Documentos de Académico
Documentos de Profesional
Documentos de Cultura
1.
How can you install the Recovery Console so it appears each time you startup on
the Operating System Startup Menu?
1. Use the Windows 2000/XP CD and type Winnt32/m:i386 from a command window.
2. Use the Windows 2000/XP CD and type Winnt32/cmdcons from a command window.
<Correct>
3. Use the Windows 2000/XP CD and type Winnt32/copydir:recoveryconsole from a
command windows.
4. Use the Windows 2000/XP CD and type Winnt32 /makelocalsource from a command
window.
Explanation:
There are approximately a dozen different switches that may be used with the
Winnt.exe and Winnt32.exe files to control the Windows 2000 installation, both locally
and remotely. The Windows 2000 upgrade process uses Winnt32.exe, whereas a clean
installation of Windows 2000 would require running Winnt.exe.
The first part of the command (X:\Winnt32) tells the operating system which
installation method (file) to use and the location of the file.
The following are some switches (options) you can use with the command:
/cmdcons
Adds a Recovery Console option for repairing a failed installation to the operating system
selection screen. It is only used post-Setup.
copydir:i386
Creates an additional folder within the folder in which the Windows 2000 files are
installed. For example, if the source folder contains a folder called Private_drivers that
has modifications just for your site, you can type /copydir:Private_drivers to have Setup
copy that folder to your installed Windows 2000 folder. So then the new folder location
would be C:\Winnt\Private_drivers. You can use /copydir to create as many additional
folders as you want.
/makelocalsource
Instructs Setup to copy all installation source files to your local hard disk. Use
/makelocalsource when installing from a CD to provide installation files when the CD is
not available later in the installation.
/m:i386
Specifies that Setup copies replacement files from an alternate location. Setup will look
in the alternate location first and if files are present, use them instead of the files from
the default location.
2.
Which of the following s the file that starts the loading of the operating system
in Windows 2000?
1.
2.
3.
4.
BOOTSECT.DOS
NTDETECT.COM
BODT.INI
NTLDR <Correct>
Explanation:
The NTLDR file starts the loading of the OS on a Windows NT, Windows 2000, or
Windows XP machine. NTLDR first loads the operating system from the boot partition.
NTLDR then controls the hardware detection process before passing control to the
Windows kernel. NTLDR must be in the root folder of the startup disk.
BOOT.INI is a text file that contains information about the operating systems on the
computer and controls the initial boot screen on a Windows NT/2000/XP computer.
BOOTSECT.DOS is used in a dual-boot environment to keep a copy of the DOS or
Windows 9x boot sector so it can be loaded or restored as needed.
NTDETECT.C0M parses the system for hardware information each time Windows
NT/2000/XP is loaded. This information is then used to create dynamic hardware
information in the Windows registry.
3.
You are configuring a network for Windows 95, Windows 98, and Windows 2000
clients that will have multiple communication protocols.
Which of the following are choices for transport protocols supported by Windows
95, Windows 98 and Windows 2000? (Select three.)
1.
2.
3.
4.
5.
TCP/IP <Correct>
NetBEUI <Correct>
Ethernet
Token Ring
IPX/SPX <Correct>
Explanation:
TCP/IP, IPX/SPX, and NetBEUI are all protocols supported by Windows 9x and Windows
2000. They are rules of language for network hosts to follow. TCP/IP is most prevalent
because of its use on the Internet. NetBEUI is a Microsoft protocol that does not
support routing, so it is not compatible with the Internet. IPX/SPX is a Novell protocol
for NetWare, but Microsoft wrote its own version of IPX/SPX and called it NWLink.
Token Ring is a Data Link layer protocol implemented on a Ring topology. Token Ring
networks (Ring Topology) use a media access method known as OSMA/CA (Carrier Sense
Multiple Access with Collision Avoldance). A data packet known as the token is passed
around the network until a host wants to transmit and grabs it. To access the network,
the sender must have the token.
Ethernet is another Data Link Layer protocol implemented on either a star or bus
topology.
Ethernet networks use a media access control method known as CSMA/CD (Carrier
Sense Multiple Access with Collision Detection).
Contention access methods, where network hosts contend for the right to transmit,
allow any computer to access the network at any time. Carrier Sense Multiple Access
(CSMA) is a contention-based access method. The three most common contention-based
access methods are CSMA/CD (CSMA using Collision Detection), CSMA/CA (OSMA using
Collision Avoidance), and Demand Priority.
4.
Your DOS-based program has been configured to be started by a batch file that
you made into an icon on the desktop. You would like a message to be displayed
anytime someone launches the program to warn that the mouse will not work with
this particular application.
To display a warning message, which command would you add to the batch file?
1.
2.
3.
4.
ECHO 0FF
REM The Mouse Will Not work With this Program
@ECHO 0FF
ECHO The Mouse Will Not work With this Program <Correct>
Explanation:
To create a message that will display every time the DOS program is launched, use the
ECHO command followed by the message you want displayed.
Use the ECHO command to turn command echoing on or off. With ECHO on, every time
you type a command, what you typed is written to the screen, echoing your command.
This is generally annoying so you can turn echo off using ECHO 0FF.
With @ECHO 0FF, even the ECHO 0FF command is not echoed.
REM is a command that instructs the system to ignore whatever follows the REM. It is
often used to make notes from the programmer the program itself without disrupting
the process stream.
5.
What are the primary attributes that can be set on a file in a Windows 9x
system?
(Choose all that apply.)
1.
2.
3.
4.
5.
6.
7.
Archive <Correct>
Read Only <Correct>
Txt
Hidden <Correct>
System <Correct>
Doc
Sys
Explanation:
Files have four primary attributes that can be used to control how the file can be used in
a Windows system. The Read Only attribute sets a file to read only status, preventing
users from changing the file. It can be read but not changed.
The Hidden attribute makes the file invisible from the DOS prompt and in Windows
Explorer unless the default view settings are changed to display Hidden files. if a file is
hidden, it is less likely to be moved or deleted by novice computer users.
The Archive attribute is used by backup programs to determine when a file has been
backed up and when it needs to be backed up.
The System attribute is assigned to system files to make it more difficult to move or
delete critical system files.
Doc, Txt, and Sys are file extensions. While they tell you something about the type of
file it is, but they are not file attributes.
6.
MSCONFIG.EXE <Correct>
SYSEDIT.EXE <Correct>
REGEDIT.EXE
CONFIG.SYS
SCANREG.EXE
Explanation:
MSCONFIG, also known as the Windows System Configuration Utility, s an enhanced
update of the SYSEDIT tool. MSCONFIG allows you to indicate how you want to start
Windows, to edit system files, and makes it easy to remove startup items.
If you use SYSEDIT to alter SYSTEM.INI, you will have to either Rem (Remark) out the
line that loads the device, or delete the line completely. MSCONFIG lets you uncheck a
box so that the line is not included, and the device is therefore not loaded. lf you later
decide that the line needs to be included, changing it back is as easy as running the
utility again and checking the box. Both utilities will permit you to prevent a file from
loading.
REGEDIT allows you to edit the Windows Registry, not the SYSTEM.INI file.
CONFIG.SYS is a file that loads device drivers for non-Windows (MS-DOS) applications.
The Windows 9x SCANREG utility scans the registry for problems each time the system
is started. SCANREG replaces a corrupt registry with a backup copy of the registry if it
defects a problem. SCANREG either restores the registry from a known good backup, or,
it no backups are available, it repairs the current registry. After the scan is complete,
SCAN REG allows you to create a backup of the registry.
7.
When your Windows 98 second edition operating system was originally installed, you
did not install additional backgrounds and screen savers that are available on the
CD-ROM. Recently you have become bored with the plain background and want to
add those screen savers.
What is the best way you can install Windows optional files after the operating
system is already installed?
1. Reinstall Windows.
What tool can you use to automatically scan your system for device drivers and
system files that are out of date and then download and install them automatically
as well?
1.
2.
3.
4.
Download
Download
Download
Download
and
and
and
and
install
install
install
install
Explanation:
In addition to critical updates and service packs that Microsoft creates to address
known problems with Windows, the Windows Automatic Update tool can be downloaded
from the Windows update site and installed on a Windows 98/Me/2000/XP computer. It
uses ActiveX controls to scan your system, find your device drivers and system files, and
compare these files to the ones on the Windows Update server. It creates an icon in the
Control Panel (in Control Panel 1 System applet in XP) that allows you to configure how
often you want it to check and how you want it to handle the updates.
Downloading and installing the DirectX 9.0 Update will not affect any future updates.
Microsoft DirectX is an advanced suite of multimedia application programming interfaces
(APIs) built into Windows operating systems. DirectX provides a standard development
platform for Windows-based POs by enabling software developers to access specialized
hardware features without having to write hardware-specific code.
Downloading and installing the latest version of Windows Media Player will not affect
future updates.
Downloading and installing the latest version of NetMeeting will not affect future
updates. NetMeeting is a real-time collaboration and conferencing client.
9.
/sos <Correct>
/noguiboot
/debug
/fastdetect
Explanation:
The boot.ini file contains the list of available operating systems and the parameters to
start them. This file determines what is on the list, how long the list displays, and what
the default setting is. Windows (specifically Ntldr) uses the boot.ini file to determine
the operating system options to display during the startup (boot) process. Boot.ini is
flagged as a read-only system file by default.
To change the contents of this file easily, use the System tool in Control Panel. Although
the file can be modified in a text editor, the recommended method of editing the file is
to go to Control Panel 1 System 1 Advanced 1 Startup and Recovery. This applet will
ensure that the parameters are set correctly in the file.
A sample Boot.ini file is shown here.
[boot loader]
timeout30
default=multi(0)disk(O)rdisk(0)partition(1 )\WINNT
[operating systems]
multi(0)disk(0)rdisk(0)partition(1)\WINNT=Microsoft Windows 2000 Professional
/fastdetect C:\CMDCONS\BOOTSECT.DAT=Microsoft Windows 2000 Recovery Console
/cmdcons
Options are entered at the end of the line for the statement you want to modify.
Options include:
/sos displays the name of each device driver as it loads. This is helpful when startup fails
while loading drivers to determine which driver is failing to load.
/fastdetect turns off serial and bus mouse detection in Ntdetect.com. if you use
/fastdetect without specifying a COM port, serial mouse detection is disabled on all
ports.
/debug loads the Windows kernel debugger when you start Windows.
/noguiboot disables the bitmap that displays the progress bar for Windows XP
Professional startup.
11. Which utility should you use to update a Windows NT 4.0 Emergency Repair Disk?
1.
2.
3.
4.
FDisk
Setup
RDisk <Correct>
ERD
Explanation:
RDISK is used in Windows NT only to create or update an Emergency Repair Disk (ERD).
You should update the ERD any time major changes are made to the system. During the
installation of Windows NT, Setup creates an Emergency Repair Disk (ERD), but Setup is
not designed to update an ERD.
FDisk and ERD are not included with the Windows NT operating system. ERD is used by
Windows 95 to backup the Windows Registry. Fdisk is used in Windows 9x to partition a
hard drive.
12. You had to reformat your hard disk drive. You need to reinstall the Windows
operating system. After you boot from a boot floppy disk, you cannot access the
CD-ROM drive.
Which of the following will help the most in accessing the CD-ROM drive?
1.
2.
3.
4.
5.
FDISK
LOADHIGH
FORMAT
MSCDEX <Correct>
CD
Explanation:
In order to boot to DOS with CD-ROM support, you need the Microsoft CD Extension
for DOS, which is contained in the MSCDEX.EXE file. This file will identify CD-ROMs,
assign a drive letter, and allow you to read their data. The drive for your CD-ROM is
useless in DOS without this file.
FORMAT is used to format hard drives.
FDISK is a utility that partitions drives.
CD is the command for Change Directory.
LOADHIGH is used in the CONFIG.SYS file to load device drivers into high memory.
13. The file size of MSDOS.SYS must be:
1.
2.
3.
4.
