ course can do so much for you when it comes to installing.1. The act of writing down important details helps to commit them to memory. configuring. Go through the checklist twice. 2. consider getting my A+ Exam Cram 6th edition study guide. You need to register with Pearson Vue to take the exam. once for each exam. I highly recommend completing each step in order and taking the 220-801 exam first.vue. Although it is possible. consider an A+ class. Complete the Practice Exams in this book. and especially troubleshooting. For each exam. 3. If you score under 90% on any one exam. but instead spacing them a week or so apart. take the four 220-802 exams and review them. and review them carefully. Attend an A+ course. I don’t recommend taking both exams on the same day. Do this first with the 220-801 exam and then again with the 220-802 exam. Whatever main study guide (or guides) you used. place a check in the status column as each item is completed. Historically. TABLE 12. you need to pass two exams: 220-801 and 220802. go back and study more! If you have any trouble at this stage. and read it very carefully. so I created a checklist that you can use to make sure you have covered all the bases.2 for an example. Create your own cheat sheet. Take the three 220-801 exams. The checklist is shown in Table 12.1 Exam Preparation Checklist Step Item Details 1. It is important to be fully prepared for the exam. be sure to review those carefully. See Table 12. Especially if you don’t have the CompTIA recommended experience (12 months). These exams are administered by Pearson Vue (www.

Good luck! Table 12. (You will need to create an account in order to sign up for exams.2 Sample Cheat Sheet Concept Fill in the Appropriate Information Here The six-step troubleshooting process 1. Do not register until you have completed the previous steps. Review practice questions.” TABLE 12. The motherboard form factors you should know The three types of DDR and their data transfer rates The EP printing process Six types of expansion busses and their maximum data transfer rates . 4. 3. Take the exam! Checkmark each exam to the right as you pass it. schedule the exam to commence within a couple days so that you won’t forget what you learned! 220-802 Status Registration can be done online. Keep reviewing practice questions until the day of the exam. Fill in the appropriate information in the right column. you shouldn’t register until you are fully prepared.vue. They accept payment by major credit card for the exam fee.2 gives a partial example of a cheat sheet that you can create to aid in your studies. When you are ready.) 6.com. the first step of the six-step troubleshooting process is “Identify the problem. 2. Register at Pearson Vue: www. 5.1 303 Continued Step Item Details 220-801 Status 5. 7. 6. For example. Register for the exam.Wrap-Up TABLE 12.

Keep in mind that Saturdays can be busy. If you do so. Oh. I’ve taken at least 20 certification exams in the past decade. You have the option to skip questions. Pick a good time for the exam—It would appear that the least amount of people are at test centers on Monday and Friday mornings. Tips for Taking the Real Exam Some of you readers will be new to exams. schedule a time that works well for you. For other readers who have taken exams before. there will be an item review section that shows you any questions that you did not answer and any that you marked. feel free to skip this section or use it as a review. and so on to commit them to memory. and the following points have served me well: General Practices for Taking Exams . The following list includes tips and tricks that I have learned over the years.2 in this fashion on paper. be sure to “mark” them before moving on. The exam is conducted on a computer and is mostly multiple-choice. when you don’t have to worry about anything else. but in general. step-by-steps. Keep in mind that most exams can be cancelled as long as you give 24 hours notice (check that time frame when registering to be sure). Feel free to mark any other questions that you have answered but are not completely sure about. I understand that sometimes deadlines have to be set. processes. don’t register for the exam until you feel confident you can pass. This section is for you. Things come up in life that can sometimes get in the way of your study time.2 Continued Concept Fill in the Appropriate Information Here Windows 7/Vista startup files Windows XP startup files Etc. .* *Continue Table 12. and don’t schedule the exam until you are ready. Otherwise. When you get to the end of the exam.304 Chapter 12 TABLE 12. There will be a small check box that you can select to mark them. The key is to write down various technologies. Consider scheduling during these times.

worse yet. Have two forms of ID (signed) ready for the administrator of the test center. get your personal belongings situated. and make sure you know where you are going. The testing center is obligated to give you something to write on. Earplugs help to block out any unwanted noise that might show up. Show up early—I recommend that you show up 30 minutes prior to your scheduled exam time. My recommendations are to study off the Cram Sheet and your own cheat sheets. I recommend you perform a trial run and drive to the testing center a few days before your exam. it . and be escorted to your seat. a loud test-taker next to you. Too much caffeine for a person who is not used to it can be detrimental to the thinking process. too. This is important. you really do need extra time because when you get to the testing center. Just be ready to show your earplugs to the test administrator. Eat a decent breakfast—Eating is good! Breakfast is number two when it comes to getting your mind ready for an exam. don’t overdo it. By the way. . It’s not a good idea to go into overload the day before the exam. make use of it! By getting all the memorization out of your head and on “paper” first. .Wrap-Up 305 . Turn your cell phone or smartphone off when you get to the test center. . Brainstorm before starting the exam—Write down as much as you can remember from the cheat sheets before starting the exam. Don’t over-study the day before the exam—Some people like to study hard the day before. some don’t. Work on reducing any types of stress the day of and the day before the exam. Stress and fear are the mind killers. give yourself plenty of time. especially if it is a morning exam. Bring earplugs—You never know when you will get a loud testing cen- ter or. sign forms. . Get a good night’s rest—A good night’s sleep (7–9 hours) before the day of the exam is probably the best way to get your mind ready for an exam. Just watch out for the coffee and tea. . but in general. This will ensure you know exactly where you are going on the day of the exam. NOTE If you are a first-time test-taker. You don’t want to have to worry about getting lost or being late. you need to show ID. they’ll check that.

