Está en la página 1de 55

Universidad Nacional de Ingeniera Facultad de Ingeniera y de Sistemas

1.

How can you install the Recovery Console so it appears each time you startup on
the Operating System Startup Menu?
1. Use the Windows 2000/XP CD and type Winnt32/m:i386 from a command window.
2. Use the Windows 2000/XP CD and type Winnt32/cmdcons from a command window.
<Correct>
3. Use the Windows 2000/XP CD and type Winnt32/copydir:recoveryconsole from a
command windows.
4. Use the Windows 2000/XP CD and type Winnt32 /makelocalsource from a command
window.
Explanation:
There are approximately a dozen different switches that may be used with the
Winnt.exe and Winnt32.exe files to control the Windows 2000 installation, both locally
and remotely. The Windows 2000 upgrade process uses Winnt32.exe, whereas a clean
installation of Windows 2000 would require running Winnt.exe.
The first part of the command (X:\Winnt32) tells the operating system which
installation method (file) to use and the location of the file.
The following are some switches (options) you can use with the command:
/cmdcons
Adds a Recovery Console option for repairing a failed installation to the operating system
selection screen. It is only used post-Setup.
copydir:i386
Creates an additional folder within the folder in which the Windows 2000 files are
installed. For example, if the source folder contains a folder called Private_drivers that
has modifications just for your site, you can type /copydir:Private_drivers to have Setup
copy that folder to your installed Windows 2000 folder. So then the new folder location
would be C:\Winnt\Private_drivers. You can use /copydir to create as many additional
folders as you want.
/makelocalsource
Instructs Setup to copy all installation source files to your local hard disk. Use
/makelocalsource when installing from a CD to provide installation files when the CD is
not available later in the installation.
/m:i386
Specifies that Setup copies replacement files from an alternate location. Setup will look
in the alternate location first and if files are present, use them instead of the files from
the default location.

2.

Which of the following s the file that starts the loading of the operating system
in Windows 2000?
1.
2.
3.
4.

BOOTSECT.DOS
NTDETECT.COM
BODT.INI
NTLDR <Correct>

Explanation:
The NTLDR file starts the loading of the OS on a Windows NT, Windows 2000, or
Windows XP machine. NTLDR first loads the operating system from the boot partition.
NTLDR then controls the hardware detection process before passing control to the
Windows kernel. NTLDR must be in the root folder of the startup disk.
BOOT.INI is a text file that contains information about the operating systems on the
computer and controls the initial boot screen on a Windows NT/2000/XP computer.
BOOTSECT.DOS is used in a dual-boot environment to keep a copy of the DOS or
Windows 9x boot sector so it can be loaded or restored as needed.
NTDETECT.C0M parses the system for hardware information each time Windows
NT/2000/XP is loaded. This information is then used to create dynamic hardware
information in the Windows registry.
3.

You are configuring a network for Windows 95, Windows 98, and Windows 2000
clients that will have multiple communication protocols.
Which of the following are choices for transport protocols supported by Windows
95, Windows 98 and Windows 2000? (Select three.)
1.
2.
3.
4.
5.

TCP/IP <Correct>
NetBEUI <Correct>
Ethernet
Token Ring
IPX/SPX <Correct>

Explanation:
TCP/IP, IPX/SPX, and NetBEUI are all protocols supported by Windows 9x and Windows
2000. They are rules of language for network hosts to follow. TCP/IP is most prevalent
because of its use on the Internet. NetBEUI is a Microsoft protocol that does not
support routing, so it is not compatible with the Internet. IPX/SPX is a Novell protocol
for NetWare, but Microsoft wrote its own version of IPX/SPX and called it NWLink.
Token Ring is a Data Link layer protocol implemented on a Ring topology. Token Ring
networks (Ring Topology) use a media access method known as OSMA/CA (Carrier Sense
Multiple Access with Collision Avoldance). A data packet known as the token is passed
around the network until a host wants to transmit and grabs it. To access the network,
the sender must have the token.
Ethernet is another Data Link Layer protocol implemented on either a star or bus
topology.

Ethernet networks use a media access control method known as CSMA/CD (Carrier
Sense Multiple Access with Collision Detection).
Contention access methods, where network hosts contend for the right to transmit,
allow any computer to access the network at any time. Carrier Sense Multiple Access
(CSMA) is a contention-based access method. The three most common contention-based
access methods are CSMA/CD (CSMA using Collision Detection), CSMA/CA (OSMA using
Collision Avoidance), and Demand Priority.
4.

Your DOS-based program has been configured to be started by a batch file that
you made into an icon on the desktop. You would like a message to be displayed
anytime someone launches the program to warn that the mouse will not work with
this particular application.
To display a warning message, which command would you add to the batch file?
1.
2.
3.
4.

ECHO 0FF
REM The Mouse Will Not work With this Program
@ECHO 0FF
ECHO The Mouse Will Not work With this Program <Correct>

Explanation:
To create a message that will display every time the DOS program is launched, use the
ECHO command followed by the message you want displayed.
Use the ECHO command to turn command echoing on or off. With ECHO on, every time
you type a command, what you typed is written to the screen, echoing your command.
This is generally annoying so you can turn echo off using ECHO 0FF.
With @ECHO 0FF, even the ECHO 0FF command is not echoed.
REM is a command that instructs the system to ignore whatever follows the REM. It is
often used to make notes from the programmer the program itself without disrupting
the process stream.
5.

What are the primary attributes that can be set on a file in a Windows 9x
system?
(Choose all that apply.)
1.
2.
3.
4.
5.
6.
7.

Archive <Correct>
Read Only <Correct>
Txt
Hidden <Correct>
System <Correct>
Doc
Sys

Explanation:
Files have four primary attributes that can be used to control how the file can be used in
a Windows system. The Read Only attribute sets a file to read only status, preventing
users from changing the file. It can be read but not changed.

The Hidden attribute makes the file invisible from the DOS prompt and in Windows
Explorer unless the default view settings are changed to display Hidden files. if a file is
hidden, it is less likely to be moved or deleted by novice computer users.
The Archive attribute is used by backup programs to determine when a file has been
backed up and when it needs to be backed up.
The System attribute is assigned to system files to make it more difficult to move or
delete critical system files.
Doc, Txt, and Sys are file extensions. While they tell you something about the type of
file it is, but they are not file attributes.
6.

You are getting an error message indicating that a device referenced in


SYSTEM.INI cannot be found on your Windows 98 computer. What two utilities
could you use to turn off the device? (Choose two.)
1.
2.
3.
4.
5.

MSCONFIG.EXE <Correct>
SYSEDIT.EXE <Correct>
REGEDIT.EXE
CONFIG.SYS
SCANREG.EXE

Explanation:
MSCONFIG, also known as the Windows System Configuration Utility, s an enhanced
update of the SYSEDIT tool. MSCONFIG allows you to indicate how you want to start
Windows, to edit system files, and makes it easy to remove startup items.
If you use SYSEDIT to alter SYSTEM.INI, you will have to either Rem (Remark) out the
line that loads the device, or delete the line completely. MSCONFIG lets you uncheck a
box so that the line is not included, and the device is therefore not loaded. lf you later
decide that the line needs to be included, changing it back is as easy as running the
utility again and checking the box. Both utilities will permit you to prevent a file from
loading.
REGEDIT allows you to edit the Windows Registry, not the SYSTEM.INI file.
CONFIG.SYS is a file that loads device drivers for non-Windows (MS-DOS) applications.
The Windows 9x SCANREG utility scans the registry for problems each time the system
is started. SCANREG replaces a corrupt registry with a backup copy of the registry if it
defects a problem. SCANREG either restores the registry from a known good backup, or,
it no backups are available, it repairs the current registry. After the scan is complete,
SCAN REG allows you to create a backup of the registry.
7.

When your Windows 98 second edition operating system was originally installed, you
did not install additional backgrounds and screen savers that are available on the
CD-ROM. Recently you have become bored with the plain background and want to
add those screen savers.
What is the best way you can install Windows optional files after the operating
system is already installed?
1. Reinstall Windows.

2. Use the Add/Remove Programs applet in Control Panel. <Correct>


3. Use the System applet in Control Panel.
4. Use the Accessibility Options applet in Control Panel.
Explanation:
To add Windows components not installed during initial installation, you should use the
Add/Remove Programs applet in Control Panel. Then choose Add/Remove Windows
components from the dialog box that follows.
Reinstalling Windows would give you the option to install the screen savers, but this is
not the simplest or best way to add them.
The System applet is used to view or modify system hardware resources and drives.
The Accessibility Options applet is used to configure the keyboard, monitor, and mouse
for use by people with physical limitations.
8.

What tool can you use to automatically scan your system for device drivers and
system files that are out of date and then download and install them automatically
as well?
1.
2.
3.
4.

Download
Download
Download
Download

and
and
and
and

install
install
install
install

the Windows Automatic Update tool. <Correct>


the latest version of Windows Media Player.
the DirectX 9.0 Update.
the latest version of NetMeeting.

Explanation:
In addition to critical updates and service packs that Microsoft creates to address
known problems with Windows, the Windows Automatic Update tool can be downloaded
from the Windows update site and installed on a Windows 98/Me/2000/XP computer. It
uses ActiveX controls to scan your system, find your device drivers and system files, and
compare these files to the ones on the Windows Update server. It creates an icon in the
Control Panel (in Control Panel 1 System applet in XP) that allows you to configure how
often you want it to check and how you want it to handle the updates.
Downloading and installing the DirectX 9.0 Update will not affect any future updates.
Microsoft DirectX is an advanced suite of multimedia application programming interfaces
(APIs) built into Windows operating systems. DirectX provides a standard development
platform for Windows-based POs by enabling software developers to access specialized
hardware features without having to write hardware-specific code.
Downloading and installing the latest version of Windows Media Player will not affect
future updates.
Downloading and installing the latest version of NetMeeting will not affect future
updates. NetMeeting is a real-time collaboration and conferencing client.
9.

To run a non-Windows application on a Windows 98 system, where could you access


the executable to start it? (Select three.)
1. From a previously created desktop shortcut <Correct>
2. From Windows Explorer <Correct>

3. From the Start Programs menu


4. From a group in the Program Manager
5. From a Start Run line <Correct>
Explanation:
You can run the program from a Start Run line by specifying the name and location of the
program. You can also run it by double-clicking it from the Windows Explorer. You can
create a shortcut icon on the desktop for it by finding the application (the executable
file) in the Windows Explorer, right-clicking it, and selecting Send To 1 Desktop as
Shortcut. Then you could double click the shortcut to launch the application.
The Program Manager Groups are used in Windows 3.x, not Windows 98.
Non-Windows applications will not be added to the Start Programs menu during
installation. You could manually create a shortcut in the Start Menu.
10. What option can you use in the boot.ini file to force your Windows XP system to
display the names of all drivers as they load?
1.
2.
3.
4.

/sos <Correct>
/noguiboot
/debug
/fastdetect

Explanation:
The boot.ini file contains the list of available operating systems and the parameters to
start them. This file determines what is on the list, how long the list displays, and what
the default setting is. Windows (specifically Ntldr) uses the boot.ini file to determine
the operating system options to display during the startup (boot) process. Boot.ini is
flagged as a read-only system file by default.
To change the contents of this file easily, use the System tool in Control Panel. Although
the file can be modified in a text editor, the recommended method of editing the file is
to go to Control Panel 1 System 1 Advanced 1 Startup and Recovery. This applet will
ensure that the parameters are set correctly in the file.
A sample Boot.ini file is shown here.
[boot loader]
timeout30
default=multi(0)disk(O)rdisk(0)partition(1 )\WINNT
[operating systems]
multi(0)disk(0)rdisk(0)partition(1)\WINNT=Microsoft Windows 2000 Professional
/fastdetect C:\CMDCONS\BOOTSECT.DAT=Microsoft Windows 2000 Recovery Console
/cmdcons
Options are entered at the end of the line for the statement you want to modify.
Options include:
/sos displays the name of each device driver as it loads. This is helpful when startup fails
while loading drivers to determine which driver is failing to load.

/fastdetect turns off serial and bus mouse detection in Ntdetect.com. if you use
/fastdetect without specifying a COM port, serial mouse detection is disabled on all
ports.
/debug loads the Windows kernel debugger when you start Windows.
/noguiboot disables the bitmap that displays the progress bar for Windows XP
Professional startup.
11. Which utility should you use to update a Windows NT 4.0 Emergency Repair Disk?
1.
2.
3.
4.

FDisk
Setup
RDisk <Correct>
ERD

Explanation:
RDISK is used in Windows NT only to create or update an Emergency Repair Disk (ERD).
You should update the ERD any time major changes are made to the system. During the
installation of Windows NT, Setup creates an Emergency Repair Disk (ERD), but Setup is
not designed to update an ERD.
FDisk and ERD are not included with the Windows NT operating system. ERD is used by
Windows 95 to backup the Windows Registry. Fdisk is used in Windows 9x to partition a
hard drive.
12. You had to reformat your hard disk drive. You need to reinstall the Windows
operating system. After you boot from a boot floppy disk, you cannot access the
CD-ROM drive.
Which of the following will help the most in accessing the CD-ROM drive?
1.
2.
3.
4.
5.