FTP
TELNET
PING
TRACERT <Correct>
Explanation:
TRACERT is a TCP/IP utility that uses Internet Control Message Protocol (ICMP) echo
requests to trace the route a data packet takes to its destination. The TRACERT
command displays the hop count (also called the metric, the number of routers the signal
must pass through to get to the destination), the time each hop takes (in milliseconds),
the name of the computer or router passed through (optional), and the IP address of
each router in the hop. This s the output shown in the graphic. TRACERT works with IP
addresses, host names, and domain names.
The PING utility/command (for example, ping 208.160.120.17) is used to send test data
packets to verify connectivity to another computer using ICMP. ICMP s part of the
TCP/IP suite of protocols. It is an error-reporting protocol. PING sends an ICMP Echo
Request to a target name (like www.whitehouse.gov) or IP address. The resulting ICMP
Echo Reply verifies that a TCP/IP configuration is set up properly and that the
destination host is online and connected to the network.
The FTP (File Transfer Protocol - part of the TCP/IP suite of protocols) is a utility
program that allows the bi-directional transfer (uploading and downloading) of files
between two networked hosts. A small FTP client program runs on the remote computer
and accesses a larger FTP server running on a host.
The TCP/IP utility TELNET allows a computer to connect to a UNIX host by emulating a
terminal (such as a DEC VT1 00) and establishing a remote command-line window.
15. Which of the following is representative of a URL?
1.
2.
3.
4.
http://www.comptia.org
comptia.org
www.comptia.org
http://www.comptia.org/index.html <Correct>
Explanation:
A URL (Uniform Resource Locator) s an address for a Web page or other resource on
the Internet.
A URL contains the protocol used, the host name of the web server, the network name,
and the path and filename of the requested file.
The URL in this example is http://www.comptia.org/index.html. The index.html (it is case
sensitive) is the file or resource requested to be seen. The network name is comptia.org.
The server in the network is named www. The http:// specifies that the protocol is
Hypertext Transfer Protocol.
Because a URL must contain all of the items described above, the other choices are not
URLs because they lack one or more of the items.
The combination of the host name (server name) and the network name, www.comptia.org,
is called the domain name.
16. One of your customers s trying to access his CD-ROM drive through My Computer
in Windows 2000, but no CD-ROM drive s available. The customer says that the
drive was working properly the day before, when his system locked up and had to
be rebooted. From that time on the CD-ROM has not worked.
What would be a good first step that you should take in an effort to identify the
problem?
1. Open the System applet from the Control Panel, choose the Hardware tab, and click
the Device Manager tab. Look for errors on the DVD/CD Drives such as a red X or a
yellow! <Correct>
2. Open the Control Panel 1 Add/Remove Programs applet, and step through the
installation process.
3. Open the Add/Remove Hardware applet from the Control Panel and step through the
installation process.
4. Open the Add/Remove Hardware applet from the Control Panel and install a known
good CD-ROM driver over the existing one.
5. Open the Add/Remove Programs applet from the Control Panel and step through the
removal process.
Explanation:
Since the CD-ROM drive was working properly before, the reason for the system lockup
might be the reason for failed drive now. The problem could either be a hardware
failure, which could cause the system to lockup, or a driver file corruption. Either will be
shown as an error in the Device Manager. Use Device Manager in the Control Panel 1
System applet to check for hardware or driver problems.
Use the Control Panel 1 Add/Remove Hardware applet to add new hardware that is not
automatically recognized by Windows or to remove drivers from the system.
Use the Control Panel 1 Add/Remove Programs applet to install new software or remove
existing software.
17. Which of the following is responsible for checking hardware and building the
hardware information for the Windows XP registry?
1.
2.
3.
4.
BOOT.INI
NTBOOTDD.SYS
NTDETECT.COM <Correct>
NTLDR
Explanation:
NTDETECT.C0M parses the system for hardware information each time Windows
NT/2000/XP is loaded.
This information is then used to create dynamic hardware information in the Windows
registry.
The NTLDR file starts the loading of the OS on a Windows NT, Windows 2000, or
Windows XP machine. NTLDR first loads the operating system from the boot partition.
NTLDR then controls the hardware detection process before passing control to the
Windows kernel. NTLDR must be in the root folder of the startup disk.
BOOT.INI is a text file that contains information about the operating systems on the
computer and controls the initial boot screen on a Windows NT/2000/XP computer.
Windows NT/2000/XP uses NTBOOTDD.SYS to enable systems with a SCSI boot device
that has its firmware disabled to load the SCSI interface. If the system does not have
SCSI devices, this file is not installed.
18. Susan wants to compress a file, but she cannot find an option to do so. She read
that file compression is only available on partitions formatted with NTFS5.
Where can she check to see how the partition has been formatted? (Select two.)
1.
2.
3.
4.
5.
Explanation:
Susan can see limited information on a partition by right-clicking on the drive listed in
My Computer, and choosing Properties. The format (for example, FAT, FAT32, NTFS) is
listed. Susan can see more extensive information about the partition, including the
format, by looking at Administrative Tools Computer Management and drilling down to
Disk Management.
Partition format information is not located under Administrative Tools Performance,
Folder Options 1 File Types, or Control Panel 1 Folder Options.
Although compression was available for entire partitions under NTFS4, individual file and
folder compression only became available under NTFS5, which debuted with Windows
2000.
19. You must explain to a new employee what the Windows 9x Registry contains.
Which statement best describes the Registry?
1. The Registry consists of network hardware and configuration information and
settings.
2. The Registry consists of administrative information, as well as usernames and
passwords.
3. The Registry consists of computer hardware configuration information and userspecific settings. <Correct>
4. The Registry consists of computer software version information and administrative
information.
Explanation:
In Windows 9x, the Registry consists of a SYSTEM.DAT and a USER.DAT file. The
SYSTEM.DAT file consists of hardware configuration information. The USER. DAT file
consists of user-specific information.
Windows 95 creates a backup copy of the SYSTEM.DAT and USER.DAT files when you
boot the system. The extension used to backup the Registry files is DAO.
Starting with Windows 98, the Registry Checker (SCANREGW.EXE) runs automatically
when starting up Windows. It scans the Registry for errors, and then backs up the
Registry.
When the Register Checker backs up the files, it creates a CAB file named RBxxx.CAB.
RB stands for Registry backup, and xxx is a three-digit number. CAB files are special
internal Windows files (cabinet files).
In Windows 3.x, the registry only consists of a file named REG.DAT, which contains
information on file associations, as well as Object linking and embedding information.
In order to view or modify the information contained in the Registry, you must use the
Regedit utility.
20. You are attempting to start Windows 98 and get an error message that
HIMEM.SYS is missing or corrupt. How can you most easily fix the problem?
(Select two.)
1. Reinstall Windows
2. Boot from the startup disk and copy HIMEM.SYS from the \Win98 folder of the
installation CD to the Windows folder on the computer. <Correct>
3. Boot with the installation CD and use the Repair Windows option to restore the file.
4. Boot from the startup disk and copy HIMEM.SYS from the disk to the
Windows\System folder.
5. Boot from the startup disk and copy HIMEM.SYS from the \Win98\System folder
of the installation CD to the Windows\System folder on the computer.
6. Boot from the startup disk and copy HIMEM.SYS from the disk to the Windows
folder. <Correct>
Explanation:
Windows will not boot in Normal mode with a missing or corrupt HIMEM.SYS file.
Windows 2000 or XP may be able to use its system file protection feature to protect
HIMEM.SYS, but Windows 98 cannot.
To restore HIMEM.SYS, you can boot with the startup disk and copy HIMEM.SYS either
from the floppy or from the Win98 folder of the installation CD to the Windows folder
on the computer.
lf you have to restore HIMEM.SYS on a Windows 2000/XP computer, boot with the
installation CD and use the Repair Windows 2000 option to restore the file. HIMEM.SYS
in a Windows 2000/XP system is in the \WINNT\System32 folder.
It is not necessary to reinstall Windows to fix this problem.
21. What key can you press while Windows 98 or Windows 2000 is starting up to see a
menu of startup options, including booting to Safe Mode?
1. Esc
2. F5
3. F8 <Correct>
4. F1
Explanation:
You press the F8 key to see a list of available startup options in Windows 9x, Windows
2000, and Windows XP. The options differ somewhat between the various operating
systems, but ah offer Safe Mode. Safe Mode only loads a basic set of drivers and VGA
video. Safe Mode can also be accessed directly by pressing the F5 key during bootup.
The F1 key is a standard key used to display the help screens.
The ESC key can often be used to cancel an extended memory test during bootup.
22. You want ScanDisk to run immediately, with no delay, if the system was not shut
down correctly before Windows 98 launches next time. Which file do you need to
edit?
1.
2.
3.
4.
WIN.C0M
AUTOEXEC.BAT
MSDOS.SYS <Correct>
IO.SYS
Explanation:
MSDOS.SYS contains important pre-Windows options for Windows 9x computers. There
are three mandatory entries and a number of optional settings. The following is a typical
MSDOS.SYS:
[Paths]
WinDir=c:\windows
WinBootDir=c:\windows
HostWinBootDrv=c
[Options]
BootMulti=0
BootGUl=1
DoubleBuffer=1
The Paths section is mandatory and contains only those three entries. The Options
section may contain any of the following:
AutoScan=n (ScanDisk run settings after improper shutdown. 1 = 1-minute delay, O =
disable, 2 = no delay)
BootFailSafe=1 (To force the system to boot in Safe mode)
BootGUI=1 (To boot info GUI mode)
BootKeys= (Use function keys to determine boot mode)
BootMenu= (Displays the startup menu automatically)
BootMenuDefaulf=n (Sets the default for the startup menu)
BootMenuDelay=n (Amount of time before the default startup menu option is used)
BootMulti (Dual-booting)
BootWarn= (Display a warning before using Safe mode)
BootWin=1 (Sets Windows 98 as the default operating system)
DblSpace= (Loads DBLSPACE. BI N automatically)
DoubleBuffer= (For SCSI drives)
NTFS5 <Correct>
FAT32
NTFS4
HPFS
Explanation:
NTFS4 is the file system included in Windows NT. It offers several advantages over
FAT, including smaller cluster sizes and file-level security. It does not support file
encryption.
NTFS5 is the updated version of the file system that was included with Windows 2000.
It offers several new features, including encryption of individual files and folders,
compression of individual files and folders, and the ability to set disk space quotas.
HPFS (High Performance File System) is used by the IBM Operating System, OS/2.
FAT32 is supported by Windows 2000 but cannot be used for file encryption.
24. Your Windows computer has a laser printer. The printer has power, and s
connected with a parallel printer cable to the LPT1 port. After a successful
installation of the printer installation software, when you try to print a test page
from Windows, you receive an error message, Unable to Print to LPT1.
What is the first step you can take to solve the problem?
1.
2.
3.
4.
Explanation:
If a test page cannot be printed through Windows, the next step should be to try to
print a self-test page from the printers own controls. Most printers can print at least
one page, such as a demo page, without even being plugged into a computer. This is the
best way to prove that the printer ink or toner cartridge is installed correctly, that
there are no paper jams, and that the printer is functioning correctly.
Since the installation of the printer software completed without error, reinstalling if
would not likely correct the problem.
lf the printer were out of paper, you would typically get a message stating that the
printer is out of paper. Some new printers require a bi-directional printer port so that
two-way communication can occur between the printer and the computer. Bi-directional
printing enhances the interaction between the printer and the print spooler in Windows,
and allows specific error and diagnostic messages to be sent to the computer.
Replacing the cable may be something to fest later, but running a self-fest page is the
best choice here.
25. Which types of files can be automatically removed by the Disk Cleanup utility in
Windows 2000? (Select all that apply.)
1.
2.
3.
4.
5.
6.
Explanation:
The Disk Cleanup tool (Cleanmgr.exe) in Windows 2000 is designed to clear unnecessary files
from your computers hard disk. You can configure Cleanmgr.exe with command-line switches
to clean up the files you want. You can then schedule the task to run at a specific time by
using the Scheduled Tasks tool.