You are not being pretentious about this if you think it to yourself. I recommend small breaks and breathing techniques. then the answer will become apparent. It’s almost a Zen type of thing. the character Sherlock Holmes said it best: “When you have . but also know why the wrong answers are wrong. You’ve done everything you can to prep. if you can logically eliminate anything that is incorrect. But really. . Be confident—You have studied hard. I have gotten a few perfect scores. Smart Methods for Difficult Questions . Think of it this way: you are great…I am great…(to quote Dr. after going through every 25 questions or so. first eliminate any answers that are definitely incorrect. Think about nothing while doing so. For example. flickering monitors can cause a strain on your eyes. but for me. but it can really help to get your brain refocused. close your eyes and slowly take a few deep breaths. use it by writing down the letters of the answers that are incorrect to keep track. It takes only half a minute. and created your cheat sheet. So build that inner confidence and your mindset should be complete. Use the process of elimination—If you are not sure about an answer. . it could be a mini dry erase board or something similar. these older. But really. The testing center should give you something to write on. there is no disputing this! That’s the mentality you must have. These things alone should build confidence. Sometimes these screens are old and have seen better days. Daystrom). when I have applied this technique properly. holding each one for 5 seconds and releasing each one slowly. To sum it up. I put paper in quotation marks because it might not be paper. you just have to be confident for no reason whatsoever. This is one of the reasons why it is recommended that you not only know the correct answers to the practice exams’ questions. gone through the practice exams. Remove the test from your mind during these breaks. It’s really amazing how the mindset can make or break you. that’s another matter. Even if you aren’t sure about the correct answer.306 Chapter 12 clears the brain somewhat so that it can tackle the questions. Take small breaks while taking the exam—Exams can be brutal. You have to answer 100 questions while staring at a screen for an hour. You might be surprised how often this works. Acting that way to others…well.

Some test-takers write down their gut instinct answer before delving into the question and then compare their thoughtful answer with their gut instinct answer. . the better you will be able to figure out which of the two answers is the best one. . Tap into this ability. Real exams do not rely on trick questions. must be the truth. . logical guess. sometimes this is all you have left. chances are you are not going to get a perfect score.Wrap-Up 307 eliminated the impossible. Write out as much as you can. the brain gets sluggish. Remember that the goal is only to pass the exams. even though the test question requires you to select only one answer. how many answers you get right after that is irrelevant. Skip it and return to it later. guess—Remember that the exams might not be perfect. Don’t let one question beat you!—Don’t let yourself get stuck on one question. Also. make an educated. vague or strange as it might appear. however improbable. you should be well prepared and you should have plenty of time to go through all of the exam questions with time to spare to return to the ones you skipped and marked. If all else fails. of course. Try to imagine what the test is after. Use your gut instinct—Sometimes a person taking a test just doesn’t know the answer. A question might seem confusing or appear not to make sense. you might read a question and instinctively know the answer. and when you have gone through all the other techniques mentioned. If you have read through the question and all the answers and used the process of elimination. even if you can’t explain why. and really compare the two possible correct answers. with these exams you either know it or you don’t. . but from a scientific standpoint. When you spend too much time on one question. In some scenarios. Be logical in the face of adversity—The most difficult questions are when two answers appear to be correct. And don’t worry too much about it. and why they would be bringing up this topic. think logically. you must imagine the scenario that the question is a part of. Sometimes you need to slow down. this method can be invaluable.” There’s more to it. whatever remains. . The thing is. If you have gone through this book thoroughly. Leave questions like this until the end. The more you can visualize the scenario. it happens to everyone. Really think through step-by-step what is happening in the scenario.

But try not to overthink! Give it your best shot and be confident in your answers. Beyond the CompTIA A+ Exam CompTIA started a new policy on January 1. use the time allotted to you to review the answers. To maintain the certification beyond that time.comptia. 2011. see the following link: http://certification. you must enroll in the CompTIA Continuing Education Program. Please let me know when you pass your exams. Chances are you will have time left over at the end. I would love to hear from you! Also. For more information on this policy.aspx Final Note: I wish you the best of luck on your exams and in your IT career endeavors.com.org/getCertified/stayCertified. Sincerely. This program has an annual fee and requires that you obtain Continuing Education Units (CEUs) that count toward the recertification. Prowse . so use it wisely! Make sure that everything you have marked has a proper answer that makes sense to you. remember that I am available to answer any of your questions about this book via my website at www. A person who passes the A+ exams will be certified for three years. David L.308 Chapter 12 Wrapping Up the Exam . Review all of your answers—If you finish early.davidlprowse.