FDISK
LOADHIGH
FORMAT
MSCDEX <Correct>
CD

Explanation:
In order to boot to DOS with CD-ROM support, you need the Microsoft CD Extension
for DOS, which is contained in the MSCDEX.EXE file. This file will identify CD-ROMs,
assign a drive letter, and allow you to read their data. The drive for your CD-ROM is
useless in DOS without this file.
FORMAT is used to format hard drives.
FDISK is a utility that partitions drives.
CD is the command for Change Directory.
LOADHIGH is used in the CONFIG.SYS file to load device drivers into high memory.
13. The file size of MSDOS.SYS must be:

1. Less than 1024 bytes


2. Installed; size doesnt matter.
3. At least 1024 bytes <Correct>
4. Exactly 1024 bytes
Explanation:
MSDOS.SYS contains important pre-Windows options. It has three mandatory entries
and a number of optional settings. The following s a typical MSDOS.SYS:
[Paths]
WinDir=c:\windows
WinBootDir=c:\windows
HostWinBootDrv=c
[Options]
BootMulti=0
BootGUl=1
DoubleBuffer=1
The Paths section is mandatory and contains only those three entries. The Options
section may contain any of the following:
AutoScan=n (ScanDisk run settings)
BootFailSafe=1 (To force the system to boot n Safe mode)
BootGUl=1 (To boot into GUI mode)
BootKeys= (Use function keys to determine boot mode)
BootMenu= (Displays the startup menu automatically)
BootMenuDefault=n (Sets the default for the startup menu)
BootMenuDelay=n (Amount of time before the default startup menu option is used)
BootMulti= (Dual-booting)
BootWarn= (Display a warning before using Safe mode)
BootWin=1 (Sets Windows 98 as the default operating system)
DblSpace= (Loads DBLSPACE. BI N automatically)
DoubleBuffer= (For SCSI drives)
DrvSpace= (Loads DRVSPACE.BIN automatically)
LoadTop= (To load COMMAND.COM or DRVSPACE.BIN at the top of the 640 memory)
Logo= (To display the animated logo.)
Network= (Enables Safe mode with Networking to appear in the Startup menu)
The Msdos.sys file also contains a section that contains seemingly useless information.
This information is necessary to support programs that expect the Msdos.sys file to be
at least 1,024 bytes in length. For example, if an antivirus program detects that the
Msdos.sys file is less than 1,024 bytes, it may assume that the Msdos.sys file is infected
with a virus. lf you delete the Msdos.sys file, your computer will not start. MSDOS.SYS
must be at least 1024 bytes in size. lf you look at the MSDDS.SYS file, you will notice a
comment stating The following lines are required for compatibility with other programs.
Do not remove them (MSDOS.SYS needs to be >1024 bytes), followed by a series of
commented lines filled with Xs.
14. Which of the following utilities would provide the output shown in the graphic
exhibit?

1.
2.
3.
4.

FTP
TELNET
PING
TRACERT <Correct>

Explanation:
TRACERT is a TCP/IP utility that uses Internet Control Message Protocol (ICMP) echo
requests to trace the route a data packet takes to its destination. The TRACERT
command displays the hop count (also called the metric, the number of routers the signal
must pass through to get to the destination), the time each hop takes (in milliseconds),
the name of the computer or router passed through (optional), and the IP address of
each router in the hop. This s the output shown in the graphic. TRACERT works with IP
addresses, host names, and domain names.
The PING utility/command (for example, ping 208.160.120.17) is used to send test data
packets to verify connectivity to another computer using ICMP. ICMP s part of the
TCP/IP suite of protocols. It is an error-reporting protocol. PING sends an ICMP Echo
Request to a target name (like www.whitehouse.gov) or IP address. The resulting ICMP
Echo Reply verifies that a TCP/IP configuration is set up properly and that the
destination host is online and connected to the network.
The FTP (File Transfer Protocol - part of the TCP/IP suite of protocols) is a utility
program that allows the bi-directional transfer (uploading and downloading) of files
between two networked hosts. A small FTP client program runs on the remote computer
and accesses a larger FTP server running on a host.
The TCP/IP utility TELNET allows a computer to connect to a UNIX host by emulating a
terminal (such as a DEC VT1 00) and establishing a remote command-line window.
15. Which of the following is representative of a URL?
1.
2.
3.
4.

http://www.comptia.org
comptia.org
www.comptia.org
http://www.comptia.org/index.html <Correct>

Explanation:
A URL (Uniform Resource Locator) s an address for a Web page or other resource on
the Internet.
A URL contains the protocol used, the host name of the web server, the network name,
and the path and filename of the requested file.
The URL in this example is http://www.comptia.org/index.html. The index.html (it is case
sensitive) is the file or resource requested to be seen. The network name is comptia.org.
The server in the network is named www. The http:// specifies that the protocol is
Hypertext Transfer Protocol.
Because a URL must contain all of the items described above, the other choices are not
URLs because they lack one or more of the items.
The combination of the host name (server name) and the network name, www.comptia.org,
is called the domain name.

16. One of your customers s trying to access his CD-ROM drive through My Computer
in Windows 2000, but no CD-ROM drive s available. The customer says that the
drive was working properly the day before, when his system locked up and had to
be rebooted. From that time on the CD-ROM has not worked.
What would be a good first step that you should take in an effort to identify the
problem?
1. Open the System applet from the Control Panel, choose the Hardware tab, and click
the Device Manager tab. Look for errors on the DVD/CD Drives such as a red X or a
yellow! <Correct>
2. Open the Control Panel 1 Add/Remove Programs applet, and step through the
installation process.
3. Open the Add/Remove Hardware applet from the Control Panel and step through the
installation process.
4. Open the Add/Remove Hardware applet from the Control Panel and install a known
good CD-ROM driver over the existing one.
5. Open the Add/Remove Programs applet from the Control Panel and step through the
removal process.
Explanation:
Since the CD-ROM drive was working properly before, the reason for the system lockup
might be the reason for failed drive now. The problem could either be a hardware
failure, which could cause the system to lockup, or a driver file corruption. Either will be
shown as an error in the Device Manager. Use Device Manager in the Control Panel 1
System applet to check for hardware or driver problems.
Use the Control Panel 1 Add/Remove Hardware applet to add new hardware that is not
automatically recognized by Windows or to remove drivers from the system.
Use the Control Panel 1 Add/Remove Programs applet to install new software or remove
existing software.
17. Which of the following is responsible for checking hardware and building the
hardware information for the Windows XP registry?
1.
2.
3.
4.

BOOT.INI
NTBOOTDD.SYS
NTDETECT.COM <Correct>
NTLDR

Explanation:
NTDETECT.C0M parses the system for hardware information each time Windows
NT/2000/XP is loaded.
This information is then used to create dynamic hardware information in the Windows
registry.
The NTLDR file starts the loading of the OS on a Windows NT, Windows 2000, or
Windows XP machine. NTLDR first loads the operating system from the boot partition.

NTLDR then controls the hardware detection process before passing control to the
Windows kernel. NTLDR must be in the root folder of the startup disk.
BOOT.INI is a text file that contains information about the operating systems on the
computer and controls the initial boot screen on a Windows NT/2000/XP computer.
Windows NT/2000/XP uses NTBOOTDD.SYS to enable systems with a SCSI boot device
that has its firmware disabled to load the SCSI interface. If the system does not have
SCSI devices, this file is not installed.
18. Susan wants to compress a file, but she cannot find an option to do so. She read
that file compression is only available on partitions formatted with NTFS5.
Where can she check to see how the partition has been formatted? (Select two.)
1.
2.
3.
4.
5.

Control Panel 1 Folder Options


Administrative Tools Computer Management <Correct>
My Computer 1 Properties <Correct>
Administrative Tools Performance
Folder Options 1 File Types

Explanation:
Susan can see limited information on a partition by right-clicking on the drive listed in
My Computer, and choosing Properties. The format (for example, FAT, FAT32, NTFS) is
listed. Susan can see more extensive information about the partition, including the
format, by looking at Administrative Tools Computer Management and drilling down to
Disk Management.
Partition format information is not located under Administrative Tools Performance,
Folder Options 1 File Types, or Control Panel 1 Folder Options.
Although compression was available for entire partitions under NTFS4, individual file and
folder compression only became available under NTFS5, which debuted with Windows
2000.
19. You must explain to a new employee what the Windows 9x Registry contains.
Which statement best describes the Registry?
1. The Registry consists of network hardware and configuration information and
settings.
2. The Registry consists of administrative information, as well as usernames and
passwords.
3. The Registry consists of computer hardware configuration information and userspecific settings. <Correct>
4. The Registry consists of computer software version information and administrative
information.
Explanation:
In Windows 9x, the Registry consists of a SYSTEM.DAT and a USER.DAT file. The
SYSTEM.DAT file consists of hardware configuration information. The USER. DAT file
consists of user-specific information.

Windows 95 creates a backup copy of the SYSTEM.DAT and USER.DAT files when you
boot the system. The extension used to backup the Registry files is DAO.
Starting with Windows 98, the Registry Checker (SCANREGW.EXE) runs automatically
when starting up Windows. It scans the Registry for errors, and then backs up the
Registry.
When the Register Checker backs up the files, it creates a CAB file named RBxxx.CAB.
RB stands for Registry backup, and xxx is a three-digit number. CAB files are special
internal Windows files (cabinet files).
In Windows 3.x, the registry only consists of a file named REG.DAT, which contains
information on file associations, as well as Object linking and embedding information.
In order to view or modify the information contained in the Registry, you must use the
Regedit utility.
20. You are attempting to start Windows 98 and get an error message that
HIMEM.SYS is missing or corrupt. How can you most easily fix the problem?
(Select two.)
1. Reinstall Windows
2. Boot from the startup disk and copy HIMEM.SYS from the \Win98 folder of the
installation CD to the Windows folder on the computer. <Correct>
3. Boot with the installation CD and use the Repair Windows option to restore the file.
4. Boot from the startup disk and copy HIMEM.SYS from the disk to the
Windows\System folder.
5. Boot from the startup disk and copy HIMEM.SYS from the \Win98\System folder
of the installation CD to the Windows\System folder on the computer.
6. Boot from the startup disk and copy HIMEM.SYS from the disk to the Windows
folder. <Correct>
Explanation:
Windows will not boot in Normal mode with a missing or corrupt HIMEM.SYS file.
Windows 2000 or XP may be able to use its system file protection feature to protect
HIMEM.SYS, but Windows 98 cannot.
To restore HIMEM.SYS, you can boot with the startup disk and copy HIMEM.SYS either
from the floppy or from the Win98 folder of the installation CD to the Windows folder
on the computer.
lf you have to restore HIMEM.SYS on a Windows 2000/XP computer, boot with the
installation CD and use the Repair Windows 2000 option to restore the file. HIMEM.SYS
in a Windows 2000/XP system is in the \WINNT\System32 folder.
It is not necessary to reinstall Windows to fix this problem.
21. What key can you press while Windows 98 or Windows 2000 is starting up to see a
menu of startup options, including booting to Safe Mode?
1. Esc
2. F5
3. F8 <Correct>

4. F1
Explanation:
You press the F8 key to see a list of available startup options in Windows 9x, Windows
2000, and Windows XP. The options differ somewhat between the various operating
systems, but ah offer Safe Mode. Safe Mode only loads a basic set of drivers and VGA
video. Safe Mode can also be accessed directly by pressing the F5 key during bootup.
The F1 key is a standard key used to display the help screens.
The ESC key can often be used to cancel an extended memory test during bootup.
22. You want ScanDisk to run immediately, with no delay, if the system was not shut
down correctly before Windows 98 launches next time. Which file do you need to
edit?
1.
2.
3.
4.

WIN.C0M
AUTOEXEC.BAT
MSDOS.SYS <Correct>
IO.SYS

Explanation:
MSDOS.SYS contains important pre-Windows options for Windows 9x computers. There
are three mandatory entries and a number of optional settings. The following is a typical
MSDOS.SYS:
[Paths]
WinDir=c:\windows
WinBootDir=c:\windows
HostWinBootDrv=c
[Options]
BootMulti=0
BootGUl=1
DoubleBuffer=1
The Paths section is mandatory and contains only those three entries. The Options
section may contain any of the following:
AutoScan=n (ScanDisk run settings after improper shutdown. 1 = 1-minute delay, O =
disable, 2 = no delay)
BootFailSafe=1 (To force the system to boot in Safe mode)
BootGUI=1 (To boot info GUI mode)
BootKeys= (Use function keys to determine boot mode)
BootMenu= (Displays the startup menu automatically)
BootMenuDefaulf=n (Sets the default for the startup menu)
BootMenuDelay=n (Amount of time before the default startup menu option is used)
BootMulti (Dual-booting)
BootWarn= (Display a warning before using Safe mode)
BootWin=1 (Sets Windows 98 as the default operating system)
DblSpace= (Loads DBLSPACE. BI N automatically)
DoubleBuffer= (For SCSI drives)

DrvSpace= (Loads DRVSPACE.BIN automatically)


LoadTop= (To load COMMAND.COM or DRVSPACE.BIN at the top of the 640 memory)
Logo= (To display the animated logo.)
Network= (Enables Safe mode with Networking to appear in the Startup menu)
To set ScanDisk to run immediately, with no delay, it the system was not shut down
correctly before Windows 98 launches next time, add to the [Options] section of the
MSDOS.SYS file the following command:
AutoScan=2
23. You want to use the encryption feature in Windows 2000 to encrypt a directory.
Which file system must be used on the partition where the directory is located?
1.
2.
3.
4.

NTFS5 <Correct>
FAT32
NTFS4
HPFS

Explanation:
NTFS4 is the file system included in Windows NT. It offers several advantages over
FAT, including smaller cluster sizes and file-level security. It does not support file
encryption.
NTFS5 is the updated version of the file system that was included with Windows 2000.
It offers several new features, including encryption of individual files and folders,
compression of individual files and folders, and the ability to set disk space quotas.
HPFS (High Performance File System) is used by the IBM Operating System, OS/2.
FAT32 is supported by Windows 2000 but cannot be used for file encryption.
24. Your Windows computer has a laser printer. The printer has power, and s
connected with a parallel printer cable to the LPT1 port. After a successful
installation of the printer installation software, when you try to print a test page
from Windows, you receive an error message, Unable to Print to LPT1.
What is the first step you can take to solve the problem?
1.
2.
3.
4.

Reinstall the printer driver.


Add paper to the printer.
Replace the printer cable.
Try printing a self-test page from the printers own control interface. <Correct>

Explanation:
If a test page cannot be printed through Windows, the next step should be to try to
print a self-test page from the printers own controls. Most printers can print at least
one page, such as a demo page, without even being plugged into a computer. This is the
best way to prove that the printer ink or toner cartridge is installed correctly, that
there are no paper jams, and that the printer is functioning correctly.

Since the installation of the printer software completed without error, reinstalling if
would not likely correct the problem.
lf the printer were out of paper, you would typically get a message stating that the
printer is out of paper. Some new printers require a bi-directional printer port so that
two-way communication can occur between the printer and the computer. Bi-directional
printing enhances the interaction between the printer and the print spooler in Windows,
and allows specific error and diagnostic messages to be sent to the computer.
Replacing the cable may be something to fest later, but running a self-fest page is the
best choice here.
25. Which types of files can be automatically removed by the Disk Cleanup utility in
Windows 2000? (Select all that apply.)
1.
2.
3.
4.
5.
6.