The Disk Cleanup Utility can be configured to automatically clean up the following types of
files:
Temporary Setup Files
Downloaded Program Files
Temporary Internet Files
Old Chkdsk Files
Recycle Bin contents
Temporary Files
Temporary Offline Files
Offline Files
Compress Old Files
Catalog Files for the File Indexer
The Cleanup utility cannot clean up Archived Files or Old User Profiles.
26. Anita is installing Windows 98 on her computer. On which of the following file
systems can Anita install Windows 98? (Choose two.)
1. HPFS
2. FAT or NTFS4
3. FAT16 <Correct>
4. NTFS5
5. NTFS4
6. FAT32 <Correct>
Explanation:
The File Allocation Table (FAT) file system used determines the cluster size used and
the largest partition size possible. FAT16 uses a 16-bit file system; FAT32 uses a 32-bit
file system. FAT32 can make use of larger partitions and smaller cluster sizes, but it is
not compatible with Windows 3.1, DOS, Windows NT, or Windows 95 (except Windows
95B - OSR2).
File systems that use larger cluster sizes waste disk space, since the smallest amount of
disk space a file can use is the size of one cluster. For example, it you are using FAT1 6
on a 2 GB hard drive, the cluster size is 32 KB. Files that are less than 32KB all use 32
KB of disk space.
New Technology File System (NTFS), available to Windows NT/2000 computers, is not
compatible with Windows 3.1, DOS, Windows 95, or Windows 98. The NTFS format
provided in Windows NT is known as NTFS 4. Windows 2000 improved upon the NTFS
format, and it is included with the Windows 2000 and Windows XP operating systems as
NTFS 5.
High Performance File System (HPFS) is an OS/2 file system, and is not recognized by
Windows 95 or Windows 98, Windows 3.1, DOS, or Windows NT 4.x. HPFS can be read on
Windows 2000, but disks cannot be formatted as HPFS.
Windows 98 can only be installed on a FAT partition, either FAT16 or FAT32. The FAT
partition must be large enough for both Windows 98 and its swap file. Windows 98
cannot be installed on an NTFS or HPFS partition.
27. Which of the following statements about SCANREG are true? (Choose ah that
apply.)
1. SCAN REG checks the registry for problems. <Correct>
2. SCAN REG removes unnecessary entries from the registry.
3. If there is a problem with the registry and no backup s available, SCANREG
attempts to correct the problem. <Correct>
4. SCANREG allows you to create a backup of your registry. <Correct>
5. SCAN REG checks the hard drive for errors.
Explanation:
The Windows 9x SCANREG utility scans the registry for problems each time the system
is started.
SCANREG replaces a corrupt registry with a backup copy of the registry if it defects a
problem.
SCANREG either restores the registry from a known good backup, or, it no backups are
available, it repairs the current registry. After the scan is complete, SCAN REG allows
you to create a backup of the registry.
There are two versions of this utility: SCANREG is the Command-line version, and
SCANREGW is the Windows GUI version. You run SCANREGW manually from the Run
dialog box by entering scanreg or scanregw. Windows automatically runs SCANREG when
you restart your computer.
SCANREG does not check the hard drive for errors. Hard Drive errors are defected and
corrected by the SCANDISK utility.
SCANREG does not remove unnecessary entries from the registry. To clean up a registry
with unnecessary and obsolete entries, use a third-party program such as Symantecs
Norton System Works.
28. Your Windows 98 computer s on a small office LAN. Ah the computers on the LAN
use either Windows 98 or Windows 2000 Professional. Your office mates computer
has a printer attached to a parallel port, and his computer s also connected to the
network. He can print to the printer, and you both can access the network, but
your computer cannot find his printer. Both computers have Client for Microsoft
Networks and File and Printer Sharing for Microsoft Networks installed.
What is the most likely reason you cannot connect to his printer?
1.
2.
3.
4.
5.
Explanation:
To share files between computers, each computer must have a network adapter and be
properly connected, such as through a hub. Each computer must have a common protocol
configured, and have Client for Microsoft Networks and File and Printer Sharing for
Microsoft Networks installed.
Although this configuration enables file and print sharing to fake place, the resource
(the Printer) must still be shared on the computer to which if is connected. To share a
printer, open the Start menu, select Settings, and select Printers. Select the printer you
want to share, and right-click on it. Select Sharing and set the parameters.
lf your parallel port was disabled in CMOS, if would not affect your access to network
printers.
Since both computers can access the network, your IP address and Client for Microsoft
Networks must be properly configured.
Since the printer is attached to another computer, there is no printer for you to share
on your computer.
29. Which of the following are the minimum requirements to install Windows XP
Professional on a PC? (Choose three.)
1.
2.
3.
4.
5.
128MB RAM
64MB RAM <Correct>
650MB available disk space <Correct>
2.0GB available disk space
Pentium 333 or equivalent
Windows
Windows
Windows
Windows
98 will
98 will
98 will
98 will
Explanation:
When Windows 98 encounters an error during startup, upon restart, it automatically
launches in Safe Mode. Safe Mode is a diagnostic mode that does not load most of the
installed drivers and uses the basic VGA display mode. Enough of the operating system is
loaded to access the Control Panel, locate the problem, and load a new driver.
Windows 98 Command Prompt mode is a pseudo-DOS interface in which a thread of
Windows 98 is running in the background but the system is emulating a DOS system.
Windows 98 will not load into Command Prompt mode unless everything is working
properly in Normal mode.
General Protection Faults (GPF) are the abnormal ending (abend) of a Windows
application. You would not receive a GPF after a system failed to boot.
Windows 98 will not prompt you to choose a new video driver. However, the
recommended procedure when replacing a video card is to change the driver to the
Standard VGA driver before removing the old card and installing the new one.
31. Doug reports that Internet Explorer (IE) was working fine this morning, but now he
is getting a fatal error that causes it to shut down. Which of the following
questions s the most relevant to start the troubleshooting process?
1. When was the last time you backed up your hard drive?
2. How long does Internet Explorer work before you get the fatal error?
3. Was any new hardware or software installed since this morning? <Correct>
4. What version of Internet Explorer is it?
Explanation:
Because the problem occurred very suddenly, you should identify recent changes to
Dougs computer before proceeding with any other troubleshooting. The most relevant
question is Was any new hardware or software installed since this morning?
What version of Internet Explorer is it? and How long does Internet Explorer work
before you get the fatal error? are good questions and will probably be necessary in the
troubleshooting process, but they are not as relevant.
Asking about Dougs backup is the least relevant question.
32. What Windows 2000 Control Panel icons and subsequent options would you choose
(in order) if you wanted to disable all script support for the Internet security
zone?
1.
2.
3.
4.
Explanation:
Many of the Internet security problems that have been discovered are related to the
way that Internet Explorer interacts with Windows. There are scripts on the Internet
that can modify your Windows installation in some way and possibly allow the introduction
of a virus. To prevent against that possibility, you should change Internet Explorers
security settings as well as disable script support.
To change security settings for Internet Explorer, use the Internet Options applet in
the Control Panel. Select the Security tab. There are many cases where the default
security levels dont exactly fit your needs. It is possible to change individual security
settings, such as enabling or disabling script support for a zone. To do that, set the
default security level for the zone as close as possible to the security settings you want,
and then click the Custom Level button. For each zone, you can configure different rules
for how the Internet explorer should handle ActiveX controls and scripting.
There are four security zones: Internet, Trusted Sites, Restricted Sites, and Local
intranet. Security is controlled separately for each zone.
Trusted Sites are Web sites that you completely trust. Therefore, you can set the
security settings lower for this domain.
Restricted Sites is a zone for all those sites that could potentially damage your
computer or install malicious code onto your computer.
Local intranet is the zone that contains Web sites you access using UNC names (such
as \\server\sharenarne) or website URLs without dots (such as http://server).
Internet is a zone that contains all sites that dont fit into any of the other zones.
System - Hardware - Device Manager -Network Adapters gives you dialog boxes to
configure network adapter resources, but you cannot disable scripting.
Network and Dial-up Connections - Local Area Connection - Properties gives you dialog
boxes to configure network parameters, but you cannot disable scripting there.
Regional Options - Advanced allows you to configure language support, but you cannot
disable scripting there.
33. Which of the following s a routable protocol used for Internet connectivity?
1. PPP
2. TCP/IP <Correct>
3. IPX/SPX
4. NetBEUI
Explanation:
Network protocols are the communication languages that computers use to communicate
over Local and Wide Area Networks (LAN5 and WAN5). A protocol is said to be routable
it its addressing scheme allows it to be passed to other networks by devices called
routers.
Routers select the best and shortest path from many possible paths to a destination
host.
The TCP/IP protocol is routable and is required for Internet connectivity.
TCP/IP, IPX/SPX, and NetBEUI are all network protocols. The Transport Control
Protocol / Internet Protocol (TCP/IP) groups data together into packets in order to
transport it over the Internet.
TCP/IP is most prevalent because of its use on the Internet.
NetBEUI and IPX/SPX are LAN protocols. NetBEUI is a Microsoft protocol. It is fast
but is not routable, so it is used in small local-area networks. IPX/SPX is a Novell
protocol, and it is the primary protocol used within NetWare environments. It is routable
to some extent, but it is not used for Internet connectivity.
Point-to-Point protocol (PPP) is often used to connect to a dial-up server with a modem.
It is not routable. Once the point-to-point dial-up connection is established, TCP/IP
handles all routed data.
34. While there are five main keys n the Window 2000 Registry, two of them contain
the data, and the other three are sub-keys of the two containing the data.
Which two of the following are the main keys containing the data? (Choose two.)
1.
2.
3.
4.
5.
Hkey_Users <Correct>
H key_Local_Machine <Correct>
Hkey_Current_Config
Hkey_Current_Users
Hkey_Classes_Root
Explanation:
There are five main keys n the Windows 2000 Registry:
Hkey_Local_Machine
Hkey_Users
Hkey_Current_Config
Hkey_Classes_Root
Hkey_Current_Users
Of these five keys, Hkey_Local_Machine and Hkey_Users contain ah of the information
regarding
hardware,
applications,
and
users.
Hkey_Current_Config
and
Hkey_Current_Users are used fo differentiate which of the settings confained in the
other keys are the ones currenfly being used. They are pointers back to the main data.
When the system boots, you receive the message, Missing Operating System.
When you boot using the boot floppy, you can see that Windows 98 and all critical
files are still on the disk.
What is the most likely reason it will not boot?
1.
2.
3.
4.
Explanation:
For an operating system to boot, the primary partition on which it is installed must be
set active. You can only have one active partition. The failing hard drive was booting the
system and it was set active, which implies the second drive was not. Now the second
drive is the only drive in the system, so the primary partition must be set ACTIVE.
Hard drives are prepared for use by an operating system by configuring a Master Boot
Record using a disk partitioning utility such as FDISK. A disk does not need to be
partitioned into multiple partitions, but it could be. FDISK creates three types of
partitions, Primary, Extended, and Logical. For an operating system to be able to boot a
computer, the operating system files must be on the primary partition, but all other
files can be anywhere.
After creating a primary partition, the partition to boot the computer must be set
ACTIVE using the FDISK program. lf it is not set ACTIVE, everything could be installed
correctly, but the system still would not boot.
lf COMMAND.COM was corrupt, you would get the message Missing or Invalid Command
interpreter instead of the Missing Operating System message.
You do not use CMOS to set the ACTIVE partition; you use FDISK.
SCANDISK is not required to run prior to putting a hard drive in service.
37. Which of the following files is NOT used in the Windows 2000 boot process?
1.
2.
3.
4.
HAL.DLL
WIN.C0M <Correct>
NTOSKRNL.EXE
NTDETECT.COM
Explanation:
Files used in the Windows 2000 boot process include: NTLDR, BOOT.INI, BOOTSECT.
OS (optional), NTDETECT.00M, NTBOOTDD.SYS (optional), NTOSKRNL.EXE, HAL.DLL,
SYSTEM, and any device drivers necessary.
NTLDR runs the bootstrap code to start loading the operating system.
NTDETECT.00M parses the system for hardware information and uses if to create
dynamic configuration information for the registry.