Downloaded Program Files <Correct>


Archived Files
Old User Profiles
Temporary Internet Files <Correct>
Recycle Bin Contents <Correct>
Old Chkdsk Files <Correct>

Explanation:
The Disk Cleanup tool (Cleanmgr.exe) in Windows 2000 is designed to clear unnecessary files
from your computers hard disk. You can configure Cleanmgr.exe with command-line switches
to clean up the files you want. You can then schedule the task to run at a specific time by
using the Scheduled Tasks tool.
The Disk Cleanup Utility can be configured to automatically clean up the following types of
files:
Temporary Setup Files
Downloaded Program Files
Temporary Internet Files
Old Chkdsk Files
Recycle Bin contents
Temporary Files
Temporary Offline Files
Offline Files
Compress Old Files
Catalog Files for the File Indexer
The Cleanup utility cannot clean up Archived Files or Old User Profiles.
26. Anita is installing Windows 98 on her computer. On which of the following file
systems can Anita install Windows 98? (Choose two.)
1. HPFS
2. FAT or NTFS4
3. FAT16 <Correct>

4. NTFS5
5. NTFS4
6. FAT32 <Correct>
Explanation:
The File Allocation Table (FAT) file system used determines the cluster size used and
the largest partition size possible. FAT16 uses a 16-bit file system; FAT32 uses a 32-bit
file system. FAT32 can make use of larger partitions and smaller cluster sizes, but it is
not compatible with Windows 3.1, DOS, Windows NT, or Windows 95 (except Windows
95B - OSR2).
File systems that use larger cluster sizes waste disk space, since the smallest amount of
disk space a file can use is the size of one cluster. For example, it you are using FAT1 6
on a 2 GB hard drive, the cluster size is 32 KB. Files that are less than 32KB all use 32
KB of disk space.
New Technology File System (NTFS), available to Windows NT/2000 computers, is not
compatible with Windows 3.1, DOS, Windows 95, or Windows 98. The NTFS format
provided in Windows NT is known as NTFS 4. Windows 2000 improved upon the NTFS
format, and it is included with the Windows 2000 and Windows XP operating systems as
NTFS 5.
High Performance File System (HPFS) is an OS/2 file system, and is not recognized by
Windows 95 or Windows 98, Windows 3.1, DOS, or Windows NT 4.x. HPFS can be read on
Windows 2000, but disks cannot be formatted as HPFS.
Windows 98 can only be installed on a FAT partition, either FAT16 or FAT32. The FAT
partition must be large enough for both Windows 98 and its swap file. Windows 98
cannot be installed on an NTFS or HPFS partition.
27. Which of the following statements about SCANREG are true? (Choose ah that
apply.)
1. SCAN REG checks the registry for problems. <Correct>
2. SCAN REG removes unnecessary entries from the registry.
3. If there is a problem with the registry and no backup s available, SCANREG
attempts to correct the problem. <Correct>
4. SCANREG allows you to create a backup of your registry. <Correct>
5. SCAN REG checks the hard drive for errors.
Explanation:
The Windows 9x SCANREG utility scans the registry for problems each time the system
is started.
SCANREG replaces a corrupt registry with a backup copy of the registry if it defects a
problem.
SCANREG either restores the registry from a known good backup, or, it no backups are
available, it repairs the current registry. After the scan is complete, SCAN REG allows
you to create a backup of the registry.
There are two versions of this utility: SCANREG is the Command-line version, and
SCANREGW is the Windows GUI version. You run SCANREGW manually from the Run

dialog box by entering scanreg or scanregw. Windows automatically runs SCANREG when
you restart your computer.
SCANREG does not check the hard drive for errors. Hard Drive errors are defected and
corrected by the SCANDISK utility.
SCANREG does not remove unnecessary entries from the registry. To clean up a registry
with unnecessary and obsolete entries, use a third-party program such as Symantecs
Norton System Works.
28. Your Windows 98 computer s on a small office LAN. Ah the computers on the LAN
use either Windows 98 or Windows 2000 Professional. Your office mates computer
has a printer attached to a parallel port, and his computer s also connected to the
network. He can print to the printer, and you both can access the network, but
your computer cannot find his printer. Both computers have Client for Microsoft
Networks and File and Printer Sharing for Microsoft Networks installed.
What is the most likely reason you cannot connect to his printer?
1.
2.
3.
4.
5.

The printer is not shared at the officemates computer. <Correct>


Your computer does not have the printer shared.
Your computer is not configured with Client for Microsoft Networks.
Your parallel port is disabled in CMOS.
Your computer has the wrong IP address.

Explanation:
To share files between computers, each computer must have a network adapter and be
properly connected, such as through a hub. Each computer must have a common protocol
configured, and have Client for Microsoft Networks and File and Printer Sharing for
Microsoft Networks installed.
Although this configuration enables file and print sharing to fake place, the resource
(the Printer) must still be shared on the computer to which if is connected. To share a
printer, open the Start menu, select Settings, and select Printers. Select the printer you
want to share, and right-click on it. Select Sharing and set the parameters.
lf your parallel port was disabled in CMOS, if would not affect your access to network
printers.
Since both computers can access the network, your IP address and Client for Microsoft
Networks must be properly configured.
Since the printer is attached to another computer, there is no printer for you to share
on your computer.
29. Which of the following are the minimum requirements to install Windows XP
Professional on a PC? (Choose three.)
1.
2.
3.
4.
5.

128MB RAM
64MB RAM <Correct>
650MB available disk space <Correct>
2.0GB available disk space
Pentium 333 or equivalent

6. Pentium 233 or equivalent <Correct>


Explanation:
The minimum system requirements to install Windows XP Professional are Pentium
233MHz or higher CPU, 64MB RAM, 650MB available disk space. You also need a video
card capable of VGA resolution or higher, keyboard, mouse, or other pointing device, CDROM or DVD-ROM, and a network adapter card it you are installing over the network.
30. You have just removed the old graphics adapter and installed a new one in your
Windows 98 Pc. When the system boots, it hangs at the Windows Logo screen and
never completes the boot process. You have no choice but to restart the computer.
When you do, what likely will be the system response?
1.
2.
3.
4.

Windows
Windows
Windows
Windows

98 will
98 will
98 will
98 will

give you a General Protection Fault.


load in Safe Mode. <Correct>
load in Command Prompt mode.
prompt you to choose a new video driver.

Explanation:
When Windows 98 encounters an error during startup, upon restart, it automatically
launches in Safe Mode. Safe Mode is a diagnostic mode that does not load most of the
installed drivers and uses the basic VGA display mode. Enough of the operating system is
loaded to access the Control Panel, locate the problem, and load a new driver.
Windows 98 Command Prompt mode is a pseudo-DOS interface in which a thread of
Windows 98 is running in the background but the system is emulating a DOS system.
Windows 98 will not load into Command Prompt mode unless everything is working
properly in Normal mode.
General Protection Faults (GPF) are the abnormal ending (abend) of a Windows
application. You would not receive a GPF after a system failed to boot.
Windows 98 will not prompt you to choose a new video driver. However, the
recommended procedure when replacing a video card is to change the driver to the
Standard VGA driver before removing the old card and installing the new one.
31. Doug reports that Internet Explorer (IE) was working fine this morning, but now he
is getting a fatal error that causes it to shut down. Which of the following
questions s the most relevant to start the troubleshooting process?

1. When was the last time you backed up your hard drive?

2. How long does Internet Explorer work before you get the fatal error?
3. Was any new hardware or software installed since this morning? <Correct>
4. What version of Internet Explorer is it?
Explanation:
Because the problem occurred very suddenly, you should identify recent changes to
Dougs computer before proceeding with any other troubleshooting. The most relevant
question is Was any new hardware or software installed since this morning?

What version of Internet Explorer is it? and How long does Internet Explorer work
before you get the fatal error? are good questions and will probably be necessary in the
troubleshooting process, but they are not as relevant.
Asking about Dougs backup is the least relevant question.
32. What Windows 2000 Control Panel icons and subsequent options would you choose
(in order) if you wanted to disable all script support for the Internet security
zone?
1.
2.
3.
4.

System - Hardware - Device Manager - Network Adapters


Network and Dial-up Connections - Local Area Connection - Properties
Internet Options - Security - Internet - Custom Level <Correct>
Regional Options - Advanced

Explanation:
Many of the Internet security problems that have been discovered are related to the
way that Internet Explorer interacts with Windows. There are scripts on the Internet
that can modify your Windows installation in some way and possibly allow the introduction
of a virus. To prevent against that possibility, you should change Internet Explorers
security settings as well as disable script support.
To change security settings for Internet Explorer, use the Internet Options applet in
the Control Panel. Select the Security tab. There are many cases where the default
security levels dont exactly fit your needs. It is possible to change individual security
settings, such as enabling or disabling script support for a zone. To do that, set the
default security level for the zone as close as possible to the security settings you want,
and then click the Custom Level button. For each zone, you can configure different rules
for how the Internet explorer should handle ActiveX controls and scripting.
There are four security zones: Internet, Trusted Sites, Restricted Sites, and Local
intranet. Security is controlled separately for each zone.
Trusted Sites are Web sites that you completely trust. Therefore, you can set the
security settings lower for this domain.
Restricted Sites is a zone for all those sites that could potentially damage your
computer or install malicious code onto your computer.
Local intranet is the zone that contains Web sites you access using UNC names (such
as \\server\sharenarne) or website URLs without dots (such as http://server).
Internet is a zone that contains all sites that dont fit into any of the other zones.
System - Hardware - Device Manager -Network Adapters gives you dialog boxes to
configure network adapter resources, but you cannot disable scripting.
Network and Dial-up Connections - Local Area Connection - Properties gives you dialog
boxes to configure network parameters, but you cannot disable scripting there.
Regional Options - Advanced allows you to configure language support, but you cannot
disable scripting there.
33. Which of the following s a routable protocol used for Internet connectivity?
1. PPP

2. TCP/IP <Correct>
3. IPX/SPX
4. NetBEUI
Explanation:
Network protocols are the communication languages that computers use to communicate
over Local and Wide Area Networks (LAN5 and WAN5). A protocol is said to be routable
it its addressing scheme allows it to be passed to other networks by devices called
routers.
Routers select the best and shortest path from many possible paths to a destination
host.
The TCP/IP protocol is routable and is required for Internet connectivity.
TCP/IP, IPX/SPX, and NetBEUI are all network protocols. The Transport Control
Protocol / Internet Protocol (TCP/IP) groups data together into packets in order to
transport it over the Internet.
TCP/IP is most prevalent because of its use on the Internet.
NetBEUI and IPX/SPX are LAN protocols. NetBEUI is a Microsoft protocol. It is fast
but is not routable, so it is used in small local-area networks. IPX/SPX is a Novell
protocol, and it is the primary protocol used within NetWare environments. It is routable
to some extent, but it is not used for Internet connectivity.
Point-to-Point protocol (PPP) is often used to connect to a dial-up server with a modem.
It is not routable. Once the point-to-point dial-up connection is established, TCP/IP
handles all routed data.
34. While there are five main keys n the Window 2000 Registry, two of them contain
the data, and the other three are sub-keys of the two containing the data.
Which two of the following are the main keys containing the data? (Choose two.)
1.
2.
3.
4.
5.

Hkey_Users <Correct>
H key_Local_Machine <Correct>
Hkey_Current_Config
Hkey_Current_Users
Hkey_Classes_Root

Explanation:
There are five main keys n the Windows 2000 Registry:
Hkey_Local_Machine
Hkey_Users
Hkey_Current_Config
Hkey_Classes_Root
Hkey_Current_Users
Of these five keys, Hkey_Local_Machine and Hkey_Users contain ah of the information
regarding
hardware,
applications,
and
users.
Hkey_Current_Config
and
Hkey_Current_Users are used fo differentiate which of the settings confained in the
other keys are the ones currenfly being used. They are pointers back to the main data.

Hkey_Classes_Roof is a pointer back to importanf informafion about the user interface,


which is confained in Hkey_Local_Machine.
35. How can you check a Windows 98 system with proprietary software installed for
compatibility with Windows 2000 prior to upgrading to Windows 2000?
1. Use the Windows 2000 CD and type Winnf32 /makelocalsource from a command
window.
2. Use the Windows 2000 CD and type Winnf32 /copydir:Private_drivers from a
command window.
3. Use the Windows 2000 CD and type Winnt32 /checkupgradeonly from a command
window. <Correct>
4. Use the Windows 2000 CD and type Winnf32 /cmdcons from a command window.
Explanation:
You can use Winnf32 /checkupgradeonly to verify compatibility. The /checkupgradeonly
option checks your computer for upgrade compatibility with Windows 2000. For Windows
95 or Windows 98 upgrades, Setup creates a report named Upgrade.txt in the Windows
installation folder. For Windows NT 3.51 or 4.0 upgrades, it saves the report to the
Winnf32.Iog in the installation folder.
Other options for the Winnt32 command are:
/cmdco ns
Adds a Recovery Console option for repairing a failed installation to the operating system
selection screen. It is only used post-Setup.
/makelocalsource
lnstrucfs Setup to copy ah installation source files to your local hard disk. Use
/makelocalsource when installing from a CD to provide installafion files when the CD is
not available lafer in the installation.
/copydir:i386
Creates an additional folder within the folder in which the Windows 2000 files are
installed. For example, if the source folder contains a folder called Private_drivers that
has modifications just for your site, you can type /copydir:Private_drivers to have Setup
copy that folder to your installed Windows 2000 folder. So then the new folder locafion
would be C:\Winnt\Private_drivers. You can use /copydir to create as many additional
folders as you want.
36. Your system with two hard drives has not been running very well. After running
diagnostics on the hard drives, you discover the first physical drive, with its
jumper set to Master, has many bad sectors. The decision is made to remove the
first physical drive from the system and just use the remaining drive. After
removing the failing drive and reinstalling the second hard drive as a single drive,
properly configuring the jumpers and cables, you boot the system. The drive that
is now in the system had originally been your only drive and had Windows 98
already installed on it.

When the system boots, you receive the message, Missing Operating System.
When you boot using the boot floppy, you can see that Windows 98 and all critical
files are still on the disk.
What is the most likely reason it will not boot?
1.
2.
3.
4.

COMMAND.COM is corrupt and needs to be reinstalled.


The hard drive needs to be set active in CMOS.
The partition is not set Active. Run FDISK to set the Active Partition. <Correct>
You must run SCANDISK before trying to boot from a disk that has not been used
in a long time.

Explanation:
For an operating system to boot, the primary partition on which it is installed must be
set active. You can only have one active partition. The failing hard drive was booting the
system and it was set active, which implies the second drive was not. Now the second
drive is the only drive in the system, so the primary partition must be set ACTIVE.
Hard drives are prepared for use by an operating system by configuring a Master Boot
Record using a disk partitioning utility such as FDISK. A disk does not need to be
partitioned into multiple partitions, but it could be. FDISK creates three types of
partitions, Primary, Extended, and Logical. For an operating system to be able to boot a
computer, the operating system files must be on the primary partition, but all other
files can be anywhere.
After creating a primary partition, the partition to boot the computer must be set
ACTIVE using the FDISK program. lf it is not set ACTIVE, everything could be installed
correctly, but the system still would not boot.
lf COMMAND.COM was corrupt, you would get the message Missing or Invalid Command
interpreter instead of the Missing Operating System message.
You do not use CMOS to set the ACTIVE partition; you use FDISK.
SCANDISK is not required to run prior to putting a hard drive in service.
37. Which of the following files is NOT used in the Windows 2000 boot process?
1.
2.
3.
4.

HAL.DLL
WIN.C0M <Correct>
NTOSKRNL.EXE
NTDETECT.COM

Explanation:
Files used in the Windows 2000 boot process include: NTLDR, BOOT.INI, BOOTSECT.
OS (optional), NTDETECT.00M, NTBOOTDD.SYS (optional), NTOSKRNL.EXE, HAL.DLL,
SYSTEM, and any device drivers necessary.
NTLDR runs the bootstrap code to start loading the operating system.
NTDETECT.00M parses the system for hardware information and uses if to create
dynamic configuration information for the registry.

NTOSKRNL.EXE is the actual Windows NT/2000/XP operating system kernel.


HAL.DLL is the Hardware Abstract ion Layer software that provides a separation
between manufacturer drivers and the operating system.
WIN.C0M is used in the Windows 9x boot process, but it is NOT used in the Windows
2000 boot process.
38. Julie has brought her laptop to the office and wants to check her e-mail. Her
system is running Windows 2000 Professional with Internet Explorer 6.0. She has
a properly configured network card and, in fact, uses her network card to connect
to the Internet through her DSL modem at home.
Although she plugged her laptop network cable into the office network, she is
unable to connect to the Internet. She was told that she has to configure her
browser to use a proxy server.
Which procedure will properly configure the proxy server?
1. Open the Control Panel 1 Phone and Modem Options. Select a modem to configure.
2. Open the Control Panel 1 Internet Options applet. Select Connections, then LAN
settings. <Correct>
3. Right click My Computer and select Properties. Use the Device Manager.
4. Open the Control Panel 1 Network and DialUp Connections.
Explanation:
In the Control Panel 1 Internet Options applet, you can configure the computer to use a
proxy server by choosing the Connections tab and clicking the LAN settings button.
Enter the address for the proxy server and script file if necessary.
The Device Manager in My Computer can be used to adjust hardware resources but not
proxy servers.
The Phone and Modem Options applet allows you to configure dialing properties and
modem parameters. You cannot configure a proxy server from there.
The Network and DialUp connections are used to configure a DialUp Networking
connection to another system such as an Internet Service Provider (ISP). You cannot
configure a proxy server from there.
39. You are using a Windows 98 computer on an NT network and want to make your
hard drive available to other users on the network. You open My Computer and
select the drive you want to share. When you right-click on it, you find that the
Sharing option is not available.
Which of the following components must you install to share the drive?
1.
2.
3.
4.
5.

Dial-up Adapter
File and Printer Sharing for Microsoft Networks <Correct>
TCP/IP protocol
IPX/SPX protocol
Client for NetWare Networks

Explanation:
To share files between computers, each computer must have a network adapter, be
connected to each other through compatible media, and use a common protocol suite.
Each computer must have both Client for Microsoft Networks and File and Printer
Sharing for Microsoft Networks installed. It File and Printer Sharing for Microsoft
Networks is not installed, the option to share a resource (in this case the hard drive) will
not be available.
The TCP/IP protocol is only needed to access the Internet or other TCP/IP networks.
Similarly, the IPX/SPX protocol is only needed to access an IPX/SPX network, such as a
NetWare network. Since the Windows 98 computer is already on the Windows NT
network, a compatible protocol must have been installed.
The Dial-Up Adapter option is not needed on any computer unless that computer will
access a network through a modem.
Client for NetWare Networks is not necessary to share files or printers on a Windows
network, only to connect to NetWare Servers.
40. Your computer s running Windows 95, and you have just installed an upgrade to an
application called Organize on your system. You open Windows Explorer and display
the contents of the Organize folder to find the actual executable file for
Organize, but no executable files are displayed.
Where can you change the settings to make Windows Explorer display all files?
1.
2.
3.
4.

ToolsMenu
View Menu <Correct>
File Menu
EditMenu

Explanation:
Windows Explorer can be configured to hide specified types of files, to hide the MSDOS path, or to display all files. These options are set in the View Options pull-down
menu. Choose to display all files by clicking the Show All Files check box.
In Windows 98, you can select Folder Options from both the View menu and the Tools
menu. Then you click the View tab and select Show all files.
The Windows 95 Tools Menu contains the Find tool, the Go To tool, and the tool to map
or disconnect a network drive.
The Edit Menu contains the Undo, Cut, Copy, Select, and Paste functions.
The File Menu contains the tools to create folders, files, and shortcuts, to rename files
and folders, and to view/edit the Properties of a file or folder.
41. When purchasing something on the Internet, how can you be sure that the credit
card information you enter s being encrypted to prevent unauthorized interception
of your personal information?
1. lf the URL has the form http://www.measureup.com/paymentsystem.asp, you can be
sure that paymentsystem .asp is encrypted.

2. lf the URL has the form http://www.measureup.com/securepayment.html, you can be


sure that securepayment.html s encrypted.
3. lf the FQDN is listed on the form you use to enter your credit card information, you
can be sure that the site is secure.
4. lf the URL has the form https://www.measureup.com/paymentform.html, you can be
sure that paymentform. html is encrypted. <Correct>
Explanation:
If the secure HTTP protocol is used, the data being transmitted is encrypted, and the
protocol shown in the URL is https:I/. The secure protocol being used is SSL (Secure
Sockets Layer).
The URL shown as http://www.measureup.com/securepayment.html is not secure because
https
is
not
specified.
Likewise,
the
URL
shown
as
http://www.measureup.com/paymentsystem.asp is not secure.
FQDN stands for Fully Qualified Domain Name, which in this case is www.measureup.com.
The FQDN does not specify whether encryption is used or not.
42. Where are the Windows 2000/XP registry files stored?
1.
2.
3.
4.

%System Root%\system32\config <Correct>


%SystemRoot%\system
%SystemRoot%\Registration
%SystemRoot%

Explanation:
If you suspect that the Windows 2000IXP registry is damaged, you can use the
Recovery console commands to restore the registry from the last backup that you
created. The registry consists of five files: Default, Sam, Security, Software, and
System, which are stored in the %SystemRoot%\System32\Config folder. A backup of
the registry is stored in the %SystemRoot%\Repair\RegBack folder every time you back
up the system state.
The registry is not stored in %SystemRoot%\system. This folder contains older drivers
and library files for backward compatibility.
%SystemRoot% is the main Windows folder containing configuration settings (.ini files)
and logs.
%SystemRoot%\Registration contains information on COM+.
43. You must install a network printer on your Windows 98 machine. Your manager has
informed you that the printer has already been installed and shared on a remote
machine.
Which of the following will enable you to install the network printer?
1. Select the name of the remote computer from the Printers applet n Control Panel,
right-click on remote printers name, and click Add.
2. Select the Printers applet from the Control Panel, click Add, select the printer that
you want to install, and click Install.

3. Select the Printers applet from the Control Panel, click the Add Network Printer
con, and follow the wizard through the installation process.
4. Select the name of the remote computer from Network Neighborhood, right-click on
remote printers name, and click Install. <Correct>
Explanation:
To install a Network Printer on your machine, you can select the name of the remote
computer from Network Neighborhood, right-click on the remote printers name, and
click Install. You can also select the Printers applet from Control Panel, click the Add
Printer con, and specify Network Printer when using the Add Printer Wizard to step
through the installation process.
You can access the Add Printer dialog box by going to the Control Panel 1 Printers con or
from the Start Menu Settings 1 Printers. Either way, you choose Add Printer and your
choices will be Local Printer or Network Printer.
From the choices given, the only option that would accomplish the task requested is to
select the name of the remote computer from Network Neighborhood, right-click on the
remote printers name, and click Install. The other choices are incorrect or are missing
steps.
44. E-mail has often been used to spread viruses. Which of the following statements
are true about e-mail viruses and prevention of infection? (Choose all that apply.)
1.
2.
3.
4.

You should use anti-virus software that has an e-mail-checking component <Correct>
You should turn off the preview feature in your e-mail application <Correct>
It is possible to get a virus through an HTML-formatted e-mail. <Correct>
It is safe to open any attachments that do not have VBS in their name.

Explanation:
According to SARC (Symantec Anti-Virus Research Center), e-mail viruses often come in
the form of a script written in readily available scripting languages such as Visual Basic
and JavaScript. The script may be stand-alone (in the form of an attachment) or
embedded into HTML code. When the attachment is opened, or the HTML code viewed,
the script runs via the Windows Script Host.
It is possible to get a virus through HTML-formatted e-mail. You should turn off the
preview feature in your email application, which automatically views HTML-formatted
emails (thus causing the script to run). You should use anti-virus software that has an email-checking component, and configure it to auto-protect your system.
It is NOT safe to open any attachments that do no have VBS in their name. Although
VBS (Visual Basic Script) is associated with many e-mail viruses (VBS.Loveletter,
VBS.BubbleBoy, VBS.Network), it is not the only type of script virus.
45. Which of the following is most likely to be found in a CONFIG.SYS file?
1. C:\WINDOWS\COMMAND\SHARE.EXE
2. @ECHO 0FF
3. FILES=100 <Correct>

4. PATH= C:\; C:\Wl NDOWS; C:\WINDOWS\COMMAND


5. SET TEMP= C:\TEMP
Explanation:
The CONFIG.SYS file contains device settings and the path to device drivers. It does
not contain the actual device drivers. The CONFIG.SYS file does not contain settings
for individual programs (applications), but configures the system to work with installed
hardware. CONFIG.SYS has been replaced by the Windows Registry but is still used for
backward compatibility to old programs in Windows 9x computers. The FILES100 line
ensures there are 100 file handles available for the programs.
The other lines are used in the AUTOEXEC.BAT file, which is a set of instructions that
is read, or parsed, at startup.
The PATH command specifies the location, in the directory tree, of the root directory,
and the Windows and Windows Command directories.
The TEMP line establishes a directory location for temporary file storage.
The @ECHO 0FF command sets the text character echo-to-display properties.
The C:\WINDOWS\COMMAND\SHARE.EXE line runs the SHARE.EXE program at
startup.
46. You are upgrading a PC from Windows 98 to Windows 2000 Professional. How
should you perform the upgrade if you want to keep your current settings
(computer name, network settings, and desktop shortcuts)?
1.
2.
3.
4.

Run Winnt from DOS, and install to a different directory.


You can run Winnt32 from Windows 98, using a typical installation. <Correct>
Run Winnt32 from Windows 98, but install to a different directory.
Run Setup from Windows 98 and choose Do not save current settings when the
option appears.

Explanation:
If you run a Windows 2000 upgrade from Windows 98, using a typical installation, many
of your current settings will be saved. Winnt32 starts the installation program as an
upgrade. Winnt starts the installation program as a clean install.
There is no SETUP program to launch the Windows 2000 upgrade.
If you want to keep your current settings, you must install the new operating system into
the roof folder for the present operating system.
There is no option for Do not save current settings. There is also no Setup program.
47. You want to make your Windows 9x computer go through the startup and
initialization commands one at a time. How can you do this?
1.
2.
3.
4.
5.

Press the F8 key at bootup and select Step-by-Step Confirmation mode. <Correct>
Select Restart in Step Mode from the shut down menu.
Select Restart in Safe Mode from the shut down menu.
Press the Break key at bootup.
Press the F5 key at bootup.

Explanation:
Windows 9x has several startup modes. They are Normal, Logged, Safe, Command
Prompt, or Step-by-Step Confirmation Mode. A menu of these modes can be displayed by
pressing the F8 key when the Starting Windows 9x message is displayed at bootup. The
Step-by-Step Confirmation Mode displays and processes the startup commands line-byliine so you can determine which command is causing a problem.
Pressing the F5 key at bootup takes you straight into Safe Mode without going through
the menu selection. Safe Mode loads only a basic configuration and set of drivers. It
enables you to skip startup files, CONFIG.SYS, AUTOEXEC.BAT, SYSTEM.INI, and
WIN.INI.
However, it still enables you to access Windows 9x configuration files.
You cannot select to restart in Step-by-Step Confirmation Mode from the shut-down
menu. The Break or Pause key simply suspends the startup process.
48. Bart accidentally associated ah .TXT files with Word instead of WordPad, as he
originally intended. In Windows 2000, where can he go to change the association?
(Select all that apply.)
1.
2.
3.
4.
5.

Control Panel 1 Folder Options 1 General


Control Panel 1 Administrative Tools 1 Server Extensions
My Computer C drive Properties
My Computer Tools Folder Options 1 File Types <Correct>
Control Panel 1 Folder Options 1 File Types <Correct>

Explanation:
Bart can change the association of files to extensions by accessing Folder Options
through the Control Panel, My Computer, or Explorer. In Explorer and My Computer, the
option is located under the Tools menu. In Windows 2000, in the Control Panel, Folder
Options is a separate applet. This applet is not available in other Windows versions
except Windows XP.
You cannot change the associations through Administrative Tools 1 Server Extensions.
This is where Front Page Extensions and other more advanced server functionality
options are configured.
You cannot change the associations through the General tab under Folder Options or by
selecting the C Drive Properties.
49. How can you update a driver for a network card in your Windows 2000 system?
(Choose ah that apply.)
1. Control Panel 1 Network Connections 1 Right-click on your connection to the Internet
1 Properties
2. Control Panel 1 Network and Dial-up Connections 1 Local Area Connection 1 Properties
<Correct>
3. Right click on the network card in Device Manager 1 Properties 1 Driver tab Update
Driver button <Correct>

4. Control Panel 1 Internet Options 1 Security 1 Internet 1 Custom Level


Explanation:
After a hardware device is physically installed in a system, the next step is to install the
software necessary to interface with it. This software, called a device driver, is written
to interface with the specific device and operating system. You can view and change
current device drivers from the Device Manager. Right-click on the device in question,
choose Properties, click on the Driver Tab, and then the Update Driver button.
Control Panel 1 Network and Dial-up Connections 1 Local Area Connection 1 Properties
gives you dialog boxes to configure network parameters. You can change network card
drivers by clicking Configure.
Control Panel 1 Network Connections 1 Right-click on your connection to the Internet 1
Properties allows you to configure network parameters in Windows XP (but not Windows
2000). You can change network card drivers by clicking Configure.
Control Panel 1 Internet Options 1 Security 1 Internet 1 Custom Level makes it possible
to change individual security settings, such as enabling or disabling script support for a
particular zone, but you cannot change network card drivers.
50. Which two utilities can be used to check the digital signature of files on Windows
98 and Me? (Select two.)
1.
2.
3.
4.
5.