Dial-up Adapter
File and Printer Sharing for Microsoft Networks <Correct>
TCP/IP protocol
IPX/SPX protocol
Client for NetWare Networks
Explanation:
To share files between computers, each computer must have a network adapter, be
connected to each other through compatible media, and use a common protocol suite.
Each computer must have both Client for Microsoft Networks and File and Printer
Sharing for Microsoft Networks installed. It File and Printer Sharing for Microsoft
Networks is not installed, the option to share a resource (in this case the hard drive) will
not be available.
The TCP/IP protocol is only needed to access the Internet or other TCP/IP networks.
Similarly, the IPX/SPX protocol is only needed to access an IPX/SPX network, such as a
NetWare network. Since the Windows 98 computer is already on the Windows NT
network, a compatible protocol must have been installed.
The Dial-Up Adapter option is not needed on any computer unless that computer will
access a network through a modem.
Client for NetWare Networks is not necessary to share files or printers on a Windows
network, only to connect to NetWare Servers.
40. Your computer s running Windows 95, and you have just installed an upgrade to an
application called Organize on your system. You open Windows Explorer and display
the contents of the Organize folder to find the actual executable file for
Organize, but no executable files are displayed.
Where can you change the settings to make Windows Explorer display all files?
1.
2.
3.
4.
ToolsMenu
View Menu <Correct>
File Menu
EditMenu
Explanation:
Windows Explorer can be configured to hide specified types of files, to hide the MSDOS path, or to display all files. These options are set in the View Options pull-down
menu. Choose to display all files by clicking the Show All Files check box.
In Windows 98, you can select Folder Options from both the View menu and the Tools
menu. Then you click the View tab and select Show all files.
The Windows 95 Tools Menu contains the Find tool, the Go To tool, and the tool to map
or disconnect a network drive.
The Edit Menu contains the Undo, Cut, Copy, Select, and Paste functions.
The File Menu contains the tools to create folders, files, and shortcuts, to rename files
and folders, and to view/edit the Properties of a file or folder.
41. When purchasing something on the Internet, how can you be sure that the credit
card information you enter s being encrypted to prevent unauthorized interception
of your personal information?
1. lf the URL has the form http://www.measureup.com/paymentsystem.asp, you can be
sure that paymentsystem .asp is encrypted.
Explanation:
If you suspect that the Windows 2000IXP registry is damaged, you can use the
Recovery console commands to restore the registry from the last backup that you
created. The registry consists of five files: Default, Sam, Security, Software, and
System, which are stored in the %SystemRoot%\System32\Config folder. A backup of
the registry is stored in the %SystemRoot%\Repair\RegBack folder every time you back
up the system state.
The registry is not stored in %SystemRoot%\system. This folder contains older drivers
and library files for backward compatibility.
%SystemRoot% is the main Windows folder containing configuration settings (.ini files)
and logs.
%SystemRoot%\Registration contains information on COM+.
43. You must install a network printer on your Windows 98 machine. Your manager has
informed you that the printer has already been installed and shared on a remote
machine.
Which of the following will enable you to install the network printer?
1. Select the name of the remote computer from the Printers applet n Control Panel,
right-click on remote printers name, and click Add.
2. Select the Printers applet from the Control Panel, click Add, select the printer that
you want to install, and click Install.
3. Select the Printers applet from the Control Panel, click the Add Network Printer
con, and follow the wizard through the installation process.
4. Select the name of the remote computer from Network Neighborhood, right-click on
remote printers name, and click Install. <Correct>
Explanation:
To install a Network Printer on your machine, you can select the name of the remote
computer from Network Neighborhood, right-click on the remote printers name, and
click Install. You can also select the Printers applet from Control Panel, click the Add
Printer con, and specify Network Printer when using the Add Printer Wizard to step
through the installation process.
You can access the Add Printer dialog box by going to the Control Panel 1 Printers con or
from the Start Menu Settings 1 Printers. Either way, you choose Add Printer and your
choices will be Local Printer or Network Printer.
From the choices given, the only option that would accomplish the task requested is to
select the name of the remote computer from Network Neighborhood, right-click on the
remote printers name, and click Install. The other choices are incorrect or are missing
steps.
44. E-mail has often been used to spread viruses. Which of the following statements
are true about e-mail viruses and prevention of infection? (Choose all that apply.)
1.
2.
3.
4.
You should use anti-virus software that has an e-mail-checking component <Correct>
You should turn off the preview feature in your e-mail application <Correct>
It is possible to get a virus through an HTML-formatted e-mail. <Correct>
It is safe to open any attachments that do not have VBS in their name.
Explanation:
According to SARC (Symantec Anti-Virus Research Center), e-mail viruses often come in
the form of a script written in readily available scripting languages such as Visual Basic
and JavaScript. The script may be stand-alone (in the form of an attachment) or
embedded into HTML code. When the attachment is opened, or the HTML code viewed,
the script runs via the Windows Script Host.
It is possible to get a virus through HTML-formatted e-mail. You should turn off the
preview feature in your email application, which automatically views HTML-formatted
emails (thus causing the script to run). You should use anti-virus software that has an email-checking component, and configure it to auto-protect your system.
It is NOT safe to open any attachments that do no have VBS in their name. Although
VBS (Visual Basic Script) is associated with many e-mail viruses (VBS.Loveletter,
VBS.BubbleBoy, VBS.Network), it is not the only type of script virus.
45. Which of the following is most likely to be found in a CONFIG.SYS file?
1. C:\WINDOWS\COMMAND\SHARE.EXE
2. @ECHO 0FF
3. FILES=100 <Correct>
Explanation:
If you run a Windows 2000 upgrade from Windows 98, using a typical installation, many
of your current settings will be saved. Winnt32 starts the installation program as an
upgrade. Winnt starts the installation program as a clean install.
There is no SETUP program to launch the Windows 2000 upgrade.
If you want to keep your current settings, you must install the new operating system into
the roof folder for the present operating system.
There is no option for Do not save current settings. There is also no Setup program.
47. You want to make your Windows 9x computer go through the startup and
initialization commands one at a time. How can you do this?
1.
2.
3.
4.
5.
Press the F8 key at bootup and select Step-by-Step Confirmation mode. <Correct>
Select Restart in Step Mode from the shut down menu.
Select Restart in Safe Mode from the shut down menu.
Press the Break key at bootup.
Press the F5 key at bootup.
Explanation:
Windows 9x has several startup modes. They are Normal, Logged, Safe, Command
Prompt, or Step-by-Step Confirmation Mode. A menu of these modes can be displayed by
pressing the F8 key when the Starting Windows 9x message is displayed at bootup. The
Step-by-Step Confirmation Mode displays and processes the startup commands line-byliine so you can determine which command is causing a problem.
Pressing the F5 key at bootup takes you straight into Safe Mode without going through
the menu selection. Safe Mode loads only a basic configuration and set of drivers. It
enables you to skip startup files, CONFIG.SYS, AUTOEXEC.BAT, SYSTEM.INI, and
WIN.INI.
However, it still enables you to access Windows 9x configuration files.
You cannot select to restart in Step-by-Step Confirmation Mode from the shut-down
menu. The Break or Pause key simply suspends the startup process.
48. Bart accidentally associated ah .TXT files with Word instead of WordPad, as he
originally intended. In Windows 2000, where can he go to change the association?
(Select all that apply.)
1.
2.
3.
4.
5.
Explanation:
Bart can change the association of files to extensions by accessing Folder Options
through the Control Panel, My Computer, or Explorer. In Explorer and My Computer, the
option is located under the Tools menu. In Windows 2000, in the Control Panel, Folder
Options is a separate applet. This applet is not available in other Windows versions
except Windows XP.
You cannot change the associations through Administrative Tools 1 Server Extensions.
This is where Front Page Extensions and other more advanced server functionality
options are configured.
You cannot change the associations through the General tab under Folder Options or by
selecting the C Drive Properties.
49. How can you update a driver for a network card in your Windows 2000 system?
(Choose ah that apply.)
1. Control Panel 1 Network Connections 1 Right-click on your connection to the Internet
1 Properties
2. Control Panel 1 Network and Dial-up Connections 1 Local Area Connection 1 Properties
<Correct>
3. Right click on the network card in Device Manager 1 Properties 1 Driver tab Update
Driver button <Correct>
Explanation:
Both SF0 (System File Checker) and SIGVERIF (File Signature Verification utility) are
included in Windows 98 and Me to check digital signatures of files. SFC is a commandline utility, while SIGVERIF is a Windows utility.
You can configure how the operating system responds to unsigned files (Ignore, Warn,
Block) in the Driver Signing applet, which you can access through Control Panel 1 System
1 Hardware Device Manager. The Driver Signing applet does not check the digital
signature of files.
Event Viewer is a log utility in Windows NT/2000/XP that keeps track of significant
system events and problems (such as boot and application initialization processes). You
cannot check the digital signature of files from the Event Viewer.
Dr. Watson is a utility to monitor and trap errors in log files created by applications and
takes a snapshot of the system when a program crashes to assist in troubleshooting the
fault. It does not have any file verification capability.
51. You want to manually backup your Windows 98 Registry before you modify it.
Which programs can you use to back up the Registry? (Select ah that apply.)
1. SCANREGW.EXE <Correct>
2.
3.
4.
5.
REGEDT32.EXE
REGBACK.EXE
SCANREG.EXE <Correct>
REGEDIT.EXE <Correct>
Explanation:
The preferred method of backing up the Registry in Windows 98 is to use
SCANREG.EXE, also known as the Registry Checker. It will scan the Registry for errors
before asking it you would Iike fo backup the Registry. It stores the backups in the
C:\WINDOWS\SYSBCKUP folder. SCANREG.EXE can be run from the DOS Prompt.
SCANREGW.EXE can also be used to backup the Registry. Windows uses this file at boot
to check and backup the Registry. It must be run from within Windows.
Another method of backing up the Registry in Windows 98 is to run the Registry Editor
(REGEDIT.EXE), select ah the keys, and then export them to a file. Restoring consists
of importing the file.
REGBACK.EXE is not a Windows program.
REGEDT32.EXE is the Registry Editor For Windows NT and Windows 2000. It will not
work on a Windows 98 system.
52. Sams computer displays a list of operating systems for 30 seconds before loading
Windows 2000. He has decided that he would like that list to display for 60
seconds instead of 30.
Which file stores that setting, and how does Sam modify the file?
1. That setting is stored in ntbootdd.sys. Sam should modify the file by going to Control
Panel 1 System 1 Advanced 1 Startup and Recovery.
2. That setting is stored in boot.ini. Sam should modify the file by going to Control Panel
1 System 1 Advanced 1 Startup and Recovery. <Correct>
3. That setting is stored in boot.ini. Sam should modify the file by going to Control Panel
1 System User Profiles.
4. That setting is stored in ntbootdd.sys. Sam should modify the file by going to Control
Panel 1 System User Profiles.
Explanation:
The boot.ini file contains the list of available operating systems and the parameters to
start them. This file determines what is on the list, how long the list displays, and what
the default setting is. Windows (specifically Ntldr) uses the Boot.ini file to determine
the operating system options to display during the startup (boot) process. Boot.ini is
flagged as a read-only system file by default.
To change the contents of this file easily, use the System tool in Control Panel. Although
the file can be modified in a text editor, the recommended method of editing the file is
to go to the Control Panel 1 System 1 Advanced 1 Startup and Recovery. This applet will
ensure that the parameters are set correctly in the file.
These settings are not contained in ntbootdd.sys. Windows NT/2000/XP uses
ntbootdd.sys on a system with a SCSI boot device that has its firmware disabled to
enable and load the SCSI interface. If the system does not have SCSI devices, this file
is not installed.
You cannot edit the Boot.ini file by going to the User Profiles applet.
53. How can you display a list of startup options available on a Windows 9x computer?
(Choose two.)
1. Hold the Shift key down as you press the F8 key when the Starting Windows
message appears on the screen.
2. Press the F8 key when the Starting Windows message appears on the screen.
<Correct>
3. Press the CTRL + ALT + DEL keys when the Starting Windows message appears on
the screen.
4. Press the F5 key when the Starting Windows message appears on the screen.
5. Hold the CTRL key down during bootup. <Correct>
Explanation:
Normally, when you load Windows, the message Starting Windows appears and then the
operating system loads. However, you can force the startup menu to appear by pressing
the F8 key or holding down the CTRL key during bootup.
Pressing the CTRL + ALT + DEL keys when the Starting Windows message appears on
the screen will cause the system to reboot.
Pressing the F5 key when the Starting Windows message appears on the screen will
force Safe Mode. Holding the Shift key down as you press the F8 key when the Starting
Windows message appears on the screen will force the startup into step-by-step
confirmation.
54. Which of the following file extensions are associated with executable files?
(Choose alI that apply.)
1.
2.
3.
4.
5.
6.
7.
8.
.DLL
.EXE <Correct>
.INI
.DOC
.COM <Correct>
.DAT
.BAT <Correct>
.SYS
Explanation:
A file extension s one to three characters at the end of a filename. The extension
indicates the type of file and is separated from the rest of the filename by a period (.).
The Windows operating system associates file extensions with file types. You can change
the associations in Explorer by choosing File 1 Open With and selecting Always choose
this program fo open these files. .EXE, .COM, and .BAT are the only extensions
associated with executable files.
.DAT is associated with data files. .INI is usually a file containing initialization settings.
.DOC is associated with Word or WordPad. .SYS is usually a driver. .DLL is a Dynamic
Link Library.
55. You have just installed a new 40GB ATA-1OO hard drive on a Pentium 4 system.
The new drive is the only drive in the system, and you want to load an operating
system.
What utility must you run from a floppy disk to prepare the hard drive before you
can put anything on the drive?
1.
2.
3.
4.
5.
SETUP
FORMAT
SCANDISK
FDISK <Correct>
DEFRAG
Explanation:
A new hard drive does not have an operating system and is not bootable. Before a hard
drive can be formatted or written to, if must be partitioned. The FDISK utility can
create or remove partitions and set the active partition on a hard disk. It must be run
from floppy or from a bootable CD-ROM because the hard disk is not accessible befare a
partition exists.
After FDISK is used to create one or more partitions on a drive, you must set an active
partition. Only the active partition is able to boot the system. Then the partitions need
to be formatted. All new hard drives, including ATA-1OO drives, are low-level formatted
at the factory and rarely, if ever, need to be low-level formatted by the user.
The SETUP utility in DOS or Windows is used to install the operating system onto the
active partition.
A new hard drive does not have any files on it, so decrementing (running DEFRAG.EXE) is
not necessary.
The SCANDISK.EXE utility is used to find and correct problems such as lost clusters
(pieces of files that have been disassociated from the parent file) on a hard disk. It can
also detect bad sectors on a disk, try to recover any data contained in the bad sectors,
and lock out the bad areas from future use.
56. You need to start an FTP session with an FTP server beginning at the command
line. Which command can you use to establish a connection to a server at IP
address 135.61.85.1?
1.
2.
3.
4.
LOGIN: 135.61.85.1
OPEN 135.61.85.1 <Correct>
GET 135.61.85.1
FTP 135.61.85.1
Explanation:
FTP can be initiated from a DOS, Windows 9x, or Windows NT/2000/XP command
Explanation:
The Automatic Skip Driver (ASD.EXE) Agent is a Windows utility that flags problem
drivers that have caused Windows to stop responding. Once marked, they can
subsequently be bypassed. To use ASDA, find the System Tools group under Accessories
on the Start Menu. In System Tools start the System Information tool, click on the
Tools Menu, and choose Automatic Skip Driver Agent. Alternatively, you can run
ASD.EXE in Windows 9x from START - RUN then type ASD and click OK. Doing so
brings up the ASD utility. From this screen, you can see which tasks failed to respond. lf
you check a box next to a particular task, the next time you boot Windows, the task wiIl
not load. In this way, ASD can be used to prevent lockups during boot.
The Control Panel 1 System applet opens the System Properties dialog box. It contains
the Device Manager, which is used to remove or edit the properties of devices installed
on your computer.
You cannot start the ASD Agent from the Device Manager.
Use SCAN REG.EXE, also known as the Registry Checker to scan the Registry for errors
before making a backup the Registry. It stores the backups in the
C:\WINDOWS\SYSBCKUP folder. SCANREG.EXE can be run from the DOS Prompt. You
cannot start the ASD Agent from SCANREG.
SCANREGW.EXE can also be used to backup the Registry. Windows uses this file at boot
to check and backup the Registry. It must be run from within Windows.
REGEDIT.EXE is the Windows Registry Information Editor. It makes it easier to edit
the keys and entries in the Windows registry. You cannot start the ASD Agent from
REGEDIT.
58. Kerry s using Windows 98 and wants to change the name of a folder named
Reports to Weekly Reports.
Which of the following will allow Kerry to perform this task?
1.
2.
3.
4.
Explanation:
To rename a file or a folder, right-click on the folder in Windows Explorer and click
Rename. You can also select the file or folder from Windows Explorer or My Computer
and click File 1 Rename.
You can rename a shortcut icon on the desktop, but it does not change the name of the
actual file or folder.
59. You have a system with two hard drives. The C: drive has very little disk space
available and you want to move the temporary files folder from C: to D:.
How can you determine where the Temporary folder s located?
1.
2.
3.
4.
Explanation:
The way to determine the location of the temporary files is to determine the values set
for the TEMP and TMP environment variables. An environment variable is a setting that
stays in effect throughout a Windows or DOS session. It is set by an entry in an INI
file, the Registry, or one of the DOS configuration files (CONFIG.SYS or
AUTOEXEC.BAT).
To find out where the temporary files are stored in your machine, start a command-line
session (choose START 1 RUN and type CMD or COMMAND). At the command prompt,
type SET. This command returns all the environment variables for the system. Look for
TEMP= or TMP= or both. These variables point to the directories on your hard disk
where you will find the temporary files.
START 1 RUN 1 Command opens up a Command Prompt window. It does not tell you where
the temporary files are stored.
The WIN.INI file contains configuration information and specifies startup files that run
during initialization. The SYSTEM.INI file is used by Windows 9x to work with installed
hardware. It stores configuration and default settings. These two files are needed for
older 16-bit (non-Windows 9x) applications to set system variables within Windows 9x.
60. Which of the following s a software infestation that makes its way into a
computer disguised as something else, like a game or screen saver?
1.
2.
3.
4.
Worm virus
Trojan Horse virus <Correct>
Macro virus
Boot Sector virus
Explanation:
Deliberately planted computer bugs or infestations are categorized by the way they
travel, replicate, and work. A basic virus needs a host program to which it can attach. It
usually replicates when some action is performed.
A boot sector virus hides in the Master Boot Record of a floppy or hard disk and spreads
to other programs once it is on the computer.
A Trojan Horse is an infestation that makes its way into a computer disguised as
something else, like a game, free software gift, or a screen saver. The computer is
infected when a user opens the gift.
A worm is a bug that replicates as long as the computer is on, does not need a host
program, and can travel throughout a network.
A virus that is contained in the Macro commands of a word processing document is called
a Macro virus.
61. Windows 98 provided a utility named EXTRACT to decompress files on the Installation
CD-ROM. What s the name of this utility in Windows 2000?
1.
2.
3.
4.
EXPAND <Correct>
PKZIP
WINZIP
EXTRACT
Explanation:
The utility used to decompress cabinet (.cab) files in Windows 2000 is EXPAND. Expand
has several switches: -r is used to rename the expanded files, -d displays a list of files
without expanding them, and -f:files specifies specific files you want to expand.
Wildcards can be used. You can specify both the source and the destination.
Although EXPAND performs the same functions as EXTRACT, the name did not remain
the same for Windows 2000.
WINZIP and PKZIP are decompression utilities but are not Windows utilities.
62. What command would make the file C:\COMMAND.COM hidden and read only?
1.
2.
3.
4.
ATTRIB
ATTRIB
ATTRIB
ATTRIB
C:\COMMAND.00M
C:\COMMAND.00M
C:\COMMAND.00M
C:\COMMAND.00M
+RH
+R +H <Correct>
/RH
/R /H
Explanation:
To make the file C:\COMMAND.COM read only and hidden, use the command
ATTRIB C:\COMMAND.COM +R +H You can turn on an attribute using a + before the
attribute, such as, +R, +H, +A, +S. To turn off an attribute, use a - before the attribute,
such as, -R, -H, -S, -A.
Files have four primary attributes that can be used to control how the file can be used in
a Windows system. The Read Only attribute sets a file to read only status, preventing
users from changing the file. It can be read but not changed.
The Hidden attribute makes the file invisible from the DOS prompt and in Windows
Explorer unless the default view settings are changed to display Hidden files. It a file is
hidden, it is less likely to be moved or deleted by novice computer users.
The Archive attribute is used by backup programs to determine when a file has been
backed up and when it needs to be backed up.
The System attribute is assigned to system files to make it more difficult to move or
delete critical system files.
63. You are asked to configure tighter Internet security for your systern without
disrupting other network users in the office.
What security zone would you use to identify the Web-based applications on your
local network?
1.
2.
3.
4.
Internet
Trusted Sites
Local Intranet <Correct>
Restricted Sites
Explanation:
Many of the Internet security problems that have been discovered are related to the
way that Internet Explorer interacts with Windows. There are scripts on the Internet
that can modify your Windows installation in some way and possibly allow the introduction
of a virus. To prevent against that possibility, you should change Internet Explorers
security settings as well as disable script support.
To change security settings for Internet Explorer, use the Internet Options applet in
the Control Panel. Select the Security tab. There are four security zones: Internet,
Trusted Sites, Restricted Sites, and Local intranet. Security is controlled separately for
each zone.
Trusted Sites are Web sites that you completely trust. Therefore, you can set the
security settings lower for this domain.
Restricted Sites is a zone for all those sites that could potentially damage your
computer or install malicious code onto your computer.
Local intranet is the zone that contains Web sites you access using UNC names (such
as \\server\sharenarne) or Web site URLs without dots (such as http://server).
Internet is a zone that contains all sites that dont fit into any of the other zones.
64. You are assembling a new computer and installing the new hard drive and Windows
9x. You want to minimize wasted hard disk space.
Which of the following file systems will accomplish this?
1. NTFS5
2. FAT16
3. HPFS
4. FAT32 <Correct>
Explanation:
Hard disks are divided into cylinders and sectors during the formatting process.
Cylinders are subdivided by the sector boundaries. One sectors worth of one cylinder is
called an allocation unit. It is within the allocation unit that files are stored. File sizes
are often larger than one allocation unit. Allocation units are combined into clusters
based on the operating systems capability. The smallest memory unit on a disk that DOS
and Windows can address is a cluster. Consequently, space between the end of a file and
the end of that cluster cannot be used.
Under FAT16, which originated with DOS, the cluster size increases with disk size. The
maximum cluster size FAT16 supports is 32KB. FAT16 can only address a maximum of
216 (2 to the l6th power) clusters (65,536) Therefore, the largest drive size FAT16 can
address is 2 GB (for a 1-2 GB hard drive, the cluster size is between 16KB and 32KB).
FAT32 can address 228 (268,435,456) clusters, and each cluster has a maximum size of
32KB. It is only 228 because 4 bits out of every 32 are reserved for other uses. The
number of clusters a file system can address affects the cluster size. For example, a
2GB hard disk formatted FAT16 is subdivided into 65536 clusters, which results in a
cluster size of 32KB. An 8GB hard disk formatted FAT32 is subdivided into 268,435,456
clusters of 32KB each. Cluster size grows as the size of the disk gets larger. FAT32
allows the cluster sizes to remain small for a given disk size. A 2GB disk formatted FAT1
6 yields 32KB clusters, but the same disk formatted FAT32 yields 4KB clusters. With
FAT32, there is less wasted space between the end of a file and the end of the last
cluster it occupies.
NTFS 5 (New Technology File System) can be used with Windows NT with service pack 4
or greater, Windows 2000, and Windows XP, but it is not compatible with Windows 9x.or
Windows NT with service pack 3 or earlier.