System File Checker<Correct>


Driver Signing applet
Event Viewer
File Signature Verification Utility <Correct>
Dr. Watson

Explanation:
Both SF0 (System File Checker) and SIGVERIF (File Signature Verification utility) are
included in Windows 98 and Me to check digital signatures of files. SFC is a commandline utility, while SIGVERIF is a Windows utility.
You can configure how the operating system responds to unsigned files (Ignore, Warn,
Block) in the Driver Signing applet, which you can access through Control Panel 1 System
1 Hardware Device Manager. The Driver Signing applet does not check the digital
signature of files.
Event Viewer is a log utility in Windows NT/2000/XP that keeps track of significant
system events and problems (such as boot and application initialization processes). You
cannot check the digital signature of files from the Event Viewer.
Dr. Watson is a utility to monitor and trap errors in log files created by applications and
takes a snapshot of the system when a program crashes to assist in troubleshooting the
fault. It does not have any file verification capability.
51. You want to manually backup your Windows 98 Registry before you modify it.
Which programs can you use to back up the Registry? (Select ah that apply.)
1. SCANREGW.EXE <Correct>

2.
3.
4.
5.

REGEDT32.EXE
REGBACK.EXE
SCANREG.EXE <Correct>
REGEDIT.EXE <Correct>

Explanation:
The preferred method of backing up the Registry in Windows 98 is to use
SCANREG.EXE, also known as the Registry Checker. It will scan the Registry for errors
before asking it you would Iike fo backup the Registry. It stores the backups in the
C:\WINDOWS\SYSBCKUP folder. SCANREG.EXE can be run from the DOS Prompt.
SCANREGW.EXE can also be used to backup the Registry. Windows uses this file at boot
to check and backup the Registry. It must be run from within Windows.
Another method of backing up the Registry in Windows 98 is to run the Registry Editor
(REGEDIT.EXE), select ah the keys, and then export them to a file. Restoring consists
of importing the file.
REGBACK.EXE is not a Windows program.
REGEDT32.EXE is the Registry Editor For Windows NT and Windows 2000. It will not
work on a Windows 98 system.
52. Sams computer displays a list of operating systems for 30 seconds before loading
Windows 2000. He has decided that he would like that list to display for 60
seconds instead of 30.
Which file stores that setting, and how does Sam modify the file?
1. That setting is stored in ntbootdd.sys. Sam should modify the file by going to Control
Panel 1 System 1 Advanced 1 Startup and Recovery.
2. That setting is stored in boot.ini. Sam should modify the file by going to Control Panel
1 System 1 Advanced 1 Startup and Recovery. <Correct>
3. That setting is stored in boot.ini. Sam should modify the file by going to Control Panel
1 System User Profiles.
4. That setting is stored in ntbootdd.sys. Sam should modify the file by going to Control
Panel 1 System User Profiles.
Explanation:
The boot.ini file contains the list of available operating systems and the parameters to
start them. This file determines what is on the list, how long the list displays, and what
the default setting is. Windows (specifically Ntldr) uses the Boot.ini file to determine
the operating system options to display during the startup (boot) process. Boot.ini is
flagged as a read-only system file by default.
To change the contents of this file easily, use the System tool in Control Panel. Although
the file can be modified in a text editor, the recommended method of editing the file is
to go to the Control Panel 1 System 1 Advanced 1 Startup and Recovery. This applet will
ensure that the parameters are set correctly in the file.
These settings are not contained in ntbootdd.sys. Windows NT/2000/XP uses
ntbootdd.sys on a system with a SCSI boot device that has its firmware disabled to

enable and load the SCSI interface. If the system does not have SCSI devices, this file
is not installed.
You cannot edit the Boot.ini file by going to the User Profiles applet.
53. How can you display a list of startup options available on a Windows 9x computer?
(Choose two.)
1. Hold the Shift key down as you press the F8 key when the Starting Windows
message appears on the screen.
2. Press the F8 key when the Starting Windows message appears on the screen.
<Correct>
3. Press the CTRL + ALT + DEL keys when the Starting Windows message appears on
the screen.
4. Press the F5 key when the Starting Windows message appears on the screen.
5. Hold the CTRL key down during bootup. <Correct>
Explanation:
Normally, when you load Windows, the message Starting Windows appears and then the
operating system loads. However, you can force the startup menu to appear by pressing
the F8 key or holding down the CTRL key during bootup.
Pressing the CTRL + ALT + DEL keys when the Starting Windows message appears on
the screen will cause the system to reboot.
Pressing the F5 key when the Starting Windows message appears on the screen will
force Safe Mode. Holding the Shift key down as you press the F8 key when the Starting
Windows message appears on the screen will force the startup into step-by-step
confirmation.
54. Which of the following file extensions are associated with executable files?
(Choose alI that apply.)
1.
2.
3.
4.
5.
6.
7.
8.

.DLL
.EXE <Correct>
.INI
.DOC
.COM <Correct>
.DAT
.BAT <Correct>
.SYS

Explanation:
A file extension s one to three characters at the end of a filename. The extension
indicates the type of file and is separated from the rest of the filename by a period (.).
The Windows operating system associates file extensions with file types. You can change
the associations in Explorer by choosing File 1 Open With and selecting Always choose
this program fo open these files. .EXE, .COM, and .BAT are the only extensions
associated with executable files.

.DAT is associated with data files. .INI is usually a file containing initialization settings.
.DOC is associated with Word or WordPad. .SYS is usually a driver. .DLL is a Dynamic
Link Library.
55. You have just installed a new 40GB ATA-1OO hard drive on a Pentium 4 system.
The new drive is the only drive in the system, and you want to load an operating
system.
What utility must you run from a floppy disk to prepare the hard drive before you
can put anything on the drive?
1.
2.
3.
4.
5.

SETUP
FORMAT
SCANDISK
FDISK <Correct>
DEFRAG

Explanation:
A new hard drive does not have an operating system and is not bootable. Before a hard
drive can be formatted or written to, if must be partitioned. The FDISK utility can
create or remove partitions and set the active partition on a hard disk. It must be run
from floppy or from a bootable CD-ROM because the hard disk is not accessible befare a
partition exists.
After FDISK is used to create one or more partitions on a drive, you must set an active
partition. Only the active partition is able to boot the system. Then the partitions need
to be formatted. All new hard drives, including ATA-1OO drives, are low-level formatted
at the factory and rarely, if ever, need to be low-level formatted by the user.
The SETUP utility in DOS or Windows is used to install the operating system onto the
active partition.
A new hard drive does not have any files on it, so decrementing (running DEFRAG.EXE) is
not necessary.
The SCANDISK.EXE utility is used to find and correct problems such as lost clusters
(pieces of files that have been disassociated from the parent file) on a hard disk. It can
also detect bad sectors on a disk, try to recover any data contained in the bad sectors,
and lock out the bad areas from future use.
56. You need to start an FTP session with an FTP server beginning at the command
line. Which command can you use to establish a connection to a server at IP
address 135.61.85.1?
1.
2.
3.
4.

LOGIN: 135.61.85.1
OPEN 135.61.85.1 <Correct>
GET 135.61.85.1
FTP 135.61.85.1

Explanation:
FTP can be initiated from a DOS, Windows 9x, or Windows NT/2000/XP command

prompt provided a connection to a network or the Internet is established first. To begin


an FTP session, you first type FTP from the command line and you will get an FTP>
prompt. To establish a connection with an FTP server at 135.61.85.1, from the FTP>
prompt, type OPEN 135.61.85.1.
The LOGIN command is the response the server will send when you try to connect to it.
At the LOGIN: prompt, you would enter your user name or ID.
The GET command is used after you have logged on and want to copy a file from the
remote computer to your computer.
After you are at the FTP> prompt, you would not use the FTP command again.
57. After installing a new sound card driver, your Windows Me system fails to complete
a normal boot up. You have been successful starting in Safe Mode. You want to
load the Automatic Skip Driver (ASD) Agent to skip drivers that may be causing
the system to stall on startup.
Where can you find the ASD Agent to run it on the next boot?
1.
2.
3.
4.

ASDA is found in the Device Manager.


ASDA can be configured when you run SCANREG.
ASDA is found on the Edit menu of Regedit
ASDA is found on the Tools Menu of the System Information window in System
Tools. <Correct>

Explanation:
The Automatic Skip Driver (ASD.EXE) Agent is a Windows utility that flags problem
drivers that have caused Windows to stop responding. Once marked, they can
subsequently be bypassed. To use ASDA, find the System Tools group under Accessories
on the Start Menu. In System Tools start the System Information tool, click on the
Tools Menu, and choose Automatic Skip Driver Agent. Alternatively, you can run
ASD.EXE in Windows 9x from START - RUN then type ASD and click OK. Doing so
brings up the ASD utility. From this screen, you can see which tasks failed to respond. lf
you check a box next to a particular task, the next time you boot Windows, the task wiIl
not load. In this way, ASD can be used to prevent lockups during boot.
The Control Panel 1 System applet opens the System Properties dialog box. It contains
the Device Manager, which is used to remove or edit the properties of devices installed
on your computer.
You cannot start the ASD Agent from the Device Manager.
Use SCAN REG.EXE, also known as the Registry Checker to scan the Registry for errors
before making a backup the Registry. It stores the backups in the
C:\WINDOWS\SYSBCKUP folder. SCANREG.EXE can be run from the DOS Prompt. You
cannot start the ASD Agent from SCANREG.
SCANREGW.EXE can also be used to backup the Registry. Windows uses this file at boot
to check and backup the Registry. It must be run from within Windows.
REGEDIT.EXE is the Windows Registry Information Editor. It makes it easier to edit
the keys and entries in the Windows registry. You cannot start the ASD Agent from
REGEDIT.

58. Kerry s using Windows 98 and wants to change the name of a folder named
Reports to Weekly Reports.
Which of the following will allow Kerry to perform this task?
1.
2.
3.
4.

Right-click on the folder in Windows Explorer and click Rename. <Correct>


Select the folder n Windows Explorer, then click View Options 1 Rename.
Right-click on the shortcut icon for the folder on the desktop and click Rename.
Select the folder in Windows Explorer, then click Tools Options 1 Rename.

Explanation:
To rename a file or a folder, right-click on the folder in Windows Explorer and click
Rename. You can also select the file or folder from Windows Explorer or My Computer
and click File 1 Rename.
You can rename a shortcut icon on the desktop, but it does not change the name of the
actual file or folder.
59. You have a system with two hard drives. The C: drive has very little disk space
available and you want to move the temporary files folder from C: to D:.
How can you determine where the Temporary folder s located?
1.
2.
3.
4.

Edit the System.ini file and search for TEMP.


Enter the command SET from a command line. <Correct>
From the START menu choose RUN and type COMMAND at the command line.
Edit the Win.ini file and search for TEMP.

Explanation:
The way to determine the location of the temporary files is to determine the values set
for the TEMP and TMP environment variables. An environment variable is a setting that
stays in effect throughout a Windows or DOS session. It is set by an entry in an INI
file, the Registry, or one of the DOS configuration files (CONFIG.SYS or
AUTOEXEC.BAT).
To find out where the temporary files are stored in your machine, start a command-line
session (choose START 1 RUN and type CMD or COMMAND). At the command prompt,
type SET. This command returns all the environment variables for the system. Look for
TEMP= or TMP= or both. These variables point to the directories on your hard disk
where you will find the temporary files.
START 1 RUN 1 Command opens up a Command Prompt window. It does not tell you where
the temporary files are stored.
The WIN.INI file contains configuration information and specifies startup files that run
during initialization. The SYSTEM.INI file is used by Windows 9x to work with installed
hardware. It stores configuration and default settings. These two files are needed for
older 16-bit (non-Windows 9x) applications to set system variables within Windows 9x.
60. Which of the following s a software infestation that makes its way into a
computer disguised as something else, like a game or screen saver?

1.
2.
3.
4.

Worm virus
Trojan Horse virus <Correct>
Macro virus
Boot Sector virus

Explanation:
Deliberately planted computer bugs or infestations are categorized by the way they
travel, replicate, and work. A basic virus needs a host program to which it can attach. It
usually replicates when some action is performed.
A boot sector virus hides in the Master Boot Record of a floppy or hard disk and spreads
to other programs once it is on the computer.
A Trojan Horse is an infestation that makes its way into a computer disguised as
something else, like a game, free software gift, or a screen saver. The computer is
infected when a user opens the gift.
A worm is a bug that replicates as long as the computer is on, does not need a host
program, and can travel throughout a network.
A virus that is contained in the Macro commands of a word processing document is called
a Macro virus.
61. Windows 98 provided a utility named EXTRACT to decompress files on the Installation
CD-ROM. What s the name of this utility in Windows 2000?
1.
2.
3.
4.

EXPAND <Correct>
PKZIP
WINZIP
EXTRACT

Explanation:
The utility used to decompress cabinet (.cab) files in Windows 2000 is EXPAND. Expand
has several switches: -r is used to rename the expanded files, -d displays a list of files
without expanding them, and -f:files specifies specific files you want to expand.
Wildcards can be used. You can specify both the source and the destination.
Although EXPAND performs the same functions as EXTRACT, the name did not remain
the same for Windows 2000.
WINZIP and PKZIP are decompression utilities but are not Windows utilities.
62. What command would make the file C:\COMMAND.COM hidden and read only?
1.
2.
3.
4.