HPFS (High Performance File System) is used in the IBM OS/2 operating system.
65. Which of the following problems can keep Windows 98 from being able to load?
(Select two.)
1.
2.
3.
4.
5.
Explanation:
Windows 9x is backward compatible with older 16-bit DOS and Windows 3.1 device
drivers. HIMEM.SYS is necessary for Windows 9x fo load, but Windows 9x does not
need CONFIG.SYS or AUTOEXEC.BAT to work. Normally, lO.SYS loads HIMEM.SYS so
that Windows 9x can load, but if you configured a CONFIG.SYS file fo load
EMM386.EXE, you must include the HIMEM.SYS me before it so that the extended
memory manager finds HIMEM.SYS already loaded.
Neither an incorrect DOS version nor an error in the CONFIG.SYS file will keep
Windows 9x from loading, although DOS or some associated hardware may not work
properly. Similarly, if a device referenced in SYSTEM.INI could not be found, that
device will not work until the SYSTEM.INI problem has been corrected. This problem is
often seen when a device is removed from the system and the software is still
installed/configured.
66. Which of the following programs will start a Windows 98 installation?
1.
2.
3.
4.
WINNT.EXE
SETUP.EXE<Correct>
INSTALL.EXE
WINNT32.EXE
Explanation:
The program that s used to install Windows 98 is SETUP.EXE.
INSTALL.EXE is sometimes used to install programs and was commonly used before
Windows 95.
WINNT.EXE is used to install Windows NT/2000/XP as a clean installation.
WINNT32.EXE is used to install Windows 2000/XP as an upgrade to a previously
installed version of Windows.
67. You are installing Windows XP onto a computer on your network. When you boot it
up, you get an error message saying that a service is not starting properly.
Which Windows XP tool can you use to read a log file of such system errors?
1.
2.
3.
4.
Explanation:
Event Viewer is a Windows NT/2000/XP troubleshooting tool that keeps track of three
log files:
System, Security, and Application. This tool is extremely helpful in finding startup
problems, as well as problems any service may have during initialization.
NETSTAT is the utility that allows the user to view current active connections and
protocol-related statistics for the local host. It provides no error logs.
Network Monitor in Windows NT/2000/XP allows the user to capture, view, and analyze
datagrams sent and received at the local host.
Performance Monitor is used primarily to view statistics of system resources like disk
accesses, processor usage, and memory reads/writes. The items monitored are called
objects, and these objects are measured with counters.
68. You are troubleshooting a customers problem with his printer. He s using a
Pentium-based PC running Windows 98, and he is using an ink-jet printer connected
to the parallel port.
The customer says that when he prints a document, his computer Lock s up during
the print process, and he has to wait while the document prints. After the
document prints, his computer works normally.
Which of the following configuration settings can you alter to fix the problem?
1.
2.
3.
4.
Explanation:
When you print a document from a DOS-based system, the computer must stop
processing the current application and wait for the printer to print. In Windows 98 and
later versions, however, the CPU can send print jobs to the print queue (or to the print
server, in the case of a network printer) so that if can continue running the application it
is working on. This is called print spooling.
You can return control of the computer to the user more quickly by configuring the
computer to spool print jobs and to start printing after the first page is sent to the
printer. The spool settings are available through the Printer Properties dialog box.
In a Windows 9x system, print jobs start out as Enhanced Metafile format (EMF) and
must be converted to RAW format for the actual print mechanism in the printer.
Converting (rendering) EME format to a RAW format file takes processing time. lf the
printer is able to do the conversion, print jobs can be sent (or spooled) to the printer in
EME format so that the computer can skip the rendering process and return to the
current application more quickly. Optimizing the data format settings (EME or RAW
format) for the particular printer can speed up the printing process.
69. You have just installed a faulty sound card driver that is being loaded during
startup of your Windows Me computer and is keeping Windows Me from booting up.
You want to remove it.
How can you load a basic version of Windows Me to correct the problem?
1.
2.
3.
4.
Explanation:
Windows 9x has several startup modes. They are Normal, Logged, Safe, Command
Prompt, or Step-by-Step Confirmation Mode. A menu of these modes can be displayed by
pressing the F8 key when the Starting Windows 9x message is displayed at bootup.
Simply select the desired mode from the menu.
Windows Me does not support starting to Command Prompt Only.
Pressing the F8 key will display the Startup Menu but not necessarily start you in Safe
Mode. The best choice is to press the F5 key to start directly into Safe Mode.
Safe Mode loads only a basic configuration and set of drivers. It enables you to skip
startup files, CONFIG.SYS, AUTOEXEC.BAT, SYSTEM.INI, and WIN.INI. However, it
still enables you to access Windows 9x configuration files. You can boot straight to Safe
Mode by pressing the F5 key at bootup.
The Step-by-Step Confirmation Mode displays and processes the startup commands lineby-line so you can determine which command is causing a problem, but it does not load a
basic version of Windows 9x.
You cannot select to restart in Safe Mode or Step-by-Step Confirmation Mode from the
shutdown menu.
70. When connecting your computer to the Internet through a DSL connection, which
protocol would you expect to be used on the DSL connection?
1.
2.
3.
4.
PPP
DHCP
PPPoE <Correct>
FTP
Explanation:
A computer connects to a DSL-enabled phone line through a DSL modem. The computers
Ethernet network card connects directly to the modem, and the modem connects
directly to the phone line. The connection between the NIC and the broadband device
most likely uses Point-to-Point Protocol over Ethernet (PPP0E), a protocol specifically
designed to support broadband connections. PPPoE is included in Windows XP.
Point-to-Point Protocol (PPP) is used when establishing a Dial-Up connection from one
computer to another.
File Transfer Protocol (FTP) is used to establish a connection between an FTP server and
host. It is used to transfer files over a network.
Dynamic Host Configuration Protocol (DHCP) assigns IP addresses to clients.
71. Which of the following are the minimum requirements to install Windows 2000
Professional on a PC? (Choose three.)
1.
2.
3.
4.
5.
6.
64MB RAM
32MB RAM <Correct>
650MB available disk space <Correct>
Pentium 233 or equivalent
Pentium 133 or equivalent <Correct>
2.0GB available disk space
Explanation:
The minimum system requirements to install Windows 2000 Professional are Pentium
133MHz or higher CPU, 32MB RAM, 650MB available disk space. You also need a video
card capable of VGA resolution or higher, keyboard, mouse, or other pointing device, CDROM or DVD-ROM, and a network adapter card it you are installing over the network.
72. Which of the following s used to check a disk for surface errors and logical errors
like cross-linked files in Windows 9x?
1.
2.
3.
4.
DEFRAG
SCANDISK <Correct>
CHKDSK
SCANREG
Explanation:
In Windows 9x, the SCANDISK utility checks disks for physical and logical errors. You
can run it in the graphical interface or through the command prompt as SCANDISK.EXE.
ScanDisk replaced the older CHKDSK command in DOS. Windows NT, 2000, and XP ah
use an updated version of CHKDSK consistent with NTFS partitions and can only check
system partitions during bootup.
DEFRAG is the command-line equivalent of running the Disk Defragmenter utility.
SCANREG is the utility you use to check the registry for problems. In Windows 9x,
SCANREG runs on startup, checking the registry for errors and restoring the registry
from automatic backups if it finds problems.
73. Which of the following best describes how to change the modem used for a Dial-Up
Networking connection on a Windows 2000 computer from the Network and Dial-Up
Connections applet?
1. Right-click on the connection and choose Create Copy.
2. Right-click on the connection and choose Properties. Click Configure and choose
another modem.
3. Choose Advanced 1 Dial-Up Preferences.
4. Right-click on the connection and choose Properties. Choose another modem from the
Connect Using box. <Correct>
Explanation:
To change the modem used for a Dial-Up Networking Connection, right-click on the
connection.
Choose Properties. Choose another modem from the Connect Using box.
Right-clicking the connection and choosing create a copy of the connection will not alter
the modem.
Choosing configure from the connections properties dialog box sets hardware
preferences for the modem already selected. It does not permit you to select another
modem.
Dial-Up Preferences sets your Auto-Dial and Callback connections.
74. Which of the following s a software infestation that does not need a host program
or file to replicate and travel through a computer or network?
1.
2.
3.
4.
Trojan Horse
Worm <Correct>
Boot Sector virus
Macro virus
Explanation:
Deliberately planted computer bugs or infestations are categorized by the way they
travel, replicate, and work. A basic virus needs a host program to which it can attach. It
usually replicates when some action is performed. A boot sector virus hides in the
Master Boot Record of a floppy or hard disk and spreads to other programs once it is on
the computer.
A worm is a bug that replicates as long as the computer is on. It does not need a host
program, and it can travel throughout a network.
A Trojan Horse is an infestation that makes its way into a computer disguised as
something else, like a game, free software gift, or a screen saver. The computer is
infected when a user opens the gift.
A virus that is contained in the Macro commands of a word processing document is called
a Macro virus.
75. A virus has damaged the Master Boot Record of your hard drive, making the
system unbootable. What command can you use to replace the Master Boot Record
with a valid one without losing any data on the disk?
1.
2.
3.
4.
FORMAT C:
DEFRAG C:
FDISK/MBR<Correct>
SCANDISKC:/P
Explanation:
FDISK /MBR is used to replace a damaged Master Boot Record on an otherwise good
drive. It will not cause any loss of data.
FORMAT O: will actually cause ah data on the drive fo be erased.
SCANDISK O: IP scans a hard drive for errors. The IP option causes Scandisk to scan
the drive but not fix anything.
DEFRAG O: examines a hard drive for fragmented files and rewrites them back fo the
disk in contiguous clusters.
76. Which feature of Windows XP permits Dynamic Host Configuration Protocol (DHCP)
clients to automatically self-configure an IP address and subnet mask when their
DHCP server cannot be found?
1.
2.
3.
4.
IPCONFIG
APIPA <Correct>
WINS
DNS
Explanation:
Automatic Private IP Addressing (APIPA) is a feature of Windows 98/2000/XP that
permits DHCP clients to automatically self-configure an IP address and subnet mask
when their DHCP server cannot be found. When Windows is booting, if it cannot find a
DHCP Server, APIPA configures an IP address for the computer automatically. This
address is in the range 169.254.0.1 to 169.254.255.254 with a subnet mask of
255.255.0.0. The client uses this address until the DHCP server becomes available.
Domain Name Service (DNS) is used to resolve a fully qualified domain name to an IP
address. When one computer needs to establish a communication session with another,
the sending computer queries a DNS server for the IP address of the destination host.
The DNS server responds with the IP address, which is used by the source computer to
establish the connection. It does not assign IP addresses to clients.
Windows Internet Name Service (WINS) resolves NetBIOS names to IP addresses in a
Windows network. It does not assign IP addresses to clients.
IPCONFIG is a utility used by Windows 2000 to view current IP configuration
information. It does not assign IP addresses to clients.
77. Which TCP/IP utility allows a user to perform a manual DNS query of any DNS
database?
1.
2.
3.
4.
WINIPCFG
NSLDOKUP <Correct>
TRACERT
IPCONFIG
Explanation:
NSLOOKUP is a TCP/IP utility that allows a user to perform a manual Domain Name
System (DNS) query of any DNS database. You would use this to verify that DNS name
resolution is functioning properly.
WINIPCFG is a graphical utility found in Windows 9x that allows you to get information
about your IP configuration. It also allows you to release a Dynamic Host Configuration
Protocol (DHCP) lease and request a new one.
IPCONFIG does the same thing as WINIPCFG, but for Windows NT/2000/XP.
IPCONFIG can only be run from the command line.
TRACERT is a utility that allows you to trace the path information fakes to get from one
machine to another as it moves from network to network.
78. You are using the Windows 2000 Recovery Console to help repair a serious problem.
You cannot remember the command you need. What command will provide you with
information about other commands?
1.
2.
3.
4.
H
Help<Correct>
Command
?
Explanation:
Windows 2000 introduced the Recovery Console to perform troubleshooting and repair
tasks. You can access this command-line interface through either the Windows 2000 CD
or the Setup disks. If you have installed the Recovery Console previously, you can access
it directly during Startup.