ATTRIB
ATTRIB
ATTRIB
ATTRIB

C:\COMMAND.00M
C:\COMMAND.00M
C:\COMMAND.00M
C:\COMMAND.00M

+RH
+R +H <Correct>
/RH
/R /H

Explanation:
To make the file C:\COMMAND.COM read only and hidden, use the command
ATTRIB C:\COMMAND.COM +R +H You can turn on an attribute using a + before the

attribute, such as, +R, +H, +A, +S. To turn off an attribute, use a - before the attribute,
such as, -R, -H, -S, -A.
Files have four primary attributes that can be used to control how the file can be used in
a Windows system. The Read Only attribute sets a file to read only status, preventing
users from changing the file. It can be read but not changed.
The Hidden attribute makes the file invisible from the DOS prompt and in Windows
Explorer unless the default view settings are changed to display Hidden files. It a file is
hidden, it is less likely to be moved or deleted by novice computer users.
The Archive attribute is used by backup programs to determine when a file has been
backed up and when it needs to be backed up.
The System attribute is assigned to system files to make it more difficult to move or
delete critical system files.
63. You are asked to configure tighter Internet security for your systern without
disrupting other network users in the office.
What security zone would you use to identify the Web-based applications on your
local network?
1.
2.
3.
4.

Internet
Trusted Sites
Local Intranet <Correct>
Restricted Sites

Explanation:
Many of the Internet security problems that have been discovered are related to the
way that Internet Explorer interacts with Windows. There are scripts on the Internet
that can modify your Windows installation in some way and possibly allow the introduction
of a virus. To prevent against that possibility, you should change Internet Explorers
security settings as well as disable script support.
To change security settings for Internet Explorer, use the Internet Options applet in
the Control Panel. Select the Security tab. There are four security zones: Internet,
Trusted Sites, Restricted Sites, and Local intranet. Security is controlled separately for
each zone.
Trusted Sites are Web sites that you completely trust. Therefore, you can set the
security settings lower for this domain.
Restricted Sites is a zone for all those sites that could potentially damage your
computer or install malicious code onto your computer.
Local intranet is the zone that contains Web sites you access using UNC names (such
as \\server\sharenarne) or Web site URLs without dots (such as http://server).
Internet is a zone that contains all sites that dont fit into any of the other zones.
64. You are assembling a new computer and installing the new hard drive and Windows
9x. You want to minimize wasted hard disk space.
Which of the following file systems will accomplish this?
1. NTFS5

2. FAT16
3. HPFS
4. FAT32 <Correct>
Explanation:
Hard disks are divided into cylinders and sectors during the formatting process.
Cylinders are subdivided by the sector boundaries. One sectors worth of one cylinder is
called an allocation unit. It is within the allocation unit that files are stored. File sizes
are often larger than one allocation unit. Allocation units are combined into clusters
based on the operating systems capability. The smallest memory unit on a disk that DOS
and Windows can address is a cluster. Consequently, space between the end of a file and
the end of that cluster cannot be used.
Under FAT16, which originated with DOS, the cluster size increases with disk size. The
maximum cluster size FAT16 supports is 32KB. FAT16 can only address a maximum of
216 (2 to the l6th power) clusters (65,536) Therefore, the largest drive size FAT16 can
address is 2 GB (for a 1-2 GB hard drive, the cluster size is between 16KB and 32KB).
FAT32 can address 228 (268,435,456) clusters, and each cluster has a maximum size of
32KB. It is only 228 because 4 bits out of every 32 are reserved for other uses. The
number of clusters a file system can address affects the cluster size. For example, a
2GB hard disk formatted FAT16 is subdivided into 65536 clusters, which results in a
cluster size of 32KB. An 8GB hard disk formatted FAT32 is subdivided into 268,435,456
clusters of 32KB each. Cluster size grows as the size of the disk gets larger. FAT32
allows the cluster sizes to remain small for a given disk size. A 2GB disk formatted FAT1
6 yields 32KB clusters, but the same disk formatted FAT32 yields 4KB clusters. With
FAT32, there is less wasted space between the end of a file and the end of the last
cluster it occupies.
NTFS 5 (New Technology File System) can be used with Windows NT with service pack 4
or greater, Windows 2000, and Windows XP, but it is not compatible with Windows 9x.or
Windows NT with service pack 3 or earlier.
HPFS (High Performance File System) is used in the IBM OS/2 operating system.
65. Which of the following problems can keep Windows 98 from being able to load?
(Select two.)
1.
2.
3.
4.
5.

Missing or corrupt HIMEM.SYS <Correct>


Error in CONFIG.SYS line xx
HIMEM.SYS is not loaded <Correct>
A device referenced in SYSTEM.INI could not be found
lncorrect DOS version

Explanation:
Windows 9x is backward compatible with older 16-bit DOS and Windows 3.1 device
drivers. HIMEM.SYS is necessary for Windows 9x fo load, but Windows 9x does not
need CONFIG.SYS or AUTOEXEC.BAT to work. Normally, lO.SYS loads HIMEM.SYS so
that Windows 9x can load, but if you configured a CONFIG.SYS file fo load

EMM386.EXE, you must include the HIMEM.SYS me before it so that the extended
memory manager finds HIMEM.SYS already loaded.
Neither an incorrect DOS version nor an error in the CONFIG.SYS file will keep
Windows 9x from loading, although DOS or some associated hardware may not work
properly. Similarly, if a device referenced in SYSTEM.INI could not be found, that
device will not work until the SYSTEM.INI problem has been corrected. This problem is
often seen when a device is removed from the system and the software is still
installed/configured.
66. Which of the following programs will start a Windows 98 installation?
1.
2.
3.
4.

WINNT.EXE
SETUP.EXE<Correct>
INSTALL.EXE
WINNT32.EXE

Explanation:
The program that s used to install Windows 98 is SETUP.EXE.
INSTALL.EXE is sometimes used to install programs and was commonly used before
Windows 95.
WINNT.EXE is used to install Windows NT/2000/XP as a clean installation.
WINNT32.EXE is used to install Windows 2000/XP as an upgrade to a previously
installed version of Windows.
67. You are installing Windows XP onto a computer on your network. When you boot it
up, you get an error message saying that a service is not starting properly.
Which Windows XP tool can you use to read a log file of such system errors?
1.
2.
3.
4.

Event Viewer <Correct>


Performance Monitor
NETSTAT
Network Monitor

Explanation:
Event Viewer is a Windows NT/2000/XP troubleshooting tool that keeps track of three
log files:
System, Security, and Application. This tool is extremely helpful in finding startup
problems, as well as problems any service may have during initialization.
NETSTAT is the utility that allows the user to view current active connections and
protocol-related statistics for the local host. It provides no error logs.
Network Monitor in Windows NT/2000/XP allows the user to capture, view, and analyze
datagrams sent and received at the local host.
Performance Monitor is used primarily to view statistics of system resources like disk
accesses, processor usage, and memory reads/writes. The items monitored are called
objects, and these objects are measured with counters.

68. You are troubleshooting a customers problem with his printer. He s using a
Pentium-based PC running Windows 98, and he is using an ink-jet printer connected
to the parallel port.
The customer says that when he prints a document, his computer Lock s up during
the print process, and he has to wait while the document prints. After the
document prints, his computer works normally.
Which of the following configuration settings can you alter to fix the problem?
1.
2.
3.
4.

Data format settings


Spool settings <Correct>
Port settings
Separator settings

Explanation:
When you print a document from a DOS-based system, the computer must stop
processing the current application and wait for the printer to print. In Windows 98 and
later versions, however, the CPU can send print jobs to the print queue (or to the print
server, in the case of a network printer) so that if can continue running the application it
is working on. This is called print spooling.
You can return control of the computer to the user more quickly by configuring the
computer to spool print jobs and to start printing after the first page is sent to the
printer. The spool settings are available through the Printer Properties dialog box.
In a Windows 9x system, print jobs start out as Enhanced Metafile format (EMF) and
must be converted to RAW format for the actual print mechanism in the printer.
Converting (rendering) EME format to a RAW format file takes processing time. lf the
printer is able to do the conversion, print jobs can be sent (or spooled) to the printer in
EME format so that the computer can skip the rendering process and return to the
current application more quickly. Optimizing the data format settings (EME or RAW
format) for the particular printer can speed up the printing process.
69. You have just installed a faulty sound card driver that is being loaded during
startup of your Windows Me computer and is keeping Windows Me from booting up.
You want to remove it.
How can you load a basic version of Windows Me to correct the problem?
1.
2.
3.
4.

Press the F8 key at bootup to start in Safe Mode.


Press the F5 key at bootup to start in Step-by-Step Mode.
Select Restart in DOS Mode from the shut down menu.
Press the F5 key at bootup to start in Safe Mode. <Correct>

Explanation:
Windows 9x has several startup modes. They are Normal, Logged, Safe, Command
Prompt, or Step-by-Step Confirmation Mode. A menu of these modes can be displayed by
pressing the F8 key when the Starting Windows 9x message is displayed at bootup.
Simply select the desired mode from the menu.
Windows Me does not support starting to Command Prompt Only.

Pressing the F8 key will display the Startup Menu but not necessarily start you in Safe
Mode. The best choice is to press the F5 key to start directly into Safe Mode.
Safe Mode loads only a basic configuration and set of drivers. It enables you to skip
startup files, CONFIG.SYS, AUTOEXEC.BAT, SYSTEM.INI, and WIN.INI. However, it
still enables you to access Windows 9x configuration files. You can boot straight to Safe
Mode by pressing the F5 key at bootup.
The Step-by-Step Confirmation Mode displays and processes the startup commands lineby-line so you can determine which command is causing a problem, but it does not load a
basic version of Windows 9x.
You cannot select to restart in Safe Mode or Step-by-Step Confirmation Mode from the
shutdown menu.
70. When connecting your computer to the Internet through a DSL connection, which
protocol would you expect to be used on the DSL connection?
1.
2.
3.
4.

PPP
DHCP
PPPoE <Correct>
FTP

Explanation:
A computer connects to a DSL-enabled phone line through a DSL modem. The computers
Ethernet network card connects directly to the modem, and the modem connects
directly to the phone line. The connection between the NIC and the broadband device
most likely uses Point-to-Point Protocol over Ethernet (PPP0E), a protocol specifically
designed to support broadband connections. PPPoE is included in Windows XP.
Point-to-Point Protocol (PPP) is used when establishing a Dial-Up connection from one
computer to another.
File Transfer Protocol (FTP) is used to establish a connection between an FTP server and
host. It is used to transfer files over a network.
Dynamic Host Configuration Protocol (DHCP) assigns IP addresses to clients.
71. Which of the following are the minimum requirements to install Windows 2000
Professional on a PC? (Choose three.)
1.
2.
3.
4.
5.
6.

64MB RAM
32MB RAM <Correct>
650MB available disk space <Correct>
Pentium 233 or equivalent
Pentium 133 or equivalent <Correct>
2.0GB available disk space

Explanation:
The minimum system requirements to install Windows 2000 Professional are Pentium
133MHz or higher CPU, 32MB RAM, 650MB available disk space. You also need a video

card capable of VGA resolution or higher, keyboard, mouse, or other pointing device, CDROM or DVD-ROM, and a network adapter card it you are installing over the network.
72. Which of the following s used to check a disk for surface errors and logical errors
like cross-linked files in Windows 9x?
1.
2.
3.
4.

DEFRAG
SCANDISK <Correct>
CHKDSK
SCANREG

Explanation:
In Windows 9x, the SCANDISK utility checks disks for physical and logical errors. You
can run it in the graphical interface or through the command prompt as SCANDISK.EXE.
ScanDisk replaced the older CHKDSK command in DOS. Windows NT, 2000, and XP ah
use an updated version of CHKDSK consistent with NTFS partitions and can only check
system partitions during bootup.
DEFRAG is the command-line equivalent of running the Disk Defragmenter utility.
SCANREG is the utility you use to check the registry for problems. In Windows 9x,
SCANREG runs on startup, checking the registry for errors and restoring the registry
from automatic backups if it finds problems.
73. Which of the following best describes how to change the modem used for a Dial-Up
Networking connection on a Windows 2000 computer from the Network and Dial-Up
Connections applet?
1. Right-click on the connection and choose Create Copy.
2. Right-click on the connection and choose Properties. Click Configure and choose
another modem.
3. Choose Advanced 1 Dial-Up Preferences.
4. Right-click on the connection and choose Properties. Choose another modem from the
Connect Using box. <Correct>
Explanation:
To change the modem used for a Dial-Up Networking Connection, right-click on the
connection.
Choose Properties. Choose another modem from the Connect Using box.
Right-clicking the connection and choosing create a copy of the connection will not alter
the modem.
Choosing configure from the connections properties dialog box sets hardware
preferences for the modem already selected. It does not permit you to select another
modem.
Dial-Up Preferences sets your Auto-Dial and Callback connections.
74. Which of the following s a software infestation that does not need a host program
or file to replicate and travel through a computer or network?

1.
2.
3.
4.

Trojan Horse
Worm <Correct>
Boot Sector virus
Macro virus

Explanation:
Deliberately planted computer bugs or infestations are categorized by the way they
travel, replicate, and work. A basic virus needs a host program to which it can attach. It
usually replicates when some action is performed. A boot sector virus hides in the
Master Boot Record of a floppy or hard disk and spreads to other programs once it is on
the computer.
A worm is a bug that replicates as long as the computer is on. It does not need a host
program, and it can travel throughout a network.
A Trojan Horse is an infestation that makes its way into a computer disguised as
something else, like a game, free software gift, or a screen saver. The computer is
infected when a user opens the gift.
A virus that is contained in the Macro commands of a word processing document is called
a Macro virus.
75. A virus has damaged the Master Boot Record of your hard drive, making the
system unbootable. What command can you use to replace the Master Boot Record
with a valid one without losing any data on the disk?
1.
2.
3.
4.

FORMAT C:
DEFRAG C:
FDISK/MBR<Correct>
SCANDISKC:/P

Explanation:
FDISK /MBR is used to replace a damaged Master Boot Record on an otherwise good
drive. It will not cause any loss of data.
FORMAT O: will actually cause ah data on the drive fo be erased.
SCANDISK O: IP scans a hard drive for errors. The IP option causes Scandisk to scan
the drive but not fix anything.
DEFRAG O: examines a hard drive for fragmented files and rewrites them back fo the
disk in contiguous clusters.
76. Which feature of Windows XP permits Dynamic Host Configuration Protocol (DHCP)
clients to automatically self-configure an IP address and subnet mask when their
DHCP server cannot be found?
1.
2.
3.
4.

IPCONFIG
APIPA <Correct>
WINS
DNS

Explanation:
Automatic Private IP Addressing (APIPA) is a feature of Windows 98/2000/XP that
permits DHCP clients to automatically self-configure an IP address and subnet mask
when their DHCP server cannot be found. When Windows is booting, if it cannot find a
DHCP Server, APIPA configures an IP address for the computer automatically. This
address is in the range 169.254.0.1 to 169.254.255.254 with a subnet mask of
255.255.0.0. The client uses this address until the DHCP server becomes available.
Domain Name Service (DNS) is used to resolve a fully qualified domain name to an IP
address. When one computer needs to establish a communication session with another,
the sending computer queries a DNS server for the IP address of the destination host.
The DNS server responds with the IP address, which is used by the source computer to
establish the connection. It does not assign IP addresses to clients.
Windows Internet Name Service (WINS) resolves NetBIOS names to IP addresses in a
Windows network. It does not assign IP addresses to clients.
IPCONFIG is a utility used by Windows 2000 to view current IP configuration
information. It does not assign IP addresses to clients.
77. Which TCP/IP utility allows a user to perform a manual DNS query of any DNS
database?
1.
2.
3.
4.

WINIPCFG
NSLDOKUP <Correct>
TRACERT
IPCONFIG

Explanation:
NSLOOKUP is a TCP/IP utility that allows a user to perform a manual Domain Name
System (DNS) query of any DNS database. You would use this to verify that DNS name
resolution is functioning properly.
WINIPCFG is a graphical utility found in Windows 9x that allows you to get information
about your IP configuration. It also allows you to release a Dynamic Host Configuration
Protocol (DHCP) lease and request a new one.
IPCONFIG does the same thing as WINIPCFG, but for Windows NT/2000/XP.
IPCONFIG can only be run from the command line.
TRACERT is a utility that allows you to trace the path information fakes to get from one
machine to another as it moves from network to network.
78. You are using the Windows 2000 Recovery Console to help repair a serious problem.
You cannot remember the command you need. What command will provide you with
information about other commands?
1.
2.
3.
4.

H
Help<Correct>
Command
?

Explanation:
Windows 2000 introduced the Recovery Console to perform troubleshooting and repair
tasks. You can access this command-line interface through either the Windows 2000 CD
or the Setup disks. If you have installed the Recovery Console previously, you can access
it directly during Startup.
Several of the Recovery Console commands, particularly those associated with navigation,
were originally DOS commands. The following are a sample of Recovery Console
commands:
Cd - Changes the current directory.
Chkdsk - Checks computer disks for errors.
Cls - Clears the screen.
Enable - Enables a system service or device driver.
Fixboot - Repairs the boot sector.
The Help command will provide you with information about the other commands.
H, ?, and Command will not provide you with this information.
79. You want to display the contents of the WIN.INI file on your monitor in a DOS
session. Which command can you use to do this?
1.
2.
3.
4.

TYPE C:\WINDOWS\WIN.INI <Correct>


PRINT C:\WINDOWS\WIN.INI >PRN
ECHO C:\WINDOWS\WIN.INI
COPY C:\WINDOWS\WIN.INI

Explanation:
TYPE C:\WINDOWS\WIN.INI would display the contents of this file on the screen. If
you want to print the file, you could use the command TYPE C:\WINDOWS\WIN.INI
>PRN.
PRINT C:\WINDOWS\WIN.INI >PRN would actually send the file specified directly to
the printer.
Use the ECHO command to turn command echoing on or off. With ECHO on, every time
you type a command, what you typed is written to the screen echoing your command. This
is generally annoying so you can turn echo off using ECHO 0FF. With @ECHO 0FF, even
the ECHO 0FF command is not echoed.
COPY is used simply COPY files from one location to another. XCOPY can copy subfolders
too, and to do so you must use the /S switch.
These commands are not case sensitive.
80. What s the purpose of the Automatic Skip Driver utility in Windows 98 and Me?
1. It helps prevent skipping on CDs and DVDs by storing upcoming data.
2. Setup uses it fo determine what to load in Safe Mode.
3. Windows uses this driver to mark bad areas on a hard drive and to skip them during
subsequent writes to the hard drive.

4. It flags drivers that have caused Windows to stop responding so that they can be
bypassed during subsequent system loads. <Correct>
Explanation:
The Automatic Skip Driver (ASD.EXE) is a Windows utility that flags problem drivers
that have caused Windows to stop responding. Once marked, they can subsequently be
bypassed. To use ASD.EXE in Windows 9x go fo START 1 RUN then type ASD and click
OK. Doing so brings up the ASD utility. From this screen, you can see which tasks failed
fo respond. If you check a box next to a particular task, the next time you boot
Windows, the task will not load. In this way, ASD can be used to prevent Lock ups during
boot.
ASD.EXE is not used to prevent skipping on CDs or DVDs orto mark bad areas on a hard
drive. Setup does not use this file to determine what to load in Safe Mode.
81. Which of the following are valid ways fo create new folders using My Computer?
(Choose ah that apply.)
1.
2.
3.
4.
5.

On the menu, click File 1 New 1 Folder. <Correct>


Press the CTRL + Shift + F1 keys.
Right-click on an empty area of the window and choose New 1 Folder. <Correct>
Press the CTRL + N keys.
On the menu, click File 1 insert Folder.

Explanation:
There are two ways to create a new folder using My Computer. You can choose File, then
New, and then Folder from the menu bar or you can right-click on an empty area of the
window and choose New and then Folder.
In many programs (like Microsoft Internet Explorer), pressing the CTRL+N keys will
open a new window.
CTRL+Shift+F1 is not a valid keyboard shortcut in Windows.
File 1 insert Folder is not a valid Windows menu option.
82. After copying ah files and subfolders from C:\MYDOCS to the D: drive, you want
to delete the folder C:\MYDOCS and ah files and folders in there.
What command wound accomplish this most efficiently?
1.
2.
3.
4.

DELTREE C:\MYDOCS\*.*
DEL C:\MYDOCS
DELTREE C:\MYDOCS <Correct>
ERASE C:\MYDOCS

Explanation:
DELTREE can be used to remove entire directory trees from the disk. With DELTREE
you can remove MYDOCS and all files and subfolders under MYDOCS in one operation. To
delete MYDOCS and all files and folders under MYDOCS type DELTREE C:\MYDOCS.

DELTREE C:\MYDOCS\*.* would not delete the MYDOCS folder but it would delete all
files and folders under MYDOCS.
Both DEL C:\MYDOCS and the older version of the same command, ERASE C:\MYDOCS,
would not delete the folder MYDOCS since DEL only deletes files. In this example it
would assume MYDOCS is a filename, not a folder name.
83. A technician has just assembled a new computer and s preparing to install a
Windows 9.x operating system. Which of the following is the FIRST step in
preparing the hard drive for the installation of Windows 9.x?
1.
2.
3.
4.
5.

Defragmenting
Low-level Formatting
Optimizing
High-level Formatting
Partitioning <Correct>

Explanation:
A new hard drive does not have an operating system and is not bootable. Before a hard
drive can be formatted or written to, if must be partitioned. The FDISK utility can
create or remove partitions and set the active partition on a hard disk. It must be run
from floppy or bootable CD-ROM because the hard disk is not accessible before a
partition exists.
After FDISK is used to create one or more partitions on a drive, you must set an active
partition. Then the partition or partitions need to be formatted. Ah new hard drives are
low-level formatted at the factory and rarely, if ever, need to be low-level formatted by
the user. Ah new drives must be high-level formatted (simply referred to as formatted),
but this cannot be done until the disk is partitioned.
Since the data clusters that make up a fragmented file are stored in different physical
locations on the disk, defragmenting a disk improves file access speed by finding files
that are fragmented, and relocating all clusters associated with them info contiguous
disk space. Optimizing or defragmenting a new drive is unnecessary since if contains no
files thaf can be fragmented.
84. Which of the following s NOT a common file extension for graphic files?
1.
2.
3.
4.

JPG
GIF
BMP
ZIP <Correct>

Explanation:
GIF (Graphics Interchange Format), BMP (Windows Bitmap), and JPG (Joint
Photographic Experts Group) are all common file extensions for graphics. A file
extension is one to three characters at the end of a filename. The extension indicates
the type of file, and is separated from the rest of the filename by a period (.)
The Windows operating system associates file extensions with file types. You can change

the associations in Explorer by choosing File 1 Open With and selecting Always choose
this program to open these files.
ZIP is not a common extension for a graphics file, although TIF (Tag Image File Format)
is. ZIP is the common extension used by a file compression utility known as WINZIP.
85. On your Windows 98 computer, you have an MS-DOS program named
THATPRG.EXE that needs special parameters n the AUTOEXEC.BAT file to run.
You have created a special AUTOEXEC.BAT file and put it in the
C:\THATPRG\RUN folder.
Which of the following is the correct method for specifying the alternative
AUTOEXEC.BAT file?
1. Locate THATPRG.EXE. Right-click on it and choose Properties 1 Program 1 Advanced.
Change the Autoexec file name to C:\THATPRG\RUN\AUTOEXEC.BAT. <Correct>
2. Use a text editor to create DOSSTART.BAT in the C:\THATPRG\RUN folder. Edit
the first line of the file to be C:\THATPRG\RUN\AUTOEXEC.BAT.
3. Open C:\Windows\DOSSTART.BAT. Edit the first line of the file to be
C:\THATPRG\RU N\AUTOEXEC. BAT.
4. Locate THATPRG.EXE. Right-click on it and choose Properties 1 Program. Change the
Cmd line to C:\THATPRG\RU N\AUTOEXEC. BAT.
Explanation:
In order to use a different AUTOEXEC.BAT file with a program, you should specify the
AUTOEXEC.BAT file in the Advanced Program properties of the program. Locate the
program (THATPRG.EXE). Right-click on it and choose Properties 1 Program 1 Advanced.
You can then change the Autoexec file name from the default.
When you restart your computer in MS-DOS mode, the operating system automatically
runs the default CONFIG.SYS and AUTOEXEC.BAT, and then runs the DOSSTART.BAT
file, it if exists. lf you edit the DOSSTART.BAT program to run the modified
AUTOEXEC.BAT file, then it will run every time you restart your computer.
Creating a DOSSTART.BAT file in the program directory will have no affect on which
autoexec.bat file will run. DOSSTART does not control which autoexec file runs, and the
operating system will not look for it in the program directory.
86. Jim complains that his Windows 2000 PC always seems fo be running slower than it
should. He runs the Disk Defragmenter once a week, and if always shows over 20%
fragmentation.
What can you do to help relieve the fragmentation problem?
1.
2.
3.
4.

Set the initial paging file size to zero, and the maximum paging file size to 1 GB.
Run Dr. Watson.
Schedule the Disk Defragmenter fo run twice a day.
Set the initial and maximum sizes of the paging file to the same value. <Correct>

Explanation:
Under Windows 2000, the default paging file size is set to 1.5 times the amount of

physical RAM installed. To improve performance, you should set the initial and maximum
sizes of the paging file to the same value. This prevents disk defragmentation that might
occur from having two different values. Windows 2000 does not normally need to change
the size of the paging file during processing.
To control file fragmentation, the paging file should not have a zero minimum size and a 1
GB maximum size.
Scheduling Disk Defragmenter to run twice a day would only prevent Jim from using the
computer, and the paging file could still cause fragmentation.
Dr. Watson monitors application operation and creates reports when a program crashes.
It does not help with disk fragmentation.
87. While Emilys child was playing at Emilys computer, she clicked on the Print button
several times. A 50-page document is printing.
Which of the following options will best prevent paper waste?
1. Open the print queue immediately. Pause the printer, and then delete ah of the print
jobs, including the current one. <Correct>
2. Let the current print job finish printing, and then open the print queue to delete the
remaining print jobs.
3. Shut the printer off immediately, and then turn it back on after five minutes.
4. While the current print job is printing, delete ah of the remaining print jobs.
Explanation:
The fastest way to stop the printer from printing items you do not want printed is to
open the print queue, pause the printer (to stop print jobs from spooling to the printer),
and then delete ah of the print jobs, including the one that is currently printing. A few
more pages may print, depending on how much has spooled in the printers internal
memory, but this will prevent paper waste.
Shutting off the printer will not stop the document from spooning, but it will cause a
communication error that may cause her printer to print pages with garbled characters
instead of the document when it is turned back on. Turning off the printer while it is
printing will likely cause a paper jam.
Emily should NOT let the current print job finish printing before opening the print queue
because data will continue to spool to the printers memory and the next job while begin
printing. There is nothing to prevent Emily from deleting the current print job while it is
printing.
88. In the CONFIG.SYS file for a Windows 9x computer, you find a command Files99.
What is the result of this command?
1. The command limits lO.SYS to opening 99 files at a time. <Correct>
2. During bootup the system creates 99 temporary files to be used for Internet
browsing.
3. It creates 99 buffers for temporary file storage.
4. It specifies that COMMAND.COM is 99 files from the master boot record.

Explanation:
Windows 9x loads real-mode drivers listed in CONFIG.SYS each time the system boots.
The CONFIG.SYS file can be used to limit the maximum number of files that lO.SYS can
open at any one time. The command FILES99 limits lO.SYS to loading 99 files at once.
The FILES command does not create temporary files or buffers.
lO.SYS runs during bootup of a Windows 9x computer and calls for COMMAND.00M, the
DOS command interpreter, to load. The location of COMMAND.00M on the hard drive is
not specified by the FILES command.
89. Which command starts the registry editor in Windows XP?
1.
2.
3.
4.