Several of the Recovery Console commands, particularly those associated with navigation,
were originally DOS commands. The following are a sample of Recovery Console
commands:
Cd - Changes the current directory.
Chkdsk - Checks computer disks for errors.
Cls - Clears the screen.
Enable - Enables a system service or device driver.
Fixboot - Repairs the boot sector.
The Help command will provide you with information about the other commands.
H, ?, and Command will not provide you with this information.
79. You want to display the contents of the WIN.INI file on your monitor in a DOS
session. Which command can you use to do this?
1.
2.
3.
4.
Explanation:
TYPE C:\WINDOWS\WIN.INI would display the contents of this file on the screen. If
you want to print the file, you could use the command TYPE C:\WINDOWS\WIN.INI
>PRN.
PRINT C:\WINDOWS\WIN.INI >PRN would actually send the file specified directly to
the printer.
Use the ECHO command to turn command echoing on or off. With ECHO on, every time
you type a command, what you typed is written to the screen echoing your command. This
is generally annoying so you can turn echo off using ECHO 0FF. With @ECHO 0FF, even
the ECHO 0FF command is not echoed.
COPY is used simply COPY files from one location to another. XCOPY can copy subfolders
too, and to do so you must use the /S switch.
These commands are not case sensitive.
80. What s the purpose of the Automatic Skip Driver utility in Windows 98 and Me?
1. It helps prevent skipping on CDs and DVDs by storing upcoming data.
2. Setup uses it fo determine what to load in Safe Mode.
3. Windows uses this driver to mark bad areas on a hard drive and to skip them during
subsequent writes to the hard drive.
4. It flags drivers that have caused Windows to stop responding so that they can be
bypassed during subsequent system loads. <Correct>
Explanation:
The Automatic Skip Driver (ASD.EXE) is a Windows utility that flags problem drivers
that have caused Windows to stop responding. Once marked, they can subsequently be
bypassed. To use ASD.EXE in Windows 9x go fo START 1 RUN then type ASD and click
OK. Doing so brings up the ASD utility. From this screen, you can see which tasks failed
fo respond. If you check a box next to a particular task, the next time you boot
Windows, the task will not load. In this way, ASD can be used to prevent Lock ups during
boot.
ASD.EXE is not used to prevent skipping on CDs or DVDs orto mark bad areas on a hard
drive. Setup does not use this file to determine what to load in Safe Mode.
81. Which of the following are valid ways fo create new folders using My Computer?
(Choose ah that apply.)
1.
2.
3.
4.
5.
Explanation:
There are two ways to create a new folder using My Computer. You can choose File, then
New, and then Folder from the menu bar or you can right-click on an empty area of the
window and choose New and then Folder.
In many programs (like Microsoft Internet Explorer), pressing the CTRL+N keys will
open a new window.
CTRL+Shift+F1 is not a valid keyboard shortcut in Windows.
File 1 insert Folder is not a valid Windows menu option.
82. After copying ah files and subfolders from C:\MYDOCS to the D: drive, you want
to delete the folder C:\MYDOCS and ah files and folders in there.
What command wound accomplish this most efficiently?
1.
2.
3.
4.
DELTREE C:\MYDOCS\*.*
DEL C:\MYDOCS
DELTREE C:\MYDOCS <Correct>
ERASE C:\MYDOCS
Explanation:
DELTREE can be used to remove entire directory trees from the disk. With DELTREE
you can remove MYDOCS and all files and subfolders under MYDOCS in one operation. To
delete MYDOCS and all files and folders under MYDOCS type DELTREE C:\MYDOCS.
DELTREE C:\MYDOCS\*.* would not delete the MYDOCS folder but it would delete all
files and folders under MYDOCS.
Both DEL C:\MYDOCS and the older version of the same command, ERASE C:\MYDOCS,
would not delete the folder MYDOCS since DEL only deletes files. In this example it
would assume MYDOCS is a filename, not a folder name.
83. A technician has just assembled a new computer and s preparing to install a
Windows 9.x operating system. Which of the following is the FIRST step in
preparing the hard drive for the installation of Windows 9.x?
1.
2.
3.
4.
5.
Defragmenting
Low-level Formatting
Optimizing
High-level Formatting
Partitioning <Correct>
Explanation:
A new hard drive does not have an operating system and is not bootable. Before a hard
drive can be formatted or written to, if must be partitioned. The FDISK utility can
create or remove partitions and set the active partition on a hard disk. It must be run
from floppy or bootable CD-ROM because the hard disk is not accessible before a
partition exists.
After FDISK is used to create one or more partitions on a drive, you must set an active
partition. Then the partition or partitions need to be formatted. Ah new hard drives are
low-level formatted at the factory and rarely, if ever, need to be low-level formatted by
the user. Ah new drives must be high-level formatted (simply referred to as formatted),
but this cannot be done until the disk is partitioned.
Since the data clusters that make up a fragmented file are stored in different physical
locations on the disk, defragmenting a disk improves file access speed by finding files
that are fragmented, and relocating all clusters associated with them info contiguous
disk space. Optimizing or defragmenting a new drive is unnecessary since if contains no
files thaf can be fragmented.
84. Which of the following s NOT a common file extension for graphic files?
1.
2.
3.
4.
JPG
GIF
BMP
ZIP <Correct>
Explanation:
GIF (Graphics Interchange Format), BMP (Windows Bitmap), and JPG (Joint
Photographic Experts Group) are all common file extensions for graphics. A file
extension is one to three characters at the end of a filename. The extension indicates
the type of file, and is separated from the rest of the filename by a period (.)
The Windows operating system associates file extensions with file types. You can change
the associations in Explorer by choosing File 1 Open With and selecting Always choose
this program to open these files.
ZIP is not a common extension for a graphics file, although TIF (Tag Image File Format)
is. ZIP is the common extension used by a file compression utility known as WINZIP.
85. On your Windows 98 computer, you have an MS-DOS program named
THATPRG.EXE that needs special parameters n the AUTOEXEC.BAT file to run.
You have created a special AUTOEXEC.BAT file and put it in the
C:\THATPRG\RUN folder.
Which of the following is the correct method for specifying the alternative
AUTOEXEC.BAT file?
1. Locate THATPRG.EXE. Right-click on it and choose Properties 1 Program 1 Advanced.
Change the Autoexec file name to C:\THATPRG\RUN\AUTOEXEC.BAT. <Correct>
2. Use a text editor to create DOSSTART.BAT in the C:\THATPRG\RUN folder. Edit
the first line of the file to be C:\THATPRG\RUN\AUTOEXEC.BAT.
3. Open C:\Windows\DOSSTART.BAT. Edit the first line of the file to be
C:\THATPRG\RU N\AUTOEXEC. BAT.
4. Locate THATPRG.EXE. Right-click on it and choose Properties 1 Program. Change the
Cmd line to C:\THATPRG\RU N\AUTOEXEC. BAT.
Explanation:
In order to use a different AUTOEXEC.BAT file with a program, you should specify the
AUTOEXEC.BAT file in the Advanced Program properties of the program. Locate the
program (THATPRG.EXE). Right-click on it and choose Properties 1 Program 1 Advanced.
You can then change the Autoexec file name from the default.
When you restart your computer in MS-DOS mode, the operating system automatically
runs the default CONFIG.SYS and AUTOEXEC.BAT, and then runs the DOSSTART.BAT
file, it if exists. lf you edit the DOSSTART.BAT program to run the modified
AUTOEXEC.BAT file, then it will run every time you restart your computer.
Creating a DOSSTART.BAT file in the program directory will have no affect on which
autoexec.bat file will run. DOSSTART does not control which autoexec file runs, and the
operating system will not look for it in the program directory.
86. Jim complains that his Windows 2000 PC always seems fo be running slower than it
should. He runs the Disk Defragmenter once a week, and if always shows over 20%
fragmentation.
What can you do to help relieve the fragmentation problem?
1.
2.
3.
4.
Set the initial paging file size to zero, and the maximum paging file size to 1 GB.
Run Dr. Watson.
Schedule the Disk Defragmenter fo run twice a day.
Set the initial and maximum sizes of the paging file to the same value. <Correct>
Explanation:
Under Windows 2000, the default paging file size is set to 1.5 times the amount of
physical RAM installed. To improve performance, you should set the initial and maximum
sizes of the paging file to the same value. This prevents disk defragmentation that might
occur from having two different values. Windows 2000 does not normally need to change
the size of the paging file during processing.
To control file fragmentation, the paging file should not have a zero minimum size and a 1
GB maximum size.
Scheduling Disk Defragmenter to run twice a day would only prevent Jim from using the
computer, and the paging file could still cause fragmentation.
Dr. Watson monitors application operation and creates reports when a program crashes.
It does not help with disk fragmentation.
87. While Emilys child was playing at Emilys computer, she clicked on the Print button
several times. A 50-page document is printing.
Which of the following options will best prevent paper waste?
1. Open the print queue immediately. Pause the printer, and then delete ah of the print
jobs, including the current one. <Correct>
2. Let the current print job finish printing, and then open the print queue to delete the
remaining print jobs.
3. Shut the printer off immediately, and then turn it back on after five minutes.
4. While the current print job is printing, delete ah of the remaining print jobs.
Explanation:
The fastest way to stop the printer from printing items you do not want printed is to
open the print queue, pause the printer (to stop print jobs from spooling to the printer),
and then delete ah of the print jobs, including the one that is currently printing. A few
more pages may print, depending on how much has spooled in the printers internal
memory, but this will prevent paper waste.
Shutting off the printer will not stop the document from spooning, but it will cause a
communication error that may cause her printer to print pages with garbled characters
instead of the document when it is turned back on. Turning off the printer while it is
printing will likely cause a paper jam.
Emily should NOT let the current print job finish printing before opening the print queue
because data will continue to spool to the printers memory and the next job while begin
printing. There is nothing to prevent Emily from deleting the current print job while it is
printing.
88. In the CONFIG.SYS file for a Windows 9x computer, you find a command Files99.
What is the result of this command?
1. The command limits lO.SYS to opening 99 files at a time. <Correct>
2. During bootup the system creates 99 temporary files to be used for Internet
browsing.
3. It creates 99 buffers for temporary file storage.
4. It specifies that COMMAND.COM is 99 files from the master boot record.
Explanation:
Windows 9x loads real-mode drivers listed in CONFIG.SYS each time the system boots.
The CONFIG.SYS file can be used to limit the maximum number of files that lO.SYS can
open at any one time. The command FILES99 limits lO.SYS to loading 99 files at once.
The FILES command does not create temporary files or buffers.
lO.SYS runs during bootup of a Windows 9x computer and calls for COMMAND.00M, the
DOS command interpreter, to load. The location of COMMAND.00M on the hard drive is
not specified by the FILES command.
89. Which command starts the registry editor in Windows XP?
1.
2.
3.
4.
REGEDT16
REGEDT32
REGEDIT <Correct>
RGEDIT
Explanation:
REGEDIT is the command to start the registry editor in Windows XP.
In Windows NT/2000, both REGEDIT (the original Registry Editor included with
Windows 9x) and REGEDT32 (the Registry Editor for Windows NT/2000) are installed.
However, Microsoft recommends REGEDT32 over REGEDIT because REGEDT32 offers a
security menu and a read-only mode.
In Windows XP, the registry editor has been updated. The Windows XP registry editor is
again named regedit.exe. It provides many improvements over the previous version. It
combines the features of the original regedit.exe and the features of regedt32.exe into
one program.
90. You are working on a computer running Windows 9x, and you want fo remove the
Read Only attribute from a file.
How can you do this within Windows 9x? (Select two.)
1. Open the Control Panel 1 System applet, select the file in question, right-click, and
select
Properties.
2. Open Windows Explorer, select the file in question, and select Options from the View
menu.