REGEDT16
REGEDT32
REGEDIT <Correct>
RGEDIT

Explanation:
REGEDIT is the command to start the registry editor in Windows XP.
In Windows NT/2000, both REGEDIT (the original Registry Editor included with
Windows 9x) and REGEDT32 (the Registry Editor for Windows NT/2000) are installed.
However, Microsoft recommends REGEDT32 over REGEDIT because REGEDT32 offers a
security menu and a read-only mode.
In Windows XP, the registry editor has been updated. The Windows XP registry editor is
again named regedit.exe. It provides many improvements over the previous version. It
combines the features of the original regedit.exe and the features of regedt32.exe into
one program.
90. You are working on a computer running Windows 9x, and you want fo remove the
Read Only attribute from a file.
How can you do this within Windows 9x? (Select two.)
1. Open the Control Panel 1 System applet, select the file in question, right-click, and
select
Properties.
2. Open Windows Explorer, select the file in question, and select Options from the View
menu.
3. Open My Computer, find and select the file in question, right-click the file, and select
Properties. <Correct>
4. Open Windows Explorer, select the file in question, right-click, and select
Properties. <Correct>
5. Open Start Menu, select the desired file, right-click the file, and select Properties.
Explanation:
You can display and change file attributes by browsing to the file in question from My

Computer or in Windows Explorer, right-clicking on the filename, and selecting


Properties. Check off the attributes you want to set, and uncheck those attributes you
do not want set.
The System applet is for hardware and resource settings, and the Start Menu is for
launching applications, not changing file attributes.
The Options selection in the Windows Explorer View menu displays file associations.
91. Which of the following utilities is used to verify that another computer s online
and connected to the network?
1.
2.
3.
4.

TELNET
TRACERT
PING <Correct>
FTP

Explanation:
The PING utility/command (for example, ping 208.160.120.17) is used to send test data
packets to verify connectivity to another computer using ICMP. The Internet Control
Message Protocol (ICMP) s part of the TCP/IP suite of protocols. It is an errorreporting Protocol . PING sends an ICMP Echo Request to a target name (like computer2)
or IP address. The resulting ICMP Echo Reply verifies that a TCP/IP configuration is set
up properly and that the destination host is online and connected to the network.
TRACERT is also a TCP/IP utility. It uses ICMP echo requests to trace the route a data
packet fakes to its destination. The TRACERT command displays the hop count (also
called the metric, the number of routers the signal must pass through to get to the
destination), the time each hop fakes (in milliseconds), the name of the computer or
router passed through (optional), and the IP address of each router in the hop.
TRACERT works with IP addresses, host names, and domain names. Like PING, TRACERT
can verify a system is online, but that is not its primary purpose.
The FTP (File Transfer Protocol - part of the TCP/IP suite of protocols) is a utility
program that allows the bi-directional transfer (uploading and downloading) of files
between two networked hosts. A small FTP client program runs on the remote computer
and accesses a larger FTP server running on a host. FTP is not used to verify that
another system is anime.
The TCP/IP utility TELNET allows a computer to connect to a UNIX host by emulating a
terminal (such as a DEC VT1 00) and establishing a remate command-line window.
TELNET is not used to verify that another system is anime.
92. You can use Windows Internet Name Service (WINS) or the Domain Name Service
(DNS) to resolve Internet IP addresses. Which of the following statements s
correct about WINS and DNS?
1. WINS resolves Fully Qualified Domain Names to IP addresses and DNS resolves
NetBIOS names to IP addresses.
2. WINS resolve NetBIOS names to IP addresses and DNS resolves Fully Qualified
Domain Names to IP addresses. <Correct>

3. WINS resolves LMHDSTS names to IP addresses and DNS resolves NetBIOS names
to IP addresses.
4. WINS resolves host names to IP addresses and DNS resolves Fully Qualified Domain
Names to IP addresses.
93. Kay was installing Windows 9x onto her computer when the setup process failed
before the first reboot. Which of the following files can she use to determine
what might have caused the failure?
1.
2.
3.
4.

DETLOG.TXT
BODTLOG.TXT
SETUPLOG.TXT <Correct>
DETCRASH.LOG

Explanation:
Windows 9x provides the following log files that help you to determine the cause of a
setup or startup failure: BDOTLOG.TXT, SETUPLOG.TXT, DETLOG.TXT, and
DETCRASH .LOG.
The BODTLOG.TXT file documents the events that occur when a system is started.
lf Setup encounters an error or stops before your computer is restarted for the first
time during Setup, you must turn off the computer, turn it back on, and then run the
Setup program again. After the Setup wizard has started again, Setup determines that a
failure occurred, and the Safe Recovery screen appears. It you choose to use Safe
Recovery, Setup examines the Setuplog.txt file to determine where the failure occurred.
Setup then resumes from the point where the failure occurred. The SETUPLOG.TXT file
holds setup information that was determined when Windows 9x was installed. You should
use this file to determine what event was occurring when the Setup process fails. It is
used by Safe Recovery to determine where Setup will resume.
After the first reboot, the Setup process enters the Hardware Detection phase. The
DETLOG.TXT file and DETCRASH.LOG files record what occurs during hardware
detection. The DETLOG.TXT file contains the same information as the DETCRASH.LDG
file; however, it can be read easily by a text editor such as Notepad. Both of these files
enable you to determine the hardware components that have been detected prior to the
system crashing. DETCRASH.LOG is used by Setup to determine what steps were
successfully completed so that Setup will not fail on the same problem again.
94. You Windows XP system is failing to boot normally. It starts in Safe Mode. Which
startup option should you use to determine what is causing the failure?
1.
2.
3.
4.

Enable Boot Logging<Correct>


Enable VGA Mode
Debugging Mode
Recovery Console

Explanation:
Enable Boot Logging is the best choice. The Enable Boot Logging option allows the system

to boot normally while recording ah files loaded during the boot process. The log is
recorded in a file named NTBTLOG.TXT. The log will identify which drivers loaded and
which failed. This is especially helpful if you have a copy of the NTBTLOG.TXT file that
was created before there was a problem. You then could compare them to see whaf has
changed.
The Recovery Console does not start the graphical interface, but it does allow you to
access any FAT16, FAT32, and NTFS file systems. The purpose of the Recovery Console
is to allow you to repair a damaged registry, system files, or file system on the hard
drive.
Enable VGA Mode is used when the video setting is such that you cannot see the screen
well enough to fix a bad setting. This can happen if a user creates a desktop with black
fonts on a black background, or something similar to that. Booting in this mode gives you
very plain VGA video but allows you to change the settings in the Display properties.
Debugging Mode gives you the opportunity to move system boot logs from the failing
computer to another computer for evaluation. To use this mode, you first must connect
the failing computer to another computer using a serial cable. You then can review the
boot logs on a functioning computer.
95. Your PC experiences an Invalid Page Fault. What wiIl happen to the application that s
running?
1.
2.
3.
4.

The application
The application
The application
The application

will stop running and have to be reloaded. <Correct>


will be able to continue after you locate the proper page.
will continue running normally.
will be corrupted and will have tfo be reinstalled.

Explanation:
Windows uses Virtual Memory to optimize its use of installed physical memory (RAM).
A section of the hard drive s set aside for use as a swap file, and the computer treats
the memory space on the hard disk as if it were RAM. Data and program information s
stored in and retrieved from RAM and the hard drive in chunks called pages. When the
Virtual Machine Manager tries to access information that is not in virtual memory, a Page
Fault is issued. A Page Fault does not mean that there is a problem with the system -- it
is just an indication that information needs to be moved from the swap file to the RAM.
Page Faults will not cause the operating system or application to stop, but excessive Page
Faults will cause the system to run slow.
An Invalid Page Fault occurs when the Memory Manager tries to load a page for an
application into an area that is already occupied by an application. At a minimum, this will
cause the application to stop running, and if will have to be reloaded. Sometimes the
entire operating system will crash and have to be rebooted.
You cannot locate the proper page -- this is a Virtual Machine Manager function.
The application will not be able to continue, buf it unlikely fhaf it will be corrupted and
need to be reinstalled.

96. Depending on the Windows configuration, the Registry may consist of three files.
In Windows 98, what are the names of the three files and what extension is used
for the backup copy of the files?
1. The Registry consists of a SYSTEM.DAT file and a USER.DAT file. The third file,
POLICY.CFG, is only used if System Policies are enabled. The extension used to
backup the Registry files is BAK.
2. The Registry consists of a SYSTEM.DAT file and a USER.DAT file. The third file,
POLICY.POL, is only used if System Policies are enabled. Registry files are backed up
to a CAB file named RBxxx.CAB. <Correct>
3. The Registry consists of a REG.DAT and a CDNFIG.DAT file. The third file,
POLICY.DAT, is used when System Policies are enabled. The extension used to backup
the Registry files is BAK.
4. The Registry consists of a REG.DAT and a CDNFIG.DAT file. The third file,
POLICY.DAT, is used when System Policies are enabled. Registry files are backed up
to a CAB file named RBxxx.CAB.
5. The Registry consists of a REG.DAT and a CDNFIG.DAT file. The third file,
POLICY.DAT, is used when System Policies are enabled. The extension used to backup
the Registry files is DAO.
6. The Registry consists of a SYSTEM.DAT file and a USER.DAT file. The third file,
POLICY.DAT, is used when System Policies are enabled. The extension used to backup
the Registry files is DAO.
Explanation:
In all versions of Windows, the Registry consists of a SYSTEM.DAT and a USER.DAT
file. The SYSTEM.DAT file consists of hardware configuration information. The
USER.DAT file consists of user-specific information. A third file, PDLICY.POL, is used
only when System Policies are enabled. It contains the System Policy information.
Windows 95 creates a backup copy of the SYSTEM.DAT and USER.DAT files when you
boot the system. The extension used to backup the Registry files is DAO.
Starting with Windows 98, the Registry Checker (SCANREGW.EXE) runs automatically
when starting up Windows. It scans the Registry for errors, and then backs up the
Registry. When the Register Checker backs up the files, it creates a CAB file named
RBxxx.CAB. RB stands for Registry backup, and xxx is a three-digit number. CAB files
are special internal Windows files (cabinet files).
REG.DAT, CONFIG.DAT, and PDLICY.DAT are not Registry files.
Registry backups do not have a BAK extension in any Windows 9x or later versions.
97. After installing a new device driver for your video card in your Windows XP
system, you find that the computer stalls during bootup. Which boot option would
be the best way to correct the problem?
1.
2.
3.
4.

Safe Mode
Last Known Good Configuration <Correct>
Enable VGA Mode
Safe Mode with Command Prompt

Explanation:
Last Known Good Configuration is the best choice for this situation. Windows NT, 2000,
and XP ah keep a copy of the Last Known Good Configuration in the registry. If
something is configured incorrectly, you can restore the settings used for the last
successful boot. Any settings changes made since the last successful boot will be lost.
Safe mode boots the operating system with a minimum configuration, and can be used to
solve problems with a new hardware installation or problems caused by user settings.
Safe mode boots with the mouse, basic video, keyboard, and mass storage drivers loaded.
If uses the default system services (not any extra services) and does not provide
network access. It does provide a graphical interface.
Safe mode with Command Prompt is the same as Safe Mode but does not load the
graphical interface.
Enable VGA Mode is used when the video setting is such that you cannot see the screen
well enough to fix a bad setting. This can happen if a user creates a desktop with black
fonts on a black background, or something similar to that. Booting in this mode gives you
very plain VGA video but ah lows you to change the settings in the Display properties.
98. Which two of the following protocols are used for sending and receiving e-mail?
(Choose two.)
1.
2.
3.
4.
5.

PPP
FTP
SMTP <Correct>
SNMP
POP<Correct>

Explanation:
Simple Mail Transfer Protocol (SMTP) and Post Office Protocol (POP) are both part of
the TCP/IP suite of protocols and are used for e-mail. SMTP, which uses Port 25, is
typically used for e-mail transfers between mail servers; that is, you use it to send mail.
POP, which uses Port 110, is used for transferring e-mail from a mail server to an e-mail
client; that is, you use it to receive mail.
The FTP (File Transfer Protocol) utility program allows the bi-directional transfer of
files between two networked hosts. Both hosts must be using TCP/IP, and the source
host (the file server) must be running the FTP server daemon application.
Point-to-Point Protocol (PPP) is a communication protocol used in dial-up connections.
SNMP (Simple Network Management Protocol) is used for collecting information about
devices on a network.
99. What s the best way to keep your Windows system up to date in regard to
Windows patches and updates?
1. Set your browser home page to www.microsoft.com.
2. Run Dr. Watson every day.

3. Access the windowsupdate.microsoft.com Web site often to check for critical


updates. <Correct>
4. Set your browser home page to www.msn.com.
Explanation:
Microsoft offers patches, fixes, and updates for known problems and has an extensive
knowledge base documenting problems and their solutions. You can access the Windows
Update Web site at http://windowsupdate.microsoft.com. Choose the link to scan for
available updates, and the Web server checks the installed updates on your computer
with a database of known problems, and then generates a list for you to download and
install the updates. Microsoft offers an Automatic Update program which adds an applet
to the Control Panel in Windows 9x and Windows 2000 and can be configured to check
the Windows update Web site on a schedule of your liking. In Windows XP, it can be
found in the Control Panel 1 System applet.
Setting your browser home page to either MSN (The Microsoft Network) or the
Microsoft site will not offer the features available to update your computer like those at
windowsupdate.microsoft.com Dr. Watson is a utility to record problems with
applications. It does not fix problems.
100. Phil is using Windows 9x. The computer hangs on bootup without any error
messages being displayed. Which of the following tools should he use to fry to
solve this problem? (Choose two.)
1.
2.
3.
4.

System Disk
Startup Menu <Correct>
Repair Menu
Emergency Startup Disk <Correct>

Explanation:
If your system will not load Windows 9x, you can use the Startup Menu or your
Emergency Startup Disk to boot the system and begin troubleshooting. You should
create an Emergency Startup Disk when you install Windows 9x. It contains the
operating system files and troubleshooting utilities, and can be used to boot up the
system if your system crashes and will not re-boot. If you do not create an Emergency
Startup Disk during setup, or it you lose your disk, you can create a new disk using the
Add/Remove Programs applet in Control Panel.
To display the Startup Menu, you must press the F8 key when the Starting Windows 9x
message is displayed. The Startup Menu enables you to start the system in Normal,
Logged, Safe, or Step-by-Step Confirmation Mode. Windows 95 and Windows 98 can also
be started in DOS mode with or without networking support. Windows Me does not offer
these choices. The Step-by-Step Confirmation Mode displays the startup commands lineby-line so that you can determine which command is causing the problem.
You press the F5 key to boot up in Safe Mode. This enables you to start a basic version
of Windows 9x, but skip the startup files CONFIG.SYS, AUTOEXEC.BAT, SYSTEM.INI,
and WIN.INI. In Safe Mode, you can still access the Windows 9x configuration files to
troubleshoot the problem.

También podría gustarte