3. Open My Computer, find and select the file in question, right-click the file, and select
Properties. <Correct>
4. Open Windows Explorer, select the file in question, right-click, and select
Properties. <Correct>
5. Open Start Menu, select the desired file, right-click the file, and select Properties.
Explanation:
You can display and change file attributes by browsing to the file in question from My
TELNET
TRACERT
PING <Correct>
FTP
Explanation:
The PING utility/command (for example, ping 208.160.120.17) is used to send test data
packets to verify connectivity to another computer using ICMP. The Internet Control
Message Protocol (ICMP) s part of the TCP/IP suite of protocols. It is an errorreporting Protocol . PING sends an ICMP Echo Request to a target name (like computer2)
or IP address. The resulting ICMP Echo Reply verifies that a TCP/IP configuration is set
up properly and that the destination host is online and connected to the network.
TRACERT is also a TCP/IP utility. It uses ICMP echo requests to trace the route a data
packet fakes to its destination. The TRACERT command displays the hop count (also
called the metric, the number of routers the signal must pass through to get to the
destination), the time each hop fakes (in milliseconds), the name of the computer or
router passed through (optional), and the IP address of each router in the hop.
TRACERT works with IP addresses, host names, and domain names. Like PING, TRACERT
can verify a system is online, but that is not its primary purpose.
The FTP (File Transfer Protocol - part of the TCP/IP suite of protocols) is a utility
program that allows the bi-directional transfer (uploading and downloading) of files
between two networked hosts. A small FTP client program runs on the remote computer
and accesses a larger FTP server running on a host. FTP is not used to verify that
another system is anime.
The TCP/IP utility TELNET allows a computer to connect to a UNIX host by emulating a
terminal (such as a DEC VT1 00) and establishing a remate command-line window.
TELNET is not used to verify that another system is anime.
92. You can use Windows Internet Name Service (WINS) or the Domain Name Service
(DNS) to resolve Internet IP addresses. Which of the following statements s
correct about WINS and DNS?
1. WINS resolves Fully Qualified Domain Names to IP addresses and DNS resolves
NetBIOS names to IP addresses.
2. WINS resolve NetBIOS names to IP addresses and DNS resolves Fully Qualified
Domain Names to IP addresses. <Correct>
3. WINS resolves LMHDSTS names to IP addresses and DNS resolves NetBIOS names
to IP addresses.
4. WINS resolves host names to IP addresses and DNS resolves Fully Qualified Domain
Names to IP addresses.
93. Kay was installing Windows 9x onto her computer when the setup process failed
before the first reboot. Which of the following files can she use to determine
what might have caused the failure?
1.
2.
3.
4.
DETLOG.TXT
BODTLOG.TXT
SETUPLOG.TXT <Correct>
DETCRASH.LOG
Explanation:
Windows 9x provides the following log files that help you to determine the cause of a
setup or startup failure: BDOTLOG.TXT, SETUPLOG.TXT, DETLOG.TXT, and
DETCRASH .LOG.
The BODTLOG.TXT file documents the events that occur when a system is started.
lf Setup encounters an error or stops before your computer is restarted for the first
time during Setup, you must turn off the computer, turn it back on, and then run the
Setup program again. After the Setup wizard has started again, Setup determines that a
failure occurred, and the Safe Recovery screen appears. It you choose to use Safe
Recovery, Setup examines the Setuplog.txt file to determine where the failure occurred.
Setup then resumes from the point where the failure occurred. The SETUPLOG.TXT file
holds setup information that was determined when Windows 9x was installed. You should
use this file to determine what event was occurring when the Setup process fails. It is
used by Safe Recovery to determine where Setup will resume.
After the first reboot, the Setup process enters the Hardware Detection phase. The
DETLOG.TXT file and DETCRASH.LOG files record what occurs during hardware
detection. The DETLOG.TXT file contains the same information as the DETCRASH.LDG
file; however, it can be read easily by a text editor such as Notepad. Both of these files
enable you to determine the hardware components that have been detected prior to the
system crashing. DETCRASH.LOG is used by Setup to determine what steps were
successfully completed so that Setup will not fail on the same problem again.
94. You Windows XP system is failing to boot normally. It starts in Safe Mode. Which
startup option should you use to determine what is causing the failure?
1.
2.
3.
4.
Explanation:
Enable Boot Logging is the best choice. The Enable Boot Logging option allows the system
to boot normally while recording ah files loaded during the boot process. The log is
recorded in a file named NTBTLOG.TXT. The log will identify which drivers loaded and
which failed. This is especially helpful if you have a copy of the NTBTLOG.TXT file that
was created before there was a problem. You then could compare them to see whaf has
changed.
The Recovery Console does not start the graphical interface, but it does allow you to
access any FAT16, FAT32, and NTFS file systems. The purpose of the Recovery Console
is to allow you to repair a damaged registry, system files, or file system on the hard
drive.
Enable VGA Mode is used when the video setting is such that you cannot see the screen
well enough to fix a bad setting. This can happen if a user creates a desktop with black
fonts on a black background, or something similar to that. Booting in this mode gives you
very plain VGA video but allows you to change the settings in the Display properties.
Debugging Mode gives you the opportunity to move system boot logs from the failing
computer to another computer for evaluation. To use this mode, you first must connect
the failing computer to another computer using a serial cable. You then can review the
boot logs on a functioning computer.
95. Your PC experiences an Invalid Page Fault. What wiIl happen to the application that s
running?
1.
2.
3.
4.
The application
The application
The application
The application
Explanation:
Windows uses Virtual Memory to optimize its use of installed physical memory (RAM).
A section of the hard drive s set aside for use as a swap file, and the computer treats
the memory space on the hard disk as if it were RAM. Data and program information s
stored in and retrieved from RAM and the hard drive in chunks called pages. When the
Virtual Machine Manager tries to access information that is not in virtual memory, a Page
Fault is issued. A Page Fault does not mean that there is a problem with the system -- it
is just an indication that information needs to be moved from the swap file to the RAM.
Page Faults will not cause the operating system or application to stop, but excessive Page
Faults will cause the system to run slow.
An Invalid Page Fault occurs when the Memory Manager tries to load a page for an
application into an area that is already occupied by an application. At a minimum, this will
cause the application to stop running, and if will have to be reloaded. Sometimes the
entire operating system will crash and have to be rebooted.
You cannot locate the proper page -- this is a Virtual Machine Manager function.
The application will not be able to continue, buf it unlikely fhaf it will be corrupted and
need to be reinstalled.
96. Depending on the Windows configuration, the Registry may consist of three files.
In Windows 98, what are the names of the three files and what extension is used
for the backup copy of the files?
1. The Registry consists of a SYSTEM.DAT file and a USER.DAT file. The third file,
POLICY.CFG, is only used if System Policies are enabled. The extension used to
backup the Registry files is BAK.
2. The Registry consists of a SYSTEM.DAT file and a USER.DAT file. The third file,
POLICY.POL, is only used if System Policies are enabled. Registry files are backed up
to a CAB file named RBxxx.CAB. <Correct>
3. The Registry consists of a REG.DAT and a CDNFIG.DAT file. The third file,
POLICY.DAT, is used when System Policies are enabled. The extension used to backup
the Registry files is BAK.
4. The Registry consists of a REG.DAT and a CDNFIG.DAT file. The third file,
POLICY.DAT, is used when System Policies are enabled. Registry files are backed up
to a CAB file named RBxxx.CAB.
5. The Registry consists of a REG.DAT and a CDNFIG.DAT file. The third file,
POLICY.DAT, is used when System Policies are enabled. The extension used to backup
the Registry files is DAO.
6. The Registry consists of a SYSTEM.DAT file and a USER.DAT file. The third file,
POLICY.DAT, is used when System Policies are enabled. The extension used to backup
the Registry files is DAO.
Explanation:
In all versions of Windows, the Registry consists of a SYSTEM.DAT and a USER.DAT
file. The SYSTEM.DAT file consists of hardware configuration information. The
USER.DAT file consists of user-specific information. A third file, PDLICY.POL, is used
only when System Policies are enabled. It contains the System Policy information.
Windows 95 creates a backup copy of the SYSTEM.DAT and USER.DAT files when you
boot the system. The extension used to backup the Registry files is DAO.
Starting with Windows 98, the Registry Checker (SCANREGW.EXE) runs automatically
when starting up Windows. It scans the Registry for errors, and then backs up the
Registry. When the Register Checker backs up the files, it creates a CAB file named
RBxxx.CAB. RB stands for Registry backup, and xxx is a three-digit number. CAB files
are special internal Windows files (cabinet files).
REG.DAT, CONFIG.DAT, and PDLICY.DAT are not Registry files.
Registry backups do not have a BAK extension in any Windows 9x or later versions.
97. After installing a new device driver for your video card in your Windows XP
system, you find that the computer stalls during bootup. Which boot option would
be the best way to correct the problem?
1.
2.
3.
4.
Safe Mode
Last Known Good Configuration <Correct>
Enable VGA Mode
Safe Mode with Command Prompt
Explanation:
Last Known Good Configuration is the best choice for this situation. Windows NT, 2000,
and XP ah keep a copy of the Last Known Good Configuration in the registry. If
something is configured incorrectly, you can restore the settings used for the last
successful boot. Any settings changes made since the last successful boot will be lost.
Safe mode boots the operating system with a minimum configuration, and can be used to
solve problems with a new hardware installation or problems caused by user settings.
Safe mode boots with the mouse, basic video, keyboard, and mass storage drivers loaded.
If uses the default system services (not any extra services) and does not provide
network access. It does provide a graphical interface.
Safe mode with Command Prompt is the same as Safe Mode but does not load the
graphical interface.
Enable VGA Mode is used when the video setting is such that you cannot see the screen
well enough to fix a bad setting. This can happen if a user creates a desktop with black
fonts on a black background, or something similar to that. Booting in this mode gives you
very plain VGA video but ah lows you to change the settings in the Display properties.
98. Which two of the following protocols are used for sending and receiving e-mail?
(Choose two.)
1.
2.
3.
4.
5.
PPP
FTP
SMTP <Correct>
SNMP
POP<Correct>
Explanation:
Simple Mail Transfer Protocol (SMTP) and Post Office Protocol (POP) are both part of
the TCP/IP suite of protocols and are used for e-mail. SMTP, which uses Port 25, is
typically used for e-mail transfers between mail servers; that is, you use it to send mail.
POP, which uses Port 110, is used for transferring e-mail from a mail server to an e-mail
client; that is, you use it to receive mail.
The FTP (File Transfer Protocol) utility program allows the bi-directional transfer of
files between two networked hosts. Both hosts must be using TCP/IP, and the source
host (the file server) must be running the FTP server daemon application.
Point-to-Point Protocol (PPP) is a communication protocol used in dial-up connections.
SNMP (Simple Network Management Protocol) is used for collecting information about
devices on a network.
99. What s the best way to keep your Windows system up to date in regard to
Windows patches and updates?
1. Set your browser home page to www.microsoft.com.
2. Run Dr. Watson every day.
System Disk
Startup Menu <Correct>
Repair Menu
Emergency Startup Disk <Correct>
Explanation:
If your system will not load Windows 9x, you can use the Startup Menu or your
Emergency Startup Disk to boot the system and begin troubleshooting. You should
create an Emergency Startup Disk when you install Windows 9x. It contains the
operating system files and troubleshooting utilities, and can be used to boot up the
system if your system crashes and will not re-boot. If you do not create an Emergency
Startup Disk during setup, or it you lose your disk, you can create a new disk using the
Add/Remove Programs applet in Control Panel.
To display the Startup Menu, you must press the F8 key when the Starting Windows 9x
message is displayed. The Startup Menu enables you to start the system in Normal,
Logged, Safe, or Step-by-Step Confirmation Mode. Windows 95 and Windows 98 can also
be started in DOS mode with or without networking support. Windows Me does not offer
these choices. The Step-by-Step Confirmation Mode displays the startup commands lineby-line so that you can determine which command is causing the problem.
You press the F5 key to boot up in Safe Mode. This enables you to start a basic version
of Windows 9x, but skip the startup files CONFIG.SYS, AUTOEXEC.BAT, SYSTEM.INI,
and WIN.INI. In Safe Mode, you can still access the Windows 9x configuration files to
troubleshoot the problem.